Security update for the Linux Kernel
| Announcement ID: | SUSE-SU-2026:0293-1 |
|---|---|
| Release Date: | 2026-01-26T11:37:04Z |
| Rating: | important |
| References: |
|
| Cross-References: |
|
| CVSS scores: |
|
| Affected Products: |
|
An update that solves 334 vulnerabilities, contains 26 features and has 23 security fixes can now be installed.
Description:
The SUSE Linux Enterprise 15 SP6 kernel was updated to fix various security issues
The following security issues were fixed:
- CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328).
- CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256).
- CVE-2025-39890: wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event (bsc#1250334).
- CVE-2025-39977: futex: Prevent use-after-free during requeue-PI (bsc#1252046).
- CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342).
- CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686).
- CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824).
- CVE-2025-40042: tracing: Fix race condition in kprobe initialization causing NULL pointer dereference (bsc#1252861).
- CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808).
- CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776).
- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).
- CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386).
- CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).
- CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408).
- CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).
- CVE-2025-40167: ext4: detect invalid INLINE_DATA + EXTENTS flag combination (bsc#1253458).
- CVE-2025-40170: net: use dst_dev_rcu() in sk_setup_caps() (bsc#1253413).
- CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).
- CVE-2025-40179: ext4: verify orphan file size is not too big (bsc#1253442).
- CVE-2025-40187: net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce() (bsc#1253647).
- CVE-2025-40215: kABI: xfrm: delete x->tunnel as we delete x (bsc#1254959).
- CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520).
- CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813).
- CVE-2025-40242: gfs2: Fix unlikely race in gdlm_put_lock (bsc#1255075).
- CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1254843).
- CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self() (bsc#1254847).
- CVE-2025-40297: net: bridge: fix use-after-free due to MST port state bypass (bsc#1255187).
- CVE-2025-40328: smb: client: fix potential UAF in smb2_close_cached_fid() (bsc#1254624).
- CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).
- CVE-2025-68259: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced (bsc#1255199).
The following non security issues were fixed:
- ACPI: processor_core: fix map_x2apic_id for amd-pstate on am4 (git-fixes).
- ACPI: property: Fix fwnode refcount leak in acpi_fwnode_graph_parse_endpoint() (git-fixes).
- ALSA: dice: fix buffer overflow in detect_stream_formats() (git-fixes).
- ALSA: firewire-motu: add bounds check in put_user loop for DSP events (git-fixes).
- ALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events (git-fixes).
- ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi() (git-fixes).
- ALSA: uapi: Fix typo in asound.h comment (git-fixes).
- ALSA: usb-audio: Add DSD quirk for LEAK Stereo 230 (stable-fixes).
- ASoC: Intel: catpt: Fix error path in hw_params() (git-fixes).
- ASoC: ak4458: Disable regulator when error happens (git-fixes).
- ASoC: ak5558: Disable regulator when error happens (git-fixes).
- ASoC: codecs: wcd938x: fix OF node leaks on probe failure (git-fixes).
- ASoC: fsl_xcvr: clear the channel status control memory (git-fixes).
- ASoC: qcom: q6adm: the the copp device only during last instance (git-fixes).
- ASoC: qcom: q6asm-dai: perform correct state check before closing (git-fixes).
- ASoC: qcom: qdsp6: q6asm-dai: set 10 ms period and buffer alignment (git-fixes).
- ASoC: stm32: sai: fix OF node leak on probe (git-fixes).
- ASoC: stm32: sai: fix clk prepare imbalance on probe failure (git-fixes).
- ASoC: stm32: sai: fix device leak on probe (git-fixes).
- Bluetooth: HCI: Fix tracking of advertisement set/instance 0x00 (git-fixes).
- Bluetooth: SMP: Fix not generating mackey and ltk when repairing (git-fixes).
- Bluetooth: hci_sock: Prevent race in socket write iter and sock bind (git-fixes).
- Documentation/kernel-parameters: fix typo in retbleed= kernel parameter description (git-fixes).
- Documentation: hid-alps: Fix packet format section headings (git-fixes).
- Documentation: parport-lowlevel: Separate function listing code blocks (git-fixes).
- HID: logitech-dj: Remove duplicate error logging (git-fixes).
- HID: logitech-hidpp: Do not assume FAP in hidpp_send_message_sync() (git-fixes).
- Input: cros_ec_keyb - fix an invalid memory access (stable-fixes).
- Input: goodix - add support for ACPI ID GDIX1003 (stable-fixes).
- Input: goodix - add support for ACPI ID GDX9110 (stable-fixes).
- KEYS: trusted: Fix a memory leak in tpm2_load_cmd (git-fixes).
- KEYS: trusted_tpm1: Compare HMAC values in constant time (git-fixes).
- PCI/PM: Reinstate clearing state_saved in legacy and !PM codepaths (git-fixes).
- PCI: dwc: Fix wrong PORT_LOGIC_LTSSM_STATE_MASK definition (git-fixes).
- PCI: keystone: Exit ks_pcie_probe() for invalid mode (git-fixes).
- PCI: rcar-gen2: Drop ARM dependency from PCI_RCAR_GEN2 (git-fixes).
- Revert "mtd: rawnand: marvell: fix layouts" (git-fixes).
- USB: Fix descriptor count when handling invalid MBIM extended descriptor (git-fixes).
- USB: serial: belkin_sa: fix TIOCMBIS and TIOCMBIC (git-fixes).
- USB: serial: ftdi_sio: add support for u-blox EVK-M101 (stable-fixes).
- USB: serial: kobil_sct: fix TIOCMBIS and TIOCMBIC (git-fixes).
- USB: serial: option: add Quectel RG255C (stable-fixes).
- USB: serial: option: add Telit FN920C04 ECM compositions (stable-fixes).
- USB: serial: option: add UNISOC UIS7720 (stable-fixes).
- USB: serial: option: add support for Rolling RW101R-GL (stable-fixes).
- USB: storage: Remove subclass and protocol overrides from Novatek quirk (git-fixes).
- arm64: zynqmp: Fix usb node drive strength and slew rate (git-fixes).
- arm64: zynqmp: Revert usb node drive strength and slew rate for (git-fixes).
- atm/fore200e: Fix possible data race in fore200e_open() (git-fixes).
- atm: idt77252: Add missing
dma_map_error()(stable-fixes). - backlight: led-bl: Add devlink to supplier LEDs (git-fixes).
- backlight: lp855x: Fix lp855x.h kernel-doc warnings (git-fixes).
- bs-upload-kernel: Fix cve branch uploads.
- btrfs: make sure extent and csum paths are always released in scrub_raid56_parity_stripe() (git-fixes).
- can: gs_usb: gs_usb_xmit_callback(): fix handling of failed transmitted URBs (git-fixes).
- can: kvaser_usb: leaf: Fix potential infinite loop in command parsers (git-fixes).
- can: sja1000: fix max irq loop handling (git-fixes).
- can: sun4i_can: sun4i_can_interrupt(): fix max irq loop handling (git-fixes).
- cifs: Fix uncached read into ITER_KVEC iterator (bsc#1245449).
- cifs: after disabling multichannel, mark tcon for reconnect (git-fixes).
- cifs: avoid redundant calls to disable multichannel (git-fixes).
- cifs: cifs_pick_channel should try selecting active channels (git-fixes).
- cifs: deal with the channel loading lag while picking channels (git-fixes).
- cifs: dns resolution is needed only for primary channel (git-fixes).
- cifs: do not disable interface polling on failure (git-fixes).
- cifs: do not search for channel if server is terminating (git-fixes).
- cifs: fix a pending undercount of srv_count (git-fixes).
- cifs: fix lock ordering while disabling multichannel (git-fixes).
- cifs: fix stray unlock in cifs_chan_skip_or_disable (git-fixes).
- cifs: fix use after free for iface while disabling secondary channels (git-fixes).
- cifs: handle servers that still advertise multichannel after disabling (git-fixes).
- cifs: handle when server starts supporting multichannel (git-fixes).
- cifs: handle when server stops supporting multichannel (git-fixes).
- cifs: make cifs_chan_update_iface() a void function (git-fixes).
- cifs: make sure server interfaces are requested only for SMB3+ (git-fixes).
- cifs: make sure that channel scaling is done only once (git-fixes).
- cifs: reconnect worker should take reference on server struct unconditionally (git-fixes).
- cifs: reset connections for all channels when reconnect requested (git-fixes).
- cifs: reset iface weights when we cannot find a candidate (git-fixes).
- cifs: serialize other channels when query server interfaces is pending (git-fixes).
- cifs: update dstaddr whenever channel iface is updated (git-fixes).
- clk: qcom: camcc-sm6350: Fix PLL config of PLL2 (git-fixes).
- clk: qcom: camcc-sm6350: Specify Titan GDSC power domain as a parent to other (git-fixes).
- clk: renesas: cpg-mssr: Add missing 1ms delay into reset toggle callback (git-fixes).
- clk: renesas: r9a06g032: Fix memory leak in error path (git-fixes).
- comedi: c6xdigio: Fix invalid PNP driver unregistration (git-fixes).
- comedi: check device's attached status in compat ioctls (git-fixes).
- comedi: multiq3: sanitize config options in multiq3_attach() (git-fixes).
- comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel() (git-fixes).
- cpufreq: intel_pstate: Check IDA only before MSR_IA32_PERF_CTL writes (git-fixes).
- cpuidle: menu: Use residency threshold in polling state override decisions (bsc#1255026).
- crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id (git-fixes).
- crypto: authenc - Correctly pass EINPROGRESS back up to the caller (git-fixes).
- crypto: ccree - Correctly handle return of sg_nents_for_len (git-fixes).
- crypto: hisilicon/qm - restore original qos values (git-fixes).
- crypto: iaa - Fix incorrect return value in save_iaa_wq() (git-fixes).
- crypto: rockchip - drop redundant crypto_skcipher_ivsize() calls (git-fixes).
- dm-integrity: limit MAX_TAG_SIZE to 255 (git-fixes).
- dm-verity: fix unreliable memory allocation (git-fixes).
- dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386).
- drivers/usb/dwc3: fix PCI parent check (git-fixes).
- drm/amd/display: Check NULL before accessing (stable-fixes).
- drm/amd/display: Fix logical vs bitwise bug in get_embedded_panel_info_v2_1() (git-fixes).
- drm/amd/display: Increase DPCD read retries (stable-fixes).
- drm/amd/display: Move sleep into each retry for retrieve_link_cap() (stable-fixes).
- drm/amdgpu: Skip emit de meta data on gfx11 with rs64 enabled (stable-fixes).
- drm/amdgpu: add missing lock to amdgpu_ttm_access_memory_sdma (git-fixes).
- drm/amdgpu: fix cyan_skillfish2 gpu info fw handling (git-fixes).
- drm/gma500: Remove unused helper psb_fbdev_fb_setcolreg() (git-fixes).
- drm/mediatek: Fix CCORR mtk_ctm_s31_32_to_s1_n function issue (git-fixes).
- drm/mediatek: Fix device node reference leak in mtk_dp_dt_parse() (git-fixes).
- drm/mgag200: Fix big-endian support (git-fixes).
- drm/msm/a2xx: stop over-complaining about the legacy firmware (git-fixes).
- drm/msm/a6xx: Fix out of bound IO access in a6xx_get_gmu_registers (git-fixes).
- drm/msm/a6xx: Flush LRZ cache before PT switch (git-fixes).
- drm/msm/dpu: Remove dead-code in dpu_encoder_helper_reset_mixers() (git-fixes).
- drm/nouveau: restrict the flush page to a 32-bit address (git-fixes).
- drm/ttm: Avoid NULL pointer deref for evicted BOs (git-fixes).
- drm/vgem-fence: Fix potential deadlock on release (git-fixes).
- drm: nouveau: Replace sprintf() with sysfs_emit() (git-fixes).
- drm: sti: fix device leaks at component probe (git-fixes).
- efi/libstub: Describe missing 'out' parameter in efi_load_initrd (git-fixes).
- efi/libstub: Fix page table access in 5-level to 4-level paging transition (git-fixes).
- fbdev: pxafb: Fix multiple clamped values in pxafb_adjust_timing (git-fixes).
- fbdev: ssd1307fb: fix potential page leak in ssd1307fb_probe() (git-fixes).
- fbdev: tcx.c fix mem_map to correct smem_start offset (git-fixes).
- firmware: imx: scu-irq: fix OF node leak in (git-fixes).
- firmware: stratix10-svc: Add mutex in stratix10 memory management (git-fixes).
- firmware: stratix10-svc: fix bug in saving controller data (git-fixes).
- firmware: stratix10-svc: fix make htmldocs warning for stratix10_svc (git-fixes).
- gpu: host1x: Fix race in syncpt alloc/free (git-fixes).
- hwmon: (max16065) Use local variable to avoid TOCTOU (git-fixes).
- hwmon: (w83791d) Convert macros to functions to avoid TOCTOU (git-fixes).
- hwmon: (w83l786ng) Convert macros to functions to avoid TOCTOU (git-fixes).
- hwmon: sy7636a: Fix regulator_enable resource leak on error path (git-fixes).
- i2c: amd-mp2: fix reference leak in MP2 PCI device (git-fixes).
- i2c: i2c.h: fix a bad kernel-doc line (git-fixes).
- i3c: master: svc: Prevent incomplete IBI transaction (git-fixes).
- iio: accel: bmc150: Fix irq assumption regression (stable-fixes).
- iio: accel: fix ADXL355 startup race condition (git-fixes).
- iio: adc: ad7280a: fix ad7280_store_balance_timer() (git-fixes).
- iio: core: Clean up device correctly on iio_device_alloc() failure (git-fixes).
- iio: core: add missing mutex_destroy in iio_dev_release() (git-fixes).
- iio: imu: st_lsm6dsx: Fix measurement unit for odr struct member (git-fixes).
- iio: imu: st_lsm6dsx: fix array size for st_lsm6dsx_settings fields (git-fixes).
- iio: st_lsm6dsx: Fixed calibrated timestamp calculation (git-fixes).
- ima: Handle error code returned by ima_filter_rule_match() (git-fixes).
- intel_th: Fix error handling in intel_th_output_open (git-fixes).
- ipmi: Fix handling of messages with provided receive message pointer (git-fixes).
- ipmi: Rework user message limit handling (git-fixes).
- irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc() (git-fixes).
- kconfig/mconf: Initialize the default locale at startup (stable-fixes).
- kconfig/nconf: Initialize the default locale at startup (stable-fixes).
- leds: leds-lp50xx: Allow LED 0 to be added to module bank (git-fixes).
- leds: leds-lp50xx: Enable chip before any communication (git-fixes).
- leds: leds-lp50xx: LP5009 supports 3 modules for a total of 9 LEDs (git-fixes).
- leds: netxbig: Fix GPIO descriptor leak in error paths (git-fixes).
- lib/vsprintf: Check pointer before dereferencing in time_and_date() (git-fixes).
- mailbox: mailbox-test: Fix debugfs_create_dir error checking (git-fixes).
- media: TDA1997x: Remove redundant cancel_delayed_work in probe (git-fixes).
- media: adv7842: Avoid possible out-of-bounds array accesses in adv7842_cp_log_status() (git-fixes).
- media: amphion: Cancel message work before releasing the VPU core (git-fixes).
- media: atomisp: Prefix firmware paths with "intel/ipu/" (bsc#1252973).
- media: atomisp: Remove firmware_name module parameter (bsc#1252973).
- media: cec: Fix debugfs leak on bus_register() failure (git-fixes).
- media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg() (git-fixes).
- media: i2c: ADV7604: Remove redundant cancel_delayed_work in probe (git-fixes).
- media: i2c: adv7842: Remove redundant cancel_delayed_work in probe (git-fixes).
- media: msp3400: Avoid possible out-of-bounds array accesses in msp3400c_thread() (git-fixes).
- media: pvrusb2: Fix incorrect variable used in trace message (git-fixes).
- media: rc: st_rc: Fix reset control resource leak (git-fixes).
- media: renesas: rcar_drif: fix device node reference leak in rcar_drif_bond_enabled (git-fixes).
- media: samsung: exynos4-is: fix potential ABBA deadlock on init (git-fixes).
- media: v4l2-mem2mem: Fix outdated documentation (git-fixes).
- media: verisilicon: Protect G2 HEVC decoder against invalid DPB index (git-fixes).
- media: videobuf2: Fix device reference leak in vb2_dc_alloc error path (git-fixes).
- media: vidtv: initialize local pointers upon transfer of memory ownership (git-fixes).
- media: vpif_capture: fix section mismatch (git-fixes).
- media: vpif_display: fix section mismatch (git-fixes).
- mfd: altera-sysmgr: Fix device leak on sysmgr regmap lookup (git-fixes).
- mfd: da9055: Fix missing regmap_del_irq_chip() in error path (git-fixes).
- mfd: max77620: Fix potential IRQ chip conflict when probing two devices (git-fixes).
- mfd: mt6358-irq: Fix missing irq_domain_remove() in error path (git-fixes).
- mfd: mt6397-irq: Fix missing irq_domain_remove() in error path (git-fixes).
- most: usb: fix double free on late probe failure (git-fixes).
- mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add() (git-fixes).
- mtd: lpddr_cmds: fix signed shifts in lpddr_cmds (git-fixes).
- mtd: maps: pcmciamtd: fix potential memory leak in pcmciamtd_detach() (git-fixes).
- mtd: nand: relax ECC parameter validation check (git-fixes).
- mtd: rawnand: lpc32xx_slc: fix GPIO descriptor leak on probe error and remove (git-fixes).
- mtd: rawnand: renesas: Handle devm_pm_runtime_enable() errors (git-fixes).
- net: phy: adin1100: Fix software power-down ready condition (git-fixes).
- net: phy: mxl-gpy: fix bogus error on USXGMII and integrated PHY (git-fixes).
- net: phy: mxl-gpy: fix link properties on USXGMII and internal PHYs (git-fixes).
- nvme: Use non zero KATO for persistent discovery connections (git-fixes).
- orangefs: fix xattr related buffer overflow.. (git-fixes).
- phy: broadcom: bcm63xx-usbh: fix section mismatches (git-fixes).
- phy: renesas: rcar-gen3-usb2: Fix an error handling path in rcar_gen3_phy_usb2_probe() (git-fixes).
- pinctrl: stm32: fix hwspinlock resource leak in probe function (git-fixes).
- platform/chrome: cros_ec_ishtp: Fix UAF after unbinding driver (git-fixes).
- platform/x86: asus-wmi: use brightness_set_blocking() for kbd led (git-fixes).
- platform/x86: intel: chtwc_int33fe: don't dereference swnode args (git-fixes).
- platform/x86: intel: punit_ipc: fix memory corruption (git-fixes).
- power: supply: apm_power: only unset own apm_get_power_status (git-fixes).
- power: supply: cw2015: Check devm_delayed_work_autocancel() return code (git-fixes).
- power: supply: rt9467: Prevent using uninitialized local variable in rt9467_set_value_from_ranges() (git-fixes).
- power: supply: rt9467: Return error on failure in rt9467_set_value_from_ranges() (git-fixes).
- power: supply: wm831x: Check wm831x_set_bits() return value (git-fixes).
- powerpc/64s/slb: Fix SLB multihit issue during SLB preload (bac#1236022 ltc#211187).
- powerpc/eeh: fix recursive pci_lock_rescan_remove locking in EEH event handling (bsc#1253262 ltc#216029).
- pwm: bcm2835: Make sure the channel is enabled after pwm_request() (git-fixes).
- regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex (git-fixes).
- regulator: core: disable supply if enabling main regulator fails (git-fixes).
- rpmsg: glink: fix rpmsg device leak (git-fixes).
- rtc: gamecube: Check the return value of ioremap() (git-fixes).
- scripts: teaapi: Add paging.
- scrits: teaapi: Add list_repos.
- scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119).
- scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119).
- scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).
- scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119).
- scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119).
- scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).
- scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119).
- scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119).
- scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).
- scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).
- serial: amba-pl011: prefer dma_mapping_error() over explicit address checking (git-fixes).
- slimbus: ngd: Fix reference count leak in qcom_slim_ngd_notify_slaves (git-fixes).
- smb3: add missing null server pointer check (git-fixes).
- smb: client: fix cifs_pick_channel when channel needs reconnect (git-fixes).
- smb: client: fix warning when reconnecting channel (git-fixes).
- smb: client: introduce close_cached_dir_locked() (git-fixes).
- soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).
- soc: amlogic: canvas: fix device leak on lookup (git-fixes).
- soc: qcom: ocmem: fix device leak on lookup (git-fixes).
- soc: qcom: smem: fix hwspinlock resource leak in probe error paths (git-fixes).
- spi: amlogic-spifc-a1: Handle devm_pm_runtime_enable() errors (git-fixes).
- spi: bcm63xx: drop wrong casts in probe() (git-fixes).
- spi: bcm63xx: fix premature CS deassertion on RX-only transactions (git-fixes).
- spi: tegra210-qspi: Remove cache operations (git-fixes).
- spi: tegra210-quad: Add support for internal DMA (git-fixes).
- spi: tegra210-quad: Check hardware status on timeout (bsc#1253155).
- spi: tegra210-quad: Fix timeout handling (bsc#1253155).
- spi: tegra210-quad: Fix timeout handling (git-fixes).
- spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155).
- spi: tegra210-quad: Update dummy sequence configuration (git-fixes).
- staging: fbtft: core: fix potential memory leak in fbtft_probe_common() (git-fixes).
- thunderbolt: Add support for Intel Wildcat Lake (stable-fixes).
- tracing: Fix access to trace_event_file (bsc#1254373).
- uio: uio_fsl_elbc_gpcm:: Add null pointer check to uio_fsl_elbc_gpcm_probe (git-fixes).
- usb: cdns3: Fix double resource release in cdns3_pci_probe (git-fixes).
- usb: chaoskey: fix locking for O_NONBLOCK (git-fixes).
- usb: chipidea: udc: limit usb request length to max 16KB (stable-fixes).
- usb: dwc2: fix hang during suspend if set as peripheral (git-fixes).
- usb: dwc3: Abort suspend on soft disconnect failure (git-fixes).
- usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths (git-fixes).
- usb: dwc3: pci: Sort out the Intel device IDs (stable-fixes).
- usb: dwc3: pci: add support for the Intel Nova Lake -S (stable-fixes).
- usb: gadget: configfs: Correctly set use_os_string at bind (git-fixes).
- usb: gadget: f_eem: Fix memory leak in eem_unwrap (git-fixes).
- usb: gadget: renesas_usbf: Handle devm_pm_runtime_enable() errors (git-fixes).
- usb: gadget: tegra-xudc: Always reinitialize data toggle when clear halt (git-fixes).
- usb: phy: Initialize struct usb_phy list_head (git-fixes).
- usb: raw-gadget: cap raw_io transfer length to KMALLOC_MAX_SIZE (git-fixes).
- usb: raw-gadget: do not limit transfer length (git-fixes).
- usb: storage: Fix memory leak in USB bulk transport (git-fixes).
- usb: storage: sddr55: Reject out-of-bound new_pba (stable-fixes).
- usb: typec: tipd: Clear interrupts first (git-fixes).
- usb: typec: ucsi: psy: Set max current to zero when disconnected (git-fixes).
- usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer (git-fixes).
- usb: udc: Add trace event for usb_gadget_set_state (stable-fixes).
- usb: vhci-hcd: Prevent suspending virtually attached devices (git-fixes).
- watchdog: wdat_wdt: Fix ACPI table leak in probe function (git-fixes).
- wifi: ath11k: fix peer HE MCS assignment (git-fixes).
- wifi: ath11k: restore register window after global reset (git-fixes).
- wifi: cw1200: Fix potential memory leak in cw1200_bh_rx_helper() (git-fixes).
- wifi: ieee80211: correct FILS status codes (git-fixes).
- wifi: mac80211: fix CMAC functions not handling errors (git-fixes).
- wifi: mt76: Fix DTS power-limits on little endian systems (git-fixes).
- wifi: nl80211: vendor-cmd: intel: fix a blank kernel-doc line warning (git-fixes).
- wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring() (git-fixes).
- wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb() (git-fixes).
- x86/hyperv: Fix APIC ID and VP index confusion in hv_snp_boot_ap() (git-fixes).
- x86/microcode/AMD: Add TSA microcode SHAs (bsc#1256528).
- x86/microcode/AMD: Add Zen5 model 0x44, stepping 0x1 minrev (bsc#1256528).
- x86/microcode/AMD: Add more known models to entry sign checking (bsc#1256528).
- x86/microcode/AMD: Add some forgotten models to the SHA check (bsc#1256528).
- x86/microcode/AMD: Clean the cache if update did not load microcode (bsc#1256528).
- x86/microcode/AMD: Extend the SHA check to Zen5, block loading of any unreleased standalone Zen5 microcode patches (bsc#1256528).
- x86/microcode/AMD: Fix Entrysign revision check for Zen5/Strix Halo (bsc#1256528).
- x86/microcode/AMD: Fix __apply_microcode_amd()'s return value (bsc#1256528).
- x86/microcode/AMD: Limit Entrysign signature checking to known generations (bsc#1256528).
- x86/microcode/AMD: Load only SHA256-checksummed patches (bsc#1256528).
- x86/microcode/AMD: Select which microcode patch to load (bsc#1256528).
- x86/microcode/AMD: Use sha256() instead of init/update/final (bsc#1256528).
- x86/microcode: Fix Entrysign revision check for Zen1/Naples (bsc#1256528).
- xhci: dbgtty: fix device unregister (git-fixes).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.6
zypper in -t patch SUSE-2026-293=1 openSUSE-SLE-15.6-2026-293=1 -
SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2026-293=1 -
SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-293=1 -
SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-293=1 -
SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-293=1
Package List:
-
openSUSE Leap 15.6 (noarch nosrc)
- kernel-docs-6.4.0-150600.23.84.1
-
openSUSE Leap 15.6 (noarch)
- kernel-docs-html-6.4.0-150600.23.84.1
- kernel-devel-6.4.0-150600.23.84.1
- kernel-source-vanilla-6.4.0-150600.23.84.1
- kernel-source-6.4.0-150600.23.84.1
- kernel-macros-6.4.0-150600.23.84.1
-
openSUSE Leap 15.6 (nosrc ppc64le x86_64)
- kernel-debug-6.4.0-150600.23.84.1
-
openSUSE Leap 15.6 (ppc64le x86_64)
- kernel-debug-devel-6.4.0-150600.23.84.1
- kernel-debug-debuginfo-6.4.0-150600.23.84.1
- kernel-debug-debugsource-6.4.0-150600.23.84.1
- kernel-debug-devel-debuginfo-6.4.0-150600.23.84.1
-
openSUSE Leap 15.6 (x86_64)
- kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.84.1
- kernel-kvmsmall-vdso-6.4.0-150600.23.84.1
- kernel-default-vdso-debuginfo-6.4.0-150600.23.84.1
- kernel-default-vdso-6.4.0-150600.23.84.1
- kernel-debug-vdso-debuginfo-6.4.0-150600.23.84.1
- kernel-debug-vdso-6.4.0-150600.23.84.1
-
openSUSE Leap 15.6 (aarch64 ppc64le x86_64)
- kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1
- kernel-kvmsmall-devel-6.4.0-150600.23.84.1
- kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.84.1
- kernel-default-base-rebuild-6.4.0-150600.23.84.1.150600.12.38.1
- kernel-kvmsmall-debuginfo-6.4.0-150600.23.84.1
- kernel-kvmsmall-debugsource-6.4.0-150600.23.84.1
-
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
- cluster-md-kmp-default-6.4.0-150600.23.84.1
- kernel-default-debugsource-6.4.0-150600.23.84.1
- gfs2-kmp-default-debuginfo-6.4.0-150600.23.84.1
- kernel-obs-build-debugsource-6.4.0-150600.23.84.1
- kernel-syms-6.4.0-150600.23.84.1
- ocfs2-kmp-default-debuginfo-6.4.0-150600.23.84.1
- kselftests-kmp-default-6.4.0-150600.23.84.1
- kernel-default-devel-debuginfo-6.4.0-150600.23.84.1
- kernel-default-debuginfo-6.4.0-150600.23.84.1
- kernel-default-devel-6.4.0-150600.23.84.1
- dlm-kmp-default-6.4.0-150600.23.84.1
- kselftests-kmp-default-debuginfo-6.4.0-150600.23.84.1
- ocfs2-kmp-default-6.4.0-150600.23.84.1
- kernel-default-extra-debuginfo-6.4.0-150600.23.84.1
- kernel-obs-build-6.4.0-150600.23.84.1
- kernel-default-extra-6.4.0-150600.23.84.1
- reiserfs-kmp-default-6.4.0-150600.23.84.1
- kernel-default-optional-debuginfo-6.4.0-150600.23.84.1
- kernel-default-optional-6.4.0-150600.23.84.1
- cluster-md-kmp-default-debuginfo-6.4.0-150600.23.84.1
- dlm-kmp-default-debuginfo-6.4.0-150600.23.84.1
- kernel-obs-qa-6.4.0-150600.23.84.1
- kernel-default-livepatch-6.4.0-150600.23.84.1
- gfs2-kmp-default-6.4.0-150600.23.84.1
- reiserfs-kmp-default-debuginfo-6.4.0-150600.23.84.1
-
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc)
- kernel-default-6.4.0-150600.23.84.1
-
openSUSE Leap 15.6 (ppc64le s390x x86_64)
- kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1
- kernel-livepatch-SLE15-SP6_Update_19-debugsource-1-150600.13.3.1
- kernel-livepatch-6_4_0-150600_23_84-default-debuginfo-1-150600.13.3.1
- kernel-default-livepatch-devel-6.4.0-150600.23.84.1
-
openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64)
- kernel-kvmsmall-6.4.0-150600.23.84.1
-
openSUSE Leap 15.6 (nosrc s390x)
- kernel-zfcpdump-6.4.0-150600.23.84.1
-
openSUSE Leap 15.6 (s390x)
- kernel-zfcpdump-debuginfo-6.4.0-150600.23.84.1
- kernel-zfcpdump-debugsource-6.4.0-150600.23.84.1
-
openSUSE Leap 15.6 (nosrc)
- dtb-aarch64-6.4.0-150600.23.84.1
-
openSUSE Leap 15.6 (aarch64)
- dtb-amlogic-6.4.0-150600.23.84.1
- dtb-exynos-6.4.0-150600.23.84.1
- dtb-altera-6.4.0-150600.23.84.1
- dtb-amazon-6.4.0-150600.23.84.1
- dtb-marvell-6.4.0-150600.23.84.1
- dtb-nvidia-6.4.0-150600.23.84.1
- cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.84.1
- dtb-socionext-6.4.0-150600.23.84.1
- ocfs2-kmp-64kb-6.4.0-150600.23.84.1
- dtb-arm-6.4.0-150600.23.84.1
- dtb-mediatek-6.4.0-150600.23.84.1
- kernel-64kb-devel-6.4.0-150600.23.84.1
- kselftests-kmp-64kb-6.4.0-150600.23.84.1
- reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.84.1
- dtb-lg-6.4.0-150600.23.84.1
- dtb-broadcom-6.4.0-150600.23.84.1
- cluster-md-kmp-64kb-6.4.0-150600.23.84.1
- kernel-64kb-debugsource-6.4.0-150600.23.84.1
- kernel-64kb-extra-6.4.0-150600.23.84.1
- dtb-apm-6.4.0-150600.23.84.1
- kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.84.1
- reiserfs-kmp-64kb-6.4.0-150600.23.84.1
- dtb-apple-6.4.0-150600.23.84.1
- dlm-kmp-64kb-debuginfo-6.4.0-150600.23.84.1
- gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.84.1
- kernel-64kb-optional-debuginfo-6.4.0-150600.23.84.1
- ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.84.1
- dtb-cavium-6.4.0-150600.23.84.1
- dtb-freescale-6.4.0-150600.23.84.1
- dtb-rockchip-6.4.0-150600.23.84.1
- dtb-allwinner-6.4.0-150600.23.84.1
- dtb-hisilicon-6.4.0-150600.23.84.1
- gfs2-kmp-64kb-6.4.0-150600.23.84.1
- dtb-sprd-6.4.0-150600.23.84.1
- kernel-64kb-optional-6.4.0-150600.23.84.1
- kernel-64kb-devel-debuginfo-6.4.0-150600.23.84.1
- dtb-xilinx-6.4.0-150600.23.84.1
- kernel-64kb-extra-debuginfo-6.4.0-150600.23.84.1
- kernel-64kb-debuginfo-6.4.0-150600.23.84.1
- dlm-kmp-64kb-6.4.0-150600.23.84.1
- dtb-amd-6.4.0-150600.23.84.1
- dtb-qcom-6.4.0-150600.23.84.1
- dtb-renesas-6.4.0-150600.23.84.1
-
openSUSE Leap 15.6 (aarch64 nosrc)
- kernel-64kb-6.4.0-150600.23.84.1
-
SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc)
- kernel-default-6.4.0-150600.23.84.1
-
SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64)
- kernel-default-debuginfo-6.4.0-150600.23.84.1
- kernel-default-debugsource-6.4.0-150600.23.84.1
-
SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
- kernel-default-devel-debuginfo-6.4.0-150600.23.84.1
- kernel-default-debuginfo-6.4.0-150600.23.84.1
- cluster-md-kmp-default-debuginfo-6.4.0-150600.23.84.1
- cluster-md-kmp-default-6.4.0-150600.23.84.1
- dlm-kmp-default-debuginfo-6.4.0-150600.23.84.1
- dlm-kmp-default-6.4.0-150600.23.84.1
- kernel-default-debugsource-6.4.0-150600.23.84.1
- kernel-default-devel-6.4.0-150600.23.84.1
- kernel-obs-build-6.4.0-150600.23.84.1
- gfs2-kmp-default-debuginfo-6.4.0-150600.23.84.1
- kernel-obs-build-debugsource-6.4.0-150600.23.84.1
- reiserfs-kmp-default-6.4.0-150600.23.84.1
- kernel-syms-6.4.0-150600.23.84.1
- ocfs2-kmp-default-debuginfo-6.4.0-150600.23.84.1
- ocfs2-kmp-default-6.4.0-150600.23.84.1
- gfs2-kmp-default-6.4.0-150600.23.84.1
- reiserfs-kmp-default-debuginfo-6.4.0-150600.23.84.1
-
SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 nosrc)
- kernel-64kb-6.4.0-150600.23.84.1
-
SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64)
- kernel-64kb-devel-6.4.0-150600.23.84.1
- kernel-64kb-debugsource-6.4.0-150600.23.84.1
- kernel-64kb-devel-debuginfo-6.4.0-150600.23.84.1
- kernel-64kb-debuginfo-6.4.0-150600.23.84.1
-
SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64 nosrc)
- kernel-default-6.4.0-150600.23.84.1
-
SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le x86_64)
- kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1
-
SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
- kernel-devel-6.4.0-150600.23.84.1
- kernel-source-6.4.0-150600.23.84.1
- kernel-macros-6.4.0-150600.23.84.1
-
SUSE Linux Enterprise Server 15 SP6 LTSS (noarch nosrc)
- kernel-docs-6.4.0-150600.23.84.1
-
SUSE Linux Enterprise Server 15 SP6 LTSS (nosrc s390x)
- kernel-zfcpdump-6.4.0-150600.23.84.1
-
SUSE Linux Enterprise Server 15 SP6 LTSS (s390x)
- kernel-zfcpdump-debuginfo-6.4.0-150600.23.84.1
- kernel-zfcpdump-debugsource-6.4.0-150600.23.84.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
- kernel-default-base-6.4.0-150600.23.84.1.150600.12.38.1
- kernel-default-debuginfo-6.4.0-150600.23.84.1
- kernel-default-devel-debuginfo-6.4.0-150600.23.84.1
- cluster-md-kmp-default-debuginfo-6.4.0-150600.23.84.1
- cluster-md-kmp-default-6.4.0-150600.23.84.1
- dlm-kmp-default-debuginfo-6.4.0-150600.23.84.1
- dlm-kmp-default-6.4.0-150600.23.84.1
- kernel-default-debugsource-6.4.0-150600.23.84.1
- kernel-default-devel-6.4.0-150600.23.84.1
- kernel-obs-build-6.4.0-150600.23.84.1
- gfs2-kmp-default-debuginfo-6.4.0-150600.23.84.1
- kernel-obs-build-debugsource-6.4.0-150600.23.84.1
- reiserfs-kmp-default-6.4.0-150600.23.84.1
- kernel-syms-6.4.0-150600.23.84.1
- ocfs2-kmp-default-debuginfo-6.4.0-150600.23.84.1
- ocfs2-kmp-default-6.4.0-150600.23.84.1
- gfs2-kmp-default-6.4.0-150600.23.84.1
- reiserfs-kmp-default-debuginfo-6.4.0-150600.23.84.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP6 (nosrc ppc64le x86_64)
- kernel-default-6.4.0-150600.23.84.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
- kernel-devel-6.4.0-150600.23.84.1
- kernel-source-6.4.0-150600.23.84.1
- kernel-macros-6.4.0-150600.23.84.1
-
SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch nosrc)
- kernel-docs-6.4.0-150600.23.84.1
-
SUSE Linux Enterprise Live Patching 15-SP6 (nosrc)
- kernel-default-6.4.0-150600.23.84.1
-
SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
- kernel-livepatch-6_4_0-150600_23_84-default-1-150600.13.3.1
- kernel-default-debuginfo-6.4.0-150600.23.84.1
- kernel-default-debugsource-6.4.0-150600.23.84.1
- kernel-livepatch-6_4_0-150600_23_84-default-debuginfo-1-150600.13.3.1
- kernel-default-livepatch-6.4.0-150600.23.84.1
- kernel-livepatch-SLE15-SP6_Update_19-debugsource-1-150600.13.3.1
- kernel-default-livepatch-devel-6.4.0-150600.23.84.1
References:
- https://www.suse.com/security/cve/CVE-2023-42752.html
- https://www.suse.com/security/cve/CVE-2023-53743.html
- https://www.suse.com/security/cve/CVE-2023-53750.html
- https://www.suse.com/security/cve/CVE-2023-53752.html
- https://www.suse.com/security/cve/CVE-2023-53759.html
- https://www.suse.com/security/cve/CVE-2023-53762.html
- https://www.suse.com/security/cve/CVE-2023-53766.html
- https://www.suse.com/security/cve/CVE-2023-53768.html
- https://www.suse.com/security/cve/CVE-2023-53777.html
- https://www.suse.com/security/cve/CVE-2023-53778.html
- https://www.suse.com/security/cve/CVE-2023-53782.html
- https://www.suse.com/security/cve/CVE-2023-53784.html
- https://www.suse.com/security/cve/CVE-2023-53785.html
- https://www.suse.com/security/cve/CVE-2023-53787.html
- https://www.suse.com/security/cve/CVE-2023-53791.html
- https://www.suse.com/security/cve/CVE-2023-53792.html
- https://www.suse.com/security/cve/CVE-2023-53793.html
- https://www.suse.com/security/cve/CVE-2023-53794.html
- https://www.suse.com/security/cve/CVE-2023-53795.html
- https://www.suse.com/security/cve/CVE-2023-53797.html
- https://www.suse.com/security/cve/CVE-2023-53799.html
- https://www.suse.com/security/cve/CVE-2023-53807.html
- https://www.suse.com/security/cve/CVE-2023-53808.html
- https://www.suse.com/security/cve/CVE-2023-53813.html
- https://www.suse.com/security/cve/CVE-2023-53815.html
- https://www.suse.com/security/cve/CVE-2023-53819.html
- https://www.suse.com/security/cve/CVE-2023-53821.html
- https://www.suse.com/security/cve/CVE-2023-53823.html
- https://www.suse.com/security/cve/CVE-2023-53825.html
- https://www.suse.com/security/cve/CVE-2023-53828.html
- https://www.suse.com/security/cve/CVE-2023-53831.html
- https://www.suse.com/security/cve/CVE-2023-53834.html
- https://www.suse.com/security/cve/CVE-2023-53836.html
- https://www.suse.com/security/cve/CVE-2023-53839.html
- https://www.suse.com/security/cve/CVE-2023-53841.html
- https://www.suse.com/security/cve/CVE-2023-53842.html
- https://www.suse.com/security/cve/CVE-2023-53843.html
- https://www.suse.com/security/cve/CVE-2023-53844.html
- https://www.suse.com/security/cve/CVE-2023-53846.html
- https://www.suse.com/security/cve/CVE-2023-53847.html
- https://www.suse.com/security/cve/CVE-2023-53848.html
- https://www.suse.com/security/cve/CVE-2023-53850.html
- https://www.suse.com/security/cve/CVE-2023-53851.html
- https://www.suse.com/security/cve/CVE-2023-53852.html
- https://www.suse.com/security/cve/CVE-2023-53855.html
- https://www.suse.com/security/cve/CVE-2023-53856.html
- https://www.suse.com/security/cve/CVE-2023-53857.html
- https://www.suse.com/security/cve/CVE-2023-53858.html
- https://www.suse.com/security/cve/CVE-2023-53860.html
- https://www.suse.com/security/cve/CVE-2023-53861.html
- https://www.suse.com/security/cve/CVE-2023-53863.html
- https://www.suse.com/security/cve/CVE-2023-53864.html
- https://www.suse.com/security/cve/CVE-2023-53865.html
- https://www.suse.com/security/cve/CVE-2023-53989.html
- https://www.suse.com/security/cve/CVE-2023-53992.html
- https://www.suse.com/security/cve/CVE-2023-53994.html
- https://www.suse.com/security/cve/CVE-2023-53995.html
- https://www.suse.com/security/cve/CVE-2023-53996.html
- https://www.suse.com/security/cve/CVE-2023-53997.html
- https://www.suse.com/security/cve/CVE-2023-53998.html
- https://www.suse.com/security/cve/CVE-2023-53999.html
- https://www.suse.com/security/cve/CVE-2023-54000.html
- https://www.suse.com/security/cve/CVE-2023-54001.html
- https://www.suse.com/security/cve/CVE-2023-54005.html
- https://www.suse.com/security/cve/CVE-2023-54006.html
- https://www.suse.com/security/cve/CVE-2023-54008.html
- https://www.suse.com/security/cve/CVE-2023-54014.html
- https://www.suse.com/security/cve/CVE-2023-54016.html
- https://www.suse.com/security/cve/CVE-2023-54017.html
- https://www.suse.com/security/cve/CVE-2023-54019.html
- https://www.suse.com/security/cve/CVE-2023-54022.html
- https://www.suse.com/security/cve/CVE-2023-54023.html
- https://www.suse.com/security/cve/CVE-2023-54025.html
- https://www.suse.com/security/cve/CVE-2023-54026.html
- https://www.suse.com/security/cve/CVE-2023-54027.html
- https://www.suse.com/security/cve/CVE-2023-54030.html
- https://www.suse.com/security/cve/CVE-2023-54031.html
- https://www.suse.com/security/cve/CVE-2023-54032.html
- https://www.suse.com/security/cve/CVE-2023-54035.html
- https://www.suse.com/security/cve/CVE-2023-54037.html
- https://www.suse.com/security/cve/CVE-2023-54038.html
- https://www.suse.com/security/cve/CVE-2023-54042.html
- https://www.suse.com/security/cve/CVE-2023-54045.html
- https://www.suse.com/security/cve/CVE-2023-54048.html
- https://www.suse.com/security/cve/CVE-2023-54049.html
- https://www.suse.com/security/cve/CVE-2023-54051.html
- https://www.suse.com/security/cve/CVE-2023-54052.html
- https://www.suse.com/security/cve/CVE-2023-54060.html
- https://www.suse.com/security/cve/CVE-2023-54064.html
- https://www.suse.com/security/cve/CVE-2023-54066.html
- https://www.suse.com/security/cve/CVE-2023-54067.html
- https://www.suse.com/security/cve/CVE-2023-54069.html
- https://www.suse.com/security/cve/CVE-2023-54070.html
- https://www.suse.com/security/cve/CVE-2023-54072.html
- https://www.suse.com/security/cve/CVE-2023-54076.html
- https://www.suse.com/security/cve/CVE-2023-54080.html
- https://www.suse.com/security/cve/CVE-2023-54081.html
- https://www.suse.com/security/cve/CVE-2023-54083.html
- https://www.suse.com/security/cve/CVE-2023-54088.html
- https://www.suse.com/security/cve/CVE-2023-54089.html
- https://www.suse.com/security/cve/CVE-2023-54091.html
- https://www.suse.com/security/cve/CVE-2023-54092.html
- https://www.suse.com/security/cve/CVE-2023-54093.html
- https://www.suse.com/security/cve/CVE-2023-54094.html
- https://www.suse.com/security/cve/CVE-2023-54095.html
- https://www.suse.com/security/cve/CVE-2023-54096.html
- https://www.suse.com/security/cve/CVE-2023-54099.html
- https://www.suse.com/security/cve/CVE-2023-54101.html
- https://www.suse.com/security/cve/CVE-2023-54104.html
- https://www.suse.com/security/cve/CVE-2023-54106.html
- https://www.suse.com/security/cve/CVE-2023-54112.html
- https://www.suse.com/security/cve/CVE-2023-54113.html
- https://www.suse.com/security/cve/CVE-2023-54115.html
- https://www.suse.com/security/cve/CVE-2023-54117.html
- https://www.suse.com/security/cve/CVE-2023-54121.html
- https://www.suse.com/security/cve/CVE-2023-54125.html
- https://www.suse.com/security/cve/CVE-2023-54127.html
- https://www.suse.com/security/cve/CVE-2023-54133.html
- https://www.suse.com/security/cve/CVE-2023-54134.html
- https://www.suse.com/security/cve/CVE-2023-54135.html
- https://www.suse.com/security/cve/CVE-2023-54136.html
- https://www.suse.com/security/cve/CVE-2023-54137.html
- https://www.suse.com/security/cve/CVE-2023-54140.html
- https://www.suse.com/security/cve/CVE-2023-54141.html
- https://www.suse.com/security/cve/CVE-2023-54142.html
- https://www.suse.com/security/cve/CVE-2023-54143.html
- https://www.suse.com/security/cve/CVE-2023-54145.html
- https://www.suse.com/security/cve/CVE-2023-54148.html
- https://www.suse.com/security/cve/CVE-2023-54149.html
- https://www.suse.com/security/cve/CVE-2023-54153.html
- https://www.suse.com/security/cve/CVE-2023-54154.html
- https://www.suse.com/security/cve/CVE-2023-54155.html
- https://www.suse.com/security/cve/CVE-2023-54156.html
- https://www.suse.com/security/cve/CVE-2023-54164.html
- https://www.suse.com/security/cve/CVE-2023-54166.html
- https://www.suse.com/security/cve/CVE-2023-54169.html
- https://www.suse.com/security/cve/CVE-2023-54170.html
- https://www.suse.com/security/cve/CVE-2023-54171.html
- https://www.suse.com/security/cve/CVE-2023-54172.html
- https://www.suse.com/security/cve/CVE-2023-54173.html
- https://www.suse.com/security/cve/CVE-2023-54177.html
- https://www.suse.com/security/cve/CVE-2023-54178.html
- https://www.suse.com/security/cve/CVE-2023-54179.html
- https://www.suse.com/security/cve/CVE-2023-54181.html
- https://www.suse.com/security/cve/CVE-2023-54183.html
- https://www.suse.com/security/cve/CVE-2023-54185.html
- https://www.suse.com/security/cve/CVE-2023-54189.html
- https://www.suse.com/security/cve/CVE-2023-54194.html
- https://www.suse.com/security/cve/CVE-2023-54201.html
- https://www.suse.com/security/cve/CVE-2023-54204.html
- https://www.suse.com/security/cve/CVE-2023-54207.html
- https://www.suse.com/security/cve/CVE-2023-54209.html
- https://www.suse.com/security/cve/CVE-2023-54210.html
- https://www.suse.com/security/cve/CVE-2023-54211.html
- https://www.suse.com/security/cve/CVE-2023-54215.html
- https://www.suse.com/security/cve/CVE-2023-54219.html
- https://www.suse.com/security/cve/CVE-2023-54220.html
- https://www.suse.com/security/cve/CVE-2023-54221.html
- https://www.suse.com/security/cve/CVE-2023-54223.html
- https://www.suse.com/security/cve/CVE-2023-54224.html
- https://www.suse.com/security/cve/CVE-2023-54225.html
- https://www.suse.com/security/cve/CVE-2023-54227.html
- https://www.suse.com/security/cve/CVE-2023-54229.html
- https://www.suse.com/security/cve/CVE-2023-54230.html
- https://www.suse.com/security/cve/CVE-2023-54235.html
- https://www.suse.com/security/cve/CVE-2023-54240.html
- https://www.suse.com/security/cve/CVE-2023-54241.html
- https://www.suse.com/security/cve/CVE-2023-54246.html
- https://www.suse.com/security/cve/CVE-2023-54247.html
- https://www.suse.com/security/cve/CVE-2023-54251.html
- https://www.suse.com/security/cve/CVE-2023-54253.html
- https://www.suse.com/security/cve/CVE-2023-54254.html
- https://www.suse.com/security/cve/CVE-2023-54255.html
- https://www.suse.com/security/cve/CVE-2023-54258.html
- https://www.suse.com/security/cve/CVE-2023-54261.html
- https://www.suse.com/security/cve/CVE-2023-54263.html
- https://www.suse.com/security/cve/CVE-2023-54264.html
- https://www.suse.com/security/cve/CVE-2023-54266.html
- https://www.suse.com/security/cve/CVE-2023-54267.html
- https://www.suse.com/security/cve/CVE-2023-54271.html
- https://www.suse.com/security/cve/CVE-2023-54276.html
- https://www.suse.com/security/cve/CVE-2023-54278.html
- https://www.suse.com/security/cve/CVE-2023-54281.html
- https://www.suse.com/security/cve/CVE-2023-54282.html
- https://www.suse.com/security/cve/CVE-2023-54283.html
- https://www.suse.com/security/cve/CVE-2023-54285.html
- https://www.suse.com/security/cve/CVE-2023-54289.html
- https://www.suse.com/security/cve/CVE-2023-54291.html
- https://www.suse.com/security/cve/CVE-2023-54292.html
- https://www.suse.com/security/cve/CVE-2023-54293.html
- https://www.suse.com/security/cve/CVE-2023-54296.html
- https://www.suse.com/security/cve/CVE-2023-54297.html
- https://www.suse.com/security/cve/CVE-2023-54299.html
- https://www.suse.com/security/cve/CVE-2023-54300.html
- https://www.suse.com/security/cve/CVE-2023-54302.html
- https://www.suse.com/security/cve/CVE-2023-54303.html
- https://www.suse.com/security/cve/CVE-2023-54304.html
- https://www.suse.com/security/cve/CVE-2023-54309.html
- https://www.suse.com/security/cve/CVE-2023-54312.html
- https://www.suse.com/security/cve/CVE-2023-54313.html
- https://www.suse.com/security/cve/CVE-2023-54314.html
- https://www.suse.com/security/cve/CVE-2023-54315.html
- https://www.suse.com/security/cve/CVE-2023-54316.html
- https://www.suse.com/security/cve/CVE-2023-54318.html
- https://www.suse.com/security/cve/CVE-2023-54319.html
- https://www.suse.com/security/cve/CVE-2023-54322.html
- https://www.suse.com/security/cve/CVE-2023-54324.html
- https://www.suse.com/security/cve/CVE-2023-54326.html
- https://www.suse.com/security/cve/CVE-2024-26944.html
- https://www.suse.com/security/cve/CVE-2025-38321.html
- https://www.suse.com/security/cve/CVE-2025-38728.html
- https://www.suse.com/security/cve/CVE-2025-39890.html
- https://www.suse.com/security/cve/CVE-2025-39977.html
- https://www.suse.com/security/cve/CVE-2025-40006.html
- https://www.suse.com/security/cve/CVE-2025-40024.html
- https://www.suse.com/security/cve/CVE-2025-40033.html
- https://www.suse.com/security/cve/CVE-2025-40042.html
- https://www.suse.com/security/cve/CVE-2025-40053.html
- https://www.suse.com/security/cve/CVE-2025-40081.html
- https://www.suse.com/security/cve/CVE-2025-40102.html
- https://www.suse.com/security/cve/CVE-2025-40134.html
- https://www.suse.com/security/cve/CVE-2025-40135.html
- https://www.suse.com/security/cve/CVE-2025-40153.html
- https://www.suse.com/security/cve/CVE-2025-40158.html
- https://www.suse.com/security/cve/CVE-2025-40167.html
- https://www.suse.com/security/cve/CVE-2025-40170.html
- https://www.suse.com/security/cve/CVE-2025-40178.html
- https://www.suse.com/security/cve/CVE-2025-40179.html
- https://www.suse.com/security/cve/CVE-2025-40187.html
- https://www.suse.com/security/cve/CVE-2025-40211.html
- https://www.suse.com/security/cve/CVE-2025-40215.html
- https://www.suse.com/security/cve/CVE-2025-40219.html
- https://www.suse.com/security/cve/CVE-2025-40220.html
- https://www.suse.com/security/cve/CVE-2025-40223.html
- https://www.suse.com/security/cve/CVE-2025-40233.html
- https://www.suse.com/security/cve/CVE-2025-40242.html
- https://www.suse.com/security/cve/CVE-2025-40244.html
- https://www.suse.com/security/cve/CVE-2025-40256.html
- https://www.suse.com/security/cve/CVE-2025-40258.html
- https://www.suse.com/security/cve/CVE-2025-40262.html
- https://www.suse.com/security/cve/CVE-2025-40263.html
- https://www.suse.com/security/cve/CVE-2025-40269.html
- https://www.suse.com/security/cve/CVE-2025-40272.html
- https://www.suse.com/security/cve/CVE-2025-40273.html
- https://www.suse.com/security/cve/CVE-2025-40275.html
- https://www.suse.com/security/cve/CVE-2025-40277.html
- https://www.suse.com/security/cve/CVE-2025-40280.html
- https://www.suse.com/security/cve/CVE-2025-40282.html
- https://www.suse.com/security/cve/CVE-2025-40283.html
- https://www.suse.com/security/cve/CVE-2025-40284.html
- https://www.suse.com/security/cve/CVE-2025-40288.html
- https://www.suse.com/security/cve/CVE-2025-40297.html
- https://www.suse.com/security/cve/CVE-2025-40301.html
- https://www.suse.com/security/cve/CVE-2025-40304.html
- https://www.suse.com/security/cve/CVE-2025-40306.html
- https://www.suse.com/security/cve/CVE-2025-40308.html
- https://www.suse.com/security/cve/CVE-2025-40309.html
- https://www.suse.com/security/cve/CVE-2025-40310.html
- https://www.suse.com/security/cve/CVE-2025-40311.html
- https://www.suse.com/security/cve/CVE-2025-40312.html
- https://www.suse.com/security/cve/CVE-2025-40314.html
- https://www.suse.com/security/cve/CVE-2025-40315.html
- https://www.suse.com/security/cve/CVE-2025-40316.html
- https://www.suse.com/security/cve/CVE-2025-40317.html
- https://www.suse.com/security/cve/CVE-2025-40318.html
- https://www.suse.com/security/cve/CVE-2025-40320.html
- https://www.suse.com/security/cve/CVE-2025-40321.html
- https://www.suse.com/security/cve/CVE-2025-40322.html
- https://www.suse.com/security/cve/CVE-2025-40323.html
- https://www.suse.com/security/cve/CVE-2025-40324.html
- https://www.suse.com/security/cve/CVE-2025-40328.html
- https://www.suse.com/security/cve/CVE-2025-40329.html
- https://www.suse.com/security/cve/CVE-2025-40331.html
- https://www.suse.com/security/cve/CVE-2025-40342.html
- https://www.suse.com/security/cve/CVE-2025-40343.html
- https://www.suse.com/security/cve/CVE-2025-40345.html
- https://www.suse.com/security/cve/CVE-2025-40349.html
- https://www.suse.com/security/cve/CVE-2025-40351.html
- https://www.suse.com/security/cve/CVE-2025-68168.html
- https://www.suse.com/security/cve/CVE-2025-68172.html
- https://www.suse.com/security/cve/CVE-2025-68176.html
- https://www.suse.com/security/cve/CVE-2025-68180.html
- https://www.suse.com/security/cve/CVE-2025-68183.html
- https://www.suse.com/security/cve/CVE-2025-68185.html
- https://www.suse.com/security/cve/CVE-2025-68192.html
- https://www.suse.com/security/cve/CVE-2025-68194.html
- https://www.suse.com/security/cve/CVE-2025-68195.html
- https://www.suse.com/security/cve/CVE-2025-68217.html
- https://www.suse.com/security/cve/CVE-2025-68218.html
- https://www.suse.com/security/cve/CVE-2025-68222.html
- https://www.suse.com/security/cve/CVE-2025-68233.html
- https://www.suse.com/security/cve/CVE-2025-68235.html
- https://www.suse.com/security/cve/CVE-2025-68237.html
- https://www.suse.com/security/cve/CVE-2025-68238.html
- https://www.suse.com/security/cve/CVE-2025-68244.html
- https://www.suse.com/security/cve/CVE-2025-68249.html
- https://www.suse.com/security/cve/CVE-2025-68252.html
- https://www.suse.com/security/cve/CVE-2025-68257.html
- https://www.suse.com/security/cve/CVE-2025-68258.html
- https://www.suse.com/security/cve/CVE-2025-68259.html
- https://www.suse.com/security/cve/CVE-2025-68286.html
- https://www.suse.com/security/cve/CVE-2025-68287.html
- https://www.suse.com/security/cve/CVE-2025-68289.html
- https://www.suse.com/security/cve/CVE-2025-68290.html
- https://www.suse.com/security/cve/CVE-2025-68303.html
- https://www.suse.com/security/cve/CVE-2025-68305.html
- https://www.suse.com/security/cve/CVE-2025-68307.html
- https://www.suse.com/security/cve/CVE-2025-68308.html
- https://www.suse.com/security/cve/CVE-2025-68312.html
- https://www.suse.com/security/cve/CVE-2025-68313.html
- https://www.suse.com/security/cve/CVE-2025-68328.html
- https://www.suse.com/security/cve/CVE-2025-68330.html
- https://www.suse.com/security/cve/CVE-2025-68331.html
- https://www.suse.com/security/cve/CVE-2025-68332.html
- https://www.suse.com/security/cve/CVE-2025-68335.html
- https://www.suse.com/security/cve/CVE-2025-68339.html
- https://www.suse.com/security/cve/CVE-2025-68345.html
- https://www.suse.com/security/cve/CVE-2025-68346.html
- https://www.suse.com/security/cve/CVE-2025-68347.html
- https://www.suse.com/security/cve/CVE-2025-68354.html
- https://www.suse.com/security/cve/CVE-2025-68362.html
- https://www.suse.com/security/cve/CVE-2025-68380.html
- https://www.suse.com/security/cve/CVE-2025-68724.html
- https://www.suse.com/security/cve/CVE-2025-68732.html
- https://www.suse.com/security/cve/CVE-2025-68734.html
- https://www.suse.com/security/cve/CVE-2025-68740.html
- https://www.suse.com/security/cve/CVE-2025-68746.html
- https://www.suse.com/security/cve/CVE-2025-68750.html
- https://www.suse.com/security/cve/CVE-2025-68753.html
- https://www.suse.com/security/cve/CVE-2025-68757.html
- https://www.suse.com/security/cve/CVE-2025-68758.html
- https://www.suse.com/security/cve/CVE-2025-68759.html
- https://www.suse.com/security/cve/CVE-2025-68765.html
- https://www.suse.com/security/cve/CVE-2025-68766.html
- https://bugzilla.suse.com/show_bug.cgi?id=1012628
- https://bugzilla.suse.com/show_bug.cgi?id=1065729
- https://bugzilla.suse.com/show_bug.cgi?id=1194869
- https://bugzilla.suse.com/show_bug.cgi?id=1214635
- https://bugzilla.suse.com/show_bug.cgi?id=1214847
- https://bugzilla.suse.com/show_bug.cgi?id=1215146
- https://bugzilla.suse.com/show_bug.cgi?id=1215211
- https://bugzilla.suse.com/show_bug.cgi?id=1215344
- https://bugzilla.suse.com/show_bug.cgi?id=1216062
- https://bugzilla.suse.com/show_bug.cgi?id=1216436
- https://bugzilla.suse.com/show_bug.cgi?id=1219165
- https://bugzilla.suse.com/show_bug.cgi?id=1220419
- https://bugzilla.suse.com/show_bug.cgi?id=1223731
- https://bugzilla.suse.com/show_bug.cgi?id=1234163
- https://bugzilla.suse.com/show_bug.cgi?id=1245193
- https://bugzilla.suse.com/show_bug.cgi?id=1245449
- https://bugzilla.suse.com/show_bug.cgi?id=1246328
- https://bugzilla.suse.com/show_bug.cgi?id=1247500
- https://bugzilla.suse.com/show_bug.cgi?id=1248886
- https://bugzilla.suse.com/show_bug.cgi?id=1249256
- https://bugzilla.suse.com/show_bug.cgi?id=1250334
- https://bugzilla.suse.com/show_bug.cgi?id=1252046
- https://bugzilla.suse.com/show_bug.cgi?id=1252342
- https://bugzilla.suse.com/show_bug.cgi?id=1252686
- https://bugzilla.suse.com/show_bug.cgi?id=1252776
- https://bugzilla.suse.com/show_bug.cgi?id=1252808
- https://bugzilla.suse.com/show_bug.cgi?id=1252824
- https://bugzilla.suse.com/show_bug.cgi?id=1252861
- https://bugzilla.suse.com/show_bug.cgi?id=1252919
- https://bugzilla.suse.com/show_bug.cgi?id=1252973
- https://bugzilla.suse.com/show_bug.cgi?id=1253155
- https://bugzilla.suse.com/show_bug.cgi?id=1253262
- https://bugzilla.suse.com/show_bug.cgi?id=1253342
- https://bugzilla.suse.com/show_bug.cgi?id=1253386
- https://bugzilla.suse.com/show_bug.cgi?id=1253402
- https://bugzilla.suse.com/show_bug.cgi?id=1253408
- https://bugzilla.suse.com/show_bug.cgi?id=1253413
- https://bugzilla.suse.com/show_bug.cgi?id=1253442
- https://bugzilla.suse.com/show_bug.cgi?id=1253458
- https://bugzilla.suse.com/show_bug.cgi?id=1253463
- https://bugzilla.suse.com/show_bug.cgi?id=1253647
- https://bugzilla.suse.com/show_bug.cgi?id=1254119
- https://bugzilla.suse.com/show_bug.cgi?id=1254126
- https://bugzilla.suse.com/show_bug.cgi?id=1254373
- https://bugzilla.suse.com/show_bug.cgi?id=1254518
- https://bugzilla.suse.com/show_bug.cgi?id=1254520
- https://bugzilla.suse.com/show_bug.cgi?id=1254599
- https://bugzilla.suse.com/show_bug.cgi?id=1254606
- https://bugzilla.suse.com/show_bug.cgi?id=1254611
- https://bugzilla.suse.com/show_bug.cgi?id=1254613
- https://bugzilla.suse.com/show_bug.cgi?id=1254615
- https://bugzilla.suse.com/show_bug.cgi?id=1254621
- https://bugzilla.suse.com/show_bug.cgi?id=1254623
- https://bugzilla.suse.com/show_bug.cgi?id=1254624
- https://bugzilla.suse.com/show_bug.cgi?id=1254626
- https://bugzilla.suse.com/show_bug.cgi?id=1254648
- https://bugzilla.suse.com/show_bug.cgi?id=1254649
- https://bugzilla.suse.com/show_bug.cgi?id=1254653
- https://bugzilla.suse.com/show_bug.cgi?id=1254655
- https://bugzilla.suse.com/show_bug.cgi?id=1254657
- https://bugzilla.suse.com/show_bug.cgi?id=1254660
- https://bugzilla.suse.com/show_bug.cgi?id=1254661
- https://bugzilla.suse.com/show_bug.cgi?id=1254663
- https://bugzilla.suse.com/show_bug.cgi?id=1254669
- https://bugzilla.suse.com/show_bug.cgi?id=1254677
- https://bugzilla.suse.com/show_bug.cgi?id=1254678
- https://bugzilla.suse.com/show_bug.cgi?id=1254688
- https://bugzilla.suse.com/show_bug.cgi?id=1254690
- https://bugzilla.suse.com/show_bug.cgi?id=1254691
- https://bugzilla.suse.com/show_bug.cgi?id=1254693
- https://bugzilla.suse.com/show_bug.cgi?id=1254695
- https://bugzilla.suse.com/show_bug.cgi?id=1254698
- https://bugzilla.suse.com/show_bug.cgi?id=1254701
- https://bugzilla.suse.com/show_bug.cgi?id=1254704
- https://bugzilla.suse.com/show_bug.cgi?id=1254705
- https://bugzilla.suse.com/show_bug.cgi?id=1254707
- https://bugzilla.suse.com/show_bug.cgi?id=1254712
- https://bugzilla.suse.com/show_bug.cgi?id=1254715
- https://bugzilla.suse.com/show_bug.cgi?id=1254717
- https://bugzilla.suse.com/show_bug.cgi?id=1254723
- https://bugzilla.suse.com/show_bug.cgi?id=1254724
- https://bugzilla.suse.com/show_bug.cgi?id=1254732
- https://bugzilla.suse.com/show_bug.cgi?id=1254733
- https://bugzilla.suse.com/show_bug.cgi?id=1254737
- https://bugzilla.suse.com/show_bug.cgi?id=1254739
- https://bugzilla.suse.com/show_bug.cgi?id=1254742
- https://bugzilla.suse.com/show_bug.cgi?id=1254743
- https://bugzilla.suse.com/show_bug.cgi?id=1254749
- https://bugzilla.suse.com/show_bug.cgi?id=1254750
- https://bugzilla.suse.com/show_bug.cgi?id=1254753
- https://bugzilla.suse.com/show_bug.cgi?id=1254754
- https://bugzilla.suse.com/show_bug.cgi?id=1254758
- https://bugzilla.suse.com/show_bug.cgi?id=1254761
- https://bugzilla.suse.com/show_bug.cgi?id=1254762
- https://bugzilla.suse.com/show_bug.cgi?id=1254765
- https://bugzilla.suse.com/show_bug.cgi?id=1254782
- https://bugzilla.suse.com/show_bug.cgi?id=1254791
- https://bugzilla.suse.com/show_bug.cgi?id=1254793
- https://bugzilla.suse.com/show_bug.cgi?id=1254795
- https://bugzilla.suse.com/show_bug.cgi?id=1254796
- https://bugzilla.suse.com/show_bug.cgi?id=1254797
- https://bugzilla.suse.com/show_bug.cgi?id=1254798
- https://bugzilla.suse.com/show_bug.cgi?id=1254813
- https://bugzilla.suse.com/show_bug.cgi?id=1254828
- https://bugzilla.suse.com/show_bug.cgi?id=1254829
- https://bugzilla.suse.com/show_bug.cgi?id=1254832
- https://bugzilla.suse.com/show_bug.cgi?id=1254840
- https://bugzilla.suse.com/show_bug.cgi?id=1254843
- https://bugzilla.suse.com/show_bug.cgi?id=1254847
- https://bugzilla.suse.com/show_bug.cgi?id=1254850
- https://bugzilla.suse.com/show_bug.cgi?id=1254851
- https://bugzilla.suse.com/show_bug.cgi?id=1254858
- https://bugzilla.suse.com/show_bug.cgi?id=1254860
- https://bugzilla.suse.com/show_bug.cgi?id=1254894
- https://bugzilla.suse.com/show_bug.cgi?id=1254918
- https://bugzilla.suse.com/show_bug.cgi?id=1254957
- https://bugzilla.suse.com/show_bug.cgi?id=1254959
- https://bugzilla.suse.com/show_bug.cgi?id=1254983
- https://bugzilla.suse.com/show_bug.cgi?id=1255005
- https://bugzilla.suse.com/show_bug.cgi?id=1255009
- https://bugzilla.suse.com/show_bug.cgi?id=1255026
- https://bugzilla.suse.com/show_bug.cgi?id=1255033
- https://bugzilla.suse.com/show_bug.cgi?id=1255034
- https://bugzilla.suse.com/show_bug.cgi?id=1255035
- https://bugzilla.suse.com/show_bug.cgi?id=1255041
- https://bugzilla.suse.com/show_bug.cgi?id=1255046
- https://bugzilla.suse.com/show_bug.cgi?id=1255057
- https://bugzilla.suse.com/show_bug.cgi?id=1255062
- https://bugzilla.suse.com/show_bug.cgi?id=1255064
- https://bugzilla.suse.com/show_bug.cgi?id=1255065
- https://bugzilla.suse.com/show_bug.cgi?id=1255068
- https://bugzilla.suse.com/show_bug.cgi?id=1255072
- https://bugzilla.suse.com/show_bug.cgi?id=1255075
- https://bugzilla.suse.com/show_bug.cgi?id=1255077
- https://bugzilla.suse.com/show_bug.cgi?id=1255083
- https://bugzilla.suse.com/show_bug.cgi?id=1255092
- https://bugzilla.suse.com/show_bug.cgi?id=1255094
- https://bugzilla.suse.com/show_bug.cgi?id=1255100
- https://bugzilla.suse.com/show_bug.cgi?id=1255122
- https://bugzilla.suse.com/show_bug.cgi?id=1255135
- https://bugzilla.suse.com/show_bug.cgi?id=1255146
- https://bugzilla.suse.com/show_bug.cgi?id=1255149
- https://bugzilla.suse.com/show_bug.cgi?id=1255152
- https://bugzilla.suse.com/show_bug.cgi?id=1255154
- https://bugzilla.suse.com/show_bug.cgi?id=1255155
- https://bugzilla.suse.com/show_bug.cgi?id=1255163
- https://bugzilla.suse.com/show_bug.cgi?id=1255167
- https://bugzilla.suse.com/show_bug.cgi?id=1255169
- https://bugzilla.suse.com/show_bug.cgi?id=1255171
- https://bugzilla.suse.com/show_bug.cgi?id=1255182
- https://bugzilla.suse.com/show_bug.cgi?id=1255187
- https://bugzilla.suse.com/show_bug.cgi?id=1255190
- https://bugzilla.suse.com/show_bug.cgi?id=1255193
- https://bugzilla.suse.com/show_bug.cgi?id=1255197
- https://bugzilla.suse.com/show_bug.cgi?id=1255199
- https://bugzilla.suse.com/show_bug.cgi?id=1255202
- https://bugzilla.suse.com/show_bug.cgi?id=1255203
- https://bugzilla.suse.com/show_bug.cgi?id=1255206
- https://bugzilla.suse.com/show_bug.cgi?id=1255209
- https://bugzilla.suse.com/show_bug.cgi?id=1255218
- https://bugzilla.suse.com/show_bug.cgi?id=1255221
- https://bugzilla.suse.com/show_bug.cgi?id=1255233
- https://bugzilla.suse.com/show_bug.cgi?id=1255245
- https://bugzilla.suse.com/show_bug.cgi?id=1255246
- https://bugzilla.suse.com/show_bug.cgi?id=1255251
- https://bugzilla.suse.com/show_bug.cgi?id=1255252
- https://bugzilla.suse.com/show_bug.cgi?id=1255253
- https://bugzilla.suse.com/show_bug.cgi?id=1255259
- https://bugzilla.suse.com/show_bug.cgi?id=1255274
- https://bugzilla.suse.com/show_bug.cgi?id=1255276
- https://bugzilla.suse.com/show_bug.cgi?id=1255279
- https://bugzilla.suse.com/show_bug.cgi?id=1255280
- https://bugzilla.suse.com/show_bug.cgi?id=1255281
- https://bugzilla.suse.com/show_bug.cgi?id=1255325
- https://bugzilla.suse.com/show_bug.cgi?id=1255329
- https://bugzilla.suse.com/show_bug.cgi?id=1255351
- https://bugzilla.suse.com/show_bug.cgi?id=1255415
- https://bugzilla.suse.com/show_bug.cgi?id=1255480
- https://bugzilla.suse.com/show_bug.cgi?id=1255483
- https://bugzilla.suse.com/show_bug.cgi?id=1255489
- https://bugzilla.suse.com/show_bug.cgi?id=1255493
- https://bugzilla.suse.com/show_bug.cgi?id=1255495
- https://bugzilla.suse.com/show_bug.cgi?id=1255505
- https://bugzilla.suse.com/show_bug.cgi?id=1255538
- https://bugzilla.suse.com/show_bug.cgi?id=1255540
- https://bugzilla.suse.com/show_bug.cgi?id=1255545
- https://bugzilla.suse.com/show_bug.cgi?id=1255549
- https://bugzilla.suse.com/show_bug.cgi?id=1255550
- https://bugzilla.suse.com/show_bug.cgi?id=1255553
- https://bugzilla.suse.com/show_bug.cgi?id=1255557
- https://bugzilla.suse.com/show_bug.cgi?id=1255558
- https://bugzilla.suse.com/show_bug.cgi?id=1255563
- https://bugzilla.suse.com/show_bug.cgi?id=1255564
- https://bugzilla.suse.com/show_bug.cgi?id=1255570
- https://bugzilla.suse.com/show_bug.cgi?id=1255578
- https://bugzilla.suse.com/show_bug.cgi?id=1255579
- https://bugzilla.suse.com/show_bug.cgi?id=1255580
- https://bugzilla.suse.com/show_bug.cgi?id=1255583
- https://bugzilla.suse.com/show_bug.cgi?id=1255591
- https://bugzilla.suse.com/show_bug.cgi?id=1255601
- https://bugzilla.suse.com/show_bug.cgi?id=1255603
- https://bugzilla.suse.com/show_bug.cgi?id=1255605
- https://bugzilla.suse.com/show_bug.cgi?id=1255611
- https://bugzilla.suse.com/show_bug.cgi?id=1255616
- https://bugzilla.suse.com/show_bug.cgi?id=1255617
- https://bugzilla.suse.com/show_bug.cgi?id=1255618
- https://bugzilla.suse.com/show_bug.cgi?id=1255621
- https://bugzilla.suse.com/show_bug.cgi?id=1255628
- https://bugzilla.suse.com/show_bug.cgi?id=1255629
- https://bugzilla.suse.com/show_bug.cgi?id=1255630
- https://bugzilla.suse.com/show_bug.cgi?id=1255632
- https://bugzilla.suse.com/show_bug.cgi?id=1255636
- https://bugzilla.suse.com/show_bug.cgi?id=1255688
- https://bugzilla.suse.com/show_bug.cgi?id=1255691
- https://bugzilla.suse.com/show_bug.cgi?id=1255702
- https://bugzilla.suse.com/show_bug.cgi?id=1255704
- https://bugzilla.suse.com/show_bug.cgi?id=1255706
- https://bugzilla.suse.com/show_bug.cgi?id=1255722
- https://bugzilla.suse.com/show_bug.cgi?id=1255758
- https://bugzilla.suse.com/show_bug.cgi?id=1255759
- https://bugzilla.suse.com/show_bug.cgi?id=1255760
- https://bugzilla.suse.com/show_bug.cgi?id=1255763
- https://bugzilla.suse.com/show_bug.cgi?id=1255769
- https://bugzilla.suse.com/show_bug.cgi?id=1255770
- https://bugzilla.suse.com/show_bug.cgi?id=1255772
- https://bugzilla.suse.com/show_bug.cgi?id=1255774
- https://bugzilla.suse.com/show_bug.cgi?id=1255775
- https://bugzilla.suse.com/show_bug.cgi?id=1255776
- https://bugzilla.suse.com/show_bug.cgi?id=1255780
- https://bugzilla.suse.com/show_bug.cgi?id=1255785
- https://bugzilla.suse.com/show_bug.cgi?id=1255786
- https://bugzilla.suse.com/show_bug.cgi?id=1255789
- https://bugzilla.suse.com/show_bug.cgi?id=1255790
- https://bugzilla.suse.com/show_bug.cgi?id=1255792
- https://bugzilla.suse.com/show_bug.cgi?id=1255793
- https://bugzilla.suse.com/show_bug.cgi?id=1255795
- https://bugzilla.suse.com/show_bug.cgi?id=1255798
- https://bugzilla.suse.com/show_bug.cgi?id=1255800
- https://bugzilla.suse.com/show_bug.cgi?id=1255801
- https://bugzilla.suse.com/show_bug.cgi?id=1255806
- https://bugzilla.suse.com/show_bug.cgi?id=1255807
- https://bugzilla.suse.com/show_bug.cgi?id=1255809
- https://bugzilla.suse.com/show_bug.cgi?id=1255810
- https://bugzilla.suse.com/show_bug.cgi?id=1255812
- https://bugzilla.suse.com/show_bug.cgi?id=1255814
- https://bugzilla.suse.com/show_bug.cgi?id=1255820
- https://bugzilla.suse.com/show_bug.cgi?id=1255838
- https://bugzilla.suse.com/show_bug.cgi?id=1255842
- https://bugzilla.suse.com/show_bug.cgi?id=1255843
- https://bugzilla.suse.com/show_bug.cgi?id=1255872
- https://bugzilla.suse.com/show_bug.cgi?id=1255875
- https://bugzilla.suse.com/show_bug.cgi?id=1255879
- https://bugzilla.suse.com/show_bug.cgi?id=1255883
- https://bugzilla.suse.com/show_bug.cgi?id=1255884
- https://bugzilla.suse.com/show_bug.cgi?id=1255886
- https://bugzilla.suse.com/show_bug.cgi?id=1255888
- https://bugzilla.suse.com/show_bug.cgi?id=1255890
- https://bugzilla.suse.com/show_bug.cgi?id=1255891
- https://bugzilla.suse.com/show_bug.cgi?id=1255892
- https://bugzilla.suse.com/show_bug.cgi?id=1255899
- https://bugzilla.suse.com/show_bug.cgi?id=1255902
- https://bugzilla.suse.com/show_bug.cgi?id=1255907
- https://bugzilla.suse.com/show_bug.cgi?id=1255911
- https://bugzilla.suse.com/show_bug.cgi?id=1255915
- https://bugzilla.suse.com/show_bug.cgi?id=1255918
- https://bugzilla.suse.com/show_bug.cgi?id=1255921
- https://bugzilla.suse.com/show_bug.cgi?id=1255924
- https://bugzilla.suse.com/show_bug.cgi?id=1255925
- https://bugzilla.suse.com/show_bug.cgi?id=1255931
- https://bugzilla.suse.com/show_bug.cgi?id=1255932
- https://bugzilla.suse.com/show_bug.cgi?id=1255934
- https://bugzilla.suse.com/show_bug.cgi?id=1255943
- https://bugzilla.suse.com/show_bug.cgi?id=1255944
- https://bugzilla.suse.com/show_bug.cgi?id=1255949
- https://bugzilla.suse.com/show_bug.cgi?id=1255951
- https://bugzilla.suse.com/show_bug.cgi?id=1255952
- https://bugzilla.suse.com/show_bug.cgi?id=1255955
- https://bugzilla.suse.com/show_bug.cgi?id=1255957
- https://bugzilla.suse.com/show_bug.cgi?id=1255961
- https://bugzilla.suse.com/show_bug.cgi?id=1255963
- https://bugzilla.suse.com/show_bug.cgi?id=1255964
- https://bugzilla.suse.com/show_bug.cgi?id=1255967
- https://bugzilla.suse.com/show_bug.cgi?id=1255974
- https://bugzilla.suse.com/show_bug.cgi?id=1255978
- https://bugzilla.suse.com/show_bug.cgi?id=1255984
- https://bugzilla.suse.com/show_bug.cgi?id=1255988
- https://bugzilla.suse.com/show_bug.cgi?id=1255990
- https://bugzilla.suse.com/show_bug.cgi?id=1255992
- https://bugzilla.suse.com/show_bug.cgi?id=1255993
- https://bugzilla.suse.com/show_bug.cgi?id=1255994
- https://bugzilla.suse.com/show_bug.cgi?id=1255996
- https://bugzilla.suse.com/show_bug.cgi?id=1256033
- https://bugzilla.suse.com/show_bug.cgi?id=1256034
- https://bugzilla.suse.com/show_bug.cgi?id=1256045
- https://bugzilla.suse.com/show_bug.cgi?id=1256050
- https://bugzilla.suse.com/show_bug.cgi?id=1256058
- https://bugzilla.suse.com/show_bug.cgi?id=1256071
- https://bugzilla.suse.com/show_bug.cgi?id=1256074
- https://bugzilla.suse.com/show_bug.cgi?id=1256081
- https://bugzilla.suse.com/show_bug.cgi?id=1256082
- https://bugzilla.suse.com/show_bug.cgi?id=1256083
- https://bugzilla.suse.com/show_bug.cgi?id=1256084
- https://bugzilla.suse.com/show_bug.cgi?id=1256085
- https://bugzilla.suse.com/show_bug.cgi?id=1256090
- https://bugzilla.suse.com/show_bug.cgi?id=1256093
- https://bugzilla.suse.com/show_bug.cgi?id=1256094
- https://bugzilla.suse.com/show_bug.cgi?id=1256095
- https://bugzilla.suse.com/show_bug.cgi?id=1256096
- https://bugzilla.suse.com/show_bug.cgi?id=1256099
- https://bugzilla.suse.com/show_bug.cgi?id=1256100
- https://bugzilla.suse.com/show_bug.cgi?id=1256104
- https://bugzilla.suse.com/show_bug.cgi?id=1256106
- https://bugzilla.suse.com/show_bug.cgi?id=1256107
- https://bugzilla.suse.com/show_bug.cgi?id=1256117
- https://bugzilla.suse.com/show_bug.cgi?id=1256119
- https://bugzilla.suse.com/show_bug.cgi?id=1256121
- https://bugzilla.suse.com/show_bug.cgi?id=1256145
- https://bugzilla.suse.com/show_bug.cgi?id=1256153
- https://bugzilla.suse.com/show_bug.cgi?id=1256178
- https://bugzilla.suse.com/show_bug.cgi?id=1256197
- https://bugzilla.suse.com/show_bug.cgi?id=1256231
- https://bugzilla.suse.com/show_bug.cgi?id=1256233
- https://bugzilla.suse.com/show_bug.cgi?id=1256234
- https://bugzilla.suse.com/show_bug.cgi?id=1256238
- https://bugzilla.suse.com/show_bug.cgi?id=1256263
- https://bugzilla.suse.com/show_bug.cgi?id=1256267
- https://bugzilla.suse.com/show_bug.cgi?id=1256268
- https://bugzilla.suse.com/show_bug.cgi?id=1256271
- https://bugzilla.suse.com/show_bug.cgi?id=1256273
- https://bugzilla.suse.com/show_bug.cgi?id=1256274
- https://bugzilla.suse.com/show_bug.cgi?id=1256279
- https://bugzilla.suse.com/show_bug.cgi?id=1256285
- https://bugzilla.suse.com/show_bug.cgi?id=1256291
- https://bugzilla.suse.com/show_bug.cgi?id=1256292
- https://bugzilla.suse.com/show_bug.cgi?id=1256300
- https://bugzilla.suse.com/show_bug.cgi?id=1256301
- https://bugzilla.suse.com/show_bug.cgi?id=1256302
- https://bugzilla.suse.com/show_bug.cgi?id=1256335
- https://bugzilla.suse.com/show_bug.cgi?id=1256348
- https://bugzilla.suse.com/show_bug.cgi?id=1256351
- https://bugzilla.suse.com/show_bug.cgi?id=1256354
- https://bugzilla.suse.com/show_bug.cgi?id=1256358
- https://bugzilla.suse.com/show_bug.cgi?id=1256361
- https://bugzilla.suse.com/show_bug.cgi?id=1256364
- https://bugzilla.suse.com/show_bug.cgi?id=1256367
- https://bugzilla.suse.com/show_bug.cgi?id=1256368
- https://bugzilla.suse.com/show_bug.cgi?id=1256369
- https://bugzilla.suse.com/show_bug.cgi?id=1256370
- https://bugzilla.suse.com/show_bug.cgi?id=1256371
- https://bugzilla.suse.com/show_bug.cgi?id=1256373
- https://bugzilla.suse.com/show_bug.cgi?id=1256375
- https://bugzilla.suse.com/show_bug.cgi?id=1256379
- https://bugzilla.suse.com/show_bug.cgi?id=1256387
- https://bugzilla.suse.com/show_bug.cgi?id=1256394
- https://bugzilla.suse.com/show_bug.cgi?id=1256395
- https://bugzilla.suse.com/show_bug.cgi?id=1256396
- https://bugzilla.suse.com/show_bug.cgi?id=1256528
- https://jira.suse.com/browse/PED-14062
- https://jira.suse.com/browse/PED-3527
- https://jira.suse.com/browse/PED-4866
- https://jira.suse.com/browse/PED-5065
- https://jira.suse.com/browse/PED-5453
- https://jira.suse.com/browse/PED-5475
- https://jira.suse.com/browse/PED-5477
- https://jira.suse.com/browse/PED-5511
- https://jira.suse.com/browse/PED-6036
- https://jira.suse.com/browse/PED-6041
- https://jira.suse.com/browse/PED-6045
- https://jira.suse.com/browse/PED-6067
- https://jira.suse.com/browse/PED-6068
- https://jira.suse.com/browse/PED-6069
- https://jira.suse.com/browse/PED-6070
- https://jira.suse.com/browse/PED-6071
- https://jira.suse.com/browse/PED-6104
- https://jira.suse.com/browse/PED-6114
- https://jira.suse.com/browse/PED-6116
- https://jira.suse.com/browse/PED-6120
- https://jira.suse.com/browse/PED-6123
- https://jira.suse.com/browse/PED-6811
- https://jira.suse.com/browse/PED-7514
- https://jira.suse.com/browse/PED-7542
- https://jira.suse.com/browse/PED-7779
- https://jira.suse.com/browse/PED-7780