SUSE 5495 Published by

Multiple security updates have been released for SUSE Linux. These updates include fixes for Chromium, mozjs128, ChromeDriver, and the Linux kernel, which are all considered important or moderate in severity. Additionally, two updates address vulnerabilities in python-mistralclient.

openSUSE-SU-2025:0458-1: important: Security update to chromium
openSUSE-SU-2025-20135-1: important: Security update for mozjs128
openSUSE-SU-2025:15794-1: moderate: chromedriver-143.0.7499.40-2.1 on GA media
SUSE-SU-2025:4320-1: important: Security update for the Linux Kernel
openSUSE-SU-2025:0460-1: moderate: Security update for python-mistralclient
openSUSE-SU-2025:0461-1: moderate: Security update for python-mistralclient




openSUSE-SU-2025:0458-1: important: Security update to chromium


openSUSE Security Update: Security update to chromium
_______________________________

Announcement ID: openSUSE-SU-2025:0458-1
Rating: important
References: #1254429
Cross-References: CVE-2025-13630 CVE-2025-13631 CVE-2025-13632
CVE-2025-13633 CVE-2025-13634 CVE-2025-13635
CVE-2025-13636 CVE-2025-13637 CVE-2025-13638
CVE-2025-13639 CVE-2025-13640 CVE-2025-13720
CVE-2025-13721
Affected Products:
openSUSE Backports SLE-15-SP6
openSUSE Backports SLE-15-SP7
_______________________________

An update that fixes 13 vulnerabilities is now available.

Description:

This update for chromium fixes the following issues:

Chromium 143.0.7499.40 (boo#1254429):

* CVE-2025-13630: Type Confusion in V8
* CVE-2025-13631: Inappropriate implementation in Google Updater
* CVE-2025-13632: Inappropriate implementation in DevTools
* CVE-2025-13633: Use after free in Digital Credentials
* CVE-2025-13634: Inappropriate implementation in Downloads
* CVE-2025-13720: Bad cast in Loader
* CVE-2025-13721: Race in v8
* CVE-2025-13635: Inappropriate implementation in Downloads
* CVE-2025-13636: Inappropriate implementation in Split View
* CVE-2025-13637: Inappropriate implementation in Downloads
* CVE-2025-13638: Use after free in Media Stream
* CVE-2025-13639: Inappropriate implementation in WebRTC
* CVE-2025-13640: Inappropriate implementation in Passwords

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP7:

zypper in -t patch openSUSE-2025-458=1

- openSUSE Backports SLE-15-SP6:

zypper in -t patch openSUSE-2025-458=1

Package List:

- openSUSE Backports SLE-15-SP7 (aarch64 ppc64le x86_64):

chromedriver-143.0.7499.40-bp157.2.88.1
chromium-143.0.7499.40-bp157.2.88.1

- openSUSE Backports SLE-15-SP6 (aarch64 ppc64le x86_64):

chromedriver-143.0.7499.40-bp156.2.206.1
chromium-143.0.7499.40-bp156.2.206.1

References:

https://www.suse.com/security/cve/CVE-2025-13630.html
https://www.suse.com/security/cve/CVE-2025-13631.html
https://www.suse.com/security/cve/CVE-2025-13632.html
https://www.suse.com/security/cve/CVE-2025-13633.html
https://www.suse.com/security/cve/CVE-2025-13634.html
https://www.suse.com/security/cve/CVE-2025-13635.html
https://www.suse.com/security/cve/CVE-2025-13636.html
https://www.suse.com/security/cve/CVE-2025-13637.html
https://www.suse.com/security/cve/CVE-2025-13638.html
https://www.suse.com/security/cve/CVE-2025-13639.html
https://www.suse.com/security/cve/CVE-2025-13640.html
https://www.suse.com/security/cve/CVE-2025-13720.html
https://www.suse.com/security/cve/CVE-2025-13721.html
https://bugzilla.suse.com/1254429



openSUSE-SU-2025-20135-1: important: Security update for mozjs128


openSUSE security update: security update for mozjs128
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2025-20135-1
Rating: important
References:

* bsc#1248162

Cross-References:

* CVE-2025-5263
* CVE-2025-5264
* CVE-2025-5265
* CVE-2025-5266
* CVE-2025-5267
* CVE-2025-5268
* CVE-2025-5269
* CVE-2025-5283
* CVE-2025-6424
* CVE-2025-6425
* CVE-2025-6426
* CVE-2025-6429
* CVE-2025-6430
* CVE-2025-8027
* CVE-2025-8028
* CVE-2025-8029
* CVE-2025-8030
* CVE-2025-8031
* CVE-2025-8032
* CVE-2025-8033
* CVE-2025-8034
* CVE-2025-8035
* CVE-2025-9179
* CVE-2025-9180
* CVE-2025-9181
* CVE-2025-9185

CVSS scores:

* CVE-2025-5263 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2025-5264 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
* CVE-2025-5265 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
* CVE-2025-5266 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2025-5267 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2025-5268 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2025-5269 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2025-6424 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-6424 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-6425 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2025-6425 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-6426 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L
* CVE-2025-6426 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L
* CVE-2025-6429 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2025-6429 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-6430 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2025-6430 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-8027 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L
* CVE-2025-8027 ( SUSE ): 7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2025-8028 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L
* CVE-2025-8028 ( SUSE ): 7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2025-8029 ( SUSE ): 5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2025-8029 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-8030 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2025-8030 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-8031 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-8031 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-8032 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2025-8032 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-8033 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-8033 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-8034 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-8034 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-8035 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-8035 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-9179 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-9180 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
* CVE-2025-9181 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
* CVE-2025-9185 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves 26 vulnerabilities and has one bug fix can now be installed.

Description:

This update for mozjs128 fixes the following issues:

- Update to version 128.14.0 (bsc#1248162):
+ CVE-2025-9179: Sandbox escape due to invalid pointer in the
Audio/Video: GMP component
+ CVE-2025-9180: Same-origin policy bypass in the Graphics:
Canvas2D component
+ CVE-2025-9181: Uninitialized memory in the JavaScript Engine
component
+ CVE-2025-9185: Memory safety bugs fixed in Firefox ESR 115.27,
Firefox ESR 128.14, Thunderbird ESR 128.14, Firefox ESR 140.2,
Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142

- Update to version 128.13.0:
+ CVE-2025-8027: JavaScript engine only wrote partial return
value to stack
+ CVE-2025-8028: Large branch table could lead to truncated
instruction
+ CVE-2025-8029: javascript: URLs executed on object and embed
tags
+ CVE-2025-8030: Potential user-assisted code execution in ???Copy
as cURL??? command
+ CVE-2025-8031: Incorrect URL stripping in CSP reports
+ CVE-2025-8032: XSLT documents could bypass CSP
+ CVE-2025-8033: Incorrect JavaScript state machine for
generators
+ CVE-2025-8034: Memory safety bugs fixed in Firefox ESR 115.26,
Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1,
Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141
+ CVE-2025-8035: Memory safety bugs fixed in Firefox ESR 128.13,
Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR
140.1, Firefox 141 and Thunderbird 141

- Update to version 128.12.0:
+ CVE-2025-6424: Use-after-free in FontFaceSet
+ CVE-2025-6425: The WebCompat WebExtension shipped with Firefox
exposed a persistent UUID
+ CVE-2025-6426: No warning when opening executable terminal
files on macOS
+ CVE-2025-6429: Incorrect parsing of URLs could have allowed
embedding of youtube.com
+ CVE-2025-6430: Content-Disposition header ignored when a file
is included in an embed or object tag

- Update to version 128.11.0:
+ CVE-2025-5283: Double-free in libvpx encoder
+ CVE-2025-5263: Error handling for script execution was
incorrectly isolated from web content
+ CVE-2025-5264: Potential local code execution in ???Copy as cURL???
command
+ CVE-2025-5265: Potential local code execution in ???Copy as cURL???
command
+ CVE-2025-5266: Script element events leaked cross-origin
resource status
+ CVE-2025-5267: Clickjacking vulnerability could have led to
leaking saved payment card details
+ CVE-2025-5268: Memory safety bugs fixed in Firefox 139,
Thunderbird 139, Firefox ESR 128.11, and Thunderbird 128.11
+ CVE-2025-5269: Memory safety bug fixed in Firefox ESR 128.11
and Thunderbird 128.11

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-93=1

Package List:

- openSUSE Leap 16.0:

libmozjs-128-0-128.14.0-160000.1.1
mozjs128-128.14.0-160000.1.1
mozjs128-devel-128.14.0-160000.1.1

References:

* https://www.suse.com/security/cve/CVE-2025-5263.html
* https://www.suse.com/security/cve/CVE-2025-5264.html
* https://www.suse.com/security/cve/CVE-2025-5265.html
* https://www.suse.com/security/cve/CVE-2025-5266.html
* https://www.suse.com/security/cve/CVE-2025-5267.html
* https://www.suse.com/security/cve/CVE-2025-5268.html
* https://www.suse.com/security/cve/CVE-2025-5269.html
* https://www.suse.com/security/cve/CVE-2025-5283.html
* https://www.suse.com/security/cve/CVE-2025-6424.html
* https://www.suse.com/security/cve/CVE-2025-6425.html
* https://www.suse.com/security/cve/CVE-2025-6426.html
* https://www.suse.com/security/cve/CVE-2025-6429.html
* https://www.suse.com/security/cve/CVE-2025-6430.html
* https://www.suse.com/security/cve/CVE-2025-8027.html
* https://www.suse.com/security/cve/CVE-2025-8028.html
* https://www.suse.com/security/cve/CVE-2025-8029.html
* https://www.suse.com/security/cve/CVE-2025-8030.html
* https://www.suse.com/security/cve/CVE-2025-8031.html
* https://www.suse.com/security/cve/CVE-2025-8032.html
* https://www.suse.com/security/cve/CVE-2025-8033.html
* https://www.suse.com/security/cve/CVE-2025-8034.html
* https://www.suse.com/security/cve/CVE-2025-8035.html
* https://www.suse.com/security/cve/CVE-2025-9179.html
* https://www.suse.com/security/cve/CVE-2025-9180.html
* https://www.suse.com/security/cve/CVE-2025-9181.html
* https://www.suse.com/security/cve/CVE-2025-9185.html



openSUSE-SU-2025:15794-1: moderate: chromedriver-143.0.7499.40-2.1 on GA media


# chromedriver-143.0.7499.40-2.1 on GA media

Announcement ID: openSUSE-SU-2025:15794-1
Rating: moderate

Cross-References:

* CVE-2025-13630
* CVE-2025-13631
* CVE-2025-13632
* CVE-2025-13633
* CVE-2025-13634
* CVE-2025-13635
* CVE-2025-13636
* CVE-2025-13637
* CVE-2025-13638
* CVE-2025-13639
* CVE-2025-13640
* CVE-2025-13720
* CVE-2025-13721

Affected Products:

* openSUSE Tumbleweed

An update that solves 13 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the chromedriver-143.0.7499.40-2.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* chromedriver 143.0.7499.40-2.1
* chromium 143.0.7499.40-2.1

## References:

* https://www.suse.com/security/cve/CVE-2025-13630.html
* https://www.suse.com/security/cve/CVE-2025-13631.html
* https://www.suse.com/security/cve/CVE-2025-13632.html
* https://www.suse.com/security/cve/CVE-2025-13633.html
* https://www.suse.com/security/cve/CVE-2025-13634.html
* https://www.suse.com/security/cve/CVE-2025-13635.html
* https://www.suse.com/security/cve/CVE-2025-13636.html
* https://www.suse.com/security/cve/CVE-2025-13637.html
* https://www.suse.com/security/cve/CVE-2025-13638.html
* https://www.suse.com/security/cve/CVE-2025-13639.html
* https://www.suse.com/security/cve/CVE-2025-13640.html
* https://www.suse.com/security/cve/CVE-2025-13720.html
* https://www.suse.com/security/cve/CVE-2025-13721.html



SUSE-SU-2025:4320-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:4320-1
Release Date: 2025-12-04T10:04:36Z
Rating: important
References:

* bsc#1065729
* bsc#1205128
* bsc#1206843
* bsc#1206893
* bsc#1207612
* bsc#1207619
* bsc#1210763
* bsc#1211162
* bsc#1211692
* bsc#1213098
* bsc#1213114
* bsc#1213747
* bsc#1214754
* bsc#1214954
* bsc#1214992
* bsc#1215148
* bsc#1217366
* bsc#1236104
* bsc#1242960
* bsc#1245498
* bsc#1245499
* bsc#1246211
* bsc#1247317
* bsc#1248754
* bsc#1249479
* bsc#1249608
* bsc#1249857
* bsc#1249859
* bsc#1249988
* bsc#1250237
* bsc#1250742
* bsc#1250816
* bsc#1250946
* bsc#1251027
* bsc#1251032
* bsc#1251034
* bsc#1251035
* bsc#1251037
* bsc#1251040
* bsc#1251043
* bsc#1251045
* bsc#1251046
* bsc#1251047
* bsc#1251052
* bsc#1251054
* bsc#1251057
* bsc#1251059
* bsc#1251060
* bsc#1251061
* bsc#1251063
* bsc#1251065
* bsc#1251066
* bsc#1251068
* bsc#1251072
* bsc#1251079
* bsc#1251080
* bsc#1251082
* bsc#1251086
* bsc#1251087
* bsc#1251088
* bsc#1251091
* bsc#1251092
* bsc#1251093
* bsc#1251097
* bsc#1251099
* bsc#1251101
* bsc#1251104
* bsc#1251105
* bsc#1251106
* bsc#1251110
* bsc#1251113
* bsc#1251115
* bsc#1251123
* bsc#1251128
* bsc#1251129
* bsc#1251133
* bsc#1251136
* bsc#1251147
* bsc#1251149
* bsc#1251153
* bsc#1251154
* bsc#1251159
* bsc#1251162
* bsc#1251164
* bsc#1251166
* bsc#1251167
* bsc#1251169
* bsc#1251170
* bsc#1251173
* bsc#1251174
* bsc#1251178
* bsc#1251180
* bsc#1251182
* bsc#1251197
* bsc#1251200
* bsc#1251201
* bsc#1251202
* bsc#1251208
* bsc#1251210
* bsc#1251215
* bsc#1251218
* bsc#1251221
* bsc#1251222
* bsc#1251223
* bsc#1251230
* bsc#1251247
* bsc#1251268
* bsc#1251281
* bsc#1251282
* bsc#1251283
* bsc#1251284
* bsc#1251285
* bsc#1251286
* bsc#1251292
* bsc#1251294
* bsc#1251295
* bsc#1251296
* bsc#1251298
* bsc#1251299
* bsc#1251300
* bsc#1251301
* bsc#1251302
* bsc#1251303
* bsc#1251306
* bsc#1251307
* bsc#1251310
* bsc#1251312
* bsc#1251315
* bsc#1251322
* bsc#1251324
* bsc#1251325
* bsc#1251326
* bsc#1251327
* bsc#1251329
* bsc#1251330
* bsc#1251331
* bsc#1251519
* bsc#1251521
* bsc#1251522
* bsc#1251527
* bsc#1251529
* bsc#1251550
* bsc#1251723
* bsc#1251725
* bsc#1251728
* bsc#1251730
* bsc#1251736
* bsc#1251737
* bsc#1251738
* bsc#1251741
* bsc#1251743
* bsc#1251750
* bsc#1251753
* bsc#1251759
* bsc#1251761
* bsc#1251762
* bsc#1251763
* bsc#1251764
* bsc#1251767
* bsc#1251769
* bsc#1251772
* bsc#1251775
* bsc#1251777
* bsc#1251785
* bsc#1251823
* bsc#1251930
* bsc#1251967
* bsc#1252033
* bsc#1252035
* bsc#1252047
* bsc#1252060
* bsc#1252069
* bsc#1252265
* bsc#1252473
* bsc#1252474
* bsc#1252475
* bsc#1252476
* bsc#1252480
* bsc#1252484
* bsc#1252486
* bsc#1252489
* bsc#1252490
* bsc#1252492
* bsc#1252494
* bsc#1252495
* bsc#1252497
* bsc#1252499
* bsc#1252501
* bsc#1252508
* bsc#1252509
* bsc#1252513
* bsc#1252515
* bsc#1252516
* bsc#1252519
* bsc#1252521
* bsc#1252522
* bsc#1252523
* bsc#1252526
* bsc#1252528
* bsc#1252529
* bsc#1252532
* bsc#1252534
* bsc#1252535
* bsc#1252536
* bsc#1252537
* bsc#1252538
* bsc#1252539
* bsc#1252542
* bsc#1252545
* bsc#1252549
* bsc#1252554
* bsc#1252560
* bsc#1252564
* bsc#1252565
* bsc#1252568
* bsc#1252632
* bsc#1252634
* bsc#1252688
* bsc#1252785
* bsc#1252893
* jsc#PED-1166
* jsc#PED-1168
* jsc#PED-1170
* jsc#PED-1218
* jsc#PED-1220
* jsc#PED-1222
* jsc#PED-1223
* jsc#PED-1225
* jsc#PED-1549
* jsc#PED-2849
* jsc#PED-4593
* jsc#PED-568

Cross-References:

* CVE-2022-43945
* CVE-2022-50327
* CVE-2022-50334
* CVE-2022-50470
* CVE-2022-50471
* CVE-2022-50472
* CVE-2022-50475
* CVE-2022-50478
* CVE-2022-50479
* CVE-2022-50480
* CVE-2022-50482
* CVE-2022-50484
* CVE-2022-50485
* CVE-2022-50487
* CVE-2022-50488
* CVE-2022-50489
* CVE-2022-50490
* CVE-2022-50492
* CVE-2022-50493
* CVE-2022-50494
* CVE-2022-50496
* CVE-2022-50497
* CVE-2022-50498
* CVE-2022-50499
* CVE-2022-50501
* CVE-2022-50503
* CVE-2022-50504
* CVE-2022-50505
* CVE-2022-50509
* CVE-2022-50511
* CVE-2022-50512
* CVE-2022-50513
* CVE-2022-50514
* CVE-2022-50515
* CVE-2022-50516
* CVE-2022-50519
* CVE-2022-50520
* CVE-2022-50521
* CVE-2022-50523
* CVE-2022-50524
* CVE-2022-50525
* CVE-2022-50526
* CVE-2022-50527
* CVE-2022-50528
* CVE-2022-50529
* CVE-2022-50530
* CVE-2022-50532
* CVE-2022-50534
* CVE-2022-50535
* CVE-2022-50537
* CVE-2022-50541
* CVE-2022-50542
* CVE-2022-50543
* CVE-2022-50544
* CVE-2022-50545
* CVE-2022-50546
* CVE-2022-50549
* CVE-2022-50551
* CVE-2022-50553
* CVE-2022-50556
* CVE-2022-50559
* CVE-2022-50560
* CVE-2022-50561
* CVE-2022-50562
* CVE-2022-50563
* CVE-2022-50564
* CVE-2022-50566
* CVE-2022-50567
* CVE-2022-50568
* CVE-2022-50570
* CVE-2022-50572
* CVE-2022-50574
* CVE-2022-50575
* CVE-2022-50576
* CVE-2022-50577
* CVE-2022-50578
* CVE-2022-50579
* CVE-2022-50580
* CVE-2022-50581
* CVE-2022-50582
* CVE-2023-52923
* CVE-2023-53365
* CVE-2023-53500
* CVE-2023-53533
* CVE-2023-53534
* CVE-2023-53539
* CVE-2023-53541
* CVE-2023-53542
* CVE-2023-53546
* CVE-2023-53547
* CVE-2023-53548
* CVE-2023-53551
* CVE-2023-53552
* CVE-2023-53553
* CVE-2023-53554
* CVE-2023-53556
* CVE-2023-53557
* CVE-2023-53559
* CVE-2023-53560
* CVE-2023-53562
* CVE-2023-53564
* CVE-2023-53566
* CVE-2023-53567
* CVE-2023-53568
* CVE-2023-53571
* CVE-2023-53572
* CVE-2023-53574
* CVE-2023-53578
* CVE-2023-53579
* CVE-2023-53580
* CVE-2023-53581
* CVE-2023-53582
* CVE-2023-53587
* CVE-2023-53589
* CVE-2023-53591
* CVE-2023-53592
* CVE-2023-53594
* CVE-2023-53597
* CVE-2023-53598
* CVE-2023-53601
* CVE-2023-53603
* CVE-2023-53604
* CVE-2023-53605
* CVE-2023-53607
* CVE-2023-53608
* CVE-2023-53611
* CVE-2023-53612
* CVE-2023-53615
* CVE-2023-53616
* CVE-2023-53617
* CVE-2023-53619
* CVE-2023-53622
* CVE-2023-53625
* CVE-2023-53626
* CVE-2023-53631
* CVE-2023-53637
* CVE-2023-53639
* CVE-2023-53640
* CVE-2023-53641
* CVE-2023-53644
* CVE-2023-53648
* CVE-2023-53650
* CVE-2023-53651
* CVE-2023-53658
* CVE-2023-53659
* CVE-2023-53662
* CVE-2023-53667
* CVE-2023-53668
* CVE-2023-53670
* CVE-2023-53673
* CVE-2023-53674
* CVE-2023-53675
* CVE-2023-53679
* CVE-2023-53680
* CVE-2023-53681
* CVE-2023-53683
* CVE-2023-53687
* CVE-2023-53692
* CVE-2023-53693
* CVE-2023-53695
* CVE-2023-53696
* CVE-2023-53697
* CVE-2023-53700
* CVE-2023-53704
* CVE-2023-53705
* CVE-2023-53707
* CVE-2023-53708
* CVE-2023-53709
* CVE-2023-53711
* CVE-2023-53715
* CVE-2023-53716
* CVE-2023-53717
* CVE-2023-53718
* CVE-2023-53719
* CVE-2023-53722
* CVE-2023-53723
* CVE-2023-53724
* CVE-2023-53725
* CVE-2023-53726
* CVE-2023-53730
* CVE-2023-7324
* CVE-2025-37885
* CVE-2025-38084
* CVE-2025-38085
* CVE-2025-38476
* CVE-2025-39742
* CVE-2025-39797
* CVE-2025-39945
* CVE-2025-39965
* CVE-2025-39967
* CVE-2025-39968
* CVE-2025-39973
* CVE-2025-39978
* CVE-2025-39981
* CVE-2025-40018
* CVE-2025-40044

CVSS scores:

* CVE-2022-43945 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-43945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-43945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50327 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50334 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50334 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50334 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50470 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50470 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50471 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50471 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50472 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50472 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50475 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50475 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50478 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50479 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50479 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50480 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50480 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50482 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50482 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50484 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50485 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50485 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-50487 ( SUSE ): 7.1
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50487 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50488 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50488 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50489 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50489 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50490 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50492 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50492 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50493 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50493 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50494 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50496 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50496 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50497 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50497 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-50498 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50498 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50499 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50499 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50504 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50505 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50511 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50512 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50512 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50513 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50513 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50514 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50516 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50516 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50519 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50519 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2022-50520 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50521 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50523 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50525 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50526 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50527 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50527 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50528 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50529 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50530 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50534 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50535 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50535 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50537 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50541 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2022-50541 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2022-50542 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50542 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50544 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50544 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50545 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50546 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50549 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50551 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50556 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50559 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50560 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50561 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50561 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50563 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50563 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-50564 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50566 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50566 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50567 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50567 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50568 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50570 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50570 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2022-50572 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50574 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50575 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2022-50575 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2022-50576 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50576 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50577 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50577 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50578 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50578 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50579 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50579 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50580 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50580 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50581 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50581 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-50582 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50582 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52923 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52923 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53365 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53500 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53533 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53534 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53539 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53539 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-53541 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53541 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-53542 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53546 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53547 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53547 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53548 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53552 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53554 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53564 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53568 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53571 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53572 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53574 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53574 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53578 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53579 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53580 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53580 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53581 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53581 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53582 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53582 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-53587 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53587 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53589 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53589 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L
* CVE-2023-53591 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53592 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53592 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53594 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53598 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53601 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53603 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53604 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53604 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53605 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53605 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53608 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53608 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53612 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53612 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-53615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53616 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53616 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-53617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53619 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53619 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53622 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53622 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-53625 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53626 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53626 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-53631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53637 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53637 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53639 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53639 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53640 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53640 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53641 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53641 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53644 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53644 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53648 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53650 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53651 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53651 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53658 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53659 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53659 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53662 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53662 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53667 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53667 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-53668 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53668 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2023-53670 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53670 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53673 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53674 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53674 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53675 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53679 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53680 ( SUSE ): 5.1
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53680 ( SUSE ): 5.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-53681 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53681 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53683 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53683 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53687 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53687 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53692 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53693 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53695 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53695 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-53696 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53697 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53697 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53704 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53704 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53705 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53705 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2023-53707 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53708 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53708 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53711 ( SUSE ): 6.0
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2023-53711 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-53715 ( SUSE ): 7.1
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-53715 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-53716 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53716 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53717 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53717 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53718 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53718 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-53719 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53719 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53722 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53722 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53723 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53723 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53724 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53724 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53725 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53725 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53726 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-53726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-53730 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53730 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-7324 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-7324 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37885 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38084 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38084 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38085 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38085 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38476 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39742 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39742 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39797 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39797 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39797 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39945 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39945 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39965 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39965 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-39967 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39967 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-39968 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-39968 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-39973 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39973 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39978 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39978 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39981 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39981 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40018 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40018 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40044 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40044 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves 196 vulnerabilities, contains 12 features and has 24
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP5 kernel was updated to fix various security
issues

The following security issues were fixed:

* CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return
value (bsc#1249859).
* CVE-2022-50334: hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param()
(bsc#1249857).
* CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace
(bsc#1251164).
* CVE-2022-50516: fs: dlm: fix invalid derefence of sb_lvbptr (bsc#1251741).
* CVE-2023-53365: ip6mr: Fix skb_under_panic in ip6mr_cache_report()
(bsc#1249988).
* CVE-2023-53500: xfrm: fix slab-use-after-free in decode_session6
(bsc#1250816).
* CVE-2023-53559: ip_vti: fix potential slab-use-after-free in decode_session6
(bsc#1251052).
* CVE-2023-53574: wifi: rtw88: delete timer and free skb queue when unloading
(bsc#1251222).
* CVE-2023-53619: netfilter: conntrack: Avoid nf_ct_helper_hash uses after
free (bsc#1251743).
* CVE-2023-53673: Bluetooth: hci_event: call disconnect callback before
deleting conn (bsc#1251763).
* CVE-2023-53705: ipv6: Fix out-of-bounds access in ipv6_find_tlv()
(bsc#1252554).
* CVE-2025-37885: KVM: x86: Reset IRTE to host control if _new_ route isn't
postable (bsc#1242960).
* CVE-2025-38084: hugetlb: unshare some PMDs when splitting VMAs
(bsc#1245498).
* CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race
(bsc#1245499).
* CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline()
(bsc#1247317).
* CVE-2025-39742: RDMA: hfi1: fix possible divide-by-zero in
find_hw_thread_mask() (bsc#1249479).
* CVE-2025-39797: xfrm: Duplicate SPI Handling (bsc#1249608).
* CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task
(bsc#1251230).
* CVE-2025-39967: fbcon: fix integer overflow in fbcon_do_set_font
(bsc#1252033).
* CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047).
* CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).
* CVE-2025-39978: octeontx2-pf: Fix potential use after free in
otx2_tc_add_flow() (bsc#1252069).
* CVE-2025-39981: Bluetooth: MGMT: Fix possible UAFs (bsc#1252060).
* CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup
(bsc#1252688).
* CVE-2025-40044: fs: udf: fix OOB read in lengthAllocDescs handling
(bsc#1252785).

The following non security issues were fixed:

* NFS: remove revoked delegation from server's delegation list (bsc#1246211).
* NFSv4: Allow FREE_STATEID to clean up delegations (bsc#1246211).
* fbcon: Fix OOB access in font allocation (bsc#1252033)
* kabi fix for NFSv4: Allow FREE_STATEID to clean up delegations
(bsc#1246211).
* kernel-subpackage-spec: Do not doubly-sign modules (bsc#1251930).
* mm: avoid unnecessary page fault retires on shared memory types
(bsc#1251823).
* net: hv_netvsc: fix loss of early receive events from host during channel
open (bsc#1252265).
* net: mana: Switch to page pool for jumbo frames (bsc#1248754).
* net: mana: Use page pool fragments for RX buffers instead of full pages to
improve memory efficiency (bsc#1248754).
* netfilter: nft_objref: validate objref and objrefmap expressions
(bsc#1250237).
* rpm/check-for-config-changes: ignore CONFIG_SCHED_PROXY_EXEC, too
(bsc#1250946)

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-4320=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4320=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4320=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4320=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4320=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-4320=1

* openSUSE Leap 15.5
zypper in -t patch SUSE-2025-4320=1

## Package List:

* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.127.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* kernel-default-base-5.14.21-150500.55.127.1.150500.6.61.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* kernel-default-debugsource-5.14.21-150500.55.127.1
* kernel-default-debuginfo-5.14.21-150500.55.127.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-macros-5.14.21-150500.55.127.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.127.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.127.1
* dlm-kmp-default-5.14.21-150500.55.127.1
* kernel-obs-build-debugsource-5.14.21-150500.55.127.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.127.1
* kernel-default-devel-5.14.21-150500.55.127.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.127.1
* kernel-syms-5.14.21-150500.55.127.1
* kernel-default-base-5.14.21-150500.55.127.1.150500.6.61.1
* kernel-obs-build-5.14.21-150500.55.127.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.127.1
* kernel-default-debugsource-5.14.21-150500.55.127.1
* kernel-default-debuginfo-5.14.21-150500.55.127.1
* ocfs2-kmp-default-5.14.21-150500.55.127.1
* gfs2-kmp-default-5.14.21-150500.55.127.1
* cluster-md-kmp-default-5.14.21-150500.55.127.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
nosrc)
* kernel-64kb-5.14.21-150500.55.127.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64)
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.127.1
* kernel-64kb-devel-5.14.21-150500.55.127.1
* kernel-64kb-debugsource-5.14.21-150500.55.127.1
* kernel-64kb-debuginfo-5.14.21-150500.55.127.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150500.55.127.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* kernel-devel-5.14.21-150500.55.127.1
* kernel-source-5.14.21-150500.55.127.1
* kernel-macros-5.14.21-150500.55.127.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.127.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.127.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.127.1
* dlm-kmp-default-5.14.21-150500.55.127.1
* kernel-obs-build-debugsource-5.14.21-150500.55.127.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.127.1
* kernel-default-devel-5.14.21-150500.55.127.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.127.1
* kernel-syms-5.14.21-150500.55.127.1
* kernel-default-base-5.14.21-150500.55.127.1.150500.6.61.1
* kernel-obs-build-5.14.21-150500.55.127.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.127.1
* kernel-default-debugsource-5.14.21-150500.55.127.1
* kernel-default-debuginfo-5.14.21-150500.55.127.1
* ocfs2-kmp-default-5.14.21-150500.55.127.1
* gfs2-kmp-default-5.14.21-150500.55.127.1
* cluster-md-kmp-default-5.14.21-150500.55.127.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.127.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64)
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.127.1
* kernel-64kb-devel-5.14.21-150500.55.127.1
* kernel-64kb-debugsource-5.14.21-150500.55.127.1
* kernel-64kb-debuginfo-5.14.21-150500.55.127.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150500.55.127.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* kernel-devel-5.14.21-150500.55.127.1
* kernel-source-5.14.21-150500.55.127.1
* kernel-macros-5.14.21-150500.55.127.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.127.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.127.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.127.1
* reiserfs-kmp-default-5.14.21-150500.55.127.1
* dlm-kmp-default-5.14.21-150500.55.127.1
* kernel-obs-build-debugsource-5.14.21-150500.55.127.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.127.1
* kernel-default-devel-5.14.21-150500.55.127.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.127.1
* kernel-syms-5.14.21-150500.55.127.1
* kernel-obs-build-5.14.21-150500.55.127.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.127.1
* kernel-default-debugsource-5.14.21-150500.55.127.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.127.1
* kernel-default-debuginfo-5.14.21-150500.55.127.1
* ocfs2-kmp-default-5.14.21-150500.55.127.1
* gfs2-kmp-default-5.14.21-150500.55.127.1
* cluster-md-kmp-default-5.14.21-150500.55.127.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.127.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64)
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.127.1
* kernel-64kb-devel-5.14.21-150500.55.127.1
* kernel-64kb-debugsource-5.14.21-150500.55.127.1
* kernel-64kb-debuginfo-5.14.21-150500.55.127.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-5.14.21-150500.55.127.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150500.55.127.1.150500.6.61.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* kernel-devel-5.14.21-150500.55.127.1
* kernel-source-5.14.21-150500.55.127.1
* kernel-macros-5.14.21-150500.55.127.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch nosrc)
* kernel-docs-5.14.21-150500.55.127.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.127.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150500.55.127.1
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.127.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.127.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.127.1
* reiserfs-kmp-default-5.14.21-150500.55.127.1
* dlm-kmp-default-5.14.21-150500.55.127.1
* kernel-obs-build-debugsource-5.14.21-150500.55.127.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.127.1
* kernel-default-devel-5.14.21-150500.55.127.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.127.1
* kernel-syms-5.14.21-150500.55.127.1
* kernel-default-base-5.14.21-150500.55.127.1.150500.6.61.1
* kernel-obs-build-5.14.21-150500.55.127.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.127.1
* kernel-default-debugsource-5.14.21-150500.55.127.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.127.1
* kernel-default-debuginfo-5.14.21-150500.55.127.1
* ocfs2-kmp-default-5.14.21-150500.55.127.1
* gfs2-kmp-default-5.14.21-150500.55.127.1
* cluster-md-kmp-default-5.14.21-150500.55.127.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150500.55.127.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* kernel-devel-5.14.21-150500.55.127.1
* kernel-source-5.14.21-150500.55.127.1
* kernel-macros-5.14.21-150500.55.127.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.127.1
* SUSE Linux Enterprise Live Patching 15-SP5 (nosrc)
* kernel-default-5.14.21-150500.55.127.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_32-debugsource-1-150500.11.3.1
* kernel-default-livepatch-5.14.21-150500.55.127.1
* kernel-default-debugsource-5.14.21-150500.55.127.1
* kernel-default-livepatch-devel-5.14.21-150500.55.127.1
* kernel-livepatch-5_14_21-150500_55_127-default-1-150500.11.3.1
* kernel-default-debuginfo-5.14.21-150500.55.127.1
* kernel-livepatch-5_14_21-150500_55_127-default-debuginfo-1-150500.11.3.1
* openSUSE Leap 15.5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.127.1
* openSUSE Leap 15.5 (noarch)
* kernel-macros-5.14.21-150500.55.127.1
* kernel-devel-5.14.21-150500.55.127.1
* kernel-source-vanilla-5.14.21-150500.55.127.1
* kernel-docs-html-5.14.21-150500.55.127.1
* kernel-source-5.14.21-150500.55.127.1
* openSUSE Leap 15.5 (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150500.55.127.1.150500.6.61.1
* kernel-default-base-rebuild-5.14.21-150500.55.127.1.150500.6.61.1
* kernel-kvmsmall-debuginfo-5.14.21-150500.55.127.1
* kernel-kvmsmall-devel-5.14.21-150500.55.127.1
* kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.127.1
* kernel-kvmsmall-debugsource-5.14.21-150500.55.127.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* reiserfs-kmp-default-5.14.21-150500.55.127.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.127.1
* kselftests-kmp-default-5.14.21-150500.55.127.1
* kernel-obs-build-5.14.21-150500.55.127.1
* kernel-default-extra-debuginfo-5.14.21-150500.55.127.1
* kernel-default-optional-debuginfo-5.14.21-150500.55.127.1
* ocfs2-kmp-default-5.14.21-150500.55.127.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.127.1
* dlm-kmp-default-5.14.21-150500.55.127.1
* kernel-default-livepatch-5.14.21-150500.55.127.1
* kernel-default-debugsource-5.14.21-150500.55.127.1
* kernel-default-extra-5.14.21-150500.55.127.1
* gfs2-kmp-default-5.14.21-150500.55.127.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.127.1
* kernel-default-optional-5.14.21-150500.55.127.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.127.1
* kernel-default-debuginfo-5.14.21-150500.55.127.1
* cluster-md-kmp-default-5.14.21-150500.55.127.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.127.1
* kernel-obs-build-debugsource-5.14.21-150500.55.127.1
* kernel-syms-5.14.21-150500.55.127.1
* kernel-default-devel-5.14.21-150500.55.127.1
* kselftests-kmp-default-debuginfo-5.14.21-150500.55.127.1
* kernel-obs-qa-5.14.21-150500.55.127.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.127.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.127.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_127-default-debuginfo-1-150500.11.3.1
* kernel-default-livepatch-devel-5.14.21-150500.55.127.1
* kernel-livepatch-SLE15-SP5_Update_32-debugsource-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_55_127-default-1-150500.11.3.1
* openSUSE Leap 15.5 (x86_64)
* kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.127.1
* kernel-kvmsmall-vdso-5.14.21-150500.55.127.1
* kernel-default-vdso-5.14.21-150500.55.127.1
* kernel-default-vdso-debuginfo-5.14.21-150500.55.127.1
* openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150500.55.127.1
* openSUSE Leap 15.5 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.127.1
* openSUSE Leap 15.5 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150500.55.127.1
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.127.1
* openSUSE Leap 15.5 (nosrc)
* dtb-aarch64-5.14.21-150500.55.127.1
* openSUSE Leap 15.5 (aarch64)
* dtb-hisilicon-5.14.21-150500.55.127.1
* dtb-amd-5.14.21-150500.55.127.1
* dtb-renesas-5.14.21-150500.55.127.1
* dtb-lg-5.14.21-150500.55.127.1
* kernel-64kb-optional-5.14.21-150500.55.127.1
* dtb-sprd-5.14.21-150500.55.127.1
* kernel-64kb-extra-5.14.21-150500.55.127.1
* dtb-freescale-5.14.21-150500.55.127.1
* cluster-md-kmp-64kb-5.14.21-150500.55.127.1
* kernel-64kb-optional-debuginfo-5.14.21-150500.55.127.1
* dtb-cavium-5.14.21-150500.55.127.1
* ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.127.1
* dtb-qcom-5.14.21-150500.55.127.1
* dtb-arm-5.14.21-150500.55.127.1
* reiserfs-kmp-64kb-5.14.21-150500.55.127.1
* cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.127.1
* dtb-exynos-5.14.21-150500.55.127.1
* dtb-mediatek-5.14.21-150500.55.127.1
* kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.127.1
* kernel-64kb-extra-debuginfo-5.14.21-150500.55.127.1
* kernel-64kb-debugsource-5.14.21-150500.55.127.1
* ocfs2-kmp-64kb-5.14.21-150500.55.127.1
* dtb-altera-5.14.21-150500.55.127.1
* dtb-amazon-5.14.21-150500.55.127.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.127.1
* dtb-apple-5.14.21-150500.55.127.1
* dlm-kmp-64kb-debuginfo-5.14.21-150500.55.127.1
* kernel-64kb-debuginfo-5.14.21-150500.55.127.1
* kselftests-kmp-64kb-5.14.21-150500.55.127.1
* dtb-marvell-5.14.21-150500.55.127.1
* kernel-64kb-devel-5.14.21-150500.55.127.1
* dtb-xilinx-5.14.21-150500.55.127.1
* dtb-rockchip-5.14.21-150500.55.127.1
* gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.127.1
* gfs2-kmp-64kb-5.14.21-150500.55.127.1
* dtb-broadcom-5.14.21-150500.55.127.1
* dtb-amlogic-5.14.21-150500.55.127.1
* dlm-kmp-64kb-5.14.21-150500.55.127.1
* dtb-allwinner-5.14.21-150500.55.127.1
* reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.127.1
* dtb-socionext-5.14.21-150500.55.127.1
* dtb-nvidia-5.14.21-150500.55.127.1
* dtb-apm-5.14.21-150500.55.127.1
* openSUSE Leap 15.5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.127.1

## References:

* https://www.suse.com/security/cve/CVE-2022-43945.html
* https://www.suse.com/security/cve/CVE-2022-50327.html
* https://www.suse.com/security/cve/CVE-2022-50334.html
* https://www.suse.com/security/cve/CVE-2022-50470.html
* https://www.suse.com/security/cve/CVE-2022-50471.html
* https://www.suse.com/security/cve/CVE-2022-50472.html
* https://www.suse.com/security/cve/CVE-2022-50475.html
* https://www.suse.com/security/cve/CVE-2022-50478.html
* https://www.suse.com/security/cve/CVE-2022-50479.html
* https://www.suse.com/security/cve/CVE-2022-50480.html
* https://www.suse.com/security/cve/CVE-2022-50482.html
* https://www.suse.com/security/cve/CVE-2022-50484.html
* https://www.suse.com/security/cve/CVE-2022-50485.html
* https://www.suse.com/security/cve/CVE-2022-50487.html
* https://www.suse.com/security/cve/CVE-2022-50488.html
* https://www.suse.com/security/cve/CVE-2022-50489.html
* https://www.suse.com/security/cve/CVE-2022-50490.html
* https://www.suse.com/security/cve/CVE-2022-50492.html
* https://www.suse.com/security/cve/CVE-2022-50493.html
* https://www.suse.com/security/cve/CVE-2022-50494.html
* https://www.suse.com/security/cve/CVE-2022-50496.html
* https://www.suse.com/security/cve/CVE-2022-50497.html
* https://www.suse.com/security/cve/CVE-2022-50498.html
* https://www.suse.com/security/cve/CVE-2022-50499.html
* https://www.suse.com/security/cve/CVE-2022-50501.html
* https://www.suse.com/security/cve/CVE-2022-50503.html
* https://www.suse.com/security/cve/CVE-2022-50504.html
* https://www.suse.com/security/cve/CVE-2022-50505.html
* https://www.suse.com/security/cve/CVE-2022-50509.html
* https://www.suse.com/security/cve/CVE-2022-50511.html
* https://www.suse.com/security/cve/CVE-2022-50512.html
* https://www.suse.com/security/cve/CVE-2022-50513.html
* https://www.suse.com/security/cve/CVE-2022-50514.html
* https://www.suse.com/security/cve/CVE-2022-50515.html
* https://www.suse.com/security/cve/CVE-2022-50516.html
* https://www.suse.com/security/cve/CVE-2022-50519.html
* https://www.suse.com/security/cve/CVE-2022-50520.html
* https://www.suse.com/security/cve/CVE-2022-50521.html
* https://www.suse.com/security/cve/CVE-2022-50523.html
* https://www.suse.com/security/cve/CVE-2022-50524.html
* https://www.suse.com/security/cve/CVE-2022-50525.html
* https://www.suse.com/security/cve/CVE-2022-50526.html
* https://www.suse.com/security/cve/CVE-2022-50527.html
* https://www.suse.com/security/cve/CVE-2022-50528.html
* https://www.suse.com/security/cve/CVE-2022-50529.html
* https://www.suse.com/security/cve/CVE-2022-50530.html
* https://www.suse.com/security/cve/CVE-2022-50532.html
* https://www.suse.com/security/cve/CVE-2022-50534.html
* https://www.suse.com/security/cve/CVE-2022-50535.html
* https://www.suse.com/security/cve/CVE-2022-50537.html
* https://www.suse.com/security/cve/CVE-2022-50541.html
* https://www.suse.com/security/cve/CVE-2022-50542.html
* https://www.suse.com/security/cve/CVE-2022-50543.html
* https://www.suse.com/security/cve/CVE-2022-50544.html
* https://www.suse.com/security/cve/CVE-2022-50545.html
* https://www.suse.com/security/cve/CVE-2022-50546.html
* https://www.suse.com/security/cve/CVE-2022-50549.html
* https://www.suse.com/security/cve/CVE-2022-50551.html
* https://www.suse.com/security/cve/CVE-2022-50553.html
* https://www.suse.com/security/cve/CVE-2022-50556.html
* https://www.suse.com/security/cve/CVE-2022-50559.html
* https://www.suse.com/security/cve/CVE-2022-50560.html
* https://www.suse.com/security/cve/CVE-2022-50561.html
* https://www.suse.com/security/cve/CVE-2022-50562.html
* https://www.suse.com/security/cve/CVE-2022-50563.html
* https://www.suse.com/security/cve/CVE-2022-50564.html
* https://www.suse.com/security/cve/CVE-2022-50566.html
* https://www.suse.com/security/cve/CVE-2022-50567.html
* https://www.suse.com/security/cve/CVE-2022-50568.html
* https://www.suse.com/security/cve/CVE-2022-50570.html
* https://www.suse.com/security/cve/CVE-2022-50572.html
* https://www.suse.com/security/cve/CVE-2022-50574.html
* https://www.suse.com/security/cve/CVE-2022-50575.html
* https://www.suse.com/security/cve/CVE-2022-50576.html
* https://www.suse.com/security/cve/CVE-2022-50577.html
* https://www.suse.com/security/cve/CVE-2022-50578.html
* https://www.suse.com/security/cve/CVE-2022-50579.html
* https://www.suse.com/security/cve/CVE-2022-50580.html
* https://www.suse.com/security/cve/CVE-2022-50581.html
* https://www.suse.com/security/cve/CVE-2022-50582.html
* https://www.suse.com/security/cve/CVE-2023-52923.html
* https://www.suse.com/security/cve/CVE-2023-53365.html
* https://www.suse.com/security/cve/CVE-2023-53500.html
* https://www.suse.com/security/cve/CVE-2023-53533.html
* https://www.suse.com/security/cve/CVE-2023-53534.html
* https://www.suse.com/security/cve/CVE-2023-53539.html
* https://www.suse.com/security/cve/CVE-2023-53541.html
* https://www.suse.com/security/cve/CVE-2023-53542.html
* https://www.suse.com/security/cve/CVE-2023-53546.html
* https://www.suse.com/security/cve/CVE-2023-53547.html
* https://www.suse.com/security/cve/CVE-2023-53548.html
* https://www.suse.com/security/cve/CVE-2023-53551.html
* https://www.suse.com/security/cve/CVE-2023-53552.html
* https://www.suse.com/security/cve/CVE-2023-53553.html
* https://www.suse.com/security/cve/CVE-2023-53554.html
* https://www.suse.com/security/cve/CVE-2023-53556.html
* https://www.suse.com/security/cve/CVE-2023-53557.html
* https://www.suse.com/security/cve/CVE-2023-53559.html
* https://www.suse.com/security/cve/CVE-2023-53560.html
* https://www.suse.com/security/cve/CVE-2023-53562.html
* https://www.suse.com/security/cve/CVE-2023-53564.html
* https://www.suse.com/security/cve/CVE-2023-53566.html
* https://www.suse.com/security/cve/CVE-2023-53567.html
* https://www.suse.com/security/cve/CVE-2023-53568.html
* https://www.suse.com/security/cve/CVE-2023-53571.html
* https://www.suse.com/security/cve/CVE-2023-53572.html
* https://www.suse.com/security/cve/CVE-2023-53574.html
* https://www.suse.com/security/cve/CVE-2023-53578.html
* https://www.suse.com/security/cve/CVE-2023-53579.html
* https://www.suse.com/security/cve/CVE-2023-53580.html
* https://www.suse.com/security/cve/CVE-2023-53581.html
* https://www.suse.com/security/cve/CVE-2023-53582.html
* https://www.suse.com/security/cve/CVE-2023-53587.html
* https://www.suse.com/security/cve/CVE-2023-53589.html
* https://www.suse.com/security/cve/CVE-2023-53591.html
* https://www.suse.com/security/cve/CVE-2023-53592.html
* https://www.suse.com/security/cve/CVE-2023-53594.html
* https://www.suse.com/security/cve/CVE-2023-53597.html
* https://www.suse.com/security/cve/CVE-2023-53598.html
* https://www.suse.com/security/cve/CVE-2023-53601.html
* https://www.suse.com/security/cve/CVE-2023-53603.html
* https://www.suse.com/security/cve/CVE-2023-53604.html
* https://www.suse.com/security/cve/CVE-2023-53605.html
* https://www.suse.com/security/cve/CVE-2023-53607.html
* https://www.suse.com/security/cve/CVE-2023-53608.html
* https://www.suse.com/security/cve/CVE-2023-53611.html
* https://www.suse.com/security/cve/CVE-2023-53612.html
* https://www.suse.com/security/cve/CVE-2023-53615.html
* https://www.suse.com/security/cve/CVE-2023-53616.html
* https://www.suse.com/security/cve/CVE-2023-53617.html
* https://www.suse.com/security/cve/CVE-2023-53619.html
* https://www.suse.com/security/cve/CVE-2023-53622.html
* https://www.suse.com/security/cve/CVE-2023-53625.html
* https://www.suse.com/security/cve/CVE-2023-53626.html
* https://www.suse.com/security/cve/CVE-2023-53631.html
* https://www.suse.com/security/cve/CVE-2023-53637.html
* https://www.suse.com/security/cve/CVE-2023-53639.html
* https://www.suse.com/security/cve/CVE-2023-53640.html
* https://www.suse.com/security/cve/CVE-2023-53641.html
* https://www.suse.com/security/cve/CVE-2023-53644.html
* https://www.suse.com/security/cve/CVE-2023-53648.html
* https://www.suse.com/security/cve/CVE-2023-53650.html
* https://www.suse.com/security/cve/CVE-2023-53651.html
* https://www.suse.com/security/cve/CVE-2023-53658.html
* https://www.suse.com/security/cve/CVE-2023-53659.html
* https://www.suse.com/security/cve/CVE-2023-53662.html
* https://www.suse.com/security/cve/CVE-2023-53667.html
* https://www.suse.com/security/cve/CVE-2023-53668.html
* https://www.suse.com/security/cve/CVE-2023-53670.html
* https://www.suse.com/security/cve/CVE-2023-53673.html
* https://www.suse.com/security/cve/CVE-2023-53674.html
* https://www.suse.com/security/cve/CVE-2023-53675.html
* https://www.suse.com/security/cve/CVE-2023-53679.html
* https://www.suse.com/security/cve/CVE-2023-53680.html
* https://www.suse.com/security/cve/CVE-2023-53681.html
* https://www.suse.com/security/cve/CVE-2023-53683.html
* https://www.suse.com/security/cve/CVE-2023-53687.html
* https://www.suse.com/security/cve/CVE-2023-53692.html
* https://www.suse.com/security/cve/CVE-2023-53693.html
* https://www.suse.com/security/cve/CVE-2023-53695.html
* https://www.suse.com/security/cve/CVE-2023-53696.html
* https://www.suse.com/security/cve/CVE-2023-53697.html
* https://www.suse.com/security/cve/CVE-2023-53700.html
* https://www.suse.com/security/cve/CVE-2023-53704.html
* https://www.suse.com/security/cve/CVE-2023-53705.html
* https://www.suse.com/security/cve/CVE-2023-53707.html
* https://www.suse.com/security/cve/CVE-2023-53708.html
* https://www.suse.com/security/cve/CVE-2023-53709.html
* https://www.suse.com/security/cve/CVE-2023-53711.html
* https://www.suse.com/security/cve/CVE-2023-53715.html
* https://www.suse.com/security/cve/CVE-2023-53716.html
* https://www.suse.com/security/cve/CVE-2023-53717.html
* https://www.suse.com/security/cve/CVE-2023-53718.html
* https://www.suse.com/security/cve/CVE-2023-53719.html
* https://www.suse.com/security/cve/CVE-2023-53722.html
* https://www.suse.com/security/cve/CVE-2023-53723.html
* https://www.suse.com/security/cve/CVE-2023-53724.html
* https://www.suse.com/security/cve/CVE-2023-53725.html
* https://www.suse.com/security/cve/CVE-2023-53726.html
* https://www.suse.com/security/cve/CVE-2023-53730.html
* https://www.suse.com/security/cve/CVE-2023-7324.html
* https://www.suse.com/security/cve/CVE-2025-37885.html
* https://www.suse.com/security/cve/CVE-2025-38084.html
* https://www.suse.com/security/cve/CVE-2025-38085.html
* https://www.suse.com/security/cve/CVE-2025-38476.html
* https://www.suse.com/security/cve/CVE-2025-39742.html
* https://www.suse.com/security/cve/CVE-2025-39797.html
* https://www.suse.com/security/cve/CVE-2025-39945.html
* https://www.suse.com/security/cve/CVE-2025-39965.html
* https://www.suse.com/security/cve/CVE-2025-39967.html
* https://www.suse.com/security/cve/CVE-2025-39968.html
* https://www.suse.com/security/cve/CVE-2025-39973.html
* https://www.suse.com/security/cve/CVE-2025-39978.html
* https://www.suse.com/security/cve/CVE-2025-39981.html
* https://www.suse.com/security/cve/CVE-2025-40018.html
* https://www.suse.com/security/cve/CVE-2025-40044.html
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1205128
* https://bugzilla.suse.com/show_bug.cgi?id=1206843
* https://bugzilla.suse.com/show_bug.cgi?id=1206893
* https://bugzilla.suse.com/show_bug.cgi?id=1207612
* https://bugzilla.suse.com/show_bug.cgi?id=1207619
* https://bugzilla.suse.com/show_bug.cgi?id=1210763
* https://bugzilla.suse.com/show_bug.cgi?id=1211162
* https://bugzilla.suse.com/show_bug.cgi?id=1211692
* https://bugzilla.suse.com/show_bug.cgi?id=1213098
* https://bugzilla.suse.com/show_bug.cgi?id=1213114
* https://bugzilla.suse.com/show_bug.cgi?id=1213747
* https://bugzilla.suse.com/show_bug.cgi?id=1214754
* https://bugzilla.suse.com/show_bug.cgi?id=1214954
* https://bugzilla.suse.com/show_bug.cgi?id=1214992
* https://bugzilla.suse.com/show_bug.cgi?id=1215148
* https://bugzilla.suse.com/show_bug.cgi?id=1217366
* https://bugzilla.suse.com/show_bug.cgi?id=1236104
* https://bugzilla.suse.com/show_bug.cgi?id=1242960
* https://bugzilla.suse.com/show_bug.cgi?id=1245498
* https://bugzilla.suse.com/show_bug.cgi?id=1245499
* https://bugzilla.suse.com/show_bug.cgi?id=1246211
* https://bugzilla.suse.com/show_bug.cgi?id=1247317
* https://bugzilla.suse.com/show_bug.cgi?id=1248754
* https://bugzilla.suse.com/show_bug.cgi?id=1249479
* https://bugzilla.suse.com/show_bug.cgi?id=1249608
* https://bugzilla.suse.com/show_bug.cgi?id=1249857
* https://bugzilla.suse.com/show_bug.cgi?id=1249859
* https://bugzilla.suse.com/show_bug.cgi?id=1249988
* https://bugzilla.suse.com/show_bug.cgi?id=1250237
* https://bugzilla.suse.com/show_bug.cgi?id=1250742
* https://bugzilla.suse.com/show_bug.cgi?id=1250816
* https://bugzilla.suse.com/show_bug.cgi?id=1250946
* https://bugzilla.suse.com/show_bug.cgi?id=1251027
* https://bugzilla.suse.com/show_bug.cgi?id=1251032
* https://bugzilla.suse.com/show_bug.cgi?id=1251034
* https://bugzilla.suse.com/show_bug.cgi?id=1251035
* https://bugzilla.suse.com/show_bug.cgi?id=1251037
* https://bugzilla.suse.com/show_bug.cgi?id=1251040
* https://bugzilla.suse.com/show_bug.cgi?id=1251043
* https://bugzilla.suse.com/show_bug.cgi?id=1251045
* https://bugzilla.suse.com/show_bug.cgi?id=1251046
* https://bugzilla.suse.com/show_bug.cgi?id=1251047
* https://bugzilla.suse.com/show_bug.cgi?id=1251052
* https://bugzilla.suse.com/show_bug.cgi?id=1251054
* https://bugzilla.suse.com/show_bug.cgi?id=1251057
* https://bugzilla.suse.com/show_bug.cgi?id=1251059
* https://bugzilla.suse.com/show_bug.cgi?id=1251060
* https://bugzilla.suse.com/show_bug.cgi?id=1251061
* https://bugzilla.suse.com/show_bug.cgi?id=1251063
* https://bugzilla.suse.com/show_bug.cgi?id=1251065
* https://bugzilla.suse.com/show_bug.cgi?id=1251066
* https://bugzilla.suse.com/show_bug.cgi?id=1251068
* https://bugzilla.suse.com/show_bug.cgi?id=1251072
* https://bugzilla.suse.com/show_bug.cgi?id=1251079
* https://bugzilla.suse.com/show_bug.cgi?id=1251080
* https://bugzilla.suse.com/show_bug.cgi?id=1251082
* https://bugzilla.suse.com/show_bug.cgi?id=1251086
* https://bugzilla.suse.com/show_bug.cgi?id=1251087
* https://bugzilla.suse.com/show_bug.cgi?id=1251088
* https://bugzilla.suse.com/show_bug.cgi?id=1251091
* https://bugzilla.suse.com/show_bug.cgi?id=1251092
* https://bugzilla.suse.com/show_bug.cgi?id=1251093
* https://bugzilla.suse.com/show_bug.cgi?id=1251097
* https://bugzilla.suse.com/show_bug.cgi?id=1251099
* https://bugzilla.suse.com/show_bug.cgi?id=1251101
* https://bugzilla.suse.com/show_bug.cgi?id=1251104
* https://bugzilla.suse.com/show_bug.cgi?id=1251105
* https://bugzilla.suse.com/show_bug.cgi?id=1251106
* https://bugzilla.suse.com/show_bug.cgi?id=1251110
* https://bugzilla.suse.com/show_bug.cgi?id=1251113
* https://bugzilla.suse.com/show_bug.cgi?id=1251115
* https://bugzilla.suse.com/show_bug.cgi?id=1251123
* https://bugzilla.suse.com/show_bug.cgi?id=1251128
* https://bugzilla.suse.com/show_bug.cgi?id=1251129
* https://bugzilla.suse.com/show_bug.cgi?id=1251133
* https://bugzilla.suse.com/show_bug.cgi?id=1251136
* https://bugzilla.suse.com/show_bug.cgi?id=1251147
* https://bugzilla.suse.com/show_bug.cgi?id=1251149
* https://bugzilla.suse.com/show_bug.cgi?id=1251153
* https://bugzilla.suse.com/show_bug.cgi?id=1251154
* https://bugzilla.suse.com/show_bug.cgi?id=1251159
* https://bugzilla.suse.com/show_bug.cgi?id=1251162
* https://bugzilla.suse.com/show_bug.cgi?id=1251164
* https://bugzilla.suse.com/show_bug.cgi?id=1251166
* https://bugzilla.suse.com/show_bug.cgi?id=1251167
* https://bugzilla.suse.com/show_bug.cgi?id=1251169
* https://bugzilla.suse.com/show_bug.cgi?id=1251170
* https://bugzilla.suse.com/show_bug.cgi?id=1251173
* https://bugzilla.suse.com/show_bug.cgi?id=1251174
* https://bugzilla.suse.com/show_bug.cgi?id=1251178
* https://bugzilla.suse.com/show_bug.cgi?id=1251180
* https://bugzilla.suse.com/show_bug.cgi?id=1251182
* https://bugzilla.suse.com/show_bug.cgi?id=1251197
* https://bugzilla.suse.com/show_bug.cgi?id=1251200
* https://bugzilla.suse.com/show_bug.cgi?id=1251201
* https://bugzilla.suse.com/show_bug.cgi?id=1251202
* https://bugzilla.suse.com/show_bug.cgi?id=1251208
* https://bugzilla.suse.com/show_bug.cgi?id=1251210
* https://bugzilla.suse.com/show_bug.cgi?id=1251215
* https://bugzilla.suse.com/show_bug.cgi?id=1251218
* https://bugzilla.suse.com/show_bug.cgi?id=1251221
* https://bugzilla.suse.com/show_bug.cgi?id=1251222
* https://bugzilla.suse.com/show_bug.cgi?id=1251223
* https://bugzilla.suse.com/show_bug.cgi?id=1251230
* https://bugzilla.suse.com/show_bug.cgi?id=1251247
* https://bugzilla.suse.com/show_bug.cgi?id=1251268
* https://bugzilla.suse.com/show_bug.cgi?id=1251281
* https://bugzilla.suse.com/show_bug.cgi?id=1251282
* https://bugzilla.suse.com/show_bug.cgi?id=1251283
* https://bugzilla.suse.com/show_bug.cgi?id=1251284
* https://bugzilla.suse.com/show_bug.cgi?id=1251285
* https://bugzilla.suse.com/show_bug.cgi?id=1251286
* https://bugzilla.suse.com/show_bug.cgi?id=1251292
* https://bugzilla.suse.com/show_bug.cgi?id=1251294
* https://bugzilla.suse.com/show_bug.cgi?id=1251295
* https://bugzilla.suse.com/show_bug.cgi?id=1251296
* https://bugzilla.suse.com/show_bug.cgi?id=1251298
* https://bugzilla.suse.com/show_bug.cgi?id=1251299
* https://bugzilla.suse.com/show_bug.cgi?id=1251300
* https://bugzilla.suse.com/show_bug.cgi?id=1251301
* https://bugzilla.suse.com/show_bug.cgi?id=1251302
* https://bugzilla.suse.com/show_bug.cgi?id=1251303
* https://bugzilla.suse.com/show_bug.cgi?id=1251306
* https://bugzilla.suse.com/show_bug.cgi?id=1251307
* https://bugzilla.suse.com/show_bug.cgi?id=1251310
* https://bugzilla.suse.com/show_bug.cgi?id=1251312
* https://bugzilla.suse.com/show_bug.cgi?id=1251315
* https://bugzilla.suse.com/show_bug.cgi?id=1251322
* https://bugzilla.suse.com/show_bug.cgi?id=1251324
* https://bugzilla.suse.com/show_bug.cgi?id=1251325
* https://bugzilla.suse.com/show_bug.cgi?id=1251326
* https://bugzilla.suse.com/show_bug.cgi?id=1251327
* https://bugzilla.suse.com/show_bug.cgi?id=1251329
* https://bugzilla.suse.com/show_bug.cgi?id=1251330
* https://bugzilla.suse.com/show_bug.cgi?id=1251331
* https://bugzilla.suse.com/show_bug.cgi?id=1251519
* https://bugzilla.suse.com/show_bug.cgi?id=1251521
* https://bugzilla.suse.com/show_bug.cgi?id=1251522
* https://bugzilla.suse.com/show_bug.cgi?id=1251527
* https://bugzilla.suse.com/show_bug.cgi?id=1251529
* https://bugzilla.suse.com/show_bug.cgi?id=1251550
* https://bugzilla.suse.com/show_bug.cgi?id=1251723
* https://bugzilla.suse.com/show_bug.cgi?id=1251725
* https://bugzilla.suse.com/show_bug.cgi?id=1251728
* https://bugzilla.suse.com/show_bug.cgi?id=1251730
* https://bugzilla.suse.com/show_bug.cgi?id=1251736
* https://bugzilla.suse.com/show_bug.cgi?id=1251737
* https://bugzilla.suse.com/show_bug.cgi?id=1251738
* https://bugzilla.suse.com/show_bug.cgi?id=1251741
* https://bugzilla.suse.com/show_bug.cgi?id=1251743
* https://bugzilla.suse.com/show_bug.cgi?id=1251750
* https://bugzilla.suse.com/show_bug.cgi?id=1251753
* https://bugzilla.suse.com/show_bug.cgi?id=1251759
* https://bugzilla.suse.com/show_bug.cgi?id=1251761
* https://bugzilla.suse.com/show_bug.cgi?id=1251762
* https://bugzilla.suse.com/show_bug.cgi?id=1251763
* https://bugzilla.suse.com/show_bug.cgi?id=1251764
* https://bugzilla.suse.com/show_bug.cgi?id=1251767
* https://bugzilla.suse.com/show_bug.cgi?id=1251769
* https://bugzilla.suse.com/show_bug.cgi?id=1251772
* https://bugzilla.suse.com/show_bug.cgi?id=1251775
* https://bugzilla.suse.com/show_bug.cgi?id=1251777
* https://bugzilla.suse.com/show_bug.cgi?id=1251785
* https://bugzilla.suse.com/show_bug.cgi?id=1251823
* https://bugzilla.suse.com/show_bug.cgi?id=1251930
* https://bugzilla.suse.com/show_bug.cgi?id=1251967
* https://bugzilla.suse.com/show_bug.cgi?id=1252033
* https://bugzilla.suse.com/show_bug.cgi?id=1252035
* https://bugzilla.suse.com/show_bug.cgi?id=1252047
* https://bugzilla.suse.com/show_bug.cgi?id=1252060
* https://bugzilla.suse.com/show_bug.cgi?id=1252069
* https://bugzilla.suse.com/show_bug.cgi?id=1252265
* https://bugzilla.suse.com/show_bug.cgi?id=1252473
* https://bugzilla.suse.com/show_bug.cgi?id=1252474
* https://bugzilla.suse.com/show_bug.cgi?id=1252475
* https://bugzilla.suse.com/show_bug.cgi?id=1252476
* https://bugzilla.suse.com/show_bug.cgi?id=1252480
* https://bugzilla.suse.com/show_bug.cgi?id=1252484
* https://bugzilla.suse.com/show_bug.cgi?id=1252486
* https://bugzilla.suse.com/show_bug.cgi?id=1252489
* https://bugzilla.suse.com/show_bug.cgi?id=1252490
* https://bugzilla.suse.com/show_bug.cgi?id=1252492
* https://bugzilla.suse.com/show_bug.cgi?id=1252494
* https://bugzilla.suse.com/show_bug.cgi?id=1252495
* https://bugzilla.suse.com/show_bug.cgi?id=1252497
* https://bugzilla.suse.com/show_bug.cgi?id=1252499
* https://bugzilla.suse.com/show_bug.cgi?id=1252501
* https://bugzilla.suse.com/show_bug.cgi?id=1252508
* https://bugzilla.suse.com/show_bug.cgi?id=1252509
* https://bugzilla.suse.com/show_bug.cgi?id=1252513
* https://bugzilla.suse.com/show_bug.cgi?id=1252515
* https://bugzilla.suse.com/show_bug.cgi?id=1252516
* https://bugzilla.suse.com/show_bug.cgi?id=1252519
* https://bugzilla.suse.com/show_bug.cgi?id=1252521
* https://bugzilla.suse.com/show_bug.cgi?id=1252522
* https://bugzilla.suse.com/show_bug.cgi?id=1252523
* https://bugzilla.suse.com/show_bug.cgi?id=1252526
* https://bugzilla.suse.com/show_bug.cgi?id=1252528
* https://bugzilla.suse.com/show_bug.cgi?id=1252529
* https://bugzilla.suse.com/show_bug.cgi?id=1252532
* https://bugzilla.suse.com/show_bug.cgi?id=1252534
* https://bugzilla.suse.com/show_bug.cgi?id=1252535
* https://bugzilla.suse.com/show_bug.cgi?id=1252536
* https://bugzilla.suse.com/show_bug.cgi?id=1252537
* https://bugzilla.suse.com/show_bug.cgi?id=1252538
* https://bugzilla.suse.com/show_bug.cgi?id=1252539
* https://bugzilla.suse.com/show_bug.cgi?id=1252542
* https://bugzilla.suse.com/show_bug.cgi?id=1252545
* https://bugzilla.suse.com/show_bug.cgi?id=1252549
* https://bugzilla.suse.com/show_bug.cgi?id=1252554
* https://bugzilla.suse.com/show_bug.cgi?id=1252560
* https://bugzilla.suse.com/show_bug.cgi?id=1252564
* https://bugzilla.suse.com/show_bug.cgi?id=1252565
* https://bugzilla.suse.com/show_bug.cgi?id=1252568
* https://bugzilla.suse.com/show_bug.cgi?id=1252632
* https://bugzilla.suse.com/show_bug.cgi?id=1252634
* https://bugzilla.suse.com/show_bug.cgi?id=1252688
* https://bugzilla.suse.com/show_bug.cgi?id=1252785
* https://bugzilla.suse.com/show_bug.cgi?id=1252893
* https://jira.suse.com/browse/PED-1166
* https://jira.suse.com/browse/PED-1168
* https://jira.suse.com/browse/PED-1170
* https://jira.suse.com/browse/PED-1218
* https://jira.suse.com/browse/PED-1220
* https://jira.suse.com/browse/PED-1222
* https://jira.suse.com/browse/PED-1223
* https://jira.suse.com/browse/PED-1225
* https://jira.suse.com/browse/PED-1549
* https://jira.suse.com/browse/PED-2849
* https://jira.suse.com/browse/PED-4593
* https://jira.suse.com/browse/PED-568



openSUSE-SU-2025:0460-1: moderate: Security update for python-mistralclient


openSUSE Security Update: Security update for python-mistralclient
_______________________________

Announcement ID: openSUSE-SU-2025:0460-1
Rating: moderate
References: #1254289
Cross-References: CVE-2021-4472
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________

An update that fixes one vulnerability is now available.

Description:

This update for python-mistralclient fixes the following issues:

- CVE-2021-4472: Fixed a local file inclusion which may result in
disclosure of arbitrary files content (boo#1254289)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP7:

zypper in -t patch openSUSE-2025-460=1

Package List:

- openSUSE Backports SLE-15-SP7 (noarch):

python-mistralclient-doc-4.0.1-bp157.2.3.1
python3-mistralclient-4.0.1-bp157.2.3.1

References:

https://www.suse.com/security/cve/CVE-2021-4472.html
https://bugzilla.suse.com/1254289



openSUSE-SU-2025:0461-1: moderate: Security update for python-mistralclient


openSUSE Security Update: Security update for python-mistralclient
_______________________________

Announcement ID: openSUSE-SU-2025:0461-1
Rating: moderate
References: #1254289
Cross-References: CVE-2021-4472
Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________

An update that fixes one vulnerability is now available.

Description:

This update for python-mistralclient fixes the following issues:

- CVE-2021-4472: Fixed a local file inclusion which may result in
disclosure of arbitrary files content (boo#1254289)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP6:

zypper in -t patch openSUSE-2025-461=1

Package List:

- openSUSE Backports SLE-15-SP6 (noarch):

python-mistralclient-doc-4.0.1-bp156.4.3.1
python3-mistralclient-4.0.1-bp156.4.3.1

References:

https://www.suse.com/security/cve/CVE-2021-4472.html
https://bugzilla.suse.com/1254289