SUSE 5495 Published by

SUSE Linux has been updated with several security enhancements, including critical updates for the Linux Kernel and moderate updates for chmlib-devel, go1.24, MozillaFirefox, libsoup, libxml2, libssh, and tomcat:

SUSE-SU-2025:02262-1: important: Security update for the Linux Kernel
SUSE-SU-2025:02264-1: important: Security update for the Linux Kernel
openSUSE-SU-2025:15326-1: moderate: chmlib-devel-0.40-26.1 on GA media
openSUSE-SU-2025:15329-1: moderate: go1.24-1.24.5-1.1 on GA media
openSUSE-SU-2025:15325-1: moderate: MozillaFirefox-140.0.2-1.1 on GA media
SUSE-SU-2025:02276-1: low: Security update for libsoup
SUSE-SU-2025:02275-1: important: Security update for libxml2
SUSE-SU-2025:02277-1: low: Security update for libsoup2
SUSE-SU-2025:02278-1: important: Security update for libssh
SUSE-SU-2025:02280-1: important: Security update for tomcat




SUSE-SU-2025:02262-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:02262-1
Release Date: 2025-07-09T22:24:08Z
Rating: important
References:

* bsc#1184350
* bsc#1193629
* bsc#1204569
* bsc#1204619
* bsc#1204705
* bsc#1205282
* bsc#1206051
* bsc#1206073
* bsc#1206649
* bsc#1206886
* bsc#1206887
* bsc#1208542
* bsc#1209292
* bsc#1209556
* bsc#1209684
* bsc#1210337
* bsc#1210763
* bsc#1210767
* bsc#1211465
* bsc#1213012
* bsc#1213013
* bsc#1213094
* bsc#1213096
* bsc#1213946
* bsc#1214991
* bsc#1218470
* bsc#1232649
* bsc#1234887
* bsc#1235100
* bsc#1237981
* bsc#1238032
* bsc#1240177
* bsc#1240802
* bsc#1241525
* bsc#1241526
* bsc#1241640
* bsc#1241648
* bsc#1242147
* bsc#1242150
* bsc#1242151
* bsc#1242154
* bsc#1242157
* bsc#1242158
* bsc#1242164
* bsc#1242165
* bsc#1242169
* bsc#1242215
* bsc#1242218
* bsc#1242219
* bsc#1242222
* bsc#1242226
* bsc#1242227
* bsc#1242228
* bsc#1242229
* bsc#1242230
* bsc#1242231
* bsc#1242232
* bsc#1242237
* bsc#1242239
* bsc#1242241
* bsc#1242244
* bsc#1242245
* bsc#1242248
* bsc#1242261
* bsc#1242264
* bsc#1242265
* bsc#1242270
* bsc#1242276
* bsc#1242279
* bsc#1242280
* bsc#1242281
* bsc#1242282
* bsc#1242284
* bsc#1242285
* bsc#1242289
* bsc#1242294
* bsc#1242305
* bsc#1242312
* bsc#1242320
* bsc#1242338
* bsc#1242352
* bsc#1242353
* bsc#1242355
* bsc#1242357
* bsc#1242358
* bsc#1242361
* bsc#1242365
* bsc#1242366
* bsc#1242369
* bsc#1242370
* bsc#1242371
* bsc#1242372
* bsc#1242377
* bsc#1242378
* bsc#1242380
* bsc#1242382
* bsc#1242385
* bsc#1242387
* bsc#1242389
* bsc#1242391
* bsc#1242392
* bsc#1242394
* bsc#1242398
* bsc#1242399
* bsc#1242402
* bsc#1242403
* bsc#1242409
* bsc#1242411
* bsc#1242415
* bsc#1242416
* bsc#1242421
* bsc#1242422
* bsc#1242426
* bsc#1242428
* bsc#1242440
* bsc#1242443
* bsc#1242449
* bsc#1242452
* bsc#1242453
* bsc#1242454
* bsc#1242455
* bsc#1242456
* bsc#1242458
* bsc#1242464
* bsc#1242467
* bsc#1242469
* bsc#1242473
* bsc#1242478
* bsc#1242481
* bsc#1242484
* bsc#1242489
* bsc#1242493
* bsc#1242497
* bsc#1242527
* bsc#1242542
* bsc#1242544
* bsc#1242545
* bsc#1242547
* bsc#1242548
* bsc#1242549
* bsc#1242550
* bsc#1242551
* bsc#1242558
* bsc#1242570
* bsc#1242580
* bsc#1242586
* bsc#1242589
* bsc#1242596
* bsc#1242597
* bsc#1242685
* bsc#1242686
* bsc#1242688
* bsc#1242689
* bsc#1242695
* bsc#1242716
* bsc#1242733
* bsc#1242734
* bsc#1242735
* bsc#1242736
* bsc#1242739
* bsc#1242743
* bsc#1242744
* bsc#1242745
* bsc#1242746
* bsc#1242747
* bsc#1242749
* bsc#1242752
* bsc#1242753
* bsc#1242756
* bsc#1242759
* bsc#1242762
* bsc#1242765
* bsc#1242767
* bsc#1242778
* bsc#1242779
* bsc#1242790
* bsc#1242791
* bsc#1243047
* bsc#1243133
* bsc#1243649
* bsc#1243660
* bsc#1243737
* bsc#1243919
* jsc#SLE-24682

Cross-References:

* CVE-2022-3564
* CVE-2022-3619
* CVE-2022-3640
* CVE-2022-49110
* CVE-2022-49139
* CVE-2022-49767
* CVE-2022-49769
* CVE-2022-49770
* CVE-2022-49771
* CVE-2022-49772
* CVE-2022-49775
* CVE-2022-49776
* CVE-2022-49777
* CVE-2022-49779
* CVE-2022-49783
* CVE-2022-49787
* CVE-2022-49788
* CVE-2022-49789
* CVE-2022-49790
* CVE-2022-49792
* CVE-2022-49793
* CVE-2022-49794
* CVE-2022-49796
* CVE-2022-49797
* CVE-2022-49799
* CVE-2022-49800
* CVE-2022-49801
* CVE-2022-49802
* CVE-2022-49807
* CVE-2022-49809
* CVE-2022-49810
* CVE-2022-49812
* CVE-2022-49813
* CVE-2022-49818
* CVE-2022-49821
* CVE-2022-49822
* CVE-2022-49823
* CVE-2022-49824
* CVE-2022-49825
* CVE-2022-49826
* CVE-2022-49827
* CVE-2022-49830
* CVE-2022-49832
* CVE-2022-49834
* CVE-2022-49835
* CVE-2022-49836
* CVE-2022-49839
* CVE-2022-49841
* CVE-2022-49842
* CVE-2022-49845
* CVE-2022-49846
* CVE-2022-49850
* CVE-2022-49853
* CVE-2022-49858
* CVE-2022-49860
* CVE-2022-49861
* CVE-2022-49863
* CVE-2022-49864
* CVE-2022-49865
* CVE-2022-49868
* CVE-2022-49869
* CVE-2022-49870
* CVE-2022-49871
* CVE-2022-49874
* CVE-2022-49879
* CVE-2022-49880
* CVE-2022-49881
* CVE-2022-49885
* CVE-2022-49887
* CVE-2022-49888
* CVE-2022-49889
* CVE-2022-49890
* CVE-2022-49891
* CVE-2022-49892
* CVE-2022-49900
* CVE-2022-49905
* CVE-2022-49906
* CVE-2022-49908
* CVE-2022-49909
* CVE-2022-49910
* CVE-2022-49915
* CVE-2022-49916
* CVE-2022-49922
* CVE-2022-49923
* CVE-2022-49924
* CVE-2022-49925
* CVE-2022-49927
* CVE-2022-49928
* CVE-2022-49931
* CVE-2023-1990
* CVE-2023-53035
* CVE-2023-53038
* CVE-2023-53039
* CVE-2023-53040
* CVE-2023-53041
* CVE-2023-53044
* CVE-2023-53045
* CVE-2023-53049
* CVE-2023-53051
* CVE-2023-53052
* CVE-2023-53054
* CVE-2023-53056
* CVE-2023-53058
* CVE-2023-53059
* CVE-2023-53060
* CVE-2023-53062
* CVE-2023-53064
* CVE-2023-53065
* CVE-2023-53066
* CVE-2023-53068
* CVE-2023-53075
* CVE-2023-53077
* CVE-2023-53078
* CVE-2023-53079
* CVE-2023-53081
* CVE-2023-53084
* CVE-2023-53087
* CVE-2023-53089
* CVE-2023-53090
* CVE-2023-53091
* CVE-2023-53092
* CVE-2023-53093
* CVE-2023-53096
* CVE-2023-53098
* CVE-2023-53099
* CVE-2023-53100
* CVE-2023-53101
* CVE-2023-53106
* CVE-2023-53108
* CVE-2023-53111
* CVE-2023-53114
* CVE-2023-53116
* CVE-2023-53118
* CVE-2023-53119
* CVE-2023-53123
* CVE-2023-53124
* CVE-2023-53125
* CVE-2023-53131
* CVE-2023-53134
* CVE-2023-53137
* CVE-2023-53139
* CVE-2023-53140
* CVE-2023-53142
* CVE-2023-53143
* CVE-2023-53145
* CVE-2024-53168
* CVE-2024-56558
* CVE-2025-21888
* CVE-2025-21999
* CVE-2025-22056
* CVE-2025-22060
* CVE-2025-23138
* CVE-2025-23145
* CVE-2025-37785
* CVE-2025-37789
* CVE-2025-37948
* CVE-2025-37963

CVSS scores:

* CVE-2022-3564 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-3564 ( NVD ): 5.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-3619 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-3619 ( NVD ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-3640 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2022-3640 ( NVD ): 5.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-49110 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49139 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49772 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49775 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49775 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-49776 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49776 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49777 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49779 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49779 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49783 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49783 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49787 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49787 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49788 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49788 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49789 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49789 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49790 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49790 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-49792 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2022-49792 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2022-49793 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49793 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49794 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49796 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49797 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49801 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49802 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49807 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49809 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49810 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49812 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49812 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49813 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49818 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49818 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-49821 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49821 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49822 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49822 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49823 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49823 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49824 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49824 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49825 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49825 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49826 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49827 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49830 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49830 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49832 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49832 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49834 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49834 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49835 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49836 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49839 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49839 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49841 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49842 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49842 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49845 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49845 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49846 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49846 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49850 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49850 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49853 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49863 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49864 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49868 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49869 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49869 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49869 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49874 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49879 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49880 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49880 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-49880 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49885 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49887 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49887 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49887 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49888 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49908 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49908 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49924 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49928 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-1990 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1990 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-1990 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53035 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-53035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-53038 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-53038 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-53039 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53039 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53040 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-53040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-53041 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53041 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53052 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53052 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53068 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53077 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53077 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-53078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53089 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53089 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53090 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53091 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53098 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53100 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53100 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53101 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2023-53101 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2023-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53124 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53145 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53145 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53168 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56558 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56558 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21999 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21999 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-22056 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22056 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-22060 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23138 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-23138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23145 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37785 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37785 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-37785 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-37789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37948 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-37963 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37963 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Availability Extension 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves 157 vulnerabilities, contains one feature and has 26
security fixes can now be installed.

## Description:

This update provides the initial livepatch for this kernel update. This update
does not contain any fixes and will be updated with livepatches later.

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-2262=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-2262=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-2262=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-2262=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-2262=1

* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-2262=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.

* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2025-2262=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2262=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2262=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2262=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2262=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-2262=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2025-2262=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-2262=1

## Package List:

* openSUSE Leap 15.4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.167.1
* openSUSE Leap 15.4 (noarch)
* kernel-source-5.14.21-150400.24.167.1
* kernel-source-vanilla-5.14.21-150400.24.167.1
* kernel-docs-html-5.14.21-150400.24.167.1
* kernel-macros-5.14.21-150400.24.167.1
* kernel-devel-5.14.21-150400.24.167.1
* openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-debugsource-5.14.21-150400.24.167.1
* kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.167.1
* kernel-kvmsmall-devel-5.14.21-150400.24.167.1
* kernel-default-base-5.14.21-150400.24.167.1.150400.24.84.1
* kernel-default-base-rebuild-5.14.21-150400.24.167.1.150400.24.84.1
* kernel-kvmsmall-debuginfo-5.14.21-150400.24.167.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* kernel-obs-build-5.14.21-150400.24.167.1
* dlm-kmp-default-5.14.21-150400.24.167.1
* kernel-default-optional-5.14.21-150400.24.167.1
* kernel-syms-5.14.21-150400.24.167.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.167.1
* cluster-md-kmp-default-5.14.21-150400.24.167.1
* reiserfs-kmp-default-5.14.21-150400.24.167.1
* kernel-default-debuginfo-5.14.21-150400.24.167.1
* ocfs2-kmp-default-5.14.21-150400.24.167.1
* kernel-default-optional-debuginfo-5.14.21-150400.24.167.1
* kernel-default-extra-5.14.21-150400.24.167.1
* kernel-default-livepatch-5.14.21-150400.24.167.1
* kernel-default-devel-5.14.21-150400.24.167.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.167.1
* kernel-default-extra-debuginfo-5.14.21-150400.24.167.1
* gfs2-kmp-default-5.14.21-150400.24.167.1
* kernel-obs-qa-5.14.21-150400.24.167.1
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.167.1
* kernel-obs-build-debugsource-5.14.21-150400.24.167.1
* kselftests-kmp-default-5.14.21-150400.24.167.1
* kselftests-kmp-default-debuginfo-5.14.21-150400.24.167.1
* kernel-default-debugsource-5.14.21-150400.24.167.1
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.167.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.167.1
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.167.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150400.24.167.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_41-debugsource-1-150400.9.3.1
* kernel-default-livepatch-devel-5.14.21-150400.24.167.1
* kernel-livepatch-5_14_21-150400_24_167-default-debuginfo-1-150400.9.3.1
* kernel-livepatch-5_14_21-150400_24_167-default-1-150400.9.3.1
* openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150400.24.167.1
* openSUSE Leap 15.4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.167.1
* openSUSE Leap 15.4 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.167.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.167.1
* openSUSE Leap 15.4 (nosrc)
* dtb-aarch64-5.14.21-150400.24.167.1
* openSUSE Leap 15.4 (aarch64)
* kernel-64kb-devel-5.14.21-150400.24.167.1
* kernel-64kb-optional-5.14.21-150400.24.167.1
* dtb-mediatek-5.14.21-150400.24.167.1
* kernel-64kb-debuginfo-5.14.21-150400.24.167.1
* dtb-rockchip-5.14.21-150400.24.167.1
* kernel-64kb-extra-5.14.21-150400.24.167.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.167.1
* dtb-apm-5.14.21-150400.24.167.1
* dtb-marvell-5.14.21-150400.24.167.1
* dtb-apple-5.14.21-150400.24.167.1
* dtb-freescale-5.14.21-150400.24.167.1
* dtb-arm-5.14.21-150400.24.167.1
* kernel-64kb-extra-debuginfo-5.14.21-150400.24.167.1
* dtb-socionext-5.14.21-150400.24.167.1
* dtb-xilinx-5.14.21-150400.24.167.1
* kselftests-kmp-64kb-5.14.21-150400.24.167.1
* ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.167.1
* cluster-md-kmp-64kb-5.14.21-150400.24.167.1
* dlm-kmp-64kb-debuginfo-5.14.21-150400.24.167.1
* dtb-amazon-5.14.21-150400.24.167.1
* dtb-nvidia-5.14.21-150400.24.167.1
* dtb-broadcom-5.14.21-150400.24.167.1
* dtb-allwinner-5.14.21-150400.24.167.1
* dlm-kmp-64kb-5.14.21-150400.24.167.1
* dtb-lg-5.14.21-150400.24.167.1
* dtb-renesas-5.14.21-150400.24.167.1
* gfs2-kmp-64kb-5.14.21-150400.24.167.1
* reiserfs-kmp-64kb-5.14.21-150400.24.167.1
* dtb-amlogic-5.14.21-150400.24.167.1
* reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.167.1
* dtb-altera-5.14.21-150400.24.167.1
* dtb-amd-5.14.21-150400.24.167.1
* dtb-cavium-5.14.21-150400.24.167.1
* dtb-hisilicon-5.14.21-150400.24.167.1
* dtb-sprd-5.14.21-150400.24.167.1
* ocfs2-kmp-64kb-5.14.21-150400.24.167.1
* cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.167.1
* dtb-qcom-5.14.21-150400.24.167.1
* kernel-64kb-debugsource-5.14.21-150400.24.167.1
* kernel-64kb-optional-debuginfo-5.14.21-150400.24.167.1
* dtb-exynos-5.14.21-150400.24.167.1
* gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.167.1
* kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.167.1
* openSUSE Leap 15.4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.167.1.150400.24.84.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.167.1
* kernel-default-debuginfo-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.167.1.150400.24.84.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.167.1
* kernel-default-debuginfo-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.167.1.150400.24.84.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.167.1
* kernel-default-debuginfo-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.167.1.150400.24.84.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.167.1
* kernel-default-debuginfo-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
* kernel-default-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-default-livepatch-5.14.21-150400.24.167.1
* kernel-livepatch-SLE15-SP4_Update_41-debugsource-1-150400.9.3.1
* kernel-livepatch-5_14_21-150400_24_167-default-1-150400.9.3.1
* kernel-default-debugsource-5.14.21-150400.24.167.1
* kernel-default-livepatch-devel-5.14.21-150400.24.167.1
* kernel-default-debuginfo-5.14.21-150400.24.167.1
* kernel-livepatch-5_14_21-150400_24_167-default-debuginfo-1-150400.9.3.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.167.1
* cluster-md-kmp-default-5.14.21-150400.24.167.1
* gfs2-kmp-default-5.14.21-150400.24.167.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.167.1
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.167.1
* kernel-default-debugsource-5.14.21-150400.24.167.1
* kernel-default-debuginfo-5.14.21-150400.24.167.1
* ocfs2-kmp-default-5.14.21-150400.24.167.1
* dlm-kmp-default-5.14.21-150400.24.167.1
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.167.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
* kernel-default-5.14.21-150400.24.167.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
nosrc)
* kernel-64kb-5.14.21-150400.24.167.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* kernel-64kb-debugsource-5.14.21-150400.24.167.1
* kernel-64kb-debuginfo-5.14.21-150400.24.167.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.167.1
* kernel-64kb-devel-5.14.21-150400.24.167.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.167.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* kernel-obs-build-debugsource-5.14.21-150400.24.167.1
* kernel-default-devel-5.14.21-150400.24.167.1
* kernel-obs-build-5.14.21-150400.24.167.1
* kernel-syms-5.14.21-150400.24.167.1
* kernel-default-debugsource-5.14.21-150400.24.167.1
* reiserfs-kmp-default-5.14.21-150400.24.167.1
* kernel-default-debuginfo-5.14.21-150400.24.167.1
* kernel-default-base-5.14.21-150400.24.167.1.150400.24.84.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.167.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.167.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* kernel-source-5.14.21-150400.24.167.1
* kernel-devel-5.14.21-150400.24.167.1
* kernel-macros-5.14.21-150400.24.167.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.167.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.167.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* kernel-64kb-debugsource-5.14.21-150400.24.167.1
* kernel-64kb-debuginfo-5.14.21-150400.24.167.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.167.1
* kernel-64kb-devel-5.14.21-150400.24.167.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.167.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* kernel-obs-build-debugsource-5.14.21-150400.24.167.1
* kernel-default-devel-5.14.21-150400.24.167.1
* kernel-obs-build-5.14.21-150400.24.167.1
* kernel-syms-5.14.21-150400.24.167.1
* kernel-default-debugsource-5.14.21-150400.24.167.1
* reiserfs-kmp-default-5.14.21-150400.24.167.1
* kernel-default-debuginfo-5.14.21-150400.24.167.1
* kernel-default-base-5.14.21-150400.24.167.1.150400.24.84.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.167.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.167.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* kernel-source-5.14.21-150400.24.167.1
* kernel-devel-5.14.21-150400.24.167.1
* kernel-macros-5.14.21-150400.24.167.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64)
* kernel-64kb-debugsource-5.14.21-150400.24.167.1
* kernel-64kb-debuginfo-5.14.21-150400.24.167.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.167.1
* kernel-64kb-devel-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.167.1.150400.24.84.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* kernel-obs-build-debugsource-5.14.21-150400.24.167.1
* kernel-default-devel-5.14.21-150400.24.167.1
* kernel-obs-build-5.14.21-150400.24.167.1
* kernel-default-debugsource-5.14.21-150400.24.167.1
* reiserfs-kmp-default-5.14.21-150400.24.167.1
* kernel-default-debuginfo-5.14.21-150400.24.167.1
* kernel-syms-5.14.21-150400.24.167.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.167.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* kernel-source-5.14.21-150400.24.167.1
* kernel-devel-5.14.21-150400.24.167.1
* kernel-macros-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch nosrc)
* kernel-docs-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.167.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* kernel-obs-build-debugsource-5.14.21-150400.24.167.1
* kernel-default-devel-5.14.21-150400.24.167.1
* kernel-obs-build-5.14.21-150400.24.167.1
* kernel-syms-5.14.21-150400.24.167.1
* kernel-default-debugsource-5.14.21-150400.24.167.1
* reiserfs-kmp-default-5.14.21-150400.24.167.1
* kernel-default-debuginfo-5.14.21-150400.24.167.1
* kernel-default-base-5.14.21-150400.24.167.1.150400.24.84.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.167.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* kernel-source-5.14.21-150400.24.167.1
* kernel-devel-5.14.21-150400.24.167.1
* kernel-macros-5.14.21-150400.24.167.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.167.1
* SUSE Manager Proxy 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.167.1
* SUSE Manager Proxy 4.3 (x86_64)
* kernel-default-devel-5.14.21-150400.24.167.1
* kernel-syms-5.14.21-150400.24.167.1
* kernel-default-debugsource-5.14.21-150400.24.167.1
* kernel-default-debuginfo-5.14.21-150400.24.167.1
* kernel-default-base-5.14.21-150400.24.167.1.150400.24.84.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.167.1
* SUSE Manager Proxy 4.3 (noarch)
* kernel-source-5.14.21-150400.24.167.1
* kernel-devel-5.14.21-150400.24.167.1
* kernel-macros-5.14.21-150400.24.167.1
* SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.167.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* kernel-default-devel-5.14.21-150400.24.167.1
* kernel-default-debugsource-5.14.21-150400.24.167.1
* kernel-default-debuginfo-5.14.21-150400.24.167.1
* kernel-default-base-5.14.21-150400.24.167.1.150400.24.84.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.167.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.167.1
* kernel-macros-5.14.21-150400.24.167.1
* SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
* kernel-default-5.14.21-150400.24.167.1
* SUSE Manager Server 4.3 (ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.167.1.150400.24.84.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* kernel-default-devel-5.14.21-150400.24.167.1
* kernel-default-debugsource-5.14.21-150400.24.167.1
* kernel-default-debuginfo-5.14.21-150400.24.167.1
* kernel-syms-5.14.21-150400.24.167.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.167.1
* SUSE Manager Server 4.3 (noarch)
* kernel-source-5.14.21-150400.24.167.1
* kernel-devel-5.14.21-150400.24.167.1
* kernel-macros-5.14.21-150400.24.167.1
* SUSE Manager Server 4.3 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.167.1
* SUSE Manager Server 4.3 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.167.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.167.1

## References:

* https://www.suse.com/security/cve/CVE-2022-3564.html
* https://www.suse.com/security/cve/CVE-2022-3619.html
* https://www.suse.com/security/cve/CVE-2022-3640.html
* https://www.suse.com/security/cve/CVE-2022-49110.html
* https://www.suse.com/security/cve/CVE-2022-49139.html
* https://www.suse.com/security/cve/CVE-2022-49767.html
* https://www.suse.com/security/cve/CVE-2022-49769.html
* https://www.suse.com/security/cve/CVE-2022-49770.html
* https://www.suse.com/security/cve/CVE-2022-49771.html
* https://www.suse.com/security/cve/CVE-2022-49772.html
* https://www.suse.com/security/cve/CVE-2022-49775.html
* https://www.suse.com/security/cve/CVE-2022-49776.html
* https://www.suse.com/security/cve/CVE-2022-49777.html
* https://www.suse.com/security/cve/CVE-2022-49779.html
* https://www.suse.com/security/cve/CVE-2022-49783.html
* https://www.suse.com/security/cve/CVE-2022-49787.html
* https://www.suse.com/security/cve/CVE-2022-49788.html
* https://www.suse.com/security/cve/CVE-2022-49789.html
* https://www.suse.com/security/cve/CVE-2022-49790.html
* https://www.suse.com/security/cve/CVE-2022-49792.html
* https://www.suse.com/security/cve/CVE-2022-49793.html
* https://www.suse.com/security/cve/CVE-2022-49794.html
* https://www.suse.com/security/cve/CVE-2022-49796.html
* https://www.suse.com/security/cve/CVE-2022-49797.html
* https://www.suse.com/security/cve/CVE-2022-49799.html
* https://www.suse.com/security/cve/CVE-2022-49800.html
* https://www.suse.com/security/cve/CVE-2022-49801.html
* https://www.suse.com/security/cve/CVE-2022-49802.html
* https://www.suse.com/security/cve/CVE-2022-49807.html
* https://www.suse.com/security/cve/CVE-2022-49809.html
* https://www.suse.com/security/cve/CVE-2022-49810.html
* https://www.suse.com/security/cve/CVE-2022-49812.html
* https://www.suse.com/security/cve/CVE-2022-49813.html
* https://www.suse.com/security/cve/CVE-2022-49818.html
* https://www.suse.com/security/cve/CVE-2022-49821.html
* https://www.suse.com/security/cve/CVE-2022-49822.html
* https://www.suse.com/security/cve/CVE-2022-49823.html
* https://www.suse.com/security/cve/CVE-2022-49824.html
* https://www.suse.com/security/cve/CVE-2022-49825.html
* https://www.suse.com/security/cve/CVE-2022-49826.html
* https://www.suse.com/security/cve/CVE-2022-49827.html
* https://www.suse.com/security/cve/CVE-2022-49830.html
* https://www.suse.com/security/cve/CVE-2022-49832.html
* https://www.suse.com/security/cve/CVE-2022-49834.html
* https://www.suse.com/security/cve/CVE-2022-49835.html
* https://www.suse.com/security/cve/CVE-2022-49836.html
* https://www.suse.com/security/cve/CVE-2022-49839.html
* https://www.suse.com/security/cve/CVE-2022-49841.html
* https://www.suse.com/security/cve/CVE-2022-49842.html
* https://www.suse.com/security/cve/CVE-2022-49845.html
* https://www.suse.com/security/cve/CVE-2022-49846.html
* https://www.suse.com/security/cve/CVE-2022-49850.html
* https://www.suse.com/security/cve/CVE-2022-49853.html
* https://www.suse.com/security/cve/CVE-2022-49858.html
* https://www.suse.com/security/cve/CVE-2022-49860.html
* https://www.suse.com/security/cve/CVE-2022-49861.html
* https://www.suse.com/security/cve/CVE-2022-49863.html
* https://www.suse.com/security/cve/CVE-2022-49864.html
* https://www.suse.com/security/cve/CVE-2022-49865.html
* https://www.suse.com/security/cve/CVE-2022-49868.html
* https://www.suse.com/security/cve/CVE-2022-49869.html
* https://www.suse.com/security/cve/CVE-2022-49870.html
* https://www.suse.com/security/cve/CVE-2022-49871.html
* https://www.suse.com/security/cve/CVE-2022-49874.html
* https://www.suse.com/security/cve/CVE-2022-49879.html
* https://www.suse.com/security/cve/CVE-2022-49880.html
* https://www.suse.com/security/cve/CVE-2022-49881.html
* https://www.suse.com/security/cve/CVE-2022-49885.html
* https://www.suse.com/security/cve/CVE-2022-49887.html
* https://www.suse.com/security/cve/CVE-2022-49888.html
* https://www.suse.com/security/cve/CVE-2022-49889.html
* https://www.suse.com/security/cve/CVE-2022-49890.html
* https://www.suse.com/security/cve/CVE-2022-49891.html
* https://www.suse.com/security/cve/CVE-2022-49892.html
* https://www.suse.com/security/cve/CVE-2022-49900.html
* https://www.suse.com/security/cve/CVE-2022-49905.html
* https://www.suse.com/security/cve/CVE-2022-49906.html
* https://www.suse.com/security/cve/CVE-2022-49908.html
* https://www.suse.com/security/cve/CVE-2022-49909.html
* https://www.suse.com/security/cve/CVE-2022-49910.html
* https://www.suse.com/security/cve/CVE-2022-49915.html
* https://www.suse.com/security/cve/CVE-2022-49916.html
* https://www.suse.com/security/cve/CVE-2022-49922.html
* https://www.suse.com/security/cve/CVE-2022-49923.html
* https://www.suse.com/security/cve/CVE-2022-49924.html
* https://www.suse.com/security/cve/CVE-2022-49925.html
* https://www.suse.com/security/cve/CVE-2022-49927.html
* https://www.suse.com/security/cve/CVE-2022-49928.html
* https://www.suse.com/security/cve/CVE-2022-49931.html
* https://www.suse.com/security/cve/CVE-2023-1990.html
* https://www.suse.com/security/cve/CVE-2023-53035.html
* https://www.suse.com/security/cve/CVE-2023-53038.html
* https://www.suse.com/security/cve/CVE-2023-53039.html
* https://www.suse.com/security/cve/CVE-2023-53040.html
* https://www.suse.com/security/cve/CVE-2023-53041.html
* https://www.suse.com/security/cve/CVE-2023-53044.html
* https://www.suse.com/security/cve/CVE-2023-53045.html
* https://www.suse.com/security/cve/CVE-2023-53049.html
* https://www.suse.com/security/cve/CVE-2023-53051.html
* https://www.suse.com/security/cve/CVE-2023-53052.html
* https://www.suse.com/security/cve/CVE-2023-53054.html
* https://www.suse.com/security/cve/CVE-2023-53056.html
* https://www.suse.com/security/cve/CVE-2023-53058.html
* https://www.suse.com/security/cve/CVE-2023-53059.html
* https://www.suse.com/security/cve/CVE-2023-53060.html
* https://www.suse.com/security/cve/CVE-2023-53062.html
* https://www.suse.com/security/cve/CVE-2023-53064.html
* https://www.suse.com/security/cve/CVE-2023-53065.html
* https://www.suse.com/security/cve/CVE-2023-53066.html
* https://www.suse.com/security/cve/CVE-2023-53068.html
* https://www.suse.com/security/cve/CVE-2023-53075.html
* https://www.suse.com/security/cve/CVE-2023-53077.html
* https://www.suse.com/security/cve/CVE-2023-53078.html
* https://www.suse.com/security/cve/CVE-2023-53079.html
* https://www.suse.com/security/cve/CVE-2023-53081.html
* https://www.suse.com/security/cve/CVE-2023-53084.html
* https://www.suse.com/security/cve/CVE-2023-53087.html
* https://www.suse.com/security/cve/CVE-2023-53089.html
* https://www.suse.com/security/cve/CVE-2023-53090.html
* https://www.suse.com/security/cve/CVE-2023-53091.html
* https://www.suse.com/security/cve/CVE-2023-53092.html
* https://www.suse.com/security/cve/CVE-2023-53093.html
* https://www.suse.com/security/cve/CVE-2023-53096.html
* https://www.suse.com/security/cve/CVE-2023-53098.html
* https://www.suse.com/security/cve/CVE-2023-53099.html
* https://www.suse.com/security/cve/CVE-2023-53100.html
* https://www.suse.com/security/cve/CVE-2023-53101.html
* https://www.suse.com/security/cve/CVE-2023-53106.html
* https://www.suse.com/security/cve/CVE-2023-53108.html
* https://www.suse.com/security/cve/CVE-2023-53111.html
* https://www.suse.com/security/cve/CVE-2023-53114.html
* https://www.suse.com/security/cve/CVE-2023-53116.html
* https://www.suse.com/security/cve/CVE-2023-53118.html
* https://www.suse.com/security/cve/CVE-2023-53119.html
* https://www.suse.com/security/cve/CVE-2023-53123.html
* https://www.suse.com/security/cve/CVE-2023-53124.html
* https://www.suse.com/security/cve/CVE-2023-53125.html
* https://www.suse.com/security/cve/CVE-2023-53131.html
* https://www.suse.com/security/cve/CVE-2023-53134.html
* https://www.suse.com/security/cve/CVE-2023-53137.html
* https://www.suse.com/security/cve/CVE-2023-53139.html
* https://www.suse.com/security/cve/CVE-2023-53140.html
* https://www.suse.com/security/cve/CVE-2023-53142.html
* https://www.suse.com/security/cve/CVE-2023-53143.html
* https://www.suse.com/security/cve/CVE-2023-53145.html
* https://www.suse.com/security/cve/CVE-2024-53168.html
* https://www.suse.com/security/cve/CVE-2024-56558.html
* https://www.suse.com/security/cve/CVE-2025-21888.html
* https://www.suse.com/security/cve/CVE-2025-21999.html
* https://www.suse.com/security/cve/CVE-2025-22056.html
* https://www.suse.com/security/cve/CVE-2025-22060.html
* https://www.suse.com/security/cve/CVE-2025-23138.html
* https://www.suse.com/security/cve/CVE-2025-23145.html
* https://www.suse.com/security/cve/CVE-2025-37785.html
* https://www.suse.com/security/cve/CVE-2025-37789.html
* https://www.suse.com/security/cve/CVE-2025-37948.html
* https://www.suse.com/security/cve/CVE-2025-37963.html
* https://bugzilla.suse.com/show_bug.cgi?id=1184350
* https://bugzilla.suse.com/show_bug.cgi?id=1193629
* https://bugzilla.suse.com/show_bug.cgi?id=1204569
* https://bugzilla.suse.com/show_bug.cgi?id=1204619
* https://bugzilla.suse.com/show_bug.cgi?id=1204705
* https://bugzilla.suse.com/show_bug.cgi?id=1205282
* https://bugzilla.suse.com/show_bug.cgi?id=1206051
* https://bugzilla.suse.com/show_bug.cgi?id=1206073
* https://bugzilla.suse.com/show_bug.cgi?id=1206649
* https://bugzilla.suse.com/show_bug.cgi?id=1206886
* https://bugzilla.suse.com/show_bug.cgi?id=1206887
* https://bugzilla.suse.com/show_bug.cgi?id=1208542
* https://bugzilla.suse.com/show_bug.cgi?id=1209292
* https://bugzilla.suse.com/show_bug.cgi?id=1209556
* https://bugzilla.suse.com/show_bug.cgi?id=1209684
* https://bugzilla.suse.com/show_bug.cgi?id=1210337
* https://bugzilla.suse.com/show_bug.cgi?id=1210763
* https://bugzilla.suse.com/show_bug.cgi?id=1210767
* https://bugzilla.suse.com/show_bug.cgi?id=1211465
* https://bugzilla.suse.com/show_bug.cgi?id=1213012
* https://bugzilla.suse.com/show_bug.cgi?id=1213013
* https://bugzilla.suse.com/show_bug.cgi?id=1213094
* https://bugzilla.suse.com/show_bug.cgi?id=1213096
* https://bugzilla.suse.com/show_bug.cgi?id=1213946
* https://bugzilla.suse.com/show_bug.cgi?id=1214991
* https://bugzilla.suse.com/show_bug.cgi?id=1218470
* https://bugzilla.suse.com/show_bug.cgi?id=1232649
* https://bugzilla.suse.com/show_bug.cgi?id=1234887
* https://bugzilla.suse.com/show_bug.cgi?id=1235100
* https://bugzilla.suse.com/show_bug.cgi?id=1237981
* https://bugzilla.suse.com/show_bug.cgi?id=1238032
* https://bugzilla.suse.com/show_bug.cgi?id=1240177
* https://bugzilla.suse.com/show_bug.cgi?id=1240802
* https://bugzilla.suse.com/show_bug.cgi?id=1241525
* https://bugzilla.suse.com/show_bug.cgi?id=1241526
* https://bugzilla.suse.com/show_bug.cgi?id=1241640
* https://bugzilla.suse.com/show_bug.cgi?id=1241648
* https://bugzilla.suse.com/show_bug.cgi?id=1242147
* https://bugzilla.suse.com/show_bug.cgi?id=1242150
* https://bugzilla.suse.com/show_bug.cgi?id=1242151
* https://bugzilla.suse.com/show_bug.cgi?id=1242154
* https://bugzilla.suse.com/show_bug.cgi?id=1242157
* https://bugzilla.suse.com/show_bug.cgi?id=1242158
* https://bugzilla.suse.com/show_bug.cgi?id=1242164
* https://bugzilla.suse.com/show_bug.cgi?id=1242165
* https://bugzilla.suse.com/show_bug.cgi?id=1242169
* https://bugzilla.suse.com/show_bug.cgi?id=1242215
* https://bugzilla.suse.com/show_bug.cgi?id=1242218
* https://bugzilla.suse.com/show_bug.cgi?id=1242219
* https://bugzilla.suse.com/show_bug.cgi?id=1242222
* https://bugzilla.suse.com/show_bug.cgi?id=1242226
* https://bugzilla.suse.com/show_bug.cgi?id=1242227
* https://bugzilla.suse.com/show_bug.cgi?id=1242228
* https://bugzilla.suse.com/show_bug.cgi?id=1242229
* https://bugzilla.suse.com/show_bug.cgi?id=1242230
* https://bugzilla.suse.com/show_bug.cgi?id=1242231
* https://bugzilla.suse.com/show_bug.cgi?id=1242232
* https://bugzilla.suse.com/show_bug.cgi?id=1242237
* https://bugzilla.suse.com/show_bug.cgi?id=1242239
* https://bugzilla.suse.com/show_bug.cgi?id=1242241
* https://bugzilla.suse.com/show_bug.cgi?id=1242244
* https://bugzilla.suse.com/show_bug.cgi?id=1242245
* https://bugzilla.suse.com/show_bug.cgi?id=1242248
* https://bugzilla.suse.com/show_bug.cgi?id=1242261
* https://bugzilla.suse.com/show_bug.cgi?id=1242264
* https://bugzilla.suse.com/show_bug.cgi?id=1242265
* https://bugzilla.suse.com/show_bug.cgi?id=1242270
* https://bugzilla.suse.com/show_bug.cgi?id=1242276
* https://bugzilla.suse.com/show_bug.cgi?id=1242279
* https://bugzilla.suse.com/show_bug.cgi?id=1242280
* https://bugzilla.suse.com/show_bug.cgi?id=1242281
* https://bugzilla.suse.com/show_bug.cgi?id=1242282
* https://bugzilla.suse.com/show_bug.cgi?id=1242284
* https://bugzilla.suse.com/show_bug.cgi?id=1242285
* https://bugzilla.suse.com/show_bug.cgi?id=1242289
* https://bugzilla.suse.com/show_bug.cgi?id=1242294
* https://bugzilla.suse.com/show_bug.cgi?id=1242305
* https://bugzilla.suse.com/show_bug.cgi?id=1242312
* https://bugzilla.suse.com/show_bug.cgi?id=1242320
* https://bugzilla.suse.com/show_bug.cgi?id=1242338
* https://bugzilla.suse.com/show_bug.cgi?id=1242352
* https://bugzilla.suse.com/show_bug.cgi?id=1242353
* https://bugzilla.suse.com/show_bug.cgi?id=1242355
* https://bugzilla.suse.com/show_bug.cgi?id=1242357
* https://bugzilla.suse.com/show_bug.cgi?id=1242358
* https://bugzilla.suse.com/show_bug.cgi?id=1242361
* https://bugzilla.suse.com/show_bug.cgi?id=1242365
* https://bugzilla.suse.com/show_bug.cgi?id=1242366
* https://bugzilla.suse.com/show_bug.cgi?id=1242369
* https://bugzilla.suse.com/show_bug.cgi?id=1242370
* https://bugzilla.suse.com/show_bug.cgi?id=1242371
* https://bugzilla.suse.com/show_bug.cgi?id=1242372
* https://bugzilla.suse.com/show_bug.cgi?id=1242377
* https://bugzilla.suse.com/show_bug.cgi?id=1242378
* https://bugzilla.suse.com/show_bug.cgi?id=1242380
* https://bugzilla.suse.com/show_bug.cgi?id=1242382
* https://bugzilla.suse.com/show_bug.cgi?id=1242385
* https://bugzilla.suse.com/show_bug.cgi?id=1242387
* https://bugzilla.suse.com/show_bug.cgi?id=1242389
* https://bugzilla.suse.com/show_bug.cgi?id=1242391
* https://bugzilla.suse.com/show_bug.cgi?id=1242392
* https://bugzilla.suse.com/show_bug.cgi?id=1242394
* https://bugzilla.suse.com/show_bug.cgi?id=1242398
* https://bugzilla.suse.com/show_bug.cgi?id=1242399
* https://bugzilla.suse.com/show_bug.cgi?id=1242402
* https://bugzilla.suse.com/show_bug.cgi?id=1242403
* https://bugzilla.suse.com/show_bug.cgi?id=1242409
* https://bugzilla.suse.com/show_bug.cgi?id=1242411
* https://bugzilla.suse.com/show_bug.cgi?id=1242415
* https://bugzilla.suse.com/show_bug.cgi?id=1242416
* https://bugzilla.suse.com/show_bug.cgi?id=1242421
* https://bugzilla.suse.com/show_bug.cgi?id=1242422
* https://bugzilla.suse.com/show_bug.cgi?id=1242426
* https://bugzilla.suse.com/show_bug.cgi?id=1242428
* https://bugzilla.suse.com/show_bug.cgi?id=1242440
* https://bugzilla.suse.com/show_bug.cgi?id=1242443
* https://bugzilla.suse.com/show_bug.cgi?id=1242449
* https://bugzilla.suse.com/show_bug.cgi?id=1242452
* https://bugzilla.suse.com/show_bug.cgi?id=1242453
* https://bugzilla.suse.com/show_bug.cgi?id=1242454
* https://bugzilla.suse.com/show_bug.cgi?id=1242455
* https://bugzilla.suse.com/show_bug.cgi?id=1242456
* https://bugzilla.suse.com/show_bug.cgi?id=1242458
* https://bugzilla.suse.com/show_bug.cgi?id=1242464
* https://bugzilla.suse.com/show_bug.cgi?id=1242467
* https://bugzilla.suse.com/show_bug.cgi?id=1242469
* https://bugzilla.suse.com/show_bug.cgi?id=1242473
* https://bugzilla.suse.com/show_bug.cgi?id=1242478
* https://bugzilla.suse.com/show_bug.cgi?id=1242481
* https://bugzilla.suse.com/show_bug.cgi?id=1242484
* https://bugzilla.suse.com/show_bug.cgi?id=1242489
* https://bugzilla.suse.com/show_bug.cgi?id=1242493
* https://bugzilla.suse.com/show_bug.cgi?id=1242497
* https://bugzilla.suse.com/show_bug.cgi?id=1242527
* https://bugzilla.suse.com/show_bug.cgi?id=1242542
* https://bugzilla.suse.com/show_bug.cgi?id=1242544
* https://bugzilla.suse.com/show_bug.cgi?id=1242545
* https://bugzilla.suse.com/show_bug.cgi?id=1242547
* https://bugzilla.suse.com/show_bug.cgi?id=1242548
* https://bugzilla.suse.com/show_bug.cgi?id=1242549
* https://bugzilla.suse.com/show_bug.cgi?id=1242550
* https://bugzilla.suse.com/show_bug.cgi?id=1242551
* https://bugzilla.suse.com/show_bug.cgi?id=1242558
* https://bugzilla.suse.com/show_bug.cgi?id=1242570
* https://bugzilla.suse.com/show_bug.cgi?id=1242580
* https://bugzilla.suse.com/show_bug.cgi?id=1242586
* https://bugzilla.suse.com/show_bug.cgi?id=1242589
* https://bugzilla.suse.com/show_bug.cgi?id=1242596
* https://bugzilla.suse.com/show_bug.cgi?id=1242597
* https://bugzilla.suse.com/show_bug.cgi?id=1242685
* https://bugzilla.suse.com/show_bug.cgi?id=1242686
* https://bugzilla.suse.com/show_bug.cgi?id=1242688
* https://bugzilla.suse.com/show_bug.cgi?id=1242689
* https://bugzilla.suse.com/show_bug.cgi?id=1242695
* https://bugzilla.suse.com/show_bug.cgi?id=1242716
* https://bugzilla.suse.com/show_bug.cgi?id=1242733
* https://bugzilla.suse.com/show_bug.cgi?id=1242734
* https://bugzilla.suse.com/show_bug.cgi?id=1242735
* https://bugzilla.suse.com/show_bug.cgi?id=1242736
* https://bugzilla.suse.com/show_bug.cgi?id=1242739
* https://bugzilla.suse.com/show_bug.cgi?id=1242743
* https://bugzilla.suse.com/show_bug.cgi?id=1242744
* https://bugzilla.suse.com/show_bug.cgi?id=1242745
* https://bugzilla.suse.com/show_bug.cgi?id=1242746
* https://bugzilla.suse.com/show_bug.cgi?id=1242747
* https://bugzilla.suse.com/show_bug.cgi?id=1242749
* https://bugzilla.suse.com/show_bug.cgi?id=1242752
* https://bugzilla.suse.com/show_bug.cgi?id=1242753
* https://bugzilla.suse.com/show_bug.cgi?id=1242756
* https://bugzilla.suse.com/show_bug.cgi?id=1242759
* https://bugzilla.suse.com/show_bug.cgi?id=1242762
* https://bugzilla.suse.com/show_bug.cgi?id=1242765
* https://bugzilla.suse.com/show_bug.cgi?id=1242767
* https://bugzilla.suse.com/show_bug.cgi?id=1242778
* https://bugzilla.suse.com/show_bug.cgi?id=1242779
* https://bugzilla.suse.com/show_bug.cgi?id=1242790
* https://bugzilla.suse.com/show_bug.cgi?id=1242791
* https://bugzilla.suse.com/show_bug.cgi?id=1243047
* https://bugzilla.suse.com/show_bug.cgi?id=1243133
* https://bugzilla.suse.com/show_bug.cgi?id=1243649
* https://bugzilla.suse.com/show_bug.cgi?id=1243660
* https://bugzilla.suse.com/show_bug.cgi?id=1243737
* https://bugzilla.suse.com/show_bug.cgi?id=1243919
* https://jira.suse.com/browse/SLE-24682



SUSE-SU-2025:02264-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:02264-1
Release Date: 2025-07-10T08:25:58Z
Rating: important
References:

* bsc#1065729
* bsc#1156395
* bsc#1193629
* bsc#1194869
* bsc#1198410
* bsc#1199356
* bsc#1199487
* bsc#1201160
* bsc#1201956
* bsc#1202094
* bsc#1202095
* bsc#1202564
* bsc#1202716
* bsc#1202823
* bsc#1202860
* bsc#1203197
* bsc#1203361
* bsc#1205220
* bsc#1205514
* bsc#1205701
* bsc#1206451
* bsc#1206664
* bsc#1206878
* bsc#1206880
* bsc#1207361
* bsc#1207638
* bsc#1211226
* bsc#1212051
* bsc#1213090
* bsc#1218184
* bsc#1218234
* bsc#1218470
* bsc#1222634
* bsc#1223675
* bsc#1224095
* bsc#1224597
* bsc#1225468
* bsc#1225820
* bsc#1226514
* bsc#1226552
* bsc#1230827
* bsc#1232504
* bsc#1234156
* bsc#1234381
* bsc#1235464
* bsc#1235637
* bsc#1236821
* bsc#1236822
* bsc#1237159
* bsc#1237312
* bsc#1237313
* bsc#1238526
* bsc#1238876
* bsc#1241900
* bsc#1242221
* bsc#1242414
* bsc#1242504
* bsc#1242596
* bsc#1242778
* bsc#1242782
* bsc#1242924
* bsc#1243330
* bsc#1243543
* bsc#1243627
* bsc#1243649
* bsc#1243660
* bsc#1243832
* bsc#1244114
* bsc#1244179
* bsc#1244180
* bsc#1244234
* bsc#1244241
* bsc#1244277
* bsc#1244309
* bsc#1244337
* bsc#1244732
* bsc#1244764
* bsc#1244765
* bsc#1244767
* bsc#1244770
* bsc#1244771
* bsc#1244772
* bsc#1244773
* bsc#1244774
* bsc#1244776
* bsc#1244779
* bsc#1244780
* bsc#1244781
* bsc#1244782
* bsc#1244783
* bsc#1244784
* bsc#1244786
* bsc#1244787
* bsc#1244788
* bsc#1244790
* bsc#1244791
* bsc#1244793
* bsc#1244794
* bsc#1244796
* bsc#1244797
* bsc#1244798
* bsc#1244800
* bsc#1244802
* bsc#1244804
* bsc#1244805
* bsc#1244806
* bsc#1244807
* bsc#1244808
* bsc#1244811
* bsc#1244813
* bsc#1244814
* bsc#1244815
* bsc#1244816
* bsc#1244819
* bsc#1244820
* bsc#1244823
* bsc#1244824
* bsc#1244825
* bsc#1244826
* bsc#1244827
* bsc#1244830
* bsc#1244831
* bsc#1244832
* bsc#1244834
* bsc#1244836
* bsc#1244838
* bsc#1244839
* bsc#1244840
* bsc#1244841
* bsc#1244842
* bsc#1244843
* bsc#1244845
* bsc#1244846
* bsc#1244848
* bsc#1244849
* bsc#1244851
* bsc#1244853
* bsc#1244854
* bsc#1244856
* bsc#1244858
* bsc#1244860
* bsc#1244861
* bsc#1244866
* bsc#1244867
* bsc#1244868
* bsc#1244869
* bsc#1244870
* bsc#1244871
* bsc#1244872
* bsc#1244873
* bsc#1244875
* bsc#1244876
* bsc#1244878
* bsc#1244879
* bsc#1244881
* bsc#1244883
* bsc#1244884
* bsc#1244886
* bsc#1244887
* bsc#1244888
* bsc#1244890
* bsc#1244892
* bsc#1244893
* bsc#1244895
* bsc#1244898
* bsc#1244899
* bsc#1244900
* bsc#1244901
* bsc#1244902
* bsc#1244903
* bsc#1244904
* bsc#1244905
* bsc#1244908
* bsc#1244911
* bsc#1244912
* bsc#1244914
* bsc#1244915
* bsc#1244928
* bsc#1244936
* bsc#1244940
* bsc#1244941
* bsc#1244942
* bsc#1244943
* bsc#1244944
* bsc#1244945
* bsc#1244948
* bsc#1244949
* bsc#1244950
* bsc#1244953
* bsc#1244955
* bsc#1244956
* bsc#1244957
* bsc#1244958
* bsc#1244959
* bsc#1244960
* bsc#1244961
* bsc#1244965
* bsc#1244966
* bsc#1244967
* bsc#1244968
* bsc#1244969
* bsc#1244970
* bsc#1244973
* bsc#1244974
* bsc#1244976
* bsc#1244977
* bsc#1244978
* bsc#1244979
* bsc#1244983
* bsc#1244984
* bsc#1244985
* bsc#1244986
* bsc#1244987
* bsc#1244991
* bsc#1244992
* bsc#1244993
* bsc#1245006
* bsc#1245007
* bsc#1245009
* bsc#1245011
* bsc#1245012
* bsc#1245015
* bsc#1245018
* bsc#1245019
* bsc#1245023
* bsc#1245024
* bsc#1245028
* bsc#1245031
* bsc#1245032
* bsc#1245033
* bsc#1245038
* bsc#1245039
* bsc#1245040
* bsc#1245041
* bsc#1245047
* bsc#1245048
* bsc#1245051
* bsc#1245052
* bsc#1245057
* bsc#1245058
* bsc#1245060
* bsc#1245062
* bsc#1245063
* bsc#1245064
* bsc#1245069
* bsc#1245070
* bsc#1245072
* bsc#1245073
* bsc#1245088
* bsc#1245089
* bsc#1245092
* bsc#1245093
* bsc#1245094
* bsc#1245098
* bsc#1245103
* bsc#1245116
* bsc#1245117
* bsc#1245118
* bsc#1245119
* bsc#1245121
* bsc#1245122
* bsc#1245125
* bsc#1245129
* bsc#1245131
* bsc#1245133
* bsc#1245134
* bsc#1245135
* bsc#1245136
* bsc#1245138
* bsc#1245139
* bsc#1245140
* bsc#1245142
* bsc#1245146
* bsc#1245147
* bsc#1245149
* bsc#1245152
* bsc#1245154
* bsc#1245155
* bsc#1245180
* bsc#1245183
* bsc#1245189
* bsc#1245191
* bsc#1245195
* bsc#1245197
* bsc#1245265
* bsc#1245340
* bsc#1245348
* bsc#1245431
* bsc#1245455

Cross-References:

* CVE-2021-47557
* CVE-2021-47595
* CVE-2022-1679
* CVE-2022-2585
* CVE-2022-2586
* CVE-2022-2905
* CVE-2022-3903
* CVE-2022-4095
* CVE-2022-4662
* CVE-2022-49934
* CVE-2022-49935
* CVE-2022-49936
* CVE-2022-49937
* CVE-2022-49938
* CVE-2022-49940
* CVE-2022-49942
* CVE-2022-49943
* CVE-2022-49944
* CVE-2022-49945
* CVE-2022-49946
* CVE-2022-49948
* CVE-2022-49949
* CVE-2022-49950
* CVE-2022-49951
* CVE-2022-49952
* CVE-2022-49954
* CVE-2022-49956
* CVE-2022-49957
* CVE-2022-49958
* CVE-2022-49960
* CVE-2022-49962
* CVE-2022-49963
* CVE-2022-49964
* CVE-2022-49965
* CVE-2022-49966
* CVE-2022-49968
* CVE-2022-49969
* CVE-2022-49971
* CVE-2022-49972
* CVE-2022-49977
* CVE-2022-49978
* CVE-2022-49980
* CVE-2022-49981
* CVE-2022-49982
* CVE-2022-49983
* CVE-2022-49984
* CVE-2022-49985
* CVE-2022-49986
* CVE-2022-49987
* CVE-2022-49989
* CVE-2022-49990
* CVE-2022-49993
* CVE-2022-49995
* CVE-2022-49999
* CVE-2022-50002
* CVE-2022-50003
* CVE-2022-50005
* CVE-2022-50006
* CVE-2022-50008
* CVE-2022-50010
* CVE-2022-50011
* CVE-2022-50012
* CVE-2022-50015
* CVE-2022-50016
* CVE-2022-50019
* CVE-2022-50020
* CVE-2022-50021
* CVE-2022-50022
* CVE-2022-50023
* CVE-2022-50024
* CVE-2022-50026
* CVE-2022-50027
* CVE-2022-50028
* CVE-2022-50029
* CVE-2022-50030
* CVE-2022-50031
* CVE-2022-50032
* CVE-2022-50033
* CVE-2022-50034
* CVE-2022-50035
* CVE-2022-50036
* CVE-2022-50037
* CVE-2022-50038
* CVE-2022-50039
* CVE-2022-50040
* CVE-2022-50041
* CVE-2022-50044
* CVE-2022-50045
* CVE-2022-50046
* CVE-2022-50047
* CVE-2022-50049
* CVE-2022-50050
* CVE-2022-50051
* CVE-2022-50052
* CVE-2022-50053
* CVE-2022-50054
* CVE-2022-50055
* CVE-2022-50059
* CVE-2022-50060
* CVE-2022-50061
* CVE-2022-50062
* CVE-2022-50065
* CVE-2022-50066
* CVE-2022-50067
* CVE-2022-50068
* CVE-2022-50072
* CVE-2022-50073
* CVE-2022-50074
* CVE-2022-50076
* CVE-2022-50077
* CVE-2022-50079
* CVE-2022-50083
* CVE-2022-50084
* CVE-2022-50085
* CVE-2022-50086
* CVE-2022-50087
* CVE-2022-50092
* CVE-2022-50093
* CVE-2022-50094
* CVE-2022-50095
* CVE-2022-50097
* CVE-2022-50098
* CVE-2022-50099
* CVE-2022-50100
* CVE-2022-50101
* CVE-2022-50102
* CVE-2022-50103
* CVE-2022-50104
* CVE-2022-50108
* CVE-2022-50109
* CVE-2022-50110
* CVE-2022-50111
* CVE-2022-50112
* CVE-2022-50115
* CVE-2022-50116
* CVE-2022-50117
* CVE-2022-50118
* CVE-2022-50120
* CVE-2022-50121
* CVE-2022-50124
* CVE-2022-50125
* CVE-2022-50126
* CVE-2022-50127
* CVE-2022-50129
* CVE-2022-50131
* CVE-2022-50132
* CVE-2022-50133
* CVE-2022-50134
* CVE-2022-50135
* CVE-2022-50136
* CVE-2022-50137
* CVE-2022-50138
* CVE-2022-50139
* CVE-2022-50140
* CVE-2022-50141
* CVE-2022-50142
* CVE-2022-50143
* CVE-2022-50144
* CVE-2022-50145
* CVE-2022-50146
* CVE-2022-50149
* CVE-2022-50151
* CVE-2022-50152
* CVE-2022-50153
* CVE-2022-50154
* CVE-2022-50155
* CVE-2022-50156
* CVE-2022-50157
* CVE-2022-50158
* CVE-2022-50160
* CVE-2022-50161
* CVE-2022-50162
* CVE-2022-50164
* CVE-2022-50165
* CVE-2022-50166
* CVE-2022-50169
* CVE-2022-50171
* CVE-2022-50172
* CVE-2022-50173
* CVE-2022-50175
* CVE-2022-50176
* CVE-2022-50178
* CVE-2022-50179
* CVE-2022-50181
* CVE-2022-50183
* CVE-2022-50184
* CVE-2022-50185
* CVE-2022-50186
* CVE-2022-50187
* CVE-2022-50188
* CVE-2022-50190
* CVE-2022-50191
* CVE-2022-50192
* CVE-2022-50194
* CVE-2022-50196
* CVE-2022-50197
* CVE-2022-50198
* CVE-2022-50199
* CVE-2022-50200
* CVE-2022-50201
* CVE-2022-50202
* CVE-2022-50203
* CVE-2022-50204
* CVE-2022-50206
* CVE-2022-50207
* CVE-2022-50208
* CVE-2022-50209
* CVE-2022-50211
* CVE-2022-50212
* CVE-2022-50213
* CVE-2022-50215
* CVE-2022-50218
* CVE-2022-50220
* CVE-2022-50221
* CVE-2022-50222
* CVE-2022-50226
* CVE-2022-50228
* CVE-2022-50229
* CVE-2022-50231
* CVE-2023-3111
* CVE-2023-52924
* CVE-2023-52925
* CVE-2023-53046
* CVE-2023-53048
* CVE-2023-53076
* CVE-2023-53097
* CVE-2024-26808
* CVE-2024-26924
* CVE-2024-26935
* CVE-2024-27397
* CVE-2024-35840
* CVE-2024-36978
* CVE-2024-46800
* CVE-2024-53125
* CVE-2024-53141
* CVE-2024-53197
* CVE-2024-56770
* CVE-2024-57999
* CVE-2025-21700
* CVE-2025-21702
* CVE-2025-21703
* CVE-2025-21756
* CVE-2025-23141
* CVE-2025-23145
* CVE-2025-37752
* CVE-2025-37798
* CVE-2025-37823
* CVE-2025-37890
* CVE-2025-37932
* CVE-2025-37948
* CVE-2025-37953
* CVE-2025-37963
* CVE-2025-37997
* CVE-2025-38000
* CVE-2025-38001
* CVE-2025-38014
* CVE-2025-38060
* CVE-2025-38083

CVSS scores:

* CVE-2021-47557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47557 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47595 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47595 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-1679 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-1679 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-2585 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-2585 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-2586 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-2586 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-2586 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-2905 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-2905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-3903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-3903 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-3903 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-4095 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-4095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-4095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-4662 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-4662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-4662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49934 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49934 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49935 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49937 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49937 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49938 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49938 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49940 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49940 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49942 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49943 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49943 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-49944 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49945 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49945 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-49946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49948 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49949 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49949 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49951 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49956 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49960 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49960 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49962 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49962 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49963 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49964 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49964 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-49965 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49965 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-49966 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49966 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-49968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49969 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49969 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49971 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49971 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49972 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49977 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49977 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49978 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49980 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49980 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49981 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49982 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49993 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50003 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50010 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50011 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50012 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50019 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50020 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50020 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2022-50021 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50021 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50022 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50022 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-50023 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50024 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50027 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50028 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50028 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50029 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50030 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50030 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50031 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50032 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50033 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50047 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50068 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50068 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50084 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50085 ( SUSE ): 7.0
CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50085 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50087 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50115 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50117 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50145 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50161 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50165 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50169 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50173 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50190 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50191 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50200 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50200 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50201 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50201 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50202 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50202 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50203 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50204 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50206 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50206 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50208 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50211 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50211 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50213 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50215 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50215 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50220 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50220 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2022-50221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50222 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2022-50222 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2022-50226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50228 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-3111 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52924 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52924 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52925 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52925 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52925 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53097 ( SUSE ): 5.1
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26808 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26808 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26924 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26924 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26935 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-27397 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36978 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36978 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-46800 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53125 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53141 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53141 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53197 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-53197 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-53197 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56770 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21700 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21700 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21700 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21702 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21703 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21756 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-23141 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-23141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23145 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37752 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-37798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-37823 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37890 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-37932 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-37932 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-37948 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-37953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37963 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-37963 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-37997 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37997 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38000 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38000 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38001 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38001 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38014 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38014 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38060 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38060 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38083 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves 258 vulnerabilities and has 31 security fixes can now be
installed.

## Description:

This update provides the initial livepatch for this kernel update. This update
does not contain any fixes and will be updated with livepatches later.

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2264=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2264=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2264=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2264=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-2264=1

* openSUSE Leap 15.5
zypper in -t patch SUSE-2025-2264=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-2264=1

## Package List:

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* kernel-obs-build-5.14.21-150500.55.113.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.113.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.113.1
* ocfs2-kmp-default-5.14.21-150500.55.113.1
* cluster-md-kmp-default-5.14.21-150500.55.113.1
* kernel-default-base-5.14.21-150500.55.113.1.150500.6.53.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.113.1
* gfs2-kmp-default-5.14.21-150500.55.113.1
* kernel-default-debuginfo-5.14.21-150500.55.113.1
* kernel-default-devel-5.14.21-150500.55.113.1
* dlm-kmp-default-5.14.21-150500.55.113.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.113.1
* kernel-obs-build-debugsource-5.14.21-150500.55.113.1
* kernel-syms-5.14.21-150500.55.113.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.113.1
* kernel-default-debugsource-5.14.21-150500.55.113.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
nosrc)
* kernel-64kb-5.14.21-150500.55.113.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64)
* kernel-64kb-debugsource-5.14.21-150500.55.113.1
* kernel-64kb-debuginfo-5.14.21-150500.55.113.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.113.1
* kernel-64kb-devel-5.14.21-150500.55.113.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150500.55.113.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* kernel-devel-5.14.21-150500.55.113.1
* kernel-macros-5.14.21-150500.55.113.1
* kernel-source-5.14.21-150500.55.113.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.113.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* kernel-obs-build-5.14.21-150500.55.113.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.113.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.113.1
* ocfs2-kmp-default-5.14.21-150500.55.113.1
* cluster-md-kmp-default-5.14.21-150500.55.113.1
* kernel-default-base-5.14.21-150500.55.113.1.150500.6.53.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.113.1
* gfs2-kmp-default-5.14.21-150500.55.113.1
* kernel-default-debuginfo-5.14.21-150500.55.113.1
* kernel-default-devel-5.14.21-150500.55.113.1
* dlm-kmp-default-5.14.21-150500.55.113.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.113.1
* kernel-obs-build-debugsource-5.14.21-150500.55.113.1
* kernel-syms-5.14.21-150500.55.113.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.113.1
* kernel-default-debugsource-5.14.21-150500.55.113.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.113.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64)
* kernel-64kb-debugsource-5.14.21-150500.55.113.1
* kernel-64kb-debuginfo-5.14.21-150500.55.113.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.113.1
* kernel-64kb-devel-5.14.21-150500.55.113.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150500.55.113.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* kernel-devel-5.14.21-150500.55.113.1
* kernel-macros-5.14.21-150500.55.113.1
* kernel-source-5.14.21-150500.55.113.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.113.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* kernel-obs-build-5.14.21-150500.55.113.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.113.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.113.1
* ocfs2-kmp-default-5.14.21-150500.55.113.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.113.1
* cluster-md-kmp-default-5.14.21-150500.55.113.1
* reiserfs-kmp-default-5.14.21-150500.55.113.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.113.1
* gfs2-kmp-default-5.14.21-150500.55.113.1
* kernel-default-debuginfo-5.14.21-150500.55.113.1
* kernel-default-devel-5.14.21-150500.55.113.1
* dlm-kmp-default-5.14.21-150500.55.113.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.113.1
* kernel-obs-build-debugsource-5.14.21-150500.55.113.1
* kernel-syms-5.14.21-150500.55.113.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.113.1
* kernel-default-debugsource-5.14.21-150500.55.113.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.113.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64)
* kernel-64kb-debugsource-5.14.21-150500.55.113.1
* kernel-64kb-debuginfo-5.14.21-150500.55.113.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.113.1
* kernel-64kb-devel-5.14.21-150500.55.113.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-5.14.21-150500.55.113.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150500.55.113.1.150500.6.53.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* kernel-devel-5.14.21-150500.55.113.1
* kernel-macros-5.14.21-150500.55.113.1
* kernel-source-5.14.21-150500.55.113.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch nosrc)
* kernel-docs-5.14.21-150500.55.113.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.113.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150500.55.113.1
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.113.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* kernel-obs-build-5.14.21-150500.55.113.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.113.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.113.1
* ocfs2-kmp-default-5.14.21-150500.55.113.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.113.1
* cluster-md-kmp-default-5.14.21-150500.55.113.1
* reiserfs-kmp-default-5.14.21-150500.55.113.1
* kernel-default-base-5.14.21-150500.55.113.1.150500.6.53.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.113.1
* gfs2-kmp-default-5.14.21-150500.55.113.1
* kernel-default-debuginfo-5.14.21-150500.55.113.1
* kernel-default-devel-5.14.21-150500.55.113.1
* dlm-kmp-default-5.14.21-150500.55.113.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.113.1
* kernel-obs-build-debugsource-5.14.21-150500.55.113.1
* kernel-syms-5.14.21-150500.55.113.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.113.1
* kernel-default-debugsource-5.14.21-150500.55.113.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150500.55.113.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* kernel-devel-5.14.21-150500.55.113.1
* kernel-macros-5.14.21-150500.55.113.1
* kernel-source-5.14.21-150500.55.113.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.113.1
* SUSE Linux Enterprise Live Patching 15-SP5 (nosrc)
* kernel-default-5.14.21-150500.55.113.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-default-livepatch-devel-5.14.21-150500.55.113.1
* kernel-livepatch-5_14_21-150500_55_113-default-debuginfo-1-150500.11.3.1
* kernel-livepatch-SLE15-SP5_Update_28-debugsource-1-150500.11.3.1
* kernel-default-livepatch-5.14.21-150500.55.113.1
* kernel-default-debuginfo-5.14.21-150500.55.113.1
* kernel-livepatch-5_14_21-150500_55_113-default-1-150500.11.3.1
* kernel-default-debugsource-5.14.21-150500.55.113.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_28-debugsource-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_55_113-default-debuginfo-1-150500.11.3.1
* kernel-default-livepatch-devel-5.14.21-150500.55.113.1
* kernel-livepatch-5_14_21-150500_55_113-default-1-150500.11.3.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kernel-obs-build-5.14.21-150500.55.113.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.113.1
* ocfs2-kmp-default-5.14.21-150500.55.113.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.113.1
* gfs2-kmp-default-5.14.21-150500.55.113.1
* kernel-default-debuginfo-5.14.21-150500.55.113.1
* kernel-syms-5.14.21-150500.55.113.1
* kernel-obs-qa-5.14.21-150500.55.113.1
* reiserfs-kmp-default-5.14.21-150500.55.113.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.113.1
* kernel-obs-build-debugsource-5.14.21-150500.55.113.1
* kselftests-kmp-default-5.14.21-150500.55.113.1
* kselftests-kmp-default-debuginfo-5.14.21-150500.55.113.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.113.1
* kernel-default-extra-5.14.21-150500.55.113.1
* cluster-md-kmp-default-5.14.21-150500.55.113.1
* kernel-default-livepatch-5.14.21-150500.55.113.1
* kernel-default-extra-debuginfo-5.14.21-150500.55.113.1
* dlm-kmp-default-5.14.21-150500.55.113.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.113.1
* kernel-default-debugsource-5.14.21-150500.55.113.1
* kernel-default-optional-5.14.21-150500.55.113.1
* kernel-default-optional-debuginfo-5.14.21-150500.55.113.1
* kernel-default-devel-5.14.21-150500.55.113.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.113.1
* openSUSE Leap 15.5 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.113.1
* openSUSE Leap 15.5 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150500.55.113.1
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.113.1
* openSUSE Leap 15.5 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-devel-5.14.21-150500.55.113.1
* kernel-kvmsmall-debuginfo-5.14.21-150500.55.113.1
* kernel-kvmsmall-debugsource-5.14.21-150500.55.113.1
* kernel-default-base-5.14.21-150500.55.113.1.150500.6.53.1
* kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.113.1
* kernel-default-base-rebuild-5.14.21-150500.55.113.1.150500.6.53.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.113.1
* openSUSE Leap 15.5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.113.1
* openSUSE Leap 15.5 (noarch)
* kernel-macros-5.14.21-150500.55.113.1
* kernel-devel-5.14.21-150500.55.113.1
* kernel-source-5.14.21-150500.55.113.1
* kernel-docs-html-5.14.21-150500.55.113.1
* kernel-source-vanilla-5.14.21-150500.55.113.1
* openSUSE Leap 15.5 (x86_64)
* kernel-default-vdso-5.14.21-150500.55.113.1
* kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.113.1
* kernel-default-vdso-debuginfo-5.14.21-150500.55.113.1
* kernel-kvmsmall-vdso-5.14.21-150500.55.113.1
* openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150500.55.113.1
* openSUSE Leap 15.5 (nosrc)
* dtb-aarch64-5.14.21-150500.55.113.1
* openSUSE Leap 15.5 (aarch64)
* dtb-amazon-5.14.21-150500.55.113.1
* gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.113.1
* kselftests-kmp-64kb-5.14.21-150500.55.113.1
* dtb-broadcom-5.14.21-150500.55.113.1
* kernel-64kb-debugsource-5.14.21-150500.55.113.1
* dtb-allwinner-5.14.21-150500.55.113.1
* dtb-qcom-5.14.21-150500.55.113.1
* dtb-rockchip-5.14.21-150500.55.113.1
* dtb-arm-5.14.21-150500.55.113.1
* dtb-renesas-5.14.21-150500.55.113.1
* dtb-nvidia-5.14.21-150500.55.113.1
* dtb-altera-5.14.21-150500.55.113.1
* gfs2-kmp-64kb-5.14.21-150500.55.113.1
* dtb-marvell-5.14.21-150500.55.113.1
* cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.113.1
* kernel-64kb-optional-debuginfo-5.14.21-150500.55.113.1
* dtb-socionext-5.14.21-150500.55.113.1
* dtb-cavium-5.14.21-150500.55.113.1
* reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.113.1
* dtb-hisilicon-5.14.21-150500.55.113.1
* dtb-apm-5.14.21-150500.55.113.1
* reiserfs-kmp-64kb-5.14.21-150500.55.113.1
* kernel-64kb-devel-5.14.21-150500.55.113.1
* dtb-freescale-5.14.21-150500.55.113.1
* ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.113.1
* dtb-xilinx-5.14.21-150500.55.113.1
* kernel-64kb-optional-5.14.21-150500.55.113.1
* dtb-amlogic-5.14.21-150500.55.113.1
* cluster-md-kmp-64kb-5.14.21-150500.55.113.1
* dlm-kmp-64kb-debuginfo-5.14.21-150500.55.113.1
* dtb-amd-5.14.21-150500.55.113.1
* kernel-64kb-extra-debuginfo-5.14.21-150500.55.113.1
* dtb-lg-5.14.21-150500.55.113.1
* kernel-64kb-debuginfo-5.14.21-150500.55.113.1
* kernel-64kb-extra-5.14.21-150500.55.113.1
* dlm-kmp-64kb-5.14.21-150500.55.113.1
* dtb-mediatek-5.14.21-150500.55.113.1
* kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.113.1
* dtb-sprd-5.14.21-150500.55.113.1
* dtb-apple-5.14.21-150500.55.113.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.113.1
* dtb-exynos-5.14.21-150500.55.113.1
* ocfs2-kmp-64kb-5.14.21-150500.55.113.1
* openSUSE Leap 15.5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.113.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.113.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* kernel-default-base-5.14.21-150500.55.113.1.150500.6.53.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* kernel-default-debuginfo-5.14.21-150500.55.113.1
* kernel-default-debugsource-5.14.21-150500.55.113.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-macros-5.14.21-150500.55.113.1

## References:

* https://www.suse.com/security/cve/CVE-2021-47557.html
* https://www.suse.com/security/cve/CVE-2021-47595.html
* https://www.suse.com/security/cve/CVE-2022-1679.html
* https://www.suse.com/security/cve/CVE-2022-2585.html
* https://www.suse.com/security/cve/CVE-2022-2586.html
* https://www.suse.com/security/cve/CVE-2022-2905.html
* https://www.suse.com/security/cve/CVE-2022-3903.html
* https://www.suse.com/security/cve/CVE-2022-4095.html
* https://www.suse.com/security/cve/CVE-2022-4662.html
* https://www.suse.com/security/cve/CVE-2022-49934.html
* https://www.suse.com/security/cve/CVE-2022-49935.html
* https://www.suse.com/security/cve/CVE-2022-49936.html
* https://www.suse.com/security/cve/CVE-2022-49937.html
* https://www.suse.com/security/cve/CVE-2022-49938.html
* https://www.suse.com/security/cve/CVE-2022-49940.html
* https://www.suse.com/security/cve/CVE-2022-49942.html
* https://www.suse.com/security/cve/CVE-2022-49943.html
* https://www.suse.com/security/cve/CVE-2022-49944.html
* https://www.suse.com/security/cve/CVE-2022-49945.html
* https://www.suse.com/security/cve/CVE-2022-49946.html
* https://www.suse.com/security/cve/CVE-2022-49948.html
* https://www.suse.com/security/cve/CVE-2022-49949.html
* https://www.suse.com/security/cve/CVE-2022-49950.html
* https://www.suse.com/security/cve/CVE-2022-49951.html
* https://www.suse.com/security/cve/CVE-2022-49952.html
* https://www.suse.com/security/cve/CVE-2022-49954.html
* https://www.suse.com/security/cve/CVE-2022-49956.html
* https://www.suse.com/security/cve/CVE-2022-49957.html
* https://www.suse.com/security/cve/CVE-2022-49958.html
* https://www.suse.com/security/cve/CVE-2022-49960.html
* https://www.suse.com/security/cve/CVE-2022-49962.html
* https://www.suse.com/security/cve/CVE-2022-49963.html
* https://www.suse.com/security/cve/CVE-2022-49964.html
* https://www.suse.com/security/cve/CVE-2022-49965.html
* https://www.suse.com/security/cve/CVE-2022-49966.html
* https://www.suse.com/security/cve/CVE-2022-49968.html
* https://www.suse.com/security/cve/CVE-2022-49969.html
* https://www.suse.com/security/cve/CVE-2022-49971.html
* https://www.suse.com/security/cve/CVE-2022-49972.html
* https://www.suse.com/security/cve/CVE-2022-49977.html
* https://www.suse.com/security/cve/CVE-2022-49978.html
* https://www.suse.com/security/cve/CVE-2022-49980.html
* https://www.suse.com/security/cve/CVE-2022-49981.html
* https://www.suse.com/security/cve/CVE-2022-49982.html
* https://www.suse.com/security/cve/CVE-2022-49983.html
* https://www.suse.com/security/cve/CVE-2022-49984.html
* https://www.suse.com/security/cve/CVE-2022-49985.html
* https://www.suse.com/security/cve/CVE-2022-49986.html
* https://www.suse.com/security/cve/CVE-2022-49987.html
* https://www.suse.com/security/cve/CVE-2022-49989.html
* https://www.suse.com/security/cve/CVE-2022-49990.html
* https://www.suse.com/security/cve/CVE-2022-49993.html
* https://www.suse.com/security/cve/CVE-2022-49995.html
* https://www.suse.com/security/cve/CVE-2022-49999.html
* https://www.suse.com/security/cve/CVE-2022-50002.html
* https://www.suse.com/security/cve/CVE-2022-50003.html
* https://www.suse.com/security/cve/CVE-2022-50005.html
* https://www.suse.com/security/cve/CVE-2022-50006.html
* https://www.suse.com/security/cve/CVE-2022-50008.html
* https://www.suse.com/security/cve/CVE-2022-50010.html
* https://www.suse.com/security/cve/CVE-2022-50011.html
* https://www.suse.com/security/cve/CVE-2022-50012.html
* https://www.suse.com/security/cve/CVE-2022-50015.html
* https://www.suse.com/security/cve/CVE-2022-50016.html
* https://www.suse.com/security/cve/CVE-2022-50019.html
* https://www.suse.com/security/cve/CVE-2022-50020.html
* https://www.suse.com/security/cve/CVE-2022-50021.html
* https://www.suse.com/security/cve/CVE-2022-50022.html
* https://www.suse.com/security/cve/CVE-2022-50023.html
* https://www.suse.com/security/cve/CVE-2022-50024.html
* https://www.suse.com/security/cve/CVE-2022-50026.html
* https://www.suse.com/security/cve/CVE-2022-50027.html
* https://www.suse.com/security/cve/CVE-2022-50028.html
* https://www.suse.com/security/cve/CVE-2022-50029.html
* https://www.suse.com/security/cve/CVE-2022-50030.html
* https://www.suse.com/security/cve/CVE-2022-50031.html
* https://www.suse.com/security/cve/CVE-2022-50032.html
* https://www.suse.com/security/cve/CVE-2022-50033.html
* https://www.suse.com/security/cve/CVE-2022-50034.html
* https://www.suse.com/security/cve/CVE-2022-50035.html
* https://www.suse.com/security/cve/CVE-2022-50036.html
* https://www.suse.com/security/cve/CVE-2022-50037.html
* https://www.suse.com/security/cve/CVE-2022-50038.html
* https://www.suse.com/security/cve/CVE-2022-50039.html
* https://www.suse.com/security/cve/CVE-2022-50040.html
* https://www.suse.com/security/cve/CVE-2022-50041.html
* https://www.suse.com/security/cve/CVE-2022-50044.html
* https://www.suse.com/security/cve/CVE-2022-50045.html
* https://www.suse.com/security/cve/CVE-2022-50046.html
* https://www.suse.com/security/cve/CVE-2022-50047.html
* https://www.suse.com/security/cve/CVE-2022-50049.html
* https://www.suse.com/security/cve/CVE-2022-50050.html
* https://www.suse.com/security/cve/CVE-2022-50051.html
* https://www.suse.com/security/cve/CVE-2022-50052.html
* https://www.suse.com/security/cve/CVE-2022-50053.html
* https://www.suse.com/security/cve/CVE-2022-50054.html
* https://www.suse.com/security/cve/CVE-2022-50055.html
* https://www.suse.com/security/cve/CVE-2022-50059.html
* https://www.suse.com/security/cve/CVE-2022-50060.html
* https://www.suse.com/security/cve/CVE-2022-50061.html
* https://www.suse.com/security/cve/CVE-2022-50062.html
* https://www.suse.com/security/cve/CVE-2022-50065.html
* https://www.suse.com/security/cve/CVE-2022-50066.html
* https://www.suse.com/security/cve/CVE-2022-50067.html
* https://www.suse.com/security/cve/CVE-2022-50068.html
* https://www.suse.com/security/cve/CVE-2022-50072.html
* https://www.suse.com/security/cve/CVE-2022-50073.html
* https://www.suse.com/security/cve/CVE-2022-50074.html
* https://www.suse.com/security/cve/CVE-2022-50076.html
* https://www.suse.com/security/cve/CVE-2022-50077.html
* https://www.suse.com/security/cve/CVE-2022-50079.html
* https://www.suse.com/security/cve/CVE-2022-50083.html
* https://www.suse.com/security/cve/CVE-2022-50084.html
* https://www.suse.com/security/cve/CVE-2022-50085.html
* https://www.suse.com/security/cve/CVE-2022-50086.html
* https://www.suse.com/security/cve/CVE-2022-50087.html
* https://www.suse.com/security/cve/CVE-2022-50092.html
* https://www.suse.com/security/cve/CVE-2022-50093.html
* https://www.suse.com/security/cve/CVE-2022-50094.html
* https://www.suse.com/security/cve/CVE-2022-50095.html
* https://www.suse.com/security/cve/CVE-2022-50097.html
* https://www.suse.com/security/cve/CVE-2022-50098.html
* https://www.suse.com/security/cve/CVE-2022-50099.html
* https://www.suse.com/security/cve/CVE-2022-50100.html
* https://www.suse.com/security/cve/CVE-2022-50101.html
* https://www.suse.com/security/cve/CVE-2022-50102.html
* https://www.suse.com/security/cve/CVE-2022-50103.html
* https://www.suse.com/security/cve/CVE-2022-50104.html
* https://www.suse.com/security/cve/CVE-2022-50108.html
* https://www.suse.com/security/cve/CVE-2022-50109.html
* https://www.suse.com/security/cve/CVE-2022-50110.html
* https://www.suse.com/security/cve/CVE-2022-50111.html
* https://www.suse.com/security/cve/CVE-2022-50112.html
* https://www.suse.com/security/cve/CVE-2022-50115.html
* https://www.suse.com/security/cve/CVE-2022-50116.html
* https://www.suse.com/security/cve/CVE-2022-50117.html
* https://www.suse.com/security/cve/CVE-2022-50118.html
* https://www.suse.com/security/cve/CVE-2022-50120.html
* https://www.suse.com/security/cve/CVE-2022-50121.html
* https://www.suse.com/security/cve/CVE-2022-50124.html
* https://www.suse.com/security/cve/CVE-2022-50125.html
* https://www.suse.com/security/cve/CVE-2022-50126.html
* https://www.suse.com/security/cve/CVE-2022-50127.html
* https://www.suse.com/security/cve/CVE-2022-50129.html
* https://www.suse.com/security/cve/CVE-2022-50131.html
* https://www.suse.com/security/cve/CVE-2022-50132.html
* https://www.suse.com/security/cve/CVE-2022-50133.html
* https://www.suse.com/security/cve/CVE-2022-50134.html
* https://www.suse.com/security/cve/CVE-2022-50135.html
* https://www.suse.com/security/cve/CVE-2022-50136.html
* https://www.suse.com/security/cve/CVE-2022-50137.html
* https://www.suse.com/security/cve/CVE-2022-50138.html
* https://www.suse.com/security/cve/CVE-2022-50139.html
* https://www.suse.com/security/cve/CVE-2022-50140.html
* https://www.suse.com/security/cve/CVE-2022-50141.html
* https://www.suse.com/security/cve/CVE-2022-50142.html
* https://www.suse.com/security/cve/CVE-2022-50143.html
* https://www.suse.com/security/cve/CVE-2022-50144.html
* https://www.suse.com/security/cve/CVE-2022-50145.html
* https://www.suse.com/security/cve/CVE-2022-50146.html
* https://www.suse.com/security/cve/CVE-2022-50149.html
* https://www.suse.com/security/cve/CVE-2022-50151.html
* https://www.suse.com/security/cve/CVE-2022-50152.html
* https://www.suse.com/security/cve/CVE-2022-50153.html
* https://www.suse.com/security/cve/CVE-2022-50154.html
* https://www.suse.com/security/cve/CVE-2022-50155.html
* https://www.suse.com/security/cve/CVE-2022-50156.html
* https://www.suse.com/security/cve/CVE-2022-50157.html
* https://www.suse.com/security/cve/CVE-2022-50158.html
* https://www.suse.com/security/cve/CVE-2022-50160.html
* https://www.suse.com/security/cve/CVE-2022-50161.html
* https://www.suse.com/security/cve/CVE-2022-50162.html
* https://www.suse.com/security/cve/CVE-2022-50164.html
* https://www.suse.com/security/cve/CVE-2022-50165.html
* https://www.suse.com/security/cve/CVE-2022-50166.html
* https://www.suse.com/security/cve/CVE-2022-50169.html
* https://www.suse.com/security/cve/CVE-2022-50171.html
* https://www.suse.com/security/cve/CVE-2022-50172.html
* https://www.suse.com/security/cve/CVE-2022-50173.html
* https://www.suse.com/security/cve/CVE-2022-50175.html
* https://www.suse.com/security/cve/CVE-2022-50176.html
* https://www.suse.com/security/cve/CVE-2022-50178.html
* https://www.suse.com/security/cve/CVE-2022-50179.html
* https://www.suse.com/security/cve/CVE-2022-50181.html
* https://www.suse.com/security/cve/CVE-2022-50183.html
* https://www.suse.com/security/cve/CVE-2022-50184.html
* https://www.suse.com/security/cve/CVE-2022-50185.html
* https://www.suse.com/security/cve/CVE-2022-50186.html
* https://www.suse.com/security/cve/CVE-2022-50187.html
* https://www.suse.com/security/cve/CVE-2022-50188.html
* https://www.suse.com/security/cve/CVE-2022-50190.html
* https://www.suse.com/security/cve/CVE-2022-50191.html
* https://www.suse.com/security/cve/CVE-2022-50192.html
* https://www.suse.com/security/cve/CVE-2022-50194.html
* https://www.suse.com/security/cve/CVE-2022-50196.html
* https://www.suse.com/security/cve/CVE-2022-50197.html
* https://www.suse.com/security/cve/CVE-2022-50198.html
* https://www.suse.com/security/cve/CVE-2022-50199.html
* https://www.suse.com/security/cve/CVE-2022-50200.html
* https://www.suse.com/security/cve/CVE-2022-50201.html
* https://www.suse.com/security/cve/CVE-2022-50202.html
* https://www.suse.com/security/cve/CVE-2022-50203.html
* https://www.suse.com/security/cve/CVE-2022-50204.html
* https://www.suse.com/security/cve/CVE-2022-50206.html
* https://www.suse.com/security/cve/CVE-2022-50207.html
* https://www.suse.com/security/cve/CVE-2022-50208.html
* https://www.suse.com/security/cve/CVE-2022-50209.html
* https://www.suse.com/security/cve/CVE-2022-50211.html
* https://www.suse.com/security/cve/CVE-2022-50212.html
* https://www.suse.com/security/cve/CVE-2022-50213.html
* https://www.suse.com/security/cve/CVE-2022-50215.html
* https://www.suse.com/security/cve/CVE-2022-50218.html
* https://www.suse.com/security/cve/CVE-2022-50220.html
* https://www.suse.com/security/cve/CVE-2022-50221.html
* https://www.suse.com/security/cve/CVE-2022-50222.html
* https://www.suse.com/security/cve/CVE-2022-50226.html
* https://www.suse.com/security/cve/CVE-2022-50228.html
* https://www.suse.com/security/cve/CVE-2022-50229.html
* https://www.suse.com/security/cve/CVE-2022-50231.html
* https://www.suse.com/security/cve/CVE-2023-3111.html
* https://www.suse.com/security/cve/CVE-2023-52924.html
* https://www.suse.com/security/cve/CVE-2023-52925.html
* https://www.suse.com/security/cve/CVE-2023-53046.html
* https://www.suse.com/security/cve/CVE-2023-53048.html
* https://www.suse.com/security/cve/CVE-2023-53076.html
* https://www.suse.com/security/cve/CVE-2023-53097.html
* https://www.suse.com/security/cve/CVE-2024-26808.html
* https://www.suse.com/security/cve/CVE-2024-26924.html
* https://www.suse.com/security/cve/CVE-2024-26935.html
* https://www.suse.com/security/cve/CVE-2024-27397.html
* https://www.suse.com/security/cve/CVE-2024-35840.html
* https://www.suse.com/security/cve/CVE-2024-36978.html
* https://www.suse.com/security/cve/CVE-2024-46800.html
* https://www.suse.com/security/cve/CVE-2024-53125.html
* https://www.suse.com/security/cve/CVE-2024-53141.html
* https://www.suse.com/security/cve/CVE-2024-53197.html
* https://www.suse.com/security/cve/CVE-2024-56770.html
* https://www.suse.com/security/cve/CVE-2024-57999.html
* https://www.suse.com/security/cve/CVE-2025-21700.html
* https://www.suse.com/security/cve/CVE-2025-21702.html
* https://www.suse.com/security/cve/CVE-2025-21703.html
* https://www.suse.com/security/cve/CVE-2025-21756.html
* https://www.suse.com/security/cve/CVE-2025-23141.html
* https://www.suse.com/security/cve/CVE-2025-23145.html
* https://www.suse.com/security/cve/CVE-2025-37752.html
* https://www.suse.com/security/cve/CVE-2025-37798.html
* https://www.suse.com/security/cve/CVE-2025-37823.html
* https://www.suse.com/security/cve/CVE-2025-37890.html
* https://www.suse.com/security/cve/CVE-2025-37932.html
* https://www.suse.com/security/cve/CVE-2025-37948.html
* https://www.suse.com/security/cve/CVE-2025-37953.html
* https://www.suse.com/security/cve/CVE-2025-37963.html
* https://www.suse.com/security/cve/CVE-2025-37997.html
* https://www.suse.com/security/cve/CVE-2025-38000.html
* https://www.suse.com/security/cve/CVE-2025-38001.html
* https://www.suse.com/security/cve/CVE-2025-38014.html
* https://www.suse.com/security/cve/CVE-2025-38060.html
* https://www.suse.com/security/cve/CVE-2025-38083.html
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1156395
* https://bugzilla.suse.com/show_bug.cgi?id=1193629
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1198410
* https://bugzilla.suse.com/show_bug.cgi?id=1199356
* https://bugzilla.suse.com/show_bug.cgi?id=1199487
* https://bugzilla.suse.com/show_bug.cgi?id=1201160
* https://bugzilla.suse.com/show_bug.cgi?id=1201956
* https://bugzilla.suse.com/show_bug.cgi?id=1202094
* https://bugzilla.suse.com/show_bug.cgi?id=1202095
* https://bugzilla.suse.com/show_bug.cgi?id=1202564
* https://bugzilla.suse.com/show_bug.cgi?id=1202716
* https://bugzilla.suse.com/show_bug.cgi?id=1202823
* https://bugzilla.suse.com/show_bug.cgi?id=1202860
* https://bugzilla.suse.com/show_bug.cgi?id=1203197
* https://bugzilla.suse.com/show_bug.cgi?id=1203361
* https://bugzilla.suse.com/show_bug.cgi?id=1205220
* https://bugzilla.suse.com/show_bug.cgi?id=1205514
* https://bugzilla.suse.com/show_bug.cgi?id=1205701
* https://bugzilla.suse.com/show_bug.cgi?id=1206451
* https://bugzilla.suse.com/show_bug.cgi?id=1206664
* https://bugzilla.suse.com/show_bug.cgi?id=1206878
* https://bugzilla.suse.com/show_bug.cgi?id=1206880
* https://bugzilla.suse.com/show_bug.cgi?id=1207361
* https://bugzilla.suse.com/show_bug.cgi?id=1207638
* https://bugzilla.suse.com/show_bug.cgi?id=1211226
* https://bugzilla.suse.com/show_bug.cgi?id=1212051
* https://bugzilla.suse.com/show_bug.cgi?id=1213090
* https://bugzilla.suse.com/show_bug.cgi?id=1218184
* https://bugzilla.suse.com/show_bug.cgi?id=1218234
* https://bugzilla.suse.com/show_bug.cgi?id=1218470
* https://bugzilla.suse.com/show_bug.cgi?id=1222634
* https://bugzilla.suse.com/show_bug.cgi?id=1223675
* https://bugzilla.suse.com/show_bug.cgi?id=1224095
* https://bugzilla.suse.com/show_bug.cgi?id=1224597
* https://bugzilla.suse.com/show_bug.cgi?id=1225468
* https://bugzilla.suse.com/show_bug.cgi?id=1225820
* https://bugzilla.suse.com/show_bug.cgi?id=1226514
* https://bugzilla.suse.com/show_bug.cgi?id=1226552
* https://bugzilla.suse.com/show_bug.cgi?id=1230827
* https://bugzilla.suse.com/show_bug.cgi?id=1232504
* https://bugzilla.suse.com/show_bug.cgi?id=1234156
* https://bugzilla.suse.com/show_bug.cgi?id=1234381
* https://bugzilla.suse.com/show_bug.cgi?id=1235464
* https://bugzilla.suse.com/show_bug.cgi?id=1235637
* https://bugzilla.suse.com/show_bug.cgi?id=1236821
* https://bugzilla.suse.com/show_bug.cgi?id=1236822
* https://bugzilla.suse.com/show_bug.cgi?id=1237159
* https://bugzilla.suse.com/show_bug.cgi?id=1237312
* https://bugzilla.suse.com/show_bug.cgi?id=1237313
* https://bugzilla.suse.com/show_bug.cgi?id=1238526
* https://bugzilla.suse.com/show_bug.cgi?id=1238876
* https://bugzilla.suse.com/show_bug.cgi?id=1241900
* https://bugzilla.suse.com/show_bug.cgi?id=1242221
* https://bugzilla.suse.com/show_bug.cgi?id=1242414
* https://bugzilla.suse.com/show_bug.cgi?id=1242504
* https://bugzilla.suse.com/show_bug.cgi?id=1242596
* https://bugzilla.suse.com/show_bug.cgi?id=1242778
* https://bugzilla.suse.com/show_bug.cgi?id=1242782
* https://bugzilla.suse.com/show_bug.cgi?id=1242924
* https://bugzilla.suse.com/show_bug.cgi?id=1243330
* https://bugzilla.suse.com/show_bug.cgi?id=1243543
* https://bugzilla.suse.com/show_bug.cgi?id=1243627
* https://bugzilla.suse.com/show_bug.cgi?id=1243649
* https://bugzilla.suse.com/show_bug.cgi?id=1243660
* https://bugzilla.suse.com/show_bug.cgi?id=1243832
* https://bugzilla.suse.com/show_bug.cgi?id=1244114
* https://bugzilla.suse.com/show_bug.cgi?id=1244179
* https://bugzilla.suse.com/show_bug.cgi?id=1244180
* https://bugzilla.suse.com/show_bug.cgi?id=1244234
* https://bugzilla.suse.com/show_bug.cgi?id=1244241
* https://bugzilla.suse.com/show_bug.cgi?id=1244277
* https://bugzilla.suse.com/show_bug.cgi?id=1244309
* https://bugzilla.suse.com/show_bug.cgi?id=1244337
* https://bugzilla.suse.com/show_bug.cgi?id=1244732
* https://bugzilla.suse.com/show_bug.cgi?id=1244764
* https://bugzilla.suse.com/show_bug.cgi?id=1244765
* https://bugzilla.suse.com/show_bug.cgi?id=1244767
* https://bugzilla.suse.com/show_bug.cgi?id=1244770
* https://bugzilla.suse.com/show_bug.cgi?id=1244771
* https://bugzilla.suse.com/show_bug.cgi?id=1244772
* https://bugzilla.suse.com/show_bug.cgi?id=1244773
* https://bugzilla.suse.com/show_bug.cgi?id=1244774
* https://bugzilla.suse.com/show_bug.cgi?id=1244776
* https://bugzilla.suse.com/show_bug.cgi?id=1244779
* https://bugzilla.suse.com/show_bug.cgi?id=1244780
* https://bugzilla.suse.com/show_bug.cgi?id=1244781
* https://bugzilla.suse.com/show_bug.cgi?id=1244782
* https://bugzilla.suse.com/show_bug.cgi?id=1244783
* https://bugzilla.suse.com/show_bug.cgi?id=1244784
* https://bugzilla.suse.com/show_bug.cgi?id=1244786
* https://bugzilla.suse.com/show_bug.cgi?id=1244787
* https://bugzilla.suse.com/show_bug.cgi?id=1244788
* https://bugzilla.suse.com/show_bug.cgi?id=1244790
* https://bugzilla.suse.com/show_bug.cgi?id=1244791
* https://bugzilla.suse.com/show_bug.cgi?id=1244793
* https://bugzilla.suse.com/show_bug.cgi?id=1244794
* https://bugzilla.suse.com/show_bug.cgi?id=1244796
* https://bugzilla.suse.com/show_bug.cgi?id=1244797
* https://bugzilla.suse.com/show_bug.cgi?id=1244798
* https://bugzilla.suse.com/show_bug.cgi?id=1244800
* https://bugzilla.suse.com/show_bug.cgi?id=1244802
* https://bugzilla.suse.com/show_bug.cgi?id=1244804
* https://bugzilla.suse.com/show_bug.cgi?id=1244805
* https://bugzilla.suse.com/show_bug.cgi?id=1244806
* https://bugzilla.suse.com/show_bug.cgi?id=1244807
* https://bugzilla.suse.com/show_bug.cgi?id=1244808
* https://bugzilla.suse.com/show_bug.cgi?id=1244811
* https://bugzilla.suse.com/show_bug.cgi?id=1244813
* https://bugzilla.suse.com/show_bug.cgi?id=1244814
* https://bugzilla.suse.com/show_bug.cgi?id=1244815
* https://bugzilla.suse.com/show_bug.cgi?id=1244816
* https://bugzilla.suse.com/show_bug.cgi?id=1244819
* https://bugzilla.suse.com/show_bug.cgi?id=1244820
* https://bugzilla.suse.com/show_bug.cgi?id=1244823
* https://bugzilla.suse.com/show_bug.cgi?id=1244824
* https://bugzilla.suse.com/show_bug.cgi?id=1244825
* https://bugzilla.suse.com/show_bug.cgi?id=1244826
* https://bugzilla.suse.com/show_bug.cgi?id=1244827
* https://bugzilla.suse.com/show_bug.cgi?id=1244830
* https://bugzilla.suse.com/show_bug.cgi?id=1244831
* https://bugzilla.suse.com/show_bug.cgi?id=1244832
* https://bugzilla.suse.com/show_bug.cgi?id=1244834
* https://bugzilla.suse.com/show_bug.cgi?id=1244836
* https://bugzilla.suse.com/show_bug.cgi?id=1244838
* https://bugzilla.suse.com/show_bug.cgi?id=1244839
* https://bugzilla.suse.com/show_bug.cgi?id=1244840
* https://bugzilla.suse.com/show_bug.cgi?id=1244841
* https://bugzilla.suse.com/show_bug.cgi?id=1244842
* https://bugzilla.suse.com/show_bug.cgi?id=1244843
* https://bugzilla.suse.com/show_bug.cgi?id=1244845
* https://bugzilla.suse.com/show_bug.cgi?id=1244846
* https://bugzilla.suse.com/show_bug.cgi?id=1244848
* https://bugzilla.suse.com/show_bug.cgi?id=1244849
* https://bugzilla.suse.com/show_bug.cgi?id=1244851
* https://bugzilla.suse.com/show_bug.cgi?id=1244853
* https://bugzilla.suse.com/show_bug.cgi?id=1244854
* https://bugzilla.suse.com/show_bug.cgi?id=1244856
* https://bugzilla.suse.com/show_bug.cgi?id=1244858
* https://bugzilla.suse.com/show_bug.cgi?id=1244860
* https://bugzilla.suse.com/show_bug.cgi?id=1244861
* https://bugzilla.suse.com/show_bug.cgi?id=1244866
* https://bugzilla.suse.com/show_bug.cgi?id=1244867
* https://bugzilla.suse.com/show_bug.cgi?id=1244868
* https://bugzilla.suse.com/show_bug.cgi?id=1244869
* https://bugzilla.suse.com/show_bug.cgi?id=1244870
* https://bugzilla.suse.com/show_bug.cgi?id=1244871
* https://bugzilla.suse.com/show_bug.cgi?id=1244872
* https://bugzilla.suse.com/show_bug.cgi?id=1244873
* https://bugzilla.suse.com/show_bug.cgi?id=1244875
* https://bugzilla.suse.com/show_bug.cgi?id=1244876
* https://bugzilla.suse.com/show_bug.cgi?id=1244878
* https://bugzilla.suse.com/show_bug.cgi?id=1244879
* https://bugzilla.suse.com/show_bug.cgi?id=1244881
* https://bugzilla.suse.com/show_bug.cgi?id=1244883
* https://bugzilla.suse.com/show_bug.cgi?id=1244884
* https://bugzilla.suse.com/show_bug.cgi?id=1244886
* https://bugzilla.suse.com/show_bug.cgi?id=1244887
* https://bugzilla.suse.com/show_bug.cgi?id=1244888
* https://bugzilla.suse.com/show_bug.cgi?id=1244890
* https://bugzilla.suse.com/show_bug.cgi?id=1244892
* https://bugzilla.suse.com/show_bug.cgi?id=1244893
* https://bugzilla.suse.com/show_bug.cgi?id=1244895
* https://bugzilla.suse.com/show_bug.cgi?id=1244898
* https://bugzilla.suse.com/show_bug.cgi?id=1244899
* https://bugzilla.suse.com/show_bug.cgi?id=1244900
* https://bugzilla.suse.com/show_bug.cgi?id=1244901
* https://bugzilla.suse.com/show_bug.cgi?id=1244902
* https://bugzilla.suse.com/show_bug.cgi?id=1244903
* https://bugzilla.suse.com/show_bug.cgi?id=1244904
* https://bugzilla.suse.com/show_bug.cgi?id=1244905
* https://bugzilla.suse.com/show_bug.cgi?id=1244908
* https://bugzilla.suse.com/show_bug.cgi?id=1244911
* https://bugzilla.suse.com/show_bug.cgi?id=1244912
* https://bugzilla.suse.com/show_bug.cgi?id=1244914
* https://bugzilla.suse.com/show_bug.cgi?id=1244915
* https://bugzilla.suse.com/show_bug.cgi?id=1244928
* https://bugzilla.suse.com/show_bug.cgi?id=1244936
* https://bugzilla.suse.com/show_bug.cgi?id=1244940
* https://bugzilla.suse.com/show_bug.cgi?id=1244941
* https://bugzilla.suse.com/show_bug.cgi?id=1244942
* https://bugzilla.suse.com/show_bug.cgi?id=1244943
* https://bugzilla.suse.com/show_bug.cgi?id=1244944
* https://bugzilla.suse.com/show_bug.cgi?id=1244945
* https://bugzilla.suse.com/show_bug.cgi?id=1244948
* https://bugzilla.suse.com/show_bug.cgi?id=1244949
* https://bugzilla.suse.com/show_bug.cgi?id=1244950
* https://bugzilla.suse.com/show_bug.cgi?id=1244953
* https://bugzilla.suse.com/show_bug.cgi?id=1244955
* https://bugzilla.suse.com/show_bug.cgi?id=1244956
* https://bugzilla.suse.com/show_bug.cgi?id=1244957
* https://bugzilla.suse.com/show_bug.cgi?id=1244958
* https://bugzilla.suse.com/show_bug.cgi?id=1244959
* https://bugzilla.suse.com/show_bug.cgi?id=1244960
* https://bugzilla.suse.com/show_bug.cgi?id=1244961
* https://bugzilla.suse.com/show_bug.cgi?id=1244965
* https://bugzilla.suse.com/show_bug.cgi?id=1244966
* https://bugzilla.suse.com/show_bug.cgi?id=1244967
* https://bugzilla.suse.com/show_bug.cgi?id=1244968
* https://bugzilla.suse.com/show_bug.cgi?id=1244969
* https://bugzilla.suse.com/show_bug.cgi?id=1244970
* https://bugzilla.suse.com/show_bug.cgi?id=1244973
* https://bugzilla.suse.com/show_bug.cgi?id=1244974
* https://bugzilla.suse.com/show_bug.cgi?id=1244976
* https://bugzilla.suse.com/show_bug.cgi?id=1244977
* https://bugzilla.suse.com/show_bug.cgi?id=1244978
* https://bugzilla.suse.com/show_bug.cgi?id=1244979
* https://bugzilla.suse.com/show_bug.cgi?id=1244983
* https://bugzilla.suse.com/show_bug.cgi?id=1244984
* https://bugzilla.suse.com/show_bug.cgi?id=1244985
* https://bugzilla.suse.com/show_bug.cgi?id=1244986
* https://bugzilla.suse.com/show_bug.cgi?id=1244987
* https://bugzilla.suse.com/show_bug.cgi?id=1244991
* https://bugzilla.suse.com/show_bug.cgi?id=1244992
* https://bugzilla.suse.com/show_bug.cgi?id=1244993
* https://bugzilla.suse.com/show_bug.cgi?id=1245006
* https://bugzilla.suse.com/show_bug.cgi?id=1245007
* https://bugzilla.suse.com/show_bug.cgi?id=1245009
* https://bugzilla.suse.com/show_bug.cgi?id=1245011
* https://bugzilla.suse.com/show_bug.cgi?id=1245012
* https://bugzilla.suse.com/show_bug.cgi?id=1245015
* https://bugzilla.suse.com/show_bug.cgi?id=1245018
* https://bugzilla.suse.com/show_bug.cgi?id=1245019
* https://bugzilla.suse.com/show_bug.cgi?id=1245023
* https://bugzilla.suse.com/show_bug.cgi?id=1245024
* https://bugzilla.suse.com/show_bug.cgi?id=1245028
* https://bugzilla.suse.com/show_bug.cgi?id=1245031
* https://bugzilla.suse.com/show_bug.cgi?id=1245032
* https://bugzilla.suse.com/show_bug.cgi?id=1245033
* https://bugzilla.suse.com/show_bug.cgi?id=1245038
* https://bugzilla.suse.com/show_bug.cgi?id=1245039
* https://bugzilla.suse.com/show_bug.cgi?id=1245040
* https://bugzilla.suse.com/show_bug.cgi?id=1245041
* https://bugzilla.suse.com/show_bug.cgi?id=1245047
* https://bugzilla.suse.com/show_bug.cgi?id=1245048
* https://bugzilla.suse.com/show_bug.cgi?id=1245051
* https://bugzilla.suse.com/show_bug.cgi?id=1245052
* https://bugzilla.suse.com/show_bug.cgi?id=1245057
* https://bugzilla.suse.com/show_bug.cgi?id=1245058
* https://bugzilla.suse.com/show_bug.cgi?id=1245060
* https://bugzilla.suse.com/show_bug.cgi?id=1245062
* https://bugzilla.suse.com/show_bug.cgi?id=1245063
* https://bugzilla.suse.com/show_bug.cgi?id=1245064
* https://bugzilla.suse.com/show_bug.cgi?id=1245069
* https://bugzilla.suse.com/show_bug.cgi?id=1245070
* https://bugzilla.suse.com/show_bug.cgi?id=1245072
* https://bugzilla.suse.com/show_bug.cgi?id=1245073
* https://bugzilla.suse.com/show_bug.cgi?id=1245088
* https://bugzilla.suse.com/show_bug.cgi?id=1245089
* https://bugzilla.suse.com/show_bug.cgi?id=1245092
* https://bugzilla.suse.com/show_bug.cgi?id=1245093
* https://bugzilla.suse.com/show_bug.cgi?id=1245094
* https://bugzilla.suse.com/show_bug.cgi?id=1245098
* https://bugzilla.suse.com/show_bug.cgi?id=1245103
* https://bugzilla.suse.com/show_bug.cgi?id=1245116
* https://bugzilla.suse.com/show_bug.cgi?id=1245117
* https://bugzilla.suse.com/show_bug.cgi?id=1245118
* https://bugzilla.suse.com/show_bug.cgi?id=1245119
* https://bugzilla.suse.com/show_bug.cgi?id=1245121
* https://bugzilla.suse.com/show_bug.cgi?id=1245122
* https://bugzilla.suse.com/show_bug.cgi?id=1245125
* https://bugzilla.suse.com/show_bug.cgi?id=1245129
* https://bugzilla.suse.com/show_bug.cgi?id=1245131
* https://bugzilla.suse.com/show_bug.cgi?id=1245133
* https://bugzilla.suse.com/show_bug.cgi?id=1245134
* https://bugzilla.suse.com/show_bug.cgi?id=1245135
* https://bugzilla.suse.com/show_bug.cgi?id=1245136
* https://bugzilla.suse.com/show_bug.cgi?id=1245138
* https://bugzilla.suse.com/show_bug.cgi?id=1245139
* https://bugzilla.suse.com/show_bug.cgi?id=1245140
* https://bugzilla.suse.com/show_bug.cgi?id=1245142
* https://bugzilla.suse.com/show_bug.cgi?id=1245146
* https://bugzilla.suse.com/show_bug.cgi?id=1245147
* https://bugzilla.suse.com/show_bug.cgi?id=1245149
* https://bugzilla.suse.com/show_bug.cgi?id=1245152
* https://bugzilla.suse.com/show_bug.cgi?id=1245154
* https://bugzilla.suse.com/show_bug.cgi?id=1245155
* https://bugzilla.suse.com/show_bug.cgi?id=1245180
* https://bugzilla.suse.com/show_bug.cgi?id=1245183
* https://bugzilla.suse.com/show_bug.cgi?id=1245189
* https://bugzilla.suse.com/show_bug.cgi?id=1245191
* https://bugzilla.suse.com/show_bug.cgi?id=1245195
* https://bugzilla.suse.com/show_bug.cgi?id=1245197
* https://bugzilla.suse.com/show_bug.cgi?id=1245265
* https://bugzilla.suse.com/show_bug.cgi?id=1245340
* https://bugzilla.suse.com/show_bug.cgi?id=1245348
* https://bugzilla.suse.com/show_bug.cgi?id=1245431
* https://bugzilla.suse.com/show_bug.cgi?id=1245455



openSUSE-SU-2025:15326-1: moderate: chmlib-devel-0.40-26.1 on GA media


# chmlib-devel-0.40-26.1 on GA media

Announcement ID: openSUSE-SU-2025:15326-1
Rating: moderate

Cross-References:

* CVE-2025-48172

CVSS scores:

* CVE-2025-48172 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-48172 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the chmlib-devel-0.40-26.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* chmlib-devel 0.40-26.1
* chmlib-examples 0.40-26.1
* libchm0 0.40-26.1

## References:

* https://www.suse.com/security/cve/CVE-2025-48172.html



openSUSE-SU-2025:15329-1: moderate: go1.24-1.24.5-1.1 on GA media


# go1.24-1.24.5-1.1 on GA media

Announcement ID: openSUSE-SU-2025:15329-1
Rating: moderate

Cross-References:

* CVE-2025-4674

CVSS scores:

* CVE-2025-4674 ( SUSE ): 8.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
* CVE-2025-4674 ( SUSE ): 9.3 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the go1.24-1.24.5-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* go1.24 1.24.5-1.1
* go1.24-doc 1.24.5-1.1
* go1.24-libstd 1.24.5-1.1
* go1.24-race 1.24.5-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-4674.html



openSUSE-SU-2025:15325-1: moderate: MozillaFirefox-140.0.2-1.1 on GA media


# MozillaFirefox-140.0.2-1.1 on GA media

Announcement ID: openSUSE-SU-2025:15325-1
Rating: moderate

Cross-References:

* CVE-2025-6424
* CVE-2025-6425
* CVE-2025-6426
* CVE-2025-6427
* CVE-2025-6428
* CVE-2025-6429
* CVE-2025-6430
* CVE-2025-6431
* CVE-2025-6432
* CVE-2025-6433
* CVE-2025-6434
* CVE-2025-6435
* CVE-2025-6436

CVSS scores:

* CVE-2025-6424 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-6424 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-6425 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2025-6425 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-6426 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L
* CVE-2025-6426 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L
* CVE-2025-6427 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2025-6427 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-6428 ( SUSE ): 8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
* CVE-2025-6428 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N
* CVE-2025-6429 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2025-6429 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-6430 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2025-6430 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-6431 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L
* CVE-2025-6431 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L
* CVE-2025-6432 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2025-6432 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-6433 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2025-6433 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-6434 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2025-6434 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-6435 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-6435 ( SUSE ): 7.5 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-6436 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-6436 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 13 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the MozillaFirefox-140.0.2-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* MozillaFirefox 140.0.2-1.1
* MozillaFirefox-branding-upstream 140.0.2-1.1
* MozillaFirefox-devel 140.0.2-1.1
* MozillaFirefox-translations-common 140.0.2-1.1
* MozillaFirefox-translations-other 140.0.2-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-6424.html
* https://www.suse.com/security/cve/CVE-2025-6425.html
* https://www.suse.com/security/cve/CVE-2025-6426.html
* https://www.suse.com/security/cve/CVE-2025-6427.html
* https://www.suse.com/security/cve/CVE-2025-6428.html
* https://www.suse.com/security/cve/CVE-2025-6429.html
* https://www.suse.com/security/cve/CVE-2025-6430.html
* https://www.suse.com/security/cve/CVE-2025-6431.html
* https://www.suse.com/security/cve/CVE-2025-6432.html
* https://www.suse.com/security/cve/CVE-2025-6433.html
* https://www.suse.com/security/cve/CVE-2025-6434.html
* https://www.suse.com/security/cve/CVE-2025-6435.html
* https://www.suse.com/security/cve/CVE-2025-6436.html



SUSE-SU-2025:02276-1: low: Security update for libsoup


# Security update for libsoup

Announcement ID: SUSE-SU-2025:02276-1
Release Date: 2025-07-10T14:35:16Z
Rating: low
References:

* bsc#1243314

Cross-References:

* CVE-2025-4945

CVSS scores:

* CVE-2025-4945 ( SUSE ): 2.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-4945 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-4945 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Affected Products:

* Basesystem Module 15-SP6
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for libsoup fixes the following issues:

* CVE-2025-4945: Add value checks for date/time parsing (bsc#1243314).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-2276=1 SUSE-2025-2276=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2276=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2276=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libsoup-devel-3.4.4-150600.3.13.1
* libsoup-debugsource-3.4.4-150600.3.13.1
* libsoup-3_0-0-3.4.4-150600.3.13.1
* typelib-1_0-Soup-3_0-3.4.4-150600.3.13.1
* libsoup-3_0-0-debuginfo-3.4.4-150600.3.13.1
* openSUSE Leap 15.6 (x86_64)
* libsoup-3_0-0-32bit-3.4.4-150600.3.13.1
* libsoup-3_0-0-32bit-debuginfo-3.4.4-150600.3.13.1
* libsoup-devel-32bit-3.4.4-150600.3.13.1
* openSUSE Leap 15.6 (noarch)
* libsoup-lang-3.4.4-150600.3.13.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libsoup-devel-64bit-3.4.4-150600.3.13.1
* libsoup-3_0-0-64bit-3.4.4-150600.3.13.1
* libsoup-3_0-0-64bit-debuginfo-3.4.4-150600.3.13.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libsoup-devel-3.4.4-150600.3.13.1
* libsoup-debugsource-3.4.4-150600.3.13.1
* libsoup-3_0-0-3.4.4-150600.3.13.1
* typelib-1_0-Soup-3_0-3.4.4-150600.3.13.1
* libsoup-3_0-0-debuginfo-3.4.4-150600.3.13.1
* Basesystem Module 15-SP6 (noarch)
* libsoup-lang-3.4.4-150600.3.13.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libsoup-devel-3.4.4-150600.3.13.1
* libsoup-debugsource-3.4.4-150600.3.13.1
* libsoup-3_0-0-3.4.4-150600.3.13.1
* typelib-1_0-Soup-3_0-3.4.4-150600.3.13.1
* libsoup-3_0-0-debuginfo-3.4.4-150600.3.13.1
* Basesystem Module 15-SP7 (noarch)
* libsoup-lang-3.4.4-150600.3.13.1

## References:

* https://www.suse.com/security/cve/CVE-2025-4945.html
* https://bugzilla.suse.com/show_bug.cgi?id=1243314



SUSE-SU-2025:02275-1: important: Security update for libxml2


# Security update for libxml2

Announcement ID: SUSE-SU-2025:02275-1
Release Date: 2025-07-10T14:34:25Z
Rating: important
References:

* bsc#1244554
* bsc#1244557
* bsc#1244590
* bsc#1244700

Cross-References:

* CVE-2025-49794
* CVE-2025-49796
* CVE-2025-6021
* CVE-2025-6170

CVSS scores:

* CVE-2025-49794 ( SUSE ): 8.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-49794 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-49794 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-49796 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-49796 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-6021 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-6021 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-6021 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-6170 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-6170 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2025-6170 ( NVD ): 2.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L

Affected Products:

* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP3

An update that solves four vulnerabilities can now be installed.

## Description:

This update for libxml2 fixes the following issues:

* CVE-2025-49794: Fixed a heap use after free which could lead to denial of
service. (bsc#1244554)
* CVE-2025-49796: Fixed type confusion which could lead to denial of service.
(bsc#1244557)
* CVE-2025-6170: Fixed a stack buffer overflow which could lead to a crash.
(bsc#1244700)
* CVE-2025-6021: Fixed an integer overflow in xmlBuildQName() which could lead
to stack buffer overflow. (bsc#1244590)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-2275=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2275=1

* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2275=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2275=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2025-2275=1

* SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-2275=1

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2275=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2275=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python3-libxml2-python-debuginfo-2.9.7-150000.3.82.1
* python-libxml2-python-debugsource-2.9.7-150000.3.82.1
* python3-libxml2-python-2.9.7-150000.3.82.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* libxml2-devel-2.9.7-150000.3.82.1
* python3-libxml2-python-2.9.7-150000.3.82.1
* libxml2-tools-debuginfo-2.9.7-150000.3.82.1
* libxml2-2-debuginfo-2.9.7-150000.3.82.1
* python-libxml2-python-debugsource-2.9.7-150000.3.82.1
* libxml2-tools-2.9.7-150000.3.82.1
* libxml2-debugsource-2.9.7-150000.3.82.1
* libxml2-2-2.9.7-150000.3.82.1
* python3-libxml2-python-debuginfo-2.9.7-150000.3.82.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64)
* libxml2-2-32bit-debuginfo-2.9.7-150000.3.82.1
* libxml2-2-32bit-2.9.7-150000.3.82.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* libxml2-devel-2.9.7-150000.3.82.1
* python3-libxml2-python-2.9.7-150000.3.82.1
* libxml2-tools-debuginfo-2.9.7-150000.3.82.1
* libxml2-2-debuginfo-2.9.7-150000.3.82.1
* python-libxml2-python-debugsource-2.9.7-150000.3.82.1
* libxml2-tools-2.9.7-150000.3.82.1
* libxml2-debugsource-2.9.7-150000.3.82.1
* libxml2-2-2.9.7-150000.3.82.1
* python3-libxml2-python-debuginfo-2.9.7-150000.3.82.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64)
* libxml2-2-32bit-debuginfo-2.9.7-150000.3.82.1
* libxml2-2-32bit-2.9.7-150000.3.82.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* libxml2-devel-2.9.7-150000.3.82.1
* python3-libxml2-python-2.9.7-150000.3.82.1
* libxml2-tools-debuginfo-2.9.7-150000.3.82.1
* libxml2-2-debuginfo-2.9.7-150000.3.82.1
* python-libxml2-python-debugsource-2.9.7-150000.3.82.1
* libxml2-tools-2.9.7-150000.3.82.1
* libxml2-debugsource-2.9.7-150000.3.82.1
* libxml2-2-2.9.7-150000.3.82.1
* python3-libxml2-python-debuginfo-2.9.7-150000.3.82.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64)
* libxml2-2-32bit-debuginfo-2.9.7-150000.3.82.1
* libxml2-2-32bit-2.9.7-150000.3.82.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* libxml2-devel-2.9.7-150000.3.82.1
* python3-libxml2-python-2.9.7-150000.3.82.1
* libxml2-tools-debuginfo-2.9.7-150000.3.82.1
* libxml2-2-debuginfo-2.9.7-150000.3.82.1
* python-libxml2-python-debugsource-2.9.7-150000.3.82.1
* libxml2-tools-2.9.7-150000.3.82.1
* libxml2-debugsource-2.9.7-150000.3.82.1
* libxml2-2-2.9.7-150000.3.82.1
* python3-libxml2-python-debuginfo-2.9.7-150000.3.82.1
* SUSE Enterprise Storage 7.1 (x86_64)
* libxml2-2-32bit-debuginfo-2.9.7-150000.3.82.1
* libxml2-2-32bit-2.9.7-150000.3.82.1
* SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
* libxml2-tools-debuginfo-2.9.7-150000.3.82.1
* libxml2-2-debuginfo-2.9.7-150000.3.82.1
* libxml2-tools-2.9.7-150000.3.82.1
* libxml2-debugsource-2.9.7-150000.3.82.1
* libxml2-2-2.9.7-150000.3.82.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* python3-libxml2-python-2.9.7-150000.3.82.1
* libxml2-tools-debuginfo-2.9.7-150000.3.82.1
* libxml2-2-debuginfo-2.9.7-150000.3.82.1
* python-libxml2-python-debugsource-2.9.7-150000.3.82.1
* libxml2-tools-2.9.7-150000.3.82.1
* libxml2-debugsource-2.9.7-150000.3.82.1
* libxml2-2-2.9.7-150000.3.82.1
* python3-libxml2-python-debuginfo-2.9.7-150000.3.82.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* python3-libxml2-python-2.9.7-150000.3.82.1
* libxml2-tools-debuginfo-2.9.7-150000.3.82.1
* libxml2-2-debuginfo-2.9.7-150000.3.82.1
* python-libxml2-python-debugsource-2.9.7-150000.3.82.1
* libxml2-tools-2.9.7-150000.3.82.1
* libxml2-debugsource-2.9.7-150000.3.82.1
* libxml2-2-2.9.7-150000.3.82.1
* python3-libxml2-python-debuginfo-2.9.7-150000.3.82.1

## References:

* https://www.suse.com/security/cve/CVE-2025-49794.html
* https://www.suse.com/security/cve/CVE-2025-49796.html
* https://www.suse.com/security/cve/CVE-2025-6021.html
* https://www.suse.com/security/cve/CVE-2025-6170.html
* https://bugzilla.suse.com/show_bug.cgi?id=1244554
* https://bugzilla.suse.com/show_bug.cgi?id=1244557
* https://bugzilla.suse.com/show_bug.cgi?id=1244590
* https://bugzilla.suse.com/show_bug.cgi?id=1244700



SUSE-SU-2025:02277-1: low: Security update for libsoup2


# Security update for libsoup2

Announcement ID: SUSE-SU-2025:02277-1
Release Date: 2025-07-10T14:35:35Z
Rating: low
References:

* bsc#1243314

Cross-References:

* CVE-2025-4945

CVSS scores:

* CVE-2025-4945 ( SUSE ): 2.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-4945 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-4945 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Affected Products:

* Basesystem Module 15-SP6
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for libsoup2 fixes the following issues:

* CVE-2025-4945: Add value checks for date/time parsing (bsc#1243314).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-2277=1 openSUSE-SLE-15.6-2025-2277=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2277=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2277=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.12.1
* libsoup-2_4-1-2.74.3-150600.4.12.1
* libsoup2-debugsource-2.74.3-150600.4.12.1
* libsoup2-devel-2.74.3-150600.4.12.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.12.1
* openSUSE Leap 15.6 (x86_64)
* libsoup2-devel-32bit-2.74.3-150600.4.12.1
* libsoup-2_4-1-32bit-debuginfo-2.74.3-150600.4.12.1
* libsoup-2_4-1-32bit-2.74.3-150600.4.12.1
* openSUSE Leap 15.6 (noarch)
* libsoup2-lang-2.74.3-150600.4.12.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libsoup-2_4-1-64bit-debuginfo-2.74.3-150600.4.12.1
* libsoup2-devel-64bit-2.74.3-150600.4.12.1
* libsoup-2_4-1-64bit-2.74.3-150600.4.12.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.12.1
* libsoup-2_4-1-2.74.3-150600.4.12.1
* libsoup2-debugsource-2.74.3-150600.4.12.1
* libsoup2-devel-2.74.3-150600.4.12.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.12.1
* Basesystem Module 15-SP6 (noarch)
* libsoup2-lang-2.74.3-150600.4.12.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.12.1
* libsoup-2_4-1-2.74.3-150600.4.12.1
* libsoup2-debugsource-2.74.3-150600.4.12.1
* libsoup2-devel-2.74.3-150600.4.12.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.12.1
* Basesystem Module 15-SP7 (noarch)
* libsoup2-lang-2.74.3-150600.4.12.1

## References:

* https://www.suse.com/security/cve/CVE-2025-4945.html
* https://bugzilla.suse.com/show_bug.cgi?id=1243314



SUSE-SU-2025:02278-1: important: Security update for libssh


# Security update for libssh

Announcement ID: SUSE-SU-2025:02278-1
Release Date: 2025-07-10T16:02:59Z
Rating: important
References:

* bsc#1245309
* bsc#1245310
* bsc#1245311
* bsc#1245314

Cross-References:

* CVE-2025-4877
* CVE-2025-4878
* CVE-2025-5318
* CVE-2025-5372

CVSS scores:

* CVE-2025-4877 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-4877 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-4878 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-4878 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2025-5318 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-5318 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2025-5318 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2025-5372 ( SUSE ): 7.6
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2025-5372 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
* CVE-2025-5372 ( NVD ): 5.0 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves four vulnerabilities can now be installed.

## Description:

This update for libssh fixes the following issues:

* CVE-2025-4877: Fixed write beyond bounds in binary to base64 conversion
functions (bsc#1245309).
* CVE-2025-4878: Fixed use of uninitialized variable in privatekey_from_file()
(bsc#1245310).
* CVE-2025-5318: Fixed likely read beyond bounds in sftp server handle
management (bsc#1245311).
* CVE-2025-5372: Fixed ssh_kdf() returns a success code on certain failures
(bsc#1245314).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-2278=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-2278=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-2278=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-2278=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-2278=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-2278=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2278=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2278=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2278=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2278=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2278=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2278=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2278=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2278=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-2278=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2025-2278=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-2278=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libssh4-debuginfo-0.9.8-150400.3.9.1
* libssh4-0.9.8-150400.3.9.1
* libssh-devel-0.9.8-150400.3.9.1
* libssh-config-0.9.8-150400.3.9.1
* libssh-debugsource-0.9.8-150400.3.9.1
* openSUSE Leap 15.4 (x86_64)
* libssh4-32bit-debuginfo-0.9.8-150400.3.9.1
* libssh4-32bit-0.9.8-150400.3.9.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libssh4-64bit-0.9.8-150400.3.9.1
* libssh4-64bit-debuginfo-0.9.8-150400.3.9.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libssh-debugsource-0.9.8-150400.3.9.1
* libssh4-debuginfo-0.9.8-150400.3.9.1
* libssh4-0.9.8-150400.3.9.1
* libssh-config-0.9.8-150400.3.9.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libssh-debugsource-0.9.8-150400.3.9.1
* libssh4-debuginfo-0.9.8-150400.3.9.1
* libssh4-0.9.8-150400.3.9.1
* libssh-config-0.9.8-150400.3.9.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libssh-debugsource-0.9.8-150400.3.9.1
* libssh4-debuginfo-0.9.8-150400.3.9.1
* libssh4-0.9.8-150400.3.9.1
* libssh-config-0.9.8-150400.3.9.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libssh-debugsource-0.9.8-150400.3.9.1
* libssh4-debuginfo-0.9.8-150400.3.9.1
* libssh4-0.9.8-150400.3.9.1
* libssh-config-0.9.8-150400.3.9.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libssh-debugsource-0.9.8-150400.3.9.1
* libssh4-debuginfo-0.9.8-150400.3.9.1
* libssh4-0.9.8-150400.3.9.1
* libssh-config-0.9.8-150400.3.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libssh4-debuginfo-0.9.8-150400.3.9.1
* libssh4-0.9.8-150400.3.9.1
* libssh-devel-0.9.8-150400.3.9.1
* libssh-config-0.9.8-150400.3.9.1
* libssh-debugsource-0.9.8-150400.3.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libssh4-32bit-debuginfo-0.9.8-150400.3.9.1
* libssh4-32bit-0.9.8-150400.3.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libssh4-debuginfo-0.9.8-150400.3.9.1
* libssh4-0.9.8-150400.3.9.1
* libssh-devel-0.9.8-150400.3.9.1
* libssh-config-0.9.8-150400.3.9.1
* libssh-debugsource-0.9.8-150400.3.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libssh4-32bit-debuginfo-0.9.8-150400.3.9.1
* libssh4-32bit-0.9.8-150400.3.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libssh4-debuginfo-0.9.8-150400.3.9.1
* libssh4-0.9.8-150400.3.9.1
* libssh-devel-0.9.8-150400.3.9.1
* libssh-config-0.9.8-150400.3.9.1
* libssh-debugsource-0.9.8-150400.3.9.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64)
* libssh4-32bit-debuginfo-0.9.8-150400.3.9.1
* libssh4-32bit-0.9.8-150400.3.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libssh4-debuginfo-0.9.8-150400.3.9.1
* libssh4-0.9.8-150400.3.9.1
* libssh-devel-0.9.8-150400.3.9.1
* libssh-config-0.9.8-150400.3.9.1
* libssh-debugsource-0.9.8-150400.3.9.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64)
* libssh4-32bit-debuginfo-0.9.8-150400.3.9.1
* libssh4-32bit-0.9.8-150400.3.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libssh4-debuginfo-0.9.8-150400.3.9.1
* libssh4-0.9.8-150400.3.9.1
* libssh-devel-0.9.8-150400.3.9.1
* libssh-config-0.9.8-150400.3.9.1
* libssh-debugsource-0.9.8-150400.3.9.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* libssh4-32bit-debuginfo-0.9.8-150400.3.9.1
* libssh4-32bit-0.9.8-150400.3.9.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libssh4-debuginfo-0.9.8-150400.3.9.1
* libssh4-0.9.8-150400.3.9.1
* libssh-devel-0.9.8-150400.3.9.1
* libssh-config-0.9.8-150400.3.9.1
* libssh-debugsource-0.9.8-150400.3.9.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64)
* libssh4-32bit-debuginfo-0.9.8-150400.3.9.1
* libssh4-32bit-0.9.8-150400.3.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libssh4-debuginfo-0.9.8-150400.3.9.1
* libssh4-0.9.8-150400.3.9.1
* libssh-devel-0.9.8-150400.3.9.1
* libssh-config-0.9.8-150400.3.9.1
* libssh-debugsource-0.9.8-150400.3.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libssh4-32bit-debuginfo-0.9.8-150400.3.9.1
* libssh4-32bit-0.9.8-150400.3.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libssh4-debuginfo-0.9.8-150400.3.9.1
* libssh4-0.9.8-150400.3.9.1
* libssh-devel-0.9.8-150400.3.9.1
* libssh-config-0.9.8-150400.3.9.1
* libssh-debugsource-0.9.8-150400.3.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* libssh4-32bit-debuginfo-0.9.8-150400.3.9.1
* libssh4-32bit-0.9.8-150400.3.9.1
* SUSE Manager Proxy 4.3 (x86_64)
* libssh4-32bit-debuginfo-0.9.8-150400.3.9.1
* libssh4-debuginfo-0.9.8-150400.3.9.1
* libssh4-0.9.8-150400.3.9.1
* libssh-devel-0.9.8-150400.3.9.1
* libssh4-32bit-0.9.8-150400.3.9.1
* libssh-config-0.9.8-150400.3.9.1
* libssh-debugsource-0.9.8-150400.3.9.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libssh4-32bit-debuginfo-0.9.8-150400.3.9.1
* libssh4-debuginfo-0.9.8-150400.3.9.1
* libssh4-0.9.8-150400.3.9.1
* libssh-devel-0.9.8-150400.3.9.1
* libssh4-32bit-0.9.8-150400.3.9.1
* libssh-config-0.9.8-150400.3.9.1
* libssh-debugsource-0.9.8-150400.3.9.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libssh4-debuginfo-0.9.8-150400.3.9.1
* libssh4-0.9.8-150400.3.9.1
* libssh-devel-0.9.8-150400.3.9.1
* libssh-config-0.9.8-150400.3.9.1
* libssh-debugsource-0.9.8-150400.3.9.1
* SUSE Manager Server 4.3 (x86_64)
* libssh4-32bit-debuginfo-0.9.8-150400.3.9.1
* libssh4-32bit-0.9.8-150400.3.9.1

## References:

* https://www.suse.com/security/cve/CVE-2025-4877.html
* https://www.suse.com/security/cve/CVE-2025-4878.html
* https://www.suse.com/security/cve/CVE-2025-5318.html
* https://www.suse.com/security/cve/CVE-2025-5372.html
* https://bugzilla.suse.com/show_bug.cgi?id=1245309
* https://bugzilla.suse.com/show_bug.cgi?id=1245310
* https://bugzilla.suse.com/show_bug.cgi?id=1245311
* https://bugzilla.suse.com/show_bug.cgi?id=1245314



SUSE-SU-2025:02280-1: important: Security update for tomcat


# Security update for tomcat

Announcement ID: SUSE-SU-2025:02280-1
Release Date: 2025-07-10T16:05:23Z
Rating: important
References:

* bsc#1242722
* bsc#1243815
* bsc#1244649
* bsc#1244656

Cross-References:

* CVE-2025-46701
* CVE-2025-48988
* CVE-2025-49125

CVSS scores:

* CVE-2025-46701 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-46701 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2025-46701 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-48988 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-48988 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-48988 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-49125 ( SUSE ): 9.1
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-49125 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-49125 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Manager Server 4.3
* Web and Scripting Module 15-SP6
* Web and Scripting Module 15-SP7

An update that solves three vulnerabilities and has one security fix can now be
installed.

## Description:

This update for tomcat fixes the following issues:

* CVE-2025-46701: Fixed refactor CGI servlet to access resources via
WebResources (bsc#1243815).
* CVE-2025-48988: Fixed limits the total number of parts in a multi-part
request and limits the size of the headers provided with each part
(bsc#1244656).
* CVE-2025-49125: Fixed expand checks for webAppMount (bsc#1244649).

Other bugfixes:

* Made permissions more secure (bsc#1242722)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-2280=1

* Web and Scripting Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2025-2280=1

* Web and Scripting Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP7-2025-2280=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2280=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2280=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2280=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2280=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2280=1

* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2280=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2280=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2280=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2280=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2280=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2280=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-2280=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2025-2280=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* tomcat-lib-9.0.106-150200.86.1
* tomcat-jsp-2_3-api-9.0.106-150200.86.1
* tomcat-9.0.106-150200.86.1
* tomcat-webapps-9.0.106-150200.86.1
* tomcat-el-3_0-api-9.0.106-150200.86.1
* tomcat-admin-webapps-9.0.106-150200.86.1
* tomcat-embed-9.0.106-150200.86.1
* tomcat-javadoc-9.0.106-150200.86.1
* tomcat-servlet-4_0-api-9.0.106-150200.86.1
* tomcat-docs-webapp-9.0.106-150200.86.1
* tomcat-jsvc-9.0.106-150200.86.1
* Web and Scripting Module 15-SP6 (noarch)
* tomcat-lib-9.0.106-150200.86.1
* tomcat-jsp-2_3-api-9.0.106-150200.86.1
* tomcat-9.0.106-150200.86.1
* tomcat-webapps-9.0.106-150200.86.1
* tomcat-el-3_0-api-9.0.106-150200.86.1
* tomcat-admin-webapps-9.0.106-150200.86.1
* tomcat-servlet-4_0-api-9.0.106-150200.86.1
* Web and Scripting Module 15-SP7 (noarch)
* tomcat-lib-9.0.106-150200.86.1
* tomcat-jsp-2_3-api-9.0.106-150200.86.1
* tomcat-9.0.106-150200.86.1
* tomcat-webapps-9.0.106-150200.86.1
* tomcat-el-3_0-api-9.0.106-150200.86.1
* tomcat-admin-webapps-9.0.106-150200.86.1
* tomcat-servlet-4_0-api-9.0.106-150200.86.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* tomcat-lib-9.0.106-150200.86.1
* tomcat-jsp-2_3-api-9.0.106-150200.86.1
* tomcat-9.0.106-150200.86.1
* tomcat-webapps-9.0.106-150200.86.1
* tomcat-el-3_0-api-9.0.106-150200.86.1
* tomcat-admin-webapps-9.0.106-150200.86.1
* tomcat-servlet-4_0-api-9.0.106-150200.86.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* tomcat-lib-9.0.106-150200.86.1
* tomcat-jsp-2_3-api-9.0.106-150200.86.1
* tomcat-9.0.106-150200.86.1
* tomcat-webapps-9.0.106-150200.86.1
* tomcat-el-3_0-api-9.0.106-150200.86.1
* tomcat-admin-webapps-9.0.106-150200.86.1
* tomcat-servlet-4_0-api-9.0.106-150200.86.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* tomcat-lib-9.0.106-150200.86.1
* tomcat-jsp-2_3-api-9.0.106-150200.86.1
* tomcat-9.0.106-150200.86.1
* tomcat-webapps-9.0.106-150200.86.1
* tomcat-el-3_0-api-9.0.106-150200.86.1
* tomcat-admin-webapps-9.0.106-150200.86.1
* tomcat-servlet-4_0-api-9.0.106-150200.86.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* tomcat-lib-9.0.106-150200.86.1
* tomcat-jsp-2_3-api-9.0.106-150200.86.1
* tomcat-9.0.106-150200.86.1
* tomcat-webapps-9.0.106-150200.86.1
* tomcat-el-3_0-api-9.0.106-150200.86.1
* tomcat-admin-webapps-9.0.106-150200.86.1
* tomcat-servlet-4_0-api-9.0.106-150200.86.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* tomcat-lib-9.0.106-150200.86.1
* tomcat-jsp-2_3-api-9.0.106-150200.86.1
* tomcat-9.0.106-150200.86.1
* tomcat-webapps-9.0.106-150200.86.1
* tomcat-el-3_0-api-9.0.106-150200.86.1
* tomcat-admin-webapps-9.0.106-150200.86.1
* tomcat-servlet-4_0-api-9.0.106-150200.86.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (noarch)
* tomcat-lib-9.0.106-150200.86.1
* tomcat-jsp-2_3-api-9.0.106-150200.86.1
* tomcat-9.0.106-150200.86.1
* tomcat-webapps-9.0.106-150200.86.1
* tomcat-el-3_0-api-9.0.106-150200.86.1
* tomcat-admin-webapps-9.0.106-150200.86.1
* tomcat-servlet-4_0-api-9.0.106-150200.86.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* tomcat-lib-9.0.106-150200.86.1
* tomcat-jsp-2_3-api-9.0.106-150200.86.1
* tomcat-9.0.106-150200.86.1
* tomcat-webapps-9.0.106-150200.86.1
* tomcat-el-3_0-api-9.0.106-150200.86.1
* tomcat-admin-webapps-9.0.106-150200.86.1
* tomcat-servlet-4_0-api-9.0.106-150200.86.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* tomcat-lib-9.0.106-150200.86.1
* tomcat-jsp-2_3-api-9.0.106-150200.86.1
* tomcat-9.0.106-150200.86.1
* tomcat-webapps-9.0.106-150200.86.1
* tomcat-el-3_0-api-9.0.106-150200.86.1
* tomcat-admin-webapps-9.0.106-150200.86.1
* tomcat-servlet-4_0-api-9.0.106-150200.86.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* tomcat-lib-9.0.106-150200.86.1
* tomcat-jsp-2_3-api-9.0.106-150200.86.1
* tomcat-9.0.106-150200.86.1
* tomcat-webapps-9.0.106-150200.86.1
* tomcat-el-3_0-api-9.0.106-150200.86.1
* tomcat-admin-webapps-9.0.106-150200.86.1
* tomcat-servlet-4_0-api-9.0.106-150200.86.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* tomcat-lib-9.0.106-150200.86.1
* tomcat-jsp-2_3-api-9.0.106-150200.86.1
* tomcat-9.0.106-150200.86.1
* tomcat-webapps-9.0.106-150200.86.1
* tomcat-el-3_0-api-9.0.106-150200.86.1
* tomcat-admin-webapps-9.0.106-150200.86.1
* tomcat-servlet-4_0-api-9.0.106-150200.86.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* tomcat-lib-9.0.106-150200.86.1
* tomcat-jsp-2_3-api-9.0.106-150200.86.1
* tomcat-9.0.106-150200.86.1
* tomcat-webapps-9.0.106-150200.86.1
* tomcat-el-3_0-api-9.0.106-150200.86.1
* tomcat-admin-webapps-9.0.106-150200.86.1
* tomcat-servlet-4_0-api-9.0.106-150200.86.1
* SUSE Manager Server 4.3 (noarch)
* tomcat-lib-9.0.106-150200.86.1
* tomcat-jsp-2_3-api-9.0.106-150200.86.1
* tomcat-9.0.106-150200.86.1
* tomcat-webapps-9.0.106-150200.86.1
* tomcat-el-3_0-api-9.0.106-150200.86.1
* tomcat-admin-webapps-9.0.106-150200.86.1
* tomcat-servlet-4_0-api-9.0.106-150200.86.1
* SUSE Enterprise Storage 7.1 (noarch)
* tomcat-lib-9.0.106-150200.86.1
* tomcat-jsp-2_3-api-9.0.106-150200.86.1
* tomcat-9.0.106-150200.86.1
* tomcat-webapps-9.0.106-150200.86.1
* tomcat-el-3_0-api-9.0.106-150200.86.1
* tomcat-admin-webapps-9.0.106-150200.86.1
* tomcat-servlet-4_0-api-9.0.106-150200.86.1

## References:

* https://www.suse.com/security/cve/CVE-2025-46701.html
* https://www.suse.com/security/cve/CVE-2025-48988.html
* https://www.suse.com/security/cve/CVE-2025-49125.html
* https://bugzilla.suse.com/show_bug.cgi?id=1242722
* https://bugzilla.suse.com/show_bug.cgi?id=1243815
* https://bugzilla.suse.com/show_bug.cgi?id=1244649
* https://bugzilla.suse.com/show_bug.cgi?id=1244656