SUSE 5539 Published by

There are several security updates available for SUSE Linux, addressing vulnerabilities in various packages. Important security updates have been released for python-pyasn1, libsoup, Mozilla Firefox, and multiple Linux kernel live patches. Moderate security updates have been released for Chromium, Bind, Vlang, Avahi, Log4j, OpenLDAP2_5, Python-urllib3, and Python, among others.

SUSE-SU-2026:0252-1: important: Security update for python-pyasn1
SUSE-SU-2026:0257-1: important: Security update for libsoup
SUSE-SU-2026:0253-1: important: Security update for libsoup2
SUSE-SU-2026:0254-1: moderate: Security update for log4j
SUSE-SU-2026:0255-1: moderate: Security update for python-urllib3
SUSE-SU-2026:0259-1: moderate: Security update for avahi
SUSE-SU-2026:0256-1: moderate: Security update for openldap2_5
SUSE-SU-2026:0260-1: important: Security update for MozillaFirefox
SUSE-SU-2026:0262-1: important: Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:0258-1: important: Security update for libsoup2
SUSE-SU-2026:0263-1: important: Security update for the Linux Kernel
SUSE-SU-2026:0274-1: important: Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:0280-1: important: Security update for openvswitch
openSUSE-SU-2026:0027-1: moderate: Security update for chromium
openSUSE-SU-2026:0028-1: moderate: Security update for chromium
openSUSE-SU-2026:10080-1: moderate: bind-9.20.18-1.1 on GA media
openSUSE-SU-2026:10083-1: moderate: vlang-0.5-2.1 on GA media
SUSE-SU-2026:0269-1: important: Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP6)
SUSE-SU-2026:0268-1: moderate: Security update for python
SUSE-SU-2026:0270-1: important: Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6)




SUSE-SU-2026:0252-1: important: Security update for python-pyasn1


# Security update for python-pyasn1

Announcement ID: SUSE-SU-2026:0252-1
Release Date: 2026-01-22T16:06:59Z
Rating: important
References:

* bsc#1256902

Cross-References:

* CVE-2026-23490

CVSS scores:

* CVE-2026-23490 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23490 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.6
* Public Cloud Module 15-SP4
* Python 3 Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability can now be installed.

## Description:

This update for python-pyasn1 fixes the following issues:

* CVE-2026-23490: Fixed Denial-of-Service issue that may lead to memory
exhaustion from malformed RELATIVE-OID with excessive continuation octets
(bsc#1256902)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-252=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-252=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-252=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-252=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-252=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-252=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-252=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-252=1

* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-252=1

* Python 3 Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-252=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-252=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-252=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-252=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-252=1

## Package List:

* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* python311-pyasn1-0.5.0-150400.12.10.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* python311-pyasn1-0.5.0-150400.12.10.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* python311-pyasn1-0.5.0-150400.12.10.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* python311-pyasn1-0.5.0-150400.12.10.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* python311-pyasn1-0.5.0-150400.12.10.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* python311-pyasn1-0.5.0-150400.12.10.1
* openSUSE Leap 15.4 (noarch)
* python311-pyasn1-0.5.0-150400.12.10.1
* openSUSE Leap 15.6 (noarch)
* python311-pyasn1-0.5.0-150400.12.10.1
* Public Cloud Module 15-SP4 (noarch)
* python311-pyasn1-0.5.0-150400.12.10.1
* Python 3 Module 15-SP7 (noarch)
* python311-pyasn1-0.5.0-150400.12.10.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* python311-pyasn1-0.5.0-150400.12.10.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* python311-pyasn1-0.5.0-150400.12.10.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* python311-pyasn1-0.5.0-150400.12.10.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* python311-pyasn1-0.5.0-150400.12.10.1

## References:

* https://www.suse.com/security/cve/CVE-2026-23490.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256902



SUSE-SU-2026:0257-1: important: Security update for libsoup


# Security update for libsoup

Announcement ID: SUSE-SU-2026:0257-1
Release Date: 2026-01-22T16:09:23Z
Rating: important
References:

* bsc#1254876
* bsc#1256399
* bsc#1256418

Cross-References:

* CVE-2025-14523
* CVE-2026-0716
* CVE-2026-0719

CVSS scores:

* CVE-2025-14523 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-14523 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
* CVE-2025-14523 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
* CVE-2026-0716 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-0716 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L
* CVE-2026-0716 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2026-0719 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0719 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-0719 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves three vulnerabilities can now be installed.

## Description:

This update for libsoup fixes the following issues:

* CVE-2026-0716: Fixed out-of-bounds read for websocket (bsc#1256418)
* CVE-2026-0719: Fixed overflow for password md4sum (bsc#1256399)
* CVE-2025-14523: Reject duplicated Host in headers and followed upstream
update (bsc#1254876).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-257=1 openSUSE-SLE-15.6-2026-257=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-257=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-257=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-257=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libsoup-debugsource-3.4.4-150600.3.28.1
* libsoup-3_0-0-debuginfo-3.4.4-150600.3.28.1
* libsoup-3_0-0-3.4.4-150600.3.28.1
* libsoup-devel-3.4.4-150600.3.28.1
* typelib-1_0-Soup-3_0-3.4.4-150600.3.28.1
* openSUSE Leap 15.6 (x86_64)
* libsoup-3_0-0-32bit-debuginfo-3.4.4-150600.3.28.1
* libsoup-devel-32bit-3.4.4-150600.3.28.1
* libsoup-3_0-0-32bit-3.4.4-150600.3.28.1
* openSUSE Leap 15.6 (noarch)
* libsoup-lang-3.4.4-150600.3.28.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libsoup-devel-64bit-3.4.4-150600.3.28.1
* libsoup-3_0-0-64bit-debuginfo-3.4.4-150600.3.28.1
* libsoup-3_0-0-64bit-3.4.4-150600.3.28.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libsoup-debugsource-3.4.4-150600.3.28.1
* libsoup-3_0-0-debuginfo-3.4.4-150600.3.28.1
* libsoup-3_0-0-3.4.4-150600.3.28.1
* libsoup-devel-3.4.4-150600.3.28.1
* typelib-1_0-Soup-3_0-3.4.4-150600.3.28.1
* Basesystem Module 15-SP7 (noarch)
* libsoup-lang-3.4.4-150600.3.28.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* libsoup-debugsource-3.4.4-150600.3.28.1
* libsoup-3_0-0-debuginfo-3.4.4-150600.3.28.1
* libsoup-3_0-0-3.4.4-150600.3.28.1
* libsoup-devel-3.4.4-150600.3.28.1
* typelib-1_0-Soup-3_0-3.4.4-150600.3.28.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* libsoup-lang-3.4.4-150600.3.28.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libsoup-debugsource-3.4.4-150600.3.28.1
* libsoup-3_0-0-debuginfo-3.4.4-150600.3.28.1
* libsoup-3_0-0-3.4.4-150600.3.28.1
* libsoup-devel-3.4.4-150600.3.28.1
* typelib-1_0-Soup-3_0-3.4.4-150600.3.28.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* libsoup-lang-3.4.4-150600.3.28.1

## References:

* https://www.suse.com/security/cve/CVE-2025-14523.html
* https://www.suse.com/security/cve/CVE-2026-0716.html
* https://www.suse.com/security/cve/CVE-2026-0719.html
* https://bugzilla.suse.com/show_bug.cgi?id=1254876
* https://bugzilla.suse.com/show_bug.cgi?id=1256399
* https://bugzilla.suse.com/show_bug.cgi?id=1256418



SUSE-SU-2026:0253-1: important: Security update for libsoup2


# Security update for libsoup2

Announcement ID: SUSE-SU-2026:0253-1
Release Date: 2026-01-22T16:08:15Z
Rating: important
References:

* bsc#1254876
* bsc#1256399

Cross-References:

* CVE-2025-14523
* CVE-2026-0719

CVSS scores:

* CVE-2025-14523 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-14523 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
* CVE-2025-14523 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
* CVE-2026-0719 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0719 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-0719 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves two vulnerabilities can now be installed.

## Description:

This update for libsoup2 fixes the following issues:

* CVE-2025-14523: Reject duplicated Host in headers and followed upstream
update (bsc#1254876).
* CVE-2026-0719: Fixed overflow for password md4sum (bsc#1256399)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-253=1 openSUSE-SLE-15.6-2026-253=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-253=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-253=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-253=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libsoup-2_4-1-2.74.3-150600.4.19.1
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.19.1
* libsoup2-devel-2.74.3-150600.4.19.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.19.1
* libsoup2-debugsource-2.74.3-150600.4.19.1
* openSUSE Leap 15.6 (x86_64)
* libsoup2-devel-32bit-2.74.3-150600.4.19.1
* libsoup-2_4-1-32bit-2.74.3-150600.4.19.1
* libsoup-2_4-1-32bit-debuginfo-2.74.3-150600.4.19.1
* openSUSE Leap 15.6 (noarch)
* libsoup2-lang-2.74.3-150600.4.19.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libsoup-2_4-1-64bit-debuginfo-2.74.3-150600.4.19.1
* libsoup2-devel-64bit-2.74.3-150600.4.19.1
* libsoup-2_4-1-64bit-2.74.3-150600.4.19.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libsoup-2_4-1-2.74.3-150600.4.19.1
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.19.1
* libsoup2-devel-2.74.3-150600.4.19.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.19.1
* libsoup2-debugsource-2.74.3-150600.4.19.1
* Basesystem Module 15-SP7 (noarch)
* libsoup2-lang-2.74.3-150600.4.19.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* libsoup-2_4-1-2.74.3-150600.4.19.1
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.19.1
* libsoup2-devel-2.74.3-150600.4.19.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.19.1
* libsoup2-debugsource-2.74.3-150600.4.19.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* libsoup2-lang-2.74.3-150600.4.19.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libsoup-2_4-1-2.74.3-150600.4.19.1
* libsoup-2_4-1-debuginfo-2.74.3-150600.4.19.1
* libsoup2-devel-2.74.3-150600.4.19.1
* typelib-1_0-Soup-2_4-2.74.3-150600.4.19.1
* libsoup2-debugsource-2.74.3-150600.4.19.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* libsoup2-lang-2.74.3-150600.4.19.1

## References:

* https://www.suse.com/security/cve/CVE-2025-14523.html
* https://www.suse.com/security/cve/CVE-2026-0719.html
* https://bugzilla.suse.com/show_bug.cgi?id=1254876
* https://bugzilla.suse.com/show_bug.cgi?id=1256399



SUSE-SU-2026:0254-1: moderate: Security update for log4j


# Security update for log4j

Announcement ID: SUSE-SU-2026:0254-1
Release Date: 2026-01-22T16:08:29Z
Rating: moderate
References:

* bsc#1255427

Cross-References:

* CVE-2025-68161

CVSS scores:

* CVE-2025-68161 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
* CVE-2025-68161 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
* CVE-2025-68161 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-68161 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for log4j fixes the following issues:

Security fixes:

* CVE-2025-68161: Fixed absent TLS hostname verification that may allow a man-
in-the-middle attack (bsc#1255427)

Other fixes:

* Upgrade to 2.18.0
* Added
* Add support for Jakarta Mail API in the SMTP appender.
* Add support for custom Log4j 1.x levels.
* Add support for adding and retrieving appenders in Log4j 1.x bridge.
* Add support for custom LMAX disruptor WaitStrategy configuration.
* Add support for Apache Extras' RollingFileAppender in Log4j 1.x bridge.
* Add MutableThreadContextMapFilter.
* Add support for 24 colors in highlighting
* Changed
* Improves ServiceLoader support on servlet containers.
* Make the default disruptor WaitStrategy used by Async Loggers garbage-free.
* Do not throw UnsupportedOperationException when JUL ApiLogger::setLevel is called.
* Support Spring 2.6.x.
* Move perf tests to log4j-core-its
* Upgrade the Flume Appender to Flume 1.10.0
* Fixed
* Fix minor typo #792.
* Improve validation and reporting of configuration errors.
* Allow enterprise id to be an OID fragment.
* Fix problem with non-uppercase custom levels.
* Avoid ClassCastException in JeroMqManager with custom LoggerContextFactory #791.
* DirectWriteRolloverStrategy should use the current time when creating files.
* Fixes the syslog appender in Log4j 1.x bridge, when used with a custom layout.
* log4j-1.2-api 2.17.2 throws NullPointerException while removing appender with name as null.
* Improve JsonTemplateLayout performance.
* Fix resolution of non-Log4j properties.
* Fixes Spring Boot logging system registration in a multi-application environment.
* JAR file containing Log4j configuration isn’t closed.
* Properties defined in configuration using a value attribute (as opposed to element) are read correctly.
* Syslog appender lacks the SocketOptions setting.
* Log4j 1.2 bridge should not wrap components unnecessarily.
* Update 3rd party dependencies for 2.18.0.
* SizeBasedTriggeringPolicy would fail to rename files properly when integer pattern contained a leading zero.
* Fixes default SslConfiguration, when a custom keystore is used.
* Fixes appender concurrency problems in Log4j 1.x bridge.
* Fix and test for race condition in FileUtils.mkdir().
* LocalizedMessage logs misleading errors on the console.
* Add missing message parameterization in RegexFilter.
* Add the missing context stack to JsonLayout template.
* HttpWatcher did not pass credentials when polling.
* UrlConnectionFactory.createConnection now accepts an AuthorizationProvider as a parameter.
* The DirectWriteRolloverStrategy was not detecting the correct index to use during startup.
* Async Loggers were including the location information by default.
* ClassArbiter’s newBuilder method referenced the wrong class.
* Don’t use Paths.get() to avoid circular file systems.
* Fix parsing error, when XInclude is disabled.
* Fix LevelRangeFilterBuilder to align with log4j1’s behavior.
* Fixes problem with wrong ANSI escape code for bright colors
* Log4j 1.2 bridge should generate Log4j 2.x messages based on the parameter runtime type.
* Update to 2.19.0
* Added
* Add implementation of SLF4J2 fluent API.
* Add support for SLF4J2 stack-valued MDC.
* Changed
* Add getExplicitLevel method to LoggerConfig.
* Allow PropertySources to be added.
* Allow Plugins to be injected with the LoggerContext reference.
* Fixed
* Add correct manifest entries for OSGi to log4j-jcl
* Improve support for passwordless keystores.
* SystemPropertyArbiter was assigning the value as the name.
* Make JsonTemplateLayout stack trace truncation operate for each label block.
* Fix recursion between Log4j 1.2 LogManager and Category.
* Fix resolution of properties not starting with log4j2..
* Logger$PrivateConfig.filter(Level, Marker, String) was allocating empty varargs array.
* Allows a space separated list of style specifiers in the %style pattern for consistency with %highlight.
* Fix NPE in log4j-to-jul in the case the root logger level is null.
* Fix RollingRandomAccessFileAppender with DirectWriteRolloverStrategy can’t create the first log file of different directory.
* Generate new SSL certs for testing.
* Fix ServiceLoaderUtil behavior in the presence of a SecurityManager.
* Fix regression in Rfc5424Layout default values.
* Harden InstantFormatter against delegate failures.
* Add async support to Log4jServletFilter.
* Removed
* Removed build page in favor of a single build instructions file.
* Remove SLF4J 1.8.x binding.
* Update to 2.20.0
* Added
* Add support for timezones in RollingFileAppender date pattern
* Add LogEvent timestamp to ProducerRecord in KafkaAppender
* Add PatternLayout support for abbreviating the name of all logger components except the 2 rightmost
* Removes internal field that leaked into public API.
* Add a LogBuilder#logAndGet() method to emulate the Logger#traceEntry method.
* Changed
* Simplify site generation
* Switch the issue tracker from JIRA to GitHub Issues
* Remove liquibase-log4j2 maven module
* Fix order of stacktrace elements, that causes cache misses in ThrowableProxyHelper.
* Switch from com.sun.mail to Eclipse Angus.
* Add Log4j2 Core as default runtime dependency of the SLF4J2-to-Log4j2 API bridge.
* Replace maven-changes-plugin with a custom changelog implementation
* Moved log4j-api and log4j-core artifacts with classifier tests to log4j-api-test and log4j-core-test respectively.
* Deprecated
* Deprecate support for package scanning for plugins
* Fixed
* Copy programmatically supplied location even if includeLocation="false".
* Eliminate status logger warning, when disableAnsi or noConsoleNoAnsi is used the style and highlight patterns.
* Fix detection of location requirements in RewriteAppender.
* Replace regex with manual code to escape characters in Rfc5424Layout.
* Fix java.sql.Time object formatting in MapMessage
* Fix previous fire time computation in CronTriggeringPolicy
* Correct default to not include location for AsyncRootLoggers
* Make StatusConsoleListener use SimpleLogger internally.
* Lazily evaluate the level of a SLF4J LogEventBuilder
* Fixes priority of Legacy system properties, which are now back to having higher priority than Environment variables.
* Protects ServiceLoaderUtil from unchecked ServiceLoader exceptions.
* Fix Configurator#setLevel for internal classes
* Fix level propagation in Log4jBridgeHandler
* Disable OsgiServiceLocator if not running in OSGI container.
* When using a Date Lookup in the file pattern the current time should be used.
* Fixed LogBuilder filtering in the presence of global filters.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-254=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-254=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* log4j-slf4j-2.20.0-150200.4.30.1
* log4j-jcl-2.20.0-150200.4.30.1
* log4j-2.20.0-150200.4.30.1
* log4j-javadoc-2.20.0-150200.4.30.1
* Basesystem Module 15-SP7 (noarch)
* log4j-slf4j-2.20.0-150200.4.30.1
* log4j-jcl-2.20.0-150200.4.30.1
* log4j-2.20.0-150200.4.30.1
* log4j-javadoc-2.20.0-150200.4.30.1

## References:

* https://www.suse.com/security/cve/CVE-2025-68161.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255427



SUSE-SU-2026:0255-1: moderate: Security update for python-urllib3


# Security update for python-urllib3

Announcement ID: SUSE-SU-2026:0255-1
Release Date: 2026-01-22T16:08:48Z
Rating: moderate
References:

* bsc#1256331

Cross-References:

* CVE-2026-21441

CVSS scores:

* CVE-2026-21441 ( SUSE ): 2.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-21441 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2026-21441 ( NVD ): 8.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-21441 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.6
* Public Cloud Module 15-SP4
* Python 3 Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability can now be installed.

## Description:

This update for python-urllib3 fixes the following issues:

* CVE-2026-21441: Fixed excessive resource consumption during decompression of
data in HTTP redirect responses (bsc#1256331)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* Python 3 Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-255=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-255=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-255=1

* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-255=1

## Package List:

* Python 3 Module 15-SP7 (noarch)
* python311-urllib3-2.0.7-150400.7.24.1
* openSUSE Leap 15.4 (noarch)
* python311-urllib3-2.0.7-150400.7.24.1
* openSUSE Leap 15.6 (noarch)
* python311-urllib3-2.0.7-150400.7.24.1
* Public Cloud Module 15-SP4 (noarch)
* python311-urllib3-2.0.7-150400.7.24.1

## References:

* https://www.suse.com/security/cve/CVE-2026-21441.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256331



SUSE-SU-2026:0259-1: moderate: Security update for avahi


# Security update for avahi

Announcement ID: SUSE-SU-2026:0259-1
Release Date: 2026-01-22T16:11:01Z
Rating: moderate
References:

* bsc#1256498
* bsc#1256499
* bsc#1256500

Cross-References:

* CVE-2025-68276
* CVE-2025-68468
* CVE-2025-68471

CVSS scores:

* CVE-2025-68276 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68276 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68468 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68468 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-68468 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-68471 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68471 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-68471 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP7
* Desktop Applications Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7

An update that solves three vulnerabilities can now be installed.

## Description:

This update for avahi fixes the following issues:

* CVE-2025-68276: Fixed refuse to create wide-area record browsers when wide-
area is off (bsc#1256498)
* CVE-2025-68471: Fixed DoS bug by changing assert to return (bsc#1256500)
* CVE-2025-68468: Fixed DoS bug by removing incorrect assertion (bsc#1256499)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-259=1 openSUSE-SLE-15.6-2026-259=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-259=1

* Desktop Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-259=1

* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-259=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* avahi-utils-gtk-debuginfo-0.8-150600.15.12.1
* libavahi-ui-gtk3-0-debuginfo-0.8-150600.15.12.1
* libavahi-devel-0.8-150600.15.12.1
* libdns_sd-0.8-150600.15.12.1
* libavahi-ui-gtk3-0-0.8-150600.15.12.1
* libavahi-gobject0-0.8-150600.15.12.1
* typelib-1_0-Avahi-0_6-0.8-150600.15.12.1
* libavahi-gobject-devel-0.8-150600.15.12.1
* avahi-glib2-debugsource-0.8-150600.15.12.1
* python3-avahi-gtk-0.8-150600.15.12.1
* avahi-compat-howl-devel-0.8-150600.15.12.1
* libavahi-qt5-devel-0.8-150600.15.12.1
* avahi-utils-0.8-150600.15.12.1
* avahi-debuginfo-0.8-150600.15.12.1
* libdns_sd-debuginfo-0.8-150600.15.12.1
* avahi-0.8-150600.15.12.1
* libavahi-glib1-debuginfo-0.8-150600.15.12.1
* libavahi-libevent1-0.8-150600.15.12.1
* libavahi-core7-0.8-150600.15.12.1
* libavahi-glib1-0.8-150600.15.12.1
* libavahi-core7-debuginfo-0.8-150600.15.12.1
* libhowl0-debuginfo-0.8-150600.15.12.1
* avahi-utils-gtk-0.8-150600.15.12.1
* libavahi-client3-debuginfo-0.8-150600.15.12.1
* libavahi-libevent1-debuginfo-0.8-150600.15.12.1
* libavahi-glib-devel-0.8-150600.15.12.1
* avahi-debugsource-0.8-150600.15.12.1
* python3-avahi-0.8-150600.15.12.1
* avahi-qt5-debugsource-0.8-150600.15.12.1
* avahi-utils-debuginfo-0.8-150600.15.12.1
* libavahi-common3-debuginfo-0.8-150600.15.12.1
* libavahi-qt5-1-0.8-150600.15.12.1
* libhowl0-0.8-150600.15.12.1
* avahi-autoipd-debuginfo-0.8-150600.15.12.1
* avahi-autoipd-0.8-150600.15.12.1
* libavahi-client3-0.8-150600.15.12.1
* libavahi-qt5-1-debuginfo-0.8-150600.15.12.1
* avahi-compat-mDNSResponder-devel-0.8-150600.15.12.1
* libavahi-common3-0.8-150600.15.12.1
* libavahi-gobject0-debuginfo-0.8-150600.15.12.1
* openSUSE Leap 15.6 (x86_64)
* libavahi-glib1-32bit-0.8-150600.15.12.1
* libavahi-client3-32bit-debuginfo-0.8-150600.15.12.1
* libavahi-common3-32bit-debuginfo-0.8-150600.15.12.1
* libavahi-common3-32bit-0.8-150600.15.12.1
* libdns_sd-32bit-debuginfo-0.8-150600.15.12.1
* libavahi-client3-32bit-0.8-150600.15.12.1
* libavahi-glib1-32bit-debuginfo-0.8-150600.15.12.1
* libdns_sd-32bit-0.8-150600.15.12.1
* avahi-32bit-debuginfo-0.8-150600.15.12.1
* openSUSE Leap 15.6 (noarch)
* avahi-lang-0.8-150600.15.12.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libavahi-client3-64bit-0.8-150600.15.12.1
* libdns_sd-64bit-0.8-150600.15.12.1
* libavahi-common3-64bit-0.8-150600.15.12.1
* libdns_sd-64bit-debuginfo-0.8-150600.15.12.1
* libavahi-glib1-64bit-0.8-150600.15.12.1
* libavahi-glib1-64bit-debuginfo-0.8-150600.15.12.1
* libavahi-client3-64bit-debuginfo-0.8-150600.15.12.1
* libavahi-common3-64bit-debuginfo-0.8-150600.15.12.1
* avahi-64bit-debuginfo-0.8-150600.15.12.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libavahi-ui-gtk3-0-debuginfo-0.8-150600.15.12.1
* libavahi-devel-0.8-150600.15.12.1
* libavahi-ui-gtk3-0-0.8-150600.15.12.1
* libdns_sd-0.8-150600.15.12.1
* libavahi-gobject0-0.8-150600.15.12.1
* typelib-1_0-Avahi-0_6-0.8-150600.15.12.1
* avahi-compat-mDNSResponder-devel-0.8-150600.15.12.1
* avahi-glib2-debugsource-0.8-150600.15.12.1
* avahi-compat-howl-devel-0.8-150600.15.12.1
* avahi-utils-0.8-150600.15.12.1
* avahi-debuginfo-0.8-150600.15.12.1
* libdns_sd-debuginfo-0.8-150600.15.12.1
* avahi-0.8-150600.15.12.1
* libavahi-glib1-debuginfo-0.8-150600.15.12.1
* libavahi-libevent1-0.8-150600.15.12.1
* libavahi-core7-0.8-150600.15.12.1
* libavahi-glib1-0.8-150600.15.12.1
* libavahi-core7-debuginfo-0.8-150600.15.12.1
* libhowl0-debuginfo-0.8-150600.15.12.1
* libavahi-client3-debuginfo-0.8-150600.15.12.1
* libavahi-libevent1-debuginfo-0.8-150600.15.12.1
* libavahi-glib-devel-0.8-150600.15.12.1
* avahi-debugsource-0.8-150600.15.12.1
* avahi-utils-debuginfo-0.8-150600.15.12.1
* libavahi-common3-debuginfo-0.8-150600.15.12.1
* libhowl0-0.8-150600.15.12.1
* libavahi-client3-0.8-150600.15.12.1
* libavahi-gobject0-debuginfo-0.8-150600.15.12.1
* libavahi-common3-0.8-150600.15.12.1
* Basesystem Module 15-SP7 (noarch)
* avahi-lang-0.8-150600.15.12.1
* Basesystem Module 15-SP7 (x86_64)
* libavahi-client3-32bit-debuginfo-0.8-150600.15.12.1
* libavahi-common3-32bit-debuginfo-0.8-150600.15.12.1
* libavahi-common3-32bit-0.8-150600.15.12.1
* libavahi-client3-32bit-0.8-150600.15.12.1
* avahi-32bit-debuginfo-0.8-150600.15.12.1
* Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* avahi-glib2-debugsource-0.8-150600.15.12.1
* avahi-utils-gtk-debuginfo-0.8-150600.15.12.1
* avahi-autoipd-debuginfo-0.8-150600.15.12.1
* avahi-utils-gtk-0.8-150600.15.12.1
* avahi-debuginfo-0.8-150600.15.12.1
* avahi-autoipd-0.8-150600.15.12.1
* avahi-debugsource-0.8-150600.15.12.1
* libavahi-gobject-devel-0.8-150600.15.12.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64)
* avahi-debuginfo-0.8-150600.15.12.1
* avahi-debugsource-0.8-150600.15.12.1
* python3-avahi-0.8-150600.15.12.1

## References:

* https://www.suse.com/security/cve/CVE-2025-68276.html
* https://www.suse.com/security/cve/CVE-2025-68468.html
* https://www.suse.com/security/cve/CVE-2025-68471.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256498
* https://bugzilla.suse.com/show_bug.cgi?id=1256499
* https://bugzilla.suse.com/show_bug.cgi?id=1256500



SUSE-SU-2026:0256-1: moderate: Security update for openldap2_5


# Security update for openldap2_5

Announcement ID: SUSE-SU-2026:0256-1
Release Date: 2026-01-22T16:09:02Z
Rating: moderate
References:

* bsc#1256297

Cross-References:

* CVE-2026-22185

CVSS scores:

* CVE-2026-22185 ( SUSE ): 7.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2026-22185 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2026-22185 ( NVD ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* Server Applications Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for openldap2_5 fixes the following issues:

Security fixes:

* CVE-2026-22185: Fixed possible crash in malicious DB (bsc#1256297)

Other fixes:

* Update to version 2.5.20+11:

* ITS#10421 mdb_load: check for malicious input

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-256=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-256=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-256=1

* Server Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2026-256=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* openldap2_5-ppolicy-check-password-debuginfo-2.5.20+11-150500.11.38.1
* openldap2_5-contrib-2.5.20+11-150500.11.38.1
* openldap2_5-client-2.5.20+11-150500.11.38.1
* openldap2_5-2.5.20+11-150500.11.38.1
* openldap2_5-debugsource-2.5.20+11-150500.11.38.1
* openldap2_5-devel-2.5.20+11-150500.11.38.1
* libldap-2_5-0-2.5.20+11-150500.11.38.1
* libldap-2_5-0-debuginfo-2.5.20+11-150500.11.38.1
* openldap2_5-ppolicy-check-password-2.5.20+11-150500.11.38.1
* openldap2_5-debuginfo-2.5.20+11-150500.11.38.1
* openldap2_5-contrib-debuginfo-2.5.20+11-150500.11.38.1
* openSUSE Leap 15.5 (noarch)
* openldap2_5-doc-2.5.20+11-150500.11.38.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* openldap2_5-ppolicy-check-password-debuginfo-2.5.20+11-150500.11.38.1
* openldap2_5-contrib-2.5.20+11-150500.11.38.1
* openldap2_5-client-2.5.20+11-150500.11.38.1
* openldap2_5-2.5.20+11-150500.11.38.1
* openldap2_5-debugsource-2.5.20+11-150500.11.38.1
* openldap2_5-devel-2.5.20+11-150500.11.38.1
* libldap-2_5-0-2.5.20+11-150500.11.38.1
* libldap-2_5-0-debuginfo-2.5.20+11-150500.11.38.1
* openldap2_5-ppolicy-check-password-2.5.20+11-150500.11.38.1
* openldap2_5-debuginfo-2.5.20+11-150500.11.38.1
* openldap2_5-contrib-debuginfo-2.5.20+11-150500.11.38.1
* openSUSE Leap 15.6 (noarch)
* openldap2_5-doc-2.5.20+11-150500.11.38.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* openldap2_5-client-2.5.20+11-150500.11.38.1
* openldap2_5-debugsource-2.5.20+11-150500.11.38.1
* openldap2_5-devel-2.5.20+11-150500.11.38.1
* libldap-2_5-0-2.5.20+11-150500.11.38.1
* libldap-2_5-0-debuginfo-2.5.20+11-150500.11.38.1
* openldap2_5-debuginfo-2.5.20+11-150500.11.38.1
* Basesystem Module 15-SP7 (noarch)
* openldap2_5-doc-2.5.20+11-150500.11.38.1
* Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* openldap2_5-ppolicy-check-password-debuginfo-2.5.20+11-150500.11.38.1
* openldap2_5-contrib-2.5.20+11-150500.11.38.1
* openldap2_5-2.5.20+11-150500.11.38.1
* openldap2_5-debugsource-2.5.20+11-150500.11.38.1
* openldap2_5-ppolicy-check-password-2.5.20+11-150500.11.38.1
* openldap2_5-debuginfo-2.5.20+11-150500.11.38.1
* openldap2_5-contrib-debuginfo-2.5.20+11-150500.11.38.1

## References:

* https://www.suse.com/security/cve/CVE-2026-22185.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256297



SUSE-SU-2026:0260-1: important: Security update for MozillaFirefox


# Security update for MozillaFirefox

Announcement ID: SUSE-SU-2026:0260-1
Release Date: 2026-01-22T16:12:21Z
Rating: important
References:

* bsc#1256340

Cross-References:

* CVE-2025-14327
* CVE-2026-0877
* CVE-2026-0878
* CVE-2026-0879
* CVE-2026-0880
* CVE-2026-0882
* CVE-2026-0883
* CVE-2026-0884
* CVE-2026-0885
* CVE-2026-0886
* CVE-2026-0887
* CVE-2026-0890
* CVE-2026-0891

CVSS scores:

* CVE-2025-14327 ( SUSE ): 5.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-14327 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2025-14327 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-14327 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2026-0877 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
* CVE-2026-0878 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
* CVE-2026-0879 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-0880 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-0882 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2026-0883 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-0884 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-0885 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2026-0886 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2026-0887 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2026-0890 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
* CVE-2026-0891 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* Desktop Applications Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves 13 vulnerabilities can now be installed.

## Description:

This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 140.7.0 ESR (bsc#1256340).

* MFSA 2026-03
* CVE-2026-0877: Mitigation bypass in the DOM: Security component
* CVE-2026-0878: Sandbox escape due to incorrect boundary conditions in the
Graphics: CanvasWebGL component
* CVE-2026-0879: Sandbox escape due to incorrect boundary conditions in the
Graphics component
* CVE-2026-0880: Sandbox escape due to integer overflow in the Graphics
component
* CVE-2026-0882: Use-after-free in the IPC component
* CVE-2025-14327: Spoofing issue in the Downloads Panel component
* CVE-2026-0883: Information disclosure in the Networking component
* CVE-2026-0884: Use-after-free in the JavaScript Engine component
* CVE-2026-0885: Use-after-free in the JavaScript: GC component
* CVE-2026-0886: Incorrect boundary conditions in the Graphics component
* CVE-2026-0887: Clickjacking issue, information disclosure in the PDF Viewer
component
* CVE-2026-0890: Spoofing issue in the DOM: Copy-Paste and Drag-Drop component
* CVE-2026-0891: Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird
ESR 140.7, Firefox 147 and Thunderbird 147

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-260=1

* Desktop Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-260=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-260=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-260=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-260=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-260=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-260=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-260=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-260=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-260=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-260=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-260=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-translations-other-140.7.0-150200.152.216.1
* MozillaFirefox-debugsource-140.7.0-150200.152.216.1
* MozillaFirefox-translations-common-140.7.0-150200.152.216.1
* MozillaFirefox-140.7.0-150200.152.216.1
* MozillaFirefox-branding-upstream-140.7.0-150200.152.216.1
* MozillaFirefox-debuginfo-140.7.0-150200.152.216.1
* openSUSE Leap 15.6 (noarch)
* MozillaFirefox-devel-140.7.0-150200.152.216.1
* Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-translations-other-140.7.0-150200.152.216.1
* MozillaFirefox-debugsource-140.7.0-150200.152.216.1
* MozillaFirefox-translations-common-140.7.0-150200.152.216.1
* MozillaFirefox-140.7.0-150200.152.216.1
* MozillaFirefox-debuginfo-140.7.0-150200.152.216.1
* Desktop Applications Module 15-SP7 (noarch)
* MozillaFirefox-devel-140.7.0-150200.152.216.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-translations-other-140.7.0-150200.152.216.1
* MozillaFirefox-debugsource-140.7.0-150200.152.216.1
* MozillaFirefox-translations-common-140.7.0-150200.152.216.1
* MozillaFirefox-140.7.0-150200.152.216.1
* MozillaFirefox-debuginfo-140.7.0-150200.152.216.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* MozillaFirefox-devel-140.7.0-150200.152.216.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-translations-other-140.7.0-150200.152.216.1
* MozillaFirefox-debugsource-140.7.0-150200.152.216.1
* MozillaFirefox-translations-common-140.7.0-150200.152.216.1
* MozillaFirefox-140.7.0-150200.152.216.1
* MozillaFirefox-debuginfo-140.7.0-150200.152.216.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* MozillaFirefox-devel-140.7.0-150200.152.216.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* MozillaFirefox-translations-other-140.7.0-150200.152.216.1
* MozillaFirefox-debugsource-140.7.0-150200.152.216.1
* MozillaFirefox-translations-common-140.7.0-150200.152.216.1
* MozillaFirefox-140.7.0-150200.152.216.1
* MozillaFirefox-debuginfo-140.7.0-150200.152.216.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* MozillaFirefox-devel-140.7.0-150200.152.216.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* MozillaFirefox-translations-other-140.7.0-150200.152.216.1
* MozillaFirefox-debugsource-140.7.0-150200.152.216.1
* MozillaFirefox-translations-common-140.7.0-150200.152.216.1
* MozillaFirefox-140.7.0-150200.152.216.1
* MozillaFirefox-debuginfo-140.7.0-150200.152.216.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* MozillaFirefox-devel-140.7.0-150200.152.216.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-translations-other-140.7.0-150200.152.216.1
* MozillaFirefox-debugsource-140.7.0-150200.152.216.1
* MozillaFirefox-translations-common-140.7.0-150200.152.216.1
* MozillaFirefox-140.7.0-150200.152.216.1
* MozillaFirefox-debuginfo-140.7.0-150200.152.216.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* MozillaFirefox-devel-140.7.0-150200.152.216.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-translations-other-140.7.0-150200.152.216.1
* MozillaFirefox-debugsource-140.7.0-150200.152.216.1
* MozillaFirefox-translations-common-140.7.0-150200.152.216.1
* MozillaFirefox-140.7.0-150200.152.216.1
* MozillaFirefox-debuginfo-140.7.0-150200.152.216.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* MozillaFirefox-devel-140.7.0-150200.152.216.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-translations-other-140.7.0-150200.152.216.1
* MozillaFirefox-debugsource-140.7.0-150200.152.216.1
* MozillaFirefox-translations-common-140.7.0-150200.152.216.1
* MozillaFirefox-140.7.0-150200.152.216.1
* MozillaFirefox-debuginfo-140.7.0-150200.152.216.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* MozillaFirefox-devel-140.7.0-150200.152.216.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* MozillaFirefox-translations-other-140.7.0-150200.152.216.1
* MozillaFirefox-debugsource-140.7.0-150200.152.216.1
* MozillaFirefox-translations-common-140.7.0-150200.152.216.1
* MozillaFirefox-140.7.0-150200.152.216.1
* MozillaFirefox-debuginfo-140.7.0-150200.152.216.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* MozillaFirefox-devel-140.7.0-150200.152.216.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* MozillaFirefox-translations-other-140.7.0-150200.152.216.1
* MozillaFirefox-debugsource-140.7.0-150200.152.216.1
* MozillaFirefox-translations-common-140.7.0-150200.152.216.1
* MozillaFirefox-140.7.0-150200.152.216.1
* MozillaFirefox-debuginfo-140.7.0-150200.152.216.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* MozillaFirefox-devel-140.7.0-150200.152.216.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* MozillaFirefox-translations-other-140.7.0-150200.152.216.1
* MozillaFirefox-debugsource-140.7.0-150200.152.216.1
* MozillaFirefox-translations-common-140.7.0-150200.152.216.1
* MozillaFirefox-140.7.0-150200.152.216.1
* MozillaFirefox-debuginfo-140.7.0-150200.152.216.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* MozillaFirefox-devel-140.7.0-150200.152.216.1

## References:

* https://www.suse.com/security/cve/CVE-2025-14327.html
* https://www.suse.com/security/cve/CVE-2026-0877.html
* https://www.suse.com/security/cve/CVE-2026-0878.html
* https://www.suse.com/security/cve/CVE-2026-0879.html
* https://www.suse.com/security/cve/CVE-2026-0880.html
* https://www.suse.com/security/cve/CVE-2026-0882.html
* https://www.suse.com/security/cve/CVE-2026-0883.html
* https://www.suse.com/security/cve/CVE-2026-0884.html
* https://www.suse.com/security/cve/CVE-2026-0885.html
* https://www.suse.com/security/cve/CVE-2026-0886.html
* https://www.suse.com/security/cve/CVE-2026-0887.html
* https://www.suse.com/security/cve/CVE-2026-0890.html
* https://www.suse.com/security/cve/CVE-2026-0891.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256340



SUSE-SU-2026:0262-1: important: Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP6)


# Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise
15 SP6)

Announcement ID: SUSE-SU-2026:0262-1
Release Date: 2026-01-22T16:33:42Z
Rating: important
References:

* bsc#1248400
* bsc#1248670
* bsc#1249241
* bsc#1250192
* bsc#1251203
* bsc#1251787
* bsc#1253437
* bsc#1256928

Cross-References:

* CVE-2023-53676
* CVE-2025-38476
* CVE-2025-38572
* CVE-2025-38588
* CVE-2025-38608
* CVE-2025-39682
* CVE-2025-40204

CVSS scores:

* CVE-2023-53676 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38476 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38572 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38588 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38588 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38608 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40204 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves seven vulnerabilities and has one security fix can now be
installed.

## Description:

This update for the SUSE Linux Enterprise kernel 6.4.0-150600.23.38 fixes
various security issues

The following security issues were fixed:

* CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in
lio_target_nacl_info_show() (bsc#1251787).
* CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline()
(bsc#1251203).
* CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment()
(bsc#1248400).
* CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size()
(bsc#1249241).
* CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data()
in ktls (bsc#1248670).
* CVE-2025-39682: tls: fix handling of zero-length records on the rx_list
(bsc#1250192).
* CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437).

The following non security issue was fixed:

* fix addr_bit_set() issue on big-endian machines (bsc#1256928).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-262=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-262=1

## Package List:

* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_38-default-12-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_8-debugsource-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_38-default-debuginfo-12-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_38-default-12-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_8-debugsource-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_38-default-debuginfo-12-150600.2.1

## References:

* https://www.suse.com/security/cve/CVE-2023-53676.html
* https://www.suse.com/security/cve/CVE-2025-38476.html
* https://www.suse.com/security/cve/CVE-2025-38572.html
* https://www.suse.com/security/cve/CVE-2025-38588.html
* https://www.suse.com/security/cve/CVE-2025-38608.html
* https://www.suse.com/security/cve/CVE-2025-39682.html
* https://www.suse.com/security/cve/CVE-2025-40204.html
* https://bugzilla.suse.com/show_bug.cgi?id=1248400
* https://bugzilla.suse.com/show_bug.cgi?id=1248670
* https://bugzilla.suse.com/show_bug.cgi?id=1249241
* https://bugzilla.suse.com/show_bug.cgi?id=1250192
* https://bugzilla.suse.com/show_bug.cgi?id=1251203
* https://bugzilla.suse.com/show_bug.cgi?id=1251787
* https://bugzilla.suse.com/show_bug.cgi?id=1253437
* https://bugzilla.suse.com/show_bug.cgi?id=1256928



SUSE-SU-2026:0258-1: important: Security update for libsoup2


# Security update for libsoup2

Announcement ID: SUSE-SU-2026:0258-1
Release Date: 2026-01-22T16:10:32Z
Rating: important
References:

* bsc#1254876
* bsc#1256399

Cross-References:

* CVE-2025-14523
* CVE-2026-0719

CVSS scores:

* CVE-2025-14523 ( SUSE ): 8.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-14523 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
* CVE-2025-14523 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
* CVE-2026-0719 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-0719 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-0719 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves two vulnerabilities can now be installed.

## Description:

This update for libsoup2 fixes the following issues:

* CVE-2025-14523: Reject duplicated Host in headers and followed upstream
update (bsc#1254876).
* CVE-2026-0719: Fixed overflow for password md4sum (bsc#1256399)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-258=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-258=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-258=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-258=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-258=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-258=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-258=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-258=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-258=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-258=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-258=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-258=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-258=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-258=1

## Package List:

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* typelib-1_0-Soup-2_4-2.74.2-150400.3.19.1
* libsoup-2_4-1-2.74.2-150400.3.19.1
* libsoup2-devel-2.74.2-150400.3.19.1
* libsoup2-debugsource-2.74.2-150400.3.19.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* libsoup2-lang-2.74.2-150400.3.19.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* typelib-1_0-Soup-2_4-2.74.2-150400.3.19.1
* libsoup-2_4-1-2.74.2-150400.3.19.1
* libsoup2-devel-2.74.2-150400.3.19.1
* libsoup2-debugsource-2.74.2-150400.3.19.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* libsoup2-lang-2.74.2-150400.3.19.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* typelib-1_0-Soup-2_4-2.74.2-150400.3.19.1
* libsoup-2_4-1-2.74.2-150400.3.19.1
* libsoup2-devel-2.74.2-150400.3.19.1
* libsoup2-debugsource-2.74.2-150400.3.19.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* libsoup2-lang-2.74.2-150400.3.19.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* typelib-1_0-Soup-2_4-2.74.2-150400.3.19.1
* libsoup-2_4-1-2.74.2-150400.3.19.1
* libsoup2-devel-2.74.2-150400.3.19.1
* libsoup2-debugsource-2.74.2-150400.3.19.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* libsoup2-lang-2.74.2-150400.3.19.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* typelib-1_0-Soup-2_4-2.74.2-150400.3.19.1
* libsoup-2_4-1-2.74.2-150400.3.19.1
* libsoup2-devel-2.74.2-150400.3.19.1
* libsoup2-debugsource-2.74.2-150400.3.19.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* libsoup2-lang-2.74.2-150400.3.19.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* typelib-1_0-Soup-2_4-2.74.2-150400.3.19.1
* libsoup-2_4-1-2.74.2-150400.3.19.1
* libsoup2-devel-2.74.2-150400.3.19.1
* libsoup2-debugsource-2.74.2-150400.3.19.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* libsoup2-lang-2.74.2-150400.3.19.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* typelib-1_0-Soup-2_4-2.74.2-150400.3.19.1
* libsoup-2_4-1-2.74.2-150400.3.19.1
* libsoup2-devel-2.74.2-150400.3.19.1
* libsoup2-debugsource-2.74.2-150400.3.19.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1
* openSUSE Leap 15.4 (x86_64)
* libsoup2-devel-32bit-2.74.2-150400.3.19.1
* libsoup-2_4-1-32bit-debuginfo-2.74.2-150400.3.19.1
* libsoup-2_4-1-32bit-2.74.2-150400.3.19.1
* openSUSE Leap 15.4 (noarch)
* libsoup2-lang-2.74.2-150400.3.19.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libsoup2-devel-64bit-2.74.2-150400.3.19.1
* libsoup-2_4-1-64bit-debuginfo-2.74.2-150400.3.19.1
* libsoup-2_4-1-64bit-2.74.2-150400.3.19.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libsoup2-debugsource-2.74.2-150400.3.19.1
* libsoup-2_4-1-2.74.2-150400.3.19.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libsoup2-debugsource-2.74.2-150400.3.19.1
* libsoup-2_4-1-2.74.2-150400.3.19.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libsoup2-debugsource-2.74.2-150400.3.19.1
* libsoup-2_4-1-2.74.2-150400.3.19.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libsoup2-debugsource-2.74.2-150400.3.19.1
* libsoup-2_4-1-2.74.2-150400.3.19.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libsoup2-debugsource-2.74.2-150400.3.19.1
* libsoup-2_4-1-2.74.2-150400.3.19.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* typelib-1_0-Soup-2_4-2.74.2-150400.3.19.1
* libsoup-2_4-1-2.74.2-150400.3.19.1
* libsoup2-devel-2.74.2-150400.3.19.1
* libsoup2-debugsource-2.74.2-150400.3.19.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* libsoup2-lang-2.74.2-150400.3.19.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* typelib-1_0-Soup-2_4-2.74.2-150400.3.19.1
* libsoup-2_4-1-2.74.2-150400.3.19.1
* libsoup2-devel-2.74.2-150400.3.19.1
* libsoup2-debugsource-2.74.2-150400.3.19.1
* libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* libsoup2-lang-2.74.2-150400.3.19.1

## References:

* https://www.suse.com/security/cve/CVE-2025-14523.html
* https://www.suse.com/security/cve/CVE-2026-0719.html
* https://bugzilla.suse.com/show_bug.cgi?id=1254876
* https://bugzilla.suse.com/show_bug.cgi?id=1256399



SUSE-SU-2026:0263-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2026:0263-1
Release Date: 2026-01-22T21:15:03Z
Rating: important
References:

* bsc#1065729
* bsc#1193629
* bsc#1194869
* bsc#1196823
* bsc#1204957
* bsc#1205567
* bsc#1206451
* bsc#1206843
* bsc#1206889
* bsc#1207051
* bsc#1207088
* bsc#1207315
* bsc#1207611
* bsc#1207620
* bsc#1207622
* bsc#1207636
* bsc#1207644
* bsc#1207646
* bsc#1207652
* bsc#1207653
* bsc#1208570
* bsc#1208758
* bsc#1209799
* bsc#1209980
* bsc#1210644
* bsc#1210817
* bsc#1210943
* bsc#1211690
* bsc#1213025
* bsc#1213032
* bsc#1213093
* bsc#1213105
* bsc#1213110
* bsc#1213111
* bsc#1213653
* bsc#1213747
* bsc#1213867
* bsc#1214635
* bsc#1214940
* bsc#1214962
* bsc#1214986
* bsc#1214990
* bsc#1216062
* bsc#1224573
* bsc#1225832
* bsc#1226797
* bsc#1226846
* bsc#1228015
* bsc#1233640
* bsc#1235038
* bsc#1237563
* bsc#1249871
* bsc#1252046
* bsc#1252678
* bsc#1253409
* bsc#1254392
* bsc#1254520
* bsc#1254559
* bsc#1254562
* bsc#1254572
* bsc#1254578
* bsc#1254580
* bsc#1254592
* bsc#1254601
* bsc#1254608
* bsc#1254609
* bsc#1254614
* bsc#1254615
* bsc#1254617
* bsc#1254623
* bsc#1254625
* bsc#1254626
* bsc#1254631
* bsc#1254632
* bsc#1254634
* bsc#1254644
* bsc#1254645
* bsc#1254649
* bsc#1254651
* bsc#1254653
* bsc#1254656
* bsc#1254658
* bsc#1254660
* bsc#1254664
* bsc#1254671
* bsc#1254674
* bsc#1254676
* bsc#1254677
* bsc#1254681
* bsc#1254684
* bsc#1254685
* bsc#1254686
* bsc#1254690
* bsc#1254692
* bsc#1254694
* bsc#1254696
* bsc#1254698
* bsc#1254699
* bsc#1254704
* bsc#1254706
* bsc#1254709
* bsc#1254710
* bsc#1254711
* bsc#1254712
* bsc#1254713
* bsc#1254714
* bsc#1254716
* bsc#1254723
* bsc#1254725
* bsc#1254728
* bsc#1254729
* bsc#1254743
* bsc#1254745
* bsc#1254751
* bsc#1254753
* bsc#1254754
* bsc#1254756
* bsc#1254759
* bsc#1254763
* bsc#1254775
* bsc#1254780
* bsc#1254781
* bsc#1254782
* bsc#1254783
* bsc#1254785
* bsc#1254786
* bsc#1254788
* bsc#1254789
* bsc#1254792
* bsc#1254813
* bsc#1254843
* bsc#1254847
* bsc#1254851
* bsc#1254894
* bsc#1254902
* bsc#1254910
* bsc#1254911
* bsc#1254915
* bsc#1254916
* bsc#1254917
* bsc#1254920
* bsc#1254922
* bsc#1254958
* bsc#1254959
* bsc#1254974
* bsc#1254979
* bsc#1254986
* bsc#1254994
* bsc#1255002
* bsc#1255005
* bsc#1255007
* bsc#1255049
* bsc#1255060
* bsc#1255107
* bsc#1255163
* bsc#1255165
* bsc#1255245
* bsc#1255467
* bsc#1255469
* bsc#1255521
* bsc#1255528
* bsc#1255532
* bsc#1255546
* bsc#1255549
* bsc#1255554
* bsc#1255555
* bsc#1255558
* bsc#1255560
* bsc#1255561
* bsc#1255562
* bsc#1255565
* bsc#1255574
* bsc#1255576
* bsc#1255578
* bsc#1255582
* bsc#1255596
* bsc#1255600
* bsc#1255605
* bsc#1255607
* bsc#1255608
* bsc#1255609
* bsc#1255618
* bsc#1255619
* bsc#1255620
* bsc#1255623
* bsc#1255624
* bsc#1255626
* bsc#1255627
* bsc#1255628
* bsc#1255635
* bsc#1255636
* bsc#1255688
* bsc#1255690
* bsc#1255697
* bsc#1255702
* bsc#1255704
* bsc#1255745
* bsc#1255747
* bsc#1255749
* bsc#1255750
* bsc#1255757
* bsc#1255758
* bsc#1255760
* bsc#1255761
* bsc#1255762
* bsc#1255763
* bsc#1255769
* bsc#1255771
* bsc#1255773
* bsc#1255780
* bsc#1255786
* bsc#1255787
* bsc#1255789
* bsc#1255790
* bsc#1255791
* bsc#1255792
* bsc#1255796
* bsc#1255797
* bsc#1255800
* bsc#1255801
* bsc#1255802
* bsc#1255803
* bsc#1255804
* bsc#1255806
* bsc#1255808
* bsc#1255819
* bsc#1255839
* bsc#1255841
* bsc#1255843
* bsc#1255844
* bsc#1255872
* bsc#1255875
* bsc#1255876
* bsc#1255877
* bsc#1255878
* bsc#1255880
* bsc#1255881
* bsc#1255888
* bsc#1255889
* bsc#1255890
* bsc#1255899
* bsc#1255901
* bsc#1255902
* bsc#1255905
* bsc#1255906
* bsc#1255909
* bsc#1255910
* bsc#1255912
* bsc#1255916
* bsc#1255919
* bsc#1255920
* bsc#1255922
* bsc#1255924
* bsc#1255925
* bsc#1255939
* bsc#1255946
* bsc#1255950
* bsc#1255953
* bsc#1255954
* bsc#1255955
* bsc#1255962
* bsc#1255964
* bsc#1255968
* bsc#1255969
* bsc#1255970
* bsc#1255971
* bsc#1255974
* bsc#1255978
* bsc#1255979
* bsc#1255983
* bsc#1255985
* bsc#1255990
* bsc#1255993
* bsc#1255994
* bsc#1255996
* bsc#1255998
* bsc#1256034
* bsc#1256040
* bsc#1256042
* bsc#1256045
* bsc#1256046
* bsc#1256048
* bsc#1256049
* bsc#1256050
* bsc#1256053
* bsc#1256056
* bsc#1256057
* bsc#1256062
* bsc#1256063
* bsc#1256064
* bsc#1256065
* bsc#1256071
* bsc#1256074
* bsc#1256081
* bsc#1256084
* bsc#1256086
* bsc#1256088
* bsc#1256091
* bsc#1256093
* bsc#1256099
* bsc#1256101
* bsc#1256103
* bsc#1256106
* bsc#1256111
* bsc#1256112
* bsc#1256114
* bsc#1256115
* bsc#1256118
* bsc#1256119
* bsc#1256121
* bsc#1256122
* bsc#1256124
* bsc#1256125
* bsc#1256126
* bsc#1256127
* bsc#1256128
* bsc#1256130
* bsc#1256131
* bsc#1256132
* bsc#1256133
* bsc#1256136
* bsc#1256137
* bsc#1256140
* bsc#1256141
* bsc#1256142
* bsc#1256143
* bsc#1256144
* bsc#1256145
* bsc#1256149
* bsc#1256150
* bsc#1256152
* bsc#1256154
* bsc#1256155
* bsc#1256157
* bsc#1256158
* bsc#1256162
* bsc#1256164
* bsc#1256165
* bsc#1256166
* bsc#1256167
* bsc#1256172
* bsc#1256173
* bsc#1256174
* bsc#1256177
* bsc#1256178
* bsc#1256179
* bsc#1256182
* bsc#1256184
* bsc#1256185
* bsc#1256186
* bsc#1256188
* bsc#1256189
* bsc#1256191
* bsc#1256192
* bsc#1256193
* bsc#1256194
* bsc#1256196
* bsc#1256198
* bsc#1256199
* bsc#1256200
* bsc#1256202
* bsc#1256203
* bsc#1256204
* bsc#1256205
* bsc#1256206
* bsc#1256207
* bsc#1256208
* bsc#1256211
* bsc#1256214
* bsc#1256215
* bsc#1256216
* bsc#1256218
* bsc#1256219
* bsc#1256220
* bsc#1256221
* bsc#1256223
* bsc#1256228
* bsc#1256230
* bsc#1256231
* bsc#1256235
* bsc#1256239
* bsc#1256241
* bsc#1256242
* bsc#1256245
* bsc#1256248
* bsc#1256250
* bsc#1256254
* bsc#1256260
* bsc#1256265
* bsc#1256269
* bsc#1256271
* bsc#1256274
* bsc#1256282
* bsc#1256285
* bsc#1256291
* bsc#1256294
* bsc#1256295
* bsc#1256300
* bsc#1256302
* bsc#1256306
* bsc#1256309
* bsc#1256317
* bsc#1256320
* bsc#1256323
* bsc#1256326
* bsc#1256328
* bsc#1256333
* bsc#1256334
* bsc#1256335
* bsc#1256337
* bsc#1256338
* bsc#1256344
* bsc#1256346
* bsc#1256349
* bsc#1256352
* bsc#1256353
* bsc#1256355
* bsc#1256358
* bsc#1256359
* bsc#1256363
* bsc#1256364
* bsc#1256368
* bsc#1256370
* bsc#1256375
* bsc#1256381
* bsc#1256382
* bsc#1256383
* bsc#1256384
* bsc#1256386
* bsc#1256388
* bsc#1256391
* bsc#1256394
* bsc#1256395
* bsc#1256396
* bsc#1256397
* bsc#1256398
* bsc#1256423
* bsc#1256426
* bsc#1256432
* jsc#PED-1073
* jsc#PED-14062
* jsc#PED-1407
* jsc#PED-1495
* jsc#PED-1549
* jsc#PED-1559
* jsc#PED-2765
* jsc#PED-370
* jsc#PED-376
* jsc#PED-7167
* jsc#PED-8111
* jsc#SLE-13847
* jsc#SLE-18378
* jsc#SLE-18384
* jsc#SLE-19253
* jsc#SLE-19255

Cross-References:

* CVE-2022-0854
* CVE-2022-48853
* CVE-2022-50614
* CVE-2022-50615
* CVE-2022-50617
* CVE-2022-50618
* CVE-2022-50619
* CVE-2022-50621
* CVE-2022-50622
* CVE-2022-50623
* CVE-2022-50625
* CVE-2022-50626
* CVE-2022-50629
* CVE-2022-50630
* CVE-2022-50633
* CVE-2022-50635
* CVE-2022-50636
* CVE-2022-50638
* CVE-2022-50640
* CVE-2022-50641
* CVE-2022-50643
* CVE-2022-50644
* CVE-2022-50646
* CVE-2022-50649
* CVE-2022-50652
* CVE-2022-50653
* CVE-2022-50656
* CVE-2022-50658
* CVE-2022-50660
* CVE-2022-50661
* CVE-2022-50662
* CVE-2022-50664
* CVE-2022-50665
* CVE-2022-50666
* CVE-2022-50667
* CVE-2022-50668
* CVE-2022-50669
* CVE-2022-50670
* CVE-2022-50671
* CVE-2022-50672
* CVE-2022-50673
* CVE-2022-50675
* CVE-2022-50677
* CVE-2022-50678
* CVE-2022-50679
* CVE-2022-50698
* CVE-2022-50699
* CVE-2022-50700
* CVE-2022-50701
* CVE-2022-50702
* CVE-2022-50703
* CVE-2022-50704
* CVE-2022-50705
* CVE-2022-50709
* CVE-2022-50710
* CVE-2022-50712
* CVE-2022-50714
* CVE-2022-50715
* CVE-2022-50716
* CVE-2022-50717
* CVE-2022-50718
* CVE-2022-50719
* CVE-2022-50722
* CVE-2022-50723
* CVE-2022-50724
* CVE-2022-50726
* CVE-2022-50727
* CVE-2022-50728
* CVE-2022-50730
* CVE-2022-50731
* CVE-2022-50732
* CVE-2022-50733
* CVE-2022-50735
* CVE-2022-50736
* CVE-2022-50738
* CVE-2022-50740
* CVE-2022-50742
* CVE-2022-50744
* CVE-2022-50745
* CVE-2022-50747
* CVE-2022-50749
* CVE-2022-50750
* CVE-2022-50751
* CVE-2022-50752
* CVE-2022-50754
* CVE-2022-50755
* CVE-2022-50756
* CVE-2022-50757
* CVE-2022-50758
* CVE-2022-50760
* CVE-2022-50761
* CVE-2022-50763
* CVE-2022-50767
* CVE-2022-50768
* CVE-2022-50769
* CVE-2022-50770
* CVE-2022-50773
* CVE-2022-50774
* CVE-2022-50776
* CVE-2022-50777
* CVE-2022-50779
* CVE-2022-50781
* CVE-2022-50782
* CVE-2022-50809
* CVE-2022-50814
* CVE-2022-50818
* CVE-2022-50819
* CVE-2022-50821
* CVE-2022-50822
* CVE-2022-50823
* CVE-2022-50824
* CVE-2022-50826
* CVE-2022-50827
* CVE-2022-50828
* CVE-2022-50829
* CVE-2022-50830
* CVE-2022-50832
* CVE-2022-50833
* CVE-2022-50834
* CVE-2022-50835
* CVE-2022-50836
* CVE-2022-50838
* CVE-2022-50839
* CVE-2022-50840
* CVE-2022-50842
* CVE-2022-50843
* CVE-2022-50844
* CVE-2022-50845
* CVE-2022-50846
* CVE-2022-50847
* CVE-2022-50848
* CVE-2022-50849
* CVE-2022-50850
* CVE-2022-50851
* CVE-2022-50853
* CVE-2022-50856
* CVE-2022-50858
* CVE-2022-50859
* CVE-2022-50860
* CVE-2022-50861
* CVE-2022-50862
* CVE-2022-50864
* CVE-2022-50866
* CVE-2022-50867
* CVE-2022-50868
* CVE-2022-50870
* CVE-2022-50872
* CVE-2022-50873
* CVE-2022-50876
* CVE-2022-50878
* CVE-2022-50880
* CVE-2022-50881
* CVE-2022-50882
* CVE-2022-50883
* CVE-2022-50884
* CVE-2022-50885
* CVE-2022-50886
* CVE-2022-50887
* CVE-2022-50888
* CVE-2022-50889
* CVE-2023-23559
* CVE-2023-53254
* CVE-2023-53743
* CVE-2023-53744
* CVE-2023-53746
* CVE-2023-53747
* CVE-2023-53751
* CVE-2023-53753
* CVE-2023-53754
* CVE-2023-53755
* CVE-2023-53761
* CVE-2023-53766
* CVE-2023-53769
* CVE-2023-53780
* CVE-2023-53781
* CVE-2023-53783
* CVE-2023-53786
* CVE-2023-53788
* CVE-2023-53792
* CVE-2023-53794
* CVE-2023-53801
* CVE-2023-53802
* CVE-2023-53803
* CVE-2023-53804
* CVE-2023-53806
* CVE-2023-53808
* CVE-2023-53811
* CVE-2023-53814
* CVE-2023-53816
* CVE-2023-53818
* CVE-2023-53819
* CVE-2023-53820
* CVE-2023-53827
* CVE-2023-53828
* CVE-2023-53830
* CVE-2023-53832
* CVE-2023-53833
* CVE-2023-53834
* CVE-2023-53837
* CVE-2023-53840
* CVE-2023-53842
* CVE-2023-53844
* CVE-2023-53845
* CVE-2023-53847
* CVE-2023-53848
* CVE-2023-53849
* CVE-2023-53850
* CVE-2023-53852
* CVE-2023-53858
* CVE-2023-53860
* CVE-2023-53862
* CVE-2023-53864
* CVE-2023-53866
* CVE-2023-53989
* CVE-2023-53990
* CVE-2023-53991
* CVE-2023-53996
* CVE-2023-53998
* CVE-2023-54001
* CVE-2023-54003
* CVE-2023-54007
* CVE-2023-54009
* CVE-2023-54010
* CVE-2023-54014
* CVE-2023-54015
* CVE-2023-54017
* CVE-2023-54018
* CVE-2023-54019
* CVE-2023-54020
* CVE-2023-54021
* CVE-2023-54024
* CVE-2023-54025
* CVE-2023-54026
* CVE-2023-54028
* CVE-2023-54036
* CVE-2023-54039
* CVE-2023-54040
* CVE-2023-54041
* CVE-2023-54042
* CVE-2023-54044
* CVE-2023-54045
* CVE-2023-54046
* CVE-2023-54047
* CVE-2023-54048
* CVE-2023-54049
* CVE-2023-54050
* CVE-2023-54051
* CVE-2023-54053
* CVE-2023-54055
* CVE-2023-54057
* CVE-2023-54058
* CVE-2023-54064
* CVE-2023-54070
* CVE-2023-54072
* CVE-2023-54074
* CVE-2023-54076
* CVE-2023-54078
* CVE-2023-54079
* CVE-2023-54083
* CVE-2023-54084
* CVE-2023-54090
* CVE-2023-54091
* CVE-2023-54092
* CVE-2023-54095
* CVE-2023-54096
* CVE-2023-54097
* CVE-2023-54098
* CVE-2023-54100
* CVE-2023-54102
* CVE-2023-54104
* CVE-2023-54106
* CVE-2023-54107
* CVE-2023-54108
* CVE-2023-54110
* CVE-2023-54111
* CVE-2023-54114
* CVE-2023-54115
* CVE-2023-54116
* CVE-2023-54118
* CVE-2023-54119
* CVE-2023-54120
* CVE-2023-54122
* CVE-2023-54123
* CVE-2023-54126
* CVE-2023-54127
* CVE-2023-54128
* CVE-2023-54130
* CVE-2023-54131
* CVE-2023-54132
* CVE-2023-54134
* CVE-2023-54136
* CVE-2023-54138
* CVE-2023-54140
* CVE-2023-54144
* CVE-2023-54146
* CVE-2023-54148
* CVE-2023-54150
* CVE-2023-54153
* CVE-2023-54156
* CVE-2023-54159
* CVE-2023-54164
* CVE-2023-54166
* CVE-2023-54168
* CVE-2023-54169
* CVE-2023-54170
* CVE-2023-54171
* CVE-2023-54173
* CVE-2023-54175
* CVE-2023-54177
* CVE-2023-54179
* CVE-2023-54183
* CVE-2023-54186
* CVE-2023-54189
* CVE-2023-54190
* CVE-2023-54194
* CVE-2023-54197
* CVE-2023-54198
* CVE-2023-54199
* CVE-2023-54201
* CVE-2023-54202
* CVE-2023-54205
* CVE-2023-54208
* CVE-2023-54210
* CVE-2023-54211
* CVE-2023-54213
* CVE-2023-54214
* CVE-2023-54219
* CVE-2023-54226
* CVE-2023-54229
* CVE-2023-54230
* CVE-2023-54234
* CVE-2023-54236
* CVE-2023-54238
* CVE-2023-54242
* CVE-2023-54244
* CVE-2023-54245
* CVE-2023-54251
* CVE-2023-54252
* CVE-2023-54254
* CVE-2023-54260
* CVE-2023-54262
* CVE-2023-54264
* CVE-2023-54266
* CVE-2023-54267
* CVE-2023-54269
* CVE-2023-54270
* CVE-2023-54271
* CVE-2023-54274
* CVE-2023-54275
* CVE-2023-54277
* CVE-2023-54280
* CVE-2023-54284
* CVE-2023-54286
* CVE-2023-54287
* CVE-2023-54289
* CVE-2023-54292
* CVE-2023-54293
* CVE-2023-54294
* CVE-2023-54295
* CVE-2023-54298
* CVE-2023-54299
* CVE-2023-54300
* CVE-2023-54301
* CVE-2023-54302
* CVE-2023-54304
* CVE-2023-54305
* CVE-2023-54309
* CVE-2023-54311
* CVE-2023-54315
* CVE-2023-54317
* CVE-2023-54319
* CVE-2023-54320
* CVE-2023-54321
* CVE-2023-54322
* CVE-2023-54325
* CVE-2023-54326
* CVE-2024-36933
* CVE-2024-53093
* CVE-2024-56590
* CVE-2025-39977
* CVE-2025-40019
* CVE-2025-40139
* CVE-2025-40215
* CVE-2025-40220
* CVE-2025-40233
* CVE-2025-40256
* CVE-2025-40258
* CVE-2025-40277
* CVE-2025-40280
* CVE-2025-40331
* CVE-2025-68218
* CVE-2025-68732

CVSS scores:

* CVE-2022-0854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-0854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-50614 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50614 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50615 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50617 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50618 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50622 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50622 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50625 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50626 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50633 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50636 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50638 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50638 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2022-50640 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50641 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50641 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50643 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50643 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50644 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50644 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50646 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50646 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50649 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50652 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50653 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50653 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50656 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50656 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
* CVE-2022-50658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50664 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50673 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50700 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50709 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50709 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-50710 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50710 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50714 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50714 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50716 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50717 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50717 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50719 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50722 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50723 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50723 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50724 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50726 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50732 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50733 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50735 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50736 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50736 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50738 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50740 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50740 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50742 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50742 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50744 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50745 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50745 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50747 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-50749 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2022-50750 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50750 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50751 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50752 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50752 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50755 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50755 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50756 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50756 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50757 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50758 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50758 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50760 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50761 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50763 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50763 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50767 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50768 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50769 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50770 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50770 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50773 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50774 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50774 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50776 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50777 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50777 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50779 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50779 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50781 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50781 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
* CVE-2022-50782 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50823 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50824 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50824 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50826 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50827 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50829 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50830 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50858 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50868 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-23559 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
* CVE-2023-23559 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-23559 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53254 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53254 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53254 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-53254 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-53743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53747 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53751 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53761 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53761 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53766 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53766 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53780 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53781 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53781 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53783 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53794 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53794 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53803 ( SUSE ): 5.1
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-53803 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-53804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53806 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53806 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53816 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-53818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53827 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53827 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53845 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53845 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-53847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53866 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53989 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53996 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2023-53996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-53998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54003 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54003 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54009 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54009 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54010 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54014 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54017 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54017 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54018 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54021 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54036 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54041 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54042 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54042 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54044 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54045 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54046 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54046 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54047 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54072 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54072 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54076 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54076 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54078 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54079 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54079 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54083 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54083 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54084 ( SUSE ): 7.0
CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54084 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54090 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54091 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54091 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54092 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54095 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54096 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54096 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54097 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54097 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54098 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54100 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54100 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54102 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54102 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54104 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-54106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54111 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54111 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54114 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54115 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54118 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54118 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54120 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54120 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54123 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54123 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54126 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54126 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54127 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54127 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54128 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54128 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54130 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54131 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54131 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54132 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54134 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54134 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54136 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54136 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54138 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54140 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54140 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54144 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54144 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54146 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54146 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54148 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54148 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
* CVE-2023-54150 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54150 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54153 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54156 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54159 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54159 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54164 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54166 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54166 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54168 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54169 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54170 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54173 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54173 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54175 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54175 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54177 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54179 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54179 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54183 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54183 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54186 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54189 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54190 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54190 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54194 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54194 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54197 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54198 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54199 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54201 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54201 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54205 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54205 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54208 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54208 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54210 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54210 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54211 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54213 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54213 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54214 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54214 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54219 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54219 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54226 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54226 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54229 ( SUSE ): 5.1
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54229 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54230 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54230 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54234 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54234 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54236 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54236 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54238 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54238 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54242 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54242 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54244 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54245 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54245 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54251 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54252 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54252 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54254 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54254 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54260 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54260 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54262 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54262 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54264 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54266 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54266 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54267 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-54267 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-54269 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54269 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54270 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54270 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54271 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54271 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54274 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54274 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54275 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54275 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54277 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54280 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54280 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54284 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54286 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54286 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54287 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54289 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54292 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54292 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54293 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54293 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54294 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54294 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54295 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54295 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54298 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54299 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54300 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54300 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54301 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54301 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54302 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54302 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54304 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54305 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54309 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54309 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54311 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54311 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54315 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54317 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54317 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54319 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54320 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54320 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54321 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54321 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54322 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54322 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54325 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54325 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54326 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54326 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-36933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56590 ( SUSE ): 6.9
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56590 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39977 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39977 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40019 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40019 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40139 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40139 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40215 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40215 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40220 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40220 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40258 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40258 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40280 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40280 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68732 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68732 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise Micro 5.5

An update that solves 392 vulnerabilities, contains 16 features and has 47
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to fix various security
issues

The following security issues were fixed:

* CVE-2022-50630: mm: hugetlb: fix UAF in hugetlb_handle_userfault
(bsc#1254785).
* CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer
(bsc#1255576).
* CVE-2023-53254: cacheinfo: Fix shared_cpu_map to handle shared caches at
different levels (bsc#1249871).
* CVE-2023-53781: smc: Fix use-after-free in tcp_write_timer_handler()
(bsc#1254751).
* CVE-2024-56590: Bluetooth: hci_core: Fix not checking skb length on
hci_acldata_packet (bsc#1235038).
* CVE-2025-39977: futex: Prevent use-after-free during requeue-PI
(bsc#1252046).
* CVE-2025-40019: crypto: essiv - Check ssize for decryption and in-place
encryption (bsc#1252678).
* CVE-2025-40139: net: ipv4: Consolidate ipv4_mtu and ip_dst_mtu_maybe_forward
(bsc#1253409).
* CVE-2025-40215: kABI: xfrm: delete x->tunnel as we delete x (bsc#1254959).
* CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk
workers (bsc#1254520).
* CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents
(bsc#1254813).
* CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work()
(bsc#1254843).
* CVE-2025-40277: drm/vmwgfx: Validate command header size against
(bsc#1254894).
* CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self()
(bsc#1254847).
* CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).
* CVE-2025-68732: gpu: host1x: Fix race in syncpt alloc/free (bsc#1255688).

The following non security issues were fixed:

* ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() (git-fixes).
* ACPI: PRM: Remove unnecessary strict handler address checks (git-fixes).
* ACPI: property: Do not pass NULL handles to acpi_attach_data() (git-fixes).
* ACPI: property: Fix buffer properties extraction for subnodes (git-fixes).
* KVM: SVM: Fix TSC_AUX virtualization setup (git-fixes).
* RDMA/cm: Rate limit destroy CM ID timeout error message (git-fixes).
* RDMA/counter: Check CAP_NET_RAW check in user namespace for RDMA counters
(git-fixes).
* RDMA/hns: Fix the modification of max_send_sge (git-fixes).
* RDMA/mlx5: Check CAP_NET_RAW in user namespace for anchor create (git-
fixes).
* RDMA/mlx5: Check CAP_NET_RAW in user namespace for devx create (git-fixes).
* RDMA/mlx5: Check CAP_NET_RAW in user namespace for flow create (git-fixes).
* RDMA/mlx5: Fix compilation warning when USER_ACCESS isn't set (git-fixes).
* RDMA/nldev: Check CAP_NET_RAW in user namespace for QP modify (git-fixes).
* RDMA/uverbs: Add empty rdma_uattrs_has_raw_cap() declaration (git-fixes).
* RDMA/uverbs: Check CAP_NET_RAW in user namespace for QP create (git-fixes).
* RDMA/uverbs: Check CAP_NET_RAW in user namespace for RAW QP create (git-
fixes).
* RDMA/uverbs: Check CAP_NET_RAW in user namespace for flow create (git-
fixes).
* arch/idle: Change arch_cpu_idle() behavior: always exit with IRQs disabled
(git-fixes).
* cpuidle/poll: Ensure IRQs stay disabled after cpuidle_state::enter() calls
(git-fixes).
* cpuidle: Move IRQ state validation (git-fixes).
* cpuidle: haltpoll: Do not enable interrupts when entering idle (git-fixes).
* dm: free table mempools if not used in __bind (git-fixes).
* padata: Honor the caller's alignment in case of chunk_size 0 (bsc#1237563).
* platform/x86/intel-uncore-freq: Fail module load when plat_info is NULL
(git-fixes).
* x86/bugs: Fix RSB clearing in indirect_branch_prediction_barrier() (git-
fixes).
* x86/bugs: Use SBPB in write_ibpb() if applicable (git-fixes).
* x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT (git-fixes).
* x86/tdx: Drop flags from __tdx_hypercall() (git-fixes).
* x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes).
* x86/tdx: Emit warning if IRQs are enabled during HLT #VE handling (git-
fixes).
* x86/tdx: Extend TDX_MODULE_CALL to support more TDCALL/SEAMCALL leafs (git-
fixes).
* x86/tdx: Fix __noreturn build warning around __tdx_hypercall_failed() (git-
fixes).
* x86/tdx: Fix arch_safe_halt() execution for TDX VMs (git-fixes).
* x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes).
* x86/tdx: Make TDX_HYPERCALL asm similar to TDX_MODULE_CALL (git-fixes).
* x86/tdx: Make macros of TDCALLs consistent with the spec (git-fixes).
* x86/tdx: Pass TDCALL/SEAMCALL input/output registers via a structure (git-
fixes).
* x86/tdx: Reimplement __tdx_hypercall() using TDX_MODULE_CALL asm (git-
fixes).
* x86/tdx: Remove 'struct tdx_hypercall_args' (git-fixes).
* x86/tdx: Remove TDX_HCALL_ISSUE_STI (git-fixes).
* x86/tdx: Rename __tdx_module_call() to __tdcall() (git-fixes).
* x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes).
* x86/tdx: Retry partially-completed page conversion hypercalls (git-fixes).
* x86/tdx: Skip saving output regs when SEAMCALL fails with VMFailInvalid
(git-fixes).
* x86/tdx: Zero out the missing RSI in TDX_HYPERCALL macro (git-fixes).
* x86/virt/tdx: Make TDX_MODULE_CALL handle SEAMCALL #UD and #GP (git-fixes).
* x86/virt/tdx: Wire up basic SEAMCALL functions (git-fixes).
* xfs: fix sparse inode limits on runt AG (bsc#1254392).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-263=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-263=1

## Package List:

* openSUSE Leap 15.5 (noarch)
* kernel-devel-rt-5.14.21-150500.13.118.1
* kernel-source-rt-5.14.21-150500.13.118.1
* openSUSE Leap 15.5 (x86_64)
* gfs2-kmp-rt-5.14.21-150500.13.118.1
* ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.118.1
* kernel-rt-debugsource-5.14.21-150500.13.118.1
* kernel-rt-devel-5.14.21-150500.13.118.1
* kselftests-kmp-rt-5.14.21-150500.13.118.1
* kernel-rt_debug-vdso-5.14.21-150500.13.118.1
* kernel-rt_debug-devel-5.14.21-150500.13.118.1
* kernel-rt_debug-debugsource-5.14.21-150500.13.118.1
* kernel-rt-devel-debuginfo-5.14.21-150500.13.118.1
* reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.118.1
* kernel-rt-optional-5.14.21-150500.13.118.1
* kernel-rt-vdso-5.14.21-150500.13.118.1
* kernel-rt-optional-debuginfo-5.14.21-150500.13.118.1
* kselftests-kmp-rt-debuginfo-5.14.21-150500.13.118.1
* kernel-syms-rt-5.14.21-150500.13.118.1
* kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.118.1
* kernel-rt-vdso-debuginfo-5.14.21-150500.13.118.1
* kernel-rt-livepatch-devel-5.14.21-150500.13.118.1
* dlm-kmp-rt-debuginfo-5.14.21-150500.13.118.1
* ocfs2-kmp-rt-5.14.21-150500.13.118.1
* kernel-rt-extra-debuginfo-5.14.21-150500.13.118.1
* kernel-rt_debug-debuginfo-5.14.21-150500.13.118.1
* reiserfs-kmp-rt-5.14.21-150500.13.118.1
* kernel-rt-extra-5.14.21-150500.13.118.1
* cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.118.1
* cluster-md-kmp-rt-5.14.21-150500.13.118.1
* kernel-rt-livepatch-5.14.21-150500.13.118.1
* kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.118.1
* gfs2-kmp-rt-debuginfo-5.14.21-150500.13.118.1
* kernel-rt-debuginfo-5.14.21-150500.13.118.1
* dlm-kmp-rt-5.14.21-150500.13.118.1
* openSUSE Leap 15.5 (nosrc x86_64)
* kernel-rt_debug-5.14.21-150500.13.118.1
* kernel-rt-5.14.21-150500.13.118.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-devel-rt-5.14.21-150500.13.118.1
* kernel-source-rt-5.14.21-150500.13.118.1
* SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
* kernel-rt-5.14.21-150500.13.118.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* kernel-rt-debugsource-5.14.21-150500.13.118.1
* kernel-rt-debuginfo-5.14.21-150500.13.118.1

## References:

* https://www.suse.com/security/cve/CVE-2022-0854.html
* https://www.suse.com/security/cve/CVE-2022-48853.html
* https://www.suse.com/security/cve/CVE-2022-50614.html
* https://www.suse.com/security/cve/CVE-2022-50615.html
* https://www.suse.com/security/cve/CVE-2022-50617.html
* https://www.suse.com/security/cve/CVE-2022-50618.html
* https://www.suse.com/security/cve/CVE-2022-50619.html
* https://www.suse.com/security/cve/CVE-2022-50621.html
* https://www.suse.com/security/cve/CVE-2022-50622.html
* https://www.suse.com/security/cve/CVE-2022-50623.html
* https://www.suse.com/security/cve/CVE-2022-50625.html
* https://www.suse.com/security/cve/CVE-2022-50626.html
* https://www.suse.com/security/cve/CVE-2022-50629.html
* https://www.suse.com/security/cve/CVE-2022-50630.html
* https://www.suse.com/security/cve/CVE-2022-50633.html
* https://www.suse.com/security/cve/CVE-2022-50635.html
* https://www.suse.com/security/cve/CVE-2022-50636.html
* https://www.suse.com/security/cve/CVE-2022-50638.html
* https://www.suse.com/security/cve/CVE-2022-50640.html
* https://www.suse.com/security/cve/CVE-2022-50641.html
* https://www.suse.com/security/cve/CVE-2022-50643.html
* https://www.suse.com/security/cve/CVE-2022-50644.html
* https://www.suse.com/security/cve/CVE-2022-50646.html
* https://www.suse.com/security/cve/CVE-2022-50649.html
* https://www.suse.com/security/cve/CVE-2022-50652.html
* https://www.suse.com/security/cve/CVE-2022-50653.html
* https://www.suse.com/security/cve/CVE-2022-50656.html
* https://www.suse.com/security/cve/CVE-2022-50658.html
* https://www.suse.com/security/cve/CVE-2022-50660.html
* https://www.suse.com/security/cve/CVE-2022-50661.html
* https://www.suse.com/security/cve/CVE-2022-50662.html
* https://www.suse.com/security/cve/CVE-2022-50664.html
* https://www.suse.com/security/cve/CVE-2022-50665.html
* https://www.suse.com/security/cve/CVE-2022-50666.html
* https://www.suse.com/security/cve/CVE-2022-50667.html
* https://www.suse.com/security/cve/CVE-2022-50668.html
* https://www.suse.com/security/cve/CVE-2022-50669.html
* https://www.suse.com/security/cve/CVE-2022-50670.html
* https://www.suse.com/security/cve/CVE-2022-50671.html
* https://www.suse.com/security/cve/CVE-2022-50672.html
* https://www.suse.com/security/cve/CVE-2022-50673.html
* https://www.suse.com/security/cve/CVE-2022-50675.html
* https://www.suse.com/security/cve/CVE-2022-50677.html
* https://www.suse.com/security/cve/CVE-2022-50678.html
* https://www.suse.com/security/cve/CVE-2022-50679.html
* https://www.suse.com/security/cve/CVE-2022-50698.html
* https://www.suse.com/security/cve/CVE-2022-50699.html
* https://www.suse.com/security/cve/CVE-2022-50700.html
* https://www.suse.com/security/cve/CVE-2022-50701.html
* https://www.suse.com/security/cve/CVE-2022-50702.html
* https://www.suse.com/security/cve/CVE-2022-50703.html
* https://www.suse.com/security/cve/CVE-2022-50704.html
* https://www.suse.com/security/cve/CVE-2022-50705.html
* https://www.suse.com/security/cve/CVE-2022-50709.html
* https://www.suse.com/security/cve/CVE-2022-50710.html
* https://www.suse.com/security/cve/CVE-2022-50712.html
* https://www.suse.com/security/cve/CVE-2022-50714.html
* https://www.suse.com/security/cve/CVE-2022-50715.html
* https://www.suse.com/security/cve/CVE-2022-50716.html
* https://www.suse.com/security/cve/CVE-2022-50717.html
* https://www.suse.com/security/cve/CVE-2022-50718.html
* https://www.suse.com/security/cve/CVE-2022-50719.html
* https://www.suse.com/security/cve/CVE-2022-50722.html
* https://www.suse.com/security/cve/CVE-2022-50723.html
* https://www.suse.com/security/cve/CVE-2022-50724.html
* https://www.suse.com/security/cve/CVE-2022-50726.html
* https://www.suse.com/security/cve/CVE-2022-50727.html
* https://www.suse.com/security/cve/CVE-2022-50728.html
* https://www.suse.com/security/cve/CVE-2022-50730.html
* https://www.suse.com/security/cve/CVE-2022-50731.html
* https://www.suse.com/security/cve/CVE-2022-50732.html
* https://www.suse.com/security/cve/CVE-2022-50733.html
* https://www.suse.com/security/cve/CVE-2022-50735.html
* https://www.suse.com/security/cve/CVE-2022-50736.html
* https://www.suse.com/security/cve/CVE-2022-50738.html
* https://www.suse.com/security/cve/CVE-2022-50740.html
* https://www.suse.com/security/cve/CVE-2022-50742.html
* https://www.suse.com/security/cve/CVE-2022-50744.html
* https://www.suse.com/security/cve/CVE-2022-50745.html
* https://www.suse.com/security/cve/CVE-2022-50747.html
* https://www.suse.com/security/cve/CVE-2022-50749.html
* https://www.suse.com/security/cve/CVE-2022-50750.html
* https://www.suse.com/security/cve/CVE-2022-50751.html
* https://www.suse.com/security/cve/CVE-2022-50752.html
* https://www.suse.com/security/cve/CVE-2022-50754.html
* https://www.suse.com/security/cve/CVE-2022-50755.html
* https://www.suse.com/security/cve/CVE-2022-50756.html
* https://www.suse.com/security/cve/CVE-2022-50757.html
* https://www.suse.com/security/cve/CVE-2022-50758.html
* https://www.suse.com/security/cve/CVE-2022-50760.html
* https://www.suse.com/security/cve/CVE-2022-50761.html
* https://www.suse.com/security/cve/CVE-2022-50763.html
* https://www.suse.com/security/cve/CVE-2022-50767.html
* https://www.suse.com/security/cve/CVE-2022-50768.html
* https://www.suse.com/security/cve/CVE-2022-50769.html
* https://www.suse.com/security/cve/CVE-2022-50770.html
* https://www.suse.com/security/cve/CVE-2022-50773.html
* https://www.suse.com/security/cve/CVE-2022-50774.html
* https://www.suse.com/security/cve/CVE-2022-50776.html
* https://www.suse.com/security/cve/CVE-2022-50777.html
* https://www.suse.com/security/cve/CVE-2022-50779.html
* https://www.suse.com/security/cve/CVE-2022-50781.html
* https://www.suse.com/security/cve/CVE-2022-50782.html
* https://www.suse.com/security/cve/CVE-2022-50809.html
* https://www.suse.com/security/cve/CVE-2022-50814.html
* https://www.suse.com/security/cve/CVE-2022-50818.html
* https://www.suse.com/security/cve/CVE-2022-50819.html
* https://www.suse.com/security/cve/CVE-2022-50821.html
* https://www.suse.com/security/cve/CVE-2022-50822.html
* https://www.suse.com/security/cve/CVE-2022-50823.html
* https://www.suse.com/security/cve/CVE-2022-50824.html
* https://www.suse.com/security/cve/CVE-2022-50826.html
* https://www.suse.com/security/cve/CVE-2022-50827.html
* https://www.suse.com/security/cve/CVE-2022-50828.html
* https://www.suse.com/security/cve/CVE-2022-50829.html
* https://www.suse.com/security/cve/CVE-2022-50830.html
* https://www.suse.com/security/cve/CVE-2022-50832.html
* https://www.suse.com/security/cve/CVE-2022-50833.html
* https://www.suse.com/security/cve/CVE-2022-50834.html
* https://www.suse.com/security/cve/CVE-2022-50835.html
* https://www.suse.com/security/cve/CVE-2022-50836.html
* https://www.suse.com/security/cve/CVE-2022-50838.html
* https://www.suse.com/security/cve/CVE-2022-50839.html
* https://www.suse.com/security/cve/CVE-2022-50840.html
* https://www.suse.com/security/cve/CVE-2022-50842.html
* https://www.suse.com/security/cve/CVE-2022-50843.html
* https://www.suse.com/security/cve/CVE-2022-50844.html
* https://www.suse.com/security/cve/CVE-2022-50845.html
* https://www.suse.com/security/cve/CVE-2022-50846.html
* https://www.suse.com/security/cve/CVE-2022-50847.html
* https://www.suse.com/security/cve/CVE-2022-50848.html
* https://www.suse.com/security/cve/CVE-2022-50849.html
* https://www.suse.com/security/cve/CVE-2022-50850.html
* https://www.suse.com/security/cve/CVE-2022-50851.html
* https://www.suse.com/security/cve/CVE-2022-50853.html
* https://www.suse.com/security/cve/CVE-2022-50856.html
* https://www.suse.com/security/cve/CVE-2022-50858.html
* https://www.suse.com/security/cve/CVE-2022-50859.html
* https://www.suse.com/security/cve/CVE-2022-50860.html
* https://www.suse.com/security/cve/CVE-2022-50861.html
* https://www.suse.com/security/cve/CVE-2022-50862.html
* https://www.suse.com/security/cve/CVE-2022-50864.html
* https://www.suse.com/security/cve/CVE-2022-50866.html
* https://www.suse.com/security/cve/CVE-2022-50867.html
* https://www.suse.com/security/cve/CVE-2022-50868.html
* https://www.suse.com/security/cve/CVE-2022-50870.html
* https://www.suse.com/security/cve/CVE-2022-50872.html
* https://www.suse.com/security/cve/CVE-2022-50873.html
* https://www.suse.com/security/cve/CVE-2022-50876.html
* https://www.suse.com/security/cve/CVE-2022-50878.html
* https://www.suse.com/security/cve/CVE-2022-50880.html
* https://www.suse.com/security/cve/CVE-2022-50881.html
* https://www.suse.com/security/cve/CVE-2022-50882.html
* https://www.suse.com/security/cve/CVE-2022-50883.html
* https://www.suse.com/security/cve/CVE-2022-50884.html
* https://www.suse.com/security/cve/CVE-2022-50885.html
* https://www.suse.com/security/cve/CVE-2022-50886.html
* https://www.suse.com/security/cve/CVE-2022-50887.html
* https://www.suse.com/security/cve/CVE-2022-50888.html
* https://www.suse.com/security/cve/CVE-2022-50889.html
* https://www.suse.com/security/cve/CVE-2023-23559.html
* https://www.suse.com/security/cve/CVE-2023-53254.html
* https://www.suse.com/security/cve/CVE-2023-53743.html
* https://www.suse.com/security/cve/CVE-2023-53744.html
* https://www.suse.com/security/cve/CVE-2023-53746.html
* https://www.suse.com/security/cve/CVE-2023-53747.html
* https://www.suse.com/security/cve/CVE-2023-53751.html
* https://www.suse.com/security/cve/CVE-2023-53753.html
* https://www.suse.com/security/cve/CVE-2023-53754.html
* https://www.suse.com/security/cve/CVE-2023-53755.html
* https://www.suse.com/security/cve/CVE-2023-53761.html
* https://www.suse.com/security/cve/CVE-2023-53766.html
* https://www.suse.com/security/cve/CVE-2023-53769.html
* https://www.suse.com/security/cve/CVE-2023-53780.html
* https://www.suse.com/security/cve/CVE-2023-53781.html
* https://www.suse.com/security/cve/CVE-2023-53783.html
* https://www.suse.com/security/cve/CVE-2023-53786.html
* https://www.suse.com/security/cve/CVE-2023-53788.html
* https://www.suse.com/security/cve/CVE-2023-53792.html
* https://www.suse.com/security/cve/CVE-2023-53794.html
* https://www.suse.com/security/cve/CVE-2023-53801.html
* https://www.suse.com/security/cve/CVE-2023-53802.html
* https://www.suse.com/security/cve/CVE-2023-53803.html
* https://www.suse.com/security/cve/CVE-2023-53804.html
* https://www.suse.com/security/cve/CVE-2023-53806.html
* https://www.suse.com/security/cve/CVE-2023-53808.html
* https://www.suse.com/security/cve/CVE-2023-53811.html
* https://www.suse.com/security/cve/CVE-2023-53814.html
* https://www.suse.com/security/cve/CVE-2023-53816.html
* https://www.suse.com/security/cve/CVE-2023-53818.html
* https://www.suse.com/security/cve/CVE-2023-53819.html
* https://www.suse.com/security/cve/CVE-2023-53820.html
* https://www.suse.com/security/cve/CVE-2023-53827.html
* https://www.suse.com/security/cve/CVE-2023-53828.html
* https://www.suse.com/security/cve/CVE-2023-53830.html
* https://www.suse.com/security/cve/CVE-2023-53832.html
* https://www.suse.com/security/cve/CVE-2023-53833.html
* https://www.suse.com/security/cve/CVE-2023-53834.html
* https://www.suse.com/security/cve/CVE-2023-53837.html
* https://www.suse.com/security/cve/CVE-2023-53840.html
* https://www.suse.com/security/cve/CVE-2023-53842.html
* https://www.suse.com/security/cve/CVE-2023-53844.html
* https://www.suse.com/security/cve/CVE-2023-53845.html
* https://www.suse.com/security/cve/CVE-2023-53847.html
* https://www.suse.com/security/cve/CVE-2023-53848.html
* https://www.suse.com/security/cve/CVE-2023-53849.html
* https://www.suse.com/security/cve/CVE-2023-53850.html
* https://www.suse.com/security/cve/CVE-2023-53852.html
* https://www.suse.com/security/cve/CVE-2023-53858.html
* https://www.suse.com/security/cve/CVE-2023-53860.html
* https://www.suse.com/security/cve/CVE-2023-53862.html
* https://www.suse.com/security/cve/CVE-2023-53864.html
* https://www.suse.com/security/cve/CVE-2023-53866.html
* https://www.suse.com/security/cve/CVE-2023-53989.html
* https://www.suse.com/security/cve/CVE-2023-53990.html
* https://www.suse.com/security/cve/CVE-2023-53991.html
* https://www.suse.com/security/cve/CVE-2023-53996.html
* https://www.suse.com/security/cve/CVE-2023-53998.html
* https://www.suse.com/security/cve/CVE-2023-54001.html
* https://www.suse.com/security/cve/CVE-2023-54003.html
* https://www.suse.com/security/cve/CVE-2023-54007.html
* https://www.suse.com/security/cve/CVE-2023-54009.html
* https://www.suse.com/security/cve/CVE-2023-54010.html
* https://www.suse.com/security/cve/CVE-2023-54014.html
* https://www.suse.com/security/cve/CVE-2023-54015.html
* https://www.suse.com/security/cve/CVE-2023-54017.html
* https://www.suse.com/security/cve/CVE-2023-54018.html
* https://www.suse.com/security/cve/CVE-2023-54019.html
* https://www.suse.com/security/cve/CVE-2023-54020.html
* https://www.suse.com/security/cve/CVE-2023-54021.html
* https://www.suse.com/security/cve/CVE-2023-54024.html
* https://www.suse.com/security/cve/CVE-2023-54025.html
* https://www.suse.com/security/cve/CVE-2023-54026.html
* https://www.suse.com/security/cve/CVE-2023-54028.html
* https://www.suse.com/security/cve/CVE-2023-54036.html
* https://www.suse.com/security/cve/CVE-2023-54039.html
* https://www.suse.com/security/cve/CVE-2023-54040.html
* https://www.suse.com/security/cve/CVE-2023-54041.html
* https://www.suse.com/security/cve/CVE-2023-54042.html
* https://www.suse.com/security/cve/CVE-2023-54044.html
* https://www.suse.com/security/cve/CVE-2023-54045.html
* https://www.suse.com/security/cve/CVE-2023-54046.html
* https://www.suse.com/security/cve/CVE-2023-54047.html
* https://www.suse.com/security/cve/CVE-2023-54048.html
* https://www.suse.com/security/cve/CVE-2023-54049.html
* https://www.suse.com/security/cve/CVE-2023-54050.html
* https://www.suse.com/security/cve/CVE-2023-54051.html
* https://www.suse.com/security/cve/CVE-2023-54053.html
* https://www.suse.com/security/cve/CVE-2023-54055.html
* https://www.suse.com/security/cve/CVE-2023-54057.html
* https://www.suse.com/security/cve/CVE-2023-54058.html
* https://www.suse.com/security/cve/CVE-2023-54064.html
* https://www.suse.com/security/cve/CVE-2023-54070.html
* https://www.suse.com/security/cve/CVE-2023-54072.html
* https://www.suse.com/security/cve/CVE-2023-54074.html
* https://www.suse.com/security/cve/CVE-2023-54076.html
* https://www.suse.com/security/cve/CVE-2023-54078.html
* https://www.suse.com/security/cve/CVE-2023-54079.html
* https://www.suse.com/security/cve/CVE-2023-54083.html
* https://www.suse.com/security/cve/CVE-2023-54084.html
* https://www.suse.com/security/cve/CVE-2023-54090.html
* https://www.suse.com/security/cve/CVE-2023-54091.html
* https://www.suse.com/security/cve/CVE-2023-54092.html
* https://www.suse.com/security/cve/CVE-2023-54095.html
* https://www.suse.com/security/cve/CVE-2023-54096.html
* https://www.suse.com/security/cve/CVE-2023-54097.html
* https://www.suse.com/security/cve/CVE-2023-54098.html
* https://www.suse.com/security/cve/CVE-2023-54100.html
* https://www.suse.com/security/cve/CVE-2023-54102.html
* https://www.suse.com/security/cve/CVE-2023-54104.html
* https://www.suse.com/security/cve/CVE-2023-54106.html
* https://www.suse.com/security/cve/CVE-2023-54107.html
* https://www.suse.com/security/cve/CVE-2023-54108.html
* https://www.suse.com/security/cve/CVE-2023-54110.html
* https://www.suse.com/security/cve/CVE-2023-54111.html
* https://www.suse.com/security/cve/CVE-2023-54114.html
* https://www.suse.com/security/cve/CVE-2023-54115.html
* https://www.suse.com/security/cve/CVE-2023-54116.html
* https://www.suse.com/security/cve/CVE-2023-54118.html
* https://www.suse.com/security/cve/CVE-2023-54119.html
* https://www.suse.com/security/cve/CVE-2023-54120.html
* https://www.suse.com/security/cve/CVE-2023-54122.html
* https://www.suse.com/security/cve/CVE-2023-54123.html
* https://www.suse.com/security/cve/CVE-2023-54126.html
* https://www.suse.com/security/cve/CVE-2023-54127.html
* https://www.suse.com/security/cve/CVE-2023-54128.html
* https://www.suse.com/security/cve/CVE-2023-54130.html
* https://www.suse.com/security/cve/CVE-2023-54131.html
* https://www.suse.com/security/cve/CVE-2023-54132.html
* https://www.suse.com/security/cve/CVE-2023-54134.html
* https://www.suse.com/security/cve/CVE-2023-54136.html
* https://www.suse.com/security/cve/CVE-2023-54138.html
* https://www.suse.com/security/cve/CVE-2023-54140.html
* https://www.suse.com/security/cve/CVE-2023-54144.html
* https://www.suse.com/security/cve/CVE-2023-54146.html
* https://www.suse.com/security/cve/CVE-2023-54148.html
* https://www.suse.com/security/cve/CVE-2023-54150.html
* https://www.suse.com/security/cve/CVE-2023-54153.html
* https://www.suse.com/security/cve/CVE-2023-54156.html
* https://www.suse.com/security/cve/CVE-2023-54159.html
* https://www.suse.com/security/cve/CVE-2023-54164.html
* https://www.suse.com/security/cve/CVE-2023-54166.html
* https://www.suse.com/security/cve/CVE-2023-54168.html
* https://www.suse.com/security/cve/CVE-2023-54169.html
* https://www.suse.com/security/cve/CVE-2023-54170.html
* https://www.suse.com/security/cve/CVE-2023-54171.html
* https://www.suse.com/security/cve/CVE-2023-54173.html
* https://www.suse.com/security/cve/CVE-2023-54175.html
* https://www.suse.com/security/cve/CVE-2023-54177.html
* https://www.suse.com/security/cve/CVE-2023-54179.html
* https://www.suse.com/security/cve/CVE-2023-54183.html
* https://www.suse.com/security/cve/CVE-2023-54186.html
* https://www.suse.com/security/cve/CVE-2023-54189.html
* https://www.suse.com/security/cve/CVE-2023-54190.html
* https://www.suse.com/security/cve/CVE-2023-54194.html
* https://www.suse.com/security/cve/CVE-2023-54197.html
* https://www.suse.com/security/cve/CVE-2023-54198.html
* https://www.suse.com/security/cve/CVE-2023-54199.html
* https://www.suse.com/security/cve/CVE-2023-54201.html
* https://www.suse.com/security/cve/CVE-2023-54202.html
* https://www.suse.com/security/cve/CVE-2023-54205.html
* https://www.suse.com/security/cve/CVE-2023-54208.html
* https://www.suse.com/security/cve/CVE-2023-54210.html
* https://www.suse.com/security/cve/CVE-2023-54211.html
* https://www.suse.com/security/cve/CVE-2023-54213.html
* https://www.suse.com/security/cve/CVE-2023-54214.html
* https://www.suse.com/security/cve/CVE-2023-54219.html
* https://www.suse.com/security/cve/CVE-2023-54226.html
* https://www.suse.com/security/cve/CVE-2023-54229.html
* https://www.suse.com/security/cve/CVE-2023-54230.html
* https://www.suse.com/security/cve/CVE-2023-54234.html
* https://www.suse.com/security/cve/CVE-2023-54236.html
* https://www.suse.com/security/cve/CVE-2023-54238.html
* https://www.suse.com/security/cve/CVE-2023-54242.html
* https://www.suse.com/security/cve/CVE-2023-54244.html
* https://www.suse.com/security/cve/CVE-2023-54245.html
* https://www.suse.com/security/cve/CVE-2023-54251.html
* https://www.suse.com/security/cve/CVE-2023-54252.html
* https://www.suse.com/security/cve/CVE-2023-54254.html
* https://www.suse.com/security/cve/CVE-2023-54260.html
* https://www.suse.com/security/cve/CVE-2023-54262.html
* https://www.suse.com/security/cve/CVE-2023-54264.html
* https://www.suse.com/security/cve/CVE-2023-54266.html
* https://www.suse.com/security/cve/CVE-2023-54267.html
* https://www.suse.com/security/cve/CVE-2023-54269.html
* https://www.suse.com/security/cve/CVE-2023-54270.html
* https://www.suse.com/security/cve/CVE-2023-54271.html
* https://www.suse.com/security/cve/CVE-2023-54274.html
* https://www.suse.com/security/cve/CVE-2023-54275.html
* https://www.suse.com/security/cve/CVE-2023-54277.html
* https://www.suse.com/security/cve/CVE-2023-54280.html
* https://www.suse.com/security/cve/CVE-2023-54284.html
* https://www.suse.com/security/cve/CVE-2023-54286.html
* https://www.suse.com/security/cve/CVE-2023-54287.html
* https://www.suse.com/security/cve/CVE-2023-54289.html
* https://www.suse.com/security/cve/CVE-2023-54292.html
* https://www.suse.com/security/cve/CVE-2023-54293.html
* https://www.suse.com/security/cve/CVE-2023-54294.html
* https://www.suse.com/security/cve/CVE-2023-54295.html
* https://www.suse.com/security/cve/CVE-2023-54298.html
* https://www.suse.com/security/cve/CVE-2023-54299.html
* https://www.suse.com/security/cve/CVE-2023-54300.html
* https://www.suse.com/security/cve/CVE-2023-54301.html
* https://www.suse.com/security/cve/CVE-2023-54302.html
* https://www.suse.com/security/cve/CVE-2023-54304.html
* https://www.suse.com/security/cve/CVE-2023-54305.html
* https://www.suse.com/security/cve/CVE-2023-54309.html
* https://www.suse.com/security/cve/CVE-2023-54311.html
* https://www.suse.com/security/cve/CVE-2023-54315.html
* https://www.suse.com/security/cve/CVE-2023-54317.html
* https://www.suse.com/security/cve/CVE-2023-54319.html
* https://www.suse.com/security/cve/CVE-2023-54320.html
* https://www.suse.com/security/cve/CVE-2023-54321.html
* https://www.suse.com/security/cve/CVE-2023-54322.html
* https://www.suse.com/security/cve/CVE-2023-54325.html
* https://www.suse.com/security/cve/CVE-2023-54326.html
* https://www.suse.com/security/cve/CVE-2024-36933.html
* https://www.suse.com/security/cve/CVE-2024-53093.html
* https://www.suse.com/security/cve/CVE-2024-56590.html
* https://www.suse.com/security/cve/CVE-2025-39977.html
* https://www.suse.com/security/cve/CVE-2025-40019.html
* https://www.suse.com/security/cve/CVE-2025-40139.html
* https://www.suse.com/security/cve/CVE-2025-40215.html
* https://www.suse.com/security/cve/CVE-2025-40220.html
* https://www.suse.com/security/cve/CVE-2025-40233.html
* https://www.suse.com/security/cve/CVE-2025-40256.html
* https://www.suse.com/security/cve/CVE-2025-40258.html
* https://www.suse.com/security/cve/CVE-2025-40277.html
* https://www.suse.com/security/cve/CVE-2025-40280.html
* https://www.suse.com/security/cve/CVE-2025-40331.html
* https://www.suse.com/security/cve/CVE-2025-68218.html
* https://www.suse.com/security/cve/CVE-2025-68732.html
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1193629
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1196823
* https://bugzilla.suse.com/show_bug.cgi?id=1204957
* https://bugzilla.suse.com/show_bug.cgi?id=1205567
* https://bugzilla.suse.com/show_bug.cgi?id=1206451
* https://bugzilla.suse.com/show_bug.cgi?id=1206843
* https://bugzilla.suse.com/show_bug.cgi?id=1206889
* https://bugzilla.suse.com/show_bug.cgi?id=1207051
* https://bugzilla.suse.com/show_bug.cgi?id=1207088
* https://bugzilla.suse.com/show_bug.cgi?id=1207315
* https://bugzilla.suse.com/show_bug.cgi?id=1207611
* https://bugzilla.suse.com/show_bug.cgi?id=1207620
* https://bugzilla.suse.com/show_bug.cgi?id=1207622
* https://bugzilla.suse.com/show_bug.cgi?id=1207636
* https://bugzilla.suse.com/show_bug.cgi?id=1207644
* https://bugzilla.suse.com/show_bug.cgi?id=1207646
* https://bugzilla.suse.com/show_bug.cgi?id=1207652
* https://bugzilla.suse.com/show_bug.cgi?id=1207653
* https://bugzilla.suse.com/show_bug.cgi?id=1208570
* https://bugzilla.suse.com/show_bug.cgi?id=1208758
* https://bugzilla.suse.com/show_bug.cgi?id=1209799
* https://bugzilla.suse.com/show_bug.cgi?id=1209980
* https://bugzilla.suse.com/show_bug.cgi?id=1210644
* https://bugzilla.suse.com/show_bug.cgi?id=1210817
* https://bugzilla.suse.com/show_bug.cgi?id=1210943
* https://bugzilla.suse.com/show_bug.cgi?id=1211690
* https://bugzilla.suse.com/show_bug.cgi?id=1213025
* https://bugzilla.suse.com/show_bug.cgi?id=1213032
* https://bugzilla.suse.com/show_bug.cgi?id=1213093
* https://bugzilla.suse.com/show_bug.cgi?id=1213105
* https://bugzilla.suse.com/show_bug.cgi?id=1213110
* https://bugzilla.suse.com/show_bug.cgi?id=1213111
* https://bugzilla.suse.com/show_bug.cgi?id=1213653
* https://bugzilla.suse.com/show_bug.cgi?id=1213747
* https://bugzilla.suse.com/show_bug.cgi?id=1213867
* https://bugzilla.suse.com/show_bug.cgi?id=1214635
* https://bugzilla.suse.com/show_bug.cgi?id=1214940
* https://bugzilla.suse.com/show_bug.cgi?id=1214962
* https://bugzilla.suse.com/show_bug.cgi?id=1214986
* https://bugzilla.suse.com/show_bug.cgi?id=1214990
* https://bugzilla.suse.com/show_bug.cgi?id=1216062
* https://bugzilla.suse.com/show_bug.cgi?id=1224573
* https://bugzilla.suse.com/show_bug.cgi?id=1225832
* https://bugzilla.suse.com/show_bug.cgi?id=1226797
* https://bugzilla.suse.com/show_bug.cgi?id=1226846
* https://bugzilla.suse.com/show_bug.cgi?id=1228015
* https://bugzilla.suse.com/show_bug.cgi?id=1233640
* https://bugzilla.suse.com/show_bug.cgi?id=1235038
* https://bugzilla.suse.com/show_bug.cgi?id=1237563
* https://bugzilla.suse.com/show_bug.cgi?id=1249871
* https://bugzilla.suse.com/show_bug.cgi?id=1252046
* https://bugzilla.suse.com/show_bug.cgi?id=1252678
* https://bugzilla.suse.com/show_bug.cgi?id=1253409
* https://bugzilla.suse.com/show_bug.cgi?id=1254392
* https://bugzilla.suse.com/show_bug.cgi?id=1254520
* https://bugzilla.suse.com/show_bug.cgi?id=1254559
* https://bugzilla.suse.com/show_bug.cgi?id=1254562
* https://bugzilla.suse.com/show_bug.cgi?id=1254572
* https://bugzilla.suse.com/show_bug.cgi?id=1254578
* https://bugzilla.suse.com/show_bug.cgi?id=1254580
* https://bugzilla.suse.com/show_bug.cgi?id=1254592
* https://bugzilla.suse.com/show_bug.cgi?id=1254601
* https://bugzilla.suse.com/show_bug.cgi?id=1254608
* https://bugzilla.suse.com/show_bug.cgi?id=1254609
* https://bugzilla.suse.com/show_bug.cgi?id=1254614
* https://bugzilla.suse.com/show_bug.cgi?id=1254615
* https://bugzilla.suse.com/show_bug.cgi?id=1254617
* https://bugzilla.suse.com/show_bug.cgi?id=1254623
* https://bugzilla.suse.com/show_bug.cgi?id=1254625
* https://bugzilla.suse.com/show_bug.cgi?id=1254626
* https://bugzilla.suse.com/show_bug.cgi?id=1254631
* https://bugzilla.suse.com/show_bug.cgi?id=1254632
* https://bugzilla.suse.com/show_bug.cgi?id=1254634
* https://bugzilla.suse.com/show_bug.cgi?id=1254644
* https://bugzilla.suse.com/show_bug.cgi?id=1254645
* https://bugzilla.suse.com/show_bug.cgi?id=1254649
* https://bugzilla.suse.com/show_bug.cgi?id=1254651
* https://bugzilla.suse.com/show_bug.cgi?id=1254653
* https://bugzilla.suse.com/show_bug.cgi?id=1254656
* https://bugzilla.suse.com/show_bug.cgi?id=1254658
* https://bugzilla.suse.com/show_bug.cgi?id=1254660
* https://bugzilla.suse.com/show_bug.cgi?id=1254664
* https://bugzilla.suse.com/show_bug.cgi?id=1254671
* https://bugzilla.suse.com/show_bug.cgi?id=1254674
* https://bugzilla.suse.com/show_bug.cgi?id=1254676
* https://bugzilla.suse.com/show_bug.cgi?id=1254677
* https://bugzilla.suse.com/show_bug.cgi?id=1254681
* https://bugzilla.suse.com/show_bug.cgi?id=1254684
* https://bugzilla.suse.com/show_bug.cgi?id=1254685
* https://bugzilla.suse.com/show_bug.cgi?id=1254686
* https://bugzilla.suse.com/show_bug.cgi?id=1254690
* https://bugzilla.suse.com/show_bug.cgi?id=1254692
* https://bugzilla.suse.com/show_bug.cgi?id=1254694
* https://bugzilla.suse.com/show_bug.cgi?id=1254696
* https://bugzilla.suse.com/show_bug.cgi?id=1254698
* https://bugzilla.suse.com/show_bug.cgi?id=1254699
* https://bugzilla.suse.com/show_bug.cgi?id=1254704
* https://bugzilla.suse.com/show_bug.cgi?id=1254706
* https://bugzilla.suse.com/show_bug.cgi?id=1254709
* https://bugzilla.suse.com/show_bug.cgi?id=1254710
* https://bugzilla.suse.com/show_bug.cgi?id=1254711
* https://bugzilla.suse.com/show_bug.cgi?id=1254712
* https://bugzilla.suse.com/show_bug.cgi?id=1254713
* https://bugzilla.suse.com/show_bug.cgi?id=1254714
* https://bugzilla.suse.com/show_bug.cgi?id=1254716
* https://bugzilla.suse.com/show_bug.cgi?id=1254723
* https://bugzilla.suse.com/show_bug.cgi?id=1254725
* https://bugzilla.suse.com/show_bug.cgi?id=1254728
* https://bugzilla.suse.com/show_bug.cgi?id=1254729
* https://bugzilla.suse.com/show_bug.cgi?id=1254743
* https://bugzilla.suse.com/show_bug.cgi?id=1254745
* https://bugzilla.suse.com/show_bug.cgi?id=1254751
* https://bugzilla.suse.com/show_bug.cgi?id=1254753
* https://bugzilla.suse.com/show_bug.cgi?id=1254754
* https://bugzilla.suse.com/show_bug.cgi?id=1254756
* https://bugzilla.suse.com/show_bug.cgi?id=1254759
* https://bugzilla.suse.com/show_bug.cgi?id=1254763
* https://bugzilla.suse.com/show_bug.cgi?id=1254775
* https://bugzilla.suse.com/show_bug.cgi?id=1254780
* https://bugzilla.suse.com/show_bug.cgi?id=1254781
* https://bugzilla.suse.com/show_bug.cgi?id=1254782
* https://bugzilla.suse.com/show_bug.cgi?id=1254783
* https://bugzilla.suse.com/show_bug.cgi?id=1254785
* https://bugzilla.suse.com/show_bug.cgi?id=1254786
* https://bugzilla.suse.com/show_bug.cgi?id=1254788
* https://bugzilla.suse.com/show_bug.cgi?id=1254789
* https://bugzilla.suse.com/show_bug.cgi?id=1254792
* https://bugzilla.suse.com/show_bug.cgi?id=1254813
* https://bugzilla.suse.com/show_bug.cgi?id=1254843
* https://bugzilla.suse.com/show_bug.cgi?id=1254847
* https://bugzilla.suse.com/show_bug.cgi?id=1254851
* https://bugzilla.suse.com/show_bug.cgi?id=1254894
* https://bugzilla.suse.com/show_bug.cgi?id=1254902
* https://bugzilla.suse.com/show_bug.cgi?id=1254910
* https://bugzilla.suse.com/show_bug.cgi?id=1254911
* https://bugzilla.suse.com/show_bug.cgi?id=1254915
* https://bugzilla.suse.com/show_bug.cgi?id=1254916
* https://bugzilla.suse.com/show_bug.cgi?id=1254917
* https://bugzilla.suse.com/show_bug.cgi?id=1254920
* https://bugzilla.suse.com/show_bug.cgi?id=1254922
* https://bugzilla.suse.com/show_bug.cgi?id=1254958
* https://bugzilla.suse.com/show_bug.cgi?id=1254959
* https://bugzilla.suse.com/show_bug.cgi?id=1254974
* https://bugzilla.suse.com/show_bug.cgi?id=1254979
* https://bugzilla.suse.com/show_bug.cgi?id=1254986
* https://bugzilla.suse.com/show_bug.cgi?id=1254994
* https://bugzilla.suse.com/show_bug.cgi?id=1255002
* https://bugzilla.suse.com/show_bug.cgi?id=1255005
* https://bugzilla.suse.com/show_bug.cgi?id=1255007
* https://bugzilla.suse.com/show_bug.cgi?id=1255049
* https://bugzilla.suse.com/show_bug.cgi?id=1255060
* https://bugzilla.suse.com/show_bug.cgi?id=1255107
* https://bugzilla.suse.com/show_bug.cgi?id=1255163
* https://bugzilla.suse.com/show_bug.cgi?id=1255165
* https://bugzilla.suse.com/show_bug.cgi?id=1255245
* https://bugzilla.suse.com/show_bug.cgi?id=1255467
* https://bugzilla.suse.com/show_bug.cgi?id=1255469
* https://bugzilla.suse.com/show_bug.cgi?id=1255521
* https://bugzilla.suse.com/show_bug.cgi?id=1255528
* https://bugzilla.suse.com/show_bug.cgi?id=1255532
* https://bugzilla.suse.com/show_bug.cgi?id=1255546
* https://bugzilla.suse.com/show_bug.cgi?id=1255549
* https://bugzilla.suse.com/show_bug.cgi?id=1255554
* https://bugzilla.suse.com/show_bug.cgi?id=1255555
* https://bugzilla.suse.com/show_bug.cgi?id=1255558
* https://bugzilla.suse.com/show_bug.cgi?id=1255560
* https://bugzilla.suse.com/show_bug.cgi?id=1255561
* https://bugzilla.suse.com/show_bug.cgi?id=1255562
* https://bugzilla.suse.com/show_bug.cgi?id=1255565
* https://bugzilla.suse.com/show_bug.cgi?id=1255574
* https://bugzilla.suse.com/show_bug.cgi?id=1255576
* https://bugzilla.suse.com/show_bug.cgi?id=1255578
* https://bugzilla.suse.com/show_bug.cgi?id=1255582
* https://bugzilla.suse.com/show_bug.cgi?id=1255596
* https://bugzilla.suse.com/show_bug.cgi?id=1255600
* https://bugzilla.suse.com/show_bug.cgi?id=1255605
* https://bugzilla.suse.com/show_bug.cgi?id=1255607
* https://bugzilla.suse.com/show_bug.cgi?id=1255608
* https://bugzilla.suse.com/show_bug.cgi?id=1255609
* https://bugzilla.suse.com/show_bug.cgi?id=1255618
* https://bugzilla.suse.com/show_bug.cgi?id=1255619
* https://bugzilla.suse.com/show_bug.cgi?id=1255620
* https://bugzilla.suse.com/show_bug.cgi?id=1255623
* https://bugzilla.suse.com/show_bug.cgi?id=1255624
* https://bugzilla.suse.com/show_bug.cgi?id=1255626
* https://bugzilla.suse.com/show_bug.cgi?id=1255627
* https://bugzilla.suse.com/show_bug.cgi?id=1255628
* https://bugzilla.suse.com/show_bug.cgi?id=1255635
* https://bugzilla.suse.com/show_bug.cgi?id=1255636
* https://bugzilla.suse.com/show_bug.cgi?id=1255688
* https://bugzilla.suse.com/show_bug.cgi?id=1255690
* https://bugzilla.suse.com/show_bug.cgi?id=1255697
* https://bugzilla.suse.com/show_bug.cgi?id=1255702
* https://bugzilla.suse.com/show_bug.cgi?id=1255704
* https://bugzilla.suse.com/show_bug.cgi?id=1255745
* https://bugzilla.suse.com/show_bug.cgi?id=1255747
* https://bugzilla.suse.com/show_bug.cgi?id=1255749
* https://bugzilla.suse.com/show_bug.cgi?id=1255750
* https://bugzilla.suse.com/show_bug.cgi?id=1255757
* https://bugzilla.suse.com/show_bug.cgi?id=1255758
* https://bugzilla.suse.com/show_bug.cgi?id=1255760
* https://bugzilla.suse.com/show_bug.cgi?id=1255761
* https://bugzilla.suse.com/show_bug.cgi?id=1255762
* https://bugzilla.suse.com/show_bug.cgi?id=1255763
* https://bugzilla.suse.com/show_bug.cgi?id=1255769
* https://bugzilla.suse.com/show_bug.cgi?id=1255771
* https://bugzilla.suse.com/show_bug.cgi?id=1255773
* https://bugzilla.suse.com/show_bug.cgi?id=1255780
* https://bugzilla.suse.com/show_bug.cgi?id=1255786
* https://bugzilla.suse.com/show_bug.cgi?id=1255787
* https://bugzilla.suse.com/show_bug.cgi?id=1255789
* https://bugzilla.suse.com/show_bug.cgi?id=1255790
* https://bugzilla.suse.com/show_bug.cgi?id=1255791
* https://bugzilla.suse.com/show_bug.cgi?id=1255792
* https://bugzilla.suse.com/show_bug.cgi?id=1255796
* https://bugzilla.suse.com/show_bug.cgi?id=1255797
* https://bugzilla.suse.com/show_bug.cgi?id=1255800
* https://bugzilla.suse.com/show_bug.cgi?id=1255801
* https://bugzilla.suse.com/show_bug.cgi?id=1255802
* https://bugzilla.suse.com/show_bug.cgi?id=1255803
* https://bugzilla.suse.com/show_bug.cgi?id=1255804
* https://bugzilla.suse.com/show_bug.cgi?id=1255806
* https://bugzilla.suse.com/show_bug.cgi?id=1255808
* https://bugzilla.suse.com/show_bug.cgi?id=1255819
* https://bugzilla.suse.com/show_bug.cgi?id=1255839
* https://bugzilla.suse.com/show_bug.cgi?id=1255841
* https://bugzilla.suse.com/show_bug.cgi?id=1255843
* https://bugzilla.suse.com/show_bug.cgi?id=1255844
* https://bugzilla.suse.com/show_bug.cgi?id=1255872
* https://bugzilla.suse.com/show_bug.cgi?id=1255875
* https://bugzilla.suse.com/show_bug.cgi?id=1255876
* https://bugzilla.suse.com/show_bug.cgi?id=1255877
* https://bugzilla.suse.com/show_bug.cgi?id=1255878
* https://bugzilla.suse.com/show_bug.cgi?id=1255880
* https://bugzilla.suse.com/show_bug.cgi?id=1255881
* https://bugzilla.suse.com/show_bug.cgi?id=1255888
* https://bugzilla.suse.com/show_bug.cgi?id=1255889
* https://bugzilla.suse.com/show_bug.cgi?id=1255890
* https://bugzilla.suse.com/show_bug.cgi?id=1255899
* https://bugzilla.suse.com/show_bug.cgi?id=1255901
* https://bugzilla.suse.com/show_bug.cgi?id=1255902
* https://bugzilla.suse.com/show_bug.cgi?id=1255905
* https://bugzilla.suse.com/show_bug.cgi?id=1255906
* https://bugzilla.suse.com/show_bug.cgi?id=1255909
* https://bugzilla.suse.com/show_bug.cgi?id=1255910
* https://bugzilla.suse.com/show_bug.cgi?id=1255912
* https://bugzilla.suse.com/show_bug.cgi?id=1255916
* https://bugzilla.suse.com/show_bug.cgi?id=1255919
* https://bugzilla.suse.com/show_bug.cgi?id=1255920
* https://bugzilla.suse.com/show_bug.cgi?id=1255922
* https://bugzilla.suse.com/show_bug.cgi?id=1255924
* https://bugzilla.suse.com/show_bug.cgi?id=1255925
* https://bugzilla.suse.com/show_bug.cgi?id=1255939
* https://bugzilla.suse.com/show_bug.cgi?id=1255946
* https://bugzilla.suse.com/show_bug.cgi?id=1255950
* https://bugzilla.suse.com/show_bug.cgi?id=1255953
* https://bugzilla.suse.com/show_bug.cgi?id=1255954
* https://bugzilla.suse.com/show_bug.cgi?id=1255955
* https://bugzilla.suse.com/show_bug.cgi?id=1255962
* https://bugzilla.suse.com/show_bug.cgi?id=1255964
* https://bugzilla.suse.com/show_bug.cgi?id=1255968
* https://bugzilla.suse.com/show_bug.cgi?id=1255969
* https://bugzilla.suse.com/show_bug.cgi?id=1255970
* https://bugzilla.suse.com/show_bug.cgi?id=1255971
* https://bugzilla.suse.com/show_bug.cgi?id=1255974
* https://bugzilla.suse.com/show_bug.cgi?id=1255978
* https://bugzilla.suse.com/show_bug.cgi?id=1255979
* https://bugzilla.suse.com/show_bug.cgi?id=1255983
* https://bugzilla.suse.com/show_bug.cgi?id=1255985
* https://bugzilla.suse.com/show_bug.cgi?id=1255990
* https://bugzilla.suse.com/show_bug.cgi?id=1255993
* https://bugzilla.suse.com/show_bug.cgi?id=1255994
* https://bugzilla.suse.com/show_bug.cgi?id=1255996
* https://bugzilla.suse.com/show_bug.cgi?id=1255998
* https://bugzilla.suse.com/show_bug.cgi?id=1256034
* https://bugzilla.suse.com/show_bug.cgi?id=1256040
* https://bugzilla.suse.com/show_bug.cgi?id=1256042
* https://bugzilla.suse.com/show_bug.cgi?id=1256045
* https://bugzilla.suse.com/show_bug.cgi?id=1256046
* https://bugzilla.suse.com/show_bug.cgi?id=1256048
* https://bugzilla.suse.com/show_bug.cgi?id=1256049
* https://bugzilla.suse.com/show_bug.cgi?id=1256050
* https://bugzilla.suse.com/show_bug.cgi?id=1256053
* https://bugzilla.suse.com/show_bug.cgi?id=1256056
* https://bugzilla.suse.com/show_bug.cgi?id=1256057
* https://bugzilla.suse.com/show_bug.cgi?id=1256062
* https://bugzilla.suse.com/show_bug.cgi?id=1256063
* https://bugzilla.suse.com/show_bug.cgi?id=1256064
* https://bugzilla.suse.com/show_bug.cgi?id=1256065
* https://bugzilla.suse.com/show_bug.cgi?id=1256071
* https://bugzilla.suse.com/show_bug.cgi?id=1256074
* https://bugzilla.suse.com/show_bug.cgi?id=1256081
* https://bugzilla.suse.com/show_bug.cgi?id=1256084
* https://bugzilla.suse.com/show_bug.cgi?id=1256086
* https://bugzilla.suse.com/show_bug.cgi?id=1256088
* https://bugzilla.suse.com/show_bug.cgi?id=1256091
* https://bugzilla.suse.com/show_bug.cgi?id=1256093
* https://bugzilla.suse.com/show_bug.cgi?id=1256099
* https://bugzilla.suse.com/show_bug.cgi?id=1256101
* https://bugzilla.suse.com/show_bug.cgi?id=1256103
* https://bugzilla.suse.com/show_bug.cgi?id=1256106
* https://bugzilla.suse.com/show_bug.cgi?id=1256111
* https://bugzilla.suse.com/show_bug.cgi?id=1256112
* https://bugzilla.suse.com/show_bug.cgi?id=1256114
* https://bugzilla.suse.com/show_bug.cgi?id=1256115
* https://bugzilla.suse.com/show_bug.cgi?id=1256118
* https://bugzilla.suse.com/show_bug.cgi?id=1256119
* https://bugzilla.suse.com/show_bug.cgi?id=1256121
* https://bugzilla.suse.com/show_bug.cgi?id=1256122
* https://bugzilla.suse.com/show_bug.cgi?id=1256124
* https://bugzilla.suse.com/show_bug.cgi?id=1256125
* https://bugzilla.suse.com/show_bug.cgi?id=1256126
* https://bugzilla.suse.com/show_bug.cgi?id=1256127
* https://bugzilla.suse.com/show_bug.cgi?id=1256128
* https://bugzilla.suse.com/show_bug.cgi?id=1256130
* https://bugzilla.suse.com/show_bug.cgi?id=1256131
* https://bugzilla.suse.com/show_bug.cgi?id=1256132
* https://bugzilla.suse.com/show_bug.cgi?id=1256133
* https://bugzilla.suse.com/show_bug.cgi?id=1256136
* https://bugzilla.suse.com/show_bug.cgi?id=1256137
* https://bugzilla.suse.com/show_bug.cgi?id=1256140
* https://bugzilla.suse.com/show_bug.cgi?id=1256141
* https://bugzilla.suse.com/show_bug.cgi?id=1256142
* https://bugzilla.suse.com/show_bug.cgi?id=1256143
* https://bugzilla.suse.com/show_bug.cgi?id=1256144
* https://bugzilla.suse.com/show_bug.cgi?id=1256145
* https://bugzilla.suse.com/show_bug.cgi?id=1256149
* https://bugzilla.suse.com/show_bug.cgi?id=1256150
* https://bugzilla.suse.com/show_bug.cgi?id=1256152
* https://bugzilla.suse.com/show_bug.cgi?id=1256154
* https://bugzilla.suse.com/show_bug.cgi?id=1256155
* https://bugzilla.suse.com/show_bug.cgi?id=1256157
* https://bugzilla.suse.com/show_bug.cgi?id=1256158
* https://bugzilla.suse.com/show_bug.cgi?id=1256162
* https://bugzilla.suse.com/show_bug.cgi?id=1256164
* https://bugzilla.suse.com/show_bug.cgi?id=1256165
* https://bugzilla.suse.com/show_bug.cgi?id=1256166
* https://bugzilla.suse.com/show_bug.cgi?id=1256167
* https://bugzilla.suse.com/show_bug.cgi?id=1256172
* https://bugzilla.suse.com/show_bug.cgi?id=1256173
* https://bugzilla.suse.com/show_bug.cgi?id=1256174
* https://bugzilla.suse.com/show_bug.cgi?id=1256177
* https://bugzilla.suse.com/show_bug.cgi?id=1256178
* https://bugzilla.suse.com/show_bug.cgi?id=1256179
* https://bugzilla.suse.com/show_bug.cgi?id=1256182
* https://bugzilla.suse.com/show_bug.cgi?id=1256184
* https://bugzilla.suse.com/show_bug.cgi?id=1256185
* https://bugzilla.suse.com/show_bug.cgi?id=1256186
* https://bugzilla.suse.com/show_bug.cgi?id=1256188
* https://bugzilla.suse.com/show_bug.cgi?id=1256189
* https://bugzilla.suse.com/show_bug.cgi?id=1256191
* https://bugzilla.suse.com/show_bug.cgi?id=1256192
* https://bugzilla.suse.com/show_bug.cgi?id=1256193
* https://bugzilla.suse.com/show_bug.cgi?id=1256194
* https://bugzilla.suse.com/show_bug.cgi?id=1256196
* https://bugzilla.suse.com/show_bug.cgi?id=1256198
* https://bugzilla.suse.com/show_bug.cgi?id=1256199
* https://bugzilla.suse.com/show_bug.cgi?id=1256200
* https://bugzilla.suse.com/show_bug.cgi?id=1256202
* https://bugzilla.suse.com/show_bug.cgi?id=1256203
* https://bugzilla.suse.com/show_bug.cgi?id=1256204
* https://bugzilla.suse.com/show_bug.cgi?id=1256205
* https://bugzilla.suse.com/show_bug.cgi?id=1256206
* https://bugzilla.suse.com/show_bug.cgi?id=1256207
* https://bugzilla.suse.com/show_bug.cgi?id=1256208
* https://bugzilla.suse.com/show_bug.cgi?id=1256211
* https://bugzilla.suse.com/show_bug.cgi?id=1256214
* https://bugzilla.suse.com/show_bug.cgi?id=1256215
* https://bugzilla.suse.com/show_bug.cgi?id=1256216
* https://bugzilla.suse.com/show_bug.cgi?id=1256218
* https://bugzilla.suse.com/show_bug.cgi?id=1256219
* https://bugzilla.suse.com/show_bug.cgi?id=1256220
* https://bugzilla.suse.com/show_bug.cgi?id=1256221
* https://bugzilla.suse.com/show_bug.cgi?id=1256223
* https://bugzilla.suse.com/show_bug.cgi?id=1256228
* https://bugzilla.suse.com/show_bug.cgi?id=1256230
* https://bugzilla.suse.com/show_bug.cgi?id=1256231
* https://bugzilla.suse.com/show_bug.cgi?id=1256235
* https://bugzilla.suse.com/show_bug.cgi?id=1256239
* https://bugzilla.suse.com/show_bug.cgi?id=1256241
* https://bugzilla.suse.com/show_bug.cgi?id=1256242
* https://bugzilla.suse.com/show_bug.cgi?id=1256245
* https://bugzilla.suse.com/show_bug.cgi?id=1256248
* https://bugzilla.suse.com/show_bug.cgi?id=1256250
* https://bugzilla.suse.com/show_bug.cgi?id=1256254
* https://bugzilla.suse.com/show_bug.cgi?id=1256260
* https://bugzilla.suse.com/show_bug.cgi?id=1256265
* https://bugzilla.suse.com/show_bug.cgi?id=1256269
* https://bugzilla.suse.com/show_bug.cgi?id=1256271
* https://bugzilla.suse.com/show_bug.cgi?id=1256274
* https://bugzilla.suse.com/show_bug.cgi?id=1256282
* https://bugzilla.suse.com/show_bug.cgi?id=1256285
* https://bugzilla.suse.com/show_bug.cgi?id=1256291
* https://bugzilla.suse.com/show_bug.cgi?id=1256294
* https://bugzilla.suse.com/show_bug.cgi?id=1256295
* https://bugzilla.suse.com/show_bug.cgi?id=1256300
* https://bugzilla.suse.com/show_bug.cgi?id=1256302
* https://bugzilla.suse.com/show_bug.cgi?id=1256306
* https://bugzilla.suse.com/show_bug.cgi?id=1256309
* https://bugzilla.suse.com/show_bug.cgi?id=1256317
* https://bugzilla.suse.com/show_bug.cgi?id=1256320
* https://bugzilla.suse.com/show_bug.cgi?id=1256323
* https://bugzilla.suse.com/show_bug.cgi?id=1256326
* https://bugzilla.suse.com/show_bug.cgi?id=1256328
* https://bugzilla.suse.com/show_bug.cgi?id=1256333
* https://bugzilla.suse.com/show_bug.cgi?id=1256334
* https://bugzilla.suse.com/show_bug.cgi?id=1256335
* https://bugzilla.suse.com/show_bug.cgi?id=1256337
* https://bugzilla.suse.com/show_bug.cgi?id=1256338
* https://bugzilla.suse.com/show_bug.cgi?id=1256344
* https://bugzilla.suse.com/show_bug.cgi?id=1256346
* https://bugzilla.suse.com/show_bug.cgi?id=1256349
* https://bugzilla.suse.com/show_bug.cgi?id=1256352
* https://bugzilla.suse.com/show_bug.cgi?id=1256353
* https://bugzilla.suse.com/show_bug.cgi?id=1256355
* https://bugzilla.suse.com/show_bug.cgi?id=1256358
* https://bugzilla.suse.com/show_bug.cgi?id=1256359
* https://bugzilla.suse.com/show_bug.cgi?id=1256363
* https://bugzilla.suse.com/show_bug.cgi?id=1256364
* https://bugzilla.suse.com/show_bug.cgi?id=1256368
* https://bugzilla.suse.com/show_bug.cgi?id=1256370
* https://bugzilla.suse.com/show_bug.cgi?id=1256375
* https://bugzilla.suse.com/show_bug.cgi?id=1256381
* https://bugzilla.suse.com/show_bug.cgi?id=1256382
* https://bugzilla.suse.com/show_bug.cgi?id=1256383
* https://bugzilla.suse.com/show_bug.cgi?id=1256384
* https://bugzilla.suse.com/show_bug.cgi?id=1256386
* https://bugzilla.suse.com/show_bug.cgi?id=1256388
* https://bugzilla.suse.com/show_bug.cgi?id=1256391
* https://bugzilla.suse.com/show_bug.cgi?id=1256394
* https://bugzilla.suse.com/show_bug.cgi?id=1256395
* https://bugzilla.suse.com/show_bug.cgi?id=1256396
* https://bugzilla.suse.com/show_bug.cgi?id=1256397
* https://bugzilla.suse.com/show_bug.cgi?id=1256398
* https://bugzilla.suse.com/show_bug.cgi?id=1256423
* https://bugzilla.suse.com/show_bug.cgi?id=1256426
* https://bugzilla.suse.com/show_bug.cgi?id=1256432
* https://jira.suse.com/browse/PED-1073
* https://jira.suse.com/browse/PED-14062
* https://jira.suse.com/browse/PED-1407
* https://jira.suse.com/browse/PED-1495
* https://jira.suse.com/browse/PED-1549
* https://jira.suse.com/browse/PED-1559
* https://jira.suse.com/browse/PED-2765
* https://jira.suse.com/browse/PED-370
* https://jira.suse.com/browse/PED-376
* https://jira.suse.com/browse/PED-7167
* https://jira.suse.com/browse/PED-8111
* https://jira.suse.com/browse/SLE-13847
* https://jira.suse.com/browse/SLE-18378
* https://jira.suse.com/browse/SLE-18384
* https://jira.suse.com/browse/SLE-19253
* https://jira.suse.com/browse/SLE-19255



SUSE-SU-2026:0274-1: important: Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP6)


# Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise
15 SP6)

Announcement ID: SUSE-SU-2026:0274-1
Release Date: 2026-01-23T14:05:58Z
Rating: important
References:

* bsc#1248400
* bsc#1248670
* bsc#1249241
* bsc#1250192
* bsc#1251203
* bsc#1251787
* bsc#1253437
* bsc#1256928

Cross-References:

* CVE-2023-53676
* CVE-2025-38476
* CVE-2025-38572
* CVE-2025-38588
* CVE-2025-38608
* CVE-2025-39682
* CVE-2025-40204

CVSS scores:

* CVE-2023-53676 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38476 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38572 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38588 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38588 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38608 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40204 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves seven vulnerabilities and has one security fix can now be
installed.

## Description:

This update for the SUSE Linux Enterprise kernel 6.4.0-150600.23.53 fixes
various security issues

The following security issues were fixed:

* CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in
lio_target_nacl_info_show() (bsc#1251787).
* CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline()
(bsc#1251203).
* CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment()
(bsc#1248400).
* CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size()
(bsc#1249241).
* CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data()
in ktls (bsc#1248670).
* CVE-2025-39682: tls: fix handling of zero-length records on the rx_list
(bsc#1250192).
* CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437).

The following non security issue was fixed:

* fix addr_bit_set() issue on big-endian machines (bsc#1256928).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-275=1 SUSE-2026-276=1 SUSE-2026-277=1
SUSE-2026-274=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-275=1 SUSE-SLE-
Module-Live-Patching-15-SP6-2026-276=1 SUSE-SLE-Module-Live-
Patching-15-SP6-2026-277=1 SUSE-SLE-Module-Live-Patching-15-SP6-2026-274=1

## Package List:

* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_50-default-10-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_10-debugsource-11-150600.2.1
* kernel-livepatch-6_4_0-150600_23_42-default-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_47-default-11-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_9-debugsource-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_47-default-debuginfo-11-150600.2.1
* kernel-livepatch-6_4_0-150600_23_53-default-10-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_11-debugsource-10-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_12-debugsource-10-150600.2.1
* kernel-livepatch-6_4_0-150600_23_53-default-debuginfo-10-150600.2.1
* kernel-livepatch-6_4_0-150600_23_42-default-debuginfo-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_50-default-debuginfo-10-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_50-default-10-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_10-debugsource-11-150600.2.1
* kernel-livepatch-6_4_0-150600_23_42-default-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_47-default-11-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_9-debugsource-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_47-default-debuginfo-11-150600.2.1
* kernel-livepatch-6_4_0-150600_23_53-default-10-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_11-debugsource-10-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_12-debugsource-10-150600.2.1
* kernel-livepatch-6_4_0-150600_23_53-default-debuginfo-10-150600.2.1
* kernel-livepatch-6_4_0-150600_23_42-default-debuginfo-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_50-default-debuginfo-10-150600.2.1

## References:

* https://www.suse.com/security/cve/CVE-2023-53676.html
* https://www.suse.com/security/cve/CVE-2025-38476.html
* https://www.suse.com/security/cve/CVE-2025-38572.html
* https://www.suse.com/security/cve/CVE-2025-38588.html
* https://www.suse.com/security/cve/CVE-2025-38608.html
* https://www.suse.com/security/cve/CVE-2025-39682.html
* https://www.suse.com/security/cve/CVE-2025-40204.html
* https://bugzilla.suse.com/show_bug.cgi?id=1248400
* https://bugzilla.suse.com/show_bug.cgi?id=1248670
* https://bugzilla.suse.com/show_bug.cgi?id=1249241
* https://bugzilla.suse.com/show_bug.cgi?id=1250192
* https://bugzilla.suse.com/show_bug.cgi?id=1251203
* https://bugzilla.suse.com/show_bug.cgi?id=1251787
* https://bugzilla.suse.com/show_bug.cgi?id=1253437
* https://bugzilla.suse.com/show_bug.cgi?id=1256928



SUSE-SU-2026:0280-1: important: Security update for openvswitch


# Security update for openvswitch

Announcement ID: SUSE-SU-2026:0280-1
Release Date: 2026-01-23T15:34:06Z
Rating: important
References:

* bsc#1210054
* bsc#1212125
* bsc#1216002
* bsc#1219465
* bsc#1255435

Cross-References:

* CVE-2023-1668
* CVE-2023-3152
* CVE-2023-3153
* CVE-2023-3966
* CVE-2023-5366
* CVE-2024-2182
* CVE-2025-0650

CVSS scores:

* CVE-2023-1668 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-1668 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-1668 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-3152 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3152 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-3152 ( NVD ): 6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2023-3153 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-3153 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-3966 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-3966 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-3966 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-5366 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-5366 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-2182 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-2182 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-0650 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-0650 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0650 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves seven vulnerabilities can now be installed.

## Description:

This update for openvswitch fixes the following issues:

Update to v3.1.7:

* CVE-2023-3966: openvswitch, openvswitch3: Invalid memory access in Geneve
with HW offload (bsc#1219465).
* CVE-2024-2182: openvswitch: ov: insufficient validation of incoming BFD
packets may lead to denial of service (bsc#1255435).
* CVE-2023-1668: openvswitch: remote traffic denial of service via crafted
packets with IP proto 0 (bsc#1210054).
* CVE-2023-3153: openvswitch,openvswitch3: service monitor MAC flow is not
rate limited (bsc#1212125).
* CVE-2023-5366: openvswitch: missing masks on a final stage with ports trie
(bsc#1216002).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-280=1 openSUSE-SLE-15.6-2026-280=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-280=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-280=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* openvswitch-ipsec-3.1.7-150600.33.9.1
* openvswitch-pki-3.1.7-150600.33.9.1
* ovn-23.03.3-150600.33.9.1
* ovn-vtep-23.03.3-150600.33.9.1
* ovn-host-debuginfo-23.03.3-150600.33.9.1
* libovn-23_03-0-23.03.3-150600.33.9.1
* ovn-host-23.03.3-150600.33.9.1
* ovn-vtep-debuginfo-23.03.3-150600.33.9.1
* openvswitch-test-debuginfo-3.1.7-150600.33.9.1
* ovn-central-23.03.3-150600.33.9.1
* openvswitch-3.1.7-150600.33.9.1
* ovn-docker-23.03.3-150600.33.9.1
* ovn-devel-23.03.3-150600.33.9.1
* ovn-debuginfo-23.03.3-150600.33.9.1
* libopenvswitch-3_1-0-3.1.7-150600.33.9.1
* openvswitch-debugsource-3.1.7-150600.33.9.1
* openvswitch-test-3.1.7-150600.33.9.1
* openvswitch-vtep-debuginfo-3.1.7-150600.33.9.1
* openvswitch-vtep-3.1.7-150600.33.9.1
* ovn-central-debuginfo-23.03.3-150600.33.9.1
* libovn-23_03-0-debuginfo-23.03.3-150600.33.9.1
* libopenvswitch-3_1-0-debuginfo-3.1.7-150600.33.9.1
* python3-ovs-3.1.7-150600.33.9.1
* openvswitch-debuginfo-3.1.7-150600.33.9.1
* openvswitch-devel-3.1.7-150600.33.9.1
* openSUSE Leap 15.6 (noarch)
* ovn-doc-23.03.3-150600.33.9.1
* openvswitch-doc-3.1.7-150600.33.9.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* openvswitch-ipsec-3.1.7-150600.33.9.1
* openvswitch-pki-3.1.7-150600.33.9.1
* ovn-23.03.3-150600.33.9.1
* ovn-vtep-23.03.3-150600.33.9.1
* ovn-host-debuginfo-23.03.3-150600.33.9.1
* libovn-23_03-0-23.03.3-150600.33.9.1
* ovn-host-23.03.3-150600.33.9.1
* ovn-vtep-debuginfo-23.03.3-150600.33.9.1
* openvswitch-test-debuginfo-3.1.7-150600.33.9.1
* ovn-central-23.03.3-150600.33.9.1
* openvswitch-3.1.7-150600.33.9.1
* ovn-docker-23.03.3-150600.33.9.1
* ovn-devel-23.03.3-150600.33.9.1
* ovn-debuginfo-23.03.3-150600.33.9.1
* libopenvswitch-3_1-0-3.1.7-150600.33.9.1
* openvswitch-debugsource-3.1.7-150600.33.9.1
* openvswitch-test-3.1.7-150600.33.9.1
* openvswitch-vtep-debuginfo-3.1.7-150600.33.9.1
* openvswitch-vtep-3.1.7-150600.33.9.1
* ovn-central-debuginfo-23.03.3-150600.33.9.1
* libovn-23_03-0-debuginfo-23.03.3-150600.33.9.1
* libopenvswitch-3_1-0-debuginfo-3.1.7-150600.33.9.1
* python3-ovs-3.1.7-150600.33.9.1
* openvswitch-debuginfo-3.1.7-150600.33.9.1
* openvswitch-devel-3.1.7-150600.33.9.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* openvswitch-ipsec-3.1.7-150600.33.9.1
* openvswitch-pki-3.1.7-150600.33.9.1
* ovn-23.03.3-150600.33.9.1
* ovn-vtep-23.03.3-150600.33.9.1
* ovn-host-debuginfo-23.03.3-150600.33.9.1
* libovn-23_03-0-23.03.3-150600.33.9.1
* ovn-host-23.03.3-150600.33.9.1
* ovn-vtep-debuginfo-23.03.3-150600.33.9.1
* openvswitch-test-debuginfo-3.1.7-150600.33.9.1
* ovn-central-23.03.3-150600.33.9.1
* openvswitch-3.1.7-150600.33.9.1
* ovn-docker-23.03.3-150600.33.9.1
* ovn-devel-23.03.3-150600.33.9.1
* ovn-debuginfo-23.03.3-150600.33.9.1
* libopenvswitch-3_1-0-3.1.7-150600.33.9.1
* openvswitch-debugsource-3.1.7-150600.33.9.1
* openvswitch-test-3.1.7-150600.33.9.1
* openvswitch-vtep-debuginfo-3.1.7-150600.33.9.1
* openvswitch-vtep-3.1.7-150600.33.9.1
* ovn-central-debuginfo-23.03.3-150600.33.9.1
* libovn-23_03-0-debuginfo-23.03.3-150600.33.9.1
* libopenvswitch-3_1-0-debuginfo-3.1.7-150600.33.9.1
* python3-ovs-3.1.7-150600.33.9.1
* openvswitch-debuginfo-3.1.7-150600.33.9.1
* openvswitch-devel-3.1.7-150600.33.9.1

## References:

* https://www.suse.com/security/cve/CVE-2023-1668.html
* https://www.suse.com/security/cve/CVE-2023-3152.html
* https://www.suse.com/security/cve/CVE-2023-3153.html
* https://www.suse.com/security/cve/CVE-2023-3966.html
* https://www.suse.com/security/cve/CVE-2023-5366.html
* https://www.suse.com/security/cve/CVE-2024-2182.html
* https://www.suse.com/security/cve/CVE-2025-0650.html
* https://bugzilla.suse.com/show_bug.cgi?id=1210054
* https://bugzilla.suse.com/show_bug.cgi?id=1212125
* https://bugzilla.suse.com/show_bug.cgi?id=1216002
* https://bugzilla.suse.com/show_bug.cgi?id=1219465
* https://bugzilla.suse.com/show_bug.cgi?id=1255435



openSUSE-SU-2026:0027-1: moderate: Security update for chromium


openSUSE Security Update: Security update for chromium
_______________________________

Announcement ID: openSUSE-SU-2026:0027-1
Rating: moderate
References: #1256938 #1257011
Cross-References: CVE-2026-1220
Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for chromium fixes the following issues:

- Chromium 144.0.7559.96 (boo#1257011)
* CVE-2026-1220: Race in V8
- update INSTALL.sh to handle the addded tags in the desktop file
(boo#1256938)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP6:

zypper in -t patch openSUSE-2026-27=1

Package List:

- openSUSE Backports SLE-15-SP6 (aarch64 ppc64le x86_64):

chromedriver-144.0.7559.96-bp156.2.218.1
chromium-144.0.7559.96-bp156.2.218.1

References:

https://www.suse.com/security/cve/CVE-2026-1220.html
https://bugzilla.suse.com/1256938
https://bugzilla.suse.com/1257011



openSUSE-SU-2026:0028-1: moderate: Security update for chromium


openSUSE Security Update: Security update for chromium
_______________________________

Announcement ID: openSUSE-SU-2026:0028-1
Rating: moderate
References: #1256938 #1257011
Cross-References: CVE-2026-1220
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________

An update that solves one vulnerability and has one errata
is now available.

Description:

This update for chromium fixes the following issues:

- Chromium 144.0.7559.96 (boo#1257011)
* CVE-2026-1220: Race in V8
- update INSTALL.sh to handle the addded tags in the desktop file
(boo#1256938)

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP7:

zypper in -t patch openSUSE-2026-28=1

Package List:

- openSUSE Backports SLE-15-SP7 (aarch64 ppc64le x86_64):

chromedriver-144.0.7559.96-bp157.2.103.1
chromium-144.0.7559.96-bp157.2.103.1

References:

https://www.suse.com/security/cve/CVE-2026-1220.html
https://bugzilla.suse.com/1256938
https://bugzilla.suse.com/1257011



openSUSE-SU-2026:10080-1: moderate: bind-9.20.18-1.1 on GA media


# bind-9.20.18-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10080-1
Rating: moderate

Cross-References:

* CVE-2025-13878

CVSS scores:

* CVE-2025-13878 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-13878 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the bind-9.20.18-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* bind 9.20.18-1.1
* bind-doc 9.20.18-1.1
* bind-modules-bdbhpt 9.20.18-1.1
* bind-modules-generic 9.20.18-1.1
* bind-modules-ldap 9.20.18-1.1
* bind-modules-mysql 9.20.18-1.1
* bind-modules-perl 9.20.18-1.1
* bind-modules-sqlite3 9.20.18-1.1
* bind-utils 9.20.18-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-13878.html



openSUSE-SU-2026:10083-1: moderate: vlang-0.5-2.1 on GA media


# vlang-0.5-2.1 on GA media

Announcement ID: openSUSE-SU-2026:10083-1
Rating: moderate

Cross-References:

* CVE-2025-59438

CVSS scores:

* CVE-2025-59438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-59438 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the vlang-0.5-2.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* vlang 0.5-2.1
* vlang-examples 0.5-2.1

## References:

* https://www.suse.com/security/cve/CVE-2025-59438.html



SUSE-SU-2026:0269-1: important: Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP6)


# Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise
15 SP6)

Announcement ID: SUSE-SU-2026:0269-1
Release Date: 2026-01-23T10:04:12Z
Rating: important
References:

* bsc#1235815
* bsc#1248400
* bsc#1248670
* bsc#1249241
* bsc#1250192
* bsc#1251203
* bsc#1251787
* bsc#1253437
* bsc#1256928

Cross-References:

* CVE-2023-53676
* CVE-2024-57849
* CVE-2025-38476
* CVE-2025-38572
* CVE-2025-38588
* CVE-2025-38608
* CVE-2025-39682
* CVE-2025-40204

CVSS scores:

* CVE-2023-53676 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57849 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38476 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38572 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38588 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38588 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38608 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40204 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves eight vulnerabilities and has one security fix can now be
installed.

## Description:

This update for the SUSE Linux Enterprise kernel 6.4.0-150600.23.30 fixes
various security issues

The following security issues were fixed:

* CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in
lio_target_nacl_info_show() (bsc#1251787).
* CVE-2024-57849: s390/cpum_sf: handle CPU hotplug remove during sampling
(bsc#1235815).
* CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline()
(bsc#1251203).
* CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment()
(bsc#1248400).
* CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size()
(bsc#1249241).
* CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data()
in ktls (bsc#1248670).
* CVE-2025-39682: tls: fix handling of zero-length records on the rx_list
(bsc#1250192).
* CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437).

The following non security issue was fixed:

* fix addr_bit_set() issue on big-endian machines (bsc#1256928).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-269=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-269=1

## Package List:

* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_30-default-debuginfo-17-150600.2.1
* kernel-livepatch-6_4_0-150600_23_30-default-17-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_6-debugsource-17-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_30-default-debuginfo-17-150600.2.1
* kernel-livepatch-6_4_0-150600_23_30-default-17-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_6-debugsource-17-150600.2.1

## References:

* https://www.suse.com/security/cve/CVE-2023-53676.html
* https://www.suse.com/security/cve/CVE-2024-57849.html
* https://www.suse.com/security/cve/CVE-2025-38476.html
* https://www.suse.com/security/cve/CVE-2025-38572.html
* https://www.suse.com/security/cve/CVE-2025-38588.html
* https://www.suse.com/security/cve/CVE-2025-38608.html
* https://www.suse.com/security/cve/CVE-2025-39682.html
* https://www.suse.com/security/cve/CVE-2025-40204.html
* https://bugzilla.suse.com/show_bug.cgi?id=1235815
* https://bugzilla.suse.com/show_bug.cgi?id=1248400
* https://bugzilla.suse.com/show_bug.cgi?id=1248670
* https://bugzilla.suse.com/show_bug.cgi?id=1249241
* https://bugzilla.suse.com/show_bug.cgi?id=1250192
* https://bugzilla.suse.com/show_bug.cgi?id=1251203
* https://bugzilla.suse.com/show_bug.cgi?id=1251787
* https://bugzilla.suse.com/show_bug.cgi?id=1253437
* https://bugzilla.suse.com/show_bug.cgi?id=1256928



SUSE-SU-2026:0268-1: moderate: Security update for python


# Security update for python

Announcement ID: SUSE-SU-2026:0268-1
Release Date: 2026-01-23T09:40:55Z
Rating: moderate
References:

* bsc#1254400
* bsc#1254997

Cross-References:

* CVE-2025-12084
* CVE-2025-13836
* CVE-2025-6075

CVSS scores:

* CVE-2025-12084 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-12084 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-12084 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-12084 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-13836 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13836 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-13836 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13836 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-6075 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-6075 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-6075 ( NVD ): 1.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7

An update that solves three vulnerabilities can now be installed.

## Description:

This update for python fixes the following issues:

* CVE-2025-13836: Fixed reading an HTTP response from a server, if no read
amount is specified, with using Content-Length per default as the length
(bsc#1254400)
* CVE-2025-12084: Fixed Denial of Service due to quadratic algorithm in
xml.dom.minidom (bsc#1254997).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-268=1

* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-268=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python-curses-debuginfo-2.7.18-150000.94.1
* python-base-2.7.18-150000.94.1
* python-curses-2.7.18-150000.94.1
* python-tk-debuginfo-2.7.18-150000.94.1
* python-devel-2.7.18-150000.94.1
* python-demo-2.7.18-150000.94.1
* python-debuginfo-2.7.18-150000.94.1
* python-2.7.18-150000.94.1
* python-base-debuginfo-2.7.18-150000.94.1
* libpython2_7-1_0-2.7.18-150000.94.1
* python-xml-2.7.18-150000.94.1
* python-base-debugsource-2.7.18-150000.94.1
* python-debugsource-2.7.18-150000.94.1
* python-gdbm-debuginfo-2.7.18-150000.94.1
* python-tk-2.7.18-150000.94.1
* python-gdbm-2.7.18-150000.94.1
* python-xml-debuginfo-2.7.18-150000.94.1
* python-idle-2.7.18-150000.94.1
* libpython2_7-1_0-debuginfo-2.7.18-150000.94.1
* openSUSE Leap 15.6 (x86_64)
* python-32bit-debuginfo-2.7.18-150000.94.1
* python-32bit-2.7.18-150000.94.1
* python-base-32bit-2.7.18-150000.94.1
* libpython2_7-1_0-32bit-2.7.18-150000.94.1
* libpython2_7-1_0-32bit-debuginfo-2.7.18-150000.94.1
* python-base-32bit-debuginfo-2.7.18-150000.94.1
* openSUSE Leap 15.6 (noarch)
* python-doc-pdf-2.7.18-150000.94.1
* python-doc-2.7.18-150000.94.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64)
* python-curses-debuginfo-2.7.18-150000.94.1
* python-base-2.7.18-150000.94.1
* python-curses-2.7.18-150000.94.1
* python-debuginfo-2.7.18-150000.94.1
* python-2.7.18-150000.94.1
* python-base-debuginfo-2.7.18-150000.94.1
* libpython2_7-1_0-2.7.18-150000.94.1
* python-xml-2.7.18-150000.94.1
* python-base-debugsource-2.7.18-150000.94.1
* python-debugsource-2.7.18-150000.94.1
* python-gdbm-debuginfo-2.7.18-150000.94.1
* python-xml-debuginfo-2.7.18-150000.94.1
* python-gdbm-2.7.18-150000.94.1
* libpython2_7-1_0-debuginfo-2.7.18-150000.94.1

## References:

* https://www.suse.com/security/cve/CVE-2025-12084.html
* https://www.suse.com/security/cve/CVE-2025-13836.html
* https://www.suse.com/security/cve/CVE-2025-6075.html
* https://bugzilla.suse.com/show_bug.cgi?id=1254400
* https://bugzilla.suse.com/show_bug.cgi?id=1254997



SUSE-SU-2026:0270-1: important: Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6)


# Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise
15 SP6)

Announcement ID: SUSE-SU-2026:0270-1
Release Date: 2026-01-23T10:33:38Z
Rating: important
References:

* bsc#1248400
* bsc#1248670
* bsc#1249241
* bsc#1250192
* bsc#1251203
* bsc#1251787
* bsc#1253437
* bsc#1256928

Cross-References:

* CVE-2023-53676
* CVE-2025-38476
* CVE-2025-38572
* CVE-2025-38588
* CVE-2025-38608
* CVE-2025-39682
* CVE-2025-40204

CVSS scores:

* CVE-2023-53676 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38476 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38572 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38588 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38588 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38608 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40204 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves seven vulnerabilities and has one security fix can now be
installed.

## Description:

This update for the SUSE Linux Enterprise kernel 6.4.0-150600.23.33 fixes
various security issues

The following security issues were fixed:

* CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in
lio_target_nacl_info_show() (bsc#1251787).
* CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline()
(bsc#1251203).
* CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment()
(bsc#1248400).
* CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size()
(bsc#1249241).
* CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data()
in ktls (bsc#1248670).
* CVE-2025-39682: tls: fix handling of zero-length records on the rx_list
(bsc#1250192).
* CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437).

The following non security issue was fixed:

* fix addr_bit_set() issue on big-endian machines (bsc#1256928).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-270=1

* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-270=1

## Package List:

* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_33-default-debuginfo-17-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_7-debugsource-17-150600.2.1
* kernel-livepatch-6_4_0-150600_23_33-default-17-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_33-default-debuginfo-17-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_7-debugsource-17-150600.2.1
* kernel-livepatch-6_4_0-150600_23_33-default-17-150600.2.1

## References:

* https://www.suse.com/security/cve/CVE-2023-53676.html
* https://www.suse.com/security/cve/CVE-2025-38476.html
* https://www.suse.com/security/cve/CVE-2025-38572.html
* https://www.suse.com/security/cve/CVE-2025-38588.html
* https://www.suse.com/security/cve/CVE-2025-38608.html
* https://www.suse.com/security/cve/CVE-2025-39682.html
* https://www.suse.com/security/cve/CVE-2025-40204.html
* https://bugzilla.suse.com/show_bug.cgi?id=1248400
* https://bugzilla.suse.com/show_bug.cgi?id=1248670
* https://bugzilla.suse.com/show_bug.cgi?id=1249241
* https://bugzilla.suse.com/show_bug.cgi?id=1250192
* https://bugzilla.suse.com/show_bug.cgi?id=1251203
* https://bugzilla.suse.com/show_bug.cgi?id=1251787
* https://bugzilla.suse.com/show_bug.cgi?id=1253437
* https://bugzilla.suse.com/show_bug.cgi?id=1256928