SUSE-SU-2026:0304-1: moderate: Security update for xen
SUSE-SU-2026:0303-1: moderate: Security update for xen
SUSE-SU-2026:0305-1: important: Recommended update for kernel-firmware
SUSE-SU-2026:0306-1: moderate: Security update for xen
SUSE-SU-2026:0307-1: important: Security update for python-python-multipart
openSUSE-SU-2026:10100-1: moderate: zot-registry-2.1.14-1.1 on GA media
openSUSE-SU-2026:10099-1: moderate: zli-2.1.14-1.1 on GA media
openSUSE-SU-2026:10101-1: moderate: coredns-1.14.1-1.1 on GA media
SUSE-SU-2026:0308-1: important: Security update for go1.24-openssl
SUSE-SU-2026:0310-1: critical: Security update for openssl-3
SUSE-SU-2026:0311-1: critical: Security update for openssl-3
SUSE-SU-2026:0312-1: critical: Security update for openssl-3
SUSE-SU-2026:0313-1: important: Security update for gimp
SUSE-SU-2026:0317-1: important: Security update for the Linux Kernel
SUSE-SU-2026:0314-1: moderate: Security update for python311
SUSE-SU-2026:0326-1: important: Security update for helm
SUSE-SU-2026:0325-1: important: Security update for kubernetes
SUSE-SU-2026:0304-1: moderate: Security update for xen
# Security update for xen
Announcement ID: SUSE-SU-2026:0304-1
Release Date: 2026-01-27T16:14:51Z
Rating: moderate
References:
* bsc#1256745
* bsc#1256747
Cross-References:
* CVE-2025-58150
* CVE-2026-23553
CVSS scores:
* CVE-2025-58150 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58150 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-23553 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise Micro 5.5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for xen fixes the following issues:
* CVE-2025-58150: Fixed buffer overrun with shadow paging and tracing
(XSA-477) (bsc#1256745)
* CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation (XSA-479)
(bsc#1256747)
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-304=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-304=1
## Package List:
* openSUSE Leap 15.5 (aarch64 x86_64 i586)
* xen-tools-domU-debuginfo-4.17.6_04-150500.3.59.1
* xen-libs-debuginfo-4.17.6_04-150500.3.59.1
* xen-debugsource-4.17.6_04-150500.3.59.1
* xen-devel-4.17.6_04-150500.3.59.1
* xen-tools-domU-4.17.6_04-150500.3.59.1
* xen-libs-4.17.6_04-150500.3.59.1
* openSUSE Leap 15.5 (x86_64)
* xen-libs-32bit-debuginfo-4.17.6_04-150500.3.59.1
* xen-libs-32bit-4.17.6_04-150500.3.59.1
* openSUSE Leap 15.5 (aarch64 x86_64)
* xen-tools-4.17.6_04-150500.3.59.1
* xen-4.17.6_04-150500.3.59.1
* xen-tools-debuginfo-4.17.6_04-150500.3.59.1
* xen-doc-html-4.17.6_04-150500.3.59.1
* openSUSE Leap 15.5 (noarch)
* xen-tools-xendomains-wait-disk-4.17.6_04-150500.3.59.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* xen-libs-64bit-debuginfo-4.17.6_04-150500.3.59.1
* xen-libs-64bit-4.17.6_04-150500.3.59.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* xen-libs-4.17.6_04-150500.3.59.1
* xen-libs-debuginfo-4.17.6_04-150500.3.59.1
* xen-debugsource-4.17.6_04-150500.3.59.1
## References:
* https://www.suse.com/security/cve/CVE-2025-58150.html
* https://www.suse.com/security/cve/CVE-2026-23553.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256745
* https://bugzilla.suse.com/show_bug.cgi?id=1256747
SUSE-SU-2026:0303-1: moderate: Security update for xen
# Security update for xen
Announcement ID: SUSE-SU-2026:0303-1
Release Date: 2026-01-27T16:14:45Z
Rating: moderate
References:
* bsc#1248807
* bsc#1252692
* bsc#1254180
* bsc#1256745
* bsc#1256747
Cross-References:
* CVE-2025-27466
* CVE-2025-58142
* CVE-2025-58143
* CVE-2025-58149
* CVE-2025-58150
* CVE-2026-23553
CVSS scores:
* CVE-2025-27466 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2025-27466 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-58142 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2025-58142 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-58143 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-58143 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-58149 ( SUSE ): 4.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2025-58149 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2025-58149 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-58150 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58150 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-23553 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
An update that solves six vulnerabilities can now be installed.
## Description:
This update for xen fixes the following issues:
Security fixes:
* CVE-2025-58150: Fixed buffer overrun with shadow paging and tracing
(XSA-477) (bsc#1256745)
* CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation (XSA-479)
(bsc#1256747)
* CVE-2025-58149: Fixed incorrect removal od permissions on PCI device unplug
allow PV guests to access memory of devices no longer assigned to it
(XSA-476) (bsc#1252692)
* CVE-2025-27466, CVE-2025-58142, CVE-2025-58143: Fixed multiple
vulnerabilities in the Viridian interface (XSA-472) (bsc#1248807)
Other fixes:
* Fixed virtxend service restart. Caused by a failure to start xenstored
(bsc#1254180)
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2026-303=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-303=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-303=1
## Package List:
* openSUSE Leap 15.3 (aarch64 x86_64 i586)
* xen-debugsource-4.14.6_28-150300.3.94.1
* xen-devel-4.14.6_28-150300.3.94.1
* xen-tools-domU-debuginfo-4.14.6_28-150300.3.94.1
* xen-libs-4.14.6_28-150300.3.94.1
* xen-libs-debuginfo-4.14.6_28-150300.3.94.1
* xen-tools-domU-4.14.6_28-150300.3.94.1
* openSUSE Leap 15.3 (x86_64)
* xen-libs-32bit-4.14.6_28-150300.3.94.1
* xen-libs-32bit-debuginfo-4.14.6_28-150300.3.94.1
* openSUSE Leap 15.3 (aarch64 x86_64)
* xen-tools-debuginfo-4.14.6_28-150300.3.94.1
* xen-doc-html-4.14.6_28-150300.3.94.1
* xen-4.14.6_28-150300.3.94.1
* xen-tools-4.14.6_28-150300.3.94.1
* openSUSE Leap 15.3 (noarch)
* xen-tools-xendomains-wait-disk-4.14.6_28-150300.3.94.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* xen-libs-64bit-debuginfo-4.14.6_28-150300.3.94.1
* xen-libs-64bit-4.14.6_28-150300.3.94.1
* SUSE Linux Enterprise Micro 5.2 (x86_64)
* xen-debugsource-4.14.6_28-150300.3.94.1
* xen-libs-4.14.6_28-150300.3.94.1
* xen-libs-debuginfo-4.14.6_28-150300.3.94.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
* xen-debugsource-4.14.6_28-150300.3.94.1
* xen-libs-4.14.6_28-150300.3.94.1
* xen-libs-debuginfo-4.14.6_28-150300.3.94.1
## References:
* https://www.suse.com/security/cve/CVE-2025-27466.html
* https://www.suse.com/security/cve/CVE-2025-58142.html
* https://www.suse.com/security/cve/CVE-2025-58143.html
* https://www.suse.com/security/cve/CVE-2025-58149.html
* https://www.suse.com/security/cve/CVE-2025-58150.html
* https://www.suse.com/security/cve/CVE-2026-23553.html
* https://bugzilla.suse.com/show_bug.cgi?id=1248807
* https://bugzilla.suse.com/show_bug.cgi?id=1252692
* https://bugzilla.suse.com/show_bug.cgi?id=1254180
* https://bugzilla.suse.com/show_bug.cgi?id=1256745
* https://bugzilla.suse.com/show_bug.cgi?id=1256747
SUSE-SU-2026:0305-1: important: Recommended update for kernel-firmware
# Recommended update for kernel-firmware
Announcement ID: SUSE-SU-2026:0305-1
Release Date: 2026-01-27T16:15:14Z
Rating: important
References:
* bsc#1256483
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that has one security fix can now be installed.
## Description:
This update for kernel-firmware fixes the following issues:
* Update AMD ucode to 20251203 (bsc#1256483)
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-305=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-305=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-305=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-305=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-305=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-305=1
## Package List:
* openSUSE Leap 15.5 (noarch)
* kernel-firmware-ath11k-20230724-150500.3.15.1
* kernel-firmware-mwifiex-20230724-150500.3.15.1
* kernel-firmware-serial-20230724-150500.3.15.1
* kernel-firmware-mediatek-20230724-150500.3.15.1
* kernel-firmware-chelsio-20230724-150500.3.15.1
* kernel-firmware-ueagle-20230724-150500.3.15.1
* kernel-firmware-qlogic-20230724-150500.3.15.1
* kernel-firmware-all-20230724-150500.3.15.1
* kernel-firmware-mellanox-20230724-150500.3.15.1
* kernel-firmware-platform-20230724-150500.3.15.1
* kernel-firmware-radeon-20230724-150500.3.15.1
* kernel-firmware-ath10k-20230724-150500.3.15.1
* kernel-firmware-atheros-20230724-150500.3.15.1
* kernel-firmware-amdgpu-20230724-150500.3.15.1
* kernel-firmware-realtek-20230724-150500.3.15.1
* ucode-amd-20230724-150500.3.15.1
* kernel-firmware-qcom-20230724-150500.3.15.1
* kernel-firmware-nfp-20230724-150500.3.15.1
* kernel-firmware-prestera-20230724-150500.3.15.1
* kernel-firmware-ti-20230724-150500.3.15.1
* kernel-firmware-20230724-150500.3.15.1
* kernel-firmware-i915-20230724-150500.3.15.1
* kernel-firmware-liquidio-20230724-150500.3.15.1
* kernel-firmware-media-20230724-150500.3.15.1
* kernel-firmware-bluetooth-20230724-150500.3.15.1
* kernel-firmware-dpaa2-20230724-150500.3.15.1
* kernel-firmware-bnx2-20230724-150500.3.15.1
* kernel-firmware-nvidia-20230724-150500.3.15.1
* kernel-firmware-marvell-20230724-150500.3.15.1
* kernel-firmware-iwlwifi-20230724-150500.3.15.1
* kernel-firmware-brcm-20230724-150500.3.15.1
* kernel-firmware-intel-20230724-150500.3.15.1
* kernel-firmware-network-20230724-150500.3.15.1
* kernel-firmware-sound-20230724-150500.3.15.1
* kernel-firmware-usb-network-20230724-150500.3.15.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-firmware-ath11k-20230724-150500.3.15.1
* kernel-firmware-mwifiex-20230724-150500.3.15.1
* kernel-firmware-serial-20230724-150500.3.15.1
* kernel-firmware-mediatek-20230724-150500.3.15.1
* kernel-firmware-chelsio-20230724-150500.3.15.1
* kernel-firmware-ueagle-20230724-150500.3.15.1
* kernel-firmware-qlogic-20230724-150500.3.15.1
* kernel-firmware-all-20230724-150500.3.15.1
* kernel-firmware-mellanox-20230724-150500.3.15.1
* kernel-firmware-platform-20230724-150500.3.15.1
* kernel-firmware-radeon-20230724-150500.3.15.1
* kernel-firmware-ath10k-20230724-150500.3.15.1
* kernel-firmware-atheros-20230724-150500.3.15.1
* kernel-firmware-amdgpu-20230724-150500.3.15.1
* kernel-firmware-realtek-20230724-150500.3.15.1
* ucode-amd-20230724-150500.3.15.1
* kernel-firmware-qcom-20230724-150500.3.15.1
* kernel-firmware-nfp-20230724-150500.3.15.1
* kernel-firmware-prestera-20230724-150500.3.15.1
* kernel-firmware-ti-20230724-150500.3.15.1
* kernel-firmware-i915-20230724-150500.3.15.1
* kernel-firmware-liquidio-20230724-150500.3.15.1
* kernel-firmware-media-20230724-150500.3.15.1
* kernel-firmware-bluetooth-20230724-150500.3.15.1
* kernel-firmware-dpaa2-20230724-150500.3.15.1
* kernel-firmware-bnx2-20230724-150500.3.15.1
* kernel-firmware-nvidia-20230724-150500.3.15.1
* kernel-firmware-marvell-20230724-150500.3.15.1
* kernel-firmware-iwlwifi-20230724-150500.3.15.1
* kernel-firmware-brcm-20230724-150500.3.15.1
* kernel-firmware-intel-20230724-150500.3.15.1
* kernel-firmware-network-20230724-150500.3.15.1
* kernel-firmware-sound-20230724-150500.3.15.1
* kernel-firmware-usb-network-20230724-150500.3.15.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* kernel-firmware-ath11k-20230724-150500.3.15.1
* kernel-firmware-mwifiex-20230724-150500.3.15.1
* kernel-firmware-serial-20230724-150500.3.15.1
* kernel-firmware-mediatek-20230724-150500.3.15.1
* kernel-firmware-chelsio-20230724-150500.3.15.1
* kernel-firmware-ueagle-20230724-150500.3.15.1
* kernel-firmware-qlogic-20230724-150500.3.15.1
* kernel-firmware-all-20230724-150500.3.15.1
* kernel-firmware-mellanox-20230724-150500.3.15.1
* kernel-firmware-platform-20230724-150500.3.15.1
* kernel-firmware-radeon-20230724-150500.3.15.1
* kernel-firmware-ath10k-20230724-150500.3.15.1
* kernel-firmware-atheros-20230724-150500.3.15.1
* kernel-firmware-amdgpu-20230724-150500.3.15.1
* kernel-firmware-realtek-20230724-150500.3.15.1
* ucode-amd-20230724-150500.3.15.1
* kernel-firmware-qcom-20230724-150500.3.15.1
* kernel-firmware-nfp-20230724-150500.3.15.1
* kernel-firmware-prestera-20230724-150500.3.15.1
* kernel-firmware-ti-20230724-150500.3.15.1
* kernel-firmware-i915-20230724-150500.3.15.1
* kernel-firmware-liquidio-20230724-150500.3.15.1
* kernel-firmware-media-20230724-150500.3.15.1
* kernel-firmware-bluetooth-20230724-150500.3.15.1
* kernel-firmware-dpaa2-20230724-150500.3.15.1
* kernel-firmware-bnx2-20230724-150500.3.15.1
* kernel-firmware-nvidia-20230724-150500.3.15.1
* kernel-firmware-marvell-20230724-150500.3.15.1
* kernel-firmware-iwlwifi-20230724-150500.3.15.1
* kernel-firmware-brcm-20230724-150500.3.15.1
* kernel-firmware-intel-20230724-150500.3.15.1
* kernel-firmware-network-20230724-150500.3.15.1
* kernel-firmware-sound-20230724-150500.3.15.1
* kernel-firmware-usb-network-20230724-150500.3.15.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* kernel-firmware-ath11k-20230724-150500.3.15.1
* kernel-firmware-mwifiex-20230724-150500.3.15.1
* kernel-firmware-serial-20230724-150500.3.15.1
* kernel-firmware-mediatek-20230724-150500.3.15.1
* kernel-firmware-chelsio-20230724-150500.3.15.1
* kernel-firmware-ueagle-20230724-150500.3.15.1
* kernel-firmware-qlogic-20230724-150500.3.15.1
* kernel-firmware-all-20230724-150500.3.15.1
* kernel-firmware-mellanox-20230724-150500.3.15.1
* kernel-firmware-platform-20230724-150500.3.15.1
* kernel-firmware-radeon-20230724-150500.3.15.1
* kernel-firmware-ath10k-20230724-150500.3.15.1
* kernel-firmware-atheros-20230724-150500.3.15.1
* kernel-firmware-amdgpu-20230724-150500.3.15.1
* kernel-firmware-realtek-20230724-150500.3.15.1
* ucode-amd-20230724-150500.3.15.1
* kernel-firmware-qcom-20230724-150500.3.15.1
* kernel-firmware-nfp-20230724-150500.3.15.1
* kernel-firmware-prestera-20230724-150500.3.15.1
* kernel-firmware-ti-20230724-150500.3.15.1
* kernel-firmware-i915-20230724-150500.3.15.1
* kernel-firmware-liquidio-20230724-150500.3.15.1
* kernel-firmware-media-20230724-150500.3.15.1
* kernel-firmware-bluetooth-20230724-150500.3.15.1
* kernel-firmware-dpaa2-20230724-150500.3.15.1
* kernel-firmware-bnx2-20230724-150500.3.15.1
* kernel-firmware-nvidia-20230724-150500.3.15.1
* kernel-firmware-marvell-20230724-150500.3.15.1
* kernel-firmware-iwlwifi-20230724-150500.3.15.1
* kernel-firmware-brcm-20230724-150500.3.15.1
* kernel-firmware-intel-20230724-150500.3.15.1
* kernel-firmware-network-20230724-150500.3.15.1
* kernel-firmware-sound-20230724-150500.3.15.1
* kernel-firmware-usb-network-20230724-150500.3.15.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* kernel-firmware-ath11k-20230724-150500.3.15.1
* kernel-firmware-mwifiex-20230724-150500.3.15.1
* kernel-firmware-serial-20230724-150500.3.15.1
* kernel-firmware-mediatek-20230724-150500.3.15.1
* kernel-firmware-chelsio-20230724-150500.3.15.1
* kernel-firmware-ueagle-20230724-150500.3.15.1
* kernel-firmware-qlogic-20230724-150500.3.15.1
* kernel-firmware-all-20230724-150500.3.15.1
* kernel-firmware-mellanox-20230724-150500.3.15.1
* kernel-firmware-platform-20230724-150500.3.15.1
* kernel-firmware-radeon-20230724-150500.3.15.1
* kernel-firmware-ath10k-20230724-150500.3.15.1
* kernel-firmware-atheros-20230724-150500.3.15.1
* kernel-firmware-amdgpu-20230724-150500.3.15.1
* kernel-firmware-realtek-20230724-150500.3.15.1
* ucode-amd-20230724-150500.3.15.1
* kernel-firmware-qcom-20230724-150500.3.15.1
* kernel-firmware-nfp-20230724-150500.3.15.1
* kernel-firmware-prestera-20230724-150500.3.15.1
* kernel-firmware-ti-20230724-150500.3.15.1
* kernel-firmware-i915-20230724-150500.3.15.1
* kernel-firmware-liquidio-20230724-150500.3.15.1
* kernel-firmware-media-20230724-150500.3.15.1
* kernel-firmware-bluetooth-20230724-150500.3.15.1
* kernel-firmware-dpaa2-20230724-150500.3.15.1
* kernel-firmware-bnx2-20230724-150500.3.15.1
* kernel-firmware-nvidia-20230724-150500.3.15.1
* kernel-firmware-marvell-20230724-150500.3.15.1
* kernel-firmware-iwlwifi-20230724-150500.3.15.1
* kernel-firmware-brcm-20230724-150500.3.15.1
* kernel-firmware-intel-20230724-150500.3.15.1
* kernel-firmware-network-20230724-150500.3.15.1
* kernel-firmware-sound-20230724-150500.3.15.1
* kernel-firmware-usb-network-20230724-150500.3.15.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* kernel-firmware-ath11k-20230724-150500.3.15.1
* kernel-firmware-mwifiex-20230724-150500.3.15.1
* kernel-firmware-serial-20230724-150500.3.15.1
* kernel-firmware-mediatek-20230724-150500.3.15.1
* kernel-firmware-chelsio-20230724-150500.3.15.1
* kernel-firmware-ueagle-20230724-150500.3.15.1
* kernel-firmware-qlogic-20230724-150500.3.15.1
* kernel-firmware-all-20230724-150500.3.15.1
* kernel-firmware-mellanox-20230724-150500.3.15.1
* kernel-firmware-platform-20230724-150500.3.15.1
* kernel-firmware-radeon-20230724-150500.3.15.1
* kernel-firmware-ath10k-20230724-150500.3.15.1
* kernel-firmware-atheros-20230724-150500.3.15.1
* kernel-firmware-amdgpu-20230724-150500.3.15.1
* kernel-firmware-realtek-20230724-150500.3.15.1
* ucode-amd-20230724-150500.3.15.1
* kernel-firmware-qcom-20230724-150500.3.15.1
* kernel-firmware-nfp-20230724-150500.3.15.1
* kernel-firmware-prestera-20230724-150500.3.15.1
* kernel-firmware-ti-20230724-150500.3.15.1
* kernel-firmware-i915-20230724-150500.3.15.1
* kernel-firmware-liquidio-20230724-150500.3.15.1
* kernel-firmware-media-20230724-150500.3.15.1
* kernel-firmware-bluetooth-20230724-150500.3.15.1
* kernel-firmware-dpaa2-20230724-150500.3.15.1
* kernel-firmware-bnx2-20230724-150500.3.15.1
* kernel-firmware-nvidia-20230724-150500.3.15.1
* kernel-firmware-marvell-20230724-150500.3.15.1
* kernel-firmware-iwlwifi-20230724-150500.3.15.1
* kernel-firmware-brcm-20230724-150500.3.15.1
* kernel-firmware-intel-20230724-150500.3.15.1
* kernel-firmware-network-20230724-150500.3.15.1
* kernel-firmware-sound-20230724-150500.3.15.1
* kernel-firmware-usb-network-20230724-150500.3.15.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1256483
SUSE-SU-2026:0306-1: moderate: Security update for xen
# Security update for xen
Announcement ID: SUSE-SU-2026:0306-1
Release Date: 2026-01-27T16:15:20Z
Rating: moderate
References:
* bsc#1256745
* bsc#1256747
Cross-References:
* CVE-2025-58150
* CVE-2026-23553
CVSS scores:
* CVE-2025-58150 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58150 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-23553 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.6
An update that solves two vulnerabilities can now be installed.
## Description:
This update for xen fixes the following issues:
* CVE-2025-58150: Fixed buffer overrun with shadow paging and tracing
(XSA-477) (bsc#1256745)
* CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation (XSA-479)
(bsc#1256747)
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-306=1 openSUSE-SLE-15.6-2026-306=1
## Package List:
* openSUSE Leap 15.6 (aarch64 x86_64 i586)
* xen-tools-domU-debuginfo-4.18.5_10-150600.3.37.1
* xen-tools-domU-4.18.5_10-150600.3.37.1
* xen-debugsource-4.18.5_10-150600.3.37.1
* xen-libs-debuginfo-4.18.5_10-150600.3.37.1
* xen-libs-4.18.5_10-150600.3.37.1
* xen-devel-4.18.5_10-150600.3.37.1
* openSUSE Leap 15.6 (x86_64)
* xen-libs-32bit-4.18.5_10-150600.3.37.1
* xen-libs-32bit-debuginfo-4.18.5_10-150600.3.37.1
* openSUSE Leap 15.6 (aarch64 x86_64)
* xen-tools-debuginfo-4.18.5_10-150600.3.37.1
* xen-tools-4.18.5_10-150600.3.37.1
* xen-4.18.5_10-150600.3.37.1
* xen-doc-html-4.18.5_10-150600.3.37.1
* openSUSE Leap 15.6 (noarch)
* xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* xen-libs-64bit-debuginfo-4.18.5_10-150600.3.37.1
* xen-libs-64bit-4.18.5_10-150600.3.37.1
## References:
* https://www.suse.com/security/cve/CVE-2025-58150.html
* https://www.suse.com/security/cve/CVE-2026-23553.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256745
* https://bugzilla.suse.com/show_bug.cgi?id=1256747
SUSE-SU-2026:0307-1: important: Security update for python-python-multipart
# Security update for python-python-multipart
Announcement ID: SUSE-SU-2026:0307-1
Release Date: 2026-01-27T16:37:01Z
Rating: important
References:
* bsc#1257301
Cross-References:
* CVE-2026-24486
CVSS scores:
* CVE-2026-24486 ( SUSE ): 8.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2026-24486 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
* CVE-2026-24486 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L
Affected Products:
* openSUSE Leap 15.6
An update that solves one vulnerability can now be installed.
## Description:
This update for python-python-multipart fixes the following issues:
* CVE-2026-24486: Fixed non-default configuration options can lead to path
traversal (bsc#1257301).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-307=1 openSUSE-SLE-15.6-2026-307=1
## Package List:
* openSUSE Leap 15.6 (noarch)
* python311-python-multipart-0.0.9-150600.3.6.1
## References:
* https://www.suse.com/security/cve/CVE-2026-24486.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257301
openSUSE-SU-2026:10100-1: moderate: zot-registry-2.1.14-1.1 on GA media
# zot-registry-2.1.14-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10100-1
Rating: moderate
Cross-References:
* CVE-2025-30204
CVSS scores:
* CVE-2025-30204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-30204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the zot-registry-2.1.14-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* zot-registry 2.1.14-1.1
* zot-registry-bash-completion 2.1.14-1.1
* zot-registry-fish-completion 2.1.14-1.1
* zot-registry-zsh-completion 2.1.14-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-30204.html
openSUSE-SU-2026:10099-1: moderate: zli-2.1.14-1.1 on GA media
# zli-2.1.14-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10099-1
Rating: moderate
Cross-References:
* CVE-2025-30204
CVSS scores:
* CVE-2025-30204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-30204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves one vulnerability can now be installed.
## Description:
These are all security issues fixed in the zli-2.1.14-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* zli 2.1.14-1.1
* zli-bash-completion 2.1.14-1.1
* zli-fish-completion 2.1.14-1.1
* zli-zsh-completion 2.1.14-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-30204.html
openSUSE-SU-2026:10101-1: moderate: coredns-1.14.1-1.1 on GA media
# coredns-1.14.1-1.1 on GA media
Announcement ID: openSUSE-SU-2026:10101-1
Rating: moderate
Cross-References:
* CVE-2025-61728
* CVE-2025-68119
CVSS scores:
* CVE-2025-61728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61728 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68119 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-68119 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products:
* openSUSE Tumbleweed
An update that solves 2 vulnerabilities can now be installed.
## Description:
These are all security issues fixed in the coredns-1.14.1-1.1 package on the GA media of openSUSE Tumbleweed.
## Package List:
* openSUSE Tumbleweed:
* coredns 1.14.1-1.1
* coredns-extras 1.14.1-1.1
## References:
* https://www.suse.com/security/cve/CVE-2025-61728.html
* https://www.suse.com/security/cve/CVE-2025-68119.html
SUSE-SU-2026:0308-1: important: Security update for go1.24-openssl
# Security update for go1.24-openssl
Announcement ID: SUSE-SU-2026:0308-1
Release Date: 2026-01-28T08:38:49Z
Rating: important
References:
* bsc#1236217
* bsc#1245878
* bsc#1247816
* bsc#1248082
* bsc#1249985
* bsc#1251253
* bsc#1251254
* bsc#1251255
* bsc#1251256
* bsc#1251257
* bsc#1251258
* bsc#1251259
* bsc#1251260
* bsc#1251261
* bsc#1251262
* bsc#1254430
* bsc#1254431
* bsc#1256816
* bsc#1256817
* bsc#1256818
* bsc#1256819
* bsc#1256820
* bsc#1256821
* jsc#SLE-18320
Cross-References:
* CVE-2025-47912
* CVE-2025-58183
* CVE-2025-58185
* CVE-2025-58186
* CVE-2025-58187
* CVE-2025-58188
* CVE-2025-58189
* CVE-2025-61723
* CVE-2025-61724
* CVE-2025-61725
* CVE-2025-61726
* CVE-2025-61727
* CVE-2025-61728
* CVE-2025-61729
* CVE-2025-61730
* CVE-2025-61731
* CVE-2025-68119
* CVE-2025-68121
CVSS scores:
* CVE-2025-47912 ( SUSE ): 8.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-47912 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-47912 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-58183 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58183 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-58183 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-58185 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58185 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58185 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58186 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58186 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58186 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58187 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58187 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58187 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-58188 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-58188 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-58188 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-58189 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N
* CVE-2025-58189 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
* CVE-2025-58189 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-61723 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-61723 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-61723 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61724 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-61724 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-61724 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-61725 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61725 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61725 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61726 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61726 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61727 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61727 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2025-61728 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61729 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61729 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61729 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61730 ( SUSE ): 2.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-61730 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-61731 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61731 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-68119 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68119 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-68121 ( SUSE ): 7.6
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-68121 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Affected Products:
* Development Tools Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves 18 vulnerabilities, contains one feature and has five
security fixes can now be installed.
## Description:
This update for go1.24-openssl fixes the following issues:
Update to version 1.24.12 (released 2026-01-15) (jsc#SLE-18320, bsc#1236217):
Security fixes:
* CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames
(bsc#1251257).
* CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse
map (bsc#1251261).
* CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER
payload can cause memory exhaustion (bsc#1251258).
* CVE-2025-58186: net/http: lack of limit when parsing cookies can cause
memory exhaustion (bsc#1251259).
* CVE-2025-58187: crypto/x509: quadratic complexity when checking name
constraints (bsc#1251254).
* CVE-2025-58188: crypto/x509: panic when validating certificates with DSA
public keys (bsc#1251260).
* CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker
controlled information (bsc#1251255).
* CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid
inputs (bsc#1251256).
* CVE-2025-61724: net/textproto: excessive CPU consumption in
Reader.ReadResponse (bsc#1251262).
* CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress
(bsc#1251253).
* CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm
(bsc#1256817).
* CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn't preclude
wildcard SAN (bsc#1254430).
* CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP
archives (bsc#1256816).
* CVE-2025-61729: crypto/x509: excessive resource consumption in printing
error string for host certificate validation (bsc#1254431).
* CVE-2025-61730: crypto/tls: handshake messages may be processed at the
incorrect encryption level (bsc#1256821).
* CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary
code execution (bsc#1256819).
* CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain
(bsc#1256820).
* CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated
session ticket keys, session resumption does not account for the expiration
of full certificate chain (bsc#1256818).
Other fixes:
* go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination
addresses on IPv4 UDP sockets
* go#74821 cmd/go: "get toolchain@latest" should ignore release candidates
* go#75007 os/exec: TestLookPath fails on plan9 after CL 685755
* go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original
root
* go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21
* go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container
symbol
* go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails
on plan9
* go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9
* go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail
* go#75538 net/http: internal error: connCount underflow
* go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on
github.com/leodido/go-urn
* go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return
value
* go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square
brackets
* go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot
* go#75951 encoding/pem: regression when decoding blocks with leading garbage
* go#76028 pem/encoding: malformed line endings can cause panics
* go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause
illegal instruction core dumps on LA364 cores
* go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH
enabled
* go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes
* go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4
windows 386
* go#76796 runtime: race detector crash on ppc64le
* go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while
compiling <function>: runtime error: index out of range
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Development Tools Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-308=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-308=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-308=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-308=1 openSUSE-SLE-15.6-2026-308=1
## Package List:
* Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* go1.24-openssl-doc-1.24.12-150600.13.15.1
* go1.24-openssl-debuginfo-1.24.12-150600.13.15.1
* go1.24-openssl-1.24.12-150600.13.15.1
* go1.24-openssl-race-1.24.12-150600.13.15.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* go1.24-openssl-doc-1.24.12-150600.13.15.1
* go1.24-openssl-race-1.24.12-150600.13.15.1
* go1.24-openssl-1.24.12-150600.13.15.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* go1.24-openssl-doc-1.24.12-150600.13.15.1
* go1.24-openssl-race-1.24.12-150600.13.15.1
* go1.24-openssl-1.24.12-150600.13.15.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* go1.24-openssl-doc-1.24.12-150600.13.15.1
* go1.24-openssl-debuginfo-1.24.12-150600.13.15.1
* go1.24-openssl-1.24.12-150600.13.15.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* go1.24-openssl-race-1.24.12-150600.13.15.1
## References:
* https://www.suse.com/security/cve/CVE-2025-47912.html
* https://www.suse.com/security/cve/CVE-2025-58183.html
* https://www.suse.com/security/cve/CVE-2025-58185.html
* https://www.suse.com/security/cve/CVE-2025-58186.html
* https://www.suse.com/security/cve/CVE-2025-58187.html
* https://www.suse.com/security/cve/CVE-2025-58188.html
* https://www.suse.com/security/cve/CVE-2025-58189.html
* https://www.suse.com/security/cve/CVE-2025-61723.html
* https://www.suse.com/security/cve/CVE-2025-61724.html
* https://www.suse.com/security/cve/CVE-2025-61725.html
* https://www.suse.com/security/cve/CVE-2025-61726.html
* https://www.suse.com/security/cve/CVE-2025-61727.html
* https://www.suse.com/security/cve/CVE-2025-61728.html
* https://www.suse.com/security/cve/CVE-2025-61729.html
* https://www.suse.com/security/cve/CVE-2025-61730.html
* https://www.suse.com/security/cve/CVE-2025-61731.html
* https://www.suse.com/security/cve/CVE-2025-68119.html
* https://www.suse.com/security/cve/CVE-2025-68121.html
* https://bugzilla.suse.com/show_bug.cgi?id=1236217
* https://bugzilla.suse.com/show_bug.cgi?id=1245878
* https://bugzilla.suse.com/show_bug.cgi?id=1247816
* https://bugzilla.suse.com/show_bug.cgi?id=1248082
* https://bugzilla.suse.com/show_bug.cgi?id=1249985
* https://bugzilla.suse.com/show_bug.cgi?id=1251253
* https://bugzilla.suse.com/show_bug.cgi?id=1251254
* https://bugzilla.suse.com/show_bug.cgi?id=1251255
* https://bugzilla.suse.com/show_bug.cgi?id=1251256
* https://bugzilla.suse.com/show_bug.cgi?id=1251257
* https://bugzilla.suse.com/show_bug.cgi?id=1251258
* https://bugzilla.suse.com/show_bug.cgi?id=1251259
* https://bugzilla.suse.com/show_bug.cgi?id=1251260
* https://bugzilla.suse.com/show_bug.cgi?id=1251261
* https://bugzilla.suse.com/show_bug.cgi?id=1251262
* https://bugzilla.suse.com/show_bug.cgi?id=1254430
* https://bugzilla.suse.com/show_bug.cgi?id=1254431
* https://bugzilla.suse.com/show_bug.cgi?id=1256816
* https://bugzilla.suse.com/show_bug.cgi?id=1256817
* https://bugzilla.suse.com/show_bug.cgi?id=1256818
* https://bugzilla.suse.com/show_bug.cgi?id=1256819
* https://bugzilla.suse.com/show_bug.cgi?id=1256820
* https://bugzilla.suse.com/show_bug.cgi?id=1256821
* https://jira.suse.com/browse/SLE-18320
SUSE-SU-2026:0310-1: critical: Security update for openssl-3
# Security update for openssl-3
Announcement ID: SUSE-SU-2026:0310-1
Release Date: 2026-01-28T09:37:31Z
Rating: critical
References:
* bsc#1256830
* bsc#1256834
* bsc#1256835
* bsc#1256836
* bsc#1256837
* bsc#1256838
* bsc#1256839
* bsc#1256840
Cross-References:
* CVE-2025-15467
* CVE-2025-68160
* CVE-2025-69418
* CVE-2025-69419
* CVE-2025-69420
* CVE-2025-69421
* CVE-2026-22795
* CVE-2026-22796
CVSS scores:
* CVE-2025-15467 ( SUSE ): 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-15467 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68160 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68160 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-69418 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-69418 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-69419 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-69419 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-69420 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-69420 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-69421 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-69421 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22795 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22795 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22796 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-22796 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves eight vulnerabilities can now be installed.
## Description:
This update for openssl-3 fixes the following issues:
* CVE-2025-15467: Stack buffer overflow in CMS AuthEnvelopedData parsing
(bsc#1256830).
* CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes
(bsc#1256834).
* CVE-2025-69418: Unauthenticated/unencrypted trailing bytes with low-level
OCB function calls (bsc#1256835).
* CVE-2025-69419: Out of bounds write in PKCS12_get_friendlyname() UTF-8
conversion (bsc#1256836).
* CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response()
function (bsc#1256837).
* CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex
function (bsc#1256838).
* CVE-2026-22795: Missing ASN1_TYPE validation in PKCS#12 parsing
(bsc#1256839).
* CVE-2026-22796: ASN1_TYPE Type Confusion in the
PKCS7_digest_from_attributes() function (bsc#1256840).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-310=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-310=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-310=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-310=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-310=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-310=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-310=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-310=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-310=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libopenssl3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-3.0.8-150400.4.78.1
* openssl-3-debugsource-3.0.8-150400.4.78.1
* libopenssl-3-devel-3.0.8-150400.4.78.1
* libopenssl3-3.0.8-150400.4.78.1
* openSUSE Leap 15.4 (x86_64)
* libopenssl3-32bit-debuginfo-3.0.8-150400.4.78.1
* libopenssl-3-devel-32bit-3.0.8-150400.4.78.1
* libopenssl3-32bit-3.0.8-150400.4.78.1
* openSUSE Leap 15.4 (noarch)
* openssl-3-doc-3.0.8-150400.4.78.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libopenssl3-64bit-3.0.8-150400.4.78.1
* libopenssl-3-devel-64bit-3.0.8-150400.4.78.1
* libopenssl3-64bit-debuginfo-3.0.8-150400.4.78.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libopenssl3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-debugsource-3.0.8-150400.4.78.1
* libopenssl3-3.0.8-150400.4.78.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libopenssl3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-debugsource-3.0.8-150400.4.78.1
* libopenssl3-3.0.8-150400.4.78.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libopenssl3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-debugsource-3.0.8-150400.4.78.1
* libopenssl3-3.0.8-150400.4.78.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libopenssl3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-debugsource-3.0.8-150400.4.78.1
* libopenssl3-3.0.8-150400.4.78.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libopenssl3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-3.0.8-150400.4.78.1
* openssl-3-debugsource-3.0.8-150400.4.78.1
* libopenssl-3-devel-3.0.8-150400.4.78.1
* libopenssl3-3.0.8-150400.4.78.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libopenssl3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-3.0.8-150400.4.78.1
* openssl-3-debugsource-3.0.8-150400.4.78.1
* libopenssl-3-devel-3.0.8-150400.4.78.1
* libopenssl3-3.0.8-150400.4.78.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libopenssl3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-3.0.8-150400.4.78.1
* openssl-3-debugsource-3.0.8-150400.4.78.1
* libopenssl-3-devel-3.0.8-150400.4.78.1
* libopenssl3-3.0.8-150400.4.78.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libopenssl3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-3.0.8-150400.4.78.1
* openssl-3-debugsource-3.0.8-150400.4.78.1
* libopenssl-3-devel-3.0.8-150400.4.78.1
* libopenssl3-3.0.8-150400.4.78.1
## References:
* https://www.suse.com/security/cve/CVE-2025-15467.html
* https://www.suse.com/security/cve/CVE-2025-68160.html
* https://www.suse.com/security/cve/CVE-2025-69418.html
* https://www.suse.com/security/cve/CVE-2025-69419.html
* https://www.suse.com/security/cve/CVE-2025-69420.html
* https://www.suse.com/security/cve/CVE-2025-69421.html
* https://www.suse.com/security/cve/CVE-2026-22795.html
* https://www.suse.com/security/cve/CVE-2026-22796.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256830
* https://bugzilla.suse.com/show_bug.cgi?id=1256834
* https://bugzilla.suse.com/show_bug.cgi?id=1256835
* https://bugzilla.suse.com/show_bug.cgi?id=1256836
* https://bugzilla.suse.com/show_bug.cgi?id=1256837
* https://bugzilla.suse.com/show_bug.cgi?id=1256838
* https://bugzilla.suse.com/show_bug.cgi?id=1256839
* https://bugzilla.suse.com/show_bug.cgi?id=1256840
SUSE-SU-2026:0311-1: critical: Security update for openssl-3
# Security update for openssl-3
Announcement ID: SUSE-SU-2026:0311-1
Release Date: 2026-01-28T09:37:48Z
Rating: critical
References:
* bsc#1256830
* bsc#1256834
* bsc#1256835
* bsc#1256836
* bsc#1256837
* bsc#1256838
* bsc#1256839
* bsc#1256840
Cross-References:
* CVE-2025-15467
* CVE-2025-68160
* CVE-2025-69418
* CVE-2025-69419
* CVE-2025-69420
* CVE-2025-69421
* CVE-2026-22795
* CVE-2026-22796
CVSS scores:
* CVE-2025-15467 ( SUSE ): 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-15467 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68160 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68160 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-69418 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-69418 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-69419 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-69419 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-69420 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-69420 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-69421 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-69421 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22795 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22795 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22796 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-22796 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves eight vulnerabilities can now be installed.
## Description:
This update for openssl-3 fixes the following issues:
* CVE-2025-15467: Stack buffer overflow in CMS AuthEnvelopedData parsing
(bsc#1256830).
* CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes
(bsc#1256834).
* CVE-2025-69418: Unauthenticated/unencrypted trailing bytes with low-level
OCB function calls (bsc#1256835).
* CVE-2025-69419: Out of bounds write in PKCS12_get_friendlyname() UTF-8
conversion (bsc#1256836).
* CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response()
function (bsc#1256837).
* CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex
function (bsc#1256838).
* CVE-2026-22795: Missing ASN1_TYPE validation in PKCS#12 parsing
(bsc#1256839).
* CVE-2026-22796: ASN1_TYPE Type Confusion in the
PKCS7_digest_from_attributes() function (bsc#1256840).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-311=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-311=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-311=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-311=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-311=1
## Package List:
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libopenssl-3-devel-3.0.8-150500.5.57.1
* libopenssl3-debuginfo-3.0.8-150500.5.57.1
* openssl-3-debuginfo-3.0.8-150500.5.57.1
* openssl-3-debugsource-3.0.8-150500.5.57.1
* libopenssl3-3.0.8-150500.5.57.1
* openssl-3-3.0.8-150500.5.57.1
* openSUSE Leap 15.5 (x86_64)
* libopenssl3-32bit-3.0.8-150500.5.57.1
* libopenssl-3-devel-32bit-3.0.8-150500.5.57.1
* libopenssl3-32bit-debuginfo-3.0.8-150500.5.57.1
* openSUSE Leap 15.5 (noarch)
* openssl-3-doc-3.0.8-150500.5.57.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libopenssl-3-devel-64bit-3.0.8-150500.5.57.1
* libopenssl3-64bit-3.0.8-150500.5.57.1
* libopenssl3-64bit-debuginfo-3.0.8-150500.5.57.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libopenssl-3-devel-3.0.8-150500.5.57.1
* libopenssl3-debuginfo-3.0.8-150500.5.57.1
* openssl-3-debuginfo-3.0.8-150500.5.57.1
* openssl-3-debugsource-3.0.8-150500.5.57.1
* libopenssl3-3.0.8-150500.5.57.1
* openssl-3-3.0.8-150500.5.57.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libopenssl-3-devel-3.0.8-150500.5.57.1
* libopenssl3-debuginfo-3.0.8-150500.5.57.1
* openssl-3-debuginfo-3.0.8-150500.5.57.1
* openssl-3-debugsource-3.0.8-150500.5.57.1
* libopenssl3-3.0.8-150500.5.57.1
* openssl-3-3.0.8-150500.5.57.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libopenssl-3-devel-3.0.8-150500.5.57.1
* libopenssl3-debuginfo-3.0.8-150500.5.57.1
* openssl-3-debuginfo-3.0.8-150500.5.57.1
* openssl-3-debugsource-3.0.8-150500.5.57.1
* libopenssl3-3.0.8-150500.5.57.1
* openssl-3-3.0.8-150500.5.57.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libopenssl-3-devel-3.0.8-150500.5.57.1
* libopenssl3-debuginfo-3.0.8-150500.5.57.1
* openssl-3-debuginfo-3.0.8-150500.5.57.1
* openssl-3-debugsource-3.0.8-150500.5.57.1
* libopenssl3-3.0.8-150500.5.57.1
* openssl-3-3.0.8-150500.5.57.1
## References:
* https://www.suse.com/security/cve/CVE-2025-15467.html
* https://www.suse.com/security/cve/CVE-2025-68160.html
* https://www.suse.com/security/cve/CVE-2025-69418.html
* https://www.suse.com/security/cve/CVE-2025-69419.html
* https://www.suse.com/security/cve/CVE-2025-69420.html
* https://www.suse.com/security/cve/CVE-2025-69421.html
* https://www.suse.com/security/cve/CVE-2026-22795.html
* https://www.suse.com/security/cve/CVE-2026-22796.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256830
* https://bugzilla.suse.com/show_bug.cgi?id=1256834
* https://bugzilla.suse.com/show_bug.cgi?id=1256835
* https://bugzilla.suse.com/show_bug.cgi?id=1256836
* https://bugzilla.suse.com/show_bug.cgi?id=1256837
* https://bugzilla.suse.com/show_bug.cgi?id=1256838
* https://bugzilla.suse.com/show_bug.cgi?id=1256839
* https://bugzilla.suse.com/show_bug.cgi?id=1256840
SUSE-SU-2026:0312-1: critical: Security update for openssl-3
# Security update for openssl-3
Announcement ID: SUSE-SU-2026:0312-1
Release Date: 2026-01-28T09:38:02Z
Rating: critical
References:
* bsc#1256830
* bsc#1256834
* bsc#1256835
* bsc#1256836
* bsc#1256837
* bsc#1256838
* bsc#1256839
* bsc#1256840
Cross-References:
* CVE-2025-15467
* CVE-2025-68160
* CVE-2025-69418
* CVE-2025-69419
* CVE-2025-69420
* CVE-2025-69421
* CVE-2026-22795
* CVE-2026-22796
CVSS scores:
* CVE-2025-15467 ( SUSE ): 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-15467 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68160 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68160 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-69418 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-69418 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-69419 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-69419 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-69420 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-69420 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-69421 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-69421 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22795 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22795 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22796 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-22796 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves eight vulnerabilities can now be installed.
## Description:
This update for openssl-3 fixes the following issues:
* CVE-2025-15467: Stack buffer overflow in CMS AuthEnvelopedData parsing
(bsc#1256830).
* CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes
(bsc#1256834).
* CVE-2025-69418: Unauthenticated/unencrypted trailing bytes with low-level
OCB function calls (bsc#1256835).
* CVE-2025-69419: Out of bounds write in PKCS12_get_friendlyname() UTF-8
conversion (bsc#1256836).
* CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response()
function (bsc#1256837).
* CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex
function (bsc#1256838).
* CVE-2026-22795: Missing ASN1_TYPE validation in PKCS#12 parsing
(bsc#1256839).
* CVE-2026-22796: ASN1_TYPE Type Confusion in the
PKCS7_digest_from_attributes() function (bsc#1256840).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-312=1 openSUSE-SLE-15.6-2026-312=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-312=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-312=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libopenssl3-3.1.4-150600.5.42.1
* libopenssl3-debuginfo-3.1.4-150600.5.42.1
* openssl-3-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-debuginfo-3.1.4-150600.5.42.1
* openssl-3-debugsource-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-3.1.4-150600.5.42.1
* openssl-3-debuginfo-3.1.4-150600.5.42.1
* libopenssl-3-devel-3.1.4-150600.5.42.1
* openSUSE Leap 15.6 (x86_64)
* libopenssl3-32bit-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-32bit-debuginfo-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-32bit-3.1.4-150600.5.42.1
* libopenssl-3-devel-32bit-3.1.4-150600.5.42.1
* libopenssl3-32bit-debuginfo-3.1.4-150600.5.42.1
* openSUSE Leap 15.6 (noarch)
* openssl-3-doc-3.1.4-150600.5.42.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libopenssl-3-devel-64bit-3.1.4-150600.5.42.1
* libopenssl3-64bit-3.1.4-150600.5.42.1
* libopenssl3-64bit-debuginfo-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-64bit-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-64bit-debuginfo-3.1.4-150600.5.42.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* libopenssl3-3.1.4-150600.5.42.1
* libopenssl3-debuginfo-3.1.4-150600.5.42.1
* openssl-3-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-debuginfo-3.1.4-150600.5.42.1
* openssl-3-debugsource-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-3.1.4-150600.5.42.1
* openssl-3-debuginfo-3.1.4-150600.5.42.1
* libopenssl-3-devel-3.1.4-150600.5.42.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (x86_64)
* libopenssl-3-fips-provider-32bit-debuginfo-3.1.4-150600.5.42.1
* libopenssl3-32bit-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-32bit-3.1.4-150600.5.42.1
* libopenssl3-32bit-debuginfo-3.1.4-150600.5.42.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libopenssl3-3.1.4-150600.5.42.1
* libopenssl3-debuginfo-3.1.4-150600.5.42.1
* openssl-3-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-debuginfo-3.1.4-150600.5.42.1
* openssl-3-debugsource-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-3.1.4-150600.5.42.1
* openssl-3-debuginfo-3.1.4-150600.5.42.1
* libopenssl-3-devel-3.1.4-150600.5.42.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64)
* libopenssl-3-fips-provider-32bit-debuginfo-3.1.4-150600.5.42.1
* libopenssl3-32bit-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-32bit-3.1.4-150600.5.42.1
* libopenssl3-32bit-debuginfo-3.1.4-150600.5.42.1
## References:
* https://www.suse.com/security/cve/CVE-2025-15467.html
* https://www.suse.com/security/cve/CVE-2025-68160.html
* https://www.suse.com/security/cve/CVE-2025-69418.html
* https://www.suse.com/security/cve/CVE-2025-69419.html
* https://www.suse.com/security/cve/CVE-2025-69420.html
* https://www.suse.com/security/cve/CVE-2025-69421.html
* https://www.suse.com/security/cve/CVE-2026-22795.html
* https://www.suse.com/security/cve/CVE-2026-22796.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256830
* https://bugzilla.suse.com/show_bug.cgi?id=1256834
* https://bugzilla.suse.com/show_bug.cgi?id=1256835
* https://bugzilla.suse.com/show_bug.cgi?id=1256836
* https://bugzilla.suse.com/show_bug.cgi?id=1256837
* https://bugzilla.suse.com/show_bug.cgi?id=1256838
* https://bugzilla.suse.com/show_bug.cgi?id=1256839
* https://bugzilla.suse.com/show_bug.cgi?id=1256840
SUSE-SU-2026:0313-1: important: Security update for gimp
# Security update for gimp
Announcement ID: SUSE-SU-2026:0313-1
Release Date: 2026-01-28T10:13:44Z
Rating: important
References:
* bsc#1255293
* bsc#1255296
Cross-References:
* CVE-2025-14422
* CVE-2025-14425
CVSS scores:
* CVE-2025-14422 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-14422 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-14422 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-14425 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-14425 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-14425 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Linux Enterprise Workstation Extension 15 SP7
* SUSE Package Hub 15 15-SP7
An update that solves two vulnerabilities can now be installed.
## Description:
This update for gimp fixes the following issues:
* CVE-2025-14422: Fixed RCE vulnerability due to PNM file parsing integer
overflow (bsc#1255293)
* CVE-2025-14425: Fixed RCE vulnerability due to JP2 file parsing heap-based
buffer overflow (bsc#1255296)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-313=1
* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-313=1
* SUSE Linux Enterprise Workstation Extension 15 SP7
zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-313=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-313=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* gimp-devel-debuginfo-2.10.30-150400.3.38.1
* gimp-debuginfo-2.10.30-150400.3.38.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.38.1
* libgimpui-2_0-0-2.10.30-150400.3.38.1
* libgimp-2_0-0-2.10.30-150400.3.38.1
* gimp-plugin-aa-2.10.30-150400.3.38.1
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.38.1
* gimp-plugin-aa-debuginfo-2.10.30-150400.3.38.1
* gimp-debugsource-2.10.30-150400.3.38.1
* gimp-devel-2.10.30-150400.3.38.1
* gimp-2.10.30-150400.3.38.1
* openSUSE Leap 15.6 (noarch)
* gimp-lang-2.10.30-150400.3.38.1
* openSUSE Leap 15.6 (x86_64)
* libgimpui-2_0-0-32bit-debuginfo-2.10.30-150400.3.38.1
* libgimp-2_0-0-32bit-2.10.30-150400.3.38.1
* libgimp-2_0-0-32bit-debuginfo-2.10.30-150400.3.38.1
* libgimpui-2_0-0-32bit-2.10.30-150400.3.38.1
* SUSE Package Hub 15 15-SP7 (aarch64)
* gimp-devel-debuginfo-2.10.30-150400.3.38.1
* gimp-plugin-aa-2.10.30-150400.3.38.1
* gimp-plugin-aa-debuginfo-2.10.30-150400.3.38.1
* gimp-devel-2.10.30-150400.3.38.1
* gimp-2.10.30-150400.3.38.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x)
* gimp-debuginfo-2.10.30-150400.3.38.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.38.1
* libgimpui-2_0-0-2.10.30-150400.3.38.1
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.38.1
* gimp-debugsource-2.10.30-150400.3.38.1
* libgimp-2_0-0-2.10.30-150400.3.38.1
* SUSE Package Hub 15 15-SP7 (noarch)
* gimp-lang-2.10.30-150400.3.38.1
* SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64)
* gimp-devel-debuginfo-2.10.30-150400.3.38.1
* gimp-debuginfo-2.10.30-150400.3.38.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.38.1
* libgimpui-2_0-0-2.10.30-150400.3.38.1
* libgimp-2_0-0-2.10.30-150400.3.38.1
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.38.1
* gimp-debugsource-2.10.30-150400.3.38.1
* gimp-devel-2.10.30-150400.3.38.1
* gimp-2.10.30-150400.3.38.1
* SUSE Linux Enterprise Workstation Extension 15 SP7 (noarch)
* gimp-lang-2.10.30-150400.3.38.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* gimp-devel-debuginfo-2.10.30-150400.3.38.1
* gimp-debuginfo-2.10.30-150400.3.38.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.38.1
* libgimpui-2_0-0-2.10.30-150400.3.38.1
* libgimp-2_0-0-2.10.30-150400.3.38.1
* gimp-plugin-aa-2.10.30-150400.3.38.1
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.38.1
* gimp-plugin-aa-debuginfo-2.10.30-150400.3.38.1
* gimp-debugsource-2.10.30-150400.3.38.1
* gimp-devel-2.10.30-150400.3.38.1
* gimp-2.10.30-150400.3.38.1
* openSUSE Leap 15.4 (noarch)
* gimp-lang-2.10.30-150400.3.38.1
* openSUSE Leap 15.4 (x86_64)
* libgimpui-2_0-0-32bit-debuginfo-2.10.30-150400.3.38.1
* libgimp-2_0-0-32bit-2.10.30-150400.3.38.1
* libgimp-2_0-0-32bit-debuginfo-2.10.30-150400.3.38.1
* libgimpui-2_0-0-32bit-2.10.30-150400.3.38.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libgimpui-2_0-0-64bit-debuginfo-2.10.30-150400.3.38.1
* libgimp-2_0-0-64bit-2.10.30-150400.3.38.1
* libgimp-2_0-0-64bit-debuginfo-2.10.30-150400.3.38.1
* libgimpui-2_0-0-64bit-2.10.30-150400.3.38.1
## References:
* https://www.suse.com/security/cve/CVE-2025-14422.html
* https://www.suse.com/security/cve/CVE-2025-14425.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255293
* https://bugzilla.suse.com/show_bug.cgi?id=1255296
SUSE-SU-2026:0317-1: important: Security update for the Linux Kernel
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2026:0317-1
Release Date: 2026-01-28T14:37:05Z
Rating: important
References:
* bsc#1065729
* bsc#1193629
* bsc#1194869
* bsc#1196823
* bsc#1204957
* bsc#1205567
* bsc#1206451
* bsc#1206843
* bsc#1206889
* bsc#1207051
* bsc#1207088
* bsc#1207315
* bsc#1207611
* bsc#1207620
* bsc#1207622
* bsc#1207636
* bsc#1207644
* bsc#1207646
* bsc#1207652
* bsc#1207653
* bsc#1208570
* bsc#1208758
* bsc#1209799
* bsc#1209980
* bsc#1210644
* bsc#1210817
* bsc#1210943
* bsc#1211690
* bsc#1213025
* bsc#1213032
* bsc#1213093
* bsc#1213105
* bsc#1213110
* bsc#1213111
* bsc#1213653
* bsc#1213747
* bsc#1213867
* bsc#1214635
* bsc#1214940
* bsc#1214962
* bsc#1214986
* bsc#1214990
* bsc#1216062
* bsc#1224573
* bsc#1225832
* bsc#1226797
* bsc#1226846
* bsc#1228015
* bsc#1233640
* bsc#1235038
* bsc#1237563
* bsc#1249871
* bsc#1252046
* bsc#1252678
* bsc#1253409
* bsc#1254392
* bsc#1254520
* bsc#1254559
* bsc#1254562
* bsc#1254572
* bsc#1254578
* bsc#1254580
* bsc#1254592
* bsc#1254601
* bsc#1254608
* bsc#1254609
* bsc#1254614
* bsc#1254615
* bsc#1254617
* bsc#1254623
* bsc#1254625
* bsc#1254626
* bsc#1254631
* bsc#1254632
* bsc#1254634
* bsc#1254644
* bsc#1254645
* bsc#1254649
* bsc#1254651
* bsc#1254653
* bsc#1254656
* bsc#1254658
* bsc#1254660
* bsc#1254664
* bsc#1254671
* bsc#1254674
* bsc#1254676
* bsc#1254677
* bsc#1254681
* bsc#1254684
* bsc#1254685
* bsc#1254686
* bsc#1254690
* bsc#1254692
* bsc#1254694
* bsc#1254696
* bsc#1254698
* bsc#1254699
* bsc#1254704
* bsc#1254706
* bsc#1254709
* bsc#1254710
* bsc#1254711
* bsc#1254712
* bsc#1254713
* bsc#1254714
* bsc#1254716
* bsc#1254723
* bsc#1254725
* bsc#1254728
* bsc#1254729
* bsc#1254743
* bsc#1254745
* bsc#1254751
* bsc#1254753
* bsc#1254754
* bsc#1254756
* bsc#1254759
* bsc#1254763
* bsc#1254775
* bsc#1254780
* bsc#1254781
* bsc#1254782
* bsc#1254783
* bsc#1254785
* bsc#1254786
* bsc#1254788
* bsc#1254789
* bsc#1254792
* bsc#1254813
* bsc#1254843
* bsc#1254847
* bsc#1254851
* bsc#1254894
* bsc#1254902
* bsc#1254910
* bsc#1254911
* bsc#1254915
* bsc#1254916
* bsc#1254917
* bsc#1254920
* bsc#1254922
* bsc#1254958
* bsc#1254959
* bsc#1254974
* bsc#1254979
* bsc#1254986
* bsc#1254994
* bsc#1255002
* bsc#1255005
* bsc#1255007
* bsc#1255049
* bsc#1255060
* bsc#1255107
* bsc#1255163
* bsc#1255165
* bsc#1255245
* bsc#1255467
* bsc#1255469
* bsc#1255521
* bsc#1255528
* bsc#1255532
* bsc#1255546
* bsc#1255549
* bsc#1255554
* bsc#1255555
* bsc#1255558
* bsc#1255560
* bsc#1255561
* bsc#1255562
* bsc#1255565
* bsc#1255574
* bsc#1255576
* bsc#1255578
* bsc#1255582
* bsc#1255596
* bsc#1255600
* bsc#1255605
* bsc#1255607
* bsc#1255608
* bsc#1255609
* bsc#1255618
* bsc#1255619
* bsc#1255620
* bsc#1255623
* bsc#1255624
* bsc#1255626
* bsc#1255627
* bsc#1255628
* bsc#1255635
* bsc#1255636
* bsc#1255688
* bsc#1255690
* bsc#1255697
* bsc#1255702
* bsc#1255704
* bsc#1255745
* bsc#1255747
* bsc#1255749
* bsc#1255750
* bsc#1255757
* bsc#1255758
* bsc#1255760
* bsc#1255761
* bsc#1255762
* bsc#1255763
* bsc#1255769
* bsc#1255771
* bsc#1255773
* bsc#1255780
* bsc#1255786
* bsc#1255787
* bsc#1255789
* bsc#1255790
* bsc#1255791
* bsc#1255792
* bsc#1255796
* bsc#1255797
* bsc#1255800
* bsc#1255801
* bsc#1255802
* bsc#1255803
* bsc#1255804
* bsc#1255806
* bsc#1255808
* bsc#1255819
* bsc#1255839
* bsc#1255841
* bsc#1255843
* bsc#1255844
* bsc#1255872
* bsc#1255875
* bsc#1255876
* bsc#1255877
* bsc#1255878
* bsc#1255880
* bsc#1255881
* bsc#1255888
* bsc#1255889
* bsc#1255890
* bsc#1255899
* bsc#1255901
* bsc#1255902
* bsc#1255905
* bsc#1255906
* bsc#1255909
* bsc#1255910
* bsc#1255912
* bsc#1255916
* bsc#1255919
* bsc#1255920
* bsc#1255922
* bsc#1255924
* bsc#1255925
* bsc#1255939
* bsc#1255946
* bsc#1255950
* bsc#1255953
* bsc#1255954
* bsc#1255955
* bsc#1255962
* bsc#1255964
* bsc#1255968
* bsc#1255969
* bsc#1255970
* bsc#1255971
* bsc#1255974
* bsc#1255978
* bsc#1255979
* bsc#1255983
* bsc#1255985
* bsc#1255990
* bsc#1255993
* bsc#1255994
* bsc#1255996
* bsc#1255998
* bsc#1256034
* bsc#1256040
* bsc#1256042
* bsc#1256045
* bsc#1256046
* bsc#1256048
* bsc#1256049
* bsc#1256050
* bsc#1256053
* bsc#1256056
* bsc#1256057
* bsc#1256062
* bsc#1256063
* bsc#1256064
* bsc#1256065
* bsc#1256071
* bsc#1256074
* bsc#1256081
* bsc#1256084
* bsc#1256086
* bsc#1256088
* bsc#1256091
* bsc#1256093
* bsc#1256099
* bsc#1256101
* bsc#1256103
* bsc#1256106
* bsc#1256111
* bsc#1256112
* bsc#1256114
* bsc#1256115
* bsc#1256118
* bsc#1256119
* bsc#1256121
* bsc#1256122
* bsc#1256124
* bsc#1256125
* bsc#1256126
* bsc#1256127
* bsc#1256128
* bsc#1256130
* bsc#1256131
* bsc#1256132
* bsc#1256133
* bsc#1256136
* bsc#1256137
* bsc#1256140
* bsc#1256141
* bsc#1256142
* bsc#1256143
* bsc#1256144
* bsc#1256145
* bsc#1256149
* bsc#1256150
* bsc#1256152
* bsc#1256154
* bsc#1256155
* bsc#1256157
* bsc#1256158
* bsc#1256162
* bsc#1256164
* bsc#1256165
* bsc#1256166
* bsc#1256167
* bsc#1256172
* bsc#1256173
* bsc#1256174
* bsc#1256177
* bsc#1256178
* bsc#1256179
* bsc#1256182
* bsc#1256184
* bsc#1256185
* bsc#1256186
* bsc#1256188
* bsc#1256189
* bsc#1256191
* bsc#1256192
* bsc#1256193
* bsc#1256194
* bsc#1256196
* bsc#1256198
* bsc#1256199
* bsc#1256200
* bsc#1256202
* bsc#1256203
* bsc#1256204
* bsc#1256205
* bsc#1256206
* bsc#1256207
* bsc#1256208
* bsc#1256211
* bsc#1256214
* bsc#1256215
* bsc#1256216
* bsc#1256218
* bsc#1256219
* bsc#1256220
* bsc#1256221
* bsc#1256223
* bsc#1256228
* bsc#1256230
* bsc#1256231
* bsc#1256235
* bsc#1256239
* bsc#1256241
* bsc#1256242
* bsc#1256245
* bsc#1256248
* bsc#1256250
* bsc#1256254
* bsc#1256260
* bsc#1256265
* bsc#1256269
* bsc#1256271
* bsc#1256274
* bsc#1256282
* bsc#1256285
* bsc#1256291
* bsc#1256294
* bsc#1256295
* bsc#1256300
* bsc#1256302
* bsc#1256306
* bsc#1256309
* bsc#1256317
* bsc#1256320
* bsc#1256323
* bsc#1256326
* bsc#1256328
* bsc#1256333
* bsc#1256334
* bsc#1256335
* bsc#1256337
* bsc#1256338
* bsc#1256344
* bsc#1256346
* bsc#1256349
* bsc#1256352
* bsc#1256353
* bsc#1256355
* bsc#1256358
* bsc#1256359
* bsc#1256363
* bsc#1256364
* bsc#1256368
* bsc#1256370
* bsc#1256375
* bsc#1256381
* bsc#1256382
* bsc#1256383
* bsc#1256384
* bsc#1256386
* bsc#1256388
* bsc#1256391
* bsc#1256394
* bsc#1256395
* bsc#1256396
* bsc#1256397
* bsc#1256398
* bsc#1256423
* bsc#1256426
* bsc#1256432
* jsc#PED-1073
* jsc#PED-14062
* jsc#PED-1407
* jsc#PED-1495
* jsc#PED-1549
* jsc#PED-1559
* jsc#PED-2765
* jsc#PED-370
* jsc#PED-376
* jsc#PED-7167
* jsc#PED-8111
* jsc#SLE-13847
* jsc#SLE-18378
* jsc#SLE-18384
* jsc#SLE-19253
* jsc#SLE-19255
Cross-References:
* CVE-2022-0854
* CVE-2022-48853
* CVE-2022-50614
* CVE-2022-50615
* CVE-2022-50617
* CVE-2022-50618
* CVE-2022-50619
* CVE-2022-50621
* CVE-2022-50622
* CVE-2022-50623
* CVE-2022-50625
* CVE-2022-50626
* CVE-2022-50629
* CVE-2022-50630
* CVE-2022-50633
* CVE-2022-50635
* CVE-2022-50636
* CVE-2022-50638
* CVE-2022-50640
* CVE-2022-50641
* CVE-2022-50643
* CVE-2022-50644
* CVE-2022-50646
* CVE-2022-50649
* CVE-2022-50652
* CVE-2022-50653
* CVE-2022-50656
* CVE-2022-50658
* CVE-2022-50660
* CVE-2022-50661
* CVE-2022-50662
* CVE-2022-50664
* CVE-2022-50665
* CVE-2022-50666
* CVE-2022-50667
* CVE-2022-50668
* CVE-2022-50669
* CVE-2022-50670
* CVE-2022-50671
* CVE-2022-50672
* CVE-2022-50673
* CVE-2022-50675
* CVE-2022-50677
* CVE-2022-50678
* CVE-2022-50679
* CVE-2022-50698
* CVE-2022-50699
* CVE-2022-50700
* CVE-2022-50701
* CVE-2022-50702
* CVE-2022-50703
* CVE-2022-50704
* CVE-2022-50705
* CVE-2022-50709
* CVE-2022-50710
* CVE-2022-50712
* CVE-2022-50714
* CVE-2022-50715
* CVE-2022-50716
* CVE-2022-50717
* CVE-2022-50718
* CVE-2022-50719
* CVE-2022-50722
* CVE-2022-50723
* CVE-2022-50724
* CVE-2022-50726
* CVE-2022-50727
* CVE-2022-50728
* CVE-2022-50730
* CVE-2022-50731
* CVE-2022-50732
* CVE-2022-50733
* CVE-2022-50735
* CVE-2022-50736
* CVE-2022-50738
* CVE-2022-50740
* CVE-2022-50742
* CVE-2022-50744
* CVE-2022-50745
* CVE-2022-50747
* CVE-2022-50749
* CVE-2022-50750
* CVE-2022-50751
* CVE-2022-50752
* CVE-2022-50754
* CVE-2022-50755
* CVE-2022-50756
* CVE-2022-50757
* CVE-2022-50758
* CVE-2022-50760
* CVE-2022-50761
* CVE-2022-50763
* CVE-2022-50767
* CVE-2022-50768
* CVE-2022-50769
* CVE-2022-50770
* CVE-2022-50773
* CVE-2022-50774
* CVE-2022-50776
* CVE-2022-50777
* CVE-2022-50779
* CVE-2022-50781
* CVE-2022-50782
* CVE-2022-50809
* CVE-2022-50814
* CVE-2022-50818
* CVE-2022-50819
* CVE-2022-50821
* CVE-2022-50822
* CVE-2022-50823
* CVE-2022-50824
* CVE-2022-50826
* CVE-2022-50827
* CVE-2022-50828
* CVE-2022-50829
* CVE-2022-50830
* CVE-2022-50832
* CVE-2022-50833
* CVE-2022-50834
* CVE-2022-50835
* CVE-2022-50836
* CVE-2022-50838
* CVE-2022-50839
* CVE-2022-50840
* CVE-2022-50842
* CVE-2022-50843
* CVE-2022-50844
* CVE-2022-50845
* CVE-2022-50846
* CVE-2022-50847
* CVE-2022-50848
* CVE-2022-50849
* CVE-2022-50850
* CVE-2022-50851
* CVE-2022-50853
* CVE-2022-50856
* CVE-2022-50858
* CVE-2022-50859
* CVE-2022-50860
* CVE-2022-50861
* CVE-2022-50862
* CVE-2022-50864
* CVE-2022-50866
* CVE-2022-50867
* CVE-2022-50868
* CVE-2022-50870
* CVE-2022-50872
* CVE-2022-50873
* CVE-2022-50876
* CVE-2022-50878
* CVE-2022-50880
* CVE-2022-50881
* CVE-2022-50882
* CVE-2022-50883
* CVE-2022-50884
* CVE-2022-50885
* CVE-2022-50886
* CVE-2022-50887
* CVE-2022-50888
* CVE-2022-50889
* CVE-2023-23559
* CVE-2023-53254
* CVE-2023-53743
* CVE-2023-53744
* CVE-2023-53746
* CVE-2023-53747
* CVE-2023-53751
* CVE-2023-53753
* CVE-2023-53754
* CVE-2023-53755
* CVE-2023-53761
* CVE-2023-53766
* CVE-2023-53769
* CVE-2023-53780
* CVE-2023-53781
* CVE-2023-53783
* CVE-2023-53786
* CVE-2023-53788
* CVE-2023-53792
* CVE-2023-53794
* CVE-2023-53801
* CVE-2023-53802
* CVE-2023-53803
* CVE-2023-53804
* CVE-2023-53806
* CVE-2023-53808
* CVE-2023-53811
* CVE-2023-53814
* CVE-2023-53816
* CVE-2023-53818
* CVE-2023-53819
* CVE-2023-53820
* CVE-2023-53827
* CVE-2023-53828
* CVE-2023-53830
* CVE-2023-53832
* CVE-2023-53833
* CVE-2023-53834
* CVE-2023-53837
* CVE-2023-53840
* CVE-2023-53842
* CVE-2023-53844
* CVE-2023-53845
* CVE-2023-53847
* CVE-2023-53848
* CVE-2023-53849
* CVE-2023-53850
* CVE-2023-53852
* CVE-2023-53858
* CVE-2023-53860
* CVE-2023-53862
* CVE-2023-53864
* CVE-2023-53866
* CVE-2023-53989
* CVE-2023-53990
* CVE-2023-53991
* CVE-2023-53996
* CVE-2023-53998
* CVE-2023-54001
* CVE-2023-54003
* CVE-2023-54007
* CVE-2023-54009
* CVE-2023-54010
* CVE-2023-54014
* CVE-2023-54015
* CVE-2023-54017
* CVE-2023-54018
* CVE-2023-54019
* CVE-2023-54020
* CVE-2023-54021
* CVE-2023-54024
* CVE-2023-54025
* CVE-2023-54026
* CVE-2023-54028
* CVE-2023-54036
* CVE-2023-54039
* CVE-2023-54040
* CVE-2023-54041
* CVE-2023-54042
* CVE-2023-54044
* CVE-2023-54045
* CVE-2023-54046
* CVE-2023-54047
* CVE-2023-54048
* CVE-2023-54049
* CVE-2023-54050
* CVE-2023-54051
* CVE-2023-54053
* CVE-2023-54055
* CVE-2023-54057
* CVE-2023-54058
* CVE-2023-54064
* CVE-2023-54070
* CVE-2023-54072
* CVE-2023-54074
* CVE-2023-54076
* CVE-2023-54078
* CVE-2023-54079
* CVE-2023-54083
* CVE-2023-54084
* CVE-2023-54090
* CVE-2023-54091
* CVE-2023-54092
* CVE-2023-54095
* CVE-2023-54096
* CVE-2023-54097
* CVE-2023-54098
* CVE-2023-54100
* CVE-2023-54102
* CVE-2023-54104
* CVE-2023-54106
* CVE-2023-54107
* CVE-2023-54108
* CVE-2023-54110
* CVE-2023-54111
* CVE-2023-54114
* CVE-2023-54115
* CVE-2023-54116
* CVE-2023-54118
* CVE-2023-54119
* CVE-2023-54120
* CVE-2023-54122
* CVE-2023-54123
* CVE-2023-54126
* CVE-2023-54127
* CVE-2023-54128
* CVE-2023-54130
* CVE-2023-54131
* CVE-2023-54132
* CVE-2023-54134
* CVE-2023-54136
* CVE-2023-54138
* CVE-2023-54140
* CVE-2023-54144
* CVE-2023-54146
* CVE-2023-54148
* CVE-2023-54150
* CVE-2023-54153
* CVE-2023-54156
* CVE-2023-54159
* CVE-2023-54164
* CVE-2023-54166
* CVE-2023-54168
* CVE-2023-54169
* CVE-2023-54170
* CVE-2023-54171
* CVE-2023-54173
* CVE-2023-54175
* CVE-2023-54177
* CVE-2023-54179
* CVE-2023-54183
* CVE-2023-54186
* CVE-2023-54189
* CVE-2023-54190
* CVE-2023-54194
* CVE-2023-54197
* CVE-2023-54198
* CVE-2023-54199
* CVE-2023-54201
* CVE-2023-54202
* CVE-2023-54205
* CVE-2023-54208
* CVE-2023-54210
* CVE-2023-54211
* CVE-2023-54213
* CVE-2023-54214
* CVE-2023-54219
* CVE-2023-54226
* CVE-2023-54229
* CVE-2023-54230
* CVE-2023-54234
* CVE-2023-54236
* CVE-2023-54238
* CVE-2023-54242
* CVE-2023-54244
* CVE-2023-54245
* CVE-2023-54251
* CVE-2023-54252
* CVE-2023-54254
* CVE-2023-54260
* CVE-2023-54262
* CVE-2023-54264
* CVE-2023-54266
* CVE-2023-54267
* CVE-2023-54269
* CVE-2023-54270
* CVE-2023-54271
* CVE-2023-54274
* CVE-2023-54275
* CVE-2023-54277
* CVE-2023-54280
* CVE-2023-54284
* CVE-2023-54286
* CVE-2023-54287
* CVE-2023-54289
* CVE-2023-54292
* CVE-2023-54293
* CVE-2023-54294
* CVE-2023-54295
* CVE-2023-54298
* CVE-2023-54299
* CVE-2023-54300
* CVE-2023-54301
* CVE-2023-54302
* CVE-2023-54304
* CVE-2023-54305
* CVE-2023-54309
* CVE-2023-54311
* CVE-2023-54315
* CVE-2023-54317
* CVE-2023-54319
* CVE-2023-54320
* CVE-2023-54321
* CVE-2023-54322
* CVE-2023-54325
* CVE-2023-54326
* CVE-2024-36933
* CVE-2024-53093
* CVE-2024-56590
* CVE-2025-39977
* CVE-2025-40019
* CVE-2025-40139
* CVE-2025-40215
* CVE-2025-40220
* CVE-2025-40233
* CVE-2025-40256
* CVE-2025-40258
* CVE-2025-40277
* CVE-2025-40280
* CVE-2025-40331
* CVE-2025-68218
* CVE-2025-68732
CVSS scores:
* CVE-2022-0854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-0854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-50614 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50614 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50615 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50617 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50618 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50622 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50622 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50625 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50626 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50633 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50636 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50638 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50638 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2022-50640 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50641 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50641 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50643 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50643 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50644 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50644 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50646 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50646 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50649 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50652 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50653 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50653 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50656 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50656 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
* CVE-2022-50658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50664 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50673 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50700 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50709 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50709 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-50710 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50710 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50714 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50714 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50716 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50717 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50717 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50719 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50722 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50723 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50723 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50724 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50726 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50732 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50733 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50735 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50736 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50736 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50738 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50740 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50740 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50742 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50742 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50744 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50745 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50745 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50747 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-50749 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2022-50750 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50750 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50751 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50752 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50752 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50755 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50755 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50756 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50756 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50757 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50758 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50758 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50760 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50761 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50763 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50763 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50767 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50768 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50769 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50770 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50770 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50773 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50774 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50774 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50776 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50777 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50777 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50779 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50779 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50781 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50781 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
* CVE-2022-50782 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50823 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50824 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50824 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50826 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50827 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50829 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50830 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50858 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50868 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-23559 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
* CVE-2023-23559 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-23559 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53254 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53254 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53254 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-53254 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-53743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53747 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53751 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53761 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53761 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53766 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53766 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53780 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53781 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53781 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53783 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53794 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53794 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53803 ( SUSE ): 5.1
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-53803 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-53804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53806 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53806 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53816 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-53818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53827 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53827 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53845 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53845 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-53847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53866 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53989 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53996 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2023-53996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-53998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54003 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54003 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54009 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54009 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54010 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54014 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54017 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54017 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54018 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54021 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54036 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54041 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54042 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54042 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54044 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54045 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54046 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54046 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54047 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54072 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54072 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54076 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54076 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54078 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54079 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54079 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54083 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54083 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54084 ( SUSE ): 7.0
CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54084 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54090 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54091 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54091 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54092 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54095 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54096 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54096 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54097 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54097 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54098 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54100 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54100 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54102 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54102 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54104 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-54106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54111 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54111 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54114 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54115 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54118 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54118 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54120 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54120 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54123 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54123 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54126 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54126 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54127 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54127 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54128 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54128 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54130 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54131 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54131 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54132 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54134 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54134 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54136 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54136 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54138 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54140 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54140 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54144 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54144 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54146 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54146 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54148 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54148 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
* CVE-2023-54150 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54150 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54153 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54156 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54159 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54159 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54164 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54166 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54166 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54168 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54169 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54170 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54173 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54173 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54175 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54175 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54177 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54179 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54179 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54183 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54183 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54186 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54189 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54190 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54190 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54194 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54194 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54197 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54198 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54199 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54201 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54201 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54205 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54205 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54208 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54208 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54210 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54210 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54211 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54213 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54213 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54214 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54214 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54219 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54219 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54226 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54226 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54229 ( SUSE ): 5.1
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54229 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54230 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54230 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54234 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54234 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54236 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54236 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54238 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54238 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54242 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54242 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54244 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54245 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54245 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54251 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54252 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54252 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54254 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54254 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54260 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54260 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54262 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54262 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54264 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54266 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54266 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54267 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-54267 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-54269 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54269 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54270 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54270 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54271 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54271 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54274 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54274 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54275 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54275 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54277 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54280 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54280 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54284 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54286 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54286 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54287 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54289 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54292 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54292 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54293 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54293 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54294 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54294 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54295 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54295 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54298 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54299 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54300 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54300 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54301 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54301 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54302 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54302 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54304 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54305 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54309 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54309 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54311 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54311 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54315 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54317 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54317 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54319 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54320 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54320 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54321 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54321 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54322 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54322 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54325 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54325 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54326 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54326 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-36933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56590 ( SUSE ): 6.9
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56590 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39977 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39977 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40019 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40019 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40139 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40139 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40215 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40215 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40220 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40220 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40258 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40258 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40280 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40280 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68732 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68732 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 392 vulnerabilities, contains 16 features and has 47
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP5 kernel was updated to fix various security
issues
The following security issues were fixed:
* CVE-2022-50630: mm: hugetlb: fix UAF in hugetlb_handle_userfault
(bsc#1254785).
* CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer
(bsc#1255576).
* CVE-2023-53254: cacheinfo: Fix shared_cpu_map to handle shared caches at
different levels (bsc#1249871).
* CVE-2023-53781: smc: Fix use-after-free in tcp_write_timer_handler()
(bsc#1254751).
* CVE-2024-56590: Bluetooth: hci_core: Fix not checking skb length on
hci_acldata_packet (bsc#1235038).
* CVE-2025-39977: futex: Prevent use-after-free during requeue-PI
(bsc#1252046).
* CVE-2025-40019: crypto: essiv - Check ssize for decryption and in-place
encryption (bsc#1252678).
* CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in
smc_clc_prfx_set() (bsc#1253409).
* CVE-2025-40215: kABI: xfrm: delete x->tunnel as we delete x (bsc#1254959).
* CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk
workers (bsc#1254520).
* CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents
(bsc#1254813).
* CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work()
(bsc#1254843).
* CVE-2025-40277: drm/vmwgfx: Validate command header size against
(bsc#1254894).
* CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self()
(bsc#1254847).
* CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).
* CVE-2025-68732: gpu: host1x: Fix race in syncpt alloc/free (bsc#1255688).
The following non security issues were fixed:
* ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() (git-fixes).
* ACPI: PRM: Remove unnecessary strict handler address checks (git-fixes).
* ACPI: property: Do not pass NULL handles to acpi_attach_data() (git-fixes).
* ACPI: property: Fix buffer properties extraction for subnodes (git-fixes).
* KVM: SVM: Fix TSC_AUX virtualization setup (git-fixes).
* RDMA/cm: Rate limit destroy CM ID timeout error message (git-fixes).
* RDMA/counter: Check CAP_NET_RAW check in user namespace for RDMA counters
(git-fixes).
* RDMA/hns: Fix the modification of max_send_sge (git-fixes).
* RDMA/mlx5: Check CAP_NET_RAW in user namespace for anchor create (git-
fixes).
* RDMA/mlx5: Check CAP_NET_RAW in user namespace for devx create (git-fixes).
* RDMA/mlx5: Check CAP_NET_RAW in user namespace for flow create (git-fixes).
* RDMA/mlx5: Fix compilation warning when USER_ACCESS isn't set (git-fixes).
* RDMA/nldev: Check CAP_NET_RAW in user namespace for QP modify (git-fixes).
* RDMA/uverbs: Add empty rdma_uattrs_has_raw_cap() declaration (git-fixes).
* RDMA/uverbs: Check CAP_NET_RAW in user namespace for QP create (git-fixes).
* RDMA/uverbs: Check CAP_NET_RAW in user namespace for RAW QP create (git-
fixes).
* RDMA/uverbs: Check CAP_NET_RAW in user namespace for flow create (git-
fixes).
* arch/idle: Change arch_cpu_idle() behavior: always exit with IRQs disabled
(git-fixes).
* cpuidle/poll: Ensure IRQs stay disabled after cpuidle_state::enter() calls
(git-fixes).
* cpuidle: Move IRQ state validation (git-fixes).
* cpuidle: haltpoll: Do not enable interrupts when entering idle (git-fixes).
* dm: free table mempools if not used in __bind (git-fixes).
* padata: Honor the caller's alignment in case of chunk_size 0 (bsc#1237563).
* platform/x86/intel-uncore-freq: Fail module load when plat_info is NULL
(git-fixes).
* x86/bugs: Fix RSB clearing in indirect_branch_prediction_barrier() (git-
fixes).
* x86/bugs: Use SBPB in write_ibpb() if applicable (git-fixes).
* x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT (git-fixes).
* x86/tdx: Drop flags from __tdx_hypercall() (git-fixes).
* x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes).
* x86/tdx: Emit warning if IRQs are enabled during HLT #VE handling (git-
fixes).
* x86/tdx: Extend TDX_MODULE_CALL to support more TDCALL/SEAMCALL leafs (git-
fixes).
* x86/tdx: Fix __noreturn build warning around __tdx_hypercall_failed() (git-
fixes).
* x86/tdx: Fix arch_safe_halt() execution for TDX VMs (git-fixes).
* x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes).
* x86/tdx: Make TDX_HYPERCALL asm similar to TDX_MODULE_CALL (git-fixes).
* x86/tdx: Make macros of TDCALLs consistent with the spec (git-fixes).
* x86/tdx: Pass TDCALL/SEAMCALL input/output registers via a structure (git-
fixes).
* x86/tdx: Reimplement __tdx_hypercall() using TDX_MODULE_CALL asm (git-
fixes).
* x86/tdx: Remove 'struct tdx_hypercall_args' (git-fixes).
* x86/tdx: Remove TDX_HCALL_ISSUE_STI (git-fixes).
* x86/tdx: Rename __tdx_module_call() to __tdcall() (git-fixes).
* x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes).
* x86/tdx: Retry partially-completed page conversion hypercalls (git-fixes).
* x86/tdx: Skip saving output regs when SEAMCALL fails with VMFailInvalid
(git-fixes).
* x86/tdx: Zero out the missing RSI in TDX_HYPERCALL macro (git-fixes).
* x86/virt/tdx: Make TDX_MODULE_CALL handle SEAMCALL #UD and #GP (git-fixes).
* x86/virt/tdx: Wire up basic SEAMCALL functions (git-fixes).
* xfs: fix sparse inode limits on runt AG (bsc#1254392).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-317=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-317=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-317=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-317=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-317=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-317=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-317=1
## Package List:
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* kernel-default-base-5.14.21-150500.55.133.1.150500.6.65.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* kernel-default-debugsource-5.14.21-150500.55.133.1
* kernel-default-debuginfo-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-macros-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* kernel-default-debugsource-5.14.21-150500.55.133.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.133.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.133.1
* gfs2-kmp-default-5.14.21-150500.55.133.1
* kernel-syms-5.14.21-150500.55.133.1
* dlm-kmp-default-5.14.21-150500.55.133.1
* kernel-default-devel-5.14.21-150500.55.133.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kernel-default-base-5.14.21-150500.55.133.1.150500.6.65.1
* kernel-default-debuginfo-5.14.21-150500.55.133.1
* kernel-obs-build-debugsource-5.14.21-150500.55.133.1
* cluster-md-kmp-default-5.14.21-150500.55.133.1
* kernel-obs-build-5.14.21-150500.55.133.1
* ocfs2-kmp-default-5.14.21-150500.55.133.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
nosrc)
* kernel-64kb-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64)
* kernel-64kb-debugsource-5.14.21-150500.55.133.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.133.1
* kernel-64kb-devel-5.14.21-150500.55.133.1
* kernel-64kb-debuginfo-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* kernel-macros-5.14.21-150500.55.133.1
* kernel-source-5.14.21-150500.55.133.1
* kernel-devel-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* kernel-default-debugsource-5.14.21-150500.55.133.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.133.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.133.1
* gfs2-kmp-default-5.14.21-150500.55.133.1
* kernel-syms-5.14.21-150500.55.133.1
* dlm-kmp-default-5.14.21-150500.55.133.1
* kernel-default-devel-5.14.21-150500.55.133.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kernel-default-base-5.14.21-150500.55.133.1.150500.6.65.1
* kernel-default-debuginfo-5.14.21-150500.55.133.1
* kernel-obs-build-debugsource-5.14.21-150500.55.133.1
* cluster-md-kmp-default-5.14.21-150500.55.133.1
* kernel-obs-build-5.14.21-150500.55.133.1
* ocfs2-kmp-default-5.14.21-150500.55.133.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64)
* kernel-64kb-debugsource-5.14.21-150500.55.133.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.133.1
* kernel-64kb-devel-5.14.21-150500.55.133.1
* kernel-64kb-debuginfo-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* kernel-macros-5.14.21-150500.55.133.1
* kernel-source-5.14.21-150500.55.133.1
* kernel-devel-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* kernel-default-debugsource-5.14.21-150500.55.133.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.133.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.133.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.133.1
* gfs2-kmp-default-5.14.21-150500.55.133.1
* kernel-syms-5.14.21-150500.55.133.1
* dlm-kmp-default-5.14.21-150500.55.133.1
* reiserfs-kmp-default-5.14.21-150500.55.133.1
* kernel-default-devel-5.14.21-150500.55.133.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kernel-default-debuginfo-5.14.21-150500.55.133.1
* kernel-obs-build-debugsource-5.14.21-150500.55.133.1
* cluster-md-kmp-default-5.14.21-150500.55.133.1
* kernel-obs-build-5.14.21-150500.55.133.1
* ocfs2-kmp-default-5.14.21-150500.55.133.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64)
* kernel-64kb-debugsource-5.14.21-150500.55.133.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.133.1
* kernel-64kb-devel-5.14.21-150500.55.133.1
* kernel-64kb-debuginfo-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150500.55.133.1.150500.6.65.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* kernel-macros-5.14.21-150500.55.133.1
* kernel-source-5.14.21-150500.55.133.1
* kernel-devel-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch nosrc)
* kernel-docs-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.133.1
* kernel-zfcpdump-debugsource-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* kernel-default-debugsource-5.14.21-150500.55.133.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.133.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.133.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.133.1
* gfs2-kmp-default-5.14.21-150500.55.133.1
* kernel-syms-5.14.21-150500.55.133.1
* dlm-kmp-default-5.14.21-150500.55.133.1
* reiserfs-kmp-default-5.14.21-150500.55.133.1
* kernel-default-devel-5.14.21-150500.55.133.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kernel-default-base-5.14.21-150500.55.133.1.150500.6.65.1
* kernel-default-debuginfo-5.14.21-150500.55.133.1
* kernel-obs-build-debugsource-5.14.21-150500.55.133.1
* cluster-md-kmp-default-5.14.21-150500.55.133.1
* kernel-obs-build-5.14.21-150500.55.133.1
* ocfs2-kmp-default-5.14.21-150500.55.133.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* kernel-macros-5.14.21-150500.55.133.1
* kernel-source-5.14.21-150500.55.133.1
* kernel-devel-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Live Patching 15-SP5 (nosrc)
* kernel-default-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-default-debugsource-5.14.21-150500.55.133.1
* kernel-livepatch-SLE15-SP5_Update_34-debugsource-1-150500.11.3.1
* kernel-default-livepatch-5.14.21-150500.55.133.1
* kernel-livepatch-5_14_21-150500_55_133-default-1-150500.11.3.1
* kernel-default-livepatch-devel-5.14.21-150500.55.133.1
* kernel-default-debuginfo-5.14.21-150500.55.133.1
* kernel-livepatch-5_14_21-150500_55_133-default-debuginfo-1-150500.11.3.1
* openSUSE Leap 15.5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (noarch)
* kernel-macros-5.14.21-150500.55.133.1
* kernel-devel-5.14.21-150500.55.133.1
* kernel-source-vanilla-5.14.21-150500.55.133.1
* kernel-source-5.14.21-150500.55.133.1
* kernel-docs-html-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.133.1
* kernel-kvmsmall-debugsource-5.14.21-150500.55.133.1
* kernel-kvmsmall-devel-5.14.21-150500.55.133.1
* kernel-default-base-5.14.21-150500.55.133.1.150500.6.65.1
* kernel-default-base-rebuild-5.14.21-150500.55.133.1.150500.6.65.1
* kernel-kvmsmall-debuginfo-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kernel-default-livepatch-5.14.21-150500.55.133.1
* kernel-default-devel-5.14.21-150500.55.133.1
* kernel-default-optional-debuginfo-5.14.21-150500.55.133.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kselftests-kmp-default-debuginfo-5.14.21-150500.55.133.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kernel-default-optional-5.14.21-150500.55.133.1
* kselftests-kmp-default-5.14.21-150500.55.133.1
* kernel-default-extra-debuginfo-5.14.21-150500.55.133.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.133.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kernel-syms-5.14.21-150500.55.133.1
* dlm-kmp-default-5.14.21-150500.55.133.1
* kernel-default-extra-5.14.21-150500.55.133.1
* cluster-md-kmp-default-5.14.21-150500.55.133.1
* kernel-obs-build-5.14.21-150500.55.133.1
* ocfs2-kmp-default-5.14.21-150500.55.133.1
* kernel-default-debugsource-5.14.21-150500.55.133.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.133.1
* gfs2-kmp-default-5.14.21-150500.55.133.1
* reiserfs-kmp-default-5.14.21-150500.55.133.1
* kernel-obs-build-debugsource-5.14.21-150500.55.133.1
* kernel-obs-qa-5.14.21-150500.55.133.1
* kernel-default-debuginfo-5.14.21-150500.55.133.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_34-debugsource-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_55_133-default-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_55_133-default-debuginfo-1-150500.11.3.1
* kernel-default-livepatch-devel-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (x86_64)
* kernel-kvmsmall-vdso-5.14.21-150500.55.133.1
* kernel-default-vdso-5.14.21-150500.55.133.1
* kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.133.1
* kernel-default-vdso-debuginfo-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.133.1
* kernel-zfcpdump-debugsource-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (nosrc)
* dtb-aarch64-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (aarch64)
* dtb-amazon-5.14.21-150500.55.133.1
* dtb-lg-5.14.21-150500.55.133.1
* dtb-freescale-5.14.21-150500.55.133.1
* dtb-allwinner-5.14.21-150500.55.133.1
* kernel-64kb-extra-5.14.21-150500.55.133.1
* kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.133.1
* dlm-kmp-64kb-5.14.21-150500.55.133.1
* dtb-exynos-5.14.21-150500.55.133.1
* gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.133.1
* dtb-apple-5.14.21-150500.55.133.1
* dlm-kmp-64kb-debuginfo-5.14.21-150500.55.133.1
* kernel-64kb-extra-debuginfo-5.14.21-150500.55.133.1
* reiserfs-kmp-64kb-5.14.21-150500.55.133.1
* dtb-amlogic-5.14.21-150500.55.133.1
* gfs2-kmp-64kb-5.14.21-150500.55.133.1
* dtb-marvell-5.14.21-150500.55.133.1
* ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.133.1
* dtb-renesas-5.14.21-150500.55.133.1
* dtb-rockchip-5.14.21-150500.55.133.1
* dtb-nvidia-5.14.21-150500.55.133.1
* dtb-arm-5.14.21-150500.55.133.1
* cluster-md-kmp-64kb-5.14.21-150500.55.133.1
* kernel-64kb-devel-5.14.21-150500.55.133.1
* dtb-broadcom-5.14.21-150500.55.133.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.133.1
* dtb-sprd-5.14.21-150500.55.133.1
* kernel-64kb-optional-debuginfo-5.14.21-150500.55.133.1
* ocfs2-kmp-64kb-5.14.21-150500.55.133.1
* dtb-socionext-5.14.21-150500.55.133.1
* dtb-apm-5.14.21-150500.55.133.1
* dtb-mediatek-5.14.21-150500.55.133.1
* dtb-amd-5.14.21-150500.55.133.1
* dtb-qcom-5.14.21-150500.55.133.1
* cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.133.1
* kselftests-kmp-64kb-5.14.21-150500.55.133.1
* reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.133.1
* kernel-64kb-debugsource-5.14.21-150500.55.133.1
* kernel-64kb-debuginfo-5.14.21-150500.55.133.1
* kernel-64kb-optional-5.14.21-150500.55.133.1
* dtb-cavium-5.14.21-150500.55.133.1
* dtb-altera-5.14.21-150500.55.133.1
* dtb-hisilicon-5.14.21-150500.55.133.1
* dtb-xilinx-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.133.1
## References:
* https://www.suse.com/security/cve/CVE-2022-0854.html
* https://www.suse.com/security/cve/CVE-2022-48853.html
* https://www.suse.com/security/cve/CVE-2022-50614.html
* https://www.suse.com/security/cve/CVE-2022-50615.html
* https://www.suse.com/security/cve/CVE-2022-50617.html
* https://www.suse.com/security/cve/CVE-2022-50618.html
* https://www.suse.com/security/cve/CVE-2022-50619.html
* https://www.suse.com/security/cve/CVE-2022-50621.html
* https://www.suse.com/security/cve/CVE-2022-50622.html
* https://www.suse.com/security/cve/CVE-2022-50623.html
* https://www.suse.com/security/cve/CVE-2022-50625.html
* https://www.suse.com/security/cve/CVE-2022-50626.html
* https://www.suse.com/security/cve/CVE-2022-50629.html
* https://www.suse.com/security/cve/CVE-2022-50630.html
* https://www.suse.com/security/cve/CVE-2022-50633.html
* https://www.suse.com/security/cve/CVE-2022-50635.html
* https://www.suse.com/security/cve/CVE-2022-50636.html
* https://www.suse.com/security/cve/CVE-2022-50638.html
* https://www.suse.com/security/cve/CVE-2022-50640.html
* https://www.suse.com/security/cve/CVE-2022-50641.html
* https://www.suse.com/security/cve/CVE-2022-50643.html
* https://www.suse.com/security/cve/CVE-2022-50644.html
* https://www.suse.com/security/cve/CVE-2022-50646.html
* https://www.suse.com/security/cve/CVE-2022-50649.html
* https://www.suse.com/security/cve/CVE-2022-50652.html
* https://www.suse.com/security/cve/CVE-2022-50653.html
* https://www.suse.com/security/cve/CVE-2022-50656.html
* https://www.suse.com/security/cve/CVE-2022-50658.html
* https://www.suse.com/security/cve/CVE-2022-50660.html
* https://www.suse.com/security/cve/CVE-2022-50661.html
* https://www.suse.com/security/cve/CVE-2022-50662.html
* https://www.suse.com/security/cve/CVE-2022-50664.html
* https://www.suse.com/security/cve/CVE-2022-50665.html
* https://www.suse.com/security/cve/CVE-2022-50666.html
* https://www.suse.com/security/cve/CVE-2022-50667.html
* https://www.suse.com/security/cve/CVE-2022-50668.html
* https://www.suse.com/security/cve/CVE-2022-50669.html
* https://www.suse.com/security/cve/CVE-2022-50670.html
* https://www.suse.com/security/cve/CVE-2022-50671.html
* https://www.suse.com/security/cve/CVE-2022-50672.html
* https://www.suse.com/security/cve/CVE-2022-50673.html
* https://www.suse.com/security/cve/CVE-2022-50675.html
* https://www.suse.com/security/cve/CVE-2022-50677.html
* https://www.suse.com/security/cve/CVE-2022-50678.html
* https://www.suse.com/security/cve/CVE-2022-50679.html
* https://www.suse.com/security/cve/CVE-2022-50698.html
* https://www.suse.com/security/cve/CVE-2022-50699.html
* https://www.suse.com/security/cve/CVE-2022-50700.html
* https://www.suse.com/security/cve/CVE-2022-50701.html
* https://www.suse.com/security/cve/CVE-2022-50702.html
* https://www.suse.com/security/cve/CVE-2022-50703.html
* https://www.suse.com/security/cve/CVE-2022-50704.html
* https://www.suse.com/security/cve/CVE-2022-50705.html
* https://www.suse.com/security/cve/CVE-2022-50709.html
* https://www.suse.com/security/cve/CVE-2022-50710.html
* https://www.suse.com/security/cve/CVE-2022-50712.html
* https://www.suse.com/security/cve/CVE-2022-50714.html
* https://www.suse.com/security/cve/CVE-2022-50715.html
* https://www.suse.com/security/cve/CVE-2022-50716.html
* https://www.suse.com/security/cve/CVE-2022-50717.html
* https://www.suse.com/security/cve/CVE-2022-50718.html
* https://www.suse.com/security/cve/CVE-2022-50719.html
* https://www.suse.com/security/cve/CVE-2022-50722.html
* https://www.suse.com/security/cve/CVE-2022-50723.html
* https://www.suse.com/security/cve/CVE-2022-50724.html
* https://www.suse.com/security/cve/CVE-2022-50726.html
* https://www.suse.com/security/cve/CVE-2022-50727.html
* https://www.suse.com/security/cve/CVE-2022-50728.html
* https://www.suse.com/security/cve/CVE-2022-50730.html
* https://www.suse.com/security/cve/CVE-2022-50731.html
* https://www.suse.com/security/cve/CVE-2022-50732.html
* https://www.suse.com/security/cve/CVE-2022-50733.html
* https://www.suse.com/security/cve/CVE-2022-50735.html
* https://www.suse.com/security/cve/CVE-2022-50736.html
* https://www.suse.com/security/cve/CVE-2022-50738.html
* https://www.suse.com/security/cve/CVE-2022-50740.html
* https://www.suse.com/security/cve/CVE-2022-50742.html
* https://www.suse.com/security/cve/CVE-2022-50744.html
* https://www.suse.com/security/cve/CVE-2022-50745.html
* https://www.suse.com/security/cve/CVE-2022-50747.html
* https://www.suse.com/security/cve/CVE-2022-50749.html
* https://www.suse.com/security/cve/CVE-2022-50750.html
* https://www.suse.com/security/cve/CVE-2022-50751.html
* https://www.suse.com/security/cve/CVE-2022-50752.html
* https://www.suse.com/security/cve/CVE-2022-50754.html
* https://www.suse.com/security/cve/CVE-2022-50755.html
* https://www.suse.com/security/cve/CVE-2022-50756.html
* https://www.suse.com/security/cve/CVE-2022-50757.html
* https://www.suse.com/security/cve/CVE-2022-50758.html
* https://www.suse.com/security/cve/CVE-2022-50760.html
* https://www.suse.com/security/cve/CVE-2022-50761.html
* https://www.suse.com/security/cve/CVE-2022-50763.html
* https://www.suse.com/security/cve/CVE-2022-50767.html
* https://www.suse.com/security/cve/CVE-2022-50768.html
* https://www.suse.com/security/cve/CVE-2022-50769.html
* https://www.suse.com/security/cve/CVE-2022-50770.html
* https://www.suse.com/security/cve/CVE-2022-50773.html
* https://www.suse.com/security/cve/CVE-2022-50774.html
* https://www.suse.com/security/cve/CVE-2022-50776.html
* https://www.suse.com/security/cve/CVE-2022-50777.html
* https://www.suse.com/security/cve/CVE-2022-50779.html
* https://www.suse.com/security/cve/CVE-2022-50781.html
* https://www.suse.com/security/cve/CVE-2022-50782.html
* https://www.suse.com/security/cve/CVE-2022-50809.html
* https://www.suse.com/security/cve/CVE-2022-50814.html
* https://www.suse.com/security/cve/CVE-2022-50818.html
* https://www.suse.com/security/cve/CVE-2022-50819.html
* https://www.suse.com/security/cve/CVE-2022-50821.html
* https://www.suse.com/security/cve/CVE-2022-50822.html
* https://www.suse.com/security/cve/CVE-2022-50823.html
* https://www.suse.com/security/cve/CVE-2022-50824.html
* https://www.suse.com/security/cve/CVE-2022-50826.html
* https://www.suse.com/security/cve/CVE-2022-50827.html
* https://www.suse.com/security/cve/CVE-2022-50828.html
* https://www.suse.com/security/cve/CVE-2022-50829.html
* https://www.suse.com/security/cve/CVE-2022-50830.html
* https://www.suse.com/security/cve/CVE-2022-50832.html
* https://www.suse.com/security/cve/CVE-2022-50833.html
* https://www.suse.com/security/cve/CVE-2022-50834.html
* https://www.suse.com/security/cve/CVE-2022-50835.html
* https://www.suse.com/security/cve/CVE-2022-50836.html
* https://www.suse.com/security/cve/CVE-2022-50838.html
* https://www.suse.com/security/cve/CVE-2022-50839.html
* https://www.suse.com/security/cve/CVE-2022-50840.html
* https://www.suse.com/security/cve/CVE-2022-50842.html
* https://www.suse.com/security/cve/CVE-2022-50843.html
* https://www.suse.com/security/cve/CVE-2022-50844.html
* https://www.suse.com/security/cve/CVE-2022-50845.html
* https://www.suse.com/security/cve/CVE-2022-50846.html
* https://www.suse.com/security/cve/CVE-2022-50847.html
* https://www.suse.com/security/cve/CVE-2022-50848.html
* https://www.suse.com/security/cve/CVE-2022-50849.html
* https://www.suse.com/security/cve/CVE-2022-50850.html
* https://www.suse.com/security/cve/CVE-2022-50851.html
* https://www.suse.com/security/cve/CVE-2022-50853.html
* https://www.suse.com/security/cve/CVE-2022-50856.html
* https://www.suse.com/security/cve/CVE-2022-50858.html
* https://www.suse.com/security/cve/CVE-2022-50859.html
* https://www.suse.com/security/cve/CVE-2022-50860.html
* https://www.suse.com/security/cve/CVE-2022-50861.html
* https://www.suse.com/security/cve/CVE-2022-50862.html
* https://www.suse.com/security/cve/CVE-2022-50864.html
* https://www.suse.com/security/cve/CVE-2022-50866.html
* https://www.suse.com/security/cve/CVE-2022-50867.html
* https://www.suse.com/security/cve/CVE-2022-50868.html
* https://www.suse.com/security/cve/CVE-2022-50870.html
* https://www.suse.com/security/cve/CVE-2022-50872.html
* https://www.suse.com/security/cve/CVE-2022-50873.html
* https://www.suse.com/security/cve/CVE-2022-50876.html
* https://www.suse.com/security/cve/CVE-2022-50878.html
* https://www.suse.com/security/cve/CVE-2022-50880.html
* https://www.suse.com/security/cve/CVE-2022-50881.html
* https://www.suse.com/security/cve/CVE-2022-50882.html
* https://www.suse.com/security/cve/CVE-2022-50883.html
* https://www.suse.com/security/cve/CVE-2022-50884.html
* https://www.suse.com/security/cve/CVE-2022-50885.html
* https://www.suse.com/security/cve/CVE-2022-50886.html
* https://www.suse.com/security/cve/CVE-2022-50887.html
* https://www.suse.com/security/cve/CVE-2022-50888.html
* https://www.suse.com/security/cve/CVE-2022-50889.html
* https://www.suse.com/security/cve/CVE-2023-23559.html
* https://www.suse.com/security/cve/CVE-2023-53254.html
* https://www.suse.com/security/cve/CVE-2023-53743.html
* https://www.suse.com/security/cve/CVE-2023-53744.html
* https://www.suse.com/security/cve/CVE-2023-53746.html
* https://www.suse.com/security/cve/CVE-2023-53747.html
* https://www.suse.com/security/cve/CVE-2023-53751.html
* https://www.suse.com/security/cve/CVE-2023-53753.html
* https://www.suse.com/security/cve/CVE-2023-53754.html
* https://www.suse.com/security/cve/CVE-2023-53755.html
* https://www.suse.com/security/cve/CVE-2023-53761.html
* https://www.suse.com/security/cve/CVE-2023-53766.html
* https://www.suse.com/security/cve/CVE-2023-53769.html
* https://www.suse.com/security/cve/CVE-2023-53780.html
* https://www.suse.com/security/cve/CVE-2023-53781.html
* https://www.suse.com/security/cve/CVE-2023-53783.html
* https://www.suse.com/security/cve/CVE-2023-53786.html
* https://www.suse.com/security/cve/CVE-2023-53788.html
* https://www.suse.com/security/cve/CVE-2023-53792.html
* https://www.suse.com/security/cve/CVE-2023-53794.html
* https://www.suse.com/security/cve/CVE-2023-53801.html
* https://www.suse.com/security/cve/CVE-2023-53802.html
* https://www.suse.com/security/cve/CVE-2023-53803.html
* https://www.suse.com/security/cve/CVE-2023-53804.html
* https://www.suse.com/security/cve/CVE-2023-53806.html
* https://www.suse.com/security/cve/CVE-2023-53808.html
* https://www.suse.com/security/cve/CVE-2023-53811.html
* https://www.suse.com/security/cve/CVE-2023-53814.html
* https://www.suse.com/security/cve/CVE-2023-53816.html
* https://www.suse.com/security/cve/CVE-2023-53818.html
* https://www.suse.com/security/cve/CVE-2023-53819.html
* https://www.suse.com/security/cve/CVE-2023-53820.html
* https://www.suse.com/security/cve/CVE-2023-53827.html
* https://www.suse.com/security/cve/CVE-2023-53828.html
* https://www.suse.com/security/cve/CVE-2023-53830.html
* https://www.suse.com/security/cve/CVE-2023-53832.html
* https://www.suse.com/security/cve/CVE-2023-53833.html
* https://www.suse.com/security/cve/CVE-2023-53834.html
* https://www.suse.com/security/cve/CVE-2023-53837.html
* https://www.suse.com/security/cve/CVE-2023-53840.html
* https://www.suse.com/security/cve/CVE-2023-53842.html
* https://www.suse.com/security/cve/CVE-2023-53844.html
* https://www.suse.com/security/cve/CVE-2023-53845.html
* https://www.suse.com/security/cve/CVE-2023-53847.html
* https://www.suse.com/security/cve/CVE-2023-53848.html
* https://www.suse.com/security/cve/CVE-2023-53849.html
* https://www.suse.com/security/cve/CVE-2023-53850.html
* https://www.suse.com/security/cve/CVE-2023-53852.html
* https://www.suse.com/security/cve/CVE-2023-53858.html
* https://www.suse.com/security/cve/CVE-2023-53860.html
* https://www.suse.com/security/cve/CVE-2023-53862.html
* https://www.suse.com/security/cve/CVE-2023-53864.html
* https://www.suse.com/security/cve/CVE-2023-53866.html
* https://www.suse.com/security/cve/CVE-2023-53989.html
* https://www.suse.com/security/cve/CVE-2023-53990.html
* https://www.suse.com/security/cve/CVE-2023-53991.html
* https://www.suse.com/security/cve/CVE-2023-53996.html
* https://www.suse.com/security/cve/CVE-2023-53998.html
* https://www.suse.com/security/cve/CVE-2023-54001.html
* https://www.suse.com/security/cve/CVE-2023-54003.html
* https://www.suse.com/security/cve/CVE-2023-54007.html
* https://www.suse.com/security/cve/CVE-2023-54009.html
* https://www.suse.com/security/cve/CVE-2023-54010.html
* https://www.suse.com/security/cve/CVE-2023-54014.html
* https://www.suse.com/security/cve/CVE-2023-54015.html
* https://www.suse.com/security/cve/CVE-2023-54017.html
* https://www.suse.com/security/cve/CVE-2023-54018.html
* https://www.suse.com/security/cve/CVE-2023-54019.html
* https://www.suse.com/security/cve/CVE-2023-54020.html
* https://www.suse.com/security/cve/CVE-2023-54021.html
* https://www.suse.com/security/cve/CVE-2023-54024.html
* https://www.suse.com/security/cve/CVE-2023-54025.html
* https://www.suse.com/security/cve/CVE-2023-54026.html
* https://www.suse.com/security/cve/CVE-2023-54028.html
* https://www.suse.com/security/cve/CVE-2023-54036.html
* https://www.suse.com/security/cve/CVE-2023-54039.html
* https://www.suse.com/security/cve/CVE-2023-54040.html
* https://www.suse.com/security/cve/CVE-2023-54041.html
* https://www.suse.com/security/cve/CVE-2023-54042.html
* https://www.suse.com/security/cve/CVE-2023-54044.html
* https://www.suse.com/security/cve/CVE-2023-54045.html
* https://www.suse.com/security/cve/CVE-2023-54046.html
* https://www.suse.com/security/cve/CVE-2023-54047.html
* https://www.suse.com/security/cve/CVE-2023-54048.html
* https://www.suse.com/security/cve/CVE-2023-54049.html
* https://www.suse.com/security/cve/CVE-2023-54050.html
* https://www.suse.com/security/cve/CVE-2023-54051.html
* https://www.suse.com/security/cve/CVE-2023-54053.html
* https://www.suse.com/security/cve/CVE-2023-54055.html
* https://www.suse.com/security/cve/CVE-2023-54057.html
* https://www.suse.com/security/cve/CVE-2023-54058.html
* https://www.suse.com/security/cve/CVE-2023-54064.html
* https://www.suse.com/security/cve/CVE-2023-54070.html
* https://www.suse.com/security/cve/CVE-2023-54072.html
* https://www.suse.com/security/cve/CVE-2023-54074.html
* https://www.suse.com/security/cve/CVE-2023-54076.html
* https://www.suse.com/security/cve/CVE-2023-54078.html
* https://www.suse.com/security/cve/CVE-2023-54079.html
* https://www.suse.com/security/cve/CVE-2023-54083.html
* https://www.suse.com/security/cve/CVE-2023-54084.html
* https://www.suse.com/security/cve/CVE-2023-54090.html
* https://www.suse.com/security/cve/CVE-2023-54091.html
* https://www.suse.com/security/cve/CVE-2023-54092.html
* https://www.suse.com/security/cve/CVE-2023-54095.html
* https://www.suse.com/security/cve/CVE-2023-54096.html
* https://www.suse.com/security/cve/CVE-2023-54097.html
* https://www.suse.com/security/cve/CVE-2023-54098.html
* https://www.suse.com/security/cve/CVE-2023-54100.html
* https://www.suse.com/security/cve/CVE-2023-54102.html
* https://www.suse.com/security/cve/CVE-2023-54104.html
* https://www.suse.com/security/cve/CVE-2023-54106.html
* https://www.suse.com/security/cve/CVE-2023-54107.html
* https://www.suse.com/security/cve/CVE-2023-54108.html
* https://www.suse.com/security/cve/CVE-2023-54110.html
* https://www.suse.com/security/cve/CVE-2023-54111.html
* https://www.suse.com/security/cve/CVE-2023-54114.html
* https://www.suse.com/security/cve/CVE-2023-54115.html
* https://www.suse.com/security/cve/CVE-2023-54116.html
* https://www.suse.com/security/cve/CVE-2023-54118.html
* https://www.suse.com/security/cve/CVE-2023-54119.html
* https://www.suse.com/security/cve/CVE-2023-54120.html
* https://www.suse.com/security/cve/CVE-2023-54122.html
* https://www.suse.com/security/cve/CVE-2023-54123.html
* https://www.suse.com/security/cve/CVE-2023-54126.html
* https://www.suse.com/security/cve/CVE-2023-54127.html
* https://www.suse.com/security/cve/CVE-2023-54128.html
* https://www.suse.com/security/cve/CVE-2023-54130.html
* https://www.suse.com/security/cve/CVE-2023-54131.html
* https://www.suse.com/security/cve/CVE-2023-54132.html
* https://www.suse.com/security/cve/CVE-2023-54134.html
* https://www.suse.com/security/cve/CVE-2023-54136.html
* https://www.suse.com/security/cve/CVE-2023-54138.html
* https://www.suse.com/security/cve/CVE-2023-54140.html
* https://www.suse.com/security/cve/CVE-2023-54144.html
* https://www.suse.com/security/cve/CVE-2023-54146.html
* https://www.suse.com/security/cve/CVE-2023-54148.html
* https://www.suse.com/security/cve/CVE-2023-54150.html
* https://www.suse.com/security/cve/CVE-2023-54153.html
* https://www.suse.com/security/cve/CVE-2023-54156.html
* https://www.suse.com/security/cve/CVE-2023-54159.html
* https://www.suse.com/security/cve/CVE-2023-54164.html
* https://www.suse.com/security/cve/CVE-2023-54166.html
* https://www.suse.com/security/cve/CVE-2023-54168.html
* https://www.suse.com/security/cve/CVE-2023-54169.html
* https://www.suse.com/security/cve/CVE-2023-54170.html
* https://www.suse.com/security/cve/CVE-2023-54171.html
* https://www.suse.com/security/cve/CVE-2023-54173.html
* https://www.suse.com/security/cve/CVE-2023-54175.html
* https://www.suse.com/security/cve/CVE-2023-54177.html
* https://www.suse.com/security/cve/CVE-2023-54179.html
* https://www.suse.com/security/cve/CVE-2023-54183.html
* https://www.suse.com/security/cve/CVE-2023-54186.html
* https://www.suse.com/security/cve/CVE-2023-54189.html
* https://www.suse.com/security/cve/CVE-2023-54190.html
* https://www.suse.com/security/cve/CVE-2023-54194.html
* https://www.suse.com/security/cve/CVE-2023-54197.html
* https://www.suse.com/security/cve/CVE-2023-54198.html
* https://www.suse.com/security/cve/CVE-2023-54199.html
* https://www.suse.com/security/cve/CVE-2023-54201.html
* https://www.suse.com/security/cve/CVE-2023-54202.html
* https://www.suse.com/security/cve/CVE-2023-54205.html
* https://www.suse.com/security/cve/CVE-2023-54208.html
* https://www.suse.com/security/cve/CVE-2023-54210.html
* https://www.suse.com/security/cve/CVE-2023-54211.html
* https://www.suse.com/security/cve/CVE-2023-54213.html
* https://www.suse.com/security/cve/CVE-2023-54214.html
* https://www.suse.com/security/cve/CVE-2023-54219.html
* https://www.suse.com/security/cve/CVE-2023-54226.html
* https://www.suse.com/security/cve/CVE-2023-54229.html
* https://www.suse.com/security/cve/CVE-2023-54230.html
* https://www.suse.com/security/cve/CVE-2023-54234.html
* https://www.suse.com/security/cve/CVE-2023-54236.html
* https://www.suse.com/security/cve/CVE-2023-54238.html
* https://www.suse.com/security/cve/CVE-2023-54242.html
* https://www.suse.com/security/cve/CVE-2023-54244.html
* https://www.suse.com/security/cve/CVE-2023-54245.html
* https://www.suse.com/security/cve/CVE-2023-54251.html
* https://www.suse.com/security/cve/CVE-2023-54252.html
* https://www.suse.com/security/cve/CVE-2023-54254.html
* https://www.suse.com/security/cve/CVE-2023-54260.html
* https://www.suse.com/security/cve/CVE-2023-54262.html
* https://www.suse.com/security/cve/CVE-2023-54264.html
* https://www.suse.com/security/cve/CVE-2023-54266.html
* https://www.suse.com/security/cve/CVE-2023-54267.html
* https://www.suse.com/security/cve/CVE-2023-54269.html
* https://www.suse.com/security/cve/CVE-2023-54270.html
* https://www.suse.com/security/cve/CVE-2023-54271.html
* https://www.suse.com/security/cve/CVE-2023-54274.html
* https://www.suse.com/security/cve/CVE-2023-54275.html
* https://www.suse.com/security/cve/CVE-2023-54277.html
* https://www.suse.com/security/cve/CVE-2023-54280.html
* https://www.suse.com/security/cve/CVE-2023-54284.html
* https://www.suse.com/security/cve/CVE-2023-54286.html
* https://www.suse.com/security/cve/CVE-2023-54287.html
* https://www.suse.com/security/cve/CVE-2023-54289.html
* https://www.suse.com/security/cve/CVE-2023-54292.html
* https://www.suse.com/security/cve/CVE-2023-54293.html
* https://www.suse.com/security/cve/CVE-2023-54294.html
* https://www.suse.com/security/cve/CVE-2023-54295.html
* https://www.suse.com/security/cve/CVE-2023-54298.html
* https://www.suse.com/security/cve/CVE-2023-54299.html
* https://www.suse.com/security/cve/CVE-2023-54300.html
* https://www.suse.com/security/cve/CVE-2023-54301.html
* https://www.suse.com/security/cve/CVE-2023-54302.html
* https://www.suse.com/security/cve/CVE-2023-54304.html
* https://www.suse.com/security/cve/CVE-2023-54305.html
* https://www.suse.com/security/cve/CVE-2023-54309.html
* https://www.suse.com/security/cve/CVE-2023-54311.html
* https://www.suse.com/security/cve/CVE-2023-54315.html
* https://www.suse.com/security/cve/CVE-2023-54317.html
* https://www.suse.com/security/cve/CVE-2023-54319.html
* https://www.suse.com/security/cve/CVE-2023-54320.html
* https://www.suse.com/security/cve/CVE-2023-54321.html
* https://www.suse.com/security/cve/CVE-2023-54322.html
* https://www.suse.com/security/cve/CVE-2023-54325.html
* https://www.suse.com/security/cve/CVE-2023-54326.html
* https://www.suse.com/security/cve/CVE-2024-36933.html
* https://www.suse.com/security/cve/CVE-2024-53093.html
* https://www.suse.com/security/cve/CVE-2024-56590.html
* https://www.suse.com/security/cve/CVE-2025-39977.html
* https://www.suse.com/security/cve/CVE-2025-40019.html
* https://www.suse.com/security/cve/CVE-2025-40139.html
* https://www.suse.com/security/cve/CVE-2025-40215.html
* https://www.suse.com/security/cve/CVE-2025-40220.html
* https://www.suse.com/security/cve/CVE-2025-40233.html
* https://www.suse.com/security/cve/CVE-2025-40256.html
* https://www.suse.com/security/cve/CVE-2025-40258.html
* https://www.suse.com/security/cve/CVE-2025-40277.html
* https://www.suse.com/security/cve/CVE-2025-40280.html
* https://www.suse.com/security/cve/CVE-2025-40331.html
* https://www.suse.com/security/cve/CVE-2025-68218.html
* https://www.suse.com/security/cve/CVE-2025-68732.html
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1193629
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1196823
* https://bugzilla.suse.com/show_bug.cgi?id=1204957
* https://bugzilla.suse.com/show_bug.cgi?id=1205567
* https://bugzilla.suse.com/show_bug.cgi?id=1206451
* https://bugzilla.suse.com/show_bug.cgi?id=1206843
* https://bugzilla.suse.com/show_bug.cgi?id=1206889
* https://bugzilla.suse.com/show_bug.cgi?id=1207051
* https://bugzilla.suse.com/show_bug.cgi?id=1207088
* https://bugzilla.suse.com/show_bug.cgi?id=1207315
* https://bugzilla.suse.com/show_bug.cgi?id=1207611
* https://bugzilla.suse.com/show_bug.cgi?id=1207620
* https://bugzilla.suse.com/show_bug.cgi?id=1207622
* https://bugzilla.suse.com/show_bug.cgi?id=1207636
* https://bugzilla.suse.com/show_bug.cgi?id=1207644
* https://bugzilla.suse.com/show_bug.cgi?id=1207646
* https://bugzilla.suse.com/show_bug.cgi?id=1207652
* https://bugzilla.suse.com/show_bug.cgi?id=1207653
* https://bugzilla.suse.com/show_bug.cgi?id=1208570
* https://bugzilla.suse.com/show_bug.cgi?id=1208758
* https://bugzilla.suse.com/show_bug.cgi?id=1209799
* https://bugzilla.suse.com/show_bug.cgi?id=1209980
* https://bugzilla.suse.com/show_bug.cgi?id=1210644
* https://bugzilla.suse.com/show_bug.cgi?id=1210817
* https://bugzilla.suse.com/show_bug.cgi?id=1210943
* https://bugzilla.suse.com/show_bug.cgi?id=1211690
* https://bugzilla.suse.com/show_bug.cgi?id=1213025
* https://bugzilla.suse.com/show_bug.cgi?id=1213032
* https://bugzilla.suse.com/show_bug.cgi?id=1213093
* https://bugzilla.suse.com/show_bug.cgi?id=1213105
* https://bugzilla.suse.com/show_bug.cgi?id=1213110
* https://bugzilla.suse.com/show_bug.cgi?id=1213111
* https://bugzilla.suse.com/show_bug.cgi?id=1213653
* https://bugzilla.suse.com/show_bug.cgi?id=1213747
* https://bugzilla.suse.com/show_bug.cgi?id=1213867
* https://bugzilla.suse.com/show_bug.cgi?id=1214635
* https://bugzilla.suse.com/show_bug.cgi?id=1214940
* https://bugzilla.suse.com/show_bug.cgi?id=1214962
* https://bugzilla.suse.com/show_bug.cgi?id=1214986
* https://bugzilla.suse.com/show_bug.cgi?id=1214990
* https://bugzilla.suse.com/show_bug.cgi?id=1216062
* https://bugzilla.suse.com/show_bug.cgi?id=1224573
* https://bugzilla.suse.com/show_bug.cgi?id=1225832
* https://bugzilla.suse.com/show_bug.cgi?id=1226797
* https://bugzilla.suse.com/show_bug.cgi?id=1226846
* https://bugzilla.suse.com/show_bug.cgi?id=1228015
* https://bugzilla.suse.com/show_bug.cgi?id=1233640
* https://bugzilla.suse.com/show_bug.cgi?id=1235038
* https://bugzilla.suse.com/show_bug.cgi?id=1237563
* https://bugzilla.suse.com/show_bug.cgi?id=1249871
* https://bugzilla.suse.com/show_bug.cgi?id=1252046
* https://bugzilla.suse.com/show_bug.cgi?id=1252678
* https://bugzilla.suse.com/show_bug.cgi?id=1253409
* https://bugzilla.suse.com/show_bug.cgi?id=1254392
* https://bugzilla.suse.com/show_bug.cgi?id=1254520
* https://bugzilla.suse.com/show_bug.cgi?id=1254559
* https://bugzilla.suse.com/show_bug.cgi?id=1254562
* https://bugzilla.suse.com/show_bug.cgi?id=1254572
* https://bugzilla.suse.com/show_bug.cgi?id=1254578
* https://bugzilla.suse.com/show_bug.cgi?id=1254580
* https://bugzilla.suse.com/show_bug.cgi?id=1254592
* https://bugzilla.suse.com/show_bug.cgi?id=1254601
* https://bugzilla.suse.com/show_bug.cgi?id=1254608
* https://bugzilla.suse.com/show_bug.cgi?id=1254609
* https://bugzilla.suse.com/show_bug.cgi?id=1254614
* https://bugzilla.suse.com/show_bug.cgi?id=1254615
* https://bugzilla.suse.com/show_bug.cgi?id=1254617
* https://bugzilla.suse.com/show_bug.cgi?id=1254623
* https://bugzilla.suse.com/show_bug.cgi?id=1254625
* https://bugzilla.suse.com/show_bug.cgi?id=1254626
* https://bugzilla.suse.com/show_bug.cgi?id=1254631
* https://bugzilla.suse.com/show_bug.cgi?id=1254632
* https://bugzilla.suse.com/show_bug.cgi?id=1254634
* https://bugzilla.suse.com/show_bug.cgi?id=1254644
* https://bugzilla.suse.com/show_bug.cgi?id=1254645
* https://bugzilla.suse.com/show_bug.cgi?id=1254649
* https://bugzilla.suse.com/show_bug.cgi?id=1254651
* https://bugzilla.suse.com/show_bug.cgi?id=1254653
* https://bugzilla.suse.com/show_bug.cgi?id=1254656
* https://bugzilla.suse.com/show_bug.cgi?id=1254658
* https://bugzilla.suse.com/show_bug.cgi?id=1254660
* https://bugzilla.suse.com/show_bug.cgi?id=1254664
* https://bugzilla.suse.com/show_bug.cgi?id=1254671
* https://bugzilla.suse.com/show_bug.cgi?id=1254674
* https://bugzilla.suse.com/show_bug.cgi?id=1254676
* https://bugzilla.suse.com/show_bug.cgi?id=1254677
* https://bugzilla.suse.com/show_bug.cgi?id=1254681
* https://bugzilla.suse.com/show_bug.cgi?id=1254684
* https://bugzilla.suse.com/show_bug.cgi?id=1254685
* https://bugzilla.suse.com/show_bug.cgi?id=1254686
* https://bugzilla.suse.com/show_bug.cgi?id=1254690
* https://bugzilla.suse.com/show_bug.cgi?id=1254692
* https://bugzilla.suse.com/show_bug.cgi?id=1254694
* https://bugzilla.suse.com/show_bug.cgi?id=1254696
* https://bugzilla.suse.com/show_bug.cgi?id=1254698
* https://bugzilla.suse.com/show_bug.cgi?id=1254699
* https://bugzilla.suse.com/show_bug.cgi?id=1254704
* https://bugzilla.suse.com/show_bug.cgi?id=1254706
* https://bugzilla.suse.com/show_bug.cgi?id=1254709
* https://bugzilla.suse.com/show_bug.cgi?id=1254710
* https://bugzilla.suse.com/show_bug.cgi?id=1254711
* https://bugzilla.suse.com/show_bug.cgi?id=1254712
* https://bugzilla.suse.com/show_bug.cgi?id=1254713
* https://bugzilla.suse.com/show_bug.cgi?id=1254714
* https://bugzilla.suse.com/show_bug.cgi?id=1254716
* https://bugzilla.suse.com/show_bug.cgi?id=1254723
* https://bugzilla.suse.com/show_bug.cgi?id=1254725
* https://bugzilla.suse.com/show_bug.cgi?id=1254728
* https://bugzilla.suse.com/show_bug.cgi?id=1254729
* https://bugzilla.suse.com/show_bug.cgi?id=1254743
* https://bugzilla.suse.com/show_bug.cgi?id=1254745
* https://bugzilla.suse.com/show_bug.cgi?id=1254751
* https://bugzilla.suse.com/show_bug.cgi?id=1254753
* https://bugzilla.suse.com/show_bug.cgi?id=1254754
* https://bugzilla.suse.com/show_bug.cgi?id=1254756
* https://bugzilla.suse.com/show_bug.cgi?id=1254759
* https://bugzilla.suse.com/show_bug.cgi?id=1254763
* https://bugzilla.suse.com/show_bug.cgi?id=1254775
* https://bugzilla.suse.com/show_bug.cgi?id=1254780
* https://bugzilla.suse.com/show_bug.cgi?id=1254781
* https://bugzilla.suse.com/show_bug.cgi?id=1254782
* https://bugzilla.suse.com/show_bug.cgi?id=1254783
* https://bugzilla.suse.com/show_bug.cgi?id=1254785
* https://bugzilla.suse.com/show_bug.cgi?id=1254786
* https://bugzilla.suse.com/show_bug.cgi?id=1254788
* https://bugzilla.suse.com/show_bug.cgi?id=1254789
* https://bugzilla.suse.com/show_bug.cgi?id=1254792
* https://bugzilla.suse.com/show_bug.cgi?id=1254813
* https://bugzilla.suse.com/show_bug.cgi?id=1254843
* https://bugzilla.suse.com/show_bug.cgi?id=1254847
* https://bugzilla.suse.com/show_bug.cgi?id=1254851
* https://bugzilla.suse.com/show_bug.cgi?id=1254894
* https://bugzilla.suse.com/show_bug.cgi?id=1254902
* https://bugzilla.suse.com/show_bug.cgi?id=1254910
* https://bugzilla.suse.com/show_bug.cgi?id=1254911
* https://bugzilla.suse.com/show_bug.cgi?id=1254915
* https://bugzilla.suse.com/show_bug.cgi?id=1254916
* https://bugzilla.suse.com/show_bug.cgi?id=1254917
* https://bugzilla.suse.com/show_bug.cgi?id=1254920
* https://bugzilla.suse.com/show_bug.cgi?id=1254922
* https://bugzilla.suse.com/show_bug.cgi?id=1254958
* https://bugzilla.suse.com/show_bug.cgi?id=1254959
* https://bugzilla.suse.com/show_bug.cgi?id=1254974
* https://bugzilla.suse.com/show_bug.cgi?id=1254979
* https://bugzilla.suse.com/show_bug.cgi?id=1254986
* https://bugzilla.suse.com/show_bug.cgi?id=1254994
* https://bugzilla.suse.com/show_bug.cgi?id=1255002
* https://bugzilla.suse.com/show_bug.cgi?id=1255005
* https://bugzilla.suse.com/show_bug.cgi?id=1255007
* https://bugzilla.suse.com/show_bug.cgi?id=1255049
* https://bugzilla.suse.com/show_bug.cgi?id=1255060
* https://bugzilla.suse.com/show_bug.cgi?id=1255107
* https://bugzilla.suse.com/show_bug.cgi?id=1255163
* https://bugzilla.suse.com/show_bug.cgi?id=1255165
* https://bugzilla.suse.com/show_bug.cgi?id=1255245
* https://bugzilla.suse.com/show_bug.cgi?id=1255467
* https://bugzilla.suse.com/show_bug.cgi?id=1255469
* https://bugzilla.suse.com/show_bug.cgi?id=1255521
* https://bugzilla.suse.com/show_bug.cgi?id=1255528
* https://bugzilla.suse.com/show_bug.cgi?id=1255532
* https://bugzilla.suse.com/show_bug.cgi?id=1255546
* https://bugzilla.suse.com/show_bug.cgi?id=1255549
* https://bugzilla.suse.com/show_bug.cgi?id=1255554
* https://bugzilla.suse.com/show_bug.cgi?id=1255555
* https://bugzilla.suse.com/show_bug.cgi?id=1255558
* https://bugzilla.suse.com/show_bug.cgi?id=1255560
* https://bugzilla.suse.com/show_bug.cgi?id=1255561
* https://bugzilla.suse.com/show_bug.cgi?id=1255562
* https://bugzilla.suse.com/show_bug.cgi?id=1255565
* https://bugzilla.suse.com/show_bug.cgi?id=1255574
* https://bugzilla.suse.com/show_bug.cgi?id=1255576
* https://bugzilla.suse.com/show_bug.cgi?id=1255578
* https://bugzilla.suse.com/show_bug.cgi?id=1255582
* https://bugzilla.suse.com/show_bug.cgi?id=1255596
* https://bugzilla.suse.com/show_bug.cgi?id=1255600
* https://bugzilla.suse.com/show_bug.cgi?id=1255605
* https://bugzilla.suse.com/show_bug.cgi?id=1255607
* https://bugzilla.suse.com/show_bug.cgi?id=1255608
* https://bugzilla.suse.com/show_bug.cgi?id=1255609
* https://bugzilla.suse.com/show_bug.cgi?id=1255618
* https://bugzilla.suse.com/show_bug.cgi?id=1255619
* https://bugzilla.suse.com/show_bug.cgi?id=1255620
* https://bugzilla.suse.com/show_bug.cgi?id=1255623
* https://bugzilla.suse.com/show_bug.cgi?id=1255624
* https://bugzilla.suse.com/show_bug.cgi?id=1255626
* https://bugzilla.suse.com/show_bug.cgi?id=1255627
* https://bugzilla.suse.com/show_bug.cgi?id=1255628
* https://bugzilla.suse.com/show_bug.cgi?id=1255635
* https://bugzilla.suse.com/show_bug.cgi?id=1255636
* https://bugzilla.suse.com/show_bug.cgi?id=1255688
* https://bugzilla.suse.com/show_bug.cgi?id=1255690
* https://bugzilla.suse.com/show_bug.cgi?id=1255697
* https://bugzilla.suse.com/show_bug.cgi?id=1255702
* https://bugzilla.suse.com/show_bug.cgi?id=1255704
* https://bugzilla.suse.com/show_bug.cgi?id=1255745
* https://bugzilla.suse.com/show_bug.cgi?id=1255747
* https://bugzilla.suse.com/show_bug.cgi?id=1255749
* https://bugzilla.suse.com/show_bug.cgi?id=1255750
* https://bugzilla.suse.com/show_bug.cgi?id=1255757
* https://bugzilla.suse.com/show_bug.cgi?id=1255758
* https://bugzilla.suse.com/show_bug.cgi?id=1255760
* https://bugzilla.suse.com/show_bug.cgi?id=1255761
* https://bugzilla.suse.com/show_bug.cgi?id=1255762
* https://bugzilla.suse.com/show_bug.cgi?id=1255763
* https://bugzilla.suse.com/show_bug.cgi?id=1255769
* https://bugzilla.suse.com/show_bug.cgi?id=1255771
* https://bugzilla.suse.com/show_bug.cgi?id=1255773
* https://bugzilla.suse.com/show_bug.cgi?id=1255780
* https://bugzilla.suse.com/show_bug.cgi?id=1255786
* https://bugzilla.suse.com/show_bug.cgi?id=1255787
* https://bugzilla.suse.com/show_bug.cgi?id=1255789
* https://bugzilla.suse.com/show_bug.cgi?id=1255790
* https://bugzilla.suse.com/show_bug.cgi?id=1255791
* https://bugzilla.suse.com/show_bug.cgi?id=1255792
* https://bugzilla.suse.com/show_bug.cgi?id=1255796
* https://bugzilla.suse.com/show_bug.cgi?id=1255797
* https://bugzilla.suse.com/show_bug.cgi?id=1255800
* https://bugzilla.suse.com/show_bug.cgi?id=1255801
* https://bugzilla.suse.com/show_bug.cgi?id=1255802
* https://bugzilla.suse.com/show_bug.cgi?id=1255803
* https://bugzilla.suse.com/show_bug.cgi?id=1255804
* https://bugzilla.suse.com/show_bug.cgi?id=1255806
* https://bugzilla.suse.com/show_bug.cgi?id=1255808
* https://bugzilla.suse.com/show_bug.cgi?id=1255819
* https://bugzilla.suse.com/show_bug.cgi?id=1255839
* https://bugzilla.suse.com/show_bug.cgi?id=1255841
* https://bugzilla.suse.com/show_bug.cgi?id=1255843
* https://bugzilla.suse.com/show_bug.cgi?id=1255844
* https://bugzilla.suse.com/show_bug.cgi?id=1255872
* https://bugzilla.suse.com/show_bug.cgi?id=1255875
* https://bugzilla.suse.com/show_bug.cgi?id=1255876
* https://bugzilla.suse.com/show_bug.cgi?id=1255877
* https://bugzilla.suse.com/show_bug.cgi?id=1255878
* https://bugzilla.suse.com/show_bug.cgi?id=1255880
* https://bugzilla.suse.com/show_bug.cgi?id=1255881
* https://bugzilla.suse.com/show_bug.cgi?id=1255888
* https://bugzilla.suse.com/show_bug.cgi?id=1255889
* https://bugzilla.suse.com/show_bug.cgi?id=1255890
* https://bugzilla.suse.com/show_bug.cgi?id=1255899
* https://bugzilla.suse.com/show_bug.cgi?id=1255901
* https://bugzilla.suse.com/show_bug.cgi?id=1255902
* https://bugzilla.suse.com/show_bug.cgi?id=1255905
* https://bugzilla.suse.com/show_bug.cgi?id=1255906
* https://bugzilla.suse.com/show_bug.cgi?id=1255909
* https://bugzilla.suse.com/show_bug.cgi?id=1255910
* https://bugzilla.suse.com/show_bug.cgi?id=1255912
* https://bugzilla.suse.com/show_bug.cgi?id=1255916
* https://bugzilla.suse.com/show_bug.cgi?id=1255919
* https://bugzilla.suse.com/show_bug.cgi?id=1255920
* https://bugzilla.suse.com/show_bug.cgi?id=1255922
* https://bugzilla.suse.com/show_bug.cgi?id=1255924
* https://bugzilla.suse.com/show_bug.cgi?id=1255925
* https://bugzilla.suse.com/show_bug.cgi?id=1255939
* https://bugzilla.suse.com/show_bug.cgi?id=1255946
* https://bugzilla.suse.com/show_bug.cgi?id=1255950
* https://bugzilla.suse.com/show_bug.cgi?id=1255953
* https://bugzilla.suse.com/show_bug.cgi?id=1255954
* https://bugzilla.suse.com/show_bug.cgi?id=1255955
* https://bugzilla.suse.com/show_bug.cgi?id=1255962
* https://bugzilla.suse.com/show_bug.cgi?id=1255964
* https://bugzilla.suse.com/show_bug.cgi?id=1255968
* https://bugzilla.suse.com/show_bug.cgi?id=1255969
* https://bugzilla.suse.com/show_bug.cgi?id=1255970
* https://bugzilla.suse.com/show_bug.cgi?id=1255971
* https://bugzilla.suse.com/show_bug.cgi?id=1255974
* https://bugzilla.suse.com/show_bug.cgi?id=1255978
* https://bugzilla.suse.com/show_bug.cgi?id=1255979
* https://bugzilla.suse.com/show_bug.cgi?id=1255983
* https://bugzilla.suse.com/show_bug.cgi?id=1255985
* https://bugzilla.suse.com/show_bug.cgi?id=1255990
* https://bugzilla.suse.com/show_bug.cgi?id=1255993
* https://bugzilla.suse.com/show_bug.cgi?id=1255994
* https://bugzilla.suse.com/show_bug.cgi?id=1255996
* https://bugzilla.suse.com/show_bug.cgi?id=1255998
* https://bugzilla.suse.com/show_bug.cgi?id=1256034
* https://bugzilla.suse.com/show_bug.cgi?id=1256040
* https://bugzilla.suse.com/show_bug.cgi?id=1256042
* https://bugzilla.suse.com/show_bug.cgi?id=1256045
* https://bugzilla.suse.com/show_bug.cgi?id=1256046
* https://bugzilla.suse.com/show_bug.cgi?id=1256048
* https://bugzilla.suse.com/show_bug.cgi?id=1256049
* https://bugzilla.suse.com/show_bug.cgi?id=1256050
* https://bugzilla.suse.com/show_bug.cgi?id=1256053
* https://bugzilla.suse.com/show_bug.cgi?id=1256056
* https://bugzilla.suse.com/show_bug.cgi?id=1256057
* https://bugzilla.suse.com/show_bug.cgi?id=1256062
* https://bugzilla.suse.com/show_bug.cgi?id=1256063
* https://bugzilla.suse.com/show_bug.cgi?id=1256064
* https://bugzilla.suse.com/show_bug.cgi?id=1256065
* https://bugzilla.suse.com/show_bug.cgi?id=1256071
* https://bugzilla.suse.com/show_bug.cgi?id=1256074
* https://bugzilla.suse.com/show_bug.cgi?id=1256081
* https://bugzilla.suse.com/show_bug.cgi?id=1256084
* https://bugzilla.suse.com/show_bug.cgi?id=1256086
* https://bugzilla.suse.com/show_bug.cgi?id=1256088
* https://bugzilla.suse.com/show_bug.cgi?id=1256091
* https://bugzilla.suse.com/show_bug.cgi?id=1256093
* https://bugzilla.suse.com/show_bug.cgi?id=1256099
* https://bugzilla.suse.com/show_bug.cgi?id=1256101
* https://bugzilla.suse.com/show_bug.cgi?id=1256103
* https://bugzilla.suse.com/show_bug.cgi?id=1256106
* https://bugzilla.suse.com/show_bug.cgi?id=1256111
* https://bugzilla.suse.com/show_bug.cgi?id=1256112
* https://bugzilla.suse.com/show_bug.cgi?id=1256114
* https://bugzilla.suse.com/show_bug.cgi?id=1256115
* https://bugzilla.suse.com/show_bug.cgi?id=1256118
* https://bugzilla.suse.com/show_bug.cgi?id=1256119
* https://bugzilla.suse.com/show_bug.cgi?id=1256121
* https://bugzilla.suse.com/show_bug.cgi?id=1256122
* https://bugzilla.suse.com/show_bug.cgi?id=1256124
* https://bugzilla.suse.com/show_bug.cgi?id=1256125
* https://bugzilla.suse.com/show_bug.cgi?id=1256126
* https://bugzilla.suse.com/show_bug.cgi?id=1256127
* https://bugzilla.suse.com/show_bug.cgi?id=1256128
* https://bugzilla.suse.com/show_bug.cgi?id=1256130
* https://bugzilla.suse.com/show_bug.cgi?id=1256131
* https://bugzilla.suse.com/show_bug.cgi?id=1256132
* https://bugzilla.suse.com/show_bug.cgi?id=1256133
* https://bugzilla.suse.com/show_bug.cgi?id=1256136
* https://bugzilla.suse.com/show_bug.cgi?id=1256137
* https://bugzilla.suse.com/show_bug.cgi?id=1256140
* https://bugzilla.suse.com/show_bug.cgi?id=1256141
* https://bugzilla.suse.com/show_bug.cgi?id=1256142
* https://bugzilla.suse.com/show_bug.cgi?id=1256143
* https://bugzilla.suse.com/show_bug.cgi?id=1256144
* https://bugzilla.suse.com/show_bug.cgi?id=1256145
* https://bugzilla.suse.com/show_bug.cgi?id=1256149
* https://bugzilla.suse.com/show_bug.cgi?id=1256150
* https://bugzilla.suse.com/show_bug.cgi?id=1256152
* https://bugzilla.suse.com/show_bug.cgi?id=1256154
* https://bugzilla.suse.com/show_bug.cgi?id=1256155
* https://bugzilla.suse.com/show_bug.cgi?id=1256157
* https://bugzilla.suse.com/show_bug.cgi?id=1256158
* https://bugzilla.suse.com/show_bug.cgi?id=1256162
* https://bugzilla.suse.com/show_bug.cgi?id=1256164
* https://bugzilla.suse.com/show_bug.cgi?id=1256165
* https://bugzilla.suse.com/show_bug.cgi?id=1256166
* https://bugzilla.suse.com/show_bug.cgi?id=1256167
* https://bugzilla.suse.com/show_bug.cgi?id=1256172
* https://bugzilla.suse.com/show_bug.cgi?id=1256173
* https://bugzilla.suse.com/show_bug.cgi?id=1256174
* https://bugzilla.suse.com/show_bug.cgi?id=1256177
* https://bugzilla.suse.com/show_bug.cgi?id=1256178
* https://bugzilla.suse.com/show_bug.cgi?id=1256179
* https://bugzilla.suse.com/show_bug.cgi?id=1256182
* https://bugzilla.suse.com/show_bug.cgi?id=1256184
* https://bugzilla.suse.com/show_bug.cgi?id=1256185
* https://bugzilla.suse.com/show_bug.cgi?id=1256186
* https://bugzilla.suse.com/show_bug.cgi?id=1256188
* https://bugzilla.suse.com/show_bug.cgi?id=1256189
* https://bugzilla.suse.com/show_bug.cgi?id=1256191
* https://bugzilla.suse.com/show_bug.cgi?id=1256192
* https://bugzilla.suse.com/show_bug.cgi?id=1256193
* https://bugzilla.suse.com/show_bug.cgi?id=1256194
* https://bugzilla.suse.com/show_bug.cgi?id=1256196
* https://bugzilla.suse.com/show_bug.cgi?id=1256198
* https://bugzilla.suse.com/show_bug.cgi?id=1256199
* https://bugzilla.suse.com/show_bug.cgi?id=1256200
* https://bugzilla.suse.com/show_bug.cgi?id=1256202
* https://bugzilla.suse.com/show_bug.cgi?id=1256203
* https://bugzilla.suse.com/show_bug.cgi?id=1256204
* https://bugzilla.suse.com/show_bug.cgi?id=1256205
* https://bugzilla.suse.com/show_bug.cgi?id=1256206
* https://bugzilla.suse.com/show_bug.cgi?id=1256207
* https://bugzilla.suse.com/show_bug.cgi?id=1256208
* https://bugzilla.suse.com/show_bug.cgi?id=1256211
* https://bugzilla.suse.com/show_bug.cgi?id=1256214
* https://bugzilla.suse.com/show_bug.cgi?id=1256215
* https://bugzilla.suse.com/show_bug.cgi?id=1256216
* https://bugzilla.suse.com/show_bug.cgi?id=1256218
* https://bugzilla.suse.com/show_bug.cgi?id=1256219
* https://bugzilla.suse.com/show_bug.cgi?id=1256220
* https://bugzilla.suse.com/show_bug.cgi?id=1256221
* https://bugzilla.suse.com/show_bug.cgi?id=1256223
* https://bugzilla.suse.com/show_bug.cgi?id=1256228
* https://bugzilla.suse.com/show_bug.cgi?id=1256230
* https://bugzilla.suse.com/show_bug.cgi?id=1256231
* https://bugzilla.suse.com/show_bug.cgi?id=1256235
* https://bugzilla.suse.com/show_bug.cgi?id=1256239
* https://bugzilla.suse.com/show_bug.cgi?id=1256241
* https://bugzilla.suse.com/show_bug.cgi?id=1256242
* https://bugzilla.suse.com/show_bug.cgi?id=1256245
* https://bugzilla.suse.com/show_bug.cgi?id=1256248
* https://bugzilla.suse.com/show_bug.cgi?id=1256250
* https://bugzilla.suse.com/show_bug.cgi?id=1256254
* https://bugzilla.suse.com/show_bug.cgi?id=1256260
* https://bugzilla.suse.com/show_bug.cgi?id=1256265
* https://bugzilla.suse.com/show_bug.cgi?id=1256269
* https://bugzilla.suse.com/show_bug.cgi?id=1256271
* https://bugzilla.suse.com/show_bug.cgi?id=1256274
* https://bugzilla.suse.com/show_bug.cgi?id=1256282
* https://bugzilla.suse.com/show_bug.cgi?id=1256285
* https://bugzilla.suse.com/show_bug.cgi?id=1256291
* https://bugzilla.suse.com/show_bug.cgi?id=1256294
* https://bugzilla.suse.com/show_bug.cgi?id=1256295
* https://bugzilla.suse.com/show_bug.cgi?id=1256300
* https://bugzilla.suse.com/show_bug.cgi?id=1256302
* https://bugzilla.suse.com/show_bug.cgi?id=1256306
* https://bugzilla.suse.com/show_bug.cgi?id=1256309
* https://bugzilla.suse.com/show_bug.cgi?id=1256317
* https://bugzilla.suse.com/show_bug.cgi?id=1256320
* https://bugzilla.suse.com/show_bug.cgi?id=1256323
* https://bugzilla.suse.com/show_bug.cgi?id=1256326
* https://bugzilla.suse.com/show_bug.cgi?id=1256328
* https://bugzilla.suse.com/show_bug.cgi?id=1256333
* https://bugzilla.suse.com/show_bug.cgi?id=1256334
* https://bugzilla.suse.com/show_bug.cgi?id=1256335
* https://bugzilla.suse.com/show_bug.cgi?id=1256337
* https://bugzilla.suse.com/show_bug.cgi?id=1256338
* https://bugzilla.suse.com/show_bug.cgi?id=1256344
* https://bugzilla.suse.com/show_bug.cgi?id=1256346
* https://bugzilla.suse.com/show_bug.cgi?id=1256349
* https://bugzilla.suse.com/show_bug.cgi?id=1256352
* https://bugzilla.suse.com/show_bug.cgi?id=1256353
* https://bugzilla.suse.com/show_bug.cgi?id=1256355
* https://bugzilla.suse.com/show_bug.cgi?id=1256358
* https://bugzilla.suse.com/show_bug.cgi?id=1256359
* https://bugzilla.suse.com/show_bug.cgi?id=1256363
* https://bugzilla.suse.com/show_bug.cgi?id=1256364
* https://bugzilla.suse.com/show_bug.cgi?id=1256368
* https://bugzilla.suse.com/show_bug.cgi?id=1256370
* https://bugzilla.suse.com/show_bug.cgi?id=1256375
* https://bugzilla.suse.com/show_bug.cgi?id=1256381
* https://bugzilla.suse.com/show_bug.cgi?id=1256382
* https://bugzilla.suse.com/show_bug.cgi?id=1256383
* https://bugzilla.suse.com/show_bug.cgi?id=1256384
* https://bugzilla.suse.com/show_bug.cgi?id=1256386
* https://bugzilla.suse.com/show_bug.cgi?id=1256388
* https://bugzilla.suse.com/show_bug.cgi?id=1256391
* https://bugzilla.suse.com/show_bug.cgi?id=1256394
* https://bugzilla.suse.com/show_bug.cgi?id=1256395
* https://bugzilla.suse.com/show_bug.cgi?id=1256396
* https://bugzilla.suse.com/show_bug.cgi?id=1256397
* https://bugzilla.suse.com/show_bug.cgi?id=1256398
* https://bugzilla.suse.com/show_bug.cgi?id=1256423
* https://bugzilla.suse.com/show_bug.cgi?id=1256426
* https://bugzilla.suse.com/show_bug.cgi?id=1256432
* https://jira.suse.com/browse/PED-1073
* https://jira.suse.com/browse/PED-14062
* https://jira.suse.com/browse/PED-1407
* https://jira.suse.com/browse/PED-1495
* https://jira.suse.com/browse/PED-1549
* https://jira.suse.com/browse/PED-1559
* https://jira.suse.com/browse/PED-2765
* https://jira.suse.com/browse/PED-370
* https://jira.suse.com/browse/PED-376
* https://jira.suse.com/browse/PED-7167
* https://jira.suse.com/browse/PED-8111
* https://jira.suse.com/browse/SLE-13847
* https://jira.suse.com/browse/SLE-18378
* https://jira.suse.com/browse/SLE-18384
* https://jira.suse.com/browse/SLE-19253
* https://jira.suse.com/browse/SLE-19255
SUSE-SU-2026:0314-1: moderate: Security update for python311
# Security update for python311
Announcement ID: SUSE-SU-2026:0314-1
Release Date: 2026-01-28T13:28:57Z
Rating: moderate
References:
* bsc#1254400
* bsc#1254401
* bsc#1254997
Cross-References:
* CVE-2025-12084
* CVE-2025-13836
* CVE-2025-13837
CVSS scores:
* CVE-2025-12084 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-12084 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-12084 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-12084 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-13836 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13836 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-13836 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13836 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-13837 ( SUSE ): 2.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13837 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-13837 ( NVD ): 2.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13837 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* Python 3 Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves three vulnerabilities can now be installed.
## Description:
This update for python311 fixes the following issues:
* CVE-2025-12084: prevent quadratic behavior in node ID cache clearing
(bsc#1254997).
* CVE-2025-13836: prevent reading an HTTP response from a server, if no read
amount is specified, with using Content-Length per default as the length
(bsc#1254400).
* CVE-2025-13837: protect against OOM when loading malicious content
(bsc#1254401).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-314=1 openSUSE-SLE-15.6-2026-314=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-314=1
* Python 3 Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-314=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* python311-tk-debuginfo-3.11.14-150600.3.41.2
* python311-debuginfo-3.11.14-150600.3.41.2
* python311-base-3.11.14-150600.3.41.2
* python311-base-debuginfo-3.11.14-150600.3.41.2
* python311-tk-3.11.14-150600.3.41.2
* python311-devel-3.11.14-150600.3.41.2
* libpython3_11-1_0-3.11.14-150600.3.41.2
* python311-curses-debuginfo-3.11.14-150600.3.41.2
* python311-doc-devhelp-3.11.14-150600.3.41.1
* python311-testsuite-3.11.14-150600.3.41.2
* python311-3.11.14-150600.3.41.2
* python311-testsuite-debuginfo-3.11.14-150600.3.41.2
* python311-idle-3.11.14-150600.3.41.2
* python311-debugsource-3.11.14-150600.3.41.2
* python311-dbm-3.11.14-150600.3.41.2
* python311-doc-3.11.14-150600.3.41.1
* python311-tools-3.11.14-150600.3.41.2
* python311-core-debugsource-3.11.14-150600.3.41.2
* python311-curses-3.11.14-150600.3.41.2
* python311-dbm-debuginfo-3.11.14-150600.3.41.2
* libpython3_11-1_0-debuginfo-3.11.14-150600.3.41.2
* openSUSE Leap 15.6 (x86_64)
* python311-base-32bit-debuginfo-3.11.14-150600.3.41.2
* python311-32bit-debuginfo-3.11.14-150600.3.41.2
* libpython3_11-1_0-32bit-3.11.14-150600.3.41.2
* python311-32bit-3.11.14-150600.3.41.2
* python311-base-32bit-3.11.14-150600.3.41.2
* libpython3_11-1_0-32bit-debuginfo-3.11.14-150600.3.41.2
* openSUSE Leap 15.6 (aarch64_ilp32)
* python311-base-64bit-debuginfo-3.11.14-150600.3.41.2
* python311-64bit-3.11.14-150600.3.41.2
* python311-64bit-debuginfo-3.11.14-150600.3.41.2
* libpython3_11-1_0-64bit-3.11.14-150600.3.41.2
* python311-base-64bit-3.11.14-150600.3.41.2
* libpython3_11-1_0-64bit-debuginfo-3.11.14-150600.3.41.2
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* python311-base-3.11.14-150600.3.41.2
* python311-base-debuginfo-3.11.14-150600.3.41.2
* python311-core-debugsource-3.11.14-150600.3.41.2
* libpython3_11-1_0-3.11.14-150600.3.41.2
* libpython3_11-1_0-debuginfo-3.11.14-150600.3.41.2
* Python 3 Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* python311-tk-debuginfo-3.11.14-150600.3.41.2
* python311-debuginfo-3.11.14-150600.3.41.2
* python311-tools-3.11.14-150600.3.41.2
* python311-core-debugsource-3.11.14-150600.3.41.2
* python311-curses-3.11.14-150600.3.41.2
* python311-debugsource-3.11.14-150600.3.41.2
* python311-tk-3.11.14-150600.3.41.2
* python311-dbm-debuginfo-3.11.14-150600.3.41.2
* python311-devel-3.11.14-150600.3.41.2
* python311-3.11.14-150600.3.41.2
* python311-idle-3.11.14-150600.3.41.2
* python311-curses-debuginfo-3.11.14-150600.3.41.2
* python311-dbm-3.11.14-150600.3.41.2
## References:
* https://www.suse.com/security/cve/CVE-2025-12084.html
* https://www.suse.com/security/cve/CVE-2025-13836.html
* https://www.suse.com/security/cve/CVE-2025-13837.html
* https://bugzilla.suse.com/show_bug.cgi?id=1254400
* https://bugzilla.suse.com/show_bug.cgi?id=1254401
* https://bugzilla.suse.com/show_bug.cgi?id=1254997
SUSE-SU-2026:0326-1: important: Security update for helm
# Security update for helm
Announcement ID: SUSE-SU-2026:0326-1
Release Date: 2026-01-28T14:55:41Z
Rating: important
References:
Affected Products:
* Containers Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7
An update that can now be installed.
## Description:
This update for helm rebuilds it against the current GO security release.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-326=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-326=1
* Containers Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2026-326=1
* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-326=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-326=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-326=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-326=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-326=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-326=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-326=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-326=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-326=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-326=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-326=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* openSUSE Leap 15.6 (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-fish-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* helm-bash-completion-3.19.1-150000.1.62.1
* Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* Containers Module 15-SP7 (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Package Hub 15 15-SP7 (noarch)
* helm-fish-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
SUSE-SU-2026:0325-1: important: Security update for kubernetes
# Security update for kubernetes
Announcement ID: SUSE-SU-2026:0325-1
Release Date: 2026-01-28T14:54:11Z
Rating: important
References:
Affected Products:
* Containers Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that can now be installed.
## Description:
This update for kubernetes rebuilds it against the current GO security release.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Containers Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2026-325=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-325=1 openSUSE-SLE-15.6-2026-325=1
## Package List:
* Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* kubernetes1.35-client-common-1.35.0-150600.13.23.1
* kubernetes1.35-client-1.35.0-150600.13.23.1
* Containers Module 15-SP7 (noarch)
* kubernetes1.35-client-bash-completion-1.35.0-150600.13.23.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.35-client-common-1.35.0-150600.13.23.1
* kubernetes1.35-client-1.35.0-150600.13.23.1
* openSUSE Leap 15.6 (noarch)
* kubernetes1.35-client-fish-completion-1.35.0-150600.13.23.1
* kubernetes1.35-client-bash-completion-1.35.0-150600.13.23.1