SUSE 5544 Published by

Several security updates have been released for SUSE Linux, addressing various vulnerabilities. The updates include fixes for Xen, kernel-firmware, python-python-multipart, and openssl-3, among others, with some rated as critical or important. Additionally, updates have been made to Python 3.11 and the Linux Kernel, while security patches were also applied to GIMP and other applications such as Helm and Kubernetes. The severity of the updates ranges from moderate to critical, indicating potential risks if not addressed promptly.

SUSE-SU-2026:0304-1: moderate: Security update for xen
SUSE-SU-2026:0303-1: moderate: Security update for xen
SUSE-SU-2026:0305-1: important: Recommended update for kernel-firmware
SUSE-SU-2026:0306-1: moderate: Security update for xen
SUSE-SU-2026:0307-1: important: Security update for python-python-multipart
openSUSE-SU-2026:10100-1: moderate: zot-registry-2.1.14-1.1 on GA media
openSUSE-SU-2026:10099-1: moderate: zli-2.1.14-1.1 on GA media
openSUSE-SU-2026:10101-1: moderate: coredns-1.14.1-1.1 on GA media
SUSE-SU-2026:0308-1: important: Security update for go1.24-openssl
SUSE-SU-2026:0310-1: critical: Security update for openssl-3
SUSE-SU-2026:0311-1: critical: Security update for openssl-3
SUSE-SU-2026:0312-1: critical: Security update for openssl-3
SUSE-SU-2026:0313-1: important: Security update for gimp
SUSE-SU-2026:0317-1: important: Security update for the Linux Kernel
SUSE-SU-2026:0314-1: moderate: Security update for python311
SUSE-SU-2026:0326-1: important: Security update for helm
SUSE-SU-2026:0325-1: important: Security update for kubernetes



SUSE-SU-2026:0304-1: moderate: Security update for xen


# Security update for xen

Announcement ID: SUSE-SU-2026:0304-1
Release Date: 2026-01-27T16:14:51Z
Rating: moderate
References:

* bsc#1256745
* bsc#1256747

Cross-References:

* CVE-2025-58150
* CVE-2026-23553

CVSS scores:

* CVE-2025-58150 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58150 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-23553 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise Micro 5.5

An update that solves two vulnerabilities can now be installed.

## Description:

This update for xen fixes the following issues:

* CVE-2025-58150: Fixed buffer overrun with shadow paging and tracing
(XSA-477) (bsc#1256745)
* CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation (XSA-479)
(bsc#1256747)

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-304=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-304=1

## Package List:

* openSUSE Leap 15.5 (aarch64 x86_64 i586)
* xen-tools-domU-debuginfo-4.17.6_04-150500.3.59.1
* xen-libs-debuginfo-4.17.6_04-150500.3.59.1
* xen-debugsource-4.17.6_04-150500.3.59.1
* xen-devel-4.17.6_04-150500.3.59.1
* xen-tools-domU-4.17.6_04-150500.3.59.1
* xen-libs-4.17.6_04-150500.3.59.1
* openSUSE Leap 15.5 (x86_64)
* xen-libs-32bit-debuginfo-4.17.6_04-150500.3.59.1
* xen-libs-32bit-4.17.6_04-150500.3.59.1
* openSUSE Leap 15.5 (aarch64 x86_64)
* xen-tools-4.17.6_04-150500.3.59.1
* xen-4.17.6_04-150500.3.59.1
* xen-tools-debuginfo-4.17.6_04-150500.3.59.1
* xen-doc-html-4.17.6_04-150500.3.59.1
* openSUSE Leap 15.5 (noarch)
* xen-tools-xendomains-wait-disk-4.17.6_04-150500.3.59.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* xen-libs-64bit-debuginfo-4.17.6_04-150500.3.59.1
* xen-libs-64bit-4.17.6_04-150500.3.59.1
* SUSE Linux Enterprise Micro 5.5 (x86_64)
* xen-libs-4.17.6_04-150500.3.59.1
* xen-libs-debuginfo-4.17.6_04-150500.3.59.1
* xen-debugsource-4.17.6_04-150500.3.59.1

## References:

* https://www.suse.com/security/cve/CVE-2025-58150.html
* https://www.suse.com/security/cve/CVE-2026-23553.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256745
* https://bugzilla.suse.com/show_bug.cgi?id=1256747



SUSE-SU-2026:0303-1: moderate: Security update for xen


# Security update for xen

Announcement ID: SUSE-SU-2026:0303-1
Release Date: 2026-01-27T16:14:45Z
Rating: moderate
References:

* bsc#1248807
* bsc#1252692
* bsc#1254180
* bsc#1256745
* bsc#1256747

Cross-References:

* CVE-2025-27466
* CVE-2025-58142
* CVE-2025-58143
* CVE-2025-58149
* CVE-2025-58150
* CVE-2026-23553

CVSS scores:

* CVE-2025-27466 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2025-27466 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-58142 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2025-58142 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-58143 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-58143 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-58149 ( SUSE ): 4.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2025-58149 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2025-58149 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-58150 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58150 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-23553 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Leap 15.3
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2

An update that solves six vulnerabilities can now be installed.

## Description:

This update for xen fixes the following issues:

Security fixes:

* CVE-2025-58150: Fixed buffer overrun with shadow paging and tracing
(XSA-477) (bsc#1256745)
* CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation (XSA-479)
(bsc#1256747)
* CVE-2025-58149: Fixed incorrect removal od permissions on PCI device unplug
allow PV guests to access memory of devices no longer assigned to it
(XSA-476) (bsc#1252692)
* CVE-2025-27466, CVE-2025-58142, CVE-2025-58143: Fixed multiple
vulnerabilities in the Viridian interface (XSA-472) (bsc#1248807)

Other fixes:

* Fixed virtxend service restart. Caused by a failure to start xenstored
(bsc#1254180)

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.3
zypper in -t patch SUSE-2026-303=1

* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-303=1

* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-303=1

## Package List:

* openSUSE Leap 15.3 (aarch64 x86_64 i586)
* xen-debugsource-4.14.6_28-150300.3.94.1
* xen-devel-4.14.6_28-150300.3.94.1
* xen-tools-domU-debuginfo-4.14.6_28-150300.3.94.1
* xen-libs-4.14.6_28-150300.3.94.1
* xen-libs-debuginfo-4.14.6_28-150300.3.94.1
* xen-tools-domU-4.14.6_28-150300.3.94.1
* openSUSE Leap 15.3 (x86_64)
* xen-libs-32bit-4.14.6_28-150300.3.94.1
* xen-libs-32bit-debuginfo-4.14.6_28-150300.3.94.1
* openSUSE Leap 15.3 (aarch64 x86_64)
* xen-tools-debuginfo-4.14.6_28-150300.3.94.1
* xen-doc-html-4.14.6_28-150300.3.94.1
* xen-4.14.6_28-150300.3.94.1
* xen-tools-4.14.6_28-150300.3.94.1
* openSUSE Leap 15.3 (noarch)
* xen-tools-xendomains-wait-disk-4.14.6_28-150300.3.94.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* xen-libs-64bit-debuginfo-4.14.6_28-150300.3.94.1
* xen-libs-64bit-4.14.6_28-150300.3.94.1
* SUSE Linux Enterprise Micro 5.2 (x86_64)
* xen-debugsource-4.14.6_28-150300.3.94.1
* xen-libs-4.14.6_28-150300.3.94.1
* xen-libs-debuginfo-4.14.6_28-150300.3.94.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
* xen-debugsource-4.14.6_28-150300.3.94.1
* xen-libs-4.14.6_28-150300.3.94.1
* xen-libs-debuginfo-4.14.6_28-150300.3.94.1

## References:

* https://www.suse.com/security/cve/CVE-2025-27466.html
* https://www.suse.com/security/cve/CVE-2025-58142.html
* https://www.suse.com/security/cve/CVE-2025-58143.html
* https://www.suse.com/security/cve/CVE-2025-58149.html
* https://www.suse.com/security/cve/CVE-2025-58150.html
* https://www.suse.com/security/cve/CVE-2026-23553.html
* https://bugzilla.suse.com/show_bug.cgi?id=1248807
* https://bugzilla.suse.com/show_bug.cgi?id=1252692
* https://bugzilla.suse.com/show_bug.cgi?id=1254180
* https://bugzilla.suse.com/show_bug.cgi?id=1256745
* https://bugzilla.suse.com/show_bug.cgi?id=1256747



SUSE-SU-2026:0305-1: important: Recommended update for kernel-firmware


# Recommended update for kernel-firmware

Announcement ID: SUSE-SU-2026:0305-1
Release Date: 2026-01-27T16:15:14Z
Rating: important
References:

* bsc#1256483

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that has one security fix can now be installed.

## Description:

This update for kernel-firmware fixes the following issues:

* Update AMD ucode to 20251203 (bsc#1256483)

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-305=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-305=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-305=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-305=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-305=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-305=1

## Package List:

* openSUSE Leap 15.5 (noarch)
* kernel-firmware-ath11k-20230724-150500.3.15.1
* kernel-firmware-mwifiex-20230724-150500.3.15.1
* kernel-firmware-serial-20230724-150500.3.15.1
* kernel-firmware-mediatek-20230724-150500.3.15.1
* kernel-firmware-chelsio-20230724-150500.3.15.1
* kernel-firmware-ueagle-20230724-150500.3.15.1
* kernel-firmware-qlogic-20230724-150500.3.15.1
* kernel-firmware-all-20230724-150500.3.15.1
* kernel-firmware-mellanox-20230724-150500.3.15.1
* kernel-firmware-platform-20230724-150500.3.15.1
* kernel-firmware-radeon-20230724-150500.3.15.1
* kernel-firmware-ath10k-20230724-150500.3.15.1
* kernel-firmware-atheros-20230724-150500.3.15.1
* kernel-firmware-amdgpu-20230724-150500.3.15.1
* kernel-firmware-realtek-20230724-150500.3.15.1
* ucode-amd-20230724-150500.3.15.1
* kernel-firmware-qcom-20230724-150500.3.15.1
* kernel-firmware-nfp-20230724-150500.3.15.1
* kernel-firmware-prestera-20230724-150500.3.15.1
* kernel-firmware-ti-20230724-150500.3.15.1
* kernel-firmware-20230724-150500.3.15.1
* kernel-firmware-i915-20230724-150500.3.15.1
* kernel-firmware-liquidio-20230724-150500.3.15.1
* kernel-firmware-media-20230724-150500.3.15.1
* kernel-firmware-bluetooth-20230724-150500.3.15.1
* kernel-firmware-dpaa2-20230724-150500.3.15.1
* kernel-firmware-bnx2-20230724-150500.3.15.1
* kernel-firmware-nvidia-20230724-150500.3.15.1
* kernel-firmware-marvell-20230724-150500.3.15.1
* kernel-firmware-iwlwifi-20230724-150500.3.15.1
* kernel-firmware-brcm-20230724-150500.3.15.1
* kernel-firmware-intel-20230724-150500.3.15.1
* kernel-firmware-network-20230724-150500.3.15.1
* kernel-firmware-sound-20230724-150500.3.15.1
* kernel-firmware-usb-network-20230724-150500.3.15.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-firmware-ath11k-20230724-150500.3.15.1
* kernel-firmware-mwifiex-20230724-150500.3.15.1
* kernel-firmware-serial-20230724-150500.3.15.1
* kernel-firmware-mediatek-20230724-150500.3.15.1
* kernel-firmware-chelsio-20230724-150500.3.15.1
* kernel-firmware-ueagle-20230724-150500.3.15.1
* kernel-firmware-qlogic-20230724-150500.3.15.1
* kernel-firmware-all-20230724-150500.3.15.1
* kernel-firmware-mellanox-20230724-150500.3.15.1
* kernel-firmware-platform-20230724-150500.3.15.1
* kernel-firmware-radeon-20230724-150500.3.15.1
* kernel-firmware-ath10k-20230724-150500.3.15.1
* kernel-firmware-atheros-20230724-150500.3.15.1
* kernel-firmware-amdgpu-20230724-150500.3.15.1
* kernel-firmware-realtek-20230724-150500.3.15.1
* ucode-amd-20230724-150500.3.15.1
* kernel-firmware-qcom-20230724-150500.3.15.1
* kernel-firmware-nfp-20230724-150500.3.15.1
* kernel-firmware-prestera-20230724-150500.3.15.1
* kernel-firmware-ti-20230724-150500.3.15.1
* kernel-firmware-i915-20230724-150500.3.15.1
* kernel-firmware-liquidio-20230724-150500.3.15.1
* kernel-firmware-media-20230724-150500.3.15.1
* kernel-firmware-bluetooth-20230724-150500.3.15.1
* kernel-firmware-dpaa2-20230724-150500.3.15.1
* kernel-firmware-bnx2-20230724-150500.3.15.1
* kernel-firmware-nvidia-20230724-150500.3.15.1
* kernel-firmware-marvell-20230724-150500.3.15.1
* kernel-firmware-iwlwifi-20230724-150500.3.15.1
* kernel-firmware-brcm-20230724-150500.3.15.1
* kernel-firmware-intel-20230724-150500.3.15.1
* kernel-firmware-network-20230724-150500.3.15.1
* kernel-firmware-sound-20230724-150500.3.15.1
* kernel-firmware-usb-network-20230724-150500.3.15.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* kernel-firmware-ath11k-20230724-150500.3.15.1
* kernel-firmware-mwifiex-20230724-150500.3.15.1
* kernel-firmware-serial-20230724-150500.3.15.1
* kernel-firmware-mediatek-20230724-150500.3.15.1
* kernel-firmware-chelsio-20230724-150500.3.15.1
* kernel-firmware-ueagle-20230724-150500.3.15.1
* kernel-firmware-qlogic-20230724-150500.3.15.1
* kernel-firmware-all-20230724-150500.3.15.1
* kernel-firmware-mellanox-20230724-150500.3.15.1
* kernel-firmware-platform-20230724-150500.3.15.1
* kernel-firmware-radeon-20230724-150500.3.15.1
* kernel-firmware-ath10k-20230724-150500.3.15.1
* kernel-firmware-atheros-20230724-150500.3.15.1
* kernel-firmware-amdgpu-20230724-150500.3.15.1
* kernel-firmware-realtek-20230724-150500.3.15.1
* ucode-amd-20230724-150500.3.15.1
* kernel-firmware-qcom-20230724-150500.3.15.1
* kernel-firmware-nfp-20230724-150500.3.15.1
* kernel-firmware-prestera-20230724-150500.3.15.1
* kernel-firmware-ti-20230724-150500.3.15.1
* kernel-firmware-i915-20230724-150500.3.15.1
* kernel-firmware-liquidio-20230724-150500.3.15.1
* kernel-firmware-media-20230724-150500.3.15.1
* kernel-firmware-bluetooth-20230724-150500.3.15.1
* kernel-firmware-dpaa2-20230724-150500.3.15.1
* kernel-firmware-bnx2-20230724-150500.3.15.1
* kernel-firmware-nvidia-20230724-150500.3.15.1
* kernel-firmware-marvell-20230724-150500.3.15.1
* kernel-firmware-iwlwifi-20230724-150500.3.15.1
* kernel-firmware-brcm-20230724-150500.3.15.1
* kernel-firmware-intel-20230724-150500.3.15.1
* kernel-firmware-network-20230724-150500.3.15.1
* kernel-firmware-sound-20230724-150500.3.15.1
* kernel-firmware-usb-network-20230724-150500.3.15.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* kernel-firmware-ath11k-20230724-150500.3.15.1
* kernel-firmware-mwifiex-20230724-150500.3.15.1
* kernel-firmware-serial-20230724-150500.3.15.1
* kernel-firmware-mediatek-20230724-150500.3.15.1
* kernel-firmware-chelsio-20230724-150500.3.15.1
* kernel-firmware-ueagle-20230724-150500.3.15.1
* kernel-firmware-qlogic-20230724-150500.3.15.1
* kernel-firmware-all-20230724-150500.3.15.1
* kernel-firmware-mellanox-20230724-150500.3.15.1
* kernel-firmware-platform-20230724-150500.3.15.1
* kernel-firmware-radeon-20230724-150500.3.15.1
* kernel-firmware-ath10k-20230724-150500.3.15.1
* kernel-firmware-atheros-20230724-150500.3.15.1
* kernel-firmware-amdgpu-20230724-150500.3.15.1
* kernel-firmware-realtek-20230724-150500.3.15.1
* ucode-amd-20230724-150500.3.15.1
* kernel-firmware-qcom-20230724-150500.3.15.1
* kernel-firmware-nfp-20230724-150500.3.15.1
* kernel-firmware-prestera-20230724-150500.3.15.1
* kernel-firmware-ti-20230724-150500.3.15.1
* kernel-firmware-i915-20230724-150500.3.15.1
* kernel-firmware-liquidio-20230724-150500.3.15.1
* kernel-firmware-media-20230724-150500.3.15.1
* kernel-firmware-bluetooth-20230724-150500.3.15.1
* kernel-firmware-dpaa2-20230724-150500.3.15.1
* kernel-firmware-bnx2-20230724-150500.3.15.1
* kernel-firmware-nvidia-20230724-150500.3.15.1
* kernel-firmware-marvell-20230724-150500.3.15.1
* kernel-firmware-iwlwifi-20230724-150500.3.15.1
* kernel-firmware-brcm-20230724-150500.3.15.1
* kernel-firmware-intel-20230724-150500.3.15.1
* kernel-firmware-network-20230724-150500.3.15.1
* kernel-firmware-sound-20230724-150500.3.15.1
* kernel-firmware-usb-network-20230724-150500.3.15.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* kernel-firmware-ath11k-20230724-150500.3.15.1
* kernel-firmware-mwifiex-20230724-150500.3.15.1
* kernel-firmware-serial-20230724-150500.3.15.1
* kernel-firmware-mediatek-20230724-150500.3.15.1
* kernel-firmware-chelsio-20230724-150500.3.15.1
* kernel-firmware-ueagle-20230724-150500.3.15.1
* kernel-firmware-qlogic-20230724-150500.3.15.1
* kernel-firmware-all-20230724-150500.3.15.1
* kernel-firmware-mellanox-20230724-150500.3.15.1
* kernel-firmware-platform-20230724-150500.3.15.1
* kernel-firmware-radeon-20230724-150500.3.15.1
* kernel-firmware-ath10k-20230724-150500.3.15.1
* kernel-firmware-atheros-20230724-150500.3.15.1
* kernel-firmware-amdgpu-20230724-150500.3.15.1
* kernel-firmware-realtek-20230724-150500.3.15.1
* ucode-amd-20230724-150500.3.15.1
* kernel-firmware-qcom-20230724-150500.3.15.1
* kernel-firmware-nfp-20230724-150500.3.15.1
* kernel-firmware-prestera-20230724-150500.3.15.1
* kernel-firmware-ti-20230724-150500.3.15.1
* kernel-firmware-i915-20230724-150500.3.15.1
* kernel-firmware-liquidio-20230724-150500.3.15.1
* kernel-firmware-media-20230724-150500.3.15.1
* kernel-firmware-bluetooth-20230724-150500.3.15.1
* kernel-firmware-dpaa2-20230724-150500.3.15.1
* kernel-firmware-bnx2-20230724-150500.3.15.1
* kernel-firmware-nvidia-20230724-150500.3.15.1
* kernel-firmware-marvell-20230724-150500.3.15.1
* kernel-firmware-iwlwifi-20230724-150500.3.15.1
* kernel-firmware-brcm-20230724-150500.3.15.1
* kernel-firmware-intel-20230724-150500.3.15.1
* kernel-firmware-network-20230724-150500.3.15.1
* kernel-firmware-sound-20230724-150500.3.15.1
* kernel-firmware-usb-network-20230724-150500.3.15.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* kernel-firmware-ath11k-20230724-150500.3.15.1
* kernel-firmware-mwifiex-20230724-150500.3.15.1
* kernel-firmware-serial-20230724-150500.3.15.1
* kernel-firmware-mediatek-20230724-150500.3.15.1
* kernel-firmware-chelsio-20230724-150500.3.15.1
* kernel-firmware-ueagle-20230724-150500.3.15.1
* kernel-firmware-qlogic-20230724-150500.3.15.1
* kernel-firmware-all-20230724-150500.3.15.1
* kernel-firmware-mellanox-20230724-150500.3.15.1
* kernel-firmware-platform-20230724-150500.3.15.1
* kernel-firmware-radeon-20230724-150500.3.15.1
* kernel-firmware-ath10k-20230724-150500.3.15.1
* kernel-firmware-atheros-20230724-150500.3.15.1
* kernel-firmware-amdgpu-20230724-150500.3.15.1
* kernel-firmware-realtek-20230724-150500.3.15.1
* ucode-amd-20230724-150500.3.15.1
* kernel-firmware-qcom-20230724-150500.3.15.1
* kernel-firmware-nfp-20230724-150500.3.15.1
* kernel-firmware-prestera-20230724-150500.3.15.1
* kernel-firmware-ti-20230724-150500.3.15.1
* kernel-firmware-i915-20230724-150500.3.15.1
* kernel-firmware-liquidio-20230724-150500.3.15.1
* kernel-firmware-media-20230724-150500.3.15.1
* kernel-firmware-bluetooth-20230724-150500.3.15.1
* kernel-firmware-dpaa2-20230724-150500.3.15.1
* kernel-firmware-bnx2-20230724-150500.3.15.1
* kernel-firmware-nvidia-20230724-150500.3.15.1
* kernel-firmware-marvell-20230724-150500.3.15.1
* kernel-firmware-iwlwifi-20230724-150500.3.15.1
* kernel-firmware-brcm-20230724-150500.3.15.1
* kernel-firmware-intel-20230724-150500.3.15.1
* kernel-firmware-network-20230724-150500.3.15.1
* kernel-firmware-sound-20230724-150500.3.15.1
* kernel-firmware-usb-network-20230724-150500.3.15.1

## References:

* https://bugzilla.suse.com/show_bug.cgi?id=1256483



SUSE-SU-2026:0306-1: moderate: Security update for xen


# Security update for xen

Announcement ID: SUSE-SU-2026:0306-1
Release Date: 2026-01-27T16:15:20Z
Rating: moderate
References:

* bsc#1256745
* bsc#1256747

Cross-References:

* CVE-2025-58150
* CVE-2026-23553

CVSS scores:

* CVE-2025-58150 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58150 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-23553 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23553 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Leap 15.6

An update that solves two vulnerabilities can now be installed.

## Description:

This update for xen fixes the following issues:

* CVE-2025-58150: Fixed buffer overrun with shadow paging and tracing
(XSA-477) (bsc#1256745)
* CVE-2026-23553: Fixed incomplete IBPB for vCPU isolation (XSA-479)
(bsc#1256747)

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-306=1 openSUSE-SLE-15.6-2026-306=1

## Package List:

* openSUSE Leap 15.6 (aarch64 x86_64 i586)
* xen-tools-domU-debuginfo-4.18.5_10-150600.3.37.1
* xen-tools-domU-4.18.5_10-150600.3.37.1
* xen-debugsource-4.18.5_10-150600.3.37.1
* xen-libs-debuginfo-4.18.5_10-150600.3.37.1
* xen-libs-4.18.5_10-150600.3.37.1
* xen-devel-4.18.5_10-150600.3.37.1
* openSUSE Leap 15.6 (x86_64)
* xen-libs-32bit-4.18.5_10-150600.3.37.1
* xen-libs-32bit-debuginfo-4.18.5_10-150600.3.37.1
* openSUSE Leap 15.6 (aarch64 x86_64)
* xen-tools-debuginfo-4.18.5_10-150600.3.37.1
* xen-tools-4.18.5_10-150600.3.37.1
* xen-4.18.5_10-150600.3.37.1
* xen-doc-html-4.18.5_10-150600.3.37.1
* openSUSE Leap 15.6 (noarch)
* xen-tools-xendomains-wait-disk-4.18.5_10-150600.3.37.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* xen-libs-64bit-debuginfo-4.18.5_10-150600.3.37.1
* xen-libs-64bit-4.18.5_10-150600.3.37.1

## References:

* https://www.suse.com/security/cve/CVE-2025-58150.html
* https://www.suse.com/security/cve/CVE-2026-23553.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256745
* https://bugzilla.suse.com/show_bug.cgi?id=1256747



SUSE-SU-2026:0307-1: important: Security update for python-python-multipart


# Security update for python-python-multipart

Announcement ID: SUSE-SU-2026:0307-1
Release Date: 2026-01-27T16:37:01Z
Rating: important
References:

* bsc#1257301

Cross-References:

* CVE-2026-24486

CVSS scores:

* CVE-2026-24486 ( SUSE ): 8.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N
* CVE-2026-24486 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
* CVE-2026-24486 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L

Affected Products:

* openSUSE Leap 15.6

An update that solves one vulnerability can now be installed.

## Description:

This update for python-python-multipart fixes the following issues:

* CVE-2026-24486: Fixed non-default configuration options can lead to path
traversal (bsc#1257301).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-307=1 openSUSE-SLE-15.6-2026-307=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* python311-python-multipart-0.0.9-150600.3.6.1

## References:

* https://www.suse.com/security/cve/CVE-2026-24486.html
* https://bugzilla.suse.com/show_bug.cgi?id=1257301



openSUSE-SU-2026:10100-1: moderate: zot-registry-2.1.14-1.1 on GA media


# zot-registry-2.1.14-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10100-1
Rating: moderate

Cross-References:

* CVE-2025-30204

CVSS scores:

* CVE-2025-30204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-30204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the zot-registry-2.1.14-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* zot-registry 2.1.14-1.1
* zot-registry-bash-completion 2.1.14-1.1
* zot-registry-fish-completion 2.1.14-1.1
* zot-registry-zsh-completion 2.1.14-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-30204.html



openSUSE-SU-2026:10099-1: moderate: zli-2.1.14-1.1 on GA media


# zli-2.1.14-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10099-1
Rating: moderate

Cross-References:

* CVE-2025-30204

CVSS scores:

* CVE-2025-30204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-30204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the zli-2.1.14-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* zli 2.1.14-1.1
* zli-bash-completion 2.1.14-1.1
* zli-fish-completion 2.1.14-1.1
* zli-zsh-completion 2.1.14-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-30204.html



openSUSE-SU-2026:10101-1: moderate: coredns-1.14.1-1.1 on GA media


# coredns-1.14.1-1.1 on GA media

Announcement ID: openSUSE-SU-2026:10101-1
Rating: moderate

Cross-References:

* CVE-2025-61728
* CVE-2025-68119

CVSS scores:

* CVE-2025-61728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61728 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68119 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-68119 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the coredns-1.14.1-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* coredns 1.14.1-1.1
* coredns-extras 1.14.1-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-61728.html
* https://www.suse.com/security/cve/CVE-2025-68119.html



SUSE-SU-2026:0308-1: important: Security update for go1.24-openssl


# Security update for go1.24-openssl

Announcement ID: SUSE-SU-2026:0308-1
Release Date: 2026-01-28T08:38:49Z
Rating: important
References:

* bsc#1236217
* bsc#1245878
* bsc#1247816
* bsc#1248082
* bsc#1249985
* bsc#1251253
* bsc#1251254
* bsc#1251255
* bsc#1251256
* bsc#1251257
* bsc#1251258
* bsc#1251259
* bsc#1251260
* bsc#1251261
* bsc#1251262
* bsc#1254430
* bsc#1254431
* bsc#1256816
* bsc#1256817
* bsc#1256818
* bsc#1256819
* bsc#1256820
* bsc#1256821
* jsc#SLE-18320

Cross-References:

* CVE-2025-47912
* CVE-2025-58183
* CVE-2025-58185
* CVE-2025-58186
* CVE-2025-58187
* CVE-2025-58188
* CVE-2025-58189
* CVE-2025-61723
* CVE-2025-61724
* CVE-2025-61725
* CVE-2025-61726
* CVE-2025-61727
* CVE-2025-61728
* CVE-2025-61729
* CVE-2025-61730
* CVE-2025-61731
* CVE-2025-68119
* CVE-2025-68121

CVSS scores:

* CVE-2025-47912 ( SUSE ): 8.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-47912 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-47912 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-58183 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58183 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-58183 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-58185 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58185 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58185 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58186 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58186 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58186 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58187 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58187 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58187 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-58188 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-58188 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-58188 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-58189 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N
* CVE-2025-58189 ( SUSE ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
* CVE-2025-58189 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-61723 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-61723 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-61723 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61724 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-61724 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-61724 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-61725 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61725 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61725 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61726 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61726 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61727 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61727 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61727 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2025-61728 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-61729 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61729 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61729 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-61730 ( SUSE ): 2.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-61730 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-61731 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61731 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-68119 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68119 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-68121 ( SUSE ): 7.6
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-68121 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Affected Products:

* Development Tools Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves 18 vulnerabilities, contains one feature and has five
security fixes can now be installed.

## Description:

This update for go1.24-openssl fixes the following issues:

Update to version 1.24.12 (released 2026-01-15) (jsc#SLE-18320, bsc#1236217):

Security fixes:

* CVE-2025-47912: net/url: insufficient validation of bracketed IPv6 hostnames
(bsc#1251257).
* CVE-2025-58183: archive/tar: unbounded allocation when parsing GNU sparse
map (bsc#1251261).
* CVE-2025-58185: encoding/asn1: pre-allocating memory when parsing DER
payload can cause memory exhaustion (bsc#1251258).
* CVE-2025-58186: net/http: lack of limit when parsing cookies can cause
memory exhaustion (bsc#1251259).
* CVE-2025-58187: crypto/x509: quadratic complexity when checking name
constraints (bsc#1251254).
* CVE-2025-58188: crypto/x509: panic when validating certificates with DSA
public keys (bsc#1251260).
* CVE-2025-58189: crypto/tls: ALPN negotiation error contains attacker
controlled information (bsc#1251255).
* CVE-2025-61723: encoding/pem: quadratic complexity when parsing some invalid
inputs (bsc#1251256).
* CVE-2025-61724: net/textproto: excessive CPU consumption in
Reader.ReadResponse (bsc#1251262).
* CVE-2025-61725: net/mail: excessive CPU consumption in ParseAddress
(bsc#1251253).
* CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm
(bsc#1256817).
* CVE-2025-61727: crypto/x509: excluded subdomain constraint doesn't preclude
wildcard SAN (bsc#1254430).
* CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP
archives (bsc#1256816).
* CVE-2025-61729: crypto/x509: excessive resource consumption in printing
error string for host certificate validation (bsc#1254431).
* CVE-2025-61730: crypto/tls: handshake messages may be processed at the
incorrect encryption level (bsc#1256821).
* CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary
code execution (bsc#1256819).
* CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain
(bsc#1256820).
* CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated
session ticket keys, session resumption does not account for the expiration
of full certificate chain (bsc#1256818).

Other fixes:

* go#74818 net: WriteMsgUDPAddrPort should accept IPv4-mapped IPv6 destination
addresses on IPv4 UDP sockets
* go#74821 cmd/go: "get toolchain@latest" should ignore release candidates
* go#75007 os/exec: TestLookPath fails on plan9 after CL 685755
* go#75138 os: Root.OpenRoot sets incorrect name, losing prefix of original
root
* go#75220 debug/pe: pe.Open fails on object files produced by llvm-mingw 21
* go#75351 cmd/link: panic on riscv64 with CGO enabled due to empty container
symbol
* go#75356 net: new test TestIPv4WriteMsgUDPAddrPortTargetAddrIPVersion fails
on plan9
* go#75359 os: new test TestOpenFileCreateExclDanglingSymlink fails on Plan 9
* go#75523 crypto/internal/fips140/rsa: requires a panic if self-tests fail
* go#75538 net/http: internal error: connCount underflow
* go#75594 cmd/compile: internal compiler error with GOEXPERIMENT=cgocheck2 on
github.com/leodido/go-urn
* go#75609 sync/atomic: comment for Uintptr.Or incorrectly describes return
value
* go#75831 net/url: ipv4 mapped ipv6 addresses should be valid in square
brackets
* go#75860 crypto/x509: TLS validation fails for FQDNs with trailing dot
* go#75951 encoding/pem: regression when decoding blocks with leading garbage
* go#76028 pem/encoding: malformed line endings can cause panics
* go#76378 internal/cpu: incorrect CPU features bit parsing on loong64 cause
illegal instruction core dumps on LA364 cores
* go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH
enabled
* go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes
* go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4
windows 386
* go#76796 runtime: race detector crash on ppc64le
* go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while
compiling <function>: runtime error: index out of range

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* Development Tools Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-308=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-308=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-308=1

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-308=1 openSUSE-SLE-15.6-2026-308=1

## Package List:

* Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* go1.24-openssl-doc-1.24.12-150600.13.15.1
* go1.24-openssl-debuginfo-1.24.12-150600.13.15.1
* go1.24-openssl-1.24.12-150600.13.15.1
* go1.24-openssl-race-1.24.12-150600.13.15.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* go1.24-openssl-doc-1.24.12-150600.13.15.1
* go1.24-openssl-race-1.24.12-150600.13.15.1
* go1.24-openssl-1.24.12-150600.13.15.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* go1.24-openssl-doc-1.24.12-150600.13.15.1
* go1.24-openssl-race-1.24.12-150600.13.15.1
* go1.24-openssl-1.24.12-150600.13.15.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* go1.24-openssl-doc-1.24.12-150600.13.15.1
* go1.24-openssl-debuginfo-1.24.12-150600.13.15.1
* go1.24-openssl-1.24.12-150600.13.15.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* go1.24-openssl-race-1.24.12-150600.13.15.1

## References:

* https://www.suse.com/security/cve/CVE-2025-47912.html
* https://www.suse.com/security/cve/CVE-2025-58183.html
* https://www.suse.com/security/cve/CVE-2025-58185.html
* https://www.suse.com/security/cve/CVE-2025-58186.html
* https://www.suse.com/security/cve/CVE-2025-58187.html
* https://www.suse.com/security/cve/CVE-2025-58188.html
* https://www.suse.com/security/cve/CVE-2025-58189.html
* https://www.suse.com/security/cve/CVE-2025-61723.html
* https://www.suse.com/security/cve/CVE-2025-61724.html
* https://www.suse.com/security/cve/CVE-2025-61725.html
* https://www.suse.com/security/cve/CVE-2025-61726.html
* https://www.suse.com/security/cve/CVE-2025-61727.html
* https://www.suse.com/security/cve/CVE-2025-61728.html
* https://www.suse.com/security/cve/CVE-2025-61729.html
* https://www.suse.com/security/cve/CVE-2025-61730.html
* https://www.suse.com/security/cve/CVE-2025-61731.html
* https://www.suse.com/security/cve/CVE-2025-68119.html
* https://www.suse.com/security/cve/CVE-2025-68121.html
* https://bugzilla.suse.com/show_bug.cgi?id=1236217
* https://bugzilla.suse.com/show_bug.cgi?id=1245878
* https://bugzilla.suse.com/show_bug.cgi?id=1247816
* https://bugzilla.suse.com/show_bug.cgi?id=1248082
* https://bugzilla.suse.com/show_bug.cgi?id=1249985
* https://bugzilla.suse.com/show_bug.cgi?id=1251253
* https://bugzilla.suse.com/show_bug.cgi?id=1251254
* https://bugzilla.suse.com/show_bug.cgi?id=1251255
* https://bugzilla.suse.com/show_bug.cgi?id=1251256
* https://bugzilla.suse.com/show_bug.cgi?id=1251257
* https://bugzilla.suse.com/show_bug.cgi?id=1251258
* https://bugzilla.suse.com/show_bug.cgi?id=1251259
* https://bugzilla.suse.com/show_bug.cgi?id=1251260
* https://bugzilla.suse.com/show_bug.cgi?id=1251261
* https://bugzilla.suse.com/show_bug.cgi?id=1251262
* https://bugzilla.suse.com/show_bug.cgi?id=1254430
* https://bugzilla.suse.com/show_bug.cgi?id=1254431
* https://bugzilla.suse.com/show_bug.cgi?id=1256816
* https://bugzilla.suse.com/show_bug.cgi?id=1256817
* https://bugzilla.suse.com/show_bug.cgi?id=1256818
* https://bugzilla.suse.com/show_bug.cgi?id=1256819
* https://bugzilla.suse.com/show_bug.cgi?id=1256820
* https://bugzilla.suse.com/show_bug.cgi?id=1256821
* https://jira.suse.com/browse/SLE-18320



SUSE-SU-2026:0310-1: critical: Security update for openssl-3


# Security update for openssl-3

Announcement ID: SUSE-SU-2026:0310-1
Release Date: 2026-01-28T09:37:31Z
Rating: critical
References:

* bsc#1256830
* bsc#1256834
* bsc#1256835
* bsc#1256836
* bsc#1256837
* bsc#1256838
* bsc#1256839
* bsc#1256840

Cross-References:

* CVE-2025-15467
* CVE-2025-68160
* CVE-2025-69418
* CVE-2025-69419
* CVE-2025-69420
* CVE-2025-69421
* CVE-2026-22795
* CVE-2026-22796

CVSS scores:

* CVE-2025-15467 ( SUSE ): 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-15467 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68160 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68160 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-69418 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-69418 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-69419 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-69419 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-69420 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-69420 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-69421 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-69421 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22795 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22795 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22796 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-22796 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4

An update that solves eight vulnerabilities can now be installed.

## Description:

This update for openssl-3 fixes the following issues:

* CVE-2025-15467: Stack buffer overflow in CMS AuthEnvelopedData parsing
(bsc#1256830).
* CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes
(bsc#1256834).
* CVE-2025-69418: Unauthenticated/unencrypted trailing bytes with low-level
OCB function calls (bsc#1256835).
* CVE-2025-69419: Out of bounds write in PKCS12_get_friendlyname() UTF-8
conversion (bsc#1256836).
* CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response()
function (bsc#1256837).
* CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex
function (bsc#1256838).
* CVE-2026-22795: Missing ASN1_TYPE validation in PKCS#12 parsing
(bsc#1256839).
* CVE-2026-22796: ASN1_TYPE Type Confusion in the
PKCS7_digest_from_attributes() function (bsc#1256840).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-310=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-310=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2026-310=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-310=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2026-310=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-310=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-310=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-310=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-310=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libopenssl3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-3.0.8-150400.4.78.1
* openssl-3-debugsource-3.0.8-150400.4.78.1
* libopenssl-3-devel-3.0.8-150400.4.78.1
* libopenssl3-3.0.8-150400.4.78.1
* openSUSE Leap 15.4 (x86_64)
* libopenssl3-32bit-debuginfo-3.0.8-150400.4.78.1
* libopenssl-3-devel-32bit-3.0.8-150400.4.78.1
* libopenssl3-32bit-3.0.8-150400.4.78.1
* openSUSE Leap 15.4 (noarch)
* openssl-3-doc-3.0.8-150400.4.78.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libopenssl3-64bit-3.0.8-150400.4.78.1
* libopenssl-3-devel-64bit-3.0.8-150400.4.78.1
* libopenssl3-64bit-debuginfo-3.0.8-150400.4.78.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libopenssl3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-debugsource-3.0.8-150400.4.78.1
* libopenssl3-3.0.8-150400.4.78.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libopenssl3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-debugsource-3.0.8-150400.4.78.1
* libopenssl3-3.0.8-150400.4.78.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libopenssl3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-debugsource-3.0.8-150400.4.78.1
* libopenssl3-3.0.8-150400.4.78.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libopenssl3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-debugsource-3.0.8-150400.4.78.1
* libopenssl3-3.0.8-150400.4.78.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libopenssl3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-3.0.8-150400.4.78.1
* openssl-3-debugsource-3.0.8-150400.4.78.1
* libopenssl-3-devel-3.0.8-150400.4.78.1
* libopenssl3-3.0.8-150400.4.78.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libopenssl3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-3.0.8-150400.4.78.1
* openssl-3-debugsource-3.0.8-150400.4.78.1
* libopenssl-3-devel-3.0.8-150400.4.78.1
* libopenssl3-3.0.8-150400.4.78.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libopenssl3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-3.0.8-150400.4.78.1
* openssl-3-debugsource-3.0.8-150400.4.78.1
* libopenssl-3-devel-3.0.8-150400.4.78.1
* libopenssl3-3.0.8-150400.4.78.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libopenssl3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-debuginfo-3.0.8-150400.4.78.1
* openssl-3-3.0.8-150400.4.78.1
* openssl-3-debugsource-3.0.8-150400.4.78.1
* libopenssl-3-devel-3.0.8-150400.4.78.1
* libopenssl3-3.0.8-150400.4.78.1

## References:

* https://www.suse.com/security/cve/CVE-2025-15467.html
* https://www.suse.com/security/cve/CVE-2025-68160.html
* https://www.suse.com/security/cve/CVE-2025-69418.html
* https://www.suse.com/security/cve/CVE-2025-69419.html
* https://www.suse.com/security/cve/CVE-2025-69420.html
* https://www.suse.com/security/cve/CVE-2025-69421.html
* https://www.suse.com/security/cve/CVE-2026-22795.html
* https://www.suse.com/security/cve/CVE-2026-22796.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256830
* https://bugzilla.suse.com/show_bug.cgi?id=1256834
* https://bugzilla.suse.com/show_bug.cgi?id=1256835
* https://bugzilla.suse.com/show_bug.cgi?id=1256836
* https://bugzilla.suse.com/show_bug.cgi?id=1256837
* https://bugzilla.suse.com/show_bug.cgi?id=1256838
* https://bugzilla.suse.com/show_bug.cgi?id=1256839
* https://bugzilla.suse.com/show_bug.cgi?id=1256840



SUSE-SU-2026:0311-1: critical: Security update for openssl-3


# Security update for openssl-3

Announcement ID: SUSE-SU-2026:0311-1
Release Date: 2026-01-28T09:37:48Z
Rating: critical
References:

* bsc#1256830
* bsc#1256834
* bsc#1256835
* bsc#1256836
* bsc#1256837
* bsc#1256838
* bsc#1256839
* bsc#1256840

Cross-References:

* CVE-2025-15467
* CVE-2025-68160
* CVE-2025-69418
* CVE-2025-69419
* CVE-2025-69420
* CVE-2025-69421
* CVE-2026-22795
* CVE-2026-22796

CVSS scores:

* CVE-2025-15467 ( SUSE ): 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-15467 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68160 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68160 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-69418 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-69418 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-69419 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-69419 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-69420 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-69420 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-69421 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-69421 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22795 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22795 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22796 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-22796 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves eight vulnerabilities can now be installed.

## Description:

This update for openssl-3 fixes the following issues:

* CVE-2025-15467: Stack buffer overflow in CMS AuthEnvelopedData parsing
(bsc#1256830).
* CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes
(bsc#1256834).
* CVE-2025-69418: Unauthenticated/unencrypted trailing bytes with low-level
OCB function calls (bsc#1256835).
* CVE-2025-69419: Out of bounds write in PKCS12_get_friendlyname() UTF-8
conversion (bsc#1256836).
* CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response()
function (bsc#1256837).
* CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex
function (bsc#1256838).
* CVE-2026-22795: Missing ASN1_TYPE validation in PKCS#12 parsing
(bsc#1256839).
* CVE-2026-22796: ASN1_TYPE Type Confusion in the
PKCS7_digest_from_attributes() function (bsc#1256840).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-311=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-311=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-311=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-311=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-311=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* libopenssl-3-devel-3.0.8-150500.5.57.1
* libopenssl3-debuginfo-3.0.8-150500.5.57.1
* openssl-3-debuginfo-3.0.8-150500.5.57.1
* openssl-3-debugsource-3.0.8-150500.5.57.1
* libopenssl3-3.0.8-150500.5.57.1
* openssl-3-3.0.8-150500.5.57.1
* openSUSE Leap 15.5 (x86_64)
* libopenssl3-32bit-3.0.8-150500.5.57.1
* libopenssl-3-devel-32bit-3.0.8-150500.5.57.1
* libopenssl3-32bit-debuginfo-3.0.8-150500.5.57.1
* openSUSE Leap 15.5 (noarch)
* openssl-3-doc-3.0.8-150500.5.57.1
* openSUSE Leap 15.5 (aarch64_ilp32)
* libopenssl-3-devel-64bit-3.0.8-150500.5.57.1
* libopenssl3-64bit-3.0.8-150500.5.57.1
* libopenssl3-64bit-debuginfo-3.0.8-150500.5.57.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libopenssl-3-devel-3.0.8-150500.5.57.1
* libopenssl3-debuginfo-3.0.8-150500.5.57.1
* openssl-3-debuginfo-3.0.8-150500.5.57.1
* openssl-3-debugsource-3.0.8-150500.5.57.1
* libopenssl3-3.0.8-150500.5.57.1
* openssl-3-3.0.8-150500.5.57.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libopenssl-3-devel-3.0.8-150500.5.57.1
* libopenssl3-debuginfo-3.0.8-150500.5.57.1
* openssl-3-debuginfo-3.0.8-150500.5.57.1
* openssl-3-debugsource-3.0.8-150500.5.57.1
* libopenssl3-3.0.8-150500.5.57.1
* openssl-3-3.0.8-150500.5.57.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libopenssl-3-devel-3.0.8-150500.5.57.1
* libopenssl3-debuginfo-3.0.8-150500.5.57.1
* openssl-3-debuginfo-3.0.8-150500.5.57.1
* openssl-3-debugsource-3.0.8-150500.5.57.1
* libopenssl3-3.0.8-150500.5.57.1
* openssl-3-3.0.8-150500.5.57.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libopenssl-3-devel-3.0.8-150500.5.57.1
* libopenssl3-debuginfo-3.0.8-150500.5.57.1
* openssl-3-debuginfo-3.0.8-150500.5.57.1
* openssl-3-debugsource-3.0.8-150500.5.57.1
* libopenssl3-3.0.8-150500.5.57.1
* openssl-3-3.0.8-150500.5.57.1

## References:

* https://www.suse.com/security/cve/CVE-2025-15467.html
* https://www.suse.com/security/cve/CVE-2025-68160.html
* https://www.suse.com/security/cve/CVE-2025-69418.html
* https://www.suse.com/security/cve/CVE-2025-69419.html
* https://www.suse.com/security/cve/CVE-2025-69420.html
* https://www.suse.com/security/cve/CVE-2025-69421.html
* https://www.suse.com/security/cve/CVE-2026-22795.html
* https://www.suse.com/security/cve/CVE-2026-22796.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256830
* https://bugzilla.suse.com/show_bug.cgi?id=1256834
* https://bugzilla.suse.com/show_bug.cgi?id=1256835
* https://bugzilla.suse.com/show_bug.cgi?id=1256836
* https://bugzilla.suse.com/show_bug.cgi?id=1256837
* https://bugzilla.suse.com/show_bug.cgi?id=1256838
* https://bugzilla.suse.com/show_bug.cgi?id=1256839
* https://bugzilla.suse.com/show_bug.cgi?id=1256840



SUSE-SU-2026:0312-1: critical: Security update for openssl-3


# Security update for openssl-3

Announcement ID: SUSE-SU-2026:0312-1
Release Date: 2026-01-28T09:38:02Z
Rating: critical
References:

* bsc#1256830
* bsc#1256834
* bsc#1256835
* bsc#1256836
* bsc#1256837
* bsc#1256838
* bsc#1256839
* bsc#1256840

Cross-References:

* CVE-2025-15467
* CVE-2025-68160
* CVE-2025-69418
* CVE-2025-69419
* CVE-2025-69420
* CVE-2025-69421
* CVE-2026-22795
* CVE-2026-22796

CVSS scores:

* CVE-2025-15467 ( SUSE ): 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-15467 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68160 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68160 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-69418 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-69418 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-69419 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-69419 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-69420 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-69420 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-69421 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-69421 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22795 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22795 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22796 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-22796 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves eight vulnerabilities can now be installed.

## Description:

This update for openssl-3 fixes the following issues:

* CVE-2025-15467: Stack buffer overflow in CMS AuthEnvelopedData parsing
(bsc#1256830).
* CVE-2025-68160: Heap out-of-bounds write in BIO_f_linebuffer on short writes
(bsc#1256834).
* CVE-2025-69418: Unauthenticated/unencrypted trailing bytes with low-level
OCB function calls (bsc#1256835).
* CVE-2025-69419: Out of bounds write in PKCS12_get_friendlyname() UTF-8
conversion (bsc#1256836).
* CVE-2025-69420: Missing ASN1_TYPE validation in TS_RESP_verify_response()
function (bsc#1256837).
* CVE-2025-69421: NULL Pointer Dereference in PKCS12_item_decrypt_d2i_ex
function (bsc#1256838).
* CVE-2026-22795: Missing ASN1_TYPE validation in PKCS#12 parsing
(bsc#1256839).
* CVE-2026-22796: ASN1_TYPE Type Confusion in the
PKCS7_digest_from_attributes() function (bsc#1256840).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-312=1 openSUSE-SLE-15.6-2026-312=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-312=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-312=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libopenssl3-3.1.4-150600.5.42.1
* libopenssl3-debuginfo-3.1.4-150600.5.42.1
* openssl-3-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-debuginfo-3.1.4-150600.5.42.1
* openssl-3-debugsource-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-3.1.4-150600.5.42.1
* openssl-3-debuginfo-3.1.4-150600.5.42.1
* libopenssl-3-devel-3.1.4-150600.5.42.1
* openSUSE Leap 15.6 (x86_64)
* libopenssl3-32bit-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-32bit-debuginfo-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-32bit-3.1.4-150600.5.42.1
* libopenssl-3-devel-32bit-3.1.4-150600.5.42.1
* libopenssl3-32bit-debuginfo-3.1.4-150600.5.42.1
* openSUSE Leap 15.6 (noarch)
* openssl-3-doc-3.1.4-150600.5.42.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libopenssl-3-devel-64bit-3.1.4-150600.5.42.1
* libopenssl3-64bit-3.1.4-150600.5.42.1
* libopenssl3-64bit-debuginfo-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-64bit-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-64bit-debuginfo-3.1.4-150600.5.42.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* libopenssl3-3.1.4-150600.5.42.1
* libopenssl3-debuginfo-3.1.4-150600.5.42.1
* openssl-3-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-debuginfo-3.1.4-150600.5.42.1
* openssl-3-debugsource-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-3.1.4-150600.5.42.1
* openssl-3-debuginfo-3.1.4-150600.5.42.1
* libopenssl-3-devel-3.1.4-150600.5.42.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (x86_64)
* libopenssl-3-fips-provider-32bit-debuginfo-3.1.4-150600.5.42.1
* libopenssl3-32bit-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-32bit-3.1.4-150600.5.42.1
* libopenssl3-32bit-debuginfo-3.1.4-150600.5.42.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* libopenssl3-3.1.4-150600.5.42.1
* libopenssl3-debuginfo-3.1.4-150600.5.42.1
* openssl-3-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-debuginfo-3.1.4-150600.5.42.1
* openssl-3-debugsource-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-3.1.4-150600.5.42.1
* openssl-3-debuginfo-3.1.4-150600.5.42.1
* libopenssl-3-devel-3.1.4-150600.5.42.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64)
* libopenssl-3-fips-provider-32bit-debuginfo-3.1.4-150600.5.42.1
* libopenssl3-32bit-3.1.4-150600.5.42.1
* libopenssl-3-fips-provider-32bit-3.1.4-150600.5.42.1
* libopenssl3-32bit-debuginfo-3.1.4-150600.5.42.1

## References:

* https://www.suse.com/security/cve/CVE-2025-15467.html
* https://www.suse.com/security/cve/CVE-2025-68160.html
* https://www.suse.com/security/cve/CVE-2025-69418.html
* https://www.suse.com/security/cve/CVE-2025-69419.html
* https://www.suse.com/security/cve/CVE-2025-69420.html
* https://www.suse.com/security/cve/CVE-2025-69421.html
* https://www.suse.com/security/cve/CVE-2026-22795.html
* https://www.suse.com/security/cve/CVE-2026-22796.html
* https://bugzilla.suse.com/show_bug.cgi?id=1256830
* https://bugzilla.suse.com/show_bug.cgi?id=1256834
* https://bugzilla.suse.com/show_bug.cgi?id=1256835
* https://bugzilla.suse.com/show_bug.cgi?id=1256836
* https://bugzilla.suse.com/show_bug.cgi?id=1256837
* https://bugzilla.suse.com/show_bug.cgi?id=1256838
* https://bugzilla.suse.com/show_bug.cgi?id=1256839
* https://bugzilla.suse.com/show_bug.cgi?id=1256840



SUSE-SU-2026:0313-1: important: Security update for gimp


# Security update for gimp

Announcement ID: SUSE-SU-2026:0313-1
Release Date: 2026-01-28T10:13:44Z
Rating: important
References:

* bsc#1255293
* bsc#1255296

Cross-References:

* CVE-2025-14422
* CVE-2025-14425

CVSS scores:

* CVE-2025-14422 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-14422 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-14422 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-14425 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-14425 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-14425 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Linux Enterprise Workstation Extension 15 SP7
* SUSE Package Hub 15 15-SP7

An update that solves two vulnerabilities can now be installed.

## Description:

This update for gimp fixes the following issues:

* CVE-2025-14422: Fixed RCE vulnerability due to PNM file parsing integer
overflow (bsc#1255293)
* CVE-2025-14425: Fixed RCE vulnerability due to JP2 file parsing heap-based
buffer overflow (bsc#1255296)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-313=1

* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-313=1

* SUSE Linux Enterprise Workstation Extension 15 SP7
zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-313=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2026-313=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* gimp-devel-debuginfo-2.10.30-150400.3.38.1
* gimp-debuginfo-2.10.30-150400.3.38.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.38.1
* libgimpui-2_0-0-2.10.30-150400.3.38.1
* libgimp-2_0-0-2.10.30-150400.3.38.1
* gimp-plugin-aa-2.10.30-150400.3.38.1
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.38.1
* gimp-plugin-aa-debuginfo-2.10.30-150400.3.38.1
* gimp-debugsource-2.10.30-150400.3.38.1
* gimp-devel-2.10.30-150400.3.38.1
* gimp-2.10.30-150400.3.38.1
* openSUSE Leap 15.6 (noarch)
* gimp-lang-2.10.30-150400.3.38.1
* openSUSE Leap 15.6 (x86_64)
* libgimpui-2_0-0-32bit-debuginfo-2.10.30-150400.3.38.1
* libgimp-2_0-0-32bit-2.10.30-150400.3.38.1
* libgimp-2_0-0-32bit-debuginfo-2.10.30-150400.3.38.1
* libgimpui-2_0-0-32bit-2.10.30-150400.3.38.1
* SUSE Package Hub 15 15-SP7 (aarch64)
* gimp-devel-debuginfo-2.10.30-150400.3.38.1
* gimp-plugin-aa-2.10.30-150400.3.38.1
* gimp-plugin-aa-debuginfo-2.10.30-150400.3.38.1
* gimp-devel-2.10.30-150400.3.38.1
* gimp-2.10.30-150400.3.38.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x)
* gimp-debuginfo-2.10.30-150400.3.38.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.38.1
* libgimpui-2_0-0-2.10.30-150400.3.38.1
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.38.1
* gimp-debugsource-2.10.30-150400.3.38.1
* libgimp-2_0-0-2.10.30-150400.3.38.1
* SUSE Package Hub 15 15-SP7 (noarch)
* gimp-lang-2.10.30-150400.3.38.1
* SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64)
* gimp-devel-debuginfo-2.10.30-150400.3.38.1
* gimp-debuginfo-2.10.30-150400.3.38.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.38.1
* libgimpui-2_0-0-2.10.30-150400.3.38.1
* libgimp-2_0-0-2.10.30-150400.3.38.1
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.38.1
* gimp-debugsource-2.10.30-150400.3.38.1
* gimp-devel-2.10.30-150400.3.38.1
* gimp-2.10.30-150400.3.38.1
* SUSE Linux Enterprise Workstation Extension 15 SP7 (noarch)
* gimp-lang-2.10.30-150400.3.38.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* gimp-devel-debuginfo-2.10.30-150400.3.38.1
* gimp-debuginfo-2.10.30-150400.3.38.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.38.1
* libgimpui-2_0-0-2.10.30-150400.3.38.1
* libgimp-2_0-0-2.10.30-150400.3.38.1
* gimp-plugin-aa-2.10.30-150400.3.38.1
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.38.1
* gimp-plugin-aa-debuginfo-2.10.30-150400.3.38.1
* gimp-debugsource-2.10.30-150400.3.38.1
* gimp-devel-2.10.30-150400.3.38.1
* gimp-2.10.30-150400.3.38.1
* openSUSE Leap 15.4 (noarch)
* gimp-lang-2.10.30-150400.3.38.1
* openSUSE Leap 15.4 (x86_64)
* libgimpui-2_0-0-32bit-debuginfo-2.10.30-150400.3.38.1
* libgimp-2_0-0-32bit-2.10.30-150400.3.38.1
* libgimp-2_0-0-32bit-debuginfo-2.10.30-150400.3.38.1
* libgimpui-2_0-0-32bit-2.10.30-150400.3.38.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libgimpui-2_0-0-64bit-debuginfo-2.10.30-150400.3.38.1
* libgimp-2_0-0-64bit-2.10.30-150400.3.38.1
* libgimp-2_0-0-64bit-debuginfo-2.10.30-150400.3.38.1
* libgimpui-2_0-0-64bit-2.10.30-150400.3.38.1

## References:

* https://www.suse.com/security/cve/CVE-2025-14422.html
* https://www.suse.com/security/cve/CVE-2025-14425.html
* https://bugzilla.suse.com/show_bug.cgi?id=1255293
* https://bugzilla.suse.com/show_bug.cgi?id=1255296



SUSE-SU-2026:0317-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2026:0317-1
Release Date: 2026-01-28T14:37:05Z
Rating: important
References:

* bsc#1065729
* bsc#1193629
* bsc#1194869
* bsc#1196823
* bsc#1204957
* bsc#1205567
* bsc#1206451
* bsc#1206843
* bsc#1206889
* bsc#1207051
* bsc#1207088
* bsc#1207315
* bsc#1207611
* bsc#1207620
* bsc#1207622
* bsc#1207636
* bsc#1207644
* bsc#1207646
* bsc#1207652
* bsc#1207653
* bsc#1208570
* bsc#1208758
* bsc#1209799
* bsc#1209980
* bsc#1210644
* bsc#1210817
* bsc#1210943
* bsc#1211690
* bsc#1213025
* bsc#1213032
* bsc#1213093
* bsc#1213105
* bsc#1213110
* bsc#1213111
* bsc#1213653
* bsc#1213747
* bsc#1213867
* bsc#1214635
* bsc#1214940
* bsc#1214962
* bsc#1214986
* bsc#1214990
* bsc#1216062
* bsc#1224573
* bsc#1225832
* bsc#1226797
* bsc#1226846
* bsc#1228015
* bsc#1233640
* bsc#1235038
* bsc#1237563
* bsc#1249871
* bsc#1252046
* bsc#1252678
* bsc#1253409
* bsc#1254392
* bsc#1254520
* bsc#1254559
* bsc#1254562
* bsc#1254572
* bsc#1254578
* bsc#1254580
* bsc#1254592
* bsc#1254601
* bsc#1254608
* bsc#1254609
* bsc#1254614
* bsc#1254615
* bsc#1254617
* bsc#1254623
* bsc#1254625
* bsc#1254626
* bsc#1254631
* bsc#1254632
* bsc#1254634
* bsc#1254644
* bsc#1254645
* bsc#1254649
* bsc#1254651
* bsc#1254653
* bsc#1254656
* bsc#1254658
* bsc#1254660
* bsc#1254664
* bsc#1254671
* bsc#1254674
* bsc#1254676
* bsc#1254677
* bsc#1254681
* bsc#1254684
* bsc#1254685
* bsc#1254686
* bsc#1254690
* bsc#1254692
* bsc#1254694
* bsc#1254696
* bsc#1254698
* bsc#1254699
* bsc#1254704
* bsc#1254706
* bsc#1254709
* bsc#1254710
* bsc#1254711
* bsc#1254712
* bsc#1254713
* bsc#1254714
* bsc#1254716
* bsc#1254723
* bsc#1254725
* bsc#1254728
* bsc#1254729
* bsc#1254743
* bsc#1254745
* bsc#1254751
* bsc#1254753
* bsc#1254754
* bsc#1254756
* bsc#1254759
* bsc#1254763
* bsc#1254775
* bsc#1254780
* bsc#1254781
* bsc#1254782
* bsc#1254783
* bsc#1254785
* bsc#1254786
* bsc#1254788
* bsc#1254789
* bsc#1254792
* bsc#1254813
* bsc#1254843
* bsc#1254847
* bsc#1254851
* bsc#1254894
* bsc#1254902
* bsc#1254910
* bsc#1254911
* bsc#1254915
* bsc#1254916
* bsc#1254917
* bsc#1254920
* bsc#1254922
* bsc#1254958
* bsc#1254959
* bsc#1254974
* bsc#1254979
* bsc#1254986
* bsc#1254994
* bsc#1255002
* bsc#1255005
* bsc#1255007
* bsc#1255049
* bsc#1255060
* bsc#1255107
* bsc#1255163
* bsc#1255165
* bsc#1255245
* bsc#1255467
* bsc#1255469
* bsc#1255521
* bsc#1255528
* bsc#1255532
* bsc#1255546
* bsc#1255549
* bsc#1255554
* bsc#1255555
* bsc#1255558
* bsc#1255560
* bsc#1255561
* bsc#1255562
* bsc#1255565
* bsc#1255574
* bsc#1255576
* bsc#1255578
* bsc#1255582
* bsc#1255596
* bsc#1255600
* bsc#1255605
* bsc#1255607
* bsc#1255608
* bsc#1255609
* bsc#1255618
* bsc#1255619
* bsc#1255620
* bsc#1255623
* bsc#1255624
* bsc#1255626
* bsc#1255627
* bsc#1255628
* bsc#1255635
* bsc#1255636
* bsc#1255688
* bsc#1255690
* bsc#1255697
* bsc#1255702
* bsc#1255704
* bsc#1255745
* bsc#1255747
* bsc#1255749
* bsc#1255750
* bsc#1255757
* bsc#1255758
* bsc#1255760
* bsc#1255761
* bsc#1255762
* bsc#1255763
* bsc#1255769
* bsc#1255771
* bsc#1255773
* bsc#1255780
* bsc#1255786
* bsc#1255787
* bsc#1255789
* bsc#1255790
* bsc#1255791
* bsc#1255792
* bsc#1255796
* bsc#1255797
* bsc#1255800
* bsc#1255801
* bsc#1255802
* bsc#1255803
* bsc#1255804
* bsc#1255806
* bsc#1255808
* bsc#1255819
* bsc#1255839
* bsc#1255841
* bsc#1255843
* bsc#1255844
* bsc#1255872
* bsc#1255875
* bsc#1255876
* bsc#1255877
* bsc#1255878
* bsc#1255880
* bsc#1255881
* bsc#1255888
* bsc#1255889
* bsc#1255890
* bsc#1255899
* bsc#1255901
* bsc#1255902
* bsc#1255905
* bsc#1255906
* bsc#1255909
* bsc#1255910
* bsc#1255912
* bsc#1255916
* bsc#1255919
* bsc#1255920
* bsc#1255922
* bsc#1255924
* bsc#1255925
* bsc#1255939
* bsc#1255946
* bsc#1255950
* bsc#1255953
* bsc#1255954
* bsc#1255955
* bsc#1255962
* bsc#1255964
* bsc#1255968
* bsc#1255969
* bsc#1255970
* bsc#1255971
* bsc#1255974
* bsc#1255978
* bsc#1255979
* bsc#1255983
* bsc#1255985
* bsc#1255990
* bsc#1255993
* bsc#1255994
* bsc#1255996
* bsc#1255998
* bsc#1256034
* bsc#1256040
* bsc#1256042
* bsc#1256045
* bsc#1256046
* bsc#1256048
* bsc#1256049
* bsc#1256050
* bsc#1256053
* bsc#1256056
* bsc#1256057
* bsc#1256062
* bsc#1256063
* bsc#1256064
* bsc#1256065
* bsc#1256071
* bsc#1256074
* bsc#1256081
* bsc#1256084
* bsc#1256086
* bsc#1256088
* bsc#1256091
* bsc#1256093
* bsc#1256099
* bsc#1256101
* bsc#1256103
* bsc#1256106
* bsc#1256111
* bsc#1256112
* bsc#1256114
* bsc#1256115
* bsc#1256118
* bsc#1256119
* bsc#1256121
* bsc#1256122
* bsc#1256124
* bsc#1256125
* bsc#1256126
* bsc#1256127
* bsc#1256128
* bsc#1256130
* bsc#1256131
* bsc#1256132
* bsc#1256133
* bsc#1256136
* bsc#1256137
* bsc#1256140
* bsc#1256141
* bsc#1256142
* bsc#1256143
* bsc#1256144
* bsc#1256145
* bsc#1256149
* bsc#1256150
* bsc#1256152
* bsc#1256154
* bsc#1256155
* bsc#1256157
* bsc#1256158
* bsc#1256162
* bsc#1256164
* bsc#1256165
* bsc#1256166
* bsc#1256167
* bsc#1256172
* bsc#1256173
* bsc#1256174
* bsc#1256177
* bsc#1256178
* bsc#1256179
* bsc#1256182
* bsc#1256184
* bsc#1256185
* bsc#1256186
* bsc#1256188
* bsc#1256189
* bsc#1256191
* bsc#1256192
* bsc#1256193
* bsc#1256194
* bsc#1256196
* bsc#1256198
* bsc#1256199
* bsc#1256200
* bsc#1256202
* bsc#1256203
* bsc#1256204
* bsc#1256205
* bsc#1256206
* bsc#1256207
* bsc#1256208
* bsc#1256211
* bsc#1256214
* bsc#1256215
* bsc#1256216
* bsc#1256218
* bsc#1256219
* bsc#1256220
* bsc#1256221
* bsc#1256223
* bsc#1256228
* bsc#1256230
* bsc#1256231
* bsc#1256235
* bsc#1256239
* bsc#1256241
* bsc#1256242
* bsc#1256245
* bsc#1256248
* bsc#1256250
* bsc#1256254
* bsc#1256260
* bsc#1256265
* bsc#1256269
* bsc#1256271
* bsc#1256274
* bsc#1256282
* bsc#1256285
* bsc#1256291
* bsc#1256294
* bsc#1256295
* bsc#1256300
* bsc#1256302
* bsc#1256306
* bsc#1256309
* bsc#1256317
* bsc#1256320
* bsc#1256323
* bsc#1256326
* bsc#1256328
* bsc#1256333
* bsc#1256334
* bsc#1256335
* bsc#1256337
* bsc#1256338
* bsc#1256344
* bsc#1256346
* bsc#1256349
* bsc#1256352
* bsc#1256353
* bsc#1256355
* bsc#1256358
* bsc#1256359
* bsc#1256363
* bsc#1256364
* bsc#1256368
* bsc#1256370
* bsc#1256375
* bsc#1256381
* bsc#1256382
* bsc#1256383
* bsc#1256384
* bsc#1256386
* bsc#1256388
* bsc#1256391
* bsc#1256394
* bsc#1256395
* bsc#1256396
* bsc#1256397
* bsc#1256398
* bsc#1256423
* bsc#1256426
* bsc#1256432
* jsc#PED-1073
* jsc#PED-14062
* jsc#PED-1407
* jsc#PED-1495
* jsc#PED-1549
* jsc#PED-1559
* jsc#PED-2765
* jsc#PED-370
* jsc#PED-376
* jsc#PED-7167
* jsc#PED-8111
* jsc#SLE-13847
* jsc#SLE-18378
* jsc#SLE-18384
* jsc#SLE-19253
* jsc#SLE-19255

Cross-References:

* CVE-2022-0854
* CVE-2022-48853
* CVE-2022-50614
* CVE-2022-50615
* CVE-2022-50617
* CVE-2022-50618
* CVE-2022-50619
* CVE-2022-50621
* CVE-2022-50622
* CVE-2022-50623
* CVE-2022-50625
* CVE-2022-50626
* CVE-2022-50629
* CVE-2022-50630
* CVE-2022-50633
* CVE-2022-50635
* CVE-2022-50636
* CVE-2022-50638
* CVE-2022-50640
* CVE-2022-50641
* CVE-2022-50643
* CVE-2022-50644
* CVE-2022-50646
* CVE-2022-50649
* CVE-2022-50652
* CVE-2022-50653
* CVE-2022-50656
* CVE-2022-50658
* CVE-2022-50660
* CVE-2022-50661
* CVE-2022-50662
* CVE-2022-50664
* CVE-2022-50665
* CVE-2022-50666
* CVE-2022-50667
* CVE-2022-50668
* CVE-2022-50669
* CVE-2022-50670
* CVE-2022-50671
* CVE-2022-50672
* CVE-2022-50673
* CVE-2022-50675
* CVE-2022-50677
* CVE-2022-50678
* CVE-2022-50679
* CVE-2022-50698
* CVE-2022-50699
* CVE-2022-50700
* CVE-2022-50701
* CVE-2022-50702
* CVE-2022-50703
* CVE-2022-50704
* CVE-2022-50705
* CVE-2022-50709
* CVE-2022-50710
* CVE-2022-50712
* CVE-2022-50714
* CVE-2022-50715
* CVE-2022-50716
* CVE-2022-50717
* CVE-2022-50718
* CVE-2022-50719
* CVE-2022-50722
* CVE-2022-50723
* CVE-2022-50724
* CVE-2022-50726
* CVE-2022-50727
* CVE-2022-50728
* CVE-2022-50730
* CVE-2022-50731
* CVE-2022-50732
* CVE-2022-50733
* CVE-2022-50735
* CVE-2022-50736
* CVE-2022-50738
* CVE-2022-50740
* CVE-2022-50742
* CVE-2022-50744
* CVE-2022-50745
* CVE-2022-50747
* CVE-2022-50749
* CVE-2022-50750
* CVE-2022-50751
* CVE-2022-50752
* CVE-2022-50754
* CVE-2022-50755
* CVE-2022-50756
* CVE-2022-50757
* CVE-2022-50758
* CVE-2022-50760
* CVE-2022-50761
* CVE-2022-50763
* CVE-2022-50767
* CVE-2022-50768
* CVE-2022-50769
* CVE-2022-50770
* CVE-2022-50773
* CVE-2022-50774
* CVE-2022-50776
* CVE-2022-50777
* CVE-2022-50779
* CVE-2022-50781
* CVE-2022-50782
* CVE-2022-50809
* CVE-2022-50814
* CVE-2022-50818
* CVE-2022-50819
* CVE-2022-50821
* CVE-2022-50822
* CVE-2022-50823
* CVE-2022-50824
* CVE-2022-50826
* CVE-2022-50827
* CVE-2022-50828
* CVE-2022-50829
* CVE-2022-50830
* CVE-2022-50832
* CVE-2022-50833
* CVE-2022-50834
* CVE-2022-50835
* CVE-2022-50836
* CVE-2022-50838
* CVE-2022-50839
* CVE-2022-50840
* CVE-2022-50842
* CVE-2022-50843
* CVE-2022-50844
* CVE-2022-50845
* CVE-2022-50846
* CVE-2022-50847
* CVE-2022-50848
* CVE-2022-50849
* CVE-2022-50850
* CVE-2022-50851
* CVE-2022-50853
* CVE-2022-50856
* CVE-2022-50858
* CVE-2022-50859
* CVE-2022-50860
* CVE-2022-50861
* CVE-2022-50862
* CVE-2022-50864
* CVE-2022-50866
* CVE-2022-50867
* CVE-2022-50868
* CVE-2022-50870
* CVE-2022-50872
* CVE-2022-50873
* CVE-2022-50876
* CVE-2022-50878
* CVE-2022-50880
* CVE-2022-50881
* CVE-2022-50882
* CVE-2022-50883
* CVE-2022-50884
* CVE-2022-50885
* CVE-2022-50886
* CVE-2022-50887
* CVE-2022-50888
* CVE-2022-50889
* CVE-2023-23559
* CVE-2023-53254
* CVE-2023-53743
* CVE-2023-53744
* CVE-2023-53746
* CVE-2023-53747
* CVE-2023-53751
* CVE-2023-53753
* CVE-2023-53754
* CVE-2023-53755
* CVE-2023-53761
* CVE-2023-53766
* CVE-2023-53769
* CVE-2023-53780
* CVE-2023-53781
* CVE-2023-53783
* CVE-2023-53786
* CVE-2023-53788
* CVE-2023-53792
* CVE-2023-53794
* CVE-2023-53801
* CVE-2023-53802
* CVE-2023-53803
* CVE-2023-53804
* CVE-2023-53806
* CVE-2023-53808
* CVE-2023-53811
* CVE-2023-53814
* CVE-2023-53816
* CVE-2023-53818
* CVE-2023-53819
* CVE-2023-53820
* CVE-2023-53827
* CVE-2023-53828
* CVE-2023-53830
* CVE-2023-53832
* CVE-2023-53833
* CVE-2023-53834
* CVE-2023-53837
* CVE-2023-53840
* CVE-2023-53842
* CVE-2023-53844
* CVE-2023-53845
* CVE-2023-53847
* CVE-2023-53848
* CVE-2023-53849
* CVE-2023-53850
* CVE-2023-53852
* CVE-2023-53858
* CVE-2023-53860
* CVE-2023-53862
* CVE-2023-53864
* CVE-2023-53866
* CVE-2023-53989
* CVE-2023-53990
* CVE-2023-53991
* CVE-2023-53996
* CVE-2023-53998
* CVE-2023-54001
* CVE-2023-54003
* CVE-2023-54007
* CVE-2023-54009
* CVE-2023-54010
* CVE-2023-54014
* CVE-2023-54015
* CVE-2023-54017
* CVE-2023-54018
* CVE-2023-54019
* CVE-2023-54020
* CVE-2023-54021
* CVE-2023-54024
* CVE-2023-54025
* CVE-2023-54026
* CVE-2023-54028
* CVE-2023-54036
* CVE-2023-54039
* CVE-2023-54040
* CVE-2023-54041
* CVE-2023-54042
* CVE-2023-54044
* CVE-2023-54045
* CVE-2023-54046
* CVE-2023-54047
* CVE-2023-54048
* CVE-2023-54049
* CVE-2023-54050
* CVE-2023-54051
* CVE-2023-54053
* CVE-2023-54055
* CVE-2023-54057
* CVE-2023-54058
* CVE-2023-54064
* CVE-2023-54070
* CVE-2023-54072
* CVE-2023-54074
* CVE-2023-54076
* CVE-2023-54078
* CVE-2023-54079
* CVE-2023-54083
* CVE-2023-54084
* CVE-2023-54090
* CVE-2023-54091
* CVE-2023-54092
* CVE-2023-54095
* CVE-2023-54096
* CVE-2023-54097
* CVE-2023-54098
* CVE-2023-54100
* CVE-2023-54102
* CVE-2023-54104
* CVE-2023-54106
* CVE-2023-54107
* CVE-2023-54108
* CVE-2023-54110
* CVE-2023-54111
* CVE-2023-54114
* CVE-2023-54115
* CVE-2023-54116
* CVE-2023-54118
* CVE-2023-54119
* CVE-2023-54120
* CVE-2023-54122
* CVE-2023-54123
* CVE-2023-54126
* CVE-2023-54127
* CVE-2023-54128
* CVE-2023-54130
* CVE-2023-54131
* CVE-2023-54132
* CVE-2023-54134
* CVE-2023-54136
* CVE-2023-54138
* CVE-2023-54140
* CVE-2023-54144
* CVE-2023-54146
* CVE-2023-54148
* CVE-2023-54150
* CVE-2023-54153
* CVE-2023-54156
* CVE-2023-54159
* CVE-2023-54164
* CVE-2023-54166
* CVE-2023-54168
* CVE-2023-54169
* CVE-2023-54170
* CVE-2023-54171
* CVE-2023-54173
* CVE-2023-54175
* CVE-2023-54177
* CVE-2023-54179
* CVE-2023-54183
* CVE-2023-54186
* CVE-2023-54189
* CVE-2023-54190
* CVE-2023-54194
* CVE-2023-54197
* CVE-2023-54198
* CVE-2023-54199
* CVE-2023-54201
* CVE-2023-54202
* CVE-2023-54205
* CVE-2023-54208
* CVE-2023-54210
* CVE-2023-54211
* CVE-2023-54213
* CVE-2023-54214
* CVE-2023-54219
* CVE-2023-54226
* CVE-2023-54229
* CVE-2023-54230
* CVE-2023-54234
* CVE-2023-54236
* CVE-2023-54238
* CVE-2023-54242
* CVE-2023-54244
* CVE-2023-54245
* CVE-2023-54251
* CVE-2023-54252
* CVE-2023-54254
* CVE-2023-54260
* CVE-2023-54262
* CVE-2023-54264
* CVE-2023-54266
* CVE-2023-54267
* CVE-2023-54269
* CVE-2023-54270
* CVE-2023-54271
* CVE-2023-54274
* CVE-2023-54275
* CVE-2023-54277
* CVE-2023-54280
* CVE-2023-54284
* CVE-2023-54286
* CVE-2023-54287
* CVE-2023-54289
* CVE-2023-54292
* CVE-2023-54293
* CVE-2023-54294
* CVE-2023-54295
* CVE-2023-54298
* CVE-2023-54299
* CVE-2023-54300
* CVE-2023-54301
* CVE-2023-54302
* CVE-2023-54304
* CVE-2023-54305
* CVE-2023-54309
* CVE-2023-54311
* CVE-2023-54315
* CVE-2023-54317
* CVE-2023-54319
* CVE-2023-54320
* CVE-2023-54321
* CVE-2023-54322
* CVE-2023-54325
* CVE-2023-54326
* CVE-2024-36933
* CVE-2024-53093
* CVE-2024-56590
* CVE-2025-39977
* CVE-2025-40019
* CVE-2025-40139
* CVE-2025-40215
* CVE-2025-40220
* CVE-2025-40233
* CVE-2025-40256
* CVE-2025-40258
* CVE-2025-40277
* CVE-2025-40280
* CVE-2025-40331
* CVE-2025-68218
* CVE-2025-68732

CVSS scores:

* CVE-2022-0854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-0854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-48853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-50614 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50614 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50615 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50617 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50618 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50622 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50622 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50625 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50626 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50633 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50636 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50638 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50638 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2022-50640 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50641 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50641 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50643 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50643 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50644 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50644 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50646 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50646 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50649 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50652 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50653 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50653 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50656 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50656 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
* CVE-2022-50658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50664 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50673 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50700 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50709 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50709 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2022-50710 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50710 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50714 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50714 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50716 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50717 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50717 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50719 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50722 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50723 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50723 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50724 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50726 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50732 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50733 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50735 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50736 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50736 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50738 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50740 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50740 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50742 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50742 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50744 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50745 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50745 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50747 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-50749 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2022-50750 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50750 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50751 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50752 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50752 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50755 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50755 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50756 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50756 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50757 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50758 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50758 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50760 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50761 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50763 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50763 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50767 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50768 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50769 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50770 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50770 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50773 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50774 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50774 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50776 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50777 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50777 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50779 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50779 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50781 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50781 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
* CVE-2022-50782 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50823 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50824 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50824 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50826 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50827 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50829 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50830 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50858 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50868 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-23559 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
* CVE-2023-23559 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-23559 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53254 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53254 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53254 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-53254 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-53743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53747 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53751 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53761 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53761 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53766 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53766 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53780 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-53781 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53781 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53783 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53794 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53794 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53803 ( SUSE ): 5.1
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-53803 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-53804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53806 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53806 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53816 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-53818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53827 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53827 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53845 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53845 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-53847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53866 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53989 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53996 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2023-53996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2023-53998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54003 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54003 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54009 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54009 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54010 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54014 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54017 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54017 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54018 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54021 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54036 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54041 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54042 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54042 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54044 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54045 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54046 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54046 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54047 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54072 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54072 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54076 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54076 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54078 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54079 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54079 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54083 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54083 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54084 ( SUSE ): 7.0
CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54084 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54090 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54091 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54091 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54092 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54095 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54096 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54096 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54097 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54097 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54098 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54100 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54100 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54102 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54102 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54104 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-54106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54111 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54111 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54114 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54115 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54118 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54118 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54120 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54120 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54123 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54123 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54126 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54126 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54127 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54127 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54128 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54128 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54130 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54131 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54131 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54132 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54134 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54134 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54136 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54136 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54138 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54140 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54140 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54144 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54144 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54146 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54146 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54148 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54148 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
* CVE-2023-54150 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54150 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54153 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54156 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54159 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54159 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54164 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54166 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54166 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54168 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54169 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54170 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54173 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54173 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54175 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54175 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54177 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54179 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54179 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54183 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54183 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54186 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54189 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54190 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54190 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54194 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54194 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54197 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54198 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54199 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54201 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54201 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54205 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54205 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54208 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54208 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54210 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54210 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54211 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54213 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54213 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54214 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54214 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54219 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54219 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54226 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54226 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54229 ( SUSE ): 5.1
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54229 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54230 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54230 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54234 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54234 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54236 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54236 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54238 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54238 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54242 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54242 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54244 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54245 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54245 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54251 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54252 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54252 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54254 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54254 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54260 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54260 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54262 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54262 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54264 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54266 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54266 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54267 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2023-54267 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-54269 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54269 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54270 ( SUSE ): 5.4
CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54270 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54271 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54271 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54274 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54274 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54275 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54275 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54277 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54280 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54280 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54284 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54286 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54286 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54287 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54289 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54292 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54292 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54293 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54293 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54294 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54294 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54295 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54295 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54298 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54299 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54300 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54300 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-54301 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54301 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54302 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54302 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54304 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54305 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54309 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54309 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2023-54311 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54311 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54315 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54317 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54317 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2023-54319 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54320 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54320 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54321 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54321 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-54322 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-54322 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-54325 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54325 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-54326 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54326 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-36933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56590 ( SUSE ): 6.9
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56590 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39977 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39977 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40019 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40019 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40139 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40139 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40215 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40215 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40220 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40220 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40258 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40258 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40280 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40280 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68732 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68732 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves 392 vulnerabilities, contains 16 features and has 47
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP5 kernel was updated to fix various security
issues

The following security issues were fixed:

* CVE-2022-50630: mm: hugetlb: fix UAF in hugetlb_handle_userfault
(bsc#1254785).
* CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer
(bsc#1255576).
* CVE-2023-53254: cacheinfo: Fix shared_cpu_map to handle shared caches at
different levels (bsc#1249871).
* CVE-2023-53781: smc: Fix use-after-free in tcp_write_timer_handler()
(bsc#1254751).
* CVE-2024-56590: Bluetooth: hci_core: Fix not checking skb length on
hci_acldata_packet (bsc#1235038).
* CVE-2025-39977: futex: Prevent use-after-free during requeue-PI
(bsc#1252046).
* CVE-2025-40019: crypto: essiv - Check ssize for decryption and in-place
encryption (bsc#1252678).
* CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in
smc_clc_prfx_set() (bsc#1253409).
* CVE-2025-40215: kABI: xfrm: delete x->tunnel as we delete x (bsc#1254959).
* CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk
workers (bsc#1254520).
* CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents
(bsc#1254813).
* CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work()
(bsc#1254843).
* CVE-2025-40277: drm/vmwgfx: Validate command header size against
(bsc#1254894).
* CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self()
(bsc#1254847).
* CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).
* CVE-2025-68732: gpu: host1x: Fix race in syncpt alloc/free (bsc#1255688).

The following non security issues were fixed:

* ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() (git-fixes).
* ACPI: PRM: Remove unnecessary strict handler address checks (git-fixes).
* ACPI: property: Do not pass NULL handles to acpi_attach_data() (git-fixes).
* ACPI: property: Fix buffer properties extraction for subnodes (git-fixes).
* KVM: SVM: Fix TSC_AUX virtualization setup (git-fixes).
* RDMA/cm: Rate limit destroy CM ID timeout error message (git-fixes).
* RDMA/counter: Check CAP_NET_RAW check in user namespace for RDMA counters
(git-fixes).
* RDMA/hns: Fix the modification of max_send_sge (git-fixes).
* RDMA/mlx5: Check CAP_NET_RAW in user namespace for anchor create (git-
fixes).
* RDMA/mlx5: Check CAP_NET_RAW in user namespace for devx create (git-fixes).
* RDMA/mlx5: Check CAP_NET_RAW in user namespace for flow create (git-fixes).
* RDMA/mlx5: Fix compilation warning when USER_ACCESS isn't set (git-fixes).
* RDMA/nldev: Check CAP_NET_RAW in user namespace for QP modify (git-fixes).
* RDMA/uverbs: Add empty rdma_uattrs_has_raw_cap() declaration (git-fixes).
* RDMA/uverbs: Check CAP_NET_RAW in user namespace for QP create (git-fixes).
* RDMA/uverbs: Check CAP_NET_RAW in user namespace for RAW QP create (git-
fixes).
* RDMA/uverbs: Check CAP_NET_RAW in user namespace for flow create (git-
fixes).
* arch/idle: Change arch_cpu_idle() behavior: always exit with IRQs disabled
(git-fixes).
* cpuidle/poll: Ensure IRQs stay disabled after cpuidle_state::enter() calls
(git-fixes).
* cpuidle: Move IRQ state validation (git-fixes).
* cpuidle: haltpoll: Do not enable interrupts when entering idle (git-fixes).
* dm: free table mempools if not used in __bind (git-fixes).
* padata: Honor the caller's alignment in case of chunk_size 0 (bsc#1237563).
* platform/x86/intel-uncore-freq: Fail module load when plat_info is NULL
(git-fixes).
* x86/bugs: Fix RSB clearing in indirect_branch_prediction_barrier() (git-
fixes).
* x86/bugs: Use SBPB in write_ibpb() if applicable (git-fixes).
* x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT (git-fixes).
* x86/tdx: Drop flags from __tdx_hypercall() (git-fixes).
* x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes).
* x86/tdx: Emit warning if IRQs are enabled during HLT #VE handling (git-
fixes).
* x86/tdx: Extend TDX_MODULE_CALL to support more TDCALL/SEAMCALL leafs (git-
fixes).
* x86/tdx: Fix __noreturn build warning around __tdx_hypercall_failed() (git-
fixes).
* x86/tdx: Fix arch_safe_halt() execution for TDX VMs (git-fixes).
* x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes).
* x86/tdx: Make TDX_HYPERCALL asm similar to TDX_MODULE_CALL (git-fixes).
* x86/tdx: Make macros of TDCALLs consistent with the spec (git-fixes).
* x86/tdx: Pass TDCALL/SEAMCALL input/output registers via a structure (git-
fixes).
* x86/tdx: Reimplement __tdx_hypercall() using TDX_MODULE_CALL asm (git-
fixes).
* x86/tdx: Remove 'struct tdx_hypercall_args' (git-fixes).
* x86/tdx: Remove TDX_HCALL_ISSUE_STI (git-fixes).
* x86/tdx: Rename __tdx_module_call() to __tdcall() (git-fixes).
* x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes).
* x86/tdx: Retry partially-completed page conversion hypercalls (git-fixes).
* x86/tdx: Skip saving output regs when SEAMCALL fails with VMFailInvalid
(git-fixes).
* x86/tdx: Zero out the missing RSI in TDX_HYPERCALL macro (git-fixes).
* x86/virt/tdx: Make TDX_MODULE_CALL handle SEAMCALL #UD and #GP (git-fixes).
* x86/virt/tdx: Wire up basic SEAMCALL functions (git-fixes).
* xfs: fix sparse inode limits on runt AG (bsc#1254392).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-317=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-317=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-317=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-317=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-317=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-317=1

* openSUSE Leap 15.5
zypper in -t patch SUSE-2026-317=1

## Package List:

* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* kernel-default-base-5.14.21-150500.55.133.1.150500.6.65.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* kernel-default-debugsource-5.14.21-150500.55.133.1
* kernel-default-debuginfo-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-macros-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* kernel-default-debugsource-5.14.21-150500.55.133.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.133.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.133.1
* gfs2-kmp-default-5.14.21-150500.55.133.1
* kernel-syms-5.14.21-150500.55.133.1
* dlm-kmp-default-5.14.21-150500.55.133.1
* kernel-default-devel-5.14.21-150500.55.133.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kernel-default-base-5.14.21-150500.55.133.1.150500.6.65.1
* kernel-default-debuginfo-5.14.21-150500.55.133.1
* kernel-obs-build-debugsource-5.14.21-150500.55.133.1
* cluster-md-kmp-default-5.14.21-150500.55.133.1
* kernel-obs-build-5.14.21-150500.55.133.1
* ocfs2-kmp-default-5.14.21-150500.55.133.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
nosrc)
* kernel-64kb-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64)
* kernel-64kb-debugsource-5.14.21-150500.55.133.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.133.1
* kernel-64kb-devel-5.14.21-150500.55.133.1
* kernel-64kb-debuginfo-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* kernel-macros-5.14.21-150500.55.133.1
* kernel-source-5.14.21-150500.55.133.1
* kernel-devel-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* kernel-default-debugsource-5.14.21-150500.55.133.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.133.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.133.1
* gfs2-kmp-default-5.14.21-150500.55.133.1
* kernel-syms-5.14.21-150500.55.133.1
* dlm-kmp-default-5.14.21-150500.55.133.1
* kernel-default-devel-5.14.21-150500.55.133.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kernel-default-base-5.14.21-150500.55.133.1.150500.6.65.1
* kernel-default-debuginfo-5.14.21-150500.55.133.1
* kernel-obs-build-debugsource-5.14.21-150500.55.133.1
* cluster-md-kmp-default-5.14.21-150500.55.133.1
* kernel-obs-build-5.14.21-150500.55.133.1
* ocfs2-kmp-default-5.14.21-150500.55.133.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64)
* kernel-64kb-debugsource-5.14.21-150500.55.133.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.133.1
* kernel-64kb-devel-5.14.21-150500.55.133.1
* kernel-64kb-debuginfo-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* kernel-macros-5.14.21-150500.55.133.1
* kernel-source-5.14.21-150500.55.133.1
* kernel-devel-5.14.21-150500.55.133.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* kernel-default-debugsource-5.14.21-150500.55.133.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.133.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.133.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.133.1
* gfs2-kmp-default-5.14.21-150500.55.133.1
* kernel-syms-5.14.21-150500.55.133.1
* dlm-kmp-default-5.14.21-150500.55.133.1
* reiserfs-kmp-default-5.14.21-150500.55.133.1
* kernel-default-devel-5.14.21-150500.55.133.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kernel-default-debuginfo-5.14.21-150500.55.133.1
* kernel-obs-build-debugsource-5.14.21-150500.55.133.1
* cluster-md-kmp-default-5.14.21-150500.55.133.1
* kernel-obs-build-5.14.21-150500.55.133.1
* ocfs2-kmp-default-5.14.21-150500.55.133.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64)
* kernel-64kb-debugsource-5.14.21-150500.55.133.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.133.1
* kernel-64kb-devel-5.14.21-150500.55.133.1
* kernel-64kb-debuginfo-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150500.55.133.1.150500.6.65.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* kernel-macros-5.14.21-150500.55.133.1
* kernel-source-5.14.21-150500.55.133.1
* kernel-devel-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch nosrc)
* kernel-docs-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.133.1
* kernel-zfcpdump-debugsource-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* kernel-default-debugsource-5.14.21-150500.55.133.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.133.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.133.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.133.1
* gfs2-kmp-default-5.14.21-150500.55.133.1
* kernel-syms-5.14.21-150500.55.133.1
* dlm-kmp-default-5.14.21-150500.55.133.1
* reiserfs-kmp-default-5.14.21-150500.55.133.1
* kernel-default-devel-5.14.21-150500.55.133.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kernel-default-base-5.14.21-150500.55.133.1.150500.6.65.1
* kernel-default-debuginfo-5.14.21-150500.55.133.1
* kernel-obs-build-debugsource-5.14.21-150500.55.133.1
* cluster-md-kmp-default-5.14.21-150500.55.133.1
* kernel-obs-build-5.14.21-150500.55.133.1
* ocfs2-kmp-default-5.14.21-150500.55.133.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* kernel-macros-5.14.21-150500.55.133.1
* kernel-source-5.14.21-150500.55.133.1
* kernel-devel-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Live Patching 15-SP5 (nosrc)
* kernel-default-5.14.21-150500.55.133.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-default-debugsource-5.14.21-150500.55.133.1
* kernel-livepatch-SLE15-SP5_Update_34-debugsource-1-150500.11.3.1
* kernel-default-livepatch-5.14.21-150500.55.133.1
* kernel-livepatch-5_14_21-150500_55_133-default-1-150500.11.3.1
* kernel-default-livepatch-devel-5.14.21-150500.55.133.1
* kernel-default-debuginfo-5.14.21-150500.55.133.1
* kernel-livepatch-5_14_21-150500_55_133-default-debuginfo-1-150500.11.3.1
* openSUSE Leap 15.5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (noarch)
* kernel-macros-5.14.21-150500.55.133.1
* kernel-devel-5.14.21-150500.55.133.1
* kernel-source-vanilla-5.14.21-150500.55.133.1
* kernel-source-5.14.21-150500.55.133.1
* kernel-docs-html-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.133.1
* kernel-kvmsmall-debugsource-5.14.21-150500.55.133.1
* kernel-kvmsmall-devel-5.14.21-150500.55.133.1
* kernel-default-base-5.14.21-150500.55.133.1.150500.6.65.1
* kernel-default-base-rebuild-5.14.21-150500.55.133.1.150500.6.65.1
* kernel-kvmsmall-debuginfo-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kernel-default-livepatch-5.14.21-150500.55.133.1
* kernel-default-devel-5.14.21-150500.55.133.1
* kernel-default-optional-debuginfo-5.14.21-150500.55.133.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kselftests-kmp-default-debuginfo-5.14.21-150500.55.133.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kernel-default-optional-5.14.21-150500.55.133.1
* kselftests-kmp-default-5.14.21-150500.55.133.1
* kernel-default-extra-debuginfo-5.14.21-150500.55.133.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.133.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.133.1
* kernel-syms-5.14.21-150500.55.133.1
* dlm-kmp-default-5.14.21-150500.55.133.1
* kernel-default-extra-5.14.21-150500.55.133.1
* cluster-md-kmp-default-5.14.21-150500.55.133.1
* kernel-obs-build-5.14.21-150500.55.133.1
* ocfs2-kmp-default-5.14.21-150500.55.133.1
* kernel-default-debugsource-5.14.21-150500.55.133.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.133.1
* gfs2-kmp-default-5.14.21-150500.55.133.1
* reiserfs-kmp-default-5.14.21-150500.55.133.1
* kernel-obs-build-debugsource-5.14.21-150500.55.133.1
* kernel-obs-qa-5.14.21-150500.55.133.1
* kernel-default-debuginfo-5.14.21-150500.55.133.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_34-debugsource-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_55_133-default-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_55_133-default-debuginfo-1-150500.11.3.1
* kernel-default-livepatch-devel-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (x86_64)
* kernel-kvmsmall-vdso-5.14.21-150500.55.133.1
* kernel-default-vdso-5.14.21-150500.55.133.1
* kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.133.1
* kernel-default-vdso-debuginfo-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.133.1
* kernel-zfcpdump-debugsource-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (nosrc)
* dtb-aarch64-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (aarch64)
* dtb-amazon-5.14.21-150500.55.133.1
* dtb-lg-5.14.21-150500.55.133.1
* dtb-freescale-5.14.21-150500.55.133.1
* dtb-allwinner-5.14.21-150500.55.133.1
* kernel-64kb-extra-5.14.21-150500.55.133.1
* kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.133.1
* dlm-kmp-64kb-5.14.21-150500.55.133.1
* dtb-exynos-5.14.21-150500.55.133.1
* gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.133.1
* dtb-apple-5.14.21-150500.55.133.1
* dlm-kmp-64kb-debuginfo-5.14.21-150500.55.133.1
* kernel-64kb-extra-debuginfo-5.14.21-150500.55.133.1
* reiserfs-kmp-64kb-5.14.21-150500.55.133.1
* dtb-amlogic-5.14.21-150500.55.133.1
* gfs2-kmp-64kb-5.14.21-150500.55.133.1
* dtb-marvell-5.14.21-150500.55.133.1
* ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.133.1
* dtb-renesas-5.14.21-150500.55.133.1
* dtb-rockchip-5.14.21-150500.55.133.1
* dtb-nvidia-5.14.21-150500.55.133.1
* dtb-arm-5.14.21-150500.55.133.1
* cluster-md-kmp-64kb-5.14.21-150500.55.133.1
* kernel-64kb-devel-5.14.21-150500.55.133.1
* dtb-broadcom-5.14.21-150500.55.133.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.133.1
* dtb-sprd-5.14.21-150500.55.133.1
* kernel-64kb-optional-debuginfo-5.14.21-150500.55.133.1
* ocfs2-kmp-64kb-5.14.21-150500.55.133.1
* dtb-socionext-5.14.21-150500.55.133.1
* dtb-apm-5.14.21-150500.55.133.1
* dtb-mediatek-5.14.21-150500.55.133.1
* dtb-amd-5.14.21-150500.55.133.1
* dtb-qcom-5.14.21-150500.55.133.1
* cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.133.1
* kselftests-kmp-64kb-5.14.21-150500.55.133.1
* reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.133.1
* kernel-64kb-debugsource-5.14.21-150500.55.133.1
* kernel-64kb-debuginfo-5.14.21-150500.55.133.1
* kernel-64kb-optional-5.14.21-150500.55.133.1
* dtb-cavium-5.14.21-150500.55.133.1
* dtb-altera-5.14.21-150500.55.133.1
* dtb-hisilicon-5.14.21-150500.55.133.1
* dtb-xilinx-5.14.21-150500.55.133.1
* openSUSE Leap 15.5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.133.1

## References:

* https://www.suse.com/security/cve/CVE-2022-0854.html
* https://www.suse.com/security/cve/CVE-2022-48853.html
* https://www.suse.com/security/cve/CVE-2022-50614.html
* https://www.suse.com/security/cve/CVE-2022-50615.html
* https://www.suse.com/security/cve/CVE-2022-50617.html
* https://www.suse.com/security/cve/CVE-2022-50618.html
* https://www.suse.com/security/cve/CVE-2022-50619.html
* https://www.suse.com/security/cve/CVE-2022-50621.html
* https://www.suse.com/security/cve/CVE-2022-50622.html
* https://www.suse.com/security/cve/CVE-2022-50623.html
* https://www.suse.com/security/cve/CVE-2022-50625.html
* https://www.suse.com/security/cve/CVE-2022-50626.html
* https://www.suse.com/security/cve/CVE-2022-50629.html
* https://www.suse.com/security/cve/CVE-2022-50630.html
* https://www.suse.com/security/cve/CVE-2022-50633.html
* https://www.suse.com/security/cve/CVE-2022-50635.html
* https://www.suse.com/security/cve/CVE-2022-50636.html
* https://www.suse.com/security/cve/CVE-2022-50638.html
* https://www.suse.com/security/cve/CVE-2022-50640.html
* https://www.suse.com/security/cve/CVE-2022-50641.html
* https://www.suse.com/security/cve/CVE-2022-50643.html
* https://www.suse.com/security/cve/CVE-2022-50644.html
* https://www.suse.com/security/cve/CVE-2022-50646.html
* https://www.suse.com/security/cve/CVE-2022-50649.html
* https://www.suse.com/security/cve/CVE-2022-50652.html
* https://www.suse.com/security/cve/CVE-2022-50653.html
* https://www.suse.com/security/cve/CVE-2022-50656.html
* https://www.suse.com/security/cve/CVE-2022-50658.html
* https://www.suse.com/security/cve/CVE-2022-50660.html
* https://www.suse.com/security/cve/CVE-2022-50661.html
* https://www.suse.com/security/cve/CVE-2022-50662.html
* https://www.suse.com/security/cve/CVE-2022-50664.html
* https://www.suse.com/security/cve/CVE-2022-50665.html
* https://www.suse.com/security/cve/CVE-2022-50666.html
* https://www.suse.com/security/cve/CVE-2022-50667.html
* https://www.suse.com/security/cve/CVE-2022-50668.html
* https://www.suse.com/security/cve/CVE-2022-50669.html
* https://www.suse.com/security/cve/CVE-2022-50670.html
* https://www.suse.com/security/cve/CVE-2022-50671.html
* https://www.suse.com/security/cve/CVE-2022-50672.html
* https://www.suse.com/security/cve/CVE-2022-50673.html
* https://www.suse.com/security/cve/CVE-2022-50675.html
* https://www.suse.com/security/cve/CVE-2022-50677.html
* https://www.suse.com/security/cve/CVE-2022-50678.html
* https://www.suse.com/security/cve/CVE-2022-50679.html
* https://www.suse.com/security/cve/CVE-2022-50698.html
* https://www.suse.com/security/cve/CVE-2022-50699.html
* https://www.suse.com/security/cve/CVE-2022-50700.html
* https://www.suse.com/security/cve/CVE-2022-50701.html
* https://www.suse.com/security/cve/CVE-2022-50702.html
* https://www.suse.com/security/cve/CVE-2022-50703.html
* https://www.suse.com/security/cve/CVE-2022-50704.html
* https://www.suse.com/security/cve/CVE-2022-50705.html
* https://www.suse.com/security/cve/CVE-2022-50709.html
* https://www.suse.com/security/cve/CVE-2022-50710.html
* https://www.suse.com/security/cve/CVE-2022-50712.html
* https://www.suse.com/security/cve/CVE-2022-50714.html
* https://www.suse.com/security/cve/CVE-2022-50715.html
* https://www.suse.com/security/cve/CVE-2022-50716.html
* https://www.suse.com/security/cve/CVE-2022-50717.html
* https://www.suse.com/security/cve/CVE-2022-50718.html
* https://www.suse.com/security/cve/CVE-2022-50719.html
* https://www.suse.com/security/cve/CVE-2022-50722.html
* https://www.suse.com/security/cve/CVE-2022-50723.html
* https://www.suse.com/security/cve/CVE-2022-50724.html
* https://www.suse.com/security/cve/CVE-2022-50726.html
* https://www.suse.com/security/cve/CVE-2022-50727.html
* https://www.suse.com/security/cve/CVE-2022-50728.html
* https://www.suse.com/security/cve/CVE-2022-50730.html
* https://www.suse.com/security/cve/CVE-2022-50731.html
* https://www.suse.com/security/cve/CVE-2022-50732.html
* https://www.suse.com/security/cve/CVE-2022-50733.html
* https://www.suse.com/security/cve/CVE-2022-50735.html
* https://www.suse.com/security/cve/CVE-2022-50736.html
* https://www.suse.com/security/cve/CVE-2022-50738.html
* https://www.suse.com/security/cve/CVE-2022-50740.html
* https://www.suse.com/security/cve/CVE-2022-50742.html
* https://www.suse.com/security/cve/CVE-2022-50744.html
* https://www.suse.com/security/cve/CVE-2022-50745.html
* https://www.suse.com/security/cve/CVE-2022-50747.html
* https://www.suse.com/security/cve/CVE-2022-50749.html
* https://www.suse.com/security/cve/CVE-2022-50750.html
* https://www.suse.com/security/cve/CVE-2022-50751.html
* https://www.suse.com/security/cve/CVE-2022-50752.html
* https://www.suse.com/security/cve/CVE-2022-50754.html
* https://www.suse.com/security/cve/CVE-2022-50755.html
* https://www.suse.com/security/cve/CVE-2022-50756.html
* https://www.suse.com/security/cve/CVE-2022-50757.html
* https://www.suse.com/security/cve/CVE-2022-50758.html
* https://www.suse.com/security/cve/CVE-2022-50760.html
* https://www.suse.com/security/cve/CVE-2022-50761.html
* https://www.suse.com/security/cve/CVE-2022-50763.html
* https://www.suse.com/security/cve/CVE-2022-50767.html
* https://www.suse.com/security/cve/CVE-2022-50768.html
* https://www.suse.com/security/cve/CVE-2022-50769.html
* https://www.suse.com/security/cve/CVE-2022-50770.html
* https://www.suse.com/security/cve/CVE-2022-50773.html
* https://www.suse.com/security/cve/CVE-2022-50774.html
* https://www.suse.com/security/cve/CVE-2022-50776.html
* https://www.suse.com/security/cve/CVE-2022-50777.html
* https://www.suse.com/security/cve/CVE-2022-50779.html
* https://www.suse.com/security/cve/CVE-2022-50781.html
* https://www.suse.com/security/cve/CVE-2022-50782.html
* https://www.suse.com/security/cve/CVE-2022-50809.html
* https://www.suse.com/security/cve/CVE-2022-50814.html
* https://www.suse.com/security/cve/CVE-2022-50818.html
* https://www.suse.com/security/cve/CVE-2022-50819.html
* https://www.suse.com/security/cve/CVE-2022-50821.html
* https://www.suse.com/security/cve/CVE-2022-50822.html
* https://www.suse.com/security/cve/CVE-2022-50823.html
* https://www.suse.com/security/cve/CVE-2022-50824.html
* https://www.suse.com/security/cve/CVE-2022-50826.html
* https://www.suse.com/security/cve/CVE-2022-50827.html
* https://www.suse.com/security/cve/CVE-2022-50828.html
* https://www.suse.com/security/cve/CVE-2022-50829.html
* https://www.suse.com/security/cve/CVE-2022-50830.html
* https://www.suse.com/security/cve/CVE-2022-50832.html
* https://www.suse.com/security/cve/CVE-2022-50833.html
* https://www.suse.com/security/cve/CVE-2022-50834.html
* https://www.suse.com/security/cve/CVE-2022-50835.html
* https://www.suse.com/security/cve/CVE-2022-50836.html
* https://www.suse.com/security/cve/CVE-2022-50838.html
* https://www.suse.com/security/cve/CVE-2022-50839.html
* https://www.suse.com/security/cve/CVE-2022-50840.html
* https://www.suse.com/security/cve/CVE-2022-50842.html
* https://www.suse.com/security/cve/CVE-2022-50843.html
* https://www.suse.com/security/cve/CVE-2022-50844.html
* https://www.suse.com/security/cve/CVE-2022-50845.html
* https://www.suse.com/security/cve/CVE-2022-50846.html
* https://www.suse.com/security/cve/CVE-2022-50847.html
* https://www.suse.com/security/cve/CVE-2022-50848.html
* https://www.suse.com/security/cve/CVE-2022-50849.html
* https://www.suse.com/security/cve/CVE-2022-50850.html
* https://www.suse.com/security/cve/CVE-2022-50851.html
* https://www.suse.com/security/cve/CVE-2022-50853.html
* https://www.suse.com/security/cve/CVE-2022-50856.html
* https://www.suse.com/security/cve/CVE-2022-50858.html
* https://www.suse.com/security/cve/CVE-2022-50859.html
* https://www.suse.com/security/cve/CVE-2022-50860.html
* https://www.suse.com/security/cve/CVE-2022-50861.html
* https://www.suse.com/security/cve/CVE-2022-50862.html
* https://www.suse.com/security/cve/CVE-2022-50864.html
* https://www.suse.com/security/cve/CVE-2022-50866.html
* https://www.suse.com/security/cve/CVE-2022-50867.html
* https://www.suse.com/security/cve/CVE-2022-50868.html
* https://www.suse.com/security/cve/CVE-2022-50870.html
* https://www.suse.com/security/cve/CVE-2022-50872.html
* https://www.suse.com/security/cve/CVE-2022-50873.html
* https://www.suse.com/security/cve/CVE-2022-50876.html
* https://www.suse.com/security/cve/CVE-2022-50878.html
* https://www.suse.com/security/cve/CVE-2022-50880.html
* https://www.suse.com/security/cve/CVE-2022-50881.html
* https://www.suse.com/security/cve/CVE-2022-50882.html
* https://www.suse.com/security/cve/CVE-2022-50883.html
* https://www.suse.com/security/cve/CVE-2022-50884.html
* https://www.suse.com/security/cve/CVE-2022-50885.html
* https://www.suse.com/security/cve/CVE-2022-50886.html
* https://www.suse.com/security/cve/CVE-2022-50887.html
* https://www.suse.com/security/cve/CVE-2022-50888.html
* https://www.suse.com/security/cve/CVE-2022-50889.html
* https://www.suse.com/security/cve/CVE-2023-23559.html
* https://www.suse.com/security/cve/CVE-2023-53254.html
* https://www.suse.com/security/cve/CVE-2023-53743.html
* https://www.suse.com/security/cve/CVE-2023-53744.html
* https://www.suse.com/security/cve/CVE-2023-53746.html
* https://www.suse.com/security/cve/CVE-2023-53747.html
* https://www.suse.com/security/cve/CVE-2023-53751.html
* https://www.suse.com/security/cve/CVE-2023-53753.html
* https://www.suse.com/security/cve/CVE-2023-53754.html
* https://www.suse.com/security/cve/CVE-2023-53755.html
* https://www.suse.com/security/cve/CVE-2023-53761.html
* https://www.suse.com/security/cve/CVE-2023-53766.html
* https://www.suse.com/security/cve/CVE-2023-53769.html
* https://www.suse.com/security/cve/CVE-2023-53780.html
* https://www.suse.com/security/cve/CVE-2023-53781.html
* https://www.suse.com/security/cve/CVE-2023-53783.html
* https://www.suse.com/security/cve/CVE-2023-53786.html
* https://www.suse.com/security/cve/CVE-2023-53788.html
* https://www.suse.com/security/cve/CVE-2023-53792.html
* https://www.suse.com/security/cve/CVE-2023-53794.html
* https://www.suse.com/security/cve/CVE-2023-53801.html
* https://www.suse.com/security/cve/CVE-2023-53802.html
* https://www.suse.com/security/cve/CVE-2023-53803.html
* https://www.suse.com/security/cve/CVE-2023-53804.html
* https://www.suse.com/security/cve/CVE-2023-53806.html
* https://www.suse.com/security/cve/CVE-2023-53808.html
* https://www.suse.com/security/cve/CVE-2023-53811.html
* https://www.suse.com/security/cve/CVE-2023-53814.html
* https://www.suse.com/security/cve/CVE-2023-53816.html
* https://www.suse.com/security/cve/CVE-2023-53818.html
* https://www.suse.com/security/cve/CVE-2023-53819.html
* https://www.suse.com/security/cve/CVE-2023-53820.html
* https://www.suse.com/security/cve/CVE-2023-53827.html
* https://www.suse.com/security/cve/CVE-2023-53828.html
* https://www.suse.com/security/cve/CVE-2023-53830.html
* https://www.suse.com/security/cve/CVE-2023-53832.html
* https://www.suse.com/security/cve/CVE-2023-53833.html
* https://www.suse.com/security/cve/CVE-2023-53834.html
* https://www.suse.com/security/cve/CVE-2023-53837.html
* https://www.suse.com/security/cve/CVE-2023-53840.html
* https://www.suse.com/security/cve/CVE-2023-53842.html
* https://www.suse.com/security/cve/CVE-2023-53844.html
* https://www.suse.com/security/cve/CVE-2023-53845.html
* https://www.suse.com/security/cve/CVE-2023-53847.html
* https://www.suse.com/security/cve/CVE-2023-53848.html
* https://www.suse.com/security/cve/CVE-2023-53849.html
* https://www.suse.com/security/cve/CVE-2023-53850.html
* https://www.suse.com/security/cve/CVE-2023-53852.html
* https://www.suse.com/security/cve/CVE-2023-53858.html
* https://www.suse.com/security/cve/CVE-2023-53860.html
* https://www.suse.com/security/cve/CVE-2023-53862.html
* https://www.suse.com/security/cve/CVE-2023-53864.html
* https://www.suse.com/security/cve/CVE-2023-53866.html
* https://www.suse.com/security/cve/CVE-2023-53989.html
* https://www.suse.com/security/cve/CVE-2023-53990.html
* https://www.suse.com/security/cve/CVE-2023-53991.html
* https://www.suse.com/security/cve/CVE-2023-53996.html
* https://www.suse.com/security/cve/CVE-2023-53998.html
* https://www.suse.com/security/cve/CVE-2023-54001.html
* https://www.suse.com/security/cve/CVE-2023-54003.html
* https://www.suse.com/security/cve/CVE-2023-54007.html
* https://www.suse.com/security/cve/CVE-2023-54009.html
* https://www.suse.com/security/cve/CVE-2023-54010.html
* https://www.suse.com/security/cve/CVE-2023-54014.html
* https://www.suse.com/security/cve/CVE-2023-54015.html
* https://www.suse.com/security/cve/CVE-2023-54017.html
* https://www.suse.com/security/cve/CVE-2023-54018.html
* https://www.suse.com/security/cve/CVE-2023-54019.html
* https://www.suse.com/security/cve/CVE-2023-54020.html
* https://www.suse.com/security/cve/CVE-2023-54021.html
* https://www.suse.com/security/cve/CVE-2023-54024.html
* https://www.suse.com/security/cve/CVE-2023-54025.html
* https://www.suse.com/security/cve/CVE-2023-54026.html
* https://www.suse.com/security/cve/CVE-2023-54028.html
* https://www.suse.com/security/cve/CVE-2023-54036.html
* https://www.suse.com/security/cve/CVE-2023-54039.html
* https://www.suse.com/security/cve/CVE-2023-54040.html
* https://www.suse.com/security/cve/CVE-2023-54041.html
* https://www.suse.com/security/cve/CVE-2023-54042.html
* https://www.suse.com/security/cve/CVE-2023-54044.html
* https://www.suse.com/security/cve/CVE-2023-54045.html
* https://www.suse.com/security/cve/CVE-2023-54046.html
* https://www.suse.com/security/cve/CVE-2023-54047.html
* https://www.suse.com/security/cve/CVE-2023-54048.html
* https://www.suse.com/security/cve/CVE-2023-54049.html
* https://www.suse.com/security/cve/CVE-2023-54050.html
* https://www.suse.com/security/cve/CVE-2023-54051.html
* https://www.suse.com/security/cve/CVE-2023-54053.html
* https://www.suse.com/security/cve/CVE-2023-54055.html
* https://www.suse.com/security/cve/CVE-2023-54057.html
* https://www.suse.com/security/cve/CVE-2023-54058.html
* https://www.suse.com/security/cve/CVE-2023-54064.html
* https://www.suse.com/security/cve/CVE-2023-54070.html
* https://www.suse.com/security/cve/CVE-2023-54072.html
* https://www.suse.com/security/cve/CVE-2023-54074.html
* https://www.suse.com/security/cve/CVE-2023-54076.html
* https://www.suse.com/security/cve/CVE-2023-54078.html
* https://www.suse.com/security/cve/CVE-2023-54079.html
* https://www.suse.com/security/cve/CVE-2023-54083.html
* https://www.suse.com/security/cve/CVE-2023-54084.html
* https://www.suse.com/security/cve/CVE-2023-54090.html
* https://www.suse.com/security/cve/CVE-2023-54091.html
* https://www.suse.com/security/cve/CVE-2023-54092.html
* https://www.suse.com/security/cve/CVE-2023-54095.html
* https://www.suse.com/security/cve/CVE-2023-54096.html
* https://www.suse.com/security/cve/CVE-2023-54097.html
* https://www.suse.com/security/cve/CVE-2023-54098.html
* https://www.suse.com/security/cve/CVE-2023-54100.html
* https://www.suse.com/security/cve/CVE-2023-54102.html
* https://www.suse.com/security/cve/CVE-2023-54104.html
* https://www.suse.com/security/cve/CVE-2023-54106.html
* https://www.suse.com/security/cve/CVE-2023-54107.html
* https://www.suse.com/security/cve/CVE-2023-54108.html
* https://www.suse.com/security/cve/CVE-2023-54110.html
* https://www.suse.com/security/cve/CVE-2023-54111.html
* https://www.suse.com/security/cve/CVE-2023-54114.html
* https://www.suse.com/security/cve/CVE-2023-54115.html
* https://www.suse.com/security/cve/CVE-2023-54116.html
* https://www.suse.com/security/cve/CVE-2023-54118.html
* https://www.suse.com/security/cve/CVE-2023-54119.html
* https://www.suse.com/security/cve/CVE-2023-54120.html
* https://www.suse.com/security/cve/CVE-2023-54122.html
* https://www.suse.com/security/cve/CVE-2023-54123.html
* https://www.suse.com/security/cve/CVE-2023-54126.html
* https://www.suse.com/security/cve/CVE-2023-54127.html
* https://www.suse.com/security/cve/CVE-2023-54128.html
* https://www.suse.com/security/cve/CVE-2023-54130.html
* https://www.suse.com/security/cve/CVE-2023-54131.html
* https://www.suse.com/security/cve/CVE-2023-54132.html
* https://www.suse.com/security/cve/CVE-2023-54134.html
* https://www.suse.com/security/cve/CVE-2023-54136.html
* https://www.suse.com/security/cve/CVE-2023-54138.html
* https://www.suse.com/security/cve/CVE-2023-54140.html
* https://www.suse.com/security/cve/CVE-2023-54144.html
* https://www.suse.com/security/cve/CVE-2023-54146.html
* https://www.suse.com/security/cve/CVE-2023-54148.html
* https://www.suse.com/security/cve/CVE-2023-54150.html
* https://www.suse.com/security/cve/CVE-2023-54153.html
* https://www.suse.com/security/cve/CVE-2023-54156.html
* https://www.suse.com/security/cve/CVE-2023-54159.html
* https://www.suse.com/security/cve/CVE-2023-54164.html
* https://www.suse.com/security/cve/CVE-2023-54166.html
* https://www.suse.com/security/cve/CVE-2023-54168.html
* https://www.suse.com/security/cve/CVE-2023-54169.html
* https://www.suse.com/security/cve/CVE-2023-54170.html
* https://www.suse.com/security/cve/CVE-2023-54171.html
* https://www.suse.com/security/cve/CVE-2023-54173.html
* https://www.suse.com/security/cve/CVE-2023-54175.html
* https://www.suse.com/security/cve/CVE-2023-54177.html
* https://www.suse.com/security/cve/CVE-2023-54179.html
* https://www.suse.com/security/cve/CVE-2023-54183.html
* https://www.suse.com/security/cve/CVE-2023-54186.html
* https://www.suse.com/security/cve/CVE-2023-54189.html
* https://www.suse.com/security/cve/CVE-2023-54190.html
* https://www.suse.com/security/cve/CVE-2023-54194.html
* https://www.suse.com/security/cve/CVE-2023-54197.html
* https://www.suse.com/security/cve/CVE-2023-54198.html
* https://www.suse.com/security/cve/CVE-2023-54199.html
* https://www.suse.com/security/cve/CVE-2023-54201.html
* https://www.suse.com/security/cve/CVE-2023-54202.html
* https://www.suse.com/security/cve/CVE-2023-54205.html
* https://www.suse.com/security/cve/CVE-2023-54208.html
* https://www.suse.com/security/cve/CVE-2023-54210.html
* https://www.suse.com/security/cve/CVE-2023-54211.html
* https://www.suse.com/security/cve/CVE-2023-54213.html
* https://www.suse.com/security/cve/CVE-2023-54214.html
* https://www.suse.com/security/cve/CVE-2023-54219.html
* https://www.suse.com/security/cve/CVE-2023-54226.html
* https://www.suse.com/security/cve/CVE-2023-54229.html
* https://www.suse.com/security/cve/CVE-2023-54230.html
* https://www.suse.com/security/cve/CVE-2023-54234.html
* https://www.suse.com/security/cve/CVE-2023-54236.html
* https://www.suse.com/security/cve/CVE-2023-54238.html
* https://www.suse.com/security/cve/CVE-2023-54242.html
* https://www.suse.com/security/cve/CVE-2023-54244.html
* https://www.suse.com/security/cve/CVE-2023-54245.html
* https://www.suse.com/security/cve/CVE-2023-54251.html
* https://www.suse.com/security/cve/CVE-2023-54252.html
* https://www.suse.com/security/cve/CVE-2023-54254.html
* https://www.suse.com/security/cve/CVE-2023-54260.html
* https://www.suse.com/security/cve/CVE-2023-54262.html
* https://www.suse.com/security/cve/CVE-2023-54264.html
* https://www.suse.com/security/cve/CVE-2023-54266.html
* https://www.suse.com/security/cve/CVE-2023-54267.html
* https://www.suse.com/security/cve/CVE-2023-54269.html
* https://www.suse.com/security/cve/CVE-2023-54270.html
* https://www.suse.com/security/cve/CVE-2023-54271.html
* https://www.suse.com/security/cve/CVE-2023-54274.html
* https://www.suse.com/security/cve/CVE-2023-54275.html
* https://www.suse.com/security/cve/CVE-2023-54277.html
* https://www.suse.com/security/cve/CVE-2023-54280.html
* https://www.suse.com/security/cve/CVE-2023-54284.html
* https://www.suse.com/security/cve/CVE-2023-54286.html
* https://www.suse.com/security/cve/CVE-2023-54287.html
* https://www.suse.com/security/cve/CVE-2023-54289.html
* https://www.suse.com/security/cve/CVE-2023-54292.html
* https://www.suse.com/security/cve/CVE-2023-54293.html
* https://www.suse.com/security/cve/CVE-2023-54294.html
* https://www.suse.com/security/cve/CVE-2023-54295.html
* https://www.suse.com/security/cve/CVE-2023-54298.html
* https://www.suse.com/security/cve/CVE-2023-54299.html
* https://www.suse.com/security/cve/CVE-2023-54300.html
* https://www.suse.com/security/cve/CVE-2023-54301.html
* https://www.suse.com/security/cve/CVE-2023-54302.html
* https://www.suse.com/security/cve/CVE-2023-54304.html
* https://www.suse.com/security/cve/CVE-2023-54305.html
* https://www.suse.com/security/cve/CVE-2023-54309.html
* https://www.suse.com/security/cve/CVE-2023-54311.html
* https://www.suse.com/security/cve/CVE-2023-54315.html
* https://www.suse.com/security/cve/CVE-2023-54317.html
* https://www.suse.com/security/cve/CVE-2023-54319.html
* https://www.suse.com/security/cve/CVE-2023-54320.html
* https://www.suse.com/security/cve/CVE-2023-54321.html
* https://www.suse.com/security/cve/CVE-2023-54322.html
* https://www.suse.com/security/cve/CVE-2023-54325.html
* https://www.suse.com/security/cve/CVE-2023-54326.html
* https://www.suse.com/security/cve/CVE-2024-36933.html
* https://www.suse.com/security/cve/CVE-2024-53093.html
* https://www.suse.com/security/cve/CVE-2024-56590.html
* https://www.suse.com/security/cve/CVE-2025-39977.html
* https://www.suse.com/security/cve/CVE-2025-40019.html
* https://www.suse.com/security/cve/CVE-2025-40139.html
* https://www.suse.com/security/cve/CVE-2025-40215.html
* https://www.suse.com/security/cve/CVE-2025-40220.html
* https://www.suse.com/security/cve/CVE-2025-40233.html
* https://www.suse.com/security/cve/CVE-2025-40256.html
* https://www.suse.com/security/cve/CVE-2025-40258.html
* https://www.suse.com/security/cve/CVE-2025-40277.html
* https://www.suse.com/security/cve/CVE-2025-40280.html
* https://www.suse.com/security/cve/CVE-2025-40331.html
* https://www.suse.com/security/cve/CVE-2025-68218.html
* https://www.suse.com/security/cve/CVE-2025-68732.html
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1193629
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1196823
* https://bugzilla.suse.com/show_bug.cgi?id=1204957
* https://bugzilla.suse.com/show_bug.cgi?id=1205567
* https://bugzilla.suse.com/show_bug.cgi?id=1206451
* https://bugzilla.suse.com/show_bug.cgi?id=1206843
* https://bugzilla.suse.com/show_bug.cgi?id=1206889
* https://bugzilla.suse.com/show_bug.cgi?id=1207051
* https://bugzilla.suse.com/show_bug.cgi?id=1207088
* https://bugzilla.suse.com/show_bug.cgi?id=1207315
* https://bugzilla.suse.com/show_bug.cgi?id=1207611
* https://bugzilla.suse.com/show_bug.cgi?id=1207620
* https://bugzilla.suse.com/show_bug.cgi?id=1207622
* https://bugzilla.suse.com/show_bug.cgi?id=1207636
* https://bugzilla.suse.com/show_bug.cgi?id=1207644
* https://bugzilla.suse.com/show_bug.cgi?id=1207646
* https://bugzilla.suse.com/show_bug.cgi?id=1207652
* https://bugzilla.suse.com/show_bug.cgi?id=1207653
* https://bugzilla.suse.com/show_bug.cgi?id=1208570
* https://bugzilla.suse.com/show_bug.cgi?id=1208758
* https://bugzilla.suse.com/show_bug.cgi?id=1209799
* https://bugzilla.suse.com/show_bug.cgi?id=1209980
* https://bugzilla.suse.com/show_bug.cgi?id=1210644
* https://bugzilla.suse.com/show_bug.cgi?id=1210817
* https://bugzilla.suse.com/show_bug.cgi?id=1210943
* https://bugzilla.suse.com/show_bug.cgi?id=1211690
* https://bugzilla.suse.com/show_bug.cgi?id=1213025
* https://bugzilla.suse.com/show_bug.cgi?id=1213032
* https://bugzilla.suse.com/show_bug.cgi?id=1213093
* https://bugzilla.suse.com/show_bug.cgi?id=1213105
* https://bugzilla.suse.com/show_bug.cgi?id=1213110
* https://bugzilla.suse.com/show_bug.cgi?id=1213111
* https://bugzilla.suse.com/show_bug.cgi?id=1213653
* https://bugzilla.suse.com/show_bug.cgi?id=1213747
* https://bugzilla.suse.com/show_bug.cgi?id=1213867
* https://bugzilla.suse.com/show_bug.cgi?id=1214635
* https://bugzilla.suse.com/show_bug.cgi?id=1214940
* https://bugzilla.suse.com/show_bug.cgi?id=1214962
* https://bugzilla.suse.com/show_bug.cgi?id=1214986
* https://bugzilla.suse.com/show_bug.cgi?id=1214990
* https://bugzilla.suse.com/show_bug.cgi?id=1216062
* https://bugzilla.suse.com/show_bug.cgi?id=1224573
* https://bugzilla.suse.com/show_bug.cgi?id=1225832
* https://bugzilla.suse.com/show_bug.cgi?id=1226797
* https://bugzilla.suse.com/show_bug.cgi?id=1226846
* https://bugzilla.suse.com/show_bug.cgi?id=1228015
* https://bugzilla.suse.com/show_bug.cgi?id=1233640
* https://bugzilla.suse.com/show_bug.cgi?id=1235038
* https://bugzilla.suse.com/show_bug.cgi?id=1237563
* https://bugzilla.suse.com/show_bug.cgi?id=1249871
* https://bugzilla.suse.com/show_bug.cgi?id=1252046
* https://bugzilla.suse.com/show_bug.cgi?id=1252678
* https://bugzilla.suse.com/show_bug.cgi?id=1253409
* https://bugzilla.suse.com/show_bug.cgi?id=1254392
* https://bugzilla.suse.com/show_bug.cgi?id=1254520
* https://bugzilla.suse.com/show_bug.cgi?id=1254559
* https://bugzilla.suse.com/show_bug.cgi?id=1254562
* https://bugzilla.suse.com/show_bug.cgi?id=1254572
* https://bugzilla.suse.com/show_bug.cgi?id=1254578
* https://bugzilla.suse.com/show_bug.cgi?id=1254580
* https://bugzilla.suse.com/show_bug.cgi?id=1254592
* https://bugzilla.suse.com/show_bug.cgi?id=1254601
* https://bugzilla.suse.com/show_bug.cgi?id=1254608
* https://bugzilla.suse.com/show_bug.cgi?id=1254609
* https://bugzilla.suse.com/show_bug.cgi?id=1254614
* https://bugzilla.suse.com/show_bug.cgi?id=1254615
* https://bugzilla.suse.com/show_bug.cgi?id=1254617
* https://bugzilla.suse.com/show_bug.cgi?id=1254623
* https://bugzilla.suse.com/show_bug.cgi?id=1254625
* https://bugzilla.suse.com/show_bug.cgi?id=1254626
* https://bugzilla.suse.com/show_bug.cgi?id=1254631
* https://bugzilla.suse.com/show_bug.cgi?id=1254632
* https://bugzilla.suse.com/show_bug.cgi?id=1254634
* https://bugzilla.suse.com/show_bug.cgi?id=1254644
* https://bugzilla.suse.com/show_bug.cgi?id=1254645
* https://bugzilla.suse.com/show_bug.cgi?id=1254649
* https://bugzilla.suse.com/show_bug.cgi?id=1254651
* https://bugzilla.suse.com/show_bug.cgi?id=1254653
* https://bugzilla.suse.com/show_bug.cgi?id=1254656
* https://bugzilla.suse.com/show_bug.cgi?id=1254658
* https://bugzilla.suse.com/show_bug.cgi?id=1254660
* https://bugzilla.suse.com/show_bug.cgi?id=1254664
* https://bugzilla.suse.com/show_bug.cgi?id=1254671
* https://bugzilla.suse.com/show_bug.cgi?id=1254674
* https://bugzilla.suse.com/show_bug.cgi?id=1254676
* https://bugzilla.suse.com/show_bug.cgi?id=1254677
* https://bugzilla.suse.com/show_bug.cgi?id=1254681
* https://bugzilla.suse.com/show_bug.cgi?id=1254684
* https://bugzilla.suse.com/show_bug.cgi?id=1254685
* https://bugzilla.suse.com/show_bug.cgi?id=1254686
* https://bugzilla.suse.com/show_bug.cgi?id=1254690
* https://bugzilla.suse.com/show_bug.cgi?id=1254692
* https://bugzilla.suse.com/show_bug.cgi?id=1254694
* https://bugzilla.suse.com/show_bug.cgi?id=1254696
* https://bugzilla.suse.com/show_bug.cgi?id=1254698
* https://bugzilla.suse.com/show_bug.cgi?id=1254699
* https://bugzilla.suse.com/show_bug.cgi?id=1254704
* https://bugzilla.suse.com/show_bug.cgi?id=1254706
* https://bugzilla.suse.com/show_bug.cgi?id=1254709
* https://bugzilla.suse.com/show_bug.cgi?id=1254710
* https://bugzilla.suse.com/show_bug.cgi?id=1254711
* https://bugzilla.suse.com/show_bug.cgi?id=1254712
* https://bugzilla.suse.com/show_bug.cgi?id=1254713
* https://bugzilla.suse.com/show_bug.cgi?id=1254714
* https://bugzilla.suse.com/show_bug.cgi?id=1254716
* https://bugzilla.suse.com/show_bug.cgi?id=1254723
* https://bugzilla.suse.com/show_bug.cgi?id=1254725
* https://bugzilla.suse.com/show_bug.cgi?id=1254728
* https://bugzilla.suse.com/show_bug.cgi?id=1254729
* https://bugzilla.suse.com/show_bug.cgi?id=1254743
* https://bugzilla.suse.com/show_bug.cgi?id=1254745
* https://bugzilla.suse.com/show_bug.cgi?id=1254751
* https://bugzilla.suse.com/show_bug.cgi?id=1254753
* https://bugzilla.suse.com/show_bug.cgi?id=1254754
* https://bugzilla.suse.com/show_bug.cgi?id=1254756
* https://bugzilla.suse.com/show_bug.cgi?id=1254759
* https://bugzilla.suse.com/show_bug.cgi?id=1254763
* https://bugzilla.suse.com/show_bug.cgi?id=1254775
* https://bugzilla.suse.com/show_bug.cgi?id=1254780
* https://bugzilla.suse.com/show_bug.cgi?id=1254781
* https://bugzilla.suse.com/show_bug.cgi?id=1254782
* https://bugzilla.suse.com/show_bug.cgi?id=1254783
* https://bugzilla.suse.com/show_bug.cgi?id=1254785
* https://bugzilla.suse.com/show_bug.cgi?id=1254786
* https://bugzilla.suse.com/show_bug.cgi?id=1254788
* https://bugzilla.suse.com/show_bug.cgi?id=1254789
* https://bugzilla.suse.com/show_bug.cgi?id=1254792
* https://bugzilla.suse.com/show_bug.cgi?id=1254813
* https://bugzilla.suse.com/show_bug.cgi?id=1254843
* https://bugzilla.suse.com/show_bug.cgi?id=1254847
* https://bugzilla.suse.com/show_bug.cgi?id=1254851
* https://bugzilla.suse.com/show_bug.cgi?id=1254894
* https://bugzilla.suse.com/show_bug.cgi?id=1254902
* https://bugzilla.suse.com/show_bug.cgi?id=1254910
* https://bugzilla.suse.com/show_bug.cgi?id=1254911
* https://bugzilla.suse.com/show_bug.cgi?id=1254915
* https://bugzilla.suse.com/show_bug.cgi?id=1254916
* https://bugzilla.suse.com/show_bug.cgi?id=1254917
* https://bugzilla.suse.com/show_bug.cgi?id=1254920
* https://bugzilla.suse.com/show_bug.cgi?id=1254922
* https://bugzilla.suse.com/show_bug.cgi?id=1254958
* https://bugzilla.suse.com/show_bug.cgi?id=1254959
* https://bugzilla.suse.com/show_bug.cgi?id=1254974
* https://bugzilla.suse.com/show_bug.cgi?id=1254979
* https://bugzilla.suse.com/show_bug.cgi?id=1254986
* https://bugzilla.suse.com/show_bug.cgi?id=1254994
* https://bugzilla.suse.com/show_bug.cgi?id=1255002
* https://bugzilla.suse.com/show_bug.cgi?id=1255005
* https://bugzilla.suse.com/show_bug.cgi?id=1255007
* https://bugzilla.suse.com/show_bug.cgi?id=1255049
* https://bugzilla.suse.com/show_bug.cgi?id=1255060
* https://bugzilla.suse.com/show_bug.cgi?id=1255107
* https://bugzilla.suse.com/show_bug.cgi?id=1255163
* https://bugzilla.suse.com/show_bug.cgi?id=1255165
* https://bugzilla.suse.com/show_bug.cgi?id=1255245
* https://bugzilla.suse.com/show_bug.cgi?id=1255467
* https://bugzilla.suse.com/show_bug.cgi?id=1255469
* https://bugzilla.suse.com/show_bug.cgi?id=1255521
* https://bugzilla.suse.com/show_bug.cgi?id=1255528
* https://bugzilla.suse.com/show_bug.cgi?id=1255532
* https://bugzilla.suse.com/show_bug.cgi?id=1255546
* https://bugzilla.suse.com/show_bug.cgi?id=1255549
* https://bugzilla.suse.com/show_bug.cgi?id=1255554
* https://bugzilla.suse.com/show_bug.cgi?id=1255555
* https://bugzilla.suse.com/show_bug.cgi?id=1255558
* https://bugzilla.suse.com/show_bug.cgi?id=1255560
* https://bugzilla.suse.com/show_bug.cgi?id=1255561
* https://bugzilla.suse.com/show_bug.cgi?id=1255562
* https://bugzilla.suse.com/show_bug.cgi?id=1255565
* https://bugzilla.suse.com/show_bug.cgi?id=1255574
* https://bugzilla.suse.com/show_bug.cgi?id=1255576
* https://bugzilla.suse.com/show_bug.cgi?id=1255578
* https://bugzilla.suse.com/show_bug.cgi?id=1255582
* https://bugzilla.suse.com/show_bug.cgi?id=1255596
* https://bugzilla.suse.com/show_bug.cgi?id=1255600
* https://bugzilla.suse.com/show_bug.cgi?id=1255605
* https://bugzilla.suse.com/show_bug.cgi?id=1255607
* https://bugzilla.suse.com/show_bug.cgi?id=1255608
* https://bugzilla.suse.com/show_bug.cgi?id=1255609
* https://bugzilla.suse.com/show_bug.cgi?id=1255618
* https://bugzilla.suse.com/show_bug.cgi?id=1255619
* https://bugzilla.suse.com/show_bug.cgi?id=1255620
* https://bugzilla.suse.com/show_bug.cgi?id=1255623
* https://bugzilla.suse.com/show_bug.cgi?id=1255624
* https://bugzilla.suse.com/show_bug.cgi?id=1255626
* https://bugzilla.suse.com/show_bug.cgi?id=1255627
* https://bugzilla.suse.com/show_bug.cgi?id=1255628
* https://bugzilla.suse.com/show_bug.cgi?id=1255635
* https://bugzilla.suse.com/show_bug.cgi?id=1255636
* https://bugzilla.suse.com/show_bug.cgi?id=1255688
* https://bugzilla.suse.com/show_bug.cgi?id=1255690
* https://bugzilla.suse.com/show_bug.cgi?id=1255697
* https://bugzilla.suse.com/show_bug.cgi?id=1255702
* https://bugzilla.suse.com/show_bug.cgi?id=1255704
* https://bugzilla.suse.com/show_bug.cgi?id=1255745
* https://bugzilla.suse.com/show_bug.cgi?id=1255747
* https://bugzilla.suse.com/show_bug.cgi?id=1255749
* https://bugzilla.suse.com/show_bug.cgi?id=1255750
* https://bugzilla.suse.com/show_bug.cgi?id=1255757
* https://bugzilla.suse.com/show_bug.cgi?id=1255758
* https://bugzilla.suse.com/show_bug.cgi?id=1255760
* https://bugzilla.suse.com/show_bug.cgi?id=1255761
* https://bugzilla.suse.com/show_bug.cgi?id=1255762
* https://bugzilla.suse.com/show_bug.cgi?id=1255763
* https://bugzilla.suse.com/show_bug.cgi?id=1255769
* https://bugzilla.suse.com/show_bug.cgi?id=1255771
* https://bugzilla.suse.com/show_bug.cgi?id=1255773
* https://bugzilla.suse.com/show_bug.cgi?id=1255780
* https://bugzilla.suse.com/show_bug.cgi?id=1255786
* https://bugzilla.suse.com/show_bug.cgi?id=1255787
* https://bugzilla.suse.com/show_bug.cgi?id=1255789
* https://bugzilla.suse.com/show_bug.cgi?id=1255790
* https://bugzilla.suse.com/show_bug.cgi?id=1255791
* https://bugzilla.suse.com/show_bug.cgi?id=1255792
* https://bugzilla.suse.com/show_bug.cgi?id=1255796
* https://bugzilla.suse.com/show_bug.cgi?id=1255797
* https://bugzilla.suse.com/show_bug.cgi?id=1255800
* https://bugzilla.suse.com/show_bug.cgi?id=1255801
* https://bugzilla.suse.com/show_bug.cgi?id=1255802
* https://bugzilla.suse.com/show_bug.cgi?id=1255803
* https://bugzilla.suse.com/show_bug.cgi?id=1255804
* https://bugzilla.suse.com/show_bug.cgi?id=1255806
* https://bugzilla.suse.com/show_bug.cgi?id=1255808
* https://bugzilla.suse.com/show_bug.cgi?id=1255819
* https://bugzilla.suse.com/show_bug.cgi?id=1255839
* https://bugzilla.suse.com/show_bug.cgi?id=1255841
* https://bugzilla.suse.com/show_bug.cgi?id=1255843
* https://bugzilla.suse.com/show_bug.cgi?id=1255844
* https://bugzilla.suse.com/show_bug.cgi?id=1255872
* https://bugzilla.suse.com/show_bug.cgi?id=1255875
* https://bugzilla.suse.com/show_bug.cgi?id=1255876
* https://bugzilla.suse.com/show_bug.cgi?id=1255877
* https://bugzilla.suse.com/show_bug.cgi?id=1255878
* https://bugzilla.suse.com/show_bug.cgi?id=1255880
* https://bugzilla.suse.com/show_bug.cgi?id=1255881
* https://bugzilla.suse.com/show_bug.cgi?id=1255888
* https://bugzilla.suse.com/show_bug.cgi?id=1255889
* https://bugzilla.suse.com/show_bug.cgi?id=1255890
* https://bugzilla.suse.com/show_bug.cgi?id=1255899
* https://bugzilla.suse.com/show_bug.cgi?id=1255901
* https://bugzilla.suse.com/show_bug.cgi?id=1255902
* https://bugzilla.suse.com/show_bug.cgi?id=1255905
* https://bugzilla.suse.com/show_bug.cgi?id=1255906
* https://bugzilla.suse.com/show_bug.cgi?id=1255909
* https://bugzilla.suse.com/show_bug.cgi?id=1255910
* https://bugzilla.suse.com/show_bug.cgi?id=1255912
* https://bugzilla.suse.com/show_bug.cgi?id=1255916
* https://bugzilla.suse.com/show_bug.cgi?id=1255919
* https://bugzilla.suse.com/show_bug.cgi?id=1255920
* https://bugzilla.suse.com/show_bug.cgi?id=1255922
* https://bugzilla.suse.com/show_bug.cgi?id=1255924
* https://bugzilla.suse.com/show_bug.cgi?id=1255925
* https://bugzilla.suse.com/show_bug.cgi?id=1255939
* https://bugzilla.suse.com/show_bug.cgi?id=1255946
* https://bugzilla.suse.com/show_bug.cgi?id=1255950
* https://bugzilla.suse.com/show_bug.cgi?id=1255953
* https://bugzilla.suse.com/show_bug.cgi?id=1255954
* https://bugzilla.suse.com/show_bug.cgi?id=1255955
* https://bugzilla.suse.com/show_bug.cgi?id=1255962
* https://bugzilla.suse.com/show_bug.cgi?id=1255964
* https://bugzilla.suse.com/show_bug.cgi?id=1255968
* https://bugzilla.suse.com/show_bug.cgi?id=1255969
* https://bugzilla.suse.com/show_bug.cgi?id=1255970
* https://bugzilla.suse.com/show_bug.cgi?id=1255971
* https://bugzilla.suse.com/show_bug.cgi?id=1255974
* https://bugzilla.suse.com/show_bug.cgi?id=1255978
* https://bugzilla.suse.com/show_bug.cgi?id=1255979
* https://bugzilla.suse.com/show_bug.cgi?id=1255983
* https://bugzilla.suse.com/show_bug.cgi?id=1255985
* https://bugzilla.suse.com/show_bug.cgi?id=1255990
* https://bugzilla.suse.com/show_bug.cgi?id=1255993
* https://bugzilla.suse.com/show_bug.cgi?id=1255994
* https://bugzilla.suse.com/show_bug.cgi?id=1255996
* https://bugzilla.suse.com/show_bug.cgi?id=1255998
* https://bugzilla.suse.com/show_bug.cgi?id=1256034
* https://bugzilla.suse.com/show_bug.cgi?id=1256040
* https://bugzilla.suse.com/show_bug.cgi?id=1256042
* https://bugzilla.suse.com/show_bug.cgi?id=1256045
* https://bugzilla.suse.com/show_bug.cgi?id=1256046
* https://bugzilla.suse.com/show_bug.cgi?id=1256048
* https://bugzilla.suse.com/show_bug.cgi?id=1256049
* https://bugzilla.suse.com/show_bug.cgi?id=1256050
* https://bugzilla.suse.com/show_bug.cgi?id=1256053
* https://bugzilla.suse.com/show_bug.cgi?id=1256056
* https://bugzilla.suse.com/show_bug.cgi?id=1256057
* https://bugzilla.suse.com/show_bug.cgi?id=1256062
* https://bugzilla.suse.com/show_bug.cgi?id=1256063
* https://bugzilla.suse.com/show_bug.cgi?id=1256064
* https://bugzilla.suse.com/show_bug.cgi?id=1256065
* https://bugzilla.suse.com/show_bug.cgi?id=1256071
* https://bugzilla.suse.com/show_bug.cgi?id=1256074
* https://bugzilla.suse.com/show_bug.cgi?id=1256081
* https://bugzilla.suse.com/show_bug.cgi?id=1256084
* https://bugzilla.suse.com/show_bug.cgi?id=1256086
* https://bugzilla.suse.com/show_bug.cgi?id=1256088
* https://bugzilla.suse.com/show_bug.cgi?id=1256091
* https://bugzilla.suse.com/show_bug.cgi?id=1256093
* https://bugzilla.suse.com/show_bug.cgi?id=1256099
* https://bugzilla.suse.com/show_bug.cgi?id=1256101
* https://bugzilla.suse.com/show_bug.cgi?id=1256103
* https://bugzilla.suse.com/show_bug.cgi?id=1256106
* https://bugzilla.suse.com/show_bug.cgi?id=1256111
* https://bugzilla.suse.com/show_bug.cgi?id=1256112
* https://bugzilla.suse.com/show_bug.cgi?id=1256114
* https://bugzilla.suse.com/show_bug.cgi?id=1256115
* https://bugzilla.suse.com/show_bug.cgi?id=1256118
* https://bugzilla.suse.com/show_bug.cgi?id=1256119
* https://bugzilla.suse.com/show_bug.cgi?id=1256121
* https://bugzilla.suse.com/show_bug.cgi?id=1256122
* https://bugzilla.suse.com/show_bug.cgi?id=1256124
* https://bugzilla.suse.com/show_bug.cgi?id=1256125
* https://bugzilla.suse.com/show_bug.cgi?id=1256126
* https://bugzilla.suse.com/show_bug.cgi?id=1256127
* https://bugzilla.suse.com/show_bug.cgi?id=1256128
* https://bugzilla.suse.com/show_bug.cgi?id=1256130
* https://bugzilla.suse.com/show_bug.cgi?id=1256131
* https://bugzilla.suse.com/show_bug.cgi?id=1256132
* https://bugzilla.suse.com/show_bug.cgi?id=1256133
* https://bugzilla.suse.com/show_bug.cgi?id=1256136
* https://bugzilla.suse.com/show_bug.cgi?id=1256137
* https://bugzilla.suse.com/show_bug.cgi?id=1256140
* https://bugzilla.suse.com/show_bug.cgi?id=1256141
* https://bugzilla.suse.com/show_bug.cgi?id=1256142
* https://bugzilla.suse.com/show_bug.cgi?id=1256143
* https://bugzilla.suse.com/show_bug.cgi?id=1256144
* https://bugzilla.suse.com/show_bug.cgi?id=1256145
* https://bugzilla.suse.com/show_bug.cgi?id=1256149
* https://bugzilla.suse.com/show_bug.cgi?id=1256150
* https://bugzilla.suse.com/show_bug.cgi?id=1256152
* https://bugzilla.suse.com/show_bug.cgi?id=1256154
* https://bugzilla.suse.com/show_bug.cgi?id=1256155
* https://bugzilla.suse.com/show_bug.cgi?id=1256157
* https://bugzilla.suse.com/show_bug.cgi?id=1256158
* https://bugzilla.suse.com/show_bug.cgi?id=1256162
* https://bugzilla.suse.com/show_bug.cgi?id=1256164
* https://bugzilla.suse.com/show_bug.cgi?id=1256165
* https://bugzilla.suse.com/show_bug.cgi?id=1256166
* https://bugzilla.suse.com/show_bug.cgi?id=1256167
* https://bugzilla.suse.com/show_bug.cgi?id=1256172
* https://bugzilla.suse.com/show_bug.cgi?id=1256173
* https://bugzilla.suse.com/show_bug.cgi?id=1256174
* https://bugzilla.suse.com/show_bug.cgi?id=1256177
* https://bugzilla.suse.com/show_bug.cgi?id=1256178
* https://bugzilla.suse.com/show_bug.cgi?id=1256179
* https://bugzilla.suse.com/show_bug.cgi?id=1256182
* https://bugzilla.suse.com/show_bug.cgi?id=1256184
* https://bugzilla.suse.com/show_bug.cgi?id=1256185
* https://bugzilla.suse.com/show_bug.cgi?id=1256186
* https://bugzilla.suse.com/show_bug.cgi?id=1256188
* https://bugzilla.suse.com/show_bug.cgi?id=1256189
* https://bugzilla.suse.com/show_bug.cgi?id=1256191
* https://bugzilla.suse.com/show_bug.cgi?id=1256192
* https://bugzilla.suse.com/show_bug.cgi?id=1256193
* https://bugzilla.suse.com/show_bug.cgi?id=1256194
* https://bugzilla.suse.com/show_bug.cgi?id=1256196
* https://bugzilla.suse.com/show_bug.cgi?id=1256198
* https://bugzilla.suse.com/show_bug.cgi?id=1256199
* https://bugzilla.suse.com/show_bug.cgi?id=1256200
* https://bugzilla.suse.com/show_bug.cgi?id=1256202
* https://bugzilla.suse.com/show_bug.cgi?id=1256203
* https://bugzilla.suse.com/show_bug.cgi?id=1256204
* https://bugzilla.suse.com/show_bug.cgi?id=1256205
* https://bugzilla.suse.com/show_bug.cgi?id=1256206
* https://bugzilla.suse.com/show_bug.cgi?id=1256207
* https://bugzilla.suse.com/show_bug.cgi?id=1256208
* https://bugzilla.suse.com/show_bug.cgi?id=1256211
* https://bugzilla.suse.com/show_bug.cgi?id=1256214
* https://bugzilla.suse.com/show_bug.cgi?id=1256215
* https://bugzilla.suse.com/show_bug.cgi?id=1256216
* https://bugzilla.suse.com/show_bug.cgi?id=1256218
* https://bugzilla.suse.com/show_bug.cgi?id=1256219
* https://bugzilla.suse.com/show_bug.cgi?id=1256220
* https://bugzilla.suse.com/show_bug.cgi?id=1256221
* https://bugzilla.suse.com/show_bug.cgi?id=1256223
* https://bugzilla.suse.com/show_bug.cgi?id=1256228
* https://bugzilla.suse.com/show_bug.cgi?id=1256230
* https://bugzilla.suse.com/show_bug.cgi?id=1256231
* https://bugzilla.suse.com/show_bug.cgi?id=1256235
* https://bugzilla.suse.com/show_bug.cgi?id=1256239
* https://bugzilla.suse.com/show_bug.cgi?id=1256241
* https://bugzilla.suse.com/show_bug.cgi?id=1256242
* https://bugzilla.suse.com/show_bug.cgi?id=1256245
* https://bugzilla.suse.com/show_bug.cgi?id=1256248
* https://bugzilla.suse.com/show_bug.cgi?id=1256250
* https://bugzilla.suse.com/show_bug.cgi?id=1256254
* https://bugzilla.suse.com/show_bug.cgi?id=1256260
* https://bugzilla.suse.com/show_bug.cgi?id=1256265
* https://bugzilla.suse.com/show_bug.cgi?id=1256269
* https://bugzilla.suse.com/show_bug.cgi?id=1256271
* https://bugzilla.suse.com/show_bug.cgi?id=1256274
* https://bugzilla.suse.com/show_bug.cgi?id=1256282
* https://bugzilla.suse.com/show_bug.cgi?id=1256285
* https://bugzilla.suse.com/show_bug.cgi?id=1256291
* https://bugzilla.suse.com/show_bug.cgi?id=1256294
* https://bugzilla.suse.com/show_bug.cgi?id=1256295
* https://bugzilla.suse.com/show_bug.cgi?id=1256300
* https://bugzilla.suse.com/show_bug.cgi?id=1256302
* https://bugzilla.suse.com/show_bug.cgi?id=1256306
* https://bugzilla.suse.com/show_bug.cgi?id=1256309
* https://bugzilla.suse.com/show_bug.cgi?id=1256317
* https://bugzilla.suse.com/show_bug.cgi?id=1256320
* https://bugzilla.suse.com/show_bug.cgi?id=1256323
* https://bugzilla.suse.com/show_bug.cgi?id=1256326
* https://bugzilla.suse.com/show_bug.cgi?id=1256328
* https://bugzilla.suse.com/show_bug.cgi?id=1256333
* https://bugzilla.suse.com/show_bug.cgi?id=1256334
* https://bugzilla.suse.com/show_bug.cgi?id=1256335
* https://bugzilla.suse.com/show_bug.cgi?id=1256337
* https://bugzilla.suse.com/show_bug.cgi?id=1256338
* https://bugzilla.suse.com/show_bug.cgi?id=1256344
* https://bugzilla.suse.com/show_bug.cgi?id=1256346
* https://bugzilla.suse.com/show_bug.cgi?id=1256349
* https://bugzilla.suse.com/show_bug.cgi?id=1256352
* https://bugzilla.suse.com/show_bug.cgi?id=1256353
* https://bugzilla.suse.com/show_bug.cgi?id=1256355
* https://bugzilla.suse.com/show_bug.cgi?id=1256358
* https://bugzilla.suse.com/show_bug.cgi?id=1256359
* https://bugzilla.suse.com/show_bug.cgi?id=1256363
* https://bugzilla.suse.com/show_bug.cgi?id=1256364
* https://bugzilla.suse.com/show_bug.cgi?id=1256368
* https://bugzilla.suse.com/show_bug.cgi?id=1256370
* https://bugzilla.suse.com/show_bug.cgi?id=1256375
* https://bugzilla.suse.com/show_bug.cgi?id=1256381
* https://bugzilla.suse.com/show_bug.cgi?id=1256382
* https://bugzilla.suse.com/show_bug.cgi?id=1256383
* https://bugzilla.suse.com/show_bug.cgi?id=1256384
* https://bugzilla.suse.com/show_bug.cgi?id=1256386
* https://bugzilla.suse.com/show_bug.cgi?id=1256388
* https://bugzilla.suse.com/show_bug.cgi?id=1256391
* https://bugzilla.suse.com/show_bug.cgi?id=1256394
* https://bugzilla.suse.com/show_bug.cgi?id=1256395
* https://bugzilla.suse.com/show_bug.cgi?id=1256396
* https://bugzilla.suse.com/show_bug.cgi?id=1256397
* https://bugzilla.suse.com/show_bug.cgi?id=1256398
* https://bugzilla.suse.com/show_bug.cgi?id=1256423
* https://bugzilla.suse.com/show_bug.cgi?id=1256426
* https://bugzilla.suse.com/show_bug.cgi?id=1256432
* https://jira.suse.com/browse/PED-1073
* https://jira.suse.com/browse/PED-14062
* https://jira.suse.com/browse/PED-1407
* https://jira.suse.com/browse/PED-1495
* https://jira.suse.com/browse/PED-1549
* https://jira.suse.com/browse/PED-1559
* https://jira.suse.com/browse/PED-2765
* https://jira.suse.com/browse/PED-370
* https://jira.suse.com/browse/PED-376
* https://jira.suse.com/browse/PED-7167
* https://jira.suse.com/browse/PED-8111
* https://jira.suse.com/browse/SLE-13847
* https://jira.suse.com/browse/SLE-18378
* https://jira.suse.com/browse/SLE-18384
* https://jira.suse.com/browse/SLE-19253
* https://jira.suse.com/browse/SLE-19255



SUSE-SU-2026:0314-1: moderate: Security update for python311


# Security update for python311

Announcement ID: SUSE-SU-2026:0314-1
Release Date: 2026-01-28T13:28:57Z
Rating: moderate
References:

* bsc#1254400
* bsc#1254401
* bsc#1254997

Cross-References:

* CVE-2025-12084
* CVE-2025-13836
* CVE-2025-13837

CVSS scores:

* CVE-2025-12084 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-12084 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-12084 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-12084 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-13836 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13836 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-13836 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13836 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-13837 ( SUSE ): 2.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13837 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-13837 ( NVD ): 2.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13837 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* Python 3 Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves three vulnerabilities can now be installed.

## Description:

This update for python311 fixes the following issues:

* CVE-2025-12084: prevent quadratic behavior in node ID cache clearing
(bsc#1254997).
* CVE-2025-13836: prevent reading an HTTP response from a server, if no read
amount is specified, with using Content-Length per default as the length
(bsc#1254400).
* CVE-2025-13837: protect against OOM when loading malicious content
(bsc#1254401).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-314=1 openSUSE-SLE-15.6-2026-314=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-314=1

* Python 3 Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-314=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* python311-tk-debuginfo-3.11.14-150600.3.41.2
* python311-debuginfo-3.11.14-150600.3.41.2
* python311-base-3.11.14-150600.3.41.2
* python311-base-debuginfo-3.11.14-150600.3.41.2
* python311-tk-3.11.14-150600.3.41.2
* python311-devel-3.11.14-150600.3.41.2
* libpython3_11-1_0-3.11.14-150600.3.41.2
* python311-curses-debuginfo-3.11.14-150600.3.41.2
* python311-doc-devhelp-3.11.14-150600.3.41.1
* python311-testsuite-3.11.14-150600.3.41.2
* python311-3.11.14-150600.3.41.2
* python311-testsuite-debuginfo-3.11.14-150600.3.41.2
* python311-idle-3.11.14-150600.3.41.2
* python311-debugsource-3.11.14-150600.3.41.2
* python311-dbm-3.11.14-150600.3.41.2
* python311-doc-3.11.14-150600.3.41.1
* python311-tools-3.11.14-150600.3.41.2
* python311-core-debugsource-3.11.14-150600.3.41.2
* python311-curses-3.11.14-150600.3.41.2
* python311-dbm-debuginfo-3.11.14-150600.3.41.2
* libpython3_11-1_0-debuginfo-3.11.14-150600.3.41.2
* openSUSE Leap 15.6 (x86_64)
* python311-base-32bit-debuginfo-3.11.14-150600.3.41.2
* python311-32bit-debuginfo-3.11.14-150600.3.41.2
* libpython3_11-1_0-32bit-3.11.14-150600.3.41.2
* python311-32bit-3.11.14-150600.3.41.2
* python311-base-32bit-3.11.14-150600.3.41.2
* libpython3_11-1_0-32bit-debuginfo-3.11.14-150600.3.41.2
* openSUSE Leap 15.6 (aarch64_ilp32)
* python311-base-64bit-debuginfo-3.11.14-150600.3.41.2
* python311-64bit-3.11.14-150600.3.41.2
* python311-64bit-debuginfo-3.11.14-150600.3.41.2
* libpython3_11-1_0-64bit-3.11.14-150600.3.41.2
* python311-base-64bit-3.11.14-150600.3.41.2
* libpython3_11-1_0-64bit-debuginfo-3.11.14-150600.3.41.2
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* python311-base-3.11.14-150600.3.41.2
* python311-base-debuginfo-3.11.14-150600.3.41.2
* python311-core-debugsource-3.11.14-150600.3.41.2
* libpython3_11-1_0-3.11.14-150600.3.41.2
* libpython3_11-1_0-debuginfo-3.11.14-150600.3.41.2
* Python 3 Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* python311-tk-debuginfo-3.11.14-150600.3.41.2
* python311-debuginfo-3.11.14-150600.3.41.2
* python311-tools-3.11.14-150600.3.41.2
* python311-core-debugsource-3.11.14-150600.3.41.2
* python311-curses-3.11.14-150600.3.41.2
* python311-debugsource-3.11.14-150600.3.41.2
* python311-tk-3.11.14-150600.3.41.2
* python311-dbm-debuginfo-3.11.14-150600.3.41.2
* python311-devel-3.11.14-150600.3.41.2
* python311-3.11.14-150600.3.41.2
* python311-idle-3.11.14-150600.3.41.2
* python311-curses-debuginfo-3.11.14-150600.3.41.2
* python311-dbm-3.11.14-150600.3.41.2

## References:

* https://www.suse.com/security/cve/CVE-2025-12084.html
* https://www.suse.com/security/cve/CVE-2025-13836.html
* https://www.suse.com/security/cve/CVE-2025-13837.html
* https://bugzilla.suse.com/show_bug.cgi?id=1254400
* https://bugzilla.suse.com/show_bug.cgi?id=1254401
* https://bugzilla.suse.com/show_bug.cgi?id=1254997



SUSE-SU-2026:0326-1: important: Security update for helm


# Security update for helm

Announcement ID: SUSE-SU-2026:0326-1
Release Date: 2026-01-28T14:55:41Z
Rating: important
References:

Affected Products:

* Containers Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7

An update that can now be installed.

## Description:

This update for helm rebuilds it against the current GO security release.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2026-326=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2026-326=1

* Containers Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2026-326=1

* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-326=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-326=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-326=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-326=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-326=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-326=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-326=1

* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-326=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-326=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-326=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP6
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-326=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* openSUSE Leap 15.6 (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-fish-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* helm-bash-completion-3.19.1-150000.1.62.1
* Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* Containers Module 15-SP7 (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Package Hub 15 15-SP7 (noarch)
* helm-fish-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64)
* helm-debuginfo-3.19.1-150000.1.62.1
* helm-3.19.1-150000.1.62.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch)
* helm-zsh-completion-3.19.1-150000.1.62.1
* helm-bash-completion-3.19.1-150000.1.62.1



SUSE-SU-2026:0325-1: important: Security update for kubernetes


# Security update for kubernetes

Announcement ID: SUSE-SU-2026:0325-1
Release Date: 2026-01-28T14:54:11Z
Rating: important
References:

Affected Products:

* Containers Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that can now be installed.

## Description:

This update for kubernetes rebuilds it against the current GO security release.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* Containers Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2026-325=1

* openSUSE Leap 15.6
zypper in -t patch SUSE-2026-325=1 openSUSE-SLE-15.6-2026-325=1

## Package List:

* Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* kubernetes1.35-client-common-1.35.0-150600.13.23.1
* kubernetes1.35-client-1.35.0-150600.13.23.1
* Containers Module 15-SP7 (noarch)
* kubernetes1.35-client-bash-completion-1.35.0-150600.13.23.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kubernetes1.35-client-common-1.35.0-150600.13.23.1
* kubernetes1.35-client-1.35.0-150600.13.23.1
* openSUSE Leap 15.6 (noarch)
* kubernetes1.35-client-fish-completion-1.35.0-150600.13.23.1
* kubernetes1.35-client-bash-completion-1.35.0-150600.13.23.1