From null at suse.de Tue Apr 1 12:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 01 Apr 2025 12:30:06 -0000 Subject: SUSE-SU-2025:1084-1: critical: Security update for corosync Message-ID: <174351060646.22996.5970068567007099123@smelt2.prg2.suse.org> # Security update for corosync Announcement ID: SUSE-SU-2025:1084-1 Release Date: 2025-04-01T10:19:10Z Rating: critical References: * bsc#1239987 Cross-References: * CVE-2025-30472 CVSS scores: * CVE-2025-30472 ( SUSE ): 9.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2025-30472 ( NVD ): 9.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for corosync fixes the following issues: * CVE-2025-30472: Fixed stack buffer overflow from 'orf_token_endian_convert' (bsc#1239987) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1084=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1084=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2025-1084=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2025-1084=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2025-1084=1 * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2025-1084=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * libcfg6-2.4.6-150300.12.13.1 * libcmap4-debuginfo-2.4.6-150300.12.13.1 * corosync-testagents-debuginfo-2.4.6-150300.12.13.1 * corosync-debugsource-2.4.6-150300.12.13.1 * libcorosync-devel-2.4.6-150300.12.13.1 * libsam4-2.4.6-150300.12.13.1 * libvotequorum8-debuginfo-2.4.6-150300.12.13.1 * corosync-2.4.6-150300.12.13.1 * corosync-debuginfo-2.4.6-150300.12.13.1 * corosync-qdevice-debuginfo-2.4.6-150300.12.13.1 * corosync-qnetd-debuginfo-2.4.6-150300.12.13.1 * libquorum5-2.4.6-150300.12.13.1 * libquorum5-debuginfo-2.4.6-150300.12.13.1 * libtotem_pg5-2.4.6-150300.12.13.1 * libtotem_pg5-debuginfo-2.4.6-150300.12.13.1 * libcorosync_common4-2.4.6-150300.12.13.1 * corosync-qdevice-2.4.6-150300.12.13.1 * libsam4-debuginfo-2.4.6-150300.12.13.1 * libcpg4-debuginfo-2.4.6-150300.12.13.1 * libvotequorum8-2.4.6-150300.12.13.1 * corosync-testagents-2.4.6-150300.12.13.1 * libcfg6-debuginfo-2.4.6-150300.12.13.1 * libcorosync_common4-debuginfo-2.4.6-150300.12.13.1 * libcpg4-2.4.6-150300.12.13.1 * corosync-qnetd-2.4.6-150300.12.13.1 * libcmap4-2.4.6-150300.12.13.1 * openSUSE Leap 15.3 (x86_64) * libcmap4-32bit-2.4.6-150300.12.13.1 * libcmap4-32bit-debuginfo-2.4.6-150300.12.13.1 * libsam4-32bit-2.4.6-150300.12.13.1 * libcpg4-32bit-2.4.6-150300.12.13.1 * libvotequorum8-32bit-2.4.6-150300.12.13.1 * libquorum5-32bit-debuginfo-2.4.6-150300.12.13.1 * libcfg6-32bit-debuginfo-2.4.6-150300.12.13.1 * libcpg4-32bit-debuginfo-2.4.6-150300.12.13.1 * libsam4-32bit-debuginfo-2.4.6-150300.12.13.1 * libvotequorum8-32bit-debuginfo-2.4.6-150300.12.13.1 * libtotem_pg5-32bit-debuginfo-2.4.6-150300.12.13.1 * libquorum5-32bit-2.4.6-150300.12.13.1 * libcfg6-32bit-2.4.6-150300.12.13.1 * libtotem_pg5-32bit-2.4.6-150300.12.13.1 * libcorosync_common4-32bit-debuginfo-2.4.6-150300.12.13.1 * libcorosync_common4-32bit-2.4.6-150300.12.13.1 * openSUSE Leap 15.3 (aarch64_ilp32) * libvotequorum8-64bit-debuginfo-2.4.6-150300.12.13.1 * libcmap4-64bit-2.4.6-150300.12.13.1 * libcorosync_common4-64bit-debuginfo-2.4.6-150300.12.13.1 * libcmap4-64bit-debuginfo-2.4.6-150300.12.13.1 * libsam4-64bit-2.4.6-150300.12.13.1 * libcfg6-64bit-2.4.6-150300.12.13.1 * libcpg4-64bit-2.4.6-150300.12.13.1 * libvotequorum8-64bit-2.4.6-150300.12.13.1 * libquorum5-64bit-2.4.6-150300.12.13.1 * libsam4-64bit-debuginfo-2.4.6-150300.12.13.1 * libtotem_pg5-64bit-2.4.6-150300.12.13.1 * libcfg6-64bit-debuginfo-2.4.6-150300.12.13.1 * libtotem_pg5-64bit-debuginfo-2.4.6-150300.12.13.1 * libcpg4-64bit-debuginfo-2.4.6-150300.12.13.1 * libquorum5-64bit-debuginfo-2.4.6-150300.12.13.1 * libcorosync_common4-64bit-2.4.6-150300.12.13.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libcfg6-2.4.6-150300.12.13.1 * libcmap4-debuginfo-2.4.6-150300.12.13.1 * corosync-testagents-debuginfo-2.4.6-150300.12.13.1 * corosync-debugsource-2.4.6-150300.12.13.1 * libcorosync-devel-2.4.6-150300.12.13.1 * libsam4-2.4.6-150300.12.13.1 * libvotequorum8-debuginfo-2.4.6-150300.12.13.1 * corosync-2.4.6-150300.12.13.1 * corosync-debuginfo-2.4.6-150300.12.13.1 * corosync-qdevice-debuginfo-2.4.6-150300.12.13.1 * corosync-qnetd-debuginfo-2.4.6-150300.12.13.1 * libquorum5-2.4.6-150300.12.13.1 * libquorum5-debuginfo-2.4.6-150300.12.13.1 * libtotem_pg5-2.4.6-150300.12.13.1 * libtotem_pg5-debuginfo-2.4.6-150300.12.13.1 * libcorosync_common4-2.4.6-150300.12.13.1 * corosync-qdevice-2.4.6-150300.12.13.1 * libsam4-debuginfo-2.4.6-150300.12.13.1 * libcpg4-debuginfo-2.4.6-150300.12.13.1 * libvotequorum8-2.4.6-150300.12.13.1 * corosync-testagents-2.4.6-150300.12.13.1 * libcfg6-debuginfo-2.4.6-150300.12.13.1 * libcorosync_common4-debuginfo-2.4.6-150300.12.13.1 * libcpg4-2.4.6-150300.12.13.1 * corosync-qnetd-2.4.6-150300.12.13.1 * libcmap4-2.4.6-150300.12.13.1 * openSUSE Leap 15.6 (x86_64) * libcmap4-32bit-2.4.6-150300.12.13.1 * libcmap4-32bit-debuginfo-2.4.6-150300.12.13.1 * libsam4-32bit-2.4.6-150300.12.13.1 * libcpg4-32bit-2.4.6-150300.12.13.1 * libvotequorum8-32bit-2.4.6-150300.12.13.1 * libquorum5-32bit-debuginfo-2.4.6-150300.12.13.1 * libcfg6-32bit-debuginfo-2.4.6-150300.12.13.1 * libcpg4-32bit-debuginfo-2.4.6-150300.12.13.1 * libsam4-32bit-debuginfo-2.4.6-150300.12.13.1 * libvotequorum8-32bit-debuginfo-2.4.6-150300.12.13.1 * libtotem_pg5-32bit-debuginfo-2.4.6-150300.12.13.1 * libquorum5-32bit-2.4.6-150300.12.13.1 * libcfg6-32bit-2.4.6-150300.12.13.1 * libtotem_pg5-32bit-2.4.6-150300.12.13.1 * libcorosync_common4-32bit-debuginfo-2.4.6-150300.12.13.1 * libcorosync_common4-32bit-2.4.6-150300.12.13.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * libcfg6-2.4.6-150300.12.13.1 * libcmap4-debuginfo-2.4.6-150300.12.13.1 * corosync-testagents-debuginfo-2.4.6-150300.12.13.1 * corosync-debugsource-2.4.6-150300.12.13.1 * libcorosync-devel-2.4.6-150300.12.13.1 * libsam4-2.4.6-150300.12.13.1 * libvotequorum8-debuginfo-2.4.6-150300.12.13.1 * corosync-2.4.6-150300.12.13.1 * corosync-debuginfo-2.4.6-150300.12.13.1 * corosync-qdevice-debuginfo-2.4.6-150300.12.13.1 * corosync-qnetd-debuginfo-2.4.6-150300.12.13.1 * libquorum5-2.4.6-150300.12.13.1 * libquorum5-debuginfo-2.4.6-150300.12.13.1 * libtotem_pg5-2.4.6-150300.12.13.1 * libtotem_pg5-debuginfo-2.4.6-150300.12.13.1 * libcorosync_common4-2.4.6-150300.12.13.1 * corosync-qdevice-2.4.6-150300.12.13.1 * libsam4-debuginfo-2.4.6-150300.12.13.1 * libcpg4-debuginfo-2.4.6-150300.12.13.1 * libvotequorum8-2.4.6-150300.12.13.1 * corosync-testagents-2.4.6-150300.12.13.1 * libcfg6-debuginfo-2.4.6-150300.12.13.1 * libcorosync_common4-debuginfo-2.4.6-150300.12.13.1 * libcpg4-2.4.6-150300.12.13.1 * corosync-qnetd-2.4.6-150300.12.13.1 * libcmap4-2.4.6-150300.12.13.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * libcfg6-2.4.6-150300.12.13.1 * libcmap4-debuginfo-2.4.6-150300.12.13.1 * corosync-testagents-debuginfo-2.4.6-150300.12.13.1 * corosync-debugsource-2.4.6-150300.12.13.1 * libcorosync-devel-2.4.6-150300.12.13.1 * libsam4-2.4.6-150300.12.13.1 * libvotequorum8-debuginfo-2.4.6-150300.12.13.1 * corosync-2.4.6-150300.12.13.1 * corosync-debuginfo-2.4.6-150300.12.13.1 * corosync-qdevice-debuginfo-2.4.6-150300.12.13.1 * corosync-qnetd-debuginfo-2.4.6-150300.12.13.1 * libquorum5-2.4.6-150300.12.13.1 * libquorum5-debuginfo-2.4.6-150300.12.13.1 * libtotem_pg5-2.4.6-150300.12.13.1 * libtotem_pg5-debuginfo-2.4.6-150300.12.13.1 * libcorosync_common4-2.4.6-150300.12.13.1 * corosync-qdevice-2.4.6-150300.12.13.1 * libsam4-debuginfo-2.4.6-150300.12.13.1 * libcpg4-debuginfo-2.4.6-150300.12.13.1 * libvotequorum8-2.4.6-150300.12.13.1 * corosync-testagents-2.4.6-150300.12.13.1 * libcfg6-debuginfo-2.4.6-150300.12.13.1 * libcorosync_common4-debuginfo-2.4.6-150300.12.13.1 * libcpg4-2.4.6-150300.12.13.1 * corosync-qnetd-2.4.6-150300.12.13.1 * libcmap4-2.4.6-150300.12.13.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * libcfg6-2.4.6-150300.12.13.1 * libcmap4-debuginfo-2.4.6-150300.12.13.1 * corosync-testagents-debuginfo-2.4.6-150300.12.13.1 * corosync-debugsource-2.4.6-150300.12.13.1 * libcorosync-devel-2.4.6-150300.12.13.1 * libsam4-2.4.6-150300.12.13.1 * libvotequorum8-debuginfo-2.4.6-150300.12.13.1 * corosync-2.4.6-150300.12.13.1 * corosync-debuginfo-2.4.6-150300.12.13.1 * corosync-qdevice-debuginfo-2.4.6-150300.12.13.1 * corosync-qnetd-debuginfo-2.4.6-150300.12.13.1 * libquorum5-2.4.6-150300.12.13.1 * libquorum5-debuginfo-2.4.6-150300.12.13.1 * libtotem_pg5-2.4.6-150300.12.13.1 * libtotem_pg5-debuginfo-2.4.6-150300.12.13.1 * libcorosync_common4-2.4.6-150300.12.13.1 * corosync-qdevice-2.4.6-150300.12.13.1 * libsam4-debuginfo-2.4.6-150300.12.13.1 * libcpg4-debuginfo-2.4.6-150300.12.13.1 * libvotequorum8-2.4.6-150300.12.13.1 * corosync-testagents-2.4.6-150300.12.13.1 * libcfg6-debuginfo-2.4.6-150300.12.13.1 * libcorosync_common4-debuginfo-2.4.6-150300.12.13.1 * libcpg4-2.4.6-150300.12.13.1 * corosync-qnetd-2.4.6-150300.12.13.1 * libcmap4-2.4.6-150300.12.13.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) * libcfg6-2.4.6-150300.12.13.1 * libcmap4-debuginfo-2.4.6-150300.12.13.1 * corosync-testagents-debuginfo-2.4.6-150300.12.13.1 * corosync-debugsource-2.4.6-150300.12.13.1 * libcorosync-devel-2.4.6-150300.12.13.1 * libsam4-2.4.6-150300.12.13.1 * libvotequorum8-debuginfo-2.4.6-150300.12.13.1 * corosync-2.4.6-150300.12.13.1 * corosync-debuginfo-2.4.6-150300.12.13.1 * corosync-qdevice-debuginfo-2.4.6-150300.12.13.1 * corosync-qnetd-debuginfo-2.4.6-150300.12.13.1 * libquorum5-2.4.6-150300.12.13.1 * libquorum5-debuginfo-2.4.6-150300.12.13.1 * libtotem_pg5-2.4.6-150300.12.13.1 * libtotem_pg5-debuginfo-2.4.6-150300.12.13.1 * libcorosync_common4-2.4.6-150300.12.13.1 * corosync-qdevice-2.4.6-150300.12.13.1 * libsam4-debuginfo-2.4.6-150300.12.13.1 * libcpg4-debuginfo-2.4.6-150300.12.13.1 * libvotequorum8-2.4.6-150300.12.13.1 * corosync-testagents-2.4.6-150300.12.13.1 * libcfg6-debuginfo-2.4.6-150300.12.13.1 * libcorosync_common4-debuginfo-2.4.6-150300.12.13.1 * libcpg4-2.4.6-150300.12.13.1 * corosync-qnetd-2.4.6-150300.12.13.1 * libcmap4-2.4.6-150300.12.13.1 ## References: * https://www.suse.com/security/cve/CVE-2025-30472.html * https://bugzilla.suse.com/show_bug.cgi?id=1239987 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 1 16:30:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 01 Apr 2025 16:30:07 -0000 Subject: SUSE-SU-2025:1053-2: important: Security update for openvpn Message-ID: <174352500746.8820.609549630034980955@smelt2.prg2.suse.org> # Security update for openvpn Announcement ID: SUSE-SU-2025:1053-2 Release Date: 2025-04-01T12:04:37Z Rating: important References: * bsc#1235147 Cross-References: * CVE-2024-5594 CVSS scores: * CVE-2024-5594 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-5594 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-5594 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for openvpn fixes the following issues: * CVE-2024-5594: Fixed handling of null bytes and invalid characters in control messages (bsc#1235147). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1053=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * openvpn-2.3.8-16.35.1 * openvpn-auth-pam-plugin-2.3.8-16.35.1 * openvpn-debugsource-2.3.8-16.35.1 * openvpn-debuginfo-2.3.8-16.35.1 * openvpn-auth-pam-plugin-debuginfo-2.3.8-16.35.1 ## References: * https://www.suse.com/security/cve/CVE-2024-5594.html * https://bugzilla.suse.com/show_bug.cgi?id=1235147 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 1 20:30:04 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 01 Apr 2025 20:30:04 -0000 Subject: SUSE-SU-2025:1092-1: important: Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5) Message-ID: <174353940476.8820.17696280515700788626@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:1092-1 Release Date: 2025-04-01T16:34:07Z Rating: important References: * bsc#1228012 Cross-References: * CVE-2022-48791 CVSS scores: * CVE-2022-48791 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_228 fixes one issue. The following security issue was fixed: * CVE-2022-48791: Fix use-after-free for aborted TMF sas_task (bsc#1228002) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1092=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_228-default-6-2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48791.html * https://bugzilla.suse.com/show_bug.cgi?id=1228012 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 1 20:30:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 01 Apr 2025 20:30:08 -0000 Subject: SUSE-SU-2025:1088-1: important: Security update for the Linux Kernel (Live Patch 59 for SLE 12 SP5) Message-ID: <174353940831.8820.14057904213924802714@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 59 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:1088-1 Release Date: 2025-04-01T16:34:01Z Rating: important References: * bsc#1228012 * bsc#1228578 Cross-References: * CVE-2022-48791 * CVE-2024-41062 CVSS scores: * CVE-2022-48791 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41062 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_225 fixes several issues. The following security issues were fixed: * CVE-2024-41062: Sync sock recv cb and release (bsc#1228578). * CVE-2022-48791: Fix use-after-free for aborted TMF sas_task (bsc#1228002) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1089=1 SUSE-SLE-Live- Patching-12-SP5-2025-1087=1 SUSE-SLE-Live-Patching-12-SP5-2025-1090=1 SUSE-SLE- Live-Patching-12-SP5-2025-1091=1 SUSE-SLE-Live-Patching-12-SP5-2025-1088=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_225-default-7-2.1 * kgraft-patch-4_12_14-122_219-default-10-2.1 * kgraft-patch-4_12_14-122_201-default-15-2.1 * kgraft-patch-4_12_14-122_222-default-8-2.1 * kgraft-patch-4_12_14-122_216-default-13-2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48791.html * https://www.suse.com/security/cve/CVE-2024-41062.html * https://bugzilla.suse.com/show_bug.cgi?id=1228012 * https://bugzilla.suse.com/show_bug.cgi?id=1228578 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 2 08:30:16 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 02 Apr 2025 08:30:16 -0000 Subject: SUSE-SU-2025:1094-1: important: Security update for warewulf4 Message-ID: <174358261683.7628.6458887020847691239@smelt2.prg2.suse.org> # Security update for warewulf4 Announcement ID: SUSE-SU-2025:1094-1 Release Date: 2025-04-02T03:37:41Z Rating: important References: * bsc#1226654 * bsc#1238611 * bsc#1239322 Cross-References: * CVE-2025-22869 * CVE-2025-22870 CVSS scores: * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L Affected Products: * HPC Module 15-SP6 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP6 An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for warewulf4 fixes the following issues: warewulf4 was updated from version 4.5.8 to 4.6.0: * Security issues fixed for version 4.6.0: * CVE-2025-22869: Fixed Denial of Service vulnerability in the Key Exchange of golang.org/x/crypto/ssh (bsc#1239322) * CVE-2025-22870: Fixed proxy bypass using IPv6 zone IDs (bsc#1238611) * User visible changes: * Default values `nodes.conf`: * The default values for `kernel command line`, `init parameters` and `root` are now set in the `default` profile and this profileshould be included in every profile. During the installation of an update an upgrade is done to `nodes.conf` which updates the database accordingly. * Overlay split up: * The overlays `wwinit` and `runtime` are now split up in different overlays named according to their role. The upgrade process will update the node database and replace the overlays `wwinit` and `runtime` with a list of overlays with same role. * Site and distribution overlays: * The overlays in `/var/lib/warewulf/overlays` should not be changed by the user any more. Site specific overlays are now sorted under `/etc/warewulf/overlays`. On upgrade, changed overlays are stored with the `rpmsave` suffix and move to `/etc/warewulf/overlays/$OVERLAYNAME`. * Other changes and bugs fixed: * Fixed udev issue with assigning device names (bsc#1226654) * Implemented new package `warewulf-reference-doc` with the reference documentation for Warewulf 4 as PDF * The configuation files nodes.conf and warewulf.conf will be updated on upgrade and the unmodified configuration files will be saved as nodes.conf.4.5.x and warewulf.conf.4.5.x * Summary of upstream changes: * New configuration upgrade system * Changes to the default profile * Renamed containers to (node) images * New kernel management system * Parallel overlay builds * Sprig functions in overlay templates * Improved network overlays * Nested profiles * Arbitrary "resources" data in nodes.conf * NFS client configuration in nodes.conf * Emphatically optional syncuser * Improved network boot observability * Particularly significant changes, especially those affecting the user interface, are described in the release notes: * https://warewulf.org/docs/v4.6.x/release/v4.6.0.html ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1094=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1094=1 * HPC Module 15-SP6 zypper in -t patch SUSE-SLE-Module-HPC-15-SP6-2025-1094=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1094=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1094=1 ## Package List: * openSUSE Leap 15.5 (aarch64 x86_64) * warewulf4-4.6.0-150500.6.34.1 * warewulf4-overlay-4.6.0-150500.6.34.1 * openSUSE Leap 15.5 (noarch) * warewulf4-man-4.6.0-150500.6.34.1 * warewulf4-dracut-4.6.0-150500.6.34.1 * warewulf4-overlay-slurm-4.6.0-150500.6.34.1 * warewulf4-overlay-rke2-4.6.0-150500.6.34.1 * warewulf4-reference-doc-4.6.0-150500.6.34.1 * openSUSE Leap 15.6 (aarch64 x86_64) * warewulf4-4.6.0-150500.6.34.1 * warewulf4-overlay-4.6.0-150500.6.34.1 * openSUSE Leap 15.6 (noarch) * warewulf4-overlay-slurm-4.6.0-150500.6.34.1 * warewulf4-dracut-4.6.0-150500.6.34.1 * warewulf4-reference-doc-4.6.0-150500.6.34.1 * warewulf4-man-4.6.0-150500.6.34.1 * HPC Module 15-SP6 (aarch64 x86_64) * warewulf4-4.6.0-150500.6.34.1 * warewulf4-overlay-4.6.0-150500.6.34.1 * HPC Module 15-SP6 (noarch) * warewulf4-overlay-slurm-4.6.0-150500.6.34.1 * warewulf4-dracut-4.6.0-150500.6.34.1 * warewulf4-reference-doc-4.6.0-150500.6.34.1 * warewulf4-man-4.6.0-150500.6.34.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * warewulf4-4.6.0-150500.6.34.1 * warewulf4-overlay-4.6.0-150500.6.34.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * warewulf4-overlay-slurm-4.6.0-150500.6.34.1 * warewulf4-dracut-4.6.0-150500.6.34.1 * warewulf4-reference-doc-4.6.0-150500.6.34.1 * warewulf4-man-4.6.0-150500.6.34.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * warewulf4-4.6.0-150500.6.34.1 * warewulf4-overlay-4.6.0-150500.6.34.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * warewulf4-overlay-slurm-4.6.0-150500.6.34.1 * warewulf4-dracut-4.6.0-150500.6.34.1 * warewulf4-reference-doc-4.6.0-150500.6.34.1 * warewulf4-man-4.6.0-150500.6.34.1 ## References: * https://www.suse.com/security/cve/CVE-2025-22869.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://bugzilla.suse.com/show_bug.cgi?id=1226654 * https://bugzilla.suse.com/show_bug.cgi?id=1238611 * https://bugzilla.suse.com/show_bug.cgi?id=1239322 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 2 12:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 02 Apr 2025 12:30:06 -0000 Subject: SUSE-SU-2025:1104-1: important: Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5) Message-ID: <174359700632.17718.10835460109793529574@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 13 for SLE 15 SP5) Announcement ID: SUSE-SU-2025:1104-1 Release Date: 2025-04-02T10:33:56Z Rating: important References: * bsc#1228578 Cross-References: * CVE-2024-41062 CVSS scores: * CVE-2024-41062 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_62 fixes one issue. The following security issue was fixed: * CVE-2024-41062: Sync sock recv cb and release (bsc#1228578). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1104=1 SUSE-2025-1105=1 SUSE-2025-1106=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1104=1 SUSE-SLE- Module-Live-Patching-15-SP4-2025-1105=1 SUSE-SLE-Module-Live- Patching-15-SP4-2025-1106=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1108=1 SUSE-2025-1107=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-1108=1 SUSE-SLE- Module-Live-Patching-15-SP5-2025-1107=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-12-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_27-debugsource-12-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_28-debugsource-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_125-default-debuginfo-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_111-default-15-150400.2.1 * kernel-livepatch-5_14_21-150400_24_122-default-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_125-default-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_111-default-debuginfo-15-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_24-debugsource-15-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-12-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_27-debugsource-12-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_28-debugsource-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_125-default-debuginfo-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_111-default-15-150400.2.1 * kernel-livepatch-5_14_21-150400_24_122-default-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_125-default-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_111-default-debuginfo-15-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_24-debugsource-15-150400.2.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_11-debugsource-15-150500.2.1 * kernel-livepatch-5_14_21-150500_55_62-default-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_62-default-debuginfo-13-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_13-debugsource-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_52-default-debuginfo-15-150500.2.1 * kernel-livepatch-5_14_21-150500_55_52-default-15-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_11-debugsource-15-150500.2.1 * kernel-livepatch-5_14_21-150500_55_62-default-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_62-default-debuginfo-13-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_13-debugsource-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_52-default-debuginfo-15-150500.2.1 * kernel-livepatch-5_14_21-150500_55_52-default-15-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-41062.html * https://bugzilla.suse.com/show_bug.cgi?id=1228578 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 2 12:30:11 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 02 Apr 2025 12:30:11 -0000 Subject: SUSE-SU-2025:1103-1: important: Security update for MozillaFirefox Message-ID: <174359701147.17718.17620282934673687124@smelt2.prg2.suse.org> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2025:1103-1 Release Date: 2025-04-02T09:47:54Z Rating: important References: * bsc#1240083 Cross-References: * CVE-2025-3028 * CVE-2025-3029 * CVE-2025-3030 CVSS scores: * CVE-2025-3028 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2025-3028 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2025-3029 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-3029 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-3030 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-3030 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: * Firefox Extended Support Release 128.9.0 ESR MFSA 2025-22 (bsc#1240083): * CVE-2025-3028: Use-after-free triggered by XSLTProcessor * CVE-2025-3029: URL Bar Spoofing via non-BMP Unicode characters * CVE-2025-3030: Memory safety bugs fixed in Firefox 137, Thunderbird 137, Firefox ESR 128.9, and Thunderbird 128.9 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1103=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1103=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-128.9.0-112.252.1 * MozillaFirefox-translations-common-128.9.0-112.252.1 * MozillaFirefox-debugsource-128.9.0-112.252.1 * MozillaFirefox-debuginfo-128.9.0-112.252.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * MozillaFirefox-devel-128.9.0-112.252.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * MozillaFirefox-128.9.0-112.252.1 * MozillaFirefox-translations-common-128.9.0-112.252.1 * MozillaFirefox-debugsource-128.9.0-112.252.1 * MozillaFirefox-debuginfo-128.9.0-112.252.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * MozillaFirefox-devel-128.9.0-112.252.1 ## References: * https://www.suse.com/security/cve/CVE-2025-3028.html * https://www.suse.com/security/cve/CVE-2025-3029.html * https://www.suse.com/security/cve/CVE-2025-3030.html * https://bugzilla.suse.com/show_bug.cgi?id=1240083 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 2 12:30:19 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 02 Apr 2025 12:30:19 -0000 Subject: SUSE-SU-2025:1102-1: important: Security update for docker, docker-stable Message-ID: <174359701953.17718.14808964284629141130@smelt2.prg2.suse.org> # Security update for docker, docker-stable Announcement ID: SUSE-SU-2025:1102-1 Release Date: 2025-04-02T09:39:37Z Rating: important References: * bsc#1219437 * bsc#1234089 * bsc#1237367 * bsc#1239185 * bsc#1239322 Cross-References: * CVE-2024-2365 * CVE-2024-23650 * CVE-2024-23653 * CVE-2024-29018 * CVE-2024-41110 * CVE-2025-22868 * CVE-2025-22869 CVSS scores: * CVE-2024-23650 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-23650 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-23653 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-23653 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-29018 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-29018 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-41110 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-22868 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves seven vulnerabilities can now be installed. ## Description: This update for docker, docker-stable fixes the following issues: * CVE-2025-22868: Fixed unexpected memory consumption during token parsing in golang.org/x/oauth2 (bsc#1239185). * CVE-2025-22869: Fixed Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (bsc#1239322). * CVE-2024-29018: Fixed external DNS requests from 'internal' networks leading to data exfiltration (bsc#1234089). * CVE-2024-23650: Fixed BuildKit daemon crash via malicious BuildKit client or frontend request (bsc#1219437). Other fixes: \- Make container-selinux requirement conditional on selinux-policy (bsc#1237367). \- Updated docker-buildx to 0.19.3. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1102=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1102=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * docker-debuginfo-27.5.1_ce-98.126.1 * docker-stable-24.0.9_ce-1.11.1 * docker-stable-debuginfo-24.0.9_ce-1.11.1 * docker-27.5.1_ce-98.126.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * docker-stable-bash-completion-24.0.9_ce-1.11.1 * docker-bash-completion-27.5.1_ce-98.126.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * docker-debuginfo-27.5.1_ce-98.126.1 * docker-stable-24.0.9_ce-1.11.1 * docker-stable-debuginfo-24.0.9_ce-1.11.1 * docker-27.5.1_ce-98.126.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * docker-stable-bash-completion-24.0.9_ce-1.11.1 * docker-bash-completion-27.5.1_ce-98.126.1 ## References: * https://www.suse.com/security/cve/CVE-2024-2365.html * https://www.suse.com/security/cve/CVE-2024-23650.html * https://www.suse.com/security/cve/CVE-2024-23653.html * https://www.suse.com/security/cve/CVE-2024-29018.html * https://www.suse.com/security/cve/CVE-2024-41110.html * https://www.suse.com/security/cve/CVE-2025-22868.html * https://www.suse.com/security/cve/CVE-2025-22869.html * https://bugzilla.suse.com/show_bug.cgi?id=1219437 * https://bugzilla.suse.com/show_bug.cgi?id=1234089 * https://bugzilla.suse.com/show_bug.cgi?id=1237367 * https://bugzilla.suse.com/show_bug.cgi?id=1239185 * https://bugzilla.suse.com/show_bug.cgi?id=1239322 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 2 12:30:21 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 02 Apr 2025 12:30:21 -0000 Subject: SUSE-SU-2025:1101-1: moderate: Security update for apparmor Message-ID: <174359702167.17718.7638195521536037317@smelt2.prg2.suse.org> # Security update for apparmor Announcement ID: SUSE-SU-2025:1101-1 Release Date: 2025-04-02T09:38:52Z Rating: moderate References: * bsc#1234452 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one security fix can now be installed. ## Description: This update for apparmor fixes the following issue: * Allow dovecot-auth to execute unix check password from /sbin, not only from /usr/bin (bsc#1234452). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1101=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1101=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * apparmor-parser-debuginfo-2.8.2-56.18.2 * libapparmor1-debuginfo-2.8.2-56.18.2 * perl-apparmor-2.8.2-56.18.2 * perl-apparmor-debuginfo-2.8.2-56.18.2 * apache2-mod_apparmor-debuginfo-2.8.2-56.18.2 * apache2-mod_apparmor-2.8.2-56.18.2 * libapparmor-devel-2.8.2-56.18.2 * apparmor-parser-2.8.2-56.18.2 * libapparmor1-2.8.2-56.18.2 * apparmor-debugsource-2.8.2-56.18.2 * pam_apparmor-2.8.2-56.18.2 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * apparmor-profiles-2.8.2-56.18.2 * apparmor-utils-2.8.2-56.18.2 * apparmor-docs-2.8.2-56.18.2 * SUSE Linux Enterprise Server 12 SP5 LTSS (ppc64le s390x x86_64) * pam_apparmor-debuginfo-2.8.2-56.18.2 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libapparmor1-debuginfo-32bit-2.8.2-56.18.2 * libapparmor1-32bit-2.8.2-56.18.2 * pam_apparmor-debuginfo-32bit-2.8.2-56.18.2 * pam_apparmor-32bit-2.8.2-56.18.2 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * apparmor-parser-debuginfo-2.8.2-56.18.2 * libapparmor1-debuginfo-32bit-2.8.2-56.18.2 * libapparmor1-debuginfo-2.8.2-56.18.2 * perl-apparmor-2.8.2-56.18.2 * pam_apparmor-32bit-2.8.2-56.18.2 * pam_apparmor-debuginfo-32bit-2.8.2-56.18.2 * perl-apparmor-debuginfo-2.8.2-56.18.2 * apache2-mod_apparmor-debuginfo-2.8.2-56.18.2 * apache2-mod_apparmor-2.8.2-56.18.2 * libapparmor-devel-2.8.2-56.18.2 * pam_apparmor-debuginfo-2.8.2-56.18.2 * apparmor-parser-2.8.2-56.18.2 * libapparmor1-2.8.2-56.18.2 * apparmor-debugsource-2.8.2-56.18.2 * libapparmor1-32bit-2.8.2-56.18.2 * pam_apparmor-2.8.2-56.18.2 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * apparmor-profiles-2.8.2-56.18.2 * apparmor-utils-2.8.2-56.18.2 * apparmor-docs-2.8.2-56.18.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234452 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 2 12:30:26 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 02 Apr 2025 12:30:26 -0000 Subject: SUSE-SU-2025:1099-1: moderate: Security update for govulncheck-vulndb Message-ID: <174359702612.17718.13029428324262359269@smelt2.prg2.suse.org> # Security update for govulncheck-vulndb Announcement ID: SUSE-SU-2025:1099-1 Release Date: 2025-04-02T08:14:12Z Rating: moderate References: * jsc#PED-11136 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that contains one feature can now be installed. ## Description: This update for govulncheck-vulndb fixes the following issues: * Update to version 0.0.20250331T171002 2025-03-31T17:10:02Z (jsc#PED-11136) * GO-2025-3443 * GO-2025-3548 * GO-2025-3557 * GO-2025-3558 * GO-2025-3559 * Update to version 0.0.20250327T184518 2025-03-27T18:45:18Z (jsc#PED-11136) * GO-2025-3526 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1099=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1099=1 ## Package List: * SUSE Package Hub 15 15-SP6 (noarch) * govulncheck-vulndb-0.0.20250331T171002-150000.1.49.1 * openSUSE Leap 15.6 (noarch) * govulncheck-vulndb-0.0.20250331T171002-150000.1.49.1 ## References: * https://jira.suse.com/browse/PED-11136 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 2 16:30:03 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 02 Apr 2025 16:30:03 -0000 Subject: SUSE-SU-2025:1114-1: important: Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3) Message-ID: <174361140362.8820.3467868172580572601@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:1114-1 Release Date: 2025-04-02T14:03:50Z Rating: important References: * bsc#1233023 Cross-References: * CVE-2022-49025 CVSS scores: * CVE-2022-49025 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49025 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_174 fixes one issue. The following security issue was fixed: * CVE-2022-49025: net/mlx5e: Fix use-after-free when reverting termination table (bsc#1233023). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1114=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1114=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_174-default-7-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_48-debugsource-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_174-default-debuginfo-7-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_174-preempt-debuginfo-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_174-preempt-7-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_174-default-7-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-49025.html * https://bugzilla.suse.com/show_bug.cgi?id=1233023 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 2 16:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 02 Apr 2025 16:30:06 -0000 Subject: SUSE-SU-2025:1120-1: important: Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5) Message-ID: <174361140638.8820.4987635267476559893@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5) Announcement ID: SUSE-SU-2025:1120-1 Release Date: 2025-04-02T15:03:56Z Rating: important References: * bsc#1228578 Cross-References: * CVE-2024-41062 CVSS scores: * CVE-2024-41062 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_73 fixes one issue. The following security issue was fixed: * CVE-2024-41062: Sync sock recv cb and release (bsc#1228578). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1120=1 SUSE-2025-1115=1 SUSE-2025-1110=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1120=1 SUSE-SLE- Module-Live-Patching-15-SP4-2025-1115=1 SUSE-SLE-Module-Live- Patching-15-SP4-2025-1110=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1113=1 SUSE-2025-1116=1 SUSE-2025-1117=1 SUSE-2025-1111=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-1113=1 SUSE-SLE- Module-Live-Patching-15-SP5-2025-1116=1 SUSE-SLE-Module-Live- Patching-15-SP5-2025-1117=1 SUSE-SLE-Module-Live-Patching-15-SP5-2025-1111=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-14-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_25-debugsource-15-150400.2.1 * kernel-livepatch-5_14_21-150400_24_116-default-debuginfo-15-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_29-debugsource-7-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_26-debugsource-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_128-default-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_116-default-15-150400.2.1 * kernel-livepatch-5_14_21-150400_24_119-default-14-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-14-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_25-debugsource-15-150400.2.1 * kernel-livepatch-5_14_21-150400_24_116-default-debuginfo-15-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_29-debugsource-7-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_26-debugsource-14-150400.2.1 * kernel-livepatch-5_14_21-150400_24_128-default-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_116-default-15-150400.2.1 * kernel-livepatch-5_14_21-150400_24_119-default-14-150400.2.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_65-default-debuginfo-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_59-default-debuginfo-15-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_12-debugsource-15-150500.2.1 * kernel-livepatch-5_14_21-150500_55_73-default-debuginfo-7-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_15-debugsource-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_65-default-13-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_14-debugsource-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_59-default-15-150500.2.1 * kernel-livepatch-5_14_21-150500_55_68-default-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_73-default-7-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_17-debugsource-7-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_65-default-debuginfo-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_59-default-debuginfo-15-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_12-debugsource-15-150500.2.1 * kernel-livepatch-5_14_21-150500_55_73-default-debuginfo-7-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_15-debugsource-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_65-default-13-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_14-debugsource-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_59-default-15-150500.2.1 * kernel-livepatch-5_14_21-150500_55_68-default-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_73-default-7-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le x86_64) * kernel-livepatch-SLE15-SP5_Update_17-debugsource-7-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-41062.html * https://bugzilla.suse.com/show_bug.cgi?id=1228578 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 2 16:30:13 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 02 Apr 2025 16:30:13 -0000 Subject: SUSE-SU-2025:1119-1: important: Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3) Message-ID: <174361141346.8820.9930308976522098107@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:1119-1 Release Date: 2025-04-02T15:03:49Z Rating: important References: * bsc#1228012 * bsc#1228578 * bsc#1233023 Cross-References: * CVE-2022-48791 * CVE-2022-49025 * CVE-2024-41062 CVSS scores: * CVE-2022-48791 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49025 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49025 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41062 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_167 fixes several issues. The following security issues were fixed: * CVE-2022-49025: net/mlx5e: Fix use-after-free when reverting termination table (bsc#1233023). * CVE-2024-41062: Sync sock recv cb and release (bsc#1228578). * CVE-2022-48791: Fix use-after-free for aborted TMF sas_task (bsc#1228002) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1112=1 SUSE-2025-1119=1 SUSE-2025-1109=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1112=1 SUSE-SLE- Module-Live-Patching-15-SP3-2025-1119=1 SUSE-SLE-Module-Live- Patching-15-SP3-2025-1109=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_43-debugsource-15-150300.2.1 * kernel-livepatch-5_3_18-150300_59_158-default-debuginfo-15-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_42-debugsource-16-150300.2.1 * kernel-livepatch-5_3_18-150300_59_153-default-16-150300.2.1 * kernel-livepatch-5_3_18-150300_59_153-default-debuginfo-16-150300.2.1 * kernel-livepatch-5_3_18-150300_59_167-default-debuginfo-10-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_46-debugsource-10-150300.2.1 * kernel-livepatch-5_3_18-150300_59_167-default-10-150300.2.1 * kernel-livepatch-5_3_18-150300_59_158-default-15-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_153-preempt-debuginfo-16-150300.2.1 * kernel-livepatch-5_3_18-150300_59_158-preempt-15-150300.2.1 * kernel-livepatch-5_3_18-150300_59_167-preempt-debuginfo-10-150300.2.1 * kernel-livepatch-5_3_18-150300_59_158-preempt-debuginfo-15-150300.2.1 * kernel-livepatch-5_3_18-150300_59_153-preempt-16-150300.2.1 * kernel-livepatch-5_3_18-150300_59_167-preempt-10-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_158-default-15-150300.2.1 * kernel-livepatch-5_3_18-150300_59_167-default-10-150300.2.1 * kernel-livepatch-5_3_18-150300_59_153-default-16-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48791.html * https://www.suse.com/security/cve/CVE-2022-49025.html * https://www.suse.com/security/cve/CVE-2024-41062.html * https://bugzilla.suse.com/show_bug.cgi?id=1228012 * https://bugzilla.suse.com/show_bug.cgi?id=1228578 * https://bugzilla.suse.com/show_bug.cgi?id=1233023 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 2 16:30:21 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 02 Apr 2025 16:30:21 -0000 Subject: SUSE-SU-2025:1118-1: important: Security update for ghostscript Message-ID: <174361142119.8820.9393284633678333568@smelt2.prg2.suse.org> # Security update for ghostscript Announcement ID: SUSE-SU-2025:1118-1 Release Date: 2025-04-02T14:49:11Z Rating: important References: * bsc#1240075 * bsc#1240077 * bsc#1240080 * bsc#1240081 Cross-References: * CVE-2025-27831 * CVE-2025-27832 * CVE-2025-27835 * CVE-2025-27836 CVSS scores: * CVE-2025-27831 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2025-27831 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-27832 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H * CVE-2025-27832 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-27835 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H * CVE-2025-27835 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-27836 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H * CVE-2025-27836 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for ghostscript fixes the following issues: * CVE-2025-27831: Fixed text buffer overflow in DOCXWRITE TXTWRITE device via long characters to devices/vector/doc_common.c (bsc#1240075) * CVE-2025-27832: Fixed compression buffer overflow in NPDL device for contrib/japanese/gdevnpdl.c (bsc#1240077) * CVE-2025-27835: Fixed buffer overflow occurs when converting glyphs to Unicode in psi/zbfont.c (bsc#1240080) * CVE-2025-27836: Fixed Print buffer overflow in BJ10V device in contrib/japanese/gdev10v.c (bsc#1240081) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1118=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1118=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * ghostscript-devel-9.52-23.89.1 * ghostscript-x11-debuginfo-9.52-23.89.1 * ghostscript-debuginfo-9.52-23.89.1 * ghostscript-debugsource-9.52-23.89.1 * ghostscript-9.52-23.89.1 * ghostscript-x11-9.52-23.89.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * ghostscript-devel-9.52-23.89.1 * ghostscript-x11-debuginfo-9.52-23.89.1 * ghostscript-debuginfo-9.52-23.89.1 * ghostscript-debugsource-9.52-23.89.1 * ghostscript-9.52-23.89.1 * ghostscript-x11-9.52-23.89.1 ## References: * https://www.suse.com/security/cve/CVE-2025-27831.html * https://www.suse.com/security/cve/CVE-2025-27832.html * https://www.suse.com/security/cve/CVE-2025-27835.html * https://www.suse.com/security/cve/CVE-2025-27836.html * https://bugzilla.suse.com/show_bug.cgi?id=1240075 * https://bugzilla.suse.com/show_bug.cgi?id=1240077 * https://bugzilla.suse.com/show_bug.cgi?id=1240080 * https://bugzilla.suse.com/show_bug.cgi?id=1240081 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 2 20:30:03 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 02 Apr 2025 20:30:03 -0000 Subject: SUSE-SU-2025:1121-1: important: Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3) Message-ID: <174362580342.8820.12172457603052722271@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:1121-1 Release Date: 2025-04-02T16:33:31Z Rating: important References: * bsc#1233023 Cross-References: * CVE-2022-49025 CVSS scores: * CVE-2022-49025 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49025 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_179 fixes one issue. The following security issue was fixed: * CVE-2022-49025: net/mlx5e: Fix use-after-free when reverting termination table (bsc#1233023). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1121=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1121=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_49-debugsource-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_179-default-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_179-default-debuginfo-6-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_179-preempt-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_179-preempt-debuginfo-6-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_49-debugsource-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_179-default-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_179-default-debuginfo-6-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-49025.html * https://bugzilla.suse.com/show_bug.cgi?id=1233023 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 3 12:30:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 03 Apr 2025 12:30:07 -0000 Subject: SUSE-SU-2025:1123-1: important: Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP3) Message-ID: <174368340741.7425.819480657997737896@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:1123-1 Release Date: 2025-04-03T11:15:36Z Rating: important References: * bsc#1228012 * bsc#1228578 * bsc#1233023 Cross-References: * CVE-2022-48791 * CVE-2022-49025 * CVE-2024-41062 CVSS scores: * CVE-2022-48791 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49025 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49025 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41062 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_170 fixes several issues. The following security issues were fixed: * CVE-2022-49025: net/mlx5e: Fix use-after-free when reverting termination table (bsc#1233023). * CVE-2024-41062: Sync sock recv cb and release (bsc#1228578). * CVE-2022-48791: Fix use-after-free for aborted TMF sas_task (bsc#1228002) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1124=1 SUSE-2025-1123=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1124=1 SUSE-SLE- Module-Live-Patching-15-SP3-2025-1123=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_164-default-debuginfo-11-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_45-debugsource-11-150300.2.1 * kernel-livepatch-5_3_18-150300_59_170-default-8-150300.2.1 * kernel-livepatch-5_3_18-150300_59_164-default-11-150300.2.1 * kernel-livepatch-5_3_18-150300_59_170-default-debuginfo-8-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_47-debugsource-8-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_170-preempt-8-150300.2.1 * kernel-livepatch-5_3_18-150300_59_164-preempt-debuginfo-11-150300.2.1 * kernel-livepatch-5_3_18-150300_59_164-preempt-11-150300.2.1 * kernel-livepatch-5_3_18-150300_59_170-preempt-debuginfo-8-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_170-default-8-150300.2.1 * kernel-livepatch-5_3_18-150300_59_170-default-debuginfo-8-150300.2.1 * kernel-livepatch-5_3_18-150300_59_164-default-11-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_47-debugsource-8-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48791.html * https://www.suse.com/security/cve/CVE-2022-49025.html * https://www.suse.com/security/cve/CVE-2024-41062.html * https://bugzilla.suse.com/show_bug.cgi?id=1228012 * https://bugzilla.suse.com/show_bug.cgi?id=1228578 * https://bugzilla.suse.com/show_bug.cgi?id=1233023 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 3 12:30:11 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 03 Apr 2025 12:30:11 -0000 Subject: SUSE-SU-2025:1129-1: moderate: Security update for GraphicsMagick Message-ID: <174368341185.7425.5642381134659624175@smelt2.prg2.suse.org> # Security update for GraphicsMagick Announcement ID: SUSE-SU-2025:1129-1 Release Date: 2025-04-03T11:54:25Z Rating: moderate References: * bsc#1239044 Cross-References: * CVE-2025-27795 CVSS scores: * CVE-2025-27795 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-27795 ( SUSE ): 4.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L * CVE-2025-27795 ( NVD ): 4.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for GraphicsMagick fixes the following issues: * CVE-2025-27795: Fixed missing image dimension resource limits in JXL (bsc#1239044) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1129=1 openSUSE-SLE-15.6-2025-1129=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1129=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * GraphicsMagick-devel-1.3.42-150600.3.4.1 * GraphicsMagick-1.3.42-150600.3.4.1 * libGraphicsMagick-Q16-3-1.3.42-150600.3.4.1 * libGraphicsMagick++-Q16-12-1.3.42-150600.3.4.1 * libGraphicsMagick++-Q16-12-debuginfo-1.3.42-150600.3.4.1 * libGraphicsMagickWand-Q16-2-1.3.42-150600.3.4.1 * libGraphicsMagickWand-Q16-2-debuginfo-1.3.42-150600.3.4.1 * libGraphicsMagick-Q16-3-debuginfo-1.3.42-150600.3.4.1 * libGraphicsMagick++-devel-1.3.42-150600.3.4.1 * GraphicsMagick-debugsource-1.3.42-150600.3.4.1 * libGraphicsMagick3-config-1.3.42-150600.3.4.1 * perl-GraphicsMagick-1.3.42-150600.3.4.1 * GraphicsMagick-debuginfo-1.3.42-150600.3.4.1 * perl-GraphicsMagick-debuginfo-1.3.42-150600.3.4.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * GraphicsMagick-devel-1.3.42-150600.3.4.1 * GraphicsMagick-1.3.42-150600.3.4.1 * libGraphicsMagick-Q16-3-1.3.42-150600.3.4.1 * libGraphicsMagick++-Q16-12-1.3.42-150600.3.4.1 * libGraphicsMagick++-Q16-12-debuginfo-1.3.42-150600.3.4.1 * libGraphicsMagickWand-Q16-2-1.3.42-150600.3.4.1 * libGraphicsMagickWand-Q16-2-debuginfo-1.3.42-150600.3.4.1 * libGraphicsMagick-Q16-3-debuginfo-1.3.42-150600.3.4.1 * libGraphicsMagick++-devel-1.3.42-150600.3.4.1 * GraphicsMagick-debugsource-1.3.42-150600.3.4.1 * libGraphicsMagick3-config-1.3.42-150600.3.4.1 * perl-GraphicsMagick-1.3.42-150600.3.4.1 * GraphicsMagick-debuginfo-1.3.42-150600.3.4.1 * perl-GraphicsMagick-debuginfo-1.3.42-150600.3.4.1 ## References: * https://www.suse.com/security/cve/CVE-2025-27795.html * https://bugzilla.suse.com/show_bug.cgi?id=1239044 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 3 12:30:26 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 03 Apr 2025 12:30:26 -0000 Subject: SUSE-SU-2025:1128-1: important: Security update for ffmpeg-4 Message-ID: <174368342620.7425.17151262312908369430@smelt2.prg2.suse.org> # Security update for ffmpeg-4 Announcement ID: SUSE-SU-2025:1128-1 Release Date: 2025-04-03T11:54:06Z Rating: important References: * bsc#1186756 * bsc#1202848 * bsc#1215945 * bsc#1219494 * bsc#1229338 * bsc#1230983 * bsc#1234028 * bsc#1235092 * bsc#1236007 * bsc#1237351 * bsc#1237358 * bsc#1237371 * bsc#1237382 * jsc#PED-10024 Cross-References: * CVE-2020-22037 * CVE-2024-12361 * CVE-2024-35368 * CVE-2024-36613 * CVE-2025-0518 * CVE-2025-22919 * CVE-2025-22921 * CVE-2025-25473 CVSS scores: * CVE-2020-22037 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2020-22037 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-12361 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-12361 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35368 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-35368 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-35368 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36613 ( SUSE ): 4.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-36613 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L * CVE-2024-36613 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-0518 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2025-0518 ( NVD ): 4.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-22919 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22919 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-22919 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-22921 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22921 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-22921 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-25473 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-25473 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N * CVE-2025-25473 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves eight vulnerabilities, contains one feature and has five security fixes can now be installed. ## Description: This update for ffmpeg-4 fixes the following issues: * CVE-2020-22037: Fixed unchecked return value of the init_vlc function (bsc#1186756) * CVE-2024-12361: Fixed null pointer dereference (bsc#1237358) * CVE-2024-35368: Fixed double free via the rkmpp_retrieve_frame function within libavcodec/rkmppdec.c (bsc#1234028) * CVE-2024-36613: Fixed integer overflow in the DXA demuxer of the libavformat library (bsc#1235092) * CVE-2025-0518: Fixed memory leak due to unchecked sscanf return value (bsc#1236007) * CVE-2025-22919: Fixed denial of service (DoS) via opening a crafted AAC file (bsc#1237371) * CVE-2025-22921: Fixed segmentation violation in NULL pointer dereference via the component /libavcodec/jpeg2000dec.c (bsc#1237382) * CVE-2025-25473: Fixed memory leak in avformat_free_context() (bsc#1237351) Other fixes: * Build with SVT-AV1 3.0.0. * Update to release 4.4.5: * Adjust bconds to build the package in SLFO without xvidcore. * Add 0001-libavcodec-arm-mlpdsp_armv5te-fix-label-format-to-wo.patch (bsc#1229338) * Add ffmpeg-c99.patch so that the package conforms to the C99 standard and builds on i586 with GCC 14. * No longer build against libmfx; build against libvpl (bsc#1230983, bsc#1219494) * Drop libmfx dependency from our product (jira #PED-10024) * Update patch to build with glslang 14 * Disable vmaf integration as ffmpeg-4 cannot handle vmaf>=3 * Copy codec list from ffmpeg-6 * Resolve build failure with binutils >= 2.41. (bsc#1215945) * Update to version 4.4.4: * avcodec/012v: Order operations for odd size handling * avcodec/alsdec: The minimal block is at least 7 bits * avcodec/bink: * Avoid undefined out of array end pointers in binkb_decode_plane() * Fix off by 1 error in ref end * avcodec/eac3dec: avoid float noise in fixed mode addition to overflow * avcodec/eatgq: : Check index increments in tgq_decode_block() * avcodec/escape124: * Fix signdness of end of input check * Fix some return codes * avcodec/ffv1dec: * Check that num h/v slices is supported * Fail earlier if prior context is corrupted * Restructure slice coordinate reading a bit * avcodec/mjpegenc: take into account component count when writing the SOF header size * avcodec/mlpdec: Check max matrix instead of max channel in noise check * avcodec/motionpixels: Mask pixels to valid values * avcodec/mpeg12dec: Check input size * avcodec/nvenc: * Fix b-frame DTS behavior with fractional framerates * Fix vbv buffer size in cq mode * avcodec/pictordec: Remove mid exit branch * avcodec/pngdec: Check deloco index more exactly * avcodec/rpzaenc: stop accessing out of bounds frame * avcodec/scpr3: Check bx * avcodec/scpr: Test bx before use * avcodec/snowenc: Fix visual weight calculation * avcodec/speedhq: Check buf_size to be big enough for DC * avcodec/sunrast: Fix maplength check * avcodec/tests/snowenc: * Fix 2nd test * Return a failure if DWT/IDWT mismatches * Unbreak DWT tests * avcodec/tiff: Ignore tile_count * avcodec/utils: * Allocate a line more for VC1 and WMV3 * Ensure linesize for SVQ3 * Use 32pixel alignment for bink * avcodec/videodsp_template: Adjust pointers to avoid undefined pointer things * avcodec/vp3: Add missing check for av_malloc * avcodec/wavpack: * Avoid undefined shift in get_tail() * Check for end of input in wv_unpack_dsd_high() * avcodec/xpmdec: Check size before allocation to avoid truncation * avfilter/vf_untile: swap the chroma shift values used for plane offsets * avformat/id3v2: Check taglen in read_uslt() * avformat/mov: Check samplesize and offset to avoid integer overflow * avformat/mxfdec: Use 64bit in remainder * avformat/nutdec: Add check for avformat_new_stream * avformat/replaygain: avoid undefined / negative abs * swscale/input: Use more unsigned intermediates * swscale/output: Bias 16bps output calculations to improve non overflowing range * swscale: aarch64: Fix yuv2rgb with negative stride * Use https for repository links * Update to version 4.4.3: * Stable bug fix release, mainly codecs, filter and format fixes. * Add patch to detect SDL2 >= 2.1.0 (bsc#1202848): * Update to version 4.4.2: * Stable bug fix release, mainly codecs, filter and format fixes. * Add conflicts for ffmpeg-5's tools * Enable Vulkan filters * Fix OS version check, so nvcodec is enabled for Leap too. * Disamble libsmbclient usage (can always be built with \--with-smbclient): the usecase of ffmpeg directly accessing smb:// shares is quite constructed (most users will have their smb shares mounted). * Update to version 4.4.1: * Stable bug fix release, mainly codecs and format fixes. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1128=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1128=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1128=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1128=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1128=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libpostproc55_9-debuginfo-4.4.5-150400.3.46.1 * ffmpeg-4-debugsource-4.4.5-150400.3.46.1 * libavcodec58_134-4.4.5-150400.3.46.1 * ffmpeg-4-libavdevice-devel-4.4.5-150400.3.46.1 * ffmpeg-4-libavresample-devel-4.4.5-150400.3.46.1 * ffmpeg-4-libswscale-devel-4.4.5-150400.3.46.1 * libavfilter7_110-debuginfo-4.4.5-150400.3.46.1 * libavformat58_76-4.4.5-150400.3.46.1 * libavutil56_70-debuginfo-4.4.5-150400.3.46.1 * libswresample3_9-debuginfo-4.4.5-150400.3.46.1 * libavresample4_0-4.4.5-150400.3.46.1 * ffmpeg-4-libswresample-devel-4.4.5-150400.3.46.1 * libavdevice58_13-debuginfo-4.4.5-150400.3.46.1 * ffmpeg-4-4.4.5-150400.3.46.1 * ffmpeg-4-debuginfo-4.4.5-150400.3.46.1 * libswscale5_9-debuginfo-4.4.5-150400.3.46.1 * libavcodec58_134-debuginfo-4.4.5-150400.3.46.1 * libavutil56_70-4.4.5-150400.3.46.1 * ffmpeg-4-libavutil-devel-4.4.5-150400.3.46.1 * libpostproc55_9-4.4.5-150400.3.46.1 * ffmpeg-4-libpostproc-devel-4.4.5-150400.3.46.1 * libavfilter7_110-4.4.5-150400.3.46.1 * ffmpeg-4-libavcodec-devel-4.4.5-150400.3.46.1 * ffmpeg-4-libavfilter-devel-4.4.5-150400.3.46.1 * ffmpeg-4-libavformat-devel-4.4.5-150400.3.46.1 * libswscale5_9-4.4.5-150400.3.46.1 * libavformat58_76-debuginfo-4.4.5-150400.3.46.1 * libavdevice58_13-4.4.5-150400.3.46.1 * libswresample3_9-4.4.5-150400.3.46.1 * ffmpeg-4-private-devel-4.4.5-150400.3.46.1 * libavresample4_0-debuginfo-4.4.5-150400.3.46.1 * openSUSE Leap 15.4 (x86_64) * libavresample4_0-32bit-4.4.5-150400.3.46.1 * libswresample3_9-32bit-debuginfo-4.4.5-150400.3.46.1 * libavformat58_76-32bit-debuginfo-4.4.5-150400.3.46.1 * libavresample4_0-32bit-debuginfo-4.4.5-150400.3.46.1 * libpostproc55_9-32bit-4.4.5-150400.3.46.1 * libavcodec58_134-32bit-debuginfo-4.4.5-150400.3.46.1 * libavcodec58_134-32bit-4.4.5-150400.3.46.1 * libswresample3_9-32bit-4.4.5-150400.3.46.1 * libswscale5_9-32bit-debuginfo-4.4.5-150400.3.46.1 * libavdevice58_13-32bit-debuginfo-4.4.5-150400.3.46.1 * libavformat58_76-32bit-4.4.5-150400.3.46.1 * libpostproc55_9-32bit-debuginfo-4.4.5-150400.3.46.1 * libswscale5_9-32bit-4.4.5-150400.3.46.1 * libavfilter7_110-32bit-debuginfo-4.4.5-150400.3.46.1 * libavfilter7_110-32bit-4.4.5-150400.3.46.1 * libavutil56_70-32bit-debuginfo-4.4.5-150400.3.46.1 * libavutil56_70-32bit-4.4.5-150400.3.46.1 * libavdevice58_13-32bit-4.4.5-150400.3.46.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libavresample4_0-64bit-debuginfo-4.4.5-150400.3.46.1 * libpostproc55_9-64bit-4.4.5-150400.3.46.1 * libavutil56_70-64bit-4.4.5-150400.3.46.1 * libavfilter7_110-64bit-debuginfo-4.4.5-150400.3.46.1 * libswresample3_9-64bit-debuginfo-4.4.5-150400.3.46.1 * libswscale5_9-64bit-4.4.5-150400.3.46.1 * libavfilter7_110-64bit-4.4.5-150400.3.46.1 * libavdevice58_13-64bit-4.4.5-150400.3.46.1 * libpostproc55_9-64bit-debuginfo-4.4.5-150400.3.46.1 * libavcodec58_134-64bit-debuginfo-4.4.5-150400.3.46.1 * libavresample4_0-64bit-4.4.5-150400.3.46.1 * libswscale5_9-64bit-debuginfo-4.4.5-150400.3.46.1 * libavdevice58_13-64bit-debuginfo-4.4.5-150400.3.46.1 * libavformat58_76-64bit-debuginfo-4.4.5-150400.3.46.1 * libavcodec58_134-64bit-4.4.5-150400.3.46.1 * libavutil56_70-64bit-debuginfo-4.4.5-150400.3.46.1 * libswresample3_9-64bit-4.4.5-150400.3.46.1 * libavformat58_76-64bit-4.4.5-150400.3.46.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libpostproc55_9-4.4.5-150400.3.46.1 * libpostproc55_9-debuginfo-4.4.5-150400.3.46.1 * ffmpeg-4-debugsource-4.4.5-150400.3.46.1 * libavcodec58_134-4.4.5-150400.3.46.1 * libavformat58_76-debuginfo-4.4.5-150400.3.46.1 * libavutil56_70-debuginfo-4.4.5-150400.3.46.1 * libavformat58_76-4.4.5-150400.3.46.1 * ffmpeg-4-debuginfo-4.4.5-150400.3.46.1 * libswresample3_9-debuginfo-4.4.5-150400.3.46.1 * libswresample3_9-4.4.5-150400.3.46.1 * libavcodec58_134-debuginfo-4.4.5-150400.3.46.1 * libavutil56_70-4.4.5-150400.3.46.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libpostproc55_9-4.4.5-150400.3.46.1 * libpostproc55_9-debuginfo-4.4.5-150400.3.46.1 * ffmpeg-4-debugsource-4.4.5-150400.3.46.1 * libavcodec58_134-4.4.5-150400.3.46.1 * libavformat58_76-debuginfo-4.4.5-150400.3.46.1 * libavutil56_70-debuginfo-4.4.5-150400.3.46.1 * libavformat58_76-4.4.5-150400.3.46.1 * ffmpeg-4-debuginfo-4.4.5-150400.3.46.1 * libswresample3_9-debuginfo-4.4.5-150400.3.46.1 * libswresample3_9-4.4.5-150400.3.46.1 * libavcodec58_134-debuginfo-4.4.5-150400.3.46.1 * libavutil56_70-4.4.5-150400.3.46.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libpostproc55_9-4.4.5-150400.3.46.1 * libpostproc55_9-debuginfo-4.4.5-150400.3.46.1 * ffmpeg-4-debugsource-4.4.5-150400.3.46.1 * libavcodec58_134-4.4.5-150400.3.46.1 * libavformat58_76-debuginfo-4.4.5-150400.3.46.1 * libavutil56_70-debuginfo-4.4.5-150400.3.46.1 * libavformat58_76-4.4.5-150400.3.46.1 * ffmpeg-4-debuginfo-4.4.5-150400.3.46.1 * libswresample3_9-debuginfo-4.4.5-150400.3.46.1 * libswresample3_9-4.4.5-150400.3.46.1 * libavcodec58_134-debuginfo-4.4.5-150400.3.46.1 * libavutil56_70-4.4.5-150400.3.46.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libpostproc55_9-4.4.5-150400.3.46.1 * libpostproc55_9-debuginfo-4.4.5-150400.3.46.1 * ffmpeg-4-debugsource-4.4.5-150400.3.46.1 * libavcodec58_134-4.4.5-150400.3.46.1 * libavformat58_76-debuginfo-4.4.5-150400.3.46.1 * libavutil56_70-debuginfo-4.4.5-150400.3.46.1 * libavformat58_76-4.4.5-150400.3.46.1 * ffmpeg-4-debuginfo-4.4.5-150400.3.46.1 * libswresample3_9-debuginfo-4.4.5-150400.3.46.1 * libswresample3_9-4.4.5-150400.3.46.1 * libavcodec58_134-debuginfo-4.4.5-150400.3.46.1 * libavutil56_70-4.4.5-150400.3.46.1 ## References: * https://www.suse.com/security/cve/CVE-2020-22037.html * https://www.suse.com/security/cve/CVE-2024-12361.html * https://www.suse.com/security/cve/CVE-2024-35368.html * https://www.suse.com/security/cve/CVE-2024-36613.html * https://www.suse.com/security/cve/CVE-2025-0518.html * https://www.suse.com/security/cve/CVE-2025-22919.html * https://www.suse.com/security/cve/CVE-2025-22921.html * https://www.suse.com/security/cve/CVE-2025-25473.html * https://bugzilla.suse.com/show_bug.cgi?id=1186756 * https://bugzilla.suse.com/show_bug.cgi?id=1202848 * https://bugzilla.suse.com/show_bug.cgi?id=1215945 * https://bugzilla.suse.com/show_bug.cgi?id=1219494 * https://bugzilla.suse.com/show_bug.cgi?id=1229338 * https://bugzilla.suse.com/show_bug.cgi?id=1230983 * https://bugzilla.suse.com/show_bug.cgi?id=1234028 * https://bugzilla.suse.com/show_bug.cgi?id=1235092 * https://bugzilla.suse.com/show_bug.cgi?id=1236007 * https://bugzilla.suse.com/show_bug.cgi?id=1237351 * https://bugzilla.suse.com/show_bug.cgi?id=1237358 * https://bugzilla.suse.com/show_bug.cgi?id=1237371 * https://bugzilla.suse.com/show_bug.cgi?id=1237382 * https://jira.suse.com/browse/PED-10024 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 3 12:30:32 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 03 Apr 2025 12:30:32 -0000 Subject: SUSE-SU-2025:1127-1: important: Security update for ghostscript Message-ID: <174368343232.7425.13094230747014304708@smelt2.prg2.suse.org> # Security update for ghostscript Announcement ID: SUSE-SU-2025:1127-1 Release Date: 2025-04-03T11:53:43Z Rating: important References: * bsc#1240075 * bsc#1240077 * bsc#1240080 * bsc#1240081 Cross-References: * CVE-2025-27831 * CVE-2025-27832 * CVE-2025-27835 * CVE-2025-27836 CVSS scores: * CVE-2025-27831 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H * CVE-2025-27831 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-27832 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H * CVE-2025-27832 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-27835 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H * CVE-2025-27835 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-27836 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H * CVE-2025-27836 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves four vulnerabilities can now be installed. ## Description: This update for ghostscript fixes the following issues: * CVE-2025-27831: Fixed text buffer overflow in DOCXWRITE TXTWRITE device via long characters to devices/vector/doc_common.c (bsc#1240075) * CVE-2025-27832: Fixed compression buffer overflow in NPDL device for contrib/japanese/gdevnpdl.c (bsc#1240077) * CVE-2025-27835: Fixed buffer overflow occurs when converting glyphs to Unicode in psi/zbfont.c (bsc#1240080) * CVE-2025-27836: Fixed Print buffer overflow in BJ10V device in contrib/japanese/gdev10v.c (bsc#1240081) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1127=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1127=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1127=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1127=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1127=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1127=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1127=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1127=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1127=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1127=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1127=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1127=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1127=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1127=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1127=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1127=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1127=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Manager Proxy 4.3 (x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * ghostscript-x11-debuginfo-9.52-150000.203.1 * ghostscript-x11-9.52-150000.203.1 * ghostscript-debugsource-9.52-150000.203.1 * ghostscript-devel-9.52-150000.203.1 * ghostscript-debuginfo-9.52-150000.203.1 * ghostscript-9.52-150000.203.1 ## References: * https://www.suse.com/security/cve/CVE-2025-27831.html * https://www.suse.com/security/cve/CVE-2025-27832.html * https://www.suse.com/security/cve/CVE-2025-27835.html * https://www.suse.com/security/cve/CVE-2025-27836.html * https://bugzilla.suse.com/show_bug.cgi?id=1240075 * https://bugzilla.suse.com/show_bug.cgi?id=1240077 * https://bugzilla.suse.com/show_bug.cgi?id=1240080 * https://bugzilla.suse.com/show_bug.cgi?id=1240081 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 3 12:30:36 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 03 Apr 2025 12:30:36 -0000 Subject: SUSE-SU-2025:1126-1: important: Security update for tomcat Message-ID: <174368343642.7425.7512126969348032398@smelt2.prg2.suse.org> # Security update for tomcat Announcement ID: SUSE-SU-2025:1126-1 Release Date: 2025-04-03T11:51:52Z Rating: important References: * bsc#1239302 * bsc#1239676 Cross-References: * CVE-2024-56337 * CVE-2025-24813 CVSS scores: * CVE-2024-56337 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56337 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-24813 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-24813 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-24813 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-24813 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Server 4.3 * Web and Scripting Module 15-SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for tomcat fixes the following issues: * CVE-2025-24813: Fixed potential RCE and/or information disclosure/corruption with partial PUT (bsc#1239302) * Update to Tomcat 9.0.102 * Fixes: * launch with java 17 (bsc#1239676) * Catalina * Fix: Weak etags in the If-Range header should not match as strong etags are required. (remm) * Fix: When looking up class loader resources by resource name, the resource name should not start with '/'. If the resource name does start with '/', Tomcat is lenient and looks it up as if the '/' was not present. When the web application class loader was configured with external repositories and names starting with '/' were used for lookups, it was possible that cached 'not found' results could effectively hide lookup results using the correct resource name. (markt) * Fix: Enable the JNDIRealm to validate credentials provided to HttpServletRequest.login(String username, String password) when the realm is configured to use GSSAPI authentication. (markt) * Fix: Fix a bug in the JRE compatibility detection that incorrectly identified Java 19 and Java 20 as supporting Java 21 features. (markt) * Fix: Improve the checks for exposure to and protection against CVE-2024-56337 so that reflection is not used unless required. The checks for whether the file system is case sensitive or not have been removed. (markt) * Fix: Avoid scenarios where temporary files used for partial PUT would not be deleted. (remm) * Fix: 69602: Fix regression in releases from 12-2024 that were too strict and rejected weak etags in the If-Range header. (remm) * Fix: 69576: Avoid possible failure initializing JreCompat due to uncaught exception introduced for the check for CVE-2024-56337. (remm) * Cluster * Add: 69598: Add detection of service account token changes to the KubernetesMembershipProvider implementation and reload the token if it changes. Based on a patch by Miroslav Jezbera. (markt) * Coyote * Fix: 69575: Avoid using compression if a response is already compressed using compress, deflate or zstd. (remm) * Update: Use Transfer-Encoding for compression rather than Content-Encoding if the client submits a TE header containing gzip. (remm) * Fix: Fix a race condition in the handling of HTTP/2 stream reset that could cause unexpected 500 responses. (markt) * Other * Add: Add makensis as an option for building the Installer for Windows on non-Windows platforms. (rjung/markt) * Update: Update Byte Buddy to 1.17.1. (markt) * Update: Update Checkstyle to 10.21.3. (markt) * Update: Update SpotBugs to 4.9.1. (markt) * Update: Update JSign to 7.1. (markt) * Add: Improvements to French translations. (remm) * Add: Improvements to Japanese translations by tak7iji. (markt) * Add: Add org.apache.juli.JsonFormatter to format log as one line JSON documents. (remm) * Update to Tomcat 9.0.99 * Catalina * Update: Add tableName configuration on the DataSourcePropertyStore that may be used by the WebDAV Servlet. (remm) * Update: Improve HTTP If headers processing according to RFC 9110. Based on pull request #796 by Chenjp. (remm/markt) * Update: Allow readOnly attribute configuration on the Resources element and allow configure the readOnly attribute value of the main resources. The attribute value will also be used by the default and WebDAV Servlets. (remm) * Fix: 69285: Optimise the creation of the parameter map for included requests. Based on sample code and test cases provided by John Engebretson. (markt) * Fix: 69527: Avoid rare cases where a cached resource could be set with 0 content length, or could be evicted immediately. (remm) * Fix: Fix possible edge cases (such as HTTP/1.0) with trying to detect requests without body for WebDAV LOCK and PROPFIND. (remm) * Fix: 69528: Add multi-release JAR support for the bloom archiveIndexStrategy of the Resources. (remm) * Fix: Improve checks for WEB-INF and META-INF in the WebDAV servlet. Based on a patch submitted by Chenjp. (remm) * Add: Add a check to ensure that, if one or more web applications are potentially vulnerable to CVE-2024-56337, the JVM has been configured to protect against the vulnerability and to configure the JVM correctly if not. Where one or more web applications are potentially vulnerable to CVE-2024-56337 and the JVM cannot be correctly configured or it cannot be confirmed that the JVM has been correctly configured, prevent the impacted web applications from starting. (markt) * Fix: Remove unused session to client map from CrawlerSessionManagerValve. Submitted by Brian Matzon. (remm) * Fix: When using the WebDAV servlet with serveSubpathOnly set to true, ensure that the destination for any requested WebDAV operation is also restricted to the sub-path. (markt) * Fix: Generate an appropriate Allow HTTP header when the Default servlet returns a 405 (method not allowed) response in response to a DELETE request because the target resource cannot be deleted. Pull request #802 provided by Chenjp. (markt) * Code: Refactor creation of RequestDispatcher instances so that the processing of the provided path is consistent with normal request processing. (markt) * Add: Add encodedReverseSolidusHandling and encodedSolidusHandling attributes to Context to provide control over the handling of the path used to created a RequestDispatcher. (markt) * Fix: Handle a potential NullPointerException after an IOException occurs on a non-container thread during asynchronous processing. (markt) * Fix: Enhance lifecycle of temporary files used by partial PUT. (remm) * Coyote * Fix: Don't log warnings for registered HTTP/2 settings that Tomcat does not support. These settings are now silently ignored. (markt) * Fix: Avoid a rare NullPointerException when recycling the Http11InputBuffer. (markt) * Fix: Lower the log level to debug for logging an invalid socket channel when processing poller events for the NIO Connector as this may occur in normal usage. (markt) * Code: Clean-up references to the HTTP/2 stream once request processing has completed to aid GC and reduce the size of the HTTP/2 recycled request and response cache. (markt) * Add: Add a new Connector configuration attribute, encodedReverseSolidusHandling, to control how %5c sequences in URLs are handled. The default behaviour is unchanged (decode) keeping in mind that the allowBackslash attribute determines how the decoded URI is processed. (markt) * Fix: 69545: Improve CRLF skipping for the available method of the ChunkedInputFilter. (remm) * Fix: Improve the performance of repeated calls to getHeader(). Pull request #813 provided by Adwait Kumar Singh. (markt) * Fix: 69559: Ensure that the Java 24 warning regarding the use of sun.misc.Unsafe::invokeCleaner is only reported by the JRE when the code will be used. (markt) * Jasper * Fix: 69508: Correct a regression in the fix for 69382 that broke JSP include actions if both the page attribute and the body contained parameters. Pull request #803 provided by Chenjp. (markt) * Fix: 69521: Update the EL Parser to allow the full range of valid characters in an EL identifier as defined by the Java Language Specification. (markt) * Fix: 69532: Optimise the creation of ExpressionFactory instances. Patch provided by John Engebretson. (markt) * Web applications * Add: Documentation. Expand the description of the security implications of setting mapperContextRootRedirectEnabled and/or mapperDirectoryRedirectEnabled to true. (markt) * Fix: Documentation. Better document the default for the truststoreProvider attribute of a SSLHostConfig element. (markt) * Other * Update: Update to Commons Daemon 1.4.1. (markt) * Update: Update the internal fork of Commons Pool to 2.12.1. (markt) * Update: Update Byte Buddy to 1.16.1. (markt) * Update: Update UnboundID to 7.0.2. (markt) * Update: Update Checkstyle to 10.21.2. (markt) * Update: Update SpotBugs to 4.9.0. (markt) * Add: Improvements to French translations. (remm) * Add: Improvements to Chinese translations by leeyazhou. (markt) * Add: Improvements to Japanese translations by tak7iji. (markt) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1126=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1126=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1126=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1126=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1126=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1126=1 * Web and Scripting Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP6-2025-1126=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1126=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1126=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1126=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1126=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1126=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1126=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1126=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1126=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Manager Server 4.3 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Enterprise Storage 7.1 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * openSUSE Leap 15.6 (noarch) * tomcat-javadoc-9.0.102-150200.78.1 * tomcat-lib-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-docs-webapp-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-embed-9.0.102-150200.78.1 * tomcat-jsvc-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * Web and Scripting Module 15-SP6 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * tomcat-lib-9.0.102-150200.78.1 * tomcat-admin-webapps-9.0.102-150200.78.1 * tomcat-webapps-9.0.102-150200.78.1 * tomcat-el-3_0-api-9.0.102-150200.78.1 * tomcat-servlet-4_0-api-9.0.102-150200.78.1 * tomcat-9.0.102-150200.78.1 * tomcat-jsp-2_3-api-9.0.102-150200.78.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56337.html * https://www.suse.com/security/cve/CVE-2025-24813.html * https://bugzilla.suse.com/show_bug.cgi?id=1239302 * https://bugzilla.suse.com/show_bug.cgi?id=1239676 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 3 12:30:41 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 03 Apr 2025 12:30:41 -0000 Subject: SUSE-SU-2025:1125-1: important: Security update for libxslt Message-ID: <174368344112.7425.15974115067918265660@smelt2.prg2.suse.org> # Security update for libxslt Announcement ID: SUSE-SU-2025:1125-1 Release Date: 2025-04-03T11:50:13Z Rating: important References: * bsc#1238591 * bsc#1239625 * bsc#1239637 Cross-References: * CVE-2023-40403 * CVE-2024-55549 * CVE-2025-24855 CVSS scores: * CVE-2023-40403 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2023-40403 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-55549 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H * CVE-2024-55549 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H * CVE-2025-24855 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H * CVE-2025-24855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 * SUSE Package Hub 15 15-SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for libxslt fixes the following issues: * CVE-2023-40403: Fixed sensitive information disclosure during processing web content (bsc#1238591) * CVE-2024-55549: Fixed use-after-free in xsltGetInheritedNsList (bsc#1239637) * CVE-2025-24855: Fixed use-after-free in numbers.c (bsc#1239625) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1125=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1125=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1125=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1125=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1125=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1125=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1125=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1125=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1125=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1125=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1125=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1125=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1125=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1125=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1125=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1125=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1125=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1125=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1125=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1125=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * openSUSE Leap 15.4 (x86_64) * libxslt1-32bit-debuginfo-1.1.34-150400.3.6.1 * libxslt1-32bit-1.1.34-150400.3.6.1 * libxslt-devel-32bit-1.1.34-150400.3.6.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libxslt1-64bit-1.1.34-150400.3.6.1 * libxslt1-64bit-debuginfo-1.1.34-150400.3.6.1 * libxslt-devel-64bit-1.1.34-150400.3.6.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * openSUSE Leap 15.6 (x86_64) * libxslt1-32bit-debuginfo-1.1.34-150400.3.6.1 * libxslt1-32bit-1.1.34-150400.3.6.1 * libxslt-devel-32bit-1.1.34-150400.3.6.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Package Hub 15 15-SP6 (x86_64) * libxslt1-32bit-debuginfo-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt1-32bit-1.1.34-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Manager Proxy 4.3 (x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libxslt-tools-debuginfo-1.1.34-150400.3.6.1 * libxslt1-debuginfo-1.1.34-150400.3.6.1 * libxslt-tools-1.1.34-150400.3.6.1 * libxslt-debugsource-1.1.34-150400.3.6.1 * libxslt-devel-1.1.34-150400.3.6.1 * libxslt1-1.1.34-150400.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2023-40403.html * https://www.suse.com/security/cve/CVE-2024-55549.html * https://www.suse.com/security/cve/CVE-2025-24855.html * https://bugzilla.suse.com/show_bug.cgi?id=1238591 * https://bugzilla.suse.com/show_bug.cgi?id=1239625 * https://bugzilla.suse.com/show_bug.cgi?id=1239637 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 3 16:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 03 Apr 2025 16:30:06 -0000 Subject: SUSE-SU-2025:1138-1: important: Security update for MozillaFirefox Message-ID: <174369780600.21454.7583579602353618180@smelt2.prg2.suse.org> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2025:1138-1 Release Date: 2025-04-03T15:14:14Z Rating: important References: * bsc#1240083 Cross-References: * CVE-2025-3028 * CVE-2025-3029 * CVE-2025-3030 CVSS scores: * CVE-2025-3028 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2025-3028 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2025-3029 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-3029 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-3030 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-3030 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: * Firefox Extended Support Release 128.9.0 ESR MFSA 2025-22 (bsc#1240083): * CVE-2025-3028: Use-after-free triggered by XSLTProcessor * CVE-2025-3029: URL Bar Spoofing via non-BMP Unicode characters * CVE-2025-3030: Memory safety bugs fixed in Firefox 137, Thunderbird 137, Firefox ESR 128.9, and Thunderbird 128.9 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1138=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-1138=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1138=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1138=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1138=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1138=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1138=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1138=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1138=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1138=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1138=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1138=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1138=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1138=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-128.9.0-150200.152.176.1 * MozillaFirefox-debugsource-128.9.0-150200.152.176.1 * MozillaFirefox-translations-common-128.9.0-150200.152.176.1 * MozillaFirefox-debuginfo-128.9.0-150200.152.176.1 * MozillaFirefox-translations-other-128.9.0-150200.152.176.1 * MozillaFirefox-branding-upstream-128.9.0-150200.152.176.1 * openSUSE Leap 15.6 (noarch) * MozillaFirefox-devel-128.9.0-150200.152.176.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-128.9.0-150200.152.176.1 * MozillaFirefox-debugsource-128.9.0-150200.152.176.1 * MozillaFirefox-translations-common-128.9.0-150200.152.176.1 * MozillaFirefox-debuginfo-128.9.0-150200.152.176.1 * MozillaFirefox-translations-other-128.9.0-150200.152.176.1 * Desktop Applications Module 15-SP6 (noarch) * MozillaFirefox-devel-128.9.0-150200.152.176.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * MozillaFirefox-128.9.0-150200.152.176.1 * MozillaFirefox-debugsource-128.9.0-150200.152.176.1 * MozillaFirefox-translations-common-128.9.0-150200.152.176.1 * MozillaFirefox-debuginfo-128.9.0-150200.152.176.1 * MozillaFirefox-translations-other-128.9.0-150200.152.176.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * MozillaFirefox-devel-128.9.0-150200.152.176.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * MozillaFirefox-128.9.0-150200.152.176.1 * MozillaFirefox-debugsource-128.9.0-150200.152.176.1 * MozillaFirefox-translations-common-128.9.0-150200.152.176.1 * MozillaFirefox-debuginfo-128.9.0-150200.152.176.1 * MozillaFirefox-translations-other-128.9.0-150200.152.176.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * MozillaFirefox-devel-128.9.0-150200.152.176.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * MozillaFirefox-128.9.0-150200.152.176.1 * MozillaFirefox-debugsource-128.9.0-150200.152.176.1 * MozillaFirefox-translations-common-128.9.0-150200.152.176.1 * MozillaFirefox-debuginfo-128.9.0-150200.152.176.1 * MozillaFirefox-translations-other-128.9.0-150200.152.176.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * MozillaFirefox-devel-128.9.0-150200.152.176.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * MozillaFirefox-128.9.0-150200.152.176.1 * MozillaFirefox-debugsource-128.9.0-150200.152.176.1 * MozillaFirefox-translations-common-128.9.0-150200.152.176.1 * MozillaFirefox-debuginfo-128.9.0-150200.152.176.1 * MozillaFirefox-translations-other-128.9.0-150200.152.176.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * MozillaFirefox-devel-128.9.0-150200.152.176.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * MozillaFirefox-128.9.0-150200.152.176.1 * MozillaFirefox-debugsource-128.9.0-150200.152.176.1 * MozillaFirefox-translations-common-128.9.0-150200.152.176.1 * MozillaFirefox-debuginfo-128.9.0-150200.152.176.1 * MozillaFirefox-translations-other-128.9.0-150200.152.176.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * MozillaFirefox-devel-128.9.0-150200.152.176.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-128.9.0-150200.152.176.1 * MozillaFirefox-debugsource-128.9.0-150200.152.176.1 * MozillaFirefox-translations-common-128.9.0-150200.152.176.1 * MozillaFirefox-debuginfo-128.9.0-150200.152.176.1 * MozillaFirefox-translations-other-128.9.0-150200.152.176.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * MozillaFirefox-devel-128.9.0-150200.152.176.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-128.9.0-150200.152.176.1 * MozillaFirefox-debugsource-128.9.0-150200.152.176.1 * MozillaFirefox-translations-common-128.9.0-150200.152.176.1 * MozillaFirefox-debuginfo-128.9.0-150200.152.176.1 * MozillaFirefox-translations-other-128.9.0-150200.152.176.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * MozillaFirefox-devel-128.9.0-150200.152.176.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-128.9.0-150200.152.176.1 * MozillaFirefox-debugsource-128.9.0-150200.152.176.1 * MozillaFirefox-translations-common-128.9.0-150200.152.176.1 * MozillaFirefox-debuginfo-128.9.0-150200.152.176.1 * MozillaFirefox-translations-other-128.9.0-150200.152.176.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * MozillaFirefox-devel-128.9.0-150200.152.176.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * MozillaFirefox-128.9.0-150200.152.176.1 * MozillaFirefox-debugsource-128.9.0-150200.152.176.1 * MozillaFirefox-translations-common-128.9.0-150200.152.176.1 * MozillaFirefox-debuginfo-128.9.0-150200.152.176.1 * MozillaFirefox-translations-other-128.9.0-150200.152.176.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * MozillaFirefox-devel-128.9.0-150200.152.176.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * MozillaFirefox-128.9.0-150200.152.176.1 * MozillaFirefox-debugsource-128.9.0-150200.152.176.1 * MozillaFirefox-translations-common-128.9.0-150200.152.176.1 * MozillaFirefox-debuginfo-128.9.0-150200.152.176.1 * MozillaFirefox-translations-other-128.9.0-150200.152.176.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * MozillaFirefox-devel-128.9.0-150200.152.176.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * MozillaFirefox-128.9.0-150200.152.176.1 * MozillaFirefox-debugsource-128.9.0-150200.152.176.1 * MozillaFirefox-translations-common-128.9.0-150200.152.176.1 * MozillaFirefox-debuginfo-128.9.0-150200.152.176.1 * MozillaFirefox-translations-other-128.9.0-150200.152.176.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * MozillaFirefox-devel-128.9.0-150200.152.176.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * MozillaFirefox-128.9.0-150200.152.176.1 * MozillaFirefox-debugsource-128.9.0-150200.152.176.1 * MozillaFirefox-translations-common-128.9.0-150200.152.176.1 * MozillaFirefox-debuginfo-128.9.0-150200.152.176.1 * MozillaFirefox-translations-other-128.9.0-150200.152.176.1 * SUSE Enterprise Storage 7.1 (noarch) * MozillaFirefox-devel-128.9.0-150200.152.176.1 ## References: * https://www.suse.com/security/cve/CVE-2025-3028.html * https://www.suse.com/security/cve/CVE-2025-3029.html * https://www.suse.com/security/cve/CVE-2025-3030.html * https://bugzilla.suse.com/show_bug.cgi?id=1240083 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 3 16:30:09 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 03 Apr 2025 16:30:09 -0000 Subject: SUSE-SU-2025:1137-1: important: Security update for xz Message-ID: <174369780986.21454.7643100051038828146@smelt2.prg2.suse.org> # Security update for xz Announcement ID: SUSE-SU-2025:1137-1 Release Date: 2025-04-03T15:11:09Z Rating: important References: * bsc#1240414 Cross-References: * CVE-2025-31115 CVSS scores: * CVE-2025-31115 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-31115 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for xz fixes the following issues: * CVE-2025-31115: Fixed heap use after free and writing to an address based on the null pointer plus an offset (bsc#1240414) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1137=1 openSUSE-SLE-15.6-2025-1137=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1137=1 ## Package List: * openSUSE Leap 15.6 (x86_64) * xz-devel-32bit-5.4.1-150600.3.3.1 * liblzma5-32bit-5.4.1-150600.3.3.1 * liblzma5-32bit-debuginfo-5.4.1-150600.3.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * xz-static-devel-5.4.1-150600.3.3.1 * xz-devel-5.4.1-150600.3.3.1 * xz-debugsource-5.4.1-150600.3.3.1 * xz-debuginfo-5.4.1-150600.3.3.1 * liblzma5-debuginfo-5.4.1-150600.3.3.1 * xz-5.4.1-150600.3.3.1 * liblzma5-5.4.1-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * xz-lang-5.4.1-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * liblzma5-64bit-debuginfo-5.4.1-150600.3.3.1 * xz-devel-64bit-5.4.1-150600.3.3.1 * liblzma5-64bit-5.4.1-150600.3.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * xz-static-devel-5.4.1-150600.3.3.1 * xz-devel-5.4.1-150600.3.3.1 * xz-debugsource-5.4.1-150600.3.3.1 * xz-debuginfo-5.4.1-150600.3.3.1 * liblzma5-debuginfo-5.4.1-150600.3.3.1 * xz-5.4.1-150600.3.3.1 * liblzma5-5.4.1-150600.3.3.1 * Basesystem Module 15-SP6 (noarch) * xz-lang-5.4.1-150600.3.3.1 * Basesystem Module 15-SP6 (x86_64) * liblzma5-32bit-5.4.1-150600.3.3.1 * liblzma5-32bit-debuginfo-5.4.1-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31115.html * https://bugzilla.suse.com/show_bug.cgi?id=1240414 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 3 16:30:14 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 03 Apr 2025 16:30:14 -0000 Subject: SUSE-SU-2025:1135-1: moderate: Security update for apparmor Message-ID: <174369781484.21454.5013822521708748664@smelt2.prg2.suse.org> # Security update for apparmor Announcement ID: SUSE-SU-2025:1135-1 Release Date: 2025-04-03T14:18:32Z Rating: moderate References: * bsc#1234452 Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that has one security fix can now be installed. ## Description: This update for apparmor fixes the following issue: * Allow dovecot-auth to execute unix check password from /sbin, not only from /usr/bin (bsc#1234452). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1135=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1135=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1135=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1135=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1135=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1135=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1135=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1135=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * pam_apparmor-debuginfo-2.13.6-150300.3.18.2 * perl-apparmor-debuginfo-2.13.6-150300.3.18.2 * apache2-mod_apparmor-debuginfo-2.13.6-150300.3.18.2 * libapparmor-devel-2.13.6-150300.3.18.2 * apparmor-debugsource-2.13.6-150300.3.18.2 * python3-apparmor-2.13.6-150300.3.18.2 * apache2-mod_apparmor-2.13.6-150300.3.18.2 * perl-apparmor-2.13.6-150300.3.18.2 * ruby-apparmor-debuginfo-2.13.6-150300.3.18.2 * apparmor-parser-2.13.6-150300.3.18.2 * libapparmor-debugsource-2.13.6-150300.3.18.2 * ruby-apparmor-2.13.6-150300.3.18.2 * libapparmor1-debuginfo-2.13.6-150300.3.18.2 * libapparmor1-2.13.6-150300.3.18.2 * pam_apparmor-2.13.6-150300.3.18.2 * python3-apparmor-debuginfo-2.13.6-150300.3.18.2 * apparmor-parser-debuginfo-2.13.6-150300.3.18.2 * openSUSE Leap 15.3 (noarch) * apparmor-profiles-2.13.6-150300.3.18.2 * apparmor-abstractions-2.13.6-150300.3.18.2 * apparmor-docs-2.13.6-150300.3.18.2 * apparmor-utils-lang-2.13.6-150300.3.18.2 * apparmor-utils-2.13.6-150300.3.18.2 * apparmor-parser-lang-2.13.6-150300.3.18.2 * openSUSE Leap 15.3 (x86_64) * pam_apparmor-32bit-debuginfo-2.13.6-150300.3.18.2 * pam_apparmor-32bit-2.13.6-150300.3.18.2 * libapparmor1-32bit-2.13.6-150300.3.18.2 * libapparmor1-32bit-debuginfo-2.13.6-150300.3.18.2 * openSUSE Leap 15.3 (aarch64_ilp32) * libapparmor1-64bit-debuginfo-2.13.6-150300.3.18.2 * pam_apparmor-64bit-2.13.6-150300.3.18.2 * libapparmor1-64bit-2.13.6-150300.3.18.2 * pam_apparmor-64bit-debuginfo-2.13.6-150300.3.18.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * pam_apparmor-debuginfo-2.13.6-150300.3.18.2 * perl-apparmor-debuginfo-2.13.6-150300.3.18.2 * apache2-mod_apparmor-debuginfo-2.13.6-150300.3.18.2 * libapparmor-devel-2.13.6-150300.3.18.2 * apparmor-debugsource-2.13.6-150300.3.18.2 * python3-apparmor-2.13.6-150300.3.18.2 * apache2-mod_apparmor-2.13.6-150300.3.18.2 * perl-apparmor-2.13.6-150300.3.18.2 * apparmor-parser-2.13.6-150300.3.18.2 * libapparmor-debugsource-2.13.6-150300.3.18.2 * libapparmor1-debuginfo-2.13.6-150300.3.18.2 * libapparmor1-2.13.6-150300.3.18.2 * pam_apparmor-2.13.6-150300.3.18.2 * python3-apparmor-debuginfo-2.13.6-150300.3.18.2 * apparmor-parser-debuginfo-2.13.6-150300.3.18.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * apparmor-profiles-2.13.6-150300.3.18.2 * apparmor-abstractions-2.13.6-150300.3.18.2 * apparmor-docs-2.13.6-150300.3.18.2 * apparmor-utils-lang-2.13.6-150300.3.18.2 * apparmor-utils-2.13.6-150300.3.18.2 * apparmor-parser-lang-2.13.6-150300.3.18.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * libapparmor1-32bit-2.13.6-150300.3.18.2 * pam_apparmor-32bit-2.13.6-150300.3.18.2 * libapparmor1-32bit-debuginfo-2.13.6-150300.3.18.2 * pam_apparmor-32bit-debuginfo-2.13.6-150300.3.18.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * pam_apparmor-debuginfo-2.13.6-150300.3.18.2 * perl-apparmor-debuginfo-2.13.6-150300.3.18.2 * apache2-mod_apparmor-debuginfo-2.13.6-150300.3.18.2 * libapparmor-devel-2.13.6-150300.3.18.2 * apparmor-debugsource-2.13.6-150300.3.18.2 * python3-apparmor-2.13.6-150300.3.18.2 * apache2-mod_apparmor-2.13.6-150300.3.18.2 * perl-apparmor-2.13.6-150300.3.18.2 * apparmor-parser-2.13.6-150300.3.18.2 * libapparmor-debugsource-2.13.6-150300.3.18.2 * libapparmor1-debuginfo-2.13.6-150300.3.18.2 * libapparmor1-2.13.6-150300.3.18.2 * pam_apparmor-2.13.6-150300.3.18.2 * python3-apparmor-debuginfo-2.13.6-150300.3.18.2 * apparmor-parser-debuginfo-2.13.6-150300.3.18.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * apparmor-profiles-2.13.6-150300.3.18.2 * apparmor-abstractions-2.13.6-150300.3.18.2 * apparmor-docs-2.13.6-150300.3.18.2 * apparmor-utils-lang-2.13.6-150300.3.18.2 * apparmor-utils-2.13.6-150300.3.18.2 * apparmor-parser-lang-2.13.6-150300.3.18.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64) * libapparmor1-32bit-2.13.6-150300.3.18.2 * pam_apparmor-32bit-2.13.6-150300.3.18.2 * libapparmor1-32bit-debuginfo-2.13.6-150300.3.18.2 * pam_apparmor-32bit-debuginfo-2.13.6-150300.3.18.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * pam_apparmor-debuginfo-2.13.6-150300.3.18.2 * perl-apparmor-debuginfo-2.13.6-150300.3.18.2 * apache2-mod_apparmor-debuginfo-2.13.6-150300.3.18.2 * libapparmor-devel-2.13.6-150300.3.18.2 * apparmor-debugsource-2.13.6-150300.3.18.2 * python3-apparmor-2.13.6-150300.3.18.2 * apache2-mod_apparmor-2.13.6-150300.3.18.2 * perl-apparmor-2.13.6-150300.3.18.2 * apparmor-parser-2.13.6-150300.3.18.2 * libapparmor-debugsource-2.13.6-150300.3.18.2 * libapparmor1-debuginfo-2.13.6-150300.3.18.2 * libapparmor1-2.13.6-150300.3.18.2 * pam_apparmor-2.13.6-150300.3.18.2 * python3-apparmor-debuginfo-2.13.6-150300.3.18.2 * apparmor-parser-debuginfo-2.13.6-150300.3.18.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * apparmor-profiles-2.13.6-150300.3.18.2 * apparmor-abstractions-2.13.6-150300.3.18.2 * apparmor-docs-2.13.6-150300.3.18.2 * apparmor-utils-lang-2.13.6-150300.3.18.2 * apparmor-utils-2.13.6-150300.3.18.2 * apparmor-parser-lang-2.13.6-150300.3.18.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * libapparmor1-32bit-2.13.6-150300.3.18.2 * pam_apparmor-32bit-2.13.6-150300.3.18.2 * libapparmor1-32bit-debuginfo-2.13.6-150300.3.18.2 * pam_apparmor-32bit-debuginfo-2.13.6-150300.3.18.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * pam_apparmor-debuginfo-2.13.6-150300.3.18.2 * perl-apparmor-debuginfo-2.13.6-150300.3.18.2 * apache2-mod_apparmor-debuginfo-2.13.6-150300.3.18.2 * libapparmor-devel-2.13.6-150300.3.18.2 * apparmor-debugsource-2.13.6-150300.3.18.2 * python3-apparmor-2.13.6-150300.3.18.2 * apache2-mod_apparmor-2.13.6-150300.3.18.2 * perl-apparmor-2.13.6-150300.3.18.2 * apparmor-parser-2.13.6-150300.3.18.2 * libapparmor-debugsource-2.13.6-150300.3.18.2 * libapparmor1-debuginfo-2.13.6-150300.3.18.2 * libapparmor1-2.13.6-150300.3.18.2 * pam_apparmor-2.13.6-150300.3.18.2 * python3-apparmor-debuginfo-2.13.6-150300.3.18.2 * apparmor-parser-debuginfo-2.13.6-150300.3.18.2 * SUSE Enterprise Storage 7.1 (noarch) * apparmor-profiles-2.13.6-150300.3.18.2 * apparmor-abstractions-2.13.6-150300.3.18.2 * apparmor-docs-2.13.6-150300.3.18.2 * apparmor-utils-lang-2.13.6-150300.3.18.2 * apparmor-utils-2.13.6-150300.3.18.2 * apparmor-parser-lang-2.13.6-150300.3.18.2 * SUSE Enterprise Storage 7.1 (x86_64) * libapparmor1-32bit-2.13.6-150300.3.18.2 * pam_apparmor-32bit-2.13.6-150300.3.18.2 * libapparmor1-32bit-debuginfo-2.13.6-150300.3.18.2 * pam_apparmor-32bit-debuginfo-2.13.6-150300.3.18.2 * SUSE Linux Enterprise Micro 5.1 (noarch) * apparmor-abstractions-2.13.6-150300.3.18.2 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * pam_apparmor-debuginfo-2.13.6-150300.3.18.2 * apparmor-debugsource-2.13.6-150300.3.18.2 * apparmor-parser-2.13.6-150300.3.18.2 * libapparmor-debugsource-2.13.6-150300.3.18.2 * libapparmor1-debuginfo-2.13.6-150300.3.18.2 * libapparmor1-2.13.6-150300.3.18.2 * pam_apparmor-2.13.6-150300.3.18.2 * apparmor-parser-debuginfo-2.13.6-150300.3.18.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * pam_apparmor-debuginfo-2.13.6-150300.3.18.2 * apparmor-debugsource-2.13.6-150300.3.18.2 * apparmor-parser-2.13.6-150300.3.18.2 * libapparmor-debugsource-2.13.6-150300.3.18.2 * libapparmor1-debuginfo-2.13.6-150300.3.18.2 * libapparmor1-2.13.6-150300.3.18.2 * pam_apparmor-2.13.6-150300.3.18.2 * apparmor-parser-debuginfo-2.13.6-150300.3.18.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * pam_apparmor-debuginfo-2.13.6-150300.3.18.2 * apparmor-debugsource-2.13.6-150300.3.18.2 * apparmor-parser-2.13.6-150300.3.18.2 * libapparmor-debugsource-2.13.6-150300.3.18.2 * libapparmor1-debuginfo-2.13.6-150300.3.18.2 * libapparmor1-2.13.6-150300.3.18.2 * pam_apparmor-2.13.6-150300.3.18.2 * apparmor-parser-debuginfo-2.13.6-150300.3.18.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234452 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 3 16:30:17 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 03 Apr 2025 16:30:17 -0000 Subject: SUSE-SU-2025:1134-1: moderate: Security update for apparmor Message-ID: <174369781749.21454.14594735633850687146@smelt2.prg2.suse.org> # Security update for apparmor Announcement ID: SUSE-SU-2025:1134-1 Release Date: 2025-04-03T14:18:00Z Rating: moderate References: * bsc#1234452 Affected Products: * Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one security fix can now be installed. ## Description: This update for apparmor fixes the following issue: * Allow dovecot-auth to execute unix check password from /sbin, not only from /usr/bin (bsc#1234452). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-1134=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-1134=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1134=1 openSUSE-SLE-15.6-2025-1134=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1134=1 ## Package List: * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * perl-apparmor-3.1.7-150600.5.3.2 * perl-apparmor-debuginfo-3.1.7-150600.5.3.2 * apparmor-debugsource-3.1.7-150600.5.3.2 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * apache2-mod_apparmor-debuginfo-3.1.7-150600.5.3.2 * apache2-mod_apparmor-3.1.7-150600.5.3.2 * apparmor-debugsource-3.1.7-150600.5.3.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libapparmor1-debuginfo-3.1.7-150600.5.3.2 * apparmor-parser-debuginfo-3.1.7-150600.5.3.2 * libapparmor1-3.1.7-150600.5.3.2 * perl-apparmor-debuginfo-3.1.7-150600.5.3.2 * pam_apparmor-3.1.7-150600.5.3.2 * libapparmor-devel-3.1.7-150600.5.3.2 * pam_apparmor-debuginfo-3.1.7-150600.5.3.2 * python3-apparmor-debuginfo-3.1.7-150600.5.3.2 * apache2-mod_apparmor-debuginfo-3.1.7-150600.5.3.2 * python3-apparmor-3.1.7-150600.5.3.2 * apparmor-parser-3.1.7-150600.5.3.2 * ruby-apparmor-3.1.7-150600.5.3.2 * perl-apparmor-3.1.7-150600.5.3.2 * apache2-mod_apparmor-3.1.7-150600.5.3.2 * libapparmor-debugsource-3.1.7-150600.5.3.2 * apparmor-debugsource-3.1.7-150600.5.3.2 * ruby-apparmor-debuginfo-3.1.7-150600.5.3.2 * openSUSE Leap 15.6 (noarch) * apparmor-utils-lang-3.1.7-150600.5.3.2 * apparmor-utils-3.1.7-150600.5.3.2 * apparmor-docs-3.1.7-150600.5.3.2 * apparmor-profiles-3.1.7-150600.5.3.2 * apparmor-abstractions-3.1.7-150600.5.3.2 * apparmor-parser-lang-3.1.7-150600.5.3.2 * openSUSE Leap 15.6 (x86_64) * pam_apparmor-32bit-debuginfo-3.1.7-150600.5.3.2 * pam_apparmor-32bit-3.1.7-150600.5.3.2 * libapparmor1-32bit-debuginfo-3.1.7-150600.5.3.2 * libapparmor1-32bit-3.1.7-150600.5.3.2 * openSUSE Leap 15.6 (aarch64_ilp32) * pam_apparmor-64bit-debuginfo-3.1.7-150600.5.3.2 * pam_apparmor-64bit-3.1.7-150600.5.3.2 * libapparmor1-64bit-debuginfo-3.1.7-150600.5.3.2 * libapparmor1-64bit-3.1.7-150600.5.3.2 * Basesystem Module 15-SP6 (noarch) * apparmor-utils-lang-3.1.7-150600.5.3.2 * apparmor-utils-3.1.7-150600.5.3.2 * apparmor-docs-3.1.7-150600.5.3.2 * apparmor-profiles-3.1.7-150600.5.3.2 * apparmor-abstractions-3.1.7-150600.5.3.2 * apparmor-parser-lang-3.1.7-150600.5.3.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libapparmor1-debuginfo-3.1.7-150600.5.3.2 * apparmor-parser-debuginfo-3.1.7-150600.5.3.2 * libapparmor1-3.1.7-150600.5.3.2 * libapparmor-devel-3.1.7-150600.5.3.2 * pam_apparmor-3.1.7-150600.5.3.2 * pam_apparmor-debuginfo-3.1.7-150600.5.3.2 * python3-apparmor-debuginfo-3.1.7-150600.5.3.2 * python3-apparmor-3.1.7-150600.5.3.2 * apparmor-parser-3.1.7-150600.5.3.2 * libapparmor-debugsource-3.1.7-150600.5.3.2 * apparmor-debugsource-3.1.7-150600.5.3.2 * Basesystem Module 15-SP6 (x86_64) * pam_apparmor-32bit-debuginfo-3.1.7-150600.5.3.2 * pam_apparmor-32bit-3.1.7-150600.5.3.2 * libapparmor1-32bit-debuginfo-3.1.7-150600.5.3.2 * libapparmor1-32bit-3.1.7-150600.5.3.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234452 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 3 16:30:24 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 03 Apr 2025 16:30:24 -0000 Subject: SUSE-SU-2025:1131-1: important: Security update for openvpn Message-ID: <174369782461.21454.6207316794261798075@smelt2.prg2.suse.org> # Security update for openvpn Announcement ID: SUSE-SU-2025:1131-1 Release Date: 2025-04-03T13:10:02Z Rating: important References: * bsc#1235147 Cross-References: * CVE-2024-5594 CVSS scores: * CVE-2024-5594 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-5594 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2024-5594 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for openvpn fixes the following issues: * CVE-2024-5594: Fixed incorrect handling of null bytes and invalid characters in control messages (bsc#1235147) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1131=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1131=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1131=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1131=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1131=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1131=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1131=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1131=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1131=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1131=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1131=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1131=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-down-root-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-down-root-plugin-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Manager Proxy 4.3 (x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * openvpn-debuginfo-2.5.6-150400.3.9.1 * openvpn-debugsource-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-debuginfo-2.5.6-150400.3.9.1 * openvpn-auth-pam-plugin-2.5.6-150400.3.9.1 * openvpn-devel-2.5.6-150400.3.9.1 * openvpn-2.5.6-150400.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-5594.html * https://bugzilla.suse.com/show_bug.cgi?id=1235147 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 3 20:30:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 03 Apr 2025 20:30:07 -0000 Subject: SUSE-SU-2025:1139-1: important: Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) Message-ID: <174371220767.21454.15442400850955445312@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:1139-1 Release Date: 2025-04-03T16:33:54Z Rating: important References: * bsc#1228012 * bsc#1228578 * bsc#1233023 Cross-References: * CVE-2022-48791 * CVE-2022-49025 * CVE-2024-41062 CVSS scores: * CVE-2022-48791 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-48791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49025 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49025 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-41062 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-41062 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_161 fixes several issues. The following security issues were fixed: * CVE-2022-49025: net/mlx5e: Fix use-after-free when reverting termination table (bsc#1233023). * CVE-2024-41062: Sync sock recv cb and release (bsc#1228578). * CVE-2022-48791: Fix use-after-free for aborted TMF sas_task (bsc#1228002) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1139=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1139=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_161-default-14-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_44-debugsource-14-150300.2.1 * kernel-livepatch-5_3_18-150300_59_161-default-debuginfo-14-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_161-preempt-debuginfo-14-150300.2.1 * kernel-livepatch-5_3_18-150300_59_161-preempt-14-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_161-default-14-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-48791.html * https://www.suse.com/security/cve/CVE-2022-49025.html * https://www.suse.com/security/cve/CVE-2024-41062.html * https://bugzilla.suse.com/show_bug.cgi?id=1228012 * https://bugzilla.suse.com/show_bug.cgi?id=1228578 * https://bugzilla.suse.com/show_bug.cgi?id=1233023 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Apr 4 12:30:05 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 04 Apr 2025 12:30:05 -0000 Subject: SUSE-SU-2025:1141-1: important: Security update for go1.23 Message-ID: <174376980580.7034.17347107675695942505@smelt2.prg2.suse.org> # Security update for go1.23 Announcement ID: SUSE-SU-2025:1141-1 Release Date: 2025-04-04T11:42:11Z Rating: important References: * bsc#1229122 * bsc#1240550 Cross-References: * CVE-2025-22871 CVSS scores: * CVE-2025-22871 ( SUSE ): 9.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-22871 ( SUSE ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability and has one security fix can now be installed. ## Description: This update for go1.23 fixes the following issues: * Update to go1.23.8 * CVE-2025-22871: Fix an issue with request smuggling through invalid chunked data. (bsc#1240550) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1141=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-1141=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1141=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1141=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1141=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1141=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1141=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1141=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1141=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1141=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1141=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1141=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1141=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1141=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * go1.23-race-1.23.8-150000.1.27.1 * go1.23-doc-1.23.8-150000.1.27.1 * go1.23-1.23.8-150000.1.27.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * go1.23-race-1.23.8-150000.1.27.1 * go1.23-doc-1.23.8-150000.1.27.1 * go1.23-1.23.8-150000.1.27.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * go1.23-race-1.23.8-150000.1.27.1 * go1.23-doc-1.23.8-150000.1.27.1 * go1.23-1.23.8-150000.1.27.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * go1.23-race-1.23.8-150000.1.27.1 * go1.23-doc-1.23.8-150000.1.27.1 * go1.23-1.23.8-150000.1.27.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * go1.23-race-1.23.8-150000.1.27.1 * go1.23-doc-1.23.8-150000.1.27.1 * go1.23-1.23.8-150000.1.27.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * go1.23-race-1.23.8-150000.1.27.1 * go1.23-doc-1.23.8-150000.1.27.1 * go1.23-1.23.8-150000.1.27.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * go1.23-race-1.23.8-150000.1.27.1 * go1.23-doc-1.23.8-150000.1.27.1 * go1.23-1.23.8-150000.1.27.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * go1.23-race-1.23.8-150000.1.27.1 * go1.23-doc-1.23.8-150000.1.27.1 * go1.23-1.23.8-150000.1.27.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * go1.23-race-1.23.8-150000.1.27.1 * go1.23-doc-1.23.8-150000.1.27.1 * go1.23-1.23.8-150000.1.27.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * go1.23-race-1.23.8-150000.1.27.1 * go1.23-doc-1.23.8-150000.1.27.1 * go1.23-1.23.8-150000.1.27.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * go1.23-race-1.23.8-150000.1.27.1 * go1.23-doc-1.23.8-150000.1.27.1 * go1.23-1.23.8-150000.1.27.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * go1.23-race-1.23.8-150000.1.27.1 * go1.23-doc-1.23.8-150000.1.27.1 * go1.23-1.23.8-150000.1.27.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * go1.23-race-1.23.8-150000.1.27.1 * go1.23-doc-1.23.8-150000.1.27.1 * go1.23-1.23.8-150000.1.27.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * go1.23-race-1.23.8-150000.1.27.1 * go1.23-doc-1.23.8-150000.1.27.1 * go1.23-1.23.8-150000.1.27.1 ## References: * https://www.suse.com/security/cve/CVE-2025-22871.html * https://bugzilla.suse.com/show_bug.cgi?id=1229122 * https://bugzilla.suse.com/show_bug.cgi?id=1240550 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Apr 4 16:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 04 Apr 2025 16:30:12 -0000 Subject: SUSE-SU-2025:1143-1: important: Security update for google-guest-agent Message-ID: <174378421274.17402.10427343827935697271@smelt2.prg2.suse.org> # Security update for google-guest-agent Announcement ID: SUSE-SU-2025:1143-1 Release Date: 2025-04-04T13:31:36Z Rating: important References: * bsc#1234563 * bsc#1239763 * bsc#1239866 Cross-References: * CVE-2024-45337 CVSS scores: * CVE-2024-45337 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45337 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * openSUSE Leap 15.6 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that solves one vulnerability and has two security fixes can now be installed. ## Description: This update for google-guest-agent fixes the following issues: * CVE-2024-45337: golang.org/x/crypto/ssh: Fixed misuse of ServerConfig.PublicKeyCallback leading to authorization bypass (bsc#1234563). Other fixes: \- Updated to version 20250327.01 (bsc#1239763, bsc#1239866) * Remove error messages from gce_workload_cert_refresh and metadata script runner (#527) \- from version 20250327.00 * Update guest-logging-go dependency (#526) * Add 'created-by' metadata, and pass it as option to logging library (#508) * Revert "oslogin: Correctly handle newlines at the end of modified files (#520)" (#523) * Re-enable disabled services if the core plugin was enabled (#522) * Enable guest services on package upgrade (#519) * oslogin: Correctly handle newlines at the end of modified files (#520) * Fix core plugin path (#518) * Fix package build issues (#517) * Fix dependencies ran go mod tidy -v (#515) * Fix debian build path (#514) * Bundle compat metadata script runner binary in package (#513) * Bump golang.org/x/net from 0.27.0 to 0.36.0 (#512) * Update startup/shutdown services to launch compat manager (#503) * Bundle new gce metadata script runner binary in agent package (#502) * Revert "Revert bundling new binaries in the package (#509)" (#511) \- from version 20250326.00 * Re- enable disabled services if the core plugin was enabled (#521) \- from version 20250324.00 * Enable guest services on package upgrade (#519) * oslogin: Correctly handle newlines at the end of modified files (#520) * Fix core plugin path (#518) * Fix package build issues (#517) * Fix dependencies ran go mod tidy -v (#515) * Fix debian build path (#514) * Bundle compat metadata script runner binary in package (#513) * Bump golang.org/x/net from 0.27.0 to 0.36.0 (#512) * Update startup/shutdown services to launch compat manager (#503) * Bundle new gce metadata script runner binary in agent package (#502) * Revert "Revert bundling new binaries in the package (#509)" (#511) * Revert bundling new binaries in the package (#509) * Fix typo in windows build script (#501) * Include core plugin binary for all packages (#500) * Start packaging compat manager (#498) * Start bundling ggactl_plugin_cleanup binary in all agent packages (#492) * scripts: introduce a wrapper to locally build deb package (#490) * Introduce compat-manager systemd unit (#497) \- from version 20250317.00 * Revert "Revert bundling new binaries in the package (#509)" (#511) * Revert bundling new binaries in the package (#509) * Fix typo in windows build script (#501) * Include core plugin binary for all packages (#500) * Start packaging compat manager (#498) * Start bundling ggactl_plugin_cleanup binary in all agent packages (#492) * scripts: introduce a wrapper to locally build deb package (#490) * Introduce compat-manager systemd unit (#497) \- from version 20250312.00 * Revert bundling new binaries in the package (#509) * Fix typo in windows build script (#501) * Include core plugin binary for all packages (#500) * Update crypto library to fix CVE-2024-45337 (#499) * Start packaging compat manager (#498) * Start bundling ggactl_plugin_cleanup binary in all agent packages (#492) * scripts: introduce a wrapper to locally build deb package (#490) * Introduce compat-manager systemd unit (#497) \- from version 20250305.00 * Revert bundling new binaries in the package (#509) * Fix typo in windows build script (#501) * Include core plugin binary for all packages (#500) * Start packaging compat manager (#498) * Start bundling ggactl_plugin_cleanup binary in all agent packages (#492) * scripts: introduce a wrapper to locally build deb package (#490) * Introduce compat-manager systemd unit (#497) \- from version 20250304.01 * Fix typo in windows build script (#501) \- from version 20250214.01 * Include core plugin binary for all packages (#500) \- from version 20250214.00 * Update crypto library to fix CVE-2024-45337 (#499) \- from version 20250212.00 * Start packaging compat manager (#498) * Start bundling ggactl_plugin_cleanup binary in all agent packages (#492) \- from version 20250211.00 * scripts: introduce a wrapper to locally build deb package (#490) * Introduce compat-manager systemd unit (#497) \- from version 20250207.00 * vlan: toggle vlan configuration in debian packaging (#495) * vlan: move config out of unstable section (#494) * Add clarification to comments regarding invalid NICs and the `invalid` tag. (#493) * Include interfaces in lists even if it has an invalid MAC. (#489) * Fix windows package build failures (#491) * vlan: don't index based on the vlan ID (#486) * Revert PR #482 (#488) * Remove Amy and Zach from OWNERS (#487) * Skip interfaces in interfaceNames() instead of erroring if there is an (#482) * Fix Debian packaging if guest agent manager is not checked out (#485) \- from version 20250204.02 * force concourse to move version forward. \- from version 20250204.01 * vlan: toggle vlan configuration in debian packaging (#495) \- from version 20250204.00 * vlan: move config out of unstable section (#494) * Add clarification to comments regarding invalid NICs and the `invalid` tag. (#493) \- from version 20250203.01 * Include interfaces in lists even if it has an invalid MAC. (#489) \- from version 20250203.00 * Fix windows package build failures (#491) * vlan: don't index based on the vlan ID (#486) * Revert PR #482 (#488) * Remove Amy and Zach from OWNERS (#487) * Skip interfaces in interfaceNames() instead of erroring if there is an (#482) * Fix Debian packaging if guest agent manager is not checked out (#485) \- from version 20250122.00 * networkd(vlan): remove the interface in addition to config (#468) * Implement support for vlan dynamic removal, update dhclient to remove only if configured (#465) * Update logging library (#479) * Remove Pat from owners file. (#478) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2025-1143=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-1143=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1143=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1143=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2025-1143=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2025-1143=1 ## Package List: * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * google-guest-agent-20250327.01-150000.1.60.1 * Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64) * google-guest-agent-20250327.01-150000.1.60.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * google-guest-agent-20250327.01-150000.1.60.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * google-guest-agent-20250327.01-150000.1.60.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * google-guest-agent-20250327.01-150000.1.60.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * google-guest-agent-20250327.01-150000.1.60.1 ## References: * https://www.suse.com/security/cve/CVE-2024-45337.html * https://bugzilla.suse.com/show_bug.cgi?id=1234563 * https://bugzilla.suse.com/show_bug.cgi?id=1239763 * https://bugzilla.suse.com/show_bug.cgi?id=1239866 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Apr 4 16:30:17 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 04 Apr 2025 16:30:17 -0000 Subject: SUSE-SU-2025:1142-1: important: Security update for google-guest-agent Message-ID: <174378421719.17402.1263824552022329974@smelt2.prg2.suse.org> # Security update for google-guest-agent Announcement ID: SUSE-SU-2025:1142-1 Release Date: 2025-04-04T13:30:47Z Rating: important References: * bsc#1234563 * bsc#1239763 * bsc#1239866 Cross-References: * CVE-2024-45337 CVSS scores: * CVE-2024-45337 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45337 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability and has two security fixes can now be installed. ## Description: This update for google-guest-agent fixes the following issues: * CVE-2024-45337: golang.org/x/crypto/ssh: Fixed misuse of ServerConfig.PublicKeyCallback leading to authorization bypass (bsc#1234563). Other fixes: \- Updated to version 20250327.01 (bsc#1239763, bsc#1239866) * Remove error messages from gce_workload_cert_refresh and metadata script runner (#527) \- from version 20250327.00 * Update guest-logging-go dependency (#526) * Add 'created-by' metadata, and pass it as option to logging library (#508) * Revert "oslogin: Correctly handle newlines at the end of modified files (#520)" (#523) * Re-enable disabled services if the core plugin was enabled (#522) * Enable guest services on package upgrade (#519) * oslogin: Correctly handle newlines at the end of modified files (#520) * Fix core plugin path (#518) * Fix package build issues (#517) * Fix dependencies ran go mod tidy -v (#515) * Fix debian build path (#514) * Bundle compat metadata script runner binary in package (#513) * Bump golang.org/x/net from 0.27.0 to 0.36.0 (#512) * Update startup/shutdown services to launch compat manager (#503) * Bundle new gce metadata script runner binary in agent package (#502) * Revert "Revert bundling new binaries in the package (#509)" (#511) \- from version 20250326.00 * Re- enable disabled services if the core plugin was enabled (#521) \- from version 20250324.00 * Enable guest services on package upgrade (#519) * oslogin: Correctly handle newlines at the end of modified files (#520) * Fix core plugin path (#518) * Fix package build issues (#517) * Fix dependencies ran go mod tidy -v (#515) * Fix debian build path (#514) * Bundle compat metadata script runner binary in package (#513) * Bump golang.org/x/net from 0.27.0 to 0.36.0 (#512) * Update startup/shutdown services to launch compat manager (#503) * Bundle new gce metadata script runner binary in agent package (#502) * Revert "Revert bundling new binaries in the package (#509)" (#511) * Revert bundling new binaries in the package (#509) * Fix typo in windows build script (#501) * Include core plugin binary for all packages (#500) * Start packaging compat manager (#498) * Start bundling ggactl_plugin_cleanup binary in all agent packages (#492) * scripts: introduce a wrapper to locally build deb package (#490) * Introduce compat-manager systemd unit (#497) \- from version 20250317.00 * Revert "Revert bundling new binaries in the package (#509)" (#511) * Revert bundling new binaries in the package (#509) * Fix typo in windows build script (#501) * Include core plugin binary for all packages (#500) * Start packaging compat manager (#498) * Start bundling ggactl_plugin_cleanup binary in all agent packages (#492) * scripts: introduce a wrapper to locally build deb package (#490) * Introduce compat-manager systemd unit (#497) \- from version 20250312.00 * Revert bundling new binaries in the package (#509) * Fix typo in windows build script (#501) * Include core plugin binary for all packages (#500) * Start packaging compat manager (#498) * Start bundling ggactl_plugin_cleanup binary in all agent packages (#492) * scripts: introduce a wrapper to locally build deb package (#490) * Introduce compat-manager systemd unit (#497) \- from version 20250305.00 * Revert bundling new binaries in the package (#509) * Fix typo in windows build script (#501) * Include core plugin binary for all packages (#500) * Start packaging compat manager (#498) * Start bundling ggactl_plugin_cleanup binary in all agent packages (#492) * scripts: introduce a wrapper to locally build deb package (#490) * Introduce compat-manager systemd unit (#497) \- from version 20250304.01 * Fix typo in windows build script (#501) \- from version 20250214.01 * Include core plugin binary for all packages (#500) \- from version 20250212.00 * Start packaging compat manager (#498) * Start bundling ggactl_plugin_cleanup binary in all agent packages (#492) \- from version 20250211.00 * scripts: introduce a wrapper to locally build deb package (#490) * Introduce compat-manager systemd unit (#497) \- from version 20250207.00 * vlan: toggle vlan configuration in debian packaging (#495) * vlan: move config out of unstable section (#494) * Add clarification to comments regarding invalid NICs and the `invalid` tag. (#493) * Include interfaces in lists even if it has an invalid MAC. (#489) * Fix windows package build failures (#491) * vlan: don't index based on the vlan ID (#486) * Revert PR #482 (#488) * Remove Amy and Zach from OWNERS (#487) * Skip interfaces in interfaceNames() instead of erroring if there is an (#482) * Fix Debian packaging if guest agent manager is not checked out (#485) \- from version 20250204.02 * force concourse to move version forward. \- from version 20250204.01 * vlan: toggle vlan configuration in debian packaging (#495) \- from version 20250204.00 * vlan: move config out of unstable section (#494) * Add clarification to comments regarding invalid NICs and the `invalid` tag. (#493) \- from version 20250203.01 * Include interfaces in lists even if it has an invalid MAC. (#489) \- from version 20250203.00 * Fix windows package build failures (#491) * vlan: don't index based on the vlan ID (#486) * Revert PR #482 (#488) * Remove Amy and Zach from OWNERS (#487) * Skip interfaces in interfaceNames() instead of erroring if there is an (#482) * Fix Debian packaging if guest agent manager is not checked out (#485) \- from version 20250122.00 * networkd(vlan): remove the interface in addition to config (#468) * Implement support for vlan dynamic removal, update dhclient to remove only if configured (#465) * Update logging library (#479) * Remove Pat from owners file. (#478) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2025-1142=1 ## Package List: * Public Cloud Module 12 (aarch64 ppc64le s390x x86_64) * google-guest-agent-20250327.01-1.50.1 ## References: * https://www.suse.com/security/cve/CVE-2024-45337.html * https://bugzilla.suse.com/show_bug.cgi?id=1234563 * https://bugzilla.suse.com/show_bug.cgi?id=1239763 * https://bugzilla.suse.com/show_bug.cgi?id=1239866 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 7 08:30:15 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 07 Apr 2025 08:30:15 -0000 Subject: SUSE-SU-2025:1149-1: moderate: Security update for webkit2gtk3 Message-ID: <174401461557.21179.9175757063188431175@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2025:1149-1 Release Date: 2025-04-07T07:12:51Z Rating: moderate References: * bsc#1239863 * bsc#1239864 * bsc#1239950 Cross-References: * CVE-2024-44192 * CVE-2024-54467 * CVE-2025-24201 CVSS scores: * CVE-2024-44192 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44192 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-44192 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-44192 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-54467 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-54467 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-54467 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-54467 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-24201 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24201 ( NVD ): 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24201 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * Desktop Applications Module 15-SP6 * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: * CVE-2024-44192: Fixed unexpected process crash due to processing maliciously crafted web content (bsc#1239863) * CVE-2024-54467: Fixed information disclosure via data cross-origin exfiltration due to a cookie management issue (bsc#1239864) Other fixes: * Update to version 2.48.0: * Move tiles rendering to worker threads when rendering with the GPU. * Fix preserve-3D intersection rendering. * Added new function for creating Promise objects to JavaScripotCore GLib API. * The MediaRecorder backend gained WebM support (requires at least GStreamer 1.24.9) and audio bitrate configuration support. * Fix invalid DPI-aware font size conversion. * Bring back support for OpenType-SVG fonts using Skia SVG module. * Add metadata (title and creation/modification date) to the PDF document generated for printing. * Propagate the font?s computed locale to HarfBuzz. * The GPU process build is now enabled for WebGL, but the web process is still used by default. The runtime flag UseGPUProcessForWebGL can be used to use the GPU process for WebGL. * Security fixes: CVE-2024-44192, CVE-2024-54467, CVE-2025-24201. * Disable speech synthesis. It has been disabled until now, and we don't have flite or spiel in SLE. * Add gcc13-PIE to BuildRequires (bsc#1239950). * Backport upstream patch to stop using IOChannel in NetworkCache: hopefully fixes crashes in the network process. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1149=1 SUSE-2025-1149=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1149=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-1149=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-1149=1 ## Package List: * openSUSE Leap 15.6 (noarch) * WebKitGTK-6.0-lang-2.48.0-150600.12.33.1 * WebKitGTK-4.1-lang-2.48.0-150600.12.33.1 * WebKitGTK-4.0-lang-2.48.0-150600.12.33.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libjavascriptcoregtk-6_0-1-debuginfo-2.48.0-150600.12.33.1 * webkitgtk-6_0-injected-bundles-debuginfo-2.48.0-150600.12.33.1 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.0-150600.12.33.1 * libwebkit2gtk-4_1-0-debuginfo-2.48.0-150600.12.33.1 * webkit2gtk3-soup2-devel-2.48.0-150600.12.33.1 * libjavascriptcoregtk-4_0-18-2.48.0-150600.12.33.1 * webkit2gtk3-soup2-debugsource-2.48.0-150600.12.33.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.0-150600.12.33.1 * webkit2gtk3-soup2-minibrowser-debuginfo-2.48.0-150600.12.33.1 * typelib-1_0-WebKit2WebExtension-4_1-2.48.0-150600.12.33.1 * typelib-1_0-JavaScriptCore-4_0-2.48.0-150600.12.33.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.0-150600.12.33.1 * webkit-jsc-4.1-2.48.0-150600.12.33.1 * webkit2gtk3-soup2-minibrowser-2.48.0-150600.12.33.1 * webkit-jsc-4-debuginfo-2.48.0-150600.12.33.1 * webkit2gtk3-minibrowser-2.48.0-150600.12.33.1 * typelib-1_0-WebKit2-4_0-2.48.0-150600.12.33.1 * typelib-1_0-WebKit-6_0-2.48.0-150600.12.33.1 * webkit2gtk3-debugsource-2.48.0-150600.12.33.1 * webkit2gtk3-minibrowser-debuginfo-2.48.0-150600.12.33.1 * webkit2gtk-4_0-injected-bundles-2.48.0-150600.12.33.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.0-150600.12.33.1 * typelib-1_0-JavaScriptCore-6_0-2.48.0-150600.12.33.1 * webkit2gtk4-debugsource-2.48.0-150600.12.33.1 * webkit-jsc-6.0-debuginfo-2.48.0-150600.12.33.1 * webkit-jsc-6.0-2.48.0-150600.12.33.1 * libwebkit2gtk-4_0-37-debuginfo-2.48.0-150600.12.33.1 * typelib-1_0-WebKitWebProcessExtension-6_0-2.48.0-150600.12.33.1 * webkit2gtk4-minibrowser-debuginfo-2.48.0-150600.12.33.1 * webkit-jsc-4.1-debuginfo-2.48.0-150600.12.33.1 * webkit2gtk4-devel-2.48.0-150600.12.33.1 * typelib-1_0-JavaScriptCore-4_1-2.48.0-150600.12.33.1 * webkit2gtk-4_1-injected-bundles-2.48.0-150600.12.33.1 * libwebkitgtk-6_0-4-debuginfo-2.48.0-150600.12.33.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.0-150600.12.33.1 * libjavascriptcoregtk-6_0-1-2.48.0-150600.12.33.1 * libwebkit2gtk-4_1-0-2.48.0-150600.12.33.1 * libwebkitgtk-6_0-4-2.48.0-150600.12.33.1 * webkit2gtk3-devel-2.48.0-150600.12.33.1 * libwebkit2gtk-4_0-37-2.48.0-150600.12.33.1 * webkit2gtk4-minibrowser-2.48.0-150600.12.33.1 * webkitgtk-6_0-injected-bundles-2.48.0-150600.12.33.1 * webkit-jsc-4-2.48.0-150600.12.33.1 * typelib-1_0-WebKit2-4_1-2.48.0-150600.12.33.1 * libjavascriptcoregtk-4_1-0-2.48.0-150600.12.33.1 * openSUSE Leap 15.6 (x86_64) * libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.48.0-150600.12.33.1 * libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.48.0-150600.12.33.1 * libjavascriptcoregtk-4_1-0-32bit-2.48.0-150600.12.33.1 * libwebkit2gtk-4_1-0-32bit-2.48.0-150600.12.33.1 * libwebkit2gtk-4_0-37-32bit-2.48.0-150600.12.33.1 * libwebkit2gtk-4_1-0-32bit-debuginfo-2.48.0-150600.12.33.1 * libwebkit2gtk-4_0-37-32bit-debuginfo-2.48.0-150600.12.33.1 * libjavascriptcoregtk-4_0-18-32bit-2.48.0-150600.12.33.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libwebkit2gtk-4_1-0-64bit-2.48.0-150600.12.33.1 * libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.48.0-150600.12.33.1 * libwebkit2gtk-4_0-37-64bit-2.48.0-150600.12.33.1 * libwebkit2gtk-4_1-0-64bit-debuginfo-2.48.0-150600.12.33.1 * libwebkit2gtk-4_0-37-64bit-debuginfo-2.48.0-150600.12.33.1 * libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.48.0-150600.12.33.1 * libjavascriptcoregtk-4_1-0-64bit-2.48.0-150600.12.33.1 * libjavascriptcoregtk-4_0-18-64bit-2.48.0-150600.12.33.1 * Basesystem Module 15-SP6 (noarch) * WebKitGTK-6.0-lang-2.48.0-150600.12.33.1 * WebKitGTK-4.0-lang-2.48.0-150600.12.33.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libwebkitgtk-6_0-4-debuginfo-2.48.0-150600.12.33.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.0-150600.12.33.1 * webkit2gtk4-debugsource-2.48.0-150600.12.33.1 * webkitgtk-6_0-injected-bundles-debuginfo-2.48.0-150600.12.33.1 * libwebkit2gtk-4_0-37-debuginfo-2.48.0-150600.12.33.1 * webkit2gtk3-soup2-devel-2.48.0-150600.12.33.1 * typelib-1_0-JavaScriptCore-4_0-2.48.0-150600.12.33.1 * libwebkitgtk-6_0-4-2.48.0-150600.12.33.1 * libjavascriptcoregtk-6_0-1-2.48.0-150600.12.33.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.0-150600.12.33.1 * libwebkit2gtk-4_0-37-2.48.0-150600.12.33.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.0-150600.12.33.1 * webkitgtk-6_0-injected-bundles-2.48.0-150600.12.33.1 * typelib-1_0-WebKit2-4_0-2.48.0-150600.12.33.1 * libjavascriptcoregtk-4_0-18-2.48.0-150600.12.33.1 * webkit2gtk3-soup2-debugsource-2.48.0-150600.12.33.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.0-150600.12.33.1 * webkit2gtk-4_0-injected-bundles-2.48.0-150600.12.33.1 * Desktop Applications Module 15-SP6 (noarch) * WebKitGTK-4.1-lang-2.48.0-150600.12.33.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.0-150600.12.33.1 * typelib-1_0-WebKit2WebExtension-4_1-2.48.0-150600.12.33.1 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.0-150600.12.33.1 * libwebkit2gtk-4_1-0-2.48.0-150600.12.33.1 * webkit2gtk3-devel-2.48.0-150600.12.33.1 * typelib-1_0-WebKit2-4_1-2.48.0-150600.12.33.1 * typelib-1_0-JavaScriptCore-4_1-2.48.0-150600.12.33.1 * libwebkit2gtk-4_1-0-debuginfo-2.48.0-150600.12.33.1 * libjavascriptcoregtk-4_1-0-2.48.0-150600.12.33.1 * webkit2gtk3-debugsource-2.48.0-150600.12.33.1 * webkit2gtk-4_1-injected-bundles-2.48.0-150600.12.33.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * webkit2gtk4-debugsource-2.48.0-150600.12.33.1 * typelib-1_0-WebKitWebProcessExtension-6_0-2.48.0-150600.12.33.1 * webkit2gtk4-devel-2.48.0-150600.12.33.1 * typelib-1_0-WebKit-6_0-2.48.0-150600.12.33.1 * typelib-1_0-JavaScriptCore-6_0-2.48.0-150600.12.33.1 ## References: * https://www.suse.com/security/cve/CVE-2024-44192.html * https://www.suse.com/security/cve/CVE-2024-54467.html * https://www.suse.com/security/cve/CVE-2025-24201.html * https://bugzilla.suse.com/show_bug.cgi?id=1239863 * https://bugzilla.suse.com/show_bug.cgi?id=1239864 * https://bugzilla.suse.com/show_bug.cgi?id=1239950 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 7 12:30:03 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 07 Apr 2025 12:30:03 -0000 Subject: SUSE-SU-2025:1157-1: important: Security update for MozillaThunderbird Message-ID: <174402900336.21179.16705357913828870554@smelt2.prg2.suse.org> # Security update for MozillaThunderbird Announcement ID: SUSE-SU-2025:1157-1 Release Date: 2025-04-07T08:27:15Z Rating: important References: * bsc#1240083 Cross-References: * CVE-2025-3028 * CVE-2025-3029 * CVE-2025-3030 CVSS scores: * CVE-2025-3028 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2025-3028 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2025-3029 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-3029 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-3030 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-3030 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for MozillaThunderbird fixes the following issues: * Mozilla Thunderbird ESR 128.9 MFSA 2025-24 (bsc#1240083) * CVE-2025-3028: Use-after-free triggered by XSLTProcessor * CVE-2025-3029: URL Bar Spoofing via non-BMP Unicode characters * CVE-2025-3030: Memory safety bugs fixed in Firefox 137, Thunderbird 137, Firefox ESR 128.9, and Thunderbird 128.9 Other fixes: * new: Thunderbird now has a notification system for real-time desktop alerts * fixed: Data corruption occurred when compacting IMAP Drafts folder after saving a message * fixed: Right-clicking "Decrypt and Save As..." on an attachment file failed. * fixed: Thunderbird could crash when importing mail * fixed: Sort indicators were missing on the calendar events list. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1157=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-1157=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1157=1 ## Package List: * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x) * MozillaThunderbird-debuginfo-128.9.0-150200.8.206.1 * MozillaThunderbird-translations-common-128.9.0-150200.8.206.1 * MozillaThunderbird-translations-other-128.9.0-150200.8.206.1 * MozillaThunderbird-debugsource-128.9.0-150200.8.206.1 * MozillaThunderbird-128.9.0-150200.8.206.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * MozillaThunderbird-debuginfo-128.9.0-150200.8.206.1 * MozillaThunderbird-translations-common-128.9.0-150200.8.206.1 * MozillaThunderbird-translations-other-128.9.0-150200.8.206.1 * MozillaThunderbird-debugsource-128.9.0-150200.8.206.1 * MozillaThunderbird-128.9.0-150200.8.206.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-debuginfo-128.9.0-150200.8.206.1 * MozillaThunderbird-translations-common-128.9.0-150200.8.206.1 * MozillaThunderbird-translations-other-128.9.0-150200.8.206.1 * MozillaThunderbird-debugsource-128.9.0-150200.8.206.1 * MozillaThunderbird-128.9.0-150200.8.206.1 ## References: * https://www.suse.com/security/cve/CVE-2025-3028.html * https://www.suse.com/security/cve/CVE-2025-3029.html * https://www.suse.com/security/cve/CVE-2025-3030.html * https://bugzilla.suse.com/show_bug.cgi?id=1240083 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 7 12:30:05 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 07 Apr 2025 12:30:05 -0000 Subject: SUSE-SU-2025:1155-1: moderate: Security update for govulncheck-vulndb Message-ID: <174402900526.21179.6568442427145037715@smelt2.prg2.suse.org> # Security update for govulncheck-vulndb Announcement ID: SUSE-SU-2025:1155-1 Release Date: 2025-04-07T08:16:12Z Rating: moderate References: * jsc#PED-11136 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that contains one feature can now be installed. ## Description: This update for govulncheck-vulndb fixes the following issues: * Update to version 0.0.20250402T160203 2025-04-02T16:02:03Z (jsc#PED-11136) * GO-2025-3443 * GO-2025-3581 * GO-2025-3582 * GO-2025-3583 * GO-2025-3584 * GO-2025-3585 * GO-2025-3586 * GO-2025-3587 * GO-2025-3588 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1155=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1155=1 ## Package List: * openSUSE Leap 15.6 (noarch) * govulncheck-vulndb-0.0.20250402T160203-150000.1.52.1 * SUSE Package Hub 15 15-SP6 (noarch) * govulncheck-vulndb-0.0.20250402T160203-150000.1.52.1 ## References: * https://jira.suse.com/browse/PED-11136 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 7 12:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 07 Apr 2025 12:30:12 -0000 Subject: SUSE-SU-2025:1153-1: important: Security update for go1.24 Message-ID: <174402901281.21179.15136735706720437159@smelt2.prg2.suse.org> # Security update for go1.24 Announcement ID: SUSE-SU-2025:1153-1 Release Date: 2025-04-07T08:15:54Z Rating: important References: * bsc#1236217 * bsc#1239182 * bsc#1240550 Cross-References: * CVE-2025-22871 CVSS scores: * CVE-2025-22871 ( SUSE ): 9.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-22871 ( SUSE ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability and has two security fixes can now be installed. ## Description: This update for go1.24 fixes the following issues: * Update to go1.24.2 * CVE-2025-22871: Fix an issue with request smuggling through invalid chunked data. (bsc#1240550) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1153=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-1153=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * go1.24-1.24.2-150000.1.17.1 * go1.24-race-1.24.2-150000.1.17.1 * go1.24-doc-1.24.2-150000.1.17.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * go1.24-1.24.2-150000.1.17.1 * go1.24-race-1.24.2-150000.1.17.1 * go1.24-doc-1.24.2-150000.1.17.1 ## References: * https://www.suse.com/security/cve/CVE-2025-22871.html * https://bugzilla.suse.com/show_bug.cgi?id=1236217 * https://bugzilla.suse.com/show_bug.cgi?id=1239182 * https://bugzilla.suse.com/show_bug.cgi?id=1240550 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 7 16:30:18 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 07 Apr 2025 16:30:18 -0000 Subject: SUSE-SU-2025:1158-1: moderate: Security update for pam Message-ID: <174404341822.21454.10259465927261978147@smelt2.prg2.suse.org> # Security update for pam Announcement ID: SUSE-SU-2025:1158-1 Release Date: 2025-04-07T13:25:23Z Rating: moderate References: * bsc#1232234 Cross-References: * CVE-2024-10041 CVSS scores: * CVE-2024-10041 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-10041 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-10041 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for pam fixes the following issues: * CVE-2024-10041: sensitive data exposure while performing authentications. (bsc#1232234) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1158=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * pam-32bit-1.1.8-24.64.1 * pam-devel-1.1.8-24.64.1 * pam-1.1.8-24.64.1 * pam-extra-debuginfo-32bit-1.1.8-24.64.1 * pam-debugsource-1.1.8-24.64.1 * pam-extra-32bit-1.1.8-24.64.1 * pam-debuginfo-32bit-1.1.8-24.64.1 * pam-extra-1.1.8-24.64.1 * pam-extra-debuginfo-1.1.8-24.64.1 * pam-debuginfo-1.1.8-24.64.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * pam-doc-1.1.8-24.64.1 ## References: * https://www.suse.com/security/cve/CVE-2024-10041.html * https://bugzilla.suse.com/show_bug.cgi?id=1232234 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 7 20:30:10 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 07 Apr 2025 20:30:10 -0000 Subject: SUSE-SU-2025:1162-1: moderate: Security update for xen Message-ID: <174405781040.21179.6337624322635224166@smelt2.prg2.suse.org> # Security update for xen Announcement ID: SUSE-SU-2025:1162-1 Release Date: 2025-04-07T16:08:51Z Rating: moderate References: * bsc#1027519 * bsc#1219354 * bsc#1233796 * bsc#1237692 * bsc#1238043 Cross-References: * CVE-2025-1713 CVSS scores: * CVE-2025-1713 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2025-1713 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability and has four security fixes can now be installed. ## Description: This update for xen fixes the following issues: * CVE-2025-1713: Fixed potential deadlock with VT-d and legacy PCI device pass-through (bsc#1238043) Other fixes: * Xen channels and domU console (bsc#1219354) * Fixed attempting to start guest vm's libxl fills disk with errors (bsc#1237692) * Xen call trace and APIC Error found after reboot operation on AMD machines (bsc#1233796). * Upstream bug fixes (bsc#1027519). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-1162=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1162=1 openSUSE-SLE-15.6-2025-1162=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1162=1 ## Package List: * Server Applications Module 15-SP6 (x86_64) * xen-tools-debuginfo-4.18.4_06-150600.3.20.1 * xen-4.18.4_06-150600.3.20.1 * xen-devel-4.18.4_06-150600.3.20.1 * xen-tools-4.18.4_06-150600.3.20.1 * xen-debugsource-4.18.4_06-150600.3.20.1 * Server Applications Module 15-SP6 (noarch) * xen-tools-xendomains-wait-disk-4.18.4_06-150600.3.20.1 * openSUSE Leap 15.6 (aarch64 x86_64 i586) * xen-tools-domU-4.18.4_06-150600.3.20.1 * xen-devel-4.18.4_06-150600.3.20.1 * xen-libs-debuginfo-4.18.4_06-150600.3.20.1 * xen-tools-domU-debuginfo-4.18.4_06-150600.3.20.1 * xen-debugsource-4.18.4_06-150600.3.20.1 * xen-libs-4.18.4_06-150600.3.20.1 * openSUSE Leap 15.6 (x86_64) * xen-libs-32bit-debuginfo-4.18.4_06-150600.3.20.1 * xen-libs-32bit-4.18.4_06-150600.3.20.1 * openSUSE Leap 15.6 (aarch64 x86_64) * xen-tools-debuginfo-4.18.4_06-150600.3.20.1 * xen-4.18.4_06-150600.3.20.1 * xen-tools-4.18.4_06-150600.3.20.1 * xen-doc-html-4.18.4_06-150600.3.20.1 * openSUSE Leap 15.6 (noarch) * xen-tools-xendomains-wait-disk-4.18.4_06-150600.3.20.1 * openSUSE Leap 15.6 (aarch64_ilp32) * xen-libs-64bit-debuginfo-4.18.4_06-150600.3.20.1 * xen-libs-64bit-4.18.4_06-150600.3.20.1 * Basesystem Module 15-SP6 (x86_64) * xen-tools-domU-4.18.4_06-150600.3.20.1 * xen-libs-debuginfo-4.18.4_06-150600.3.20.1 * xen-tools-domU-debuginfo-4.18.4_06-150600.3.20.1 * xen-debugsource-4.18.4_06-150600.3.20.1 * xen-libs-4.18.4_06-150600.3.20.1 ## References: * https://www.suse.com/security/cve/CVE-2025-1713.html * https://bugzilla.suse.com/show_bug.cgi?id=1027519 * https://bugzilla.suse.com/show_bug.cgi?id=1219354 * https://bugzilla.suse.com/show_bug.cgi?id=1233796 * https://bugzilla.suse.com/show_bug.cgi?id=1237692 * https://bugzilla.suse.com/show_bug.cgi?id=1238043 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 8 08:30:04 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 08 Apr 2025 08:30:04 -0000 Subject: SUSE-SU-2025:1164-1: important: Security update for giflib Message-ID: <174410100418.21454.12354682125951408998@smelt2.prg2.suse.org> # Security update for giflib Announcement ID: SUSE-SU-2025:1164-1 Release Date: 2025-04-08T07:03:34Z Rating: important References: * bsc#1240416 Cross-References: * CVE-2025-31344 CVSS scores: Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for giflib fixes the following issues: * CVE-2025-31344: Fixed a buffer overflow in function DumpScreen2RGB (bsc#1240416) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1164=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1164=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1164=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1164=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1164=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1164=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1164=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1164=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1164=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1164=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1164=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1164=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1164=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1164=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1164=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1164=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1164=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Manager Proxy 4.3 (x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * giflib-debugsource-5.2.2-150000.4.16.1 * giflib-progs-debuginfo-5.2.2-150000.4.16.1 * giflib-devel-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * giflib-progs-5.2.2-150000.4.16.1 * openSUSE Leap 15.6 (x86_64) * libgif7-32bit-debuginfo-5.2.2-150000.4.16.1 * libgif7-32bit-5.2.2-150000.4.16.1 * giflib-devel-32bit-5.2.2-150000.4.16.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * giflib-devel-5.2.2-150000.4.16.1 * giflib-debugsource-5.2.2-150000.4.16.1 * libgif7-5.2.2-150000.4.16.1 * libgif7-debuginfo-5.2.2-150000.4.16.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31344.html * https://bugzilla.suse.com/show_bug.cgi?id=1240416 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 8 08:30:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 08 Apr 2025 08:30:07 -0000 Subject: SUSE-SU-2025:1163-1: important: Security update for giflib Message-ID: <174410100708.21454.7623075258939251616@smelt2.prg2.suse.org> # Security update for giflib Announcement ID: SUSE-SU-2025:1163-1 Release Date: 2025-04-08T07:02:15Z Rating: important References: * bsc#1240416 Cross-References: * CVE-2025-31344 CVSS scores: Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for giflib fixes the following issues: * CVE-2025-31344: Fixed a buffer overflow in function DumpScreen2RGB (bsc#1240416) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1163=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1163=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * giflib-progs-debuginfo-5.0.5-13.9.1 * libgif6-debuginfo-5.0.5-13.9.1 * giflib-devel-5.0.5-13.9.1 * giflib-debugsource-5.0.5-13.9.1 * libgif6-5.0.5-13.9.1 * giflib-progs-5.0.5-13.9.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libgif6-32bit-5.0.5-13.9.1 * libgif6-debuginfo-32bit-5.0.5-13.9.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * giflib-progs-debuginfo-5.0.5-13.9.1 * libgif6-debuginfo-5.0.5-13.9.1 * libgif6-debuginfo-32bit-5.0.5-13.9.1 * giflib-devel-5.0.5-13.9.1 * giflib-debugsource-5.0.5-13.9.1 * libgif6-32bit-5.0.5-13.9.1 * libgif6-5.0.5-13.9.1 * giflib-progs-5.0.5-13.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31344.html * https://bugzilla.suse.com/show_bug.cgi?id=1240416 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 8 16:33:01 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 08 Apr 2025 16:33:01 -0000 Subject: SUSE-SU-2025:1177-1: important: Security update for the Linux Kernel Message-ID: <174412998162.21179.15417247769400629131@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:1177-1 Release Date: 2025-04-08T15:36:35Z Rating: important References: * bsc#1207948 * bsc#1215199 * bsc#1215211 * bsc#1218470 * bsc#1221651 * bsc#1222649 * bsc#1223047 * bsc#1224489 * bsc#1224610 * bsc#1225533 * bsc#1225742 * bsc#1225770 * bsc#1226871 * bsc#1227858 * bsc#1228653 * bsc#1229311 * bsc#1229361 * bsc#1230497 * bsc#1230728 * bsc#1230769 * bsc#1230832 * bsc#1231293 * bsc#1231432 * bsc#1232364 * bsc#1232389 * bsc#1232421 * bsc#1232743 * bsc#1232812 * bsc#1232848 * bsc#1232895 * bsc#1233033 * bsc#1233060 * bsc#1233259 * bsc#1233260 * bsc#1233479 * bsc#1233551 * bsc#1233557 * bsc#1233749 * bsc#1234222 * bsc#1234480 * bsc#1234828 * bsc#1234936 * bsc#1235436 * bsc#1235455 * bsc#1235501 * bsc#1235524 * bsc#1235589 * bsc#1235591 * bsc#1235621 * bsc#1235637 * bsc#1235698 * bsc#1235711 * bsc#1235712 * bsc#1235715 * bsc#1235729 * bsc#1235733 * bsc#1235761 * bsc#1235870 * bsc#1235973 * bsc#1236099 * bsc#1236111 * bsc#1236206 * bsc#1236333 * bsc#1236692 * bsc#1237029 * bsc#1237164 * bsc#1237313 * bsc#1237530 * bsc#1237558 * bsc#1237562 * bsc#1237565 * bsc#1237571 * bsc#1237853 * bsc#1237856 * bsc#1237873 * bsc#1237875 * bsc#1237876 * bsc#1237877 * bsc#1237881 * bsc#1237885 * bsc#1237890 * bsc#1237894 * bsc#1237897 * bsc#1237900 * bsc#1237906 * bsc#1237907 * bsc#1237911 * bsc#1237912 * bsc#1237950 * bsc#1238212 * bsc#1238474 * bsc#1238475 * bsc#1238479 * bsc#1238497 * bsc#1238500 * bsc#1238501 * bsc#1238502 * bsc#1238503 * bsc#1238506 * bsc#1238507 * bsc#1238510 * bsc#1238511 * bsc#1238512 * bsc#1238523 * bsc#1238526 * bsc#1238528 * bsc#1238529 * bsc#1238531 * bsc#1238532 * bsc#1238715 * bsc#1238716 * bsc#1238734 * bsc#1238735 * bsc#1238736 * bsc#1238738 * bsc#1238747 * bsc#1238754 * bsc#1238757 * bsc#1238760 * bsc#1238762 * bsc#1238763 * bsc#1238767 * bsc#1238768 * bsc#1238771 * bsc#1238772 * bsc#1238773 * bsc#1238775 * bsc#1238780 * bsc#1238781 * bsc#1238785 * bsc#1238864 * bsc#1238865 * bsc#1238876 * bsc#1238903 * bsc#1238904 * bsc#1238905 * bsc#1238909 * bsc#1238911 * bsc#1238917 * bsc#1238958 * bsc#1238959 * bsc#1238963 * bsc#1238964 * bsc#1238969 * bsc#1238971 * bsc#1238973 * bsc#1238975 * bsc#1238978 * bsc#1238979 * bsc#1238981 * bsc#1238984 * bsc#1238986 * bsc#1238993 * bsc#1238994 * bsc#1238997 * bsc#1239015 * bsc#1239016 * bsc#1239027 * bsc#1239029 * bsc#1239030 * bsc#1239033 * bsc#1239034 * bsc#1239036 * bsc#1239037 * bsc#1239038 * bsc#1239039 * bsc#1239045 * bsc#1239065 * bsc#1239068 * bsc#1239073 * bsc#1239076 * bsc#1239080 * bsc#1239085 * bsc#1239087 * bsc#1239095 * bsc#1239104 * bsc#1239105 * bsc#1239109 * bsc#1239112 * bsc#1239114 * bsc#1239115 * bsc#1239117 * bsc#1239167 * bsc#1239174 * bsc#1239346 * bsc#1239349 * bsc#1239435 * bsc#1239467 * bsc#1239468 * bsc#1239471 * bsc#1239473 * bsc#1239474 * bsc#1239477 * bsc#1239478 * bsc#1239479 * bsc#1239481 * bsc#1239482 * bsc#1239483 * bsc#1239484 * bsc#1239486 * bsc#1239508 * bsc#1239512 * bsc#1239518 * bsc#1239573 * bsc#1239594 * bsc#1239595 * bsc#1239600 * bsc#1239605 * bsc#1239615 * bsc#1239644 * bsc#1239707 * bsc#1239986 * bsc#1239994 * bsc#1240169 * bsc#1240172 * bsc#1240173 * bsc#1240175 * bsc#1240177 * bsc#1240179 * bsc#1240182 * bsc#1240183 * bsc#1240186 * bsc#1240188 * bsc#1240189 * bsc#1240191 * bsc#1240192 * bsc#1240333 * bsc#1240334 * jsc#PED-10701 * jsc#PED-12251 * jsc#PED-12416 Cross-References: * CVE-2023-52831 * CVE-2023-52926 * CVE-2023-52927 * CVE-2024-26634 * CVE-2024-26873 * CVE-2024-35826 * CVE-2024-35910 * CVE-2024-38606 * CVE-2024-41005 * CVE-2024-41077 * CVE-2024-41149 * CVE-2024-42307 * CVE-2024-43820 * CVE-2024-46736 * CVE-2024-46782 * CVE-2024-46796 * CVE-2024-47408 * CVE-2024-47794 * CVE-2024-49571 * CVE-2024-49924 * CVE-2024-49940 * CVE-2024-49994 * CVE-2024-50056 * CVE-2024-50126 * CVE-2024-50140 * CVE-2024-50152 * CVE-2024-50290 * CVE-2024-52559 * CVE-2024-53057 * CVE-2024-53063 * CVE-2024-53140 * CVE-2024-53163 * CVE-2024-53680 * CVE-2024-54683 * CVE-2024-56638 * CVE-2024-56640 * CVE-2024-56702 * CVE-2024-56703 * CVE-2024-56718 * CVE-2024-56719 * CVE-2024-56751 * CVE-2024-56758 * CVE-2024-56770 * CVE-2024-57807 * CVE-2024-57834 * CVE-2024-57900 * CVE-2024-57947 * CVE-2024-57973 * CVE-2024-57974 * CVE-2024-57978 * CVE-2024-57980 * CVE-2024-57981 * CVE-2024-57986 * CVE-2024-57990 * CVE-2024-57993 * CVE-2024-57996 * CVE-2024-57997 * CVE-2024-57999 * CVE-2024-58002 * CVE-2024-58005 * CVE-2024-58006 * CVE-2024-58007 * CVE-2024-58009 * CVE-2024-58011 * CVE-2024-58012 * CVE-2024-58013 * CVE-2024-58014 * CVE-2024-58017 * CVE-2024-58019 * CVE-2024-58020 * CVE-2024-58034 * CVE-2024-58051 * CVE-2024-58052 * CVE-2024-58054 * CVE-2024-58055 * CVE-2024-58056 * CVE-2024-58057 * CVE-2024-58058 * CVE-2024-58061 * CVE-2024-58063 * CVE-2024-58069 * CVE-2024-58072 * CVE-2024-58076 * CVE-2024-58078 * CVE-2024-58079 * CVE-2024-58080 * CVE-2024-58083 * CVE-2024-58085 * CVE-2024-58086 * CVE-2025-21631 * CVE-2025-21635 * CVE-2025-21659 * CVE-2025-21671 * CVE-2025-21693 * CVE-2025-21701 * CVE-2025-21703 * CVE-2025-21704 * CVE-2025-21706 * CVE-2025-21708 * CVE-2025-21711 * CVE-2025-21714 * CVE-2025-21718 * CVE-2025-21723 * CVE-2025-21726 * CVE-2025-21727 * CVE-2025-21731 * CVE-2025-21732 * CVE-2025-21734 * CVE-2025-21735 * CVE-2025-21736 * CVE-2025-21738 * CVE-2025-21739 * CVE-2025-21741 * CVE-2025-21742 * CVE-2025-21743 * CVE-2025-21744 * CVE-2025-21745 * CVE-2025-21749 * CVE-2025-21750 * CVE-2025-21753 * CVE-2025-21756 * CVE-2025-21759 * CVE-2025-21760 * CVE-2025-21761 * CVE-2025-21762 * CVE-2025-21763 * CVE-2025-21764 * CVE-2025-21765 * CVE-2025-21766 * CVE-2025-21772 * CVE-2025-21773 * CVE-2025-21775 * CVE-2025-21776 * CVE-2025-21779 * CVE-2025-21780 * CVE-2025-21781 * CVE-2025-21782 * CVE-2025-21784 * CVE-2025-21785 * CVE-2025-21791 * CVE-2025-21793 * CVE-2025-21794 * CVE-2025-21796 * CVE-2025-21804 * CVE-2025-21810 * CVE-2025-21815 * CVE-2025-21819 * CVE-2025-21820 * CVE-2025-21821 * CVE-2025-21823 * CVE-2025-21825 * CVE-2025-21828 * CVE-2025-21829 * CVE-2025-21830 * CVE-2025-21831 * CVE-2025-21832 * CVE-2025-21835 * CVE-2025-21838 * CVE-2025-21844 * CVE-2025-21846 * CVE-2025-21847 * CVE-2025-21848 * CVE-2025-21850 * CVE-2025-21855 * CVE-2025-21856 * CVE-2025-21857 * CVE-2025-21858 * CVE-2025-21859 * CVE-2025-21861 * CVE-2025-21862 * CVE-2025-21864 * CVE-2025-21865 * CVE-2025-21866 * CVE-2025-21869 * CVE-2025-21870 * CVE-2025-21871 * CVE-2025-21876 * CVE-2025-21877 * CVE-2025-21878 * CVE-2025-21883 * CVE-2025-21885 * CVE-2025-21886 * CVE-2025-21888 * CVE-2025-21890 * CVE-2025-21891 * CVE-2025-21892 CVSS scores: * CVE-2023-52831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52926 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-52926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52927 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-52927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-26634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-38606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-41077 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46736 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46736 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46796 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47408 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47408 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47794 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47794 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49571 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49571 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-49924 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49940 ( SUSE ): 6.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49940 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49994 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53163 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53163 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53680 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53680 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-54683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54683 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56638 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56638 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56703 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56703 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56718 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56718 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56718 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56751 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56758 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56770 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57900 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57947 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57947 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-58009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58014 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58017 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58017 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-58017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58085 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21631 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21631 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21659 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21671 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21671 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21704 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21704 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-21706 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21708 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21711 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21711 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21711 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21718 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21726 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21726 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21731 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21736 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21738 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21738 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21739 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21741 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21742 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21749 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21750 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21761 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21762 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21780 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21782 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21782 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21785 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21785 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21785 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21832 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21855 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21856 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * Public Cloud Module 15-SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves 186 vulnerabilities, contains three features and has 42 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644). * CVE-2024-35910: tcp: properly terminate timers for kernel sockets (bsc#1224489). * CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active (bsc#1227858). * CVE-2024-46782: ila: call nf_unregister_net_hooks() sooner (bsc#1230769). * CVE-2024-47408: net/smc: check smcd_v2_ext_offset when receiving proposal msg (bsc#1235711). * CVE-2024-47794: kABI: bpf: Prevent tailcall infinite loop caused by freplace kABI workaround (bsc#1235712). * CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg (bsc#1235733). * CVE-2024-49940: kABI fix for l2tp: prevent possible tunnel refcount underflow (bsc#1232812). * CVE-2024-50056: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c (bsc#1232389). * CVE-2024-50140: net: sched: use RCU read-side critical section in taprio_dump() (bsc#1233060). * CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551). * CVE-2024-53140: netlink: terminate outstanding dump on socket close (bsc#1234222). * CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (bsc#1235715). * CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock (bsc#1235729). * CVE-2024-56638: kABI fix for "netfilter: nft_inner: incorrect percpu area handling under softirq" (bsc#1235524). * CVE-2024-56640: net/smc: fix LGR and link use-after-free issue (bsc#1235436). * CVE-2024-56702: bpf: Add tracepoints with null-able arguments (bsc#1235501). * CVE-2024-56703: ipv6: Fix soft lockups in fib6_select_path under high next hop churn (bsc#1235455). * CVE-2024-56718: net/smc: protect link down work from execute after lgr freed (bsc#1235589). * CVE-2024-56719: net: stmmac: fix TSO DMA API usage causing oops (bsc#1235591). * CVE-2024-56751: ipv6: release nexthop on device removal (bsc#1234936). * CVE-2024-56758: btrfs: check folio mapping after unlock in relocate_one_folio() (bsc#1235621). * CVE-2024-56770: net/sched: netem: account for backlog updates from child qdisc (bsc#1235637). * CVE-2024-57900: ila: serialize calls to nf_register_net_hooks() (bsc#1235973). * CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333). * CVE-2024-57974: udp: Deal with race between UDP socket address change and rehash (bsc#1238532). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076). * CVE-2024-58012: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params (bsc#1239104). * CVE-2024-58019: nvkm/gsp: correctly advance the read pointer of GSP message queue (bsc#1238997). * CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036). * CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy (bsc#1236111). * CVE-2025-21659: netdev: prevent accessing NAPI instances from another namespace (bsc#1236206). * CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029). * CVE-2025-21701: net: avoid race between device unregistration and ethnl ops (bsc#1237164). * CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313). * CVE-2025-21706: mptcp: pm: only set fullmesh for subflow endp (bsc#1238528). * CVE-2025-21739: kABI: ufshcd: add ufshcd_dealloc_host back (bsc#1238506). * CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875). * CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send() (bsc#1238738). * CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb() (bsc#1238763). * CVE-2025-21761: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() (bsc#1238775). * CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780). * CVE-2025-21763: neighbour: use RCU protection in __neigh_notify() (bsc#1237897). * CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss() (bsc#1237906). * CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu() (bsc#1238754). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512). * CVE-2025-21825: selftests/bpf: Add test case for the freeing of bpf_timer (bsc#1238971). * CVE-2025-21844: smb: client: Add check for next_buffer in receive_encrypted_standard() (bsc#1239512). * CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (bsc#1239479). * CVE-2025-21856: s390/ism: add release function for struct device (bsc#1239486). * CVE-2025-21857: net/sched: cls_api: fix error handling causing NULL dereference (bsc#1239478). * CVE-2025-21861: mm/migrate_device: do not add folio to be freed to LRU in migrate_device_finalize() (bsc#1239483). * CVE-2025-21862: drop_monitor: fix incorrect initialization order (bsc#1239474). * CVE-2025-21864: kABI fix for tcp: drop secpath at the same time as we currently drop (bsc#1239482). * CVE-2025-21865: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl() (bsc#1239481). * CVE-2025-21870: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers (bsc#1240191). * CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183). * CVE-2025-21883: ice: Fix deinitializing VF in error path (bsc#1240189). * CVE-2025-21890: idpf: fix checksums set in idpf_rx_rsc() (bsc#1240173). * CVE-2025-21891: ipvlan: ensure network headers are in skb linear part (bsc#1240186). The following non-security bugs were fixed: * Move upstreamed PCI and initramfs patches into sorted section * Move upstreamed nfsd and sunrpc patches into sorted section * Move upstreamed powerpc and SCSI patches into sorted section * Reapply "wifi: ath11k: restore country code during resume" (bsc#1207948). * Revert "dm: requeue IO if mapping table not yet available" (git-fixes). * Revert "drivers/card_reader/rtsx_usb: Restore interrupt based detection" (git-fixes). * Revert "leds-pca955x: Remove the unused function pca95xx_num_led_regs()" (stable-fixes). * Revert "wifi: ath11k: restore country code during resume" (bsc#1207948). * Revert "wifi: ath11k: support hibernation" (bsc#1207948). * accel/qaic: Fix integer overflow in qaic_validate_req() (git-fixes). * accel/qaic: Fix possible data corruption in BOs > 2G (git-fixes). * acpi: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * acpi: resource: IRQ override for Eluktronics MECH-17 (stable-fixes). * af_unix: Annotate data-race of sk->sk_state in unix_stream_read_skb() (bsc#1239435). * af_unix: Disable MSG_OOB handling for sockets in sockmap/sockhash (bsc#1239435). * af_unix: Remove put_pid()/put_cred() in copy_peercred() (bsc#1240334). * alsa: hda/realtek - add supported Mic Mute LED for Lenovo platform (stable- fixes). * alsa: hda/realtek: Add mute LED quirk for HP Pavilion x360 14-dy1xxx (stable-fixes). * alsa: hda/realtek: Add support for ASUS B3405 and B3605 Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for ASUS B5405 and B5605 Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for ASUS ROG Strix G614 Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for ASUS ROG Strix G814 Laptop using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for ASUS ROG Strix GA603 Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for ASUS Zenbook UM3406KA Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for various ASUS Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for various HP Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Always honor no_shutup_pins (git-fixes). * alsa: hda/realtek: Fix Asus Z13 2025 audio (stable-fixes). * alsa: hda/realtek: Fix built-in mic assignment on ASUS VivoBook X515UA (git- fixes). * alsa: hda/realtek: Limit mic boost on Positivo ARN50 (stable-fixes). * alsa: hda/realtek: Remove (revert) duplicate Ally X config (git-fixes). * alsa: hda/realtek: Support mute LED on HP Laptop 15s-du3xxx (stable-fixes). * alsa: hda/realtek: update ALC222 depop optimize (stable-fixes). * alsa: hda: Fix speakers on ASUS EXPERTBOOK P5405CSA 1.0 (stable-fixes). * alsa: hda: intel: Add Dell ALC3271 to power_save denylist (stable-fixes). * alsa: hda: realtek: fix incorrect IS_REACHABLE() usage (git-fixes). * alsa: pcm: Drop superfluous NULL check in snd_pcm_format_set_silence() (git- fixes). * alsa: seq: Avoid module auto-load handling at event delivery (stable-fixes). * alsa: usb-audio: Add quirk for Plantronics headsets to fix control names (stable-fixes). * alsa: usb-audio: separate DJM-A9 cap lvl options (git-fixes). * alsa: usx2y: validate nrpacks module parameter on probe (git-fixes). * arm64: cputype: Add MIDR_CORTEX_A76AE (git-fixes) * arm64: dts: freescale: imx8mm-verdin-dahlia: add Microphone Jack to (git- fixes) * arm64: dts: freescale: tqma8mpql: Fix vqmmc-supply (git-fixes) * arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi (git- fixes) * arm64: dts: rockchip: Add missing PCIe supplies to RockPro64 board (git- fixes) * arm64: dts: rockchip: Fix PWM pinctrl names (git-fixes) * arm64: dts: rockchip: Remove bluetooth node from rock-3a (git-fixes) * arm64: dts: rockchip: Remove undocumented sdmmc property from (git-fixes) * arm64: dts: rockchip: add rs485 support on uart5 of (git-fixes) * arm64: dts: rockchip: fix pinmux of UART0 for PX30 Ringneck on Haikou (git- fixes) * arm64: dts: rockchip: fix pinmux of UART5 for PX30 Ringneck on Haikou (git- fixes) * arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe (git- fixes) * arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list (git- fixes) * arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() (git- fixes) * arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre (git- fixes) * arm64: mm: Populate vmemmap at the page level if not section aligned (git- fixes) * arm64: tegra: Remove the Orin NX/Nano suspend key (git-fixes) * asoc: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module (stable- fixes). * asoc: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE (stable-fixes). * asoc: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model (stable-fixes). * asoc: arizona/madera: use fsleep() in up/down DAPM event delays (stable- fixes). * asoc: codecs: wm0010: Fix error handling path in wm0010_spi_probe() (git- fixes). * asoc: cs35l41: check the return value from spi_setup() (git-fixes). * asoc: ops: Consistently treat platform_max as control value (git-fixes). * asoc: rt722-sdca: add missing readable registers (git-fixes). * asoc: tas2764: Fix power control mask (stable-fixes). * asoc: tas2764: Set the SDOUT polarity correctly (stable-fixes). * asoc: tas2770: Fix volume scale (stable-fixes). * asoc: ti: j721e-evm: Fix clock configuration for ti,j7200-cpb-audio compatible (git-fixes). * ata: ahci: Add mask_port_map module parameter (git-fixes). * ata: libata-scsi: Check ATA_QCFLAG_RTF_FILLED before using result_tf (git- fixes). * ata: libata-scsi: Remove redundant sense_buffer memsets (git-fixes). * ata: libata: Fix NCQ Non-Data log not supported print (git-fixes). * ata: pata_parport: add custom version of wait_after_reset (git-fixes). * ata: pata_parport: fit3: implement IDE command set registers (git-fixes). * ata: pata_serverworks: Do not use the term blacklist (git-fixes). * ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys() (git-fixes). * ata: sata_sil: Rename sil_blacklist to sil_quirks (git-fixes). * auxdisplay: panel: Fix an API misuse in panel.c (git-fixes). * backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() (git-fixes). * batman-adv: Ignore own maximum aggregation size during RX (git-fixes). * bitmap: introduce generic optimized bitmap_size() (git-fixes). * block: cleanup and fix batch completion adding conditions (git-fixes). * block: do not revert iter for -EIOCBQUEUED (git-fixes). * bluetooth: Fix error code in chan_alloc_skb_cb() (git-fixes). * bluetooth: HCI: Add definition of hci_rp_remote_name_req_cancel (git-fixes). * bluetooth: Improve setsockopt() handling of malformed user input (git- fixes). * bluetooth: hci_event: Fix connection regression between LE and non-LE adapters (git-fixes). * bluetooth: hci_event: Fix enabling passive scanning (git-fixes). * bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie (git-fixes). * bpf: Fix a verifier verbose message (git-fixes). * bpf: Replace bpf_lpm_trie_key 0-length array with flexible array (git- fixes). * bpf: Use -Wno-error in certain tests when building with GCC (git-fixes). * bpf: prevent r10 register from being marked as precise (git-fixes). * broadcom: fix supported flag check in periodic output function (git-fixes). * btrfs: check delayed refs when we're checking if a ref exists (bsc#1239605). * btrfs: do not use btrfs_bio_ctrl for extent buffer writing (bsc#1239045). * btrfs: drop the backref cache during relocation if we commit (bsc#1239605). * btrfs: remove the mirror_num argument to btrfs_submit_compressed_read (bsc#1239045). * btrfs: subpage: fix error handling in end_bio_subpage_eb_writepage (bsc#1239045). * btrfs: use a separate end_io handler for extent_buffer writing (bsc#1239045). * bus: mhi: host: Fix race between unprepare and queue_buf (git-fixes). * bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock (git-fixes). * bus: qcom-ssc-block-bus: Fix the error handling path of qcom_ssc_block_bus_probe() (git-fixes). * bus: qcom-ssc-block-bus: Remove some duplicated iounmap() calls (git-fixes). * bus: simple-pm-bus: fix forced runtime PM use (git-fixes). * can: flexcan: disable transceiver during system PM (git-fixes). * can: flexcan: only change CAN state when link up in system PM (git-fixes). * can: rcar_canfd: Fix page entries in the AFL list (git-fixes). * can: ucan: fix out of bound read in strscpy() source (git-fixes). * cdx: Fix possible UAF error in driver_override_show() (git-fixes). * char: misc: deallocate static minor in error path (git-fixes). * clockevents/drivers/i8253: Fix stop sequence for timer 0 (git-fixes). * coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes). * cppc_cpufreq: Use desired perf if feedback ctrs are 0 or unchanged (bsc#1237856) * cpufreq/amd-pstate: Fix max_perf updation with schedutil (bsc#1239707). * cpufreq/cppc: Do not compare desired_perf in target() (bsc#1237856) * cpufreq/cppc: Move and rename (bsc#1237856) * cpufreq: cppc: Set fie_disabled to FIE_DISABLED if fails to create (bsc#1237856) * cpufreq: cppc: cppc_cpufreq_get_rate() returns zero in all error (bsc#1237856) * cpumask: add cpumask_weight_andnot() (bsc#1239015). * cpumask: define cleanup function for cpumasks (bsc#1239015). * crypto: ccp - Fix check for the primary ASP device (git-fixes). * crypto: ccp - Fix uAPI definitions of PSP errors (git-fixes). * crypto: hisilicon/sec2 - fix for aead auth key length (git-fixes). * crypto: hisilicon/sec2 - fix for aead authsize alignment (git-fixes). * crypto: hisilicon/sec2 - fix for sec spec check (git-fixes). * crypto: iaa - Add global_stats file and remove individual stat files (jsc#PED-12416). * crypto: iaa - Change desc->priv to 0 (jsc#PED-12416). * crypto: iaa - Change iaa statistics to atomic64_t (jsc#PED-12416). * crypto: iaa - Fix comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove header table code (jsc#PED-12416). * crypto: iaa - Remove potential infinite loop in check_completion() (jsc#PED-12416). * crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init() (jsc#PED-12416). * crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns() (jsc#PED-12416). * crypto: iaa - Test the correct request flag (git-fixes). * crypto: iaa - Use cpumask_weight() when rebalancing (jsc#PED-12416). * crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy() (jsc#PED-12416). * crypto: iaa - fix decomp_bytes_in stats (jsc#PED-12416). * crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags (jsc#PED-12416). * crypto: iaa - remove unneeded semicolon (jsc#PED-12416). * crypto: nx - Fix uninitialised hv_nxc on error (git-fixes). * crypto: qat - Avoid -Wflex-array-member-not-at-end warnings (jsc#PED-12416). * crypto: qat - Constify struct pm_status_row (jsc#PED-12416). * crypto: qat - Fix missing destroy_workqueue in adf_init_aer() (jsc#PED-12416). * crypto: qat - Fix spelling mistake "Invalide" -> "Invalid" (jsc#PED-12416). * crypto: qat - Fix typo "accelaration" (jsc#PED-12416). * crypto: qat - Fix typo (jsc#PED-12416). * crypto: qat - Remove trailing space after \n newline (jsc#PED-12416). * crypto: qat - Use static_assert() to check struct sizes (jsc#PED-12416). * crypto: qat - add admin msgs for telemetry (jsc#PED-12416). * crypto: qat - add auto reset on error (jsc#PED-12416). * crypto: qat - add bank save and restore flows (jsc#PED-12416). * crypto: qat - add fatal error notification (jsc#PED-12416). * crypto: qat - add fatal error notify method (jsc#PED-12416). * crypto: qat - add heartbeat error simulator (jsc#PED-12416). * crypto: qat - add interface for live migration (jsc#PED-12416). * crypto: qat - add support for 420xx devices (jsc#PED-12416). * crypto: qat - add support for device telemetry (jsc#PED-12416). * crypto: qat - add support for device telemetry (jsc#PED-12416). * crypto: qat - add support for ring pair level telemetry (jsc#PED-12416). * crypto: qat - adf_get_etr_base() helper (jsc#PED-12416). * crypto: qat - allow disabling SR-IOV VFs (jsc#PED-12416). * crypto: qat - avoid memcpy() overflow warning (jsc#PED-12416). * crypto: qat - change signature of uof_get_num_objs() (jsc#PED-12416). * crypto: qat - disable arbitration before reset (jsc#PED-12416). * crypto: qat - ensure correct order in VF restarting handler (jsc#PED-12416). * crypto: qat - expand CSR operations for QAT GEN4 devices (jsc#PED-12416). * crypto: qat - fix "Full Going True" macro definition (jsc#PED-12416). * crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx (jsc#PED-12416). * crypto: qat - fix comment structure (jsc#PED-12416). * crypto: qat - fix linking errors when PCI_IOV is disabled (jsc#PED-12416). * crypto: qat - fix recovery flow for VFs (jsc#PED-12416). * crypto: qat - fix ring to service map for dcc in 420xx (jsc#PED-12416). * crypto: qat - generate dynamically arbiter mappings (jsc#PED-12416). * crypto: qat - implement dh fallback for primes > 4K (jsc#PED-12416). * crypto: qat - implement interface for live migration (jsc#PED-12416). * crypto: qat - improve aer error reset handling (jsc#PED-12416). * crypto: qat - improve error message in adf_get_arbiter_mapping() (jsc#PED-12416). * crypto: qat - include pci.h for GET_DEV() (jsc#PED-12416). * crypto: qat - initialize user_input.lock for rate_limiting (jsc#PED-12416). * crypto: qat - limit heartbeat notifications (jsc#PED-12416). * crypto: qat - make adf_ctl_class constant (jsc#PED-12416). * crypto: qat - make ring to service map common for QAT GEN4 (jsc#PED-12416). * crypto: qat - move PFVF compat checker to a function (jsc#PED-12416). * crypto: qat - move fw config related structures (jsc#PED-12416). * crypto: qat - preserve ADF_GENERAL_SEC (jsc#PED-12416). * crypto: qat - re-enable sriov after pf reset (jsc#PED-12416). * crypto: qat - relocate CSR access code (jsc#PED-12416). * crypto: qat - relocate and rename 4xxx PF2VM definitions (jsc#PED-12416). * crypto: qat - relocate portions of qat_4xxx code (jsc#PED-12416). * crypto: qat - remove access to parity register for QAT GEN4 (git-fixes). * crypto: qat - remove unnecessary description from comment (jsc#PED-12416). * crypto: qat - remove unused adf_devmgr_get_first (jsc#PED-12416). * crypto: qat - rename get_sla_arr_of_type() (jsc#PED-12416). * crypto: qat - set parity error mask for qat_420xx (git-fixes). * crypto: qat - uninitialized variable in adf_hb_error_inject_write() (jsc#PED-12416). * crypto: qat - update PFVF protocol for recovery (jsc#PED-12416). * crypto: qat - use kcalloc_node() instead of kzalloc_node() (jsc#PED-12416). * crypto: qat - validate slices count returned by FW (jsc#PED-12416). * crypto: qat/qat_420xx - fix off by one in uof_get_name() (jsc#PED-12416). * disable CRYPTO_DEV_QAT_420XX * dlm: prevent NPD when writing a positive value to event_done (git-fixes). * dm array: fix cursor index when skipping across block boundaries (git- fixes). * dm array: fix unreleased btree blocks on closing a faulty array cursor (git- fixes). * dm init: Handle minors larger than 255 (git-fixes). * dm integrity: fix out-of-range warning (git-fixes). * dm persistent data: fix memory allocation failure (git-fixes). * dm resume: do not return EINVAL when signalled (git-fixes). * dm suspend: return -ERESTARTSYS instead of -EINTR (git-fixes). * dm thin: Add missing destroy_work_on_stack() (git-fixes). * dm-crypt: do not update io->sector after kcryptd_crypt_write_io_submit() (git-fixes). * dm-crypt: track tag_offset in convert_context (git-fixes). * dm-delay: fix hung task introduced by kthread mode (git-fixes). * dm-delay: fix max_delay calculations (git-fixes). * dm-delay: fix workqueue delay_timer race (git-fixes). * dm-ebs: do not set the flag DM_TARGET_PASSES_INTEGRITY (git-fixes). * dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (git- fixes). * dm-integrity: align the outgoing bio in integrity_recheck (git-fixes). * dm-integrity: fix a race condition when accessing recalc_sector (git-fixes). * dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume (git-fixes). * dm-unstriped: cast an operand to sector_t to prevent potential uint32_t overflow (git-fixes). * dm-verity FEC: Fix RS FEC repair for roots unaligned to block size (take 2) (git-fixes). mwilck: some hand editing because d95e2c34a3ca ("dm verity: Fix IO priority lost when reading FEC and hash") is missing * dm: Fix typo in error message (git-fixes). * dma: kmsan: export kmsan_handle_dma() for modules (git-fixes). * documentation: qat: fix auto_reset attribute details (git-fixes). * documentation: qat: fix auto_reset section (git-fixes). * driver core: Remove needless return in void API device_remove_group() (git- fixes). * drivers: core: fix device leak in __fw_devlink_relax_cycles() (git-fixes). * drivers: hv: vmbus: Do not release fb_mmio resource in vmbus_free_mmio() (git-fixes). * drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl (git-fixes). * drm/amd/display: Assign normalized_pix_clk when color depth = 14 (stable- fixes). * drm/amd/display: Disable PSR-SU on eDP panels (stable-fixes). * drm/amd/display: Disable unneeded hpd interrupts during dm_init (stable- fixes). * drm/amd/display: Fix HPD after gpu reset (stable-fixes). * drm/amd/display: Fix slab-use-after-free on hdcp_work (git-fixes). * drm/amd/display: Restore correct backlight brightness after a GPU reset (stable-fixes). * drm/amd/display: Use HW lock mgr for PSR1 when only one eDP (git-fixes). * drm/amd/display: avoid NPD when ASIC does not support DMUB (git-fixes). * drm/amd/display: fix type mismatch in CalculateDynamicMetadataParameters() (git-fixes). * drm/amdgpu/umsch: declare umsch firmware (git-fixes). * drm/amdgpu: Check extended configuration space register when system uses large bar (stable-fixes). * drm/amdgpu: Fix JPEG video caps max size for navi1x and raven (stable- fixes). * drm/amdgpu: Fix MPEG2, MPEG4 and VC1 video caps max size (stable-fixes). * drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid Priority Inversion in SRIOV (git-fixes). * drm/amdkfd: Fix Circular Locking Dependency in 'svm_range_cpu_invalidate_pagetables' (git-fixes). * drm/atomic: Filter out redundant DPMS calls (stable-fixes). * drm/bridge: Fix spelling mistake "gettin" -> "getting" (git-fixes). * drm/bridge: it6505: fix HDCP V match check is not performed correctly (git- fixes). * drm/bridge: ti-sn65dsi86: Fix multiple instances (git-fixes). * drm/dp_mst: Fix drm RAD print (git-fixes). * drm/dp_mst: Fix locking when skipping CSN before topology probing (git- fixes). * drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data() (git- fixes). * drm/hyperv: Fix address space leak when Hyper-V DRM device is removed (git- fixes). * drm/i915/cdclk: Do cdclk post plane programming later (stable-fixes). * drm/i915/ddi: Fix HDMI port width programming in DDI_BUF_CTL (git-fixes). * drm/i915/dsi: Use TRANS_DDI_FUNC_CTL's own port width macro (git-fixes). * drm/i915/xe2lpd: Move D2D enable/disable (stable-fixes). * drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr (git- fixes). * drm/mediatek: dsi: fix error codes in mtk_dsi_host_transfer() (git-fixes). * drm/mediatek: mtk_hdmi: Fix typo for aud_sampe_size member (git-fixes). * drm/mediatek: mtk_hdmi: Unregister audio platform device on failure (git- fixes). * drm/msm/a6xx: Fix a6xx indexed-regs in devcoreduump (git-fixes). * drm/msm/a6xx: Fix stale rpmh votes from GPU (git-fixes). * drm/msm/dpu: do not use active in atomic_check() (git-fixes). * drm/msm/dsi: Set PHY usescase (and mode) before registering DSI host (git- fixes). * drm/msm/dsi: Use existing per-interface slice count in DSC timing (git- fixes). * drm/nouveau: Do not override forced connector status (stable-fixes). * drm/panel: ilitek-ili9882t: fix GPIO name in error message (git-fixes). * drm/radeon/ci_dpm: Remove needless NULL checks of dpm tables (git-fixes). * drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M (stable- fixes). * drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (git- fixes). * drm/repaper: fix integer overflows in repeat functions (git-fixes). * drm/sched: Fix fence reference count leak (git-fixes). * drm/ssd130x: Set SPI .id_table to prevent an SPI core warning (git-fixes). * drm/ssd130x: ensure ssd132x pitch is correct (git-fixes). * drm/ssd130x: fix ssd132x encoding (git-fixes). * drm/v3d: Do not run jobs that have errors flagged in its fence (git-fixes). * drm/vkms: Fix use after free and double free on init error (git-fixes). * drm/vkms: Round fixp2int conversion in lerp_u16 (stable-fixes). * drm: xlnx: zynqmp: Fix max dma segment size (git-fixes). * dummycon: fix default rows/cols (git-fixes). * eeprom: digsy_mtc: Make GPIO lookup table match the device (git-fixes). * efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32 (bsc#1239349). * fbdev: au1100fb: Move a variable assignment behind a null pointer check (git-fixes). * fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes). * fbdev: sm501fb: Add some geometry checks (git-fixes). * firmware: arm_ffa: Explicitly cast return value from FFA_VERSION before comparison (git-fixes). * firmware: arm_scmi: use ioread64() instead of ioread64_hi_lo() (git-fixes). * firmware: cs_dsp: Remove async regmap writes (git-fixes). * firmware: imx-scu: fix OF node leak in .probe() (git-fixes). * flow_dissector: use RCU protection to fetch dev_net() (bsc#1239994). * gpio: aggregator: protect driver attr handlers against module unload (git- fixes). * gpio: rcar: Fix missing of_node_put() call (git-fixes). * gpio: rcar: Use raw_spinlock to protect register access (stable-fixes). * gpu: host1x: Do not assume that a NULL domain means no DMA IOMMU (git- fixes). * hid: Enable playstation driver independently of sony driver (git-fixes). * hid: apple: disable Fn key handling on the Omoton KB066 (git-fixes). * hid: apple: fix up the F6 key on the Omoton KB066 keyboard (stable-fixes). * hid: appleir: Fix potential NULL dereference at raw event handle (git- fixes). * hid: google: fix unused variable warning under !CONFIG_ACPI (git-fixes). * hid: hid-apple: Apple Magic Keyboard a3203 USB-C support (stable-fixes). * hid: hid-steam: Fix use-after-free when detaching device (git-fixes). * hid: i2c-hid: Skip SET_POWER SLEEP for Cirque touchpad on system suspend (stable-fixes). * hid: ignore non-functional sensor in HP 5MP Camera (stable-fixes). * hid: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (git- fixes). * hid: intel-ish-hid: Send clock sync message immediately after reset (stable- fixes). * hid: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell (stable- fixes). * hid: remove superfluous (and wrong) Makefile entry for CONFIG_INTEL_ISH_FIRMWARE_DOWNLOADER (git-fixes). * hid: topre: Fix n-key rollover on Realforce R3S TKL boards (stable-fixes). * hwmon: (ad7314) Validate leading zero bits and return error (git-fixes). * hwmon: (ntc_thermistor) Fix the ncpXXxh103 sensor table (git-fixes). * hwmon: (pmbus) Initialise page count in pmbus_identify() (git-fixes). * hwmon: fix a NULL vs IS_ERR_OR_NULL() check in xgene_hwmon_probe() (git- fixes). * i2c: ali1535: Fix an error handling path in ali1535_probe() (git-fixes). * i2c: ali15x3: Fix an error handling path in ali15x3_probe() (git-fixes). * i2c: amd-mp2: drop free_irq() of devm_request_irq() allocated irq (git- fixes). * i2c: omap: fix IRQ storms (git-fixes). * i2c: sis630: Fix an error handling path in sis630_probe() (git-fixes). * i3c: Add NULL pointer check in i3c_master_queue_ibi() (git-fixes). * i3c: master: svc: Fix missing the IBI rules (git-fixes). * i3c: master: svc: Use readsb helper for reading MDB (git-fixes). * ib/mad: Check available slots before posting receive WRs (git-fixes) * ice: Remove and readd netdev during devlink reload (bsc#1230497 bsc#1239518). * iio: accel: mma8452: Ensure error return on failure to matching oversampling ratio (git-fixes). * iio: accel: msa311: Fix failure to release runtime pm if direct mode claim fails (git-fixes). * iio: adc: ad4130: Fix comparison of channel setups (git-fixes). * iio: adc: ad7124: Fix comparison of channel configs (git-fixes). * iio: adc: at91-sama5d2_adc: fix sama7g5 realbits value (git-fixes). * iio: dac: ad3552r: clear reset status flag (git-fixes). * iio: filter: admv8818: Force initialization of SDO (git-fixes). * include/linux/mmzone.h: clean up watermark accessors (bsc#1239600). * include: net: add static inline dst_dev_overhead() to dst.h (git-fixes). * init: add initramfs_internal.h (bsc#1232848). * initramfs: allocate heap buffers together (bsc#1232848). * initramfs: fix hardlink hash leak without TRAILER (bsc#1232848). * input: ads7846 - fix gpiod allocation (git-fixes). * input: i8042 - add required quirks for missing old boardnames (stable- fixes). * input: i8042 - swap old quirk combination with new quirk for NHxxRZQ (stable-fixes). * input: i8042 - swap old quirk combination with new quirk for more devices (stable-fixes). * input: i8042 - swap old quirk combination with new quirk for several devices (stable-fixes). * input: iqs7222 - add support for Azoteq IQS7222D (git-fixes). * input: iqs7222 - add support for IQS7222D v1.1 and v1.2 (git-fixes). * input: iqs7222 - preserve system status register (git-fixes). * input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE controllers (stable-fixes). * input: xpad - add multiple supported devices (stable-fixes). * input: xpad - add support for TECNO Pocket Go (stable-fixes). * input: xpad - add support for ZOTAC Gaming Zone (stable-fixes). * input: xpad - rename QH controller to Legion Go S (stable-fixes). * intel_idle: Add ibrs_off module parameter to force-disable IBRS (git-fixes). * intel_idle: Use __update_spec_ctrl() in intel_idle_ibrs() (git-fixes). * intel_th: pci: Add Arrow Lake support (stable-fixes). * intel_th: pci: Add Panther Lake-H support (stable-fixes). * intel_th: pci: Add Panther Lake-P/U support (stable-fixes). * ioam6: improve checks on user data (git-fixes). * iommu/vt-d: Fix suspicious RCU usage (git-fixes). * ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994). * ipv4: use RCU protection in inet_select_addr() (bsc#1239994). * ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994). * ipv4: use RCU protection in ipv4_default_advmss() (bsc#1239994). * ipv4: use RCU protection in rt_is_expired() (bsc#1239994). * ipv6: Ensure natural alignment of const ipv6 loopback and router addresses (git-fixes). * ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw() (git- fixes). * ipv6: Set errno after ip_fib_metrics_init() in ip6_route_info_create() (git- fixes). * ipv6: Use RCU in ip6_input() (bsc#1239994). * ipv6: annotate data-races around cnf.disable_ipv6 (git-fixes). * ipv6: avoid atomic fragment on GSO packets (git-fixes). * ipv6: fib6_rules: flush route cache when rule is changed (git-fixes). * ipv6: fib: hide unused 'pn' variable (git-fixes). * ipv6: fix ndisc_is_useropt() handling for PIO (git-fixes). * ipv6: fix potential NULL deref in fib6_add() (git-fixes). * ipv6: icmp: convert to dev_net_rcu() (bsc#1239994). * ipv6: introduce dst_rt6_info() helper (git-fixes). * ipv6: ioam: block BH from ioam6_output() (git-fixes). * ipv6: properly combine dev_base_seq and ipv6.dev_addr_genid (git-fixes). * ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * ipv6: sr: add missing seg6_local_exit (git-fixes). * ipv6: sr: block BH in seg6_output_core() and seg6_input_core() (git-fixes). * ipv6: take care of scope when choosing the src addr (git-fixes). * jfs: add check read-only before truncation in jfs_truncate_nolock() (git- fixes). * jfs: add check read-only before txBeginAnon() call (git-fixes). * jfs: add index corruption check to DT_GETPAGE() (git-fixes). * jfs: fix slab-out-of-bounds read in ea_get() (git-fixes). * jfs: reject on-disk inodes of an unsupported type (git-fixes). * kABI fix for RDMA/core: Do not expose hw_counters outside (git-fixes) * kABI fix for ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * kABI fix for net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * kABI fix for netlink: terminate outstanding dump on socket close (git- fixes). * kABI fix for tcp: fix cookie_init_timestamp() overflows (git-fixes). * kABI fix for tcp: replace tcp_time_stamp_raw() (git-fixes). * kABI workaround for intel-ish-hid (git-fixes). * kABI workaround for soc_mixer_control changes (git-fixes). * kbuild: hdrcheck: fix cross build with clang (git-fixes). * kunit: qemu_configs: sparc: use Zilog console (git-fixes). * l2tp: fix ICMP error handling for UDP-encap sockets (git-fixes). * l2tp: fix incorrect parameter validation in the pppol2tp_getsockopt() function (git-fixes). * l2tp: fix lockdep splat (git-fixes). * leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs (git- fixes). * leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs (git- fixes). * lib: 842: Improve error handling in sw842_compress() (git-fixes). * lockdep: Do not disable interrupts on RT in disable_irq_nosync_lockdep.*() (git-fixes). * mdacon: rework dependency list (git-fixes). * media: i2c: adv748x: Fix test pattern selection mask (git-fixes). * media: i2c: ccs: Set the device's runtime PM status correctly in remove (git-fixes). * media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO (git-fixes). * media: i2c: ov7251: Set enable GPIO low in probe (git-fixes). * media: platform: allgro-dvt: unregister v4l2_device on the error path (git- fixes). * media: platform: stm32: Add check for clk_enable() (git-fixes). * media: siano: Fix error handling in smsdvb_module_init() (git-fixes). * media: streamzap: fix race between device disconnection and urb callback (git-fixes). * media: streamzap: prevent processing IR data on URB failure (git-fixes). * media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf() (git- fixes). * media: venus: hfi: add a check to handle OOB in sfr region (git-fixes). * media: venus: hfi: add check to handle incorrect queue size (git-fixes). * media: venus: hfi_parser: add check to avoid out of bound access (git- fixes). * media: venus: hfi_parser: refactor hfi packet parsing logic (git-fixes). * media: verisilicon: HEVC: Initialize start_bit field (git-fixes). * media: vim2m: print device name after registering device (git-fixes). * media: visl: Fix ERANGE error when setting enum controls (git-fixes). * mei: me: add panther lake P DID (stable-fixes). * memblock tests: fix warning: "__ALIGN_KERNEL" redefined (git-fixes). * memory: mtk-smi: Add ostd setting for mt8192 (git-fixes). * memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (git-fixes). * mfd: ene-kb3930: Fix a potential NULL pointer dereference (git-fixes). * mfd: sm501: Switch to BIT() to mitigate integer overflows (git-fixes). * mfd: syscon: Add of_syscon_register_regmap() API (stable-fixes). * mfd: syscon: Fix race in device_node_get_regmap() (git-fixes). * mfd: syscon: Remove extern from function prototypes (stable-fixes). * mfd: syscon: Use scoped variables with memory allocators to simplify error paths (stable-fixes). * mm/page_alloc: fix memory accept before watermarks gets initialized (bsc#1239600). * mm: accept to promo watermark (bsc#1239600). * mm: create promo_wmark_pages and clean up open-coded sites (bsc#1239600). * mm: fix endless reclaim on machines with unaccepted memory (bsc#1239600). * mm: zswap: move allocations during CPU init outside the lock (git-fixes). * mmc: atmel-mci: Add missing clk_disable_unprepare() (git-fixes). * mmc: omap: Fix memory leak in mmc_omap_new_slot (git-fixes). * mmc: sdhci-brcmstb: add cqhci suspend/resume to PM ops (git-fixes). * mmc: sdhci-omap: Disable MMC_CAP_AGGRESSIVE_PM for eMMC/SD (git-fixes). * mtd: Add check for devm_kcalloc() (git-fixes). * mtd: Replace kcalloc() with devm_kcalloc() (git-fixes). * mtd: nand: Fix a kdoc comment (git-fixes). * mtd: rawnand: brcmnand: fix PM resume warning (git-fixes). * ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994). * ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994). * net l2tp: drop flow hash on forward (git-fixes). * net/sched: act_api: deny mismatched skip_sw/skip_hw flags for actions created by classifiers (git-fixes). * net/sched: act_api: rely on rcu in tcf_idr_check_alloc (git-fixes). * net/sched: adjust device watchdog timer to detect stopped queue at right time (git-fixes). * net/sched: cbs: Fix integer overflow in cbs_set_port_rate() (git-fixes). * net/sched: cls_u32: replace int refcounts with proper refcounts (git-fixes). * net/sched: flower: Add lock protection when remove filter handle (git- fixes). * net/sched: taprio: make q->picos_per_byte available to fill_sched_entry() (git-fixes). * net/sched: tbf: correct backlog statistic for GSO packets (git-fixes). * net: add dev_net_rcu() helper (bsc#1239994). * net: constify sk_dst_get() and __sk_dst_get() argument (git-fixes). * net: ipv6: fix dst ref loop in ila lwtunnel (git-fixes). * net: ipv6: fix dst ref loop on input in rpl lwt (git-fixes). * net: ipv6: fix dst ref loop on input in seg6 lwt (git-fixes). * net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels (git-fixes). * net: ipv6: fix missing dst ref drop in ila lwtunnel (git-fixes). * net: ipv6: fix wrong start position when receive hop-by-hop fragment (git- fixes). * net: ipv6: ioam6: code alignment (git-fixes). * net: ipv6: ioam6: new feature tunsrc (git-fixes). * net: ipv6: ioam6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input (git-fixes). * net: ipv6: rpl_iptunnel: block BH in rpl_output() and rpl_input() (git- fixes). * net: ipv6: rpl_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: seg6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL (git-fixes). * net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016). * net: mana: Allow variable size indirection table (bsc#1239016). * net: mana: Assigning IRQ affinity on HT cores (bsc#1239015). * net: mana: Avoid open coded arithmetic (bsc#1239016). * net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Fix memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Support holes in device list reply msg (git-fixes). * net: mana: add a function to spread IRQs per CPUs (bsc#1239015). * net: mana: cleanup mana struct after debugfs_remove() (git-fixes). * net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480). * net: use unrcu_pointer() helper (git-fixes). * net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors (stable- fixes). * net_sched: Prevent creation of classes with TC_H_ROOT (git-fixes). * net_sched: sch_sfq: annotate data-races around q->perturb_period (git- fixes). * net_sched: sch_sfq: handle bigger packets (git-fixes). * nfsd: clear acl_access/acl_default after releasing them (git-fixes). * nvme-fc: do not ignore connectivity loss during connecting (git-fixes bsc#1222649). * nvme-fc: go straight to connecting state when initializing (git-fixes bsc#1222649). * nvme-fc: rely on state transitions to handle connectivity loss (git-fixes bsc#1222649). * nvme-ioctl: fix leaked requests on mapping error (git-fixes). * nvme-pci: quirk Acer FA100 for non-uniqueue identifiers (git-fixes). * nvme-pci: remove stale comment (git-fixes). * nvme-tcp: Fix a C2HTermReq error message (git-fixes). * nvme-tcp: add basic support for the C2HTermReq PDU (git-fixes). * nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (git- fixes). * nvme-tcp: fix signedness bug in nvme_tcp_init_connection() (git-fixes). * nvme: introduce nvme_disk_is_ns_head helper (git-fixes). * nvme: move error logging from nvme_end_req() to __nvme_end_req() (git- fixes). * nvme: move passthrough logging attribute to head (git-fixes). * nvme: only allow entering LIVE from CONNECTING state (git-fixes bsc#1222649). * nvmet-fc: Remove unused functions (git-fixes). * nvmet-rdma: recheck queue state is LIVE in state lock in recv done (git- fixes). * nvmet-tcp: Fix a possible sporadic response drops in weakly ordered arch (git-fixes). * nvmet: remove old function prototype (git-fixes). * ocfs2: check dir i_size in ocfs2_find_entry (git-fixes). * ocfs2: fix deadlock in ocfs2_get_system_file_inode (git-fixes). * ocfs2: handle a symlink read error correctly (git-fixes). * ocfs2: mark dquot as inactive if failed to start trans while releasing dquot (git-fixes). * ocfs2: update seq_file index in ocfs2_dlm_seq_next (git-fixes). * orangefs: fix a oob in orangefs_debug_write (git-fixes). * packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251). * packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251). * padata: fix sysfs store callback check (git-fixes). * partitions: mac: fix handling of bogus partition table (git-fixes). * pci/acs: Fix 'pci=config_acs=' parameter (git-fixes). * pci/aspm: Fix link state exit during switch upstream function removal (git- fixes). * pci/doe: Poll DOE Busy bit for up to 1 second in pci_doe_send_req() (bsc#1237853) * pci/doe: Support discovery version 2 (bsc#1237853) * pci/portdrv: Only disable pciehp interrupts early when needed (git-fixes). * pci: Avoid reset when disabled via sysfs (git-fixes). * pci: Fix reference leak in pci_alloc_child_bus() (git-fixes). * pci: Remove stray put_device() in pci_register_host_bridge() (git-fixes). * pci: brcmstb: Fix error path after a call to regulator_bulk_get() (git- fixes). * pci: brcmstb: Fix missing of_node_put() in brcm_pcie_probe() (git-fixes). * pci: brcmstb: Fix potential premature regulator disabling (git-fixes). * pci: brcmstb: Set generation limit before PCIe link up (git-fixes). * pci: brcmstb: Use internal register to change link capability (git-fixes). * pci: cadence-ep: Fix the driver to send MSG TLP for INTx without data payload (git-fixes). * pci: dwc: ep: Return -ENOMEM for allocation failures (git-fixes). * pci: pciehp: Do not enable HPIE when resuming in poll mode (git-fixes). * pci: xilinx-cpm: Fix IRQ domain leak in error path of probe (git-fixes). * pinctrl: bcm281xx: Fix incorrect regmap max_registers value (git-fixes). * pinctrl: intel: Fix wrong bypass assignment in intel_pinctrl_probe_pwm() (git-fixes). * pinctrl: qcom: Clear latched interrupt status when changing IRQ type (git- fixes). * pinctrl: renesas: rza2: Fix missing of_node_put() call (git-fixes). * pinctrl: renesas: rzv2m: Fix missing of_node_put() call (git-fixes). * pinctrl: tegra: Set SFIO mode to Mux Register (git-fixes). * platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show() (stable- fixes). * platform/x86: dell-ddv: Fix temperature calculation (git-fixes). * platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e (stable- fixes). * platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e (stable-fixes). * platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles (stable- fixes). * pm: sleep: Adjust check before setting power.must_resume (git-fixes). * pm: sleep: Fix handling devices with direct_complete set on errors (git- fixes). * pnfs/flexfiles: retry getting layout segment for reads (git-fixes). * power: supply: max77693: Fix wrong conversion of charge input threshold value (git-fixes). * powerpc/pseries/eeh: Fix pseries_eeh_err_inject (bsc#1239573). * powerpc/pseries/eeh: move pseries_eeh_err_inject() outside CONFIG_DEBUG_FS block (bsc#1239573). * powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for pmemory (bsc#1239167 ltc#211055). * powerpc: Stop using no_llseek (bsc#1239573). * rapidio: add check for rio_add_net() in rio_scan_alloc_net() (git-fixes). * rapidio: fix an API misues when rio_add_net() fails (git-fixes). * ras: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619). * ras: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619). * rdma/bnxt_re: Add missing paranthesis in map_qp_id_to_tbl_indx (git-fixes) * rdma/bnxt_re: Avoid clearing VLAN_ID mask in modify qp path (git-fixes) * rdma/core: Do not expose hw_counters outside of init net namespace (git- fixes) * rdma/erdma: Prevent use-after-free in erdma_accept_newconn() (git-fixes) * rdma/hns: Fix a missing rollback in error path of hns_roce_create_qp_common() (git-fixes) * rdma/hns: Fix missing xa_destroy() (git-fixes) * rdma/hns: Fix soft lockup during bt pages loop (git-fixes) * rdma/hns: Fix unmatched condition in error path of alloc_user_qp_db() (git- fixes) * rdma/hns: Fix wrong value of max_sge_rd (git-fixes) * rdma/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016). * rdma/mlx5: Fix MR cache initialization error flow (git-fixes) * rdma/mlx5: Fix cache entry update on dereg error (git-fixes) * rdma/mlx5: Fix calculation of total invalidated pages (git-fixes) * rdma/mlx5: Fix mlx5_poll_one() cur_qp update flow (git-fixes) * rdma/mlx5: Handle errors returned from mlx5r_ib_rate() (git-fixes) * rdma/rxe: Fix the failure of ibv_query_device() and ibv_query_device_ex() tests (git-fixes) * regulator: check that dummy regulator has been probed before using it (stable-fixes). * regulator: core: Fix deadlock in create_regulator() (git-fixes). * regulator: dummy: force synchronous probing (git-fixes). * rndis_host: Flag RNDIS modems as WWAN devices (git-fixes). * rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf (bsc#1239986) sle_version was obsoleted for SLE16. It has to be combined with suse_version check. * rpm/release-projects: Update the ALP projects again (bsc#1231293). * s390/stackleak: Use exrl instead of ex in __stackleak_poison() (git-fixes bsc#1239594). * s390/traps: Fix test_monitor_call() inline assembly (git-fixes bsc#1239595). * sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743). * selftests/bpf: Fix flaky selftest lwt_redirect/lwt_reroute (git-fixes). * selftests/bpf: Fix flaky test btf_map_in_map/lookup_update (git-fixes). * selftests/bpf: Prevent client connect before server bind in test_tc_tunnel.sh (git-fixes). * selftests/bpf: add fp-leaking precise subprog result tests (git-fixes). * selftests/mm/cow: fix the incorrect error handling (git-fixes). * selftests/x86/syscall: Fix coccinelle WARNING recommending the use of ARRAY_SIZE() (git-fixes). * selftests: mptcp: close fd_in before returning in main_loop (git-fixes). * selftests: mptcp: fix incorrect fd checks in main_loop (git-fixes). * seq_file: add helper macro to define attribute for rw file (jsc#PED-12416). * slimbus: messaging: Free transaction ID in delayed interrupt scenario (git- fixes). * smb: client: destroy cfid_put_wq on module exit (git-fixes). * soc: imx8m: Remove global soc_uid (stable-fixes). * soc: imx8m: Unregister cpufreq and soc dev in cleanup path (git-fixes). * soc: imx8m: Use devm_* to simplify probe failure handling (stable-fixes). * soc: mediatek: mt8167-mmsys: Fix missing regval in all entries (git-fixes). * soc: mediatek: mt8365-mmsys: Fix routing table masks and values (git-fixes). * soc: qcom: pdr: Fix the potential deadlock (git-fixes). * soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe() (git-fixes). * soundwire: slave: fix an OF node reference leak in soundwire slave device (git-fixes). * spi: cadence-qspi: Fix probe on AM62A LP SK (git-fixes). * spi: microchip-core: Clean up redundant dev_err_probe() (git-fixes). * spi: microchip-core: Use helper function devm_clk_get_enabled() (git-fixes). * splice: do not checksum AF_UNIX sockets (bsc#1240333). * sunrpc: Handle -ETIMEDOUT return from tlshd (git-fixes). * sunrpc: Prevent looping due to rpc_signal_task() races (git-fixes). * sunrpc: convert RPC_TASK_* constants to enum (git-fixes). * sunrpc: suppress warnings for unused procfs functions (git-fixes). * supported.conf: add now-included qat_420xx (external, intel) * tcp: Add memory barrier to tcp_push() (git-fixes). * tcp: Adjust clamping window for applications specifying SO_RCVBUF (git- fixes). * tcp: Annotate data-race around sk->sk_mark in tcp_v4_send_reset (git-fixes). * tcp: Defer ts_recent changes until req is owned (git-fixes). * tcp: Do not drop SYN+ACK for simultaneous connect() (git-fixes). * tcp: Fix NEW_SYN_RECV handling in inet_twsk_purge() (git-fixes). * tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6) non- wildcard addresses (git-fixes). * tcp: Update window clamping condition (git-fixes). * tcp: add tcp_done_with_error() helper (git-fixes). * tcp: adjust rcvq_space after updating scaling ratio (git-fixes). * tcp: annotate data-races around tp->window_clamp (git-fixes). * tcp: avoid premature drops in tcp_add_backlog() (git-fixes). * tcp: avoid reusing FIN_WAIT2 when trying to find port in connect() process (git-fixes). * tcp: check mptcp-level constraints for backlog coalescing (git-fixes). * tcp: check space before adding MPTCP SYN options (git-fixes). * tcp: clear tp->retrans_stamp in tcp_rcv_fastopen_synack() (git-fixes). * tcp: count CLOSE-WAIT sockets for TCP_MIB_CURRESTAB (git-fixes). * tcp: define initial scaling factor value as a macro (git-fixes). * tcp: derive delack_max from rto_min (git-fixes). * tcp: fix TFO SYN_RECV to not zero retrans_stamp with retransmits out (git- fixes). * tcp: fix cookie_init_timestamp() overflows (git-fixes). * tcp: fix forever orphan socket caused by tcp_abort (git-fixes). * tcp: fix incorrect parameter validation in the do_tcp_getsockopt() function (git-fixes). * tcp: fix incorrect undo caused by DSACK of TLP retransmit (git-fixes). * tcp: fix mid stream window clamp (git-fixes). * tcp: fix race in tcp_v6_syn_recv_sock() (git-fixes). * tcp: fix race in tcp_write_err() (git-fixes). * tcp: fix races in tcp_abort() (git-fixes). * tcp: fix races in tcp_v_err() (git-fixes). * tcp: fix tcp_enter_recovery() to zero retrans_stamp when it's safe (git- fixes). * tcp: fix tcp_rcv_fastopen_synack() to enter TCP_CA_Loss for failed TFO (git- fixes). * tcp: fix to allow timestamp undo if no retransmits were sent (git-fixes). * tcp: increase the default TCP scaling ratio (git-fixes). * tcp: introduce tcp_clock_ms() (git-fixes). * tcp: process the 3rd ACK with sk_socket for TFO/MPTCP (git-fixes). * tcp: reduce accepted window in NEW_SYN_RECV state (git-fixes). * tcp: remove 64 KByte limit for initial tp->rcv_wnd value (git-fixes). * tcp: replace tcp_time_stamp_raw() (git-fixes). * thermal/drivers/rockchip: Add missing rk3328 mapping entry (git-fixes). * thermal: int340x: Add NULL check for adev (git-fixes). * tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server bind (git-fixes). * tools: move alignment-related macros to new <linux/align.h> (git-fixes). * tpm, tpm_tis: Fix timeout handling when waiting for TPM status (git-fixes). * tpm: do not start chip while suspended (git-fixes). * tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870). * ubi: Add a check for ubi_num (git-fixes). * ubi: block: Fix use-after-free in ubiblock_cleanup (git-fixes). * ubi: block: fix null-pointer-dereference in ubiblock_create() (git-fixes). * ubi: correct the calculation of fastmap size (stable-fixes). * ubi: eba: properly rollback inside self_check_eba (git-fixes). * ubi: fastmap: Fix missed ec updating after erasing old fastmap data block (git-fixes). * ubi: fastmap: may_reserve_for_fm: Do not reserve PEB if fm_anchor exists (git-fixes). * ubi: fastmap: wl: Schedule fm_work if wear-leveling pool is empty (git- fixes). * ubi: wl: Put source PEB into correct list if trying locking LEB failed (git- fixes). * upstream: tcp: fix DSACK undo in fast recovery to call tcp_try_to_open() (git-fixes). * usb: atm: cxacru: fix a flaw in existing endpoint checks (git-fixes). * usb: dwc3: gadget: Prevent irq storm when TH re-executes (git-fixes). * usb: gadget: Check bmAttributes only if configuration is valid (git-fixes). * usb: gadget: Fix setting self-powered state on suspend (git-fixes). * usb: gadget: Set self-powered based on MaxPower and bmAttributes (git- fixes). * usb: gadget: u_ether: Set is_suspend flag if remote wakeup fails (git- fixes). * usb: hub: lack of clearing xHC resources (git-fixes). * usb: phy: generic: Use proper helper for property detection (stable-fixes). * usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card Reader (stable-fixes). * usb: renesas_usbhs: Call clk_put() (git-fixes). * usb: renesas_usbhs: Flush the notify_hotplug_work (git-fixes). * usb: renesas_usbhs: Use devm_usb_get_phy() (git-fixes). * usb: serial: ftdi_sio: add support for Altera USB Blaster 3 (stable-fixes). * usb: serial: option: add Telit Cinterion FE990B compositions (stable-fixes). * usb: serial: option: fix Telit Cinterion FE990A name (stable-fixes). * usb: serial: option: match on interface class for Telit FN990B (stable- fixes). * usb: typec: tcpci_rt1711h: Unmask alert interrupts to fix functionality (git-fixes). * usb: typec: ucsi: Fix NULL pointer access (git-fixes). * usb: typec: ucsi: increase timeout for PPM reset operations (git-fixes). * usb: xHCI: add XHCI_RESET_ON_RESUME quirk for Phytium xHCI host (git-fixes). * usb: xhci: Enable the TRB overfetch quirk on VIA VL805 (git-fixes). * usb: xhci: remove 'retval' from xhci_pci_resume() (git-fixes). * vboxsf: fix building with GCC 15 (stable-fixes). * wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in error path (git-fixes). * wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode (git- fixes). * wifi: ath11k: choose default PM policy for hibernation (bsc#1207948). * wifi: ath11k: determine PM policy based on machine model (bsc#1207948). * wifi: ath11k: fix RCU stall while reaping monitor destination ring (git- fixes). * wifi: ath11k: fix wrong overriding for VHT Beamformee STS Capability (git- fixes). * wifi: ath11k: introduce ath11k_core_continue_suspend_resume() (bsc#1207948). * wifi: ath11k: refactor ath11k_core_suspend/_resume() (bsc#1207948). * wifi: ath11k: support non-WoWLAN mode suspend as well (bsc#1207948). * wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path (git-fixes). * wifi: ath12k: encode max Tx power in scan channel list command (git-fixes). * wifi: ath9k: do not submit zero bytes to the entropy pool (git-fixes). * wifi: cfg80211: cancel wiphy_work before freeing wiphy (git-fixes). * wifi: cfg80211: init wiphy_work before allocating rfkill fails (git-fixes). * wifi: iwlwifi: mvm: fix PNVM timeout for non-MSI-X platforms (git-fixes). * wifi: mac80211: fix integer overflow in hwmp_route_info_get() (git-fixes). * wifi: mt76: Add check for devm_kstrdup() (git-fixes). * wifi: mt76: mt7915: fix possible integer overflows in mt7915_muru_stats_show() (git-fixes). * wifi: mt76: mt7925: ensure wow pattern command align fw format (git-fixes). * wifi: mt76: mt7925: fix country count limitation for CLC (git-fixes). * wifi: mt76: mt7925: remove unused acpi function for clc (git-fixes). * wifi: mwifiex: Fix premature release of RF calibration data (git-fixes). * wifi: rtl8xxxu: Perform update_beacon_work when beaconing is enabled (git- fixes). * wifi: rtw89: fw: correct debug message format in rtw89_build_txpwr_trk_tbl_from_elm() (git-fixes). * wifi: rtw89: pci: correct ISR RDU bit for 8922AE (git-fixes). * x86/apic: Provide apic_force_nmi_on_cpu() (git-fixes). * x86/boot/32: De-uglify the 2/3 level paging difference in mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Disable stackprotector and tracing for mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Restructure mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Temporarily map initrd for microcode loading (git-fixes). * x86/boot: Use __pa_nodebug() in mk_early_pgtbl_32() (git-fixes). * x86/coco: Replace 'static const cc_mask' with the newly introduced cc_get_mask() function (git-fixes). * x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers (git-fixes). * x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu() (git- fixes). * x86/entry: Add __init to ia32_emulation_override_cmdline() (git-fixes). * x86/fpu: Fix guest FPU state buffer allocation size (git-fixes). * x86/hyperv/vtl: Stop kernel from probing VTL0 low memory (git-fixes). * x86/hyperv: Fix output argument to hypercall that changes page visibility (git-fixes). * x86/idle: Disable IBRS when CPU is offline to improve single-threaded performance (git-fixes). * x86/microcode/32: Move early loading after paging enable (git-fixes). * x86/microcode/amd: Cache builtin microcode too (git-fixes). * x86/microcode/amd: Cache builtin/initrd microcode early (git-fixes). * x86/microcode/amd: Use cached microcode for AP load (git-fixes). * x86/microcode/amd: Use correct per CPU ucode_cpu_info (git-fixes). * x86/microcode/intel: Add a minimum required revision for late loading (git- fixes). * x86/microcode/intel: Cleanup code further (git-fixes). * x86/microcode/intel: Move microcode functions out of cpu/intel.c (git- fixes). * x86/microcode/intel: Remove debug code (git-fixes). * x86/microcode/intel: Remove pointless mutex (git-fixes). * x86/microcode/intel: Rename get_datasize() since its used externally (git- fixes). * x86/microcode/intel: Reuse intel_cpu_collect_info() git-fixes). * x86/microcode/intel: Rework intel_cpu_collect_info() (git-fixes). * x86/microcode/intel: Rework intel_find_matching_signature() (git-fixes). * x86/microcode/intel: Rip out mixed stepping support for Intel CPUs (git- fixes). * x86/microcode/intel: Save the microcode only after a successful late-load (git-fixes). * x86/microcode/intel: Simplify and rename generic_load_microcode() (git- fixes). * x86/microcode/intel: Simplify early loading (git-fixes). * x86/microcode/intel: Simplify scan_microcode() (git-fixes). * x86/microcode/intel: Switch to kvmalloc() (git-fixes). * x86/microcode/intel: Unify microcode apply() functions (git-fixes). * x86/microcode: Add per CPU control field (git-fixes). * x86/microcode: Add per CPU result state (git-fixes). * x86/microcode: Clarify the late load logic (git-fixes). * x86/microcode: Clean up mc_cpu_down_prep() (git-fixes). * x86/microcode: Get rid of the schedule work indirection (git-fixes). * x86/microcode: Handle "nosmt" correctly (git-fixes). * x86/microcode: Handle "offline" CPUs correctly (git-fixes). * x86/microcode: Hide the config knob (git-fixes). * x86/microcode: Include vendor headers into microcode.h (git-fixes). * x86/microcode: Make reload_early_microcode() static (git-fixes). * x86/microcode: Mop up early loading leftovers (git-fixes). * x86/microcode: Move core specific defines to local header (git-fixes). * x86/microcode: Prepare for minimal revision check (git-fixes). * x86/microcode: Protect against instrumentation (git-fixes). * x86/microcode: Provide CONFIG_MICROCODE_INITRD32 (git-fixes). * x86/microcode: Provide new control functions (git-fixes). * x86/microcode: Remove microcode_mutex (git-fixes). * x86/microcode: Remove pointless apply() invocation (git-fixes). * x86/microcode: Rendezvous and load in NMI (git-fixes). * x86/microcode: Replace the all-in-one rendevous handler (git-fixes). * x86/microcode: Sanitize __wait_for_cpus() (git-fixes). * x86/mm: Remove unused microcode.h include (git-fixes). * x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes). * x86/speculation: Add __update_spec_ctrl() helper (git-fixes). * x86/usercopy: Fix kernel-doc func param name in clean_cache_range()'s description (git-fixes). * xhci: Apply XHCI_RESET_TO_DEFAULT quirk to TGL (git-fixes). * xhci: Cleanup Candence controller PCI device and vendor ID usage (git- fixes). * xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701). * xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701). * xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701). * xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701). * xhci: Do not perform Soft Retry for Etron xHCI host (git-fixes). * xhci: dbc: Check for errors first in xhci_dbc_stop() (git-fixes). * xhci: dbc: Convert to use sysfs_streq() (git-fixes). * xhci: dbc: Drop duplicate checks for dma_free_coherent() (git-fixes). * xhci: dbc: Fix STALL transfer event handling (git-fixes). * xhci: dbc: Replace custom return value with proper Linux error code (git- fixes). * xhci: dbc: Use ATTRIBUTE_GROUPS() (git-fixes). * xhci: dbc: Use sysfs_emit() to instead of scnprintf() (git-fixes). * xhci: pci: Fix indentation in the PCI device ID definitions (stable-fixes). * xhci: pci: Group out Thunderbolt xHCI IDs (git-fixes). * xhci: pci: Use PCI_VENDOR_ID_RENESAS (git-fixes). * xhci: pci: Use full names in PCI IDs for Intel platforms (git-fixes). * xhci: pci: Use standard pattern for device IDs (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1177=1 openSUSE-SLE-15.6-2025-1177=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-1177=1 ## Package List: * openSUSE Leap 15.6 (aarch64 x86_64) * kernel-azure-devel-6.4.0-150600.8.34.2 * gfs2-kmp-azure-debuginfo-6.4.0-150600.8.34.2 * gfs2-kmp-azure-6.4.0-150600.8.34.2 * kernel-azure-extra-debuginfo-6.4.0-150600.8.34.2 * cluster-md-kmp-azure-6.4.0-150600.8.34.2 * ocfs2-kmp-azure-6.4.0-150600.8.34.2 * reiserfs-kmp-azure-6.4.0-150600.8.34.2 * kernel-azure-debuginfo-6.4.0-150600.8.34.2 * kselftests-kmp-azure-6.4.0-150600.8.34.2 * kernel-syms-azure-6.4.0-150600.8.34.1 * ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.34.2 * kernel-azure-optional-debuginfo-6.4.0-150600.8.34.2 * kernel-azure-extra-6.4.0-150600.8.34.2 * dlm-kmp-azure-debuginfo-6.4.0-150600.8.34.2 * kselftests-kmp-azure-debuginfo-6.4.0-150600.8.34.2 * kernel-azure-devel-debuginfo-6.4.0-150600.8.34.2 * kernel-azure-optional-6.4.0-150600.8.34.2 * cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.34.2 * reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.34.2 * kernel-azure-debugsource-6.4.0-150600.8.34.2 * dlm-kmp-azure-6.4.0-150600.8.34.2 * openSUSE Leap 15.6 (aarch64 nosrc x86_64) * kernel-azure-6.4.0-150600.8.34.2 * openSUSE Leap 15.6 (x86_64) * kernel-azure-vdso-debuginfo-6.4.0-150600.8.34.2 * kernel-azure-vdso-6.4.0-150600.8.34.2 * openSUSE Leap 15.6 (noarch) * kernel-devel-azure-6.4.0-150600.8.34.2 * kernel-source-azure-6.4.0-150600.8.34.2 * Public Cloud Module 15-SP6 (aarch64 nosrc x86_64) * kernel-azure-6.4.0-150600.8.34.2 * Public Cloud Module 15-SP6 (aarch64 x86_64) * kernel-azure-devel-6.4.0-150600.8.34.2 * kernel-azure-devel-debuginfo-6.4.0-150600.8.34.2 * kernel-syms-azure-6.4.0-150600.8.34.1 * kernel-azure-debugsource-6.4.0-150600.8.34.2 * kernel-azure-debuginfo-6.4.0-150600.8.34.2 * Public Cloud Module 15-SP6 (noarch) * kernel-devel-azure-6.4.0-150600.8.34.2 * kernel-source-azure-6.4.0-150600.8.34.2 ## References: * https://www.suse.com/security/cve/CVE-2023-52831.html * https://www.suse.com/security/cve/CVE-2023-52926.html * https://www.suse.com/security/cve/CVE-2023-52927.html * https://www.suse.com/security/cve/CVE-2024-26634.html * https://www.suse.com/security/cve/CVE-2024-26873.html * https://www.suse.com/security/cve/CVE-2024-35826.html * https://www.suse.com/security/cve/CVE-2024-35910.html * https://www.suse.com/security/cve/CVE-2024-38606.html * https://www.suse.com/security/cve/CVE-2024-41005.html * https://www.suse.com/security/cve/CVE-2024-41077.html * https://www.suse.com/security/cve/CVE-2024-41149.html * https://www.suse.com/security/cve/CVE-2024-42307.html * https://www.suse.com/security/cve/CVE-2024-43820.html * https://www.suse.com/security/cve/CVE-2024-46736.html * https://www.suse.com/security/cve/CVE-2024-46782.html * https://www.suse.com/security/cve/CVE-2024-46796.html * https://www.suse.com/security/cve/CVE-2024-47408.html * https://www.suse.com/security/cve/CVE-2024-47794.html * https://www.suse.com/security/cve/CVE-2024-49571.html * https://www.suse.com/security/cve/CVE-2024-49924.html * https://www.suse.com/security/cve/CVE-2024-49940.html * https://www.suse.com/security/cve/CVE-2024-49994.html * https://www.suse.com/security/cve/CVE-2024-50056.html * https://www.suse.com/security/cve/CVE-2024-50126.html * https://www.suse.com/security/cve/CVE-2024-50140.html * https://www.suse.com/security/cve/CVE-2024-50152.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-52559.html * https://www.suse.com/security/cve/CVE-2024-53057.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53140.html * https://www.suse.com/security/cve/CVE-2024-53163.html * https://www.suse.com/security/cve/CVE-2024-53680.html * https://www.suse.com/security/cve/CVE-2024-54683.html * https://www.suse.com/security/cve/CVE-2024-56638.html * https://www.suse.com/security/cve/CVE-2024-56640.html * https://www.suse.com/security/cve/CVE-2024-56702.html * https://www.suse.com/security/cve/CVE-2024-56703.html * https://www.suse.com/security/cve/CVE-2024-56718.html * https://www.suse.com/security/cve/CVE-2024-56719.html * https://www.suse.com/security/cve/CVE-2024-56751.html * https://www.suse.com/security/cve/CVE-2024-56758.html * https://www.suse.com/security/cve/CVE-2024-56770.html * https://www.suse.com/security/cve/CVE-2024-57807.html * https://www.suse.com/security/cve/CVE-2024-57834.html * https://www.suse.com/security/cve/CVE-2024-57900.html * https://www.suse.com/security/cve/CVE-2024-57947.html * https://www.suse.com/security/cve/CVE-2024-57973.html * https://www.suse.com/security/cve/CVE-2024-57974.html * https://www.suse.com/security/cve/CVE-2024-57978.html * https://www.suse.com/security/cve/CVE-2024-57980.html * https://www.suse.com/security/cve/CVE-2024-57981.html * https://www.suse.com/security/cve/CVE-2024-57986.html * https://www.suse.com/security/cve/CVE-2024-57990.html * https://www.suse.com/security/cve/CVE-2024-57993.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-57997.html * https://www.suse.com/security/cve/CVE-2024-57999.html * https://www.suse.com/security/cve/CVE-2024-58002.html * https://www.suse.com/security/cve/CVE-2024-58005.html * https://www.suse.com/security/cve/CVE-2024-58006.html * https://www.suse.com/security/cve/CVE-2024-58007.html * https://www.suse.com/security/cve/CVE-2024-58009.html * https://www.suse.com/security/cve/CVE-2024-58011.html * https://www.suse.com/security/cve/CVE-2024-58012.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2024-58014.html * https://www.suse.com/security/cve/CVE-2024-58017.html * https://www.suse.com/security/cve/CVE-2024-58019.html * https://www.suse.com/security/cve/CVE-2024-58020.html * https://www.suse.com/security/cve/CVE-2024-58034.html * https://www.suse.com/security/cve/CVE-2024-58051.html * https://www.suse.com/security/cve/CVE-2024-58052.html * https://www.suse.com/security/cve/CVE-2024-58054.html * https://www.suse.com/security/cve/CVE-2024-58055.html * https://www.suse.com/security/cve/CVE-2024-58056.html * https://www.suse.com/security/cve/CVE-2024-58057.html * https://www.suse.com/security/cve/CVE-2024-58058.html * https://www.suse.com/security/cve/CVE-2024-58061.html * https://www.suse.com/security/cve/CVE-2024-58063.html * https://www.suse.com/security/cve/CVE-2024-58069.html * https://www.suse.com/security/cve/CVE-2024-58072.html * https://www.suse.com/security/cve/CVE-2024-58076.html * https://www.suse.com/security/cve/CVE-2024-58078.html * https://www.suse.com/security/cve/CVE-2024-58079.html * https://www.suse.com/security/cve/CVE-2024-58080.html * https://www.suse.com/security/cve/CVE-2024-58083.html * https://www.suse.com/security/cve/CVE-2024-58085.html * https://www.suse.com/security/cve/CVE-2024-58086.html * https://www.suse.com/security/cve/CVE-2025-21631.html * https://www.suse.com/security/cve/CVE-2025-21635.html * https://www.suse.com/security/cve/CVE-2025-21659.html * https://www.suse.com/security/cve/CVE-2025-21671.html * https://www.suse.com/security/cve/CVE-2025-21693.html * https://www.suse.com/security/cve/CVE-2025-21701.html * https://www.suse.com/security/cve/CVE-2025-21703.html * https://www.suse.com/security/cve/CVE-2025-21704.html * https://www.suse.com/security/cve/CVE-2025-21706.html * https://www.suse.com/security/cve/CVE-2025-21708.html * https://www.suse.com/security/cve/CVE-2025-21711.html * https://www.suse.com/security/cve/CVE-2025-21714.html * https://www.suse.com/security/cve/CVE-2025-21718.html * https://www.suse.com/security/cve/CVE-2025-21723.html * https://www.suse.com/security/cve/CVE-2025-21726.html * https://www.suse.com/security/cve/CVE-2025-21727.html * https://www.suse.com/security/cve/CVE-2025-21731.html * https://www.suse.com/security/cve/CVE-2025-21732.html * https://www.suse.com/security/cve/CVE-2025-21734.html * https://www.suse.com/security/cve/CVE-2025-21735.html * https://www.suse.com/security/cve/CVE-2025-21736.html * https://www.suse.com/security/cve/CVE-2025-21738.html * https://www.suse.com/security/cve/CVE-2025-21739.html * https://www.suse.com/security/cve/CVE-2025-21741.html * https://www.suse.com/security/cve/CVE-2025-21742.html * https://www.suse.com/security/cve/CVE-2025-21743.html * https://www.suse.com/security/cve/CVE-2025-21744.html * https://www.suse.com/security/cve/CVE-2025-21745.html * https://www.suse.com/security/cve/CVE-2025-21749.html * https://www.suse.com/security/cve/CVE-2025-21750.html * https://www.suse.com/security/cve/CVE-2025-21753.html * https://www.suse.com/security/cve/CVE-2025-21756.html * https://www.suse.com/security/cve/CVE-2025-21759.html * https://www.suse.com/security/cve/CVE-2025-21760.html * https://www.suse.com/security/cve/CVE-2025-21761.html * https://www.suse.com/security/cve/CVE-2025-21762.html * https://www.suse.com/security/cve/CVE-2025-21763.html * https://www.suse.com/security/cve/CVE-2025-21764.html * https://www.suse.com/security/cve/CVE-2025-21765.html * https://www.suse.com/security/cve/CVE-2025-21766.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21773.html * https://www.suse.com/security/cve/CVE-2025-21775.html * https://www.suse.com/security/cve/CVE-2025-21776.html * https://www.suse.com/security/cve/CVE-2025-21779.html * https://www.suse.com/security/cve/CVE-2025-21780.html * https://www.suse.com/security/cve/CVE-2025-21781.html * https://www.suse.com/security/cve/CVE-2025-21782.html * https://www.suse.com/security/cve/CVE-2025-21784.html * https://www.suse.com/security/cve/CVE-2025-21785.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-21793.html * https://www.suse.com/security/cve/CVE-2025-21794.html * https://www.suse.com/security/cve/CVE-2025-21796.html * https://www.suse.com/security/cve/CVE-2025-21804.html * https://www.suse.com/security/cve/CVE-2025-21810.html * https://www.suse.com/security/cve/CVE-2025-21815.html * https://www.suse.com/security/cve/CVE-2025-21819.html * https://www.suse.com/security/cve/CVE-2025-21820.html * https://www.suse.com/security/cve/CVE-2025-21821.html * https://www.suse.com/security/cve/CVE-2025-21823.html * https://www.suse.com/security/cve/CVE-2025-21825.html * https://www.suse.com/security/cve/CVE-2025-21828.html * https://www.suse.com/security/cve/CVE-2025-21829.html * https://www.suse.com/security/cve/CVE-2025-21830.html * https://www.suse.com/security/cve/CVE-2025-21831.html * https://www.suse.com/security/cve/CVE-2025-21832.html * https://www.suse.com/security/cve/CVE-2025-21835.html * https://www.suse.com/security/cve/CVE-2025-21838.html * https://www.suse.com/security/cve/CVE-2025-21844.html * https://www.suse.com/security/cve/CVE-2025-21846.html * https://www.suse.com/security/cve/CVE-2025-21847.html * https://www.suse.com/security/cve/CVE-2025-21848.html * https://www.suse.com/security/cve/CVE-2025-21850.html * https://www.suse.com/security/cve/CVE-2025-21855.html * https://www.suse.com/security/cve/CVE-2025-21856.html * https://www.suse.com/security/cve/CVE-2025-21857.html * https://www.suse.com/security/cve/CVE-2025-21858.html * https://www.suse.com/security/cve/CVE-2025-21859.html * https://www.suse.com/security/cve/CVE-2025-21861.html * https://www.suse.com/security/cve/CVE-2025-21862.html * https://www.suse.com/security/cve/CVE-2025-21864.html * https://www.suse.com/security/cve/CVE-2025-21865.html * https://www.suse.com/security/cve/CVE-2025-21866.html * https://www.suse.com/security/cve/CVE-2025-21869.html * https://www.suse.com/security/cve/CVE-2025-21870.html * https://www.suse.com/security/cve/CVE-2025-21871.html * https://www.suse.com/security/cve/CVE-2025-21876.html * https://www.suse.com/security/cve/CVE-2025-21877.html * https://www.suse.com/security/cve/CVE-2025-21878.html * https://www.suse.com/security/cve/CVE-2025-21883.html * https://www.suse.com/security/cve/CVE-2025-21885.html * https://www.suse.com/security/cve/CVE-2025-21886.html * https://www.suse.com/security/cve/CVE-2025-21888.html * https://www.suse.com/security/cve/CVE-2025-21890.html * https://www.suse.com/security/cve/CVE-2025-21891.html * https://www.suse.com/security/cve/CVE-2025-21892.html * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1215211 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1221651 * https://bugzilla.suse.com/show_bug.cgi?id=1222649 * https://bugzilla.suse.com/show_bug.cgi?id=1223047 * https://bugzilla.suse.com/show_bug.cgi?id=1224489 * https://bugzilla.suse.com/show_bug.cgi?id=1224610 * https://bugzilla.suse.com/show_bug.cgi?id=1225533 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225770 * https://bugzilla.suse.com/show_bug.cgi?id=1226871 * https://bugzilla.suse.com/show_bug.cgi?id=1227858 * https://bugzilla.suse.com/show_bug.cgi?id=1228653 * https://bugzilla.suse.com/show_bug.cgi?id=1229311 * https://bugzilla.suse.com/show_bug.cgi?id=1229361 * https://bugzilla.suse.com/show_bug.cgi?id=1230497 * https://bugzilla.suse.com/show_bug.cgi?id=1230728 * https://bugzilla.suse.com/show_bug.cgi?id=1230769 * https://bugzilla.suse.com/show_bug.cgi?id=1230832 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231432 * https://bugzilla.suse.com/show_bug.cgi?id=1232364 * https://bugzilla.suse.com/show_bug.cgi?id=1232389 * https://bugzilla.suse.com/show_bug.cgi?id=1232421 * https://bugzilla.suse.com/show_bug.cgi?id=1232743 * https://bugzilla.suse.com/show_bug.cgi?id=1232812 * https://bugzilla.suse.com/show_bug.cgi?id=1232848 * https://bugzilla.suse.com/show_bug.cgi?id=1232895 * https://bugzilla.suse.com/show_bug.cgi?id=1233033 * https://bugzilla.suse.com/show_bug.cgi?id=1233060 * https://bugzilla.suse.com/show_bug.cgi?id=1233259 * https://bugzilla.suse.com/show_bug.cgi?id=1233260 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233551 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233749 * https://bugzilla.suse.com/show_bug.cgi?id=1234222 * https://bugzilla.suse.com/show_bug.cgi?id=1234480 * https://bugzilla.suse.com/show_bug.cgi?id=1234828 * https://bugzilla.suse.com/show_bug.cgi?id=1234936 * https://bugzilla.suse.com/show_bug.cgi?id=1235436 * https://bugzilla.suse.com/show_bug.cgi?id=1235455 * https://bugzilla.suse.com/show_bug.cgi?id=1235501 * https://bugzilla.suse.com/show_bug.cgi?id=1235524 * https://bugzilla.suse.com/show_bug.cgi?id=1235589 * https://bugzilla.suse.com/show_bug.cgi?id=1235591 * https://bugzilla.suse.com/show_bug.cgi?id=1235621 * https://bugzilla.suse.com/show_bug.cgi?id=1235637 * https://bugzilla.suse.com/show_bug.cgi?id=1235698 * https://bugzilla.suse.com/show_bug.cgi?id=1235711 * https://bugzilla.suse.com/show_bug.cgi?id=1235712 * https://bugzilla.suse.com/show_bug.cgi?id=1235715 * https://bugzilla.suse.com/show_bug.cgi?id=1235729 * https://bugzilla.suse.com/show_bug.cgi?id=1235733 * https://bugzilla.suse.com/show_bug.cgi?id=1235761 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1235973 * https://bugzilla.suse.com/show_bug.cgi?id=1236099 * https://bugzilla.suse.com/show_bug.cgi?id=1236111 * https://bugzilla.suse.com/show_bug.cgi?id=1236206 * https://bugzilla.suse.com/show_bug.cgi?id=1236333 * https://bugzilla.suse.com/show_bug.cgi?id=1236692 * https://bugzilla.suse.com/show_bug.cgi?id=1237029 * https://bugzilla.suse.com/show_bug.cgi?id=1237164 * https://bugzilla.suse.com/show_bug.cgi?id=1237313 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237558 * https://bugzilla.suse.com/show_bug.cgi?id=1237562 * https://bugzilla.suse.com/show_bug.cgi?id=1237565 * https://bugzilla.suse.com/show_bug.cgi?id=1237571 * https://bugzilla.suse.com/show_bug.cgi?id=1237853 * https://bugzilla.suse.com/show_bug.cgi?id=1237856 * https://bugzilla.suse.com/show_bug.cgi?id=1237873 * https://bugzilla.suse.com/show_bug.cgi?id=1237875 * https://bugzilla.suse.com/show_bug.cgi?id=1237876 * https://bugzilla.suse.com/show_bug.cgi?id=1237877 * https://bugzilla.suse.com/show_bug.cgi?id=1237881 * https://bugzilla.suse.com/show_bug.cgi?id=1237885 * https://bugzilla.suse.com/show_bug.cgi?id=1237890 * https://bugzilla.suse.com/show_bug.cgi?id=1237894 * https://bugzilla.suse.com/show_bug.cgi?id=1237897 * https://bugzilla.suse.com/show_bug.cgi?id=1237900 * https://bugzilla.suse.com/show_bug.cgi?id=1237906 * https://bugzilla.suse.com/show_bug.cgi?id=1237907 * https://bugzilla.suse.com/show_bug.cgi?id=1237911 * https://bugzilla.suse.com/show_bug.cgi?id=1237912 * https://bugzilla.suse.com/show_bug.cgi?id=1237950 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238474 * https://bugzilla.suse.com/show_bug.cgi?id=1238475 * https://bugzilla.suse.com/show_bug.cgi?id=1238479 * https://bugzilla.suse.com/show_bug.cgi?id=1238497 * https://bugzilla.suse.com/show_bug.cgi?id=1238500 * https://bugzilla.suse.com/show_bug.cgi?id=1238501 * https://bugzilla.suse.com/show_bug.cgi?id=1238502 * https://bugzilla.suse.com/show_bug.cgi?id=1238503 * https://bugzilla.suse.com/show_bug.cgi?id=1238506 * https://bugzilla.suse.com/show_bug.cgi?id=1238507 * https://bugzilla.suse.com/show_bug.cgi?id=1238510 * https://bugzilla.suse.com/show_bug.cgi?id=1238511 * https://bugzilla.suse.com/show_bug.cgi?id=1238512 * https://bugzilla.suse.com/show_bug.cgi?id=1238523 * https://bugzilla.suse.com/show_bug.cgi?id=1238526 * https://bugzilla.suse.com/show_bug.cgi?id=1238528 * https://bugzilla.suse.com/show_bug.cgi?id=1238529 * https://bugzilla.suse.com/show_bug.cgi?id=1238531 * https://bugzilla.suse.com/show_bug.cgi?id=1238532 * https://bugzilla.suse.com/show_bug.cgi?id=1238715 * https://bugzilla.suse.com/show_bug.cgi?id=1238716 * https://bugzilla.suse.com/show_bug.cgi?id=1238734 * https://bugzilla.suse.com/show_bug.cgi?id=1238735 * https://bugzilla.suse.com/show_bug.cgi?id=1238736 * https://bugzilla.suse.com/show_bug.cgi?id=1238738 * https://bugzilla.suse.com/show_bug.cgi?id=1238747 * https://bugzilla.suse.com/show_bug.cgi?id=1238754 * https://bugzilla.suse.com/show_bug.cgi?id=1238757 * https://bugzilla.suse.com/show_bug.cgi?id=1238760 * https://bugzilla.suse.com/show_bug.cgi?id=1238762 * https://bugzilla.suse.com/show_bug.cgi?id=1238763 * https://bugzilla.suse.com/show_bug.cgi?id=1238767 * https://bugzilla.suse.com/show_bug.cgi?id=1238768 * https://bugzilla.suse.com/show_bug.cgi?id=1238771 * https://bugzilla.suse.com/show_bug.cgi?id=1238772 * https://bugzilla.suse.com/show_bug.cgi?id=1238773 * https://bugzilla.suse.com/show_bug.cgi?id=1238775 * https://bugzilla.suse.com/show_bug.cgi?id=1238780 * https://bugzilla.suse.com/show_bug.cgi?id=1238781 * https://bugzilla.suse.com/show_bug.cgi?id=1238785 * https://bugzilla.suse.com/show_bug.cgi?id=1238864 * https://bugzilla.suse.com/show_bug.cgi?id=1238865 * https://bugzilla.suse.com/show_bug.cgi?id=1238876 * https://bugzilla.suse.com/show_bug.cgi?id=1238903 * https://bugzilla.suse.com/show_bug.cgi?id=1238904 * https://bugzilla.suse.com/show_bug.cgi?id=1238905 * https://bugzilla.suse.com/show_bug.cgi?id=1238909 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238917 * https://bugzilla.suse.com/show_bug.cgi?id=1238958 * https://bugzilla.suse.com/show_bug.cgi?id=1238959 * https://bugzilla.suse.com/show_bug.cgi?id=1238963 * https://bugzilla.suse.com/show_bug.cgi?id=1238964 * https://bugzilla.suse.com/show_bug.cgi?id=1238969 * https://bugzilla.suse.com/show_bug.cgi?id=1238971 * https://bugzilla.suse.com/show_bug.cgi?id=1238973 * https://bugzilla.suse.com/show_bug.cgi?id=1238975 * https://bugzilla.suse.com/show_bug.cgi?id=1238978 * https://bugzilla.suse.com/show_bug.cgi?id=1238979 * https://bugzilla.suse.com/show_bug.cgi?id=1238981 * https://bugzilla.suse.com/show_bug.cgi?id=1238984 * https://bugzilla.suse.com/show_bug.cgi?id=1238986 * https://bugzilla.suse.com/show_bug.cgi?id=1238993 * https://bugzilla.suse.com/show_bug.cgi?id=1238994 * https://bugzilla.suse.com/show_bug.cgi?id=1238997 * https://bugzilla.suse.com/show_bug.cgi?id=1239015 * https://bugzilla.suse.com/show_bug.cgi?id=1239016 * https://bugzilla.suse.com/show_bug.cgi?id=1239027 * https://bugzilla.suse.com/show_bug.cgi?id=1239029 * https://bugzilla.suse.com/show_bug.cgi?id=1239030 * https://bugzilla.suse.com/show_bug.cgi?id=1239033 * https://bugzilla.suse.com/show_bug.cgi?id=1239034 * https://bugzilla.suse.com/show_bug.cgi?id=1239036 * https://bugzilla.suse.com/show_bug.cgi?id=1239037 * https://bugzilla.suse.com/show_bug.cgi?id=1239038 * https://bugzilla.suse.com/show_bug.cgi?id=1239039 * https://bugzilla.suse.com/show_bug.cgi?id=1239045 * https://bugzilla.suse.com/show_bug.cgi?id=1239065 * https://bugzilla.suse.com/show_bug.cgi?id=1239068 * https://bugzilla.suse.com/show_bug.cgi?id=1239073 * https://bugzilla.suse.com/show_bug.cgi?id=1239076 * https://bugzilla.suse.com/show_bug.cgi?id=1239080 * https://bugzilla.suse.com/show_bug.cgi?id=1239085 * https://bugzilla.suse.com/show_bug.cgi?id=1239087 * https://bugzilla.suse.com/show_bug.cgi?id=1239095 * https://bugzilla.suse.com/show_bug.cgi?id=1239104 * https://bugzilla.suse.com/show_bug.cgi?id=1239105 * https://bugzilla.suse.com/show_bug.cgi?id=1239109 * https://bugzilla.suse.com/show_bug.cgi?id=1239112 * https://bugzilla.suse.com/show_bug.cgi?id=1239114 * https://bugzilla.suse.com/show_bug.cgi?id=1239115 * https://bugzilla.suse.com/show_bug.cgi?id=1239117 * https://bugzilla.suse.com/show_bug.cgi?id=1239167 * https://bugzilla.suse.com/show_bug.cgi?id=1239174 * https://bugzilla.suse.com/show_bug.cgi?id=1239346 * https://bugzilla.suse.com/show_bug.cgi?id=1239349 * https://bugzilla.suse.com/show_bug.cgi?id=1239435 * https://bugzilla.suse.com/show_bug.cgi?id=1239467 * https://bugzilla.suse.com/show_bug.cgi?id=1239468 * https://bugzilla.suse.com/show_bug.cgi?id=1239471 * https://bugzilla.suse.com/show_bug.cgi?id=1239473 * https://bugzilla.suse.com/show_bug.cgi?id=1239474 * https://bugzilla.suse.com/show_bug.cgi?id=1239477 * https://bugzilla.suse.com/show_bug.cgi?id=1239478 * https://bugzilla.suse.com/show_bug.cgi?id=1239479 * https://bugzilla.suse.com/show_bug.cgi?id=1239481 * https://bugzilla.suse.com/show_bug.cgi?id=1239482 * https://bugzilla.suse.com/show_bug.cgi?id=1239483 * https://bugzilla.suse.com/show_bug.cgi?id=1239484 * https://bugzilla.suse.com/show_bug.cgi?id=1239486 * https://bugzilla.suse.com/show_bug.cgi?id=1239508 * https://bugzilla.suse.com/show_bug.cgi?id=1239512 * https://bugzilla.suse.com/show_bug.cgi?id=1239518 * https://bugzilla.suse.com/show_bug.cgi?id=1239573 * https://bugzilla.suse.com/show_bug.cgi?id=1239594 * https://bugzilla.suse.com/show_bug.cgi?id=1239595 * https://bugzilla.suse.com/show_bug.cgi?id=1239600 * https://bugzilla.suse.com/show_bug.cgi?id=1239605 * https://bugzilla.suse.com/show_bug.cgi?id=1239615 * https://bugzilla.suse.com/show_bug.cgi?id=1239644 * https://bugzilla.suse.com/show_bug.cgi?id=1239707 * https://bugzilla.suse.com/show_bug.cgi?id=1239986 * https://bugzilla.suse.com/show_bug.cgi?id=1239994 * https://bugzilla.suse.com/show_bug.cgi?id=1240169 * https://bugzilla.suse.com/show_bug.cgi?id=1240172 * https://bugzilla.suse.com/show_bug.cgi?id=1240173 * https://bugzilla.suse.com/show_bug.cgi?id=1240175 * https://bugzilla.suse.com/show_bug.cgi?id=1240177 * https://bugzilla.suse.com/show_bug.cgi?id=1240179 * https://bugzilla.suse.com/show_bug.cgi?id=1240182 * https://bugzilla.suse.com/show_bug.cgi?id=1240183 * https://bugzilla.suse.com/show_bug.cgi?id=1240186 * https://bugzilla.suse.com/show_bug.cgi?id=1240188 * https://bugzilla.suse.com/show_bug.cgi?id=1240189 * https://bugzilla.suse.com/show_bug.cgi?id=1240191 * https://bugzilla.suse.com/show_bug.cgi?id=1240192 * https://bugzilla.suse.com/show_bug.cgi?id=1240333 * https://bugzilla.suse.com/show_bug.cgi?id=1240334 * https://jira.suse.com/browse/PED-10701 * https://jira.suse.com/browse/PED-12251 * https://jira.suse.com/browse/PED-12416 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 8 16:51:35 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 08 Apr 2025 16:51:35 -0000 Subject: SUSE-SU-2025:1176-1: important: Security update for the Linux Kernel Message-ID: <174413109509.21179.5600564442797049216@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:1176-1 Release Date: Rating: important References: * bsc#1065729 * bsc#1180814 * bsc#1183682 * bsc#1190336 * bsc#1190768 * bsc#1190786 * bsc#1193629 * bsc#1194869 * bsc#1194904 * bsc#1195823 * bsc#1196444 * bsc#1197158 * bsc#1197174 * bsc#1197227 * bsc#1197246 * bsc#1197302 * bsc#1197331 * bsc#1197472 * bsc#1197661 * bsc#1197926 * bsc#1198019 * bsc#1198021 * bsc#1198240 * bsc#1198577 * bsc#1198660 * bsc#1199657 * bsc#1200045 * bsc#1200571 * bsc#1200807 * bsc#1200809 * bsc#1200810 * bsc#1200824 * bsc#1200825 * bsc#1200871 * bsc#1200872 * bsc#1201193 * bsc#1201218 * bsc#1201323 * bsc#1201381 * bsc#1201610 * bsc#1202672 * bsc#1202711 * bsc#1202712 * bsc#1202771 * bsc#1202774 * bsc#1202778 * bsc#1202781 * bsc#1203699 * bsc#1203769 * bsc#1204171 * bsc#1205205 * bsc#1205701 * bsc#1206048 * bsc#1206049 * bsc#1206451 * bsc#1207034 * bsc#1207186 * bsc#1207361 * bsc#1207593 * bsc#1207640 * bsc#1207878 * bsc#1209262 * bsc#1209547 * bsc#1209788 * bsc#1209980 * bsc#1210050 * bsc#1210647 * bsc#1211263 * bsc#1213167 * bsc#1218450 * bsc#1221651 * bsc#1225428 * bsc#1225742 * bsc#1229312 * bsc#1231375 * bsc#1231432 * bsc#1231854 * bsc#1232299 * bsc#1232743 * bsc#1233479 * bsc#1233557 * bsc#1233749 * bsc#1234074 * bsc#1234894 * bsc#1234895 * bsc#1234896 * bsc#1235528 * bsc#1235599 * bsc#1235870 * bsc#1237029 * bsc#1237521 * bsc#1237530 * bsc#1237718 * bsc#1237721 * bsc#1237722 * bsc#1237723 * bsc#1237724 * bsc#1237725 * bsc#1237726 * bsc#1237727 * bsc#1237728 * bsc#1237729 * bsc#1237730 * bsc#1237733 * bsc#1237734 * bsc#1237735 * bsc#1237736 * bsc#1237737 * bsc#1237738 * bsc#1237739 * bsc#1237740 * bsc#1237742 * bsc#1237743 * bsc#1237744 * bsc#1237745 * bsc#1237746 * bsc#1237748 * bsc#1237749 * bsc#1237751 * bsc#1237752 * bsc#1237753 * bsc#1237755 * bsc#1237759 * bsc#1237761 * bsc#1237763 * bsc#1237766 * bsc#1237767 * bsc#1237768 * bsc#1237774 * bsc#1237775 * bsc#1237778 * bsc#1237779 * bsc#1237780 * bsc#1237782 * bsc#1237783 * bsc#1237784 * bsc#1237785 * bsc#1237786 * bsc#1237787 * bsc#1237788 * bsc#1237789 * bsc#1237790 * bsc#1237792 * bsc#1237794 * bsc#1237795 * bsc#1237797 * bsc#1237798 * bsc#1237799 * bsc#1237807 * bsc#1237808 * bsc#1237809 * bsc#1237810 * bsc#1237812 * bsc#1237813 * bsc#1237814 * bsc#1237815 * bsc#1237816 * bsc#1237817 * bsc#1237818 * bsc#1237820 * bsc#1237821 * bsc#1237823 * bsc#1237824 * bsc#1237826 * bsc#1237827 * bsc#1237829 * bsc#1237831 * bsc#1237835 * bsc#1237836 * bsc#1237837 * bsc#1237839 * bsc#1237840 * bsc#1237845 * bsc#1237846 * bsc#1237868 * bsc#1237872 * bsc#1237892 * bsc#1237903 * bsc#1237904 * bsc#1237916 * bsc#1237918 * bsc#1237922 * bsc#1237925 * bsc#1237926 * bsc#1237927 * bsc#1237928 * bsc#1237929 * bsc#1237931 * bsc#1237932 * bsc#1237933 * bsc#1237937 * bsc#1237939 * bsc#1237940 * bsc#1237941 * bsc#1237942 * bsc#1237946 * bsc#1237951 * bsc#1237952 * bsc#1237954 * bsc#1237955 * bsc#1237957 * bsc#1237958 * bsc#1237959 * bsc#1237960 * bsc#1237961 * bsc#1237962 * bsc#1237963 * bsc#1237965 * bsc#1237966 * bsc#1237967 * bsc#1237968 * bsc#1237969 * bsc#1237970 * bsc#1237971 * bsc#1237972 * bsc#1237973 * bsc#1237975 * bsc#1237976 * bsc#1237978 * bsc#1237979 * bsc#1237980 * bsc#1237982 * bsc#1237983 * bsc#1237984 * bsc#1237986 * bsc#1237987 * bsc#1237990 * bsc#1237992 * bsc#1237996 * bsc#1237997 * bsc#1237998 * bsc#1237999 * bsc#1238000 * bsc#1238003 * bsc#1238004 * bsc#1238005 * bsc#1238006 * bsc#1238007 * bsc#1238009 * bsc#1238010 * bsc#1238011 * bsc#1238012 * bsc#1238013 * bsc#1238014 * bsc#1238016 * bsc#1238017 * bsc#1238018 * bsc#1238019 * bsc#1238021 * bsc#1238022 * bsc#1238024 * bsc#1238025 * bsc#1238030 * bsc#1238032 * bsc#1238036 * bsc#1238037 * bsc#1238041 * bsc#1238046 * bsc#1238047 * bsc#1238048 * bsc#1238069 * bsc#1238071 * bsc#1238077 * bsc#1238079 * bsc#1238080 * bsc#1238083 * bsc#1238084 * bsc#1238085 * bsc#1238086 * bsc#1238089 * bsc#1238090 * bsc#1238091 * bsc#1238092 * bsc#1238096 * bsc#1238097 * bsc#1238099 * bsc#1238103 * bsc#1238105 * bsc#1238106 * bsc#1238107 * bsc#1238108 * bsc#1238110 * bsc#1238111 * bsc#1238112 * bsc#1238113 * bsc#1238114 * bsc#1238115 * bsc#1238116 * bsc#1238118 * bsc#1238120 * bsc#1238122 * bsc#1238123 * bsc#1238125 * bsc#1238126 * bsc#1238127 * bsc#1238128 * bsc#1238131 * bsc#1238134 * bsc#1238135 * bsc#1238138 * bsc#1238139 * bsc#1238140 * bsc#1238142 * bsc#1238144 * bsc#1238146 * bsc#1238147 * bsc#1238149 * bsc#1238150 * bsc#1238153 * bsc#1238155 * bsc#1238156 * bsc#1238157 * bsc#1238158 * bsc#1238160 * bsc#1238162 * bsc#1238166 * bsc#1238167 * bsc#1238168 * bsc#1238169 * bsc#1238170 * bsc#1238171 * bsc#1238172 * bsc#1238175 * bsc#1238176 * bsc#1238177 * bsc#1238178 * bsc#1238179 * bsc#1238180 * bsc#1238181 * bsc#1238183 * bsc#1238184 * bsc#1238187 * bsc#1238221 * bsc#1238222 * bsc#1238226 * bsc#1238228 * bsc#1238229 * bsc#1238231 * bsc#1238233 * bsc#1238234 * bsc#1238235 * bsc#1238236 * bsc#1238238 * bsc#1238239 * bsc#1238240 * bsc#1238241 * bsc#1238242 * bsc#1238243 * bsc#1238244 * bsc#1238246 * bsc#1238247 * bsc#1238248 * bsc#1238249 * bsc#1238252 * bsc#1238253 * bsc#1238255 * bsc#1238256 * bsc#1238257 * bsc#1238260 * bsc#1238261 * bsc#1238262 * bsc#1238263 * bsc#1238264 * bsc#1238266 * bsc#1238267 * bsc#1238268 * bsc#1238269 * bsc#1238270 * bsc#1238271 * bsc#1238272 * bsc#1238274 * bsc#1238275 * bsc#1238276 * bsc#1238277 * bsc#1238278 * bsc#1238279 * bsc#1238281 * bsc#1238282 * bsc#1238283 * bsc#1238284 * bsc#1238285 * bsc#1238286 * bsc#1238287 * bsc#1238288 * bsc#1238289 * bsc#1238291 * bsc#1238292 * bsc#1238293 * bsc#1238295 * bsc#1238298 * bsc#1238300 * bsc#1238301 * bsc#1238302 * bsc#1238306 * bsc#1238307 * bsc#1238308 * bsc#1238309 * bsc#1238311 * bsc#1238313 * bsc#1238326 * bsc#1238327 * bsc#1238328 * bsc#1238329 * bsc#1238331 * bsc#1238333 * bsc#1238334 * bsc#1238335 * bsc#1238336 * bsc#1238337 * bsc#1238338 * bsc#1238339 * bsc#1238341 * bsc#1238343 * bsc#1238344 * bsc#1238345 * bsc#1238372 * bsc#1238373 * bsc#1238374 * bsc#1238376 * bsc#1238377 * bsc#1238378 * bsc#1238381 * bsc#1238382 * bsc#1238383 * bsc#1238385 * bsc#1238386 * bsc#1238387 * bsc#1238388 * bsc#1238389 * bsc#1238390 * bsc#1238391 * bsc#1238392 * bsc#1238393 * bsc#1238394 * bsc#1238395 * bsc#1238396 * bsc#1238397 * bsc#1238398 * bsc#1238400 * bsc#1238401 * bsc#1238410 * bsc#1238411 * bsc#1238413 * bsc#1238415 * bsc#1238416 * bsc#1238417 * bsc#1238418 * bsc#1238419 * bsc#1238420 * bsc#1238422 * bsc#1238423 * bsc#1238424 * bsc#1238428 * bsc#1238429 * bsc#1238430 * bsc#1238431 * bsc#1238432 * bsc#1238433 * bsc#1238434 * bsc#1238435 * bsc#1238436 * bsc#1238437 * bsc#1238440 * bsc#1238441 * bsc#1238442 * bsc#1238443 * bsc#1238444 * bsc#1238445 * bsc#1238446 * bsc#1238447 * bsc#1238453 * bsc#1238454 * bsc#1238458 * bsc#1238459 * bsc#1238462 * bsc#1238463 * bsc#1238465 * bsc#1238467 * bsc#1238469 * bsc#1238533 * bsc#1238536 * bsc#1238538 * bsc#1238539 * bsc#1238540 * bsc#1238542 * bsc#1238543 * bsc#1238545 * bsc#1238546 * bsc#1238551 * bsc#1238552 * bsc#1238556 * bsc#1238557 * bsc#1238599 * bsc#1238600 * bsc#1238601 * bsc#1238602 * bsc#1238605 * bsc#1238612 * bsc#1238613 * bsc#1238615 * bsc#1238616 * bsc#1238617 * bsc#1238618 * bsc#1238619 * bsc#1238621 * bsc#1238623 * bsc#1238625 * bsc#1238626 * bsc#1238630 * bsc#1238631 * bsc#1238632 * bsc#1238633 * bsc#1238635 * bsc#1238636 * bsc#1238638 * bsc#1238639 * bsc#1238640 * bsc#1238641 * bsc#1238642 * bsc#1238643 * bsc#1238645 * bsc#1238646 * bsc#1238647 * bsc#1238648 * bsc#1238649 * bsc#1238650 * bsc#1238653 * bsc#1238654 * bsc#1238655 * bsc#1238658 * bsc#1238661 * bsc#1238662 * bsc#1238663 * bsc#1238664 * bsc#1238666 * bsc#1238668 * bsc#1238705 * bsc#1238707 * bsc#1238710 * bsc#1238712 * bsc#1238718 * bsc#1238719 * bsc#1238721 * bsc#1238722 * bsc#1238727 * bsc#1238729 * bsc#1238750 * bsc#1238787 * bsc#1238789 * bsc#1238792 * bsc#1238799 * bsc#1238803 * bsc#1238804 * bsc#1238805 * bsc#1238806 * bsc#1238808 * bsc#1238809 * bsc#1238810 * bsc#1238811 * bsc#1238814 * bsc#1238815 * bsc#1238816 * bsc#1238817 * bsc#1238818 * bsc#1238819 * bsc#1238820 * bsc#1238821 * bsc#1238822 * bsc#1238823 * bsc#1238825 * bsc#1238830 * bsc#1238834 * bsc#1238835 * bsc#1238836 * bsc#1238838 * bsc#1238843 * bsc#1238867 * bsc#1238868 * bsc#1238869 * bsc#1238870 * bsc#1238871 * bsc#1238878 * bsc#1238889 * bsc#1238892 * bsc#1238893 * bsc#1238897 * bsc#1238898 * bsc#1238899 * bsc#1238902 * bsc#1238911 * bsc#1238916 * bsc#1238919 * bsc#1238925 * bsc#1238930 * bsc#1238933 * bsc#1238936 * bsc#1238937 * bsc#1238938 * bsc#1238939 * bsc#1238941 * bsc#1238942 * bsc#1238943 * bsc#1238944 * bsc#1238945 * bsc#1238946 * bsc#1238948 * bsc#1238949 * bsc#1238950 * bsc#1238951 * bsc#1238952 * bsc#1238953 * bsc#1238954 * bsc#1238956 * bsc#1238957 * bsc#1239001 * bsc#1239004 * bsc#1239016 * bsc#1239035 * bsc#1239040 * bsc#1239041 * bsc#1239051 * bsc#1239060 * bsc#1239070 * bsc#1239071 * bsc#1239073 * bsc#1239076 * bsc#1239095 * bsc#1239109 * bsc#1239115 * bsc#1239126 * bsc#1239452 * bsc#1239454 * bsc#1239968 * bsc#1239969 * bsc#1240133 * bsc#1240205 * bsc#1240207 * bsc#1240208 * bsc#1240210 * bsc#1240212 * bsc#1240213 * bsc#1240218 * bsc#1240220 * bsc#1240227 * bsc#1240229 * bsc#1240231 * bsc#1240242 * bsc#1240245 * bsc#1240247 * bsc#1240250 * bsc#1240254 * bsc#1240256 * bsc#1240264 * bsc#1240266 * bsc#1240272 * bsc#1240275 * bsc#1240276 * bsc#1240278 * bsc#1240279 * bsc#1240280 * bsc#1240281 * bsc#1240282 * bsc#1240283 * bsc#1240284 * bsc#1240286 * bsc#1240288 * bsc#1240290 * bsc#1240292 * bsc#1240293 * bsc#1240297 * bsc#1240304 * bsc#1240308 * bsc#1240309 * bsc#1240317 * bsc#1240318 * bsc#1240322 Cross-References: * CVE-2017-5753 * CVE-2021-4453 * CVE-2021-4454 * CVE-2021-47517 * CVE-2021-47631 * CVE-2021-47632 * CVE-2021-47633 * CVE-2021-47635 * CVE-2021-47636 * CVE-2021-47637 * CVE-2021-47638 * CVE-2021-47639 * CVE-2021-47641 * CVE-2021-47642 * CVE-2021-47643 * CVE-2021-47644 * CVE-2021-47645 * CVE-2021-47646 * CVE-2021-47647 * CVE-2021-47648 * CVE-2021-47649 * CVE-2021-47650 * CVE-2021-47651 * CVE-2021-47652 * CVE-2021-47653 * CVE-2021-47654 * CVE-2021-47656 * CVE-2021-47657 * CVE-2021-47659 * CVE-2022-0168 * CVE-2022-0995 * CVE-2022-1016 * CVE-2022-1048 * CVE-2022-1184 * CVE-2022-2977 * CVE-2022-29900 * CVE-2022-29901 * CVE-2022-3303 * CVE-2022-3435 * CVE-2022-49044 * CVE-2022-49050 * CVE-2022-49051 * CVE-2022-49053 * CVE-2022-49054 * CVE-2022-49055 * CVE-2022-49056 * CVE-2022-49057 * CVE-2022-49058 * CVE-2022-49059 * CVE-2022-49060 * CVE-2022-49061 * CVE-2022-49062 * CVE-2022-49063 * CVE-2022-49064 * CVE-2022-49065 * CVE-2022-49066 * CVE-2022-49070 * CVE-2022-49071 * CVE-2022-49073 * CVE-2022-49074 * CVE-2022-49075 * CVE-2022-49076 * CVE-2022-49078 * CVE-2022-49082 * CVE-2022-49083 * CVE-2022-49084 * CVE-2022-49085 * CVE-2022-49086 * CVE-2022-49088 * CVE-2022-49089 * CVE-2022-49090 * CVE-2022-49091 * CVE-2022-49092 * CVE-2022-49093 * CVE-2022-49095 * CVE-2022-49096 * CVE-2022-49097 * CVE-2022-49098 * CVE-2022-49099 * CVE-2022-49100 * CVE-2022-49102 * CVE-2022-49103 * CVE-2022-49104 * CVE-2022-49105 * CVE-2022-49106 * CVE-2022-49107 * CVE-2022-49109 * CVE-2022-49111 * CVE-2022-49112 * CVE-2022-49113 * CVE-2022-49114 * CVE-2022-49115 * CVE-2022-49116 * CVE-2022-49118 * CVE-2022-49119 * CVE-2022-49120 * CVE-2022-49121 * CVE-2022-49122 * CVE-2022-49123 * CVE-2022-49125 * CVE-2022-49126 * CVE-2022-49128 * CVE-2022-49129 * CVE-2022-49130 * CVE-2022-49131 * CVE-2022-49132 * CVE-2022-49133 * CVE-2022-49134 * CVE-2022-49135 * CVE-2022-49136 * CVE-2022-49137 * CVE-2022-49138 * CVE-2022-49139 * CVE-2022-49144 * CVE-2022-49145 * CVE-2022-49147 * CVE-2022-49148 * CVE-2022-49151 * CVE-2022-49153 * CVE-2022-49154 * CVE-2022-49155 * CVE-2022-49156 * CVE-2022-49157 * CVE-2022-49158 * CVE-2022-49159 * CVE-2022-49160 * CVE-2022-49162 * CVE-2022-49163 * CVE-2022-49164 * CVE-2022-49165 * CVE-2022-49174 * CVE-2022-49175 * CVE-2022-49176 * CVE-2022-49177 * CVE-2022-49178 * CVE-2022-49179 * CVE-2022-49180 * CVE-2022-49182 * CVE-2022-49183 * CVE-2022-49185 * CVE-2022-49187 * CVE-2022-49188 * CVE-2022-49189 * CVE-2022-49192 * CVE-2022-49193 * CVE-2022-49194 * CVE-2022-49196 * CVE-2022-49199 * CVE-2022-49200 * CVE-2022-49201 * CVE-2022-49202 * CVE-2022-49203 * CVE-2022-49204 * CVE-2022-49205 * CVE-2022-49206 * CVE-2022-49207 * CVE-2022-49208 * CVE-2022-49209 * CVE-2022-49212 * CVE-2022-49213 * CVE-2022-49214 * CVE-2022-49215 * CVE-2022-49216 * CVE-2022-49217 * CVE-2022-49218 * CVE-2022-49219 * CVE-2022-49221 * CVE-2022-49222 * CVE-2022-49224 * CVE-2022-49225 * CVE-2022-49226 * CVE-2022-49227 * CVE-2022-49228 * CVE-2022-49230 * CVE-2022-49232 * CVE-2022-49233 * CVE-2022-49235 * CVE-2022-49236 * CVE-2022-49237 * CVE-2022-49238 * CVE-2022-49239 * CVE-2022-49241 * CVE-2022-49242 * CVE-2022-49243 * CVE-2022-49244 * CVE-2022-49246 * CVE-2022-49247 * CVE-2022-49248 * CVE-2022-49249 * CVE-2022-49250 * CVE-2022-49251 * CVE-2022-49252 * CVE-2022-49253 * CVE-2022-49254 * CVE-2022-49256 * CVE-2022-49257 * CVE-2022-49258 * CVE-2022-49259 * CVE-2022-49260 * CVE-2022-49261 * CVE-2022-49262 * CVE-2022-49263 * CVE-2022-49264 * CVE-2022-49265 * CVE-2022-49266 * CVE-2022-49268 * CVE-2022-49269 * CVE-2022-49270 * CVE-2022-49271 * CVE-2022-49272 * CVE-2022-49273 * CVE-2022-49274 * CVE-2022-49275 * CVE-2022-49276 * CVE-2022-49277 * CVE-2022-49278 * CVE-2022-49279 * CVE-2022-49280 * CVE-2022-49281 * CVE-2022-49283 * CVE-2022-49285 * CVE-2022-49286 * CVE-2022-49287 * CVE-2022-49288 * CVE-2022-49290 * CVE-2022-49291 * CVE-2022-49292 * CVE-2022-49293 * CVE-2022-49294 * CVE-2022-49295 * CVE-2022-49296 * CVE-2022-49297 * CVE-2022-49298 * CVE-2022-49299 * CVE-2022-49300 * CVE-2022-49301 * CVE-2022-49302 * CVE-2022-49304 * CVE-2022-49305 * CVE-2022-49306 * CVE-2022-49307 * CVE-2022-49308 * CVE-2022-49309 * CVE-2022-49310 * CVE-2022-49311 * CVE-2022-49312 * CVE-2022-49313 * CVE-2022-49314 * CVE-2022-49315 * CVE-2022-49316 * CVE-2022-49319 * CVE-2022-49320 * CVE-2022-49321 * CVE-2022-49322 * CVE-2022-49323 * CVE-2022-49325 * CVE-2022-49326 * CVE-2022-49327 * CVE-2022-49328 * CVE-2022-49329 * CVE-2022-49330 * CVE-2022-49331 * CVE-2022-49332 * CVE-2022-49333 * CVE-2022-49335 * CVE-2022-49336 * CVE-2022-49337 * CVE-2022-49338 * CVE-2022-49339 * CVE-2022-49341 * CVE-2022-49342 * CVE-2022-49343 * CVE-2022-49345 * CVE-2022-49346 * CVE-2022-49347 * CVE-2022-49348 * CVE-2022-49349 * CVE-2022-49350 * CVE-2022-49351 * CVE-2022-49352 * CVE-2022-49353 * CVE-2022-49354 * CVE-2022-49356 * CVE-2022-49357 * CVE-2022-49359 * CVE-2022-49362 * CVE-2022-49365 * CVE-2022-49367 * CVE-2022-49368 * CVE-2022-49370 * CVE-2022-49371 * CVE-2022-49373 * CVE-2022-49375 * CVE-2022-49376 * CVE-2022-49377 * CVE-2022-49378 * CVE-2022-49379 * CVE-2022-49381 * CVE-2022-49382 * CVE-2022-49384 * CVE-2022-49385 * CVE-2022-49386 * CVE-2022-49389 * CVE-2022-49390 * CVE-2022-49392 * CVE-2022-49394 * CVE-2022-49396 * CVE-2022-49397 * CVE-2022-49398 * CVE-2022-49399 * CVE-2022-49400 * CVE-2022-49402 * CVE-2022-49404 * CVE-2022-49406 * CVE-2022-49407 * CVE-2022-49409 * CVE-2022-49410 * CVE-2022-49411 * CVE-2022-49412 * CVE-2022-49413 * CVE-2022-49414 * CVE-2022-49416 * CVE-2022-49418 * CVE-2022-49419 * CVE-2022-49421 * CVE-2022-49422 * CVE-2022-49424 * CVE-2022-49426 * CVE-2022-49427 * CVE-2022-49429 * CVE-2022-49430 * CVE-2022-49431 * CVE-2022-49432 * CVE-2022-49433 * CVE-2022-49434 * CVE-2022-49435 * CVE-2022-49436 * CVE-2022-49437 * CVE-2022-49438 * CVE-2022-49440 * CVE-2022-49441 * CVE-2022-49442 * CVE-2022-49443 * CVE-2022-49444 * CVE-2022-49445 * CVE-2022-49446 * CVE-2022-49447 * CVE-2022-49448 * CVE-2022-49449 * CVE-2022-49451 * CVE-2022-49453 * CVE-2022-49455 * CVE-2022-49458 * CVE-2022-49459 * CVE-2022-49460 * CVE-2022-49462 * CVE-2022-49463 * CVE-2022-49465 * CVE-2022-49466 * CVE-2022-49467 * CVE-2022-49468 * CVE-2022-49470 * CVE-2022-49472 * CVE-2022-49473 * CVE-2022-49474 * CVE-2022-49475 * CVE-2022-49476 * CVE-2022-49477 * CVE-2022-49478 * CVE-2022-49479 * CVE-2022-49480 * CVE-2022-49481 * CVE-2022-49482 * CVE-2022-49483 * CVE-2022-49484 * CVE-2022-49485 * CVE-2022-49486 * CVE-2022-49487 * CVE-2022-49488 * CVE-2022-49489 * CVE-2022-49490 * CVE-2022-49491 * CVE-2022-49492 * CVE-2022-49493 * CVE-2022-49494 * CVE-2022-49495 * CVE-2022-49497 * CVE-2022-49498 * CVE-2022-49499 * CVE-2022-49501 * CVE-2022-49502 * CVE-2022-49503 * CVE-2022-49504 * CVE-2022-49505 * CVE-2022-49506 * CVE-2022-49507 * CVE-2022-49508 * CVE-2022-49509 * CVE-2022-49510 * CVE-2022-49511 * CVE-2022-49512 * CVE-2022-49514 * CVE-2022-49515 * CVE-2022-49516 * CVE-2022-49517 * CVE-2022-49518 * CVE-2022-49519 * CVE-2022-49520 * CVE-2022-49521 * CVE-2022-49522 * CVE-2022-49523 * CVE-2022-49524 * CVE-2022-49525 * CVE-2022-49526 * CVE-2022-49527 * CVE-2022-49529 * CVE-2022-49530 * CVE-2022-49532 * CVE-2022-49533 * CVE-2022-49534 * CVE-2022-49535 * CVE-2022-49536 * CVE-2022-49537 * CVE-2022-49538 * CVE-2022-49541 * CVE-2022-49542 * CVE-2022-49543 * CVE-2022-49544 * CVE-2022-49545 * CVE-2022-49546 * CVE-2022-49548 * CVE-2022-49549 * CVE-2022-49551 * CVE-2022-49552 * CVE-2022-49555 * CVE-2022-49556 * CVE-2022-49559 * CVE-2022-49560 * CVE-2022-49562 * CVE-2022-49563 * CVE-2022-49564 * CVE-2022-49565 * CVE-2022-49566 * CVE-2022-49568 * CVE-2022-49569 * CVE-2022-49570 * CVE-2022-49579 * CVE-2022-49581 * CVE-2022-49583 * CVE-2022-49584 * CVE-2022-49591 * CVE-2022-49592 * CVE-2022-49603 * CVE-2022-49605 * CVE-2022-49606 * CVE-2022-49607 * CVE-2022-49609 * CVE-2022-49610 * CVE-2022-49611 * CVE-2022-49613 * CVE-2022-49615 * CVE-2022-49616 * CVE-2022-49617 * CVE-2022-49618 * CVE-2022-49621 * CVE-2022-49623 * CVE-2022-49624 * CVE-2022-49625 * CVE-2022-49626 * CVE-2022-49627 * CVE-2022-49628 * CVE-2022-49631 * CVE-2022-49634 * CVE-2022-49635 * CVE-2022-49638 * CVE-2022-49640 * CVE-2022-49641 * CVE-2022-49642 * CVE-2022-49643 * CVE-2022-49644 * CVE-2022-49645 * CVE-2022-49646 * CVE-2022-49647 * CVE-2022-49648 * CVE-2022-49649 * CVE-2022-49650 * CVE-2022-49652 * CVE-2022-49653 * CVE-2022-49655 * CVE-2022-49656 * CVE-2022-49657 * CVE-2022-49658 * CVE-2022-49661 * CVE-2022-49663 * CVE-2022-49665 * CVE-2022-49667 * CVE-2022-49668 * CVE-2022-49670 * CVE-2022-49671 * CVE-2022-49672 * CVE-2022-49673 * CVE-2022-49674 * CVE-2022-49675 * CVE-2022-49676 * CVE-2022-49677 * CVE-2022-49678 * CVE-2022-49679 * CVE-2022-49680 * CVE-2022-49683 * CVE-2022-49685 * CVE-2022-49686 * CVE-2022-49687 * CVE-2022-49688 * CVE-2022-49693 * CVE-2022-49694 * CVE-2022-49695 * CVE-2022-49697 * CVE-2022-49699 * CVE-2022-49700 * CVE-2022-49701 * CVE-2022-49703 * CVE-2022-49704 * CVE-2022-49705 * CVE-2022-49707 * CVE-2022-49708 * CVE-2022-49710 * CVE-2022-49711 * CVE-2022-49712 * CVE-2022-49713 * CVE-2022-49714 * CVE-2022-49715 * CVE-2022-49716 * CVE-2022-49719 * CVE-2022-49720 * CVE-2022-49721 * CVE-2022-49722 * CVE-2022-49723 * CVE-2022-49724 * CVE-2022-49725 * CVE-2022-49726 * CVE-2022-49729 * CVE-2022-49730 * CVE-2022-49731 * CVE-2022-49732 * CVE-2022-49733 * CVE-2022-49739 * CVE-2022-49746 * CVE-2022-49748 * CVE-2022-49751 * CVE-2022-49753 * CVE-2022-49755 * CVE-2022-49759 * CVE-2023-0179 * CVE-2023-1652 * CVE-2023-2162 * CVE-2023-28410 * CVE-2023-3567 * CVE-2023-52930 * CVE-2023-52933 * CVE-2023-52935 * CVE-2023-52939 * CVE-2023-52941 * CVE-2023-52973 * CVE-2023-52974 * CVE-2023-52975 * CVE-2023-52976 * CVE-2023-52979 * CVE-2023-52983 * CVE-2023-52984 * CVE-2023-52988 * CVE-2023-52989 * CVE-2023-52992 * CVE-2023-52993 * CVE-2023-53000 * CVE-2023-53005 * CVE-2023-53006 * CVE-2023-53007 * CVE-2023-53008 * CVE-2023-53010 * CVE-2023-53015 * CVE-2023-53016 * CVE-2023-53019 * CVE-2023-53023 * CVE-2023-53024 * CVE-2023-53025 * CVE-2023-53026 * CVE-2023-53028 * CVE-2023-53029 * CVE-2023-53030 * CVE-2023-53033 * CVE-2024-26634 * CVE-2024-47678 * CVE-2024-50290 * CVE-2024-53063 * CVE-2024-53124 * CVE-2024-53176 * CVE-2024-53178 * CVE-2024-56651 * CVE-2024-57996 * CVE-2024-58013 * CVE-2024-58014 * CVE-2025-21693 * CVE-2025-21718 * CVE-2025-21772 * CVE-2025-21780 CVSS scores: * CVE-2017-5753 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( SUSE ): 7.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( NVD ): 5.6 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2021-4453 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-4453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-4453 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-4454 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-4454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47517 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47631 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47631 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47632 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47632 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47633 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2021-47633 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47635 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2021-47635 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47636 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47636 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2021-47637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47637 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47638 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2021-47638 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47638 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47639 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2021-47639 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47639 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47641 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47641 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47642 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2021-47642 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2021-47643 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47643 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47644 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2021-47644 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47644 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47645 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47646 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2021-47646 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47646 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47647 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47649 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47650 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47651 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47651 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47651 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47652 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47652 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47653 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47653 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47653 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47654 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2021-47654 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47654 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47656 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2021-47656 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47656 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47657 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47657 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47659 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2021-47659 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-0168 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-0168 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-0995 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-0995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-1016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-1016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-1048 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-1048 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-1184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-2977 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2022-2977 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-29900 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-29900 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2022-29901 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-29901 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2022-3303 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3303 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3435 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2022-3435 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2022-49044 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49044 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49050 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49050 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49051 ( SUSE ): 4.3 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2022-49051 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N * CVE-2022-49053 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49053 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49053 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49054 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2022-49054 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2022-49055 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49056 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49056 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49057 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49057 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49058 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49059 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49059 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49060 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49061 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49061 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49062 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49062 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49063 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49063 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49063 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49064 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49065 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49065 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49066 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49070 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49071 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49071 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49073 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49074 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49076 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49076 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49078 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49078 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49082 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49082 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49083 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49084 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49085 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49085 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49086 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49086 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49088 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49089 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49089 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2022-49090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49091 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49093 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49093 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49096 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49096 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2022-49096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49097 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49098 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49098 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49099 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49100 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49103 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49103 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49105 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49105 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49106 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49106 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49107 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49107 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49111 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49112 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49113 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49113 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49114 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49114 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49114 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49115 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49115 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49118 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49119 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49119 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49120 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49121 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49122 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49123 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49123 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49125 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49126 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49126 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49128 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49128 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49128 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49129 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49130 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49130 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49131 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49131 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49132 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49133 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49134 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49135 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49135 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49136 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49136 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49136 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49137 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49137 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49137 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49138 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49138 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49139 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49144 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49144 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49145 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49145 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-49147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49153 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49153 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49154 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49154 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2022-49155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49155 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49156 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49157 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49157 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49158 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2022-49158 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2022-49159 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49159 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49162 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49163 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49163 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49164 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49165 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49165 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49175 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49176 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49176 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49177 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49177 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49178 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49179 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49182 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49183 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49183 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49187 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49189 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2022-49189 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2022-49192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49194 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49196 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49201 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49202 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49203 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49205 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49206 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49206 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49207 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49208 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49208 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49209 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49212 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49212 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49213 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49213 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49213 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49214 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49215 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49215 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49216 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49216 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49218 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49219 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49219 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49221 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49221 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49222 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49222 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49225 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49226 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49228 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49228 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49230 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49232 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49232 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49233 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49235 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49235 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49236 ( SUSE ): 7.5 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49236 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49236 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49238 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49238 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49238 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49239 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49241 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49241 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49241 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49242 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49242 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49243 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49243 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49248 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49249 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49250 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49254 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49254 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49257 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49258 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49260 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49260 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2022-49261 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49261 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49262 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49262 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49266 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49266 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49268 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49268 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49269 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2022-49269 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2022-49270 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49270 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49271 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49273 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49274 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49275 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49275 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49275 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49276 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49277 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49279 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49279 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49280 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49281 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49283 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49285 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49286 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49286 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49287 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49288 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49290 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49290 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2022-49291 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49291 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49291 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49292 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49293 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49294 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49295 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49295 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49296 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49297 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49297 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49298 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49298 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49299 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49300 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49300 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49301 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49301 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49302 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49304 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49305 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49306 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49307 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49308 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49309 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49309 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49310 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49310 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49311 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49311 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49312 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49312 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49313 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49314 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49314 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49315 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49316 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49316 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49316 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49319 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49319 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49320 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49321 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49321 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49321 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49322 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49322 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49323 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49323 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49323 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49325 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49326 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49326 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49326 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49327 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49327 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49328 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49328 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49328 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49329 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49329 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49330 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49330 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49331 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49332 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49333 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49333 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49335 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49335 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49336 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49336 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49337 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49338 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49339 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49339 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49341 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49341 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49342 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49342 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49342 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49343 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49343 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49345 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49346 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49346 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49347 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49347 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49348 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49348 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49349 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49349 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49350 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49350 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49352 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49352 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49353 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49354 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49354 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49356 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49357 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49357 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49359 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49362 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49365 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49367 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49370 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49373 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49375 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49376 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49377 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49377 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49378 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49381 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49382 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49385 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49390 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49390 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49392 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49392 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49394 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49394 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49398 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49400 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49402 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49404 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49411 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49411 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49412 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49413 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49413 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49413 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49414 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49416 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49419 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49421 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49426 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49426 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49429 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49429 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49431 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49432 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49432 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49434 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49437 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49437 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49438 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49440 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49440 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49444 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49446 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49447 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49447 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49448 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49449 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49449 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49453 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49455 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49459 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49460 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49460 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49462 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49465 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49465 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49465 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49466 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49467 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49468 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49468 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49470 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49470 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49472 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49472 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49473 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49474 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49474 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49475 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49476 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49476 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49477 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49479 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49479 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49480 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49481 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49482 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49483 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49485 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49485 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49487 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49487 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49489 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49489 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49490 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49491 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49492 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49493 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49493 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49495 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49497 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49497 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49498 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2022-49498 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2022-49499 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49501 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49501 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49502 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49502 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49504 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49505 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49505 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49506 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49508 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49510 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49511 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49512 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49514 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49516 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49516 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49517 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49518 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49518 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49519 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49519 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49520 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2022-49520 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2022-49521 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49521 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49522 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49523 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49523 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49524 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49524 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49525 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49525 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49526 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49526 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49527 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49527 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49527 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49529 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49529 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49529 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49530 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49530 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49530 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49532 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49532 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49533 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49534 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49534 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49534 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49535 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49535 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49535 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49536 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49536 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49536 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49537 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49537 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49538 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49538 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49541 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49541 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2022-49541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49542 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49544 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49544 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49544 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49545 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49545 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49546 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49546 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49549 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49551 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49552 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49555 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49560 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49563 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49564 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49565 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49566 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49568 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49568 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49568 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49569 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49570 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49570 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49579 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49579 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49583 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49591 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49591 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49603 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49605 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49607 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49609 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49610 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2022-49610 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2022-49611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49613 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49615 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49615 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49616 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49617 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49618 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49618 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49618 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49621 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49621 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49621 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49623 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49624 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49626 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49626 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49627 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49627 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49628 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49631 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49634 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49638 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49640 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49641 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49642 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49643 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49644 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49644 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49646 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49647 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49652 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49653 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49653 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49655 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49656 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49657 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49667 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49668 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49673 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49676 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49679 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49685 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49693 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49694 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49700 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49704 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49711 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49711 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49720 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49729 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49729 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49729 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49730 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49731 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49731 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49733 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49739 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49746 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49748 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49751 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49753 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49755 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49755 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49759 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0179 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1652 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1652 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-1652 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-2162 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-28410 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-28410 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-3567 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52935 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52973 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52975 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52975 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52992 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53008 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53023 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53025 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47678 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53176 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53176 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53178 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56651 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56651 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58014 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21718 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21780 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Micro 5.5 An update that solves 605 vulnerabilities and has 71 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918). * CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled (bsc#1238919). * CVE-2022-49739: gfs2: Always check inode size of inline inodes (bsc#1240207). * CVE-2023-52935: mm/khugepaged: fix ->anon_vma race (bsc#1240276). * CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc (bsc#1234074). * CVE-2024-53176: smb: During unmount, ensure all cached dir instances drop their dentry (bsc#1234894). * CVE-2024-53178: smb: Do not leak cfid when reconnect races with open_cached_dir (bsc#1234895). * CVE-2024-56651: can: hi311x: hi3110_can_ist(): fix potential use-after-free (bsc#1235528). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076). * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239095). * CVE-2024-58014: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (bsc#1239109). * CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029). * CVE-2025-21718: net: rose: fix timer races against user threads (bsc#1239073). * CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238911). * CVE-2025-21780: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (bsc#1239115). The following non-security bugs were fixed: * ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016). * RDMA/mana_ib: Use v2 version of cfg_rx_steer_req to enable RX coalescing (bsc#1239016). * Revert "gfs2: Fix inode height consistency check (git-fixes). * btrfs: defrag: do not use merged extent map for their generation check (bsc#1239968). * btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1239968). * btrfs: fix extent map merging not happening for adjacent extents (bsc#1239968). * btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1239969). * btrfs: send: fix invalid clone operation for file that got its size decreased (bsc#1239969). * cifs: Add a laundromat thread for cached directories (git-fixes). * cifs: fix potential null pointer use in destroy_workqueue in init_cifs error path (git-fixes). * gfs2: Fix inode height consistency check (git-fixes). * mm/mmu_notifier.c: fix race in mmu_interval_notifier_remove() (bsc#1239126). * mm: zswap: move allocations during CPU init outside the lock (git-fixes). * net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016). * net: mana: Allow variable size indirection table (bsc#1239016). * net: mana: Avoid open coded arithmetic (bsc#1239016). * net: mana: Support holes in device list reply msg (bsc#1240133). * sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743). * smb3: allow controlling length of time directory entries are cached with dir leases (git-fixes). * smb3: do not start laundromat thread when dir leases disabled (git-fixes). * smb3: retrying on failed server close (git-fixes). * smb: client: destroy cfid_put_wq on module exit (git-fixes). * smb: client: disable directory caching when dir_cache_timeout is zero (git- fixes). * smb: client: do not start laundromat thread on nohandlecache (git-fixes). * smb: client: make laundromat a delayed worker (git-fixes). * smb: client: properly close cfids on umount (bsc#1231432, bsc#1232299, bsc#1235599, bsc#1234896). * tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1176=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1176=1 ## Package List: * openSUSE Leap 15.5 (noarch) * kernel-devel-rt-5.14.21-150500.13.91.1 * kernel-source-rt-5.14.21-150500.13.91.1 * openSUSE Leap 15.5 (x86_64) * kernel-rt-optional-debuginfo-5.14.21-150500.13.91.1 * kernel-rt_debug-debugsource-5.14.21-150500.13.91.1 * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.91.1 * kernel-rt-devel-debuginfo-5.14.21-150500.13.91.1 * kernel-rt-debuginfo-5.14.21-150500.13.91.1 * kernel-rt_debug-vdso-5.14.21-150500.13.91.1 * kernel-rt-livepatch-devel-5.14.21-150500.13.91.1 * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.91.1 * kernel-rt-optional-5.14.21-150500.13.91.1 * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.91.1 * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.91.1 * kernel-rt_debug-debuginfo-5.14.21-150500.13.91.1 * kselftests-kmp-rt-debuginfo-5.14.21-150500.13.91.1 * kernel-rt-extra-debuginfo-5.14.21-150500.13.91.1 * ocfs2-kmp-rt-5.14.21-150500.13.91.1 * dlm-kmp-rt-debuginfo-5.14.21-150500.13.91.1 * cluster-md-kmp-rt-5.14.21-150500.13.91.1 * kselftests-kmp-rt-5.14.21-150500.13.91.1 * kernel-rt-debugsource-5.14.21-150500.13.91.1 * kernel-syms-rt-5.14.21-150500.13.91.1 * reiserfs-kmp-rt-5.14.21-150500.13.91.1 * kernel-rt-devel-5.14.21-150500.13.91.1 * kernel-rt_debug-devel-5.14.21-150500.13.91.1 * dlm-kmp-rt-5.14.21-150500.13.91.1 * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.91.1 * reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.91.1 * kernel-rt-vdso-debuginfo-5.14.21-150500.13.91.1 * kernel-rt-extra-5.14.21-150500.13.91.1 * gfs2-kmp-rt-5.14.21-150500.13.91.1 * kernel-rt-livepatch-5.14.21-150500.13.91.1 * kernel-rt-vdso-5.14.21-150500.13.91.1 * openSUSE Leap 15.5 (nosrc x86_64) * kernel-rt_debug-5.14.21-150500.13.91.1 * kernel-rt-5.14.21-150500.13.91.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * kernel-devel-rt-5.14.21-150500.13.91.1 * kernel-source-rt-5.14.21-150500.13.91.1 * SUSE Linux Enterprise Micro 5.5 (nosrc x86_64) * kernel-rt-5.14.21-150500.13.91.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * kernel-rt-debugsource-5.14.21-150500.13.91.1 * kernel-rt-debuginfo-5.14.21-150500.13.91.1 ## References: * https://www.suse.com/security/cve/CVE-2017-5753.html * https://www.suse.com/security/cve/CVE-2021-4453.html * https://www.suse.com/security/cve/CVE-2021-4454.html * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2021-47631.html * https://www.suse.com/security/cve/CVE-2021-47632.html * https://www.suse.com/security/cve/CVE-2021-47633.html * https://www.suse.com/security/cve/CVE-2021-47635.html * https://www.suse.com/security/cve/CVE-2021-47636.html * https://www.suse.com/security/cve/CVE-2021-47637.html * https://www.suse.com/security/cve/CVE-2021-47638.html * https://www.suse.com/security/cve/CVE-2021-47639.html * https://www.suse.com/security/cve/CVE-2021-47641.html * https://www.suse.com/security/cve/CVE-2021-47642.html * https://www.suse.com/security/cve/CVE-2021-47643.html * https://www.suse.com/security/cve/CVE-2021-47644.html * https://www.suse.com/security/cve/CVE-2021-47645.html * https://www.suse.com/security/cve/CVE-2021-47646.html * https://www.suse.com/security/cve/CVE-2021-47647.html * https://www.suse.com/security/cve/CVE-2021-47648.html * https://www.suse.com/security/cve/CVE-2021-47649.html * https://www.suse.com/security/cve/CVE-2021-47650.html * https://www.suse.com/security/cve/CVE-2021-47651.html * https://www.suse.com/security/cve/CVE-2021-47652.html * https://www.suse.com/security/cve/CVE-2021-47653.html * https://www.suse.com/security/cve/CVE-2021-47654.html * https://www.suse.com/security/cve/CVE-2021-47656.html * https://www.suse.com/security/cve/CVE-2021-47657.html * https://www.suse.com/security/cve/CVE-2021-47659.html * https://www.suse.com/security/cve/CVE-2022-0168.html * https://www.suse.com/security/cve/CVE-2022-0995.html * https://www.suse.com/security/cve/CVE-2022-1016.html * https://www.suse.com/security/cve/CVE-2022-1048.html * https://www.suse.com/security/cve/CVE-2022-1184.html * https://www.suse.com/security/cve/CVE-2022-2977.html * https://www.suse.com/security/cve/CVE-2022-29900.html * https://www.suse.com/security/cve/CVE-2022-29901.html * https://www.suse.com/security/cve/CVE-2022-3303.html * https://www.suse.com/security/cve/CVE-2022-3435.html * https://www.suse.com/security/cve/CVE-2022-49044.html * https://www.suse.com/security/cve/CVE-2022-49050.html * https://www.suse.com/security/cve/CVE-2022-49051.html * https://www.suse.com/security/cve/CVE-2022-49053.html * https://www.suse.com/security/cve/CVE-2022-49054.html * https://www.suse.com/security/cve/CVE-2022-49055.html * https://www.suse.com/security/cve/CVE-2022-49056.html * https://www.suse.com/security/cve/CVE-2022-49057.html * https://www.suse.com/security/cve/CVE-2022-49058.html * https://www.suse.com/security/cve/CVE-2022-49059.html * https://www.suse.com/security/cve/CVE-2022-49060.html * https://www.suse.com/security/cve/CVE-2022-49061.html * https://www.suse.com/security/cve/CVE-2022-49062.html * https://www.suse.com/security/cve/CVE-2022-49063.html * https://www.suse.com/security/cve/CVE-2022-49064.html * https://www.suse.com/security/cve/CVE-2022-49065.html * https://www.suse.com/security/cve/CVE-2022-49066.html * https://www.suse.com/security/cve/CVE-2022-49070.html * https://www.suse.com/security/cve/CVE-2022-49071.html * https://www.suse.com/security/cve/CVE-2022-49073.html * https://www.suse.com/security/cve/CVE-2022-49074.html * https://www.suse.com/security/cve/CVE-2022-49075.html * https://www.suse.com/security/cve/CVE-2022-49076.html * https://www.suse.com/security/cve/CVE-2022-49078.html * https://www.suse.com/security/cve/CVE-2022-49082.html * https://www.suse.com/security/cve/CVE-2022-49083.html * https://www.suse.com/security/cve/CVE-2022-49084.html * https://www.suse.com/security/cve/CVE-2022-49085.html * https://www.suse.com/security/cve/CVE-2022-49086.html * https://www.suse.com/security/cve/CVE-2022-49088.html * https://www.suse.com/security/cve/CVE-2022-49089.html * https://www.suse.com/security/cve/CVE-2022-49090.html * https://www.suse.com/security/cve/CVE-2022-49091.html * https://www.suse.com/security/cve/CVE-2022-49092.html * https://www.suse.com/security/cve/CVE-2022-49093.html * https://www.suse.com/security/cve/CVE-2022-49095.html * https://www.suse.com/security/cve/CVE-2022-49096.html * https://www.suse.com/security/cve/CVE-2022-49097.html * https://www.suse.com/security/cve/CVE-2022-49098.html * https://www.suse.com/security/cve/CVE-2022-49099.html * https://www.suse.com/security/cve/CVE-2022-49100.html * https://www.suse.com/security/cve/CVE-2022-49102.html * https://www.suse.com/security/cve/CVE-2022-49103.html * https://www.suse.com/security/cve/CVE-2022-49104.html * https://www.suse.com/security/cve/CVE-2022-49105.html * https://www.suse.com/security/cve/CVE-2022-49106.html * https://www.suse.com/security/cve/CVE-2022-49107.html * https://www.suse.com/security/cve/CVE-2022-49109.html * https://www.suse.com/security/cve/CVE-2022-49111.html * https://www.suse.com/security/cve/CVE-2022-49112.html * https://www.suse.com/security/cve/CVE-2022-49113.html * https://www.suse.com/security/cve/CVE-2022-49114.html * https://www.suse.com/security/cve/CVE-2022-49115.html * https://www.suse.com/security/cve/CVE-2022-49116.html * https://www.suse.com/security/cve/CVE-2022-49118.html * https://www.suse.com/security/cve/CVE-2022-49119.html * https://www.suse.com/security/cve/CVE-2022-49120.html * https://www.suse.com/security/cve/CVE-2022-49121.html * https://www.suse.com/security/cve/CVE-2022-49122.html * https://www.suse.com/security/cve/CVE-2022-49123.html * https://www.suse.com/security/cve/CVE-2022-49125.html * https://www.suse.com/security/cve/CVE-2022-49126.html * https://www.suse.com/security/cve/CVE-2022-49128.html * https://www.suse.com/security/cve/CVE-2022-49129.html * https://www.suse.com/security/cve/CVE-2022-49130.html * https://www.suse.com/security/cve/CVE-2022-49131.html * https://www.suse.com/security/cve/CVE-2022-49132.html * https://www.suse.com/security/cve/CVE-2022-49133.html * https://www.suse.com/security/cve/CVE-2022-49134.html * https://www.suse.com/security/cve/CVE-2022-49135.html * https://www.suse.com/security/cve/CVE-2022-49136.html * https://www.suse.com/security/cve/CVE-2022-49137.html * https://www.suse.com/security/cve/CVE-2022-49138.html * https://www.suse.com/security/cve/CVE-2022-49139.html * https://www.suse.com/security/cve/CVE-2022-49144.html * https://www.suse.com/security/cve/CVE-2022-49145.html * https://www.suse.com/security/cve/CVE-2022-49147.html * https://www.suse.com/security/cve/CVE-2022-49148.html * https://www.suse.com/security/cve/CVE-2022-49151.html * https://www.suse.com/security/cve/CVE-2022-49153.html * https://www.suse.com/security/cve/CVE-2022-49154.html * https://www.suse.com/security/cve/CVE-2022-49155.html * https://www.suse.com/security/cve/CVE-2022-49156.html * https://www.suse.com/security/cve/CVE-2022-49157.html * https://www.suse.com/security/cve/CVE-2022-49158.html * https://www.suse.com/security/cve/CVE-2022-49159.html * https://www.suse.com/security/cve/CVE-2022-49160.html * https://www.suse.com/security/cve/CVE-2022-49162.html * https://www.suse.com/security/cve/CVE-2022-49163.html * https://www.suse.com/security/cve/CVE-2022-49164.html * https://www.suse.com/security/cve/CVE-2022-49165.html * https://www.suse.com/security/cve/CVE-2022-49174.html * https://www.suse.com/security/cve/CVE-2022-49175.html * https://www.suse.com/security/cve/CVE-2022-49176.html * https://www.suse.com/security/cve/CVE-2022-49177.html * https://www.suse.com/security/cve/CVE-2022-49178.html * https://www.suse.com/security/cve/CVE-2022-49179.html * https://www.suse.com/security/cve/CVE-2022-49180.html * https://www.suse.com/security/cve/CVE-2022-49182.html * https://www.suse.com/security/cve/CVE-2022-49183.html * https://www.suse.com/security/cve/CVE-2022-49185.html * https://www.suse.com/security/cve/CVE-2022-49187.html * https://www.suse.com/security/cve/CVE-2022-49188.html * https://www.suse.com/security/cve/CVE-2022-49189.html * https://www.suse.com/security/cve/CVE-2022-49192.html * https://www.suse.com/security/cve/CVE-2022-49193.html * https://www.suse.com/security/cve/CVE-2022-49194.html * https://www.suse.com/security/cve/CVE-2022-49196.html * https://www.suse.com/security/cve/CVE-2022-49199.html * https://www.suse.com/security/cve/CVE-2022-49200.html * https://www.suse.com/security/cve/CVE-2022-49201.html * https://www.suse.com/security/cve/CVE-2022-49202.html * https://www.suse.com/security/cve/CVE-2022-49203.html * https://www.suse.com/security/cve/CVE-2022-49204.html * https://www.suse.com/security/cve/CVE-2022-49205.html * https://www.suse.com/security/cve/CVE-2022-49206.html * https://www.suse.com/security/cve/CVE-2022-49207.html * https://www.suse.com/security/cve/CVE-2022-49208.html * https://www.suse.com/security/cve/CVE-2022-49209.html * https://www.suse.com/security/cve/CVE-2022-49212.html * https://www.suse.com/security/cve/CVE-2022-49213.html * https://www.suse.com/security/cve/CVE-2022-49214.html * https://www.suse.com/security/cve/CVE-2022-49215.html * https://www.suse.com/security/cve/CVE-2022-49216.html * https://www.suse.com/security/cve/CVE-2022-49217.html * https://www.suse.com/security/cve/CVE-2022-49218.html * https://www.suse.com/security/cve/CVE-2022-49219.html * https://www.suse.com/security/cve/CVE-2022-49221.html * https://www.suse.com/security/cve/CVE-2022-49222.html * https://www.suse.com/security/cve/CVE-2022-49224.html * https://www.suse.com/security/cve/CVE-2022-49225.html * https://www.suse.com/security/cve/CVE-2022-49226.html * https://www.suse.com/security/cve/CVE-2022-49227.html * https://www.suse.com/security/cve/CVE-2022-49228.html * https://www.suse.com/security/cve/CVE-2022-49230.html * https://www.suse.com/security/cve/CVE-2022-49232.html * https://www.suse.com/security/cve/CVE-2022-49233.html * https://www.suse.com/security/cve/CVE-2022-49235.html * https://www.suse.com/security/cve/CVE-2022-49236.html * https://www.suse.com/security/cve/CVE-2022-49237.html * https://www.suse.com/security/cve/CVE-2022-49238.html * https://www.suse.com/security/cve/CVE-2022-49239.html * https://www.suse.com/security/cve/CVE-2022-49241.html * https://www.suse.com/security/cve/CVE-2022-49242.html * https://www.suse.com/security/cve/CVE-2022-49243.html * https://www.suse.com/security/cve/CVE-2022-49244.html * https://www.suse.com/security/cve/CVE-2022-49246.html * https://www.suse.com/security/cve/CVE-2022-49247.html * https://www.suse.com/security/cve/CVE-2022-49248.html * https://www.suse.com/security/cve/CVE-2022-49249.html * https://www.suse.com/security/cve/CVE-2022-49250.html * https://www.suse.com/security/cve/CVE-2022-49251.html * https://www.suse.com/security/cve/CVE-2022-49252.html * https://www.suse.com/security/cve/CVE-2022-49253.html * https://www.suse.com/security/cve/CVE-2022-49254.html * https://www.suse.com/security/cve/CVE-2022-49256.html * https://www.suse.com/security/cve/CVE-2022-49257.html * https://www.suse.com/security/cve/CVE-2022-49258.html * https://www.suse.com/security/cve/CVE-2022-49259.html * https://www.suse.com/security/cve/CVE-2022-49260.html * https://www.suse.com/security/cve/CVE-2022-49261.html * https://www.suse.com/security/cve/CVE-2022-49262.html * https://www.suse.com/security/cve/CVE-2022-49263.html * https://www.suse.com/security/cve/CVE-2022-49264.html * https://www.suse.com/security/cve/CVE-2022-49265.html * https://www.suse.com/security/cve/CVE-2022-49266.html * https://www.suse.com/security/cve/CVE-2022-49268.html * https://www.suse.com/security/cve/CVE-2022-49269.html * https://www.suse.com/security/cve/CVE-2022-49270.html * https://www.suse.com/security/cve/CVE-2022-49271.html * https://www.suse.com/security/cve/CVE-2022-49272.html * https://www.suse.com/security/cve/CVE-2022-49273.html * https://www.suse.com/security/cve/CVE-2022-49274.html * https://www.suse.com/security/cve/CVE-2022-49275.html * https://www.suse.com/security/cve/CVE-2022-49276.html * https://www.suse.com/security/cve/CVE-2022-49277.html * https://www.suse.com/security/cve/CVE-2022-49278.html * https://www.suse.com/security/cve/CVE-2022-49279.html * https://www.suse.com/security/cve/CVE-2022-49280.html * https://www.suse.com/security/cve/CVE-2022-49281.html * https://www.suse.com/security/cve/CVE-2022-49283.html * https://www.suse.com/security/cve/CVE-2022-49285.html * https://www.suse.com/security/cve/CVE-2022-49286.html * https://www.suse.com/security/cve/CVE-2022-49287.html * https://www.suse.com/security/cve/CVE-2022-49288.html * https://www.suse.com/security/cve/CVE-2022-49290.html * https://www.suse.com/security/cve/CVE-2022-49291.html * https://www.suse.com/security/cve/CVE-2022-49292.html * https://www.suse.com/security/cve/CVE-2022-49293.html * https://www.suse.com/security/cve/CVE-2022-49294.html * https://www.suse.com/security/cve/CVE-2022-49295.html * https://www.suse.com/security/cve/CVE-2022-49296.html * https://www.suse.com/security/cve/CVE-2022-49297.html * https://www.suse.com/security/cve/CVE-2022-49298.html * https://www.suse.com/security/cve/CVE-2022-49299.html * https://www.suse.com/security/cve/CVE-2022-49300.html * https://www.suse.com/security/cve/CVE-2022-49301.html * https://www.suse.com/security/cve/CVE-2022-49302.html * https://www.suse.com/security/cve/CVE-2022-49304.html * https://www.suse.com/security/cve/CVE-2022-49305.html * https://www.suse.com/security/cve/CVE-2022-49306.html * https://www.suse.com/security/cve/CVE-2022-49307.html * https://www.suse.com/security/cve/CVE-2022-49308.html * https://www.suse.com/security/cve/CVE-2022-49309.html * https://www.suse.com/security/cve/CVE-2022-49310.html * https://www.suse.com/security/cve/CVE-2022-49311.html * https://www.suse.com/security/cve/CVE-2022-49312.html * https://www.suse.com/security/cve/CVE-2022-49313.html * https://www.suse.com/security/cve/CVE-2022-49314.html * https://www.suse.com/security/cve/CVE-2022-49315.html * https://www.suse.com/security/cve/CVE-2022-49316.html * https://www.suse.com/security/cve/CVE-2022-49319.html * https://www.suse.com/security/cve/CVE-2022-49320.html * https://www.suse.com/security/cve/CVE-2022-49321.html * https://www.suse.com/security/cve/CVE-2022-49322.html * https://www.suse.com/security/cve/CVE-2022-49323.html * https://www.suse.com/security/cve/CVE-2022-49325.html * https://www.suse.com/security/cve/CVE-2022-49326.html * https://www.suse.com/security/cve/CVE-2022-49327.html * https://www.suse.com/security/cve/CVE-2022-49328.html * https://www.suse.com/security/cve/CVE-2022-49329.html * https://www.suse.com/security/cve/CVE-2022-49330.html * https://www.suse.com/security/cve/CVE-2022-49331.html * https://www.suse.com/security/cve/CVE-2022-49332.html * https://www.suse.com/security/cve/CVE-2022-49333.html * https://www.suse.com/security/cve/CVE-2022-49335.html * https://www.suse.com/security/cve/CVE-2022-49336.html * https://www.suse.com/security/cve/CVE-2022-49337.html * https://www.suse.com/security/cve/CVE-2022-49338.html * https://www.suse.com/security/cve/CVE-2022-49339.html * https://www.suse.com/security/cve/CVE-2022-49341.html * https://www.suse.com/security/cve/CVE-2022-49342.html * https://www.suse.com/security/cve/CVE-2022-49343.html * https://www.suse.com/security/cve/CVE-2022-49345.html * https://www.suse.com/security/cve/CVE-2022-49346.html * https://www.suse.com/security/cve/CVE-2022-49347.html * https://www.suse.com/security/cve/CVE-2022-49348.html * https://www.suse.com/security/cve/CVE-2022-49349.html * https://www.suse.com/security/cve/CVE-2022-49350.html * https://www.suse.com/security/cve/CVE-2022-49351.html * https://www.suse.com/security/cve/CVE-2022-49352.html * https://www.suse.com/security/cve/CVE-2022-49353.html * https://www.suse.com/security/cve/CVE-2022-49354.html * https://www.suse.com/security/cve/CVE-2022-49356.html * https://www.suse.com/security/cve/CVE-2022-49357.html * https://www.suse.com/security/cve/CVE-2022-49359.html * https://www.suse.com/security/cve/CVE-2022-49362.html * https://www.suse.com/security/cve/CVE-2022-49365.html * https://www.suse.com/security/cve/CVE-2022-49367.html * https://www.suse.com/security/cve/CVE-2022-49368.html * https://www.suse.com/security/cve/CVE-2022-49370.html * https://www.suse.com/security/cve/CVE-2022-49371.html * https://www.suse.com/security/cve/CVE-2022-49373.html * https://www.suse.com/security/cve/CVE-2022-49375.html * https://www.suse.com/security/cve/CVE-2022-49376.html * https://www.suse.com/security/cve/CVE-2022-49377.html * https://www.suse.com/security/cve/CVE-2022-49378.html * https://www.suse.com/security/cve/CVE-2022-49379.html * https://www.suse.com/security/cve/CVE-2022-49381.html * https://www.suse.com/security/cve/CVE-2022-49382.html * https://www.suse.com/security/cve/CVE-2022-49384.html * https://www.suse.com/security/cve/CVE-2022-49385.html * https://www.suse.com/security/cve/CVE-2022-49386.html * https://www.suse.com/security/cve/CVE-2022-49389.html * https://www.suse.com/security/cve/CVE-2022-49390.html * https://www.suse.com/security/cve/CVE-2022-49392.html * https://www.suse.com/security/cve/CVE-2022-49394.html * https://www.suse.com/security/cve/CVE-2022-49396.html * https://www.suse.com/security/cve/CVE-2022-49397.html * https://www.suse.com/security/cve/CVE-2022-49398.html * https://www.suse.com/security/cve/CVE-2022-49399.html * https://www.suse.com/security/cve/CVE-2022-49400.html * https://www.suse.com/security/cve/CVE-2022-49402.html * https://www.suse.com/security/cve/CVE-2022-49404.html * https://www.suse.com/security/cve/CVE-2022-49406.html * https://www.suse.com/security/cve/CVE-2022-49407.html * https://www.suse.com/security/cve/CVE-2022-49409.html * https://www.suse.com/security/cve/CVE-2022-49410.html * https://www.suse.com/security/cve/CVE-2022-49411.html * https://www.suse.com/security/cve/CVE-2022-49412.html * https://www.suse.com/security/cve/CVE-2022-49413.html * https://www.suse.com/security/cve/CVE-2022-49414.html * https://www.suse.com/security/cve/CVE-2022-49416.html * https://www.suse.com/security/cve/CVE-2022-49418.html * https://www.suse.com/security/cve/CVE-2022-49419.html * https://www.suse.com/security/cve/CVE-2022-49421.html * https://www.suse.com/security/cve/CVE-2022-49422.html * https://www.suse.com/security/cve/CVE-2022-49424.html * https://www.suse.com/security/cve/CVE-2022-49426.html * https://www.suse.com/security/cve/CVE-2022-49427.html * https://www.suse.com/security/cve/CVE-2022-49429.html * https://www.suse.com/security/cve/CVE-2022-49430.html * https://www.suse.com/security/cve/CVE-2022-49431.html * https://www.suse.com/security/cve/CVE-2022-49432.html * https://www.suse.com/security/cve/CVE-2022-49433.html * https://www.suse.com/security/cve/CVE-2022-49434.html * https://www.suse.com/security/cve/CVE-2022-49435.html * https://www.suse.com/security/cve/CVE-2022-49436.html * https://www.suse.com/security/cve/CVE-2022-49437.html * https://www.suse.com/security/cve/CVE-2022-49438.html * https://www.suse.com/security/cve/CVE-2022-49440.html * https://www.suse.com/security/cve/CVE-2022-49441.html * https://www.suse.com/security/cve/CVE-2022-49442.html * https://www.suse.com/security/cve/CVE-2022-49443.html * https://www.suse.com/security/cve/CVE-2022-49444.html * https://www.suse.com/security/cve/CVE-2022-49445.html * https://www.suse.com/security/cve/CVE-2022-49446.html * https://www.suse.com/security/cve/CVE-2022-49447.html * https://www.suse.com/security/cve/CVE-2022-49448.html * https://www.suse.com/security/cve/CVE-2022-49449.html * https://www.suse.com/security/cve/CVE-2022-49451.html * https://www.suse.com/security/cve/CVE-2022-49453.html * https://www.suse.com/security/cve/CVE-2022-49455.html * https://www.suse.com/security/cve/CVE-2022-49458.html * https://www.suse.com/security/cve/CVE-2022-49459.html * https://www.suse.com/security/cve/CVE-2022-49460.html * https://www.suse.com/security/cve/CVE-2022-49462.html * https://www.suse.com/security/cve/CVE-2022-49463.html * https://www.suse.com/security/cve/CVE-2022-49465.html * https://www.suse.com/security/cve/CVE-2022-49466.html * https://www.suse.com/security/cve/CVE-2022-49467.html * https://www.suse.com/security/cve/CVE-2022-49468.html * https://www.suse.com/security/cve/CVE-2022-49470.html * https://www.suse.com/security/cve/CVE-2022-49472.html * https://www.suse.com/security/cve/CVE-2022-49473.html * https://www.suse.com/security/cve/CVE-2022-49474.html * https://www.suse.com/security/cve/CVE-2022-49475.html * https://www.suse.com/security/cve/CVE-2022-49476.html * https://www.suse.com/security/cve/CVE-2022-49477.html * https://www.suse.com/security/cve/CVE-2022-49478.html * https://www.suse.com/security/cve/CVE-2022-49479.html * https://www.suse.com/security/cve/CVE-2022-49480.html * https://www.suse.com/security/cve/CVE-2022-49481.html * https://www.suse.com/security/cve/CVE-2022-49482.html * https://www.suse.com/security/cve/CVE-2022-49483.html * https://www.suse.com/security/cve/CVE-2022-49484.html * https://www.suse.com/security/cve/CVE-2022-49485.html * https://www.suse.com/security/cve/CVE-2022-49486.html * https://www.suse.com/security/cve/CVE-2022-49487.html * https://www.suse.com/security/cve/CVE-2022-49488.html * https://www.suse.com/security/cve/CVE-2022-49489.html * https://www.suse.com/security/cve/CVE-2022-49490.html * https://www.suse.com/security/cve/CVE-2022-49491.html * https://www.suse.com/security/cve/CVE-2022-49492.html * https://www.suse.com/security/cve/CVE-2022-49493.html * https://www.suse.com/security/cve/CVE-2022-49494.html * https://www.suse.com/security/cve/CVE-2022-49495.html * https://www.suse.com/security/cve/CVE-2022-49497.html * https://www.suse.com/security/cve/CVE-2022-49498.html * https://www.suse.com/security/cve/CVE-2022-49499.html * https://www.suse.com/security/cve/CVE-2022-49501.html * https://www.suse.com/security/cve/CVE-2022-49502.html * https://www.suse.com/security/cve/CVE-2022-49503.html * https://www.suse.com/security/cve/CVE-2022-49504.html * https://www.suse.com/security/cve/CVE-2022-49505.html * https://www.suse.com/security/cve/CVE-2022-49506.html * https://www.suse.com/security/cve/CVE-2022-49507.html * https://www.suse.com/security/cve/CVE-2022-49508.html * https://www.suse.com/security/cve/CVE-2022-49509.html * https://www.suse.com/security/cve/CVE-2022-49510.html * https://www.suse.com/security/cve/CVE-2022-49511.html * https://www.suse.com/security/cve/CVE-2022-49512.html * https://www.suse.com/security/cve/CVE-2022-49514.html * https://www.suse.com/security/cve/CVE-2022-49515.html * https://www.suse.com/security/cve/CVE-2022-49516.html * https://www.suse.com/security/cve/CVE-2022-49517.html * https://www.suse.com/security/cve/CVE-2022-49518.html * https://www.suse.com/security/cve/CVE-2022-49519.html * https://www.suse.com/security/cve/CVE-2022-49520.html * https://www.suse.com/security/cve/CVE-2022-49521.html * https://www.suse.com/security/cve/CVE-2022-49522.html * https://www.suse.com/security/cve/CVE-2022-49523.html * https://www.suse.com/security/cve/CVE-2022-49524.html * https://www.suse.com/security/cve/CVE-2022-49525.html * https://www.suse.com/security/cve/CVE-2022-49526.html * https://www.suse.com/security/cve/CVE-2022-49527.html * https://www.suse.com/security/cve/CVE-2022-49529.html * https://www.suse.com/security/cve/CVE-2022-49530.html * https://www.suse.com/security/cve/CVE-2022-49532.html * https://www.suse.com/security/cve/CVE-2022-49533.html * https://www.suse.com/security/cve/CVE-2022-49534.html * https://www.suse.com/security/cve/CVE-2022-49535.html * https://www.suse.com/security/cve/CVE-2022-49536.html * https://www.suse.com/security/cve/CVE-2022-49537.html * https://www.suse.com/security/cve/CVE-2022-49538.html * https://www.suse.com/security/cve/CVE-2022-49541.html * https://www.suse.com/security/cve/CVE-2022-49542.html * https://www.suse.com/security/cve/CVE-2022-49543.html * https://www.suse.com/security/cve/CVE-2022-49544.html * https://www.suse.com/security/cve/CVE-2022-49545.html * https://www.suse.com/security/cve/CVE-2022-49546.html * https://www.suse.com/security/cve/CVE-2022-49548.html * https://www.suse.com/security/cve/CVE-2022-49549.html * https://www.suse.com/security/cve/CVE-2022-49551.html * https://www.suse.com/security/cve/CVE-2022-49552.html * https://www.suse.com/security/cve/CVE-2022-49555.html * https://www.suse.com/security/cve/CVE-2022-49556.html * https://www.suse.com/security/cve/CVE-2022-49559.html * https://www.suse.com/security/cve/CVE-2022-49560.html * https://www.suse.com/security/cve/CVE-2022-49562.html * https://www.suse.com/security/cve/CVE-2022-49563.html * https://www.suse.com/security/cve/CVE-2022-49564.html * https://www.suse.com/security/cve/CVE-2022-49565.html * https://www.suse.com/security/cve/CVE-2022-49566.html * https://www.suse.com/security/cve/CVE-2022-49568.html * https://www.suse.com/security/cve/CVE-2022-49569.html * https://www.suse.com/security/cve/CVE-2022-49570.html * https://www.suse.com/security/cve/CVE-2022-49579.html * https://www.suse.com/security/cve/CVE-2022-49581.html * https://www.suse.com/security/cve/CVE-2022-49583.html * https://www.suse.com/security/cve/CVE-2022-49584.html * https://www.suse.com/security/cve/CVE-2022-49591.html * https://www.suse.com/security/cve/CVE-2022-49592.html * https://www.suse.com/security/cve/CVE-2022-49603.html * https://www.suse.com/security/cve/CVE-2022-49605.html * https://www.suse.com/security/cve/CVE-2022-49606.html * https://www.suse.com/security/cve/CVE-2022-49607.html * https://www.suse.com/security/cve/CVE-2022-49609.html * https://www.suse.com/security/cve/CVE-2022-49610.html * https://www.suse.com/security/cve/CVE-2022-49611.html * https://www.suse.com/security/cve/CVE-2022-49613.html * https://www.suse.com/security/cve/CVE-2022-49615.html * https://www.suse.com/security/cve/CVE-2022-49616.html * https://www.suse.com/security/cve/CVE-2022-49617.html * https://www.suse.com/security/cve/CVE-2022-49618.html * https://www.suse.com/security/cve/CVE-2022-49621.html * https://www.suse.com/security/cve/CVE-2022-49623.html * https://www.suse.com/security/cve/CVE-2022-49624.html * https://www.suse.com/security/cve/CVE-2022-49625.html * https://www.suse.com/security/cve/CVE-2022-49626.html * https://www.suse.com/security/cve/CVE-2022-49627.html * https://www.suse.com/security/cve/CVE-2022-49628.html * https://www.suse.com/security/cve/CVE-2022-49631.html * https://www.suse.com/security/cve/CVE-2022-49634.html * https://www.suse.com/security/cve/CVE-2022-49635.html * https://www.suse.com/security/cve/CVE-2022-49638.html * https://www.suse.com/security/cve/CVE-2022-49640.html * https://www.suse.com/security/cve/CVE-2022-49641.html * https://www.suse.com/security/cve/CVE-2022-49642.html * https://www.suse.com/security/cve/CVE-2022-49643.html * https://www.suse.com/security/cve/CVE-2022-49644.html * https://www.suse.com/security/cve/CVE-2022-49645.html * https://www.suse.com/security/cve/CVE-2022-49646.html * https://www.suse.com/security/cve/CVE-2022-49647.html * https://www.suse.com/security/cve/CVE-2022-49648.html * https://www.suse.com/security/cve/CVE-2022-49649.html * https://www.suse.com/security/cve/CVE-2022-49650.html * https://www.suse.com/security/cve/CVE-2022-49652.html * https://www.suse.com/security/cve/CVE-2022-49653.html * https://www.suse.com/security/cve/CVE-2022-49655.html * https://www.suse.com/security/cve/CVE-2022-49656.html * https://www.suse.com/security/cve/CVE-2022-49657.html * https://www.suse.com/security/cve/CVE-2022-49658.html * https://www.suse.com/security/cve/CVE-2022-49661.html * https://www.suse.com/security/cve/CVE-2022-49663.html * https://www.suse.com/security/cve/CVE-2022-49665.html * https://www.suse.com/security/cve/CVE-2022-49667.html * https://www.suse.com/security/cve/CVE-2022-49668.html * https://www.suse.com/security/cve/CVE-2022-49670.html * https://www.suse.com/security/cve/CVE-2022-49671.html * https://www.suse.com/security/cve/CVE-2022-49672.html * https://www.suse.com/security/cve/CVE-2022-49673.html * https://www.suse.com/security/cve/CVE-2022-49674.html * https://www.suse.com/security/cve/CVE-2022-49675.html * https://www.suse.com/security/cve/CVE-2022-49676.html * https://www.suse.com/security/cve/CVE-2022-49677.html * https://www.suse.com/security/cve/CVE-2022-49678.html * https://www.suse.com/security/cve/CVE-2022-49679.html * https://www.suse.com/security/cve/CVE-2022-49680.html * https://www.suse.com/security/cve/CVE-2022-49683.html * https://www.suse.com/security/cve/CVE-2022-49685.html * https://www.suse.com/security/cve/CVE-2022-49686.html * https://www.suse.com/security/cve/CVE-2022-49687.html * https://www.suse.com/security/cve/CVE-2022-49688.html * https://www.suse.com/security/cve/CVE-2022-49693.html * https://www.suse.com/security/cve/CVE-2022-49694.html * https://www.suse.com/security/cve/CVE-2022-49695.html * https://www.suse.com/security/cve/CVE-2022-49697.html * https://www.suse.com/security/cve/CVE-2022-49699.html * https://www.suse.com/security/cve/CVE-2022-49700.html * https://www.suse.com/security/cve/CVE-2022-49701.html * https://www.suse.com/security/cve/CVE-2022-49703.html * https://www.suse.com/security/cve/CVE-2022-49704.html * https://www.suse.com/security/cve/CVE-2022-49705.html * https://www.suse.com/security/cve/CVE-2022-49707.html * https://www.suse.com/security/cve/CVE-2022-49708.html * https://www.suse.com/security/cve/CVE-2022-49710.html * https://www.suse.com/security/cve/CVE-2022-49711.html * https://www.suse.com/security/cve/CVE-2022-49712.html * https://www.suse.com/security/cve/CVE-2022-49713.html * https://www.suse.com/security/cve/CVE-2022-49714.html * https://www.suse.com/security/cve/CVE-2022-49715.html * https://www.suse.com/security/cve/CVE-2022-49716.html * https://www.suse.com/security/cve/CVE-2022-49719.html * https://www.suse.com/security/cve/CVE-2022-49720.html * https://www.suse.com/security/cve/CVE-2022-49721.html * https://www.suse.com/security/cve/CVE-2022-49722.html * https://www.suse.com/security/cve/CVE-2022-49723.html * https://www.suse.com/security/cve/CVE-2022-49724.html * https://www.suse.com/security/cve/CVE-2022-49725.html * https://www.suse.com/security/cve/CVE-2022-49726.html * https://www.suse.com/security/cve/CVE-2022-49729.html * https://www.suse.com/security/cve/CVE-2022-49730.html * https://www.suse.com/security/cve/CVE-2022-49731.html * https://www.suse.com/security/cve/CVE-2022-49732.html * https://www.suse.com/security/cve/CVE-2022-49733.html * https://www.suse.com/security/cve/CVE-2022-49739.html * https://www.suse.com/security/cve/CVE-2022-49746.html * https://www.suse.com/security/cve/CVE-2022-49748.html * https://www.suse.com/security/cve/CVE-2022-49751.html * https://www.suse.com/security/cve/CVE-2022-49753.html * https://www.suse.com/security/cve/CVE-2022-49755.html * https://www.suse.com/security/cve/CVE-2022-49759.html * https://www.suse.com/security/cve/CVE-2023-0179.html * https://www.suse.com/security/cve/CVE-2023-1652.html * https://www.suse.com/security/cve/CVE-2023-2162.html * https://www.suse.com/security/cve/CVE-2023-28410.html * https://www.suse.com/security/cve/CVE-2023-3567.html * https://www.suse.com/security/cve/CVE-2023-52930.html * https://www.suse.com/security/cve/CVE-2023-52933.html * https://www.suse.com/security/cve/CVE-2023-52935.html * https://www.suse.com/security/cve/CVE-2023-52939.html * https://www.suse.com/security/cve/CVE-2023-52941.html * https://www.suse.com/security/cve/CVE-2023-52973.html * https://www.suse.com/security/cve/CVE-2023-52974.html * https://www.suse.com/security/cve/CVE-2023-52975.html * https://www.suse.com/security/cve/CVE-2023-52976.html * https://www.suse.com/security/cve/CVE-2023-52979.html * https://www.suse.com/security/cve/CVE-2023-52983.html * https://www.suse.com/security/cve/CVE-2023-52984.html * https://www.suse.com/security/cve/CVE-2023-52988.html * https://www.suse.com/security/cve/CVE-2023-52989.html * https://www.suse.com/security/cve/CVE-2023-52992.html * https://www.suse.com/security/cve/CVE-2023-52993.html * https://www.suse.com/security/cve/CVE-2023-53000.html * https://www.suse.com/security/cve/CVE-2023-53005.html * https://www.suse.com/security/cve/CVE-2023-53006.html * https://www.suse.com/security/cve/CVE-2023-53007.html * https://www.suse.com/security/cve/CVE-2023-53008.html * https://www.suse.com/security/cve/CVE-2023-53010.html * https://www.suse.com/security/cve/CVE-2023-53015.html * https://www.suse.com/security/cve/CVE-2023-53016.html * https://www.suse.com/security/cve/CVE-2023-53019.html * https://www.suse.com/security/cve/CVE-2023-53023.html * https://www.suse.com/security/cve/CVE-2023-53024.html * https://www.suse.com/security/cve/CVE-2023-53025.html * https://www.suse.com/security/cve/CVE-2023-53026.html * https://www.suse.com/security/cve/CVE-2023-53028.html * https://www.suse.com/security/cve/CVE-2023-53029.html * https://www.suse.com/security/cve/CVE-2023-53030.html * https://www.suse.com/security/cve/CVE-2023-53033.html * https://www.suse.com/security/cve/CVE-2024-26634.html * https://www.suse.com/security/cve/CVE-2024-47678.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53124.html * https://www.suse.com/security/cve/CVE-2024-53176.html * https://www.suse.com/security/cve/CVE-2024-53178.html * https://www.suse.com/security/cve/CVE-2024-56651.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2024-58014.html * https://www.suse.com/security/cve/CVE-2025-21693.html * https://www.suse.com/security/cve/CVE-2025-21718.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21780.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1180814 * https://bugzilla.suse.com/show_bug.cgi?id=1183682 * https://bugzilla.suse.com/show_bug.cgi?id=1190336 * https://bugzilla.suse.com/show_bug.cgi?id=1190768 * https://bugzilla.suse.com/show_bug.cgi?id=1190786 * https://bugzilla.suse.com/show_bug.cgi?id=1193629 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1194904 * https://bugzilla.suse.com/show_bug.cgi?id=1195823 * https://bugzilla.suse.com/show_bug.cgi?id=1196444 * https://bugzilla.suse.com/show_bug.cgi?id=1197158 * https://bugzilla.suse.com/show_bug.cgi?id=1197174 * https://bugzilla.suse.com/show_bug.cgi?id=1197227 * https://bugzilla.suse.com/show_bug.cgi?id=1197246 * https://bugzilla.suse.com/show_bug.cgi?id=1197302 * https://bugzilla.suse.com/show_bug.cgi?id=1197331 * https://bugzilla.suse.com/show_bug.cgi?id=1197472 * https://bugzilla.suse.com/show_bug.cgi?id=1197661 * https://bugzilla.suse.com/show_bug.cgi?id=1197926 * https://bugzilla.suse.com/show_bug.cgi?id=1198019 * https://bugzilla.suse.com/show_bug.cgi?id=1198021 * https://bugzilla.suse.com/show_bug.cgi?id=1198240 * https://bugzilla.suse.com/show_bug.cgi?id=1198577 * https://bugzilla.suse.com/show_bug.cgi?id=1198660 * https://bugzilla.suse.com/show_bug.cgi?id=1199657 * https://bugzilla.suse.com/show_bug.cgi?id=1200045 * https://bugzilla.suse.com/show_bug.cgi?id=1200571 * https://bugzilla.suse.com/show_bug.cgi?id=1200807 * https://bugzilla.suse.com/show_bug.cgi?id=1200809 * https://bugzilla.suse.com/show_bug.cgi?id=1200810 * https://bugzilla.suse.com/show_bug.cgi?id=1200824 * https://bugzilla.suse.com/show_bug.cgi?id=1200825 * https://bugzilla.suse.com/show_bug.cgi?id=1200871 * https://bugzilla.suse.com/show_bug.cgi?id=1200872 * https://bugzilla.suse.com/show_bug.cgi?id=1201193 * https://bugzilla.suse.com/show_bug.cgi?id=1201218 * https://bugzilla.suse.com/show_bug.cgi?id=1201323 * https://bugzilla.suse.com/show_bug.cgi?id=1201381 * https://bugzilla.suse.com/show_bug.cgi?id=1201610 * https://bugzilla.suse.com/show_bug.cgi?id=1202672 * https://bugzilla.suse.com/show_bug.cgi?id=1202711 * https://bugzilla.suse.com/show_bug.cgi?id=1202712 * https://bugzilla.suse.com/show_bug.cgi?id=1202771 * https://bugzilla.suse.com/show_bug.cgi?id=1202774 * https://bugzilla.suse.com/show_bug.cgi?id=1202778 * https://bugzilla.suse.com/show_bug.cgi?id=1202781 * https://bugzilla.suse.com/show_bug.cgi?id=1203699 * https://bugzilla.suse.com/show_bug.cgi?id=1203769 * https://bugzilla.suse.com/show_bug.cgi?id=1204171 * https://bugzilla.suse.com/show_bug.cgi?id=1205205 * https://bugzilla.suse.com/show_bug.cgi?id=1205701 * https://bugzilla.suse.com/show_bug.cgi?id=1206048 * https://bugzilla.suse.com/show_bug.cgi?id=1206049 * https://bugzilla.suse.com/show_bug.cgi?id=1206451 * https://bugzilla.suse.com/show_bug.cgi?id=1207034 * https://bugzilla.suse.com/show_bug.cgi?id=1207186 * https://bugzilla.suse.com/show_bug.cgi?id=1207361 * https://bugzilla.suse.com/show_bug.cgi?id=1207593 * https://bugzilla.suse.com/show_bug.cgi?id=1207640 * https://bugzilla.suse.com/show_bug.cgi?id=1207878 * https://bugzilla.suse.com/show_bug.cgi?id=1209262 * https://bugzilla.suse.com/show_bug.cgi?id=1209547 * https://bugzilla.suse.com/show_bug.cgi?id=1209788 * https://bugzilla.suse.com/show_bug.cgi?id=1209980 * https://bugzilla.suse.com/show_bug.cgi?id=1210050 * https://bugzilla.suse.com/show_bug.cgi?id=1210647 * https://bugzilla.suse.com/show_bug.cgi?id=1211263 * https://bugzilla.suse.com/show_bug.cgi?id=1213167 * https://bugzilla.suse.com/show_bug.cgi?id=1218450 * https://bugzilla.suse.com/show_bug.cgi?id=1221651 * https://bugzilla.suse.com/show_bug.cgi?id=1225428 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1229312 * https://bugzilla.suse.com/show_bug.cgi?id=1231375 * https://bugzilla.suse.com/show_bug.cgi?id=1231432 * https://bugzilla.suse.com/show_bug.cgi?id=1231854 * https://bugzilla.suse.com/show_bug.cgi?id=1232299 * https://bugzilla.suse.com/show_bug.cgi?id=1232743 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233749 * https://bugzilla.suse.com/show_bug.cgi?id=1234074 * https://bugzilla.suse.com/show_bug.cgi?id=1234894 * https://bugzilla.suse.com/show_bug.cgi?id=1234895 * https://bugzilla.suse.com/show_bug.cgi?id=1234896 * https://bugzilla.suse.com/show_bug.cgi?id=1235528 * https://bugzilla.suse.com/show_bug.cgi?id=1235599 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1237029 * https://bugzilla.suse.com/show_bug.cgi?id=1237521 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237718 * https://bugzilla.suse.com/show_bug.cgi?id=1237721 * https://bugzilla.suse.com/show_bug.cgi?id=1237722 * https://bugzilla.suse.com/show_bug.cgi?id=1237723 * https://bugzilla.suse.com/show_bug.cgi?id=1237724 * https://bugzilla.suse.com/show_bug.cgi?id=1237725 * https://bugzilla.suse.com/show_bug.cgi?id=1237726 * https://bugzilla.suse.com/show_bug.cgi?id=1237727 * https://bugzilla.suse.com/show_bug.cgi?id=1237728 * https://bugzilla.suse.com/show_bug.cgi?id=1237729 * https://bugzilla.suse.com/show_bug.cgi?id=1237730 * https://bugzilla.suse.com/show_bug.cgi?id=1237733 * https://bugzilla.suse.com/show_bug.cgi?id=1237734 * https://bugzilla.suse.com/show_bug.cgi?id=1237735 * https://bugzilla.suse.com/show_bug.cgi?id=1237736 * https://bugzilla.suse.com/show_bug.cgi?id=1237737 * https://bugzilla.suse.com/show_bug.cgi?id=1237738 * https://bugzilla.suse.com/show_bug.cgi?id=1237739 * https://bugzilla.suse.com/show_bug.cgi?id=1237740 * https://bugzilla.suse.com/show_bug.cgi?id=1237742 * https://bugzilla.suse.com/show_bug.cgi?id=1237743 * https://bugzilla.suse.com/show_bug.cgi?id=1237744 * https://bugzilla.suse.com/show_bug.cgi?id=1237745 * https://bugzilla.suse.com/show_bug.cgi?id=1237746 * https://bugzilla.suse.com/show_bug.cgi?id=1237748 * https://bugzilla.suse.com/show_bug.cgi?id=1237749 * https://bugzilla.suse.com/show_bug.cgi?id=1237751 * https://bugzilla.suse.com/show_bug.cgi?id=1237752 * https://bugzilla.suse.com/show_bug.cgi?id=1237753 * https://bugzilla.suse.com/show_bug.cgi?id=1237755 * https://bugzilla.suse.com/show_bug.cgi?id=1237759 * https://bugzilla.suse.com/show_bug.cgi?id=1237761 * https://bugzilla.suse.com/show_bug.cgi?id=1237763 * https://bugzilla.suse.com/show_bug.cgi?id=1237766 * https://bugzilla.suse.com/show_bug.cgi?id=1237767 * https://bugzilla.suse.com/show_bug.cgi?id=1237768 * https://bugzilla.suse.com/show_bug.cgi?id=1237774 * https://bugzilla.suse.com/show_bug.cgi?id=1237775 * https://bugzilla.suse.com/show_bug.cgi?id=1237778 * https://bugzilla.suse.com/show_bug.cgi?id=1237779 * https://bugzilla.suse.com/show_bug.cgi?id=1237780 * https://bugzilla.suse.com/show_bug.cgi?id=1237782 * https://bugzilla.suse.com/show_bug.cgi?id=1237783 * https://bugzilla.suse.com/show_bug.cgi?id=1237784 * https://bugzilla.suse.com/show_bug.cgi?id=1237785 * https://bugzilla.suse.com/show_bug.cgi?id=1237786 * https://bugzilla.suse.com/show_bug.cgi?id=1237787 * https://bugzilla.suse.com/show_bug.cgi?id=1237788 * https://bugzilla.suse.com/show_bug.cgi?id=1237789 * https://bugzilla.suse.com/show_bug.cgi?id=1237790 * https://bugzilla.suse.com/show_bug.cgi?id=1237792 * https://bugzilla.suse.com/show_bug.cgi?id=1237794 * https://bugzilla.suse.com/show_bug.cgi?id=1237795 * https://bugzilla.suse.com/show_bug.cgi?id=1237797 * https://bugzilla.suse.com/show_bug.cgi?id=1237798 * https://bugzilla.suse.com/show_bug.cgi?id=1237799 * https://bugzilla.suse.com/show_bug.cgi?id=1237807 * https://bugzilla.suse.com/show_bug.cgi?id=1237808 * https://bugzilla.suse.com/show_bug.cgi?id=1237809 * https://bugzilla.suse.com/show_bug.cgi?id=1237810 * https://bugzilla.suse.com/show_bug.cgi?id=1237812 * https://bugzilla.suse.com/show_bug.cgi?id=1237813 * https://bugzilla.suse.com/show_bug.cgi?id=1237814 * https://bugzilla.suse.com/show_bug.cgi?id=1237815 * https://bugzilla.suse.com/show_bug.cgi?id=1237816 * https://bugzilla.suse.com/show_bug.cgi?id=1237817 * https://bugzilla.suse.com/show_bug.cgi?id=1237818 * https://bugzilla.suse.com/show_bug.cgi?id=1237820 * https://bugzilla.suse.com/show_bug.cgi?id=1237821 * https://bugzilla.suse.com/show_bug.cgi?id=1237823 * https://bugzilla.suse.com/show_bug.cgi?id=1237824 * https://bugzilla.suse.com/show_bug.cgi?id=1237826 * https://bugzilla.suse.com/show_bug.cgi?id=1237827 * https://bugzilla.suse.com/show_bug.cgi?id=1237829 * https://bugzilla.suse.com/show_bug.cgi?id=1237831 * https://bugzilla.suse.com/show_bug.cgi?id=1237835 * https://bugzilla.suse.com/show_bug.cgi?id=1237836 * https://bugzilla.suse.com/show_bug.cgi?id=1237837 * https://bugzilla.suse.com/show_bug.cgi?id=1237839 * https://bugzilla.suse.com/show_bug.cgi?id=1237840 * https://bugzilla.suse.com/show_bug.cgi?id=1237845 * https://bugzilla.suse.com/show_bug.cgi?id=1237846 * https://bugzilla.suse.com/show_bug.cgi?id=1237868 * https://bugzilla.suse.com/show_bug.cgi?id=1237872 * https://bugzilla.suse.com/show_bug.cgi?id=1237892 * https://bugzilla.suse.com/show_bug.cgi?id=1237903 * https://bugzilla.suse.com/show_bug.cgi?id=1237904 * https://bugzilla.suse.com/show_bug.cgi?id=1237916 * https://bugzilla.suse.com/show_bug.cgi?id=1237918 * https://bugzilla.suse.com/show_bug.cgi?id=1237922 * https://bugzilla.suse.com/show_bug.cgi?id=1237925 * https://bugzilla.suse.com/show_bug.cgi?id=1237926 * https://bugzilla.suse.com/show_bug.cgi?id=1237927 * https://bugzilla.suse.com/show_bug.cgi?id=1237928 * https://bugzilla.suse.com/show_bug.cgi?id=1237929 * https://bugzilla.suse.com/show_bug.cgi?id=1237931 * https://bugzilla.suse.com/show_bug.cgi?id=1237932 * https://bugzilla.suse.com/show_bug.cgi?id=1237933 * https://bugzilla.suse.com/show_bug.cgi?id=1237937 * https://bugzilla.suse.com/show_bug.cgi?id=1237939 * https://bugzilla.suse.com/show_bug.cgi?id=1237940 * https://bugzilla.suse.com/show_bug.cgi?id=1237941 * https://bugzilla.suse.com/show_bug.cgi?id=1237942 * https://bugzilla.suse.com/show_bug.cgi?id=1237946 * https://bugzilla.suse.com/show_bug.cgi?id=1237951 * https://bugzilla.suse.com/show_bug.cgi?id=1237952 * https://bugzilla.suse.com/show_bug.cgi?id=1237954 * https://bugzilla.suse.com/show_bug.cgi?id=1237955 * https://bugzilla.suse.com/show_bug.cgi?id=1237957 * https://bugzilla.suse.com/show_bug.cgi?id=1237958 * https://bugzilla.suse.com/show_bug.cgi?id=1237959 * https://bugzilla.suse.com/show_bug.cgi?id=1237960 * https://bugzilla.suse.com/show_bug.cgi?id=1237961 * https://bugzilla.suse.com/show_bug.cgi?id=1237962 * https://bugzilla.suse.com/show_bug.cgi?id=1237963 * https://bugzilla.suse.com/show_bug.cgi?id=1237965 * https://bugzilla.suse.com/show_bug.cgi?id=1237966 * https://bugzilla.suse.com/show_bug.cgi?id=1237967 * https://bugzilla.suse.com/show_bug.cgi?id=1237968 * https://bugzilla.suse.com/show_bug.cgi?id=1237969 * https://bugzilla.suse.com/show_bug.cgi?id=1237970 * https://bugzilla.suse.com/show_bug.cgi?id=1237971 * https://bugzilla.suse.com/show_bug.cgi?id=1237972 * https://bugzilla.suse.com/show_bug.cgi?id=1237973 * https://bugzilla.suse.com/show_bug.cgi?id=1237975 * https://bugzilla.suse.com/show_bug.cgi?id=1237976 * https://bugzilla.suse.com/show_bug.cgi?id=1237978 * https://bugzilla.suse.com/show_bug.cgi?id=1237979 * https://bugzilla.suse.com/show_bug.cgi?id=1237980 * https://bugzilla.suse.com/show_bug.cgi?id=1237982 * https://bugzilla.suse.com/show_bug.cgi?id=1237983 * https://bugzilla.suse.com/show_bug.cgi?id=1237984 * https://bugzilla.suse.com/show_bug.cgi?id=1237986 * https://bugzilla.suse.com/show_bug.cgi?id=1237987 * https://bugzilla.suse.com/show_bug.cgi?id=1237990 * https://bugzilla.suse.com/show_bug.cgi?id=1237992 * https://bugzilla.suse.com/show_bug.cgi?id=1237996 * https://bugzilla.suse.com/show_bug.cgi?id=1237997 * https://bugzilla.suse.com/show_bug.cgi?id=1237998 * https://bugzilla.suse.com/show_bug.cgi?id=1237999 * https://bugzilla.suse.com/show_bug.cgi?id=1238000 * https://bugzilla.suse.com/show_bug.cgi?id=1238003 * https://bugzilla.suse.com/show_bug.cgi?id=1238004 * https://bugzilla.suse.com/show_bug.cgi?id=1238005 * https://bugzilla.suse.com/show_bug.cgi?id=1238006 * https://bugzilla.suse.com/show_bug.cgi?id=1238007 * https://bugzilla.suse.com/show_bug.cgi?id=1238009 * https://bugzilla.suse.com/show_bug.cgi?id=1238010 * https://bugzilla.suse.com/show_bug.cgi?id=1238011 * https://bugzilla.suse.com/show_bug.cgi?id=1238012 * https://bugzilla.suse.com/show_bug.cgi?id=1238013 * https://bugzilla.suse.com/show_bug.cgi?id=1238014 * https://bugzilla.suse.com/show_bug.cgi?id=1238016 * https://bugzilla.suse.com/show_bug.cgi?id=1238017 * https://bugzilla.suse.com/show_bug.cgi?id=1238018 * https://bugzilla.suse.com/show_bug.cgi?id=1238019 * https://bugzilla.suse.com/show_bug.cgi?id=1238021 * https://bugzilla.suse.com/show_bug.cgi?id=1238022 * https://bugzilla.suse.com/show_bug.cgi?id=1238024 * https://bugzilla.suse.com/show_bug.cgi?id=1238025 * https://bugzilla.suse.com/show_bug.cgi?id=1238030 * https://bugzilla.suse.com/show_bug.cgi?id=1238032 * https://bugzilla.suse.com/show_bug.cgi?id=1238036 * https://bugzilla.suse.com/show_bug.cgi?id=1238037 * https://bugzilla.suse.com/show_bug.cgi?id=1238041 * https://bugzilla.suse.com/show_bug.cgi?id=1238046 * https://bugzilla.suse.com/show_bug.cgi?id=1238047 * https://bugzilla.suse.com/show_bug.cgi?id=1238048 * https://bugzilla.suse.com/show_bug.cgi?id=1238069 * https://bugzilla.suse.com/show_bug.cgi?id=1238071 * https://bugzilla.suse.com/show_bug.cgi?id=1238077 * https://bugzilla.suse.com/show_bug.cgi?id=1238079 * https://bugzilla.suse.com/show_bug.cgi?id=1238080 * https://bugzilla.suse.com/show_bug.cgi?id=1238083 * https://bugzilla.suse.com/show_bug.cgi?id=1238084 * https://bugzilla.suse.com/show_bug.cgi?id=1238085 * https://bugzilla.suse.com/show_bug.cgi?id=1238086 * https://bugzilla.suse.com/show_bug.cgi?id=1238089 * https://bugzilla.suse.com/show_bug.cgi?id=1238090 * https://bugzilla.suse.com/show_bug.cgi?id=1238091 * https://bugzilla.suse.com/show_bug.cgi?id=1238092 * https://bugzilla.suse.com/show_bug.cgi?id=1238096 * https://bugzilla.suse.com/show_bug.cgi?id=1238097 * https://bugzilla.suse.com/show_bug.cgi?id=1238099 * https://bugzilla.suse.com/show_bug.cgi?id=1238103 * https://bugzilla.suse.com/show_bug.cgi?id=1238105 * https://bugzilla.suse.com/show_bug.cgi?id=1238106 * https://bugzilla.suse.com/show_bug.cgi?id=1238107 * https://bugzilla.suse.com/show_bug.cgi?id=1238108 * https://bugzilla.suse.com/show_bug.cgi?id=1238110 * https://bugzilla.suse.com/show_bug.cgi?id=1238111 * https://bugzilla.suse.com/show_bug.cgi?id=1238112 * https://bugzilla.suse.com/show_bug.cgi?id=1238113 * https://bugzilla.suse.com/show_bug.cgi?id=1238114 * https://bugzilla.suse.com/show_bug.cgi?id=1238115 * https://bugzilla.suse.com/show_bug.cgi?id=1238116 * https://bugzilla.suse.com/show_bug.cgi?id=1238118 * https://bugzilla.suse.com/show_bug.cgi?id=1238120 * https://bugzilla.suse.com/show_bug.cgi?id=1238122 * https://bugzilla.suse.com/show_bug.cgi?id=1238123 * https://bugzilla.suse.com/show_bug.cgi?id=1238125 * https://bugzilla.suse.com/show_bug.cgi?id=1238126 * https://bugzilla.suse.com/show_bug.cgi?id=1238127 * https://bugzilla.suse.com/show_bug.cgi?id=1238128 * https://bugzilla.suse.com/show_bug.cgi?id=1238131 * https://bugzilla.suse.com/show_bug.cgi?id=1238134 * https://bugzilla.suse.com/show_bug.cgi?id=1238135 * https://bugzilla.suse.com/show_bug.cgi?id=1238138 * https://bugzilla.suse.com/show_bug.cgi?id=1238139 * https://bugzilla.suse.com/show_bug.cgi?id=1238140 * https://bugzilla.suse.com/show_bug.cgi?id=1238142 * https://bugzilla.suse.com/show_bug.cgi?id=1238144 * https://bugzilla.suse.com/show_bug.cgi?id=1238146 * https://bugzilla.suse.com/show_bug.cgi?id=1238147 * https://bugzilla.suse.com/show_bug.cgi?id=1238149 * https://bugzilla.suse.com/show_bug.cgi?id=1238150 * https://bugzilla.suse.com/show_bug.cgi?id=1238153 * https://bugzilla.suse.com/show_bug.cgi?id=1238155 * https://bugzilla.suse.com/show_bug.cgi?id=1238156 * https://bugzilla.suse.com/show_bug.cgi?id=1238157 * https://bugzilla.suse.com/show_bug.cgi?id=1238158 * https://bugzilla.suse.com/show_bug.cgi?id=1238160 * https://bugzilla.suse.com/show_bug.cgi?id=1238162 * https://bugzilla.suse.com/show_bug.cgi?id=1238166 * https://bugzilla.suse.com/show_bug.cgi?id=1238167 * https://bugzilla.suse.com/show_bug.cgi?id=1238168 * https://bugzilla.suse.com/show_bug.cgi?id=1238169 * https://bugzilla.suse.com/show_bug.cgi?id=1238170 * https://bugzilla.suse.com/show_bug.cgi?id=1238171 * https://bugzilla.suse.com/show_bug.cgi?id=1238172 * https://bugzilla.suse.com/show_bug.cgi?id=1238175 * https://bugzilla.suse.com/show_bug.cgi?id=1238176 * https://bugzilla.suse.com/show_bug.cgi?id=1238177 * https://bugzilla.suse.com/show_bug.cgi?id=1238178 * https://bugzilla.suse.com/show_bug.cgi?id=1238179 * https://bugzilla.suse.com/show_bug.cgi?id=1238180 * https://bugzilla.suse.com/show_bug.cgi?id=1238181 * https://bugzilla.suse.com/show_bug.cgi?id=1238183 * https://bugzilla.suse.com/show_bug.cgi?id=1238184 * https://bugzilla.suse.com/show_bug.cgi?id=1238187 * https://bugzilla.suse.com/show_bug.cgi?id=1238221 * https://bugzilla.suse.com/show_bug.cgi?id=1238222 * https://bugzilla.suse.com/show_bug.cgi?id=1238226 * https://bugzilla.suse.com/show_bug.cgi?id=1238228 * https://bugzilla.suse.com/show_bug.cgi?id=1238229 * https://bugzilla.suse.com/show_bug.cgi?id=1238231 * https://bugzilla.suse.com/show_bug.cgi?id=1238233 * https://bugzilla.suse.com/show_bug.cgi?id=1238234 * https://bugzilla.suse.com/show_bug.cgi?id=1238235 * https://bugzilla.suse.com/show_bug.cgi?id=1238236 * https://bugzilla.suse.com/show_bug.cgi?id=1238238 * https://bugzilla.suse.com/show_bug.cgi?id=1238239 * https://bugzilla.suse.com/show_bug.cgi?id=1238240 * https://bugzilla.suse.com/show_bug.cgi?id=1238241 * https://bugzilla.suse.com/show_bug.cgi?id=1238242 * https://bugzilla.suse.com/show_bug.cgi?id=1238243 * https://bugzilla.suse.com/show_bug.cgi?id=1238244 * https://bugzilla.suse.com/show_bug.cgi?id=1238246 * https://bugzilla.suse.com/show_bug.cgi?id=1238247 * https://bugzilla.suse.com/show_bug.cgi?id=1238248 * https://bugzilla.suse.com/show_bug.cgi?id=1238249 * https://bugzilla.suse.com/show_bug.cgi?id=1238252 * https://bugzilla.suse.com/show_bug.cgi?id=1238253 * https://bugzilla.suse.com/show_bug.cgi?id=1238255 * https://bugzilla.suse.com/show_bug.cgi?id=1238256 * https://bugzilla.suse.com/show_bug.cgi?id=1238257 * https://bugzilla.suse.com/show_bug.cgi?id=1238260 * https://bugzilla.suse.com/show_bug.cgi?id=1238261 * https://bugzilla.suse.com/show_bug.cgi?id=1238262 * https://bugzilla.suse.com/show_bug.cgi?id=1238263 * https://bugzilla.suse.com/show_bug.cgi?id=1238264 * https://bugzilla.suse.com/show_bug.cgi?id=1238266 * https://bugzilla.suse.com/show_bug.cgi?id=1238267 * https://bugzilla.suse.com/show_bug.cgi?id=1238268 * https://bugzilla.suse.com/show_bug.cgi?id=1238269 * https://bugzilla.suse.com/show_bug.cgi?id=1238270 * https://bugzilla.suse.com/show_bug.cgi?id=1238271 * https://bugzilla.suse.com/show_bug.cgi?id=1238272 * https://bugzilla.suse.com/show_bug.cgi?id=1238274 * https://bugzilla.suse.com/show_bug.cgi?id=1238275 * https://bugzilla.suse.com/show_bug.cgi?id=1238276 * https://bugzilla.suse.com/show_bug.cgi?id=1238277 * https://bugzilla.suse.com/show_bug.cgi?id=1238278 * https://bugzilla.suse.com/show_bug.cgi?id=1238279 * https://bugzilla.suse.com/show_bug.cgi?id=1238281 * https://bugzilla.suse.com/show_bug.cgi?id=1238282 * https://bugzilla.suse.com/show_bug.cgi?id=1238283 * https://bugzilla.suse.com/show_bug.cgi?id=1238284 * https://bugzilla.suse.com/show_bug.cgi?id=1238285 * https://bugzilla.suse.com/show_bug.cgi?id=1238286 * https://bugzilla.suse.com/show_bug.cgi?id=1238287 * https://bugzilla.suse.com/show_bug.cgi?id=1238288 * https://bugzilla.suse.com/show_bug.cgi?id=1238289 * https://bugzilla.suse.com/show_bug.cgi?id=1238291 * https://bugzilla.suse.com/show_bug.cgi?id=1238292 * https://bugzilla.suse.com/show_bug.cgi?id=1238293 * https://bugzilla.suse.com/show_bug.cgi?id=1238295 * https://bugzilla.suse.com/show_bug.cgi?id=1238298 * https://bugzilla.suse.com/show_bug.cgi?id=1238300 * https://bugzilla.suse.com/show_bug.cgi?id=1238301 * https://bugzilla.suse.com/show_bug.cgi?id=1238302 * https://bugzilla.suse.com/show_bug.cgi?id=1238306 * https://bugzilla.suse.com/show_bug.cgi?id=1238307 * https://bugzilla.suse.com/show_bug.cgi?id=1238308 * https://bugzilla.suse.com/show_bug.cgi?id=1238309 * https://bugzilla.suse.com/show_bug.cgi?id=1238311 * https://bugzilla.suse.com/show_bug.cgi?id=1238313 * https://bugzilla.suse.com/show_bug.cgi?id=1238326 * https://bugzilla.suse.com/show_bug.cgi?id=1238327 * https://bugzilla.suse.com/show_bug.cgi?id=1238328 * https://bugzilla.suse.com/show_bug.cgi?id=1238329 * https://bugzilla.suse.com/show_bug.cgi?id=1238331 * https://bugzilla.suse.com/show_bug.cgi?id=1238333 * https://bugzilla.suse.com/show_bug.cgi?id=1238334 * https://bugzilla.suse.com/show_bug.cgi?id=1238335 * https://bugzilla.suse.com/show_bug.cgi?id=1238336 * https://bugzilla.suse.com/show_bug.cgi?id=1238337 * https://bugzilla.suse.com/show_bug.cgi?id=1238338 * https://bugzilla.suse.com/show_bug.cgi?id=1238339 * https://bugzilla.suse.com/show_bug.cgi?id=1238341 * https://bugzilla.suse.com/show_bug.cgi?id=1238343 * https://bugzilla.suse.com/show_bug.cgi?id=1238344 * https://bugzilla.suse.com/show_bug.cgi?id=1238345 * https://bugzilla.suse.com/show_bug.cgi?id=1238372 * https://bugzilla.suse.com/show_bug.cgi?id=1238373 * https://bugzilla.suse.com/show_bug.cgi?id=1238374 * https://bugzilla.suse.com/show_bug.cgi?id=1238376 * https://bugzilla.suse.com/show_bug.cgi?id=1238377 * https://bugzilla.suse.com/show_bug.cgi?id=1238378 * https://bugzilla.suse.com/show_bug.cgi?id=1238381 * https://bugzilla.suse.com/show_bug.cgi?id=1238382 * https://bugzilla.suse.com/show_bug.cgi?id=1238383 * https://bugzilla.suse.com/show_bug.cgi?id=1238385 * https://bugzilla.suse.com/show_bug.cgi?id=1238386 * https://bugzilla.suse.com/show_bug.cgi?id=1238387 * https://bugzilla.suse.com/show_bug.cgi?id=1238388 * https://bugzilla.suse.com/show_bug.cgi?id=1238389 * https://bugzilla.suse.com/show_bug.cgi?id=1238390 * https://bugzilla.suse.com/show_bug.cgi?id=1238391 * https://bugzilla.suse.com/show_bug.cgi?id=1238392 * https://bugzilla.suse.com/show_bug.cgi?id=1238393 * https://bugzilla.suse.com/show_bug.cgi?id=1238394 * https://bugzilla.suse.com/show_bug.cgi?id=1238395 * https://bugzilla.suse.com/show_bug.cgi?id=1238396 * https://bugzilla.suse.com/show_bug.cgi?id=1238397 * https://bugzilla.suse.com/show_bug.cgi?id=1238398 * https://bugzilla.suse.com/show_bug.cgi?id=1238400 * https://bugzilla.suse.com/show_bug.cgi?id=1238401 * https://bugzilla.suse.com/show_bug.cgi?id=1238410 * https://bugzilla.suse.com/show_bug.cgi?id=1238411 * https://bugzilla.suse.com/show_bug.cgi?id=1238413 * https://bugzilla.suse.com/show_bug.cgi?id=1238415 * https://bugzilla.suse.com/show_bug.cgi?id=1238416 * https://bugzilla.suse.com/show_bug.cgi?id=1238417 * https://bugzilla.suse.com/show_bug.cgi?id=1238418 * https://bugzilla.suse.com/show_bug.cgi?id=1238419 * https://bugzilla.suse.com/show_bug.cgi?id=1238420 * https://bugzilla.suse.com/show_bug.cgi?id=1238422 * https://bugzilla.suse.com/show_bug.cgi?id=1238423 * https://bugzilla.suse.com/show_bug.cgi?id=1238424 * https://bugzilla.suse.com/show_bug.cgi?id=1238428 * https://bugzilla.suse.com/show_bug.cgi?id=1238429 * https://bugzilla.suse.com/show_bug.cgi?id=1238430 * https://bugzilla.suse.com/show_bug.cgi?id=1238431 * https://bugzilla.suse.com/show_bug.cgi?id=1238432 * https://bugzilla.suse.com/show_bug.cgi?id=1238433 * https://bugzilla.suse.com/show_bug.cgi?id=1238434 * https://bugzilla.suse.com/show_bug.cgi?id=1238435 * https://bugzilla.suse.com/show_bug.cgi?id=1238436 * https://bugzilla.suse.com/show_bug.cgi?id=1238437 * https://bugzilla.suse.com/show_bug.cgi?id=1238440 * https://bugzilla.suse.com/show_bug.cgi?id=1238441 * https://bugzilla.suse.com/show_bug.cgi?id=1238442 * https://bugzilla.suse.com/show_bug.cgi?id=1238443 * https://bugzilla.suse.com/show_bug.cgi?id=1238444 * https://bugzilla.suse.com/show_bug.cgi?id=1238445 * https://bugzilla.suse.com/show_bug.cgi?id=1238446 * https://bugzilla.suse.com/show_bug.cgi?id=1238447 * https://bugzilla.suse.com/show_bug.cgi?id=1238453 * https://bugzilla.suse.com/show_bug.cgi?id=1238454 * https://bugzilla.suse.com/show_bug.cgi?id=1238458 * https://bugzilla.suse.com/show_bug.cgi?id=1238459 * https://bugzilla.suse.com/show_bug.cgi?id=1238462 * https://bugzilla.suse.com/show_bug.cgi?id=1238463 * https://bugzilla.suse.com/show_bug.cgi?id=1238465 * https://bugzilla.suse.com/show_bug.cgi?id=1238467 * https://bugzilla.suse.com/show_bug.cgi?id=1238469 * https://bugzilla.suse.com/show_bug.cgi?id=1238533 * https://bugzilla.suse.com/show_bug.cgi?id=1238536 * https://bugzilla.suse.com/show_bug.cgi?id=1238538 * https://bugzilla.suse.com/show_bug.cgi?id=1238539 * https://bugzilla.suse.com/show_bug.cgi?id=1238540 * https://bugzilla.suse.com/show_bug.cgi?id=1238542 * https://bugzilla.suse.com/show_bug.cgi?id=1238543 * https://bugzilla.suse.com/show_bug.cgi?id=1238545 * https://bugzilla.suse.com/show_bug.cgi?id=1238546 * https://bugzilla.suse.com/show_bug.cgi?id=1238551 * https://bugzilla.suse.com/show_bug.cgi?id=1238552 * https://bugzilla.suse.com/show_bug.cgi?id=1238556 * https://bugzilla.suse.com/show_bug.cgi?id=1238557 * https://bugzilla.suse.com/show_bug.cgi?id=1238599 * https://bugzilla.suse.com/show_bug.cgi?id=1238600 * https://bugzilla.suse.com/show_bug.cgi?id=1238601 * https://bugzilla.suse.com/show_bug.cgi?id=1238602 * https://bugzilla.suse.com/show_bug.cgi?id=1238605 * https://bugzilla.suse.com/show_bug.cgi?id=1238612 * https://bugzilla.suse.com/show_bug.cgi?id=1238613 * https://bugzilla.suse.com/show_bug.cgi?id=1238615 * https://bugzilla.suse.com/show_bug.cgi?id=1238616 * https://bugzilla.suse.com/show_bug.cgi?id=1238617 * https://bugzilla.suse.com/show_bug.cgi?id=1238618 * https://bugzilla.suse.com/show_bug.cgi?id=1238619 * https://bugzilla.suse.com/show_bug.cgi?id=1238621 * https://bugzilla.suse.com/show_bug.cgi?id=1238623 * https://bugzilla.suse.com/show_bug.cgi?id=1238625 * https://bugzilla.suse.com/show_bug.cgi?id=1238626 * https://bugzilla.suse.com/show_bug.cgi?id=1238630 * https://bugzilla.suse.com/show_bug.cgi?id=1238631 * https://bugzilla.suse.com/show_bug.cgi?id=1238632 * https://bugzilla.suse.com/show_bug.cgi?id=1238633 * https://bugzilla.suse.com/show_bug.cgi?id=1238635 * https://bugzilla.suse.com/show_bug.cgi?id=1238636 * https://bugzilla.suse.com/show_bug.cgi?id=1238638 * https://bugzilla.suse.com/show_bug.cgi?id=1238639 * https://bugzilla.suse.com/show_bug.cgi?id=1238640 * https://bugzilla.suse.com/show_bug.cgi?id=1238641 * https://bugzilla.suse.com/show_bug.cgi?id=1238642 * https://bugzilla.suse.com/show_bug.cgi?id=1238643 * https://bugzilla.suse.com/show_bug.cgi?id=1238645 * https://bugzilla.suse.com/show_bug.cgi?id=1238646 * https://bugzilla.suse.com/show_bug.cgi?id=1238647 * https://bugzilla.suse.com/show_bug.cgi?id=1238648 * https://bugzilla.suse.com/show_bug.cgi?id=1238649 * https://bugzilla.suse.com/show_bug.cgi?id=1238650 * https://bugzilla.suse.com/show_bug.cgi?id=1238653 * https://bugzilla.suse.com/show_bug.cgi?id=1238654 * https://bugzilla.suse.com/show_bug.cgi?id=1238655 * https://bugzilla.suse.com/show_bug.cgi?id=1238658 * https://bugzilla.suse.com/show_bug.cgi?id=1238661 * https://bugzilla.suse.com/show_bug.cgi?id=1238662 * https://bugzilla.suse.com/show_bug.cgi?id=1238663 * https://bugzilla.suse.com/show_bug.cgi?id=1238664 * https://bugzilla.suse.com/show_bug.cgi?id=1238666 * https://bugzilla.suse.com/show_bug.cgi?id=1238668 * https://bugzilla.suse.com/show_bug.cgi?id=1238705 * https://bugzilla.suse.com/show_bug.cgi?id=1238707 * https://bugzilla.suse.com/show_bug.cgi?id=1238710 * https://bugzilla.suse.com/show_bug.cgi?id=1238712 * https://bugzilla.suse.com/show_bug.cgi?id=1238718 * https://bugzilla.suse.com/show_bug.cgi?id=1238719 * https://bugzilla.suse.com/show_bug.cgi?id=1238721 * https://bugzilla.suse.com/show_bug.cgi?id=1238722 * https://bugzilla.suse.com/show_bug.cgi?id=1238727 * https://bugzilla.suse.com/show_bug.cgi?id=1238729 * https://bugzilla.suse.com/show_bug.cgi?id=1238750 * https://bugzilla.suse.com/show_bug.cgi?id=1238787 * https://bugzilla.suse.com/show_bug.cgi?id=1238789 * https://bugzilla.suse.com/show_bug.cgi?id=1238792 * https://bugzilla.suse.com/show_bug.cgi?id=1238799 * https://bugzilla.suse.com/show_bug.cgi?id=1238803 * https://bugzilla.suse.com/show_bug.cgi?id=1238804 * https://bugzilla.suse.com/show_bug.cgi?id=1238805 * https://bugzilla.suse.com/show_bug.cgi?id=1238806 * https://bugzilla.suse.com/show_bug.cgi?id=1238808 * https://bugzilla.suse.com/show_bug.cgi?id=1238809 * https://bugzilla.suse.com/show_bug.cgi?id=1238810 * https://bugzilla.suse.com/show_bug.cgi?id=1238811 * https://bugzilla.suse.com/show_bug.cgi?id=1238814 * https://bugzilla.suse.com/show_bug.cgi?id=1238815 * https://bugzilla.suse.com/show_bug.cgi?id=1238816 * https://bugzilla.suse.com/show_bug.cgi?id=1238817 * https://bugzilla.suse.com/show_bug.cgi?id=1238818 * https://bugzilla.suse.com/show_bug.cgi?id=1238819 * https://bugzilla.suse.com/show_bug.cgi?id=1238820 * https://bugzilla.suse.com/show_bug.cgi?id=1238821 * https://bugzilla.suse.com/show_bug.cgi?id=1238822 * https://bugzilla.suse.com/show_bug.cgi?id=1238823 * https://bugzilla.suse.com/show_bug.cgi?id=1238825 * https://bugzilla.suse.com/show_bug.cgi?id=1238830 * https://bugzilla.suse.com/show_bug.cgi?id=1238834 * https://bugzilla.suse.com/show_bug.cgi?id=1238835 * https://bugzilla.suse.com/show_bug.cgi?id=1238836 * https://bugzilla.suse.com/show_bug.cgi?id=1238838 * https://bugzilla.suse.com/show_bug.cgi?id=1238843 * https://bugzilla.suse.com/show_bug.cgi?id=1238867 * https://bugzilla.suse.com/show_bug.cgi?id=1238868 * https://bugzilla.suse.com/show_bug.cgi?id=1238869 * https://bugzilla.suse.com/show_bug.cgi?id=1238870 * https://bugzilla.suse.com/show_bug.cgi?id=1238871 * https://bugzilla.suse.com/show_bug.cgi?id=1238878 * https://bugzilla.suse.com/show_bug.cgi?id=1238889 * https://bugzilla.suse.com/show_bug.cgi?id=1238892 * https://bugzilla.suse.com/show_bug.cgi?id=1238893 * https://bugzilla.suse.com/show_bug.cgi?id=1238897 * https://bugzilla.suse.com/show_bug.cgi?id=1238898 * https://bugzilla.suse.com/show_bug.cgi?id=1238899 * https://bugzilla.suse.com/show_bug.cgi?id=1238902 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238916 * https://bugzilla.suse.com/show_bug.cgi?id=1238919 * https://bugzilla.suse.com/show_bug.cgi?id=1238925 * https://bugzilla.suse.com/show_bug.cgi?id=1238930 * https://bugzilla.suse.com/show_bug.cgi?id=1238933 * https://bugzilla.suse.com/show_bug.cgi?id=1238936 * https://bugzilla.suse.com/show_bug.cgi?id=1238937 * https://bugzilla.suse.com/show_bug.cgi?id=1238938 * https://bugzilla.suse.com/show_bug.cgi?id=1238939 * https://bugzilla.suse.com/show_bug.cgi?id=1238941 * https://bugzilla.suse.com/show_bug.cgi?id=1238942 * https://bugzilla.suse.com/show_bug.cgi?id=1238943 * https://bugzilla.suse.com/show_bug.cgi?id=1238944 * https://bugzilla.suse.com/show_bug.cgi?id=1238945 * https://bugzilla.suse.com/show_bug.cgi?id=1238946 * https://bugzilla.suse.com/show_bug.cgi?id=1238948 * https://bugzilla.suse.com/show_bug.cgi?id=1238949 * https://bugzilla.suse.com/show_bug.cgi?id=1238950 * https://bugzilla.suse.com/show_bug.cgi?id=1238951 * https://bugzilla.suse.com/show_bug.cgi?id=1238952 * https://bugzilla.suse.com/show_bug.cgi?id=1238953 * https://bugzilla.suse.com/show_bug.cgi?id=1238954 * https://bugzilla.suse.com/show_bug.cgi?id=1238956 * https://bugzilla.suse.com/show_bug.cgi?id=1238957 * https://bugzilla.suse.com/show_bug.cgi?id=1239001 * https://bugzilla.suse.com/show_bug.cgi?id=1239004 * https://bugzilla.suse.com/show_bug.cgi?id=1239016 * https://bugzilla.suse.com/show_bug.cgi?id=1239035 * https://bugzilla.suse.com/show_bug.cgi?id=1239040 * https://bugzilla.suse.com/show_bug.cgi?id=1239041 * https://bugzilla.suse.com/show_bug.cgi?id=1239051 * https://bugzilla.suse.com/show_bug.cgi?id=1239060 * https://bugzilla.suse.com/show_bug.cgi?id=1239070 * https://bugzilla.suse.com/show_bug.cgi?id=1239071 * https://bugzilla.suse.com/show_bug.cgi?id=1239073 * https://bugzilla.suse.com/show_bug.cgi?id=1239076 * https://bugzilla.suse.com/show_bug.cgi?id=1239095 * https://bugzilla.suse.com/show_bug.cgi?id=1239109 * https://bugzilla.suse.com/show_bug.cgi?id=1239115 * https://bugzilla.suse.com/show_bug.cgi?id=1239126 * https://bugzilla.suse.com/show_bug.cgi?id=1239452 * https://bugzilla.suse.com/show_bug.cgi?id=1239454 * https://bugzilla.suse.com/show_bug.cgi?id=1239968 * https://bugzilla.suse.com/show_bug.cgi?id=1239969 * https://bugzilla.suse.com/show_bug.cgi?id=1240133 * https://bugzilla.suse.com/show_bug.cgi?id=1240205 * https://bugzilla.suse.com/show_bug.cgi?id=1240207 * https://bugzilla.suse.com/show_bug.cgi?id=1240208 * https://bugzilla.suse.com/show_bug.cgi?id=1240210 * https://bugzilla.suse.com/show_bug.cgi?id=1240212 * https://bugzilla.suse.com/show_bug.cgi?id=1240213 * https://bugzilla.suse.com/show_bug.cgi?id=1240218 * https://bugzilla.suse.com/show_bug.cgi?id=1240220 * https://bugzilla.suse.com/show_bug.cgi?id=1240227 * https://bugzilla.suse.com/show_bug.cgi?id=1240229 * https://bugzilla.suse.com/show_bug.cgi?id=1240231 * https://bugzilla.suse.com/show_bug.cgi?id=1240242 * https://bugzilla.suse.com/show_bug.cgi?id=1240245 * https://bugzilla.suse.com/show_bug.cgi?id=1240247 * https://bugzilla.suse.com/show_bug.cgi?id=1240250 * https://bugzilla.suse.com/show_bug.cgi?id=1240254 * https://bugzilla.suse.com/show_bug.cgi?id=1240256 * https://bugzilla.suse.com/show_bug.cgi?id=1240264 * https://bugzilla.suse.com/show_bug.cgi?id=1240266 * https://bugzilla.suse.com/show_bug.cgi?id=1240272 * https://bugzilla.suse.com/show_bug.cgi?id=1240275 * https://bugzilla.suse.com/show_bug.cgi?id=1240276 * https://bugzilla.suse.com/show_bug.cgi?id=1240278 * https://bugzilla.suse.com/show_bug.cgi?id=1240279 * https://bugzilla.suse.com/show_bug.cgi?id=1240280 * https://bugzilla.suse.com/show_bug.cgi?id=1240281 * https://bugzilla.suse.com/show_bug.cgi?id=1240282 * https://bugzilla.suse.com/show_bug.cgi?id=1240283 * https://bugzilla.suse.com/show_bug.cgi?id=1240284 * https://bugzilla.suse.com/show_bug.cgi?id=1240286 * https://bugzilla.suse.com/show_bug.cgi?id=1240288 * https://bugzilla.suse.com/show_bug.cgi?id=1240290 * https://bugzilla.suse.com/show_bug.cgi?id=1240292 * https://bugzilla.suse.com/show_bug.cgi?id=1240293 * https://bugzilla.suse.com/show_bug.cgi?id=1240297 * https://bugzilla.suse.com/show_bug.cgi?id=1240304 * https://bugzilla.suse.com/show_bug.cgi?id=1240308 * https://bugzilla.suse.com/show_bug.cgi?id=1240309 * https://bugzilla.suse.com/show_bug.cgi?id=1240317 * https://bugzilla.suse.com/show_bug.cgi?id=1240318 * https://bugzilla.suse.com/show_bug.cgi?id=1240322 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 8 16:51:43 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 08 Apr 2025 16:51:43 -0000 Subject: SUSE-SU-2025:1173-1: moderate: Security update for poppler Message-ID: <174413110373.21179.2618703036109291402@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2025:1173-1 Release Date: 2025-04-08T13:36:38Z Rating: moderate References: * bsc#1240880 * bsc#1240881 Cross-References: * CVE-2025-32364 * CVE-2025-32365 CVSS scores: * CVE-2025-32364 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-32364 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32364 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32365 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-32365 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32365 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.5 An update that solves two vulnerabilities can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2025-32364: Fixed a floating point exception. (bsc#1240880) * CVE-2025-32365: Fixed the isOk check in JBIG2Bitmap::combine function in JBIG2Stream.cc. (bsc#1240881) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1173=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libpoppler-qt5-1-23.01.0-150500.3.17.1 * libpoppler126-23.01.0-150500.3.17.1 * poppler-tools-debuginfo-23.01.0-150500.3.17.1 * libpoppler-glib8-debuginfo-23.01.0-150500.3.17.1 * poppler-debugsource-23.01.0-150500.3.17.1 * libpoppler-glib8-23.01.0-150500.3.17.1 * libpoppler-qt5-devel-23.01.0-150500.3.17.1 * poppler-qt5-debugsource-23.01.0-150500.3.17.1 * libpoppler-qt6-3-debuginfo-23.01.0-150500.3.17.1 * libpoppler-qt5-1-debuginfo-23.01.0-150500.3.17.1 * typelib-1_0-Poppler-0_18-23.01.0-150500.3.17.1 * libpoppler-qt6-devel-23.01.0-150500.3.17.1 * libpoppler126-debuginfo-23.01.0-150500.3.17.1 * poppler-qt6-debugsource-23.01.0-150500.3.17.1 * libpoppler-cpp0-23.01.0-150500.3.17.1 * poppler-tools-23.01.0-150500.3.17.1 * libpoppler-cpp0-debuginfo-23.01.0-150500.3.17.1 * libpoppler-qt6-3-23.01.0-150500.3.17.1 * libpoppler-glib-devel-23.01.0-150500.3.17.1 * libpoppler-devel-23.01.0-150500.3.17.1 * openSUSE Leap 15.5 (x86_64) * libpoppler126-32bit-debuginfo-23.01.0-150500.3.17.1 * libpoppler-qt5-1-32bit-23.01.0-150500.3.17.1 * libpoppler-cpp0-32bit-23.01.0-150500.3.17.1 * libpoppler126-32bit-23.01.0-150500.3.17.1 * libpoppler-qt5-1-32bit-debuginfo-23.01.0-150500.3.17.1 * libpoppler-glib8-32bit-debuginfo-23.01.0-150500.3.17.1 * libpoppler-cpp0-32bit-debuginfo-23.01.0-150500.3.17.1 * libpoppler-glib8-32bit-23.01.0-150500.3.17.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libpoppler-glib8-64bit-debuginfo-23.01.0-150500.3.17.1 * libpoppler-cpp0-64bit-23.01.0-150500.3.17.1 * libpoppler-qt5-1-64bit-23.01.0-150500.3.17.1 * libpoppler-qt5-1-64bit-debuginfo-23.01.0-150500.3.17.1 * libpoppler-glib8-64bit-23.01.0-150500.3.17.1 * libpoppler126-64bit-23.01.0-150500.3.17.1 * libpoppler-cpp0-64bit-debuginfo-23.01.0-150500.3.17.1 * libpoppler126-64bit-debuginfo-23.01.0-150500.3.17.1 ## References: * https://www.suse.com/security/cve/CVE-2025-32364.html * https://www.suse.com/security/cve/CVE-2025-32365.html * https://bugzilla.suse.com/show_bug.cgi?id=1240880 * https://bugzilla.suse.com/show_bug.cgi?id=1240881 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 8 16:51:48 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 08 Apr 2025 16:51:48 -0000 Subject: SUSE-SU-2025:1172-1: moderate: Security update for poppler Message-ID: <174413110860.21179.8654902584134137476@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2025:1172-1 Release Date: 2025-04-08T13:36:26Z Rating: moderate References: * bsc#1240880 * bsc#1240881 Cross-References: * CVE-2025-32364 * CVE-2025-32365 CVSS scores: * CVE-2025-32364 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-32364 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32364 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32365 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-32365 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32365 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.4 An update that solves two vulnerabilities can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2025-32364: Fixed a floating point exception. (bsc#1240880) * CVE-2025-32365: Fixed the isOk check in JBIG2Bitmap::combine function in JBIG2Stream.cc. (bsc#1240881) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1172=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libpoppler-qt6-3-22.01.0-150400.3.28.1 * poppler-debugsource-22.01.0-150400.3.28.1 * libpoppler-cpp0-22.01.0-150400.3.28.1 * libpoppler-glib-devel-22.01.0-150400.3.28.1 * typelib-1_0-Poppler-0_18-22.01.0-150400.3.28.1 * libpoppler-qt6-3-debuginfo-22.01.0-150400.3.28.1 * libpoppler-cpp0-debuginfo-22.01.0-150400.3.28.1 * poppler-tools-22.01.0-150400.3.28.1 * poppler-tools-debuginfo-22.01.0-150400.3.28.1 * libpoppler-qt5-1-22.01.0-150400.3.28.1 * libpoppler-qt6-devel-22.01.0-150400.3.28.1 * libpoppler117-22.01.0-150400.3.28.1 * libpoppler117-debuginfo-22.01.0-150400.3.28.1 * libpoppler-glib8-22.01.0-150400.3.28.1 * libpoppler-glib8-debuginfo-22.01.0-150400.3.28.1 * poppler-qt5-debugsource-22.01.0-150400.3.28.1 * poppler-qt6-debugsource-22.01.0-150400.3.28.1 * libpoppler-qt5-devel-22.01.0-150400.3.28.1 * libpoppler-qt5-1-debuginfo-22.01.0-150400.3.28.1 * libpoppler-devel-22.01.0-150400.3.28.1 * openSUSE Leap 15.4 (x86_64) * libpoppler117-32bit-22.01.0-150400.3.28.1 * libpoppler-glib8-32bit-22.01.0-150400.3.28.1 * libpoppler117-32bit-debuginfo-22.01.0-150400.3.28.1 * libpoppler-qt5-1-32bit-22.01.0-150400.3.28.1 * libpoppler-glib8-32bit-debuginfo-22.01.0-150400.3.28.1 * libpoppler-cpp0-32bit-debuginfo-22.01.0-150400.3.28.1 * libpoppler-cpp0-32bit-22.01.0-150400.3.28.1 * libpoppler-qt5-1-32bit-debuginfo-22.01.0-150400.3.28.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libpoppler117-64bit-22.01.0-150400.3.28.1 * libpoppler-qt5-1-64bit-22.01.0-150400.3.28.1 * libpoppler-cpp0-64bit-22.01.0-150400.3.28.1 * libpoppler-cpp0-64bit-debuginfo-22.01.0-150400.3.28.1 * libpoppler-qt5-1-64bit-debuginfo-22.01.0-150400.3.28.1 * libpoppler117-64bit-debuginfo-22.01.0-150400.3.28.1 * libpoppler-glib8-64bit-22.01.0-150400.3.28.1 * libpoppler-glib8-64bit-debuginfo-22.01.0-150400.3.28.1 ## References: * https://www.suse.com/security/cve/CVE-2025-32364.html * https://www.suse.com/security/cve/CVE-2025-32365.html * https://bugzilla.suse.com/show_bug.cgi?id=1240880 * https://bugzilla.suse.com/show_bug.cgi?id=1240881 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 8 20:33:16 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 08 Apr 2025 20:33:16 -0000 Subject: SUSE-SU-2025:1178-1: important: Security update for the Linux Kernel Message-ID: <174414439680.21179.13754999475083089575@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:1178-1 Release Date: 2025-04-08T16:32:09Z Rating: important References: * bsc#1207948 * bsc#1215199 * bsc#1215211 * bsc#1218470 * bsc#1221651 * bsc#1222649 * bsc#1223047 * bsc#1224489 * bsc#1224610 * bsc#1225533 * bsc#1225742 * bsc#1225770 * bsc#1226871 * bsc#1227858 * bsc#1228653 * bsc#1229311 * bsc#1229361 * bsc#1230497 * bsc#1230728 * bsc#1230769 * bsc#1230832 * bsc#1231293 * bsc#1231432 * bsc#1232364 * bsc#1232389 * bsc#1232421 * bsc#1232743 * bsc#1232812 * bsc#1232848 * bsc#1232895 * bsc#1233033 * bsc#1233060 * bsc#1233259 * bsc#1233260 * bsc#1233479 * bsc#1233551 * bsc#1233557 * bsc#1233749 * bsc#1234222 * bsc#1234480 * bsc#1234828 * bsc#1234936 * bsc#1235436 * bsc#1235455 * bsc#1235501 * bsc#1235524 * bsc#1235589 * bsc#1235591 * bsc#1235621 * bsc#1235637 * bsc#1235698 * bsc#1235711 * bsc#1235712 * bsc#1235715 * bsc#1235729 * bsc#1235733 * bsc#1235761 * bsc#1235870 * bsc#1235973 * bsc#1236099 * bsc#1236111 * bsc#1236206 * bsc#1236333 * bsc#1236692 * bsc#1237029 * bsc#1237164 * bsc#1237313 * bsc#1237530 * bsc#1237558 * bsc#1237562 * bsc#1237565 * bsc#1237571 * bsc#1237853 * bsc#1237856 * bsc#1237873 * bsc#1237875 * bsc#1237876 * bsc#1237877 * bsc#1237881 * bsc#1237885 * bsc#1237890 * bsc#1237894 * bsc#1237897 * bsc#1237900 * bsc#1237906 * bsc#1237907 * bsc#1237911 * bsc#1237912 * bsc#1237950 * bsc#1238212 * bsc#1238474 * bsc#1238475 * bsc#1238479 * bsc#1238494 * bsc#1238496 * bsc#1238497 * bsc#1238500 * bsc#1238501 * bsc#1238502 * bsc#1238503 * bsc#1238506 * bsc#1238507 * bsc#1238510 * bsc#1238511 * bsc#1238512 * bsc#1238521 * bsc#1238523 * bsc#1238526 * bsc#1238528 * bsc#1238529 * bsc#1238531 * bsc#1238532 * bsc#1238715 * bsc#1238716 * bsc#1238734 * bsc#1238735 * bsc#1238736 * bsc#1238738 * bsc#1238747 * bsc#1238754 * bsc#1238757 * bsc#1238760 * bsc#1238762 * bsc#1238763 * bsc#1238767 * bsc#1238768 * bsc#1238771 * bsc#1238772 * bsc#1238773 * bsc#1238775 * bsc#1238780 * bsc#1238781 * bsc#1238785 * bsc#1238864 * bsc#1238865 * bsc#1238876 * bsc#1238903 * bsc#1238904 * bsc#1238905 * bsc#1238909 * bsc#1238911 * bsc#1238917 * bsc#1238958 * bsc#1238959 * bsc#1238963 * bsc#1238964 * bsc#1238969 * bsc#1238971 * bsc#1238973 * bsc#1238975 * bsc#1238978 * bsc#1238979 * bsc#1238981 * bsc#1238984 * bsc#1238986 * bsc#1238993 * bsc#1238994 * bsc#1238997 * bsc#1239015 * bsc#1239016 * bsc#1239027 * bsc#1239029 * bsc#1239030 * bsc#1239033 * bsc#1239034 * bsc#1239036 * bsc#1239037 * bsc#1239038 * bsc#1239039 * bsc#1239045 * bsc#1239065 * bsc#1239068 * bsc#1239073 * bsc#1239076 * bsc#1239080 * bsc#1239085 * bsc#1239087 * bsc#1239095 * bsc#1239104 * bsc#1239105 * bsc#1239109 * bsc#1239112 * bsc#1239114 * bsc#1239115 * bsc#1239117 * bsc#1239167 * bsc#1239174 * bsc#1239346 * bsc#1239349 * bsc#1239435 * bsc#1239467 * bsc#1239468 * bsc#1239471 * bsc#1239473 * bsc#1239474 * bsc#1239477 * bsc#1239478 * bsc#1239479 * bsc#1239481 * bsc#1239482 * bsc#1239483 * bsc#1239484 * bsc#1239486 * bsc#1239508 * bsc#1239512 * bsc#1239518 * bsc#1239573 * bsc#1239594 * bsc#1239595 * bsc#1239600 * bsc#1239605 * bsc#1239615 * bsc#1239644 * bsc#1239707 * bsc#1239986 * bsc#1239994 * bsc#1240169 * bsc#1240172 * bsc#1240173 * bsc#1240175 * bsc#1240177 * bsc#1240179 * bsc#1240182 * bsc#1240183 * bsc#1240186 * bsc#1240188 * bsc#1240189 * bsc#1240191 * bsc#1240192 * bsc#1240333 * bsc#1240334 * jsc#PED-10701 * jsc#PED-12251 * jsc#PED-12416 Cross-References: * CVE-2023-52831 * CVE-2023-52926 * CVE-2023-52927 * CVE-2024-26634 * CVE-2024-26873 * CVE-2024-35826 * CVE-2024-35910 * CVE-2024-38606 * CVE-2024-41005 * CVE-2024-41077 * CVE-2024-41149 * CVE-2024-42307 * CVE-2024-43820 * CVE-2024-46736 * CVE-2024-46782 * CVE-2024-46796 * CVE-2024-47408 * CVE-2024-47794 * CVE-2024-49571 * CVE-2024-49924 * CVE-2024-49940 * CVE-2024-49994 * CVE-2024-50056 * CVE-2024-50126 * CVE-2024-50140 * CVE-2024-50152 * CVE-2024-50290 * CVE-2024-52559 * CVE-2024-53057 * CVE-2024-53063 * CVE-2024-53140 * CVE-2024-53163 * CVE-2024-53680 * CVE-2024-54683 * CVE-2024-56638 * CVE-2024-56640 * CVE-2024-56702 * CVE-2024-56703 * CVE-2024-56718 * CVE-2024-56719 * CVE-2024-56751 * CVE-2024-56758 * CVE-2024-56770 * CVE-2024-57807 * CVE-2024-57834 * CVE-2024-57900 * CVE-2024-57947 * CVE-2024-57973 * CVE-2024-57974 * CVE-2024-57978 * CVE-2024-57979 * CVE-2024-57980 * CVE-2024-57981 * CVE-2024-57986 * CVE-2024-57990 * CVE-2024-57993 * CVE-2024-57996 * CVE-2024-57997 * CVE-2024-57999 * CVE-2024-58002 * CVE-2024-58005 * CVE-2024-58006 * CVE-2024-58007 * CVE-2024-58009 * CVE-2024-58011 * CVE-2024-58012 * CVE-2024-58013 * CVE-2024-58014 * CVE-2024-58017 * CVE-2024-58019 * CVE-2024-58020 * CVE-2024-58034 * CVE-2024-58051 * CVE-2024-58052 * CVE-2024-58054 * CVE-2024-58055 * CVE-2024-58056 * CVE-2024-58057 * CVE-2024-58058 * CVE-2024-58061 * CVE-2024-58063 * CVE-2024-58069 * CVE-2024-58072 * CVE-2024-58076 * CVE-2024-58078 * CVE-2024-58079 * CVE-2024-58080 * CVE-2024-58083 * CVE-2024-58085 * CVE-2024-58086 * CVE-2025-21631 * CVE-2025-21635 * CVE-2025-21659 * CVE-2025-21671 * CVE-2025-21693 * CVE-2025-21701 * CVE-2025-21703 * CVE-2025-21704 * CVE-2025-21706 * CVE-2025-21708 * CVE-2025-21711 * CVE-2025-21714 * CVE-2025-21718 * CVE-2025-21723 * CVE-2025-21726 * CVE-2025-21727 * CVE-2025-21731 * CVE-2025-21732 * CVE-2025-21733 * CVE-2025-21734 * CVE-2025-21735 * CVE-2025-21736 * CVE-2025-21738 * CVE-2025-21739 * CVE-2025-21741 * CVE-2025-21742 * CVE-2025-21743 * CVE-2025-21744 * CVE-2025-21745 * CVE-2025-21749 * CVE-2025-21750 * CVE-2025-21753 * CVE-2025-21754 * CVE-2025-21756 * CVE-2025-21759 * CVE-2025-21760 * CVE-2025-21761 * CVE-2025-21762 * CVE-2025-21763 * CVE-2025-21764 * CVE-2025-21765 * CVE-2025-21766 * CVE-2025-21772 * CVE-2025-21773 * CVE-2025-21775 * CVE-2025-21776 * CVE-2025-21779 * CVE-2025-21780 * CVE-2025-21781 * CVE-2025-21782 * CVE-2025-21784 * CVE-2025-21785 * CVE-2025-21791 * CVE-2025-21793 * CVE-2025-21794 * CVE-2025-21796 * CVE-2025-21804 * CVE-2025-21810 * CVE-2025-21815 * CVE-2025-21819 * CVE-2025-21820 * CVE-2025-21821 * CVE-2025-21823 * CVE-2025-21825 * CVE-2025-21828 * CVE-2025-21829 * CVE-2025-21830 * CVE-2025-21831 * CVE-2025-21832 * CVE-2025-21835 * CVE-2025-21838 * CVE-2025-21844 * CVE-2025-21846 * CVE-2025-21847 * CVE-2025-21848 * CVE-2025-21850 * CVE-2025-21855 * CVE-2025-21856 * CVE-2025-21857 * CVE-2025-21858 * CVE-2025-21859 * CVE-2025-21861 * CVE-2025-21862 * CVE-2025-21864 * CVE-2025-21865 * CVE-2025-21866 * CVE-2025-21869 * CVE-2025-21870 * CVE-2025-21871 * CVE-2025-21876 * CVE-2025-21877 * CVE-2025-21878 * CVE-2025-21883 * CVE-2025-21885 * CVE-2025-21886 * CVE-2025-21888 * CVE-2025-21890 * CVE-2025-21891 * CVE-2025-21892 CVSS scores: * CVE-2023-52831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52926 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-52926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52927 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-52927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-26634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-38606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-41077 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46736 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46736 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46796 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47408 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47408 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47794 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47794 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49571 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49571 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-49924 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49940 ( SUSE ): 6.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49940 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49994 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53163 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53163 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53680 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53680 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-54683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54683 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56638 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56638 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56703 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56703 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56718 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56718 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56718 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56751 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56758 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56770 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57900 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57947 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57947 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-58009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58014 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58017 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58017 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-58017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58085 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21631 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21631 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21659 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21671 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21671 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21704 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21704 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-21706 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21708 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21711 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21711 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21711 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21718 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21726 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21726 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21731 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21736 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21738 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21738 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21739 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21741 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21742 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21749 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21750 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21761 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21762 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21780 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21782 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21782 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21785 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21785 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21785 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21832 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21855 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21856 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Real Time Module 15-SP6 An update that solves 189 vulnerabilities, contains three features and has 42 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP6 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644). * CVE-2024-35910: tcp: properly terminate timers for kernel sockets (bsc#1224489). * CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active (bsc#1227858). * CVE-2024-46782: ila: call nf_unregister_net_hooks() sooner (bsc#1230769). * CVE-2024-47408: net/smc: check smcd_v2_ext_offset when receiving proposal msg (bsc#1235711). * CVE-2024-47794: kABI: bpf: Prevent tailcall infinite loop caused by freplace kABI workaround (bsc#1235712). * CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg (bsc#1235733). * CVE-2024-49940: kABI fix for l2tp: prevent possible tunnel refcount underflow (bsc#1232812). * CVE-2024-50056: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c (bsc#1232389). * CVE-2024-50140: net: sched: use RCU read-side critical section in taprio_dump() (bsc#1233060). * CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551). * CVE-2024-53140: netlink: terminate outstanding dump on socket close (bsc#1234222). * CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (bsc#1235715). * CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock (bsc#1235729). * CVE-2024-56638: kABI fix for "netfilter: nft_inner: incorrect percpu area handling under softirq" (bsc#1235524). * CVE-2024-56640: net/smc: fix LGR and link use-after-free issue (bsc#1235436). * CVE-2024-56702: bpf: Add tracepoints with null-able arguments (bsc#1235501). * CVE-2024-56703: ipv6: Fix soft lockups in fib6_select_path under high next hop churn (bsc#1235455). * CVE-2024-56718: net/smc: protect link down work from execute after lgr freed (bsc#1235589). * CVE-2024-56719: net: stmmac: fix TSO DMA API usage causing oops (bsc#1235591). * CVE-2024-56751: ipv6: release nexthop on device removal (bsc#1234936). * CVE-2024-56758: btrfs: check folio mapping after unlock in relocate_one_folio() (bsc#1235621). * CVE-2024-56770: net/sched: netem: account for backlog updates from child qdisc (bsc#1235637). * CVE-2024-57900: ila: serialize calls to nf_register_net_hooks() (bsc#1235973). * CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333). * CVE-2024-57974: udp: Deal with race between UDP socket address change and rehash (bsc#1238532). * CVE-2024-57979: kABI workaround for pps changes (bsc#1238521). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076). * CVE-2024-58012: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params (bsc#1239104). * CVE-2024-58019: nvkm/gsp: correctly advance the read pointer of GSP message queue (bsc#1238997). * CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036). * CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy (bsc#1236111). * CVE-2025-21659: netdev: prevent accessing NAPI instances from another namespace (bsc#1236206). * CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029). * CVE-2025-21701: net: avoid race between device unregistration and ethnl ops (bsc#1237164). * CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313). * CVE-2025-21706: mptcp: pm: only set fullmesh for subflow endp (bsc#1238528). * CVE-2025-21733: tracing/osnoise: Fix resetting of tracepoints (bsc#1238494). * CVE-2025-21739: kABI: ufshcd: add ufshcd_dealloc_host back (bsc#1238506). * CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875). * CVE-2025-21754: btrfs: fix assertion failure when splitting ordered extent after transaction abort (bsc#1238496). * CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send() (bsc#1238738). * CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb() (bsc#1238763). * CVE-2025-21761: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() (bsc#1238775). * CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780). * CVE-2025-21763: neighbour: use RCU protection in __neigh_notify() (bsc#1237897). * CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss() (bsc#1237906). * CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu() (bsc#1238754). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512). * CVE-2025-21825: selftests/bpf: Add test case for the freeing of bpf_timer (bsc#1238971). * CVE-2025-21844: smb: client: Add check for next_buffer in receive_encrypted_standard() (bsc#1239512). * CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (bsc#1239479). * CVE-2025-21856: s390/ism: add release function for struct device (bsc#1239486). * CVE-2025-21857: net/sched: cls_api: fix error handling causing NULL dereference (bsc#1239478). * CVE-2025-21861: mm/migrate_device: do not add folio to be freed to LRU in migrate_device_finalize() (bsc#1239483). * CVE-2025-21862: drop_monitor: fix incorrect initialization order (bsc#1239474). * CVE-2025-21864: kABI fix for tcp: drop secpath at the same time as we currently drop (bsc#1239482). * CVE-2025-21865: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl() (bsc#1239481). * CVE-2025-21870: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers (bsc#1240191). * CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183). * CVE-2025-21883: ice: Fix deinitializing VF in error path (bsc#1240189). * CVE-2025-21890: idpf: fix checksums set in idpf_rx_rsc() (bsc#1240173). * CVE-2025-21891: ipvlan: ensure network headers are in skb linear part (bsc#1240186). The following non-security bugs were fixed: * accel/qaic: Fix integer overflow in qaic_validate_req() (git-fixes). * accel/qaic: Fix possible data corruption in BOs > 2G (git-fixes). * acpi: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * acpi: resource: IRQ override for Eluktronics MECH-17 (stable-fixes). * af_unix: Annotate data-race of sk->sk_state in unix_stream_read_skb() (bsc#1239435). * af_unix: Disable MSG_OOB handling for sockets in sockmap/sockhash (bsc#1239435). * af_unix: Remove put_pid()/put_cred() in copy_peercred() (bsc#1240334). * alsa: hda: Fix speakers on ASUS EXPERTBOOK P5405CSA 1.0 (stable-fixes). * alsa: hda: intel: Add Dell ALC3271 to power_save denylist (stable-fixes). * alsa: hda: realtek: fix incorrect IS_REACHABLE() usage (git-fixes). * alsa: hda/realtek - add supported Mic Mute LED for Lenovo platform (stable- fixes). * alsa: hda/realtek: Add mute LED quirk for HP Pavilion x360 14-dy1xxx (stable-fixes). * alsa: hda/realtek: Add support for ASUS B3405 and B3605 Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for ASUS B5405 and B5605 Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for ASUS ROG Strix G614 Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for ASUS ROG Strix G814 Laptop using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for ASUS ROG Strix GA603 Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for ASUS Zenbook UM3406KA Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for various ASUS Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for various HP Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Always honor no_shutup_pins (git-fixes). * alsa: hda/realtek: Fix Asus Z13 2025 audio (stable-fixes). * alsa: hda/realtek: Fix built-in mic assignment on ASUS VivoBook X515UA (git- fixes). * alsa: hda/realtek: Limit mic boost on Positivo ARN50 (stable-fixes). * alsa: hda/realtek: Remove (revert) duplicate Ally X config (git-fixes). * alsa: hda/realtek: Support mute LED on HP Laptop 15s-du3xxx (stable-fixes). * alsa: hda/realtek: update ALC222 depop optimize (stable-fixes). * alsa: pcm: Drop superfluous NULL check in snd_pcm_format_set_silence() (git- fixes). * alsa: seq: Avoid module auto-load handling at event delivery (stable-fixes). * alsa: usb-audio: Add quirk for Plantronics headsets to fix control names (stable-fixes). * alsa: usb-audio: separate DJM-A9 cap lvl options (git-fixes). * alsa: usx2y: validate nrpacks module parameter on probe (git-fixes). * arm64: cputype: Add MIDR_CORTEX_A76AE (git-fixes) * arm64: dts: freescale: imx8mm-verdin-dahlia: add Microphone Jack to (git- fixes) * arm64: dts: freescale: tqma8mpql: Fix vqmmc-supply (git-fixes) * arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi (git- fixes) * arm64: dts: rockchip: Add missing PCIe supplies to RockPro64 board (git- fixes) * arm64: dts: rockchip: add rs485 support on uart5 of (git-fixes) * arm64: dts: rockchip: fix pinmux of UART0 for PX30 Ringneck on Haikou (git- fixes) * arm64: dts: rockchip: fix pinmux of UART5 for PX30 Ringneck on Haikou (git- fixes) * arm64: dts: rockchip: Fix PWM pinctrl names (git-fixes) * arm64: dts: rockchip: Remove bluetooth node from rock-3a (git-fixes) * arm64: dts: rockchip: Remove undocumented sdmmc property from (git-fixes) * arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe (git- fixes) * arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() (git- fixes) * arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list (git- fixes) * arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre (git- fixes) * arm64: mm: Populate vmemmap at the page level if not section aligned (git- fixes) * arm64: tegra: Remove the Orin NX/Nano suspend key (git-fixes) * asoc: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model (stable-fixes). * asoc: arizona/madera: use fsleep() in up/down DAPM event delays (stable- fixes). * asoc: codecs: wm0010: Fix error handling path in wm0010_spi_probe() (git- fixes). * asoc: cs35l41: check the return value from spi_setup() (git-fixes). * asoc: ops: Consistently treat platform_max as control value (git-fixes). * asoc: rt722-sdca: add missing readable registers (git-fixes). * asoc: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE (stable-fixes). * asoc: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module (stable- fixes). * asoc: tas2764: Fix power control mask (stable-fixes). * asoc: tas2764: Set the SDOUT polarity correctly (stable-fixes). * asoc: tas2770: Fix volume scale (stable-fixes). * asoc: ti: j721e-evm: Fix clock configuration for ti,j7200-cpb-audio compatible (git-fixes). * ata: ahci: Add mask_port_map module parameter (git-fixes). * ata: libata-scsi: Check ATA_QCFLAG_RTF_FILLED before using result_tf (git- fixes). * ata: libata-scsi: Remove redundant sense_buffer memsets (git-fixes). * ata: libata: Fix NCQ Non-Data log not supported print (git-fixes). * ata: pata_parport: add custom version of wait_after_reset (git-fixes). * ata: pata_parport: fit3: implement IDE command set registers (git-fixes). * ata: pata_serverworks: Do not use the term blacklist (git-fixes). * ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys() (git-fixes). * ata: sata_sil: Rename sil_blacklist to sil_quirks (git-fixes). * auxdisplay: panel: Fix an API misuse in panel.c (git-fixes). * backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() (git-fixes). * batman-adv: Ignore own maximum aggregation size during RX (git-fixes). * bitmap: introduce generic optimized bitmap_size() (git-fixes). * block: cleanup and fix batch completion adding conditions (git-fixes). * block: do not revert iter for -EIOCBQUEUED (git-fixes). * bluetooth: Fix error code in chan_alloc_skb_cb() (git-fixes). * bluetooth: hci_event: Fix connection regression between LE and non-LE adapters (git-fixes). * bluetooth: hci_event: Fix enabling passive scanning (git-fixes). * bluetooth: HCI: Add definition of hci_rp_remote_name_req_cancel (git-fixes). * bluetooth: Improve setsockopt() handling of malformed user input (git- fixes). * bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie (git-fixes). * bpf: Fix a verifier verbose message (git-fixes). * bpf: prevent r10 register from being marked as precise (git-fixes). * bpf: Replace bpf_lpm_trie_key 0-length array with flexible array (git- fixes). * bpf: Use -Wno-error in certain tests when building with GCC (git-fixes). * broadcom: fix supported flag check in periodic output function (git-fixes). * btrfs: check delayed refs when we're checking if a ref exists (bsc#1239605). * btrfs: do not use btrfs_bio_ctrl for extent buffer writing (bsc#1239045). * btrfs: drop the backref cache during relocation if we commit (bsc#1239605). * btrfs: remove the mirror_num argument to btrfs_submit_compressed_read (bsc#1239045). * btrfs: subpage: fix error handling in end_bio_subpage_eb_writepage (bsc#1239045). * btrfs: use a separate end_io handler for extent_buffer writing (bsc#1239045). * bus: mhi: host: Fix race between unprepare and queue_buf (git-fixes). * bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock (git-fixes). * bus: qcom-ssc-block-bus: Fix the error handling path of qcom_ssc_block_bus_probe() (git-fixes). * bus: qcom-ssc-block-bus: Remove some duplicated iounmap() calls (git-fixes). * bus: simple-pm-bus: fix forced runtime PM use (git-fixes). * can: flexcan: disable transceiver during system PM (git-fixes). * can: flexcan: only change CAN state when link up in system PM (git-fixes). * can: rcar_canfd: Fix page entries in the AFL list (git-fixes). * can: ucan: fix out of bound read in strscpy() source (git-fixes). * cdx: Fix possible UAF error in driver_override_show() (git-fixes). * char: misc: deallocate static minor in error path (git-fixes). * clockevents/drivers/i8253: Fix stop sequence for timer 0 (git-fixes). * coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes). * cppc_cpufreq: Use desired perf if feedback ctrs are 0 or unchanged (bsc#1237856) * cpufreq: cppc: cppc_cpufreq_get_rate() returns zero in all error (bsc#1237856) * cpufreq: cppc: Set fie_disabled to FIE_DISABLED if fails to create (bsc#1237856) * cpufreq/amd-pstate: Fix max_perf updation with schedutil (bsc#1239707). * cpufreq/cppc: Do not compare desired_perf in target() (bsc#1237856) * cpufreq/cppc: Move and rename (bsc#1237856) * cpumask: add cpumask_weight_andnot() (bsc#1239015). * cpumask: define cleanup function for cpumasks (bsc#1239015). * crypto: ccp - Fix check for the primary ASP device (git-fixes). * crypto: ccp - Fix uAPI definitions of PSP errors (git-fixes). * crypto: hisilicon/sec2 - fix for aead auth key length (git-fixes). * crypto: hisilicon/sec2 - fix for aead authsize alignment (git-fixes). * crypto: hisilicon/sec2 - fix for sec spec check (git-fixes). * crypto: iaa - Add global_stats file and remove individual stat files (jsc#PED-12416). * crypto: iaa - Change desc->priv to 0 (jsc#PED-12416). * crypto: iaa - Change iaa statistics to atomic64_t (jsc#PED-12416). * crypto: iaa - Fix comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - fix decomp_bytes_in stats (jsc#PED-12416). * crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags (jsc#PED-12416). * crypto: iaa - Remove comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove header table code (jsc#PED-12416). * crypto: iaa - Remove potential infinite loop in check_completion() (jsc#PED-12416). * crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init() (jsc#PED-12416). * crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns() (jsc#PED-12416). * crypto: iaa - remove unneeded semicolon (jsc#PED-12416). * crypto: iaa - Test the correct request flag (git-fixes). * crypto: iaa - Use cpumask_weight() when rebalancing (jsc#PED-12416). * crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy() (jsc#PED-12416). * crypto: nx - Fix uninitialised hv_nxc on error (git-fixes). * crypto: qat - add admin msgs for telemetry (jsc#PED-12416). * crypto: qat - add auto reset on error (jsc#PED-12416). * crypto: qat - add bank save and restore flows (jsc#PED-12416). * crypto: qat - add fatal error notification (jsc#PED-12416). * crypto: qat - add fatal error notify method (jsc#PED-12416). * crypto: qat - add heartbeat error simulator (jsc#PED-12416). * crypto: qat - add interface for live migration (jsc#PED-12416). * crypto: qat - add support for 420xx devices (jsc#PED-12416). * crypto: qat - add support for device telemetry (jsc#PED-12416). * crypto: qat - add support for ring pair level telemetry (jsc#PED-12416). * crypto: qat - adf_get_etr_base() helper (jsc#PED-12416). * crypto: qat - allow disabling SR-IOV VFs (jsc#PED-12416). * crypto: qat - Avoid -Wflex-array-member-not-at-end warnings (jsc#PED-12416). * crypto: qat - avoid memcpy() overflow warning (jsc#PED-12416). * crypto: qat - change signature of uof_get_num_objs() (jsc#PED-12416). * crypto: qat - Constify struct pm_status_row (jsc#PED-12416). * crypto: qat - disable arbitration before reset (jsc#PED-12416). * crypto: qat - ensure correct order in VF restarting handler (jsc#PED-12416). * crypto: qat - expand CSR operations for QAT GEN4 devices (jsc#PED-12416). * crypto: qat - fix "Full Going True" macro definition (jsc#PED-12416). * crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx (jsc#PED-12416). * crypto: qat - fix comment structure (jsc#PED-12416). * crypto: qat - fix linking errors when PCI_IOV is disabled (jsc#PED-12416). * crypto: qat - Fix missing destroy_workqueue in adf_init_aer() (jsc#PED-12416). * crypto: qat - fix recovery flow for VFs (jsc#PED-12416). * crypto: qat - fix ring to service map for dcc in 420xx (jsc#PED-12416). * crypto: qat - Fix spelling mistake "Invalide" -> "Invalid" (jsc#PED-12416). * crypto: qat - Fix typo "accelaration" (jsc#PED-12416). * crypto: qat - Fix typo (jsc#PED-12416). * crypto: qat - generate dynamically arbiter mappings (jsc#PED-12416). * crypto: qat - implement dh fallback for primes > 4K (jsc#PED-12416). * crypto: qat - implement interface for live migration (jsc#PED-12416). * crypto: qat - improve aer error reset handling (jsc#PED-12416). * crypto: qat - improve error message in adf_get_arbiter_mapping() (jsc#PED-12416). * crypto: qat - include pci.h for GET_DEV() (jsc#PED-12416). * crypto: qat - initialize user_input.lock for rate_limiting (jsc#PED-12416). * crypto: qat - limit heartbeat notifications (jsc#PED-12416). * crypto: qat - make adf_ctl_class constant (jsc#PED-12416). * crypto: qat - make ring to service map common for QAT GEN4 (jsc#PED-12416). * crypto: qat - move fw config related structures (jsc#PED-12416). * crypto: qat - move PFVF compat checker to a function (jsc#PED-12416). * crypto: qat - preserve ADF_GENERAL_SEC (jsc#PED-12416). * crypto: qat - re-enable sriov after pf reset (jsc#PED-12416). * crypto: qat - relocate and rename 4xxx PF2VM definitions (jsc#PED-12416). * crypto: qat - relocate CSR access code (jsc#PED-12416). * crypto: qat - relocate portions of qat_4xxx code (jsc#PED-12416). * crypto: qat - remove access to parity register for QAT GEN4 (git-fixes). * crypto: qat - Remove trailing space after \n newline (jsc#PED-12416). * crypto: qat - remove unnecessary description from comment (jsc#PED-12416). * crypto: qat - remove unused adf_devmgr_get_first (jsc#PED-12416). * crypto: qat - rename get_sla_arr_of_type() (jsc#PED-12416). * crypto: qat - set parity error mask for qat_420xx (git-fixes). * crypto: qat - uninitialized variable in adf_hb_error_inject_write() (jsc#PED-12416). * crypto: qat - update PFVF protocol for recovery (jsc#PED-12416). * crypto: qat - use kcalloc_node() instead of kzalloc_node() (jsc#PED-12416). * crypto: qat - Use static_assert() to check struct sizes (jsc#PED-12416). * crypto: qat - validate slices count returned by FW (jsc#PED-12416). * crypto: qat/qat_420xx - fix off by one in uof_get_name() (jsc#PED-12416). * dlm: prevent NPD when writing a positive value to event_done (git-fixes). * dm array: fix cursor index when skipping across block boundaries (git- fixes). * dm array: fix unreleased btree blocks on closing a faulty array cursor (git- fixes). * dm init: Handle minors larger than 255 (git-fixes). * dm integrity: fix out-of-range warning (git-fixes). * dm persistent data: fix memory allocation failure (git-fixes). * dm resume: do not return EINVAL when signalled (git-fixes). * dm suspend: return -ERESTARTSYS instead of -EINTR (git-fixes). * dm thin: Add missing destroy_work_on_stack() (git-fixes). * dm-crypt: do not update io->sector after kcryptd_crypt_write_io_submit() (git-fixes). * dm-crypt: track tag_offset in convert_context (git-fixes). * dm-delay: fix hung task introduced by kthread mode (git-fixes). * dm-delay: fix max_delay calculations (git-fixes). * dm-delay: fix workqueue delay_timer race (git-fixes). * dm-ebs: do not set the flag DM_TARGET_PASSES_INTEGRITY (git-fixes). * dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (git- fixes). * dm-integrity: align the outgoing bio in integrity_recheck (git-fixes). * dm-integrity: fix a race condition when accessing recalc_sector (git-fixes). * dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume (git-fixes). * dm-unstriped: cast an operand to sector_t to prevent potential uint32_t overflow (git-fixes). * dm-verity FEC: Fix RS FEC repair for roots unaligned to block size (take 2) (git-fixes). mwilck: some hand editing because d95e2c34a3ca ("dm verity: Fix IO priority lost when reading FEC and hash") is missing * dm: Fix typo in error message (git-fixes). * dma: kmsan: export kmsan_handle_dma() for modules (git-fixes). * documentation: qat: fix auto_reset attribute details (git-fixes). * documentation: qat: fix auto_reset section (git-fixes). * driver core: Remove needless return in void API device_remove_group() (git- fixes). * drivers: core: fix device leak in __fw_devlink_relax_cycles() (git-fixes). * drivers: hv: vmbus: Do not release fb_mmio resource in vmbus_free_mmio() (git-fixes). * drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl (git-fixes). * drm: xlnx: zynqmp: Fix max dma segment size (git-fixes). * drm/amd/display: Assign normalized_pix_clk when color depth = 14 (stable- fixes). * drm/amd/display: avoid NPD when ASIC does not support DMUB (git-fixes). * drm/amd/display: Disable PSR-SU on eDP panels (stable-fixes). * drm/amd/display: Disable unneeded hpd interrupts during dm_init (stable- fixes). * drm/amd/display: Fix HPD after gpu reset (stable-fixes). * drm/amd/display: Fix slab-use-after-free on hdcp_work (git-fixes). * drm/amd/display: fix type mismatch in CalculateDynamicMetadataParameters() (git-fixes). * drm/amd/display: Restore correct backlight brightness after a GPU reset (stable-fixes). * drm/amd/display: Use HW lock mgr for PSR1 when only one eDP (git-fixes). * drm/amdgpu: Check extended configuration space register when system uses large bar (stable-fixes). * drm/amdgpu: Fix JPEG video caps max size for navi1x and raven (stable- fixes). * drm/amdgpu: Fix MPEG2, MPEG4 and VC1 video caps max size (stable-fixes). * drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid Priority Inversion in SRIOV (git-fixes). * drm/amdgpu/umsch: declare umsch firmware (git-fixes). * drm/amdkfd: Fix Circular Locking Dependency in 'svm_range_cpu_invalidate_pagetables' (git-fixes). * drm/atomic: Filter out redundant DPMS calls (stable-fixes). * drm/bridge: Fix spelling mistake "gettin" -> "getting" (git-fixes). * drm/bridge: it6505: fix HDCP V match check is not performed correctly (git- fixes). * drm/bridge: ti-sn65dsi86: Fix multiple instances (git-fixes). * drm/dp_mst: Fix drm RAD print (git-fixes). * drm/dp_mst: Fix locking when skipping CSN before topology probing (git- fixes). * drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data() (git- fixes). * drm/hyperv: Fix address space leak when Hyper-V DRM device is removed (git- fixes). * drm/i915/cdclk: Do cdclk post plane programming later (stable-fixes). * drm/i915/ddi: Fix HDMI port width programming in DDI_BUF_CTL (git-fixes). * drm/i915/dsi: Use TRANS_DDI_FUNC_CTL's own port width macro (git-fixes). * drm/i915/xe2lpd: Move D2D enable/disable (stable-fixes). * drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr (git- fixes). * drm/mediatek: dsi: fix error codes in mtk_dsi_host_transfer() (git-fixes). * drm/mediatek: mtk_hdmi: Fix typo for aud_sampe_size member (git-fixes). * drm/mediatek: mtk_hdmi: Unregister audio platform device on failure (git- fixes). * drm/msm/a6xx: Fix a6xx indexed-regs in devcoreduump (git-fixes). * drm/msm/a6xx: Fix stale rpmh votes from GPU (git-fixes). * drm/msm/dpu: do not use active in atomic_check() (git-fixes). * drm/msm/dsi: Set PHY usescase (and mode) before registering DSI host (git- fixes). * drm/msm/dsi: Use existing per-interface slice count in DSC timing (git- fixes). * drm/nouveau: Do not override forced connector status (stable-fixes). * drm/panel: ilitek-ili9882t: fix GPIO name in error message (git-fixes). * drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M (stable- fixes). * drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (git- fixes). * drm/radeon/ci_dpm: Remove needless NULL checks of dpm tables (git-fixes). * drm/repaper: fix integer overflows in repeat functions (git-fixes). * drm/sched: Fix fence reference count leak (git-fixes). * drm/ssd130x: ensure ssd132x pitch is correct (git-fixes). * drm/ssd130x: fix ssd132x encoding (git-fixes). * drm/ssd130x: Set SPI .id_table to prevent an SPI core warning (git-fixes). * drm/v3d: Do not run jobs that have errors flagged in its fence (git-fixes). * drm/vkms: Fix use after free and double free on init error (git-fixes). * drm/vkms: Round fixp2int conversion in lerp_u16 (stable-fixes). * dummycon: fix default rows/cols (git-fixes). * eeprom: digsy_mtc: Make GPIO lookup table match the device (git-fixes). * efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32 (bsc#1239349). * fbdev: au1100fb: Move a variable assignment behind a null pointer check (git-fixes). * fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes). * fbdev: sm501fb: Add some geometry checks (git-fixes). * firmware: arm_ffa: Explicitly cast return value from FFA_VERSION before comparison (git-fixes). * firmware: arm_scmi: use ioread64() instead of ioread64_hi_lo() (git-fixes). * firmware: cs_dsp: Remove async regmap writes (git-fixes). * firmware: imx-scu: fix OF node leak in .probe() (git-fixes). * flow_dissector: use RCU protection to fetch dev_net() (bsc#1239994). * gpio: aggregator: protect driver attr handlers against module unload (git- fixes). * gpio: rcar: Fix missing of_node_put() call (git-fixes). * gpio: rcar: Use raw_spinlock to protect register access (stable-fixes). * gpu: host1x: Do not assume that a NULL domain means no DMA IOMMU (git- fixes). * hid: apple: disable Fn key handling on the Omoton KB066 (git-fixes). * hid: apple: fix up the F6 key on the Omoton KB066 keyboard (stable-fixes). * hid: appleir: Fix potential NULL dereference at raw event handle (git- fixes). * hid: Enable playstation driver independently of sony driver (git-fixes). * hid: google: fix unused variable warning under !CONFIG_ACPI (git-fixes). * hid: hid-apple: Apple Magic Keyboard a3203 USB-C support (stable-fixes). * hid: hid-steam: Fix use-after-free when detaching device (git-fixes). * hid: i2c-hid: Skip SET_POWER SLEEP for Cirque touchpad on system suspend (stable-fixes). * hid: ignore non-functional sensor in HP 5MP Camera (stable-fixes). * hid: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell (stable- fixes). * hid: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (git- fixes). * hid: intel-ish-hid: Send clock sync message immediately after reset (stable- fixes). * hid: remove superfluous (and wrong) Makefile entry for CONFIG_INTEL_ISH_FIRMWARE_DOWNLOADER (git-fixes). * hid: topre: Fix n-key rollover on Realforce R3S TKL boards (stable-fixes). * hwmon: (ad7314) Validate leading zero bits and return error (git-fixes). * hwmon: (ntc_thermistor) Fix the ncpXXxh103 sensor table (git-fixes). * hwmon: (pmbus) Initialise page count in pmbus_identify() (git-fixes). * hwmon: fix a NULL vs IS_ERR_OR_NULL() check in xgene_hwmon_probe() (git- fixes). * i2c: ali1535: Fix an error handling path in ali1535_probe() (git-fixes). * i2c: ali15x3: Fix an error handling path in ali15x3_probe() (git-fixes). * i2c: amd-mp2: drop free_irq() of devm_request_irq() allocated irq (git- fixes). * i2c: omap: fix IRQ storms (git-fixes). * i2c: sis630: Fix an error handling path in sis630_probe() (git-fixes). * i3c: Add NULL pointer check in i3c_master_queue_ibi() (git-fixes). * i3c: master: svc: Fix missing the IBI rules (git-fixes). * i3c: master: svc: Use readsb helper for reading MDB (git-fixes). * ib/mad: Check available slots before posting receive WRs (git-fixes) * ice: Remove and readd netdev during devlink reload (bsc#1230497 bsc#1239518). * iio: accel: mma8452: Ensure error return on failure to matching oversampling ratio (git-fixes). * iio: accel: msa311: Fix failure to release runtime pm if direct mode claim fails (git-fixes). * iio: adc: ad4130: Fix comparison of channel setups (git-fixes). * iio: adc: ad7124: Fix comparison of channel configs (git-fixes). * iio: adc: at91-sama5d2_adc: fix sama7g5 realbits value (git-fixes). * iio: dac: ad3552r: clear reset status flag (git-fixes). * iio: filter: admv8818: Force initialization of SDO (git-fixes). * include: net: add static inline dst_dev_overhead() to dst.h (git-fixes). * include/linux/mmzone.h: clean up watermark accessors (bsc#1239600). * init: add initramfs_internal.h (bsc#1232848). * initramfs: allocate heap buffers together (bsc#1232848). * initramfs: fix hardlink hash leak without TRAILER (bsc#1232848). * input: ads7846 - fix gpiod allocation (git-fixes). * input: i8042 - add required quirks for missing old boardnames (stable- fixes). * input: i8042 - swap old quirk combination with new quirk for more devices (stable-fixes). * input: i8042 - swap old quirk combination with new quirk for NHxxRZQ (stable-fixes). * input: i8042 - swap old quirk combination with new quirk for several devices (stable-fixes). * input: iqs7222 - add support for Azoteq IQS7222D (git-fixes). * input: iqs7222 - add support for IQS7222D v1.1 and v1.2 (git-fixes). * input: iqs7222 - preserve system status register (git-fixes). * input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE controllers (stable-fixes). * input: xpad - add multiple supported devices (stable-fixes). * input: xpad - add support for TECNO Pocket Go (stable-fixes). * input: xpad - add support for ZOTAC Gaming Zone (stable-fixes). * input: xpad - rename QH controller to Legion Go S (stable-fixes). * intel_idle: Add ibrs_off module parameter to force-disable IBRS (git-fixes). * intel_idle: Use __update_spec_ctrl() in intel_idle_ibrs() (git-fixes). * intel_th: pci: Add Arrow Lake support (stable-fixes). * intel_th: pci: Add Panther Lake-H support (stable-fixes). * intel_th: pci: Add Panther Lake-P/U support (stable-fixes). * ioam6: improve checks on user data (git-fixes). * iommu/vt-d: Fix suspicious RCU usage (git-fixes). * ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994). * ipv4: use RCU protection in inet_select_addr() (bsc#1239994). * ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994). * ipv4: use RCU protection in ipv4_default_advmss() (bsc#1239994). * ipv4: use RCU protection in rt_is_expired() (bsc#1239994). * ipv6: annotate data-races around cnf.disable_ipv6 (git-fixes). * ipv6: avoid atomic fragment on GSO packets (git-fixes). * ipv6: Ensure natural alignment of const ipv6 loopback and router addresses (git-fixes). * ipv6: fib: hide unused 'pn' variable (git-fixes). * ipv6: fib6_rules: flush route cache when rule is changed (git-fixes). * ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw() (git- fixes). * ipv6: fix ndisc_is_useropt() handling for PIO (git-fixes). * ipv6: fix potential NULL deref in fib6_add() (git-fixes). * ipv6: icmp: convert to dev_net_rcu() (bsc#1239994). * ipv6: introduce dst_rt6_info() helper (git-fixes). * ipv6: ioam: block BH from ioam6_output() (git-fixes). * ipv6: properly combine dev_base_seq and ipv6.dev_addr_genid (git-fixes). * ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * ipv6: Set errno after ip_fib_metrics_init() in ip6_route_info_create() (git- fixes). * ipv6: sr: add missing seg6_local_exit (git-fixes). * ipv6: sr: block BH in seg6_output_core() and seg6_input_core() (git-fixes). * ipv6: take care of scope when choosing the src addr (git-fixes). * ipv6: Use RCU in ip6_input() (bsc#1239994). * jfs: add check read-only before truncation in jfs_truncate_nolock() (git- fixes). * jfs: add check read-only before txBeginAnon() call (git-fixes). * jfs: add index corruption check to DT_GETPAGE() (git-fixes). * jfs: fix slab-out-of-bounds read in ea_get() (git-fixes). * jfs: reject on-disk inodes of an unsupported type (git-fixes). * kABI fix for ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * kABI fix for net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * kABI fix for netlink: terminate outstanding dump on socket close (git- fixes). * kABI fix for RDMA/core: Do not expose hw_counters outside (git-fixes) * kABI fix for tcp: fix cookie_init_timestamp() overflows (git-fixes). * kABI fix for tcp: replace tcp_time_stamp_raw() (git-fixes). * kABI workaround for intel-ish-hid (git-fixes). * kABI workaround for soc_mixer_control changes (git-fixes). * kbuild: hdrcheck: fix cross build with clang (git-fixes). * kunit: qemu_configs: sparc: use Zilog console (git-fixes). * l2tp: fix ICMP error handling for UDP-encap sockets (git-fixes). * l2tp: fix incorrect parameter validation in the pppol2tp_getsockopt() function (git-fixes). * l2tp: fix lockdep splat (git-fixes). * leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs (git- fixes). * leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs (git- fixes). * lib: 842: Improve error handling in sw842_compress() (git-fixes). * lockdep: Do not disable interrupts on RT in disable_irq_nosync_lockdep.*() (git-fixes). * mdacon: rework dependency list (git-fixes). * media: i2c: adv748x: Fix test pattern selection mask (git-fixes). * media: i2c: ccs: Set the device's runtime PM status correctly in remove (git-fixes). * media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO (git-fixes). * media: i2c: ov7251: Set enable GPIO low in probe (git-fixes). * media: platform: allgro-dvt: unregister v4l2_device on the error path (git- fixes). * media: platform: stm32: Add check for clk_enable() (git-fixes). * media: siano: Fix error handling in smsdvb_module_init() (git-fixes). * media: streamzap: fix race between device disconnection and urb callback (git-fixes). * media: streamzap: prevent processing IR data on URB failure (git-fixes). * media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf() (git- fixes). * media: venus: hfi_parser: add check to avoid out of bound access (git- fixes). * media: venus: hfi_parser: refactor hfi packet parsing logic (git-fixes). * media: venus: hfi: add a check to handle OOB in sfr region (git-fixes). * media: venus: hfi: add check to handle incorrect queue size (git-fixes). * media: verisilicon: HEVC: Initialize start_bit field (git-fixes). * media: vim2m: print device name after registering device (git-fixes). * media: visl: Fix ERANGE error when setting enum controls (git-fixes). * mei: me: add panther lake P DID (stable-fixes). * memblock tests: fix warning: "__ALIGN_KERNEL" redefined (git-fixes). Fix tools/ build breakage introduced by suse commit 3d6cb93162fd "bitmap: introduce generic optimized bitmap_size() (git-fixes)" * memory: mtk-smi: Add ostd setting for mt8192 (git-fixes). * memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (git-fixes). * mfd: ene-kb3930: Fix a potential NULL pointer dereference (git-fixes). * mfd: sm501: Switch to BIT() to mitigate integer overflows (git-fixes). * mfd: syscon: Add of_syscon_register_regmap() API (stable-fixes). * mfd: syscon: Fix race in device_node_get_regmap() (git-fixes). * mfd: syscon: Remove extern from function prototypes (stable-fixes). * mfd: syscon: Use scoped variables with memory allocators to simplify error paths (stable-fixes). * mm: accept to promo watermark (bsc#1239600). * mm: create promo_wmark_pages and clean up open-coded sites (bsc#1239600). * mm: fix endless reclaim on machines with unaccepted memory (bsc#1239600). * mm: zswap: move allocations during CPU init outside the lock (git-fixes). * mm/page_alloc: fix memory accept before watermarks gets initialized (bsc#1239600). * mmc: atmel-mci: Add missing clk_disable_unprepare() (git-fixes). * mmc: omap: Fix memory leak in mmc_omap_new_slot (git-fixes). * mmc: sdhci-brcmstb: add cqhci suspend/resume to PM ops (git-fixes). * mmc: sdhci-omap: Disable MMC_CAP_AGGRESSIVE_PM for eMMC/SD (git-fixes). * Move upstreamed nfsd and sunrpc patches into sorted section * Move upstreamed PCI and initramfs patches into sorted section * Move upstreamed powerpc and SCSI patches into sorted section * mtd: Add check for devm_kcalloc() (git-fixes). * mtd: nand: Fix a kdoc comment (git-fixes). * mtd: rawnand: brcmnand: fix PM resume warning (git-fixes). * mtd: Replace kcalloc() with devm_kcalloc() (git-fixes). * ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994). * ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994). * net l2tp: drop flow hash on forward (git-fixes). * net_sched: Prevent creation of classes with TC_H_ROOT (git-fixes). * net_sched: sch_sfq: annotate data-races around q->perturb_period (git- fixes). * net_sched: sch_sfq: handle bigger packets (git-fixes). * net: add dev_net_rcu() helper (bsc#1239994). * net: constify sk_dst_get() and __sk_dst_get() argument (git-fixes). * net: ipv6: fix dst ref loop in ila lwtunnel (git-fixes). * net: ipv6: fix dst ref loop on input in rpl lwt (git-fixes). * net: ipv6: fix dst ref loop on input in seg6 lwt (git-fixes). * net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels (git-fixes). * net: ipv6: fix missing dst ref drop in ila lwtunnel (git-fixes). * net: ipv6: fix wrong start position when receive hop-by-hop fragment (git- fixes). * net: ipv6: ioam6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: ioam6: code alignment (git-fixes). * net: ipv6: ioam6: new feature tunsrc (git-fixes). * net: ipv6: rpl_iptunnel: block BH in rpl_output() and rpl_input() (git- fixes). * net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input (git-fixes). * net: ipv6: rpl_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: seg6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL (git-fixes). * net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * net: mana: add a function to spread IRQs per CPUs (bsc#1239015). * net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016). * net: mana: Allow variable size indirection table (bsc#1239016). * net: mana: Assigning IRQ affinity on HT cores (bsc#1239015). * net: mana: Avoid open coded arithmetic (bsc#1239016). * net: mana: cleanup mana struct after debugfs_remove() (git-fixes). * net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Fix memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Support holes in device list reply msg (git-fixes). * net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480). * net: use unrcu_pointer() helper (git-fixes). * net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors (stable- fixes). * net/sched: act_api: deny mismatched skip_sw/skip_hw flags for actions created by classifiers (git-fixes). * net/sched: act_api: rely on rcu in tcf_idr_check_alloc (git-fixes). * net/sched: adjust device watchdog timer to detect stopped queue at right time (git-fixes). * net/sched: cbs: Fix integer overflow in cbs_set_port_rate() (git-fixes). * net/sched: cls_u32: replace int refcounts with proper refcounts (git-fixes). * net/sched: flower: Add lock protection when remove filter handle (git- fixes). * net/sched: taprio: make q->picos_per_byte available to fill_sched_entry() (git-fixes). * net/sched: tbf: correct backlog statistic for GSO packets (git-fixes). * nfsd: clear acl_access/acl_default after releasing them (git-fixes). * nvme-fc: do not ignore connectivity loss during connecting (git-fixes bsc#1222649). * nvme-fc: go straight to connecting state when initializing (git-fixes bsc#1222649). * nvme-fc: rely on state transitions to handle connectivity loss (git-fixes bsc#1222649). * nvme-ioctl: fix leaked requests on mapping error (git-fixes). * nvme-pci: quirk Acer FA100 for non-uniqueue identifiers (git-fixes). * nvme-pci: remove stale comment (git-fixes). * nvme-tcp: add basic support for the C2HTermReq PDU (git-fixes). * nvme-tcp: Fix a C2HTermReq error message (git-fixes). * nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (git- fixes). * nvme-tcp: fix signedness bug in nvme_tcp_init_connection() (git-fixes). * nvme: introduce nvme_disk_is_ns_head helper (git-fixes). * nvme: move error logging from nvme_end_req() to __nvme_end_req() (git- fixes). * nvme: move passthrough logging attribute to head (git-fixes). * nvme: only allow entering LIVE from CONNECTING state (git-fixes bsc#1222649). * nvmet-fc: Remove unused functions (git-fixes). * nvmet-rdma: recheck queue state is LIVE in state lock in recv done (git- fixes). * nvmet-tcp: Fix a possible sporadic response drops in weakly ordered arch (git-fixes). * nvmet: remove old function prototype (git-fixes). * ocfs2: check dir i_size in ocfs2_find_entry (git-fixes). * ocfs2: fix deadlock in ocfs2_get_system_file_inode (git-fixes). * ocfs2: handle a symlink read error correctly (git-fixes). * ocfs2: mark dquot as inactive if failed to start trans while releasing dquot (git-fixes). * ocfs2: update seq_file index in ocfs2_dlm_seq_next (git-fixes). * orangefs: fix a oob in orangefs_debug_write (git-fixes). * packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251). * packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251). * padata: fix sysfs store callback check (git-fixes). * partitions: mac: fix handling of bogus partition table (git-fixes). * pci: Avoid reset when disabled via sysfs (git-fixes). * pci: brcmstb: Fix error path after a call to regulator_bulk_get() (git- fixes). * pci: brcmstb: Fix missing of_node_put() in brcm_pcie_probe() (git-fixes). * pci: brcmstb: Fix potential premature regulator disabling (git-fixes). * pci: brcmstb: Set generation limit before PCIe link up (git-fixes). * pci: brcmstb: Use internal register to change link capability (git-fixes). * pci: cadence-ep: Fix the driver to send MSG TLP for INTx without data payload (git-fixes). * pci: dwc: ep: Return -ENOMEM for allocation failures (git-fixes). * pci: Fix reference leak in pci_alloc_child_bus() (git-fixes). * pci: pciehp: Do not enable HPIE when resuming in poll mode (git-fixes). * pci: Remove stray put_device() in pci_register_host_bridge() (git-fixes). * pci: xilinx-cpm: Fix IRQ domain leak in error path of probe (git-fixes). * pci/acs: Fix 'pci=config_acs=' parameter (git-fixes). * pci/aspm: Fix link state exit during switch upstream function removal (git- fixes). * pci/doe: Poll DOE Busy bit for up to 1 second in pci_doe_send_req() (bsc#1237853) * pci/doe: Support discovery version 2 (bsc#1237853) * pci/portdrv: Only disable pciehp interrupts early when needed (git-fixes). * pinctrl: bcm281xx: Fix incorrect regmap max_registers value (git-fixes). * pinctrl: intel: Fix wrong bypass assignment in intel_pinctrl_probe_pwm() (git-fixes). * pinctrl: qcom: Clear latched interrupt status when changing IRQ type (git- fixes). * pinctrl: renesas: rza2: Fix missing of_node_put() call (git-fixes). * pinctrl: renesas: rzv2m: Fix missing of_node_put() call (git-fixes). * pinctrl: tegra: Set SFIO mode to Mux Register (git-fixes). * platform/x86: dell-ddv: Fix temperature calculation (git-fixes). * platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e (stable- fixes). * platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e (stable-fixes). * platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles (stable- fixes). * platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show() (stable- fixes). * pm: sleep: Adjust check before setting power.must_resume (git-fixes). * pm: sleep: Fix handling devices with direct_complete set on errors (git- fixes). * pnfs/flexfiles: retry getting layout segment for reads (git-fixes). * power: supply: max77693: Fix wrong conversion of charge input threshold value (git-fixes). * powerpc: Stop using no_llseek (bsc#1239573). * powerpc/pseries/eeh: Fix pseries_eeh_err_inject (bsc#1239573). * powerpc/pseries/eeh: move pseries_eeh_err_inject() outside CONFIG_DEBUG_FS block (bsc#1239573). * powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for pmemory (bsc#1239167 ltc#211055). * rapidio: add check for rio_add_net() in rio_scan_alloc_net() (git-fixes). * rapidio: fix an API misues when rio_add_net() fails (git-fixes). * ras: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619). * rdma/bnxt_re: Add missing paranthesis in map_qp_id_to_tbl_indx (git-fixes) * rdma/bnxt_re: Avoid clearing VLAN_ID mask in modify qp path (git-fixes) * rdma/core: Do not expose hw_counters outside of init net namespace (git- fixes) * rdma/erdma: Prevent use-after-free in erdma_accept_newconn() (git-fixes) * rdma/hns: Fix a missing rollback in error path of hns_roce_create_qp_common() (git-fixes) * rdma/hns: Fix missing xa_destroy() (git-fixes) * rdma/hns: Fix soft lockup during bt pages loop (git-fixes) * rdma/hns: Fix unmatched condition in error path of alloc_user_qp_db() (git- fixes) * rdma/hns: Fix wrong value of max_sge_rd (git-fixes) * rdma/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016). * rdma/mlx5: Fix cache entry update on dereg error (git-fixes) * rdma/mlx5: Fix calculation of total invalidated pages (git-fixes) * rdma/mlx5: Fix mlx5_poll_one() cur_qp update flow (git-fixes) * rdma/mlx5: Fix MR cache initialization error flow (git-fixes) * rdma/mlx5: Handle errors returned from mlx5r_ib_rate() (git-fixes) * rdma/rxe: Fix the failure of ibv_query_device() and ibv_query_device_ex() tests (git-fixes) * Reapply "wifi: ath11k: restore country code during resume" (bsc#1207948). * regulator: check that dummy regulator has been probed before using it (stable-fixes). * regulator: core: Fix deadlock in create_regulator() (git-fixes). * regulator: dummy: force synchronous probing (git-fixes). * Revert "dm: requeue IO if mapping table not yet available" (git-fixes). * Revert "drivers/card_reader/rtsx_usb: Restore interrupt based detection" (git-fixes). * Revert "leds-pca955x: Remove the unused function pca95xx_num_led_regs()" (stable-fixes). * Revert "wifi: ath11k: restore country code during resume" (bsc#1207948). * Revert "wifi: ath11k: support hibernation" (bsc#1207948). * rndis_host: Flag RNDIS modems as WWAN devices (git-fixes). * rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf (bsc#1239986) sle_version was obsoleted for SLE16. It has to be combined with suse_version check. * rpm/release-projects: Update the ALP projects again (bsc#1231293). * s390/stackleak: Use exrl instead of ex in __stackleak_poison() (git-fixes bsc#1239594). * s390/traps: Fix test_monitor_call() inline assembly (git-fixes bsc#1239595). * sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743). * selftests: mptcp: close fd_in before returning in main_loop (git-fixes). * selftests: mptcp: fix incorrect fd checks in main_loop (git-fixes). * selftests/bpf: add fp-leaking precise subprog result tests (git-fixes). * selftests/bpf: Fix flaky selftest lwt_redirect/lwt_reroute (git-fixes). * selftests/bpf: Fix flaky test btf_map_in_map/lookup_update (git-fixes). * selftests/bpf: Prevent client connect before server bind in test_tc_tunnel.sh (git-fixes). * selftests/mm/cow: fix the incorrect error handling (git-fixes). * selftests/x86/syscall: Fix coccinelle WARNING recommending the use of ARRAY_SIZE() (git-fixes). * seq_file: add helper macro to define attribute for rw file (jsc#PED-12416). * slimbus: messaging: Free transaction ID in delayed interrupt scenario (git- fixes). * smb: client: destroy cfid_put_wq on module exit (git-fixes). * soc: imx8m: Remove global soc_uid (stable-fixes). * soc: imx8m: Unregister cpufreq and soc dev in cleanup path (git-fixes). * soc: imx8m: Use devm_* to simplify probe failure handling (stable-fixes). * soc: mediatek: mt8167-mmsys: Fix missing regval in all entries (git-fixes). * soc: mediatek: mt8365-mmsys: Fix routing table masks and values (git-fixes). * soc: qcom: pdr: Fix the potential deadlock (git-fixes). * soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe() (git-fixes). * soundwire: slave: fix an OF node reference leak in soundwire slave device (git-fixes). * spi: cadence-qspi: Fix probe on AM62A LP SK (git-fixes). * spi: microchip-core: Clean up redundant dev_err_probe() (git-fixes). * spi: microchip-core: Use helper function devm_clk_get_enabled() (git-fixes). * splice: do not checksum AF_UNIX sockets (bsc#1240333). * sunrpc: convert RPC_TASK_* constants to enum (git-fixes). * sunrpc: Handle -ETIMEDOUT return from tlshd (git-fixes). * sunrpc: Prevent looping due to rpc_signal_task() races (git-fixes). * sunrpc: suppress warnings for unused procfs functions (git-fixes). * supported.conf: add now-included qat_420xx (external, intel) * tcp: Add memory barrier to tcp_push() (git-fixes). * tcp: add tcp_done_with_error() helper (git-fixes). * tcp: Adjust clamping window for applications specifying SO_RCVBUF (git- fixes). * tcp: adjust rcvq_space after updating scaling ratio (git-fixes). * tcp: Annotate data-race around sk->sk_mark in tcp_v4_send_reset (git-fixes). * tcp: annotate data-races around tp->window_clamp (git-fixes). * tcp: avoid premature drops in tcp_add_backlog() (git-fixes). * tcp: avoid reusing FIN_WAIT2 when trying to find port in connect() process (git-fixes). * tcp: check mptcp-level constraints for backlog coalescing (git-fixes). * tcp: check space before adding MPTCP SYN options (git-fixes). * tcp: clear tp->retrans_stamp in tcp_rcv_fastopen_synack() (git-fixes). * tcp: count CLOSE-WAIT sockets for TCP_MIB_CURRESTAB (git-fixes). * tcp: Defer ts_recent changes until req is owned (git-fixes). * tcp: define initial scaling factor value as a macro (git-fixes). * tcp: derive delack_max from rto_min (git-fixes). * tcp: Do not drop SYN+ACK for simultaneous connect() (git-fixes). * tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6) non- wildcard addresses (git-fixes). * tcp: fix cookie_init_timestamp() overflows (git-fixes). * tcp: fix forever orphan socket caused by tcp_abort (git-fixes). * tcp: fix incorrect parameter validation in the do_tcp_getsockopt() function (git-fixes). * tcp: fix incorrect undo caused by DSACK of TLP retransmit (git-fixes). * tcp: fix mid stream window clamp (git-fixes). * tcp: Fix NEW_SYN_RECV handling in inet_twsk_purge() (git-fixes). * tcp: fix race in tcp_v6_syn_recv_sock() (git-fixes). * tcp: fix race in tcp_write_err() (git-fixes). * tcp: fix races in tcp_abort() (git-fixes). * tcp: fix races in tcp_v_err() (git-fixes). * tcp: fix tcp_enter_recovery() to zero retrans_stamp when it's safe (git- fixes). * tcp: fix tcp_rcv_fastopen_synack() to enter TCP_CA_Loss for failed TFO (git- fixes). * tcp: fix TFO SYN_RECV to not zero retrans_stamp with retransmits out (git- fixes). * tcp: fix to allow timestamp undo if no retransmits were sent (git-fixes). * tcp: increase the default TCP scaling ratio (git-fixes). * tcp: introduce tcp_clock_ms() (git-fixes). * tcp: process the 3rd ACK with sk_socket for TFO/MPTCP (git-fixes). * tcp: reduce accepted window in NEW_SYN_RECV state (git-fixes). * tcp: remove 64 KByte limit for initial tp->rcv_wnd value (git-fixes). * tcp: replace tcp_time_stamp_raw() (git-fixes). * tcp: Update window clamping condition (git-fixes). * thermal: int340x: Add NULL check for adev (git-fixes). * thermal/drivers/rockchip: Add missing rk3328 mapping entry (git-fixes). * tools: move alignment-related macros to new <linux/align.h> (git-fixes). Fix tools/ build breakage introduced by suse commit 3d6cb93162fd "bitmap: introduce generic optimized bitmap_size() (git-fixes)" * tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server bind (git-fixes). * tpm, tpm_tis: Fix timeout handling when waiting for TPM status (git-fixes). * tpm: do not start chip while suspended (git-fixes). * tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870). * ubi: Add a check for ubi_num (git-fixes). * ubi: block: fix null-pointer-dereference in ubiblock_create() (git-fixes). * ubi: block: Fix use-after-free in ubiblock_cleanup (git-fixes). * ubi: correct the calculation of fastmap size (stable-fixes). * ubi: eba: properly rollback inside self_check_eba (git-fixes). * ubi: fastmap: Fix missed ec updating after erasing old fastmap data block (git-fixes). * ubi: fastmap: may_reserve_for_fm: Do not reserve PEB if fm_anchor exists (git-fixes). * ubi: fastmap: wl: Schedule fm_work if wear-leveling pool is empty (git- fixes). * ubi: wl: Put source PEB into correct list if trying locking LEB failed (git- fixes). * upstream: tcp: fix DSACK undo in fast recovery to call tcp_try_to_open() (git-fixes). * usb: atm: cxacru: fix a flaw in existing endpoint checks (git-fixes). * usb: dwc3: gadget: Prevent irq storm when TH re-executes (git-fixes). * usb: gadget: Check bmAttributes only if configuration is valid (git-fixes). * usb: gadget: Fix setting self-powered state on suspend (git-fixes). * usb: gadget: Set self-powered based on MaxPower and bmAttributes (git- fixes). * usb: gadget: u_ether: Set is_suspend flag if remote wakeup fails (git- fixes). * usb: hub: lack of clearing xHC resources (git-fixes). * usb: phy: generic: Use proper helper for property detection (stable-fixes). * usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card Reader (stable-fixes). * usb: renesas_usbhs: Call clk_put() (git-fixes). * usb: renesas_usbhs: Flush the notify_hotplug_work (git-fixes). * usb: renesas_usbhs: Use devm_usb_get_phy() (git-fixes). * usb: serial: ftdi_sio: add support for Altera USB Blaster 3 (stable-fixes). * usb: serial: option: add Telit Cinterion FE990B compositions (stable-fixes). * usb: serial: option: fix Telit Cinterion FE990A name (stable-fixes). * usb: serial: option: match on interface class for Telit FN990B (stable- fixes). * usb: typec: tcpci_rt1711h: Unmask alert interrupts to fix functionality (git-fixes). * usb: typec: ucsi: Fix NULL pointer access (git-fixes). * usb: typec: ucsi: increase timeout for PPM reset operations (git-fixes). * usb: xHCI: add XHCI_RESET_ON_RESUME quirk for Phytium xHCI host (git-fixes). * usb: xhci: Enable the TRB overfetch quirk on VIA VL805 (git-fixes). * usb: xhci: remove 'retval' from xhci_pci_resume() (git-fixes). * vboxsf: fix building with GCC 15 (stable-fixes). * wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode (git- fixes). * wifi: ath11k: choose default PM policy for hibernation (bsc#1207948). * wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in error path (git-fixes). * wifi: ath11k: determine PM policy based on machine model (bsc#1207948). * wifi: ath11k: fix RCU stall while reaping monitor destination ring (git- fixes). * wifi: ath11k: fix wrong overriding for VHT Beamformee STS Capability (git- fixes). * wifi: ath11k: introduce ath11k_core_continue_suspend_resume() (bsc#1207948). * wifi: ath11k: refactor ath11k_core_suspend/_resume() (bsc#1207948). * wifi: ath11k: support non-WoWLAN mode suspend as well (bsc#1207948). * wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path (git-fixes). * wifi: ath12k: encode max Tx power in scan channel list command (git-fixes). * wifi: ath9k: do not submit zero bytes to the entropy pool (git-fixes). * wifi: cfg80211: cancel wiphy_work before freeing wiphy (git-fixes). * wifi: cfg80211: init wiphy_work before allocating rfkill fails (git-fixes). * wifi: iwlwifi: mvm: fix PNVM timeout for non-MSI-X platforms (git-fixes). * wifi: mac80211: fix integer overflow in hwmp_route_info_get() (git-fixes). * wifi: mt76: Add check for devm_kstrdup() (git-fixes). * wifi: mt76: mt7915: fix possible integer overflows in mt7915_muru_stats_show() (git-fixes). * wifi: mt76: mt7925: ensure wow pattern command align fw format (git-fixes). * wifi: mt76: mt7925: fix country count limitation for CLC (git-fixes). * wifi: mt76: mt7925: remove unused acpi function for clc (git-fixes). * wifi: mwifiex: Fix premature release of RF calibration data (git-fixes). * wifi: rtl8xxxu: Perform update_beacon_work when beaconing is enabled (git- fixes). * wifi: rtw89: fw: correct debug message format in rtw89_build_txpwr_trk_tbl_from_elm() (git-fixes). * wifi: rtw89: pci: correct ISR RDU bit for 8922AE (git-fixes). * x86/apic: Provide apic_force_nmi_on_cpu() (git-fixes). * x86/boot: Use __pa_nodebug() in mk_early_pgtbl_32() (git-fixes). * x86/boot/32: De-uglify the 2/3 level paging difference in mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Disable stackprotector and tracing for mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Restructure mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Temporarily map initrd for microcode loading (git-fixes). * x86/coco: Replace 'static const cc_mask' with the newly introduced cc_get_mask() function (git-fixes). * x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu() (git- fixes). * x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers (git-fixes). * x86/entry: Add __init to ia32_emulation_override_cmdline() (git-fixes). * x86/fpu: Fix guest FPU state buffer allocation size (git-fixes). * x86/hyperv: Fix output argument to hypercall that changes page visibility (git-fixes). * x86/hyperv/vtl: Stop kernel from probing VTL0 low memory (git-fixes). * x86/idle: Disable IBRS when CPU is offline to improve single-threaded performance (git-fixes). * x86/microcode: Add per CPU control field (git-fixes). * x86/microcode: Add per CPU result state (git-fixes). * x86/microcode: Clarify the late load logic (git-fixes). * x86/microcode: Clean up mc_cpu_down_prep() (git-fixes). * x86/microcode: Get rid of the schedule work indirection (git-fixes). * x86/microcode: Handle "nosmt" correctly (git-fixes). * x86/microcode: Handle "offline" CPUs correctly (git-fixes). * x86/microcode: Hide the config knob (git-fixes). * x86/microcode: Include vendor headers into microcode.h (git-fixes). * x86/microcode: Make reload_early_microcode() static (git-fixes). * x86/microcode: Mop up early loading leftovers (git-fixes). * x86/microcode: Move core specific defines to local header (git-fixes). * x86/microcode: Prepare for minimal revision check (git-fixes). * x86/microcode: Protect against instrumentation (git-fixes). * x86/microcode: Provide CONFIG_MICROCODE_INITRD32 (git-fixes). * x86/microcode: Provide new control functions (git-fixes). * x86/microcode: Remove microcode_mutex (git-fixes). * x86/microcode: Remove pointless apply() invocation (git-fixes). * x86/microcode: Rendezvous and load in NMI (git-fixes). * x86/microcode: Replace the all-in-one rendevous handler (git-fixes). * x86/microcode: Sanitize __wait_for_cpus() (git-fixes). * x86/microcode/32: Move early loading after paging enable (git-fixes). * x86/microcode/amd: Cache builtin microcode too (git-fixes). * x86/microcode/amd: Cache builtin/initrd microcode early (git-fixes). * x86/microcode/amd: Use cached microcode for AP load (git-fixes). * x86/microcode/amd: Use correct per CPU ucode_cpu_info (git-fixes). * x86/microcode/intel: Add a minimum required revision for late loading (git- fixes). * x86/microcode/intel: Cleanup code further (git-fixes). * x86/microcode/intel: Move microcode functions out of cpu/intel.c (git- fixes). * x86/microcode/intel: Remove debug code (git-fixes). * x86/microcode/intel: Remove pointless mutex (git-fixes). * x86/microcode/intel: Rename get_datasize() since its used externally (git- fixes). * x86/microcode/intel: Reuse intel_cpu_collect_info() git-fixes). * x86/microcode/intel: Rework intel_cpu_collect_info() (git-fixes). * x86/microcode/intel: Rework intel_find_matching_signature() (git-fixes). * x86/microcode/intel: Rip out mixed stepping support for Intel CPUs (git- fixes). * x86/microcode/intel: Save the microcode only after a successful late-load (git-fixes). * x86/microcode/intel: Simplify and rename generic_load_microcode() (git- fixes). * x86/microcode/intel: Simplify early loading (git-fixes). * x86/microcode/intel: Simplify scan_microcode() (git-fixes). * x86/microcode/intel: Switch to kvmalloc() (git-fixes). * x86/microcode/intel: Unify microcode apply() functions (git-fixes). * x86/mm: Remove unused microcode.h include (git-fixes). * x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes). * x86/speculation: Add __update_spec_ctrl() helper (git-fixes). * x86/usercopy: Fix kernel-doc func param name in clean_cache_range()'s description (git-fixes). * xhci: Apply XHCI_RESET_TO_DEFAULT quirk to TGL (git-fixes). * xhci: Cleanup Candence controller PCI device and vendor ID usage (git- fixes). * xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701). * xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701). * xhci: dbc: Check for errors first in xhci_dbc_stop() (git-fixes). * xhci: dbc: Convert to use sysfs_streq() (git-fixes). * xhci: dbc: Drop duplicate checks for dma_free_coherent() (git-fixes). * xhci: dbc: Fix STALL transfer event handling (git-fixes). * xhci: dbc: Replace custom return value with proper Linux error code (git- fixes). * xhci: dbc: Use ATTRIBUTE_GROUPS() (git-fixes). * xhci: dbc: Use sysfs_emit() to instead of scnprintf() (git-fixes). * xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701). * xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701). * xhci: Do not perform Soft Retry for Etron xHCI host (git-fixes). * xhci: pci: Fix indentation in the PCI device ID definitions (stable-fixes). * xhci: pci: Group out Thunderbolt xHCI IDs (git-fixes). * xhci: pci: Use full names in PCI IDs for Intel platforms (git-fixes). * xhci: pci: Use PCI_VENDOR_ID_RENESAS (git-fixes). * xhci: pci: Use standard pattern for device IDs (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1178=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1178=1 * SUSE Real Time Module 15-SP6 zypper in -t patch SUSE-SLE-Module-RT-15-SP6-2025-1178=1 ## Package List: * openSUSE Leap 15.6 (x86_64) * kernel-rt-devel-debuginfo-6.4.0-150600.10.34.1 * kernel-rt-vdso-6.4.0-150600.10.34.1 * kernel-rt-devel-6.4.0-150600.10.34.1 * kernel-rt-extra-6.4.0-150600.10.34.1 * kernel-rt_debug-vdso-6.4.0-150600.10.34.1 * kernel-rt-optional-6.4.0-150600.10.34.1 * kernel-rt_debug-debuginfo-6.4.0-150600.10.34.1 * ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.34.1 * kernel-rt-extra-debuginfo-6.4.0-150600.10.34.1 * cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.34.1 * cluster-md-kmp-rt-6.4.0-150600.10.34.1 * gfs2-kmp-rt-debuginfo-6.4.0-150600.10.34.1 * reiserfs-kmp-rt-debuginfo-6.4.0-150600.10.34.1 * kernel-rt-vdso-debuginfo-6.4.0-150600.10.34.1 * kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.34.1 * dlm-kmp-rt-6.4.0-150600.10.34.1 * kernel-rt-optional-debuginfo-6.4.0-150600.10.34.1 * dlm-kmp-rt-debuginfo-6.4.0-150600.10.34.1 * kselftests-kmp-rt-debuginfo-6.4.0-150600.10.34.1 * kernel-rt-debuginfo-6.4.0-150600.10.34.1 * kernel-rt_debug-vdso-debuginfo-6.4.0-150600.10.34.1 * kernel-rt-livepatch-devel-6.4.0-150600.10.34.1 * kernel-syms-rt-6.4.0-150600.10.34.1 * kselftests-kmp-rt-6.4.0-150600.10.34.1 * kernel-rt-debugsource-6.4.0-150600.10.34.1 * gfs2-kmp-rt-6.4.0-150600.10.34.1 * kernel-rt_debug-debugsource-6.4.0-150600.10.34.1 * reiserfs-kmp-rt-6.4.0-150600.10.34.1 * ocfs2-kmp-rt-6.4.0-150600.10.34.1 * kernel-rt_debug-devel-6.4.0-150600.10.34.1 * openSUSE Leap 15.6 (noarch) * kernel-devel-rt-6.4.0-150600.10.34.1 * kernel-source-rt-6.4.0-150600.10.34.1 * openSUSE Leap 15.6 (nosrc x86_64) * kernel-rt_debug-6.4.0-150600.10.34.1 * kernel-rt-6.4.0-150600.10.34.1 * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-SLE15-SP6-RT_Update_10-debugsource-1-150600.1.5.1 * kernel-livepatch-6_4_0-150600_10_34-rt-1-150600.1.5.1 * kernel-livepatch-6_4_0-150600_10_34-rt-debuginfo-1-150600.1.5.1 * SUSE Real Time Module 15-SP6 (x86_64) * cluster-md-kmp-rt-debuginfo-6.4.0-150600.10.34.1 * cluster-md-kmp-rt-6.4.0-150600.10.34.1 * kernel-rt-debuginfo-6.4.0-150600.10.34.1 * kernel-rt-devel-debuginfo-6.4.0-150600.10.34.1 * gfs2-kmp-rt-6.4.0-150600.10.34.1 * gfs2-kmp-rt-debuginfo-6.4.0-150600.10.34.1 * kernel-rt_debug-devel-6.4.0-150600.10.34.1 * ocfs2-kmp-rt-debuginfo-6.4.0-150600.10.34.1 * kernel-rt_debug-debugsource-6.4.0-150600.10.34.1 * ocfs2-kmp-rt-6.4.0-150600.10.34.1 * kernel-rt-devel-6.4.0-150600.10.34.1 * kernel-rt_debug-devel-debuginfo-6.4.0-150600.10.34.1 * kernel-syms-rt-6.4.0-150600.10.34.1 * dlm-kmp-rt-6.4.0-150600.10.34.1 * kernel-rt-debugsource-6.4.0-150600.10.34.1 * kernel-rt_debug-debuginfo-6.4.0-150600.10.34.1 * dlm-kmp-rt-debuginfo-6.4.0-150600.10.34.1 * SUSE Real Time Module 15-SP6 (noarch) * kernel-devel-rt-6.4.0-150600.10.34.1 * kernel-source-rt-6.4.0-150600.10.34.1 * SUSE Real Time Module 15-SP6 (nosrc x86_64) * kernel-rt_debug-6.4.0-150600.10.34.1 * kernel-rt-6.4.0-150600.10.34.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52831.html * https://www.suse.com/security/cve/CVE-2023-52926.html * https://www.suse.com/security/cve/CVE-2023-52927.html * https://www.suse.com/security/cve/CVE-2024-26634.html * https://www.suse.com/security/cve/CVE-2024-26873.html * https://www.suse.com/security/cve/CVE-2024-35826.html * https://www.suse.com/security/cve/CVE-2024-35910.html * https://www.suse.com/security/cve/CVE-2024-38606.html * https://www.suse.com/security/cve/CVE-2024-41005.html * https://www.suse.com/security/cve/CVE-2024-41077.html * https://www.suse.com/security/cve/CVE-2024-41149.html * https://www.suse.com/security/cve/CVE-2024-42307.html * https://www.suse.com/security/cve/CVE-2024-43820.html * https://www.suse.com/security/cve/CVE-2024-46736.html * https://www.suse.com/security/cve/CVE-2024-46782.html * https://www.suse.com/security/cve/CVE-2024-46796.html * https://www.suse.com/security/cve/CVE-2024-47408.html * https://www.suse.com/security/cve/CVE-2024-47794.html * https://www.suse.com/security/cve/CVE-2024-49571.html * https://www.suse.com/security/cve/CVE-2024-49924.html * https://www.suse.com/security/cve/CVE-2024-49940.html * https://www.suse.com/security/cve/CVE-2024-49994.html * https://www.suse.com/security/cve/CVE-2024-50056.html * https://www.suse.com/security/cve/CVE-2024-50126.html * https://www.suse.com/security/cve/CVE-2024-50140.html * https://www.suse.com/security/cve/CVE-2024-50152.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-52559.html * https://www.suse.com/security/cve/CVE-2024-53057.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53140.html * https://www.suse.com/security/cve/CVE-2024-53163.html * https://www.suse.com/security/cve/CVE-2024-53680.html * https://www.suse.com/security/cve/CVE-2024-54683.html * https://www.suse.com/security/cve/CVE-2024-56638.html * https://www.suse.com/security/cve/CVE-2024-56640.html * https://www.suse.com/security/cve/CVE-2024-56702.html * https://www.suse.com/security/cve/CVE-2024-56703.html * https://www.suse.com/security/cve/CVE-2024-56718.html * https://www.suse.com/security/cve/CVE-2024-56719.html * https://www.suse.com/security/cve/CVE-2024-56751.html * https://www.suse.com/security/cve/CVE-2024-56758.html * https://www.suse.com/security/cve/CVE-2024-56770.html * https://www.suse.com/security/cve/CVE-2024-57807.html * https://www.suse.com/security/cve/CVE-2024-57834.html * https://www.suse.com/security/cve/CVE-2024-57900.html * https://www.suse.com/security/cve/CVE-2024-57947.html * https://www.suse.com/security/cve/CVE-2024-57973.html * https://www.suse.com/security/cve/CVE-2024-57974.html * https://www.suse.com/security/cve/CVE-2024-57978.html * https://www.suse.com/security/cve/CVE-2024-57979.html * https://www.suse.com/security/cve/CVE-2024-57980.html * https://www.suse.com/security/cve/CVE-2024-57981.html * https://www.suse.com/security/cve/CVE-2024-57986.html * https://www.suse.com/security/cve/CVE-2024-57990.html * https://www.suse.com/security/cve/CVE-2024-57993.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-57997.html * https://www.suse.com/security/cve/CVE-2024-57999.html * https://www.suse.com/security/cve/CVE-2024-58002.html * https://www.suse.com/security/cve/CVE-2024-58005.html * https://www.suse.com/security/cve/CVE-2024-58006.html * https://www.suse.com/security/cve/CVE-2024-58007.html * https://www.suse.com/security/cve/CVE-2024-58009.html * https://www.suse.com/security/cve/CVE-2024-58011.html * https://www.suse.com/security/cve/CVE-2024-58012.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2024-58014.html * https://www.suse.com/security/cve/CVE-2024-58017.html * https://www.suse.com/security/cve/CVE-2024-58019.html * https://www.suse.com/security/cve/CVE-2024-58020.html * https://www.suse.com/security/cve/CVE-2024-58034.html * https://www.suse.com/security/cve/CVE-2024-58051.html * https://www.suse.com/security/cve/CVE-2024-58052.html * https://www.suse.com/security/cve/CVE-2024-58054.html * https://www.suse.com/security/cve/CVE-2024-58055.html * https://www.suse.com/security/cve/CVE-2024-58056.html * https://www.suse.com/security/cve/CVE-2024-58057.html * https://www.suse.com/security/cve/CVE-2024-58058.html * https://www.suse.com/security/cve/CVE-2024-58061.html * https://www.suse.com/security/cve/CVE-2024-58063.html * https://www.suse.com/security/cve/CVE-2024-58069.html * https://www.suse.com/security/cve/CVE-2024-58072.html * https://www.suse.com/security/cve/CVE-2024-58076.html * https://www.suse.com/security/cve/CVE-2024-58078.html * https://www.suse.com/security/cve/CVE-2024-58079.html * https://www.suse.com/security/cve/CVE-2024-58080.html * https://www.suse.com/security/cve/CVE-2024-58083.html * https://www.suse.com/security/cve/CVE-2024-58085.html * https://www.suse.com/security/cve/CVE-2024-58086.html * https://www.suse.com/security/cve/CVE-2025-21631.html * https://www.suse.com/security/cve/CVE-2025-21635.html * https://www.suse.com/security/cve/CVE-2025-21659.html * https://www.suse.com/security/cve/CVE-2025-21671.html * https://www.suse.com/security/cve/CVE-2025-21693.html * https://www.suse.com/security/cve/CVE-2025-21701.html * https://www.suse.com/security/cve/CVE-2025-21703.html * https://www.suse.com/security/cve/CVE-2025-21704.html * https://www.suse.com/security/cve/CVE-2025-21706.html * https://www.suse.com/security/cve/CVE-2025-21708.html * https://www.suse.com/security/cve/CVE-2025-21711.html * https://www.suse.com/security/cve/CVE-2025-21714.html * https://www.suse.com/security/cve/CVE-2025-21718.html * https://www.suse.com/security/cve/CVE-2025-21723.html * https://www.suse.com/security/cve/CVE-2025-21726.html * https://www.suse.com/security/cve/CVE-2025-21727.html * https://www.suse.com/security/cve/CVE-2025-21731.html * https://www.suse.com/security/cve/CVE-2025-21732.html * https://www.suse.com/security/cve/CVE-2025-21733.html * https://www.suse.com/security/cve/CVE-2025-21734.html * https://www.suse.com/security/cve/CVE-2025-21735.html * https://www.suse.com/security/cve/CVE-2025-21736.html * https://www.suse.com/security/cve/CVE-2025-21738.html * https://www.suse.com/security/cve/CVE-2025-21739.html * https://www.suse.com/security/cve/CVE-2025-21741.html * https://www.suse.com/security/cve/CVE-2025-21742.html * https://www.suse.com/security/cve/CVE-2025-21743.html * https://www.suse.com/security/cve/CVE-2025-21744.html * https://www.suse.com/security/cve/CVE-2025-21745.html * https://www.suse.com/security/cve/CVE-2025-21749.html * https://www.suse.com/security/cve/CVE-2025-21750.html * https://www.suse.com/security/cve/CVE-2025-21753.html * https://www.suse.com/security/cve/CVE-2025-21754.html * https://www.suse.com/security/cve/CVE-2025-21756.html * https://www.suse.com/security/cve/CVE-2025-21759.html * https://www.suse.com/security/cve/CVE-2025-21760.html * https://www.suse.com/security/cve/CVE-2025-21761.html * https://www.suse.com/security/cve/CVE-2025-21762.html * https://www.suse.com/security/cve/CVE-2025-21763.html * https://www.suse.com/security/cve/CVE-2025-21764.html * https://www.suse.com/security/cve/CVE-2025-21765.html * https://www.suse.com/security/cve/CVE-2025-21766.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21773.html * https://www.suse.com/security/cve/CVE-2025-21775.html * https://www.suse.com/security/cve/CVE-2025-21776.html * https://www.suse.com/security/cve/CVE-2025-21779.html * https://www.suse.com/security/cve/CVE-2025-21780.html * https://www.suse.com/security/cve/CVE-2025-21781.html * https://www.suse.com/security/cve/CVE-2025-21782.html * https://www.suse.com/security/cve/CVE-2025-21784.html * https://www.suse.com/security/cve/CVE-2025-21785.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-21793.html * https://www.suse.com/security/cve/CVE-2025-21794.html * https://www.suse.com/security/cve/CVE-2025-21796.html * https://www.suse.com/security/cve/CVE-2025-21804.html * https://www.suse.com/security/cve/CVE-2025-21810.html * https://www.suse.com/security/cve/CVE-2025-21815.html * https://www.suse.com/security/cve/CVE-2025-21819.html * https://www.suse.com/security/cve/CVE-2025-21820.html * https://www.suse.com/security/cve/CVE-2025-21821.html * https://www.suse.com/security/cve/CVE-2025-21823.html * https://www.suse.com/security/cve/CVE-2025-21825.html * https://www.suse.com/security/cve/CVE-2025-21828.html * https://www.suse.com/security/cve/CVE-2025-21829.html * https://www.suse.com/security/cve/CVE-2025-21830.html * https://www.suse.com/security/cve/CVE-2025-21831.html * https://www.suse.com/security/cve/CVE-2025-21832.html * https://www.suse.com/security/cve/CVE-2025-21835.html * https://www.suse.com/security/cve/CVE-2025-21838.html * https://www.suse.com/security/cve/CVE-2025-21844.html * https://www.suse.com/security/cve/CVE-2025-21846.html * https://www.suse.com/security/cve/CVE-2025-21847.html * https://www.suse.com/security/cve/CVE-2025-21848.html * https://www.suse.com/security/cve/CVE-2025-21850.html * https://www.suse.com/security/cve/CVE-2025-21855.html * https://www.suse.com/security/cve/CVE-2025-21856.html * https://www.suse.com/security/cve/CVE-2025-21857.html * https://www.suse.com/security/cve/CVE-2025-21858.html * https://www.suse.com/security/cve/CVE-2025-21859.html * https://www.suse.com/security/cve/CVE-2025-21861.html * https://www.suse.com/security/cve/CVE-2025-21862.html * https://www.suse.com/security/cve/CVE-2025-21864.html * https://www.suse.com/security/cve/CVE-2025-21865.html * https://www.suse.com/security/cve/CVE-2025-21866.html * https://www.suse.com/security/cve/CVE-2025-21869.html * https://www.suse.com/security/cve/CVE-2025-21870.html * https://www.suse.com/security/cve/CVE-2025-21871.html * https://www.suse.com/security/cve/CVE-2025-21876.html * https://www.suse.com/security/cve/CVE-2025-21877.html * https://www.suse.com/security/cve/CVE-2025-21878.html * https://www.suse.com/security/cve/CVE-2025-21883.html * https://www.suse.com/security/cve/CVE-2025-21885.html * https://www.suse.com/security/cve/CVE-2025-21886.html * https://www.suse.com/security/cve/CVE-2025-21888.html * https://www.suse.com/security/cve/CVE-2025-21890.html * https://www.suse.com/security/cve/CVE-2025-21891.html * https://www.suse.com/security/cve/CVE-2025-21892.html * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1215211 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1221651 * https://bugzilla.suse.com/show_bug.cgi?id=1222649 * https://bugzilla.suse.com/show_bug.cgi?id=1223047 * https://bugzilla.suse.com/show_bug.cgi?id=1224489 * https://bugzilla.suse.com/show_bug.cgi?id=1224610 * https://bugzilla.suse.com/show_bug.cgi?id=1225533 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225770 * https://bugzilla.suse.com/show_bug.cgi?id=1226871 * https://bugzilla.suse.com/show_bug.cgi?id=1227858 * https://bugzilla.suse.com/show_bug.cgi?id=1228653 * https://bugzilla.suse.com/show_bug.cgi?id=1229311 * https://bugzilla.suse.com/show_bug.cgi?id=1229361 * https://bugzilla.suse.com/show_bug.cgi?id=1230497 * https://bugzilla.suse.com/show_bug.cgi?id=1230728 * https://bugzilla.suse.com/show_bug.cgi?id=1230769 * https://bugzilla.suse.com/show_bug.cgi?id=1230832 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231432 * https://bugzilla.suse.com/show_bug.cgi?id=1232364 * https://bugzilla.suse.com/show_bug.cgi?id=1232389 * https://bugzilla.suse.com/show_bug.cgi?id=1232421 * https://bugzilla.suse.com/show_bug.cgi?id=1232743 * https://bugzilla.suse.com/show_bug.cgi?id=1232812 * https://bugzilla.suse.com/show_bug.cgi?id=1232848 * https://bugzilla.suse.com/show_bug.cgi?id=1232895 * https://bugzilla.suse.com/show_bug.cgi?id=1233033 * https://bugzilla.suse.com/show_bug.cgi?id=1233060 * https://bugzilla.suse.com/show_bug.cgi?id=1233259 * https://bugzilla.suse.com/show_bug.cgi?id=1233260 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233551 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233749 * https://bugzilla.suse.com/show_bug.cgi?id=1234222 * https://bugzilla.suse.com/show_bug.cgi?id=1234480 * https://bugzilla.suse.com/show_bug.cgi?id=1234828 * https://bugzilla.suse.com/show_bug.cgi?id=1234936 * https://bugzilla.suse.com/show_bug.cgi?id=1235436 * https://bugzilla.suse.com/show_bug.cgi?id=1235455 * https://bugzilla.suse.com/show_bug.cgi?id=1235501 * https://bugzilla.suse.com/show_bug.cgi?id=1235524 * https://bugzilla.suse.com/show_bug.cgi?id=1235589 * https://bugzilla.suse.com/show_bug.cgi?id=1235591 * https://bugzilla.suse.com/show_bug.cgi?id=1235621 * https://bugzilla.suse.com/show_bug.cgi?id=1235637 * https://bugzilla.suse.com/show_bug.cgi?id=1235698 * https://bugzilla.suse.com/show_bug.cgi?id=1235711 * https://bugzilla.suse.com/show_bug.cgi?id=1235712 * https://bugzilla.suse.com/show_bug.cgi?id=1235715 * https://bugzilla.suse.com/show_bug.cgi?id=1235729 * https://bugzilla.suse.com/show_bug.cgi?id=1235733 * https://bugzilla.suse.com/show_bug.cgi?id=1235761 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1235973 * https://bugzilla.suse.com/show_bug.cgi?id=1236099 * https://bugzilla.suse.com/show_bug.cgi?id=1236111 * https://bugzilla.suse.com/show_bug.cgi?id=1236206 * https://bugzilla.suse.com/show_bug.cgi?id=1236333 * https://bugzilla.suse.com/show_bug.cgi?id=1236692 * https://bugzilla.suse.com/show_bug.cgi?id=1237029 * https://bugzilla.suse.com/show_bug.cgi?id=1237164 * https://bugzilla.suse.com/show_bug.cgi?id=1237313 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237558 * https://bugzilla.suse.com/show_bug.cgi?id=1237562 * https://bugzilla.suse.com/show_bug.cgi?id=1237565 * https://bugzilla.suse.com/show_bug.cgi?id=1237571 * https://bugzilla.suse.com/show_bug.cgi?id=1237853 * https://bugzilla.suse.com/show_bug.cgi?id=1237856 * https://bugzilla.suse.com/show_bug.cgi?id=1237873 * https://bugzilla.suse.com/show_bug.cgi?id=1237875 * https://bugzilla.suse.com/show_bug.cgi?id=1237876 * https://bugzilla.suse.com/show_bug.cgi?id=1237877 * https://bugzilla.suse.com/show_bug.cgi?id=1237881 * https://bugzilla.suse.com/show_bug.cgi?id=1237885 * https://bugzilla.suse.com/show_bug.cgi?id=1237890 * https://bugzilla.suse.com/show_bug.cgi?id=1237894 * https://bugzilla.suse.com/show_bug.cgi?id=1237897 * https://bugzilla.suse.com/show_bug.cgi?id=1237900 * https://bugzilla.suse.com/show_bug.cgi?id=1237906 * https://bugzilla.suse.com/show_bug.cgi?id=1237907 * https://bugzilla.suse.com/show_bug.cgi?id=1237911 * https://bugzilla.suse.com/show_bug.cgi?id=1237912 * https://bugzilla.suse.com/show_bug.cgi?id=1237950 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238474 * https://bugzilla.suse.com/show_bug.cgi?id=1238475 * https://bugzilla.suse.com/show_bug.cgi?id=1238479 * https://bugzilla.suse.com/show_bug.cgi?id=1238494 * https://bugzilla.suse.com/show_bug.cgi?id=1238496 * https://bugzilla.suse.com/show_bug.cgi?id=1238497 * https://bugzilla.suse.com/show_bug.cgi?id=1238500 * https://bugzilla.suse.com/show_bug.cgi?id=1238501 * https://bugzilla.suse.com/show_bug.cgi?id=1238502 * https://bugzilla.suse.com/show_bug.cgi?id=1238503 * https://bugzilla.suse.com/show_bug.cgi?id=1238506 * https://bugzilla.suse.com/show_bug.cgi?id=1238507 * https://bugzilla.suse.com/show_bug.cgi?id=1238510 * https://bugzilla.suse.com/show_bug.cgi?id=1238511 * https://bugzilla.suse.com/show_bug.cgi?id=1238512 * https://bugzilla.suse.com/show_bug.cgi?id=1238521 * https://bugzilla.suse.com/show_bug.cgi?id=1238523 * https://bugzilla.suse.com/show_bug.cgi?id=1238526 * https://bugzilla.suse.com/show_bug.cgi?id=1238528 * https://bugzilla.suse.com/show_bug.cgi?id=1238529 * https://bugzilla.suse.com/show_bug.cgi?id=1238531 * https://bugzilla.suse.com/show_bug.cgi?id=1238532 * https://bugzilla.suse.com/show_bug.cgi?id=1238715 * https://bugzilla.suse.com/show_bug.cgi?id=1238716 * https://bugzilla.suse.com/show_bug.cgi?id=1238734 * https://bugzilla.suse.com/show_bug.cgi?id=1238735 * https://bugzilla.suse.com/show_bug.cgi?id=1238736 * https://bugzilla.suse.com/show_bug.cgi?id=1238738 * https://bugzilla.suse.com/show_bug.cgi?id=1238747 * https://bugzilla.suse.com/show_bug.cgi?id=1238754 * https://bugzilla.suse.com/show_bug.cgi?id=1238757 * https://bugzilla.suse.com/show_bug.cgi?id=1238760 * https://bugzilla.suse.com/show_bug.cgi?id=1238762 * https://bugzilla.suse.com/show_bug.cgi?id=1238763 * https://bugzilla.suse.com/show_bug.cgi?id=1238767 * https://bugzilla.suse.com/show_bug.cgi?id=1238768 * https://bugzilla.suse.com/show_bug.cgi?id=1238771 * https://bugzilla.suse.com/show_bug.cgi?id=1238772 * https://bugzilla.suse.com/show_bug.cgi?id=1238773 * https://bugzilla.suse.com/show_bug.cgi?id=1238775 * https://bugzilla.suse.com/show_bug.cgi?id=1238780 * https://bugzilla.suse.com/show_bug.cgi?id=1238781 * https://bugzilla.suse.com/show_bug.cgi?id=1238785 * https://bugzilla.suse.com/show_bug.cgi?id=1238864 * https://bugzilla.suse.com/show_bug.cgi?id=1238865 * https://bugzilla.suse.com/show_bug.cgi?id=1238876 * https://bugzilla.suse.com/show_bug.cgi?id=1238903 * https://bugzilla.suse.com/show_bug.cgi?id=1238904 * https://bugzilla.suse.com/show_bug.cgi?id=1238905 * https://bugzilla.suse.com/show_bug.cgi?id=1238909 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238917 * https://bugzilla.suse.com/show_bug.cgi?id=1238958 * https://bugzilla.suse.com/show_bug.cgi?id=1238959 * https://bugzilla.suse.com/show_bug.cgi?id=1238963 * https://bugzilla.suse.com/show_bug.cgi?id=1238964 * https://bugzilla.suse.com/show_bug.cgi?id=1238969 * https://bugzilla.suse.com/show_bug.cgi?id=1238971 * https://bugzilla.suse.com/show_bug.cgi?id=1238973 * https://bugzilla.suse.com/show_bug.cgi?id=1238975 * https://bugzilla.suse.com/show_bug.cgi?id=1238978 * https://bugzilla.suse.com/show_bug.cgi?id=1238979 * https://bugzilla.suse.com/show_bug.cgi?id=1238981 * https://bugzilla.suse.com/show_bug.cgi?id=1238984 * https://bugzilla.suse.com/show_bug.cgi?id=1238986 * https://bugzilla.suse.com/show_bug.cgi?id=1238993 * https://bugzilla.suse.com/show_bug.cgi?id=1238994 * https://bugzilla.suse.com/show_bug.cgi?id=1238997 * https://bugzilla.suse.com/show_bug.cgi?id=1239015 * https://bugzilla.suse.com/show_bug.cgi?id=1239016 * https://bugzilla.suse.com/show_bug.cgi?id=1239027 * https://bugzilla.suse.com/show_bug.cgi?id=1239029 * https://bugzilla.suse.com/show_bug.cgi?id=1239030 * https://bugzilla.suse.com/show_bug.cgi?id=1239033 * https://bugzilla.suse.com/show_bug.cgi?id=1239034 * https://bugzilla.suse.com/show_bug.cgi?id=1239036 * https://bugzilla.suse.com/show_bug.cgi?id=1239037 * https://bugzilla.suse.com/show_bug.cgi?id=1239038 * https://bugzilla.suse.com/show_bug.cgi?id=1239039 * https://bugzilla.suse.com/show_bug.cgi?id=1239045 * https://bugzilla.suse.com/show_bug.cgi?id=1239065 * https://bugzilla.suse.com/show_bug.cgi?id=1239068 * https://bugzilla.suse.com/show_bug.cgi?id=1239073 * https://bugzilla.suse.com/show_bug.cgi?id=1239076 * https://bugzilla.suse.com/show_bug.cgi?id=1239080 * https://bugzilla.suse.com/show_bug.cgi?id=1239085 * https://bugzilla.suse.com/show_bug.cgi?id=1239087 * https://bugzilla.suse.com/show_bug.cgi?id=1239095 * https://bugzilla.suse.com/show_bug.cgi?id=1239104 * https://bugzilla.suse.com/show_bug.cgi?id=1239105 * https://bugzilla.suse.com/show_bug.cgi?id=1239109 * https://bugzilla.suse.com/show_bug.cgi?id=1239112 * https://bugzilla.suse.com/show_bug.cgi?id=1239114 * https://bugzilla.suse.com/show_bug.cgi?id=1239115 * https://bugzilla.suse.com/show_bug.cgi?id=1239117 * https://bugzilla.suse.com/show_bug.cgi?id=1239167 * https://bugzilla.suse.com/show_bug.cgi?id=1239174 * https://bugzilla.suse.com/show_bug.cgi?id=1239346 * https://bugzilla.suse.com/show_bug.cgi?id=1239349 * https://bugzilla.suse.com/show_bug.cgi?id=1239435 * https://bugzilla.suse.com/show_bug.cgi?id=1239467 * https://bugzilla.suse.com/show_bug.cgi?id=1239468 * https://bugzilla.suse.com/show_bug.cgi?id=1239471 * https://bugzilla.suse.com/show_bug.cgi?id=1239473 * https://bugzilla.suse.com/show_bug.cgi?id=1239474 * https://bugzilla.suse.com/show_bug.cgi?id=1239477 * https://bugzilla.suse.com/show_bug.cgi?id=1239478 * https://bugzilla.suse.com/show_bug.cgi?id=1239479 * https://bugzilla.suse.com/show_bug.cgi?id=1239481 * https://bugzilla.suse.com/show_bug.cgi?id=1239482 * https://bugzilla.suse.com/show_bug.cgi?id=1239483 * https://bugzilla.suse.com/show_bug.cgi?id=1239484 * https://bugzilla.suse.com/show_bug.cgi?id=1239486 * https://bugzilla.suse.com/show_bug.cgi?id=1239508 * https://bugzilla.suse.com/show_bug.cgi?id=1239512 * https://bugzilla.suse.com/show_bug.cgi?id=1239518 * https://bugzilla.suse.com/show_bug.cgi?id=1239573 * https://bugzilla.suse.com/show_bug.cgi?id=1239594 * https://bugzilla.suse.com/show_bug.cgi?id=1239595 * https://bugzilla.suse.com/show_bug.cgi?id=1239600 * https://bugzilla.suse.com/show_bug.cgi?id=1239605 * https://bugzilla.suse.com/show_bug.cgi?id=1239615 * https://bugzilla.suse.com/show_bug.cgi?id=1239644 * https://bugzilla.suse.com/show_bug.cgi?id=1239707 * https://bugzilla.suse.com/show_bug.cgi?id=1239986 * https://bugzilla.suse.com/show_bug.cgi?id=1239994 * https://bugzilla.suse.com/show_bug.cgi?id=1240169 * https://bugzilla.suse.com/show_bug.cgi?id=1240172 * https://bugzilla.suse.com/show_bug.cgi?id=1240173 * https://bugzilla.suse.com/show_bug.cgi?id=1240175 * https://bugzilla.suse.com/show_bug.cgi?id=1240177 * https://bugzilla.suse.com/show_bug.cgi?id=1240179 * https://bugzilla.suse.com/show_bug.cgi?id=1240182 * https://bugzilla.suse.com/show_bug.cgi?id=1240183 * https://bugzilla.suse.com/show_bug.cgi?id=1240186 * https://bugzilla.suse.com/show_bug.cgi?id=1240188 * https://bugzilla.suse.com/show_bug.cgi?id=1240189 * https://bugzilla.suse.com/show_bug.cgi?id=1240191 * https://bugzilla.suse.com/show_bug.cgi?id=1240192 * https://bugzilla.suse.com/show_bug.cgi?id=1240333 * https://bugzilla.suse.com/show_bug.cgi?id=1240334 * https://jira.suse.com/browse/PED-10701 * https://jira.suse.com/browse/PED-12251 * https://jira.suse.com/browse/PED-12416 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 9 08:33:28 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 09 Apr 2025 08:33:28 -0000 Subject: SUSE-SU-2025:1180-1: important: Security update for the Linux Kernel Message-ID: <174418760813.21179.8160989012116817682@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:1180-1 Release Date: 2025-04-09T07:02:50Z Rating: important References: * bsc#1207948 * bsc#1215199 * bsc#1215211 * bsc#1218470 * bsc#1221651 * bsc#1222649 * bsc#1223047 * bsc#1224489 * bsc#1224610 * bsc#1225533 * bsc#1225742 * bsc#1225770 * bsc#1226871 * bsc#1227858 * bsc#1228653 * bsc#1229311 * bsc#1229361 * bsc#1230497 * bsc#1230728 * bsc#1230769 * bsc#1230832 * bsc#1231293 * bsc#1231432 * bsc#1232364 * bsc#1232389 * bsc#1232421 * bsc#1232743 * bsc#1232812 * bsc#1232848 * bsc#1232895 * bsc#1233033 * bsc#1233060 * bsc#1233259 * bsc#1233260 * bsc#1233479 * bsc#1233551 * bsc#1233557 * bsc#1233749 * bsc#1234222 * bsc#1234480 * bsc#1234828 * bsc#1234936 * bsc#1235436 * bsc#1235455 * bsc#1235501 * bsc#1235524 * bsc#1235589 * bsc#1235591 * bsc#1235621 * bsc#1235637 * bsc#1235698 * bsc#1235711 * bsc#1235712 * bsc#1235715 * bsc#1235729 * bsc#1235733 * bsc#1235761 * bsc#1235870 * bsc#1235973 * bsc#1236099 * bsc#1236111 * bsc#1236206 * bsc#1236333 * bsc#1236692 * bsc#1237029 * bsc#1237164 * bsc#1237313 * bsc#1237530 * bsc#1237558 * bsc#1237562 * bsc#1237565 * bsc#1237571 * bsc#1237853 * bsc#1237856 * bsc#1237873 * bsc#1237875 * bsc#1237876 * bsc#1237877 * bsc#1237881 * bsc#1237885 * bsc#1237890 * bsc#1237894 * bsc#1237897 * bsc#1237900 * bsc#1237906 * bsc#1237907 * bsc#1237911 * bsc#1237912 * bsc#1237950 * bsc#1238212 * bsc#1238474 * bsc#1238475 * bsc#1238479 * bsc#1238494 * bsc#1238496 * bsc#1238497 * bsc#1238500 * bsc#1238501 * bsc#1238502 * bsc#1238503 * bsc#1238506 * bsc#1238507 * bsc#1238510 * bsc#1238511 * bsc#1238512 * bsc#1238521 * bsc#1238523 * bsc#1238526 * bsc#1238528 * bsc#1238529 * bsc#1238531 * bsc#1238532 * bsc#1238715 * bsc#1238716 * bsc#1238734 * bsc#1238735 * bsc#1238736 * bsc#1238738 * bsc#1238747 * bsc#1238754 * bsc#1238757 * bsc#1238760 * bsc#1238762 * bsc#1238763 * bsc#1238767 * bsc#1238768 * bsc#1238771 * bsc#1238772 * bsc#1238773 * bsc#1238775 * bsc#1238780 * bsc#1238781 * bsc#1238785 * bsc#1238864 * bsc#1238865 * bsc#1238876 * bsc#1238903 * bsc#1238904 * bsc#1238905 * bsc#1238909 * bsc#1238911 * bsc#1238917 * bsc#1238958 * bsc#1238959 * bsc#1238963 * bsc#1238964 * bsc#1238969 * bsc#1238971 * bsc#1238973 * bsc#1238975 * bsc#1238978 * bsc#1238979 * bsc#1238981 * bsc#1238984 * bsc#1238986 * bsc#1238993 * bsc#1238994 * bsc#1238997 * bsc#1239015 * bsc#1239016 * bsc#1239027 * bsc#1239029 * bsc#1239030 * bsc#1239033 * bsc#1239034 * bsc#1239036 * bsc#1239037 * bsc#1239038 * bsc#1239039 * bsc#1239045 * bsc#1239065 * bsc#1239068 * bsc#1239073 * bsc#1239076 * bsc#1239080 * bsc#1239085 * bsc#1239087 * bsc#1239095 * bsc#1239104 * bsc#1239105 * bsc#1239109 * bsc#1239112 * bsc#1239114 * bsc#1239115 * bsc#1239117 * bsc#1239167 * bsc#1239174 * bsc#1239346 * bsc#1239349 * bsc#1239435 * bsc#1239467 * bsc#1239468 * bsc#1239471 * bsc#1239473 * bsc#1239474 * bsc#1239477 * bsc#1239478 * bsc#1239479 * bsc#1239481 * bsc#1239482 * bsc#1239483 * bsc#1239484 * bsc#1239486 * bsc#1239508 * bsc#1239512 * bsc#1239518 * bsc#1239573 * bsc#1239594 * bsc#1239595 * bsc#1239600 * bsc#1239605 * bsc#1239615 * bsc#1239644 * bsc#1239707 * bsc#1239986 * bsc#1239994 * bsc#1240169 * bsc#1240172 * bsc#1240173 * bsc#1240175 * bsc#1240177 * bsc#1240179 * bsc#1240182 * bsc#1240183 * bsc#1240186 * bsc#1240188 * bsc#1240189 * bsc#1240191 * bsc#1240192 * bsc#1240333 * bsc#1240334 * jsc#PED-10701 * jsc#PED-12251 * jsc#PED-12416 Cross-References: * CVE-2023-52831 * CVE-2023-52926 * CVE-2023-52927 * CVE-2024-26634 * CVE-2024-26873 * CVE-2024-35826 * CVE-2024-35910 * CVE-2024-38606 * CVE-2024-41005 * CVE-2024-41077 * CVE-2024-41149 * CVE-2024-42307 * CVE-2024-43820 * CVE-2024-46736 * CVE-2024-46782 * CVE-2024-46796 * CVE-2024-47408 * CVE-2024-47794 * CVE-2024-49571 * CVE-2024-49924 * CVE-2024-49940 * CVE-2024-49994 * CVE-2024-50056 * CVE-2024-50126 * CVE-2024-50140 * CVE-2024-50152 * CVE-2024-50290 * CVE-2024-52559 * CVE-2024-53057 * CVE-2024-53063 * CVE-2024-53140 * CVE-2024-53163 * CVE-2024-53680 * CVE-2024-54683 * CVE-2024-56638 * CVE-2024-56640 * CVE-2024-56702 * CVE-2024-56703 * CVE-2024-56718 * CVE-2024-56719 * CVE-2024-56751 * CVE-2024-56758 * CVE-2024-56770 * CVE-2024-57807 * CVE-2024-57834 * CVE-2024-57900 * CVE-2024-57947 * CVE-2024-57973 * CVE-2024-57974 * CVE-2024-57978 * CVE-2024-57979 * CVE-2024-57980 * CVE-2024-57981 * CVE-2024-57986 * CVE-2024-57990 * CVE-2024-57993 * CVE-2024-57996 * CVE-2024-57997 * CVE-2024-57999 * CVE-2024-58002 * CVE-2024-58005 * CVE-2024-58006 * CVE-2024-58007 * CVE-2024-58009 * CVE-2024-58011 * CVE-2024-58012 * CVE-2024-58013 * CVE-2024-58014 * CVE-2024-58017 * CVE-2024-58019 * CVE-2024-58020 * CVE-2024-58034 * CVE-2024-58051 * CVE-2024-58052 * CVE-2024-58054 * CVE-2024-58055 * CVE-2024-58056 * CVE-2024-58057 * CVE-2024-58058 * CVE-2024-58061 * CVE-2024-58063 * CVE-2024-58069 * CVE-2024-58072 * CVE-2024-58076 * CVE-2024-58078 * CVE-2024-58079 * CVE-2024-58080 * CVE-2024-58083 * CVE-2024-58085 * CVE-2024-58086 * CVE-2025-21631 * CVE-2025-21635 * CVE-2025-21659 * CVE-2025-21671 * CVE-2025-21693 * CVE-2025-21701 * CVE-2025-21703 * CVE-2025-21704 * CVE-2025-21706 * CVE-2025-21708 * CVE-2025-21711 * CVE-2025-21714 * CVE-2025-21718 * CVE-2025-21723 * CVE-2025-21726 * CVE-2025-21727 * CVE-2025-21731 * CVE-2025-21732 * CVE-2025-21733 * CVE-2025-21734 * CVE-2025-21735 * CVE-2025-21736 * CVE-2025-21738 * CVE-2025-21739 * CVE-2025-21741 * CVE-2025-21742 * CVE-2025-21743 * CVE-2025-21744 * CVE-2025-21745 * CVE-2025-21749 * CVE-2025-21750 * CVE-2025-21753 * CVE-2025-21754 * CVE-2025-21756 * CVE-2025-21759 * CVE-2025-21760 * CVE-2025-21761 * CVE-2025-21762 * CVE-2025-21763 * CVE-2025-21764 * CVE-2025-21765 * CVE-2025-21766 * CVE-2025-21772 * CVE-2025-21773 * CVE-2025-21775 * CVE-2025-21776 * CVE-2025-21779 * CVE-2025-21780 * CVE-2025-21781 * CVE-2025-21782 * CVE-2025-21784 * CVE-2025-21785 * CVE-2025-21791 * CVE-2025-21793 * CVE-2025-21794 * CVE-2025-21796 * CVE-2025-21804 * CVE-2025-21810 * CVE-2025-21815 * CVE-2025-21819 * CVE-2025-21820 * CVE-2025-21821 * CVE-2025-21823 * CVE-2025-21825 * CVE-2025-21828 * CVE-2025-21829 * CVE-2025-21830 * CVE-2025-21831 * CVE-2025-21832 * CVE-2025-21835 * CVE-2025-21838 * CVE-2025-21844 * CVE-2025-21846 * CVE-2025-21847 * CVE-2025-21848 * CVE-2025-21850 * CVE-2025-21855 * CVE-2025-21856 * CVE-2025-21857 * CVE-2025-21858 * CVE-2025-21859 * CVE-2025-21861 * CVE-2025-21862 * CVE-2025-21864 * CVE-2025-21865 * CVE-2025-21866 * CVE-2025-21869 * CVE-2025-21870 * CVE-2025-21871 * CVE-2025-21876 * CVE-2025-21877 * CVE-2025-21878 * CVE-2025-21883 * CVE-2025-21885 * CVE-2025-21886 * CVE-2025-21888 * CVE-2025-21890 * CVE-2025-21891 * CVE-2025-21892 CVSS scores: * CVE-2023-52831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52926 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-52926 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52926 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52927 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-52927 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2024-26634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26873 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-38606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-38606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-41077 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-41149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41149 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-43820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46736 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2024-46736 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-46782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46782 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46796 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-47408 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47408 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-47794 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-47794 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49571 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49571 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-49924 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-49924 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49924 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-49940 ( SUSE ): 6.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49940 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49994 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50126 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-52559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53163 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53163 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-53163 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53680 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53680 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-54683 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54683 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-54683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56638 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2024-56638 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-56640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56702 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56702 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56703 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56703 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56718 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56718 ( SUSE ): 5.9 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56718 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56751 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2024-56751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-56751 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56758 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56770 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-57807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57834 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57900 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57947 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-57947 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2024-57973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58002 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58007 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-58009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58014 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58017 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58017 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-58017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58034 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58055 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58069 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58080 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58085 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-58085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21631 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21631 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21635 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21659 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21659 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21671 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21671 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21671 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21704 ( SUSE ): 4.1 CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21704 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-21706 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21708 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21711 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21711 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-21711 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21718 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21723 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21726 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21726 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21727 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21731 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21735 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21736 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21736 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21738 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21738 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-21739 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21739 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21741 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21741 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21742 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21743 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21749 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-21749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-21749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21750 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21761 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21761 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21762 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21773 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21775 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21780 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21781 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21782 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21782 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21785 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21785 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21785 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21794 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21820 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21829 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21832 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21844 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21847 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21855 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21856 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21857 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21859 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21866 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21869 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * Legacy Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP6 An update that solves 189 vulnerabilities, contains three features and has 42 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP6 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644). * CVE-2024-35910: tcp: properly terminate timers for kernel sockets (bsc#1224489). * CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active (bsc#1227858). * CVE-2024-46782: ila: call nf_unregister_net_hooks() sooner (bsc#1230769). * CVE-2024-47408: net/smc: check smcd_v2_ext_offset when receiving proposal msg (bsc#1235711). * CVE-2024-47794: kABI: bpf: Prevent tailcall infinite loop caused by freplace kABI workaround (bsc#1235712). * CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg (bsc#1235733). * CVE-2024-49940: kABI fix for l2tp: prevent possible tunnel refcount underflow (bsc#1232812). * CVE-2024-50056: usb: gadget: uvc: Fix ERR_PTR dereference in uvc_v4l2.c (bsc#1232389). * CVE-2024-50140: net: sched: use RCU read-side critical section in taprio_dump() (bsc#1233060). * CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551). * CVE-2024-53140: netlink: terminate outstanding dump on socket close (bsc#1234222). * CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (bsc#1235715). * CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock (bsc#1235729). * CVE-2024-56638: kABI fix for "netfilter: nft_inner: incorrect percpu area handling under softirq" (bsc#1235524). * CVE-2024-56640: net/smc: fix LGR and link use-after-free issue (bsc#1235436). * CVE-2024-56702: bpf: Add tracepoints with null-able arguments (bsc#1235501). * CVE-2024-56703: ipv6: Fix soft lockups in fib6_select_path under high next hop churn (bsc#1235455). * CVE-2024-56718: net/smc: protect link down work from execute after lgr freed (bsc#1235589). * CVE-2024-56719: net: stmmac: fix TSO DMA API usage causing oops (bsc#1235591). * CVE-2024-56751: ipv6: release nexthop on device removal (bsc#1234936). * CVE-2024-56758: btrfs: check folio mapping after unlock in relocate_one_folio() (bsc#1235621). * CVE-2024-56770: net/sched: netem: account for backlog updates from child qdisc (bsc#1235637). * CVE-2024-57900: ila: serialize calls to nf_register_net_hooks() (bsc#1235973). * CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333). * CVE-2024-57974: udp: Deal with race between UDP socket address change and rehash (bsc#1238532). * CVE-2024-57979: kABI workaround for pps changes (bsc#1238521). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076). * CVE-2024-58012: ASoC: SOF: Intel: hda-dai: Ensure DAI widget is valid during params (bsc#1239104). * CVE-2024-58019: nvkm/gsp: correctly advance the read pointer of GSP message queue (bsc#1238997). * CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036). * CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using current->nsproxy (bsc#1236111). * CVE-2025-21659: netdev: prevent accessing NAPI instances from another namespace (bsc#1236206). * CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029). * CVE-2025-21701: net: avoid race between device unregistration and ethnl ops (bsc#1237164). * CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313). * CVE-2025-21706: mptcp: pm: only set fullmesh for subflow endp (bsc#1238528). * CVE-2025-21733: tracing/osnoise: Fix resetting of tracepoints (bsc#1238494). * CVE-2025-21739: kABI: ufshcd: add ufshcd_dealloc_host back (bsc#1238506). * CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875). * CVE-2025-21754: btrfs: fix assertion failure when splitting ordered extent after transaction abort (bsc#1238496). * CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send() (bsc#1238738). * CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb() (bsc#1238763). * CVE-2025-21761: openvswitch: use RCU protection in ovs_vport_cmd_fill_info() (bsc#1238775). * CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780). * CVE-2025-21763: neighbour: use RCU protection in __neigh_notify() (bsc#1237897). * CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss() (bsc#1237906). * CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu() (bsc#1238754). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512). * CVE-2025-21825: selftests/bpf: Add test case for the freeing of bpf_timer (bsc#1238971). * CVE-2025-21844: smb: client: Add check for next_buffer in receive_encrypted_standard() (bsc#1239512). * CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (bsc#1239479). * CVE-2025-21856: s390/ism: add release function for struct device (bsc#1239486). * CVE-2025-21857: net/sched: cls_api: fix error handling causing NULL dereference (bsc#1239478). * CVE-2025-21861: mm/migrate_device: do not add folio to be freed to LRU in migrate_device_finalize() (bsc#1239483). * CVE-2025-21862: drop_monitor: fix incorrect initialization order (bsc#1239474). * CVE-2025-21864: kABI fix for tcp: drop secpath at the same time as we currently drop (bsc#1239482). * CVE-2025-21865: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl() (bsc#1239481). * CVE-2025-21870: ASoC: SOF: ipc4-topology: Harden loops for looking up ALH copiers (bsc#1240191). * CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183). * CVE-2025-21883: ice: Fix deinitializing VF in error path (bsc#1240189). * CVE-2025-21890: idpf: fix checksums set in idpf_rx_rsc() (bsc#1240173). * CVE-2025-21891: ipvlan: ensure network headers are in skb linear part (bsc#1240186). The following non-security bugs were fixed: * accel/qaic: Fix integer overflow in qaic_validate_req() (git-fixes). * accel/qaic: Fix possible data corruption in BOs > 2G (git-fixes). * acpi: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * acpi: resource: IRQ override for Eluktronics MECH-17 (stable-fixes). * af_unix: Annotate data-race of sk->sk_state in unix_stream_read_skb() (bsc#1239435). * af_unix: Disable MSG_OOB handling for sockets in sockmap/sockhash (bsc#1239435). * af_unix: Remove put_pid()/put_cred() in copy_peercred() (bsc#1240334). * alsa: hda: Fix speakers on ASUS EXPERTBOOK P5405CSA 1.0 (stable-fixes). * alsa: hda: intel: Add Dell ALC3271 to power_save denylist (stable-fixes). * alsa: hda: realtek: fix incorrect IS_REACHABLE() usage (git-fixes). * alsa: hda/realtek - add supported Mic Mute LED for Lenovo platform (stable- fixes). * alsa: hda/realtek: Add mute LED quirk for HP Pavilion x360 14-dy1xxx (stable-fixes). * alsa: hda/realtek: Add support for ASUS B3405 and B3605 Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for ASUS B5405 and B5605 Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for ASUS ROG Strix G614 Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for ASUS ROG Strix G814 Laptop using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for ASUS ROG Strix GA603 Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for ASUS Zenbook UM3406KA Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for various ASUS Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Add support for various HP Laptops using CS35L41 HDA (stable-fixes). * alsa: hda/realtek: Always honor no_shutup_pins (git-fixes). * alsa: hda/realtek: Fix Asus Z13 2025 audio (stable-fixes). * alsa: hda/realtek: Fix built-in mic assignment on ASUS VivoBook X515UA (git- fixes). * alsa: hda/realtek: Limit mic boost on Positivo ARN50 (stable-fixes). * alsa: hda/realtek: Remove (revert) duplicate Ally X config (git-fixes). * alsa: hda/realtek: Support mute LED on HP Laptop 15s-du3xxx (stable-fixes). * alsa: hda/realtek: update ALC222 depop optimize (stable-fixes). * alsa: pcm: Drop superfluous NULL check in snd_pcm_format_set_silence() (git- fixes). * alsa: seq: Avoid module auto-load handling at event delivery (stable-fixes). * alsa: usb-audio: Add quirk for Plantronics headsets to fix control names (stable-fixes). * alsa: usb-audio: separate DJM-A9 cap lvl options (git-fixes). * alsa: usx2y: validate nrpacks module parameter on probe (git-fixes). * arm64: cputype: Add MIDR_CORTEX_A76AE (git-fixes) * arm64: dts: freescale: imx8mm-verdin-dahlia: add Microphone Jack to (git- fixes) * arm64: dts: freescale: tqma8mpql: Fix vqmmc-supply (git-fixes) * arm64: dts: rockchip: Add avdd HDMI supplies to RockPro64 board dtsi (git- fixes) * arm64: dts: rockchip: Add missing PCIe supplies to RockPro64 board (git- fixes) * arm64: dts: rockchip: add rs485 support on uart5 of (git-fixes) * arm64: dts: rockchip: fix pinmux of UART0 for PX30 Ringneck on Haikou (git- fixes) * arm64: dts: rockchip: fix pinmux of UART5 for PX30 Ringneck on Haikou (git- fixes) * arm64: dts: rockchip: Fix PWM pinctrl names (git-fixes) * arm64: dts: rockchip: Remove bluetooth node from rock-3a (git-fixes) * arm64: dts: rockchip: Remove undocumented sdmmc property from (git-fixes) * arm64: errata: Add KRYO 2XX/3XX/4XX silver cores to Spectre BHB safe (git- fixes) * arm64: errata: Add newer ARM cores to the spectre_bhb_loop_affected() (git- fixes) * arm64: errata: Add QCOM_KRYO_4XX_GOLD to the spectre_bhb_k24_list (git- fixes) * arm64: errata: Assume that unknown CPUs _are_ vulnerable to Spectre (git- fixes) * arm64: mm: Populate vmemmap at the page level if not section aligned (git- fixes) * arm64: tegra: Remove the Orin NX/Nano suspend key (git-fixes) * asoc: amd: yc: Support mic on another Lenovo ThinkPad E16 Gen 2 model (stable-fixes). * asoc: arizona/madera: use fsleep() in up/down DAPM event delays (stable- fixes). * asoc: codecs: wm0010: Fix error handling path in wm0010_spi_probe() (git- fixes). * asoc: cs35l41: check the return value from spi_setup() (git-fixes). * asoc: ops: Consistently treat platform_max as control value (git-fixes). * asoc: rt722-sdca: add missing readable registers (git-fixes). * asoc: SOF: amd: Handle IPC replies before FW_BOOT_COMPLETE (stable-fixes). * asoc: SOF: Intel: hda: add softdep pre to snd-hda-codec-hdmi module (stable- fixes). * asoc: tas2764: Fix power control mask (stable-fixes). * asoc: tas2764: Set the SDOUT polarity correctly (stable-fixes). * asoc: tas2770: Fix volume scale (stable-fixes). * asoc: ti: j721e-evm: Fix clock configuration for ti,j7200-cpb-audio compatible (git-fixes). * ata: ahci: Add mask_port_map module parameter (git-fixes). * ata: libata-scsi: Check ATA_QCFLAG_RTF_FILLED before using result_tf (git- fixes). * ata: libata-scsi: Remove redundant sense_buffer memsets (git-fixes). * ata: libata: Fix NCQ Non-Data log not supported print (git-fixes). * ata: pata_parport: add custom version of wait_after_reset (git-fixes). * ata: pata_parport: fit3: implement IDE command set registers (git-fixes). * ata: pata_serverworks: Do not use the term blacklist (git-fixes). * ata: sata_highbank: fix OF node reference leak in highbank_initialize_phys() (git-fixes). * ata: sata_sil: Rename sil_blacklist to sil_quirks (git-fixes). * auxdisplay: panel: Fix an API misuse in panel.c (git-fixes). * backlight: led_bl: Hold led_access lock when calling led_sysfs_disable() (git-fixes). * batman-adv: Ignore own maximum aggregation size during RX (git-fixes). * bitmap: introduce generic optimized bitmap_size() (git-fixes). * block: cleanup and fix batch completion adding conditions (git-fixes). * block: do not revert iter for -EIOCBQUEUED (git-fixes). * bluetooth: Fix error code in chan_alloc_skb_cb() (git-fixes). * bluetooth: hci_event: Fix connection regression between LE and non-LE adapters (git-fixes). * bluetooth: hci_event: Fix enabling passive scanning (git-fixes). * bluetooth: HCI: Add definition of hci_rp_remote_name_req_cancel (git-fixes). * bluetooth: Improve setsockopt() handling of malformed user input (git- fixes). * bpf: Avoid kfree_rcu() under lock in bpf_lpm_trie (git-fixes). * bpf: Fix a verifier verbose message (git-fixes). * bpf: prevent r10 register from being marked as precise (git-fixes). * bpf: Replace bpf_lpm_trie_key 0-length array with flexible array (git- fixes). * bpf: Use -Wno-error in certain tests when building with GCC (git-fixes). * broadcom: fix supported flag check in periodic output function (git-fixes). * btrfs: check delayed refs when we're checking if a ref exists (bsc#1239605). * btrfs: do not use btrfs_bio_ctrl for extent buffer writing (bsc#1239045). * btrfs: drop the backref cache during relocation if we commit (bsc#1239605). * btrfs: remove the mirror_num argument to btrfs_submit_compressed_read (bsc#1239045). * btrfs: subpage: fix error handling in end_bio_subpage_eb_writepage (bsc#1239045). * btrfs: use a separate end_io handler for extent_buffer writing (bsc#1239045). * bus: mhi: host: Fix race between unprepare and queue_buf (git-fixes). * bus: mhi: host: pci_generic: Use pci_try_reset_function() to avoid deadlock (git-fixes). * bus: qcom-ssc-block-bus: Fix the error handling path of qcom_ssc_block_bus_probe() (git-fixes). * bus: qcom-ssc-block-bus: Remove some duplicated iounmap() calls (git-fixes). * bus: simple-pm-bus: fix forced runtime PM use (git-fixes). * can: flexcan: disable transceiver during system PM (git-fixes). * can: flexcan: only change CAN state when link up in system PM (git-fixes). * can: rcar_canfd: Fix page entries in the AFL list (git-fixes). * can: ucan: fix out of bound read in strscpy() source (git-fixes). * cdx: Fix possible UAF error in driver_override_show() (git-fixes). * char: misc: deallocate static minor in error path (git-fixes). * clockevents/drivers/i8253: Fix stop sequence for timer 0 (git-fixes). * coredump: Fixes core_pipe_limit sysctl proc_handler (git-fixes). * cppc_cpufreq: Use desired perf if feedback ctrs are 0 or unchanged (bsc#1237856) * cpufreq: cppc: cppc_cpufreq_get_rate() returns zero in all error (bsc#1237856) * cpufreq: cppc: Set fie_disabled to FIE_DISABLED if fails to create (bsc#1237856) * cpufreq/amd-pstate: Fix max_perf updation with schedutil (bsc#1239707). * cpufreq/cppc: Do not compare desired_perf in target() (bsc#1237856) * cpufreq/cppc: Move and rename (bsc#1237856) * cpumask: add cpumask_weight_andnot() (bsc#1239015). * cpumask: define cleanup function for cpumasks (bsc#1239015). * crypto: ccp - Fix check for the primary ASP device (git-fixes). * crypto: ccp - Fix uAPI definitions of PSP errors (git-fixes). * crypto: hisilicon/sec2 - fix for aead auth key length (git-fixes). * crypto: hisilicon/sec2 - fix for aead authsize alignment (git-fixes). * crypto: hisilicon/sec2 - fix for sec spec check (git-fixes). * crypto: iaa - Add global_stats file and remove individual stat files (jsc#PED-12416). * crypto: iaa - Change desc->priv to 0 (jsc#PED-12416). * crypto: iaa - Change iaa statistics to atomic64_t (jsc#PED-12416). * crypto: iaa - Fix comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - fix decomp_bytes_in stats (jsc#PED-12416). * crypto: iaa - fix the missing CRYPTO_ALG_ASYNC in cra_flags (jsc#PED-12416). * crypto: iaa - Remove comp/decomp delay statistics (jsc#PED-12416). * crypto: iaa - Remove header table code (jsc#PED-12416). * crypto: iaa - Remove potential infinite loop in check_completion() (jsc#PED-12416). * crypto: iaa - Remove unnecessary debugfs_create_dir() error check in iaa_crypto_debugfs_init() (jsc#PED-12416). * crypto: iaa - Remove unneeded newline in update_max_adecomp_delay_ns() (jsc#PED-12416). * crypto: iaa - remove unneeded semicolon (jsc#PED-12416). * crypto: iaa - Test the correct request flag (git-fixes). * crypto: iaa - Use cpumask_weight() when rebalancing (jsc#PED-12416). * crypto: iaa - Use kmemdup() instead of kzalloc() and memcpy() (jsc#PED-12416). * crypto: nx - Fix uninitialised hv_nxc on error (git-fixes). * crypto: qat - add admin msgs for telemetry (jsc#PED-12416). * crypto: qat - add auto reset on error (jsc#PED-12416). * crypto: qat - add bank save and restore flows (jsc#PED-12416). * crypto: qat - add fatal error notification (jsc#PED-12416). * crypto: qat - add fatal error notify method (jsc#PED-12416). * crypto: qat - add heartbeat error simulator (jsc#PED-12416). * crypto: qat - add interface for live migration (jsc#PED-12416). * crypto: qat - add support for 420xx devices (jsc#PED-12416). * crypto: qat - add support for device telemetry (jsc#PED-12416). * crypto: qat - add support for ring pair level telemetry (jsc#PED-12416). * crypto: qat - adf_get_etr_base() helper (jsc#PED-12416). * crypto: qat - allow disabling SR-IOV VFs (jsc#PED-12416). * crypto: qat - Avoid -Wflex-array-member-not-at-end warnings (jsc#PED-12416). * crypto: qat - avoid memcpy() overflow warning (jsc#PED-12416). * crypto: qat - change signature of uof_get_num_objs() (jsc#PED-12416). * crypto: qat - Constify struct pm_status_row (jsc#PED-12416). * crypto: qat - disable arbitration before reset (jsc#PED-12416). * crypto: qat - ensure correct order in VF restarting handler (jsc#PED-12416). * crypto: qat - expand CSR operations for QAT GEN4 devices (jsc#PED-12416). * crypto: qat - fix "Full Going True" macro definition (jsc#PED-12416). * crypto: qat - fix arbiter mapping generation algorithm for QAT 402xx (jsc#PED-12416). * crypto: qat - fix comment structure (jsc#PED-12416). * crypto: qat - fix linking errors when PCI_IOV is disabled (jsc#PED-12416). * crypto: qat - Fix missing destroy_workqueue in adf_init_aer() (jsc#PED-12416). * crypto: qat - fix recovery flow for VFs (jsc#PED-12416). * crypto: qat - fix ring to service map for dcc in 420xx (jsc#PED-12416). * crypto: qat - Fix spelling mistake "Invalide" -> "Invalid" (jsc#PED-12416). * crypto: qat - Fix typo "accelaration" (jsc#PED-12416). * crypto: qat - Fix typo (jsc#PED-12416). * crypto: qat - generate dynamically arbiter mappings (jsc#PED-12416). * crypto: qat - implement dh fallback for primes > 4K (jsc#PED-12416). * crypto: qat - implement interface for live migration (jsc#PED-12416). * crypto: qat - improve aer error reset handling (jsc#PED-12416). * crypto: qat - improve error message in adf_get_arbiter_mapping() (jsc#PED-12416). * crypto: qat - include pci.h for GET_DEV() (jsc#PED-12416). * crypto: qat - initialize user_input.lock for rate_limiting (jsc#PED-12416). * crypto: qat - limit heartbeat notifications (jsc#PED-12416). * crypto: qat - make adf_ctl_class constant (jsc#PED-12416). * crypto: qat - make ring to service map common for QAT GEN4 (jsc#PED-12416). * crypto: qat - move fw config related structures (jsc#PED-12416). * crypto: qat - move PFVF compat checker to a function (jsc#PED-12416). * crypto: qat - preserve ADF_GENERAL_SEC (jsc#PED-12416). * crypto: qat - re-enable sriov after pf reset (jsc#PED-12416). * crypto: qat - relocate and rename 4xxx PF2VM definitions (jsc#PED-12416). * crypto: qat - relocate CSR access code (jsc#PED-12416). * crypto: qat - relocate portions of qat_4xxx code (jsc#PED-12416). * crypto: qat - remove access to parity register for QAT GEN4 (git-fixes). * crypto: qat - Remove trailing space after \n newline (jsc#PED-12416). * crypto: qat - remove unnecessary description from comment (jsc#PED-12416). * crypto: qat - remove unused adf_devmgr_get_first (jsc#PED-12416). * crypto: qat - rename get_sla_arr_of_type() (jsc#PED-12416). * crypto: qat - set parity error mask for qat_420xx (git-fixes). * crypto: qat - uninitialized variable in adf_hb_error_inject_write() (jsc#PED-12416). * crypto: qat - update PFVF protocol for recovery (jsc#PED-12416). * crypto: qat - use kcalloc_node() instead of kzalloc_node() (jsc#PED-12416). * crypto: qat - Use static_assert() to check struct sizes (jsc#PED-12416). * crypto: qat - validate slices count returned by FW (jsc#PED-12416). * crypto: qat/qat_420xx - fix off by one in uof_get_name() (jsc#PED-12416). * dlm: prevent NPD when writing a positive value to event_done (git-fixes). * dm array: fix cursor index when skipping across block boundaries (git- fixes). * dm array: fix unreleased btree blocks on closing a faulty array cursor (git- fixes). * dm init: Handle minors larger than 255 (git-fixes). * dm integrity: fix out-of-range warning (git-fixes). * dm persistent data: fix memory allocation failure (git-fixes). * dm resume: do not return EINVAL when signalled (git-fixes). * dm suspend: return -ERESTARTSYS instead of -EINTR (git-fixes). * dm thin: Add missing destroy_work_on_stack() (git-fixes). * dm-crypt: do not update io->sector after kcryptd_crypt_write_io_submit() (git-fixes). * dm-crypt: track tag_offset in convert_context (git-fixes). * dm-delay: fix hung task introduced by kthread mode (git-fixes). * dm-delay: fix max_delay calculations (git-fixes). * dm-delay: fix workqueue delay_timer race (git-fixes). * dm-ebs: do not set the flag DM_TARGET_PASSES_INTEGRITY (git-fixes). * dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature (git- fixes). * dm-integrity: align the outgoing bio in integrity_recheck (git-fixes). * dm-integrity: fix a race condition when accessing recalc_sector (git-fixes). * dm-raid: Fix WARN_ON_ONCE check for sync_thread in raid_resume (git-fixes). * dm-unstriped: cast an operand to sector_t to prevent potential uint32_t overflow (git-fixes). * dm-verity FEC: Fix RS FEC repair for roots unaligned to block size (take 2) (git-fixes). * dm: Fix typo in error message (git-fixes). * dma: kmsan: export kmsan_handle_dma() for modules (git-fixes). * documentation: qat: fix auto_reset attribute details (git-fixes). * documentation: qat: fix auto_reset section (git-fixes). * driver core: Remove needless return in void API device_remove_group() (git- fixes). * drivers: core: fix device leak in __fw_devlink_relax_cycles() (git-fixes). * drivers: hv: vmbus: Do not release fb_mmio resource in vmbus_free_mmio() (git-fixes). * drivers: virt: acrn: hsm: Use kzalloc to avoid info leak in pmcmd_ioctl (git-fixes). * drm: xlnx: zynqmp: Fix max dma segment size (git-fixes). * drm/amd/display: Assign normalized_pix_clk when color depth = 14 (stable- fixes). * drm/amd/display: avoid NPD when ASIC does not support DMUB (git-fixes). * drm/amd/display: Disable PSR-SU on eDP panels (stable-fixes). * drm/amd/display: Disable unneeded hpd interrupts during dm_init (stable- fixes). * drm/amd/display: Fix HPD after gpu reset (stable-fixes). * drm/amd/display: Fix slab-use-after-free on hdcp_work (git-fixes). * drm/amd/display: fix type mismatch in CalculateDynamicMetadataParameters() (git-fixes). * drm/amd/display: Restore correct backlight brightness after a GPU reset (stable-fixes). * drm/amd/display: Use HW lock mgr for PSR1 when only one eDP (git-fixes). * drm/amdgpu: Check extended configuration space register when system uses large bar (stable-fixes). * drm/amdgpu: Fix JPEG video caps max size for navi1x and raven (stable- fixes). * drm/amdgpu: Fix MPEG2, MPEG4 and VC1 video caps max size (stable-fixes). * drm/amdgpu: Replace Mutex with Spinlock for RLCG register access to avoid Priority Inversion in SRIOV (git-fixes). * drm/amdgpu/umsch: declare umsch firmware (git-fixes). * drm/amdkfd: Fix Circular Locking Dependency in 'svm_range_cpu_invalidate_pagetables' (git-fixes). * drm/atomic: Filter out redundant DPMS calls (stable-fixes). * drm/bridge: Fix spelling mistake "gettin" -> "getting" (git-fixes). * drm/bridge: it6505: fix HDCP V match check is not performed correctly (git- fixes). * drm/bridge: ti-sn65dsi86: Fix multiple instances (git-fixes). * drm/dp_mst: Fix drm RAD print (git-fixes). * drm/dp_mst: Fix locking when skipping CSN before topology probing (git- fixes). * drm/gma500: Add NULL check for pci_gfx_root in mid_get_vbt_data() (git- fixes). * drm/hyperv: Fix address space leak when Hyper-V DRM device is removed (git- fixes). * drm/i915/cdclk: Do cdclk post plane programming later (stable-fixes). * drm/i915/ddi: Fix HDMI port width programming in DDI_BUF_CTL (git-fixes). * drm/i915/dsi: Use TRANS_DDI_FUNC_CTL's own port width macro (git-fixes). * drm/i915/xe2lpd: Move D2D enable/disable (stable-fixes). * drm/mediatek: dp: drm_err => dev_err in HPD path to avoid NULL ptr (git- fixes). * drm/mediatek: dsi: fix error codes in mtk_dsi_host_transfer() (git-fixes). * drm/mediatek: mtk_hdmi: Fix typo for aud_sampe_size member (git-fixes). * drm/mediatek: mtk_hdmi: Unregister audio platform device on failure (git- fixes). * drm/msm/a6xx: Fix a6xx indexed-regs in devcoreduump (git-fixes). * drm/msm/a6xx: Fix stale rpmh votes from GPU (git-fixes). * drm/msm/dpu: do not use active in atomic_check() (git-fixes). * drm/msm/dsi: Set PHY usescase (and mode) before registering DSI host (git- fixes). * drm/msm/dsi: Use existing per-interface slice count in DSC timing (git- fixes). * drm/nouveau: Do not override forced connector status (stable-fixes). * drm/panel: ilitek-ili9882t: fix GPIO name in error message (git-fixes). * drm/radeon: Fix rs400_gpu_init for ATI mobility radeon Xpress 200M (stable- fixes). * drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (git- fixes). * drm/radeon/ci_dpm: Remove needless NULL checks of dpm tables (git-fixes). * drm/repaper: fix integer overflows in repeat functions (git-fixes). * drm/sched: Fix fence reference count leak (git-fixes). * drm/ssd130x: ensure ssd132x pitch is correct (git-fixes). * drm/ssd130x: fix ssd132x encoding (git-fixes). * drm/ssd130x: Set SPI .id_table to prevent an SPI core warning (git-fixes). * drm/v3d: Do not run jobs that have errors flagged in its fence (git-fixes). * drm/vkms: Fix use after free and double free on init error (git-fixes). * drm/vkms: Round fixp2int conversion in lerp_u16 (stable-fixes). * dummycon: fix default rows/cols (git-fixes). * eeprom: digsy_mtc: Make GPIO lookup table match the device (git-fixes). * efi/libstub: Bump up EFI_MMAP_NR_SLACK_SLOTS to 32 (bsc#1239349). * fbdev: au1100fb: Move a variable assignment behind a null pointer check (git-fixes). * fbdev: pxafb: Fix possible use after free in pxafb_task() (stable-fixes). * fbdev: sm501fb: Add some geometry checks (git-fixes). * firmware: arm_ffa: Explicitly cast return value from FFA_VERSION before comparison (git-fixes). * firmware: arm_scmi: use ioread64() instead of ioread64_hi_lo() (git-fixes). * firmware: cs_dsp: Remove async regmap writes (git-fixes). * firmware: imx-scu: fix OF node leak in .probe() (git-fixes). * flow_dissector: use RCU protection to fetch dev_net() (bsc#1239994). * gpio: aggregator: protect driver attr handlers against module unload (git- fixes). * gpio: rcar: Fix missing of_node_put() call (git-fixes). * gpio: rcar: Use raw_spinlock to protect register access (stable-fixes). * gpu: host1x: Do not assume that a NULL domain means no DMA IOMMU (git- fixes). * hid: apple: disable Fn key handling on the Omoton KB066 (git-fixes). * hid: apple: fix up the F6 key on the Omoton KB066 keyboard (stable-fixes). * hid: appleir: Fix potential NULL dereference at raw event handle (git- fixes). * hid: Enable playstation driver independently of sony driver (git-fixes). * hid: google: fix unused variable warning under !CONFIG_ACPI (git-fixes). * hid: hid-apple: Apple Magic Keyboard a3203 USB-C support (stable-fixes). * hid: hid-steam: Fix use-after-free when detaching device (git-fixes). * hid: i2c-hid: Skip SET_POWER SLEEP for Cirque touchpad on system suspend (stable-fixes). * hid: ignore non-functional sensor in HP 5MP Camera (stable-fixes). * hid: intel-ish-hid: fix the length of MNG_SYNC_FW_CLOCK in doorbell (stable- fixes). * hid: intel-ish-hid: Fix use-after-free issue in ishtp_hid_remove() (git- fixes). * hid: intel-ish-hid: Send clock sync message immediately after reset (stable- fixes). * hid: remove superfluous (and wrong) Makefile entry for CONFIG_INTEL_ISH_FIRMWARE_DOWNLOADER (git-fixes). * hid: topre: Fix n-key rollover on Realforce R3S TKL boards (stable-fixes). * hwmon: (ad7314) Validate leading zero bits and return error (git-fixes). * hwmon: (ntc_thermistor) Fix the ncpXXxh103 sensor table (git-fixes). * hwmon: (pmbus) Initialise page count in pmbus_identify() (git-fixes). * hwmon: fix a NULL vs IS_ERR_OR_NULL() check in xgene_hwmon_probe() (git- fixes). * i2c: ali1535: Fix an error handling path in ali1535_probe() (git-fixes). * i2c: ali15x3: Fix an error handling path in ali15x3_probe() (git-fixes). * i2c: amd-mp2: drop free_irq() of devm_request_irq() allocated irq (git- fixes). * i2c: omap: fix IRQ storms (git-fixes). * i2c: sis630: Fix an error handling path in sis630_probe() (git-fixes). * i3c: Add NULL pointer check in i3c_master_queue_ibi() (git-fixes). * i3c: master: svc: Fix missing the IBI rules (git-fixes). * i3c: master: svc: Use readsb helper for reading MDB (git-fixes). * ib/mad: Check available slots before posting receive WRs (git-fixes) * ice: Remove and readd netdev during devlink reload (bsc#1230497 bsc#1239518). * iio: accel: mma8452: Ensure error return on failure to matching oversampling ratio (git-fixes). * iio: accel: msa311: Fix failure to release runtime pm if direct mode claim fails (git-fixes). * iio: adc: ad4130: Fix comparison of channel setups (git-fixes). * iio: adc: ad7124: Fix comparison of channel configs (git-fixes). * iio: adc: at91-sama5d2_adc: fix sama7g5 realbits value (git-fixes). * iio: dac: ad3552r: clear reset status flag (git-fixes). * iio: filter: admv8818: Force initialization of SDO (git-fixes). * include: net: add static inline dst_dev_overhead() to dst.h (git-fixes). * include/linux/mmzone.h: clean up watermark accessors (bsc#1239600). * init: add initramfs_internal.h (bsc#1232848). * initramfs: allocate heap buffers together (bsc#1232848). * initramfs: fix hardlink hash leak without TRAILER (bsc#1232848). * input: ads7846 - fix gpiod allocation (git-fixes). * input: i8042 - add required quirks for missing old boardnames (stable- fixes). * input: i8042 - swap old quirk combination with new quirk for more devices (stable-fixes). * input: i8042 - swap old quirk combination with new quirk for NHxxRZQ (stable-fixes). * input: i8042 - swap old quirk combination with new quirk for several devices (stable-fixes). * input: iqs7222 - add support for Azoteq IQS7222D (git-fixes). * input: iqs7222 - add support for IQS7222D v1.1 and v1.2 (git-fixes). * input: iqs7222 - preserve system status register (git-fixes). * input: xpad - add 8BitDo SN30 Pro, Hyperkin X91 and Gamesir G7 SE controllers (stable-fixes). * input: xpad - add multiple supported devices (stable-fixes). * input: xpad - add support for TECNO Pocket Go (stable-fixes). * input: xpad - add support for ZOTAC Gaming Zone (stable-fixes). * input: xpad - rename QH controller to Legion Go S (stable-fixes). * intel_idle: Add ibrs_off module parameter to force-disable IBRS (git-fixes). * intel_idle: Use __update_spec_ctrl() in intel_idle_ibrs() (git-fixes). * intel_th: pci: Add Arrow Lake support (stable-fixes). * intel_th: pci: Add Panther Lake-H support (stable-fixes). * intel_th: pci: Add Panther Lake-P/U support (stable-fixes). * ioam6: improve checks on user data (git-fixes). * iommu/vt-d: Fix suspicious RCU usage (git-fixes). * ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994). * ipv4: use RCU protection in inet_select_addr() (bsc#1239994). * ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994). * ipv4: use RCU protection in ipv4_default_advmss() (bsc#1239994). * ipv4: use RCU protection in rt_is_expired() (bsc#1239994). * ipv6: annotate data-races around cnf.disable_ipv6 (git-fixes). * ipv6: avoid atomic fragment on GSO packets (git-fixes). * ipv6: Ensure natural alignment of const ipv6 loopback and router addresses (git-fixes). * ipv6: fib: hide unused 'pn' variable (git-fixes). * ipv6: fib6_rules: flush route cache when rule is changed (git-fixes). * ipv6: Fix memleak of nhc_pcpu_rth_output in fib_check_nh_v6_gw() (git- fixes). * ipv6: fix ndisc_is_useropt() handling for PIO (git-fixes). * ipv6: fix potential NULL deref in fib6_add() (git-fixes). * ipv6: icmp: convert to dev_net_rcu() (bsc#1239994). * ipv6: introduce dst_rt6_info() helper (git-fixes). * ipv6: ioam: block BH from ioam6_output() (git-fixes). * ipv6: properly combine dev_base_seq and ipv6.dev_addr_genid (git-fixes). * ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * ipv6: Set errno after ip_fib_metrics_init() in ip6_route_info_create() (git- fixes). * ipv6: sr: add missing seg6_local_exit (git-fixes). * ipv6: sr: block BH in seg6_output_core() and seg6_input_core() (git-fixes). * ipv6: take care of scope when choosing the src addr (git-fixes). * ipv6: Use RCU in ip6_input() (bsc#1239994). * jfs: add check read-only before truncation in jfs_truncate_nolock() (git- fixes). * jfs: add check read-only before txBeginAnon() call (git-fixes). * jfs: add index corruption check to DT_GETPAGE() (git-fixes). * jfs: fix slab-out-of-bounds read in ea_get() (git-fixes). * jfs: reject on-disk inodes of an unsupported type (git-fixes). * kABI fix for ipv6: remove hard coded limitation on ipv6_pinfo (git-fixes). * kABI fix for net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * kABI fix for netlink: terminate outstanding dump on socket close (git- fixes). * kABI fix for RDMA/core: Do not expose hw_counters outside (git-fixes) * kABI fix for tcp: fix cookie_init_timestamp() overflows (git-fixes). * kABI fix for tcp: replace tcp_time_stamp_raw() (git-fixes). * kABI workaround for intel-ish-hid (git-fixes). * kABI workaround for soc_mixer_control changes (git-fixes). * kbuild: hdrcheck: fix cross build with clang (git-fixes). * kunit: qemu_configs: sparc: use Zilog console (git-fixes). * l2tp: fix ICMP error handling for UDP-encap sockets (git-fixes). * l2tp: fix incorrect parameter validation in the pppol2tp_getsockopt() function (git-fixes). * l2tp: fix lockdep splat (git-fixes). * leds: rgb: leds-qcom-lpg: Fix calculation of best period Hi-Res PWMs (git- fixes). * leds: rgb: leds-qcom-lpg: Fix pwm resolution max for Hi-Res PWMs (git- fixes). * lib: 842: Improve error handling in sw842_compress() (git-fixes). * lockdep: Do not disable interrupts on RT in disable_irq_nosync_lockdep.*() (git-fixes). * mdacon: rework dependency list (git-fixes). * media: i2c: adv748x: Fix test pattern selection mask (git-fixes). * media: i2c: ccs: Set the device's runtime PM status correctly in remove (git-fixes). * media: i2c: ov7251: Introduce 1 ms delay between regulators and en GPIO (git-fixes). * media: i2c: ov7251: Set enable GPIO low in probe (git-fixes). * media: platform: allgro-dvt: unregister v4l2_device on the error path (git- fixes). * media: platform: stm32: Add check for clk_enable() (git-fixes). * media: siano: Fix error handling in smsdvb_module_init() (git-fixes). * media: streamzap: fix race between device disconnection and urb callback (git-fixes). * media: streamzap: prevent processing IR data on URB failure (git-fixes). * media: v4l2-dv-timings: prevent possible overflow in v4l2_detect_gtf() (git- fixes). * media: venus: hfi_parser: add check to avoid out of bound access (git- fixes). * media: venus: hfi_parser: refactor hfi packet parsing logic (git-fixes). * media: venus: hfi: add a check to handle OOB in sfr region (git-fixes). * media: venus: hfi: add check to handle incorrect queue size (git-fixes). * media: verisilicon: HEVC: Initialize start_bit field (git-fixes). * media: vim2m: print device name after registering device (git-fixes). * media: visl: Fix ERANGE error when setting enum controls (git-fixes). * mei: me: add panther lake P DID (stable-fixes). * memblock tests: fix warning: "__ALIGN_KERNEL" redefined (git-fixes). * memory: mtk-smi: Add ostd setting for mt8192 (git-fixes). * memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (git-fixes). * mfd: ene-kb3930: Fix a potential NULL pointer dereference (git-fixes). * mfd: sm501: Switch to BIT() to mitigate integer overflows (git-fixes). * mfd: syscon: Add of_syscon_register_regmap() API (stable-fixes). * mfd: syscon: Fix race in device_node_get_regmap() (git-fixes). * mfd: syscon: Remove extern from function prototypes (stable-fixes). * mfd: syscon: Use scoped variables with memory allocators to simplify error paths (stable-fixes). * mm: accept to promo watermark (bsc#1239600). * mm: create promo_wmark_pages and clean up open-coded sites (bsc#1239600). * mm: fix endless reclaim on machines with unaccepted memory (bsc#1239600). * mm: zswap: move allocations during CPU init outside the lock (git-fixes). * mm/page_alloc: fix memory accept before watermarks gets initialized (bsc#1239600). * mmc: atmel-mci: Add missing clk_disable_unprepare() (git-fixes). * mmc: omap: Fix memory leak in mmc_omap_new_slot (git-fixes). * mmc: sdhci-brcmstb: add cqhci suspend/resume to PM ops (git-fixes). * mmc: sdhci-omap: Disable MMC_CAP_AGGRESSIVE_PM for eMMC/SD (git-fixes). * mtd: Add check for devm_kcalloc() (git-fixes). * mtd: nand: Fix a kdoc comment (git-fixes). * mtd: rawnand: brcmnand: fix PM resume warning (git-fixes). * mtd: Replace kcalloc() with devm_kcalloc() (git-fixes). * ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994). * ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994). * net l2tp: drop flow hash on forward (git-fixes). * net_sched: Prevent creation of classes with TC_H_ROOT (git-fixes). * net_sched: sch_sfq: annotate data-races around q->perturb_period (git- fixes). * net_sched: sch_sfq: handle bigger packets (git-fixes). * net: add dev_net_rcu() helper (bsc#1239994). * net: constify sk_dst_get() and __sk_dst_get() argument (git-fixes). * net: ipv6: fix dst ref loop in ila lwtunnel (git-fixes). * net: ipv6: fix dst ref loop on input in rpl lwt (git-fixes). * net: ipv6: fix dst ref loop on input in seg6 lwt (git-fixes). * net: ipv6: fix dst refleaks in rpl, seg6 and ioam6 lwtunnels (git-fixes). * net: ipv6: fix missing dst ref drop in ila lwtunnel (git-fixes). * net: ipv6: fix wrong start position when receive hop-by-hop fragment (git- fixes). * net: ipv6: ioam6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: ioam6: code alignment (git-fixes). * net: ipv6: ioam6: new feature tunsrc (git-fixes). * net: ipv6: rpl_iptunnel: block BH in rpl_output() and rpl_input() (git- fixes). * net: ipv6: rpl_iptunnel: Fix memory leak in rpl_input (git-fixes). * net: ipv6: rpl_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: seg6_iptunnel: mitigate 2-realloc issue (git-fixes). * net: ipv6: select DST_CACHE from IPV6_RPL_LWTUNNEL (git-fixes). * net: ipv6: support reporting otherwise unknown prefix flags in RTM_NEWPREFIX (git-fixes). * net: mana: add a function to spread IRQs per CPUs (bsc#1239015). * net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016). * net: mana: Allow variable size indirection table (bsc#1239016). * net: mana: Assigning IRQ affinity on HT cores (bsc#1239015). * net: mana: Avoid open coded arithmetic (bsc#1239016). * net: mana: cleanup mana struct after debugfs_remove() (git-fixes). * net: mana: Fix irq_contexts memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Fix memory leak in mana_gd_setup_irqs (bsc#1239015). * net: mana: Support holes in device list reply msg (git-fixes). * net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480). * net: use unrcu_pointer() helper (git-fixes). * net: wwan: mhi_wwan_mbim: Silence sequence number glitch errors (stable- fixes). * net/sched: act_api: deny mismatched skip_sw/skip_hw flags for actions created by classifiers (git-fixes). * net/sched: act_api: rely on rcu in tcf_idr_check_alloc (git-fixes). * net/sched: adjust device watchdog timer to detect stopped queue at right time (git-fixes). * net/sched: cbs: Fix integer overflow in cbs_set_port_rate() (git-fixes). * net/sched: cls_u32: replace int refcounts with proper refcounts (git-fixes). * net/sched: flower: Add lock protection when remove filter handle (git- fixes). * net/sched: taprio: make q->picos_per_byte available to fill_sched_entry() (git-fixes). * net/sched: tbf: correct backlog statistic for GSO packets (git-fixes). * nfsd: clear acl_access/acl_default after releasing them (git-fixes). * nvme-fc: do not ignore connectivity loss during connecting (git-fixes bsc#1222649). Refresh: - patches.suse/nvme-fc-use-ctrl-state-getter.patch * nvme-fc: go straight to connecting state when initializing (git-fixes bsc#1222649). * nvme-fc: rely on state transitions to handle connectivity loss (git-fixes bsc#1222649). * nvme-ioctl: fix leaked requests on mapping error (git-fixes). * nvme-pci: quirk Acer FA100 for non-uniqueue identifiers (git-fixes). * nvme-pci: remove stale comment (git-fixes). * nvme-tcp: add basic support for the C2HTermReq PDU (git-fixes). * nvme-tcp: Fix a C2HTermReq error message (git-fixes). * nvme-tcp: fix potential memory corruption in nvme_tcp_recv_pdu() (git- fixes). * nvme-tcp: fix signedness bug in nvme_tcp_init_connection() (git-fixes). * nvme: introduce nvme_disk_is_ns_head helper (git-fixes). * nvme: move error logging from nvme_end_req() to __nvme_end_req() (git- fixes). * nvme: move passthrough logging attribute to head (git-fixes). * nvme: only allow entering LIVE from CONNECTING state (git-fixes bsc#1222649). * nvmet-fc: Remove unused functions (git-fixes). * nvmet-rdma: recheck queue state is LIVE in state lock in recv done (git- fixes). * nvmet-tcp: Fix a possible sporadic response drops in weakly ordered arch (git-fixes). * nvmet: remove old function prototype (git-fixes). * ocfs2: check dir i_size in ocfs2_find_entry (git-fixes). * ocfs2: fix deadlock in ocfs2_get_system_file_inode (git-fixes). * ocfs2: handle a symlink read error correctly (git-fixes). * ocfs2: mark dquot as inactive if failed to start trans while releasing dquot (git-fixes). * ocfs2: update seq_file index in ocfs2_dlm_seq_next (git-fixes). * orangefs: fix a oob in orangefs_debug_write (git-fixes). * packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251). * padata: fix sysfs store callback check (git-fixes). * partitions: mac: fix handling of bogus partition table (git-fixes). * pci: Avoid reset when disabled via sysfs (git-fixes). * pci: brcmstb: Fix error path after a call to regulator_bulk_get() (git- fixes). * pci: brcmstb: Fix missing of_node_put() in brcm_pcie_probe() (git-fixes). * pci: brcmstb: Fix potential premature regulator disabling (git-fixes). * pci: brcmstb: Set generation limit before PCIe link up (git-fixes). * pci: brcmstb: Use internal register to change link capability (git-fixes). * pci: cadence-ep: Fix the driver to send MSG TLP for INTx without data payload (git-fixes). * pci: dwc: ep: Return -ENOMEM for allocation failures (git-fixes). * pci: Fix reference leak in pci_alloc_child_bus() (git-fixes). * pci: pciehp: Do not enable HPIE when resuming in poll mode (git-fixes). * pci: Remove stray put_device() in pci_register_host_bridge() (git-fixes). * pci: xilinx-cpm: Fix IRQ domain leak in error path of probe (git-fixes). * pci/ACS: Fix 'pci=config_acs=' parameter (git-fixes). * pci/ASPM: Fix link state exit during switch upstream function removal (git- fixes). * pci/DOE: Poll DOE Busy bit for up to 1 second in pci_doe_send_req() (bsc#1237853) * pci/DOE: Support discovery version 2 (bsc#1237853) * pci/portdrv: Only disable pciehp interrupts early when needed (git-fixes). * pinctrl: bcm281xx: Fix incorrect regmap max_registers value (git-fixes). * pinctrl: intel: Fix wrong bypass assignment in intel_pinctrl_probe_pwm() (git-fixes). * pinctrl: qcom: Clear latched interrupt status when changing IRQ type (git- fixes). * pinctrl: renesas: rza2: Fix missing of_node_put() call (git-fixes). * pinctrl: renesas: rzv2m: Fix missing of_node_put() call (git-fixes). * pinctrl: tegra: Set SFIO mode to Mux Register (git-fixes). * platform/x86: dell-ddv: Fix temperature calculation (git-fixes). * platform/x86: thinkpad_acpi: Add battery quirk for ThinkPad X131e (stable- fixes). * platform/x86: thinkpad_acpi: Fix invalid fan speed on ThinkPad X120e (stable-fixes). * platform/x86: thinkpad_acpi: Support for V9 DYTC platform profiles (stable- fixes). * platform/x86/intel: pmc: fix ltr decode in pmc_core_ltr_show() (stable- fixes). * pm: sleep: Adjust check before setting power.must_resume (git-fixes). * pm: sleep: Fix handling devices with direct_complete set on errors (git- fixes). * pnfs/flexfiles: retry getting layout segment for reads (git-fixes). * power: supply: max77693: Fix wrong conversion of charge input threshold value (git-fixes). * powerpc: Stop using no_llseek (bsc#1239573). * powerpc/pseries/eeh: Fix pseries_eeh_err_inject (bsc#1239573). * powerpc/pseries/eeh: move pseries_eeh_err_inject() outside CONFIG_DEBUG_FS block (bsc#1239573). * powerpc/pseries/iommu: memory notifier incorrectly adds TCEs for pmemory (bsc#1239167 ltc#211055). * rapidio: add check for rio_add_net() in rio_scan_alloc_net() (git-fixes). * rapidio: fix an API misues when rio_add_net() fails (git-fixes). * ras: Avoid build errors when CONFIG_DEBUG_FS=n (jsc#PED-7619). Replace our patch with the upstream version. * rdma/bnxt_re: Add missing paranthesis in map_qp_id_to_tbl_indx (git-fixes) * rdma/bnxt_re: Avoid clearing VLAN_ID mask in modify qp path (git-fixes) * rdma/core: Do not expose hw_counters outside of init net namespace (git- fixes) * rdma/erdma: Prevent use-after-free in erdma_accept_newconn() (git-fixes) * rdma/hns: Fix a missing rollback in error path of hns_roce_create_qp_common() (git-fixes) * rdma/hns: Fix missing xa_destroy() (git-fixes) * rdma/hns: Fix soft lockup during bt pages loop (git-fixes) * rdma/hns: Fix unmatched condition in error path of alloc_user_qp_db() (git- fixes) * rdma/hns: Fix wrong value of max_sge_rd (git-fixes) * rdma/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016). * rdma/mlx5: Fix cache entry update on dereg error (git-fixes) * rdma/mlx5: Fix calculation of total invalidated pages (git-fixes) * rdma/mlx5: Fix mlx5_poll_one() cur_qp update flow (git-fixes) * rdma/mlx5: Fix MR cache initialization error flow (git-fixes) * rdma/mlx5: Handle errors returned from mlx5r_ib_rate() (git-fixes) * rdma/rxe: Fix the failure of ibv_query_device() and ibv_query_device_ex() tests (git-fixes) * reapply "wifi: ath11k: restore country code during resume" (bsc#1207948). * regulator: check that dummy regulator has been probed before using it (stable-fixes). * regulator: core: Fix deadlock in create_regulator() (git-fixes). * regulator: dummy: force synchronous probing (git-fixes). * revert "dm: requeue IO if mapping table not yet available" (git-fixes). * revert "drivers/card_reader/rtsx_usb: Restore interrupt based detection" (git-fixes). * revert "leds-pca955x: Remove the unused function pca95xx_num_led_regs()" (stable-fixes). * revert "wifi: ath11k: restore country code during resume" (bsc#1207948). * revert "wifi: ath11k: support hibernation" (bsc#1207948). * rndis_host: Flag RNDIS modems as WWAN devices (git-fixes). * rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf (bsc#1239986) * rpm/release-projects: Update the ALP projects again (bsc#1231293). * s390/stackleak: Use exrl instead of ex in __stackleak_poison() (git-fixes bsc#1239594). * s390/traps: Fix test_monitor_call() inline assembly (git-fixes bsc#1239595). * sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743). * selftests: mptcp: close fd_in before returning in main_loop (git-fixes). * selftests: mptcp: fix incorrect fd checks in main_loop (git-fixes). * selftests/bpf: add fp-leaking precise subprog result tests (git-fixes). * selftests/bpf: Fix flaky selftest lwt_redirect/lwt_reroute (git-fixes). * selftests/bpf: Fix flaky test btf_map_in_map/lookup_update (git-fixes). * selftests/bpf: Prevent client connect before server bind in test_tc_tunnel.sh (git-fixes). * selftests/mm/cow: fix the incorrect error handling (git-fixes). * selftests/x86/syscall: Fix coccinelle WARNING recommending the use of ARRAY_SIZE() (git-fixes). * seq_file: add helper macro to define attribute for rw file (jsc#PED-12416). * slimbus: messaging: Free transaction ID in delayed interrupt scenario (git- fixes). * smb: client: destroy cfid_put_wq on module exit (git-fixes). * soc: imx8m: Remove global soc_uid (stable-fixes). * soc: imx8m: Unregister cpufreq and soc dev in cleanup path (git-fixes). * soc: imx8m: Use devm_* to simplify probe failure handling (stable-fixes). * soc: mediatek: mt8167-mmsys: Fix missing regval in all entries (git-fixes). * soc: mediatek: mt8365-mmsys: Fix routing table masks and values (git-fixes). * soc: qcom: pdr: Fix the potential deadlock (git-fixes). * soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe() (git-fixes). * soundwire: slave: fix an OF node reference leak in soundwire slave device (git-fixes). * spi: cadence-qspi: Fix probe on AM62A LP SK (git-fixes). * spi: microchip-core: Clean up redundant dev_err_probe() (git-fixes). * spi: microchip-core: Use helper function devm_clk_get_enabled() (git-fixes). * splice: do not checksum AF_UNIX sockets (bsc#1240333). * sunrpc: convert RPC_TASK_* constants to enum (git-fixes). * sunrpc: Handle -ETIMEDOUT return from tlshd (git-fixes). * sunrpc: Prevent looping due to rpc_signal_task() races (git-fixes). * sunrpc: suppress warnings for unused procfs functions (git-fixes). * supported.conf: add now-included qat_420xx (external, intel) * tcp: Add memory barrier to tcp_push() (git-fixes). * tcp: add tcp_done_with_error() helper (git-fixes). * tcp: Adjust clamping window for applications specifying SO_RCVBUF (git- fixes). * tcp: adjust rcvq_space after updating scaling ratio (git-fixes). * tcp: Annotate data-race around sk->sk_mark in tcp_v4_send_reset (git-fixes). * tcp: annotate data-races around tp->window_clamp (git-fixes). * tcp: avoid premature drops in tcp_add_backlog() (git-fixes). * tcp: avoid reusing FIN_WAIT2 when trying to find port in connect() process (git-fixes). * tcp: check mptcp-level constraints for backlog coalescing (git-fixes). * tcp: check space before adding MPTCP SYN options (git-fixes). * tcp: clear tp->retrans_stamp in tcp_rcv_fastopen_synack() (git-fixes). * tcp: count CLOSE-WAIT sockets for TCP_MIB_CURRESTAB (git-fixes). * tcp: Defer ts_recent changes until req is owned (git-fixes). * tcp: define initial scaling factor value as a macro (git-fixes). * tcp: derive delack_max from rto_min (git-fixes). * tcp: Do not drop SYN+ACK for simultaneous connect() (git-fixes). * tcp: Fix bind() regression for v6-only wildcard and v4(-mapped-v6) non- wildcard addresses (git-fixes). * tcp: fix cookie_init_timestamp() overflows (git-fixes). * tcp: fix DSACK undo in fast recovery to call tcp_try_to_open() (git-fixes). * tcp: fix forever orphan socket caused by tcp_abort (git-fixes). * tcp: fix incorrect parameter validation in the do_tcp_getsockopt() function (git-fixes). * tcp: fix incorrect undo caused by DSACK of TLP retransmit (git-fixes). * tcp: fix mid stream window clamp (git-fixes). * tcp: Fix NEW_SYN_RECV handling in inet_twsk_purge() (git-fixes). * tcp: fix race in tcp_v6_syn_recv_sock() (git-fixes). * tcp: fix race in tcp_write_err() (git-fixes). * tcp: fix races in tcp_abort() (git-fixes). * tcp: fix races in tcp_v_err() (git-fixes). * tcp: fix tcp_enter_recovery() to zero retrans_stamp when it's safe (git- fixes). * tcp: fix tcp_rcv_fastopen_synack() to enter TCP_CA_Loss for failed TFO (git- fixes). * tcp: fix TFO SYN_RECV to not zero retrans_stamp with retransmits out (git- fixes). * tcp: fix to allow timestamp undo if no retransmits were sent (git-fixes). * tcp: increase the default TCP scaling ratio (git-fixes). * tcp: introduce tcp_clock_ms() (git-fixes). * tcp: process the 3rd ACK with sk_socket for TFO/MPTCP (git-fixes). * tcp: reduce accepted window in NEW_SYN_RECV state (git-fixes). * tcp: remove 64 KByte limit for initial tp->rcv_wnd value (git-fixes). * tcp: replace tcp_time_stamp_raw() (git-fixes). * tcp: Update window clamping condition (git-fixes). * thermal: int340x: Add NULL check for adev (git-fixes). * thermal/drivers/rockchip: Add missing rk3328 mapping entry (git-fixes). * tools: move alignment-related macros to new <linux/align.h> (git-fixes). * tools/testing/selftests/bpf/test_tc_tunnel.sh: Fix wait for server bind (git-fixes). * tpm, tpm_tis: Fix timeout handling when waiting for TPM status (git-fixes). * tpm: do not start chip while suspended (git-fixes). * tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870). * ubi: Add a check for ubi_num (git-fixes). * ubi: block: fix null-pointer-dereference in ubiblock_create() (git-fixes). * ubi: block: Fix use-after-free in ubiblock_cleanup (git-fixes). * ubi: correct the calculation of fastmap size (stable-fixes). * ubi: eba: properly rollback inside self_check_eba (git-fixes). * ubi: fastmap: Fix missed ec updating after erasing old fastmap data block (git-fixes). * ubi: fastmap: may_reserve_for_fm: Do not reserve PEB if fm_anchor exists (git-fixes). * ubi: fastmap: wl: Schedule fm_work if wear-leveling pool is empty (git- fixes). * ubi: wl: Put source PEB into correct list if trying locking LEB failed (git- fixes). * usb: atm: cxacru: fix a flaw in existing endpoint checks (git-fixes). * usb: dwc3: gadget: Prevent irq storm when TH re-executes (git-fixes). * usb: gadget: Check bmAttributes only if configuration is valid (git-fixes). * usb: gadget: Fix setting self-powered state on suspend (git-fixes). * usb: gadget: Set self-powered based on MaxPower and bmAttributes (git- fixes). * usb: gadget: u_ether: Set is_suspend flag if remote wakeup fails (git- fixes). * usb: hub: lack of clearing xHC resources (git-fixes). * usb: phy: generic: Use proper helper for property detection (stable-fixes). * usb: quirks: Add DELAY_INIT and NO_LPM for Prolific Mass Storage Card Reader (stable-fixes). * usb: renesas_usbhs: Call clk_put() (git-fixes). * usb: renesas_usbhs: Flush the notify_hotplug_work (git-fixes). * usb: renesas_usbhs: Use devm_usb_get_phy() (git-fixes). * usb: serial: ftdi_sio: add support for Altera USB Blaster 3 (stable-fixes). * usb: serial: option: add Telit Cinterion FE990B compositions (stable-fixes). * usb: serial: option: fix Telit Cinterion FE990A name (stable-fixes). * usb: serial: option: match on interface class for Telit FN990B (stable- fixes). * usb: typec: tcpci_rt1711h: Unmask alert interrupts to fix functionality (git-fixes). * usb: typec: ucsi: Fix NULL pointer access (git-fixes). * usb: typec: ucsi: increase timeout for PPM reset operations (git-fixes). * usb: xHCI: add XHCI_RESET_ON_RESUME quirk for Phytium xHCI host (git-fixes). * usb: xhci: Enable the TRB overfetch quirk on VIA VL805 (git-fixes). * usb: xhci: remove 'retval' from xhci_pci_resume() (git-fixes). * vboxsf: fix building with GCC 15 (stable-fixes). * wifi: ath11k: add srng->lock for ath11k_hal_srng_* in monitor mode (git- fixes). * wifi: ath11k: choose default PM policy for hibernation (bsc#1207948). * wifi: ath11k: Clear affinity hint before calling ath11k_pcic_free_irq() in error path (git-fixes). * wifi: ath11k: determine PM policy based on machine model (bsc#1207948). * wifi: ath11k: fix RCU stall while reaping monitor destination ring (git- fixes). * wifi: ath11k: fix wrong overriding for VHT Beamformee STS Capability (git- fixes). * wifi: ath11k: introduce ath11k_core_continue_suspend_resume() (bsc#1207948). * wifi: ath11k: refactor ath11k_core_suspend/_resume() (bsc#1207948). * wifi: ath11k: support non-WoWLAN mode suspend as well (bsc#1207948). * wifi: ath12k: Clear affinity hint before calling ath12k_pci_free_irq() in error path (git-fixes). * wifi: ath12k: encode max Tx power in scan channel list command (git-fixes). * wifi: ath9k: do not submit zero bytes to the entropy pool (git-fixes). * wifi: cfg80211: cancel wiphy_work before freeing wiphy (git-fixes). * wifi: cfg80211: init wiphy_work before allocating rfkill fails (git-fixes). * wifi: iwlwifi: mvm: fix PNVM timeout for non-MSI-X platforms (git-fixes). * wifi: mac80211: fix integer overflow in hwmp_route_info_get() (git-fixes). * wifi: mt76: Add check for devm_kstrdup() (git-fixes). * wifi: mt76: mt7915: fix possible integer overflows in mt7915_muru_stats_show() (git-fixes). * wifi: mt76: mt7925: ensure wow pattern command align fw format (git-fixes). * wifi: mt76: mt7925: fix country count limitation for CLC (git-fixes). * wifi: mt76: mt7925: remove unused acpi function for clc (git-fixes). * wifi: mwifiex: Fix premature release of RF calibration data (git-fixes). * wifi: rtl8xxxu: Perform update_beacon_work when beaconing is enabled (git- fixes). * wifi: rtw89: fw: correct debug message format in rtw89_build_txpwr_trk_tbl_from_elm() (git-fixes). * wifi: rtw89: pci: correct ISR RDU bit for 8922AE (git-fixes). * x86/apic: Provide apic_force_nmi_on_cpu() (git-fixes). * x86/boot: Use __pa_nodebug() in mk_early_pgtbl_32() (git-fixes). * x86/boot/32: De-uglify the 2/3 level paging difference in mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Disable stackprotector and tracing for mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Restructure mk_early_pgtbl_32() (git-fixes). * x86/boot/32: Temporarily map initrd for microcode loading (git-fixes). * x86/coco: Replace 'static const cc_mask' with the newly introduced cc_get_mask() function (git-fixes). * x86/cpu: Allow reducing x86_phys_bits during early_identify_cpu() (git- fixes). * x86/cpu/intel: Detect TME keyid bits before setting MTRR mask registers (git-fixes). * x86/entry: Add __init to ia32_emulation_override_cmdline() (git-fixes). * x86/fpu: Fix guest FPU state buffer allocation size (git-fixes). * x86/hyperv: Fix output argument to hypercall that changes page visibility (git-fixes). * x86/hyperv/vtl: Stop kernel from probing VTL0 low memory (git-fixes). * x86/idle: Disable IBRS when CPU is offline to improve single-threaded performance (git-fixes). * x86/microcode: Add per CPU control field (git-fixes). * x86/microcode: Add per CPU result state (git-fixes). * x86/microcode: Clarify the late load logic (git-fixes). * x86/microcode: Clean up mc_cpu_down_prep() (git-fixes). * x86/microcode: Get rid of the schedule work indirection (git-fixes). * x86/microcode: Handle "nosmt" correctly (git-fixes). * x86/microcode: Handle "offline" CPUs correctly (git-fixes). * x86/microcode: Hide the config knob (git-fixes). * x86/microcode: Include vendor headers into microcode.h (git-fixes). * x86/microcode: Make reload_early_microcode() static (git-fixes). * x86/microcode: Mop up early loading leftovers (git-fixes). * x86/microcode: Move core specific defines to local header (git-fixes). * x86/microcode: Prepare for minimal revision check (git-fixes). * x86/microcode: Protect against instrumentation (git-fixes). * x86/microcode: Provide CONFIG_MICROCODE_INITRD32 (git-fixes). * x86/microcode: Provide new control functions (git-fixes). * x86/microcode: Remove microcode_mutex (git-fixes). * x86/microcode: Remove pointless apply() invocation (git-fixes). * x86/microcode: Rendezvous and load in NMI (git-fixes). * x86/microcode: Replace the all-in-one rendevous handler (git-fixes). * x86/microcode: Sanitize __wait_for_cpus() (git-fixes). * x86/microcode/32: Move early loading after paging enable (git-fixes). * x86/microcode/amd: Cache builtin microcode too (git-fixes). * x86/microcode/amd: Cache builtin/initrd microcode early (git-fixes). * x86/microcode/amd: Use cached microcode for AP load (git-fixes). * x86/microcode/amd: Use correct per CPU ucode_cpu_info (git-fixes). * x86/microcode/intel: Add a minimum required revision for late loading (git- fixes). * x86/microcode/intel: Cleanup code further (git-fixes). * x86/microcode/intel: Move microcode functions out of cpu/intel.c (git- fixes). * x86/microcode/intel: Remove debug code (git-fixes). * x86/microcode/intel: Remove pointless mutex (git-fixes). * x86/microcode/intel: Rename get_datasize() since its used externally (git- fixes). * x86/microcode/intel: Reuse intel_cpu_collect_info() git-fixes). * x86/microcode/intel: Rework intel_cpu_collect_info() (git-fixes). * x86/microcode/intel: Rework intel_find_matching_signature() (git-fixes). * x86/microcode/intel: Rip out mixed stepping support for Intel CPUs (git- fixes). * x86/microcode/intel: Save the microcode only after a successful late-load (git-fixes). * x86/microcode/intel: Simplify and rename generic_load_microcode() (git- fixes). * x86/microcode/intel: Simplify early loading (git-fixes). * x86/microcode/intel: Simplify scan_microcode() (git-fixes). * x86/microcode/intel: Switch to kvmalloc() (git-fixes). * x86/microcode/intel: Unify microcode apply() functions (git-fixes). * x86/mm: Remove unused microcode.h include (git-fixes). * x86/platform/olpc: Remove unused variable 'len' in olpc_dt_compatible_match() (git-fixes). * x86/speculation: Add __update_spec_ctrl() helper (git-fixes). * x86/usercopy: Fix kernel-doc func param name in clean_cache_range()'s description (git-fixes). * xhci: Apply XHCI_RESET_TO_DEFAULT quirk to TGL (git-fixes). * xhci: Cleanup Candence controller PCI device and vendor ID usage (git- fixes). * xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701). * xhci: Combine two if statements for Etron xHCI host (jsc#PED-10701). * xhci: dbc: Check for errors first in xhci_dbc_stop() (git-fixes). * xhci: dbc: Convert to use sysfs_streq() (git-fixes). * xhci: dbc: Drop duplicate checks for dma_free_coherent() (git-fixes). * xhci: dbc: Fix STALL transfer event handling (git-fixes). * xhci: dbc: Replace custom return value with proper Linux error code (git- fixes). * xhci: dbc: Use ATTRIBUTE_GROUPS() (git-fixes). * xhci: dbc: Use sysfs_emit() to instead of scnprintf() (git-fixes). * xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701). * xhci: Do not issue Reset Device command to Etron xHCI host (jsc#PED-10701). * xhci: Do not perform Soft Retry for Etron xHCI host (git-fixes). * xhci: pci: Fix indentation in the PCI device ID definitions (stable-fixes). * xhci: pci: Group out Thunderbolt xHCI IDs (git-fixes). * xhci: pci: Use full names in PCI IDs for Intel platforms (git-fixes). * xhci: pci: Use PCI_VENDOR_ID_RENESAS (git-fixes). * xhci: pci: Use standard pattern for device IDs (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1180=1 openSUSE-SLE-15.6-2025-1180=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1180=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-1180=1 * Legacy Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2025-1180=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1180=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2025-1180=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-1180=1 ## Package List: * openSUSE Leap 15.6 (noarch nosrc) * kernel-docs-6.4.0-150600.23.47.1 * openSUSE Leap 15.6 (noarch) * kernel-macros-6.4.0-150600.23.47.2 * kernel-source-vanilla-6.4.0-150600.23.47.2 * kernel-devel-6.4.0-150600.23.47.2 * kernel-docs-html-6.4.0-150600.23.47.1 * kernel-source-6.4.0-150600.23.47.2 * openSUSE Leap 15.6 (nosrc ppc64le x86_64) * kernel-debug-6.4.0-150600.23.47.2 * openSUSE Leap 15.6 (ppc64le x86_64) * kernel-debug-devel-debuginfo-6.4.0-150600.23.47.2 * kernel-debug-debugsource-6.4.0-150600.23.47.2 * kernel-debug-debuginfo-6.4.0-150600.23.47.2 * kernel-debug-devel-6.4.0-150600.23.47.2 * openSUSE Leap 15.6 (x86_64) * kernel-kvmsmall-vdso-6.4.0-150600.23.47.2 * kernel-default-vdso-6.4.0-150600.23.47.2 * kernel-debug-vdso-6.4.0-150600.23.47.2 * kernel-debug-vdso-debuginfo-6.4.0-150600.23.47.2 * kernel-default-vdso-debuginfo-6.4.0-150600.23.47.2 * kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.47.2 * openSUSE Leap 15.6 (aarch64 ppc64le x86_64) * kernel-kvmsmall-devel-6.4.0-150600.23.47.2 * kernel-default-base-rebuild-6.4.0-150600.23.47.2.150600.12.20.2 * kernel-kvmsmall-debuginfo-6.4.0-150600.23.47.2 * kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.47.2 * kernel-default-base-6.4.0-150600.23.47.2.150600.12.20.2 * kernel-kvmsmall-debugsource-6.4.0-150600.23.47.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * cluster-md-kmp-default-debuginfo-6.4.0-150600.23.47.2 * gfs2-kmp-default-debuginfo-6.4.0-150600.23.47.2 * reiserfs-kmp-default-6.4.0-150600.23.47.2 * kselftests-kmp-default-6.4.0-150600.23.47.2 * kernel-syms-6.4.0-150600.23.47.1 * kernel-default-extra-debuginfo-6.4.0-150600.23.47.2 * kselftests-kmp-default-debuginfo-6.4.0-150600.23.47.2 * reiserfs-kmp-default-debuginfo-6.4.0-150600.23.47.2 * gfs2-kmp-default-6.4.0-150600.23.47.2 * kernel-default-optional-debuginfo-6.4.0-150600.23.47.2 * dlm-kmp-default-debuginfo-6.4.0-150600.23.47.2 * cluster-md-kmp-default-6.4.0-150600.23.47.2 * kernel-obs-build-6.4.0-150600.23.47.1 * kernel-default-devel-6.4.0-150600.23.47.2 * kernel-default-extra-6.4.0-150600.23.47.2 * dlm-kmp-default-6.4.0-150600.23.47.2 * kernel-default-livepatch-6.4.0-150600.23.47.2 * kernel-default-optional-6.4.0-150600.23.47.2 * kernel-default-debuginfo-6.4.0-150600.23.47.2 * ocfs2-kmp-default-6.4.0-150600.23.47.2 * kernel-default-devel-debuginfo-6.4.0-150600.23.47.2 * kernel-obs-build-debugsource-6.4.0-150600.23.47.1 * ocfs2-kmp-default-debuginfo-6.4.0-150600.23.47.2 * kernel-default-debugsource-6.4.0-150600.23.47.2 * kernel-obs-qa-6.4.0-150600.23.47.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-150600.23.47.2 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_47-default-1-150600.13.5.1 * kernel-default-livepatch-devel-6.4.0-150600.23.47.2 * kernel-livepatch-SLE15-SP6_Update_10-debugsource-1-150600.13.5.1 * kernel-livepatch-6_4_0-150600_23_47-default-debuginfo-1-150600.13.5.1 * openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-6.4.0-150600.23.47.2 * openSUSE Leap 15.6 (nosrc s390x) * kernel-zfcpdump-6.4.0-150600.23.47.2 * openSUSE Leap 15.6 (s390x) * kernel-zfcpdump-debugsource-6.4.0-150600.23.47.2 * kernel-zfcpdump-debuginfo-6.4.0-150600.23.47.2 * openSUSE Leap 15.6 (nosrc) * dtb-aarch64-6.4.0-150600.23.47.1 * openSUSE Leap 15.6 (aarch64) * kselftests-kmp-64kb-6.4.0-150600.23.47.2 * dtb-mediatek-6.4.0-150600.23.47.1 * kernel-64kb-devel-6.4.0-150600.23.47.2 * kernel-64kb-extra-6.4.0-150600.23.47.2 * dtb-xilinx-6.4.0-150600.23.47.1 * kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.47.2 * kernel-64kb-optional-debuginfo-6.4.0-150600.23.47.2 * dtb-allwinner-6.4.0-150600.23.47.1 * kernel-64kb-devel-debuginfo-6.4.0-150600.23.47.2 * kernel-64kb-extra-debuginfo-6.4.0-150600.23.47.2 * cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.47.2 * dtb-renesas-6.4.0-150600.23.47.1 * kernel-64kb-debugsource-6.4.0-150600.23.47.2 * reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.47.2 * dlm-kmp-64kb-debuginfo-6.4.0-150600.23.47.2 * dtb-marvell-6.4.0-150600.23.47.1 * dtb-amazon-6.4.0-150600.23.47.1 * kernel-64kb-optional-6.4.0-150600.23.47.2 * dtb-amd-6.4.0-150600.23.47.1 * dtb-hisilicon-6.4.0-150600.23.47.1 * dtb-apm-6.4.0-150600.23.47.1 * dlm-kmp-64kb-6.4.0-150600.23.47.2 * cluster-md-kmp-64kb-6.4.0-150600.23.47.2 * dtb-apple-6.4.0-150600.23.47.1 * dtb-rockchip-6.4.0-150600.23.47.1 * gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.47.2 * ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.47.2 * ocfs2-kmp-64kb-6.4.0-150600.23.47.2 * dtb-sprd-6.4.0-150600.23.47.1 * reiserfs-kmp-64kb-6.4.0-150600.23.47.2 * kernel-64kb-debuginfo-6.4.0-150600.23.47.2 * dtb-arm-6.4.0-150600.23.47.1 * dtb-amlogic-6.4.0-150600.23.47.1 * dtb-cavium-6.4.0-150600.23.47.1 * dtb-freescale-6.4.0-150600.23.47.1 * dtb-exynos-6.4.0-150600.23.47.1 * dtb-lg-6.4.0-150600.23.47.1 * dtb-nvidia-6.4.0-150600.23.47.1 * dtb-qcom-6.4.0-150600.23.47.1 * dtb-socionext-6.4.0-150600.23.47.1 * dtb-altera-6.4.0-150600.23.47.1 * gfs2-kmp-64kb-6.4.0-150600.23.47.2 * dtb-broadcom-6.4.0-150600.23.47.1 * openSUSE Leap 15.6 (aarch64 nosrc) * kernel-64kb-6.4.0-150600.23.47.2 * Basesystem Module 15-SP6 (aarch64 nosrc) * kernel-64kb-6.4.0-150600.23.47.2 * Basesystem Module 15-SP6 (aarch64) * kernel-64kb-devel-6.4.0-150600.23.47.2 * kernel-64kb-devel-debuginfo-6.4.0-150600.23.47.2 * kernel-64kb-debuginfo-6.4.0-150600.23.47.2 * kernel-64kb-debugsource-6.4.0-150600.23.47.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.4.0-150600.23.47.2 * Basesystem Module 15-SP6 (aarch64 ppc64le x86_64) * kernel-default-base-6.4.0-150600.23.47.2.150600.12.20.2 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-debuginfo-6.4.0-150600.23.47.2 * kernel-default-debugsource-6.4.0-150600.23.47.2 * kernel-default-devel-6.4.0-150600.23.47.2 * kernel-default-debuginfo-6.4.0-150600.23.47.2 * Basesystem Module 15-SP6 (noarch) * kernel-macros-6.4.0-150600.23.47.2 * kernel-devel-6.4.0-150600.23.47.2 * Basesystem Module 15-SP6 (nosrc s390x) * kernel-zfcpdump-6.4.0-150600.23.47.2 * Basesystem Module 15-SP6 (s390x) * kernel-zfcpdump-debugsource-6.4.0-150600.23.47.2 * kernel-zfcpdump-debuginfo-6.4.0-150600.23.47.2 * Development Tools Module 15-SP6 (noarch nosrc) * kernel-docs-6.4.0-150600.23.47.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * kernel-syms-6.4.0-150600.23.47.1 * kernel-obs-build-6.4.0-150600.23.47.1 * kernel-obs-build-debugsource-6.4.0-150600.23.47.1 * Development Tools Module 15-SP6 (noarch) * kernel-source-6.4.0-150600.23.47.2 * Legacy Module 15-SP6 (nosrc) * kernel-default-6.4.0-150600.23.47.2 * Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-6.4.0-150600.23.47.2 * kernel-default-debugsource-6.4.0-150600.23.47.2 * kernel-default-debuginfo-6.4.0-150600.23.47.2 * reiserfs-kmp-default-debuginfo-6.4.0-150600.23.47.2 * SUSE Linux Enterprise Live Patching 15-SP6 (nosrc) * kernel-default-6.4.0-150600.23.47.2 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-default-livepatch-devel-6.4.0-150600.23.47.2 * kernel-livepatch-6_4_0-150600_23_47-default-1-150600.13.5.1 * kernel-default-debugsource-6.4.0-150600.23.47.2 * kernel-default-livepatch-6.4.0-150600.23.47.2 * kernel-livepatch-SLE15-SP6_Update_10-debugsource-1-150600.13.5.1 * kernel-default-debuginfo-6.4.0-150600.23.47.2 * kernel-livepatch-6_4_0-150600_23_47-default-debuginfo-1-150600.13.5.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) * gfs2-kmp-default-6.4.0-150600.23.47.2 * ocfs2-kmp-default-6.4.0-150600.23.47.2 * cluster-md-kmp-default-debuginfo-6.4.0-150600.23.47.2 * gfs2-kmp-default-debuginfo-6.4.0-150600.23.47.2 * dlm-kmp-default-6.4.0-150600.23.47.2 * dlm-kmp-default-debuginfo-6.4.0-150600.23.47.2 * ocfs2-kmp-default-debuginfo-6.4.0-150600.23.47.2 * kernel-default-debugsource-6.4.0-150600.23.47.2 * kernel-default-debuginfo-6.4.0-150600.23.47.2 * cluster-md-kmp-default-6.4.0-150600.23.47.2 * SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc) * kernel-default-6.4.0-150600.23.47.2 * SUSE Linux Enterprise Workstation Extension 15 SP6 (nosrc) * kernel-default-6.4.0-150600.23.47.2 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * kernel-default-extra-6.4.0-150600.23.47.2 * kernel-default-debugsource-6.4.0-150600.23.47.2 * kernel-default-extra-debuginfo-6.4.0-150600.23.47.2 * kernel-default-debuginfo-6.4.0-150600.23.47.2 ## References: * https://www.suse.com/security/cve/CVE-2023-52831.html * https://www.suse.com/security/cve/CVE-2023-52926.html * https://www.suse.com/security/cve/CVE-2023-52927.html * https://www.suse.com/security/cve/CVE-2024-26634.html * https://www.suse.com/security/cve/CVE-2024-26873.html * https://www.suse.com/security/cve/CVE-2024-35826.html * https://www.suse.com/security/cve/CVE-2024-35910.html * https://www.suse.com/security/cve/CVE-2024-38606.html * https://www.suse.com/security/cve/CVE-2024-41005.html * https://www.suse.com/security/cve/CVE-2024-41077.html * https://www.suse.com/security/cve/CVE-2024-41149.html * https://www.suse.com/security/cve/CVE-2024-42307.html * https://www.suse.com/security/cve/CVE-2024-43820.html * https://www.suse.com/security/cve/CVE-2024-46736.html * https://www.suse.com/security/cve/CVE-2024-46782.html * https://www.suse.com/security/cve/CVE-2024-46796.html * https://www.suse.com/security/cve/CVE-2024-47408.html * https://www.suse.com/security/cve/CVE-2024-47794.html * https://www.suse.com/security/cve/CVE-2024-49571.html * https://www.suse.com/security/cve/CVE-2024-49924.html * https://www.suse.com/security/cve/CVE-2024-49940.html * https://www.suse.com/security/cve/CVE-2024-49994.html * https://www.suse.com/security/cve/CVE-2024-50056.html * https://www.suse.com/security/cve/CVE-2024-50126.html * https://www.suse.com/security/cve/CVE-2024-50140.html * https://www.suse.com/security/cve/CVE-2024-50152.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-52559.html * https://www.suse.com/security/cve/CVE-2024-53057.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53140.html * https://www.suse.com/security/cve/CVE-2024-53163.html * https://www.suse.com/security/cve/CVE-2024-53680.html * https://www.suse.com/security/cve/CVE-2024-54683.html * https://www.suse.com/security/cve/CVE-2024-56638.html * https://www.suse.com/security/cve/CVE-2024-56640.html * https://www.suse.com/security/cve/CVE-2024-56702.html * https://www.suse.com/security/cve/CVE-2024-56703.html * https://www.suse.com/security/cve/CVE-2024-56718.html * https://www.suse.com/security/cve/CVE-2024-56719.html * https://www.suse.com/security/cve/CVE-2024-56751.html * https://www.suse.com/security/cve/CVE-2024-56758.html * https://www.suse.com/security/cve/CVE-2024-56770.html * https://www.suse.com/security/cve/CVE-2024-57807.html * https://www.suse.com/security/cve/CVE-2024-57834.html * https://www.suse.com/security/cve/CVE-2024-57900.html * https://www.suse.com/security/cve/CVE-2024-57947.html * https://www.suse.com/security/cve/CVE-2024-57973.html * https://www.suse.com/security/cve/CVE-2024-57974.html * https://www.suse.com/security/cve/CVE-2024-57978.html * https://www.suse.com/security/cve/CVE-2024-57979.html * https://www.suse.com/security/cve/CVE-2024-57980.html * https://www.suse.com/security/cve/CVE-2024-57981.html * https://www.suse.com/security/cve/CVE-2024-57986.html * https://www.suse.com/security/cve/CVE-2024-57990.html * https://www.suse.com/security/cve/CVE-2024-57993.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-57997.html * https://www.suse.com/security/cve/CVE-2024-57999.html * https://www.suse.com/security/cve/CVE-2024-58002.html * https://www.suse.com/security/cve/CVE-2024-58005.html * https://www.suse.com/security/cve/CVE-2024-58006.html * https://www.suse.com/security/cve/CVE-2024-58007.html * https://www.suse.com/security/cve/CVE-2024-58009.html * https://www.suse.com/security/cve/CVE-2024-58011.html * https://www.suse.com/security/cve/CVE-2024-58012.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2024-58014.html * https://www.suse.com/security/cve/CVE-2024-58017.html * https://www.suse.com/security/cve/CVE-2024-58019.html * https://www.suse.com/security/cve/CVE-2024-58020.html * https://www.suse.com/security/cve/CVE-2024-58034.html * https://www.suse.com/security/cve/CVE-2024-58051.html * https://www.suse.com/security/cve/CVE-2024-58052.html * https://www.suse.com/security/cve/CVE-2024-58054.html * https://www.suse.com/security/cve/CVE-2024-58055.html * https://www.suse.com/security/cve/CVE-2024-58056.html * https://www.suse.com/security/cve/CVE-2024-58057.html * https://www.suse.com/security/cve/CVE-2024-58058.html * https://www.suse.com/security/cve/CVE-2024-58061.html * https://www.suse.com/security/cve/CVE-2024-58063.html * https://www.suse.com/security/cve/CVE-2024-58069.html * https://www.suse.com/security/cve/CVE-2024-58072.html * https://www.suse.com/security/cve/CVE-2024-58076.html * https://www.suse.com/security/cve/CVE-2024-58078.html * https://www.suse.com/security/cve/CVE-2024-58079.html * https://www.suse.com/security/cve/CVE-2024-58080.html * https://www.suse.com/security/cve/CVE-2024-58083.html * https://www.suse.com/security/cve/CVE-2024-58085.html * https://www.suse.com/security/cve/CVE-2024-58086.html * https://www.suse.com/security/cve/CVE-2025-21631.html * https://www.suse.com/security/cve/CVE-2025-21635.html * https://www.suse.com/security/cve/CVE-2025-21659.html * https://www.suse.com/security/cve/CVE-2025-21671.html * https://www.suse.com/security/cve/CVE-2025-21693.html * https://www.suse.com/security/cve/CVE-2025-21701.html * https://www.suse.com/security/cve/CVE-2025-21703.html * https://www.suse.com/security/cve/CVE-2025-21704.html * https://www.suse.com/security/cve/CVE-2025-21706.html * https://www.suse.com/security/cve/CVE-2025-21708.html * https://www.suse.com/security/cve/CVE-2025-21711.html * https://www.suse.com/security/cve/CVE-2025-21714.html * https://www.suse.com/security/cve/CVE-2025-21718.html * https://www.suse.com/security/cve/CVE-2025-21723.html * https://www.suse.com/security/cve/CVE-2025-21726.html * https://www.suse.com/security/cve/CVE-2025-21727.html * https://www.suse.com/security/cve/CVE-2025-21731.html * https://www.suse.com/security/cve/CVE-2025-21732.html * https://www.suse.com/security/cve/CVE-2025-21733.html * https://www.suse.com/security/cve/CVE-2025-21734.html * https://www.suse.com/security/cve/CVE-2025-21735.html * https://www.suse.com/security/cve/CVE-2025-21736.html * https://www.suse.com/security/cve/CVE-2025-21738.html * https://www.suse.com/security/cve/CVE-2025-21739.html * https://www.suse.com/security/cve/CVE-2025-21741.html * https://www.suse.com/security/cve/CVE-2025-21742.html * https://www.suse.com/security/cve/CVE-2025-21743.html * https://www.suse.com/security/cve/CVE-2025-21744.html * https://www.suse.com/security/cve/CVE-2025-21745.html * https://www.suse.com/security/cve/CVE-2025-21749.html * https://www.suse.com/security/cve/CVE-2025-21750.html * https://www.suse.com/security/cve/CVE-2025-21753.html * https://www.suse.com/security/cve/CVE-2025-21754.html * https://www.suse.com/security/cve/CVE-2025-21756.html * https://www.suse.com/security/cve/CVE-2025-21759.html * https://www.suse.com/security/cve/CVE-2025-21760.html * https://www.suse.com/security/cve/CVE-2025-21761.html * https://www.suse.com/security/cve/CVE-2025-21762.html * https://www.suse.com/security/cve/CVE-2025-21763.html * https://www.suse.com/security/cve/CVE-2025-21764.html * https://www.suse.com/security/cve/CVE-2025-21765.html * https://www.suse.com/security/cve/CVE-2025-21766.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21773.html * https://www.suse.com/security/cve/CVE-2025-21775.html * https://www.suse.com/security/cve/CVE-2025-21776.html * https://www.suse.com/security/cve/CVE-2025-21779.html * https://www.suse.com/security/cve/CVE-2025-21780.html * https://www.suse.com/security/cve/CVE-2025-21781.html * https://www.suse.com/security/cve/CVE-2025-21782.html * https://www.suse.com/security/cve/CVE-2025-21784.html * https://www.suse.com/security/cve/CVE-2025-21785.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-21793.html * https://www.suse.com/security/cve/CVE-2025-21794.html * https://www.suse.com/security/cve/CVE-2025-21796.html * https://www.suse.com/security/cve/CVE-2025-21804.html * https://www.suse.com/security/cve/CVE-2025-21810.html * https://www.suse.com/security/cve/CVE-2025-21815.html * https://www.suse.com/security/cve/CVE-2025-21819.html * https://www.suse.com/security/cve/CVE-2025-21820.html * https://www.suse.com/security/cve/CVE-2025-21821.html * https://www.suse.com/security/cve/CVE-2025-21823.html * https://www.suse.com/security/cve/CVE-2025-21825.html * https://www.suse.com/security/cve/CVE-2025-21828.html * https://www.suse.com/security/cve/CVE-2025-21829.html * https://www.suse.com/security/cve/CVE-2025-21830.html * https://www.suse.com/security/cve/CVE-2025-21831.html * https://www.suse.com/security/cve/CVE-2025-21832.html * https://www.suse.com/security/cve/CVE-2025-21835.html * https://www.suse.com/security/cve/CVE-2025-21838.html * https://www.suse.com/security/cve/CVE-2025-21844.html * https://www.suse.com/security/cve/CVE-2025-21846.html * https://www.suse.com/security/cve/CVE-2025-21847.html * https://www.suse.com/security/cve/CVE-2025-21848.html * https://www.suse.com/security/cve/CVE-2025-21850.html * https://www.suse.com/security/cve/CVE-2025-21855.html * https://www.suse.com/security/cve/CVE-2025-21856.html * https://www.suse.com/security/cve/CVE-2025-21857.html * https://www.suse.com/security/cve/CVE-2025-21858.html * https://www.suse.com/security/cve/CVE-2025-21859.html * https://www.suse.com/security/cve/CVE-2025-21861.html * https://www.suse.com/security/cve/CVE-2025-21862.html * https://www.suse.com/security/cve/CVE-2025-21864.html * https://www.suse.com/security/cve/CVE-2025-21865.html * https://www.suse.com/security/cve/CVE-2025-21866.html * https://www.suse.com/security/cve/CVE-2025-21869.html * https://www.suse.com/security/cve/CVE-2025-21870.html * https://www.suse.com/security/cve/CVE-2025-21871.html * https://www.suse.com/security/cve/CVE-2025-21876.html * https://www.suse.com/security/cve/CVE-2025-21877.html * https://www.suse.com/security/cve/CVE-2025-21878.html * https://www.suse.com/security/cve/CVE-2025-21883.html * https://www.suse.com/security/cve/CVE-2025-21885.html * https://www.suse.com/security/cve/CVE-2025-21886.html * https://www.suse.com/security/cve/CVE-2025-21888.html * https://www.suse.com/security/cve/CVE-2025-21890.html * https://www.suse.com/security/cve/CVE-2025-21891.html * https://www.suse.com/security/cve/CVE-2025-21892.html * https://bugzilla.suse.com/show_bug.cgi?id=1207948 * https://bugzilla.suse.com/show_bug.cgi?id=1215199 * https://bugzilla.suse.com/show_bug.cgi?id=1215211 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1221651 * https://bugzilla.suse.com/show_bug.cgi?id=1222649 * https://bugzilla.suse.com/show_bug.cgi?id=1223047 * https://bugzilla.suse.com/show_bug.cgi?id=1224489 * https://bugzilla.suse.com/show_bug.cgi?id=1224610 * https://bugzilla.suse.com/show_bug.cgi?id=1225533 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1225770 * https://bugzilla.suse.com/show_bug.cgi?id=1226871 * https://bugzilla.suse.com/show_bug.cgi?id=1227858 * https://bugzilla.suse.com/show_bug.cgi?id=1228653 * https://bugzilla.suse.com/show_bug.cgi?id=1229311 * https://bugzilla.suse.com/show_bug.cgi?id=1229361 * https://bugzilla.suse.com/show_bug.cgi?id=1230497 * https://bugzilla.suse.com/show_bug.cgi?id=1230728 * https://bugzilla.suse.com/show_bug.cgi?id=1230769 * https://bugzilla.suse.com/show_bug.cgi?id=1230832 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1231432 * https://bugzilla.suse.com/show_bug.cgi?id=1232364 * https://bugzilla.suse.com/show_bug.cgi?id=1232389 * https://bugzilla.suse.com/show_bug.cgi?id=1232421 * https://bugzilla.suse.com/show_bug.cgi?id=1232743 * https://bugzilla.suse.com/show_bug.cgi?id=1232812 * https://bugzilla.suse.com/show_bug.cgi?id=1232848 * https://bugzilla.suse.com/show_bug.cgi?id=1232895 * https://bugzilla.suse.com/show_bug.cgi?id=1233033 * https://bugzilla.suse.com/show_bug.cgi?id=1233060 * https://bugzilla.suse.com/show_bug.cgi?id=1233259 * https://bugzilla.suse.com/show_bug.cgi?id=1233260 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233551 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233749 * https://bugzilla.suse.com/show_bug.cgi?id=1234222 * https://bugzilla.suse.com/show_bug.cgi?id=1234480 * https://bugzilla.suse.com/show_bug.cgi?id=1234828 * https://bugzilla.suse.com/show_bug.cgi?id=1234936 * https://bugzilla.suse.com/show_bug.cgi?id=1235436 * https://bugzilla.suse.com/show_bug.cgi?id=1235455 * https://bugzilla.suse.com/show_bug.cgi?id=1235501 * https://bugzilla.suse.com/show_bug.cgi?id=1235524 * https://bugzilla.suse.com/show_bug.cgi?id=1235589 * https://bugzilla.suse.com/show_bug.cgi?id=1235591 * https://bugzilla.suse.com/show_bug.cgi?id=1235621 * https://bugzilla.suse.com/show_bug.cgi?id=1235637 * https://bugzilla.suse.com/show_bug.cgi?id=1235698 * https://bugzilla.suse.com/show_bug.cgi?id=1235711 * https://bugzilla.suse.com/show_bug.cgi?id=1235712 * https://bugzilla.suse.com/show_bug.cgi?id=1235715 * https://bugzilla.suse.com/show_bug.cgi?id=1235729 * https://bugzilla.suse.com/show_bug.cgi?id=1235733 * https://bugzilla.suse.com/show_bug.cgi?id=1235761 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1235973 * https://bugzilla.suse.com/show_bug.cgi?id=1236099 * https://bugzilla.suse.com/show_bug.cgi?id=1236111 * https://bugzilla.suse.com/show_bug.cgi?id=1236206 * https://bugzilla.suse.com/show_bug.cgi?id=1236333 * https://bugzilla.suse.com/show_bug.cgi?id=1236692 * https://bugzilla.suse.com/show_bug.cgi?id=1237029 * https://bugzilla.suse.com/show_bug.cgi?id=1237164 * https://bugzilla.suse.com/show_bug.cgi?id=1237313 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237558 * https://bugzilla.suse.com/show_bug.cgi?id=1237562 * https://bugzilla.suse.com/show_bug.cgi?id=1237565 * https://bugzilla.suse.com/show_bug.cgi?id=1237571 * https://bugzilla.suse.com/show_bug.cgi?id=1237853 * https://bugzilla.suse.com/show_bug.cgi?id=1237856 * https://bugzilla.suse.com/show_bug.cgi?id=1237873 * https://bugzilla.suse.com/show_bug.cgi?id=1237875 * https://bugzilla.suse.com/show_bug.cgi?id=1237876 * https://bugzilla.suse.com/show_bug.cgi?id=1237877 * https://bugzilla.suse.com/show_bug.cgi?id=1237881 * https://bugzilla.suse.com/show_bug.cgi?id=1237885 * https://bugzilla.suse.com/show_bug.cgi?id=1237890 * https://bugzilla.suse.com/show_bug.cgi?id=1237894 * https://bugzilla.suse.com/show_bug.cgi?id=1237897 * https://bugzilla.suse.com/show_bug.cgi?id=1237900 * https://bugzilla.suse.com/show_bug.cgi?id=1237906 * https://bugzilla.suse.com/show_bug.cgi?id=1237907 * https://bugzilla.suse.com/show_bug.cgi?id=1237911 * https://bugzilla.suse.com/show_bug.cgi?id=1237912 * https://bugzilla.suse.com/show_bug.cgi?id=1237950 * https://bugzilla.suse.com/show_bug.cgi?id=1238212 * https://bugzilla.suse.com/show_bug.cgi?id=1238474 * https://bugzilla.suse.com/show_bug.cgi?id=1238475 * https://bugzilla.suse.com/show_bug.cgi?id=1238479 * https://bugzilla.suse.com/show_bug.cgi?id=1238494 * https://bugzilla.suse.com/show_bug.cgi?id=1238496 * https://bugzilla.suse.com/show_bug.cgi?id=1238497 * https://bugzilla.suse.com/show_bug.cgi?id=1238500 * https://bugzilla.suse.com/show_bug.cgi?id=1238501 * https://bugzilla.suse.com/show_bug.cgi?id=1238502 * https://bugzilla.suse.com/show_bug.cgi?id=1238503 * https://bugzilla.suse.com/show_bug.cgi?id=1238506 * https://bugzilla.suse.com/show_bug.cgi?id=1238507 * https://bugzilla.suse.com/show_bug.cgi?id=1238510 * https://bugzilla.suse.com/show_bug.cgi?id=1238511 * https://bugzilla.suse.com/show_bug.cgi?id=1238512 * https://bugzilla.suse.com/show_bug.cgi?id=1238521 * https://bugzilla.suse.com/show_bug.cgi?id=1238523 * https://bugzilla.suse.com/show_bug.cgi?id=1238526 * https://bugzilla.suse.com/show_bug.cgi?id=1238528 * https://bugzilla.suse.com/show_bug.cgi?id=1238529 * https://bugzilla.suse.com/show_bug.cgi?id=1238531 * https://bugzilla.suse.com/show_bug.cgi?id=1238532 * https://bugzilla.suse.com/show_bug.cgi?id=1238715 * https://bugzilla.suse.com/show_bug.cgi?id=1238716 * https://bugzilla.suse.com/show_bug.cgi?id=1238734 * https://bugzilla.suse.com/show_bug.cgi?id=1238735 * https://bugzilla.suse.com/show_bug.cgi?id=1238736 * https://bugzilla.suse.com/show_bug.cgi?id=1238738 * https://bugzilla.suse.com/show_bug.cgi?id=1238747 * https://bugzilla.suse.com/show_bug.cgi?id=1238754 * https://bugzilla.suse.com/show_bug.cgi?id=1238757 * https://bugzilla.suse.com/show_bug.cgi?id=1238760 * https://bugzilla.suse.com/show_bug.cgi?id=1238762 * https://bugzilla.suse.com/show_bug.cgi?id=1238763 * https://bugzilla.suse.com/show_bug.cgi?id=1238767 * https://bugzilla.suse.com/show_bug.cgi?id=1238768 * https://bugzilla.suse.com/show_bug.cgi?id=1238771 * https://bugzilla.suse.com/show_bug.cgi?id=1238772 * https://bugzilla.suse.com/show_bug.cgi?id=1238773 * https://bugzilla.suse.com/show_bug.cgi?id=1238775 * https://bugzilla.suse.com/show_bug.cgi?id=1238780 * https://bugzilla.suse.com/show_bug.cgi?id=1238781 * https://bugzilla.suse.com/show_bug.cgi?id=1238785 * https://bugzilla.suse.com/show_bug.cgi?id=1238864 * https://bugzilla.suse.com/show_bug.cgi?id=1238865 * https://bugzilla.suse.com/show_bug.cgi?id=1238876 * https://bugzilla.suse.com/show_bug.cgi?id=1238903 * https://bugzilla.suse.com/show_bug.cgi?id=1238904 * https://bugzilla.suse.com/show_bug.cgi?id=1238905 * https://bugzilla.suse.com/show_bug.cgi?id=1238909 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238917 * https://bugzilla.suse.com/show_bug.cgi?id=1238958 * https://bugzilla.suse.com/show_bug.cgi?id=1238959 * https://bugzilla.suse.com/show_bug.cgi?id=1238963 * https://bugzilla.suse.com/show_bug.cgi?id=1238964 * https://bugzilla.suse.com/show_bug.cgi?id=1238969 * https://bugzilla.suse.com/show_bug.cgi?id=1238971 * https://bugzilla.suse.com/show_bug.cgi?id=1238973 * https://bugzilla.suse.com/show_bug.cgi?id=1238975 * https://bugzilla.suse.com/show_bug.cgi?id=1238978 * https://bugzilla.suse.com/show_bug.cgi?id=1238979 * https://bugzilla.suse.com/show_bug.cgi?id=1238981 * https://bugzilla.suse.com/show_bug.cgi?id=1238984 * https://bugzilla.suse.com/show_bug.cgi?id=1238986 * https://bugzilla.suse.com/show_bug.cgi?id=1238993 * https://bugzilla.suse.com/show_bug.cgi?id=1238994 * https://bugzilla.suse.com/show_bug.cgi?id=1238997 * https://bugzilla.suse.com/show_bug.cgi?id=1239015 * https://bugzilla.suse.com/show_bug.cgi?id=1239016 * https://bugzilla.suse.com/show_bug.cgi?id=1239027 * https://bugzilla.suse.com/show_bug.cgi?id=1239029 * https://bugzilla.suse.com/show_bug.cgi?id=1239030 * https://bugzilla.suse.com/show_bug.cgi?id=1239033 * https://bugzilla.suse.com/show_bug.cgi?id=1239034 * https://bugzilla.suse.com/show_bug.cgi?id=1239036 * https://bugzilla.suse.com/show_bug.cgi?id=1239037 * https://bugzilla.suse.com/show_bug.cgi?id=1239038 * https://bugzilla.suse.com/show_bug.cgi?id=1239039 * https://bugzilla.suse.com/show_bug.cgi?id=1239045 * https://bugzilla.suse.com/show_bug.cgi?id=1239065 * https://bugzilla.suse.com/show_bug.cgi?id=1239068 * https://bugzilla.suse.com/show_bug.cgi?id=1239073 * https://bugzilla.suse.com/show_bug.cgi?id=1239076 * https://bugzilla.suse.com/show_bug.cgi?id=1239080 * https://bugzilla.suse.com/show_bug.cgi?id=1239085 * https://bugzilla.suse.com/show_bug.cgi?id=1239087 * https://bugzilla.suse.com/show_bug.cgi?id=1239095 * https://bugzilla.suse.com/show_bug.cgi?id=1239104 * https://bugzilla.suse.com/show_bug.cgi?id=1239105 * https://bugzilla.suse.com/show_bug.cgi?id=1239109 * https://bugzilla.suse.com/show_bug.cgi?id=1239112 * https://bugzilla.suse.com/show_bug.cgi?id=1239114 * https://bugzilla.suse.com/show_bug.cgi?id=1239115 * https://bugzilla.suse.com/show_bug.cgi?id=1239117 * https://bugzilla.suse.com/show_bug.cgi?id=1239167 * https://bugzilla.suse.com/show_bug.cgi?id=1239174 * https://bugzilla.suse.com/show_bug.cgi?id=1239346 * https://bugzilla.suse.com/show_bug.cgi?id=1239349 * https://bugzilla.suse.com/show_bug.cgi?id=1239435 * https://bugzilla.suse.com/show_bug.cgi?id=1239467 * https://bugzilla.suse.com/show_bug.cgi?id=1239468 * https://bugzilla.suse.com/show_bug.cgi?id=1239471 * https://bugzilla.suse.com/show_bug.cgi?id=1239473 * https://bugzilla.suse.com/show_bug.cgi?id=1239474 * https://bugzilla.suse.com/show_bug.cgi?id=1239477 * https://bugzilla.suse.com/show_bug.cgi?id=1239478 * https://bugzilla.suse.com/show_bug.cgi?id=1239479 * https://bugzilla.suse.com/show_bug.cgi?id=1239481 * https://bugzilla.suse.com/show_bug.cgi?id=1239482 * https://bugzilla.suse.com/show_bug.cgi?id=1239483 * https://bugzilla.suse.com/show_bug.cgi?id=1239484 * https://bugzilla.suse.com/show_bug.cgi?id=1239486 * https://bugzilla.suse.com/show_bug.cgi?id=1239508 * https://bugzilla.suse.com/show_bug.cgi?id=1239512 * https://bugzilla.suse.com/show_bug.cgi?id=1239518 * https://bugzilla.suse.com/show_bug.cgi?id=1239573 * https://bugzilla.suse.com/show_bug.cgi?id=1239594 * https://bugzilla.suse.com/show_bug.cgi?id=1239595 * https://bugzilla.suse.com/show_bug.cgi?id=1239600 * https://bugzilla.suse.com/show_bug.cgi?id=1239605 * https://bugzilla.suse.com/show_bug.cgi?id=1239615 * https://bugzilla.suse.com/show_bug.cgi?id=1239644 * https://bugzilla.suse.com/show_bug.cgi?id=1239707 * https://bugzilla.suse.com/show_bug.cgi?id=1239986 * https://bugzilla.suse.com/show_bug.cgi?id=1239994 * https://bugzilla.suse.com/show_bug.cgi?id=1240169 * https://bugzilla.suse.com/show_bug.cgi?id=1240172 * https://bugzilla.suse.com/show_bug.cgi?id=1240173 * https://bugzilla.suse.com/show_bug.cgi?id=1240175 * https://bugzilla.suse.com/show_bug.cgi?id=1240177 * https://bugzilla.suse.com/show_bug.cgi?id=1240179 * https://bugzilla.suse.com/show_bug.cgi?id=1240182 * https://bugzilla.suse.com/show_bug.cgi?id=1240183 * https://bugzilla.suse.com/show_bug.cgi?id=1240186 * https://bugzilla.suse.com/show_bug.cgi?id=1240188 * https://bugzilla.suse.com/show_bug.cgi?id=1240189 * https://bugzilla.suse.com/show_bug.cgi?id=1240191 * https://bugzilla.suse.com/show_bug.cgi?id=1240192 * https://bugzilla.suse.com/show_bug.cgi?id=1240333 * https://bugzilla.suse.com/show_bug.cgi?id=1240334 * https://jira.suse.com/browse/PED-10701 * https://jira.suse.com/browse/PED-12251 * https://jira.suse.com/browse/PED-12416 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 9 12:30:04 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 09 Apr 2025 12:30:04 -0000 Subject: SUSE-SU-2025:1182-1: important: Security update for azure-cli-core Message-ID: <174420180446.21454.17429099235392678623@smelt2.prg2.suse.org> # Security update for azure-cli-core Announcement ID: SUSE-SU-2025:1182-1 Release Date: 2025-04-09T10:12:44Z Rating: important References: * bsc#1239460 Cross-References: * CVE-2025-24049 CVSS scores: * CVE-2025-24049 ( SUSE ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-24049 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-24049 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Public Cloud Module 15-SP3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves one vulnerability can now be installed. ## Description: This update for azure-cli-core fixes the following issues: * CVE-2025-24049: Fixed improper neutralization of special elements used in a command allows an unauthorized attacker to elevate privileges locally (bsc#1239460) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2025-1182=1 ## Package List: * Public Cloud Module 15-SP3 (noarch) * azure-cli-core-2.36.0-150200.9.6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-24049.html * https://bugzilla.suse.com/show_bug.cgi?id=1239460 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 9 16:30:15 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 09 Apr 2025 16:30:15 -0000 Subject: SUSE-SU-2025:1186-1: important: Security update for expat Message-ID: <174421621519.21179.3143190707220753219@smelt2.prg2.suse.org> # Security update for expat Announcement ID: SUSE-SU-2025:1186-1 Release Date: 2025-04-09T14:28:15Z Rating: important References: * bsc#1239618 * jsc#PED-12500 * jsc#SLE-21253 Cross-References: * CVE-2024-8176 CVSS scores: * CVE-2024-8176 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-8176 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8176 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability and contains two features can now be installed. ## Description: This update for expat fixes the following issues: * CVE-2024-8176: Fixed denial of service from chaining a large number of entities caused by stack overflow by resolving use of recursion (bsc#1239618) Other fixes: \- version update to 2.7.1 (jsc#PED-12500) Bug fixes: #980 #989 Restore event pointer behavior from Expat 2.6.4 (that the fix to CVE-2024-8176 changed in 2.7.0); affected API functions are: \- XML_GetCurrentByteCount \- XML_GetCurrentByteIndex \- XML_GetCurrentColumnNumber \- XML_GetCurrentLineNumber \- XML_GetInputContext Other changes: #976 #977 Autotools: Integrate files "fuzz/xml_lpm_fuzzer.{cpp,proto}" with Automake that were missing from 2.7.0 release tarballs #983 #984 Fix printf format specifiers for 32bit Emscripten #992 docs: Promote OpenSSF Best Practices self- certification #978 tests/benchmark: Resolve mistaken double close #986 Address compiler warnings #990 #993 Version info bumped from 11:1:10 (libexpat _.so.1.10.1) to 11:2:10 (libexpat_.so.1.10.2); see https://verbump.de/ for what these numbers do Infrastructure: #982 CI: Start running Perl XML::Parser integration tests #987 CI: Enforce Clang Static Analyzer clean code #991 CI: Re- enable warning clang-analyzer-valist.Uninitialized for clang-tidy #981 CI: Cover compilation with musl #983 #984 CI: Cover compilation with 32bit Emscripten #976 #977 CI: Protect against fuzzer files missing from future release archives * version update to 2.7.0 #935 #937 Autotools: Make generated CMake files look for libexpat. at SO_MAJOR@.dylib on macOS #925 Autotools: Sync CMake templates with CMake 3.29 #945 #962 #966 CMake: Drop support for CMake <3.13 #942 CMake: Small fuzzing related improvements #921 docs: Add missing documentation of error code XML_ERROR_NOT_STARTED that was introduced with 2.6.4 #941 docs: Document need for C++11 compiler for use from C++ #959 tests/benchmark: Fix a (harmless) TOCTTOU #944 Windows: Fix installer target location of file xmlwf.xml for CMake #953 Windows: Address warning -Wunknown-warning-option about -Wno-pedantic-ms-format from LLVM MinGW #971 Address Cppcheck warnings #969 #970 Mass-migrate links from http:// to https:// #947 #958 .. #974 #975 Document changes since the previous release #974 #975 Version info bumped from 11:0:10 (libexpat _.so.1.10.0) to 11:1:10 (libexpat_.so.1.10.1); see https://verbump.de/ for what these numbers do * Version info bumped from 9:3:8 to 9:4:8; see https://verbump.de/ for what these numbers do ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1186=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1186=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1186=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1186=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1186=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1186=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1186=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * expat-debugsource-2.7.1-150000.3.36.1 * libexpat1-2.7.1-150000.3.36.1 * expat-debuginfo-2.7.1-150000.3.36.1 * libexpat1-debuginfo-2.7.1-150000.3.36.1 * libexpat-devel-2.7.1-150000.3.36.1 * expat-2.7.1-150000.3.36.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * expat-32bit-debuginfo-2.7.1-150000.3.36.1 * libexpat1-32bit-debuginfo-2.7.1-150000.3.36.1 * libexpat1-32bit-2.7.1-150000.3.36.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * expat-debugsource-2.7.1-150000.3.36.1 * libexpat1-2.7.1-150000.3.36.1 * expat-debuginfo-2.7.1-150000.3.36.1 * libexpat1-debuginfo-2.7.1-150000.3.36.1 * libexpat-devel-2.7.1-150000.3.36.1 * expat-2.7.1-150000.3.36.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64) * expat-32bit-debuginfo-2.7.1-150000.3.36.1 * libexpat1-32bit-debuginfo-2.7.1-150000.3.36.1 * libexpat1-32bit-2.7.1-150000.3.36.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * expat-debugsource-2.7.1-150000.3.36.1 * libexpat1-2.7.1-150000.3.36.1 * expat-debuginfo-2.7.1-150000.3.36.1 * libexpat1-debuginfo-2.7.1-150000.3.36.1 * libexpat-devel-2.7.1-150000.3.36.1 * expat-2.7.1-150000.3.36.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * expat-32bit-debuginfo-2.7.1-150000.3.36.1 * libexpat1-32bit-debuginfo-2.7.1-150000.3.36.1 * libexpat1-32bit-2.7.1-150000.3.36.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * expat-debugsource-2.7.1-150000.3.36.1 * libexpat1-2.7.1-150000.3.36.1 * expat-debuginfo-2.7.1-150000.3.36.1 * libexpat1-debuginfo-2.7.1-150000.3.36.1 * libexpat-devel-2.7.1-150000.3.36.1 * expat-2.7.1-150000.3.36.1 * SUSE Enterprise Storage 7.1 (x86_64) * expat-32bit-debuginfo-2.7.1-150000.3.36.1 * libexpat1-32bit-debuginfo-2.7.1-150000.3.36.1 * libexpat1-32bit-2.7.1-150000.3.36.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libexpat1-debuginfo-2.7.1-150000.3.36.1 * expat-debuginfo-2.7.1-150000.3.36.1 * expat-debugsource-2.7.1-150000.3.36.1 * libexpat1-2.7.1-150000.3.36.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libexpat1-debuginfo-2.7.1-150000.3.36.1 * expat-debuginfo-2.7.1-150000.3.36.1 * expat-debugsource-2.7.1-150000.3.36.1 * libexpat1-2.7.1-150000.3.36.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libexpat1-debuginfo-2.7.1-150000.3.36.1 * expat-debuginfo-2.7.1-150000.3.36.1 * expat-debugsource-2.7.1-150000.3.36.1 * libexpat1-2.7.1-150000.3.36.1 ## References: * https://www.suse.com/security/cve/CVE-2024-8176.html * https://bugzilla.suse.com/show_bug.cgi?id=1239618 * https://jira.suse.com/browse/PED-12500 * https://jira.suse.com/browse/SLE-21253 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 9 16:37:41 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 09 Apr 2025 16:37:41 -0000 Subject: SUSE-SU-2025:1183-1: important: Security update for the Linux Kernel Message-ID: <174421666179.21179.12413292798502532306@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:1183-1 Release Date: 2025-04-09T13:57:54Z Rating: important References: * bsc#1065729 * bsc#1180814 * bsc#1183682 * bsc#1190336 * bsc#1190768 * bsc#1190786 * bsc#1193629 * bsc#1194869 * bsc#1194904 * bsc#1195823 * bsc#1196444 * bsc#1197158 * bsc#1197174 * bsc#1197227 * bsc#1197246 * bsc#1197302 * bsc#1197331 * bsc#1197472 * bsc#1197661 * bsc#1197926 * bsc#1198019 * bsc#1198021 * bsc#1198240 * bsc#1198577 * bsc#1198660 * bsc#1199657 * bsc#1200045 * bsc#1200571 * bsc#1200807 * bsc#1200809 * bsc#1200810 * bsc#1200824 * bsc#1200825 * bsc#1200871 * bsc#1200872 * bsc#1201193 * bsc#1201218 * bsc#1201323 * bsc#1201381 * bsc#1201610 * bsc#1202672 * bsc#1202711 * bsc#1202712 * bsc#1202771 * bsc#1202774 * bsc#1202778 * bsc#1202781 * bsc#1203699 * bsc#1203769 * bsc#1204171 * bsc#1206048 * bsc#1206049 * bsc#1207034 * bsc#1207186 * bsc#1207593 * bsc#1207640 * bsc#1207878 * bsc#1209262 * bsc#1209547 * bsc#1209788 * bsc#1210050 * bsc#1210647 * bsc#1211263 * bsc#1213167 * bsc#1217339 * bsc#1225742 * bsc#1228483 * bsc#1228708 * bsc#1228779 * bsc#1228966 * bsc#1231375 * bsc#1233479 * bsc#1233557 * bsc#1233558 * bsc#1234464 * bsc#1235528 * bsc#1237029 * bsc#1237521 * bsc#1237530 * bsc#1237718 * bsc#1237721 * bsc#1237722 * bsc#1237723 * bsc#1237724 * bsc#1237725 * bsc#1237726 * bsc#1237727 * bsc#1237728 * bsc#1237729 * bsc#1237734 * bsc#1237735 * bsc#1237736 * bsc#1237737 * bsc#1237738 * bsc#1237739 * bsc#1237740 * bsc#1237742 * bsc#1237743 * bsc#1237745 * bsc#1237746 * bsc#1237748 * bsc#1237751 * bsc#1237752 * bsc#1237753 * bsc#1237755 * bsc#1237759 * bsc#1237761 * bsc#1237763 * bsc#1237766 * bsc#1237767 * bsc#1237768 * bsc#1237774 * bsc#1237775 * bsc#1237778 * bsc#1237779 * bsc#1237780 * bsc#1237782 * bsc#1237783 * bsc#1237784 * bsc#1237785 * bsc#1237786 * bsc#1237787 * bsc#1237788 * bsc#1237789 * bsc#1237795 * bsc#1237797 * bsc#1237798 * bsc#1237807 * bsc#1237808 * bsc#1237810 * bsc#1237812 * bsc#1237813 * bsc#1237814 * bsc#1237815 * bsc#1237817 * bsc#1237818 * bsc#1237821 * bsc#1237823 * bsc#1237824 * bsc#1237826 * bsc#1237827 * bsc#1237829 * bsc#1237831 * bsc#1237835 * bsc#1237836 * bsc#1237837 * bsc#1237839 * bsc#1237840 * bsc#1237845 * bsc#1237846 * bsc#1237868 * bsc#1237872 * bsc#1237875 * bsc#1237877 * bsc#1237890 * bsc#1237892 * bsc#1237903 * bsc#1237904 * bsc#1237916 * bsc#1237918 * bsc#1237922 * bsc#1237925 * bsc#1237926 * bsc#1237929 * bsc#1237931 * bsc#1237932 * bsc#1237933 * bsc#1237937 * bsc#1237939 * bsc#1237940 * bsc#1237941 * bsc#1237942 * bsc#1237946 * bsc#1237951 * bsc#1237952 * bsc#1237954 * bsc#1237955 * bsc#1237957 * bsc#1237958 * bsc#1237959 * bsc#1237960 * bsc#1237961 * bsc#1237963 * bsc#1237965 * bsc#1237966 * bsc#1237967 * bsc#1237968 * bsc#1237969 * bsc#1237970 * bsc#1237971 * bsc#1237973 * bsc#1237975 * bsc#1237976 * bsc#1237978 * bsc#1237979 * bsc#1237983 * bsc#1237984 * bsc#1237986 * bsc#1237987 * bsc#1237990 * bsc#1237996 * bsc#1237997 * bsc#1237998 * bsc#1237999 * bsc#1238000 * bsc#1238003 * bsc#1238006 * bsc#1238007 * bsc#1238010 * bsc#1238011 * bsc#1238012 * bsc#1238013 * bsc#1238014 * bsc#1238016 * bsc#1238017 * bsc#1238018 * bsc#1238019 * bsc#1238021 * bsc#1238022 * bsc#1238024 * bsc#1238030 * bsc#1238036 * bsc#1238037 * bsc#1238041 * bsc#1238046 * bsc#1238047 * bsc#1238071 * bsc#1238077 * bsc#1238079 * bsc#1238080 * bsc#1238089 * bsc#1238090 * bsc#1238091 * bsc#1238092 * bsc#1238096 * bsc#1238097 * bsc#1238099 * bsc#1238103 * bsc#1238105 * bsc#1238106 * bsc#1238108 * bsc#1238110 * bsc#1238111 * bsc#1238112 * bsc#1238113 * bsc#1238115 * bsc#1238116 * bsc#1238120 * bsc#1238123 * bsc#1238125 * bsc#1238126 * bsc#1238127 * bsc#1238131 * bsc#1238134 * bsc#1238135 * bsc#1238138 * bsc#1238139 * bsc#1238140 * bsc#1238142 * bsc#1238144 * bsc#1238146 * bsc#1238147 * bsc#1238149 * bsc#1238150 * bsc#1238155 * bsc#1238156 * bsc#1238157 * bsc#1238158 * bsc#1238162 * bsc#1238166 * bsc#1238167 * bsc#1238168 * bsc#1238169 * bsc#1238170 * bsc#1238171 * bsc#1238172 * bsc#1238175 * bsc#1238176 * bsc#1238177 * bsc#1238180 * bsc#1238181 * bsc#1238183 * bsc#1238184 * bsc#1238228 * bsc#1238229 * bsc#1238231 * bsc#1238234 * bsc#1238235 * bsc#1238236 * bsc#1238238 * bsc#1238239 * bsc#1238241 * bsc#1238242 * bsc#1238243 * bsc#1238244 * bsc#1238246 * bsc#1238247 * bsc#1238248 * bsc#1238249 * bsc#1238253 * bsc#1238255 * bsc#1238256 * bsc#1238257 * bsc#1238260 * bsc#1238262 * bsc#1238263 * bsc#1238264 * bsc#1238266 * bsc#1238267 * bsc#1238268 * bsc#1238269 * bsc#1238270 * bsc#1238271 * bsc#1238272 * bsc#1238274 * bsc#1238275 * bsc#1238276 * bsc#1238277 * bsc#1238278 * bsc#1238279 * bsc#1238281 * bsc#1238282 * bsc#1238283 * bsc#1238284 * bsc#1238286 * bsc#1238287 * bsc#1238288 * bsc#1238289 * bsc#1238292 * bsc#1238293 * bsc#1238295 * bsc#1238298 * bsc#1238301 * bsc#1238302 * bsc#1238306 * bsc#1238307 * bsc#1238308 * bsc#1238309 * bsc#1238311 * bsc#1238313 * bsc#1238326 * bsc#1238327 * bsc#1238328 * bsc#1238331 * bsc#1238333 * bsc#1238334 * bsc#1238336 * bsc#1238337 * bsc#1238338 * bsc#1238339 * bsc#1238343 * bsc#1238345 * bsc#1238372 * bsc#1238373 * bsc#1238374 * bsc#1238376 * bsc#1238377 * bsc#1238381 * bsc#1238382 * bsc#1238383 * bsc#1238386 * bsc#1238387 * bsc#1238388 * bsc#1238389 * bsc#1238390 * bsc#1238391 * bsc#1238392 * bsc#1238393 * bsc#1238394 * bsc#1238395 * bsc#1238396 * bsc#1238397 * bsc#1238400 * bsc#1238410 * bsc#1238411 * bsc#1238413 * bsc#1238415 * bsc#1238416 * bsc#1238417 * bsc#1238418 * bsc#1238419 * bsc#1238420 * bsc#1238423 * bsc#1238428 * bsc#1238429 * bsc#1238430 * bsc#1238431 * bsc#1238432 * bsc#1238433 * bsc#1238434 * bsc#1238435 * bsc#1238436 * bsc#1238437 * bsc#1238440 * bsc#1238441 * bsc#1238442 * bsc#1238443 * bsc#1238444 * bsc#1238445 * bsc#1238446 * bsc#1238447 * bsc#1238453 * bsc#1238454 * bsc#1238458 * bsc#1238459 * bsc#1238462 * bsc#1238463 * bsc#1238465 * bsc#1238467 * bsc#1238469 * bsc#1238533 * bsc#1238536 * bsc#1238538 * bsc#1238539 * bsc#1238540 * bsc#1238543 * bsc#1238545 * bsc#1238546 * bsc#1238556 * bsc#1238557 * bsc#1238599 * bsc#1238600 * bsc#1238601 * bsc#1238602 * bsc#1238605 * bsc#1238612 * bsc#1238615 * bsc#1238617 * bsc#1238618 * bsc#1238619 * bsc#1238621 * bsc#1238623 * bsc#1238625 * bsc#1238626 * bsc#1238630 * bsc#1238631 * bsc#1238632 * bsc#1238633 * bsc#1238635 * bsc#1238636 * bsc#1238638 * bsc#1238639 * bsc#1238640 * bsc#1238641 * bsc#1238642 * bsc#1238643 * bsc#1238645 * bsc#1238646 * bsc#1238647 * bsc#1238650 * bsc#1238653 * bsc#1238654 * bsc#1238655 * bsc#1238662 * bsc#1238663 * bsc#1238664 * bsc#1238666 * bsc#1238668 * bsc#1238705 * bsc#1238707 * bsc#1238710 * bsc#1238712 * bsc#1238718 * bsc#1238719 * bsc#1238721 * bsc#1238722 * bsc#1238727 * bsc#1238729 * bsc#1238750 * bsc#1238787 * bsc#1238789 * bsc#1238792 * bsc#1238799 * bsc#1238804 * bsc#1238805 * bsc#1238808 * bsc#1238809 * bsc#1238811 * bsc#1238814 * bsc#1238815 * bsc#1238816 * bsc#1238817 * bsc#1238818 * bsc#1238819 * bsc#1238821 * bsc#1238823 * bsc#1238825 * bsc#1238830 * bsc#1238834 * bsc#1238835 * bsc#1238836 * bsc#1238838 * bsc#1238867 * bsc#1238868 * bsc#1238869 * bsc#1238870 * bsc#1238871 * bsc#1238878 * bsc#1238889 * bsc#1238892 * bsc#1238893 * bsc#1238897 * bsc#1238898 * bsc#1238899 * bsc#1238902 * bsc#1238911 * bsc#1238916 * bsc#1238919 * bsc#1238925 * bsc#1238930 * bsc#1238933 * bsc#1238936 * bsc#1238937 * bsc#1238938 * bsc#1238939 * bsc#1238943 * bsc#1238945 * bsc#1238948 * bsc#1238949 * bsc#1238950 * bsc#1238951 * bsc#1238952 * bsc#1238954 * bsc#1238956 * bsc#1238957 * bsc#1239001 * bsc#1239004 * bsc#1239016 * bsc#1239035 * bsc#1239036 * bsc#1239040 * bsc#1239041 * bsc#1239051 * bsc#1239060 * bsc#1239061 * bsc#1239070 * bsc#1239071 * bsc#1239073 * bsc#1239076 * bsc#1239109 * bsc#1239115 * bsc#1239126 * bsc#1239452 * bsc#1239454 * bsc#1239968 * bsc#1239969 * bsc#1240133 * bsc#1240195 * bsc#1240205 * bsc#1240207 * bsc#1240208 * bsc#1240210 * bsc#1240212 * bsc#1240213 * bsc#1240218 * bsc#1240220 * bsc#1240227 * bsc#1240229 * bsc#1240231 * bsc#1240242 * bsc#1240245 * bsc#1240247 * bsc#1240250 * bsc#1240254 * bsc#1240256 * bsc#1240264 * bsc#1240266 * bsc#1240272 * bsc#1240275 * bsc#1240276 * bsc#1240278 * bsc#1240279 * bsc#1240280 * bsc#1240281 * bsc#1240282 * bsc#1240283 * bsc#1240284 * bsc#1240286 * bsc#1240288 * bsc#1240290 * bsc#1240292 * bsc#1240293 * bsc#1240297 * bsc#1240304 * bsc#1240308 * bsc#1240309 * bsc#1240317 * bsc#1240318 * bsc#1240322 * jsc#PED-1073 Cross-References: * CVE-2017-5753 * CVE-2021-4453 * CVE-2021-4454 * CVE-2021-47631 * CVE-2021-47632 * CVE-2021-47633 * CVE-2021-47635 * CVE-2021-47636 * CVE-2021-47637 * CVE-2021-47638 * CVE-2021-47639 * CVE-2021-47641 * CVE-2021-47642 * CVE-2021-47643 * CVE-2021-47644 * CVE-2021-47645 * CVE-2021-47646 * CVE-2021-47647 * CVE-2021-47648 * CVE-2021-47649 * CVE-2021-47650 * CVE-2021-47651 * CVE-2021-47652 * CVE-2021-47653 * CVE-2021-47654 * CVE-2021-47656 * CVE-2021-47657 * CVE-2021-47659 * CVE-2022-0168 * CVE-2022-0995 * CVE-2022-1016 * CVE-2022-1048 * CVE-2022-1184 * CVE-2022-2977 * CVE-2022-29900 * CVE-2022-29901 * CVE-2022-3303 * CVE-2022-3435 * CVE-2022-49044 * CVE-2022-49050 * CVE-2022-49051 * CVE-2022-49053 * CVE-2022-49054 * CVE-2022-49055 * CVE-2022-49058 * CVE-2022-49059 * CVE-2022-49060 * CVE-2022-49061 * CVE-2022-49063 * CVE-2022-49065 * CVE-2022-49066 * CVE-2022-49073 * CVE-2022-49074 * CVE-2022-49076 * CVE-2022-49078 * CVE-2022-49082 * CVE-2022-49083 * CVE-2022-49084 * CVE-2022-49085 * CVE-2022-49086 * CVE-2022-49088 * CVE-2022-49089 * CVE-2022-49090 * CVE-2022-49091 * CVE-2022-49092 * CVE-2022-49093 * CVE-2022-49095 * CVE-2022-49096 * CVE-2022-49097 * CVE-2022-49098 * CVE-2022-49099 * CVE-2022-49100 * CVE-2022-49102 * CVE-2022-49103 * CVE-2022-49104 * CVE-2022-49105 * CVE-2022-49106 * CVE-2022-49107 * CVE-2022-49109 * CVE-2022-49111 * CVE-2022-49112 * CVE-2022-49113 * CVE-2022-49114 * CVE-2022-49115 * CVE-2022-49116 * CVE-2022-49118 * CVE-2022-49119 * CVE-2022-49120 * CVE-2022-49121 * CVE-2022-49122 * CVE-2022-49126 * CVE-2022-49128 * CVE-2022-49129 * CVE-2022-49130 * CVE-2022-49131 * CVE-2022-49132 * CVE-2022-49135 * CVE-2022-49137 * CVE-2022-49145 * CVE-2022-49147 * CVE-2022-49148 * CVE-2022-49151 * CVE-2022-49153 * CVE-2022-49154 * CVE-2022-49155 * CVE-2022-49156 * CVE-2022-49157 * CVE-2022-49158 * CVE-2022-49159 * CVE-2022-49160 * CVE-2022-49162 * CVE-2022-49163 * CVE-2022-49164 * CVE-2022-49165 * CVE-2022-49174 * CVE-2022-49175 * CVE-2022-49176 * CVE-2022-49177 * CVE-2022-49179 * CVE-2022-49180 * CVE-2022-49182 * CVE-2022-49185 * CVE-2022-49187 * CVE-2022-49188 * CVE-2022-49189 * CVE-2022-49193 * CVE-2022-49194 * CVE-2022-49196 * CVE-2022-49199 * CVE-2022-49200 * CVE-2022-49201 * CVE-2022-49206 * CVE-2022-49208 * CVE-2022-49212 * CVE-2022-49213 * CVE-2022-49214 * CVE-2022-49216 * CVE-2022-49217 * CVE-2022-49218 * CVE-2022-49221 * CVE-2022-49222 * CVE-2022-49224 * CVE-2022-49226 * CVE-2022-49227 * CVE-2022-49232 * CVE-2022-49235 * CVE-2022-49236 * CVE-2022-49239 * CVE-2022-49241 * CVE-2022-49242 * CVE-2022-49243 * CVE-2022-49244 * CVE-2022-49246 * CVE-2022-49247 * CVE-2022-49248 * CVE-2022-49249 * CVE-2022-49250 * CVE-2022-49251 * CVE-2022-49252 * CVE-2022-49253 * CVE-2022-49254 * CVE-2022-49256 * CVE-2022-49257 * CVE-2022-49258 * CVE-2022-49259 * CVE-2022-49260 * CVE-2022-49261 * CVE-2022-49262 * CVE-2022-49263 * CVE-2022-49264 * CVE-2022-49265 * CVE-2022-49266 * CVE-2022-49268 * CVE-2022-49269 * CVE-2022-49270 * CVE-2022-49271 * CVE-2022-49272 * CVE-2022-49273 * CVE-2022-49274 * CVE-2022-49275 * CVE-2022-49276 * CVE-2022-49277 * CVE-2022-49278 * CVE-2022-49279 * CVE-2022-49280 * CVE-2022-49281 * CVE-2022-49283 * CVE-2022-49285 * CVE-2022-49286 * CVE-2022-49287 * CVE-2022-49288 * CVE-2022-49290 * CVE-2022-49291 * CVE-2022-49292 * CVE-2022-49293 * CVE-2022-49294 * CVE-2022-49295 * CVE-2022-49297 * CVE-2022-49298 * CVE-2022-49299 * CVE-2022-49300 * CVE-2022-49301 * CVE-2022-49302 * CVE-2022-49304 * CVE-2022-49305 * CVE-2022-49307 * CVE-2022-49308 * CVE-2022-49309 * CVE-2022-49310 * CVE-2022-49311 * CVE-2022-49312 * CVE-2022-49313 * CVE-2022-49314 * CVE-2022-49315 * CVE-2022-49316 * CVE-2022-49319 * CVE-2022-49320 * CVE-2022-49321 * CVE-2022-49322 * CVE-2022-49323 * CVE-2022-49326 * CVE-2022-49327 * CVE-2022-49328 * CVE-2022-49331 * CVE-2022-49332 * CVE-2022-49335 * CVE-2022-49336 * CVE-2022-49337 * CVE-2022-49339 * CVE-2022-49341 * CVE-2022-49342 * CVE-2022-49343 * CVE-2022-49345 * CVE-2022-49346 * CVE-2022-49347 * CVE-2022-49348 * CVE-2022-49349 * CVE-2022-49350 * CVE-2022-49351 * CVE-2022-49352 * CVE-2022-49354 * CVE-2022-49356 * CVE-2022-49357 * CVE-2022-49367 * CVE-2022-49368 * CVE-2022-49370 * CVE-2022-49371 * CVE-2022-49373 * CVE-2022-49375 * CVE-2022-49376 * CVE-2022-49377 * CVE-2022-49378 * CVE-2022-49379 * CVE-2022-49381 * CVE-2022-49382 * CVE-2022-49384 * CVE-2022-49385 * CVE-2022-49386 * CVE-2022-49389 * CVE-2022-49392 * CVE-2022-49394 * CVE-2022-49396 * CVE-2022-49397 * CVE-2022-49398 * CVE-2022-49399 * CVE-2022-49400 * CVE-2022-49402 * CVE-2022-49404 * CVE-2022-49407 * CVE-2022-49409 * CVE-2022-49410 * CVE-2022-49411 * CVE-2022-49412 * CVE-2022-49413 * CVE-2022-49414 * CVE-2022-49416 * CVE-2022-49418 * CVE-2022-49421 * CVE-2022-49422 * CVE-2022-49424 * CVE-2022-49426 * CVE-2022-49427 * CVE-2022-49429 * CVE-2022-49430 * CVE-2022-49431 * CVE-2022-49432 * CVE-2022-49433 * CVE-2022-49434 * CVE-2022-49435 * CVE-2022-49437 * CVE-2022-49438 * CVE-2022-49440 * CVE-2022-49441 * CVE-2022-49442 * CVE-2022-49443 * CVE-2022-49444 * CVE-2022-49445 * CVE-2022-49447 * CVE-2022-49448 * CVE-2022-49449 * CVE-2022-49451 * CVE-2022-49453 * CVE-2022-49455 * CVE-2022-49459 * CVE-2022-49460 * CVE-2022-49462 * CVE-2022-49463 * CVE-2022-49465 * CVE-2022-49466 * CVE-2022-49467 * CVE-2022-49468 * CVE-2022-49472 * CVE-2022-49473 * CVE-2022-49474 * CVE-2022-49475 * CVE-2022-49477 * CVE-2022-49478 * CVE-2022-49480 * CVE-2022-49481 * CVE-2022-49482 * CVE-2022-49486 * CVE-2022-49487 * CVE-2022-49488 * CVE-2022-49489 * CVE-2022-49490 * CVE-2022-49491 * CVE-2022-49492 * CVE-2022-49493 * CVE-2022-49494 * CVE-2022-49495 * CVE-2022-49498 * CVE-2022-49501 * CVE-2022-49502 * CVE-2022-49503 * CVE-2022-49504 * CVE-2022-49505 * CVE-2022-49506 * CVE-2022-49507 * CVE-2022-49508 * CVE-2022-49509 * CVE-2022-49512 * CVE-2022-49514 * CVE-2022-49515 * CVE-2022-49517 * CVE-2022-49519 * CVE-2022-49520 * CVE-2022-49521 * CVE-2022-49522 * CVE-2022-49523 * CVE-2022-49524 * CVE-2022-49525 * CVE-2022-49526 * CVE-2022-49527 * CVE-2022-49532 * CVE-2022-49534 * CVE-2022-49535 * CVE-2022-49536 * CVE-2022-49537 * CVE-2022-49541 * CVE-2022-49542 * CVE-2022-49544 * CVE-2022-49545 * CVE-2022-49546 * CVE-2022-49549 * CVE-2022-49551 * CVE-2022-49555 * CVE-2022-49556 * CVE-2022-49559 * CVE-2022-49562 * CVE-2022-49563 * CVE-2022-49564 * CVE-2022-49566 * CVE-2022-49568 * CVE-2022-49569 * CVE-2022-49570 * CVE-2022-49579 * CVE-2022-49581 * CVE-2022-49583 * CVE-2022-49584 * CVE-2022-49591 * CVE-2022-49592 * CVE-2022-49603 * CVE-2022-49605 * CVE-2022-49606 * CVE-2022-49607 * CVE-2022-49609 * CVE-2022-49610 * CVE-2022-49611 * CVE-2022-49613 * CVE-2022-49615 * CVE-2022-49616 * CVE-2022-49617 * CVE-2022-49618 * CVE-2022-49621 * CVE-2022-49623 * CVE-2022-49625 * CVE-2022-49626 * CVE-2022-49627 * CVE-2022-49628 * CVE-2022-49631 * CVE-2022-49634 * CVE-2022-49640 * CVE-2022-49641 * CVE-2022-49642 * CVE-2022-49643 * CVE-2022-49644 * CVE-2022-49645 * CVE-2022-49646 * CVE-2022-49647 * CVE-2022-49648 * CVE-2022-49649 * CVE-2022-49650 * CVE-2022-49652 * CVE-2022-49653 * CVE-2022-49656 * CVE-2022-49657 * CVE-2022-49661 * CVE-2022-49663 * CVE-2022-49665 * CVE-2022-49667 * CVE-2022-49668 * CVE-2022-49670 * CVE-2022-49671 * CVE-2022-49672 * CVE-2022-49673 * CVE-2022-49674 * CVE-2022-49675 * CVE-2022-49676 * CVE-2022-49677 * CVE-2022-49678 * CVE-2022-49679 * CVE-2022-49680 * CVE-2022-49683 * CVE-2022-49685 * CVE-2022-49687 * CVE-2022-49688 * CVE-2022-49693 * CVE-2022-49695 * CVE-2022-49699 * CVE-2022-49700 * CVE-2022-49701 * CVE-2022-49703 * CVE-2022-49704 * CVE-2022-49705 * CVE-2022-49707 * CVE-2022-49708 * CVE-2022-49710 * CVE-2022-49711 * CVE-2022-49712 * CVE-2022-49713 * CVE-2022-49714 * CVE-2022-49715 * CVE-2022-49716 * CVE-2022-49719 * CVE-2022-49720 * CVE-2022-49721 * CVE-2022-49722 * CVE-2022-49723 * CVE-2022-49724 * CVE-2022-49725 * CVE-2022-49726 * CVE-2022-49729 * CVE-2022-49730 * CVE-2022-49731 * CVE-2022-49733 * CVE-2022-49739 * CVE-2022-49746 * CVE-2022-49748 * CVE-2022-49751 * CVE-2022-49753 * CVE-2022-49755 * CVE-2022-49759 * CVE-2023-0179 * CVE-2023-1652 * CVE-2023-2162 * CVE-2023-28410 * CVE-2023-3567 * CVE-2023-52930 * CVE-2023-52933 * CVE-2023-52935 * CVE-2023-52939 * CVE-2023-52941 * CVE-2023-52973 * CVE-2023-52974 * CVE-2023-52975 * CVE-2023-52976 * CVE-2023-52979 * CVE-2023-52983 * CVE-2023-52984 * CVE-2023-52988 * CVE-2023-52989 * CVE-2023-52992 * CVE-2023-52993 * CVE-2023-53000 * CVE-2023-53005 * CVE-2023-53006 * CVE-2023-53007 * CVE-2023-53008 * CVE-2023-53010 * CVE-2023-53015 * CVE-2023-53016 * CVE-2023-53019 * CVE-2023-53023 * CVE-2023-53024 * CVE-2023-53025 * CVE-2023-53026 * CVE-2023-53028 * CVE-2023-53029 * CVE-2023-53030 * CVE-2023-53033 * CVE-2024-2201 * CVE-2024-41092 * CVE-2024-42098 * CVE-2024-42229 * CVE-2024-42240 * CVE-2024-50290 * CVE-2024-53063 * CVE-2024-53064 * CVE-2024-56651 * CVE-2024-57996 * CVE-2024-58014 * CVE-2024-58083 * CVE-2025-21693 * CVE-2025-21714 * CVE-2025-21718 * CVE-2025-21732 * CVE-2025-21753 * CVE-2025-21772 * CVE-2025-21780 * CVE-2025-21839 CVSS scores: * CVE-2017-5753 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( SUSE ): 7.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( NVD ): 5.6 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2021-4453 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-4453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-4453 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-4454 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-4454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47631 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47631 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47632 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47632 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47633 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2021-47633 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47635 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2021-47635 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47636 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47636 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2021-47637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47637 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47638 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2021-47638 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47638 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47639 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2021-47639 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47639 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47641 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47641 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47642 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2021-47642 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2021-47643 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47643 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47644 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2021-47644 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47644 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47645 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47646 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2021-47646 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47646 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47647 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47649 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47650 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47651 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47651 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47651 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47652 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47652 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47653 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47653 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47653 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47654 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2021-47654 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47654 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47656 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2021-47656 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47656 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47657 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47657 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47659 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2021-47659 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-0168 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-0168 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-0995 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-0995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-1016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-1016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-1048 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-1048 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-1184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-2977 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2022-2977 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-29900 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-29900 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2022-29901 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-29901 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2022-3303 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3303 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3435 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2022-3435 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2022-49044 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49044 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49050 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49050 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49051 ( SUSE ): 4.3 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2022-49051 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N * CVE-2022-49053 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49053 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49053 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49054 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2022-49054 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2022-49055 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49058 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49059 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49059 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49060 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49061 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49061 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49063 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49063 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49063 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49065 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49065 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49066 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49073 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49074 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49076 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49076 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49078 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49078 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49082 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49082 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49083 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49084 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49085 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49085 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49086 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49086 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49088 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49089 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49089 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2022-49090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49091 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49093 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49093 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49096 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49096 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2022-49096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49097 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49098 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49098 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49099 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49100 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49103 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49103 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49105 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49105 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49106 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49106 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49107 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49107 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49111 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49112 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49113 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49113 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49114 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49114 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49114 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49115 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49115 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49118 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49119 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49119 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49120 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49121 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49122 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49126 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49126 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49128 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49128 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49128 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49129 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49130 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49130 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49131 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49131 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49132 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49135 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49135 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49137 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49137 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49137 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49145 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49145 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-49147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49153 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49153 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49154 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49154 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2022-49155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49155 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49156 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49157 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49157 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49158 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2022-49158 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2022-49159 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49159 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49162 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49163 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49163 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49164 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49165 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49165 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49175 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49176 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49176 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49177 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49177 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49179 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49182 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49187 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49189 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2022-49189 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2022-49193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49194 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49196 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49201 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49206 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49206 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49208 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49208 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49212 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49212 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49213 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49213 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49213 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49214 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49216 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49216 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49218 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49221 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49221 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49222 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49222 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49226 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49232 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49232 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49235 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49235 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49236 ( SUSE ): 7.5 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49236 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49236 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49239 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49241 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49241 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49241 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49242 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49242 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49243 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49243 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49248 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49249 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49250 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49254 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49254 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49257 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49258 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49260 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49260 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2022-49261 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49261 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49262 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49262 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49266 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49266 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49268 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49268 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49269 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2022-49269 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2022-49270 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49270 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49271 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49273 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49274 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49275 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49275 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49275 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49276 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49277 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49279 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49279 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49280 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49281 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49283 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49285 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49286 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49286 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49287 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49288 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49290 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49290 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2022-49291 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49291 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49291 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49292 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49293 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49294 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49295 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49295 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49297 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49297 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49298 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49298 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49299 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49300 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49300 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49301 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49301 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49302 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49304 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49305 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49307 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49308 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49309 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49309 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49310 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49310 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49311 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49311 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49312 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49312 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49313 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49314 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49314 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49315 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49316 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49316 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49316 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49319 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49319 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49320 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49321 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49321 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49321 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49322 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49322 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49323 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49323 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49323 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49326 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49326 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49326 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49327 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49327 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49328 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49328 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49328 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49331 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49332 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49335 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49335 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49336 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49336 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49337 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49339 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49339 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49341 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49341 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49342 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49342 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49342 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49343 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49343 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49345 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49346 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49346 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49347 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49347 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49348 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49348 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49349 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49349 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49350 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49350 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49352 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49352 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49354 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49354 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49356 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49357 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49357 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49367 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49370 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49373 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49375 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49376 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49377 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49377 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49378 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49381 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49382 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49385 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49392 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49392 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49394 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49394 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49398 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49400 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49402 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49404 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49411 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49411 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49412 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49413 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49413 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49413 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49414 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49416 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49421 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49426 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49426 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49429 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49429 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49431 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49432 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49432 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49434 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49437 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49437 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49438 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49440 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49440 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49444 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49447 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49447 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49448 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49449 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49449 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49453 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49455 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49459 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49460 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49460 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49462 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49465 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49465 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49465 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49466 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49467 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49468 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49468 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49472 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49472 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49473 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49474 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49474 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49475 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49477 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49480 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49481 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49482 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49487 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49487 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49489 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49489 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49490 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49491 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49492 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49493 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49493 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49495 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49498 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2022-49498 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2022-49501 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49501 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49502 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49502 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49504 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49505 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49505 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49506 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49508 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49512 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49514 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49517 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49519 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49519 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49520 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2022-49520 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2022-49521 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49521 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49522 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49523 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49523 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49524 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49524 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49525 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49525 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49526 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49526 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49527 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49527 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49527 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49532 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49532 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49534 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49534 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49534 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49535 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49535 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49535 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49536 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49536 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49536 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49537 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49537 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49541 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49541 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2022-49541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49542 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49544 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49544 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49544 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49545 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49545 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49546 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49546 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49549 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49551 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49555 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49563 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49564 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49566 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49568 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49568 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49568 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49569 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49570 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49570 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49579 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49579 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49583 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49591 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49591 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49603 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49605 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49607 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49609 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49610 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2022-49610 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2022-49611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49613 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49615 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49615 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49616 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49617 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49618 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49618 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49618 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49621 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49621 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49621 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49623 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49626 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49626 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49627 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49627 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49628 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49631 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49634 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49640 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49641 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49642 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49643 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49644 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49644 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49646 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49647 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49652 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49653 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49653 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49656 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49657 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49667 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49668 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49673 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49676 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49679 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49685 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49693 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49700 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49704 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49711 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49711 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49720 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49729 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49729 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49729 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49730 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49731 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49731 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49733 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49739 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49746 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49748 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49751 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49753 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49755 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49755 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49759 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0179 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1652 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1652 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-1652 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-2162 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-28410 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-28410 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-3567 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52935 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52973 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52975 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52975 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52992 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53008 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53023 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53025 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-2201 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-2201 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-41092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41092 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-42098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42229 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42229 ( NVD ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2024-42240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-42240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-42240 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56651 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56651 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58014 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21718 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21780 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that solves 530 vulnerabilities, contains one feature and has 59 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918). * CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled (bsc#1238919). * CVE-2022-49739: gfs2: Always check inode size of inline inodes (bsc#1240207). * CVE-2023-52935: mm/khugepaged: fix ->anon_vma race (bsc#1240276). * CVE-2024-2201: Fixed information leak in x86/BHI (bsc#1217339). * CVE-2024-41092: drm/i915/gt: Fix potential UAF by revoke of fence registers (bsc#1228483). * CVE-2024-42098: crypto: ecdh - explicitly zeroize private_key (bsc#1228779). * CVE-2024-42229: crypto: aead,cipher - zeroize key buffer after use (bsc#1228708). * CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558 bsc#1234464). * CVE-2024-56651: can: hi311x: hi3110_can_ist(): fix potential use-after-free (bsc#1235528). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076). * CVE-2024-58014: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (bsc#1239109). * CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036). * CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029). * CVE-2025-21714: RDMA/mlx5: Fix implicit ODP use after free (bsc#1237890). * CVE-2025-21718: net: rose: fix timer races against user threads (bsc#1239073). * CVE-2025-21732: RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error (bsc#1237877). * CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875). * CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238911). * CVE-2025-21780: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (bsc#1239115). * CVE-2025-21839: kABI: Fix kABI after backport od CVE-2025-21839 (bsc#1239061). The following non-security bugs were fixed: * ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016). * RDMA/mana_ib: Use v2 version of cfg_rx_steer_req to enable RX coalescing (bsc#1239016). * RDMA/mlx5: Fix implicit ODP hang on parent deregistration (git-fixes) * btrfs: defrag: do not use merged extent map for their generation check (bsc#1239968). * btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1239968). * btrfs: fix extent map merging not happening for adjacent extents (bsc#1239968). * btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1239969). * btrfs: send: fix invalid clone operation for file that got its size decreased (bsc#1239969). * gfs2: Fix inode height consistency check (git-fixes). * mm/mmu_notifier.c: fix race in mmu_interval_notifier_remove() (bsc#1239126). * mm: zswap: move allocations during CPU init outside the lock (git-fixes). * net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016). * net: mana: Allow variable size indirection table (bsc#1239016). * net: mana: Avoid open coded arithmetic (bsc#1239016). * net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (bsc#1240195). * net: mana: Support holes in device list reply msg (bsc#1240133). * x86/bhi: Avoid warning in #DB handler due to BHI mitigation (git-fixes). * x86/bugs: Cache the value of MSR_IA32_ARCH_CAPABILITIES (git-fixes). * x86/bugs: Fix BHI documentation (git-fixes). * x86/bugs: Fix BHI handling of RRSBA (git-fixes). * x86/bugs: Fix BHI retpoline check (git-fixes). * x86/bugs: Fix return type of spectre_bhi_state() (git-fixes). * x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git- fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1183=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1183=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1183=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1183=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.115.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.115.1 * kernel-rt-debugsource-5.14.21-150400.15.115.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * kernel-source-rt-5.14.21-150400.15.115.1 * SUSE Linux Enterprise Micro 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.115.1 * SUSE Linux Enterprise Micro 5.4 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.115.1 * kernel-rt-debugsource-5.14.21-150400.15.115.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * kernel-source-rt-5.14.21-150400.15.115.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.115.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.115.1 * kernel-rt-debugsource-5.14.21-150400.15.115.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * kernel-source-rt-5.14.21-150400.15.115.1 * SUSE Linux Enterprise Micro 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.115.1 * SUSE Linux Enterprise Micro 5.3 (x86_64) * kernel-rt-debuginfo-5.14.21-150400.15.115.1 * kernel-rt-debugsource-5.14.21-150400.15.115.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * kernel-source-rt-5.14.21-150400.15.115.1 ## References: * https://www.suse.com/security/cve/CVE-2017-5753.html * https://www.suse.com/security/cve/CVE-2021-4453.html * https://www.suse.com/security/cve/CVE-2021-4454.html * https://www.suse.com/security/cve/CVE-2021-47631.html * https://www.suse.com/security/cve/CVE-2021-47632.html * https://www.suse.com/security/cve/CVE-2021-47633.html * https://www.suse.com/security/cve/CVE-2021-47635.html * https://www.suse.com/security/cve/CVE-2021-47636.html * https://www.suse.com/security/cve/CVE-2021-47637.html * https://www.suse.com/security/cve/CVE-2021-47638.html * https://www.suse.com/security/cve/CVE-2021-47639.html * https://www.suse.com/security/cve/CVE-2021-47641.html * https://www.suse.com/security/cve/CVE-2021-47642.html * https://www.suse.com/security/cve/CVE-2021-47643.html * https://www.suse.com/security/cve/CVE-2021-47644.html * https://www.suse.com/security/cve/CVE-2021-47645.html * https://www.suse.com/security/cve/CVE-2021-47646.html * https://www.suse.com/security/cve/CVE-2021-47647.html * https://www.suse.com/security/cve/CVE-2021-47648.html * https://www.suse.com/security/cve/CVE-2021-47649.html * https://www.suse.com/security/cve/CVE-2021-47650.html * https://www.suse.com/security/cve/CVE-2021-47651.html * https://www.suse.com/security/cve/CVE-2021-47652.html * https://www.suse.com/security/cve/CVE-2021-47653.html * https://www.suse.com/security/cve/CVE-2021-47654.html * https://www.suse.com/security/cve/CVE-2021-47656.html * https://www.suse.com/security/cve/CVE-2021-47657.html * https://www.suse.com/security/cve/CVE-2021-47659.html * https://www.suse.com/security/cve/CVE-2022-0168.html * https://www.suse.com/security/cve/CVE-2022-0995.html * https://www.suse.com/security/cve/CVE-2022-1016.html * https://www.suse.com/security/cve/CVE-2022-1048.html * https://www.suse.com/security/cve/CVE-2022-1184.html * https://www.suse.com/security/cve/CVE-2022-2977.html * https://www.suse.com/security/cve/CVE-2022-29900.html * https://www.suse.com/security/cve/CVE-2022-29901.html * https://www.suse.com/security/cve/CVE-2022-3303.html * https://www.suse.com/security/cve/CVE-2022-3435.html * https://www.suse.com/security/cve/CVE-2022-49044.html * https://www.suse.com/security/cve/CVE-2022-49050.html * https://www.suse.com/security/cve/CVE-2022-49051.html * https://www.suse.com/security/cve/CVE-2022-49053.html * https://www.suse.com/security/cve/CVE-2022-49054.html * https://www.suse.com/security/cve/CVE-2022-49055.html * https://www.suse.com/security/cve/CVE-2022-49058.html * https://www.suse.com/security/cve/CVE-2022-49059.html * https://www.suse.com/security/cve/CVE-2022-49060.html * https://www.suse.com/security/cve/CVE-2022-49061.html * https://www.suse.com/security/cve/CVE-2022-49063.html * https://www.suse.com/security/cve/CVE-2022-49065.html * https://www.suse.com/security/cve/CVE-2022-49066.html * https://www.suse.com/security/cve/CVE-2022-49073.html * https://www.suse.com/security/cve/CVE-2022-49074.html * https://www.suse.com/security/cve/CVE-2022-49076.html * https://www.suse.com/security/cve/CVE-2022-49078.html * https://www.suse.com/security/cve/CVE-2022-49082.html * https://www.suse.com/security/cve/CVE-2022-49083.html * https://www.suse.com/security/cve/CVE-2022-49084.html * https://www.suse.com/security/cve/CVE-2022-49085.html * https://www.suse.com/security/cve/CVE-2022-49086.html * https://www.suse.com/security/cve/CVE-2022-49088.html * https://www.suse.com/security/cve/CVE-2022-49089.html * https://www.suse.com/security/cve/CVE-2022-49090.html * https://www.suse.com/security/cve/CVE-2022-49091.html * https://www.suse.com/security/cve/CVE-2022-49092.html * https://www.suse.com/security/cve/CVE-2022-49093.html * https://www.suse.com/security/cve/CVE-2022-49095.html * https://www.suse.com/security/cve/CVE-2022-49096.html * https://www.suse.com/security/cve/CVE-2022-49097.html * https://www.suse.com/security/cve/CVE-2022-49098.html * https://www.suse.com/security/cve/CVE-2022-49099.html * https://www.suse.com/security/cve/CVE-2022-49100.html * https://www.suse.com/security/cve/CVE-2022-49102.html * https://www.suse.com/security/cve/CVE-2022-49103.html * https://www.suse.com/security/cve/CVE-2022-49104.html * https://www.suse.com/security/cve/CVE-2022-49105.html * https://www.suse.com/security/cve/CVE-2022-49106.html * https://www.suse.com/security/cve/CVE-2022-49107.html * https://www.suse.com/security/cve/CVE-2022-49109.html * https://www.suse.com/security/cve/CVE-2022-49111.html * https://www.suse.com/security/cve/CVE-2022-49112.html * https://www.suse.com/security/cve/CVE-2022-49113.html * https://www.suse.com/security/cve/CVE-2022-49114.html * https://www.suse.com/security/cve/CVE-2022-49115.html * https://www.suse.com/security/cve/CVE-2022-49116.html * https://www.suse.com/security/cve/CVE-2022-49118.html * https://www.suse.com/security/cve/CVE-2022-49119.html * https://www.suse.com/security/cve/CVE-2022-49120.html * https://www.suse.com/security/cve/CVE-2022-49121.html * https://www.suse.com/security/cve/CVE-2022-49122.html * https://www.suse.com/security/cve/CVE-2022-49126.html * https://www.suse.com/security/cve/CVE-2022-49128.html * https://www.suse.com/security/cve/CVE-2022-49129.html * https://www.suse.com/security/cve/CVE-2022-49130.html * https://www.suse.com/security/cve/CVE-2022-49131.html * https://www.suse.com/security/cve/CVE-2022-49132.html * https://www.suse.com/security/cve/CVE-2022-49135.html * https://www.suse.com/security/cve/CVE-2022-49137.html * https://www.suse.com/security/cve/CVE-2022-49145.html * https://www.suse.com/security/cve/CVE-2022-49147.html * https://www.suse.com/security/cve/CVE-2022-49148.html * https://www.suse.com/security/cve/CVE-2022-49151.html * https://www.suse.com/security/cve/CVE-2022-49153.html * https://www.suse.com/security/cve/CVE-2022-49154.html * https://www.suse.com/security/cve/CVE-2022-49155.html * https://www.suse.com/security/cve/CVE-2022-49156.html * https://www.suse.com/security/cve/CVE-2022-49157.html * https://www.suse.com/security/cve/CVE-2022-49158.html * https://www.suse.com/security/cve/CVE-2022-49159.html * https://www.suse.com/security/cve/CVE-2022-49160.html * https://www.suse.com/security/cve/CVE-2022-49162.html * https://www.suse.com/security/cve/CVE-2022-49163.html * https://www.suse.com/security/cve/CVE-2022-49164.html * https://www.suse.com/security/cve/CVE-2022-49165.html * https://www.suse.com/security/cve/CVE-2022-49174.html * https://www.suse.com/security/cve/CVE-2022-49175.html * https://www.suse.com/security/cve/CVE-2022-49176.html * https://www.suse.com/security/cve/CVE-2022-49177.html * https://www.suse.com/security/cve/CVE-2022-49179.html * https://www.suse.com/security/cve/CVE-2022-49180.html * https://www.suse.com/security/cve/CVE-2022-49182.html * https://www.suse.com/security/cve/CVE-2022-49185.html * https://www.suse.com/security/cve/CVE-2022-49187.html * https://www.suse.com/security/cve/CVE-2022-49188.html * https://www.suse.com/security/cve/CVE-2022-49189.html * https://www.suse.com/security/cve/CVE-2022-49193.html * https://www.suse.com/security/cve/CVE-2022-49194.html * https://www.suse.com/security/cve/CVE-2022-49196.html * https://www.suse.com/security/cve/CVE-2022-49199.html * https://www.suse.com/security/cve/CVE-2022-49200.html * https://www.suse.com/security/cve/CVE-2022-49201.html * https://www.suse.com/security/cve/CVE-2022-49206.html * https://www.suse.com/security/cve/CVE-2022-49208.html * https://www.suse.com/security/cve/CVE-2022-49212.html * https://www.suse.com/security/cve/CVE-2022-49213.html * https://www.suse.com/security/cve/CVE-2022-49214.html * https://www.suse.com/security/cve/CVE-2022-49216.html * https://www.suse.com/security/cve/CVE-2022-49217.html * https://www.suse.com/security/cve/CVE-2022-49218.html * https://www.suse.com/security/cve/CVE-2022-49221.html * https://www.suse.com/security/cve/CVE-2022-49222.html * https://www.suse.com/security/cve/CVE-2022-49224.html * https://www.suse.com/security/cve/CVE-2022-49226.html * https://www.suse.com/security/cve/CVE-2022-49227.html * https://www.suse.com/security/cve/CVE-2022-49232.html * https://www.suse.com/security/cve/CVE-2022-49235.html * https://www.suse.com/security/cve/CVE-2022-49236.html * https://www.suse.com/security/cve/CVE-2022-49239.html * https://www.suse.com/security/cve/CVE-2022-49241.html * https://www.suse.com/security/cve/CVE-2022-49242.html * https://www.suse.com/security/cve/CVE-2022-49243.html * https://www.suse.com/security/cve/CVE-2022-49244.html * https://www.suse.com/security/cve/CVE-2022-49246.html * https://www.suse.com/security/cve/CVE-2022-49247.html * https://www.suse.com/security/cve/CVE-2022-49248.html * https://www.suse.com/security/cve/CVE-2022-49249.html * https://www.suse.com/security/cve/CVE-2022-49250.html * https://www.suse.com/security/cve/CVE-2022-49251.html * https://www.suse.com/security/cve/CVE-2022-49252.html * https://www.suse.com/security/cve/CVE-2022-49253.html * https://www.suse.com/security/cve/CVE-2022-49254.html * https://www.suse.com/security/cve/CVE-2022-49256.html * https://www.suse.com/security/cve/CVE-2022-49257.html * https://www.suse.com/security/cve/CVE-2022-49258.html * https://www.suse.com/security/cve/CVE-2022-49259.html * https://www.suse.com/security/cve/CVE-2022-49260.html * https://www.suse.com/security/cve/CVE-2022-49261.html * https://www.suse.com/security/cve/CVE-2022-49262.html * https://www.suse.com/security/cve/CVE-2022-49263.html * https://www.suse.com/security/cve/CVE-2022-49264.html * https://www.suse.com/security/cve/CVE-2022-49265.html * https://www.suse.com/security/cve/CVE-2022-49266.html * https://www.suse.com/security/cve/CVE-2022-49268.html * https://www.suse.com/security/cve/CVE-2022-49269.html * https://www.suse.com/security/cve/CVE-2022-49270.html * https://www.suse.com/security/cve/CVE-2022-49271.html * https://www.suse.com/security/cve/CVE-2022-49272.html * https://www.suse.com/security/cve/CVE-2022-49273.html * https://www.suse.com/security/cve/CVE-2022-49274.html * https://www.suse.com/security/cve/CVE-2022-49275.html * https://www.suse.com/security/cve/CVE-2022-49276.html * https://www.suse.com/security/cve/CVE-2022-49277.html * https://www.suse.com/security/cve/CVE-2022-49278.html * https://www.suse.com/security/cve/CVE-2022-49279.html * https://www.suse.com/security/cve/CVE-2022-49280.html * https://www.suse.com/security/cve/CVE-2022-49281.html * https://www.suse.com/security/cve/CVE-2022-49283.html * https://www.suse.com/security/cve/CVE-2022-49285.html * https://www.suse.com/security/cve/CVE-2022-49286.html * https://www.suse.com/security/cve/CVE-2022-49287.html * https://www.suse.com/security/cve/CVE-2022-49288.html * https://www.suse.com/security/cve/CVE-2022-49290.html * https://www.suse.com/security/cve/CVE-2022-49291.html * https://www.suse.com/security/cve/CVE-2022-49292.html * https://www.suse.com/security/cve/CVE-2022-49293.html * https://www.suse.com/security/cve/CVE-2022-49294.html * https://www.suse.com/security/cve/CVE-2022-49295.html * https://www.suse.com/security/cve/CVE-2022-49297.html * https://www.suse.com/security/cve/CVE-2022-49298.html * https://www.suse.com/security/cve/CVE-2022-49299.html * https://www.suse.com/security/cve/CVE-2022-49300.html * https://www.suse.com/security/cve/CVE-2022-49301.html * https://www.suse.com/security/cve/CVE-2022-49302.html * https://www.suse.com/security/cve/CVE-2022-49304.html * https://www.suse.com/security/cve/CVE-2022-49305.html * https://www.suse.com/security/cve/CVE-2022-49307.html * https://www.suse.com/security/cve/CVE-2022-49308.html * https://www.suse.com/security/cve/CVE-2022-49309.html * https://www.suse.com/security/cve/CVE-2022-49310.html * https://www.suse.com/security/cve/CVE-2022-49311.html * https://www.suse.com/security/cve/CVE-2022-49312.html * https://www.suse.com/security/cve/CVE-2022-49313.html * https://www.suse.com/security/cve/CVE-2022-49314.html * https://www.suse.com/security/cve/CVE-2022-49315.html * https://www.suse.com/security/cve/CVE-2022-49316.html * https://www.suse.com/security/cve/CVE-2022-49319.html * https://www.suse.com/security/cve/CVE-2022-49320.html * https://www.suse.com/security/cve/CVE-2022-49321.html * https://www.suse.com/security/cve/CVE-2022-49322.html * https://www.suse.com/security/cve/CVE-2022-49323.html * https://www.suse.com/security/cve/CVE-2022-49326.html * https://www.suse.com/security/cve/CVE-2022-49327.html * https://www.suse.com/security/cve/CVE-2022-49328.html * https://www.suse.com/security/cve/CVE-2022-49331.html * https://www.suse.com/security/cve/CVE-2022-49332.html * https://www.suse.com/security/cve/CVE-2022-49335.html * https://www.suse.com/security/cve/CVE-2022-49336.html * https://www.suse.com/security/cve/CVE-2022-49337.html * https://www.suse.com/security/cve/CVE-2022-49339.html * https://www.suse.com/security/cve/CVE-2022-49341.html * https://www.suse.com/security/cve/CVE-2022-49342.html * https://www.suse.com/security/cve/CVE-2022-49343.html * https://www.suse.com/security/cve/CVE-2022-49345.html * https://www.suse.com/security/cve/CVE-2022-49346.html * https://www.suse.com/security/cve/CVE-2022-49347.html * https://www.suse.com/security/cve/CVE-2022-49348.html * https://www.suse.com/security/cve/CVE-2022-49349.html * https://www.suse.com/security/cve/CVE-2022-49350.html * https://www.suse.com/security/cve/CVE-2022-49351.html * https://www.suse.com/security/cve/CVE-2022-49352.html * https://www.suse.com/security/cve/CVE-2022-49354.html * https://www.suse.com/security/cve/CVE-2022-49356.html * https://www.suse.com/security/cve/CVE-2022-49357.html * https://www.suse.com/security/cve/CVE-2022-49367.html * https://www.suse.com/security/cve/CVE-2022-49368.html * https://www.suse.com/security/cve/CVE-2022-49370.html * https://www.suse.com/security/cve/CVE-2022-49371.html * https://www.suse.com/security/cve/CVE-2022-49373.html * https://www.suse.com/security/cve/CVE-2022-49375.html * https://www.suse.com/security/cve/CVE-2022-49376.html * https://www.suse.com/security/cve/CVE-2022-49377.html * https://www.suse.com/security/cve/CVE-2022-49378.html * https://www.suse.com/security/cve/CVE-2022-49379.html * https://www.suse.com/security/cve/CVE-2022-49381.html * https://www.suse.com/security/cve/CVE-2022-49382.html * https://www.suse.com/security/cve/CVE-2022-49384.html * https://www.suse.com/security/cve/CVE-2022-49385.html * https://www.suse.com/security/cve/CVE-2022-49386.html * https://www.suse.com/security/cve/CVE-2022-49389.html * https://www.suse.com/security/cve/CVE-2022-49392.html * https://www.suse.com/security/cve/CVE-2022-49394.html * https://www.suse.com/security/cve/CVE-2022-49396.html * https://www.suse.com/security/cve/CVE-2022-49397.html * https://www.suse.com/security/cve/CVE-2022-49398.html * https://www.suse.com/security/cve/CVE-2022-49399.html * https://www.suse.com/security/cve/CVE-2022-49400.html * https://www.suse.com/security/cve/CVE-2022-49402.html * https://www.suse.com/security/cve/CVE-2022-49404.html * https://www.suse.com/security/cve/CVE-2022-49407.html * https://www.suse.com/security/cve/CVE-2022-49409.html * https://www.suse.com/security/cve/CVE-2022-49410.html * https://www.suse.com/security/cve/CVE-2022-49411.html * https://www.suse.com/security/cve/CVE-2022-49412.html * https://www.suse.com/security/cve/CVE-2022-49413.html * https://www.suse.com/security/cve/CVE-2022-49414.html * https://www.suse.com/security/cve/CVE-2022-49416.html * https://www.suse.com/security/cve/CVE-2022-49418.html * https://www.suse.com/security/cve/CVE-2022-49421.html * https://www.suse.com/security/cve/CVE-2022-49422.html * https://www.suse.com/security/cve/CVE-2022-49424.html * https://www.suse.com/security/cve/CVE-2022-49426.html * https://www.suse.com/security/cve/CVE-2022-49427.html * https://www.suse.com/security/cve/CVE-2022-49429.html * https://www.suse.com/security/cve/CVE-2022-49430.html * https://www.suse.com/security/cve/CVE-2022-49431.html * https://www.suse.com/security/cve/CVE-2022-49432.html * https://www.suse.com/security/cve/CVE-2022-49433.html * https://www.suse.com/security/cve/CVE-2022-49434.html * https://www.suse.com/security/cve/CVE-2022-49435.html * https://www.suse.com/security/cve/CVE-2022-49437.html * https://www.suse.com/security/cve/CVE-2022-49438.html * https://www.suse.com/security/cve/CVE-2022-49440.html * https://www.suse.com/security/cve/CVE-2022-49441.html * https://www.suse.com/security/cve/CVE-2022-49442.html * https://www.suse.com/security/cve/CVE-2022-49443.html * https://www.suse.com/security/cve/CVE-2022-49444.html * https://www.suse.com/security/cve/CVE-2022-49445.html * https://www.suse.com/security/cve/CVE-2022-49447.html * https://www.suse.com/security/cve/CVE-2022-49448.html * https://www.suse.com/security/cve/CVE-2022-49449.html * https://www.suse.com/security/cve/CVE-2022-49451.html * https://www.suse.com/security/cve/CVE-2022-49453.html * https://www.suse.com/security/cve/CVE-2022-49455.html * https://www.suse.com/security/cve/CVE-2022-49459.html * https://www.suse.com/security/cve/CVE-2022-49460.html * https://www.suse.com/security/cve/CVE-2022-49462.html * https://www.suse.com/security/cve/CVE-2022-49463.html * https://www.suse.com/security/cve/CVE-2022-49465.html * https://www.suse.com/security/cve/CVE-2022-49466.html * https://www.suse.com/security/cve/CVE-2022-49467.html * https://www.suse.com/security/cve/CVE-2022-49468.html * https://www.suse.com/security/cve/CVE-2022-49472.html * https://www.suse.com/security/cve/CVE-2022-49473.html * https://www.suse.com/security/cve/CVE-2022-49474.html * https://www.suse.com/security/cve/CVE-2022-49475.html * https://www.suse.com/security/cve/CVE-2022-49477.html * https://www.suse.com/security/cve/CVE-2022-49478.html * https://www.suse.com/security/cve/CVE-2022-49480.html * https://www.suse.com/security/cve/CVE-2022-49481.html * https://www.suse.com/security/cve/CVE-2022-49482.html * https://www.suse.com/security/cve/CVE-2022-49486.html * https://www.suse.com/security/cve/CVE-2022-49487.html * https://www.suse.com/security/cve/CVE-2022-49488.html * https://www.suse.com/security/cve/CVE-2022-49489.html * https://www.suse.com/security/cve/CVE-2022-49490.html * https://www.suse.com/security/cve/CVE-2022-49491.html * https://www.suse.com/security/cve/CVE-2022-49492.html * https://www.suse.com/security/cve/CVE-2022-49493.html * https://www.suse.com/security/cve/CVE-2022-49494.html * https://www.suse.com/security/cve/CVE-2022-49495.html * https://www.suse.com/security/cve/CVE-2022-49498.html * https://www.suse.com/security/cve/CVE-2022-49501.html * https://www.suse.com/security/cve/CVE-2022-49502.html * https://www.suse.com/security/cve/CVE-2022-49503.html * https://www.suse.com/security/cve/CVE-2022-49504.html * https://www.suse.com/security/cve/CVE-2022-49505.html * https://www.suse.com/security/cve/CVE-2022-49506.html * https://www.suse.com/security/cve/CVE-2022-49507.html * https://www.suse.com/security/cve/CVE-2022-49508.html * https://www.suse.com/security/cve/CVE-2022-49509.html * https://www.suse.com/security/cve/CVE-2022-49512.html * https://www.suse.com/security/cve/CVE-2022-49514.html * https://www.suse.com/security/cve/CVE-2022-49515.html * https://www.suse.com/security/cve/CVE-2022-49517.html * https://www.suse.com/security/cve/CVE-2022-49519.html * https://www.suse.com/security/cve/CVE-2022-49520.html * https://www.suse.com/security/cve/CVE-2022-49521.html * https://www.suse.com/security/cve/CVE-2022-49522.html * https://www.suse.com/security/cve/CVE-2022-49523.html * https://www.suse.com/security/cve/CVE-2022-49524.html * https://www.suse.com/security/cve/CVE-2022-49525.html * https://www.suse.com/security/cve/CVE-2022-49526.html * https://www.suse.com/security/cve/CVE-2022-49527.html * https://www.suse.com/security/cve/CVE-2022-49532.html * https://www.suse.com/security/cve/CVE-2022-49534.html * https://www.suse.com/security/cve/CVE-2022-49535.html * https://www.suse.com/security/cve/CVE-2022-49536.html * https://www.suse.com/security/cve/CVE-2022-49537.html * https://www.suse.com/security/cve/CVE-2022-49541.html * https://www.suse.com/security/cve/CVE-2022-49542.html * https://www.suse.com/security/cve/CVE-2022-49544.html * https://www.suse.com/security/cve/CVE-2022-49545.html * https://www.suse.com/security/cve/CVE-2022-49546.html * https://www.suse.com/security/cve/CVE-2022-49549.html * https://www.suse.com/security/cve/CVE-2022-49551.html * https://www.suse.com/security/cve/CVE-2022-49555.html * https://www.suse.com/security/cve/CVE-2022-49556.html * https://www.suse.com/security/cve/CVE-2022-49559.html * https://www.suse.com/security/cve/CVE-2022-49562.html * https://www.suse.com/security/cve/CVE-2022-49563.html * https://www.suse.com/security/cve/CVE-2022-49564.html * https://www.suse.com/security/cve/CVE-2022-49566.html * https://www.suse.com/security/cve/CVE-2022-49568.html * https://www.suse.com/security/cve/CVE-2022-49569.html * https://www.suse.com/security/cve/CVE-2022-49570.html * https://www.suse.com/security/cve/CVE-2022-49579.html * https://www.suse.com/security/cve/CVE-2022-49581.html * https://www.suse.com/security/cve/CVE-2022-49583.html * https://www.suse.com/security/cve/CVE-2022-49584.html * https://www.suse.com/security/cve/CVE-2022-49591.html * https://www.suse.com/security/cve/CVE-2022-49592.html * https://www.suse.com/security/cve/CVE-2022-49603.html * https://www.suse.com/security/cve/CVE-2022-49605.html * https://www.suse.com/security/cve/CVE-2022-49606.html * https://www.suse.com/security/cve/CVE-2022-49607.html * https://www.suse.com/security/cve/CVE-2022-49609.html * https://www.suse.com/security/cve/CVE-2022-49610.html * https://www.suse.com/security/cve/CVE-2022-49611.html * https://www.suse.com/security/cve/CVE-2022-49613.html * https://www.suse.com/security/cve/CVE-2022-49615.html * https://www.suse.com/security/cve/CVE-2022-49616.html * https://www.suse.com/security/cve/CVE-2022-49617.html * https://www.suse.com/security/cve/CVE-2022-49618.html * https://www.suse.com/security/cve/CVE-2022-49621.html * https://www.suse.com/security/cve/CVE-2022-49623.html * https://www.suse.com/security/cve/CVE-2022-49625.html * https://www.suse.com/security/cve/CVE-2022-49626.html * https://www.suse.com/security/cve/CVE-2022-49627.html * https://www.suse.com/security/cve/CVE-2022-49628.html * https://www.suse.com/security/cve/CVE-2022-49631.html * https://www.suse.com/security/cve/CVE-2022-49634.html * https://www.suse.com/security/cve/CVE-2022-49640.html * https://www.suse.com/security/cve/CVE-2022-49641.html * https://www.suse.com/security/cve/CVE-2022-49642.html * https://www.suse.com/security/cve/CVE-2022-49643.html * https://www.suse.com/security/cve/CVE-2022-49644.html * https://www.suse.com/security/cve/CVE-2022-49645.html * https://www.suse.com/security/cve/CVE-2022-49646.html * https://www.suse.com/security/cve/CVE-2022-49647.html * https://www.suse.com/security/cve/CVE-2022-49648.html * https://www.suse.com/security/cve/CVE-2022-49649.html * https://www.suse.com/security/cve/CVE-2022-49650.html * https://www.suse.com/security/cve/CVE-2022-49652.html * https://www.suse.com/security/cve/CVE-2022-49653.html * https://www.suse.com/security/cve/CVE-2022-49656.html * https://www.suse.com/security/cve/CVE-2022-49657.html * https://www.suse.com/security/cve/CVE-2022-49661.html * https://www.suse.com/security/cve/CVE-2022-49663.html * https://www.suse.com/security/cve/CVE-2022-49665.html * https://www.suse.com/security/cve/CVE-2022-49667.html * https://www.suse.com/security/cve/CVE-2022-49668.html * https://www.suse.com/security/cve/CVE-2022-49670.html * https://www.suse.com/security/cve/CVE-2022-49671.html * https://www.suse.com/security/cve/CVE-2022-49672.html * https://www.suse.com/security/cve/CVE-2022-49673.html * https://www.suse.com/security/cve/CVE-2022-49674.html * https://www.suse.com/security/cve/CVE-2022-49675.html * https://www.suse.com/security/cve/CVE-2022-49676.html * https://www.suse.com/security/cve/CVE-2022-49677.html * https://www.suse.com/security/cve/CVE-2022-49678.html * https://www.suse.com/security/cve/CVE-2022-49679.html * https://www.suse.com/security/cve/CVE-2022-49680.html * https://www.suse.com/security/cve/CVE-2022-49683.html * https://www.suse.com/security/cve/CVE-2022-49685.html * https://www.suse.com/security/cve/CVE-2022-49687.html * https://www.suse.com/security/cve/CVE-2022-49688.html * https://www.suse.com/security/cve/CVE-2022-49693.html * https://www.suse.com/security/cve/CVE-2022-49695.html * https://www.suse.com/security/cve/CVE-2022-49699.html * https://www.suse.com/security/cve/CVE-2022-49700.html * https://www.suse.com/security/cve/CVE-2022-49701.html * https://www.suse.com/security/cve/CVE-2022-49703.html * https://www.suse.com/security/cve/CVE-2022-49704.html * https://www.suse.com/security/cve/CVE-2022-49705.html * https://www.suse.com/security/cve/CVE-2022-49707.html * https://www.suse.com/security/cve/CVE-2022-49708.html * https://www.suse.com/security/cve/CVE-2022-49710.html * https://www.suse.com/security/cve/CVE-2022-49711.html * https://www.suse.com/security/cve/CVE-2022-49712.html * https://www.suse.com/security/cve/CVE-2022-49713.html * https://www.suse.com/security/cve/CVE-2022-49714.html * https://www.suse.com/security/cve/CVE-2022-49715.html * https://www.suse.com/security/cve/CVE-2022-49716.html * https://www.suse.com/security/cve/CVE-2022-49719.html * https://www.suse.com/security/cve/CVE-2022-49720.html * https://www.suse.com/security/cve/CVE-2022-49721.html * https://www.suse.com/security/cve/CVE-2022-49722.html * https://www.suse.com/security/cve/CVE-2022-49723.html * https://www.suse.com/security/cve/CVE-2022-49724.html * https://www.suse.com/security/cve/CVE-2022-49725.html * https://www.suse.com/security/cve/CVE-2022-49726.html * https://www.suse.com/security/cve/CVE-2022-49729.html * https://www.suse.com/security/cve/CVE-2022-49730.html * https://www.suse.com/security/cve/CVE-2022-49731.html * https://www.suse.com/security/cve/CVE-2022-49733.html * https://www.suse.com/security/cve/CVE-2022-49739.html * https://www.suse.com/security/cve/CVE-2022-49746.html * https://www.suse.com/security/cve/CVE-2022-49748.html * https://www.suse.com/security/cve/CVE-2022-49751.html * https://www.suse.com/security/cve/CVE-2022-49753.html * https://www.suse.com/security/cve/CVE-2022-49755.html * https://www.suse.com/security/cve/CVE-2022-49759.html * https://www.suse.com/security/cve/CVE-2023-0179.html * https://www.suse.com/security/cve/CVE-2023-1652.html * https://www.suse.com/security/cve/CVE-2023-2162.html * https://www.suse.com/security/cve/CVE-2023-28410.html * https://www.suse.com/security/cve/CVE-2023-3567.html * https://www.suse.com/security/cve/CVE-2023-52930.html * https://www.suse.com/security/cve/CVE-2023-52933.html * https://www.suse.com/security/cve/CVE-2023-52935.html * https://www.suse.com/security/cve/CVE-2023-52939.html * https://www.suse.com/security/cve/CVE-2023-52941.html * https://www.suse.com/security/cve/CVE-2023-52973.html * https://www.suse.com/security/cve/CVE-2023-52974.html * https://www.suse.com/security/cve/CVE-2023-52975.html * https://www.suse.com/security/cve/CVE-2023-52976.html * https://www.suse.com/security/cve/CVE-2023-52979.html * https://www.suse.com/security/cve/CVE-2023-52983.html * https://www.suse.com/security/cve/CVE-2023-52984.html * https://www.suse.com/security/cve/CVE-2023-52988.html * https://www.suse.com/security/cve/CVE-2023-52989.html * https://www.suse.com/security/cve/CVE-2023-52992.html * https://www.suse.com/security/cve/CVE-2023-52993.html * https://www.suse.com/security/cve/CVE-2023-53000.html * https://www.suse.com/security/cve/CVE-2023-53005.html * https://www.suse.com/security/cve/CVE-2023-53006.html * https://www.suse.com/security/cve/CVE-2023-53007.html * https://www.suse.com/security/cve/CVE-2023-53008.html * https://www.suse.com/security/cve/CVE-2023-53010.html * https://www.suse.com/security/cve/CVE-2023-53015.html * https://www.suse.com/security/cve/CVE-2023-53016.html * https://www.suse.com/security/cve/CVE-2023-53019.html * https://www.suse.com/security/cve/CVE-2023-53023.html * https://www.suse.com/security/cve/CVE-2023-53024.html * https://www.suse.com/security/cve/CVE-2023-53025.html * https://www.suse.com/security/cve/CVE-2023-53026.html * https://www.suse.com/security/cve/CVE-2023-53028.html * https://www.suse.com/security/cve/CVE-2023-53029.html * https://www.suse.com/security/cve/CVE-2023-53030.html * https://www.suse.com/security/cve/CVE-2023-53033.html * https://www.suse.com/security/cve/CVE-2024-2201.html * https://www.suse.com/security/cve/CVE-2024-41092.html * https://www.suse.com/security/cve/CVE-2024-42098.html * https://www.suse.com/security/cve/CVE-2024-42229.html * https://www.suse.com/security/cve/CVE-2024-42240.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53064.html * https://www.suse.com/security/cve/CVE-2024-56651.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58014.html * https://www.suse.com/security/cve/CVE-2024-58083.html * https://www.suse.com/security/cve/CVE-2025-21693.html * https://www.suse.com/security/cve/CVE-2025-21714.html * https://www.suse.com/security/cve/CVE-2025-21718.html * https://www.suse.com/security/cve/CVE-2025-21732.html * https://www.suse.com/security/cve/CVE-2025-21753.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21780.html * https://www.suse.com/security/cve/CVE-2025-21839.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1180814 * https://bugzilla.suse.com/show_bug.cgi?id=1183682 * https://bugzilla.suse.com/show_bug.cgi?id=1190336 * https://bugzilla.suse.com/show_bug.cgi?id=1190768 * https://bugzilla.suse.com/show_bug.cgi?id=1190786 * https://bugzilla.suse.com/show_bug.cgi?id=1193629 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1194904 * https://bugzilla.suse.com/show_bug.cgi?id=1195823 * https://bugzilla.suse.com/show_bug.cgi?id=1196444 * https://bugzilla.suse.com/show_bug.cgi?id=1197158 * https://bugzilla.suse.com/show_bug.cgi?id=1197174 * https://bugzilla.suse.com/show_bug.cgi?id=1197227 * https://bugzilla.suse.com/show_bug.cgi?id=1197246 * https://bugzilla.suse.com/show_bug.cgi?id=1197302 * https://bugzilla.suse.com/show_bug.cgi?id=1197331 * https://bugzilla.suse.com/show_bug.cgi?id=1197472 * https://bugzilla.suse.com/show_bug.cgi?id=1197661 * https://bugzilla.suse.com/show_bug.cgi?id=1197926 * https://bugzilla.suse.com/show_bug.cgi?id=1198019 * https://bugzilla.suse.com/show_bug.cgi?id=1198021 * https://bugzilla.suse.com/show_bug.cgi?id=1198240 * https://bugzilla.suse.com/show_bug.cgi?id=1198577 * https://bugzilla.suse.com/show_bug.cgi?id=1198660 * https://bugzilla.suse.com/show_bug.cgi?id=1199657 * https://bugzilla.suse.com/show_bug.cgi?id=1200045 * https://bugzilla.suse.com/show_bug.cgi?id=1200571 * https://bugzilla.suse.com/show_bug.cgi?id=1200807 * https://bugzilla.suse.com/show_bug.cgi?id=1200809 * https://bugzilla.suse.com/show_bug.cgi?id=1200810 * https://bugzilla.suse.com/show_bug.cgi?id=1200824 * https://bugzilla.suse.com/show_bug.cgi?id=1200825 * https://bugzilla.suse.com/show_bug.cgi?id=1200871 * https://bugzilla.suse.com/show_bug.cgi?id=1200872 * https://bugzilla.suse.com/show_bug.cgi?id=1201193 * https://bugzilla.suse.com/show_bug.cgi?id=1201218 * https://bugzilla.suse.com/show_bug.cgi?id=1201323 * https://bugzilla.suse.com/show_bug.cgi?id=1201381 * https://bugzilla.suse.com/show_bug.cgi?id=1201610 * https://bugzilla.suse.com/show_bug.cgi?id=1202672 * https://bugzilla.suse.com/show_bug.cgi?id=1202711 * https://bugzilla.suse.com/show_bug.cgi?id=1202712 * https://bugzilla.suse.com/show_bug.cgi?id=1202771 * https://bugzilla.suse.com/show_bug.cgi?id=1202774 * https://bugzilla.suse.com/show_bug.cgi?id=1202778 * https://bugzilla.suse.com/show_bug.cgi?id=1202781 * https://bugzilla.suse.com/show_bug.cgi?id=1203699 * https://bugzilla.suse.com/show_bug.cgi?id=1203769 * https://bugzilla.suse.com/show_bug.cgi?id=1204171 * https://bugzilla.suse.com/show_bug.cgi?id=1206048 * https://bugzilla.suse.com/show_bug.cgi?id=1206049 * https://bugzilla.suse.com/show_bug.cgi?id=1207034 * https://bugzilla.suse.com/show_bug.cgi?id=1207186 * https://bugzilla.suse.com/show_bug.cgi?id=1207593 * https://bugzilla.suse.com/show_bug.cgi?id=1207640 * https://bugzilla.suse.com/show_bug.cgi?id=1207878 * https://bugzilla.suse.com/show_bug.cgi?id=1209262 * https://bugzilla.suse.com/show_bug.cgi?id=1209547 * https://bugzilla.suse.com/show_bug.cgi?id=1209788 * https://bugzilla.suse.com/show_bug.cgi?id=1210050 * https://bugzilla.suse.com/show_bug.cgi?id=1210647 * https://bugzilla.suse.com/show_bug.cgi?id=1211263 * https://bugzilla.suse.com/show_bug.cgi?id=1213167 * https://bugzilla.suse.com/show_bug.cgi?id=1217339 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1228483 * https://bugzilla.suse.com/show_bug.cgi?id=1228708 * https://bugzilla.suse.com/show_bug.cgi?id=1228779 * https://bugzilla.suse.com/show_bug.cgi?id=1228966 * https://bugzilla.suse.com/show_bug.cgi?id=1231375 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233558 * https://bugzilla.suse.com/show_bug.cgi?id=1234464 * https://bugzilla.suse.com/show_bug.cgi?id=1235528 * https://bugzilla.suse.com/show_bug.cgi?id=1237029 * https://bugzilla.suse.com/show_bug.cgi?id=1237521 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237718 * https://bugzilla.suse.com/show_bug.cgi?id=1237721 * https://bugzilla.suse.com/show_bug.cgi?id=1237722 * https://bugzilla.suse.com/show_bug.cgi?id=1237723 * https://bugzilla.suse.com/show_bug.cgi?id=1237724 * https://bugzilla.suse.com/show_bug.cgi?id=1237725 * https://bugzilla.suse.com/show_bug.cgi?id=1237726 * https://bugzilla.suse.com/show_bug.cgi?id=1237727 * https://bugzilla.suse.com/show_bug.cgi?id=1237728 * https://bugzilla.suse.com/show_bug.cgi?id=1237729 * https://bugzilla.suse.com/show_bug.cgi?id=1237734 * https://bugzilla.suse.com/show_bug.cgi?id=1237735 * https://bugzilla.suse.com/show_bug.cgi?id=1237736 * https://bugzilla.suse.com/show_bug.cgi?id=1237737 * https://bugzilla.suse.com/show_bug.cgi?id=1237738 * https://bugzilla.suse.com/show_bug.cgi?id=1237739 * https://bugzilla.suse.com/show_bug.cgi?id=1237740 * https://bugzilla.suse.com/show_bug.cgi?id=1237742 * https://bugzilla.suse.com/show_bug.cgi?id=1237743 * https://bugzilla.suse.com/show_bug.cgi?id=1237745 * https://bugzilla.suse.com/show_bug.cgi?id=1237746 * https://bugzilla.suse.com/show_bug.cgi?id=1237748 * https://bugzilla.suse.com/show_bug.cgi?id=1237751 * https://bugzilla.suse.com/show_bug.cgi?id=1237752 * https://bugzilla.suse.com/show_bug.cgi?id=1237753 * https://bugzilla.suse.com/show_bug.cgi?id=1237755 * https://bugzilla.suse.com/show_bug.cgi?id=1237759 * https://bugzilla.suse.com/show_bug.cgi?id=1237761 * https://bugzilla.suse.com/show_bug.cgi?id=1237763 * https://bugzilla.suse.com/show_bug.cgi?id=1237766 * https://bugzilla.suse.com/show_bug.cgi?id=1237767 * https://bugzilla.suse.com/show_bug.cgi?id=1237768 * https://bugzilla.suse.com/show_bug.cgi?id=1237774 * https://bugzilla.suse.com/show_bug.cgi?id=1237775 * https://bugzilla.suse.com/show_bug.cgi?id=1237778 * https://bugzilla.suse.com/show_bug.cgi?id=1237779 * https://bugzilla.suse.com/show_bug.cgi?id=1237780 * https://bugzilla.suse.com/show_bug.cgi?id=1237782 * https://bugzilla.suse.com/show_bug.cgi?id=1237783 * https://bugzilla.suse.com/show_bug.cgi?id=1237784 * https://bugzilla.suse.com/show_bug.cgi?id=1237785 * https://bugzilla.suse.com/show_bug.cgi?id=1237786 * https://bugzilla.suse.com/show_bug.cgi?id=1237787 * https://bugzilla.suse.com/show_bug.cgi?id=1237788 * https://bugzilla.suse.com/show_bug.cgi?id=1237789 * https://bugzilla.suse.com/show_bug.cgi?id=1237795 * https://bugzilla.suse.com/show_bug.cgi?id=1237797 * https://bugzilla.suse.com/show_bug.cgi?id=1237798 * https://bugzilla.suse.com/show_bug.cgi?id=1237807 * https://bugzilla.suse.com/show_bug.cgi?id=1237808 * https://bugzilla.suse.com/show_bug.cgi?id=1237810 * https://bugzilla.suse.com/show_bug.cgi?id=1237812 * https://bugzilla.suse.com/show_bug.cgi?id=1237813 * https://bugzilla.suse.com/show_bug.cgi?id=1237814 * https://bugzilla.suse.com/show_bug.cgi?id=1237815 * https://bugzilla.suse.com/show_bug.cgi?id=1237817 * https://bugzilla.suse.com/show_bug.cgi?id=1237818 * https://bugzilla.suse.com/show_bug.cgi?id=1237821 * https://bugzilla.suse.com/show_bug.cgi?id=1237823 * https://bugzilla.suse.com/show_bug.cgi?id=1237824 * https://bugzilla.suse.com/show_bug.cgi?id=1237826 * https://bugzilla.suse.com/show_bug.cgi?id=1237827 * https://bugzilla.suse.com/show_bug.cgi?id=1237829 * https://bugzilla.suse.com/show_bug.cgi?id=1237831 * https://bugzilla.suse.com/show_bug.cgi?id=1237835 * https://bugzilla.suse.com/show_bug.cgi?id=1237836 * https://bugzilla.suse.com/show_bug.cgi?id=1237837 * https://bugzilla.suse.com/show_bug.cgi?id=1237839 * https://bugzilla.suse.com/show_bug.cgi?id=1237840 * https://bugzilla.suse.com/show_bug.cgi?id=1237845 * https://bugzilla.suse.com/show_bug.cgi?id=1237846 * https://bugzilla.suse.com/show_bug.cgi?id=1237868 * https://bugzilla.suse.com/show_bug.cgi?id=1237872 * https://bugzilla.suse.com/show_bug.cgi?id=1237875 * https://bugzilla.suse.com/show_bug.cgi?id=1237877 * https://bugzilla.suse.com/show_bug.cgi?id=1237890 * https://bugzilla.suse.com/show_bug.cgi?id=1237892 * https://bugzilla.suse.com/show_bug.cgi?id=1237903 * https://bugzilla.suse.com/show_bug.cgi?id=1237904 * https://bugzilla.suse.com/show_bug.cgi?id=1237916 * https://bugzilla.suse.com/show_bug.cgi?id=1237918 * https://bugzilla.suse.com/show_bug.cgi?id=1237922 * https://bugzilla.suse.com/show_bug.cgi?id=1237925 * https://bugzilla.suse.com/show_bug.cgi?id=1237926 * https://bugzilla.suse.com/show_bug.cgi?id=1237929 * https://bugzilla.suse.com/show_bug.cgi?id=1237931 * https://bugzilla.suse.com/show_bug.cgi?id=1237932 * https://bugzilla.suse.com/show_bug.cgi?id=1237933 * https://bugzilla.suse.com/show_bug.cgi?id=1237937 * https://bugzilla.suse.com/show_bug.cgi?id=1237939 * https://bugzilla.suse.com/show_bug.cgi?id=1237940 * https://bugzilla.suse.com/show_bug.cgi?id=1237941 * https://bugzilla.suse.com/show_bug.cgi?id=1237942 * https://bugzilla.suse.com/show_bug.cgi?id=1237946 * https://bugzilla.suse.com/show_bug.cgi?id=1237951 * https://bugzilla.suse.com/show_bug.cgi?id=1237952 * https://bugzilla.suse.com/show_bug.cgi?id=1237954 * https://bugzilla.suse.com/show_bug.cgi?id=1237955 * https://bugzilla.suse.com/show_bug.cgi?id=1237957 * https://bugzilla.suse.com/show_bug.cgi?id=1237958 * https://bugzilla.suse.com/show_bug.cgi?id=1237959 * https://bugzilla.suse.com/show_bug.cgi?id=1237960 * https://bugzilla.suse.com/show_bug.cgi?id=1237961 * https://bugzilla.suse.com/show_bug.cgi?id=1237963 * https://bugzilla.suse.com/show_bug.cgi?id=1237965 * https://bugzilla.suse.com/show_bug.cgi?id=1237966 * https://bugzilla.suse.com/show_bug.cgi?id=1237967 * https://bugzilla.suse.com/show_bug.cgi?id=1237968 * https://bugzilla.suse.com/show_bug.cgi?id=1237969 * https://bugzilla.suse.com/show_bug.cgi?id=1237970 * https://bugzilla.suse.com/show_bug.cgi?id=1237971 * https://bugzilla.suse.com/show_bug.cgi?id=1237973 * https://bugzilla.suse.com/show_bug.cgi?id=1237975 * https://bugzilla.suse.com/show_bug.cgi?id=1237976 * https://bugzilla.suse.com/show_bug.cgi?id=1237978 * https://bugzilla.suse.com/show_bug.cgi?id=1237979 * https://bugzilla.suse.com/show_bug.cgi?id=1237983 * https://bugzilla.suse.com/show_bug.cgi?id=1237984 * https://bugzilla.suse.com/show_bug.cgi?id=1237986 * https://bugzilla.suse.com/show_bug.cgi?id=1237987 * https://bugzilla.suse.com/show_bug.cgi?id=1237990 * https://bugzilla.suse.com/show_bug.cgi?id=1237996 * https://bugzilla.suse.com/show_bug.cgi?id=1237997 * https://bugzilla.suse.com/show_bug.cgi?id=1237998 * https://bugzilla.suse.com/show_bug.cgi?id=1237999 * https://bugzilla.suse.com/show_bug.cgi?id=1238000 * https://bugzilla.suse.com/show_bug.cgi?id=1238003 * https://bugzilla.suse.com/show_bug.cgi?id=1238006 * https://bugzilla.suse.com/show_bug.cgi?id=1238007 * https://bugzilla.suse.com/show_bug.cgi?id=1238010 * https://bugzilla.suse.com/show_bug.cgi?id=1238011 * https://bugzilla.suse.com/show_bug.cgi?id=1238012 * https://bugzilla.suse.com/show_bug.cgi?id=1238013 * https://bugzilla.suse.com/show_bug.cgi?id=1238014 * https://bugzilla.suse.com/show_bug.cgi?id=1238016 * https://bugzilla.suse.com/show_bug.cgi?id=1238017 * https://bugzilla.suse.com/show_bug.cgi?id=1238018 * https://bugzilla.suse.com/show_bug.cgi?id=1238019 * https://bugzilla.suse.com/show_bug.cgi?id=1238021 * https://bugzilla.suse.com/show_bug.cgi?id=1238022 * https://bugzilla.suse.com/show_bug.cgi?id=1238024 * https://bugzilla.suse.com/show_bug.cgi?id=1238030 * https://bugzilla.suse.com/show_bug.cgi?id=1238036 * https://bugzilla.suse.com/show_bug.cgi?id=1238037 * https://bugzilla.suse.com/show_bug.cgi?id=1238041 * https://bugzilla.suse.com/show_bug.cgi?id=1238046 * https://bugzilla.suse.com/show_bug.cgi?id=1238047 * https://bugzilla.suse.com/show_bug.cgi?id=1238071 * https://bugzilla.suse.com/show_bug.cgi?id=1238077 * https://bugzilla.suse.com/show_bug.cgi?id=1238079 * https://bugzilla.suse.com/show_bug.cgi?id=1238080 * https://bugzilla.suse.com/show_bug.cgi?id=1238089 * https://bugzilla.suse.com/show_bug.cgi?id=1238090 * https://bugzilla.suse.com/show_bug.cgi?id=1238091 * https://bugzilla.suse.com/show_bug.cgi?id=1238092 * https://bugzilla.suse.com/show_bug.cgi?id=1238096 * https://bugzilla.suse.com/show_bug.cgi?id=1238097 * https://bugzilla.suse.com/show_bug.cgi?id=1238099 * https://bugzilla.suse.com/show_bug.cgi?id=1238103 * https://bugzilla.suse.com/show_bug.cgi?id=1238105 * https://bugzilla.suse.com/show_bug.cgi?id=1238106 * https://bugzilla.suse.com/show_bug.cgi?id=1238108 * https://bugzilla.suse.com/show_bug.cgi?id=1238110 * https://bugzilla.suse.com/show_bug.cgi?id=1238111 * https://bugzilla.suse.com/show_bug.cgi?id=1238112 * https://bugzilla.suse.com/show_bug.cgi?id=1238113 * https://bugzilla.suse.com/show_bug.cgi?id=1238115 * https://bugzilla.suse.com/show_bug.cgi?id=1238116 * https://bugzilla.suse.com/show_bug.cgi?id=1238120 * https://bugzilla.suse.com/show_bug.cgi?id=1238123 * https://bugzilla.suse.com/show_bug.cgi?id=1238125 * https://bugzilla.suse.com/show_bug.cgi?id=1238126 * https://bugzilla.suse.com/show_bug.cgi?id=1238127 * https://bugzilla.suse.com/show_bug.cgi?id=1238131 * https://bugzilla.suse.com/show_bug.cgi?id=1238134 * https://bugzilla.suse.com/show_bug.cgi?id=1238135 * https://bugzilla.suse.com/show_bug.cgi?id=1238138 * https://bugzilla.suse.com/show_bug.cgi?id=1238139 * https://bugzilla.suse.com/show_bug.cgi?id=1238140 * https://bugzilla.suse.com/show_bug.cgi?id=1238142 * https://bugzilla.suse.com/show_bug.cgi?id=1238144 * https://bugzilla.suse.com/show_bug.cgi?id=1238146 * https://bugzilla.suse.com/show_bug.cgi?id=1238147 * https://bugzilla.suse.com/show_bug.cgi?id=1238149 * https://bugzilla.suse.com/show_bug.cgi?id=1238150 * https://bugzilla.suse.com/show_bug.cgi?id=1238155 * https://bugzilla.suse.com/show_bug.cgi?id=1238156 * https://bugzilla.suse.com/show_bug.cgi?id=1238157 * https://bugzilla.suse.com/show_bug.cgi?id=1238158 * https://bugzilla.suse.com/show_bug.cgi?id=1238162 * https://bugzilla.suse.com/show_bug.cgi?id=1238166 * https://bugzilla.suse.com/show_bug.cgi?id=1238167 * https://bugzilla.suse.com/show_bug.cgi?id=1238168 * https://bugzilla.suse.com/show_bug.cgi?id=1238169 * https://bugzilla.suse.com/show_bug.cgi?id=1238170 * https://bugzilla.suse.com/show_bug.cgi?id=1238171 * https://bugzilla.suse.com/show_bug.cgi?id=1238172 * https://bugzilla.suse.com/show_bug.cgi?id=1238175 * https://bugzilla.suse.com/show_bug.cgi?id=1238176 * https://bugzilla.suse.com/show_bug.cgi?id=1238177 * https://bugzilla.suse.com/show_bug.cgi?id=1238180 * https://bugzilla.suse.com/show_bug.cgi?id=1238181 * https://bugzilla.suse.com/show_bug.cgi?id=1238183 * https://bugzilla.suse.com/show_bug.cgi?id=1238184 * https://bugzilla.suse.com/show_bug.cgi?id=1238228 * https://bugzilla.suse.com/show_bug.cgi?id=1238229 * https://bugzilla.suse.com/show_bug.cgi?id=1238231 * https://bugzilla.suse.com/show_bug.cgi?id=1238234 * https://bugzilla.suse.com/show_bug.cgi?id=1238235 * https://bugzilla.suse.com/show_bug.cgi?id=1238236 * https://bugzilla.suse.com/show_bug.cgi?id=1238238 * https://bugzilla.suse.com/show_bug.cgi?id=1238239 * https://bugzilla.suse.com/show_bug.cgi?id=1238241 * https://bugzilla.suse.com/show_bug.cgi?id=1238242 * https://bugzilla.suse.com/show_bug.cgi?id=1238243 * https://bugzilla.suse.com/show_bug.cgi?id=1238244 * https://bugzilla.suse.com/show_bug.cgi?id=1238246 * https://bugzilla.suse.com/show_bug.cgi?id=1238247 * https://bugzilla.suse.com/show_bug.cgi?id=1238248 * https://bugzilla.suse.com/show_bug.cgi?id=1238249 * https://bugzilla.suse.com/show_bug.cgi?id=1238253 * https://bugzilla.suse.com/show_bug.cgi?id=1238255 * https://bugzilla.suse.com/show_bug.cgi?id=1238256 * https://bugzilla.suse.com/show_bug.cgi?id=1238257 * https://bugzilla.suse.com/show_bug.cgi?id=1238260 * https://bugzilla.suse.com/show_bug.cgi?id=1238262 * https://bugzilla.suse.com/show_bug.cgi?id=1238263 * https://bugzilla.suse.com/show_bug.cgi?id=1238264 * https://bugzilla.suse.com/show_bug.cgi?id=1238266 * https://bugzilla.suse.com/show_bug.cgi?id=1238267 * https://bugzilla.suse.com/show_bug.cgi?id=1238268 * https://bugzilla.suse.com/show_bug.cgi?id=1238269 * https://bugzilla.suse.com/show_bug.cgi?id=1238270 * https://bugzilla.suse.com/show_bug.cgi?id=1238271 * https://bugzilla.suse.com/show_bug.cgi?id=1238272 * https://bugzilla.suse.com/show_bug.cgi?id=1238274 * https://bugzilla.suse.com/show_bug.cgi?id=1238275 * https://bugzilla.suse.com/show_bug.cgi?id=1238276 * https://bugzilla.suse.com/show_bug.cgi?id=1238277 * https://bugzilla.suse.com/show_bug.cgi?id=1238278 * https://bugzilla.suse.com/show_bug.cgi?id=1238279 * https://bugzilla.suse.com/show_bug.cgi?id=1238281 * https://bugzilla.suse.com/show_bug.cgi?id=1238282 * https://bugzilla.suse.com/show_bug.cgi?id=1238283 * https://bugzilla.suse.com/show_bug.cgi?id=1238284 * https://bugzilla.suse.com/show_bug.cgi?id=1238286 * https://bugzilla.suse.com/show_bug.cgi?id=1238287 * https://bugzilla.suse.com/show_bug.cgi?id=1238288 * https://bugzilla.suse.com/show_bug.cgi?id=1238289 * https://bugzilla.suse.com/show_bug.cgi?id=1238292 * https://bugzilla.suse.com/show_bug.cgi?id=1238293 * https://bugzilla.suse.com/show_bug.cgi?id=1238295 * https://bugzilla.suse.com/show_bug.cgi?id=1238298 * https://bugzilla.suse.com/show_bug.cgi?id=1238301 * https://bugzilla.suse.com/show_bug.cgi?id=1238302 * https://bugzilla.suse.com/show_bug.cgi?id=1238306 * https://bugzilla.suse.com/show_bug.cgi?id=1238307 * https://bugzilla.suse.com/show_bug.cgi?id=1238308 * https://bugzilla.suse.com/show_bug.cgi?id=1238309 * https://bugzilla.suse.com/show_bug.cgi?id=1238311 * https://bugzilla.suse.com/show_bug.cgi?id=1238313 * https://bugzilla.suse.com/show_bug.cgi?id=1238326 * https://bugzilla.suse.com/show_bug.cgi?id=1238327 * https://bugzilla.suse.com/show_bug.cgi?id=1238328 * https://bugzilla.suse.com/show_bug.cgi?id=1238331 * https://bugzilla.suse.com/show_bug.cgi?id=1238333 * https://bugzilla.suse.com/show_bug.cgi?id=1238334 * https://bugzilla.suse.com/show_bug.cgi?id=1238336 * https://bugzilla.suse.com/show_bug.cgi?id=1238337 * https://bugzilla.suse.com/show_bug.cgi?id=1238338 * https://bugzilla.suse.com/show_bug.cgi?id=1238339 * https://bugzilla.suse.com/show_bug.cgi?id=1238343 * https://bugzilla.suse.com/show_bug.cgi?id=1238345 * https://bugzilla.suse.com/show_bug.cgi?id=1238372 * https://bugzilla.suse.com/show_bug.cgi?id=1238373 * https://bugzilla.suse.com/show_bug.cgi?id=1238374 * https://bugzilla.suse.com/show_bug.cgi?id=1238376 * https://bugzilla.suse.com/show_bug.cgi?id=1238377 * https://bugzilla.suse.com/show_bug.cgi?id=1238381 * https://bugzilla.suse.com/show_bug.cgi?id=1238382 * https://bugzilla.suse.com/show_bug.cgi?id=1238383 * https://bugzilla.suse.com/show_bug.cgi?id=1238386 * https://bugzilla.suse.com/show_bug.cgi?id=1238387 * https://bugzilla.suse.com/show_bug.cgi?id=1238388 * https://bugzilla.suse.com/show_bug.cgi?id=1238389 * https://bugzilla.suse.com/show_bug.cgi?id=1238390 * https://bugzilla.suse.com/show_bug.cgi?id=1238391 * https://bugzilla.suse.com/show_bug.cgi?id=1238392 * https://bugzilla.suse.com/show_bug.cgi?id=1238393 * https://bugzilla.suse.com/show_bug.cgi?id=1238394 * https://bugzilla.suse.com/show_bug.cgi?id=1238395 * https://bugzilla.suse.com/show_bug.cgi?id=1238396 * https://bugzilla.suse.com/show_bug.cgi?id=1238397 * https://bugzilla.suse.com/show_bug.cgi?id=1238400 * https://bugzilla.suse.com/show_bug.cgi?id=1238410 * https://bugzilla.suse.com/show_bug.cgi?id=1238411 * https://bugzilla.suse.com/show_bug.cgi?id=1238413 * https://bugzilla.suse.com/show_bug.cgi?id=1238415 * https://bugzilla.suse.com/show_bug.cgi?id=1238416 * https://bugzilla.suse.com/show_bug.cgi?id=1238417 * https://bugzilla.suse.com/show_bug.cgi?id=1238418 * https://bugzilla.suse.com/show_bug.cgi?id=1238419 * https://bugzilla.suse.com/show_bug.cgi?id=1238420 * https://bugzilla.suse.com/show_bug.cgi?id=1238423 * https://bugzilla.suse.com/show_bug.cgi?id=1238428 * https://bugzilla.suse.com/show_bug.cgi?id=1238429 * https://bugzilla.suse.com/show_bug.cgi?id=1238430 * https://bugzilla.suse.com/show_bug.cgi?id=1238431 * https://bugzilla.suse.com/show_bug.cgi?id=1238432 * https://bugzilla.suse.com/show_bug.cgi?id=1238433 * https://bugzilla.suse.com/show_bug.cgi?id=1238434 * https://bugzilla.suse.com/show_bug.cgi?id=1238435 * https://bugzilla.suse.com/show_bug.cgi?id=1238436 * https://bugzilla.suse.com/show_bug.cgi?id=1238437 * https://bugzilla.suse.com/show_bug.cgi?id=1238440 * https://bugzilla.suse.com/show_bug.cgi?id=1238441 * https://bugzilla.suse.com/show_bug.cgi?id=1238442 * https://bugzilla.suse.com/show_bug.cgi?id=1238443 * https://bugzilla.suse.com/show_bug.cgi?id=1238444 * https://bugzilla.suse.com/show_bug.cgi?id=1238445 * https://bugzilla.suse.com/show_bug.cgi?id=1238446 * https://bugzilla.suse.com/show_bug.cgi?id=1238447 * https://bugzilla.suse.com/show_bug.cgi?id=1238453 * https://bugzilla.suse.com/show_bug.cgi?id=1238454 * https://bugzilla.suse.com/show_bug.cgi?id=1238458 * https://bugzilla.suse.com/show_bug.cgi?id=1238459 * https://bugzilla.suse.com/show_bug.cgi?id=1238462 * https://bugzilla.suse.com/show_bug.cgi?id=1238463 * https://bugzilla.suse.com/show_bug.cgi?id=1238465 * https://bugzilla.suse.com/show_bug.cgi?id=1238467 * https://bugzilla.suse.com/show_bug.cgi?id=1238469 * https://bugzilla.suse.com/show_bug.cgi?id=1238533 * https://bugzilla.suse.com/show_bug.cgi?id=1238536 * https://bugzilla.suse.com/show_bug.cgi?id=1238538 * https://bugzilla.suse.com/show_bug.cgi?id=1238539 * https://bugzilla.suse.com/show_bug.cgi?id=1238540 * https://bugzilla.suse.com/show_bug.cgi?id=1238543 * https://bugzilla.suse.com/show_bug.cgi?id=1238545 * https://bugzilla.suse.com/show_bug.cgi?id=1238546 * https://bugzilla.suse.com/show_bug.cgi?id=1238556 * https://bugzilla.suse.com/show_bug.cgi?id=1238557 * https://bugzilla.suse.com/show_bug.cgi?id=1238599 * https://bugzilla.suse.com/show_bug.cgi?id=1238600 * https://bugzilla.suse.com/show_bug.cgi?id=1238601 * https://bugzilla.suse.com/show_bug.cgi?id=1238602 * https://bugzilla.suse.com/show_bug.cgi?id=1238605 * https://bugzilla.suse.com/show_bug.cgi?id=1238612 * https://bugzilla.suse.com/show_bug.cgi?id=1238615 * https://bugzilla.suse.com/show_bug.cgi?id=1238617 * https://bugzilla.suse.com/show_bug.cgi?id=1238618 * https://bugzilla.suse.com/show_bug.cgi?id=1238619 * https://bugzilla.suse.com/show_bug.cgi?id=1238621 * https://bugzilla.suse.com/show_bug.cgi?id=1238623 * https://bugzilla.suse.com/show_bug.cgi?id=1238625 * https://bugzilla.suse.com/show_bug.cgi?id=1238626 * https://bugzilla.suse.com/show_bug.cgi?id=1238630 * https://bugzilla.suse.com/show_bug.cgi?id=1238631 * https://bugzilla.suse.com/show_bug.cgi?id=1238632 * https://bugzilla.suse.com/show_bug.cgi?id=1238633 * https://bugzilla.suse.com/show_bug.cgi?id=1238635 * https://bugzilla.suse.com/show_bug.cgi?id=1238636 * https://bugzilla.suse.com/show_bug.cgi?id=1238638 * https://bugzilla.suse.com/show_bug.cgi?id=1238639 * https://bugzilla.suse.com/show_bug.cgi?id=1238640 * https://bugzilla.suse.com/show_bug.cgi?id=1238641 * https://bugzilla.suse.com/show_bug.cgi?id=1238642 * https://bugzilla.suse.com/show_bug.cgi?id=1238643 * https://bugzilla.suse.com/show_bug.cgi?id=1238645 * https://bugzilla.suse.com/show_bug.cgi?id=1238646 * https://bugzilla.suse.com/show_bug.cgi?id=1238647 * https://bugzilla.suse.com/show_bug.cgi?id=1238650 * https://bugzilla.suse.com/show_bug.cgi?id=1238653 * https://bugzilla.suse.com/show_bug.cgi?id=1238654 * https://bugzilla.suse.com/show_bug.cgi?id=1238655 * https://bugzilla.suse.com/show_bug.cgi?id=1238662 * https://bugzilla.suse.com/show_bug.cgi?id=1238663 * https://bugzilla.suse.com/show_bug.cgi?id=1238664 * https://bugzilla.suse.com/show_bug.cgi?id=1238666 * https://bugzilla.suse.com/show_bug.cgi?id=1238668 * https://bugzilla.suse.com/show_bug.cgi?id=1238705 * https://bugzilla.suse.com/show_bug.cgi?id=1238707 * https://bugzilla.suse.com/show_bug.cgi?id=1238710 * https://bugzilla.suse.com/show_bug.cgi?id=1238712 * https://bugzilla.suse.com/show_bug.cgi?id=1238718 * https://bugzilla.suse.com/show_bug.cgi?id=1238719 * https://bugzilla.suse.com/show_bug.cgi?id=1238721 * https://bugzilla.suse.com/show_bug.cgi?id=1238722 * https://bugzilla.suse.com/show_bug.cgi?id=1238727 * https://bugzilla.suse.com/show_bug.cgi?id=1238729 * https://bugzilla.suse.com/show_bug.cgi?id=1238750 * https://bugzilla.suse.com/show_bug.cgi?id=1238787 * https://bugzilla.suse.com/show_bug.cgi?id=1238789 * https://bugzilla.suse.com/show_bug.cgi?id=1238792 * https://bugzilla.suse.com/show_bug.cgi?id=1238799 * https://bugzilla.suse.com/show_bug.cgi?id=1238804 * https://bugzilla.suse.com/show_bug.cgi?id=1238805 * https://bugzilla.suse.com/show_bug.cgi?id=1238808 * https://bugzilla.suse.com/show_bug.cgi?id=1238809 * https://bugzilla.suse.com/show_bug.cgi?id=1238811 * https://bugzilla.suse.com/show_bug.cgi?id=1238814 * https://bugzilla.suse.com/show_bug.cgi?id=1238815 * https://bugzilla.suse.com/show_bug.cgi?id=1238816 * https://bugzilla.suse.com/show_bug.cgi?id=1238817 * https://bugzilla.suse.com/show_bug.cgi?id=1238818 * https://bugzilla.suse.com/show_bug.cgi?id=1238819 * https://bugzilla.suse.com/show_bug.cgi?id=1238821 * https://bugzilla.suse.com/show_bug.cgi?id=1238823 * https://bugzilla.suse.com/show_bug.cgi?id=1238825 * https://bugzilla.suse.com/show_bug.cgi?id=1238830 * https://bugzilla.suse.com/show_bug.cgi?id=1238834 * https://bugzilla.suse.com/show_bug.cgi?id=1238835 * https://bugzilla.suse.com/show_bug.cgi?id=1238836 * https://bugzilla.suse.com/show_bug.cgi?id=1238838 * https://bugzilla.suse.com/show_bug.cgi?id=1238867 * https://bugzilla.suse.com/show_bug.cgi?id=1238868 * https://bugzilla.suse.com/show_bug.cgi?id=1238869 * https://bugzilla.suse.com/show_bug.cgi?id=1238870 * https://bugzilla.suse.com/show_bug.cgi?id=1238871 * https://bugzilla.suse.com/show_bug.cgi?id=1238878 * https://bugzilla.suse.com/show_bug.cgi?id=1238889 * https://bugzilla.suse.com/show_bug.cgi?id=1238892 * https://bugzilla.suse.com/show_bug.cgi?id=1238893 * https://bugzilla.suse.com/show_bug.cgi?id=1238897 * https://bugzilla.suse.com/show_bug.cgi?id=1238898 * https://bugzilla.suse.com/show_bug.cgi?id=1238899 * https://bugzilla.suse.com/show_bug.cgi?id=1238902 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238916 * https://bugzilla.suse.com/show_bug.cgi?id=1238919 * https://bugzilla.suse.com/show_bug.cgi?id=1238925 * https://bugzilla.suse.com/show_bug.cgi?id=1238930 * https://bugzilla.suse.com/show_bug.cgi?id=1238933 * https://bugzilla.suse.com/show_bug.cgi?id=1238936 * https://bugzilla.suse.com/show_bug.cgi?id=1238937 * https://bugzilla.suse.com/show_bug.cgi?id=1238938 * https://bugzilla.suse.com/show_bug.cgi?id=1238939 * https://bugzilla.suse.com/show_bug.cgi?id=1238943 * https://bugzilla.suse.com/show_bug.cgi?id=1238945 * https://bugzilla.suse.com/show_bug.cgi?id=1238948 * https://bugzilla.suse.com/show_bug.cgi?id=1238949 * https://bugzilla.suse.com/show_bug.cgi?id=1238950 * https://bugzilla.suse.com/show_bug.cgi?id=1238951 * https://bugzilla.suse.com/show_bug.cgi?id=1238952 * https://bugzilla.suse.com/show_bug.cgi?id=1238954 * https://bugzilla.suse.com/show_bug.cgi?id=1238956 * https://bugzilla.suse.com/show_bug.cgi?id=1238957 * https://bugzilla.suse.com/show_bug.cgi?id=1239001 * https://bugzilla.suse.com/show_bug.cgi?id=1239004 * https://bugzilla.suse.com/show_bug.cgi?id=1239016 * https://bugzilla.suse.com/show_bug.cgi?id=1239035 * https://bugzilla.suse.com/show_bug.cgi?id=1239036 * https://bugzilla.suse.com/show_bug.cgi?id=1239040 * https://bugzilla.suse.com/show_bug.cgi?id=1239041 * https://bugzilla.suse.com/show_bug.cgi?id=1239051 * https://bugzilla.suse.com/show_bug.cgi?id=1239060 * https://bugzilla.suse.com/show_bug.cgi?id=1239061 * https://bugzilla.suse.com/show_bug.cgi?id=1239070 * https://bugzilla.suse.com/show_bug.cgi?id=1239071 * https://bugzilla.suse.com/show_bug.cgi?id=1239073 * https://bugzilla.suse.com/show_bug.cgi?id=1239076 * https://bugzilla.suse.com/show_bug.cgi?id=1239109 * https://bugzilla.suse.com/show_bug.cgi?id=1239115 * https://bugzilla.suse.com/show_bug.cgi?id=1239126 * https://bugzilla.suse.com/show_bug.cgi?id=1239452 * https://bugzilla.suse.com/show_bug.cgi?id=1239454 * https://bugzilla.suse.com/show_bug.cgi?id=1239968 * https://bugzilla.suse.com/show_bug.cgi?id=1239969 * https://bugzilla.suse.com/show_bug.cgi?id=1240133 * https://bugzilla.suse.com/show_bug.cgi?id=1240195 * https://bugzilla.suse.com/show_bug.cgi?id=1240205 * https://bugzilla.suse.com/show_bug.cgi?id=1240207 * https://bugzilla.suse.com/show_bug.cgi?id=1240208 * https://bugzilla.suse.com/show_bug.cgi?id=1240210 * https://bugzilla.suse.com/show_bug.cgi?id=1240212 * https://bugzilla.suse.com/show_bug.cgi?id=1240213 * https://bugzilla.suse.com/show_bug.cgi?id=1240218 * https://bugzilla.suse.com/show_bug.cgi?id=1240220 * https://bugzilla.suse.com/show_bug.cgi?id=1240227 * https://bugzilla.suse.com/show_bug.cgi?id=1240229 * https://bugzilla.suse.com/show_bug.cgi?id=1240231 * https://bugzilla.suse.com/show_bug.cgi?id=1240242 * https://bugzilla.suse.com/show_bug.cgi?id=1240245 * https://bugzilla.suse.com/show_bug.cgi?id=1240247 * https://bugzilla.suse.com/show_bug.cgi?id=1240250 * https://bugzilla.suse.com/show_bug.cgi?id=1240254 * https://bugzilla.suse.com/show_bug.cgi?id=1240256 * https://bugzilla.suse.com/show_bug.cgi?id=1240264 * https://bugzilla.suse.com/show_bug.cgi?id=1240266 * https://bugzilla.suse.com/show_bug.cgi?id=1240272 * https://bugzilla.suse.com/show_bug.cgi?id=1240275 * https://bugzilla.suse.com/show_bug.cgi?id=1240276 * https://bugzilla.suse.com/show_bug.cgi?id=1240278 * https://bugzilla.suse.com/show_bug.cgi?id=1240279 * https://bugzilla.suse.com/show_bug.cgi?id=1240280 * https://bugzilla.suse.com/show_bug.cgi?id=1240281 * https://bugzilla.suse.com/show_bug.cgi?id=1240282 * https://bugzilla.suse.com/show_bug.cgi?id=1240283 * https://bugzilla.suse.com/show_bug.cgi?id=1240284 * https://bugzilla.suse.com/show_bug.cgi?id=1240286 * https://bugzilla.suse.com/show_bug.cgi?id=1240288 * https://bugzilla.suse.com/show_bug.cgi?id=1240290 * https://bugzilla.suse.com/show_bug.cgi?id=1240292 * https://bugzilla.suse.com/show_bug.cgi?id=1240293 * https://bugzilla.suse.com/show_bug.cgi?id=1240297 * https://bugzilla.suse.com/show_bug.cgi?id=1240304 * https://bugzilla.suse.com/show_bug.cgi?id=1240308 * https://bugzilla.suse.com/show_bug.cgi?id=1240309 * https://bugzilla.suse.com/show_bug.cgi?id=1240317 * https://bugzilla.suse.com/show_bug.cgi?id=1240318 * https://bugzilla.suse.com/show_bug.cgi?id=1240322 * https://jira.suse.com/browse/PED-1073 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 10 08:30:03 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 10 Apr 2025 08:30:03 -0000 Subject: SUSE-SU-2025:1193-1: moderate: Security update for apparmor Message-ID: <174427380380.21179.12080533178761741682@smelt2.prg2.suse.org> # Security update for apparmor Announcement ID: SUSE-SU-2025:1193-1 Release Date: 2025-04-10T08:01:52Z Rating: moderate References: * bsc#1234452 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one security fix can now be installed. ## Description: This update for apparmor fixes the following issue: * Allow dovecot-auth to execute unix check password from /sbin, not only from /usr/bin (bsc#1234452). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1193=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1193=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1193=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1193=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1193=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1193=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1193=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1193=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1193=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1193=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1193=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1193=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * perl-apparmor-debuginfo-3.0.4-150400.5.12.2 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.12.2 * python3-apparmor-debuginfo-3.0.4-150400.5.12.2 * apparmor-parser-3.0.4-150400.5.12.2 * ruby-apparmor-debuginfo-3.0.4-150400.5.12.2 * libapparmor-devel-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * ruby-apparmor-3.0.4-150400.5.12.2 * python3-apparmor-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * perl-apparmor-3.0.4-150400.5.12.2 * apache2-mod_apparmor-3.0.4-150400.5.12.2 * openSUSE Leap 15.4 (noarch) * apparmor-parser-lang-3.0.4-150400.5.12.2 * apparmor-utils-lang-3.0.4-150400.5.12.2 * apparmor-abstractions-3.0.4-150400.5.12.2 * apparmor-docs-3.0.4-150400.5.12.2 * apparmor-utils-3.0.4-150400.5.12.2 * apparmor-profiles-3.0.4-150400.5.12.2 * openSUSE Leap 15.4 (x86_64) * libapparmor1-32bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.12.2 * openSUSE Leap 15.4 (aarch64_ilp32) * pam_apparmor-64bit-debuginfo-3.0.4-150400.5.12.2 * pam_apparmor-64bit-3.0.4-150400.5.12.2 * libapparmor1-64bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-64bit-3.0.4-150400.5.12.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * perl-apparmor-debuginfo-3.0.4-150400.5.12.2 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.12.2 * python3-apparmor-debuginfo-3.0.4-150400.5.12.2 * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor-devel-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * perl-apparmor-3.0.4-150400.5.12.2 * apache2-mod_apparmor-3.0.4-150400.5.12.2 * python3-apparmor-3.0.4-150400.5.12.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * apparmor-parser-lang-3.0.4-150400.5.12.2 * apparmor-utils-lang-3.0.4-150400.5.12.2 * apparmor-abstractions-3.0.4-150400.5.12.2 * apparmor-docs-3.0.4-150400.5.12.2 * apparmor-utils-3.0.4-150400.5.12.2 * apparmor-profiles-3.0.4-150400.5.12.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libapparmor1-32bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.12.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * perl-apparmor-debuginfo-3.0.4-150400.5.12.2 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.12.2 * python3-apparmor-debuginfo-3.0.4-150400.5.12.2 * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor-devel-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * perl-apparmor-3.0.4-150400.5.12.2 * apache2-mod_apparmor-3.0.4-150400.5.12.2 * python3-apparmor-3.0.4-150400.5.12.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * apparmor-parser-lang-3.0.4-150400.5.12.2 * apparmor-utils-lang-3.0.4-150400.5.12.2 * apparmor-abstractions-3.0.4-150400.5.12.2 * apparmor-docs-3.0.4-150400.5.12.2 * apparmor-utils-3.0.4-150400.5.12.2 * apparmor-profiles-3.0.4-150400.5.12.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libapparmor1-32bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.12.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * perl-apparmor-debuginfo-3.0.4-150400.5.12.2 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.12.2 * python3-apparmor-debuginfo-3.0.4-150400.5.12.2 * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor-devel-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * perl-apparmor-3.0.4-150400.5.12.2 * apache2-mod_apparmor-3.0.4-150400.5.12.2 * python3-apparmor-3.0.4-150400.5.12.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * apparmor-parser-lang-3.0.4-150400.5.12.2 * apparmor-utils-lang-3.0.4-150400.5.12.2 * apparmor-abstractions-3.0.4-150400.5.12.2 * apparmor-docs-3.0.4-150400.5.12.2 * apparmor-utils-3.0.4-150400.5.12.2 * apparmor-profiles-3.0.4-150400.5.12.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * libapparmor1-32bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.12.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * perl-apparmor-debuginfo-3.0.4-150400.5.12.2 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.12.2 * python3-apparmor-debuginfo-3.0.4-150400.5.12.2 * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor-devel-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * perl-apparmor-3.0.4-150400.5.12.2 * apache2-mod_apparmor-3.0.4-150400.5.12.2 * python3-apparmor-3.0.4-150400.5.12.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * apparmor-parser-lang-3.0.4-150400.5.12.2 * apparmor-utils-lang-3.0.4-150400.5.12.2 * apparmor-abstractions-3.0.4-150400.5.12.2 * apparmor-docs-3.0.4-150400.5.12.2 * apparmor-utils-3.0.4-150400.5.12.2 * apparmor-profiles-3.0.4-150400.5.12.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libapparmor1-32bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.12.2 * SUSE Manager Proxy 4.3 (x86_64) * libapparmor1-32bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-32bit-3.0.4-150400.5.12.2 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.12.2 * python3-apparmor-debuginfo-3.0.4-150400.5.12.2 * pam_apparmor-32bit-3.0.4-150400.5.12.2 * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor-devel-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * apache2-mod_apparmor-3.0.4-150400.5.12.2 * python3-apparmor-3.0.4-150400.5.12.2 * SUSE Manager Proxy 4.3 (noarch) * apparmor-parser-lang-3.0.4-150400.5.12.2 * apparmor-utils-lang-3.0.4-150400.5.12.2 * apparmor-abstractions-3.0.4-150400.5.12.2 * apparmor-docs-3.0.4-150400.5.12.2 * apparmor-utils-3.0.4-150400.5.12.2 * apparmor-profiles-3.0.4-150400.5.12.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libapparmor1-32bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-32bit-3.0.4-150400.5.12.2 * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.12.2 * python3-apparmor-debuginfo-3.0.4-150400.5.12.2 * pam_apparmor-32bit-3.0.4-150400.5.12.2 * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor-devel-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * apache2-mod_apparmor-3.0.4-150400.5.12.2 * python3-apparmor-3.0.4-150400.5.12.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * apparmor-parser-lang-3.0.4-150400.5.12.2 * apparmor-utils-lang-3.0.4-150400.5.12.2 * apparmor-abstractions-3.0.4-150400.5.12.2 * apparmor-docs-3.0.4-150400.5.12.2 * apparmor-utils-3.0.4-150400.5.12.2 * apparmor-profiles-3.0.4-150400.5.12.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * apache2-mod_apparmor-debuginfo-3.0.4-150400.5.12.2 * python3-apparmor-debuginfo-3.0.4-150400.5.12.2 * apparmor-parser-3.0.4-150400.5.12.2 * libapparmor-devel-3.0.4-150400.5.12.2 * libapparmor1-debuginfo-3.0.4-150400.5.12.2 * libapparmor-debugsource-3.0.4-150400.5.12.2 * apparmor-debugsource-3.0.4-150400.5.12.2 * pam_apparmor-3.0.4-150400.5.12.2 * pam_apparmor-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-3.0.4-150400.5.12.2 * apparmor-parser-debuginfo-3.0.4-150400.5.12.2 * apache2-mod_apparmor-3.0.4-150400.5.12.2 * python3-apparmor-3.0.4-150400.5.12.2 * SUSE Manager Server 4.3 (noarch) * apparmor-parser-lang-3.0.4-150400.5.12.2 * apparmor-utils-lang-3.0.4-150400.5.12.2 * apparmor-abstractions-3.0.4-150400.5.12.2 * apparmor-docs-3.0.4-150400.5.12.2 * apparmor-utils-3.0.4-150400.5.12.2 * apparmor-profiles-3.0.4-150400.5.12.2 * SUSE Manager Server 4.3 (x86_64) * libapparmor1-32bit-debuginfo-3.0.4-150400.5.12.2 * libapparmor1-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-3.0.4-150400.5.12.2 * pam_apparmor-32bit-debuginfo-3.0.4-150400.5.12.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234452 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 10 16:31:09 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 10 Apr 2025 16:31:09 -0000 Subject: SUSE-SU-2025:1195-1: important: Security update for the Linux Kernel Message-ID: <174430266995.4671.1710321888818699426@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:1195-1 Release Date: 2025-04-10T13:48:07Z Rating: important References: * bsc#1193629 * bsc#1197227 * bsc#1207034 * bsc#1207186 * bsc#1207878 * bsc#1209262 * bsc#1209547 * bsc#1209788 * bsc#1210647 * bsc#1213167 * bsc#1225742 * bsc#1231375 * bsc#1233479 * bsc#1233557 * bsc#1233558 * bsc#1234464 * bsc#1235528 * bsc#1237029 * bsc#1237530 * bsc#1237875 * bsc#1237877 * bsc#1237890 * bsc#1237918 * bsc#1238911 * bsc#1238919 * bsc#1239016 * bsc#1239036 * bsc#1239061 * bsc#1239126 * bsc#1239452 * bsc#1239454 * bsc#1239968 * bsc#1239969 * bsc#1240133 * bsc#1240195 * bsc#1240205 * bsc#1240207 * bsc#1240208 * bsc#1240210 * bsc#1240212 * bsc#1240213 * bsc#1240218 * bsc#1240220 * bsc#1240227 * bsc#1240229 * bsc#1240231 * bsc#1240242 * bsc#1240245 * bsc#1240247 * bsc#1240250 * bsc#1240254 * bsc#1240256 * bsc#1240264 * bsc#1240266 * bsc#1240272 * bsc#1240275 * bsc#1240276 * bsc#1240278 * bsc#1240279 * bsc#1240280 * bsc#1240281 * bsc#1240282 * bsc#1240283 * bsc#1240284 * bsc#1240286 * bsc#1240288 * bsc#1240290 * bsc#1240292 * bsc#1240293 * bsc#1240297 * bsc#1240304 * bsc#1240308 * bsc#1240309 * bsc#1240317 * bsc#1240318 * bsc#1240322 Cross-References: * CVE-2017-5753 * CVE-2021-4454 * CVE-2022-1016 * CVE-2022-49053 * CVE-2022-49293 * CVE-2022-49465 * CVE-2022-49650 * CVE-2022-49739 * CVE-2022-49746 * CVE-2022-49748 * CVE-2022-49751 * CVE-2022-49753 * CVE-2022-49755 * CVE-2022-49759 * CVE-2023-0179 * CVE-2023-1652 * CVE-2023-2162 * CVE-2023-3567 * CVE-2023-52930 * CVE-2023-52933 * CVE-2023-52935 * CVE-2023-52939 * CVE-2023-52941 * CVE-2023-52973 * CVE-2023-52974 * CVE-2023-52975 * CVE-2023-52976 * CVE-2023-52979 * CVE-2023-52983 * CVE-2023-52984 * CVE-2023-52988 * CVE-2023-52989 * CVE-2023-52992 * CVE-2023-52993 * CVE-2023-53000 * CVE-2023-53005 * CVE-2023-53006 * CVE-2023-53007 * CVE-2023-53008 * CVE-2023-53010 * CVE-2023-53015 * CVE-2023-53016 * CVE-2023-53019 * CVE-2023-53023 * CVE-2023-53024 * CVE-2023-53025 * CVE-2023-53026 * CVE-2023-53028 * CVE-2023-53029 * CVE-2023-53030 * CVE-2023-53033 * CVE-2024-50290 * CVE-2024-53063 * CVE-2024-53064 * CVE-2024-56651 * CVE-2024-58083 * CVE-2025-21693 * CVE-2025-21714 * CVE-2025-21732 * CVE-2025-21753 * CVE-2025-21772 * CVE-2025-21839 CVSS scores: * CVE-2017-5753 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( SUSE ): 7.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( NVD ): 5.6 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2021-4454 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-4454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-1016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-49053 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49053 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49053 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49293 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49465 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49465 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49465 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49739 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49746 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49748 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49751 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49753 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49755 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49755 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49759 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0179 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1652 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1652 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-1652 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-2162 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-3567 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52935 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52973 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52975 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52975 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52992 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53008 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53023 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53025 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56651 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56651 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves 62 vulnerabilities and has 14 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918). * CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled (bsc#1238919). * CVE-2022-49739: gfs2: Always check inode size of inline inodes (bsc#1240207). * CVE-2023-52935: mm/khugepaged: fix ->anon_vma race (bsc#1240276). * CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558 bsc#1234464). * CVE-2024-56651: can: hi311x: hi3110_can_ist(): fix potential use-after-free (bsc#1235528). * CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036). * CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029). * CVE-2025-21714: RDMA/mlx5: Fix implicit ODP use after free (bsc#1237890). * CVE-2025-21732: RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error (bsc#1237877). * CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875). * CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238911). The following non-security bugs were fixed: * ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016). * RDMA/mana_ib: Use v2 version of cfg_rx_steer_req to enable RX coalescing (bsc#1239016). * RDMA/mlx5: Fix implicit ODP hang on parent deregistration (git-fixes) * btrfs: defrag: do not use merged extent map for their generation check (bsc#1239968). * btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1239968). * btrfs: fix extent map merging not happening for adjacent extents (bsc#1239968). * btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1239969). * btrfs: send: fix invalid clone operation for file that got its size decreased (bsc#1239969). * gfs2: Fix inode height consistency check (git-fixes). * mm/mmu_notifier.c: fix race in mmu_interval_notifier_remove() (bsc#1239126). * mm: zswap: move allocations during CPU init outside the lock (git-fixes). * net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016). * net: mana: Allow variable size indirection table (bsc#1239016). * net: mana: Avoid open coded arithmetic (bsc#1239016). * net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (bsc#1240195). * net: mana: Support holes in device list reply msg (bsc#1240133). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1195=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1195=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1195=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1195=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1195=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1195=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2025-1195=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1195=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1195=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1195=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1195=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1195=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1195=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1195=1 ## Package List: * openSUSE Leap 15.4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (noarch) * kernel-macros-5.14.21-150400.24.161.1 * kernel-devel-5.14.21-150400.24.161.1 * kernel-source-5.14.21-150400.24.161.1 * kernel-source-vanilla-5.14.21-150400.24.161.1 * kernel-docs-html-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (nosrc ppc64le x86_64) * kernel-debug-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (ppc64le x86_64) * kernel-debug-debugsource-5.14.21-150400.24.161.1 * kernel-debug-debuginfo-5.14.21-150400.24.161.1 * kernel-debug-devel-5.14.21-150400.24.161.1 * kernel-debug-devel-debuginfo-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * kernel-kvmsmall-debuginfo-5.14.21-150400.24.161.1 * kernel-kvmsmall-devel-5.14.21-150400.24.161.1 * kernel-kvmsmall-debugsource-5.14.21-150400.24.161.1 * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * kernel-default-base-rebuild-5.14.21-150400.24.161.1.150400.24.80.1 * kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * kernel-default-extra-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * reiserfs-kmp-default-5.14.21-150400.24.161.1 * kselftests-kmp-default-5.14.21-150400.24.161.1 * cluster-md-kmp-default-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * kernel-default-optional-5.14.21-150400.24.161.1 * kernel-default-devel-5.14.21-150400.24.161.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-obs-build-debugsource-5.14.21-150400.24.161.1 * kselftests-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-syms-5.14.21-150400.24.161.1 * kernel-obs-build-5.14.21-150400.24.161.1 * kernel-obs-qa-5.14.21-150400.24.161.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * kernel-default-extra-5.14.21-150400.24.161.1 * kernel-default-livepatch-5.14.21-150400.24.161.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-optional-debuginfo-5.14.21-150400.24.161.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.161.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.161.1 * dlm-kmp-default-5.14.21-150400.24.161.1 * ocfs2-kmp-default-5.14.21-150400.24.161.1 * gfs2-kmp-default-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-1-150400.9.3.1 * kernel-default-livepatch-devel-5.14.21-150400.24.161.1 * kernel-livepatch-5_14_21-150400_24_161-default-1-150400.9.3.1 * kernel-livepatch-SLE15-SP4_Update_39-debugsource-1-150400.9.3.1 * openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150400.24.161.1 * kernel-zfcpdump-debugsource-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (nosrc) * dtb-aarch64-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (aarch64) * dtb-cavium-5.14.21-150400.24.161.1 * kernel-64kb-debugsource-5.14.21-150400.24.161.1 * reiserfs-kmp-64kb-5.14.21-150400.24.161.1 * kselftests-kmp-64kb-5.14.21-150400.24.161.1 * kernel-64kb-devel-5.14.21-150400.24.161.1 * dtb-altera-5.14.21-150400.24.161.1 * kernel-64kb-extra-debuginfo-5.14.21-150400.24.161.1 * dtb-freescale-5.14.21-150400.24.161.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.161.1 * dtb-arm-5.14.21-150400.24.161.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.161.1 * dtb-amazon-5.14.21-150400.24.161.1 * cluster-md-kmp-64kb-5.14.21-150400.24.161.1 * kernel-64kb-debuginfo-5.14.21-150400.24.161.1 * kernel-64kb-optional-debuginfo-5.14.21-150400.24.161.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.161.1 * dlm-kmp-64kb-5.14.21-150400.24.161.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.161.1 * dtb-mediatek-5.14.21-150400.24.161.1 * dtb-apm-5.14.21-150400.24.161.1 * kernel-64kb-extra-5.14.21-150400.24.161.1 * dtb-apple-5.14.21-150400.24.161.1 * dtb-qcom-5.14.21-150400.24.161.1 * dtb-hisilicon-5.14.21-150400.24.161.1 * dtb-amd-5.14.21-150400.24.161.1 * dtb-lg-5.14.21-150400.24.161.1 * dtb-socionext-5.14.21-150400.24.161.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.161.1 * dtb-xilinx-5.14.21-150400.24.161.1 * dtb-broadcom-5.14.21-150400.24.161.1 * dtb-nvidia-5.14.21-150400.24.161.1 * dtb-exynos-5.14.21-150400.24.161.1 * ocfs2-kmp-64kb-5.14.21-150400.24.161.1 * kernel-64kb-optional-5.14.21-150400.24.161.1 * dtb-renesas-5.14.21-150400.24.161.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.161.1 * dtb-sprd-5.14.21-150400.24.161.1 * dtb-amlogic-5.14.21-150400.24.161.1 * dtb-rockchip-5.14.21-150400.24.161.1 * dtb-marvell-5.14.21-150400.24.161.1 * gfs2-kmp-64kb-5.14.21-150400.24.161.1 * dlm-kmp-64kb-debuginfo-5.14.21-150400.24.161.1 * dtb-allwinner-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-default-livepatch-devel-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-livepatch-5_14_21-150400_24_161-default-1-150400.9.3.1 * kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-1-150400.9.3.1 * kernel-livepatch-SLE15-SP4_Update_39-debugsource-1-150400.9.3.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * kernel-default-livepatch-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * gfs2-kmp-default-5.14.21-150400.24.161.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.161.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.161.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.161.1 * dlm-kmp-default-5.14.21-150400.24.161.1 * ocfs2-kmp-default-5.14.21-150400.24.161.1 * cluster-md-kmp-default-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150400.24.161.1 * kernel-64kb-debugsource-5.14.21-150400.24.161.1 * kernel-64kb-debuginfo-5.14.21-150400.24.161.1 * kernel-64kb-devel-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-devel-5.14.21-150400.24.161.1 * kernel-obs-build-debugsource-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * kernel-syms-5.14.21-150400.24.161.1 * kernel-obs-build-5.14.21-150400.24.161.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * reiserfs-kmp-default-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.161.1 * kernel-source-5.14.21-150400.24.161.1 * kernel-macros-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150400.24.161.1 * kernel-64kb-debugsource-5.14.21-150400.24.161.1 * kernel-64kb-debuginfo-5.14.21-150400.24.161.1 * kernel-64kb-devel-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-devel-5.14.21-150400.24.161.1 * kernel-obs-build-debugsource-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * kernel-syms-5.14.21-150400.24.161.1 * kernel-obs-build-5.14.21-150400.24.161.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * reiserfs-kmp-default-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.161.1 * kernel-source-5.14.21-150400.24.161.1 * kernel-macros-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150400.24.161.1 * kernel-64kb-debugsource-5.14.21-150400.24.161.1 * kernel-64kb-debuginfo-5.14.21-150400.24.161.1 * kernel-64kb-devel-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-devel-5.14.21-150400.24.161.1 * kernel-obs-build-debugsource-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-syms-5.14.21-150400.24.161.1 * kernel-obs-build-5.14.21-150400.24.161.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * reiserfs-kmp-default-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * kernel-devel-5.14.21-150400.24.161.1 * kernel-source-5.14.21-150400.24.161.1 * kernel-macros-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch nosrc) * kernel-docs-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150400.24.161.1 * kernel-zfcpdump-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-devel-5.14.21-150400.24.161.1 * kernel-obs-build-debugsource-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * kernel-syms-5.14.21-150400.24.161.1 * kernel-obs-build-5.14.21-150400.24.161.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * reiserfs-kmp-default-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.161.1 * kernel-source-5.14.21-150400.24.161.1 * kernel-macros-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.161.1 * SUSE Manager Proxy 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Manager Proxy 4.3 (x86_64) * kernel-default-devel-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * kernel-syms-5.14.21-150400.24.161.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Manager Proxy 4.3 (noarch) * kernel-devel-5.14.21-150400.24.161.1 * kernel-source-5.14.21-150400.24.161.1 * kernel-macros-5.14.21-150400.24.161.1 * SUSE Manager Retail Branch Server 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * kernel-default-devel-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * kernel-devel-5.14.21-150400.24.161.1 * kernel-macros-5.14.21-150400.24.161.1 * SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Manager Server 4.3 (ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * kernel-default-devel-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-syms-5.14.21-150400.24.161.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Manager Server 4.3 (noarch) * kernel-devel-5.14.21-150400.24.161.1 * kernel-source-5.14.21-150400.24.161.1 * kernel-macros-5.14.21-150400.24.161.1 * SUSE Manager Server 4.3 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.161.1 * SUSE Manager Server 4.3 (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150400.24.161.1 * kernel-zfcpdump-debugsource-5.14.21-150400.24.161.1 ## References: * https://www.suse.com/security/cve/CVE-2017-5753.html * https://www.suse.com/security/cve/CVE-2021-4454.html * https://www.suse.com/security/cve/CVE-2022-1016.html * https://www.suse.com/security/cve/CVE-2022-49053.html * https://www.suse.com/security/cve/CVE-2022-49293.html * https://www.suse.com/security/cve/CVE-2022-49465.html * https://www.suse.com/security/cve/CVE-2022-49650.html * https://www.suse.com/security/cve/CVE-2022-49739.html * https://www.suse.com/security/cve/CVE-2022-49746.html * https://www.suse.com/security/cve/CVE-2022-49748.html * https://www.suse.com/security/cve/CVE-2022-49751.html * https://www.suse.com/security/cve/CVE-2022-49753.html * https://www.suse.com/security/cve/CVE-2022-49755.html * https://www.suse.com/security/cve/CVE-2022-49759.html * https://www.suse.com/security/cve/CVE-2023-0179.html * https://www.suse.com/security/cve/CVE-2023-1652.html * https://www.suse.com/security/cve/CVE-2023-2162.html * https://www.suse.com/security/cve/CVE-2023-3567.html * https://www.suse.com/security/cve/CVE-2023-52930.html * https://www.suse.com/security/cve/CVE-2023-52933.html * https://www.suse.com/security/cve/CVE-2023-52935.html * https://www.suse.com/security/cve/CVE-2023-52939.html * https://www.suse.com/security/cve/CVE-2023-52941.html * https://www.suse.com/security/cve/CVE-2023-52973.html * https://www.suse.com/security/cve/CVE-2023-52974.html * https://www.suse.com/security/cve/CVE-2023-52975.html * https://www.suse.com/security/cve/CVE-2023-52976.html * https://www.suse.com/security/cve/CVE-2023-52979.html * https://www.suse.com/security/cve/CVE-2023-52983.html * https://www.suse.com/security/cve/CVE-2023-52984.html * https://www.suse.com/security/cve/CVE-2023-52988.html * https://www.suse.com/security/cve/CVE-2023-52989.html * https://www.suse.com/security/cve/CVE-2023-52992.html * https://www.suse.com/security/cve/CVE-2023-52993.html * https://www.suse.com/security/cve/CVE-2023-53000.html * https://www.suse.com/security/cve/CVE-2023-53005.html * https://www.suse.com/security/cve/CVE-2023-53006.html * https://www.suse.com/security/cve/CVE-2023-53007.html * https://www.suse.com/security/cve/CVE-2023-53008.html * https://www.suse.com/security/cve/CVE-2023-53010.html * https://www.suse.com/security/cve/CVE-2023-53015.html * https://www.suse.com/security/cve/CVE-2023-53016.html * https://www.suse.com/security/cve/CVE-2023-53019.html * https://www.suse.com/security/cve/CVE-2023-53023.html * https://www.suse.com/security/cve/CVE-2023-53024.html * https://www.suse.com/security/cve/CVE-2023-53025.html * https://www.suse.com/security/cve/CVE-2023-53026.html * https://www.suse.com/security/cve/CVE-2023-53028.html * https://www.suse.com/security/cve/CVE-2023-53029.html * https://www.suse.com/security/cve/CVE-2023-53030.html * https://www.suse.com/security/cve/CVE-2023-53033.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53064.html * https://www.suse.com/security/cve/CVE-2024-56651.html * https://www.suse.com/security/cve/CVE-2024-58083.html * https://www.suse.com/security/cve/CVE-2025-21693.html * https://www.suse.com/security/cve/CVE-2025-21714.html * https://www.suse.com/security/cve/CVE-2025-21732.html * https://www.suse.com/security/cve/CVE-2025-21753.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21839.html * https://bugzilla.suse.com/show_bug.cgi?id=1193629 * https://bugzilla.suse.com/show_bug.cgi?id=1197227 * https://bugzilla.suse.com/show_bug.cgi?id=1207034 * https://bugzilla.suse.com/show_bug.cgi?id=1207186 * https://bugzilla.suse.com/show_bug.cgi?id=1207878 * https://bugzilla.suse.com/show_bug.cgi?id=1209262 * https://bugzilla.suse.com/show_bug.cgi?id=1209547 * https://bugzilla.suse.com/show_bug.cgi?id=1209788 * https://bugzilla.suse.com/show_bug.cgi?id=1210647 * https://bugzilla.suse.com/show_bug.cgi?id=1213167 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1231375 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233558 * https://bugzilla.suse.com/show_bug.cgi?id=1234464 * https://bugzilla.suse.com/show_bug.cgi?id=1235528 * https://bugzilla.suse.com/show_bug.cgi?id=1237029 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237875 * https://bugzilla.suse.com/show_bug.cgi?id=1237877 * https://bugzilla.suse.com/show_bug.cgi?id=1237890 * https://bugzilla.suse.com/show_bug.cgi?id=1237918 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238919 * https://bugzilla.suse.com/show_bug.cgi?id=1239016 * https://bugzilla.suse.com/show_bug.cgi?id=1239036 * https://bugzilla.suse.com/show_bug.cgi?id=1239061 * https://bugzilla.suse.com/show_bug.cgi?id=1239126 * https://bugzilla.suse.com/show_bug.cgi?id=1239452 * https://bugzilla.suse.com/show_bug.cgi?id=1239454 * https://bugzilla.suse.com/show_bug.cgi?id=1239968 * https://bugzilla.suse.com/show_bug.cgi?id=1239969 * https://bugzilla.suse.com/show_bug.cgi?id=1240133 * https://bugzilla.suse.com/show_bug.cgi?id=1240195 * https://bugzilla.suse.com/show_bug.cgi?id=1240205 * https://bugzilla.suse.com/show_bug.cgi?id=1240207 * https://bugzilla.suse.com/show_bug.cgi?id=1240208 * https://bugzilla.suse.com/show_bug.cgi?id=1240210 * https://bugzilla.suse.com/show_bug.cgi?id=1240212 * https://bugzilla.suse.com/show_bug.cgi?id=1240213 * https://bugzilla.suse.com/show_bug.cgi?id=1240218 * https://bugzilla.suse.com/show_bug.cgi?id=1240220 * https://bugzilla.suse.com/show_bug.cgi?id=1240227 * https://bugzilla.suse.com/show_bug.cgi?id=1240229 * https://bugzilla.suse.com/show_bug.cgi?id=1240231 * https://bugzilla.suse.com/show_bug.cgi?id=1240242 * https://bugzilla.suse.com/show_bug.cgi?id=1240245 * https://bugzilla.suse.com/show_bug.cgi?id=1240247 * https://bugzilla.suse.com/show_bug.cgi?id=1240250 * https://bugzilla.suse.com/show_bug.cgi?id=1240254 * https://bugzilla.suse.com/show_bug.cgi?id=1240256 * https://bugzilla.suse.com/show_bug.cgi?id=1240264 * https://bugzilla.suse.com/show_bug.cgi?id=1240266 * https://bugzilla.suse.com/show_bug.cgi?id=1240272 * https://bugzilla.suse.com/show_bug.cgi?id=1240275 * https://bugzilla.suse.com/show_bug.cgi?id=1240276 * https://bugzilla.suse.com/show_bug.cgi?id=1240278 * https://bugzilla.suse.com/show_bug.cgi?id=1240279 * https://bugzilla.suse.com/show_bug.cgi?id=1240280 * https://bugzilla.suse.com/show_bug.cgi?id=1240281 * https://bugzilla.suse.com/show_bug.cgi?id=1240282 * https://bugzilla.suse.com/show_bug.cgi?id=1240283 * https://bugzilla.suse.com/show_bug.cgi?id=1240284 * https://bugzilla.suse.com/show_bug.cgi?id=1240286 * https://bugzilla.suse.com/show_bug.cgi?id=1240288 * https://bugzilla.suse.com/show_bug.cgi?id=1240290 * https://bugzilla.suse.com/show_bug.cgi?id=1240292 * https://bugzilla.suse.com/show_bug.cgi?id=1240293 * https://bugzilla.suse.com/show_bug.cgi?id=1240297 * https://bugzilla.suse.com/show_bug.cgi?id=1240304 * https://bugzilla.suse.com/show_bug.cgi?id=1240308 * https://bugzilla.suse.com/show_bug.cgi?id=1240309 * https://bugzilla.suse.com/show_bug.cgi?id=1240317 * https://bugzilla.suse.com/show_bug.cgi?id=1240318 * https://bugzilla.suse.com/show_bug.cgi?id=1240322 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 10 16:35:01 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 10 Apr 2025 16:35:01 -0000 Subject: SUSE-SU-2025:1194-1: important: Security update for the Linux Kernel Message-ID: <174430290146.4671.10422471934447954661@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:1194-1 Release Date: 2025-04-10T13:46:40Z Rating: important References: * bsc#1065729 * bsc#1179878 * bsc#1180814 * bsc#1185762 * bsc#1195823 * bsc#1196444 * bsc#1197158 * bsc#1197227 * bsc#1197302 * bsc#1197331 * bsc#1197472 * bsc#1197661 * bsc#1197926 * bsc#1198577 * bsc#1198660 * bsc#1199657 * bsc#1200045 * bsc#1200217 * bsc#1200571 * bsc#1200807 * bsc#1200809 * bsc#1200825 * bsc#1200871 * bsc#1200872 * bsc#1201193 * bsc#1201381 * bsc#1201610 * bsc#1202672 * bsc#1202711 * bsc#1203769 * bsc#1207186 * bsc#1209547 * bsc#1210647 * bsc#1213167 * bsc#1224867 * bsc#1225742 * bsc#1230326 * bsc#1231375 * bsc#1233479 * bsc#1233557 * bsc#1235433 * bsc#1235528 * bsc#1237530 * bsc#1237718 * bsc#1237721 * bsc#1237723 * bsc#1237726 * bsc#1237734 * bsc#1237735 * bsc#1237736 * bsc#1237738 * bsc#1237739 * bsc#1237740 * bsc#1237742 * bsc#1237746 * bsc#1237748 * bsc#1237752 * bsc#1237778 * bsc#1237782 * bsc#1237783 * bsc#1237784 * bsc#1237788 * bsc#1237798 * bsc#1237810 * bsc#1237813 * bsc#1237814 * bsc#1237815 * bsc#1237823 * bsc#1237829 * bsc#1237831 * bsc#1237839 * bsc#1237840 * bsc#1237846 * bsc#1237868 * bsc#1237872 * bsc#1237903 * bsc#1237916 * bsc#1237918 * bsc#1237932 * bsc#1237940 * bsc#1237941 * bsc#1237951 * bsc#1237954 * bsc#1237958 * bsc#1237963 * bsc#1237983 * bsc#1237984 * bsc#1237996 * bsc#1237997 * bsc#1237998 * bsc#1238000 * bsc#1238007 * bsc#1238013 * bsc#1238022 * bsc#1238030 * bsc#1238036 * bsc#1238046 * bsc#1238071 * bsc#1238079 * bsc#1238096 * bsc#1238099 * bsc#1238103 * bsc#1238108 * bsc#1238111 * bsc#1238123 * bsc#1238126 * bsc#1238131 * bsc#1238135 * bsc#1238139 * bsc#1238146 * bsc#1238149 * bsc#1238150 * bsc#1238155 * bsc#1238156 * bsc#1238158 * bsc#1238162 * bsc#1238166 * bsc#1238168 * bsc#1238169 * bsc#1238170 * bsc#1238171 * bsc#1238172 * bsc#1238175 * bsc#1238177 * bsc#1238181 * bsc#1238183 * bsc#1238184 * bsc#1238228 * bsc#1238229 * bsc#1238231 * bsc#1238235 * bsc#1238236 * bsc#1238239 * bsc#1238241 * bsc#1238242 * bsc#1238243 * bsc#1238244 * bsc#1238249 * bsc#1238255 * bsc#1238256 * bsc#1238257 * bsc#1238263 * bsc#1238264 * bsc#1238266 * bsc#1238267 * bsc#1238269 * bsc#1238271 * bsc#1238272 * bsc#1238274 * bsc#1238275 * bsc#1238276 * bsc#1238278 * bsc#1238279 * bsc#1238281 * bsc#1238284 * bsc#1238289 * bsc#1238293 * bsc#1238306 * bsc#1238307 * bsc#1238313 * bsc#1238327 * bsc#1238331 * bsc#1238333 * bsc#1238334 * bsc#1238336 * bsc#1238337 * bsc#1238338 * bsc#1238343 * bsc#1238372 * bsc#1238373 * bsc#1238377 * bsc#1238382 * bsc#1238386 * bsc#1238393 * bsc#1238394 * bsc#1238395 * bsc#1238413 * bsc#1238416 * bsc#1238417 * bsc#1238419 * bsc#1238420 * bsc#1238429 * bsc#1238430 * bsc#1238435 * bsc#1238441 * bsc#1238443 * bsc#1238454 * bsc#1238462 * bsc#1238467 * bsc#1238469 * bsc#1238539 * bsc#1238543 * bsc#1238546 * bsc#1238599 * bsc#1238600 * bsc#1238612 * bsc#1238615 * bsc#1238617 * bsc#1238618 * bsc#1238621 * bsc#1238623 * bsc#1238625 * bsc#1238626 * bsc#1238630 * bsc#1238631 * bsc#1238633 * bsc#1238635 * bsc#1238638 * bsc#1238639 * bsc#1238641 * bsc#1238643 * bsc#1238645 * bsc#1238646 * bsc#1238653 * bsc#1238655 * bsc#1238663 * bsc#1238705 * bsc#1238707 * bsc#1238710 * bsc#1238712 * bsc#1238718 * bsc#1238719 * bsc#1238721 * bsc#1238722 * bsc#1238727 * bsc#1238729 * bsc#1238750 * bsc#1238787 * bsc#1238789 * bsc#1238805 * bsc#1238809 * bsc#1238814 * bsc#1238815 * bsc#1238819 * bsc#1238821 * bsc#1238822 * bsc#1238823 * bsc#1238825 * bsc#1238835 * bsc#1238838 * bsc#1238868 * bsc#1238869 * bsc#1238871 * bsc#1238892 * bsc#1238893 * bsc#1238911 * bsc#1238919 * bsc#1238925 * bsc#1238930 * bsc#1238933 * bsc#1238937 * bsc#1238938 * bsc#1238939 * bsc#1238948 * bsc#1238949 * bsc#1238952 * bsc#1239001 * bsc#1239035 * bsc#1239040 * bsc#1239041 * bsc#1239060 * bsc#1239070 * bsc#1239071 * bsc#1239076 * bsc#1239109 * bsc#1239115 * bsc#1239454 * bsc#1239969 * bsc#1240207 * bsc#1240213 * bsc#1240218 * bsc#1240227 * bsc#1240272 * bsc#1240276 * bsc#1240288 Cross-References: * CVE-2017-5753 * CVE-2020-27835 * CVE-2021-47248 * CVE-2021-47631 * CVE-2021-47641 * CVE-2021-47642 * CVE-2021-47650 * CVE-2021-47651 * CVE-2021-47652 * CVE-2021-47653 * CVE-2021-47659 * CVE-2022-0168 * CVE-2022-1016 * CVE-2022-1048 * CVE-2022-1184 * CVE-2022-2977 * CVE-2022-29900 * CVE-2022-29901 * CVE-2022-3303 * CVE-2022-49044 * CVE-2022-49051 * CVE-2022-49053 * CVE-2022-49055 * CVE-2022-49058 * CVE-2022-49059 * CVE-2022-49063 * CVE-2022-49065 * CVE-2022-49073 * CVE-2022-49076 * CVE-2022-49078 * CVE-2022-49082 * CVE-2022-49083 * CVE-2022-49085 * CVE-2022-49091 * CVE-2022-49095 * CVE-2022-49098 * CVE-2022-49100 * CVE-2022-49111 * CVE-2022-49114 * CVE-2022-49122 * CVE-2022-49137 * CVE-2022-49145 * CVE-2022-49151 * CVE-2022-49153 * CVE-2022-49155 * CVE-2022-49156 * CVE-2022-49157 * CVE-2022-49158 * CVE-2022-49159 * CVE-2022-49160 * CVE-2022-49162 * CVE-2022-49164 * CVE-2022-49175 * CVE-2022-49185 * CVE-2022-49189 * CVE-2022-49196 * CVE-2022-49200 * CVE-2022-49201 * CVE-2022-49206 * CVE-2022-49212 * CVE-2022-49213 * CVE-2022-49216 * CVE-2022-49217 * CVE-2022-49224 * CVE-2022-49226 * CVE-2022-49232 * CVE-2022-49235 * CVE-2022-49239 * CVE-2022-49242 * CVE-2022-49243 * CVE-2022-49247 * CVE-2022-49248 * CVE-2022-49253 * CVE-2022-49259 * CVE-2022-49261 * CVE-2022-49263 * CVE-2022-49264 * CVE-2022-49271 * CVE-2022-49272 * CVE-2022-49275 * CVE-2022-49279 * CVE-2022-49280 * CVE-2022-49281 * CVE-2022-49285 * CVE-2022-49287 * CVE-2022-49288 * CVE-2022-49290 * CVE-2022-49291 * CVE-2022-49292 * CVE-2022-49293 * CVE-2022-49295 * CVE-2022-49297 * CVE-2022-49298 * CVE-2022-49299 * CVE-2022-49300 * CVE-2022-49301 * CVE-2022-49302 * CVE-2022-49304 * CVE-2022-49305 * CVE-2022-49307 * CVE-2022-49313 * CVE-2022-49314 * CVE-2022-49315 * CVE-2022-49316 * CVE-2022-49320 * CVE-2022-49321 * CVE-2022-49326 * CVE-2022-49327 * CVE-2022-49331 * CVE-2022-49332 * CVE-2022-49335 * CVE-2022-49343 * CVE-2022-49347 * CVE-2022-49349 * CVE-2022-49352 * CVE-2022-49357 * CVE-2022-49370 * CVE-2022-49371 * CVE-2022-49373 * CVE-2022-49375 * CVE-2022-49376 * CVE-2022-49382 * CVE-2022-49385 * CVE-2022-49389 * CVE-2022-49394 * CVE-2022-49396 * CVE-2022-49397 * CVE-2022-49398 * CVE-2022-49399 * CVE-2022-49402 * CVE-2022-49404 * CVE-2022-49409 * CVE-2022-49410 * CVE-2022-49411 * CVE-2022-49413 * CVE-2022-49414 * CVE-2022-49416 * CVE-2022-49421 * CVE-2022-49422 * CVE-2022-49437 * CVE-2022-49438 * CVE-2022-49441 * CVE-2022-49442 * CVE-2022-49446 * CVE-2022-49451 * CVE-2022-49455 * CVE-2022-49459 * CVE-2022-49460 * CVE-2022-49462 * CVE-2022-49465 * CVE-2022-49467 * CVE-2022-49473 * CVE-2022-49474 * CVE-2022-49475 * CVE-2022-49478 * CVE-2022-49481 * CVE-2022-49482 * CVE-2022-49488 * CVE-2022-49489 * CVE-2022-49490 * CVE-2022-49491 * CVE-2022-49493 * CVE-2022-49495 * CVE-2022-49498 * CVE-2022-49503 * CVE-2022-49504 * CVE-2022-49505 * CVE-2022-49508 * CVE-2022-49514 * CVE-2022-49517 * CVE-2022-49521 * CVE-2022-49522 * CVE-2022-49524 * CVE-2022-49525 * CVE-2022-49526 * CVE-2022-49527 * CVE-2022-49532 * CVE-2022-49534 * CVE-2022-49535 * CVE-2022-49536 * CVE-2022-49537 * CVE-2022-49541 * CVE-2022-49542 * CVE-2022-49544 * CVE-2022-49545 * CVE-2022-49546 * CVE-2022-49555 * CVE-2022-49563 * CVE-2022-49564 * CVE-2022-49566 * CVE-2022-49609 * CVE-2022-49610 * CVE-2022-49611 * CVE-2022-49623 * CVE-2022-49627 * CVE-2022-49631 * CVE-2022-49640 * CVE-2022-49641 * CVE-2022-49643 * CVE-2022-49644 * CVE-2022-49645 * CVE-2022-49646 * CVE-2022-49647 * CVE-2022-49648 * CVE-2022-49649 * CVE-2022-49652 * CVE-2022-49657 * CVE-2022-49661 * CVE-2022-49670 * CVE-2022-49671 * CVE-2022-49673 * CVE-2022-49674 * CVE-2022-49678 * CVE-2022-49685 * CVE-2022-49687 * CVE-2022-49693 * CVE-2022-49700 * CVE-2022-49701 * CVE-2022-49703 * CVE-2022-49707 * CVE-2022-49708 * CVE-2022-49710 * CVE-2022-49711 * CVE-2022-49712 * CVE-2022-49713 * CVE-2022-49720 * CVE-2022-49723 * CVE-2022-49724 * CVE-2022-49729 * CVE-2022-49730 * CVE-2022-49731 * CVE-2022-49733 * CVE-2022-49739 * CVE-2023-2162 * CVE-2023-3567 * CVE-2023-52935 * CVE-2023-52973 * CVE-2023-52974 * CVE-2023-53000 * CVE-2023-53015 * CVE-2023-53024 * CVE-2024-50290 * CVE-2024-53063 * CVE-2024-56642 * CVE-2024-56651 * CVE-2024-57996 * CVE-2024-58014 * CVE-2025-21772 * CVE-2025-21780 CVSS scores: * CVE-2017-5753 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( SUSE ): 7.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( NVD ): 5.6 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2020-27835 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2020-27835 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47248 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47631 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47631 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47641 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47641 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47642 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2021-47642 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2021-47650 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47651 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47651 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47651 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47652 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47652 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47653 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47653 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47653 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47659 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2021-47659 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-0168 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-0168 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-1016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-1048 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-1048 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-1184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-2977 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2022-2977 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-29900 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-29900 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2022-29901 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-29901 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2022-3303 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3303 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49044 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49044 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49051 ( SUSE ): 4.3 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2022-49051 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N * CVE-2022-49053 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49053 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49053 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49055 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49058 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49059 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49059 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49063 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49063 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49063 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49065 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49065 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49073 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49076 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49076 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49078 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49078 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49082 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49082 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49083 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49085 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49085 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49091 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49098 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49098 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49100 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49111 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49114 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49114 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49114 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49122 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49137 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49137 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49137 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49145 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49145 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-49151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49153 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49153 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49155 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49156 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49157 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49157 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49158 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2022-49158 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2022-49159 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49159 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49162 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49164 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49175 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49189 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2022-49189 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2022-49196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49196 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49201 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49206 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49206 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49212 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49212 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49213 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49213 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49213 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49216 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49216 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49226 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49232 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49232 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49235 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49235 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49239 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49242 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49242 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49243 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49243 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49248 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49261 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49261 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49271 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49275 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49275 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49275 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49279 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49279 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49280 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49281 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49285 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49287 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49288 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49290 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49290 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2022-49291 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49291 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49291 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49292 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49293 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49295 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49295 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49297 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49297 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49298 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49298 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49299 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49300 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49300 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49301 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49301 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49302 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49304 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49305 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49307 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49313 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49314 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49314 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49315 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49316 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49316 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49316 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49320 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49321 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49321 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49321 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49326 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49326 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49326 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49327 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49327 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49331 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49332 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49335 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49335 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49343 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49343 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49347 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49347 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49349 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49349 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49352 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49352 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49357 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49357 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49370 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49373 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49375 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49376 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49382 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49385 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49394 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49394 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49398 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49402 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49404 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49411 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49411 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49413 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49413 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49413 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49414 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49416 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49421 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49437 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49437 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49438 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49446 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49455 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49459 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49460 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49460 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49462 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49465 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49465 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49465 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49467 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49473 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49474 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49474 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49475 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49481 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49482 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49489 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49489 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49490 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49491 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49493 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49493 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49495 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49498 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2022-49498 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2022-49503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49504 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49505 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49505 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49508 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49514 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49517 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49521 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49521 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49522 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49524 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49524 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49525 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49525 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49526 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49526 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49527 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49527 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49527 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49532 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49532 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49534 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49534 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49534 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49535 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49535 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49535 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49536 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49536 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49536 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49537 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49537 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49541 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49541 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2022-49541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49542 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49544 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49544 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49544 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49545 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49545 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49546 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49546 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49555 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49563 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49564 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49566 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49609 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49610 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2022-49610 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2022-49611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49623 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49627 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49627 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49631 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49640 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49641 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49643 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49644 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49644 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49646 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49647 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49652 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49657 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49673 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49685 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49693 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49700 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49711 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49711 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49720 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49729 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49729 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49729 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49730 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49731 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49731 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49733 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49739 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-2162 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-3567 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52935 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52973 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56642 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56642 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56651 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58014 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21780 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves 249 vulnerabilities and has 26 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2021-47248: udp: fix race between close() and udp_abort() (bsc#1224867). * CVE-2022-49051: net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (bsc#1237903). * CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918). * CVE-2022-49275: can: m_can: m_can_tx_handler(): fix use after free of skb (bsc#1238719). * CVE-2022-49413: bfq: Update cgroup information before merging bio (bsc#1238710). * CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled (bsc#1238919). * CVE-2022-49545: ALSA: usb-audio: Cancel pending work at closing a MIDI substream (bsc#1238729). * CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238787). * CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238789). * CVE-2022-49739: gfs2: Always check inode size of inline inodes (bsc#1240207). * CVE-2023-52935: mm/khugepaged: fix ->anon_vma race (bsc#1240276). * CVE-2024-56642: tipc: Fix use-after-free of kernel socket in cleanup_bearer() (bsc#1235433). * CVE-2024-56651: can: hi311x: hi3110_can_ist(): fix potential use-after-free (bsc#1235528). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076). * CVE-2024-58014: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (bsc#1239109). * CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238911). * CVE-2025-21780: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (bsc#1239115). The following non-security bugs were fixed: * ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1239969). * btrfs: send: fix invalid clone operation for file that got its size decreased (bsc#1239969). * btrfs: send: use btrfs_file_extent_end() in send_write_or_clone() (bsc#1239969). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1194=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1194=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1194=1 ## Package List: * SUSE Linux Enterprise Micro 5.1 (nosrc x86_64) * kernel-rt-5.3.18-150300.205.1 * SUSE Linux Enterprise Micro 5.1 (x86_64) * kernel-rt-debuginfo-5.3.18-150300.205.1 * kernel-rt-debugsource-5.3.18-150300.205.1 * SUSE Linux Enterprise Micro 5.1 (noarch) * kernel-source-rt-5.3.18-150300.205.1 * SUSE Linux Enterprise Micro 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.205.1 * SUSE Linux Enterprise Micro 5.2 (x86_64) * kernel-rt-debuginfo-5.3.18-150300.205.1 * kernel-rt-debugsource-5.3.18-150300.205.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * kernel-source-rt-5.3.18-150300.205.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.205.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64) * kernel-rt-debuginfo-5.3.18-150300.205.1 * kernel-rt-debugsource-5.3.18-150300.205.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * kernel-source-rt-5.3.18-150300.205.1 ## References: * https://www.suse.com/security/cve/CVE-2017-5753.html * https://www.suse.com/security/cve/CVE-2020-27835.html * https://www.suse.com/security/cve/CVE-2021-47248.html * https://www.suse.com/security/cve/CVE-2021-47631.html * https://www.suse.com/security/cve/CVE-2021-47641.html * https://www.suse.com/security/cve/CVE-2021-47642.html * https://www.suse.com/security/cve/CVE-2021-47650.html * https://www.suse.com/security/cve/CVE-2021-47651.html * https://www.suse.com/security/cve/CVE-2021-47652.html * https://www.suse.com/security/cve/CVE-2021-47653.html * https://www.suse.com/security/cve/CVE-2021-47659.html * https://www.suse.com/security/cve/CVE-2022-0168.html * https://www.suse.com/security/cve/CVE-2022-1016.html * https://www.suse.com/security/cve/CVE-2022-1048.html * https://www.suse.com/security/cve/CVE-2022-1184.html * https://www.suse.com/security/cve/CVE-2022-2977.html * https://www.suse.com/security/cve/CVE-2022-29900.html * https://www.suse.com/security/cve/CVE-2022-29901.html * https://www.suse.com/security/cve/CVE-2022-3303.html * https://www.suse.com/security/cve/CVE-2022-49044.html * https://www.suse.com/security/cve/CVE-2022-49051.html * https://www.suse.com/security/cve/CVE-2022-49053.html * https://www.suse.com/security/cve/CVE-2022-49055.html * https://www.suse.com/security/cve/CVE-2022-49058.html * https://www.suse.com/security/cve/CVE-2022-49059.html * https://www.suse.com/security/cve/CVE-2022-49063.html * https://www.suse.com/security/cve/CVE-2022-49065.html * https://www.suse.com/security/cve/CVE-2022-49073.html * https://www.suse.com/security/cve/CVE-2022-49076.html * https://www.suse.com/security/cve/CVE-2022-49078.html * https://www.suse.com/security/cve/CVE-2022-49082.html * https://www.suse.com/security/cve/CVE-2022-49083.html * https://www.suse.com/security/cve/CVE-2022-49085.html * https://www.suse.com/security/cve/CVE-2022-49091.html * https://www.suse.com/security/cve/CVE-2022-49095.html * https://www.suse.com/security/cve/CVE-2022-49098.html * https://www.suse.com/security/cve/CVE-2022-49100.html * https://www.suse.com/security/cve/CVE-2022-49111.html * https://www.suse.com/security/cve/CVE-2022-49114.html * https://www.suse.com/security/cve/CVE-2022-49122.html * https://www.suse.com/security/cve/CVE-2022-49137.html * https://www.suse.com/security/cve/CVE-2022-49145.html * https://www.suse.com/security/cve/CVE-2022-49151.html * https://www.suse.com/security/cve/CVE-2022-49153.html * https://www.suse.com/security/cve/CVE-2022-49155.html * https://www.suse.com/security/cve/CVE-2022-49156.html * https://www.suse.com/security/cve/CVE-2022-49157.html * https://www.suse.com/security/cve/CVE-2022-49158.html * https://www.suse.com/security/cve/CVE-2022-49159.html * https://www.suse.com/security/cve/CVE-2022-49160.html * https://www.suse.com/security/cve/CVE-2022-49162.html * https://www.suse.com/security/cve/CVE-2022-49164.html * https://www.suse.com/security/cve/CVE-2022-49175.html * https://www.suse.com/security/cve/CVE-2022-49185.html * https://www.suse.com/security/cve/CVE-2022-49189.html * https://www.suse.com/security/cve/CVE-2022-49196.html * https://www.suse.com/security/cve/CVE-2022-49200.html * https://www.suse.com/security/cve/CVE-2022-49201.html * https://www.suse.com/security/cve/CVE-2022-49206.html * https://www.suse.com/security/cve/CVE-2022-49212.html * https://www.suse.com/security/cve/CVE-2022-49213.html * https://www.suse.com/security/cve/CVE-2022-49216.html * https://www.suse.com/security/cve/CVE-2022-49217.html * https://www.suse.com/security/cve/CVE-2022-49224.html * https://www.suse.com/security/cve/CVE-2022-49226.html * https://www.suse.com/security/cve/CVE-2022-49232.html * https://www.suse.com/security/cve/CVE-2022-49235.html * https://www.suse.com/security/cve/CVE-2022-49239.html * https://www.suse.com/security/cve/CVE-2022-49242.html * https://www.suse.com/security/cve/CVE-2022-49243.html * https://www.suse.com/security/cve/CVE-2022-49247.html * https://www.suse.com/security/cve/CVE-2022-49248.html * https://www.suse.com/security/cve/CVE-2022-49253.html * https://www.suse.com/security/cve/CVE-2022-49259.html * https://www.suse.com/security/cve/CVE-2022-49261.html * https://www.suse.com/security/cve/CVE-2022-49263.html * https://www.suse.com/security/cve/CVE-2022-49264.html * https://www.suse.com/security/cve/CVE-2022-49271.html * https://www.suse.com/security/cve/CVE-2022-49272.html * https://www.suse.com/security/cve/CVE-2022-49275.html * https://www.suse.com/security/cve/CVE-2022-49279.html * https://www.suse.com/security/cve/CVE-2022-49280.html * https://www.suse.com/security/cve/CVE-2022-49281.html * https://www.suse.com/security/cve/CVE-2022-49285.html * https://www.suse.com/security/cve/CVE-2022-49287.html * https://www.suse.com/security/cve/CVE-2022-49288.html * https://www.suse.com/security/cve/CVE-2022-49290.html * https://www.suse.com/security/cve/CVE-2022-49291.html * https://www.suse.com/security/cve/CVE-2022-49292.html * https://www.suse.com/security/cve/CVE-2022-49293.html * https://www.suse.com/security/cve/CVE-2022-49295.html * https://www.suse.com/security/cve/CVE-2022-49297.html * https://www.suse.com/security/cve/CVE-2022-49298.html * https://www.suse.com/security/cve/CVE-2022-49299.html * https://www.suse.com/security/cve/CVE-2022-49300.html * https://www.suse.com/security/cve/CVE-2022-49301.html * https://www.suse.com/security/cve/CVE-2022-49302.html * https://www.suse.com/security/cve/CVE-2022-49304.html * https://www.suse.com/security/cve/CVE-2022-49305.html * https://www.suse.com/security/cve/CVE-2022-49307.html * https://www.suse.com/security/cve/CVE-2022-49313.html * https://www.suse.com/security/cve/CVE-2022-49314.html * https://www.suse.com/security/cve/CVE-2022-49315.html * https://www.suse.com/security/cve/CVE-2022-49316.html * https://www.suse.com/security/cve/CVE-2022-49320.html * https://www.suse.com/security/cve/CVE-2022-49321.html * https://www.suse.com/security/cve/CVE-2022-49326.html * https://www.suse.com/security/cve/CVE-2022-49327.html * https://www.suse.com/security/cve/CVE-2022-49331.html * https://www.suse.com/security/cve/CVE-2022-49332.html * https://www.suse.com/security/cve/CVE-2022-49335.html * https://www.suse.com/security/cve/CVE-2022-49343.html * https://www.suse.com/security/cve/CVE-2022-49347.html * https://www.suse.com/security/cve/CVE-2022-49349.html * https://www.suse.com/security/cve/CVE-2022-49352.html * https://www.suse.com/security/cve/CVE-2022-49357.html * https://www.suse.com/security/cve/CVE-2022-49370.html * https://www.suse.com/security/cve/CVE-2022-49371.html * https://www.suse.com/security/cve/CVE-2022-49373.html * https://www.suse.com/security/cve/CVE-2022-49375.html * https://www.suse.com/security/cve/CVE-2022-49376.html * https://www.suse.com/security/cve/CVE-2022-49382.html * https://www.suse.com/security/cve/CVE-2022-49385.html * https://www.suse.com/security/cve/CVE-2022-49389.html * https://www.suse.com/security/cve/CVE-2022-49394.html * https://www.suse.com/security/cve/CVE-2022-49396.html * https://www.suse.com/security/cve/CVE-2022-49397.html * https://www.suse.com/security/cve/CVE-2022-49398.html * https://www.suse.com/security/cve/CVE-2022-49399.html * https://www.suse.com/security/cve/CVE-2022-49402.html * https://www.suse.com/security/cve/CVE-2022-49404.html * https://www.suse.com/security/cve/CVE-2022-49409.html * https://www.suse.com/security/cve/CVE-2022-49410.html * https://www.suse.com/security/cve/CVE-2022-49411.html * https://www.suse.com/security/cve/CVE-2022-49413.html * https://www.suse.com/security/cve/CVE-2022-49414.html * https://www.suse.com/security/cve/CVE-2022-49416.html * https://www.suse.com/security/cve/CVE-2022-49421.html * https://www.suse.com/security/cve/CVE-2022-49422.html * https://www.suse.com/security/cve/CVE-2022-49437.html * https://www.suse.com/security/cve/CVE-2022-49438.html * https://www.suse.com/security/cve/CVE-2022-49441.html * https://www.suse.com/security/cve/CVE-2022-49442.html * https://www.suse.com/security/cve/CVE-2022-49446.html * https://www.suse.com/security/cve/CVE-2022-49451.html * https://www.suse.com/security/cve/CVE-2022-49455.html * https://www.suse.com/security/cve/CVE-2022-49459.html * https://www.suse.com/security/cve/CVE-2022-49460.html * https://www.suse.com/security/cve/CVE-2022-49462.html * https://www.suse.com/security/cve/CVE-2022-49465.html * https://www.suse.com/security/cve/CVE-2022-49467.html * https://www.suse.com/security/cve/CVE-2022-49473.html * https://www.suse.com/security/cve/CVE-2022-49474.html * https://www.suse.com/security/cve/CVE-2022-49475.html * https://www.suse.com/security/cve/CVE-2022-49478.html * https://www.suse.com/security/cve/CVE-2022-49481.html * https://www.suse.com/security/cve/CVE-2022-49482.html * https://www.suse.com/security/cve/CVE-2022-49488.html * https://www.suse.com/security/cve/CVE-2022-49489.html * https://www.suse.com/security/cve/CVE-2022-49490.html * https://www.suse.com/security/cve/CVE-2022-49491.html * https://www.suse.com/security/cve/CVE-2022-49493.html * https://www.suse.com/security/cve/CVE-2022-49495.html * https://www.suse.com/security/cve/CVE-2022-49498.html * https://www.suse.com/security/cve/CVE-2022-49503.html * https://www.suse.com/security/cve/CVE-2022-49504.html * https://www.suse.com/security/cve/CVE-2022-49505.html * https://www.suse.com/security/cve/CVE-2022-49508.html * https://www.suse.com/security/cve/CVE-2022-49514.html * https://www.suse.com/security/cve/CVE-2022-49517.html * https://www.suse.com/security/cve/CVE-2022-49521.html * https://www.suse.com/security/cve/CVE-2022-49522.html * https://www.suse.com/security/cve/CVE-2022-49524.html * https://www.suse.com/security/cve/CVE-2022-49525.html * https://www.suse.com/security/cve/CVE-2022-49526.html * https://www.suse.com/security/cve/CVE-2022-49527.html * https://www.suse.com/security/cve/CVE-2022-49532.html * https://www.suse.com/security/cve/CVE-2022-49534.html * https://www.suse.com/security/cve/CVE-2022-49535.html * https://www.suse.com/security/cve/CVE-2022-49536.html * https://www.suse.com/security/cve/CVE-2022-49537.html * https://www.suse.com/security/cve/CVE-2022-49541.html * https://www.suse.com/security/cve/CVE-2022-49542.html * https://www.suse.com/security/cve/CVE-2022-49544.html * https://www.suse.com/security/cve/CVE-2022-49545.html * https://www.suse.com/security/cve/CVE-2022-49546.html * https://www.suse.com/security/cve/CVE-2022-49555.html * https://www.suse.com/security/cve/CVE-2022-49563.html * https://www.suse.com/security/cve/CVE-2022-49564.html * https://www.suse.com/security/cve/CVE-2022-49566.html * https://www.suse.com/security/cve/CVE-2022-49609.html * https://www.suse.com/security/cve/CVE-2022-49610.html * https://www.suse.com/security/cve/CVE-2022-49611.html * https://www.suse.com/security/cve/CVE-2022-49623.html * https://www.suse.com/security/cve/CVE-2022-49627.html * https://www.suse.com/security/cve/CVE-2022-49631.html * https://www.suse.com/security/cve/CVE-2022-49640.html * https://www.suse.com/security/cve/CVE-2022-49641.html * https://www.suse.com/security/cve/CVE-2022-49643.html * https://www.suse.com/security/cve/CVE-2022-49644.html * https://www.suse.com/security/cve/CVE-2022-49645.html * https://www.suse.com/security/cve/CVE-2022-49646.html * https://www.suse.com/security/cve/CVE-2022-49647.html * https://www.suse.com/security/cve/CVE-2022-49648.html * https://www.suse.com/security/cve/CVE-2022-49649.html * https://www.suse.com/security/cve/CVE-2022-49652.html * https://www.suse.com/security/cve/CVE-2022-49657.html * https://www.suse.com/security/cve/CVE-2022-49661.html * https://www.suse.com/security/cve/CVE-2022-49670.html * https://www.suse.com/security/cve/CVE-2022-49671.html * https://www.suse.com/security/cve/CVE-2022-49673.html * https://www.suse.com/security/cve/CVE-2022-49674.html * https://www.suse.com/security/cve/CVE-2022-49678.html * https://www.suse.com/security/cve/CVE-2022-49685.html * https://www.suse.com/security/cve/CVE-2022-49687.html * https://www.suse.com/security/cve/CVE-2022-49693.html * https://www.suse.com/security/cve/CVE-2022-49700.html * https://www.suse.com/security/cve/CVE-2022-49701.html * https://www.suse.com/security/cve/CVE-2022-49703.html * https://www.suse.com/security/cve/CVE-2022-49707.html * https://www.suse.com/security/cve/CVE-2022-49708.html * https://www.suse.com/security/cve/CVE-2022-49710.html * https://www.suse.com/security/cve/CVE-2022-49711.html * https://www.suse.com/security/cve/CVE-2022-49712.html * https://www.suse.com/security/cve/CVE-2022-49713.html * https://www.suse.com/security/cve/CVE-2022-49720.html * https://www.suse.com/security/cve/CVE-2022-49723.html * https://www.suse.com/security/cve/CVE-2022-49724.html * https://www.suse.com/security/cve/CVE-2022-49729.html * https://www.suse.com/security/cve/CVE-2022-49730.html * https://www.suse.com/security/cve/CVE-2022-49731.html * https://www.suse.com/security/cve/CVE-2022-49733.html * https://www.suse.com/security/cve/CVE-2022-49739.html * https://www.suse.com/security/cve/CVE-2023-2162.html * https://www.suse.com/security/cve/CVE-2023-3567.html * https://www.suse.com/security/cve/CVE-2023-52935.html * https://www.suse.com/security/cve/CVE-2023-52973.html * https://www.suse.com/security/cve/CVE-2023-52974.html * https://www.suse.com/security/cve/CVE-2023-53000.html * https://www.suse.com/security/cve/CVE-2023-53015.html * https://www.suse.com/security/cve/CVE-2023-53024.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-56642.html * https://www.suse.com/security/cve/CVE-2024-56651.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58014.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21780.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1179878 * https://bugzilla.suse.com/show_bug.cgi?id=1180814 * https://bugzilla.suse.com/show_bug.cgi?id=1185762 * https://bugzilla.suse.com/show_bug.cgi?id=1195823 * https://bugzilla.suse.com/show_bug.cgi?id=1196444 * https://bugzilla.suse.com/show_bug.cgi?id=1197158 * https://bugzilla.suse.com/show_bug.cgi?id=1197227 * https://bugzilla.suse.com/show_bug.cgi?id=1197302 * https://bugzilla.suse.com/show_bug.cgi?id=1197331 * https://bugzilla.suse.com/show_bug.cgi?id=1197472 * https://bugzilla.suse.com/show_bug.cgi?id=1197661 * https://bugzilla.suse.com/show_bug.cgi?id=1197926 * https://bugzilla.suse.com/show_bug.cgi?id=1198577 * https://bugzilla.suse.com/show_bug.cgi?id=1198660 * https://bugzilla.suse.com/show_bug.cgi?id=1199657 * https://bugzilla.suse.com/show_bug.cgi?id=1200045 * https://bugzilla.suse.com/show_bug.cgi?id=1200217 * https://bugzilla.suse.com/show_bug.cgi?id=1200571 * https://bugzilla.suse.com/show_bug.cgi?id=1200807 * https://bugzilla.suse.com/show_bug.cgi?id=1200809 * https://bugzilla.suse.com/show_bug.cgi?id=1200825 * https://bugzilla.suse.com/show_bug.cgi?id=1200871 * https://bugzilla.suse.com/show_bug.cgi?id=1200872 * https://bugzilla.suse.com/show_bug.cgi?id=1201193 * https://bugzilla.suse.com/show_bug.cgi?id=1201381 * https://bugzilla.suse.com/show_bug.cgi?id=1201610 * https://bugzilla.suse.com/show_bug.cgi?id=1202672 * https://bugzilla.suse.com/show_bug.cgi?id=1202711 * https://bugzilla.suse.com/show_bug.cgi?id=1203769 * https://bugzilla.suse.com/show_bug.cgi?id=1207186 * https://bugzilla.suse.com/show_bug.cgi?id=1209547 * https://bugzilla.suse.com/show_bug.cgi?id=1210647 * https://bugzilla.suse.com/show_bug.cgi?id=1213167 * https://bugzilla.suse.com/show_bug.cgi?id=1224867 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1230326 * https://bugzilla.suse.com/show_bug.cgi?id=1231375 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1235433 * https://bugzilla.suse.com/show_bug.cgi?id=1235528 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237718 * https://bugzilla.suse.com/show_bug.cgi?id=1237721 * https://bugzilla.suse.com/show_bug.cgi?id=1237723 * https://bugzilla.suse.com/show_bug.cgi?id=1237726 * https://bugzilla.suse.com/show_bug.cgi?id=1237734 * https://bugzilla.suse.com/show_bug.cgi?id=1237735 * https://bugzilla.suse.com/show_bug.cgi?id=1237736 * https://bugzilla.suse.com/show_bug.cgi?id=1237738 * https://bugzilla.suse.com/show_bug.cgi?id=1237739 * https://bugzilla.suse.com/show_bug.cgi?id=1237740 * https://bugzilla.suse.com/show_bug.cgi?id=1237742 * https://bugzilla.suse.com/show_bug.cgi?id=1237746 * https://bugzilla.suse.com/show_bug.cgi?id=1237748 * https://bugzilla.suse.com/show_bug.cgi?id=1237752 * https://bugzilla.suse.com/show_bug.cgi?id=1237778 * https://bugzilla.suse.com/show_bug.cgi?id=1237782 * https://bugzilla.suse.com/show_bug.cgi?id=1237783 * https://bugzilla.suse.com/show_bug.cgi?id=1237784 * https://bugzilla.suse.com/show_bug.cgi?id=1237788 * https://bugzilla.suse.com/show_bug.cgi?id=1237798 * https://bugzilla.suse.com/show_bug.cgi?id=1237810 * https://bugzilla.suse.com/show_bug.cgi?id=1237813 * https://bugzilla.suse.com/show_bug.cgi?id=1237814 * https://bugzilla.suse.com/show_bug.cgi?id=1237815 * https://bugzilla.suse.com/show_bug.cgi?id=1237823 * https://bugzilla.suse.com/show_bug.cgi?id=1237829 * https://bugzilla.suse.com/show_bug.cgi?id=1237831 * https://bugzilla.suse.com/show_bug.cgi?id=1237839 * https://bugzilla.suse.com/show_bug.cgi?id=1237840 * https://bugzilla.suse.com/show_bug.cgi?id=1237846 * https://bugzilla.suse.com/show_bug.cgi?id=1237868 * https://bugzilla.suse.com/show_bug.cgi?id=1237872 * https://bugzilla.suse.com/show_bug.cgi?id=1237903 * https://bugzilla.suse.com/show_bug.cgi?id=1237916 * https://bugzilla.suse.com/show_bug.cgi?id=1237918 * https://bugzilla.suse.com/show_bug.cgi?id=1237932 * https://bugzilla.suse.com/show_bug.cgi?id=1237940 * https://bugzilla.suse.com/show_bug.cgi?id=1237941 * https://bugzilla.suse.com/show_bug.cgi?id=1237951 * https://bugzilla.suse.com/show_bug.cgi?id=1237954 * https://bugzilla.suse.com/show_bug.cgi?id=1237958 * https://bugzilla.suse.com/show_bug.cgi?id=1237963 * https://bugzilla.suse.com/show_bug.cgi?id=1237983 * https://bugzilla.suse.com/show_bug.cgi?id=1237984 * https://bugzilla.suse.com/show_bug.cgi?id=1237996 * https://bugzilla.suse.com/show_bug.cgi?id=1237997 * https://bugzilla.suse.com/show_bug.cgi?id=1237998 * https://bugzilla.suse.com/show_bug.cgi?id=1238000 * https://bugzilla.suse.com/show_bug.cgi?id=1238007 * https://bugzilla.suse.com/show_bug.cgi?id=1238013 * https://bugzilla.suse.com/show_bug.cgi?id=1238022 * https://bugzilla.suse.com/show_bug.cgi?id=1238030 * https://bugzilla.suse.com/show_bug.cgi?id=1238036 * https://bugzilla.suse.com/show_bug.cgi?id=1238046 * https://bugzilla.suse.com/show_bug.cgi?id=1238071 * https://bugzilla.suse.com/show_bug.cgi?id=1238079 * https://bugzilla.suse.com/show_bug.cgi?id=1238096 * https://bugzilla.suse.com/show_bug.cgi?id=1238099 * https://bugzilla.suse.com/show_bug.cgi?id=1238103 * https://bugzilla.suse.com/show_bug.cgi?id=1238108 * https://bugzilla.suse.com/show_bug.cgi?id=1238111 * https://bugzilla.suse.com/show_bug.cgi?id=1238123 * https://bugzilla.suse.com/show_bug.cgi?id=1238126 * https://bugzilla.suse.com/show_bug.cgi?id=1238131 * https://bugzilla.suse.com/show_bug.cgi?id=1238135 * https://bugzilla.suse.com/show_bug.cgi?id=1238139 * https://bugzilla.suse.com/show_bug.cgi?id=1238146 * https://bugzilla.suse.com/show_bug.cgi?id=1238149 * https://bugzilla.suse.com/show_bug.cgi?id=1238150 * https://bugzilla.suse.com/show_bug.cgi?id=1238155 * https://bugzilla.suse.com/show_bug.cgi?id=1238156 * https://bugzilla.suse.com/show_bug.cgi?id=1238158 * https://bugzilla.suse.com/show_bug.cgi?id=1238162 * https://bugzilla.suse.com/show_bug.cgi?id=1238166 * https://bugzilla.suse.com/show_bug.cgi?id=1238168 * https://bugzilla.suse.com/show_bug.cgi?id=1238169 * https://bugzilla.suse.com/show_bug.cgi?id=1238170 * https://bugzilla.suse.com/show_bug.cgi?id=1238171 * https://bugzilla.suse.com/show_bug.cgi?id=1238172 * https://bugzilla.suse.com/show_bug.cgi?id=1238175 * https://bugzilla.suse.com/show_bug.cgi?id=1238177 * https://bugzilla.suse.com/show_bug.cgi?id=1238181 * https://bugzilla.suse.com/show_bug.cgi?id=1238183 * https://bugzilla.suse.com/show_bug.cgi?id=1238184 * https://bugzilla.suse.com/show_bug.cgi?id=1238228 * https://bugzilla.suse.com/show_bug.cgi?id=1238229 * https://bugzilla.suse.com/show_bug.cgi?id=1238231 * https://bugzilla.suse.com/show_bug.cgi?id=1238235 * https://bugzilla.suse.com/show_bug.cgi?id=1238236 * https://bugzilla.suse.com/show_bug.cgi?id=1238239 * https://bugzilla.suse.com/show_bug.cgi?id=1238241 * https://bugzilla.suse.com/show_bug.cgi?id=1238242 * https://bugzilla.suse.com/show_bug.cgi?id=1238243 * https://bugzilla.suse.com/show_bug.cgi?id=1238244 * https://bugzilla.suse.com/show_bug.cgi?id=1238249 * https://bugzilla.suse.com/show_bug.cgi?id=1238255 * https://bugzilla.suse.com/show_bug.cgi?id=1238256 * https://bugzilla.suse.com/show_bug.cgi?id=1238257 * https://bugzilla.suse.com/show_bug.cgi?id=1238263 * https://bugzilla.suse.com/show_bug.cgi?id=1238264 * https://bugzilla.suse.com/show_bug.cgi?id=1238266 * https://bugzilla.suse.com/show_bug.cgi?id=1238267 * https://bugzilla.suse.com/show_bug.cgi?id=1238269 * https://bugzilla.suse.com/show_bug.cgi?id=1238271 * https://bugzilla.suse.com/show_bug.cgi?id=1238272 * https://bugzilla.suse.com/show_bug.cgi?id=1238274 * https://bugzilla.suse.com/show_bug.cgi?id=1238275 * https://bugzilla.suse.com/show_bug.cgi?id=1238276 * https://bugzilla.suse.com/show_bug.cgi?id=1238278 * https://bugzilla.suse.com/show_bug.cgi?id=1238279 * https://bugzilla.suse.com/show_bug.cgi?id=1238281 * https://bugzilla.suse.com/show_bug.cgi?id=1238284 * https://bugzilla.suse.com/show_bug.cgi?id=1238289 * https://bugzilla.suse.com/show_bug.cgi?id=1238293 * https://bugzilla.suse.com/show_bug.cgi?id=1238306 * https://bugzilla.suse.com/show_bug.cgi?id=1238307 * https://bugzilla.suse.com/show_bug.cgi?id=1238313 * https://bugzilla.suse.com/show_bug.cgi?id=1238327 * https://bugzilla.suse.com/show_bug.cgi?id=1238331 * https://bugzilla.suse.com/show_bug.cgi?id=1238333 * https://bugzilla.suse.com/show_bug.cgi?id=1238334 * https://bugzilla.suse.com/show_bug.cgi?id=1238336 * https://bugzilla.suse.com/show_bug.cgi?id=1238337 * https://bugzilla.suse.com/show_bug.cgi?id=1238338 * https://bugzilla.suse.com/show_bug.cgi?id=1238343 * https://bugzilla.suse.com/show_bug.cgi?id=1238372 * https://bugzilla.suse.com/show_bug.cgi?id=1238373 * https://bugzilla.suse.com/show_bug.cgi?id=1238377 * https://bugzilla.suse.com/show_bug.cgi?id=1238382 * https://bugzilla.suse.com/show_bug.cgi?id=1238386 * https://bugzilla.suse.com/show_bug.cgi?id=1238393 * https://bugzilla.suse.com/show_bug.cgi?id=1238394 * https://bugzilla.suse.com/show_bug.cgi?id=1238395 * https://bugzilla.suse.com/show_bug.cgi?id=1238413 * https://bugzilla.suse.com/show_bug.cgi?id=1238416 * https://bugzilla.suse.com/show_bug.cgi?id=1238417 * https://bugzilla.suse.com/show_bug.cgi?id=1238419 * https://bugzilla.suse.com/show_bug.cgi?id=1238420 * https://bugzilla.suse.com/show_bug.cgi?id=1238429 * https://bugzilla.suse.com/show_bug.cgi?id=1238430 * https://bugzilla.suse.com/show_bug.cgi?id=1238435 * https://bugzilla.suse.com/show_bug.cgi?id=1238441 * https://bugzilla.suse.com/show_bug.cgi?id=1238443 * https://bugzilla.suse.com/show_bug.cgi?id=1238454 * https://bugzilla.suse.com/show_bug.cgi?id=1238462 * https://bugzilla.suse.com/show_bug.cgi?id=1238467 * https://bugzilla.suse.com/show_bug.cgi?id=1238469 * https://bugzilla.suse.com/show_bug.cgi?id=1238539 * https://bugzilla.suse.com/show_bug.cgi?id=1238543 * https://bugzilla.suse.com/show_bug.cgi?id=1238546 * https://bugzilla.suse.com/show_bug.cgi?id=1238599 * https://bugzilla.suse.com/show_bug.cgi?id=1238600 * https://bugzilla.suse.com/show_bug.cgi?id=1238612 * https://bugzilla.suse.com/show_bug.cgi?id=1238615 * https://bugzilla.suse.com/show_bug.cgi?id=1238617 * https://bugzilla.suse.com/show_bug.cgi?id=1238618 * https://bugzilla.suse.com/show_bug.cgi?id=1238621 * https://bugzilla.suse.com/show_bug.cgi?id=1238623 * https://bugzilla.suse.com/show_bug.cgi?id=1238625 * https://bugzilla.suse.com/show_bug.cgi?id=1238626 * https://bugzilla.suse.com/show_bug.cgi?id=1238630 * https://bugzilla.suse.com/show_bug.cgi?id=1238631 * https://bugzilla.suse.com/show_bug.cgi?id=1238633 * https://bugzilla.suse.com/show_bug.cgi?id=1238635 * https://bugzilla.suse.com/show_bug.cgi?id=1238638 * https://bugzilla.suse.com/show_bug.cgi?id=1238639 * https://bugzilla.suse.com/show_bug.cgi?id=1238641 * https://bugzilla.suse.com/show_bug.cgi?id=1238643 * https://bugzilla.suse.com/show_bug.cgi?id=1238645 * https://bugzilla.suse.com/show_bug.cgi?id=1238646 * https://bugzilla.suse.com/show_bug.cgi?id=1238653 * https://bugzilla.suse.com/show_bug.cgi?id=1238655 * https://bugzilla.suse.com/show_bug.cgi?id=1238663 * https://bugzilla.suse.com/show_bug.cgi?id=1238705 * https://bugzilla.suse.com/show_bug.cgi?id=1238707 * https://bugzilla.suse.com/show_bug.cgi?id=1238710 * https://bugzilla.suse.com/show_bug.cgi?id=1238712 * https://bugzilla.suse.com/show_bug.cgi?id=1238718 * https://bugzilla.suse.com/show_bug.cgi?id=1238719 * https://bugzilla.suse.com/show_bug.cgi?id=1238721 * https://bugzilla.suse.com/show_bug.cgi?id=1238722 * https://bugzilla.suse.com/show_bug.cgi?id=1238727 * https://bugzilla.suse.com/show_bug.cgi?id=1238729 * https://bugzilla.suse.com/show_bug.cgi?id=1238750 * https://bugzilla.suse.com/show_bug.cgi?id=1238787 * https://bugzilla.suse.com/show_bug.cgi?id=1238789 * https://bugzilla.suse.com/show_bug.cgi?id=1238805 * https://bugzilla.suse.com/show_bug.cgi?id=1238809 * https://bugzilla.suse.com/show_bug.cgi?id=1238814 * https://bugzilla.suse.com/show_bug.cgi?id=1238815 * https://bugzilla.suse.com/show_bug.cgi?id=1238819 * https://bugzilla.suse.com/show_bug.cgi?id=1238821 * https://bugzilla.suse.com/show_bug.cgi?id=1238822 * https://bugzilla.suse.com/show_bug.cgi?id=1238823 * https://bugzilla.suse.com/show_bug.cgi?id=1238825 * https://bugzilla.suse.com/show_bug.cgi?id=1238835 * https://bugzilla.suse.com/show_bug.cgi?id=1238838 * https://bugzilla.suse.com/show_bug.cgi?id=1238868 * https://bugzilla.suse.com/show_bug.cgi?id=1238869 * https://bugzilla.suse.com/show_bug.cgi?id=1238871 * https://bugzilla.suse.com/show_bug.cgi?id=1238892 * https://bugzilla.suse.com/show_bug.cgi?id=1238893 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238919 * https://bugzilla.suse.com/show_bug.cgi?id=1238925 * https://bugzilla.suse.com/show_bug.cgi?id=1238930 * https://bugzilla.suse.com/show_bug.cgi?id=1238933 * https://bugzilla.suse.com/show_bug.cgi?id=1238937 * https://bugzilla.suse.com/show_bug.cgi?id=1238938 * https://bugzilla.suse.com/show_bug.cgi?id=1238939 * https://bugzilla.suse.com/show_bug.cgi?id=1238948 * https://bugzilla.suse.com/show_bug.cgi?id=1238949 * https://bugzilla.suse.com/show_bug.cgi?id=1238952 * https://bugzilla.suse.com/show_bug.cgi?id=1239001 * https://bugzilla.suse.com/show_bug.cgi?id=1239035 * https://bugzilla.suse.com/show_bug.cgi?id=1239040 * https://bugzilla.suse.com/show_bug.cgi?id=1239041 * https://bugzilla.suse.com/show_bug.cgi?id=1239060 * https://bugzilla.suse.com/show_bug.cgi?id=1239070 * https://bugzilla.suse.com/show_bug.cgi?id=1239071 * https://bugzilla.suse.com/show_bug.cgi?id=1239076 * https://bugzilla.suse.com/show_bug.cgi?id=1239109 * https://bugzilla.suse.com/show_bug.cgi?id=1239115 * https://bugzilla.suse.com/show_bug.cgi?id=1239454 * https://bugzilla.suse.com/show_bug.cgi?id=1239969 * https://bugzilla.suse.com/show_bug.cgi?id=1240207 * https://bugzilla.suse.com/show_bug.cgi?id=1240213 * https://bugzilla.suse.com/show_bug.cgi?id=1240218 * https://bugzilla.suse.com/show_bug.cgi?id=1240227 * https://bugzilla.suse.com/show_bug.cgi?id=1240272 * https://bugzilla.suse.com/show_bug.cgi?id=1240276 * https://bugzilla.suse.com/show_bug.cgi?id=1240288 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Apr 11 12:30:09 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 11 Apr 2025 12:30:09 -0000 Subject: SUSE-SU-2025:1201-1: important: Security update for expat Message-ID: <174437460948.19639.1855135369342188709@smelt2.prg2.suse.org> # Security update for expat Announcement ID: SUSE-SU-2025:1201-1 Release Date: 2025-04-11T10:16:48Z Rating: important References: * bsc#1239618 * jsc#PED-12500 * jsc#SLE-21253 Cross-References: * CVE-2024-8176 CVSS scores: * CVE-2024-8176 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-8176 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8176 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability and contains two features can now be installed. ## Description: This update for expat fixes the following issues: * CVE-2024-8176: Fixed denial of service from chaining a large number of entities caused by stack overflow by resolving use of recursion (bsc#1239618) Other fixes: \- version update to 2.7.1 (jsc#PED-12500) Bug fixes: #980 #989 Restore event pointer behavior from Expat 2.6.4 (that the fix to CVE-2024-8176 changed in 2.7.0); affected API functions are: \- XML_GetCurrentByteCount \- XML_GetCurrentByteIndex \- XML_GetCurrentColumnNumber \- XML_GetCurrentLineNumber \- XML_GetInputContext Other changes: #976 #977 Autotools: Integrate files "fuzz/xml_lpm_fuzzer.{cpp,proto}" with Automake that were missing from 2.7.0 release tarballs #983 #984 Fix printf format specifiers for 32bit Emscripten #992 docs: Promote OpenSSF Best Practices self- certification #978 tests/benchmark: Resolve mistaken double close #986 Address compiler warnings #990 #993 Version info bumped from 11:1:10 (libexpat _.so.1.10.1) to 11:2:10 (libexpat_.so.1.10.2); see https://verbump.de/ for what these numbers do Infrastructure: #982 CI: Start running Perl XML::Parser integration tests #987 CI: Enforce Clang Static Analyzer clean code #991 CI: Re- enable warning clang-analyzer-valist.Uninitialized for clang-tidy #981 CI: Cover compilation with musl #983 #984 CI: Cover compilation with 32bit Emscripten #976 #977 CI: Protect against fuzzer files missing from future release archives * version update to 2.7.0 #935 #937 Autotools: Make generated CMake files look for libexpat. at SO_MAJOR@.dylib on macOS #925 Autotools: Sync CMake templates with CMake 3.29 #945 #962 #966 CMake: Drop support for CMake <3.13 #942 CMake: Small fuzzing related improvements #921 docs: Add missing documentation of error code XML_ERROR_NOT_STARTED that was introduced with 2.6.4 #941 docs: Document need for C++11 compiler for use from C++ #959 tests/benchmark: Fix a (harmless) TOCTTOU #944 Windows: Fix installer target location of file xmlwf.xml for CMake #953 Windows: Address warning -Wunknown-warning-option about -Wno-pedantic-ms-format from LLVM MinGW #971 Address Cppcheck warnings #969 #970 Mass-migrate links from http:// to https:// #947 #958 .. #974 #975 Document changes since the previous release #974 #975 Version info bumped from 11:0:10 (libexpat _.so.1.10.0) to 11:1:10 (libexpat_.so.1.10.1); see https://verbump.de/ for what these numbers do ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1201=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1201=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1201=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1201=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1201=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1201=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1201=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1201=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1201=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1201=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1201=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1201=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1201=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1201=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1201=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1201=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1201=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1201=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1201=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libexpat1-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debugsource-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libexpat1-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debugsource-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libexpat1-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debugsource-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * Basesystem Module 15-SP6 (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Manager Proxy 4.3 (x86_64) * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * SUSE Manager Server 4.3 (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * openSUSE Leap 15.4 (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat-devel-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libexpat-devel-64bit-2.7.1-150400.3.28.1 * libexpat1-64bit-2.7.1-150400.3.28.1 * libexpat1-64bit-debuginfo-2.7.1-150400.3.28.1 * expat-64bit-debuginfo-2.7.1-150400.3.28.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * expat-debugsource-2.7.1-150400.3.28.1 * expat-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * libexpat1-2.7.1-150400.3.28.1 * libexpat-devel-2.7.1-150400.3.28.1 * openSUSE Leap 15.6 (x86_64) * libexpat1-32bit-2.7.1-150400.3.28.1 * libexpat-devel-32bit-2.7.1-150400.3.28.1 * libexpat1-32bit-debuginfo-2.7.1-150400.3.28.1 * expat-32bit-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libexpat1-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debugsource-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libexpat1-2.7.1-150400.3.28.1 * libexpat1-debuginfo-2.7.1-150400.3.28.1 * expat-debugsource-2.7.1-150400.3.28.1 * expat-debuginfo-2.7.1-150400.3.28.1 ## References: * https://www.suse.com/security/cve/CVE-2024-8176.html * https://bugzilla.suse.com/show_bug.cgi?id=1239618 * https://jira.suse.com/browse/PED-12500 * https://jira.suse.com/browse/SLE-21253 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Apr 11 12:30:14 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 11 Apr 2025 12:30:14 -0000 Subject: SUSE-SU-2025:1199-1: moderate: Security update for fontforge Message-ID: <174437461441.19639.4704839994196337949@smelt2.prg2.suse.org> # Security update for fontforge Announcement ID: SUSE-SU-2025:1199-1 Release Date: 2025-04-11T08:41:18Z Rating: moderate References: * bsc#1073014 Cross-References: * CVE-2017-17521 CVSS scores: * CVE-2017-17521 ( SUSE ): 5.9 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2017-17521 ( NVD ): 8.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for fontforge fixes the following issues: * CVE-2017-17521: Fixed command injection in help function uiutil.c (bsc#1073014) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1199=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-1199=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * fontforge-debuginfo-20200314-150200.3.9.1 * fontforge-devel-20200314-150200.3.9.1 * fontforge-debugsource-20200314-150200.3.9.1 * fontforge-20200314-150200.3.9.1 * openSUSE Leap 15.6 (noarch) * fontforge-doc-20200314-150200.3.9.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * fontforge-debuginfo-20200314-150200.3.9.1 * fontforge-debugsource-20200314-150200.3.9.1 * fontforge-20200314-150200.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2017-17521.html * https://bugzilla.suse.com/show_bug.cgi?id=1073014 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 14 08:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 14 Apr 2025 08:30:12 -0000 Subject: SUSE-SU-2025:1225-1: important: Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3) Message-ID: <174461941241.29196.9158012910274013513@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:1225-1 Release Date: 2025-04-14T06:33:56Z Rating: important References: * bsc#1232818 * bsc#1235218 * bsc#1238788 * bsc#1238790 Cross-References: * CVE-2022-49014 * CVE-2022-49563 * CVE-2022-49564 * CVE-2024-56600 CVSS scores: * CVE-2022-49014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49564 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_179 fixes several issues. The following security issues were fixed: * CVE-2022-49014: net: tun: Fix use-after-free in tun_detach() (bsc#1232818). * CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238788). * CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238790). * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1225=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1225=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_49-debugsource-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_179-default-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_179-default-debuginfo-7-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_179-preempt-debuginfo-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_179-preempt-7-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_49-debugsource-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_179-default-7-150300.2.1 * kernel-livepatch-5_3_18-150300_59_179-default-debuginfo-7-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-49014.html * https://www.suse.com/security/cve/CVE-2022-49563.html * https://www.suse.com/security/cve/CVE-2022-49564.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://bugzilla.suse.com/show_bug.cgi?id=1232818 * https://bugzilla.suse.com/show_bug.cgi?id=1235218 * https://bugzilla.suse.com/show_bug.cgi?id=1238788 * https://bugzilla.suse.com/show_bug.cgi?id=1238790 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 14 08:30:19 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 14 Apr 2025 08:30:19 -0000 Subject: SUSE-SU-2025:1213-1: important: Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3) Message-ID: <174461941921.29196.11629528691803819531@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 43 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:1213-1 Release Date: 2025-04-14T07:33:36Z Rating: important References: * bsc#1228714 * bsc#1232818 * bsc#1235218 * bsc#1238788 * bsc#1238790 Cross-References: * CVE-2022-49014 * CVE-2022-49563 * CVE-2022-49564 * CVE-2024-41090 * CVE-2024-56600 CVSS scores: * CVE-2022-49014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49564 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41090 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_158 fixes several issues. The following security issues were fixed: * CVE-2022-49014: net: tun: Fix use-after-free in tun_detach() (bsc#1232818). * CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238788). * CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238790). * CVE-2024-41090: tap: add missing verification for short frame (bsc#1228714). * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1213=1 SUSE-SLE-Live- Patching-12-SP5-2025-1208=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1228=1 SUSE-2025-1224=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1228=1 SUSE-SLE- Module-Live-Patching-15-SP3-2025-1224=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_222-default-9-2.1 * kgraft-patch-4_12_14-122_201-default-16-2.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_43-debugsource-16-150300.2.1 * kernel-livepatch-5_3_18-150300_59_153-default-debuginfo-17-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_42-debugsource-17-150300.2.1 * kernel-livepatch-5_3_18-150300_59_153-default-17-150300.2.1 * kernel-livepatch-5_3_18-150300_59_158-default-16-150300.2.1 * kernel-livepatch-5_3_18-150300_59_158-default-debuginfo-16-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_153-preempt-debuginfo-17-150300.2.1 * kernel-livepatch-5_3_18-150300_59_158-preempt-debuginfo-16-150300.2.1 * kernel-livepatch-5_3_18-150300_59_153-preempt-17-150300.2.1 * kernel-livepatch-5_3_18-150300_59_158-preempt-16-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_153-default-17-150300.2.1 * kernel-livepatch-5_3_18-150300_59_158-default-16-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-49014.html * https://www.suse.com/security/cve/CVE-2022-49563.html * https://www.suse.com/security/cve/CVE-2022-49564.html * https://www.suse.com/security/cve/CVE-2024-41090.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://bugzilla.suse.com/show_bug.cgi?id=1228714 * https://bugzilla.suse.com/show_bug.cgi?id=1232818 * https://bugzilla.suse.com/show_bug.cgi?id=1235218 * https://bugzilla.suse.com/show_bug.cgi?id=1238788 * https://bugzilla.suse.com/show_bug.cgi?id=1238790 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 14 08:30:22 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 14 Apr 2025 08:30:22 -0000 Subject: SUSE-SU-2025:1207-1: important: Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6) Message-ID: <174461942246.29196.1978423549340967568@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:1207-1 Release Date: 2025-04-13T20:50:31Z Rating: important References: * bsc#1228714 * bsc#1235218 Cross-References: * CVE-2024-41090 * CVE-2024-56600 CVSS scores: * CVE-2024-41090 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_14 fixes several issues. The following security issues were fixed: * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218). * CVE-2024-41090: tap: add missing verification for short frame (bsc#1228714). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1216=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-1216=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1218=1 SUSE-2025-1222=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1207=1 SUSE-SLE- Module-Live-Patching-15-SP6-2025-1218=1 SUSE-SLE-Module-Live- Patching-15-SP6-2025-1222=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1215=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1215=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_68-default-13-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_15-debugsource-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-13-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_68-default-13-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_15-debugsource-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-13-150500.2.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_14-default-12-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_1-debugsource-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_7-default-debuginfo-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_7-default-12-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_2-debugsource-12-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_14-default-12-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_1-debugsource-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_7-default-debuginfo-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_7-default-12-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_2-debugsource-12-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_8-rt-13-150600.3.1 * kernel-livepatch-SLE15-SP6-RT_Update_0-debugsource-13-150600.3.1 * kernel-livepatch-6_4_0-150600_8-rt-debuginfo-13-150600.3.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_27-debugsource-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_122-default-13-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_27-debugsource-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_122-default-debuginfo-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_122-default-13-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-41090.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://bugzilla.suse.com/show_bug.cgi?id=1228714 * https://bugzilla.suse.com/show_bug.cgi?id=1235218 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 14 08:30:26 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 14 Apr 2025 08:30:26 -0000 Subject: SUSE-SU-2025:1214-1: important: Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP6) Message-ID: <174461942662.29196.10959303983652734622@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:1214-1 Release Date: 2025-04-13T20:50:37Z Rating: important References: * bsc#1235218 Cross-References: * CVE-2024-56600 CVSS scores: * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_33 fixes one issue. The following security issue was fixed: * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1214=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1214=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1204=1 SUSE-SLE- Module-Live-Patching-15-SP6-2025-1205=1 SUSE-SLE-Module-Live- Patching-15-SP6-2025-1210=1 SUSE-SLE-Module-Live-Patching-15-SP6-2025-1206=1 SUSE-SLE-Module-Live-Patching-15-SP6-2025-1209=1 SUSE-SLE-Module-Live- Patching-15-SP6-2025-1211=1 SUSE-SLE-Module-Live-Patching-15-SP6-2025-1212=1 SUSE-SLE-Module-Live-Patching-15-SP6-2025-1223=1 SUSE-SLE-Module-Live- Patching-15-SP6-2025-1219=1 SUSE-SLE-Module-Live-Patching-15-SP6-2025-1220=1 SUSE-SLE-Module-Live-Patching-15-SP6-2025-1221=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1220=1 SUSE-2025-1221=1 SUSE-2025-1223=1 SUSE-2025-1219=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-8-150400.2.1 * kernel-livepatch-5_14_21-150400_24_128-default-8-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_29-debugsource-8-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-8-150400.2.1 * kernel-livepatch-5_14_21-150400_24_128-default-8-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_29-debugsource-8-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo-12-150600.2.1 * kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo-8-150600.2.1 * kernel-livepatch-6_4_0-150600_10_8-rt-8-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_4-debugsource-7-150600.2.1 * kernel-livepatch-6_4_0-150600_10_23-rt-4-150600.2.1 * kernel-livepatch-6_4_0-150600_10_11-rt-debuginfo-8-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_3-debugsource-8-150600.2.1 * kernel-livepatch-6_4_0-150600_10_17-rt-6-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource-8-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_5-debugsource-6-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_6-debugsource-4-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource-12-150600.2.1 * kernel-livepatch-6_4_0-150600_10_20-rt-debuginfo-4-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_7-debugsource-4-150600.2.1 * kernel-livepatch-6_4_0-150600_10_14-rt-debuginfo-7-150600.2.1 * kernel-livepatch-6_4_0-150600_10_14-rt-7-150600.2.1 * kernel-livepatch-6_4_0-150600_10_5-rt-12-150600.2.1 * kernel-livepatch-6_4_0-150600_10_20-rt-4-150600.2.1 * kernel-livepatch-6_4_0-150600_10_11-rt-8-150600.2.1 * kernel-livepatch-6_4_0-150600_10_17-rt-debuginfo-6-150600.2.1 * kernel-livepatch-6_4_0-150600_10_23-rt-debuginfo-4-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_17-default-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_17-default-debuginfo-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_33-default-4-150600.2.1 * kernel-livepatch-6_4_0-150600_23_22-default-debuginfo-8-150600.2.1 * kernel-livepatch-6_4_0-150600_23_33-default-debuginfo-4-150600.2.1 * kernel-livepatch-6_4_0-150600_23_22-default-8-150600.2.1 * kernel-livepatch-6_4_0-150600_23_25-default-7-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_7-debugsource-4-150600.2.1 * kernel-livepatch-6_4_0-150600_23_25-default-debuginfo-7-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_3-debugsource-12-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_4-debugsource-8-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_5-debugsource-7-150600.2.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_17-default-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_17-default-debuginfo-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_33-default-4-150600.2.1 * kernel-livepatch-6_4_0-150600_23_22-default-debuginfo-8-150600.2.1 * kernel-livepatch-6_4_0-150600_23_33-default-debuginfo-4-150600.2.1 * kernel-livepatch-6_4_0-150600_23_22-default-8-150600.2.1 * kernel-livepatch-6_4_0-150600_23_25-default-7-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_7-debugsource-4-150600.2.1 * kernel-livepatch-6_4_0-150600_23_25-default-debuginfo-7-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_3-debugsource-12-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_4-debugsource-8-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_5-debugsource-7-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56600.html * https://bugzilla.suse.com/show_bug.cgi?id=1235218 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 14 08:30:29 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 14 Apr 2025 08:30:29 -0000 Subject: SUSE-SU-2025:1227-1: important: Security update for pgadmin4 Message-ID: <174461942938.29196.7449513467357918990@smelt2.prg2.suse.org> # Security update for pgadmin4 Announcement ID: SUSE-SU-2025:1227-1 Release Date: 2025-04-14T07:06:39Z Rating: important References: * bsc#1239308 Cross-References: * CVE-2025-27152 CVSS scores: * CVE-2025-27152 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-27152 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-27152 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.6 * Python 3 Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for pgadmin4 fixes the following issues: * CVE-2025-27152: axios: Fixed SSRF and creadential leakage due to requests sent to absolute URL even when baseURL is set (bsc#1239308) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1227=1 openSUSE-SLE-15.6-2025-1227=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2025-1227=1 ## Package List: * openSUSE Leap 15.6 (noarch) * system-user-pgadmin-8.5-150600.3.9.1 * pgadmin4-doc-8.5-150600.3.9.1 * pgadmin4-web-uwsgi-8.5-150600.3.9.1 * pgadmin4-desktop-8.5-150600.3.9.1 * pgadmin4-8.5-150600.3.9.1 * pgadmin4-cloud-8.5-150600.3.9.1 * Python 3 Module 15-SP6 (noarch) * pgadmin4-8.5-150600.3.9.1 * system-user-pgadmin-8.5-150600.3.9.1 * pgadmin4-doc-8.5-150600.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-27152.html * https://bugzilla.suse.com/show_bug.cgi?id=1239308 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 14 08:30:31 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 14 Apr 2025 08:30:31 -0000 Subject: SUSE-SU-2025:1226-1: moderate: Security update for govulncheck-vulndb Message-ID: <174461943118.29196.16203591281120999003@smelt2.prg2.suse.org> # Security update for govulncheck-vulndb Announcement ID: SUSE-SU-2025:1226-1 Release Date: 2025-04-14T07:06:22Z Rating: moderate References: * jsc#PED-11136 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that contains one feature can now be installed. ## Description: This update for govulncheck-vulndb fixes the following issues: * Update to version 0.0.20250409T170536 2025-04-09T17:05:36Z (jsc#PED-11136) * GO-2025-3591 * GO-2025-3594 * GO-2025-3598 * GO-2025-3599 * Update to version 0.0.20250408T210408 2025-04-08T21:04:08Z (jsc#PED-11136) * GO-2025-3553 * GO-2025-3563 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1226=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1226=1 ## Package List: * SUSE Package Hub 15 15-SP6 (noarch) * govulncheck-vulndb-0.0.20250409T170536-150000.1.57.1 * openSUSE Leap 15.6 (noarch) * govulncheck-vulndb-0.0.20250409T170536-150000.1.57.1 ## References: * https://jira.suse.com/browse/PED-11136 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 14 12:30:04 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 14 Apr 2025 12:30:04 -0000 Subject: SUSE-SU-2025:1238-1: important: Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6) Message-ID: <174463380444.32203.16008321479627778607@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 6 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:1238-1 Release Date: 2025-04-14T09:04:27Z Rating: important References: * bsc#1235218 Cross-References: * CVE-2024-56600 CVSS scores: * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_23_30 fixes one issue. The following security issue was fixed: * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1240=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1238=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-1238=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1240=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_6-debugsource-4-150600.2.1 * kernel-livepatch-6_4_0-150600_23_30-default-4-150600.2.1 * kernel-livepatch-6_4_0-150600_23_30-default-debuginfo-4-150600.2.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_73-default-8-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_17-debugsource-8-150500.2.1 * kernel-livepatch-5_14_21-150500_55_73-default-debuginfo-8-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_73-default-8-150500.2.1 * kernel-livepatch-5_14_21-150500_55_73-default-debuginfo-8-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le x86_64) * kernel-livepatch-SLE15-SP5_Update_17-debugsource-8-150500.2.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_6-debugsource-4-150600.2.1 * kernel-livepatch-6_4_0-150600_23_30-default-4-150600.2.1 * kernel-livepatch-6_4_0-150600_23_30-default-debuginfo-4-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56600.html * https://bugzilla.suse.com/show_bug.cgi?id=1235218 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 14 12:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 14 Apr 2025 12:30:12 -0000 Subject: SUSE-SU-2025:1236-1: important: Security update for the Linux Kernel (Live Patch 59 for SLE 12 SP5) Message-ID: <174463381238.32203.17291908175776455481@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 59 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:1236-1 Release Date: 2025-04-14T09:03:59Z Rating: important References: * bsc#1232818 * bsc#1235218 * bsc#1238788 * bsc#1238790 Cross-References: * CVE-2022-49014 * CVE-2022-49563 * CVE-2022-49564 * CVE-2024-56600 CVSS scores: * CVE-2022-49014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49564 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_225 fixes several issues. The following security issues were fixed: * CVE-2022-49014: net: tun: Fix use-after-free in tun_detach() (bsc#1232818). * CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238788). * CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238790). * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1236=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_225-default-8-2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-49014.html * https://www.suse.com/security/cve/CVE-2022-49563.html * https://www.suse.com/security/cve/CVE-2022-49564.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://bugzilla.suse.com/show_bug.cgi?id=1232818 * https://bugzilla.suse.com/show_bug.cgi?id=1235218 * https://bugzilla.suse.com/show_bug.cgi?id=1238788 * https://bugzilla.suse.com/show_bug.cgi?id=1238790 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 14 12:30:16 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 14 Apr 2025 12:30:16 -0000 Subject: SUSE-SU-2025:1232-1: important: Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) Message-ID: <174463381655.32203.3156722477205215429@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 0 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:1232-1 Release Date: 2025-04-14T11:03:52Z Rating: important References: * bsc#1228714 * bsc#1235218 Cross-References: * CVE-2024-41090 * CVE-2024-56600 CVSS scores: * CVE-2024-41090 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_21 fixes several issues. The following security issues were fixed: * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218). * CVE-2024-41090: tap: add missing verification for short frame (bsc#1228714). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1234=1 SUSE-2025-1233=1 SUSE-2025-1243=1 SUSE-2025-1237=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-1234=1 SUSE-SLE- Module-Live-Patching-15-SP5-2025-1233=1 SUSE-SLE-Module-Live- Patching-15-SP5-2025-1243=1 SUSE-SLE-Module-Live-Patching-15-SP5-2025-1237=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1239=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1239=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1232=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1232=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_65-default-14-150500.2.1 * kernel-livepatch-5_14_21-150500_55_52-default-debuginfo-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_62-default-14-150500.2.1 * kernel-livepatch-5_14_21-150500_55_65-default-debuginfo-14-150500.2.1 * kernel-livepatch-5_14_21-150500_55_59-default-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_59-default-debuginfo-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_62-default-debuginfo-14-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_11-debugsource-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_52-default-16-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_14-debugsource-14-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_13-debugsource-14-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_12-debugsource-16-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_65-default-14-150500.2.1 * kernel-livepatch-5_14_21-150500_55_52-default-debuginfo-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_62-default-14-150500.2.1 * kernel-livepatch-5_14_21-150500_55_65-default-debuginfo-14-150500.2.1 * kernel-livepatch-5_14_21-150500_55_59-default-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_59-default-debuginfo-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_62-default-debuginfo-14-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_11-debugsource-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_52-default-16-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_14-debugsource-14-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_13-debugsource-14-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_12-debugsource-16-150500.2.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_0-debugsource-14-150600.4.34.1 * kernel-livepatch-6_4_0-150600_21-default-14-150600.4.34.1 * kernel-livepatch-6_4_0-150600_21-default-debuginfo-14-150600.4.34.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_0-debugsource-14-150600.4.34.1 * kernel-livepatch-6_4_0-150600_21-default-14-150600.4.34.1 * kernel-livepatch-6_4_0-150600_21-default-debuginfo-14-150600.4.34.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_125-default-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_125-default-debuginfo-10-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_28-debugsource-10-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_125-default-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_125-default-debuginfo-10-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_28-debugsource-10-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-41090.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://bugzilla.suse.com/show_bug.cgi?id=1228714 * https://bugzilla.suse.com/show_bug.cgi?id=1235218 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 14 12:30:23 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 14 Apr 2025 12:30:23 -0000 Subject: SUSE-SU-2025:1231-1: important: Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) Message-ID: <174463382389.32203.14520352765007739135@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 56 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:1231-1 Release Date: 2025-04-14T08:33:40Z Rating: important References: * bsc#1228714 * bsc#1232818 * bsc#1235218 * bsc#1238788 * bsc#1238790 Cross-References: * CVE-2022-49014 * CVE-2022-49563 * CVE-2022-49564 * CVE-2024-41090 * CVE-2024-56600 CVSS scores: * CVE-2022-49014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49564 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41090 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_216 fixes several issues. The following security issues were fixed: * CVE-2022-49014: net: tun: Fix use-after-free in tun_detach() (bsc#1232818). * CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238788). * CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238790). * CVE-2024-41090: tap: add missing verification for short frame (bsc#1228714). * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1231=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_216-default-14-2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-49014.html * https://www.suse.com/security/cve/CVE-2022-49563.html * https://www.suse.com/security/cve/CVE-2022-49564.html * https://www.suse.com/security/cve/CVE-2024-41090.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://bugzilla.suse.com/show_bug.cgi?id=1228714 * https://bugzilla.suse.com/show_bug.cgi?id=1232818 * https://bugzilla.suse.com/show_bug.cgi?id=1235218 * https://bugzilla.suse.com/show_bug.cgi?id=1238788 * https://bugzilla.suse.com/show_bug.cgi?id=1238790 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 14 12:39:32 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 14 Apr 2025 12:39:32 -0000 Subject: SUSE-SU-2025:1241-1: important: Security update for the Linux Kernel Message-ID: <174463437295.32203.17019117688097725115@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:1241-1 Release Date: 2025-04-14T10:37:24Z Rating: important References: * bsc#1065729 * bsc#1180814 * bsc#1183682 * bsc#1190336 * bsc#1190768 * bsc#1190786 * bsc#1193629 * bsc#1194869 * bsc#1194904 * bsc#1195823 * bsc#1196444 * bsc#1197158 * bsc#1197174 * bsc#1197227 * bsc#1197246 * bsc#1197302 * bsc#1197331 * bsc#1197472 * bsc#1197661 * bsc#1197926 * bsc#1198019 * bsc#1198021 * bsc#1198240 * bsc#1198577 * bsc#1198660 * bsc#1199657 * bsc#1200045 * bsc#1200571 * bsc#1200807 * bsc#1200809 * bsc#1200810 * bsc#1200824 * bsc#1200825 * bsc#1200871 * bsc#1200872 * bsc#1201193 * bsc#1201218 * bsc#1201323 * bsc#1201381 * bsc#1201610 * bsc#1202672 * bsc#1202711 * bsc#1202712 * bsc#1202771 * bsc#1202774 * bsc#1202778 * bsc#1202781 * bsc#1203699 * bsc#1203769 * bsc#1204171 * bsc#1205205 * bsc#1205701 * bsc#1206048 * bsc#1206049 * bsc#1206451 * bsc#1207034 * bsc#1207186 * bsc#1207361 * bsc#1207593 * bsc#1207640 * bsc#1207878 * bsc#1209262 * bsc#1209547 * bsc#1209788 * bsc#1209980 * bsc#1210050 * bsc#1210647 * bsc#1211263 * bsc#1213167 * bsc#1218450 * bsc#1221651 * bsc#1225428 * bsc#1225742 * bsc#1229312 * bsc#1231375 * bsc#1231432 * bsc#1231854 * bsc#1232299 * bsc#1232743 * bsc#1233479 * bsc#1233557 * bsc#1233749 * bsc#1234074 * bsc#1234894 * bsc#1234895 * bsc#1234896 * bsc#1235528 * bsc#1235599 * bsc#1235870 * bsc#1237029 * bsc#1237521 * bsc#1237530 * bsc#1237718 * bsc#1237721 * bsc#1237722 * bsc#1237723 * bsc#1237724 * bsc#1237725 * bsc#1237726 * bsc#1237727 * bsc#1237728 * bsc#1237729 * bsc#1237730 * bsc#1237733 * bsc#1237734 * bsc#1237735 * bsc#1237736 * bsc#1237737 * bsc#1237738 * bsc#1237739 * bsc#1237740 * bsc#1237742 * bsc#1237743 * bsc#1237744 * bsc#1237745 * bsc#1237746 * bsc#1237748 * bsc#1237749 * bsc#1237751 * bsc#1237752 * bsc#1237753 * bsc#1237755 * bsc#1237759 * bsc#1237761 * bsc#1237763 * bsc#1237766 * bsc#1237767 * bsc#1237768 * bsc#1237774 * bsc#1237775 * bsc#1237778 * bsc#1237779 * bsc#1237780 * bsc#1237782 * bsc#1237783 * bsc#1237784 * bsc#1237785 * bsc#1237786 * bsc#1237787 * bsc#1237788 * bsc#1237789 * bsc#1237790 * bsc#1237792 * bsc#1237794 * bsc#1237795 * bsc#1237797 * bsc#1237798 * bsc#1237799 * bsc#1237807 * bsc#1237808 * bsc#1237809 * bsc#1237810 * bsc#1237812 * bsc#1237813 * bsc#1237814 * bsc#1237815 * bsc#1237816 * bsc#1237817 * bsc#1237818 * bsc#1237820 * bsc#1237821 * bsc#1237823 * bsc#1237824 * bsc#1237826 * bsc#1237827 * bsc#1237829 * bsc#1237831 * bsc#1237835 * bsc#1237836 * bsc#1237837 * bsc#1237839 * bsc#1237840 * bsc#1237845 * bsc#1237846 * bsc#1237868 * bsc#1237872 * bsc#1237892 * bsc#1237903 * bsc#1237904 * bsc#1237916 * bsc#1237918 * bsc#1237922 * bsc#1237925 * bsc#1237926 * bsc#1237927 * bsc#1237928 * bsc#1237929 * bsc#1237931 * bsc#1237932 * bsc#1237933 * bsc#1237937 * bsc#1237940 * bsc#1237941 * bsc#1237942 * bsc#1237946 * bsc#1237951 * bsc#1237952 * bsc#1237954 * bsc#1237955 * bsc#1237957 * bsc#1237958 * bsc#1237959 * bsc#1237960 * bsc#1237961 * bsc#1237962 * bsc#1237963 * bsc#1237965 * bsc#1237966 * bsc#1237967 * bsc#1237968 * bsc#1237969 * bsc#1237970 * bsc#1237971 * bsc#1237972 * bsc#1237973 * bsc#1237975 * bsc#1237976 * bsc#1237978 * bsc#1237979 * bsc#1237980 * bsc#1237982 * bsc#1237983 * bsc#1237984 * bsc#1237986 * bsc#1237987 * bsc#1237990 * bsc#1237992 * bsc#1237996 * bsc#1237997 * bsc#1237998 * bsc#1237999 * bsc#1238000 * bsc#1238003 * bsc#1238004 * bsc#1238005 * bsc#1238006 * bsc#1238007 * bsc#1238009 * bsc#1238010 * bsc#1238011 * bsc#1238012 * bsc#1238013 * bsc#1238014 * bsc#1238016 * bsc#1238017 * bsc#1238018 * bsc#1238019 * bsc#1238021 * bsc#1238022 * bsc#1238024 * bsc#1238025 * bsc#1238030 * bsc#1238032 * bsc#1238036 * bsc#1238037 * bsc#1238041 * bsc#1238046 * bsc#1238047 * bsc#1238048 * bsc#1238069 * bsc#1238071 * bsc#1238077 * bsc#1238079 * bsc#1238080 * bsc#1238083 * bsc#1238084 * bsc#1238085 * bsc#1238086 * bsc#1238089 * bsc#1238090 * bsc#1238091 * bsc#1238092 * bsc#1238096 * bsc#1238097 * bsc#1238099 * bsc#1238103 * bsc#1238105 * bsc#1238106 * bsc#1238107 * bsc#1238108 * bsc#1238110 * bsc#1238111 * bsc#1238112 * bsc#1238113 * bsc#1238114 * bsc#1238115 * bsc#1238116 * bsc#1238118 * bsc#1238120 * bsc#1238122 * bsc#1238123 * bsc#1238125 * bsc#1238126 * bsc#1238127 * bsc#1238128 * bsc#1238131 * bsc#1238134 * bsc#1238135 * bsc#1238138 * bsc#1238139 * bsc#1238140 * bsc#1238142 * bsc#1238144 * bsc#1238146 * bsc#1238147 * bsc#1238149 * bsc#1238150 * bsc#1238153 * bsc#1238155 * bsc#1238156 * bsc#1238157 * bsc#1238158 * bsc#1238160 * bsc#1238162 * bsc#1238166 * bsc#1238167 * bsc#1238168 * bsc#1238169 * bsc#1238170 * bsc#1238171 * bsc#1238172 * bsc#1238175 * bsc#1238176 * bsc#1238177 * bsc#1238178 * bsc#1238179 * bsc#1238180 * bsc#1238181 * bsc#1238183 * bsc#1238184 * bsc#1238187 * bsc#1238221 * bsc#1238222 * bsc#1238226 * bsc#1238228 * bsc#1238229 * bsc#1238231 * bsc#1238233 * bsc#1238234 * bsc#1238235 * bsc#1238236 * bsc#1238238 * bsc#1238239 * bsc#1238240 * bsc#1238241 * bsc#1238242 * bsc#1238243 * bsc#1238244 * bsc#1238246 * bsc#1238247 * bsc#1238248 * bsc#1238249 * bsc#1238252 * bsc#1238253 * bsc#1238255 * bsc#1238256 * bsc#1238257 * bsc#1238260 * bsc#1238261 * bsc#1238262 * bsc#1238263 * bsc#1238264 * bsc#1238266 * bsc#1238267 * bsc#1238268 * bsc#1238269 * bsc#1238270 * bsc#1238271 * bsc#1238272 * bsc#1238274 * bsc#1238275 * bsc#1238276 * bsc#1238277 * bsc#1238278 * bsc#1238279 * bsc#1238281 * bsc#1238282 * bsc#1238283 * bsc#1238284 * bsc#1238285 * bsc#1238286 * bsc#1238287 * bsc#1238288 * bsc#1238289 * bsc#1238291 * bsc#1238292 * bsc#1238293 * bsc#1238295 * bsc#1238298 * bsc#1238300 * bsc#1238301 * bsc#1238302 * bsc#1238306 * bsc#1238307 * bsc#1238308 * bsc#1238309 * bsc#1238311 * bsc#1238313 * bsc#1238326 * bsc#1238327 * bsc#1238328 * bsc#1238329 * bsc#1238331 * bsc#1238333 * bsc#1238334 * bsc#1238335 * bsc#1238336 * bsc#1238337 * bsc#1238338 * bsc#1238339 * bsc#1238341 * bsc#1238343 * bsc#1238344 * bsc#1238345 * bsc#1238372 * bsc#1238373 * bsc#1238374 * bsc#1238376 * bsc#1238377 * bsc#1238378 * bsc#1238381 * bsc#1238382 * bsc#1238383 * bsc#1238385 * bsc#1238386 * bsc#1238387 * bsc#1238388 * bsc#1238389 * bsc#1238390 * bsc#1238391 * bsc#1238392 * bsc#1238393 * bsc#1238394 * bsc#1238395 * bsc#1238396 * bsc#1238397 * bsc#1238398 * bsc#1238400 * bsc#1238401 * bsc#1238410 * bsc#1238411 * bsc#1238413 * bsc#1238415 * bsc#1238416 * bsc#1238417 * bsc#1238418 * bsc#1238419 * bsc#1238420 * bsc#1238422 * bsc#1238423 * bsc#1238424 * bsc#1238428 * bsc#1238429 * bsc#1238430 * bsc#1238431 * bsc#1238432 * bsc#1238433 * bsc#1238434 * bsc#1238435 * bsc#1238436 * bsc#1238437 * bsc#1238440 * bsc#1238441 * bsc#1238442 * bsc#1238443 * bsc#1238444 * bsc#1238445 * bsc#1238447 * bsc#1238453 * bsc#1238454 * bsc#1238458 * bsc#1238459 * bsc#1238462 * bsc#1238463 * bsc#1238465 * bsc#1238467 * bsc#1238469 * bsc#1238533 * bsc#1238536 * bsc#1238538 * bsc#1238539 * bsc#1238540 * bsc#1238542 * bsc#1238543 * bsc#1238546 * bsc#1238551 * bsc#1238552 * bsc#1238556 * bsc#1238557 * bsc#1238599 * bsc#1238600 * bsc#1238601 * bsc#1238602 * bsc#1238605 * bsc#1238612 * bsc#1238613 * bsc#1238615 * bsc#1238616 * bsc#1238617 * bsc#1238618 * bsc#1238619 * bsc#1238621 * bsc#1238623 * bsc#1238625 * bsc#1238626 * bsc#1238630 * bsc#1238631 * bsc#1238632 * bsc#1238633 * bsc#1238635 * bsc#1238636 * bsc#1238638 * bsc#1238639 * bsc#1238640 * bsc#1238641 * bsc#1238642 * bsc#1238643 * bsc#1238645 * bsc#1238646 * bsc#1238647 * bsc#1238648 * bsc#1238649 * bsc#1238650 * bsc#1238653 * bsc#1238654 * bsc#1238655 * bsc#1238658 * bsc#1238661 * bsc#1238662 * bsc#1238663 * bsc#1238664 * bsc#1238666 * bsc#1238668 * bsc#1238705 * bsc#1238707 * bsc#1238710 * bsc#1238712 * bsc#1238718 * bsc#1238719 * bsc#1238721 * bsc#1238722 * bsc#1238727 * bsc#1238729 * bsc#1238750 * bsc#1238787 * bsc#1238789 * bsc#1238792 * bsc#1238799 * bsc#1238803 * bsc#1238804 * bsc#1238805 * bsc#1238806 * bsc#1238808 * bsc#1238809 * bsc#1238810 * bsc#1238811 * bsc#1238814 * bsc#1238815 * bsc#1238816 * bsc#1238817 * bsc#1238818 * bsc#1238819 * bsc#1238820 * bsc#1238821 * bsc#1238822 * bsc#1238823 * bsc#1238825 * bsc#1238830 * bsc#1238834 * bsc#1238835 * bsc#1238836 * bsc#1238838 * bsc#1238843 * bsc#1238867 * bsc#1238868 * bsc#1238869 * bsc#1238870 * bsc#1238871 * bsc#1238878 * bsc#1238889 * bsc#1238892 * bsc#1238893 * bsc#1238897 * bsc#1238898 * bsc#1238899 * bsc#1238902 * bsc#1238911 * bsc#1238916 * bsc#1238919 * bsc#1238925 * bsc#1238930 * bsc#1238933 * bsc#1238936 * bsc#1238937 * bsc#1238938 * bsc#1238939 * bsc#1238941 * bsc#1238942 * bsc#1238943 * bsc#1238944 * bsc#1238945 * bsc#1238946 * bsc#1238948 * bsc#1238949 * bsc#1238950 * bsc#1238951 * bsc#1238952 * bsc#1238953 * bsc#1238954 * bsc#1238956 * bsc#1238957 * bsc#1239001 * bsc#1239004 * bsc#1239016 * bsc#1239035 * bsc#1239040 * bsc#1239041 * bsc#1239051 * bsc#1239060 * bsc#1239070 * bsc#1239071 * bsc#1239073 * bsc#1239076 * bsc#1239095 * bsc#1239109 * bsc#1239115 * bsc#1239126 * bsc#1239452 * bsc#1239454 * bsc#1239968 * bsc#1239969 * bsc#1240133 * bsc#1240205 * bsc#1240207 * bsc#1240208 * bsc#1240210 * bsc#1240212 * bsc#1240213 * bsc#1240218 * bsc#1240220 * bsc#1240227 * bsc#1240229 * bsc#1240231 * bsc#1240242 * bsc#1240245 * bsc#1240247 * bsc#1240250 * bsc#1240254 * bsc#1240256 * bsc#1240264 * bsc#1240266 * bsc#1240272 * bsc#1240275 * bsc#1240276 * bsc#1240278 * bsc#1240279 * bsc#1240280 * bsc#1240281 * bsc#1240282 * bsc#1240283 * bsc#1240284 * bsc#1240286 * bsc#1240288 * bsc#1240290 * bsc#1240292 * bsc#1240293 * bsc#1240297 * bsc#1240304 * bsc#1240308 * bsc#1240309 * bsc#1240317 * bsc#1240318 * bsc#1240322 Cross-References: * CVE-2017-5753 * CVE-2021-4453 * CVE-2021-4454 * CVE-2021-47517 * CVE-2021-47631 * CVE-2021-47632 * CVE-2021-47633 * CVE-2021-47635 * CVE-2021-47636 * CVE-2021-47637 * CVE-2021-47638 * CVE-2021-47639 * CVE-2021-47641 * CVE-2021-47642 * CVE-2021-47643 * CVE-2021-47644 * CVE-2021-47645 * CVE-2021-47646 * CVE-2021-47647 * CVE-2021-47648 * CVE-2021-47649 * CVE-2021-47650 * CVE-2021-47651 * CVE-2021-47652 * CVE-2021-47653 * CVE-2021-47654 * CVE-2021-47656 * CVE-2021-47657 * CVE-2021-47659 * CVE-2022-0168 * CVE-2022-0995 * CVE-2022-1016 * CVE-2022-1048 * CVE-2022-1184 * CVE-2022-2977 * CVE-2022-29900 * CVE-2022-29901 * CVE-2022-3303 * CVE-2022-3435 * CVE-2022-49044 * CVE-2022-49050 * CVE-2022-49051 * CVE-2022-49053 * CVE-2022-49054 * CVE-2022-49055 * CVE-2022-49056 * CVE-2022-49057 * CVE-2022-49058 * CVE-2022-49059 * CVE-2022-49060 * CVE-2022-49061 * CVE-2022-49062 * CVE-2022-49063 * CVE-2022-49064 * CVE-2022-49065 * CVE-2022-49066 * CVE-2022-49070 * CVE-2022-49071 * CVE-2022-49073 * CVE-2022-49074 * CVE-2022-49075 * CVE-2022-49076 * CVE-2022-49078 * CVE-2022-49082 * CVE-2022-49083 * CVE-2022-49084 * CVE-2022-49085 * CVE-2022-49086 * CVE-2022-49088 * CVE-2022-49089 * CVE-2022-49090 * CVE-2022-49091 * CVE-2022-49092 * CVE-2022-49093 * CVE-2022-49095 * CVE-2022-49096 * CVE-2022-49097 * CVE-2022-49098 * CVE-2022-49099 * CVE-2022-49100 * CVE-2022-49102 * CVE-2022-49103 * CVE-2022-49104 * CVE-2022-49105 * CVE-2022-49106 * CVE-2022-49107 * CVE-2022-49109 * CVE-2022-49111 * CVE-2022-49112 * CVE-2022-49113 * CVE-2022-49114 * CVE-2022-49115 * CVE-2022-49116 * CVE-2022-49118 * CVE-2022-49119 * CVE-2022-49120 * CVE-2022-49121 * CVE-2022-49122 * CVE-2022-49123 * CVE-2022-49125 * CVE-2022-49126 * CVE-2022-49128 * CVE-2022-49129 * CVE-2022-49130 * CVE-2022-49131 * CVE-2022-49132 * CVE-2022-49133 * CVE-2022-49134 * CVE-2022-49135 * CVE-2022-49136 * CVE-2022-49137 * CVE-2022-49138 * CVE-2022-49139 * CVE-2022-49144 * CVE-2022-49145 * CVE-2022-49147 * CVE-2022-49148 * CVE-2022-49151 * CVE-2022-49153 * CVE-2022-49154 * CVE-2022-49155 * CVE-2022-49156 * CVE-2022-49157 * CVE-2022-49158 * CVE-2022-49159 * CVE-2022-49160 * CVE-2022-49162 * CVE-2022-49163 * CVE-2022-49164 * CVE-2022-49165 * CVE-2022-49174 * CVE-2022-49175 * CVE-2022-49176 * CVE-2022-49177 * CVE-2022-49178 * CVE-2022-49179 * CVE-2022-49180 * CVE-2022-49182 * CVE-2022-49183 * CVE-2022-49185 * CVE-2022-49187 * CVE-2022-49188 * CVE-2022-49189 * CVE-2022-49192 * CVE-2022-49193 * CVE-2022-49194 * CVE-2022-49196 * CVE-2022-49199 * CVE-2022-49200 * CVE-2022-49201 * CVE-2022-49202 * CVE-2022-49203 * CVE-2022-49204 * CVE-2022-49205 * CVE-2022-49206 * CVE-2022-49207 * CVE-2022-49208 * CVE-2022-49209 * CVE-2022-49212 * CVE-2022-49213 * CVE-2022-49214 * CVE-2022-49215 * CVE-2022-49216 * CVE-2022-49217 * CVE-2022-49218 * CVE-2022-49219 * CVE-2022-49221 * CVE-2022-49222 * CVE-2022-49224 * CVE-2022-49225 * CVE-2022-49226 * CVE-2022-49227 * CVE-2022-49228 * CVE-2022-49230 * CVE-2022-49232 * CVE-2022-49233 * CVE-2022-49235 * CVE-2022-49236 * CVE-2022-49237 * CVE-2022-49238 * CVE-2022-49239 * CVE-2022-49241 * CVE-2022-49242 * CVE-2022-49243 * CVE-2022-49244 * CVE-2022-49246 * CVE-2022-49247 * CVE-2022-49248 * CVE-2022-49249 * CVE-2022-49250 * CVE-2022-49251 * CVE-2022-49252 * CVE-2022-49253 * CVE-2022-49254 * CVE-2022-49256 * CVE-2022-49257 * CVE-2022-49258 * CVE-2022-49259 * CVE-2022-49260 * CVE-2022-49261 * CVE-2022-49262 * CVE-2022-49263 * CVE-2022-49264 * CVE-2022-49265 * CVE-2022-49266 * CVE-2022-49268 * CVE-2022-49269 * CVE-2022-49270 * CVE-2022-49271 * CVE-2022-49272 * CVE-2022-49273 * CVE-2022-49274 * CVE-2022-49275 * CVE-2022-49276 * CVE-2022-49277 * CVE-2022-49278 * CVE-2022-49279 * CVE-2022-49280 * CVE-2022-49281 * CVE-2022-49283 * CVE-2022-49285 * CVE-2022-49286 * CVE-2022-49287 * CVE-2022-49288 * CVE-2022-49290 * CVE-2022-49291 * CVE-2022-49292 * CVE-2022-49293 * CVE-2022-49294 * CVE-2022-49295 * CVE-2022-49296 * CVE-2022-49297 * CVE-2022-49298 * CVE-2022-49299 * CVE-2022-49300 * CVE-2022-49301 * CVE-2022-49302 * CVE-2022-49304 * CVE-2022-49305 * CVE-2022-49306 * CVE-2022-49307 * CVE-2022-49308 * CVE-2022-49309 * CVE-2022-49310 * CVE-2022-49311 * CVE-2022-49312 * CVE-2022-49313 * CVE-2022-49314 * CVE-2022-49315 * CVE-2022-49316 * CVE-2022-49319 * CVE-2022-49320 * CVE-2022-49321 * CVE-2022-49322 * CVE-2022-49323 * CVE-2022-49325 * CVE-2022-49326 * CVE-2022-49327 * CVE-2022-49328 * CVE-2022-49329 * CVE-2022-49330 * CVE-2022-49331 * CVE-2022-49332 * CVE-2022-49333 * CVE-2022-49335 * CVE-2022-49336 * CVE-2022-49337 * CVE-2022-49338 * CVE-2022-49339 * CVE-2022-49341 * CVE-2022-49342 * CVE-2022-49343 * CVE-2022-49345 * CVE-2022-49346 * CVE-2022-49347 * CVE-2022-49348 * CVE-2022-49349 * CVE-2022-49350 * CVE-2022-49351 * CVE-2022-49352 * CVE-2022-49353 * CVE-2022-49354 * CVE-2022-49356 * CVE-2022-49357 * CVE-2022-49359 * CVE-2022-49362 * CVE-2022-49365 * CVE-2022-49367 * CVE-2022-49368 * CVE-2022-49370 * CVE-2022-49371 * CVE-2022-49373 * CVE-2022-49375 * CVE-2022-49376 * CVE-2022-49377 * CVE-2022-49378 * CVE-2022-49379 * CVE-2022-49381 * CVE-2022-49382 * CVE-2022-49384 * CVE-2022-49385 * CVE-2022-49386 * CVE-2022-49389 * CVE-2022-49390 * CVE-2022-49392 * CVE-2022-49394 * CVE-2022-49396 * CVE-2022-49397 * CVE-2022-49398 * CVE-2022-49399 * CVE-2022-49400 * CVE-2022-49402 * CVE-2022-49404 * CVE-2022-49406 * CVE-2022-49407 * CVE-2022-49409 * CVE-2022-49410 * CVE-2022-49411 * CVE-2022-49412 * CVE-2022-49413 * CVE-2022-49414 * CVE-2022-49416 * CVE-2022-49418 * CVE-2022-49419 * CVE-2022-49421 * CVE-2022-49422 * CVE-2022-49424 * CVE-2022-49426 * CVE-2022-49427 * CVE-2022-49429 * CVE-2022-49430 * CVE-2022-49431 * CVE-2022-49432 * CVE-2022-49433 * CVE-2022-49434 * CVE-2022-49435 * CVE-2022-49436 * CVE-2022-49437 * CVE-2022-49438 * CVE-2022-49440 * CVE-2022-49441 * CVE-2022-49442 * CVE-2022-49443 * CVE-2022-49444 * CVE-2022-49445 * CVE-2022-49446 * CVE-2022-49447 * CVE-2022-49448 * CVE-2022-49449 * CVE-2022-49451 * CVE-2022-49453 * CVE-2022-49455 * CVE-2022-49458 * CVE-2022-49459 * CVE-2022-49460 * CVE-2022-49462 * CVE-2022-49463 * CVE-2022-49465 * CVE-2022-49466 * CVE-2022-49467 * CVE-2022-49468 * CVE-2022-49470 * CVE-2022-49472 * CVE-2022-49473 * CVE-2022-49474 * CVE-2022-49475 * CVE-2022-49476 * CVE-2022-49477 * CVE-2022-49478 * CVE-2022-49479 * CVE-2022-49480 * CVE-2022-49481 * CVE-2022-49482 * CVE-2022-49483 * CVE-2022-49484 * CVE-2022-49485 * CVE-2022-49486 * CVE-2022-49487 * CVE-2022-49488 * CVE-2022-49489 * CVE-2022-49490 * CVE-2022-49491 * CVE-2022-49492 * CVE-2022-49493 * CVE-2022-49494 * CVE-2022-49495 * CVE-2022-49497 * CVE-2022-49498 * CVE-2022-49499 * CVE-2022-49501 * CVE-2022-49502 * CVE-2022-49503 * CVE-2022-49504 * CVE-2022-49505 * CVE-2022-49506 * CVE-2022-49507 * CVE-2022-49508 * CVE-2022-49509 * CVE-2022-49510 * CVE-2022-49511 * CVE-2022-49512 * CVE-2022-49514 * CVE-2022-49515 * CVE-2022-49516 * CVE-2022-49517 * CVE-2022-49518 * CVE-2022-49519 * CVE-2022-49520 * CVE-2022-49521 * CVE-2022-49522 * CVE-2022-49523 * CVE-2022-49524 * CVE-2022-49525 * CVE-2022-49526 * CVE-2022-49527 * CVE-2022-49529 * CVE-2022-49530 * CVE-2022-49532 * CVE-2022-49533 * CVE-2022-49534 * CVE-2022-49535 * CVE-2022-49536 * CVE-2022-49537 * CVE-2022-49538 * CVE-2022-49541 * CVE-2022-49542 * CVE-2022-49543 * CVE-2022-49544 * CVE-2022-49545 * CVE-2022-49546 * CVE-2022-49548 * CVE-2022-49549 * CVE-2022-49551 * CVE-2022-49552 * CVE-2022-49555 * CVE-2022-49556 * CVE-2022-49559 * CVE-2022-49560 * CVE-2022-49562 * CVE-2022-49563 * CVE-2022-49564 * CVE-2022-49565 * CVE-2022-49566 * CVE-2022-49568 * CVE-2022-49569 * CVE-2022-49570 * CVE-2022-49579 * CVE-2022-49581 * CVE-2022-49583 * CVE-2022-49584 * CVE-2022-49591 * CVE-2022-49592 * CVE-2022-49603 * CVE-2022-49605 * CVE-2022-49606 * CVE-2022-49607 * CVE-2022-49609 * CVE-2022-49610 * CVE-2022-49611 * CVE-2022-49613 * CVE-2022-49615 * CVE-2022-49616 * CVE-2022-49617 * CVE-2022-49618 * CVE-2022-49621 * CVE-2022-49623 * CVE-2022-49624 * CVE-2022-49625 * CVE-2022-49626 * CVE-2022-49627 * CVE-2022-49628 * CVE-2022-49631 * CVE-2022-49634 * CVE-2022-49635 * CVE-2022-49638 * CVE-2022-49640 * CVE-2022-49641 * CVE-2022-49642 * CVE-2022-49643 * CVE-2022-49644 * CVE-2022-49645 * CVE-2022-49646 * CVE-2022-49647 * CVE-2022-49648 * CVE-2022-49649 * CVE-2022-49650 * CVE-2022-49652 * CVE-2022-49653 * CVE-2022-49655 * CVE-2022-49656 * CVE-2022-49657 * CVE-2022-49658 * CVE-2022-49661 * CVE-2022-49663 * CVE-2022-49665 * CVE-2022-49667 * CVE-2022-49668 * CVE-2022-49670 * CVE-2022-49671 * CVE-2022-49672 * CVE-2022-49673 * CVE-2022-49674 * CVE-2022-49675 * CVE-2022-49676 * CVE-2022-49677 * CVE-2022-49678 * CVE-2022-49679 * CVE-2022-49680 * CVE-2022-49683 * CVE-2022-49685 * CVE-2022-49686 * CVE-2022-49687 * CVE-2022-49688 * CVE-2022-49693 * CVE-2022-49694 * CVE-2022-49695 * CVE-2022-49697 * CVE-2022-49699 * CVE-2022-49700 * CVE-2022-49701 * CVE-2022-49703 * CVE-2022-49704 * CVE-2022-49705 * CVE-2022-49707 * CVE-2022-49708 * CVE-2022-49710 * CVE-2022-49711 * CVE-2022-49712 * CVE-2022-49713 * CVE-2022-49714 * CVE-2022-49715 * CVE-2022-49716 * CVE-2022-49719 * CVE-2022-49720 * CVE-2022-49721 * CVE-2022-49722 * CVE-2022-49723 * CVE-2022-49724 * CVE-2022-49725 * CVE-2022-49726 * CVE-2022-49729 * CVE-2022-49730 * CVE-2022-49731 * CVE-2022-49732 * CVE-2022-49733 * CVE-2022-49739 * CVE-2022-49746 * CVE-2022-49748 * CVE-2022-49751 * CVE-2022-49753 * CVE-2022-49755 * CVE-2022-49759 * CVE-2023-0179 * CVE-2023-1652 * CVE-2023-2162 * CVE-2023-28410 * CVE-2023-3567 * CVE-2023-52930 * CVE-2023-52933 * CVE-2023-52935 * CVE-2023-52939 * CVE-2023-52941 * CVE-2023-52973 * CVE-2023-52974 * CVE-2023-52975 * CVE-2023-52976 * CVE-2023-52979 * CVE-2023-52983 * CVE-2023-52984 * CVE-2023-52988 * CVE-2023-52989 * CVE-2023-52992 * CVE-2023-52993 * CVE-2023-53000 * CVE-2023-53005 * CVE-2023-53006 * CVE-2023-53007 * CVE-2023-53008 * CVE-2023-53010 * CVE-2023-53015 * CVE-2023-53016 * CVE-2023-53019 * CVE-2023-53023 * CVE-2023-53024 * CVE-2023-53025 * CVE-2023-53026 * CVE-2023-53028 * CVE-2023-53029 * CVE-2023-53030 * CVE-2023-53033 * CVE-2024-26634 * CVE-2024-47678 * CVE-2024-50290 * CVE-2024-53063 * CVE-2024-53124 * CVE-2024-53176 * CVE-2024-53178 * CVE-2024-56651 * CVE-2024-57996 * CVE-2024-58013 * CVE-2024-58014 * CVE-2025-21693 * CVE-2025-21718 * CVE-2025-21772 * CVE-2025-21780 CVSS scores: * CVE-2017-5753 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( SUSE ): 7.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( NVD ): 5.6 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2021-4453 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-4453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-4453 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-4454 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-4454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47517 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2021-47517 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47631 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47631 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47632 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47632 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47632 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47633 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2021-47633 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47635 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2021-47635 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47636 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47636 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2021-47637 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47637 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47637 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47638 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2021-47638 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47638 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47639 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2021-47639 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47639 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47641 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47641 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47642 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2021-47642 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2021-47643 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47643 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47644 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2021-47644 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47644 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47645 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47646 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2021-47646 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47646 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47647 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47649 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47650 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47651 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47651 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47651 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47652 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47652 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47653 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47653 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47653 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47654 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2021-47654 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2021-47654 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47656 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2021-47656 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47656 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47657 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47657 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47659 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2021-47659 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-0168 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-0168 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-0995 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-0995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-1016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-1016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-1048 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-1048 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-1184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-2977 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2022-2977 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-29900 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-29900 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2022-29901 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-29901 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2022-3303 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3303 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3435 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2022-3435 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2022-49044 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49044 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49050 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49050 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49051 ( SUSE ): 4.3 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2022-49051 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N * CVE-2022-49053 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49053 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49053 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49054 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2022-49054 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2022-49055 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49056 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49056 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49057 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49057 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49058 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49059 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49059 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49060 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49061 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49061 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49062 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49062 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49063 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49063 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49063 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49064 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49065 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49065 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49066 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49070 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49070 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49071 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49071 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49073 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49074 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49076 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49076 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49078 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49078 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49082 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49082 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49083 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49084 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49085 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49085 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49086 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49086 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49088 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49089 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49089 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2022-49090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49091 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49093 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49093 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49096 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49096 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H * CVE-2022-49096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49097 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49098 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49098 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49099 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49100 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49103 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49103 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49105 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49105 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49105 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49106 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49106 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49107 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49107 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49111 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49112 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49113 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49113 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49114 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49114 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49114 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49115 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49115 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49118 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49119 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49119 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49120 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49121 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49122 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49123 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49123 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49125 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49126 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49126 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49128 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49128 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49128 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49129 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49130 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49130 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49131 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49131 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49132 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49133 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49133 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49134 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49135 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49135 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49136 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49136 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49136 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49137 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49137 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49137 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49138 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49138 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49139 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49144 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49144 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49145 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49145 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-49147 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49148 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49148 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49153 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49153 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49154 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49154 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2022-49155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49155 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49156 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49157 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49157 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49158 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2022-49158 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2022-49159 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49159 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49162 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49163 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49163 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49164 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49165 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49165 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49174 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49175 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49176 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49176 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49177 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49177 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49177 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49178 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49179 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49180 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49182 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49183 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49183 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49187 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49187 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49189 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2022-49189 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2022-49192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49194 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49196 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49201 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49202 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49203 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49205 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49206 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49206 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49207 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49208 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49208 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49209 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49212 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49212 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49213 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49213 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49213 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49214 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49215 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49215 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49216 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49216 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49218 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49219 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49219 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49221 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49221 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49221 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49222 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49222 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49225 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49225 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49226 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49228 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49228 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49230 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49232 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49232 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49233 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49235 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49235 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49236 ( SUSE ): 7.5 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49236 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49236 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49237 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49238 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49238 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49238 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49239 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49241 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49241 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49241 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49242 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49242 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49243 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49243 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49248 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49249 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49250 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49254 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49254 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49257 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49258 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49260 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49260 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2022-49261 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49261 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49262 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49262 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49265 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49266 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49266 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49268 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49268 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49269 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2022-49269 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2022-49270 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49270 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49270 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49271 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49273 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49274 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49275 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49275 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49275 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49276 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49277 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49279 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49279 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49280 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49281 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49283 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49285 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49286 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49286 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49287 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49288 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49290 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49290 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2022-49291 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49291 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49291 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49292 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49293 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49294 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49294 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49295 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49295 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49296 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49297 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49297 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49298 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49298 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49299 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49300 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49300 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49301 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49301 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49302 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49304 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49305 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49306 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49307 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49308 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49309 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49309 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49309 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49310 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49310 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49311 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49311 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49311 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49312 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49312 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49313 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49314 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49314 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49315 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49316 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49316 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49316 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49319 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49319 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49320 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49321 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49321 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49321 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49322 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49322 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49323 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49323 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49323 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49325 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49326 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49326 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49326 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49327 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49327 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49328 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49328 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49328 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49329 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49329 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49330 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49330 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49331 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49332 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49333 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49333 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49335 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49335 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49336 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49336 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49337 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49338 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49339 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49339 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49341 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49341 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49342 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49342 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49342 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49343 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49343 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49345 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49346 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49346 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49347 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49347 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49348 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49348 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49349 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49349 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49350 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49350 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49352 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49352 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49353 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49353 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49354 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49354 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49356 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49357 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49357 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49359 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49362 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49365 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49367 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49370 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49373 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49375 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49376 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49377 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49377 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49378 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49381 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49382 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49384 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49385 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49390 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49390 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49392 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49392 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49394 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49394 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49398 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49400 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49402 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49404 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49406 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49411 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49411 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49412 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49412 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49413 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49413 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49413 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49414 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49416 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49418 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49419 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49421 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49424 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49426 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49426 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49427 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49429 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49429 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49430 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49431 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49431 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49432 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49432 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49434 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49435 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49436 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49437 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49437 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49438 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49440 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49440 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49444 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49445 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49446 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49447 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49447 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49448 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49449 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49449 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49453 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49455 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49458 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49459 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49460 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49460 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49462 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49463 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49465 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49465 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49465 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49466 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49467 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49468 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49468 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49470 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49470 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49472 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49472 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49473 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49474 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49474 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49475 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49476 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49476 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49477 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49479 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49479 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49480 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49481 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49482 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49483 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49485 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49485 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49486 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49487 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49487 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49489 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49489 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49490 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49491 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49492 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49493 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49493 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49495 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49497 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49497 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49498 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2022-49498 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2022-49499 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49501 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49501 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49501 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49502 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49502 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49504 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49505 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49505 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49506 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49507 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49508 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49509 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49510 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49511 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49512 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49514 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49515 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49516 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49516 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49517 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49518 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49518 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49519 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49519 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49520 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2022-49520 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2022-49521 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49521 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49522 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49523 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49523 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49524 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49524 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49525 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49525 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49526 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49526 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49527 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49527 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49527 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49529 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49529 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49529 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49530 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49530 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49530 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49532 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49532 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49533 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49534 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49534 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49534 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49535 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49535 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49535 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49536 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49536 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49536 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49537 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49537 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49538 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49538 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49541 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49541 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2022-49541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49542 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49543 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49544 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49544 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49544 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49545 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49545 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49546 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49546 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49548 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49549 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49549 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49551 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49552 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49555 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49556 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49560 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49560 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49563 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49564 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49565 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49566 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49568 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49568 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49568 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49569 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49569 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49570 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49570 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49579 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49579 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49583 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49583 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49591 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49591 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49592 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49603 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49605 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49607 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49609 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49610 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2022-49610 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2022-49611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49613 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49615 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49615 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49616 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49617 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49617 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49618 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49618 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49618 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49621 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49621 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49621 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49623 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49624 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49625 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49626 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49626 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49627 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49627 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49628 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49631 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49634 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49638 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49640 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49641 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49642 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49643 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49644 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49644 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49646 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49647 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49652 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49653 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49653 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49655 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49656 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49656 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49657 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49663 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49667 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49668 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49673 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49676 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49676 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49677 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49679 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49680 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49683 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49685 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49686 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49693 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49694 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49694 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49695 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49695 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49697 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49700 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49704 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49705 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49711 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49711 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49714 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49715 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49716 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49719 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49719 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49720 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49721 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49726 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49729 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49729 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49729 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49730 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49731 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49731 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49733 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49739 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49746 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49748 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49751 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49753 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49755 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49755 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49759 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0179 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1652 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1652 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-1652 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-2162 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-28410 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-28410 ( NVD ): 8.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2023-3567 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52935 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52973 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52975 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52975 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52992 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53008 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53023 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53025 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26634 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26634 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-47678 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53176 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53176 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53178 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53178 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56651 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56651 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-58013 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58013 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58014 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21718 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21718 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21780 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 605 vulnerabilities and has 68 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918). * CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled (bsc#1238919). * CVE-2022-49739: gfs2: Always check inode size of inline inodes (bsc#1240207). * CVE-2023-52935: mm/khugepaged: fix ->anon_vma race (bsc#1240276). * CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc (bsc#1234074). * CVE-2024-53176: smb: During unmount, ensure all cached dir instances drop their dentry (bsc#1234894). * CVE-2024-53178: smb: Do not leak cfid when reconnect races with open_cached_dir (bsc#1234895). * CVE-2024-56651: can: hi311x: hi3110_can_ist(): fix potential use-after-free (bsc#1235528). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076). * CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239095). * CVE-2024-58014: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (bsc#1239109). * CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029). * CVE-2025-21718: net: rose: fix timer races against user threads (bsc#1239073). * CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238911). * CVE-2025-21780: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (bsc#1239115). The following non-security bugs were fixed: * ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * btrfs: defrag: do not use merged extent map for their generation check (bsc#1239968). * btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1239968). * btrfs: fix extent map merging not happening for adjacent extents (bsc#1239968). * btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1239969). * btrfs: send: fix invalid clone operation for file that got its size decreased (bsc#1239969). * cifs: Add a laundromat thread for cached directories (git-fixes). * cifs: fix potential null pointer use in destroy_workqueue in init_cifs error path (git-fixes). * gfs2: Fix inode height consistency check (git-fixes). * mm: zswap: move allocations during CPU init outside the lock (git-fixes). * mm/mmu_notifier.c: fix race in mmu_interval_notifier_remove() (bsc#1239126). * net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016). * net: mana: Allow variable size indirection table (bsc#1239016). * net: mana: Avoid open coded arithmetic (bsc#1239016). * net: mana: Support holes in device list reply msg (bsc#1240133). * RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016). * RDMA/mana_ib: Use v2 version of cfg_rx_steer_req to enable RX coalescing (bsc#1239016). * sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743). * smb: client: destroy cfid_put_wq on module exit (git-fixes). * smb: client: disable directory caching when dir_cache_timeout is zero (git- fixes). * smb: client: do not start laundromat thread on nohandlecache (git-fixes). * smb: client: make laundromat a delayed worker (git-fixes). * smb: client: properly close cfids on umount (bsc#1231432, bsc#1232299, bsc#1235599, bsc#1234896). * smb3: allow controlling length of time directory entries are cached with dir leases (git-fixes). * smb3: do not start laundromat thread when dir leases disabled (git-fixes). * smb3: retrying on failed server close (git-fixes). * tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1241=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1241=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-1241=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1241=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1241=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1241=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1241=1 ## Package List: * openSUSE Leap 15.5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.100.1 * openSUSE Leap 15.5 (noarch) * kernel-macros-5.14.21-150500.55.100.1 * kernel-source-5.14.21-150500.55.100.1 * kernel-devel-5.14.21-150500.55.100.1 * kernel-docs-html-5.14.21-150500.55.100.1 * kernel-source-vanilla-5.14.21-150500.55.100.1 * openSUSE Leap 15.5 (nosrc ppc64le x86_64) * kernel-debug-5.14.21-150500.55.100.1 * openSUSE Leap 15.5 (ppc64le x86_64) * kernel-debug-debugsource-5.14.21-150500.55.100.1 * kernel-debug-devel-debuginfo-5.14.21-150500.55.100.1 * kernel-debug-devel-5.14.21-150500.55.100.1 * kernel-debug-debuginfo-5.14.21-150500.55.100.1 * openSUSE Leap 15.5 (x86_64) * kernel-debug-vdso-5.14.21-150500.55.100.1 * kernel-debug-vdso-debuginfo-5.14.21-150500.55.100.1 * kernel-default-vdso-debuginfo-5.14.21-150500.55.100.1 * kernel-kvmsmall-vdso-5.14.21-150500.55.100.1 * kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.100.1 * kernel-default-vdso-5.14.21-150500.55.100.1 * openSUSE Leap 15.5 (aarch64 ppc64le x86_64) * kernel-kvmsmall-debugsource-5.14.21-150500.55.100.1 * kernel-default-base-rebuild-5.14.21-150500.55.100.1.150500.6.47.1 * kernel-default-base-5.14.21-150500.55.100.1.150500.6.47.1 * kernel-kvmsmall-devel-5.14.21-150500.55.100.1 * kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.100.1 * kernel-kvmsmall-debuginfo-5.14.21-150500.55.100.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * kernel-default-devel-5.14.21-150500.55.100.1 * reiserfs-kmp-default-5.14.21-150500.55.100.1 * kernel-default-extra-debuginfo-5.14.21-150500.55.100.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.100.1 * cluster-md-kmp-default-5.14.21-150500.55.100.1 * kernel-obs-qa-5.14.21-150500.55.100.1 * kernel-default-extra-5.14.21-150500.55.100.1 * kselftests-kmp-default-debuginfo-5.14.21-150500.55.100.1 * kernel-default-optional-5.14.21-150500.55.100.1 * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.100.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.100.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.100.1 * kernel-syms-5.14.21-150500.55.100.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.100.1 * dlm-kmp-default-5.14.21-150500.55.100.1 * kernel-default-debuginfo-5.14.21-150500.55.100.1 * gfs2-kmp-default-5.14.21-150500.55.100.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.100.1 * kernel-obs-build-5.14.21-150500.55.100.1 * kernel-default-debugsource-5.14.21-150500.55.100.1 * kernel-default-optional-debuginfo-5.14.21-150500.55.100.1 * kselftests-kmp-default-5.14.21-150500.55.100.1 * kernel-obs-build-debugsource-5.14.21-150500.55.100.1 * kernel-default-livepatch-5.14.21-150500.55.100.1 * ocfs2-kmp-default-5.14.21-150500.55.100.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.100.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_100-default-debuginfo-1-150500.11.3.1 * kernel-default-livepatch-devel-5.14.21-150500.55.100.1 * kernel-livepatch-5_14_21-150500_55_100-default-1-150500.11.3.1 * kernel-livepatch-SLE15-SP5_Update_25-debugsource-1-150500.11.3.1 * openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150500.55.100.1 * openSUSE Leap 15.5 (nosrc s390x) * kernel-zfcpdump-5.14.21-150500.55.100.1 * openSUSE Leap 15.5 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150500.55.100.1 * kernel-zfcpdump-debuginfo-5.14.21-150500.55.100.1 * openSUSE Leap 15.5 (nosrc) * dtb-aarch64-5.14.21-150500.55.100.1 * openSUSE Leap 15.5 (aarch64) * kernel-64kb-debuginfo-5.14.21-150500.55.100.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.100.1 * dlm-kmp-64kb-5.14.21-150500.55.100.1 * dtb-lg-5.14.21-150500.55.100.1 * kernel-64kb-extra-debuginfo-5.14.21-150500.55.100.1 * kernel-64kb-optional-debuginfo-5.14.21-150500.55.100.1 * kernel-64kb-optional-5.14.21-150500.55.100.1 * dtb-apm-5.14.21-150500.55.100.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.100.1 * dtb-renesas-5.14.21-150500.55.100.1 * dtb-freescale-5.14.21-150500.55.100.1 * dtb-qcom-5.14.21-150500.55.100.1 * cluster-md-kmp-64kb-5.14.21-150500.55.100.1 * dtb-amazon-5.14.21-150500.55.100.1 * dtb-amd-5.14.21-150500.55.100.1 * dtb-rockchip-5.14.21-150500.55.100.1 * kernel-64kb-debugsource-5.14.21-150500.55.100.1 * dtb-arm-5.14.21-150500.55.100.1 * kernel-64kb-devel-5.14.21-150500.55.100.1 * dtb-amlogic-5.14.21-150500.55.100.1 * dtb-apple-5.14.21-150500.55.100.1 * kernel-64kb-extra-5.14.21-150500.55.100.1 * dtb-cavium-5.14.21-150500.55.100.1 * gfs2-kmp-64kb-5.14.21-150500.55.100.1 * dtb-broadcom-5.14.21-150500.55.100.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.100.1 * dtb-nvidia-5.14.21-150500.55.100.1 * reiserfs-kmp-64kb-5.14.21-150500.55.100.1 * dtb-sprd-5.14.21-150500.55.100.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.100.1 * dtb-allwinner-5.14.21-150500.55.100.1 * dtb-marvell-5.14.21-150500.55.100.1 * dtb-hisilicon-5.14.21-150500.55.100.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.100.1 * dtb-altera-5.14.21-150500.55.100.1 * kselftests-kmp-64kb-5.14.21-150500.55.100.1 * dtb-xilinx-5.14.21-150500.55.100.1 * dtb-mediatek-5.14.21-150500.55.100.1 * dlm-kmp-64kb-debuginfo-5.14.21-150500.55.100.1 * ocfs2-kmp-64kb-5.14.21-150500.55.100.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.100.1 * dtb-socionext-5.14.21-150500.55.100.1 * dtb-exynos-5.14.21-150500.55.100.1 * openSUSE Leap 15.5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.100.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.100.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) * kernel-default-base-5.14.21-150500.55.100.1.150500.6.47.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * kernel-default-debuginfo-5.14.21-150500.55.100.1 * kernel-default-debugsource-5.14.21-150500.55.100.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * kernel-macros-5.14.21-150500.55.100.1 * SUSE Linux Enterprise Live Patching 15-SP5 (nosrc) * kernel-default-5.14.21-150500.55.100.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_100-default-1-150500.11.3.1 * kernel-default-debuginfo-5.14.21-150500.55.100.1 * kernel-livepatch-5_14_21-150500_55_100-default-debuginfo-1-150500.11.3.1 * kernel-livepatch-SLE15-SP5_Update_25-debugsource-1-150500.11.3.1 * kernel-default-debugsource-5.14.21-150500.55.100.1 * kernel-default-livepatch-devel-5.14.21-150500.55.100.1 * kernel-default-livepatch-5.14.21-150500.55.100.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * gfs2-kmp-default-debuginfo-5.14.21-150500.55.100.1 * dlm-kmp-default-5.14.21-150500.55.100.1 * kernel-default-debuginfo-5.14.21-150500.55.100.1 * kernel-syms-5.14.21-150500.55.100.1 * ocfs2-kmp-default-5.14.21-150500.55.100.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.100.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.100.1 * kernel-default-base-5.14.21-150500.55.100.1.150500.6.47.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.100.1 * cluster-md-kmp-default-5.14.21-150500.55.100.1 * gfs2-kmp-default-5.14.21-150500.55.100.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.100.1 * kernel-obs-build-debugsource-5.14.21-150500.55.100.1 * kernel-obs-build-5.14.21-150500.55.100.1 * kernel-default-debugsource-5.14.21-150500.55.100.1 * kernel-default-devel-5.14.21-150500.55.100.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.100.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150500.55.100.1 * kernel-64kb-devel-5.14.21-150500.55.100.1 * kernel-64kb-debugsource-5.14.21-150500.55.100.1 * kernel-64kb-debuginfo-5.14.21-150500.55.100.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150500.55.100.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * kernel-macros-5.14.21-150500.55.100.1 * kernel-source-5.14.21-150500.55.100.1 * kernel-devel-5.14.21-150500.55.100.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.100.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * gfs2-kmp-default-debuginfo-5.14.21-150500.55.100.1 * dlm-kmp-default-5.14.21-150500.55.100.1 * kernel-default-debuginfo-5.14.21-150500.55.100.1 * kernel-syms-5.14.21-150500.55.100.1 * ocfs2-kmp-default-5.14.21-150500.55.100.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.100.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.100.1 * kernel-default-base-5.14.21-150500.55.100.1.150500.6.47.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.100.1 * cluster-md-kmp-default-5.14.21-150500.55.100.1 * gfs2-kmp-default-5.14.21-150500.55.100.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.100.1 * kernel-obs-build-debugsource-5.14.21-150500.55.100.1 * kernel-obs-build-5.14.21-150500.55.100.1 * kernel-default-debugsource-5.14.21-150500.55.100.1 * kernel-default-devel-5.14.21-150500.55.100.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.100.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150500.55.100.1 * kernel-64kb-devel-5.14.21-150500.55.100.1 * kernel-64kb-debugsource-5.14.21-150500.55.100.1 * kernel-64kb-debuginfo-5.14.21-150500.55.100.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150500.55.100.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * kernel-macros-5.14.21-150500.55.100.1 * kernel-source-5.14.21-150500.55.100.1 * kernel-devel-5.14.21-150500.55.100.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.100.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * gfs2-kmp-default-debuginfo-5.14.21-150500.55.100.1 * dlm-kmp-default-5.14.21-150500.55.100.1 * kernel-default-debuginfo-5.14.21-150500.55.100.1 * kernel-syms-5.14.21-150500.55.100.1 * ocfs2-kmp-default-5.14.21-150500.55.100.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.100.1 * reiserfs-kmp-default-5.14.21-150500.55.100.1 * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.100.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.100.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.100.1 * cluster-md-kmp-default-5.14.21-150500.55.100.1 * gfs2-kmp-default-5.14.21-150500.55.100.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.100.1 * kernel-obs-build-debugsource-5.14.21-150500.55.100.1 * kernel-obs-build-5.14.21-150500.55.100.1 * kernel-default-debugsource-5.14.21-150500.55.100.1 * kernel-default-devel-5.14.21-150500.55.100.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.100.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150500.55.100.1 * kernel-64kb-devel-5.14.21-150500.55.100.1 * kernel-64kb-debugsource-5.14.21-150500.55.100.1 * kernel-64kb-debuginfo-5.14.21-150500.55.100.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.100.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150500.55.100.1.150500.6.47.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * kernel-macros-5.14.21-150500.55.100.1 * kernel-source-5.14.21-150500.55.100.1 * kernel-devel-5.14.21-150500.55.100.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch nosrc) * kernel-docs-5.14.21-150500.55.100.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (nosrc s390x) * kernel-zfcpdump-5.14.21-150500.55.100.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (s390x) * kernel-zfcpdump-debugsource-5.14.21-150500.55.100.1 * kernel-zfcpdump-debuginfo-5.14.21-150500.55.100.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * gfs2-kmp-default-debuginfo-5.14.21-150500.55.100.1 * dlm-kmp-default-5.14.21-150500.55.100.1 * kernel-default-debuginfo-5.14.21-150500.55.100.1 * kernel-syms-5.14.21-150500.55.100.1 * ocfs2-kmp-default-5.14.21-150500.55.100.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.100.1 * reiserfs-kmp-default-5.14.21-150500.55.100.1 * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.100.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.100.1 * kernel-default-base-5.14.21-150500.55.100.1.150500.6.47.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.100.1 * cluster-md-kmp-default-5.14.21-150500.55.100.1 * gfs2-kmp-default-5.14.21-150500.55.100.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.100.1 * kernel-obs-build-debugsource-5.14.21-150500.55.100.1 * kernel-obs-build-5.14.21-150500.55.100.1 * kernel-default-debugsource-5.14.21-150500.55.100.1 * kernel-default-devel-5.14.21-150500.55.100.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150500.55.100.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * kernel-macros-5.14.21-150500.55.100.1 * kernel-source-5.14.21-150500.55.100.1 * kernel-devel-5.14.21-150500.55.100.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.100.1 ## References: * https://www.suse.com/security/cve/CVE-2017-5753.html * https://www.suse.com/security/cve/CVE-2021-4453.html * https://www.suse.com/security/cve/CVE-2021-4454.html * https://www.suse.com/security/cve/CVE-2021-47517.html * https://www.suse.com/security/cve/CVE-2021-47631.html * https://www.suse.com/security/cve/CVE-2021-47632.html * https://www.suse.com/security/cve/CVE-2021-47633.html * https://www.suse.com/security/cve/CVE-2021-47635.html * https://www.suse.com/security/cve/CVE-2021-47636.html * https://www.suse.com/security/cve/CVE-2021-47637.html * https://www.suse.com/security/cve/CVE-2021-47638.html * https://www.suse.com/security/cve/CVE-2021-47639.html * https://www.suse.com/security/cve/CVE-2021-47641.html * https://www.suse.com/security/cve/CVE-2021-47642.html * https://www.suse.com/security/cve/CVE-2021-47643.html * https://www.suse.com/security/cve/CVE-2021-47644.html * https://www.suse.com/security/cve/CVE-2021-47645.html * https://www.suse.com/security/cve/CVE-2021-47646.html * https://www.suse.com/security/cve/CVE-2021-47647.html * https://www.suse.com/security/cve/CVE-2021-47648.html * https://www.suse.com/security/cve/CVE-2021-47649.html * https://www.suse.com/security/cve/CVE-2021-47650.html * https://www.suse.com/security/cve/CVE-2021-47651.html * https://www.suse.com/security/cve/CVE-2021-47652.html * https://www.suse.com/security/cve/CVE-2021-47653.html * https://www.suse.com/security/cve/CVE-2021-47654.html * https://www.suse.com/security/cve/CVE-2021-47656.html * https://www.suse.com/security/cve/CVE-2021-47657.html * https://www.suse.com/security/cve/CVE-2021-47659.html * https://www.suse.com/security/cve/CVE-2022-0168.html * https://www.suse.com/security/cve/CVE-2022-0995.html * https://www.suse.com/security/cve/CVE-2022-1016.html * https://www.suse.com/security/cve/CVE-2022-1048.html * https://www.suse.com/security/cve/CVE-2022-1184.html * https://www.suse.com/security/cve/CVE-2022-2977.html * https://www.suse.com/security/cve/CVE-2022-29900.html * https://www.suse.com/security/cve/CVE-2022-29901.html * https://www.suse.com/security/cve/CVE-2022-3303.html * https://www.suse.com/security/cve/CVE-2022-3435.html * https://www.suse.com/security/cve/CVE-2022-49044.html * https://www.suse.com/security/cve/CVE-2022-49050.html * https://www.suse.com/security/cve/CVE-2022-49051.html * https://www.suse.com/security/cve/CVE-2022-49053.html * https://www.suse.com/security/cve/CVE-2022-49054.html * https://www.suse.com/security/cve/CVE-2022-49055.html * https://www.suse.com/security/cve/CVE-2022-49056.html * https://www.suse.com/security/cve/CVE-2022-49057.html * https://www.suse.com/security/cve/CVE-2022-49058.html * https://www.suse.com/security/cve/CVE-2022-49059.html * https://www.suse.com/security/cve/CVE-2022-49060.html * https://www.suse.com/security/cve/CVE-2022-49061.html * https://www.suse.com/security/cve/CVE-2022-49062.html * https://www.suse.com/security/cve/CVE-2022-49063.html * https://www.suse.com/security/cve/CVE-2022-49064.html * https://www.suse.com/security/cve/CVE-2022-49065.html * https://www.suse.com/security/cve/CVE-2022-49066.html * https://www.suse.com/security/cve/CVE-2022-49070.html * https://www.suse.com/security/cve/CVE-2022-49071.html * https://www.suse.com/security/cve/CVE-2022-49073.html * https://www.suse.com/security/cve/CVE-2022-49074.html * https://www.suse.com/security/cve/CVE-2022-49075.html * https://www.suse.com/security/cve/CVE-2022-49076.html * https://www.suse.com/security/cve/CVE-2022-49078.html * https://www.suse.com/security/cve/CVE-2022-49082.html * https://www.suse.com/security/cve/CVE-2022-49083.html * https://www.suse.com/security/cve/CVE-2022-49084.html * https://www.suse.com/security/cve/CVE-2022-49085.html * https://www.suse.com/security/cve/CVE-2022-49086.html * https://www.suse.com/security/cve/CVE-2022-49088.html * https://www.suse.com/security/cve/CVE-2022-49089.html * https://www.suse.com/security/cve/CVE-2022-49090.html * https://www.suse.com/security/cve/CVE-2022-49091.html * https://www.suse.com/security/cve/CVE-2022-49092.html * https://www.suse.com/security/cve/CVE-2022-49093.html * https://www.suse.com/security/cve/CVE-2022-49095.html * https://www.suse.com/security/cve/CVE-2022-49096.html * https://www.suse.com/security/cve/CVE-2022-49097.html * https://www.suse.com/security/cve/CVE-2022-49098.html * https://www.suse.com/security/cve/CVE-2022-49099.html * https://www.suse.com/security/cve/CVE-2022-49100.html * https://www.suse.com/security/cve/CVE-2022-49102.html * https://www.suse.com/security/cve/CVE-2022-49103.html * https://www.suse.com/security/cve/CVE-2022-49104.html * https://www.suse.com/security/cve/CVE-2022-49105.html * https://www.suse.com/security/cve/CVE-2022-49106.html * https://www.suse.com/security/cve/CVE-2022-49107.html * https://www.suse.com/security/cve/CVE-2022-49109.html * https://www.suse.com/security/cve/CVE-2022-49111.html * https://www.suse.com/security/cve/CVE-2022-49112.html * https://www.suse.com/security/cve/CVE-2022-49113.html * https://www.suse.com/security/cve/CVE-2022-49114.html * https://www.suse.com/security/cve/CVE-2022-49115.html * https://www.suse.com/security/cve/CVE-2022-49116.html * https://www.suse.com/security/cve/CVE-2022-49118.html * https://www.suse.com/security/cve/CVE-2022-49119.html * https://www.suse.com/security/cve/CVE-2022-49120.html * https://www.suse.com/security/cve/CVE-2022-49121.html * https://www.suse.com/security/cve/CVE-2022-49122.html * https://www.suse.com/security/cve/CVE-2022-49123.html * https://www.suse.com/security/cve/CVE-2022-49125.html * https://www.suse.com/security/cve/CVE-2022-49126.html * https://www.suse.com/security/cve/CVE-2022-49128.html * https://www.suse.com/security/cve/CVE-2022-49129.html * https://www.suse.com/security/cve/CVE-2022-49130.html * https://www.suse.com/security/cve/CVE-2022-49131.html * https://www.suse.com/security/cve/CVE-2022-49132.html * https://www.suse.com/security/cve/CVE-2022-49133.html * https://www.suse.com/security/cve/CVE-2022-49134.html * https://www.suse.com/security/cve/CVE-2022-49135.html * https://www.suse.com/security/cve/CVE-2022-49136.html * https://www.suse.com/security/cve/CVE-2022-49137.html * https://www.suse.com/security/cve/CVE-2022-49138.html * https://www.suse.com/security/cve/CVE-2022-49139.html * https://www.suse.com/security/cve/CVE-2022-49144.html * https://www.suse.com/security/cve/CVE-2022-49145.html * https://www.suse.com/security/cve/CVE-2022-49147.html * https://www.suse.com/security/cve/CVE-2022-49148.html * https://www.suse.com/security/cve/CVE-2022-49151.html * https://www.suse.com/security/cve/CVE-2022-49153.html * https://www.suse.com/security/cve/CVE-2022-49154.html * https://www.suse.com/security/cve/CVE-2022-49155.html * https://www.suse.com/security/cve/CVE-2022-49156.html * https://www.suse.com/security/cve/CVE-2022-49157.html * https://www.suse.com/security/cve/CVE-2022-49158.html * https://www.suse.com/security/cve/CVE-2022-49159.html * https://www.suse.com/security/cve/CVE-2022-49160.html * https://www.suse.com/security/cve/CVE-2022-49162.html * https://www.suse.com/security/cve/CVE-2022-49163.html * https://www.suse.com/security/cve/CVE-2022-49164.html * https://www.suse.com/security/cve/CVE-2022-49165.html * https://www.suse.com/security/cve/CVE-2022-49174.html * https://www.suse.com/security/cve/CVE-2022-49175.html * https://www.suse.com/security/cve/CVE-2022-49176.html * https://www.suse.com/security/cve/CVE-2022-49177.html * https://www.suse.com/security/cve/CVE-2022-49178.html * https://www.suse.com/security/cve/CVE-2022-49179.html * https://www.suse.com/security/cve/CVE-2022-49180.html * https://www.suse.com/security/cve/CVE-2022-49182.html * https://www.suse.com/security/cve/CVE-2022-49183.html * https://www.suse.com/security/cve/CVE-2022-49185.html * https://www.suse.com/security/cve/CVE-2022-49187.html * https://www.suse.com/security/cve/CVE-2022-49188.html * https://www.suse.com/security/cve/CVE-2022-49189.html * https://www.suse.com/security/cve/CVE-2022-49192.html * https://www.suse.com/security/cve/CVE-2022-49193.html * https://www.suse.com/security/cve/CVE-2022-49194.html * https://www.suse.com/security/cve/CVE-2022-49196.html * https://www.suse.com/security/cve/CVE-2022-49199.html * https://www.suse.com/security/cve/CVE-2022-49200.html * https://www.suse.com/security/cve/CVE-2022-49201.html * https://www.suse.com/security/cve/CVE-2022-49202.html * https://www.suse.com/security/cve/CVE-2022-49203.html * https://www.suse.com/security/cve/CVE-2022-49204.html * https://www.suse.com/security/cve/CVE-2022-49205.html * https://www.suse.com/security/cve/CVE-2022-49206.html * https://www.suse.com/security/cve/CVE-2022-49207.html * https://www.suse.com/security/cve/CVE-2022-49208.html * https://www.suse.com/security/cve/CVE-2022-49209.html * https://www.suse.com/security/cve/CVE-2022-49212.html * https://www.suse.com/security/cve/CVE-2022-49213.html * https://www.suse.com/security/cve/CVE-2022-49214.html * https://www.suse.com/security/cve/CVE-2022-49215.html * https://www.suse.com/security/cve/CVE-2022-49216.html * https://www.suse.com/security/cve/CVE-2022-49217.html * https://www.suse.com/security/cve/CVE-2022-49218.html * https://www.suse.com/security/cve/CVE-2022-49219.html * https://www.suse.com/security/cve/CVE-2022-49221.html * https://www.suse.com/security/cve/CVE-2022-49222.html * https://www.suse.com/security/cve/CVE-2022-49224.html * https://www.suse.com/security/cve/CVE-2022-49225.html * https://www.suse.com/security/cve/CVE-2022-49226.html * https://www.suse.com/security/cve/CVE-2022-49227.html * https://www.suse.com/security/cve/CVE-2022-49228.html * https://www.suse.com/security/cve/CVE-2022-49230.html * https://www.suse.com/security/cve/CVE-2022-49232.html * https://www.suse.com/security/cve/CVE-2022-49233.html * https://www.suse.com/security/cve/CVE-2022-49235.html * https://www.suse.com/security/cve/CVE-2022-49236.html * https://www.suse.com/security/cve/CVE-2022-49237.html * https://www.suse.com/security/cve/CVE-2022-49238.html * https://www.suse.com/security/cve/CVE-2022-49239.html * https://www.suse.com/security/cve/CVE-2022-49241.html * https://www.suse.com/security/cve/CVE-2022-49242.html * https://www.suse.com/security/cve/CVE-2022-49243.html * https://www.suse.com/security/cve/CVE-2022-49244.html * https://www.suse.com/security/cve/CVE-2022-49246.html * https://www.suse.com/security/cve/CVE-2022-49247.html * https://www.suse.com/security/cve/CVE-2022-49248.html * https://www.suse.com/security/cve/CVE-2022-49249.html * https://www.suse.com/security/cve/CVE-2022-49250.html * https://www.suse.com/security/cve/CVE-2022-49251.html * https://www.suse.com/security/cve/CVE-2022-49252.html * https://www.suse.com/security/cve/CVE-2022-49253.html * https://www.suse.com/security/cve/CVE-2022-49254.html * https://www.suse.com/security/cve/CVE-2022-49256.html * https://www.suse.com/security/cve/CVE-2022-49257.html * https://www.suse.com/security/cve/CVE-2022-49258.html * https://www.suse.com/security/cve/CVE-2022-49259.html * https://www.suse.com/security/cve/CVE-2022-49260.html * https://www.suse.com/security/cve/CVE-2022-49261.html * https://www.suse.com/security/cve/CVE-2022-49262.html * https://www.suse.com/security/cve/CVE-2022-49263.html * https://www.suse.com/security/cve/CVE-2022-49264.html * https://www.suse.com/security/cve/CVE-2022-49265.html * https://www.suse.com/security/cve/CVE-2022-49266.html * https://www.suse.com/security/cve/CVE-2022-49268.html * https://www.suse.com/security/cve/CVE-2022-49269.html * https://www.suse.com/security/cve/CVE-2022-49270.html * https://www.suse.com/security/cve/CVE-2022-49271.html * https://www.suse.com/security/cve/CVE-2022-49272.html * https://www.suse.com/security/cve/CVE-2022-49273.html * https://www.suse.com/security/cve/CVE-2022-49274.html * https://www.suse.com/security/cve/CVE-2022-49275.html * https://www.suse.com/security/cve/CVE-2022-49276.html * https://www.suse.com/security/cve/CVE-2022-49277.html * https://www.suse.com/security/cve/CVE-2022-49278.html * https://www.suse.com/security/cve/CVE-2022-49279.html * https://www.suse.com/security/cve/CVE-2022-49280.html * https://www.suse.com/security/cve/CVE-2022-49281.html * https://www.suse.com/security/cve/CVE-2022-49283.html * https://www.suse.com/security/cve/CVE-2022-49285.html * https://www.suse.com/security/cve/CVE-2022-49286.html * https://www.suse.com/security/cve/CVE-2022-49287.html * https://www.suse.com/security/cve/CVE-2022-49288.html * https://www.suse.com/security/cve/CVE-2022-49290.html * https://www.suse.com/security/cve/CVE-2022-49291.html * https://www.suse.com/security/cve/CVE-2022-49292.html * https://www.suse.com/security/cve/CVE-2022-49293.html * https://www.suse.com/security/cve/CVE-2022-49294.html * https://www.suse.com/security/cve/CVE-2022-49295.html * https://www.suse.com/security/cve/CVE-2022-49296.html * https://www.suse.com/security/cve/CVE-2022-49297.html * https://www.suse.com/security/cve/CVE-2022-49298.html * https://www.suse.com/security/cve/CVE-2022-49299.html * https://www.suse.com/security/cve/CVE-2022-49300.html * https://www.suse.com/security/cve/CVE-2022-49301.html * https://www.suse.com/security/cve/CVE-2022-49302.html * https://www.suse.com/security/cve/CVE-2022-49304.html * https://www.suse.com/security/cve/CVE-2022-49305.html * https://www.suse.com/security/cve/CVE-2022-49306.html * https://www.suse.com/security/cve/CVE-2022-49307.html * https://www.suse.com/security/cve/CVE-2022-49308.html * https://www.suse.com/security/cve/CVE-2022-49309.html * https://www.suse.com/security/cve/CVE-2022-49310.html * https://www.suse.com/security/cve/CVE-2022-49311.html * https://www.suse.com/security/cve/CVE-2022-49312.html * https://www.suse.com/security/cve/CVE-2022-49313.html * https://www.suse.com/security/cve/CVE-2022-49314.html * https://www.suse.com/security/cve/CVE-2022-49315.html * https://www.suse.com/security/cve/CVE-2022-49316.html * https://www.suse.com/security/cve/CVE-2022-49319.html * https://www.suse.com/security/cve/CVE-2022-49320.html * https://www.suse.com/security/cve/CVE-2022-49321.html * https://www.suse.com/security/cve/CVE-2022-49322.html * https://www.suse.com/security/cve/CVE-2022-49323.html * https://www.suse.com/security/cve/CVE-2022-49325.html * https://www.suse.com/security/cve/CVE-2022-49326.html * https://www.suse.com/security/cve/CVE-2022-49327.html * https://www.suse.com/security/cve/CVE-2022-49328.html * https://www.suse.com/security/cve/CVE-2022-49329.html * https://www.suse.com/security/cve/CVE-2022-49330.html * https://www.suse.com/security/cve/CVE-2022-49331.html * https://www.suse.com/security/cve/CVE-2022-49332.html * https://www.suse.com/security/cve/CVE-2022-49333.html * https://www.suse.com/security/cve/CVE-2022-49335.html * https://www.suse.com/security/cve/CVE-2022-49336.html * https://www.suse.com/security/cve/CVE-2022-49337.html * https://www.suse.com/security/cve/CVE-2022-49338.html * https://www.suse.com/security/cve/CVE-2022-49339.html * https://www.suse.com/security/cve/CVE-2022-49341.html * https://www.suse.com/security/cve/CVE-2022-49342.html * https://www.suse.com/security/cve/CVE-2022-49343.html * https://www.suse.com/security/cve/CVE-2022-49345.html * https://www.suse.com/security/cve/CVE-2022-49346.html * https://www.suse.com/security/cve/CVE-2022-49347.html * https://www.suse.com/security/cve/CVE-2022-49348.html * https://www.suse.com/security/cve/CVE-2022-49349.html * https://www.suse.com/security/cve/CVE-2022-49350.html * https://www.suse.com/security/cve/CVE-2022-49351.html * https://www.suse.com/security/cve/CVE-2022-49352.html * https://www.suse.com/security/cve/CVE-2022-49353.html * https://www.suse.com/security/cve/CVE-2022-49354.html * https://www.suse.com/security/cve/CVE-2022-49356.html * https://www.suse.com/security/cve/CVE-2022-49357.html * https://www.suse.com/security/cve/CVE-2022-49359.html * https://www.suse.com/security/cve/CVE-2022-49362.html * https://www.suse.com/security/cve/CVE-2022-49365.html * https://www.suse.com/security/cve/CVE-2022-49367.html * https://www.suse.com/security/cve/CVE-2022-49368.html * https://www.suse.com/security/cve/CVE-2022-49370.html * https://www.suse.com/security/cve/CVE-2022-49371.html * https://www.suse.com/security/cve/CVE-2022-49373.html * https://www.suse.com/security/cve/CVE-2022-49375.html * https://www.suse.com/security/cve/CVE-2022-49376.html * https://www.suse.com/security/cve/CVE-2022-49377.html * https://www.suse.com/security/cve/CVE-2022-49378.html * https://www.suse.com/security/cve/CVE-2022-49379.html * https://www.suse.com/security/cve/CVE-2022-49381.html * https://www.suse.com/security/cve/CVE-2022-49382.html * https://www.suse.com/security/cve/CVE-2022-49384.html * https://www.suse.com/security/cve/CVE-2022-49385.html * https://www.suse.com/security/cve/CVE-2022-49386.html * https://www.suse.com/security/cve/CVE-2022-49389.html * https://www.suse.com/security/cve/CVE-2022-49390.html * https://www.suse.com/security/cve/CVE-2022-49392.html * https://www.suse.com/security/cve/CVE-2022-49394.html * https://www.suse.com/security/cve/CVE-2022-49396.html * https://www.suse.com/security/cve/CVE-2022-49397.html * https://www.suse.com/security/cve/CVE-2022-49398.html * https://www.suse.com/security/cve/CVE-2022-49399.html * https://www.suse.com/security/cve/CVE-2022-49400.html * https://www.suse.com/security/cve/CVE-2022-49402.html * https://www.suse.com/security/cve/CVE-2022-49404.html * https://www.suse.com/security/cve/CVE-2022-49406.html * https://www.suse.com/security/cve/CVE-2022-49407.html * https://www.suse.com/security/cve/CVE-2022-49409.html * https://www.suse.com/security/cve/CVE-2022-49410.html * https://www.suse.com/security/cve/CVE-2022-49411.html * https://www.suse.com/security/cve/CVE-2022-49412.html * https://www.suse.com/security/cve/CVE-2022-49413.html * https://www.suse.com/security/cve/CVE-2022-49414.html * https://www.suse.com/security/cve/CVE-2022-49416.html * https://www.suse.com/security/cve/CVE-2022-49418.html * https://www.suse.com/security/cve/CVE-2022-49419.html * https://www.suse.com/security/cve/CVE-2022-49421.html * https://www.suse.com/security/cve/CVE-2022-49422.html * https://www.suse.com/security/cve/CVE-2022-49424.html * https://www.suse.com/security/cve/CVE-2022-49426.html * https://www.suse.com/security/cve/CVE-2022-49427.html * https://www.suse.com/security/cve/CVE-2022-49429.html * https://www.suse.com/security/cve/CVE-2022-49430.html * https://www.suse.com/security/cve/CVE-2022-49431.html * https://www.suse.com/security/cve/CVE-2022-49432.html * https://www.suse.com/security/cve/CVE-2022-49433.html * https://www.suse.com/security/cve/CVE-2022-49434.html * https://www.suse.com/security/cve/CVE-2022-49435.html * https://www.suse.com/security/cve/CVE-2022-49436.html * https://www.suse.com/security/cve/CVE-2022-49437.html * https://www.suse.com/security/cve/CVE-2022-49438.html * https://www.suse.com/security/cve/CVE-2022-49440.html * https://www.suse.com/security/cve/CVE-2022-49441.html * https://www.suse.com/security/cve/CVE-2022-49442.html * https://www.suse.com/security/cve/CVE-2022-49443.html * https://www.suse.com/security/cve/CVE-2022-49444.html * https://www.suse.com/security/cve/CVE-2022-49445.html * https://www.suse.com/security/cve/CVE-2022-49446.html * https://www.suse.com/security/cve/CVE-2022-49447.html * https://www.suse.com/security/cve/CVE-2022-49448.html * https://www.suse.com/security/cve/CVE-2022-49449.html * https://www.suse.com/security/cve/CVE-2022-49451.html * https://www.suse.com/security/cve/CVE-2022-49453.html * https://www.suse.com/security/cve/CVE-2022-49455.html * https://www.suse.com/security/cve/CVE-2022-49458.html * https://www.suse.com/security/cve/CVE-2022-49459.html * https://www.suse.com/security/cve/CVE-2022-49460.html * https://www.suse.com/security/cve/CVE-2022-49462.html * https://www.suse.com/security/cve/CVE-2022-49463.html * https://www.suse.com/security/cve/CVE-2022-49465.html * https://www.suse.com/security/cve/CVE-2022-49466.html * https://www.suse.com/security/cve/CVE-2022-49467.html * https://www.suse.com/security/cve/CVE-2022-49468.html * https://www.suse.com/security/cve/CVE-2022-49470.html * https://www.suse.com/security/cve/CVE-2022-49472.html * https://www.suse.com/security/cve/CVE-2022-49473.html * https://www.suse.com/security/cve/CVE-2022-49474.html * https://www.suse.com/security/cve/CVE-2022-49475.html * https://www.suse.com/security/cve/CVE-2022-49476.html * https://www.suse.com/security/cve/CVE-2022-49477.html * https://www.suse.com/security/cve/CVE-2022-49478.html * https://www.suse.com/security/cve/CVE-2022-49479.html * https://www.suse.com/security/cve/CVE-2022-49480.html * https://www.suse.com/security/cve/CVE-2022-49481.html * https://www.suse.com/security/cve/CVE-2022-49482.html * https://www.suse.com/security/cve/CVE-2022-49483.html * https://www.suse.com/security/cve/CVE-2022-49484.html * https://www.suse.com/security/cve/CVE-2022-49485.html * https://www.suse.com/security/cve/CVE-2022-49486.html * https://www.suse.com/security/cve/CVE-2022-49487.html * https://www.suse.com/security/cve/CVE-2022-49488.html * https://www.suse.com/security/cve/CVE-2022-49489.html * https://www.suse.com/security/cve/CVE-2022-49490.html * https://www.suse.com/security/cve/CVE-2022-49491.html * https://www.suse.com/security/cve/CVE-2022-49492.html * https://www.suse.com/security/cve/CVE-2022-49493.html * https://www.suse.com/security/cve/CVE-2022-49494.html * https://www.suse.com/security/cve/CVE-2022-49495.html * https://www.suse.com/security/cve/CVE-2022-49497.html * https://www.suse.com/security/cve/CVE-2022-49498.html * https://www.suse.com/security/cve/CVE-2022-49499.html * https://www.suse.com/security/cve/CVE-2022-49501.html * https://www.suse.com/security/cve/CVE-2022-49502.html * https://www.suse.com/security/cve/CVE-2022-49503.html * https://www.suse.com/security/cve/CVE-2022-49504.html * https://www.suse.com/security/cve/CVE-2022-49505.html * https://www.suse.com/security/cve/CVE-2022-49506.html * https://www.suse.com/security/cve/CVE-2022-49507.html * https://www.suse.com/security/cve/CVE-2022-49508.html * https://www.suse.com/security/cve/CVE-2022-49509.html * https://www.suse.com/security/cve/CVE-2022-49510.html * https://www.suse.com/security/cve/CVE-2022-49511.html * https://www.suse.com/security/cve/CVE-2022-49512.html * https://www.suse.com/security/cve/CVE-2022-49514.html * https://www.suse.com/security/cve/CVE-2022-49515.html * https://www.suse.com/security/cve/CVE-2022-49516.html * https://www.suse.com/security/cve/CVE-2022-49517.html * https://www.suse.com/security/cve/CVE-2022-49518.html * https://www.suse.com/security/cve/CVE-2022-49519.html * https://www.suse.com/security/cve/CVE-2022-49520.html * https://www.suse.com/security/cve/CVE-2022-49521.html * https://www.suse.com/security/cve/CVE-2022-49522.html * https://www.suse.com/security/cve/CVE-2022-49523.html * https://www.suse.com/security/cve/CVE-2022-49524.html * https://www.suse.com/security/cve/CVE-2022-49525.html * https://www.suse.com/security/cve/CVE-2022-49526.html * https://www.suse.com/security/cve/CVE-2022-49527.html * https://www.suse.com/security/cve/CVE-2022-49529.html * https://www.suse.com/security/cve/CVE-2022-49530.html * https://www.suse.com/security/cve/CVE-2022-49532.html * https://www.suse.com/security/cve/CVE-2022-49533.html * https://www.suse.com/security/cve/CVE-2022-49534.html * https://www.suse.com/security/cve/CVE-2022-49535.html * https://www.suse.com/security/cve/CVE-2022-49536.html * https://www.suse.com/security/cve/CVE-2022-49537.html * https://www.suse.com/security/cve/CVE-2022-49538.html * https://www.suse.com/security/cve/CVE-2022-49541.html * https://www.suse.com/security/cve/CVE-2022-49542.html * https://www.suse.com/security/cve/CVE-2022-49543.html * https://www.suse.com/security/cve/CVE-2022-49544.html * https://www.suse.com/security/cve/CVE-2022-49545.html * https://www.suse.com/security/cve/CVE-2022-49546.html * https://www.suse.com/security/cve/CVE-2022-49548.html * https://www.suse.com/security/cve/CVE-2022-49549.html * https://www.suse.com/security/cve/CVE-2022-49551.html * https://www.suse.com/security/cve/CVE-2022-49552.html * https://www.suse.com/security/cve/CVE-2022-49555.html * https://www.suse.com/security/cve/CVE-2022-49556.html * https://www.suse.com/security/cve/CVE-2022-49559.html * https://www.suse.com/security/cve/CVE-2022-49560.html * https://www.suse.com/security/cve/CVE-2022-49562.html * https://www.suse.com/security/cve/CVE-2022-49563.html * https://www.suse.com/security/cve/CVE-2022-49564.html * https://www.suse.com/security/cve/CVE-2022-49565.html * https://www.suse.com/security/cve/CVE-2022-49566.html * https://www.suse.com/security/cve/CVE-2022-49568.html * https://www.suse.com/security/cve/CVE-2022-49569.html * https://www.suse.com/security/cve/CVE-2022-49570.html * https://www.suse.com/security/cve/CVE-2022-49579.html * https://www.suse.com/security/cve/CVE-2022-49581.html * https://www.suse.com/security/cve/CVE-2022-49583.html * https://www.suse.com/security/cve/CVE-2022-49584.html * https://www.suse.com/security/cve/CVE-2022-49591.html * https://www.suse.com/security/cve/CVE-2022-49592.html * https://www.suse.com/security/cve/CVE-2022-49603.html * https://www.suse.com/security/cve/CVE-2022-49605.html * https://www.suse.com/security/cve/CVE-2022-49606.html * https://www.suse.com/security/cve/CVE-2022-49607.html * https://www.suse.com/security/cve/CVE-2022-49609.html * https://www.suse.com/security/cve/CVE-2022-49610.html * https://www.suse.com/security/cve/CVE-2022-49611.html * https://www.suse.com/security/cve/CVE-2022-49613.html * https://www.suse.com/security/cve/CVE-2022-49615.html * https://www.suse.com/security/cve/CVE-2022-49616.html * https://www.suse.com/security/cve/CVE-2022-49617.html * https://www.suse.com/security/cve/CVE-2022-49618.html * https://www.suse.com/security/cve/CVE-2022-49621.html * https://www.suse.com/security/cve/CVE-2022-49623.html * https://www.suse.com/security/cve/CVE-2022-49624.html * https://www.suse.com/security/cve/CVE-2022-49625.html * https://www.suse.com/security/cve/CVE-2022-49626.html * https://www.suse.com/security/cve/CVE-2022-49627.html * https://www.suse.com/security/cve/CVE-2022-49628.html * https://www.suse.com/security/cve/CVE-2022-49631.html * https://www.suse.com/security/cve/CVE-2022-49634.html * https://www.suse.com/security/cve/CVE-2022-49635.html * https://www.suse.com/security/cve/CVE-2022-49638.html * https://www.suse.com/security/cve/CVE-2022-49640.html * https://www.suse.com/security/cve/CVE-2022-49641.html * https://www.suse.com/security/cve/CVE-2022-49642.html * https://www.suse.com/security/cve/CVE-2022-49643.html * https://www.suse.com/security/cve/CVE-2022-49644.html * https://www.suse.com/security/cve/CVE-2022-49645.html * https://www.suse.com/security/cve/CVE-2022-49646.html * https://www.suse.com/security/cve/CVE-2022-49647.html * https://www.suse.com/security/cve/CVE-2022-49648.html * https://www.suse.com/security/cve/CVE-2022-49649.html * https://www.suse.com/security/cve/CVE-2022-49650.html * https://www.suse.com/security/cve/CVE-2022-49652.html * https://www.suse.com/security/cve/CVE-2022-49653.html * https://www.suse.com/security/cve/CVE-2022-49655.html * https://www.suse.com/security/cve/CVE-2022-49656.html * https://www.suse.com/security/cve/CVE-2022-49657.html * https://www.suse.com/security/cve/CVE-2022-49658.html * https://www.suse.com/security/cve/CVE-2022-49661.html * https://www.suse.com/security/cve/CVE-2022-49663.html * https://www.suse.com/security/cve/CVE-2022-49665.html * https://www.suse.com/security/cve/CVE-2022-49667.html * https://www.suse.com/security/cve/CVE-2022-49668.html * https://www.suse.com/security/cve/CVE-2022-49670.html * https://www.suse.com/security/cve/CVE-2022-49671.html * https://www.suse.com/security/cve/CVE-2022-49672.html * https://www.suse.com/security/cve/CVE-2022-49673.html * https://www.suse.com/security/cve/CVE-2022-49674.html * https://www.suse.com/security/cve/CVE-2022-49675.html * https://www.suse.com/security/cve/CVE-2022-49676.html * https://www.suse.com/security/cve/CVE-2022-49677.html * https://www.suse.com/security/cve/CVE-2022-49678.html * https://www.suse.com/security/cve/CVE-2022-49679.html * https://www.suse.com/security/cve/CVE-2022-49680.html * https://www.suse.com/security/cve/CVE-2022-49683.html * https://www.suse.com/security/cve/CVE-2022-49685.html * https://www.suse.com/security/cve/CVE-2022-49686.html * https://www.suse.com/security/cve/CVE-2022-49687.html * https://www.suse.com/security/cve/CVE-2022-49688.html * https://www.suse.com/security/cve/CVE-2022-49693.html * https://www.suse.com/security/cve/CVE-2022-49694.html * https://www.suse.com/security/cve/CVE-2022-49695.html * https://www.suse.com/security/cve/CVE-2022-49697.html * https://www.suse.com/security/cve/CVE-2022-49699.html * https://www.suse.com/security/cve/CVE-2022-49700.html * https://www.suse.com/security/cve/CVE-2022-49701.html * https://www.suse.com/security/cve/CVE-2022-49703.html * https://www.suse.com/security/cve/CVE-2022-49704.html * https://www.suse.com/security/cve/CVE-2022-49705.html * https://www.suse.com/security/cve/CVE-2022-49707.html * https://www.suse.com/security/cve/CVE-2022-49708.html * https://www.suse.com/security/cve/CVE-2022-49710.html * https://www.suse.com/security/cve/CVE-2022-49711.html * https://www.suse.com/security/cve/CVE-2022-49712.html * https://www.suse.com/security/cve/CVE-2022-49713.html * https://www.suse.com/security/cve/CVE-2022-49714.html * https://www.suse.com/security/cve/CVE-2022-49715.html * https://www.suse.com/security/cve/CVE-2022-49716.html * https://www.suse.com/security/cve/CVE-2022-49719.html * https://www.suse.com/security/cve/CVE-2022-49720.html * https://www.suse.com/security/cve/CVE-2022-49721.html * https://www.suse.com/security/cve/CVE-2022-49722.html * https://www.suse.com/security/cve/CVE-2022-49723.html * https://www.suse.com/security/cve/CVE-2022-49724.html * https://www.suse.com/security/cve/CVE-2022-49725.html * https://www.suse.com/security/cve/CVE-2022-49726.html * https://www.suse.com/security/cve/CVE-2022-49729.html * https://www.suse.com/security/cve/CVE-2022-49730.html * https://www.suse.com/security/cve/CVE-2022-49731.html * https://www.suse.com/security/cve/CVE-2022-49732.html * https://www.suse.com/security/cve/CVE-2022-49733.html * https://www.suse.com/security/cve/CVE-2022-49739.html * https://www.suse.com/security/cve/CVE-2022-49746.html * https://www.suse.com/security/cve/CVE-2022-49748.html * https://www.suse.com/security/cve/CVE-2022-49751.html * https://www.suse.com/security/cve/CVE-2022-49753.html * https://www.suse.com/security/cve/CVE-2022-49755.html * https://www.suse.com/security/cve/CVE-2022-49759.html * https://www.suse.com/security/cve/CVE-2023-0179.html * https://www.suse.com/security/cve/CVE-2023-1652.html * https://www.suse.com/security/cve/CVE-2023-2162.html * https://www.suse.com/security/cve/CVE-2023-28410.html * https://www.suse.com/security/cve/CVE-2023-3567.html * https://www.suse.com/security/cve/CVE-2023-52930.html * https://www.suse.com/security/cve/CVE-2023-52933.html * https://www.suse.com/security/cve/CVE-2023-52935.html * https://www.suse.com/security/cve/CVE-2023-52939.html * https://www.suse.com/security/cve/CVE-2023-52941.html * https://www.suse.com/security/cve/CVE-2023-52973.html * https://www.suse.com/security/cve/CVE-2023-52974.html * https://www.suse.com/security/cve/CVE-2023-52975.html * https://www.suse.com/security/cve/CVE-2023-52976.html * https://www.suse.com/security/cve/CVE-2023-52979.html * https://www.suse.com/security/cve/CVE-2023-52983.html * https://www.suse.com/security/cve/CVE-2023-52984.html * https://www.suse.com/security/cve/CVE-2023-52988.html * https://www.suse.com/security/cve/CVE-2023-52989.html * https://www.suse.com/security/cve/CVE-2023-52992.html * https://www.suse.com/security/cve/CVE-2023-52993.html * https://www.suse.com/security/cve/CVE-2023-53000.html * https://www.suse.com/security/cve/CVE-2023-53005.html * https://www.suse.com/security/cve/CVE-2023-53006.html * https://www.suse.com/security/cve/CVE-2023-53007.html * https://www.suse.com/security/cve/CVE-2023-53008.html * https://www.suse.com/security/cve/CVE-2023-53010.html * https://www.suse.com/security/cve/CVE-2023-53015.html * https://www.suse.com/security/cve/CVE-2023-53016.html * https://www.suse.com/security/cve/CVE-2023-53019.html * https://www.suse.com/security/cve/CVE-2023-53023.html * https://www.suse.com/security/cve/CVE-2023-53024.html * https://www.suse.com/security/cve/CVE-2023-53025.html * https://www.suse.com/security/cve/CVE-2023-53026.html * https://www.suse.com/security/cve/CVE-2023-53028.html * https://www.suse.com/security/cve/CVE-2023-53029.html * https://www.suse.com/security/cve/CVE-2023-53030.html * https://www.suse.com/security/cve/CVE-2023-53033.html * https://www.suse.com/security/cve/CVE-2024-26634.html * https://www.suse.com/security/cve/CVE-2024-47678.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53124.html * https://www.suse.com/security/cve/CVE-2024-53176.html * https://www.suse.com/security/cve/CVE-2024-53178.html * https://www.suse.com/security/cve/CVE-2024-56651.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58013.html * https://www.suse.com/security/cve/CVE-2024-58014.html * https://www.suse.com/security/cve/CVE-2025-21693.html * https://www.suse.com/security/cve/CVE-2025-21718.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21780.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1180814 * https://bugzilla.suse.com/show_bug.cgi?id=1183682 * https://bugzilla.suse.com/show_bug.cgi?id=1190336 * https://bugzilla.suse.com/show_bug.cgi?id=1190768 * https://bugzilla.suse.com/show_bug.cgi?id=1190786 * https://bugzilla.suse.com/show_bug.cgi?id=1193629 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1194904 * https://bugzilla.suse.com/show_bug.cgi?id=1195823 * https://bugzilla.suse.com/show_bug.cgi?id=1196444 * https://bugzilla.suse.com/show_bug.cgi?id=1197158 * https://bugzilla.suse.com/show_bug.cgi?id=1197174 * https://bugzilla.suse.com/show_bug.cgi?id=1197227 * https://bugzilla.suse.com/show_bug.cgi?id=1197246 * https://bugzilla.suse.com/show_bug.cgi?id=1197302 * https://bugzilla.suse.com/show_bug.cgi?id=1197331 * https://bugzilla.suse.com/show_bug.cgi?id=1197472 * https://bugzilla.suse.com/show_bug.cgi?id=1197661 * https://bugzilla.suse.com/show_bug.cgi?id=1197926 * https://bugzilla.suse.com/show_bug.cgi?id=1198019 * https://bugzilla.suse.com/show_bug.cgi?id=1198021 * https://bugzilla.suse.com/show_bug.cgi?id=1198240 * https://bugzilla.suse.com/show_bug.cgi?id=1198577 * https://bugzilla.suse.com/show_bug.cgi?id=1198660 * https://bugzilla.suse.com/show_bug.cgi?id=1199657 * https://bugzilla.suse.com/show_bug.cgi?id=1200045 * https://bugzilla.suse.com/show_bug.cgi?id=1200571 * https://bugzilla.suse.com/show_bug.cgi?id=1200807 * https://bugzilla.suse.com/show_bug.cgi?id=1200809 * https://bugzilla.suse.com/show_bug.cgi?id=1200810 * https://bugzilla.suse.com/show_bug.cgi?id=1200824 * https://bugzilla.suse.com/show_bug.cgi?id=1200825 * https://bugzilla.suse.com/show_bug.cgi?id=1200871 * https://bugzilla.suse.com/show_bug.cgi?id=1200872 * https://bugzilla.suse.com/show_bug.cgi?id=1201193 * https://bugzilla.suse.com/show_bug.cgi?id=1201218 * https://bugzilla.suse.com/show_bug.cgi?id=1201323 * https://bugzilla.suse.com/show_bug.cgi?id=1201381 * https://bugzilla.suse.com/show_bug.cgi?id=1201610 * https://bugzilla.suse.com/show_bug.cgi?id=1202672 * https://bugzilla.suse.com/show_bug.cgi?id=1202711 * https://bugzilla.suse.com/show_bug.cgi?id=1202712 * https://bugzilla.suse.com/show_bug.cgi?id=1202771 * https://bugzilla.suse.com/show_bug.cgi?id=1202774 * https://bugzilla.suse.com/show_bug.cgi?id=1202778 * https://bugzilla.suse.com/show_bug.cgi?id=1202781 * https://bugzilla.suse.com/show_bug.cgi?id=1203699 * https://bugzilla.suse.com/show_bug.cgi?id=1203769 * https://bugzilla.suse.com/show_bug.cgi?id=1204171 * https://bugzilla.suse.com/show_bug.cgi?id=1205205 * https://bugzilla.suse.com/show_bug.cgi?id=1205701 * https://bugzilla.suse.com/show_bug.cgi?id=1206048 * https://bugzilla.suse.com/show_bug.cgi?id=1206049 * https://bugzilla.suse.com/show_bug.cgi?id=1206451 * https://bugzilla.suse.com/show_bug.cgi?id=1207034 * https://bugzilla.suse.com/show_bug.cgi?id=1207186 * https://bugzilla.suse.com/show_bug.cgi?id=1207361 * https://bugzilla.suse.com/show_bug.cgi?id=1207593 * https://bugzilla.suse.com/show_bug.cgi?id=1207640 * https://bugzilla.suse.com/show_bug.cgi?id=1207878 * https://bugzilla.suse.com/show_bug.cgi?id=1209262 * https://bugzilla.suse.com/show_bug.cgi?id=1209547 * https://bugzilla.suse.com/show_bug.cgi?id=1209788 * https://bugzilla.suse.com/show_bug.cgi?id=1209980 * https://bugzilla.suse.com/show_bug.cgi?id=1210050 * https://bugzilla.suse.com/show_bug.cgi?id=1210647 * https://bugzilla.suse.com/show_bug.cgi?id=1211263 * https://bugzilla.suse.com/show_bug.cgi?id=1213167 * https://bugzilla.suse.com/show_bug.cgi?id=1218450 * https://bugzilla.suse.com/show_bug.cgi?id=1221651 * https://bugzilla.suse.com/show_bug.cgi?id=1225428 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1229312 * https://bugzilla.suse.com/show_bug.cgi?id=1231375 * https://bugzilla.suse.com/show_bug.cgi?id=1231432 * https://bugzilla.suse.com/show_bug.cgi?id=1231854 * https://bugzilla.suse.com/show_bug.cgi?id=1232299 * https://bugzilla.suse.com/show_bug.cgi?id=1232743 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233749 * https://bugzilla.suse.com/show_bug.cgi?id=1234074 * https://bugzilla.suse.com/show_bug.cgi?id=1234894 * https://bugzilla.suse.com/show_bug.cgi?id=1234895 * https://bugzilla.suse.com/show_bug.cgi?id=1234896 * https://bugzilla.suse.com/show_bug.cgi?id=1235528 * https://bugzilla.suse.com/show_bug.cgi?id=1235599 * https://bugzilla.suse.com/show_bug.cgi?id=1235870 * https://bugzilla.suse.com/show_bug.cgi?id=1237029 * https://bugzilla.suse.com/show_bug.cgi?id=1237521 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237718 * https://bugzilla.suse.com/show_bug.cgi?id=1237721 * https://bugzilla.suse.com/show_bug.cgi?id=1237722 * https://bugzilla.suse.com/show_bug.cgi?id=1237723 * https://bugzilla.suse.com/show_bug.cgi?id=1237724 * https://bugzilla.suse.com/show_bug.cgi?id=1237725 * https://bugzilla.suse.com/show_bug.cgi?id=1237726 * https://bugzilla.suse.com/show_bug.cgi?id=1237727 * https://bugzilla.suse.com/show_bug.cgi?id=1237728 * https://bugzilla.suse.com/show_bug.cgi?id=1237729 * https://bugzilla.suse.com/show_bug.cgi?id=1237730 * https://bugzilla.suse.com/show_bug.cgi?id=1237733 * https://bugzilla.suse.com/show_bug.cgi?id=1237734 * https://bugzilla.suse.com/show_bug.cgi?id=1237735 * https://bugzilla.suse.com/show_bug.cgi?id=1237736 * https://bugzilla.suse.com/show_bug.cgi?id=1237737 * https://bugzilla.suse.com/show_bug.cgi?id=1237738 * https://bugzilla.suse.com/show_bug.cgi?id=1237739 * https://bugzilla.suse.com/show_bug.cgi?id=1237740 * https://bugzilla.suse.com/show_bug.cgi?id=1237742 * https://bugzilla.suse.com/show_bug.cgi?id=1237743 * https://bugzilla.suse.com/show_bug.cgi?id=1237744 * https://bugzilla.suse.com/show_bug.cgi?id=1237745 * https://bugzilla.suse.com/show_bug.cgi?id=1237746 * https://bugzilla.suse.com/show_bug.cgi?id=1237748 * https://bugzilla.suse.com/show_bug.cgi?id=1237749 * https://bugzilla.suse.com/show_bug.cgi?id=1237751 * https://bugzilla.suse.com/show_bug.cgi?id=1237752 * https://bugzilla.suse.com/show_bug.cgi?id=1237753 * https://bugzilla.suse.com/show_bug.cgi?id=1237755 * https://bugzilla.suse.com/show_bug.cgi?id=1237759 * https://bugzilla.suse.com/show_bug.cgi?id=1237761 * https://bugzilla.suse.com/show_bug.cgi?id=1237763 * https://bugzilla.suse.com/show_bug.cgi?id=1237766 * https://bugzilla.suse.com/show_bug.cgi?id=1237767 * https://bugzilla.suse.com/show_bug.cgi?id=1237768 * https://bugzilla.suse.com/show_bug.cgi?id=1237774 * https://bugzilla.suse.com/show_bug.cgi?id=1237775 * https://bugzilla.suse.com/show_bug.cgi?id=1237778 * https://bugzilla.suse.com/show_bug.cgi?id=1237779 * https://bugzilla.suse.com/show_bug.cgi?id=1237780 * https://bugzilla.suse.com/show_bug.cgi?id=1237782 * https://bugzilla.suse.com/show_bug.cgi?id=1237783 * https://bugzilla.suse.com/show_bug.cgi?id=1237784 * https://bugzilla.suse.com/show_bug.cgi?id=1237785 * https://bugzilla.suse.com/show_bug.cgi?id=1237786 * https://bugzilla.suse.com/show_bug.cgi?id=1237787 * https://bugzilla.suse.com/show_bug.cgi?id=1237788 * https://bugzilla.suse.com/show_bug.cgi?id=1237789 * https://bugzilla.suse.com/show_bug.cgi?id=1237790 * https://bugzilla.suse.com/show_bug.cgi?id=1237792 * https://bugzilla.suse.com/show_bug.cgi?id=1237794 * https://bugzilla.suse.com/show_bug.cgi?id=1237795 * https://bugzilla.suse.com/show_bug.cgi?id=1237797 * https://bugzilla.suse.com/show_bug.cgi?id=1237798 * https://bugzilla.suse.com/show_bug.cgi?id=1237799 * https://bugzilla.suse.com/show_bug.cgi?id=1237807 * https://bugzilla.suse.com/show_bug.cgi?id=1237808 * https://bugzilla.suse.com/show_bug.cgi?id=1237809 * https://bugzilla.suse.com/show_bug.cgi?id=1237810 * https://bugzilla.suse.com/show_bug.cgi?id=1237812 * https://bugzilla.suse.com/show_bug.cgi?id=1237813 * https://bugzilla.suse.com/show_bug.cgi?id=1237814 * https://bugzilla.suse.com/show_bug.cgi?id=1237815 * https://bugzilla.suse.com/show_bug.cgi?id=1237816 * https://bugzilla.suse.com/show_bug.cgi?id=1237817 * https://bugzilla.suse.com/show_bug.cgi?id=1237818 * https://bugzilla.suse.com/show_bug.cgi?id=1237820 * https://bugzilla.suse.com/show_bug.cgi?id=1237821 * https://bugzilla.suse.com/show_bug.cgi?id=1237823 * https://bugzilla.suse.com/show_bug.cgi?id=1237824 * https://bugzilla.suse.com/show_bug.cgi?id=1237826 * https://bugzilla.suse.com/show_bug.cgi?id=1237827 * https://bugzilla.suse.com/show_bug.cgi?id=1237829 * https://bugzilla.suse.com/show_bug.cgi?id=1237831 * https://bugzilla.suse.com/show_bug.cgi?id=1237835 * https://bugzilla.suse.com/show_bug.cgi?id=1237836 * https://bugzilla.suse.com/show_bug.cgi?id=1237837 * https://bugzilla.suse.com/show_bug.cgi?id=1237839 * https://bugzilla.suse.com/show_bug.cgi?id=1237840 * https://bugzilla.suse.com/show_bug.cgi?id=1237845 * https://bugzilla.suse.com/show_bug.cgi?id=1237846 * https://bugzilla.suse.com/show_bug.cgi?id=1237868 * https://bugzilla.suse.com/show_bug.cgi?id=1237872 * https://bugzilla.suse.com/show_bug.cgi?id=1237892 * https://bugzilla.suse.com/show_bug.cgi?id=1237903 * https://bugzilla.suse.com/show_bug.cgi?id=1237904 * https://bugzilla.suse.com/show_bug.cgi?id=1237916 * https://bugzilla.suse.com/show_bug.cgi?id=1237918 * https://bugzilla.suse.com/show_bug.cgi?id=1237922 * https://bugzilla.suse.com/show_bug.cgi?id=1237925 * https://bugzilla.suse.com/show_bug.cgi?id=1237926 * https://bugzilla.suse.com/show_bug.cgi?id=1237927 * https://bugzilla.suse.com/show_bug.cgi?id=1237928 * https://bugzilla.suse.com/show_bug.cgi?id=1237929 * https://bugzilla.suse.com/show_bug.cgi?id=1237931 * https://bugzilla.suse.com/show_bug.cgi?id=1237932 * https://bugzilla.suse.com/show_bug.cgi?id=1237933 * https://bugzilla.suse.com/show_bug.cgi?id=1237937 * https://bugzilla.suse.com/show_bug.cgi?id=1237940 * https://bugzilla.suse.com/show_bug.cgi?id=1237941 * https://bugzilla.suse.com/show_bug.cgi?id=1237942 * https://bugzilla.suse.com/show_bug.cgi?id=1237946 * https://bugzilla.suse.com/show_bug.cgi?id=1237951 * https://bugzilla.suse.com/show_bug.cgi?id=1237952 * https://bugzilla.suse.com/show_bug.cgi?id=1237954 * https://bugzilla.suse.com/show_bug.cgi?id=1237955 * https://bugzilla.suse.com/show_bug.cgi?id=1237957 * https://bugzilla.suse.com/show_bug.cgi?id=1237958 * https://bugzilla.suse.com/show_bug.cgi?id=1237959 * https://bugzilla.suse.com/show_bug.cgi?id=1237960 * https://bugzilla.suse.com/show_bug.cgi?id=1237961 * https://bugzilla.suse.com/show_bug.cgi?id=1237962 * https://bugzilla.suse.com/show_bug.cgi?id=1237963 * https://bugzilla.suse.com/show_bug.cgi?id=1237965 * https://bugzilla.suse.com/show_bug.cgi?id=1237966 * https://bugzilla.suse.com/show_bug.cgi?id=1237967 * https://bugzilla.suse.com/show_bug.cgi?id=1237968 * https://bugzilla.suse.com/show_bug.cgi?id=1237969 * https://bugzilla.suse.com/show_bug.cgi?id=1237970 * https://bugzilla.suse.com/show_bug.cgi?id=1237971 * https://bugzilla.suse.com/show_bug.cgi?id=1237972 * https://bugzilla.suse.com/show_bug.cgi?id=1237973 * https://bugzilla.suse.com/show_bug.cgi?id=1237975 * https://bugzilla.suse.com/show_bug.cgi?id=1237976 * https://bugzilla.suse.com/show_bug.cgi?id=1237978 * https://bugzilla.suse.com/show_bug.cgi?id=1237979 * https://bugzilla.suse.com/show_bug.cgi?id=1237980 * https://bugzilla.suse.com/show_bug.cgi?id=1237982 * https://bugzilla.suse.com/show_bug.cgi?id=1237983 * https://bugzilla.suse.com/show_bug.cgi?id=1237984 * https://bugzilla.suse.com/show_bug.cgi?id=1237986 * https://bugzilla.suse.com/show_bug.cgi?id=1237987 * https://bugzilla.suse.com/show_bug.cgi?id=1237990 * https://bugzilla.suse.com/show_bug.cgi?id=1237992 * https://bugzilla.suse.com/show_bug.cgi?id=1237996 * https://bugzilla.suse.com/show_bug.cgi?id=1237997 * https://bugzilla.suse.com/show_bug.cgi?id=1237998 * https://bugzilla.suse.com/show_bug.cgi?id=1237999 * https://bugzilla.suse.com/show_bug.cgi?id=1238000 * https://bugzilla.suse.com/show_bug.cgi?id=1238003 * https://bugzilla.suse.com/show_bug.cgi?id=1238004 * https://bugzilla.suse.com/show_bug.cgi?id=1238005 * https://bugzilla.suse.com/show_bug.cgi?id=1238006 * https://bugzilla.suse.com/show_bug.cgi?id=1238007 * https://bugzilla.suse.com/show_bug.cgi?id=1238009 * https://bugzilla.suse.com/show_bug.cgi?id=1238010 * https://bugzilla.suse.com/show_bug.cgi?id=1238011 * https://bugzilla.suse.com/show_bug.cgi?id=1238012 * https://bugzilla.suse.com/show_bug.cgi?id=1238013 * https://bugzilla.suse.com/show_bug.cgi?id=1238014 * https://bugzilla.suse.com/show_bug.cgi?id=1238016 * https://bugzilla.suse.com/show_bug.cgi?id=1238017 * https://bugzilla.suse.com/show_bug.cgi?id=1238018 * https://bugzilla.suse.com/show_bug.cgi?id=1238019 * https://bugzilla.suse.com/show_bug.cgi?id=1238021 * https://bugzilla.suse.com/show_bug.cgi?id=1238022 * https://bugzilla.suse.com/show_bug.cgi?id=1238024 * https://bugzilla.suse.com/show_bug.cgi?id=1238025 * https://bugzilla.suse.com/show_bug.cgi?id=1238030 * https://bugzilla.suse.com/show_bug.cgi?id=1238032 * https://bugzilla.suse.com/show_bug.cgi?id=1238036 * https://bugzilla.suse.com/show_bug.cgi?id=1238037 * https://bugzilla.suse.com/show_bug.cgi?id=1238041 * https://bugzilla.suse.com/show_bug.cgi?id=1238046 * https://bugzilla.suse.com/show_bug.cgi?id=1238047 * https://bugzilla.suse.com/show_bug.cgi?id=1238048 * https://bugzilla.suse.com/show_bug.cgi?id=1238069 * https://bugzilla.suse.com/show_bug.cgi?id=1238071 * https://bugzilla.suse.com/show_bug.cgi?id=1238077 * https://bugzilla.suse.com/show_bug.cgi?id=1238079 * https://bugzilla.suse.com/show_bug.cgi?id=1238080 * https://bugzilla.suse.com/show_bug.cgi?id=1238083 * https://bugzilla.suse.com/show_bug.cgi?id=1238084 * https://bugzilla.suse.com/show_bug.cgi?id=1238085 * https://bugzilla.suse.com/show_bug.cgi?id=1238086 * https://bugzilla.suse.com/show_bug.cgi?id=1238089 * https://bugzilla.suse.com/show_bug.cgi?id=1238090 * https://bugzilla.suse.com/show_bug.cgi?id=1238091 * https://bugzilla.suse.com/show_bug.cgi?id=1238092 * https://bugzilla.suse.com/show_bug.cgi?id=1238096 * https://bugzilla.suse.com/show_bug.cgi?id=1238097 * https://bugzilla.suse.com/show_bug.cgi?id=1238099 * https://bugzilla.suse.com/show_bug.cgi?id=1238103 * https://bugzilla.suse.com/show_bug.cgi?id=1238105 * https://bugzilla.suse.com/show_bug.cgi?id=1238106 * https://bugzilla.suse.com/show_bug.cgi?id=1238107 * https://bugzilla.suse.com/show_bug.cgi?id=1238108 * https://bugzilla.suse.com/show_bug.cgi?id=1238110 * https://bugzilla.suse.com/show_bug.cgi?id=1238111 * https://bugzilla.suse.com/show_bug.cgi?id=1238112 * https://bugzilla.suse.com/show_bug.cgi?id=1238113 * https://bugzilla.suse.com/show_bug.cgi?id=1238114 * https://bugzilla.suse.com/show_bug.cgi?id=1238115 * https://bugzilla.suse.com/show_bug.cgi?id=1238116 * https://bugzilla.suse.com/show_bug.cgi?id=1238118 * https://bugzilla.suse.com/show_bug.cgi?id=1238120 * https://bugzilla.suse.com/show_bug.cgi?id=1238122 * https://bugzilla.suse.com/show_bug.cgi?id=1238123 * https://bugzilla.suse.com/show_bug.cgi?id=1238125 * https://bugzilla.suse.com/show_bug.cgi?id=1238126 * https://bugzilla.suse.com/show_bug.cgi?id=1238127 * https://bugzilla.suse.com/show_bug.cgi?id=1238128 * https://bugzilla.suse.com/show_bug.cgi?id=1238131 * https://bugzilla.suse.com/show_bug.cgi?id=1238134 * https://bugzilla.suse.com/show_bug.cgi?id=1238135 * https://bugzilla.suse.com/show_bug.cgi?id=1238138 * https://bugzilla.suse.com/show_bug.cgi?id=1238139 * https://bugzilla.suse.com/show_bug.cgi?id=1238140 * https://bugzilla.suse.com/show_bug.cgi?id=1238142 * https://bugzilla.suse.com/show_bug.cgi?id=1238144 * https://bugzilla.suse.com/show_bug.cgi?id=1238146 * https://bugzilla.suse.com/show_bug.cgi?id=1238147 * https://bugzilla.suse.com/show_bug.cgi?id=1238149 * https://bugzilla.suse.com/show_bug.cgi?id=1238150 * https://bugzilla.suse.com/show_bug.cgi?id=1238153 * https://bugzilla.suse.com/show_bug.cgi?id=1238155 * https://bugzilla.suse.com/show_bug.cgi?id=1238156 * https://bugzilla.suse.com/show_bug.cgi?id=1238157 * https://bugzilla.suse.com/show_bug.cgi?id=1238158 * https://bugzilla.suse.com/show_bug.cgi?id=1238160 * https://bugzilla.suse.com/show_bug.cgi?id=1238162 * https://bugzilla.suse.com/show_bug.cgi?id=1238166 * https://bugzilla.suse.com/show_bug.cgi?id=1238167 * https://bugzilla.suse.com/show_bug.cgi?id=1238168 * https://bugzilla.suse.com/show_bug.cgi?id=1238169 * https://bugzilla.suse.com/show_bug.cgi?id=1238170 * https://bugzilla.suse.com/show_bug.cgi?id=1238171 * https://bugzilla.suse.com/show_bug.cgi?id=1238172 * https://bugzilla.suse.com/show_bug.cgi?id=1238175 * https://bugzilla.suse.com/show_bug.cgi?id=1238176 * https://bugzilla.suse.com/show_bug.cgi?id=1238177 * https://bugzilla.suse.com/show_bug.cgi?id=1238178 * https://bugzilla.suse.com/show_bug.cgi?id=1238179 * https://bugzilla.suse.com/show_bug.cgi?id=1238180 * https://bugzilla.suse.com/show_bug.cgi?id=1238181 * https://bugzilla.suse.com/show_bug.cgi?id=1238183 * https://bugzilla.suse.com/show_bug.cgi?id=1238184 * https://bugzilla.suse.com/show_bug.cgi?id=1238187 * https://bugzilla.suse.com/show_bug.cgi?id=1238221 * https://bugzilla.suse.com/show_bug.cgi?id=1238222 * https://bugzilla.suse.com/show_bug.cgi?id=1238226 * https://bugzilla.suse.com/show_bug.cgi?id=1238228 * https://bugzilla.suse.com/show_bug.cgi?id=1238229 * https://bugzilla.suse.com/show_bug.cgi?id=1238231 * https://bugzilla.suse.com/show_bug.cgi?id=1238233 * https://bugzilla.suse.com/show_bug.cgi?id=1238234 * https://bugzilla.suse.com/show_bug.cgi?id=1238235 * https://bugzilla.suse.com/show_bug.cgi?id=1238236 * https://bugzilla.suse.com/show_bug.cgi?id=1238238 * https://bugzilla.suse.com/show_bug.cgi?id=1238239 * https://bugzilla.suse.com/show_bug.cgi?id=1238240 * https://bugzilla.suse.com/show_bug.cgi?id=1238241 * https://bugzilla.suse.com/show_bug.cgi?id=1238242 * https://bugzilla.suse.com/show_bug.cgi?id=1238243 * https://bugzilla.suse.com/show_bug.cgi?id=1238244 * https://bugzilla.suse.com/show_bug.cgi?id=1238246 * https://bugzilla.suse.com/show_bug.cgi?id=1238247 * https://bugzilla.suse.com/show_bug.cgi?id=1238248 * https://bugzilla.suse.com/show_bug.cgi?id=1238249 * https://bugzilla.suse.com/show_bug.cgi?id=1238252 * https://bugzilla.suse.com/show_bug.cgi?id=1238253 * https://bugzilla.suse.com/show_bug.cgi?id=1238255 * https://bugzilla.suse.com/show_bug.cgi?id=1238256 * https://bugzilla.suse.com/show_bug.cgi?id=1238257 * https://bugzilla.suse.com/show_bug.cgi?id=1238260 * https://bugzilla.suse.com/show_bug.cgi?id=1238261 * https://bugzilla.suse.com/show_bug.cgi?id=1238262 * https://bugzilla.suse.com/show_bug.cgi?id=1238263 * https://bugzilla.suse.com/show_bug.cgi?id=1238264 * https://bugzilla.suse.com/show_bug.cgi?id=1238266 * https://bugzilla.suse.com/show_bug.cgi?id=1238267 * https://bugzilla.suse.com/show_bug.cgi?id=1238268 * https://bugzilla.suse.com/show_bug.cgi?id=1238269 * https://bugzilla.suse.com/show_bug.cgi?id=1238270 * https://bugzilla.suse.com/show_bug.cgi?id=1238271 * https://bugzilla.suse.com/show_bug.cgi?id=1238272 * https://bugzilla.suse.com/show_bug.cgi?id=1238274 * https://bugzilla.suse.com/show_bug.cgi?id=1238275 * https://bugzilla.suse.com/show_bug.cgi?id=1238276 * https://bugzilla.suse.com/show_bug.cgi?id=1238277 * https://bugzilla.suse.com/show_bug.cgi?id=1238278 * https://bugzilla.suse.com/show_bug.cgi?id=1238279 * https://bugzilla.suse.com/show_bug.cgi?id=1238281 * https://bugzilla.suse.com/show_bug.cgi?id=1238282 * https://bugzilla.suse.com/show_bug.cgi?id=1238283 * https://bugzilla.suse.com/show_bug.cgi?id=1238284 * https://bugzilla.suse.com/show_bug.cgi?id=1238285 * https://bugzilla.suse.com/show_bug.cgi?id=1238286 * https://bugzilla.suse.com/show_bug.cgi?id=1238287 * https://bugzilla.suse.com/show_bug.cgi?id=1238288 * https://bugzilla.suse.com/show_bug.cgi?id=1238289 * https://bugzilla.suse.com/show_bug.cgi?id=1238291 * https://bugzilla.suse.com/show_bug.cgi?id=1238292 * https://bugzilla.suse.com/show_bug.cgi?id=1238293 * https://bugzilla.suse.com/show_bug.cgi?id=1238295 * https://bugzilla.suse.com/show_bug.cgi?id=1238298 * https://bugzilla.suse.com/show_bug.cgi?id=1238300 * https://bugzilla.suse.com/show_bug.cgi?id=1238301 * https://bugzilla.suse.com/show_bug.cgi?id=1238302 * https://bugzilla.suse.com/show_bug.cgi?id=1238306 * https://bugzilla.suse.com/show_bug.cgi?id=1238307 * https://bugzilla.suse.com/show_bug.cgi?id=1238308 * https://bugzilla.suse.com/show_bug.cgi?id=1238309 * https://bugzilla.suse.com/show_bug.cgi?id=1238311 * https://bugzilla.suse.com/show_bug.cgi?id=1238313 * https://bugzilla.suse.com/show_bug.cgi?id=1238326 * https://bugzilla.suse.com/show_bug.cgi?id=1238327 * https://bugzilla.suse.com/show_bug.cgi?id=1238328 * https://bugzilla.suse.com/show_bug.cgi?id=1238329 * https://bugzilla.suse.com/show_bug.cgi?id=1238331 * https://bugzilla.suse.com/show_bug.cgi?id=1238333 * https://bugzilla.suse.com/show_bug.cgi?id=1238334 * https://bugzilla.suse.com/show_bug.cgi?id=1238335 * https://bugzilla.suse.com/show_bug.cgi?id=1238336 * https://bugzilla.suse.com/show_bug.cgi?id=1238337 * https://bugzilla.suse.com/show_bug.cgi?id=1238338 * https://bugzilla.suse.com/show_bug.cgi?id=1238339 * https://bugzilla.suse.com/show_bug.cgi?id=1238341 * https://bugzilla.suse.com/show_bug.cgi?id=1238343 * https://bugzilla.suse.com/show_bug.cgi?id=1238344 * https://bugzilla.suse.com/show_bug.cgi?id=1238345 * https://bugzilla.suse.com/show_bug.cgi?id=1238372 * https://bugzilla.suse.com/show_bug.cgi?id=1238373 * https://bugzilla.suse.com/show_bug.cgi?id=1238374 * https://bugzilla.suse.com/show_bug.cgi?id=1238376 * https://bugzilla.suse.com/show_bug.cgi?id=1238377 * https://bugzilla.suse.com/show_bug.cgi?id=1238378 * https://bugzilla.suse.com/show_bug.cgi?id=1238381 * https://bugzilla.suse.com/show_bug.cgi?id=1238382 * https://bugzilla.suse.com/show_bug.cgi?id=1238383 * https://bugzilla.suse.com/show_bug.cgi?id=1238385 * https://bugzilla.suse.com/show_bug.cgi?id=1238386 * https://bugzilla.suse.com/show_bug.cgi?id=1238387 * https://bugzilla.suse.com/show_bug.cgi?id=1238388 * https://bugzilla.suse.com/show_bug.cgi?id=1238389 * https://bugzilla.suse.com/show_bug.cgi?id=1238390 * https://bugzilla.suse.com/show_bug.cgi?id=1238391 * https://bugzilla.suse.com/show_bug.cgi?id=1238392 * https://bugzilla.suse.com/show_bug.cgi?id=1238393 * https://bugzilla.suse.com/show_bug.cgi?id=1238394 * https://bugzilla.suse.com/show_bug.cgi?id=1238395 * https://bugzilla.suse.com/show_bug.cgi?id=1238396 * https://bugzilla.suse.com/show_bug.cgi?id=1238397 * https://bugzilla.suse.com/show_bug.cgi?id=1238398 * https://bugzilla.suse.com/show_bug.cgi?id=1238400 * https://bugzilla.suse.com/show_bug.cgi?id=1238401 * https://bugzilla.suse.com/show_bug.cgi?id=1238410 * https://bugzilla.suse.com/show_bug.cgi?id=1238411 * https://bugzilla.suse.com/show_bug.cgi?id=1238413 * https://bugzilla.suse.com/show_bug.cgi?id=1238415 * https://bugzilla.suse.com/show_bug.cgi?id=1238416 * https://bugzilla.suse.com/show_bug.cgi?id=1238417 * https://bugzilla.suse.com/show_bug.cgi?id=1238418 * https://bugzilla.suse.com/show_bug.cgi?id=1238419 * https://bugzilla.suse.com/show_bug.cgi?id=1238420 * https://bugzilla.suse.com/show_bug.cgi?id=1238422 * https://bugzilla.suse.com/show_bug.cgi?id=1238423 * https://bugzilla.suse.com/show_bug.cgi?id=1238424 * https://bugzilla.suse.com/show_bug.cgi?id=1238428 * https://bugzilla.suse.com/show_bug.cgi?id=1238429 * https://bugzilla.suse.com/show_bug.cgi?id=1238430 * https://bugzilla.suse.com/show_bug.cgi?id=1238431 * https://bugzilla.suse.com/show_bug.cgi?id=1238432 * https://bugzilla.suse.com/show_bug.cgi?id=1238433 * https://bugzilla.suse.com/show_bug.cgi?id=1238434 * https://bugzilla.suse.com/show_bug.cgi?id=1238435 * https://bugzilla.suse.com/show_bug.cgi?id=1238436 * https://bugzilla.suse.com/show_bug.cgi?id=1238437 * https://bugzilla.suse.com/show_bug.cgi?id=1238440 * https://bugzilla.suse.com/show_bug.cgi?id=1238441 * https://bugzilla.suse.com/show_bug.cgi?id=1238442 * https://bugzilla.suse.com/show_bug.cgi?id=1238443 * https://bugzilla.suse.com/show_bug.cgi?id=1238444 * https://bugzilla.suse.com/show_bug.cgi?id=1238445 * https://bugzilla.suse.com/show_bug.cgi?id=1238447 * https://bugzilla.suse.com/show_bug.cgi?id=1238453 * https://bugzilla.suse.com/show_bug.cgi?id=1238454 * https://bugzilla.suse.com/show_bug.cgi?id=1238458 * https://bugzilla.suse.com/show_bug.cgi?id=1238459 * https://bugzilla.suse.com/show_bug.cgi?id=1238462 * https://bugzilla.suse.com/show_bug.cgi?id=1238463 * https://bugzilla.suse.com/show_bug.cgi?id=1238465 * https://bugzilla.suse.com/show_bug.cgi?id=1238467 * https://bugzilla.suse.com/show_bug.cgi?id=1238469 * https://bugzilla.suse.com/show_bug.cgi?id=1238533 * https://bugzilla.suse.com/show_bug.cgi?id=1238536 * https://bugzilla.suse.com/show_bug.cgi?id=1238538 * https://bugzilla.suse.com/show_bug.cgi?id=1238539 * https://bugzilla.suse.com/show_bug.cgi?id=1238540 * https://bugzilla.suse.com/show_bug.cgi?id=1238542 * https://bugzilla.suse.com/show_bug.cgi?id=1238543 * https://bugzilla.suse.com/show_bug.cgi?id=1238546 * https://bugzilla.suse.com/show_bug.cgi?id=1238551 * https://bugzilla.suse.com/show_bug.cgi?id=1238552 * https://bugzilla.suse.com/show_bug.cgi?id=1238556 * https://bugzilla.suse.com/show_bug.cgi?id=1238557 * https://bugzilla.suse.com/show_bug.cgi?id=1238599 * https://bugzilla.suse.com/show_bug.cgi?id=1238600 * https://bugzilla.suse.com/show_bug.cgi?id=1238601 * https://bugzilla.suse.com/show_bug.cgi?id=1238602 * https://bugzilla.suse.com/show_bug.cgi?id=1238605 * https://bugzilla.suse.com/show_bug.cgi?id=1238612 * https://bugzilla.suse.com/show_bug.cgi?id=1238613 * https://bugzilla.suse.com/show_bug.cgi?id=1238615 * https://bugzilla.suse.com/show_bug.cgi?id=1238616 * https://bugzilla.suse.com/show_bug.cgi?id=1238617 * https://bugzilla.suse.com/show_bug.cgi?id=1238618 * https://bugzilla.suse.com/show_bug.cgi?id=1238619 * https://bugzilla.suse.com/show_bug.cgi?id=1238621 * https://bugzilla.suse.com/show_bug.cgi?id=1238623 * https://bugzilla.suse.com/show_bug.cgi?id=1238625 * https://bugzilla.suse.com/show_bug.cgi?id=1238626 * https://bugzilla.suse.com/show_bug.cgi?id=1238630 * https://bugzilla.suse.com/show_bug.cgi?id=1238631 * https://bugzilla.suse.com/show_bug.cgi?id=1238632 * https://bugzilla.suse.com/show_bug.cgi?id=1238633 * https://bugzilla.suse.com/show_bug.cgi?id=1238635 * https://bugzilla.suse.com/show_bug.cgi?id=1238636 * https://bugzilla.suse.com/show_bug.cgi?id=1238638 * https://bugzilla.suse.com/show_bug.cgi?id=1238639 * https://bugzilla.suse.com/show_bug.cgi?id=1238640 * https://bugzilla.suse.com/show_bug.cgi?id=1238641 * https://bugzilla.suse.com/show_bug.cgi?id=1238642 * https://bugzilla.suse.com/show_bug.cgi?id=1238643 * https://bugzilla.suse.com/show_bug.cgi?id=1238645 * https://bugzilla.suse.com/show_bug.cgi?id=1238646 * https://bugzilla.suse.com/show_bug.cgi?id=1238647 * https://bugzilla.suse.com/show_bug.cgi?id=1238648 * https://bugzilla.suse.com/show_bug.cgi?id=1238649 * https://bugzilla.suse.com/show_bug.cgi?id=1238650 * https://bugzilla.suse.com/show_bug.cgi?id=1238653 * https://bugzilla.suse.com/show_bug.cgi?id=1238654 * https://bugzilla.suse.com/show_bug.cgi?id=1238655 * https://bugzilla.suse.com/show_bug.cgi?id=1238658 * https://bugzilla.suse.com/show_bug.cgi?id=1238661 * https://bugzilla.suse.com/show_bug.cgi?id=1238662 * https://bugzilla.suse.com/show_bug.cgi?id=1238663 * https://bugzilla.suse.com/show_bug.cgi?id=1238664 * https://bugzilla.suse.com/show_bug.cgi?id=1238666 * https://bugzilla.suse.com/show_bug.cgi?id=1238668 * https://bugzilla.suse.com/show_bug.cgi?id=1238705 * https://bugzilla.suse.com/show_bug.cgi?id=1238707 * https://bugzilla.suse.com/show_bug.cgi?id=1238710 * https://bugzilla.suse.com/show_bug.cgi?id=1238712 * https://bugzilla.suse.com/show_bug.cgi?id=1238718 * https://bugzilla.suse.com/show_bug.cgi?id=1238719 * https://bugzilla.suse.com/show_bug.cgi?id=1238721 * https://bugzilla.suse.com/show_bug.cgi?id=1238722 * https://bugzilla.suse.com/show_bug.cgi?id=1238727 * https://bugzilla.suse.com/show_bug.cgi?id=1238729 * https://bugzilla.suse.com/show_bug.cgi?id=1238750 * https://bugzilla.suse.com/show_bug.cgi?id=1238787 * https://bugzilla.suse.com/show_bug.cgi?id=1238789 * https://bugzilla.suse.com/show_bug.cgi?id=1238792 * https://bugzilla.suse.com/show_bug.cgi?id=1238799 * https://bugzilla.suse.com/show_bug.cgi?id=1238803 * https://bugzilla.suse.com/show_bug.cgi?id=1238804 * https://bugzilla.suse.com/show_bug.cgi?id=1238805 * https://bugzilla.suse.com/show_bug.cgi?id=1238806 * https://bugzilla.suse.com/show_bug.cgi?id=1238808 * https://bugzilla.suse.com/show_bug.cgi?id=1238809 * https://bugzilla.suse.com/show_bug.cgi?id=1238810 * https://bugzilla.suse.com/show_bug.cgi?id=1238811 * https://bugzilla.suse.com/show_bug.cgi?id=1238814 * https://bugzilla.suse.com/show_bug.cgi?id=1238815 * https://bugzilla.suse.com/show_bug.cgi?id=1238816 * https://bugzilla.suse.com/show_bug.cgi?id=1238817 * https://bugzilla.suse.com/show_bug.cgi?id=1238818 * https://bugzilla.suse.com/show_bug.cgi?id=1238819 * https://bugzilla.suse.com/show_bug.cgi?id=1238820 * https://bugzilla.suse.com/show_bug.cgi?id=1238821 * https://bugzilla.suse.com/show_bug.cgi?id=1238822 * https://bugzilla.suse.com/show_bug.cgi?id=1238823 * https://bugzilla.suse.com/show_bug.cgi?id=1238825 * https://bugzilla.suse.com/show_bug.cgi?id=1238830 * https://bugzilla.suse.com/show_bug.cgi?id=1238834 * https://bugzilla.suse.com/show_bug.cgi?id=1238835 * https://bugzilla.suse.com/show_bug.cgi?id=1238836 * https://bugzilla.suse.com/show_bug.cgi?id=1238838 * https://bugzilla.suse.com/show_bug.cgi?id=1238843 * https://bugzilla.suse.com/show_bug.cgi?id=1238867 * https://bugzilla.suse.com/show_bug.cgi?id=1238868 * https://bugzilla.suse.com/show_bug.cgi?id=1238869 * https://bugzilla.suse.com/show_bug.cgi?id=1238870 * https://bugzilla.suse.com/show_bug.cgi?id=1238871 * https://bugzilla.suse.com/show_bug.cgi?id=1238878 * https://bugzilla.suse.com/show_bug.cgi?id=1238889 * https://bugzilla.suse.com/show_bug.cgi?id=1238892 * https://bugzilla.suse.com/show_bug.cgi?id=1238893 * https://bugzilla.suse.com/show_bug.cgi?id=1238897 * https://bugzilla.suse.com/show_bug.cgi?id=1238898 * https://bugzilla.suse.com/show_bug.cgi?id=1238899 * https://bugzilla.suse.com/show_bug.cgi?id=1238902 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238916 * https://bugzilla.suse.com/show_bug.cgi?id=1238919 * https://bugzilla.suse.com/show_bug.cgi?id=1238925 * https://bugzilla.suse.com/show_bug.cgi?id=1238930 * https://bugzilla.suse.com/show_bug.cgi?id=1238933 * https://bugzilla.suse.com/show_bug.cgi?id=1238936 * https://bugzilla.suse.com/show_bug.cgi?id=1238937 * https://bugzilla.suse.com/show_bug.cgi?id=1238938 * https://bugzilla.suse.com/show_bug.cgi?id=1238939 * https://bugzilla.suse.com/show_bug.cgi?id=1238941 * https://bugzilla.suse.com/show_bug.cgi?id=1238942 * https://bugzilla.suse.com/show_bug.cgi?id=1238943 * https://bugzilla.suse.com/show_bug.cgi?id=1238944 * https://bugzilla.suse.com/show_bug.cgi?id=1238945 * https://bugzilla.suse.com/show_bug.cgi?id=1238946 * https://bugzilla.suse.com/show_bug.cgi?id=1238948 * https://bugzilla.suse.com/show_bug.cgi?id=1238949 * https://bugzilla.suse.com/show_bug.cgi?id=1238950 * https://bugzilla.suse.com/show_bug.cgi?id=1238951 * https://bugzilla.suse.com/show_bug.cgi?id=1238952 * https://bugzilla.suse.com/show_bug.cgi?id=1238953 * https://bugzilla.suse.com/show_bug.cgi?id=1238954 * https://bugzilla.suse.com/show_bug.cgi?id=1238956 * https://bugzilla.suse.com/show_bug.cgi?id=1238957 * https://bugzilla.suse.com/show_bug.cgi?id=1239001 * https://bugzilla.suse.com/show_bug.cgi?id=1239004 * https://bugzilla.suse.com/show_bug.cgi?id=1239016 * https://bugzilla.suse.com/show_bug.cgi?id=1239035 * https://bugzilla.suse.com/show_bug.cgi?id=1239040 * https://bugzilla.suse.com/show_bug.cgi?id=1239041 * https://bugzilla.suse.com/show_bug.cgi?id=1239051 * https://bugzilla.suse.com/show_bug.cgi?id=1239060 * https://bugzilla.suse.com/show_bug.cgi?id=1239070 * https://bugzilla.suse.com/show_bug.cgi?id=1239071 * https://bugzilla.suse.com/show_bug.cgi?id=1239073 * https://bugzilla.suse.com/show_bug.cgi?id=1239076 * https://bugzilla.suse.com/show_bug.cgi?id=1239095 * https://bugzilla.suse.com/show_bug.cgi?id=1239109 * https://bugzilla.suse.com/show_bug.cgi?id=1239115 * https://bugzilla.suse.com/show_bug.cgi?id=1239126 * https://bugzilla.suse.com/show_bug.cgi?id=1239452 * https://bugzilla.suse.com/show_bug.cgi?id=1239454 * https://bugzilla.suse.com/show_bug.cgi?id=1239968 * https://bugzilla.suse.com/show_bug.cgi?id=1239969 * https://bugzilla.suse.com/show_bug.cgi?id=1240133 * https://bugzilla.suse.com/show_bug.cgi?id=1240205 * https://bugzilla.suse.com/show_bug.cgi?id=1240207 * https://bugzilla.suse.com/show_bug.cgi?id=1240208 * https://bugzilla.suse.com/show_bug.cgi?id=1240210 * https://bugzilla.suse.com/show_bug.cgi?id=1240212 * https://bugzilla.suse.com/show_bug.cgi?id=1240213 * https://bugzilla.suse.com/show_bug.cgi?id=1240218 * https://bugzilla.suse.com/show_bug.cgi?id=1240220 * https://bugzilla.suse.com/show_bug.cgi?id=1240227 * https://bugzilla.suse.com/show_bug.cgi?id=1240229 * https://bugzilla.suse.com/show_bug.cgi?id=1240231 * https://bugzilla.suse.com/show_bug.cgi?id=1240242 * https://bugzilla.suse.com/show_bug.cgi?id=1240245 * https://bugzilla.suse.com/show_bug.cgi?id=1240247 * https://bugzilla.suse.com/show_bug.cgi?id=1240250 * https://bugzilla.suse.com/show_bug.cgi?id=1240254 * https://bugzilla.suse.com/show_bug.cgi?id=1240256 * https://bugzilla.suse.com/show_bug.cgi?id=1240264 * https://bugzilla.suse.com/show_bug.cgi?id=1240266 * https://bugzilla.suse.com/show_bug.cgi?id=1240272 * https://bugzilla.suse.com/show_bug.cgi?id=1240275 * https://bugzilla.suse.com/show_bug.cgi?id=1240276 * https://bugzilla.suse.com/show_bug.cgi?id=1240278 * https://bugzilla.suse.com/show_bug.cgi?id=1240279 * https://bugzilla.suse.com/show_bug.cgi?id=1240280 * https://bugzilla.suse.com/show_bug.cgi?id=1240281 * https://bugzilla.suse.com/show_bug.cgi?id=1240282 * https://bugzilla.suse.com/show_bug.cgi?id=1240283 * https://bugzilla.suse.com/show_bug.cgi?id=1240284 * https://bugzilla.suse.com/show_bug.cgi?id=1240286 * https://bugzilla.suse.com/show_bug.cgi?id=1240288 * https://bugzilla.suse.com/show_bug.cgi?id=1240290 * https://bugzilla.suse.com/show_bug.cgi?id=1240292 * https://bugzilla.suse.com/show_bug.cgi?id=1240293 * https://bugzilla.suse.com/show_bug.cgi?id=1240297 * https://bugzilla.suse.com/show_bug.cgi?id=1240304 * https://bugzilla.suse.com/show_bug.cgi?id=1240308 * https://bugzilla.suse.com/show_bug.cgi?id=1240309 * https://bugzilla.suse.com/show_bug.cgi?id=1240317 * https://bugzilla.suse.com/show_bug.cgi?id=1240318 * https://bugzilla.suse.com/show_bug.cgi?id=1240322 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 14 16:30:10 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 14 Apr 2025 16:30:10 -0000 Subject: SUSE-SU-2025:1254-1: important: Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3) Message-ID: <174464821060.29195.12336863435127171112@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:1254-1 Release Date: 2025-04-14T15:33:52Z Rating: important References: * bsc#1228714 * bsc#1232818 * bsc#1235218 * bsc#1238788 * bsc#1238790 Cross-References: * CVE-2022-49014 * CVE-2022-49563 * CVE-2022-49564 * CVE-2024-41090 * CVE-2024-56600 CVSS scores: * CVE-2022-49014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49564 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41090 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_167 fixes several issues. The following security issues were fixed: * CVE-2022-49014: net: tun: Fix use-after-free in tun_detach() (bsc#1232818). * CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238788). * CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238790). * CVE-2024-41090: tap: add missing verification for short frame (bsc#1228714). * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1255=1 * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1254=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1255=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_167-default-11-150300.2.1 * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_219-default-11-2.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_167-default-11-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_46-debugsource-11-150300.2.1 * kernel-livepatch-5_3_18-150300_59_167-default-debuginfo-11-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_167-preempt-debuginfo-11-150300.2.1 * kernel-livepatch-5_3_18-150300_59_167-preempt-11-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-49014.html * https://www.suse.com/security/cve/CVE-2022-49563.html * https://www.suse.com/security/cve/CVE-2022-49564.html * https://www.suse.com/security/cve/CVE-2024-41090.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://bugzilla.suse.com/show_bug.cgi?id=1228714 * https://bugzilla.suse.com/show_bug.cgi?id=1232818 * https://bugzilla.suse.com/show_bug.cgi?id=1235218 * https://bugzilla.suse.com/show_bug.cgi?id=1238788 * https://bugzilla.suse.com/show_bug.cgi?id=1238790 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 14 16:30:14 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 14 Apr 2025 16:30:14 -0000 Subject: SUSE-SU-2025:1252-1: important: Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4) Message-ID: <174464821410.29195.18280307743011006858@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4) Announcement ID: SUSE-SU-2025:1252-1 Release Date: 2025-04-14T14:04:23Z Rating: important References: * bsc#1228714 * bsc#1235218 Cross-References: * CVE-2024-41090 * CVE-2024-56600 CVSS scores: * CVE-2024-41090 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_119 fixes several issues. The following security issues were fixed: * CVE-2024-41090: tap: add missing verification for short frame (bsc#1228714). * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1252=1 SUSE-2025-1253=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1252=1 SUSE-SLE- Module-Live-Patching-15-SP4-2025-1253=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_26-debugsource-15-150400.2.1 * kernel-livepatch-5_14_21-150400_24_111-default-debuginfo-16-150400.2.1 * kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-15-150400.2.1 * kernel-livepatch-5_14_21-150400_24_111-default-16-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_24-debugsource-16-150400.2.1 * kernel-livepatch-5_14_21-150400_24_119-default-15-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_26-debugsource-15-150400.2.1 * kernel-livepatch-5_14_21-150400_24_111-default-debuginfo-16-150400.2.1 * kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-15-150400.2.1 * kernel-livepatch-5_14_21-150400_24_111-default-16-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_24-debugsource-16-150400.2.1 * kernel-livepatch-5_14_21-150400_24_119-default-15-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-41090.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://bugzilla.suse.com/show_bug.cgi?id=1228714 * https://bugzilla.suse.com/show_bug.cgi?id=1235218 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 14 16:30:19 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 14 Apr 2025 16:30:19 -0000 Subject: SUSE-SU-2025:1248-1: important: Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP3) Message-ID: <174464821979.29195.1116834879147727776@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 47 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:1248-1 Release Date: 2025-04-14T14:04:01Z Rating: important References: * bsc#1232818 * bsc#1235218 * bsc#1238788 * bsc#1238790 Cross-References: * CVE-2022-49014 * CVE-2022-49563 * CVE-2022-49564 * CVE-2024-56600 CVSS scores: * CVE-2022-49014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49564 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_170 fixes several issues. The following security issues were fixed: * CVE-2022-49014: net: tun: Fix use-after-free in tun_detach() (bsc#1232818). * CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238788). * CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238790). * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1251=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1251=1 * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1248=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_170-default-9-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_47-debugsource-9-150300.2.1 * kernel-livepatch-5_3_18-150300_59_170-default-debuginfo-9-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_170-preempt-debuginfo-9-150300.2.1 * kernel-livepatch-5_3_18-150300_59_170-preempt-9-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_170-default-9-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_47-debugsource-9-150300.2.1 * kernel-livepatch-5_3_18-150300_59_170-default-debuginfo-9-150300.2.1 * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_228-default-7-2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-49014.html * https://www.suse.com/security/cve/CVE-2022-49563.html * https://www.suse.com/security/cve/CVE-2022-49564.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://bugzilla.suse.com/show_bug.cgi?id=1232818 * https://bugzilla.suse.com/show_bug.cgi?id=1235218 * https://bugzilla.suse.com/show_bug.cgi?id=1238788 * https://bugzilla.suse.com/show_bug.cgi?id=1238790 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 14 20:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 14 Apr 2025 20:30:06 -0000 Subject: SUSE-SU-2025:1259-1: important: Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3) Message-ID: <174466260664.19579.7317497529666972525@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:1259-1 Release Date: 2025-04-14T17:33:43Z Rating: important References: * bsc#1232818 * bsc#1235218 * bsc#1238788 * bsc#1238790 Cross-References: * CVE-2022-49014 * CVE-2022-49563 * CVE-2022-49564 * CVE-2024-56600 CVSS scores: * CVE-2022-49014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49564 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_174 fixes several issues. The following security issues were fixed: * CVE-2022-49014: net: tun: Fix use-after-free in tun_detach() (bsc#1232818). * CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238788). * CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238790). * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1259=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1259=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_174-default-debuginfo-8-150300.2.1 * kernel-livepatch-5_3_18-150300_59_174-default-8-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_48-debugsource-8-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_174-preempt-8-150300.2.1 * kernel-livepatch-5_3_18-150300_59_174-preempt-debuginfo-8-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_174-default-8-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-49014.html * https://www.suse.com/security/cve/CVE-2022-49563.html * https://www.suse.com/security/cve/CVE-2022-49564.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://bugzilla.suse.com/show_bug.cgi?id=1232818 * https://bugzilla.suse.com/show_bug.cgi?id=1235218 * https://bugzilla.suse.com/show_bug.cgi?id=1238788 * https://bugzilla.suse.com/show_bug.cgi?id=1238790 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 14 20:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 14 Apr 2025 20:30:12 -0000 Subject: SUSE-SU-2025:1257-1: important: Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) Message-ID: <174466261271.19579.11218426570922961626@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 25 for SLE 15 SP4) Announcement ID: SUSE-SU-2025:1257-1 Release Date: 2025-04-14T16:33:37Z Rating: important References: * bsc#1228714 * bsc#1235218 Cross-References: * CVE-2024-41090 * CVE-2024-56600 CVSS scores: * CVE-2024-41090 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150400_24_116 fixes several issues. The following security issues were fixed: * CVE-2024-41090: tap: add missing verification for short frame (bsc#1228714). * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1257=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1257=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_25-debugsource-16-150400.2.1 * kernel-livepatch-5_14_21-150400_24_116-default-16-150400.2.1 * kernel-livepatch-5_14_21-150400_24_116-default-debuginfo-16-150400.2.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_25-debugsource-16-150400.2.1 * kernel-livepatch-5_14_21-150400_24_116-default-16-150400.2.1 * kernel-livepatch-5_14_21-150400_24_116-default-debuginfo-16-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-41090.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://bugzilla.suse.com/show_bug.cgi?id=1228714 * https://bugzilla.suse.com/show_bug.cgi?id=1235218 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 15 08:30:10 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 15 Apr 2025 08:30:10 -0000 Subject: SUSE-SU-2025:1260-1: important: Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) Message-ID: <174470581072.14384.7220635307573081240@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:1260-1 Release Date: 2025-04-14T20:03:49Z Rating: important References: * bsc#1228714 * bsc#1232818 * bsc#1235218 * bsc#1238788 * bsc#1238790 Cross-References: * CVE-2022-49014 * CVE-2022-49563 * CVE-2022-49564 * CVE-2024-41090 * CVE-2024-56600 CVSS scores: * CVE-2022-49014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49564 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41090 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_161 fixes several issues. The following security issues were fixed: * CVE-2022-49014: net: tun: Fix use-after-free in tun_detach() (bsc#1232818). * CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238788). * CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238790). * CVE-2024-41090: tap: add missing verification for short frame (bsc#1228714). * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1260=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1260=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_161-default-15-150300.2.1 * kernel-livepatch-5_3_18-150300_59_161-default-debuginfo-15-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_44-debugsource-15-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_161-preempt-debuginfo-15-150300.2.1 * kernel-livepatch-5_3_18-150300_59_161-preempt-15-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_161-default-15-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-49014.html * https://www.suse.com/security/cve/CVE-2022-49563.html * https://www.suse.com/security/cve/CVE-2022-49564.html * https://www.suse.com/security/cve/CVE-2024-41090.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://bugzilla.suse.com/show_bug.cgi?id=1228714 * https://bugzilla.suse.com/show_bug.cgi?id=1232818 * https://bugzilla.suse.com/show_bug.cgi?id=1235218 * https://bugzilla.suse.com/show_bug.cgi?id=1238788 * https://bugzilla.suse.com/show_bug.cgi?id=1238790 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 15 12:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 15 Apr 2025 12:30:12 -0000 Subject: SUSE-SU-2025:1278-1: important: Security update for the Linux Kernel (Live Patch 61 for SLE 12 SP5) Message-ID: <174472021206.29284.12407874444936741517@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 61 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:1278-1 Release Date: 2025-04-15T10:04:13Z Rating: important References: * bsc#1232818 * bsc#1235218 * bsc#1238788 * bsc#1238790 Cross-References: * CVE-2022-49014 * CVE-2022-49563 * CVE-2022-49564 * CVE-2024-56600 CVSS scores: * CVE-2022-49014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49564 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_231 fixes several issues. The following security issues were fixed: * CVE-2022-49014: net: tun: Fix use-after-free in tun_detach() (bsc#1232818). * CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238788). * CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238790). * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1278=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_231-default-6-2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-49014.html * https://www.suse.com/security/cve/CVE-2022-49563.html * https://www.suse.com/security/cve/CVE-2022-49564.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://bugzilla.suse.com/show_bug.cgi?id=1232818 * https://bugzilla.suse.com/show_bug.cgi?id=1235218 * https://bugzilla.suse.com/show_bug.cgi?id=1238788 * https://bugzilla.suse.com/show_bug.cgi?id=1238790 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 15 12:30:16 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 15 Apr 2025 12:30:16 -0000 Subject: SUSE-SU-2025:1276-1: important: Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5) Message-ID: <174472021607.29284.10447325152537591632@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 19 for SLE 15 SP5) Announcement ID: SUSE-SU-2025:1276-1 Release Date: 2025-04-15T09:33:54Z Rating: important References: * bsc#1235218 Cross-References: * CVE-2024-56600 CVSS scores: * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.14.21-150500_55_80 fixes one issue. The following security issue was fixed: * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1271=1 SUSE-2025-1273=1 SUSE-2025-1274=1 SUSE-2025-1272=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-1271=1 SUSE-SLE- Module-Live-Patching-15-SP5-2025-1272=1 SUSE-SLE-Module-Live- Patching-15-SP5-2025-1273=1 SUSE-SLE-Module-Live-Patching-15-SP5-2025-1274=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1276=1 SUSE-2025-1277=1 SUSE-2025-1268=1 SUSE-2025-1270=1 SUSE-2025-1269=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1276=1 SUSE-SLE- Module-Live-Patching-15-SP4-2025-1277=1 SUSE-SLE-Module-Live- Patching-15-SP4-2025-1268=1 SUSE-SLE-Module-Live-Patching-15-SP4-2025-1270=1 SUSE-SLE-Module-Live-Patching-15-SP4-2025-1269=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_88-default-debuginfo-3-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_21-debugsource-3-150500.2.1 * kernel-livepatch-5_14_21-150500_55_91-default-3-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_19-debugsource-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_88-default-3-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_22-debugsource-3-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_20-debugsource-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_91-default-debuginfo-3-150500.2.1 * kernel-livepatch-5_14_21-150500_55_80-default-debuginfo-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_83-default-debuginfo-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_80-default-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_83-default-6-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_88-default-debuginfo-3-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_21-debugsource-3-150500.2.1 * kernel-livepatch-5_14_21-150500_55_91-default-3-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_19-debugsource-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_88-default-3-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_22-debugsource-3-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_20-debugsource-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_91-default-debuginfo-3-150500.2.1 * kernel-livepatch-5_14_21-150500_55_80-default-debuginfo-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_83-default-debuginfo-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_80-default-6-150500.2.1 * kernel-livepatch-5_14_21-150500_55_83-default-6-150500.2.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_136-default-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_141-default-5-150400.2.1 * kernel-livepatch-5_14_21-150400_24_141-default-debuginfo-5-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_34-debugsource-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_147-default-debuginfo-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_136-default-debuginfo-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_147-default-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_144-default-4-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_33-debugsource-5-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_32-debugsource-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_144-default-debuginfo-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_133-default-debuginfo-6-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_35-debugsource-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_133-default-6-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_31-debugsource-6-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_136-default-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_141-default-5-150400.2.1 * kernel-livepatch-5_14_21-150400_24_141-default-debuginfo-5-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_34-debugsource-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_147-default-debuginfo-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_136-default-debuginfo-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_147-default-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_144-default-4-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_33-debugsource-5-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_32-debugsource-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_144-default-debuginfo-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_133-default-debuginfo-6-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_35-debugsource-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_133-default-6-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_31-debugsource-6-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56600.html * https://bugzilla.suse.com/show_bug.cgi?id=1235218 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 15 12:30:20 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 15 Apr 2025 12:30:20 -0000 Subject: SUSE-SU-2025:1275-1: important: Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3) Message-ID: <174472022042.29284.7404096294137752770@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:1275-1 Release Date: 2025-04-15T10:04:48Z Rating: important References: * bsc#1235218 * bsc#1238788 * bsc#1238790 Cross-References: * CVE-2022-49563 * CVE-2022-49564 * CVE-2024-56600 CVSS scores: * CVE-2022-49563 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49564 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_188 fixes several issues. The following security issues were fixed: * CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238788). * CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238790). * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1267=1 SUSE-2025-1282=1 SUSE-2025-1275=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1275=1 SUSE-SLE- Module-Live-Patching-15-SP3-2025-1267=1 SUSE-SLE-Module-Live- Patching-15-SP3-2025-1282=1 * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1279=1 SUSE-SLE-Live- Patching-12-SP5-2025-1280=1 SUSE-SLE-Live-Patching-12-SP5-2025-1281=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_188-default-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_185-default-debuginfo-3-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_52-debugsource-3-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_51-debugsource-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_182-default-debuginfo-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_185-default-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_182-default-5-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_50-debugsource-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_188-default-debuginfo-3-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_188-preempt-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_188-preempt-debuginfo-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_185-preempt-debuginfo-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_185-preempt-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_182-preempt-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_182-preempt-debuginfo-5-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_185-default-3-150300.2.1 * kernel-livepatch-5_3_18-150300_59_182-default-5-150300.2.1 * kernel-livepatch-5_3_18-150300_59_188-default-3-150300.2.1 * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_244-default-2-2.1 * kgraft-patch-4_12_14-122_237-default-2-2.1 * kgraft-patch-4_12_14-122_234-default-6-2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-49563.html * https://www.suse.com/security/cve/CVE-2022-49564.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://bugzilla.suse.com/show_bug.cgi?id=1235218 * https://bugzilla.suse.com/show_bug.cgi?id=1238788 * https://bugzilla.suse.com/show_bug.cgi?id=1238790 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 15 12:30:27 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 15 Apr 2025 12:30:27 -0000 Subject: SUSE-SU-2025:1262-1: important: Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3) Message-ID: <174472022734.29284.1235604779134730941@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 45 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:1262-1 Release Date: 2025-04-15T08:03:51Z Rating: important References: * bsc#1228714 * bsc#1232818 * bsc#1235218 * bsc#1238788 * bsc#1238790 Cross-References: * CVE-2022-49014 * CVE-2022-49563 * CVE-2022-49564 * CVE-2024-41090 * CVE-2024-56600 CVSS scores: * CVE-2022-49014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49014 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49564 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41090 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2024-56600 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves five vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_164 fixes several issues. The following security issues were fixed: * CVE-2022-49014: net: tun: Fix use-after-free in tun_detach() (bsc#1232818). * CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238788). * CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238790). * CVE-2024-41090: tap: add missing verification for short frame (bsc#1228714). * CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235218). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1262=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1262=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_164-default-12-150300.2.1 * kernel-livepatch-5_3_18-150300_59_164-default-debuginfo-12-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_45-debugsource-12-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_164-preempt-12-150300.2.1 * kernel-livepatch-5_3_18-150300_59_164-preempt-debuginfo-12-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_164-default-12-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-49014.html * https://www.suse.com/security/cve/CVE-2022-49563.html * https://www.suse.com/security/cve/CVE-2022-49564.html * https://www.suse.com/security/cve/CVE-2024-41090.html * https://www.suse.com/security/cve/CVE-2024-56600.html * https://bugzilla.suse.com/show_bug.cgi?id=1228714 * https://bugzilla.suse.com/show_bug.cgi?id=1232818 * https://bugzilla.suse.com/show_bug.cgi?id=1235218 * https://bugzilla.suse.com/show_bug.cgi?id=1238788 * https://bugzilla.suse.com/show_bug.cgi?id=1238790 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 15 12:30:38 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 15 Apr 2025 12:30:38 -0000 Subject: SUSE-SU-2025:1265-1: important: Security update for webkit2gtk3 Message-ID: <174472023867.29284.1017415485574123691@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2025:1265-1 Release Date: 2025-04-15T08:24:09Z Rating: important References: * bsc#1240958 * bsc#1240961 * bsc#1240962 * bsc#1240963 * bsc#1240964 * bsc#1240986 * bsc#1240987 Cross-References: * CVE-2024-54551 * CVE-2025-24208 * CVE-2025-24209 * CVE-2025-24213 * CVE-2025-24216 * CVE-2025-24264 * CVE-2025-30427 CVSS scores: * CVE-2024-54551 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54551 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-54551 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-24208 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-24208 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-24208 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-24209 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-24209 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24209 ( NVD ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-24213 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-24213 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24213 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24216 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-24216 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-24216 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-24264 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-24264 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24264 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-30427 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-30427 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-30427 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves seven vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: * Update to version 2.48.1 * CVE-2024-54551: improper memory handling may lead to a denial-of-service when processing certain web content (bsc#1240962) * CVE-2025-24208: permissions issue may lead to a cross-site scripting attack when loading a malicious iframe (bsc#1240961) * CVE-2025-24209: buffer overflow may lead to crash when processing maliciously crafted web content (bsc#1240964) * CVE-2025-24213: type confusion issue may lead to memory corruption (bsc#1240963) * CVE-2025-24216: improper memory handling may lead to an unexpected crash when processing certain web content (bsc#1240986) * CVE-2025-24264: improper memory handling may lead to unexpected crash when processing certain web content (bsc#1240987) * CVE-2025-30427: use-after-free issue may lead to an unexpected Safari crash when processing maliciously crafted web content (bsc#1240958) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1265=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1265=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1265=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1265=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * webkit2gtk3-devel-2.48.1-150200.142.1 * libjavascriptcoregtk-4_0-18-2.48.1-150200.142.1 * webkit2gtk-4_0-injected-bundles-2.48.1-150200.142.1 * typelib-1_0-WebKit2-4_0-2.48.1-150200.142.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150200.142.1 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150200.142.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150200.142.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150200.142.1 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150200.142.1 * libwebkit2gtk-4_0-37-2.48.1-150200.142.1 * webkit2gtk3-debugsource-2.48.1-150200.142.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * libwebkit2gtk3-lang-2.48.1-150200.142.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * webkit2gtk3-devel-2.48.1-150200.142.1 * libjavascriptcoregtk-4_0-18-2.48.1-150200.142.1 * webkit2gtk-4_0-injected-bundles-2.48.1-150200.142.1 * typelib-1_0-WebKit2-4_0-2.48.1-150200.142.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150200.142.1 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150200.142.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150200.142.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150200.142.1 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150200.142.1 * libwebkit2gtk-4_0-37-2.48.1-150200.142.1 * webkit2gtk3-debugsource-2.48.1-150200.142.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * libwebkit2gtk3-lang-2.48.1-150200.142.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * webkit2gtk3-devel-2.48.1-150200.142.1 * libjavascriptcoregtk-4_0-18-2.48.1-150200.142.1 * webkit2gtk-4_0-injected-bundles-2.48.1-150200.142.1 * typelib-1_0-WebKit2-4_0-2.48.1-150200.142.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150200.142.1 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150200.142.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150200.142.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150200.142.1 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150200.142.1 * libwebkit2gtk-4_0-37-2.48.1-150200.142.1 * webkit2gtk3-debugsource-2.48.1-150200.142.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * libwebkit2gtk3-lang-2.48.1-150200.142.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * webkit2gtk3-devel-2.48.1-150200.142.1 * libjavascriptcoregtk-4_0-18-2.48.1-150200.142.1 * webkit2gtk-4_0-injected-bundles-2.48.1-150200.142.1 * typelib-1_0-WebKit2-4_0-2.48.1-150200.142.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150200.142.1 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150200.142.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150200.142.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150200.142.1 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150200.142.1 * libwebkit2gtk-4_0-37-2.48.1-150200.142.1 * webkit2gtk3-debugsource-2.48.1-150200.142.1 * SUSE Enterprise Storage 7.1 (noarch) * libwebkit2gtk3-lang-2.48.1-150200.142.1 ## References: * https://www.suse.com/security/cve/CVE-2024-54551.html * https://www.suse.com/security/cve/CVE-2025-24208.html * https://www.suse.com/security/cve/CVE-2025-24209.html * https://www.suse.com/security/cve/CVE-2025-24213.html * https://www.suse.com/security/cve/CVE-2025-24216.html * https://www.suse.com/security/cve/CVE-2025-24264.html * https://www.suse.com/security/cve/CVE-2025-30427.html * https://bugzilla.suse.com/show_bug.cgi?id=1240958 * https://bugzilla.suse.com/show_bug.cgi?id=1240961 * https://bugzilla.suse.com/show_bug.cgi?id=1240962 * https://bugzilla.suse.com/show_bug.cgi?id=1240963 * https://bugzilla.suse.com/show_bug.cgi?id=1240964 * https://bugzilla.suse.com/show_bug.cgi?id=1240986 * https://bugzilla.suse.com/show_bug.cgi?id=1240987 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 15 12:30:41 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 15 Apr 2025 12:30:41 -0000 Subject: SUSE-SU-2025:1264-1: moderate: Security update for haproxy Message-ID: <174472024108.29284.15510535445921516978@smelt2.prg2.suse.org> # Security update for haproxy Announcement ID: SUSE-SU-2025:1264-1 Release Date: 2025-04-15T08:23:44Z Rating: moderate References: * bsc#1240971 Cross-References: * CVE-2025-32464 CVSS scores: * CVE-2025-32464 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-32464 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2025-32464 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for haproxy fixes the following issues: * CVE-2025-32464: Fixed heap-based buffer overflow in sample_conv_regsub. (bsc#1240971) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1264=1 openSUSE-SLE-15.6-2025-1264=1 * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2025-1264=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * haproxy-debugsource-2.8.11+git0.01c1056a4-150600.3.6.1 * haproxy-debuginfo-2.8.11+git0.01c1056a4-150600.3.6.1 * haproxy-2.8.11+git0.01c1056a4-150600.3.6.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) * haproxy-debugsource-2.8.11+git0.01c1056a4-150600.3.6.1 * haproxy-debuginfo-2.8.11+git0.01c1056a4-150600.3.6.1 * haproxy-2.8.11+git0.01c1056a4-150600.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-32464.html * https://bugzilla.suse.com/show_bug.cgi?id=1240971 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 15 12:34:19 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 15 Apr 2025 12:34:19 -0000 Subject: SUSE-SU-2025:1263-1: important: Security update for the Linux Kernel Message-ID: <174472045935.29284.5297931971016636694@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:1263-1 Release Date: 2025-04-15T08:23:33Z Rating: important References: * bsc#1065729 * bsc#1179878 * bsc#1180814 * bsc#1185762 * bsc#1195823 * bsc#1196444 * bsc#1197158 * bsc#1197227 * bsc#1197302 * bsc#1197331 * bsc#1197472 * bsc#1197661 * bsc#1197926 * bsc#1198577 * bsc#1198660 * bsc#1199657 * bsc#1200045 * bsc#1200217 * bsc#1200571 * bsc#1200807 * bsc#1200809 * bsc#1200825 * bsc#1200871 * bsc#1200872 * bsc#1201193 * bsc#1201381 * bsc#1201610 * bsc#1202672 * bsc#1202711 * bsc#1203769 * bsc#1207186 * bsc#1209547 * bsc#1210647 * bsc#1213167 * bsc#1224867 * bsc#1225742 * bsc#1230326 * bsc#1231375 * bsc#1233479 * bsc#1233557 * bsc#1235433 * bsc#1235528 * bsc#1237530 * bsc#1237718 * bsc#1237721 * bsc#1237723 * bsc#1237726 * bsc#1237734 * bsc#1237735 * bsc#1237736 * bsc#1237738 * bsc#1237739 * bsc#1237740 * bsc#1237742 * bsc#1237746 * bsc#1237748 * bsc#1237752 * bsc#1237778 * bsc#1237782 * bsc#1237783 * bsc#1237784 * bsc#1237788 * bsc#1237798 * bsc#1237810 * bsc#1237813 * bsc#1237814 * bsc#1237815 * bsc#1237823 * bsc#1237829 * bsc#1237831 * bsc#1237839 * bsc#1237840 * bsc#1237846 * bsc#1237868 * bsc#1237872 * bsc#1237903 * bsc#1237916 * bsc#1237918 * bsc#1237932 * bsc#1237940 * bsc#1237941 * bsc#1237951 * bsc#1237954 * bsc#1237958 * bsc#1237963 * bsc#1237983 * bsc#1237984 * bsc#1237996 * bsc#1237997 * bsc#1237998 * bsc#1238000 * bsc#1238007 * bsc#1238013 * bsc#1238022 * bsc#1238030 * bsc#1238036 * bsc#1238046 * bsc#1238071 * bsc#1238079 * bsc#1238096 * bsc#1238099 * bsc#1238103 * bsc#1238108 * bsc#1238111 * bsc#1238123 * bsc#1238126 * bsc#1238131 * bsc#1238135 * bsc#1238139 * bsc#1238146 * bsc#1238149 * bsc#1238150 * bsc#1238155 * bsc#1238156 * bsc#1238158 * bsc#1238162 * bsc#1238166 * bsc#1238168 * bsc#1238169 * bsc#1238170 * bsc#1238171 * bsc#1238172 * bsc#1238175 * bsc#1238177 * bsc#1238181 * bsc#1238183 * bsc#1238184 * bsc#1238228 * bsc#1238229 * bsc#1238231 * bsc#1238235 * bsc#1238236 * bsc#1238239 * bsc#1238241 * bsc#1238242 * bsc#1238243 * bsc#1238244 * bsc#1238249 * bsc#1238255 * bsc#1238256 * bsc#1238257 * bsc#1238263 * bsc#1238264 * bsc#1238266 * bsc#1238267 * bsc#1238269 * bsc#1238271 * bsc#1238272 * bsc#1238274 * bsc#1238275 * bsc#1238276 * bsc#1238278 * bsc#1238279 * bsc#1238281 * bsc#1238284 * bsc#1238289 * bsc#1238293 * bsc#1238306 * bsc#1238307 * bsc#1238313 * bsc#1238327 * bsc#1238331 * bsc#1238333 * bsc#1238334 * bsc#1238336 * bsc#1238337 * bsc#1238338 * bsc#1238343 * bsc#1238372 * bsc#1238373 * bsc#1238377 * bsc#1238386 * bsc#1238393 * bsc#1238394 * bsc#1238395 * bsc#1238413 * bsc#1238416 * bsc#1238417 * bsc#1238419 * bsc#1238420 * bsc#1238429 * bsc#1238430 * bsc#1238435 * bsc#1238441 * bsc#1238443 * bsc#1238454 * bsc#1238462 * bsc#1238467 * bsc#1238469 * bsc#1238539 * bsc#1238543 * bsc#1238546 * bsc#1238599 * bsc#1238600 * bsc#1238612 * bsc#1238615 * bsc#1238617 * bsc#1238618 * bsc#1238621 * bsc#1238623 * bsc#1238625 * bsc#1238626 * bsc#1238630 * bsc#1238631 * bsc#1238633 * bsc#1238635 * bsc#1238638 * bsc#1238639 * bsc#1238641 * bsc#1238643 * bsc#1238645 * bsc#1238646 * bsc#1238653 * bsc#1238655 * bsc#1238662 * bsc#1238663 * bsc#1238705 * bsc#1238707 * bsc#1238710 * bsc#1238712 * bsc#1238718 * bsc#1238719 * bsc#1238721 * bsc#1238722 * bsc#1238727 * bsc#1238729 * bsc#1238750 * bsc#1238787 * bsc#1238789 * bsc#1238805 * bsc#1238809 * bsc#1238814 * bsc#1238815 * bsc#1238819 * bsc#1238821 * bsc#1238822 * bsc#1238823 * bsc#1238825 * bsc#1238835 * bsc#1238838 * bsc#1238868 * bsc#1238869 * bsc#1238871 * bsc#1238892 * bsc#1238893 * bsc#1238911 * bsc#1238919 * bsc#1238925 * bsc#1238930 * bsc#1238933 * bsc#1238937 * bsc#1238938 * bsc#1238939 * bsc#1238948 * bsc#1238949 * bsc#1238952 * bsc#1239001 * bsc#1239035 * bsc#1239040 * bsc#1239041 * bsc#1239060 * bsc#1239070 * bsc#1239071 * bsc#1239076 * bsc#1239109 * bsc#1239115 * bsc#1239454 * bsc#1239969 * bsc#1240207 * bsc#1240213 * bsc#1240218 * bsc#1240227 * bsc#1240272 * bsc#1240276 * bsc#1240288 Cross-References: * CVE-2017-5753 * CVE-2020-27835 * CVE-2021-47248 * CVE-2021-47631 * CVE-2021-47641 * CVE-2021-47642 * CVE-2021-47650 * CVE-2021-47651 * CVE-2021-47652 * CVE-2021-47653 * CVE-2021-47659 * CVE-2022-0168 * CVE-2022-1016 * CVE-2022-1048 * CVE-2022-1184 * CVE-2022-2977 * CVE-2022-29900 * CVE-2022-29901 * CVE-2022-3303 * CVE-2022-49044 * CVE-2022-49051 * CVE-2022-49053 * CVE-2022-49055 * CVE-2022-49058 * CVE-2022-49059 * CVE-2022-49063 * CVE-2022-49065 * CVE-2022-49073 * CVE-2022-49076 * CVE-2022-49078 * CVE-2022-49082 * CVE-2022-49083 * CVE-2022-49085 * CVE-2022-49091 * CVE-2022-49095 * CVE-2022-49098 * CVE-2022-49100 * CVE-2022-49111 * CVE-2022-49114 * CVE-2022-49122 * CVE-2022-49137 * CVE-2022-49145 * CVE-2022-49151 * CVE-2022-49153 * CVE-2022-49155 * CVE-2022-49156 * CVE-2022-49157 * CVE-2022-49158 * CVE-2022-49159 * CVE-2022-49160 * CVE-2022-49162 * CVE-2022-49164 * CVE-2022-49175 * CVE-2022-49185 * CVE-2022-49189 * CVE-2022-49196 * CVE-2022-49200 * CVE-2022-49201 * CVE-2022-49206 * CVE-2022-49212 * CVE-2022-49213 * CVE-2022-49216 * CVE-2022-49217 * CVE-2022-49224 * CVE-2022-49226 * CVE-2022-49232 * CVE-2022-49235 * CVE-2022-49239 * CVE-2022-49242 * CVE-2022-49243 * CVE-2022-49247 * CVE-2022-49248 * CVE-2022-49253 * CVE-2022-49259 * CVE-2022-49261 * CVE-2022-49263 * CVE-2022-49264 * CVE-2022-49271 * CVE-2022-49272 * CVE-2022-49275 * CVE-2022-49279 * CVE-2022-49280 * CVE-2022-49281 * CVE-2022-49285 * CVE-2022-49287 * CVE-2022-49288 * CVE-2022-49290 * CVE-2022-49291 * CVE-2022-49292 * CVE-2022-49293 * CVE-2022-49295 * CVE-2022-49297 * CVE-2022-49298 * CVE-2022-49299 * CVE-2022-49300 * CVE-2022-49301 * CVE-2022-49302 * CVE-2022-49304 * CVE-2022-49305 * CVE-2022-49307 * CVE-2022-49313 * CVE-2022-49314 * CVE-2022-49315 * CVE-2022-49316 * CVE-2022-49320 * CVE-2022-49321 * CVE-2022-49326 * CVE-2022-49327 * CVE-2022-49331 * CVE-2022-49332 * CVE-2022-49335 * CVE-2022-49343 * CVE-2022-49347 * CVE-2022-49349 * CVE-2022-49352 * CVE-2022-49357 * CVE-2022-49370 * CVE-2022-49371 * CVE-2022-49373 * CVE-2022-49375 * CVE-2022-49376 * CVE-2022-49382 * CVE-2022-49385 * CVE-2022-49389 * CVE-2022-49394 * CVE-2022-49396 * CVE-2022-49397 * CVE-2022-49398 * CVE-2022-49399 * CVE-2022-49402 * CVE-2022-49404 * CVE-2022-49409 * CVE-2022-49410 * CVE-2022-49411 * CVE-2022-49413 * CVE-2022-49414 * CVE-2022-49416 * CVE-2022-49421 * CVE-2022-49422 * CVE-2022-49437 * CVE-2022-49438 * CVE-2022-49441 * CVE-2022-49442 * CVE-2022-49446 * CVE-2022-49451 * CVE-2022-49455 * CVE-2022-49459 * CVE-2022-49460 * CVE-2022-49462 * CVE-2022-49465 * CVE-2022-49467 * CVE-2022-49473 * CVE-2022-49474 * CVE-2022-49475 * CVE-2022-49478 * CVE-2022-49481 * CVE-2022-49482 * CVE-2022-49488 * CVE-2022-49489 * CVE-2022-49490 * CVE-2022-49491 * CVE-2022-49493 * CVE-2022-49495 * CVE-2022-49498 * CVE-2022-49503 * CVE-2022-49504 * CVE-2022-49505 * CVE-2022-49508 * CVE-2022-49514 * CVE-2022-49517 * CVE-2022-49521 * CVE-2022-49522 * CVE-2022-49524 * CVE-2022-49525 * CVE-2022-49526 * CVE-2022-49527 * CVE-2022-49532 * CVE-2022-49534 * CVE-2022-49535 * CVE-2022-49536 * CVE-2022-49537 * CVE-2022-49541 * CVE-2022-49542 * CVE-2022-49544 * CVE-2022-49545 * CVE-2022-49546 * CVE-2022-49555 * CVE-2022-49563 * CVE-2022-49564 * CVE-2022-49566 * CVE-2022-49609 * CVE-2022-49610 * CVE-2022-49611 * CVE-2022-49623 * CVE-2022-49627 * CVE-2022-49631 * CVE-2022-49640 * CVE-2022-49641 * CVE-2022-49643 * CVE-2022-49644 * CVE-2022-49645 * CVE-2022-49646 * CVE-2022-49647 * CVE-2022-49648 * CVE-2022-49649 * CVE-2022-49652 * CVE-2022-49657 * CVE-2022-49661 * CVE-2022-49670 * CVE-2022-49671 * CVE-2022-49673 * CVE-2022-49674 * CVE-2022-49678 * CVE-2022-49685 * CVE-2022-49687 * CVE-2022-49693 * CVE-2022-49700 * CVE-2022-49701 * CVE-2022-49703 * CVE-2022-49707 * CVE-2022-49708 * CVE-2022-49710 * CVE-2022-49711 * CVE-2022-49712 * CVE-2022-49713 * CVE-2022-49720 * CVE-2022-49723 * CVE-2022-49724 * CVE-2022-49729 * CVE-2022-49730 * CVE-2022-49731 * CVE-2022-49733 * CVE-2022-49739 * CVE-2023-2162 * CVE-2023-3567 * CVE-2023-52935 * CVE-2023-52973 * CVE-2023-52974 * CVE-2023-53000 * CVE-2023-53015 * CVE-2023-53024 * CVE-2024-50290 * CVE-2024-53063 * CVE-2024-56642 * CVE-2024-56651 * CVE-2024-57996 * CVE-2024-58014 * CVE-2025-21772 * CVE-2025-21780 CVSS scores: * CVE-2017-5753 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( SUSE ): 7.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( NVD ): 5.6 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2020-27835 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2020-27835 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47248 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2021-47631 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47631 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47641 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47641 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47642 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2021-47642 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2021-47650 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47651 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47651 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47651 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47652 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47652 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47653 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47653 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47653 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2021-47659 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2021-47659 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-0168 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-0168 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-1016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-1048 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-1048 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-1184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-2977 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2022-2977 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-29900 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-29900 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2022-29901 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-29901 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2022-3303 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3303 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49044 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49044 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49051 ( SUSE ): 4.3 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2022-49051 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N * CVE-2022-49053 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49053 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49053 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49055 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49058 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49059 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49059 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49063 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49063 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49063 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49065 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49065 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49073 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49076 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49076 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49078 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49078 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49082 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49082 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49083 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49085 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49085 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49091 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49098 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49098 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49100 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49111 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49114 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49114 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49114 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49122 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49137 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49137 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49137 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49145 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49145 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2022-49151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49153 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49153 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49155 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49156 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49157 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49157 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49158 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2022-49158 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2022-49159 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49159 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49162 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49164 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49175 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49185 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49189 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2022-49189 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L * CVE-2022-49196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49196 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49201 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49206 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49206 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49212 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49212 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49213 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49213 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49213 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49216 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49216 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49226 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49232 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49232 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49235 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49235 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49239 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49242 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49242 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49243 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49243 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49248 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49261 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49261 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49271 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49275 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49275 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49275 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49279 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49279 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49279 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49280 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49280 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49281 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49285 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49285 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49287 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49288 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49290 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49290 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2022-49290 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49291 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49291 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49291 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49292 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49293 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49295 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49295 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49295 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49297 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49297 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49298 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49298 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49298 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49299 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49299 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49300 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49300 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49300 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49301 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49301 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49301 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49302 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49302 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49304 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49304 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49305 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49305 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49307 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49307 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49313 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49313 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49314 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49314 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49314 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49315 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49315 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49316 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49316 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49316 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49320 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49321 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49321 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49321 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49326 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49326 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49326 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49327 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49327 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49331 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49332 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49335 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49335 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49343 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49343 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49347 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49347 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49349 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49349 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49352 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49352 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49357 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49357 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49370 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49370 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49371 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49371 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49373 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49373 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49375 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49375 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49376 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49376 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49376 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49382 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49385 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49394 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49394 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49396 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49398 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49399 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49402 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49404 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49410 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49411 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49411 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49413 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49413 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49413 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49414 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49416 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49421 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49422 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49437 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49437 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49438 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49438 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49441 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49446 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49451 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49455 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49459 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49459 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49460 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49460 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49462 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49465 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49465 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49465 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49467 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49473 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49474 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49474 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49475 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49481 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49482 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49489 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49489 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49490 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49491 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49493 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49493 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49493 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49495 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49498 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2022-49498 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2022-49503 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49504 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49505 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49505 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49508 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49514 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49517 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49521 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49521 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49522 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49522 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49524 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49524 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49525 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49525 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49526 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49526 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49527 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49527 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49527 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49532 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49532 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49534 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49534 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49534 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49535 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49535 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49535 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49536 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49536 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49536 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49537 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49537 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49541 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49541 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2022-49541 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49542 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49544 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49544 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49544 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49545 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49545 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49546 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49546 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49555 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49563 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49564 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49566 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49609 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49609 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49610 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2022-49610 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2022-49611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49623 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49627 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49627 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49631 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49631 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49640 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49641 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49643 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49643 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49644 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49644 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49646 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49647 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49652 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49657 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49670 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49671 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49673 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49685 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49685 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49693 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49700 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49700 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49703 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49711 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49711 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49712 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49720 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49720 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49723 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49729 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49729 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49729 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49730 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49731 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49731 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49733 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49739 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-2162 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-3567 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52935 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52973 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56642 ( SUSE ): 7.5 CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56642 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56651 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58014 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21780 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21780 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 Business Critical Linux * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Manager Proxy 4.2 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Server 4.2 An update that solves 249 vulnerabilities and has 26 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2021-47248: udp: fix race between close() and udp_abort() (bsc#1224867). * CVE-2022-49051: net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (bsc#1237903). * CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918). * CVE-2022-49275: can: m_can: m_can_tx_handler(): fix use after free of skb (bsc#1238719). * CVE-2022-49413: bfq: Update cgroup information before merging bio (bsc#1238710). * CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled (bsc#1238919). * CVE-2022-49545: ALSA: usb-audio: Cancel pending work at closing a MIDI substream (bsc#1238729). * CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238787). * CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238789). * CVE-2022-49739: gfs2: Always check inode size of inline inodes (bsc#1240207). * CVE-2023-52935: mm/khugepaged: fix ->anon_vma race (bsc#1240276). * CVE-2024-56642: tipc: Fix use-after-free of kernel socket in cleanup_bearer() (bsc#1235433). * CVE-2024-56651: can: hi311x: hi3110_can_ist(): fix potential use-after-free (bsc#1235528). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076). * CVE-2024-58014: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (bsc#1239109). * CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238911). * CVE-2025-21780: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (bsc#1239115). The following non-security bugs were fixed: * ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1239969). * btrfs: send: fix invalid clone operation for file that got its size decreased (bsc#1239969). * btrfs: send: use btrfs_file_extent_end() in send_write_or_clone() (bsc#1239969). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1263=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1263=1 * SUSE Linux Enterprise High Availability Extension 15 SP3 zypper in -t patch SUSE-SLE-Product-HA-15-SP3-2025-1263=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1263=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1263=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1263=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1263=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1263=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1263=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1263=1 ## Package List: * openSUSE Leap 15.3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.201.1 * openSUSE Leap 15.3 (noarch) * kernel-docs-html-5.3.18-150300.59.201.1 * kernel-macros-5.3.18-150300.59.201.1 * kernel-source-5.3.18-150300.59.201.1 * kernel-devel-5.3.18-150300.59.201.1 * kernel-source-vanilla-5.3.18-150300.59.201.1 * openSUSE Leap 15.3 (nosrc ppc64le x86_64) * kernel-kvmsmall-5.3.18-150300.59.201.1 * kernel-debug-5.3.18-150300.59.201.1 * openSUSE Leap 15.3 (ppc64le x86_64) * kernel-debug-debuginfo-5.3.18-150300.59.201.1 * kernel-kvmsmall-debugsource-5.3.18-150300.59.201.1 * kernel-kvmsmall-devel-debuginfo-5.3.18-150300.59.201.1 * kernel-kvmsmall-devel-5.3.18-150300.59.201.1 * kernel-debug-devel-5.3.18-150300.59.201.1 * kernel-debug-devel-debuginfo-5.3.18-150300.59.201.1 * kernel-debug-debugsource-5.3.18-150300.59.201.1 * kernel-kvmsmall-debuginfo-5.3.18-150300.59.201.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-5.3.18-150300.59.201.1 * kselftests-kmp-default-debuginfo-5.3.18-150300.59.201.1 * kernel-obs-qa-5.3.18-150300.59.201.1 * kernel-default-base-5.3.18-150300.59.201.1.150300.18.120.1 * cluster-md-kmp-default-5.3.18-150300.59.201.1 * kernel-default-optional-debuginfo-5.3.18-150300.59.201.1 * kernel-default-livepatch-5.3.18-150300.59.201.1 * dlm-kmp-default-debuginfo-5.3.18-150300.59.201.1 * kernel-default-debuginfo-5.3.18-150300.59.201.1 * kernel-default-debugsource-5.3.18-150300.59.201.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.201.1 * kernel-default-extra-debuginfo-5.3.18-150300.59.201.1 * reiserfs-kmp-default-5.3.18-150300.59.201.1 * dlm-kmp-default-5.3.18-150300.59.201.1 * gfs2-kmp-default-5.3.18-150300.59.201.1 * gfs2-kmp-default-debuginfo-5.3.18-150300.59.201.1 * ocfs2-kmp-default-5.3.18-150300.59.201.1 * kernel-syms-5.3.18-150300.59.201.1 * kernel-default-base-rebuild-5.3.18-150300.59.201.1.150300.18.120.1 * kernel-obs-build-debugsource-5.3.18-150300.59.201.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.201.1 * kernel-default-extra-5.3.18-150300.59.201.1 * kernel-default-optional-5.3.18-150300.59.201.1 * kernel-default-devel-5.3.18-150300.59.201.1 * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.201.1 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.201.1 * kselftests-kmp-default-5.3.18-150300.59.201.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.201.1 * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-default-livepatch-devel-5.3.18-150300.59.201.1 * kernel-livepatch-5_3_18-150300_59_201-default-1-150300.7.3.1 * kernel-livepatch-5_3_18-150300_59_201-default-debuginfo-1-150300.7.3.1 * kernel-livepatch-SLE15-SP3_Update_56-debugsource-1-150300.7.3.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_201-preempt-1-150300.7.3.1 * kernel-livepatch-5_3_18-150300_59_201-preempt-debuginfo-1-150300.7.3.1 * openSUSE Leap 15.3 (aarch64 x86_64) * dlm-kmp-preempt-debuginfo-5.3.18-150300.59.201.1 * kselftests-kmp-preempt-debuginfo-5.3.18-150300.59.201.1 * gfs2-kmp-preempt-5.3.18-150300.59.201.1 * kernel-preempt-debuginfo-5.3.18-150300.59.201.1 * gfs2-kmp-preempt-debuginfo-5.3.18-150300.59.201.1 * kernel-preempt-debugsource-5.3.18-150300.59.201.1 * kernel-preempt-devel-5.3.18-150300.59.201.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.201.1 * ocfs2-kmp-preempt-5.3.18-150300.59.201.1 * kernel-preempt-extra-5.3.18-150300.59.201.1 * cluster-md-kmp-preempt-debuginfo-5.3.18-150300.59.201.1 * reiserfs-kmp-preempt-5.3.18-150300.59.201.1 * ocfs2-kmp-preempt-debuginfo-5.3.18-150300.59.201.1 * kernel-preempt-extra-debuginfo-5.3.18-150300.59.201.1 * kernel-preempt-optional-5.3.18-150300.59.201.1 * kernel-preempt-optional-debuginfo-5.3.18-150300.59.201.1 * reiserfs-kmp-preempt-debuginfo-5.3.18-150300.59.201.1 * dlm-kmp-preempt-5.3.18-150300.59.201.1 * cluster-md-kmp-preempt-5.3.18-150300.59.201.1 * kselftests-kmp-preempt-5.3.18-150300.59.201.1 * openSUSE Leap 15.3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.201.1 * openSUSE Leap 15.3 (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.201.1 * openSUSE Leap 15.3 (s390x) * kernel-zfcpdump-debuginfo-5.3.18-150300.59.201.1 * kernel-zfcpdump-debugsource-5.3.18-150300.59.201.1 * openSUSE Leap 15.3 (nosrc) * dtb-aarch64-5.3.18-150300.59.201.1 * openSUSE Leap 15.3 (aarch64) * kernel-64kb-devel-debuginfo-5.3.18-150300.59.201.1 * dlm-kmp-64kb-5.3.18-150300.59.201.1 * gfs2-kmp-64kb-debuginfo-5.3.18-150300.59.201.1 * cluster-md-kmp-64kb-debuginfo-5.3.18-150300.59.201.1 * kernel-64kb-debuginfo-5.3.18-150300.59.201.1 * kernel-64kb-devel-5.3.18-150300.59.201.1 * dtb-altera-5.3.18-150300.59.201.1 * dtb-sprd-5.3.18-150300.59.201.1 * dtb-xilinx-5.3.18-150300.59.201.1 * dtb-hisilicon-5.3.18-150300.59.201.1 * dtb-exynos-5.3.18-150300.59.201.1 * kselftests-kmp-64kb-debuginfo-5.3.18-150300.59.201.1 * dtb-apm-5.3.18-150300.59.201.1 * dtb-mediatek-5.3.18-150300.59.201.1 * gfs2-kmp-64kb-5.3.18-150300.59.201.1 * kernel-64kb-extra-debuginfo-5.3.18-150300.59.201.1 * dtb-freescale-5.3.18-150300.59.201.1 * kselftests-kmp-64kb-5.3.18-150300.59.201.1 * dtb-nvidia-5.3.18-150300.59.201.1 * dtb-amd-5.3.18-150300.59.201.1 * dtb-lg-5.3.18-150300.59.201.1 * ocfs2-kmp-64kb-debuginfo-5.3.18-150300.59.201.1 * dtb-cavium-5.3.18-150300.59.201.1 * cluster-md-kmp-64kb-5.3.18-150300.59.201.1 * reiserfs-kmp-64kb-5.3.18-150300.59.201.1 * dtb-marvell-5.3.18-150300.59.201.1 * dtb-qcom-5.3.18-150300.59.201.1 * kernel-64kb-optional-debuginfo-5.3.18-150300.59.201.1 * dtb-socionext-5.3.18-150300.59.201.1 * dtb-amlogic-5.3.18-150300.59.201.1 * kernel-64kb-optional-5.3.18-150300.59.201.1 * dtb-allwinner-5.3.18-150300.59.201.1 * dtb-rockchip-5.3.18-150300.59.201.1 * reiserfs-kmp-64kb-debuginfo-5.3.18-150300.59.201.1 * dtb-arm-5.3.18-150300.59.201.1 * dtb-zte-5.3.18-150300.59.201.1 * dtb-al-5.3.18-150300.59.201.1 * dlm-kmp-64kb-debuginfo-5.3.18-150300.59.201.1 * dtb-renesas-5.3.18-150300.59.201.1 * kernel-64kb-debugsource-5.3.18-150300.59.201.1 * ocfs2-kmp-64kb-5.3.18-150300.59.201.1 * dtb-broadcom-5.3.18-150300.59.201.1 * kernel-64kb-extra-5.3.18-150300.59.201.1 * openSUSE Leap 15.3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Live Patching 15-SP3 (nosrc) * kernel-default-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-default-livepatch-devel-5.3.18-150300.59.201.1 * kernel-default-debugsource-5.3.18-150300.59.201.1 * kernel-livepatch-5_3_18-150300_59_201-default-debuginfo-1-150300.7.3.1 * kernel-livepatch-5_3_18-150300_59_201-default-1-150300.7.3.1 * kernel-default-livepatch-5.3.18-150300.59.201.1 * kernel-default-debuginfo-5.3.18-150300.59.201.1 * kernel-livepatch-SLE15-SP3_Update_56-debugsource-1-150300.7.3.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (aarch64 ppc64le s390x x86_64) * gfs2-kmp-default-debuginfo-5.3.18-150300.59.201.1 * dlm-kmp-default-5.3.18-150300.59.201.1 * cluster-md-kmp-default-debuginfo-5.3.18-150300.59.201.1 * gfs2-kmp-default-5.3.18-150300.59.201.1 * cluster-md-kmp-default-5.3.18-150300.59.201.1 * dlm-kmp-default-debuginfo-5.3.18-150300.59.201.1 * ocfs2-kmp-default-5.3.18-150300.59.201.1 * ocfs2-kmp-default-debuginfo-5.3.18-150300.59.201.1 * kernel-default-debugsource-5.3.18-150300.59.201.1 * kernel-default-debuginfo-5.3.18-150300.59.201.1 * SUSE Linux Enterprise High Availability Extension 15 SP3 (nosrc) * kernel-default-5.3.18-150300.59.201.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.201.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64) * kernel-64kb-devel-debuginfo-5.3.18-150300.59.201.1 * kernel-64kb-debugsource-5.3.18-150300.59.201.1 * kernel-64kb-devel-5.3.18-150300.59.201.1 * kernel-64kb-debuginfo-5.3.18-150300.59.201.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.201.1 * kernel-default-5.3.18-150300.59.201.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * kernel-obs-build-5.3.18-150300.59.201.1 * kernel-preempt-debugsource-5.3.18-150300.59.201.1 * kernel-preempt-debuginfo-5.3.18-150300.59.201.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.201.1 * kernel-preempt-devel-5.3.18-150300.59.201.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.201.1 * kernel-default-devel-5.3.18-150300.59.201.1 * kernel-default-base-5.3.18-150300.59.201.1.150300.18.120.1 * kernel-syms-5.3.18-150300.59.201.1 * reiserfs-kmp-default-5.3.18-150300.59.201.1 * kernel-obs-build-debugsource-5.3.18-150300.59.201.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.201.1 * kernel-default-debugsource-5.3.18-150300.59.201.1 * kernel-default-debuginfo-5.3.18-150300.59.201.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * kernel-macros-5.3.18-150300.59.201.1 * kernel-source-5.3.18-150300.59.201.1 * kernel-devel-5.3.18-150300.59.201.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64) * kernel-64kb-devel-debuginfo-5.3.18-150300.59.201.1 * kernel-64kb-debugsource-5.3.18-150300.59.201.1 * kernel-64kb-devel-5.3.18-150300.59.201.1 * kernel-64kb-debuginfo-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * kernel-obs-build-5.3.18-150300.59.201.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.201.1 * kernel-default-devel-5.3.18-150300.59.201.1 * kernel-default-base-5.3.18-150300.59.201.1.150300.18.120.1 * kernel-syms-5.3.18-150300.59.201.1 * reiserfs-kmp-default-5.3.18-150300.59.201.1 * kernel-obs-build-debugsource-5.3.18-150300.59.201.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.201.1 * kernel-default-debugsource-5.3.18-150300.59.201.1 * kernel-default-debuginfo-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * kernel-macros-5.3.18-150300.59.201.1 * kernel-source-5.3.18-150300.59.201.1 * kernel-devel-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch nosrc) * kernel-docs-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 x86_64) * kernel-preempt-devel-5.3.18-150300.59.201.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.201.1 * kernel-preempt-debugsource-5.3.18-150300.59.201.1 * kernel-preempt-debuginfo-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (nosrc s390x) * kernel-zfcpdump-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (s390x) * kernel-zfcpdump-debuginfo-5.3.18-150300.59.201.1 * kernel-zfcpdump-debugsource-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc ppc64le x86_64) * kernel-default-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * kernel-obs-build-5.3.18-150300.59.201.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.201.1 * kernel-default-devel-5.3.18-150300.59.201.1 * kernel-default-base-5.3.18-150300.59.201.1.150300.18.120.1 * kernel-syms-5.3.18-150300.59.201.1 * reiserfs-kmp-default-5.3.18-150300.59.201.1 * kernel-obs-build-debugsource-5.3.18-150300.59.201.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.201.1 * kernel-default-debugsource-5.3.18-150300.59.201.1 * kernel-default-debuginfo-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * kernel-macros-5.3.18-150300.59.201.1 * kernel-source-5.3.18-150300.59.201.1 * kernel-devel-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch nosrc) * kernel-docs-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (nosrc x86_64) * kernel-preempt-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * kernel-preempt-devel-5.3.18-150300.59.201.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.201.1 * kernel-preempt-debugsource-5.3.18-150300.59.201.1 * kernel-preempt-debuginfo-5.3.18-150300.59.201.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc) * kernel-64kb-5.3.18-150300.59.201.1 * SUSE Enterprise Storage 7.1 (aarch64) * kernel-64kb-devel-debuginfo-5.3.18-150300.59.201.1 * kernel-64kb-debugsource-5.3.18-150300.59.201.1 * kernel-64kb-devel-5.3.18-150300.59.201.1 * kernel-64kb-debuginfo-5.3.18-150300.59.201.1 * SUSE Enterprise Storage 7.1 (aarch64 nosrc x86_64) * kernel-preempt-5.3.18-150300.59.201.1 * kernel-default-5.3.18-150300.59.201.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * kernel-obs-build-5.3.18-150300.59.201.1 * kernel-preempt-debugsource-5.3.18-150300.59.201.1 * kernel-preempt-debuginfo-5.3.18-150300.59.201.1 * reiserfs-kmp-default-debuginfo-5.3.18-150300.59.201.1 * kernel-preempt-devel-5.3.18-150300.59.201.1 * kernel-preempt-devel-debuginfo-5.3.18-150300.59.201.1 * kernel-default-devel-5.3.18-150300.59.201.1 * kernel-default-base-5.3.18-150300.59.201.1.150300.18.120.1 * kernel-syms-5.3.18-150300.59.201.1 * reiserfs-kmp-default-5.3.18-150300.59.201.1 * kernel-obs-build-debugsource-5.3.18-150300.59.201.1 * kernel-default-devel-debuginfo-5.3.18-150300.59.201.1 * kernel-default-debugsource-5.3.18-150300.59.201.1 * kernel-default-debuginfo-5.3.18-150300.59.201.1 * SUSE Enterprise Storage 7.1 (noarch) * kernel-macros-5.3.18-150300.59.201.1 * kernel-source-5.3.18-150300.59.201.1 * kernel-devel-5.3.18-150300.59.201.1 * SUSE Enterprise Storage 7.1 (noarch nosrc) * kernel-docs-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * kernel-default-base-5.3.18-150300.59.201.1.150300.18.120.1 * kernel-default-debugsource-5.3.18-150300.59.201.1 * kernel-default-debuginfo-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.201.1.150300.18.120.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * kernel-default-debugsource-5.3.18-150300.59.201.1 * kernel-default-debuginfo-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 nosrc s390x x86_64) * kernel-default-5.3.18-150300.59.201.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64) * kernel-default-base-5.3.18-150300.59.201.1.150300.18.120.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * kernel-default-debugsource-5.3.18-150300.59.201.1 * kernel-default-debuginfo-5.3.18-150300.59.201.1 ## References: * https://www.suse.com/security/cve/CVE-2017-5753.html * https://www.suse.com/security/cve/CVE-2020-27835.html * https://www.suse.com/security/cve/CVE-2021-47248.html * https://www.suse.com/security/cve/CVE-2021-47631.html * https://www.suse.com/security/cve/CVE-2021-47641.html * https://www.suse.com/security/cve/CVE-2021-47642.html * https://www.suse.com/security/cve/CVE-2021-47650.html * https://www.suse.com/security/cve/CVE-2021-47651.html * https://www.suse.com/security/cve/CVE-2021-47652.html * https://www.suse.com/security/cve/CVE-2021-47653.html * https://www.suse.com/security/cve/CVE-2021-47659.html * https://www.suse.com/security/cve/CVE-2022-0168.html * https://www.suse.com/security/cve/CVE-2022-1016.html * https://www.suse.com/security/cve/CVE-2022-1048.html * https://www.suse.com/security/cve/CVE-2022-1184.html * https://www.suse.com/security/cve/CVE-2022-2977.html * https://www.suse.com/security/cve/CVE-2022-29900.html * https://www.suse.com/security/cve/CVE-2022-29901.html * https://www.suse.com/security/cve/CVE-2022-3303.html * https://www.suse.com/security/cve/CVE-2022-49044.html * https://www.suse.com/security/cve/CVE-2022-49051.html * https://www.suse.com/security/cve/CVE-2022-49053.html * https://www.suse.com/security/cve/CVE-2022-49055.html * https://www.suse.com/security/cve/CVE-2022-49058.html * https://www.suse.com/security/cve/CVE-2022-49059.html * https://www.suse.com/security/cve/CVE-2022-49063.html * https://www.suse.com/security/cve/CVE-2022-49065.html * https://www.suse.com/security/cve/CVE-2022-49073.html * https://www.suse.com/security/cve/CVE-2022-49076.html * https://www.suse.com/security/cve/CVE-2022-49078.html * https://www.suse.com/security/cve/CVE-2022-49082.html * https://www.suse.com/security/cve/CVE-2022-49083.html * https://www.suse.com/security/cve/CVE-2022-49085.html * https://www.suse.com/security/cve/CVE-2022-49091.html * https://www.suse.com/security/cve/CVE-2022-49095.html * https://www.suse.com/security/cve/CVE-2022-49098.html * https://www.suse.com/security/cve/CVE-2022-49100.html * https://www.suse.com/security/cve/CVE-2022-49111.html * https://www.suse.com/security/cve/CVE-2022-49114.html * https://www.suse.com/security/cve/CVE-2022-49122.html * https://www.suse.com/security/cve/CVE-2022-49137.html * https://www.suse.com/security/cve/CVE-2022-49145.html * https://www.suse.com/security/cve/CVE-2022-49151.html * https://www.suse.com/security/cve/CVE-2022-49153.html * https://www.suse.com/security/cve/CVE-2022-49155.html * https://www.suse.com/security/cve/CVE-2022-49156.html * https://www.suse.com/security/cve/CVE-2022-49157.html * https://www.suse.com/security/cve/CVE-2022-49158.html * https://www.suse.com/security/cve/CVE-2022-49159.html * https://www.suse.com/security/cve/CVE-2022-49160.html * https://www.suse.com/security/cve/CVE-2022-49162.html * https://www.suse.com/security/cve/CVE-2022-49164.html * https://www.suse.com/security/cve/CVE-2022-49175.html * https://www.suse.com/security/cve/CVE-2022-49185.html * https://www.suse.com/security/cve/CVE-2022-49189.html * https://www.suse.com/security/cve/CVE-2022-49196.html * https://www.suse.com/security/cve/CVE-2022-49200.html * https://www.suse.com/security/cve/CVE-2022-49201.html * https://www.suse.com/security/cve/CVE-2022-49206.html * https://www.suse.com/security/cve/CVE-2022-49212.html * https://www.suse.com/security/cve/CVE-2022-49213.html * https://www.suse.com/security/cve/CVE-2022-49216.html * https://www.suse.com/security/cve/CVE-2022-49217.html * https://www.suse.com/security/cve/CVE-2022-49224.html * https://www.suse.com/security/cve/CVE-2022-49226.html * https://www.suse.com/security/cve/CVE-2022-49232.html * https://www.suse.com/security/cve/CVE-2022-49235.html * https://www.suse.com/security/cve/CVE-2022-49239.html * https://www.suse.com/security/cve/CVE-2022-49242.html * https://www.suse.com/security/cve/CVE-2022-49243.html * https://www.suse.com/security/cve/CVE-2022-49247.html * https://www.suse.com/security/cve/CVE-2022-49248.html * https://www.suse.com/security/cve/CVE-2022-49253.html * https://www.suse.com/security/cve/CVE-2022-49259.html * https://www.suse.com/security/cve/CVE-2022-49261.html * https://www.suse.com/security/cve/CVE-2022-49263.html * https://www.suse.com/security/cve/CVE-2022-49264.html * https://www.suse.com/security/cve/CVE-2022-49271.html * https://www.suse.com/security/cve/CVE-2022-49272.html * https://www.suse.com/security/cve/CVE-2022-49275.html * https://www.suse.com/security/cve/CVE-2022-49279.html * https://www.suse.com/security/cve/CVE-2022-49280.html * https://www.suse.com/security/cve/CVE-2022-49281.html * https://www.suse.com/security/cve/CVE-2022-49285.html * https://www.suse.com/security/cve/CVE-2022-49287.html * https://www.suse.com/security/cve/CVE-2022-49288.html * https://www.suse.com/security/cve/CVE-2022-49290.html * https://www.suse.com/security/cve/CVE-2022-49291.html * https://www.suse.com/security/cve/CVE-2022-49292.html * https://www.suse.com/security/cve/CVE-2022-49293.html * https://www.suse.com/security/cve/CVE-2022-49295.html * https://www.suse.com/security/cve/CVE-2022-49297.html * https://www.suse.com/security/cve/CVE-2022-49298.html * https://www.suse.com/security/cve/CVE-2022-49299.html * https://www.suse.com/security/cve/CVE-2022-49300.html * https://www.suse.com/security/cve/CVE-2022-49301.html * https://www.suse.com/security/cve/CVE-2022-49302.html * https://www.suse.com/security/cve/CVE-2022-49304.html * https://www.suse.com/security/cve/CVE-2022-49305.html * https://www.suse.com/security/cve/CVE-2022-49307.html * https://www.suse.com/security/cve/CVE-2022-49313.html * https://www.suse.com/security/cve/CVE-2022-49314.html * https://www.suse.com/security/cve/CVE-2022-49315.html * https://www.suse.com/security/cve/CVE-2022-49316.html * https://www.suse.com/security/cve/CVE-2022-49320.html * https://www.suse.com/security/cve/CVE-2022-49321.html * https://www.suse.com/security/cve/CVE-2022-49326.html * https://www.suse.com/security/cve/CVE-2022-49327.html * https://www.suse.com/security/cve/CVE-2022-49331.html * https://www.suse.com/security/cve/CVE-2022-49332.html * https://www.suse.com/security/cve/CVE-2022-49335.html * https://www.suse.com/security/cve/CVE-2022-49343.html * https://www.suse.com/security/cve/CVE-2022-49347.html * https://www.suse.com/security/cve/CVE-2022-49349.html * https://www.suse.com/security/cve/CVE-2022-49352.html * https://www.suse.com/security/cve/CVE-2022-49357.html * https://www.suse.com/security/cve/CVE-2022-49370.html * https://www.suse.com/security/cve/CVE-2022-49371.html * https://www.suse.com/security/cve/CVE-2022-49373.html * https://www.suse.com/security/cve/CVE-2022-49375.html * https://www.suse.com/security/cve/CVE-2022-49376.html * https://www.suse.com/security/cve/CVE-2022-49382.html * https://www.suse.com/security/cve/CVE-2022-49385.html * https://www.suse.com/security/cve/CVE-2022-49389.html * https://www.suse.com/security/cve/CVE-2022-49394.html * https://www.suse.com/security/cve/CVE-2022-49396.html * https://www.suse.com/security/cve/CVE-2022-49397.html * https://www.suse.com/security/cve/CVE-2022-49398.html * https://www.suse.com/security/cve/CVE-2022-49399.html * https://www.suse.com/security/cve/CVE-2022-49402.html * https://www.suse.com/security/cve/CVE-2022-49404.html * https://www.suse.com/security/cve/CVE-2022-49409.html * https://www.suse.com/security/cve/CVE-2022-49410.html * https://www.suse.com/security/cve/CVE-2022-49411.html * https://www.suse.com/security/cve/CVE-2022-49413.html * https://www.suse.com/security/cve/CVE-2022-49414.html * https://www.suse.com/security/cve/CVE-2022-49416.html * https://www.suse.com/security/cve/CVE-2022-49421.html * https://www.suse.com/security/cve/CVE-2022-49422.html * https://www.suse.com/security/cve/CVE-2022-49437.html * https://www.suse.com/security/cve/CVE-2022-49438.html * https://www.suse.com/security/cve/CVE-2022-49441.html * https://www.suse.com/security/cve/CVE-2022-49442.html * https://www.suse.com/security/cve/CVE-2022-49446.html * https://www.suse.com/security/cve/CVE-2022-49451.html * https://www.suse.com/security/cve/CVE-2022-49455.html * https://www.suse.com/security/cve/CVE-2022-49459.html * https://www.suse.com/security/cve/CVE-2022-49460.html * https://www.suse.com/security/cve/CVE-2022-49462.html * https://www.suse.com/security/cve/CVE-2022-49465.html * https://www.suse.com/security/cve/CVE-2022-49467.html * https://www.suse.com/security/cve/CVE-2022-49473.html * https://www.suse.com/security/cve/CVE-2022-49474.html * https://www.suse.com/security/cve/CVE-2022-49475.html * https://www.suse.com/security/cve/CVE-2022-49478.html * https://www.suse.com/security/cve/CVE-2022-49481.html * https://www.suse.com/security/cve/CVE-2022-49482.html * https://www.suse.com/security/cve/CVE-2022-49488.html * https://www.suse.com/security/cve/CVE-2022-49489.html * https://www.suse.com/security/cve/CVE-2022-49490.html * https://www.suse.com/security/cve/CVE-2022-49491.html * https://www.suse.com/security/cve/CVE-2022-49493.html * https://www.suse.com/security/cve/CVE-2022-49495.html * https://www.suse.com/security/cve/CVE-2022-49498.html * https://www.suse.com/security/cve/CVE-2022-49503.html * https://www.suse.com/security/cve/CVE-2022-49504.html * https://www.suse.com/security/cve/CVE-2022-49505.html * https://www.suse.com/security/cve/CVE-2022-49508.html * https://www.suse.com/security/cve/CVE-2022-49514.html * https://www.suse.com/security/cve/CVE-2022-49517.html * https://www.suse.com/security/cve/CVE-2022-49521.html * https://www.suse.com/security/cve/CVE-2022-49522.html * https://www.suse.com/security/cve/CVE-2022-49524.html * https://www.suse.com/security/cve/CVE-2022-49525.html * https://www.suse.com/security/cve/CVE-2022-49526.html * https://www.suse.com/security/cve/CVE-2022-49527.html * https://www.suse.com/security/cve/CVE-2022-49532.html * https://www.suse.com/security/cve/CVE-2022-49534.html * https://www.suse.com/security/cve/CVE-2022-49535.html * https://www.suse.com/security/cve/CVE-2022-49536.html * https://www.suse.com/security/cve/CVE-2022-49537.html * https://www.suse.com/security/cve/CVE-2022-49541.html * https://www.suse.com/security/cve/CVE-2022-49542.html * https://www.suse.com/security/cve/CVE-2022-49544.html * https://www.suse.com/security/cve/CVE-2022-49545.html * https://www.suse.com/security/cve/CVE-2022-49546.html * https://www.suse.com/security/cve/CVE-2022-49555.html * https://www.suse.com/security/cve/CVE-2022-49563.html * https://www.suse.com/security/cve/CVE-2022-49564.html * https://www.suse.com/security/cve/CVE-2022-49566.html * https://www.suse.com/security/cve/CVE-2022-49609.html * https://www.suse.com/security/cve/CVE-2022-49610.html * https://www.suse.com/security/cve/CVE-2022-49611.html * https://www.suse.com/security/cve/CVE-2022-49623.html * https://www.suse.com/security/cve/CVE-2022-49627.html * https://www.suse.com/security/cve/CVE-2022-49631.html * https://www.suse.com/security/cve/CVE-2022-49640.html * https://www.suse.com/security/cve/CVE-2022-49641.html * https://www.suse.com/security/cve/CVE-2022-49643.html * https://www.suse.com/security/cve/CVE-2022-49644.html * https://www.suse.com/security/cve/CVE-2022-49645.html * https://www.suse.com/security/cve/CVE-2022-49646.html * https://www.suse.com/security/cve/CVE-2022-49647.html * https://www.suse.com/security/cve/CVE-2022-49648.html * https://www.suse.com/security/cve/CVE-2022-49649.html * https://www.suse.com/security/cve/CVE-2022-49652.html * https://www.suse.com/security/cve/CVE-2022-49657.html * https://www.suse.com/security/cve/CVE-2022-49661.html * https://www.suse.com/security/cve/CVE-2022-49670.html * https://www.suse.com/security/cve/CVE-2022-49671.html * https://www.suse.com/security/cve/CVE-2022-49673.html * https://www.suse.com/security/cve/CVE-2022-49674.html * https://www.suse.com/security/cve/CVE-2022-49678.html * https://www.suse.com/security/cve/CVE-2022-49685.html * https://www.suse.com/security/cve/CVE-2022-49687.html * https://www.suse.com/security/cve/CVE-2022-49693.html * https://www.suse.com/security/cve/CVE-2022-49700.html * https://www.suse.com/security/cve/CVE-2022-49701.html * https://www.suse.com/security/cve/CVE-2022-49703.html * https://www.suse.com/security/cve/CVE-2022-49707.html * https://www.suse.com/security/cve/CVE-2022-49708.html * https://www.suse.com/security/cve/CVE-2022-49710.html * https://www.suse.com/security/cve/CVE-2022-49711.html * https://www.suse.com/security/cve/CVE-2022-49712.html * https://www.suse.com/security/cve/CVE-2022-49713.html * https://www.suse.com/security/cve/CVE-2022-49720.html * https://www.suse.com/security/cve/CVE-2022-49723.html * https://www.suse.com/security/cve/CVE-2022-49724.html * https://www.suse.com/security/cve/CVE-2022-49729.html * https://www.suse.com/security/cve/CVE-2022-49730.html * https://www.suse.com/security/cve/CVE-2022-49731.html * https://www.suse.com/security/cve/CVE-2022-49733.html * https://www.suse.com/security/cve/CVE-2022-49739.html * https://www.suse.com/security/cve/CVE-2023-2162.html * https://www.suse.com/security/cve/CVE-2023-3567.html * https://www.suse.com/security/cve/CVE-2023-52935.html * https://www.suse.com/security/cve/CVE-2023-52973.html * https://www.suse.com/security/cve/CVE-2023-52974.html * https://www.suse.com/security/cve/CVE-2023-53000.html * https://www.suse.com/security/cve/CVE-2023-53015.html * https://www.suse.com/security/cve/CVE-2023-53024.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-56642.html * https://www.suse.com/security/cve/CVE-2024-56651.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58014.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21780.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1179878 * https://bugzilla.suse.com/show_bug.cgi?id=1180814 * https://bugzilla.suse.com/show_bug.cgi?id=1185762 * https://bugzilla.suse.com/show_bug.cgi?id=1195823 * https://bugzilla.suse.com/show_bug.cgi?id=1196444 * https://bugzilla.suse.com/show_bug.cgi?id=1197158 * https://bugzilla.suse.com/show_bug.cgi?id=1197227 * https://bugzilla.suse.com/show_bug.cgi?id=1197302 * https://bugzilla.suse.com/show_bug.cgi?id=1197331 * https://bugzilla.suse.com/show_bug.cgi?id=1197472 * https://bugzilla.suse.com/show_bug.cgi?id=1197661 * https://bugzilla.suse.com/show_bug.cgi?id=1197926 * https://bugzilla.suse.com/show_bug.cgi?id=1198577 * https://bugzilla.suse.com/show_bug.cgi?id=1198660 * https://bugzilla.suse.com/show_bug.cgi?id=1199657 * https://bugzilla.suse.com/show_bug.cgi?id=1200045 * https://bugzilla.suse.com/show_bug.cgi?id=1200217 * https://bugzilla.suse.com/show_bug.cgi?id=1200571 * https://bugzilla.suse.com/show_bug.cgi?id=1200807 * https://bugzilla.suse.com/show_bug.cgi?id=1200809 * https://bugzilla.suse.com/show_bug.cgi?id=1200825 * https://bugzilla.suse.com/show_bug.cgi?id=1200871 * https://bugzilla.suse.com/show_bug.cgi?id=1200872 * https://bugzilla.suse.com/show_bug.cgi?id=1201193 * https://bugzilla.suse.com/show_bug.cgi?id=1201381 * https://bugzilla.suse.com/show_bug.cgi?id=1201610 * https://bugzilla.suse.com/show_bug.cgi?id=1202672 * https://bugzilla.suse.com/show_bug.cgi?id=1202711 * https://bugzilla.suse.com/show_bug.cgi?id=1203769 * https://bugzilla.suse.com/show_bug.cgi?id=1207186 * https://bugzilla.suse.com/show_bug.cgi?id=1209547 * https://bugzilla.suse.com/show_bug.cgi?id=1210647 * https://bugzilla.suse.com/show_bug.cgi?id=1213167 * https://bugzilla.suse.com/show_bug.cgi?id=1224867 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1230326 * https://bugzilla.suse.com/show_bug.cgi?id=1231375 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1235433 * https://bugzilla.suse.com/show_bug.cgi?id=1235528 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237718 * https://bugzilla.suse.com/show_bug.cgi?id=1237721 * https://bugzilla.suse.com/show_bug.cgi?id=1237723 * https://bugzilla.suse.com/show_bug.cgi?id=1237726 * https://bugzilla.suse.com/show_bug.cgi?id=1237734 * https://bugzilla.suse.com/show_bug.cgi?id=1237735 * https://bugzilla.suse.com/show_bug.cgi?id=1237736 * https://bugzilla.suse.com/show_bug.cgi?id=1237738 * https://bugzilla.suse.com/show_bug.cgi?id=1237739 * https://bugzilla.suse.com/show_bug.cgi?id=1237740 * https://bugzilla.suse.com/show_bug.cgi?id=1237742 * https://bugzilla.suse.com/show_bug.cgi?id=1237746 * https://bugzilla.suse.com/show_bug.cgi?id=1237748 * https://bugzilla.suse.com/show_bug.cgi?id=1237752 * https://bugzilla.suse.com/show_bug.cgi?id=1237778 * https://bugzilla.suse.com/show_bug.cgi?id=1237782 * https://bugzilla.suse.com/show_bug.cgi?id=1237783 * https://bugzilla.suse.com/show_bug.cgi?id=1237784 * https://bugzilla.suse.com/show_bug.cgi?id=1237788 * https://bugzilla.suse.com/show_bug.cgi?id=1237798 * https://bugzilla.suse.com/show_bug.cgi?id=1237810 * https://bugzilla.suse.com/show_bug.cgi?id=1237813 * https://bugzilla.suse.com/show_bug.cgi?id=1237814 * https://bugzilla.suse.com/show_bug.cgi?id=1237815 * https://bugzilla.suse.com/show_bug.cgi?id=1237823 * https://bugzilla.suse.com/show_bug.cgi?id=1237829 * https://bugzilla.suse.com/show_bug.cgi?id=1237831 * https://bugzilla.suse.com/show_bug.cgi?id=1237839 * https://bugzilla.suse.com/show_bug.cgi?id=1237840 * https://bugzilla.suse.com/show_bug.cgi?id=1237846 * https://bugzilla.suse.com/show_bug.cgi?id=1237868 * https://bugzilla.suse.com/show_bug.cgi?id=1237872 * https://bugzilla.suse.com/show_bug.cgi?id=1237903 * https://bugzilla.suse.com/show_bug.cgi?id=1237916 * https://bugzilla.suse.com/show_bug.cgi?id=1237918 * https://bugzilla.suse.com/show_bug.cgi?id=1237932 * https://bugzilla.suse.com/show_bug.cgi?id=1237940 * https://bugzilla.suse.com/show_bug.cgi?id=1237941 * https://bugzilla.suse.com/show_bug.cgi?id=1237951 * https://bugzilla.suse.com/show_bug.cgi?id=1237954 * https://bugzilla.suse.com/show_bug.cgi?id=1237958 * https://bugzilla.suse.com/show_bug.cgi?id=1237963 * https://bugzilla.suse.com/show_bug.cgi?id=1237983 * https://bugzilla.suse.com/show_bug.cgi?id=1237984 * https://bugzilla.suse.com/show_bug.cgi?id=1237996 * https://bugzilla.suse.com/show_bug.cgi?id=1237997 * https://bugzilla.suse.com/show_bug.cgi?id=1237998 * https://bugzilla.suse.com/show_bug.cgi?id=1238000 * https://bugzilla.suse.com/show_bug.cgi?id=1238007 * https://bugzilla.suse.com/show_bug.cgi?id=1238013 * https://bugzilla.suse.com/show_bug.cgi?id=1238022 * https://bugzilla.suse.com/show_bug.cgi?id=1238030 * https://bugzilla.suse.com/show_bug.cgi?id=1238036 * https://bugzilla.suse.com/show_bug.cgi?id=1238046 * https://bugzilla.suse.com/show_bug.cgi?id=1238071 * https://bugzilla.suse.com/show_bug.cgi?id=1238079 * https://bugzilla.suse.com/show_bug.cgi?id=1238096 * https://bugzilla.suse.com/show_bug.cgi?id=1238099 * https://bugzilla.suse.com/show_bug.cgi?id=1238103 * https://bugzilla.suse.com/show_bug.cgi?id=1238108 * https://bugzilla.suse.com/show_bug.cgi?id=1238111 * https://bugzilla.suse.com/show_bug.cgi?id=1238123 * https://bugzilla.suse.com/show_bug.cgi?id=1238126 * https://bugzilla.suse.com/show_bug.cgi?id=1238131 * https://bugzilla.suse.com/show_bug.cgi?id=1238135 * https://bugzilla.suse.com/show_bug.cgi?id=1238139 * https://bugzilla.suse.com/show_bug.cgi?id=1238146 * https://bugzilla.suse.com/show_bug.cgi?id=1238149 * https://bugzilla.suse.com/show_bug.cgi?id=1238150 * https://bugzilla.suse.com/show_bug.cgi?id=1238155 * https://bugzilla.suse.com/show_bug.cgi?id=1238156 * https://bugzilla.suse.com/show_bug.cgi?id=1238158 * https://bugzilla.suse.com/show_bug.cgi?id=1238162 * https://bugzilla.suse.com/show_bug.cgi?id=1238166 * https://bugzilla.suse.com/show_bug.cgi?id=1238168 * https://bugzilla.suse.com/show_bug.cgi?id=1238169 * https://bugzilla.suse.com/show_bug.cgi?id=1238170 * https://bugzilla.suse.com/show_bug.cgi?id=1238171 * https://bugzilla.suse.com/show_bug.cgi?id=1238172 * https://bugzilla.suse.com/show_bug.cgi?id=1238175 * https://bugzilla.suse.com/show_bug.cgi?id=1238177 * https://bugzilla.suse.com/show_bug.cgi?id=1238181 * https://bugzilla.suse.com/show_bug.cgi?id=1238183 * https://bugzilla.suse.com/show_bug.cgi?id=1238184 * https://bugzilla.suse.com/show_bug.cgi?id=1238228 * https://bugzilla.suse.com/show_bug.cgi?id=1238229 * https://bugzilla.suse.com/show_bug.cgi?id=1238231 * https://bugzilla.suse.com/show_bug.cgi?id=1238235 * https://bugzilla.suse.com/show_bug.cgi?id=1238236 * https://bugzilla.suse.com/show_bug.cgi?id=1238239 * https://bugzilla.suse.com/show_bug.cgi?id=1238241 * https://bugzilla.suse.com/show_bug.cgi?id=1238242 * https://bugzilla.suse.com/show_bug.cgi?id=1238243 * https://bugzilla.suse.com/show_bug.cgi?id=1238244 * https://bugzilla.suse.com/show_bug.cgi?id=1238249 * https://bugzilla.suse.com/show_bug.cgi?id=1238255 * https://bugzilla.suse.com/show_bug.cgi?id=1238256 * https://bugzilla.suse.com/show_bug.cgi?id=1238257 * https://bugzilla.suse.com/show_bug.cgi?id=1238263 * https://bugzilla.suse.com/show_bug.cgi?id=1238264 * https://bugzilla.suse.com/show_bug.cgi?id=1238266 * https://bugzilla.suse.com/show_bug.cgi?id=1238267 * https://bugzilla.suse.com/show_bug.cgi?id=1238269 * https://bugzilla.suse.com/show_bug.cgi?id=1238271 * https://bugzilla.suse.com/show_bug.cgi?id=1238272 * https://bugzilla.suse.com/show_bug.cgi?id=1238274 * https://bugzilla.suse.com/show_bug.cgi?id=1238275 * https://bugzilla.suse.com/show_bug.cgi?id=1238276 * https://bugzilla.suse.com/show_bug.cgi?id=1238278 * https://bugzilla.suse.com/show_bug.cgi?id=1238279 * https://bugzilla.suse.com/show_bug.cgi?id=1238281 * https://bugzilla.suse.com/show_bug.cgi?id=1238284 * https://bugzilla.suse.com/show_bug.cgi?id=1238289 * https://bugzilla.suse.com/show_bug.cgi?id=1238293 * https://bugzilla.suse.com/show_bug.cgi?id=1238306 * https://bugzilla.suse.com/show_bug.cgi?id=1238307 * https://bugzilla.suse.com/show_bug.cgi?id=1238313 * https://bugzilla.suse.com/show_bug.cgi?id=1238327 * https://bugzilla.suse.com/show_bug.cgi?id=1238331 * https://bugzilla.suse.com/show_bug.cgi?id=1238333 * https://bugzilla.suse.com/show_bug.cgi?id=1238334 * https://bugzilla.suse.com/show_bug.cgi?id=1238336 * https://bugzilla.suse.com/show_bug.cgi?id=1238337 * https://bugzilla.suse.com/show_bug.cgi?id=1238338 * https://bugzilla.suse.com/show_bug.cgi?id=1238343 * https://bugzilla.suse.com/show_bug.cgi?id=1238372 * https://bugzilla.suse.com/show_bug.cgi?id=1238373 * https://bugzilla.suse.com/show_bug.cgi?id=1238377 * https://bugzilla.suse.com/show_bug.cgi?id=1238386 * https://bugzilla.suse.com/show_bug.cgi?id=1238393 * https://bugzilla.suse.com/show_bug.cgi?id=1238394 * https://bugzilla.suse.com/show_bug.cgi?id=1238395 * https://bugzilla.suse.com/show_bug.cgi?id=1238413 * https://bugzilla.suse.com/show_bug.cgi?id=1238416 * https://bugzilla.suse.com/show_bug.cgi?id=1238417 * https://bugzilla.suse.com/show_bug.cgi?id=1238419 * https://bugzilla.suse.com/show_bug.cgi?id=1238420 * https://bugzilla.suse.com/show_bug.cgi?id=1238429 * https://bugzilla.suse.com/show_bug.cgi?id=1238430 * https://bugzilla.suse.com/show_bug.cgi?id=1238435 * https://bugzilla.suse.com/show_bug.cgi?id=1238441 * https://bugzilla.suse.com/show_bug.cgi?id=1238443 * https://bugzilla.suse.com/show_bug.cgi?id=1238454 * https://bugzilla.suse.com/show_bug.cgi?id=1238462 * https://bugzilla.suse.com/show_bug.cgi?id=1238467 * https://bugzilla.suse.com/show_bug.cgi?id=1238469 * https://bugzilla.suse.com/show_bug.cgi?id=1238539 * https://bugzilla.suse.com/show_bug.cgi?id=1238543 * https://bugzilla.suse.com/show_bug.cgi?id=1238546 * https://bugzilla.suse.com/show_bug.cgi?id=1238599 * https://bugzilla.suse.com/show_bug.cgi?id=1238600 * https://bugzilla.suse.com/show_bug.cgi?id=1238612 * https://bugzilla.suse.com/show_bug.cgi?id=1238615 * https://bugzilla.suse.com/show_bug.cgi?id=1238617 * https://bugzilla.suse.com/show_bug.cgi?id=1238618 * https://bugzilla.suse.com/show_bug.cgi?id=1238621 * https://bugzilla.suse.com/show_bug.cgi?id=1238623 * https://bugzilla.suse.com/show_bug.cgi?id=1238625 * https://bugzilla.suse.com/show_bug.cgi?id=1238626 * https://bugzilla.suse.com/show_bug.cgi?id=1238630 * https://bugzilla.suse.com/show_bug.cgi?id=1238631 * https://bugzilla.suse.com/show_bug.cgi?id=1238633 * https://bugzilla.suse.com/show_bug.cgi?id=1238635 * https://bugzilla.suse.com/show_bug.cgi?id=1238638 * https://bugzilla.suse.com/show_bug.cgi?id=1238639 * https://bugzilla.suse.com/show_bug.cgi?id=1238641 * https://bugzilla.suse.com/show_bug.cgi?id=1238643 * https://bugzilla.suse.com/show_bug.cgi?id=1238645 * https://bugzilla.suse.com/show_bug.cgi?id=1238646 * https://bugzilla.suse.com/show_bug.cgi?id=1238653 * https://bugzilla.suse.com/show_bug.cgi?id=1238655 * https://bugzilla.suse.com/show_bug.cgi?id=1238662 * https://bugzilla.suse.com/show_bug.cgi?id=1238663 * https://bugzilla.suse.com/show_bug.cgi?id=1238705 * https://bugzilla.suse.com/show_bug.cgi?id=1238707 * https://bugzilla.suse.com/show_bug.cgi?id=1238710 * https://bugzilla.suse.com/show_bug.cgi?id=1238712 * https://bugzilla.suse.com/show_bug.cgi?id=1238718 * https://bugzilla.suse.com/show_bug.cgi?id=1238719 * https://bugzilla.suse.com/show_bug.cgi?id=1238721 * https://bugzilla.suse.com/show_bug.cgi?id=1238722 * https://bugzilla.suse.com/show_bug.cgi?id=1238727 * https://bugzilla.suse.com/show_bug.cgi?id=1238729 * https://bugzilla.suse.com/show_bug.cgi?id=1238750 * https://bugzilla.suse.com/show_bug.cgi?id=1238787 * https://bugzilla.suse.com/show_bug.cgi?id=1238789 * https://bugzilla.suse.com/show_bug.cgi?id=1238805 * https://bugzilla.suse.com/show_bug.cgi?id=1238809 * https://bugzilla.suse.com/show_bug.cgi?id=1238814 * https://bugzilla.suse.com/show_bug.cgi?id=1238815 * https://bugzilla.suse.com/show_bug.cgi?id=1238819 * https://bugzilla.suse.com/show_bug.cgi?id=1238821 * https://bugzilla.suse.com/show_bug.cgi?id=1238822 * https://bugzilla.suse.com/show_bug.cgi?id=1238823 * https://bugzilla.suse.com/show_bug.cgi?id=1238825 * https://bugzilla.suse.com/show_bug.cgi?id=1238835 * https://bugzilla.suse.com/show_bug.cgi?id=1238838 * https://bugzilla.suse.com/show_bug.cgi?id=1238868 * https://bugzilla.suse.com/show_bug.cgi?id=1238869 * https://bugzilla.suse.com/show_bug.cgi?id=1238871 * https://bugzilla.suse.com/show_bug.cgi?id=1238892 * https://bugzilla.suse.com/show_bug.cgi?id=1238893 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238919 * https://bugzilla.suse.com/show_bug.cgi?id=1238925 * https://bugzilla.suse.com/show_bug.cgi?id=1238930 * https://bugzilla.suse.com/show_bug.cgi?id=1238933 * https://bugzilla.suse.com/show_bug.cgi?id=1238937 * https://bugzilla.suse.com/show_bug.cgi?id=1238938 * https://bugzilla.suse.com/show_bug.cgi?id=1238939 * https://bugzilla.suse.com/show_bug.cgi?id=1238948 * https://bugzilla.suse.com/show_bug.cgi?id=1238949 * https://bugzilla.suse.com/show_bug.cgi?id=1238952 * https://bugzilla.suse.com/show_bug.cgi?id=1239001 * https://bugzilla.suse.com/show_bug.cgi?id=1239035 * https://bugzilla.suse.com/show_bug.cgi?id=1239040 * https://bugzilla.suse.com/show_bug.cgi?id=1239041 * https://bugzilla.suse.com/show_bug.cgi?id=1239060 * https://bugzilla.suse.com/show_bug.cgi?id=1239070 * https://bugzilla.suse.com/show_bug.cgi?id=1239071 * https://bugzilla.suse.com/show_bug.cgi?id=1239076 * https://bugzilla.suse.com/show_bug.cgi?id=1239109 * https://bugzilla.suse.com/show_bug.cgi?id=1239115 * https://bugzilla.suse.com/show_bug.cgi?id=1239454 * https://bugzilla.suse.com/show_bug.cgi?id=1239969 * https://bugzilla.suse.com/show_bug.cgi?id=1240207 * https://bugzilla.suse.com/show_bug.cgi?id=1240213 * https://bugzilla.suse.com/show_bug.cgi?id=1240218 * https://bugzilla.suse.com/show_bug.cgi?id=1240227 * https://bugzilla.suse.com/show_bug.cgi?id=1240272 * https://bugzilla.suse.com/show_bug.cgi?id=1240276 * https://bugzilla.suse.com/show_bug.cgi?id=1240288 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 15 20:30:04 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 15 Apr 2025 20:30:04 -0000 Subject: SUSE-SU-2025:1288-1: moderate: Security update for mozjs52 Message-ID: <174474900404.29196.3113341233716511100@smelt2.prg2.suse.org> # Security update for mozjs52 Announcement ID: SUSE-SU-2025:1288-1 Release Date: 2025-04-15T16:25:36Z Rating: moderate References: * bsc#1234837 Cross-References: * CVE-2024-56431 CVSS scores: * CVE-2024-56431 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56431 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56431 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for mozjs52 fixes the following issues: * CVE-2024-56431: Fixed a negative shift in huffdec.c (bsc#1234837). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1288=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1288=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1288=1 ## Package List: * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * libmozjs-78-0-debuginfo-78.15.0-150400.3.14.1 * mozjs78-debuginfo-78.15.0-150400.3.14.1 * libmozjs-78-0-78.15.0-150400.3.14.1 * mozjs78-debugsource-78.15.0-150400.3.14.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i686) * mozjs78-devel-78.15.0-150400.3.14.1 * mozjs78-78.15.0-150400.3.14.1 * libmozjs-78-0-78.15.0-150400.3.14.1 * libmozjs-78-0-debuginfo-78.15.0-150400.3.14.1 * mozjs78-debuginfo-78.15.0-150400.3.14.1 * mozjs78-debugsource-78.15.0-150400.3.14.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * mozjs78-devel-78.15.0-150400.3.14.1 * mozjs78-78.15.0-150400.3.14.1 * libmozjs-78-0-78.15.0-150400.3.14.1 * libmozjs-78-0-debuginfo-78.15.0-150400.3.14.1 * mozjs78-debuginfo-78.15.0-150400.3.14.1 * mozjs78-debugsource-78.15.0-150400.3.14.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56431.html * https://bugzilla.suse.com/show_bug.cgi?id=1234837 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 15 20:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 15 Apr 2025 20:30:06 -0000 Subject: SUSE-SU-2025:1287-1: moderate: Security update for mozjs52 Message-ID: <174474900659.29196.11283144195239775619@smelt2.prg2.suse.org> # Security update for mozjs52 Announcement ID: SUSE-SU-2025:1287-1 Release Date: 2025-04-15T16:25:14Z Rating: moderate References: * bsc#1234837 Cross-References: * CVE-2024-56431 CVSS scores: * CVE-2024-56431 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56431 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56431 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for mozjs52 fixes the following issues: * CVE-2024-56431: Fixed a negative shift in huffdec.c (bsc#1234837). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1287=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1287=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * mozjs52-debugsource-52.6.0-150000.3.6.1 * libmozjs-52-debuginfo-52.6.0-150000.3.6.1 * mozjs52-devel-52.6.0-150000.3.6.1 * libmozjs-52-52.6.0-150000.3.6.1 * mozjs52-debuginfo-52.6.0-150000.3.6.1 * mozjs52-52.6.0-150000.3.6.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * libmozjs-52-52.6.0-150000.3.6.1 * mozjs52-debugsource-52.6.0-150000.3.6.1 * mozjs52-debuginfo-52.6.0-150000.3.6.1 * libmozjs-52-debuginfo-52.6.0-150000.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56431.html * https://bugzilla.suse.com/show_bug.cgi?id=1234837 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 15 20:30:09 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 15 Apr 2025 20:30:09 -0000 Subject: SUSE-SU-2025:1286-1: important: Security update for apache2-mod_auth_openidc Message-ID: <174474900969.29196.14010009972849575643@smelt2.prg2.suse.org> # Security update for apache2-mod_auth_openidc Announcement ID: SUSE-SU-2025:1286-1 Release Date: 2025-04-15T16:24:55Z Rating: important References: * bsc#1240893 Cross-References: * CVE-2025-31492 CVSS scores: * CVE-2025-31492 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-31492 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-31492 ( NVD ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for apache2-mod_auth_openidc fixes the following issues: * CVE-2025-31492: Fixed a bug where OIDCProviderAuthRequestMethod POSTs can leak protected data. (bsc#1240893) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1286=1 openSUSE-SLE-15.6-2025-1286=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-1286=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * apache2-mod_auth_openidc-debuginfo-2.3.8-150600.16.8.1 * apache2-mod_auth_openidc-2.3.8-150600.16.8.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150600.16.8.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * apache2-mod_auth_openidc-debuginfo-2.3.8-150600.16.8.1 * apache2-mod_auth_openidc-2.3.8-150600.16.8.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150600.16.8.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31492.html * https://bugzilla.suse.com/show_bug.cgi?id=1240893 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 15 20:30:13 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 15 Apr 2025 20:30:13 -0000 Subject: SUSE-SU-2025:1285-1: important: Security update for etcd Message-ID: <174474901323.29196.11457583011086288914@smelt2.prg2.suse.org> # Security update for etcd Announcement ID: SUSE-SU-2025:1285-1 Release Date: 2025-04-15T16:24:45Z Rating: important References: * bsc#1240515 Cross-References: * CVE-2025-30204 CVSS scores: * CVE-2025-30204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-30204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-30204 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 An update that solves one vulnerability can now be installed. ## Description: This update for etcd fixes the following issues: * Update to version 3.5.21: * CVE-2025-30204: Fixed a bug that could allow excessive memory allocation during header parsing in jwt-go. (bsc#1240515) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1285=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * etcd-3.5.21-150000.7.12.1 * etcdctl-3.5.21-150000.7.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-30204.html * https://bugzilla.suse.com/show_bug.cgi?id=1240515 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 08:33:25 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 16 Apr 2025 08:33:25 -0000 Subject: SUSE-SU-2025:1293-1: important: Security update for the Linux Kernel Message-ID: <174479240507.29284.9675349997012437789@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:1293-1 Release Date: 2025-04-16T07:51:31Z Rating: important References: * bsc#1051510 * bsc#1054914 * bsc#1065729 * bsc#1129770 * bsc#1190317 * bsc#1195823 * bsc#1197158 * bsc#1197227 * bsc#1197331 * bsc#1197661 * bsc#1198577 * bsc#1198660 * bsc#1200571 * bsc#1200807 * bsc#1200809 * bsc#1200810 * bsc#1200871 * bsc#1200872 * bsc#1201381 * bsc#1201610 * bsc#1201726 * bsc#1202672 * bsc#1202712 * bsc#1203769 * bsc#1207186 * bsc#1209547 * bsc#1210647 * bsc#1213167 * bsc#1218450 * bsc#1220466 * bsc#1224489 * bsc#1225742 * bsc#1226130 * bsc#1226323 * bsc#1226785 * bsc#1227858 * bsc#1228909 * bsc#1231375 * bsc#1231854 * bsc#1232370 * bsc#1232812 * bsc#1233458 * bsc#1233479 * bsc#1233557 * bsc#1234074 * bsc#1234222 * bsc#1234480 * bsc#1235436 * bsc#1235485 * bsc#1235637 * bsc#1235715 * bsc#1235733 * bsc#1235973 * bsc#1237313 * bsc#1237721 * bsc#1237722 * bsc#1237725 * bsc#1237728 * bsc#1237733 * bsc#1237735 * bsc#1237739 * bsc#1237751 * bsc#1237752 * bsc#1237767 * bsc#1237768 * bsc#1237782 * bsc#1237800 * bsc#1237813 * bsc#1237814 * bsc#1237815 * bsc#1237823 * bsc#1237831 * bsc#1237836 * bsc#1237842 * bsc#1237897 * bsc#1237903 * bsc#1237906 * bsc#1237918 * bsc#1237925 * bsc#1237932 * bsc#1237933 * bsc#1237934 * bsc#1237936 * bsc#1237941 * bsc#1237953 * bsc#1237969 * bsc#1237973 * bsc#1237983 * bsc#1237988 * bsc#1238007 * bsc#1238030 * bsc#1238036 * bsc#1238079 * bsc#1238108 * bsc#1238127 * bsc#1238133 * bsc#1238146 * bsc#1238168 * bsc#1238169 * bsc#1238170 * bsc#1238171 * bsc#1238172 * bsc#1238180 * bsc#1238181 * bsc#1238183 * bsc#1238231 * bsc#1238236 * bsc#1238240 * bsc#1238251 * bsc#1238252 * bsc#1238257 * bsc#1238266 * bsc#1238268 * bsc#1238269 * bsc#1238271 * bsc#1238272 * bsc#1238274 * bsc#1238276 * bsc#1238279 * bsc#1238282 * bsc#1238293 * bsc#1238313 * bsc#1238336 * bsc#1238372 * bsc#1238373 * bsc#1238376 * bsc#1238378 * bsc#1238382 * bsc#1238393 * bsc#1238396 * bsc#1238413 * bsc#1238416 * bsc#1238417 * bsc#1238419 * bsc#1238430 * bsc#1238433 * bsc#1238434 * bsc#1238443 * bsc#1238447 * bsc#1238454 * bsc#1238467 * bsc#1238469 * bsc#1238512 * bsc#1238521 * bsc#1238531 * bsc#1238540 * bsc#1238598 * bsc#1238599 * bsc#1238600 * bsc#1238612 * bsc#1238613 * bsc#1238615 * bsc#1238618 * bsc#1238623 * bsc#1238625 * bsc#1238626 * bsc#1238630 * bsc#1238633 * bsc#1238635 * bsc#1238647 * bsc#1238654 * bsc#1238705 * bsc#1238707 * bsc#1238710 * bsc#1238716 * bsc#1238719 * bsc#1238721 * bsc#1238729 * bsc#1238738 * bsc#1238747 * bsc#1238750 * bsc#1238751 * bsc#1238754 * bsc#1238763 * bsc#1238780 * bsc#1238787 * bsc#1238789 * bsc#1238794 * bsc#1238805 * bsc#1238816 * bsc#1238817 * bsc#1238819 * bsc#1238843 * bsc#1238889 * bsc#1238903 * bsc#1238909 * bsc#1238916 * bsc#1238925 * bsc#1238933 * bsc#1238943 * bsc#1238944 * bsc#1238946 * bsc#1238949 * bsc#1238950 * bsc#1238951 * bsc#1238952 * bsc#1238953 * bsc#1238954 * bsc#1238964 * bsc#1238970 * bsc#1238986 * bsc#1239002 * bsc#1239003 * bsc#1239035 * bsc#1239036 * bsc#1239039 * bsc#1239040 * bsc#1239041 * bsc#1239059 * bsc#1239076 * bsc#1239087 * bsc#1239109 * bsc#1239117 * bsc#1239174 * bsc#1239448 * bsc#1239454 * bsc#1239468 * bsc#1239479 * bsc#1239481 * bsc#1239484 * bsc#1239508 * bsc#1239994 * bsc#1240133 * bsc#1240172 * bsc#1240183 * bsc#1240186 * bsc#1240208 * bsc#1240213 * bsc#1240218 * bsc#1240227 * bsc#1240229 * bsc#1240233 * bsc#1240272 * bsc#1240275 * bsc#1240276 * bsc#1240282 * bsc#1240285 * bsc#1240286 * bsc#1240288 * bsc#1240290 * bsc#1240303 * bsc#1240318 * bsc#1240582 * bsc#1240639 * bsc#1240700 * bsc#1240708 * bsc#1240784 * bsc#1240797 * bsc#1240801 Cross-References: * CVE-2017-5753 * CVE-2021-46925 * CVE-2021-47633 * CVE-2021-47645 * CVE-2021-47648 * CVE-2021-47652 * CVE-2022-1016 * CVE-2022-1048 * CVE-2022-1184 * CVE-2022-26373 * CVE-2022-2977 * CVE-2022-3303 * CVE-2022-49046 * CVE-2022-49051 * CVE-2022-49053 * CVE-2022-49058 * CVE-2022-49059 * CVE-2022-49065 * CVE-2022-49066 * CVE-2022-49074 * CVE-2022-49075 * CVE-2022-49084 * CVE-2022-49085 * CVE-2022-49095 * CVE-2022-49098 * CVE-2022-49100 * CVE-2022-49107 * CVE-2022-49109 * CVE-2022-49114 * CVE-2022-49119 * CVE-2022-49120 * CVE-2022-49122 * CVE-2022-49155 * CVE-2022-49156 * CVE-2022-49157 * CVE-2022-49158 * CVE-2022-49159 * CVE-2022-49160 * CVE-2022-49164 * CVE-2022-49191 * CVE-2022-49196 * CVE-2022-49204 * CVE-2022-49209 * CVE-2022-49217 * CVE-2022-49220 * CVE-2022-49226 * CVE-2022-49259 * CVE-2022-49264 * CVE-2022-49271 * CVE-2022-49272 * CVE-2022-49275 * CVE-2022-49280 * CVE-2022-49281 * CVE-2022-49286 * CVE-2022-49287 * CVE-2022-49288 * CVE-2022-49291 * CVE-2022-49292 * CVE-2022-49293 * CVE-2022-49295 * CVE-2022-49297 * CVE-2022-49300 * CVE-2022-49308 * CVE-2022-49313 * CVE-2022-49321 * CVE-2022-49322 * CVE-2022-49330 * CVE-2022-49331 * CVE-2022-49332 * CVE-2022-49337 * CVE-2022-49343 * CVE-2022-49344 * CVE-2022-49347 * CVE-2022-49349 * CVE-2022-49367 * CVE-2022-49370 * CVE-2022-49372 * CVE-2022-49388 * CVE-2022-49389 * CVE-2022-49395 * CVE-2022-49397 * CVE-2022-49404 * CVE-2022-49407 * CVE-2022-49409 * CVE-2022-49413 * CVE-2022-49414 * CVE-2022-49416 * CVE-2022-49421 * CVE-2022-49429 * CVE-2022-49432 * CVE-2022-49433 * CVE-2022-49434 * CVE-2022-49437 * CVE-2022-49443 * CVE-2022-49444 * CVE-2022-49472 * CVE-2022-49488 * CVE-2022-49492 * CVE-2022-49495 * CVE-2022-49497 * CVE-2022-49505 * CVE-2022-49513 * CVE-2022-49516 * CVE-2022-49519 * CVE-2022-49524 * CVE-2022-49526 * CVE-2022-49530 * CVE-2022-49532 * CVE-2022-49538 * CVE-2022-49544 * CVE-2022-49545 * CVE-2022-49546 * CVE-2022-49555 * CVE-2022-49563 * CVE-2022-49564 * CVE-2022-49566 * CVE-2022-49578 * CVE-2022-49581 * CVE-2022-49584 * CVE-2022-49589 * CVE-2022-49605 * CVE-2022-49607 * CVE-2022-49610 * CVE-2022-49611 * CVE-2022-49619 * CVE-2022-49620 * CVE-2022-49623 * CVE-2022-49638 * CVE-2022-49640 * CVE-2022-49641 * CVE-2022-49647 * CVE-2022-49649 * CVE-2022-49657 * CVE-2022-49667 * CVE-2022-49672 * CVE-2022-49673 * CVE-2022-49674 * CVE-2022-49687 * CVE-2022-49707 * CVE-2022-49708 * CVE-2022-49710 * CVE-2022-49711 * CVE-2022-49713 * CVE-2022-49727 * CVE-2022-49733 * CVE-2022-49740 * CVE-2023-2162 * CVE-2023-3567 * CVE-2023-52933 * CVE-2023-52935 * CVE-2023-52973 * CVE-2023-52974 * CVE-2023-52979 * CVE-2023-52997 * CVE-2023-53000 * CVE-2023-53006 * CVE-2023-53007 * CVE-2023-53008 * CVE-2023-53010 * CVE-2023-53015 * CVE-2023-53019 * CVE-2023-53024 * CVE-2023-53031 * CVE-2024-35910 * CVE-2024-36968 * CVE-2024-38559 * CVE-2024-41005 * CVE-2024-47678 * CVE-2024-49571 * CVE-2024-49935 * CVE-2024-49940 * CVE-2024-50269 * CVE-2024-50290 * CVE-2024-53063 * CVE-2024-53124 * CVE-2024-53140 * CVE-2024-53680 * CVE-2024-56633 * CVE-2024-56640 * CVE-2024-56770 * CVE-2024-57900 * CVE-2024-57973 * CVE-2024-57979 * CVE-2024-57996 * CVE-2024-58014 * CVE-2024-58052 * CVE-2024-58071 * CVE-2024-58072 * CVE-2024-58083 * CVE-2025-21703 * CVE-2025-21708 * CVE-2025-21744 * CVE-2025-21759 * CVE-2025-21760 * CVE-2025-21762 * CVE-2025-21763 * CVE-2025-21765 * CVE-2025-21766 * CVE-2025-21776 * CVE-2025-21782 * CVE-2025-21785 * CVE-2025-21791 * CVE-2025-21796 * CVE-2025-21802 * CVE-2025-21821 * CVE-2025-21831 * CVE-2025-21846 * CVE-2025-21848 * CVE-2025-21855 * CVE-2025-21858 * CVE-2025-21865 * CVE-2025-21871 * CVE-2025-21877 * CVE-2025-21891 * CVE-2025-21916 * CVE-2025-21922 * CVE-2025-21934 * CVE-2025-21935 * CVE-2025-21969 * CVE-2025-21993 * CVE-2025-21996 * CVE-2025-22007 CVSS scores: * CVE-2017-5753 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( SUSE ): 7.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( NVD ): 5.6 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2021-46925 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46925 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-46925 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47633 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2021-47633 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2021-47645 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47645 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47648 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47652 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-47652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47652 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-1016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-1048 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-1048 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-1184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-26373 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-26373 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-2977 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2022-2977 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-3303 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3303 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49046 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49051 ( SUSE ): 4.3 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2022-49051 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N * CVE-2022-49053 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49053 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49053 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49058 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49059 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49059 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49065 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49065 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49066 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49074 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49075 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49084 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49085 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49085 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49098 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49098 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49100 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49107 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49107 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49114 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49114 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49114 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49119 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49119 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49120 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49122 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49155 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49156 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49157 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49157 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49158 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2022-49158 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2022-49159 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49159 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49160 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49164 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49191 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49196 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49209 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49226 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49271 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49275 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49275 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49275 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49280 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49280 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49281 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49286 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49286 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49287 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49288 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49291 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49291 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49291 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49292 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49293 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49295 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49295 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49295 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49297 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49297 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49300 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49300 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49300 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49308 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49313 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49313 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49321 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49321 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49321 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49322 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49322 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49322 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49330 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49330 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49331 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49332 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49337 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49343 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49343 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49344 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49344 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49347 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49347 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49349 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49349 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49367 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49367 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49370 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49370 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49372 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49388 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49404 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49413 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49413 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49413 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49414 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49416 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49421 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49429 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49429 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49432 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49432 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49434 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49437 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49437 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49444 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49472 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49472 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49492 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49495 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49497 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49497 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49505 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49505 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49513 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49516 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49516 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49519 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49519 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49524 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49524 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49526 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49526 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49530 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49530 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49530 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49532 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49532 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49538 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49538 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49544 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49544 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49544 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49545 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49545 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49546 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49546 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49555 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49563 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49564 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49566 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49578 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2022-49578 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2022-49578 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49605 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49607 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49610 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L * CVE-2022-49610 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L * CVE-2022-49611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49619 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49619 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49619 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49620 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49620 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49620 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49623 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49638 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49640 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49641 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49647 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49657 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49667 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49673 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49711 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49711 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49727 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-49727 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-49727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49733 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49740 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49740 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-2162 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-3567 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52935 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52973 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52979 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53008 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35910 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-38559 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-38559 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-47678 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-49571 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49571 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2024-49935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-49940 ( SUSE ): 6.1 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-49940 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-49940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53124 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53680 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-53680 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2024-56633 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56770 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57900 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57900 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57996 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58014 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58052 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58071 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21708 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21762 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21782 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-21782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21782 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21785 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21785 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21785 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21855 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21916 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21922 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21935 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21969 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21993 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21993 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21996 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22007 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22007 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves 222 vulnerabilities and has 27 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2021-46925: Fixed kernel panic caused by race of smc_sock (bsc#1220466). * CVE-2021-47645: media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com (bsc#1237767). * CVE-2021-47648: gpu: host1x: Fix a memory leak in 'host1x_remove()' (bsc#1237725). * CVE-2022-49046: i2c: dev: check return value when calling dev_set_name() (bsc#1237842). * CVE-2022-49051: net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (bsc#1237903). * CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918). * CVE-2022-49059: nfc: nci: add flush_workqueue to prevent uaf (bsc#1238007). * CVE-2022-49074: irqchip/gic-v3: Fix GICR_CTLR.RWP polling (bsc#1237728). * CVE-2022-49075: btrfs: fix qgroup reserve overflow the qgroup limit (bsc#1237733). * CVE-2022-49084: qede: confirm skb is allocated before using (bsc#1237751). * CVE-2022-49107: ceph: fix memory leak in ceph_readdir when note_last_dentry returns error (bsc#1237973). * CVE-2022-49109: ceph: fix inode reference leakage in ceph_get_snapdir() (bsc#1237836). * CVE-2022-49119: scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req() (bsc#1237925). * CVE-2022-49120: scsi: pm8001: Fix task leak in pm8001_send_abort_all() (bsc#1237969). * CVE-2022-49209: bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full (bsc#1238252). * CVE-2022-49220: dax: make sure inodes are flushed before destroy cache (bsc#1237936). * CVE-2022-49275: can: m_can: m_can_tx_handler(): fix use after free of skb (bsc#1238719). * CVE-2022-49286: tpm: use try_get_ops() in tpm-space.c (bsc#1238647). * CVE-2022-49292: ALSA: oss: Fix PCM OSS buffer allocation overflow (bsc#1238625). * CVE-2022-49308: extcon: Modify extcon device to be created after driver data is set (bsc#1238654). * CVE-2022-49331: nfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling (bsc#1237813). * CVE-2022-49344: af_unix: Fix a data-race in unix_dgram_peer_wake_me() (bsc#1237988). * CVE-2022-49367: net: dsa: mv88e6xxx: Fix refcount leak in mv88e6xxx_mdios_register (bsc#1238447). * CVE-2022-49370: firmware: dmi-sysfs: Fix memory leak in dmi_sysfs_register_handle (bsc#1238467). * CVE-2022-49372: tcp: tcp_rtx_synack() can be called from process context (bsc#1238251). * CVE-2022-49388: ubi: ubi_create_volume: Fix use-after-free when volume creation failed (bsc#1237934). * CVE-2022-49395: um: Fix out-of-bounds read in LDT setup (bsc#1237953). * CVE-2022-49397: phy: qcom-qmp: fix struct clk leak on probe errors (bsc#1237823). * CVE-2022-49404: RDMA/hfi1: Fix potential integer multiplication overflow errors (bsc#1238430). * CVE-2022-49416: wifi: mac80211: fix use-after-free in chanctx code (bsc#1238293). * CVE-2022-49433: RDMA/hfi1: Prevent use of lock before it is initialized (bsc#1238268). * CVE-2022-49472: net: phy: micrel: Allow probing without .driver_data (bsc#1238951). * CVE-2022-49488: drm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock (bsc#1238600). * CVE-2022-49495: drm/msm/hdmi: check return value after calling platform_get_resource_byname() (bsc#1237932). * CVE-2022-49497: net: remove two BUG() from skb_checksum_help() (bsc#1238946). * CVE-2022-49505: NFC: NULL out the dev->rfkill to prevent UAF (bsc#1238615). * CVE-2022-49516: ice: always check VF VSI pointer values (bsc#1238953). * CVE-2022-49519: ath10k: skip ath10k_halt during suspend for driver state RESTARTING (bsc#1238943). * CVE-2022-49524: media: pci: cx23885: Fix the error handling in cx23885_initdev() (bsc#1238949). * CVE-2022-49530: drm/amd/pm: fix double free in si_parse_power_table() (bsc#1238944). * CVE-2022-49538: ALSA: jack: Fix mutex call in snd_jack_report() (bsc#1238843). * CVE-2022-49544: ipw2x00: Fix potential NULL dereference in libipw_xmit() (bsc#1238721). * CVE-2022-49545: ALSA: usb-audio: Cancel pending work at closing a MIDI substream (bsc#1238729). * CVE-2022-49546: x86/kexec: Fix double-free of elf header buffer (bsc#1238750). * CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238787). * CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238789). * CVE-2022-49578: ip: Fix data-races around sysctl_ip_prot_sock. (bsc#1238794). * CVE-2022-49581: be2net: Fix buffer overflow in be_get_module_eeprom (bsc#1238540). * CVE-2022-49589: kABI: protect mr_ifc_count change (bsc#1238598). * CVE-2022-49605: igc: Reinstate IGC_REMOVED logic and implement it properly (bsc#1238433). * CVE-2022-49607: perf/core: Fix data race between perf_event_set_output() and perf_mmap_close() (bsc#1238817). * CVE-2022-49610: KVM: VMX: Prevent RSB underflow before vmenter (bsc#1238952). * CVE-2022-49619: net: sfp: fix memory leak in sfp_probe() (bsc#1239003). * CVE-2022-49620: net: tipc: fix possible refcount leak in tipc_sk_create() (bsc#1239002). * CVE-2022-49640: sysctl: Fix data races in proc_douintvec_minmax() (bsc#1237782). * CVE-2022-49641: sysctl: Fix data races in proc_douintvec() (bsc#1237831). * CVE-2022-49667: net: bonding: fix use-after-free after 802.3ad slave unbind (bsc#1238282). * CVE-2022-49672: net: tun: unlink NAPI from device on destruction (bsc#1238816). * CVE-2022-49711: bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (bsc#1238416). * CVE-2022-49727: ipv6: Fix signed integer overflow in l2tp_ip6_sendmsg (bsc#1239059). * CVE-2022-49740: wifi: brcmfmac: Check the count value of channel spec to prevent out-of-bounds reads (bsc#1240233). * CVE-2023-52935: mm/khugepaged: fix ->anon_vma race (bsc#1240276). * CVE-2023-52997: ipv4: prevent potential spectre v1 gadget in ip_metrics_convert() (bsc#1240303). * CVE-2023-53010: bnxt: Do not read past the end of test names (bsc#1240290). * CVE-2023-53019: net: mdio: validate parameter addr in mdiobus_get_phy() (bsc#1240286). * CVE-2024-35910: kABI fix for tcp: properly terminate timers for kernel sockets (bsc#1224489). * CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() (bsc#1226130). * CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785). * CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active (bsc#1227858). * CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg (bsc#1235733). * CVE-2024-49935: ACPI: PAD: fix crash in exit_round_robin() (bsc#1232370). * CVE-2024-49940: l2tp: prevent possible tunnel refcount underflow (bsc#1232812). * CVE-2024-50269: usb: musb: sunxi: Fix accessing an released usb phy (bsc#1233458). * CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc (bsc#1234074). * CVE-2024-53140: netlink: terminate outstanding dump on socket close (bsc#1234222). * CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (bsc#1235715). * CVE-2024-56640: net/smc: fix LGR and link use-after-free issue (bsc#1235436). * CVE-2024-56770: net/sched: netem: account for backlog updates from child qdisc (bsc#1235637). * CVE-2024-57900: ila: serialize calls to nf_register_net_hooks() (bsc#1235973). * CVE-2024-57973: rdma/cxgb4: Prevent potential integer overflow on 32bit (bsc#1238531). * CVE-2024-57979: kABI workaround for pps changes (bsc#1238521). * CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076). * CVE-2024-58014: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (bsc#1239109). * CVE-2024-58052: drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table (bsc#1238986). * CVE-2024-58071: team: prevent adding a device which is already a team device lower (bsc#1238970) * CVE-2024-58072: wifi: rtlwifi: remove unused check_buddy_priv (bsc#1238964). * CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036). * CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313). * CVE-2025-21708: net: usb: rtl8150: enable basic endpoint checking (bsc#1239087). * CVE-2025-21744: wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() (bsc#1238903). * CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send() (bsc#1238738). * CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb() (bsc#1238763). * CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780). * CVE-2025-21763: neighbour: use RCU protection in __neigh_notify() (bsc#1237897). * CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss() (bsc#1237906). * CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu() (bsc#1238754). * CVE-2025-21776: USB: hub: Ignore non-compliant devices with too many configs or interfaces (bsc#1238909). * CVE-2025-21782: orangefs: fix a oob in orangefs_debug_write (bsc#1239117). * CVE-2025-21785: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (bsc#1238747). * CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512). * CVE-2025-21796: nfsd: clear acl_access/acl_default after releasing them (bsc#1238716). * CVE-2025-21802: net: hns3: fix oops when unload drivers paralleling (bsc#1238751). * CVE-2025-21821: fbdev: omap: use threaded IRQ for LCD DMA (bsc#1239174). * CVE-2025-21831: PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1 (bsc#1239039). * CVE-2025-21846: acct: perform last write from workqueue (bsc#1239508). * CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (bsc#1239479). * CVE-2025-21865: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl() (bsc#1239481). * CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183). * CVE-2025-21877: usbnet: gl620a: fix endpoint checking in genelink_bind() (bsc#1240172). * CVE-2025-21891: ipvlan: ensure network headers are in skb linear part (bsc#1240186). * CVE-2025-21916: usb: atm: cxacru: fix a flaw in existing endpoint checks (bsc#1240582). * CVE-2025-21922: ppp: Fix KMSAN uninit-value warning with bpf (bsc#1240639). * CVE-2025-21934: rapidio: fix an API misues when rio_add_net() fails (bsc#1240708). * CVE-2025-21935: rapidio: add check for rio_add_net() in rio_scan_alloc_net() (bsc#1240700). * CVE-2025-21969: Bluetooth: L2CAP: Fix build errors in some archs (bsc#1240784). * CVE-2025-21993: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (bsc#1240797). * CVE-2025-21996: drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (bsc#1240801). * CVE-2025-22007: Bluetooth: Fix error code in chan_alloc_skb_cb() (bsc#1240582). The following non-security bugs were fixed: * ceph: fix up error handling with snapdirs (bsc#1237836) * cpufreq: governor: Use kobject release() method to free dbs_data (bsc#1237800). * firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle (bsc#1238467) * gro_cells: Avoid packet re-ordering for cloned skbs (bsc#1226323). * ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994). * ipv4: use RCU protection in inet_select_addr() (bsc#1239994). * ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994). * ipv4: use RCU protection in rt_is_expired() (bsc#1239994). * ipv6: icmp: convert to dev_net_rcu() (bsc#1239994). * ipv6: Use RCU in ip6_input() (bsc#1239994). * kernel/sysctl.c: define minmax conv functions in terms of non-minmax versions (bsc#1237782) * ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994). * ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994). * net: add dev_net_rcu() helper (bsc#1239994). * net: fix SO_REUSEPORT return code (bsc#1239448) * net: mana: Support holes in device list reply msg (bsc#1240133). * net: treat possible_net_t net pointer as an RCU one and add read_pnet_rcu() (bsc#1239994). * net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480). * pipe, sysctl: drop 'min' parameter from pipe-max-size converter (bsc#1237782) * pipe, sysctl: remove pipe_proc_fn() (bsc#1237782) * pipe: add proc_dopipe_max_size() to safely assign pipe_max_size (bsc#1237782) * pipe: reject F_SETPIPE_SZ with size over UINT_MAX (bsc#1237782) * scripts: fix incorrect regex escape With Tumbleweed's recent switch to Python 3.13 * sysctl: check for UINT_MAX before unsigned int min/max (bsc#1237782) * team: add ethtool get_link_ksettings (bsc#1228909). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1293=1 * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1293=1 * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1293=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * kernel-default-base-debuginfo-4.12.14-122.255.1 * ocfs2-kmp-default-4.12.14-122.255.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.255.1 * kernel-default-base-4.12.14-122.255.1 * gfs2-kmp-default-4.12.14-122.255.1 * kernel-syms-4.12.14-122.255.1 * dlm-kmp-default-debuginfo-4.12.14-122.255.1 * kernel-default-devel-debuginfo-4.12.14-122.255.1 * cluster-md-kmp-default-debuginfo-4.12.14-122.255.1 * gfs2-kmp-default-debuginfo-4.12.14-122.255.1 * dlm-kmp-default-4.12.14-122.255.1 * kernel-default-devel-4.12.14-122.255.1 * cluster-md-kmp-default-4.12.14-122.255.1 * kernel-default-debuginfo-4.12.14-122.255.1 * kernel-default-debugsource-4.12.14-122.255.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64) * kernel-default-4.12.14-122.255.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * kernel-source-4.12.14-122.255.1 * kernel-devel-4.12.14-122.255.1 * kernel-macros-4.12.14-122.255.1 * SUSE Linux Enterprise Live Patching 12-SP5 (nosrc) * kernel-default-4.12.14-122.255.1 * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kernel-default-kgraft-devel-4.12.14-122.255.1 * kernel-default-kgraft-4.12.14-122.255.1 * kgraft-patch-4_12_14-122_255-default-1-8.5.1 * kernel-default-debuginfo-4.12.14-122.255.1 * kernel-default-debugsource-4.12.14-122.255.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * kernel-default-base-debuginfo-4.12.14-122.255.1 * ocfs2-kmp-default-4.12.14-122.255.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.255.1 * kernel-default-base-4.12.14-122.255.1 * gfs2-kmp-default-4.12.14-122.255.1 * kernel-syms-4.12.14-122.255.1 * dlm-kmp-default-debuginfo-4.12.14-122.255.1 * cluster-md-kmp-default-debuginfo-4.12.14-122.255.1 * gfs2-kmp-default-debuginfo-4.12.14-122.255.1 * dlm-kmp-default-4.12.14-122.255.1 * kernel-default-devel-4.12.14-122.255.1 * cluster-md-kmp-default-4.12.14-122.255.1 * kernel-default-debuginfo-4.12.14-122.255.1 * kernel-default-debugsource-4.12.14-122.255.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-4.12.14-122.255.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * kernel-source-4.12.14-122.255.1 * kernel-devel-4.12.14-122.255.1 * kernel-macros-4.12.14-122.255.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x) * kernel-default-man-4.12.14-122.255.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.255.1 ## References: * https://www.suse.com/security/cve/CVE-2017-5753.html * https://www.suse.com/security/cve/CVE-2021-46925.html * https://www.suse.com/security/cve/CVE-2021-47633.html * https://www.suse.com/security/cve/CVE-2021-47645.html * https://www.suse.com/security/cve/CVE-2021-47648.html * https://www.suse.com/security/cve/CVE-2021-47652.html * https://www.suse.com/security/cve/CVE-2022-1016.html * https://www.suse.com/security/cve/CVE-2022-1048.html * https://www.suse.com/security/cve/CVE-2022-1184.html * https://www.suse.com/security/cve/CVE-2022-26373.html * https://www.suse.com/security/cve/CVE-2022-2977.html * https://www.suse.com/security/cve/CVE-2022-3303.html * https://www.suse.com/security/cve/CVE-2022-49046.html * https://www.suse.com/security/cve/CVE-2022-49051.html * https://www.suse.com/security/cve/CVE-2022-49053.html * https://www.suse.com/security/cve/CVE-2022-49058.html * https://www.suse.com/security/cve/CVE-2022-49059.html * https://www.suse.com/security/cve/CVE-2022-49065.html * https://www.suse.com/security/cve/CVE-2022-49066.html * https://www.suse.com/security/cve/CVE-2022-49074.html * https://www.suse.com/security/cve/CVE-2022-49075.html * https://www.suse.com/security/cve/CVE-2022-49084.html * https://www.suse.com/security/cve/CVE-2022-49085.html * https://www.suse.com/security/cve/CVE-2022-49095.html * https://www.suse.com/security/cve/CVE-2022-49098.html * https://www.suse.com/security/cve/CVE-2022-49100.html * https://www.suse.com/security/cve/CVE-2022-49107.html * https://www.suse.com/security/cve/CVE-2022-49109.html * https://www.suse.com/security/cve/CVE-2022-49114.html * https://www.suse.com/security/cve/CVE-2022-49119.html * https://www.suse.com/security/cve/CVE-2022-49120.html * https://www.suse.com/security/cve/CVE-2022-49122.html * https://www.suse.com/security/cve/CVE-2022-49155.html * https://www.suse.com/security/cve/CVE-2022-49156.html * https://www.suse.com/security/cve/CVE-2022-49157.html * https://www.suse.com/security/cve/CVE-2022-49158.html * https://www.suse.com/security/cve/CVE-2022-49159.html * https://www.suse.com/security/cve/CVE-2022-49160.html * https://www.suse.com/security/cve/CVE-2022-49164.html * https://www.suse.com/security/cve/CVE-2022-49191.html * https://www.suse.com/security/cve/CVE-2022-49196.html * https://www.suse.com/security/cve/CVE-2022-49204.html * https://www.suse.com/security/cve/CVE-2022-49209.html * https://www.suse.com/security/cve/CVE-2022-49217.html * https://www.suse.com/security/cve/CVE-2022-49220.html * https://www.suse.com/security/cve/CVE-2022-49226.html * https://www.suse.com/security/cve/CVE-2022-49259.html * https://www.suse.com/security/cve/CVE-2022-49264.html * https://www.suse.com/security/cve/CVE-2022-49271.html * https://www.suse.com/security/cve/CVE-2022-49272.html * https://www.suse.com/security/cve/CVE-2022-49275.html * https://www.suse.com/security/cve/CVE-2022-49280.html * https://www.suse.com/security/cve/CVE-2022-49281.html * https://www.suse.com/security/cve/CVE-2022-49286.html * https://www.suse.com/security/cve/CVE-2022-49287.html * https://www.suse.com/security/cve/CVE-2022-49288.html * https://www.suse.com/security/cve/CVE-2022-49291.html * https://www.suse.com/security/cve/CVE-2022-49292.html * https://www.suse.com/security/cve/CVE-2022-49293.html * https://www.suse.com/security/cve/CVE-2022-49295.html * https://www.suse.com/security/cve/CVE-2022-49297.html * https://www.suse.com/security/cve/CVE-2022-49300.html * https://www.suse.com/security/cve/CVE-2022-49308.html * https://www.suse.com/security/cve/CVE-2022-49313.html * https://www.suse.com/security/cve/CVE-2022-49321.html * https://www.suse.com/security/cve/CVE-2022-49322.html * https://www.suse.com/security/cve/CVE-2022-49330.html * https://www.suse.com/security/cve/CVE-2022-49331.html * https://www.suse.com/security/cve/CVE-2022-49332.html * https://www.suse.com/security/cve/CVE-2022-49337.html * https://www.suse.com/security/cve/CVE-2022-49343.html * https://www.suse.com/security/cve/CVE-2022-49344.html * https://www.suse.com/security/cve/CVE-2022-49347.html * https://www.suse.com/security/cve/CVE-2022-49349.html * https://www.suse.com/security/cve/CVE-2022-49367.html * https://www.suse.com/security/cve/CVE-2022-49370.html * https://www.suse.com/security/cve/CVE-2022-49372.html * https://www.suse.com/security/cve/CVE-2022-49388.html * https://www.suse.com/security/cve/CVE-2022-49389.html * https://www.suse.com/security/cve/CVE-2022-49395.html * https://www.suse.com/security/cve/CVE-2022-49397.html * https://www.suse.com/security/cve/CVE-2022-49404.html * https://www.suse.com/security/cve/CVE-2022-49407.html * https://www.suse.com/security/cve/CVE-2022-49409.html * https://www.suse.com/security/cve/CVE-2022-49413.html * https://www.suse.com/security/cve/CVE-2022-49414.html * https://www.suse.com/security/cve/CVE-2022-49416.html * https://www.suse.com/security/cve/CVE-2022-49421.html * https://www.suse.com/security/cve/CVE-2022-49429.html * https://www.suse.com/security/cve/CVE-2022-49432.html * https://www.suse.com/security/cve/CVE-2022-49433.html * https://www.suse.com/security/cve/CVE-2022-49434.html * https://www.suse.com/security/cve/CVE-2022-49437.html * https://www.suse.com/security/cve/CVE-2022-49443.html * https://www.suse.com/security/cve/CVE-2022-49444.html * https://www.suse.com/security/cve/CVE-2022-49472.html * https://www.suse.com/security/cve/CVE-2022-49488.html * https://www.suse.com/security/cve/CVE-2022-49492.html * https://www.suse.com/security/cve/CVE-2022-49495.html * https://www.suse.com/security/cve/CVE-2022-49497.html * https://www.suse.com/security/cve/CVE-2022-49505.html * https://www.suse.com/security/cve/CVE-2022-49513.html * https://www.suse.com/security/cve/CVE-2022-49516.html * https://www.suse.com/security/cve/CVE-2022-49519.html * https://www.suse.com/security/cve/CVE-2022-49524.html * https://www.suse.com/security/cve/CVE-2022-49526.html * https://www.suse.com/security/cve/CVE-2022-49530.html * https://www.suse.com/security/cve/CVE-2022-49532.html * https://www.suse.com/security/cve/CVE-2022-49538.html * https://www.suse.com/security/cve/CVE-2022-49544.html * https://www.suse.com/security/cve/CVE-2022-49545.html * https://www.suse.com/security/cve/CVE-2022-49546.html * https://www.suse.com/security/cve/CVE-2022-49555.html * https://www.suse.com/security/cve/CVE-2022-49563.html * https://www.suse.com/security/cve/CVE-2022-49564.html * https://www.suse.com/security/cve/CVE-2022-49566.html * https://www.suse.com/security/cve/CVE-2022-49578.html * https://www.suse.com/security/cve/CVE-2022-49581.html * https://www.suse.com/security/cve/CVE-2022-49584.html * https://www.suse.com/security/cve/CVE-2022-49589.html * https://www.suse.com/security/cve/CVE-2022-49605.html * https://www.suse.com/security/cve/CVE-2022-49607.html * https://www.suse.com/security/cve/CVE-2022-49610.html * https://www.suse.com/security/cve/CVE-2022-49611.html * https://www.suse.com/security/cve/CVE-2022-49619.html * https://www.suse.com/security/cve/CVE-2022-49620.html * https://www.suse.com/security/cve/CVE-2022-49623.html * https://www.suse.com/security/cve/CVE-2022-49638.html * https://www.suse.com/security/cve/CVE-2022-49640.html * https://www.suse.com/security/cve/CVE-2022-49641.html * https://www.suse.com/security/cve/CVE-2022-49647.html * https://www.suse.com/security/cve/CVE-2022-49649.html * https://www.suse.com/security/cve/CVE-2022-49657.html * https://www.suse.com/security/cve/CVE-2022-49667.html * https://www.suse.com/security/cve/CVE-2022-49672.html * https://www.suse.com/security/cve/CVE-2022-49673.html * https://www.suse.com/security/cve/CVE-2022-49674.html * https://www.suse.com/security/cve/CVE-2022-49687.html * https://www.suse.com/security/cve/CVE-2022-49707.html * https://www.suse.com/security/cve/CVE-2022-49708.html * https://www.suse.com/security/cve/CVE-2022-49710.html * https://www.suse.com/security/cve/CVE-2022-49711.html * https://www.suse.com/security/cve/CVE-2022-49713.html * https://www.suse.com/security/cve/CVE-2022-49727.html * https://www.suse.com/security/cve/CVE-2022-49733.html * https://www.suse.com/security/cve/CVE-2022-49740.html * https://www.suse.com/security/cve/CVE-2023-2162.html * https://www.suse.com/security/cve/CVE-2023-3567.html * https://www.suse.com/security/cve/CVE-2023-52933.html * https://www.suse.com/security/cve/CVE-2023-52935.html * https://www.suse.com/security/cve/CVE-2023-52973.html * https://www.suse.com/security/cve/CVE-2023-52974.html * https://www.suse.com/security/cve/CVE-2023-52979.html * https://www.suse.com/security/cve/CVE-2023-52997.html * https://www.suse.com/security/cve/CVE-2023-53000.html * https://www.suse.com/security/cve/CVE-2023-53006.html * https://www.suse.com/security/cve/CVE-2023-53007.html * https://www.suse.com/security/cve/CVE-2023-53008.html * https://www.suse.com/security/cve/CVE-2023-53010.html * https://www.suse.com/security/cve/CVE-2023-53015.html * https://www.suse.com/security/cve/CVE-2023-53019.html * https://www.suse.com/security/cve/CVE-2023-53024.html * https://www.suse.com/security/cve/CVE-2023-53031.html * https://www.suse.com/security/cve/CVE-2024-35910.html * https://www.suse.com/security/cve/CVE-2024-36968.html * https://www.suse.com/security/cve/CVE-2024-38559.html * https://www.suse.com/security/cve/CVE-2024-41005.html * https://www.suse.com/security/cve/CVE-2024-47678.html * https://www.suse.com/security/cve/CVE-2024-49571.html * https://www.suse.com/security/cve/CVE-2024-49935.html * https://www.suse.com/security/cve/CVE-2024-49940.html * https://www.suse.com/security/cve/CVE-2024-50269.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53124.html * https://www.suse.com/security/cve/CVE-2024-53140.html * https://www.suse.com/security/cve/CVE-2024-53680.html * https://www.suse.com/security/cve/CVE-2024-56633.html * https://www.suse.com/security/cve/CVE-2024-56640.html * https://www.suse.com/security/cve/CVE-2024-56770.html * https://www.suse.com/security/cve/CVE-2024-57900.html * https://www.suse.com/security/cve/CVE-2024-57973.html * https://www.suse.com/security/cve/CVE-2024-57979.html * https://www.suse.com/security/cve/CVE-2024-57996.html * https://www.suse.com/security/cve/CVE-2024-58014.html * https://www.suse.com/security/cve/CVE-2024-58052.html * https://www.suse.com/security/cve/CVE-2024-58071.html * https://www.suse.com/security/cve/CVE-2024-58072.html * https://www.suse.com/security/cve/CVE-2024-58083.html * https://www.suse.com/security/cve/CVE-2025-21703.html * https://www.suse.com/security/cve/CVE-2025-21708.html * https://www.suse.com/security/cve/CVE-2025-21744.html * https://www.suse.com/security/cve/CVE-2025-21759.html * https://www.suse.com/security/cve/CVE-2025-21760.html * https://www.suse.com/security/cve/CVE-2025-21762.html * https://www.suse.com/security/cve/CVE-2025-21763.html * https://www.suse.com/security/cve/CVE-2025-21765.html * https://www.suse.com/security/cve/CVE-2025-21766.html * https://www.suse.com/security/cve/CVE-2025-21776.html * https://www.suse.com/security/cve/CVE-2025-21782.html * https://www.suse.com/security/cve/CVE-2025-21785.html * https://www.suse.com/security/cve/CVE-2025-21791.html * https://www.suse.com/security/cve/CVE-2025-21796.html * https://www.suse.com/security/cve/CVE-2025-21802.html * https://www.suse.com/security/cve/CVE-2025-21821.html * https://www.suse.com/security/cve/CVE-2025-21831.html * https://www.suse.com/security/cve/CVE-2025-21846.html * https://www.suse.com/security/cve/CVE-2025-21848.html * https://www.suse.com/security/cve/CVE-2025-21855.html * https://www.suse.com/security/cve/CVE-2025-21858.html * https://www.suse.com/security/cve/CVE-2025-21865.html * https://www.suse.com/security/cve/CVE-2025-21871.html * https://www.suse.com/security/cve/CVE-2025-21877.html * https://www.suse.com/security/cve/CVE-2025-21891.html * https://www.suse.com/security/cve/CVE-2025-21916.html * https://www.suse.com/security/cve/CVE-2025-21922.html * https://www.suse.com/security/cve/CVE-2025-21934.html * https://www.suse.com/security/cve/CVE-2025-21935.html * https://www.suse.com/security/cve/CVE-2025-21969.html * https://www.suse.com/security/cve/CVE-2025-21993.html * https://www.suse.com/security/cve/CVE-2025-21996.html * https://www.suse.com/security/cve/CVE-2025-22007.html * https://bugzilla.suse.com/show_bug.cgi?id=1051510 * https://bugzilla.suse.com/show_bug.cgi?id=1054914 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1129770 * https://bugzilla.suse.com/show_bug.cgi?id=1190317 * https://bugzilla.suse.com/show_bug.cgi?id=1195823 * https://bugzilla.suse.com/show_bug.cgi?id=1197158 * https://bugzilla.suse.com/show_bug.cgi?id=1197227 * https://bugzilla.suse.com/show_bug.cgi?id=1197331 * https://bugzilla.suse.com/show_bug.cgi?id=1197661 * https://bugzilla.suse.com/show_bug.cgi?id=1198577 * https://bugzilla.suse.com/show_bug.cgi?id=1198660 * https://bugzilla.suse.com/show_bug.cgi?id=1200571 * https://bugzilla.suse.com/show_bug.cgi?id=1200807 * https://bugzilla.suse.com/show_bug.cgi?id=1200809 * https://bugzilla.suse.com/show_bug.cgi?id=1200810 * https://bugzilla.suse.com/show_bug.cgi?id=1200871 * https://bugzilla.suse.com/show_bug.cgi?id=1200872 * https://bugzilla.suse.com/show_bug.cgi?id=1201381 * https://bugzilla.suse.com/show_bug.cgi?id=1201610 * https://bugzilla.suse.com/show_bug.cgi?id=1201726 * https://bugzilla.suse.com/show_bug.cgi?id=1202672 * https://bugzilla.suse.com/show_bug.cgi?id=1202712 * https://bugzilla.suse.com/show_bug.cgi?id=1203769 * https://bugzilla.suse.com/show_bug.cgi?id=1207186 * https://bugzilla.suse.com/show_bug.cgi?id=1209547 * https://bugzilla.suse.com/show_bug.cgi?id=1210647 * https://bugzilla.suse.com/show_bug.cgi?id=1213167 * https://bugzilla.suse.com/show_bug.cgi?id=1218450 * https://bugzilla.suse.com/show_bug.cgi?id=1220466 * https://bugzilla.suse.com/show_bug.cgi?id=1224489 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1226130 * https://bugzilla.suse.com/show_bug.cgi?id=1226323 * https://bugzilla.suse.com/show_bug.cgi?id=1226785 * https://bugzilla.suse.com/show_bug.cgi?id=1227858 * https://bugzilla.suse.com/show_bug.cgi?id=1228909 * https://bugzilla.suse.com/show_bug.cgi?id=1231375 * https://bugzilla.suse.com/show_bug.cgi?id=1231854 * https://bugzilla.suse.com/show_bug.cgi?id=1232370 * https://bugzilla.suse.com/show_bug.cgi?id=1232812 * https://bugzilla.suse.com/show_bug.cgi?id=1233458 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1234074 * https://bugzilla.suse.com/show_bug.cgi?id=1234222 * https://bugzilla.suse.com/show_bug.cgi?id=1234480 * https://bugzilla.suse.com/show_bug.cgi?id=1235436 * https://bugzilla.suse.com/show_bug.cgi?id=1235485 * https://bugzilla.suse.com/show_bug.cgi?id=1235637 * https://bugzilla.suse.com/show_bug.cgi?id=1235715 * https://bugzilla.suse.com/show_bug.cgi?id=1235733 * https://bugzilla.suse.com/show_bug.cgi?id=1235973 * https://bugzilla.suse.com/show_bug.cgi?id=1237313 * https://bugzilla.suse.com/show_bug.cgi?id=1237721 * https://bugzilla.suse.com/show_bug.cgi?id=1237722 * https://bugzilla.suse.com/show_bug.cgi?id=1237725 * https://bugzilla.suse.com/show_bug.cgi?id=1237728 * https://bugzilla.suse.com/show_bug.cgi?id=1237733 * https://bugzilla.suse.com/show_bug.cgi?id=1237735 * https://bugzilla.suse.com/show_bug.cgi?id=1237739 * https://bugzilla.suse.com/show_bug.cgi?id=1237751 * https://bugzilla.suse.com/show_bug.cgi?id=1237752 * https://bugzilla.suse.com/show_bug.cgi?id=1237767 * https://bugzilla.suse.com/show_bug.cgi?id=1237768 * https://bugzilla.suse.com/show_bug.cgi?id=1237782 * https://bugzilla.suse.com/show_bug.cgi?id=1237800 * https://bugzilla.suse.com/show_bug.cgi?id=1237813 * https://bugzilla.suse.com/show_bug.cgi?id=1237814 * https://bugzilla.suse.com/show_bug.cgi?id=1237815 * https://bugzilla.suse.com/show_bug.cgi?id=1237823 * https://bugzilla.suse.com/show_bug.cgi?id=1237831 * https://bugzilla.suse.com/show_bug.cgi?id=1237836 * https://bugzilla.suse.com/show_bug.cgi?id=1237842 * https://bugzilla.suse.com/show_bug.cgi?id=1237897 * https://bugzilla.suse.com/show_bug.cgi?id=1237903 * https://bugzilla.suse.com/show_bug.cgi?id=1237906 * https://bugzilla.suse.com/show_bug.cgi?id=1237918 * https://bugzilla.suse.com/show_bug.cgi?id=1237925 * https://bugzilla.suse.com/show_bug.cgi?id=1237932 * https://bugzilla.suse.com/show_bug.cgi?id=1237933 * https://bugzilla.suse.com/show_bug.cgi?id=1237934 * https://bugzilla.suse.com/show_bug.cgi?id=1237936 * https://bugzilla.suse.com/show_bug.cgi?id=1237941 * https://bugzilla.suse.com/show_bug.cgi?id=1237953 * https://bugzilla.suse.com/show_bug.cgi?id=1237969 * https://bugzilla.suse.com/show_bug.cgi?id=1237973 * https://bugzilla.suse.com/show_bug.cgi?id=1237983 * https://bugzilla.suse.com/show_bug.cgi?id=1237988 * https://bugzilla.suse.com/show_bug.cgi?id=1238007 * https://bugzilla.suse.com/show_bug.cgi?id=1238030 * https://bugzilla.suse.com/show_bug.cgi?id=1238036 * https://bugzilla.suse.com/show_bug.cgi?id=1238079 * https://bugzilla.suse.com/show_bug.cgi?id=1238108 * https://bugzilla.suse.com/show_bug.cgi?id=1238127 * https://bugzilla.suse.com/show_bug.cgi?id=1238133 * https://bugzilla.suse.com/show_bug.cgi?id=1238146 * https://bugzilla.suse.com/show_bug.cgi?id=1238168 * https://bugzilla.suse.com/show_bug.cgi?id=1238169 * https://bugzilla.suse.com/show_bug.cgi?id=1238170 * https://bugzilla.suse.com/show_bug.cgi?id=1238171 * https://bugzilla.suse.com/show_bug.cgi?id=1238172 * https://bugzilla.suse.com/show_bug.cgi?id=1238180 * https://bugzilla.suse.com/show_bug.cgi?id=1238181 * https://bugzilla.suse.com/show_bug.cgi?id=1238183 * https://bugzilla.suse.com/show_bug.cgi?id=1238231 * https://bugzilla.suse.com/show_bug.cgi?id=1238236 * https://bugzilla.suse.com/show_bug.cgi?id=1238240 * https://bugzilla.suse.com/show_bug.cgi?id=1238251 * https://bugzilla.suse.com/show_bug.cgi?id=1238252 * https://bugzilla.suse.com/show_bug.cgi?id=1238257 * https://bugzilla.suse.com/show_bug.cgi?id=1238266 * https://bugzilla.suse.com/show_bug.cgi?id=1238268 * https://bugzilla.suse.com/show_bug.cgi?id=1238269 * https://bugzilla.suse.com/show_bug.cgi?id=1238271 * https://bugzilla.suse.com/show_bug.cgi?id=1238272 * https://bugzilla.suse.com/show_bug.cgi?id=1238274 * https://bugzilla.suse.com/show_bug.cgi?id=1238276 * https://bugzilla.suse.com/show_bug.cgi?id=1238279 * https://bugzilla.suse.com/show_bug.cgi?id=1238282 * https://bugzilla.suse.com/show_bug.cgi?id=1238293 * https://bugzilla.suse.com/show_bug.cgi?id=1238313 * https://bugzilla.suse.com/show_bug.cgi?id=1238336 * https://bugzilla.suse.com/show_bug.cgi?id=1238372 * https://bugzilla.suse.com/show_bug.cgi?id=1238373 * https://bugzilla.suse.com/show_bug.cgi?id=1238376 * https://bugzilla.suse.com/show_bug.cgi?id=1238378 * https://bugzilla.suse.com/show_bug.cgi?id=1238382 * https://bugzilla.suse.com/show_bug.cgi?id=1238393 * https://bugzilla.suse.com/show_bug.cgi?id=1238396 * https://bugzilla.suse.com/show_bug.cgi?id=1238413 * https://bugzilla.suse.com/show_bug.cgi?id=1238416 * https://bugzilla.suse.com/show_bug.cgi?id=1238417 * https://bugzilla.suse.com/show_bug.cgi?id=1238419 * https://bugzilla.suse.com/show_bug.cgi?id=1238430 * https://bugzilla.suse.com/show_bug.cgi?id=1238433 * https://bugzilla.suse.com/show_bug.cgi?id=1238434 * https://bugzilla.suse.com/show_bug.cgi?id=1238443 * https://bugzilla.suse.com/show_bug.cgi?id=1238447 * https://bugzilla.suse.com/show_bug.cgi?id=1238454 * https://bugzilla.suse.com/show_bug.cgi?id=1238467 * https://bugzilla.suse.com/show_bug.cgi?id=1238469 * https://bugzilla.suse.com/show_bug.cgi?id=1238512 * https://bugzilla.suse.com/show_bug.cgi?id=1238521 * https://bugzilla.suse.com/show_bug.cgi?id=1238531 * https://bugzilla.suse.com/show_bug.cgi?id=1238540 * https://bugzilla.suse.com/show_bug.cgi?id=1238598 * https://bugzilla.suse.com/show_bug.cgi?id=1238599 * https://bugzilla.suse.com/show_bug.cgi?id=1238600 * https://bugzilla.suse.com/show_bug.cgi?id=1238612 * https://bugzilla.suse.com/show_bug.cgi?id=1238613 * https://bugzilla.suse.com/show_bug.cgi?id=1238615 * https://bugzilla.suse.com/show_bug.cgi?id=1238618 * https://bugzilla.suse.com/show_bug.cgi?id=1238623 * https://bugzilla.suse.com/show_bug.cgi?id=1238625 * https://bugzilla.suse.com/show_bug.cgi?id=1238626 * https://bugzilla.suse.com/show_bug.cgi?id=1238630 * https://bugzilla.suse.com/show_bug.cgi?id=1238633 * https://bugzilla.suse.com/show_bug.cgi?id=1238635 * https://bugzilla.suse.com/show_bug.cgi?id=1238647 * https://bugzilla.suse.com/show_bug.cgi?id=1238654 * https://bugzilla.suse.com/show_bug.cgi?id=1238705 * https://bugzilla.suse.com/show_bug.cgi?id=1238707 * https://bugzilla.suse.com/show_bug.cgi?id=1238710 * https://bugzilla.suse.com/show_bug.cgi?id=1238716 * https://bugzilla.suse.com/show_bug.cgi?id=1238719 * https://bugzilla.suse.com/show_bug.cgi?id=1238721 * https://bugzilla.suse.com/show_bug.cgi?id=1238729 * https://bugzilla.suse.com/show_bug.cgi?id=1238738 * https://bugzilla.suse.com/show_bug.cgi?id=1238747 * https://bugzilla.suse.com/show_bug.cgi?id=1238750 * https://bugzilla.suse.com/show_bug.cgi?id=1238751 * https://bugzilla.suse.com/show_bug.cgi?id=1238754 * https://bugzilla.suse.com/show_bug.cgi?id=1238763 * https://bugzilla.suse.com/show_bug.cgi?id=1238780 * https://bugzilla.suse.com/show_bug.cgi?id=1238787 * https://bugzilla.suse.com/show_bug.cgi?id=1238789 * https://bugzilla.suse.com/show_bug.cgi?id=1238794 * https://bugzilla.suse.com/show_bug.cgi?id=1238805 * https://bugzilla.suse.com/show_bug.cgi?id=1238816 * https://bugzilla.suse.com/show_bug.cgi?id=1238817 * https://bugzilla.suse.com/show_bug.cgi?id=1238819 * https://bugzilla.suse.com/show_bug.cgi?id=1238843 * https://bugzilla.suse.com/show_bug.cgi?id=1238889 * https://bugzilla.suse.com/show_bug.cgi?id=1238903 * https://bugzilla.suse.com/show_bug.cgi?id=1238909 * https://bugzilla.suse.com/show_bug.cgi?id=1238916 * https://bugzilla.suse.com/show_bug.cgi?id=1238925 * https://bugzilla.suse.com/show_bug.cgi?id=1238933 * https://bugzilla.suse.com/show_bug.cgi?id=1238943 * https://bugzilla.suse.com/show_bug.cgi?id=1238944 * https://bugzilla.suse.com/show_bug.cgi?id=1238946 * https://bugzilla.suse.com/show_bug.cgi?id=1238949 * https://bugzilla.suse.com/show_bug.cgi?id=1238950 * https://bugzilla.suse.com/show_bug.cgi?id=1238951 * https://bugzilla.suse.com/show_bug.cgi?id=1238952 * https://bugzilla.suse.com/show_bug.cgi?id=1238953 * https://bugzilla.suse.com/show_bug.cgi?id=1238954 * https://bugzilla.suse.com/show_bug.cgi?id=1238964 * https://bugzilla.suse.com/show_bug.cgi?id=1238970 * https://bugzilla.suse.com/show_bug.cgi?id=1238986 * https://bugzilla.suse.com/show_bug.cgi?id=1239002 * https://bugzilla.suse.com/show_bug.cgi?id=1239003 * https://bugzilla.suse.com/show_bug.cgi?id=1239035 * https://bugzilla.suse.com/show_bug.cgi?id=1239036 * https://bugzilla.suse.com/show_bug.cgi?id=1239039 * https://bugzilla.suse.com/show_bug.cgi?id=1239040 * https://bugzilla.suse.com/show_bug.cgi?id=1239041 * https://bugzilla.suse.com/show_bug.cgi?id=1239059 * https://bugzilla.suse.com/show_bug.cgi?id=1239076 * https://bugzilla.suse.com/show_bug.cgi?id=1239087 * https://bugzilla.suse.com/show_bug.cgi?id=1239109 * https://bugzilla.suse.com/show_bug.cgi?id=1239117 * https://bugzilla.suse.com/show_bug.cgi?id=1239174 * https://bugzilla.suse.com/show_bug.cgi?id=1239448 * https://bugzilla.suse.com/show_bug.cgi?id=1239454 * https://bugzilla.suse.com/show_bug.cgi?id=1239468 * https://bugzilla.suse.com/show_bug.cgi?id=1239479 * https://bugzilla.suse.com/show_bug.cgi?id=1239481 * https://bugzilla.suse.com/show_bug.cgi?id=1239484 * https://bugzilla.suse.com/show_bug.cgi?id=1239508 * https://bugzilla.suse.com/show_bug.cgi?id=1239994 * https://bugzilla.suse.com/show_bug.cgi?id=1240133 * https://bugzilla.suse.com/show_bug.cgi?id=1240172 * https://bugzilla.suse.com/show_bug.cgi?id=1240183 * https://bugzilla.suse.com/show_bug.cgi?id=1240186 * https://bugzilla.suse.com/show_bug.cgi?id=1240208 * https://bugzilla.suse.com/show_bug.cgi?id=1240213 * https://bugzilla.suse.com/show_bug.cgi?id=1240218 * https://bugzilla.suse.com/show_bug.cgi?id=1240227 * https://bugzilla.suse.com/show_bug.cgi?id=1240229 * https://bugzilla.suse.com/show_bug.cgi?id=1240233 * https://bugzilla.suse.com/show_bug.cgi?id=1240272 * https://bugzilla.suse.com/show_bug.cgi?id=1240275 * https://bugzilla.suse.com/show_bug.cgi?id=1240276 * https://bugzilla.suse.com/show_bug.cgi?id=1240282 * https://bugzilla.suse.com/show_bug.cgi?id=1240285 * https://bugzilla.suse.com/show_bug.cgi?id=1240286 * https://bugzilla.suse.com/show_bug.cgi?id=1240288 * https://bugzilla.suse.com/show_bug.cgi?id=1240290 * https://bugzilla.suse.com/show_bug.cgi?id=1240303 * https://bugzilla.suse.com/show_bug.cgi?id=1240318 * https://bugzilla.suse.com/show_bug.cgi?id=1240582 * https://bugzilla.suse.com/show_bug.cgi?id=1240639 * https://bugzilla.suse.com/show_bug.cgi?id=1240700 * https://bugzilla.suse.com/show_bug.cgi?id=1240708 * https://bugzilla.suse.com/show_bug.cgi?id=1240784 * https://bugzilla.suse.com/show_bug.cgi?id=1240797 * https://bugzilla.suse.com/show_bug.cgi?id=1240801 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 08:34:32 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 16 Apr 2025 08:34:32 -0000 Subject: SUSE-SU-2025:1297-1: moderate: Security update for Multi-Linux Manager 5.0: Server, Proxy and Retail Server Message-ID: <174479247279.29284.8636676157863501027@smelt2.prg2.suse.org> # Security update for Multi-Linux Manager 5.0: Server, Proxy and Retail Server Announcement ID: SUSE-SU-2025:1297-1 Release Date: 2025-04-16T07:57:31Z Rating: moderate References: * bsc#1221505 * bsc#1225287 * bsc#1226273 * bsc#1227118 * bsc#1227859 * bsc#1231983 * bsc#1233500 * bsc#1234033 * bsc#1234202 * bsc#1234226 * bsc#1234442 * bsc#1235527 * bsc#1235696 * bsc#1235825 * bsc#1235853 * bsc#1235970 * bsc#1236011 * bsc#1236118 * bsc#1236166 * bsc#1236234 * bsc#1236268 * bsc#1236323 * bsc#1236601 * bsc#1236625 * bsc#1236678 * bsc#1236707 * bsc#1237060 * bsc#1237403 * bsc#1237535 * bsc#1237694 * bsc#1238924 * bsc#1239826 * bsc#1240960 * jsc#MSQA-934 Cross-References: * CVE-2025-23392 CVSS scores: * CVE-2025-23392 ( SUSE ): 5.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-23392 ( SUSE ): 5.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N Affected Products: * SUSE Linux Enterprise Micro 5.5 * SUSE Manager Proxy 5.0 Extension * SUSE Manager Retail Branch Server 5.0 Extension * SUSE Manager Server 5.0 Extension An update that solves one vulnerability, contains one feature and has 32 security fixes can now be installed. ## Recommended update 5.0.4 for Multi-Linux Manager Proxy ### Description: This update fixes the following issues: proxy-helm: * Version 5.0.12: * Image rebuilt to the newest version with updated dependencies proxy-httpd-image: * Version 5.0.10: * Fixed wrong IP address set on susemanager-tftpsync-recv.conf * Image rebuilt to the newest version with updated dependencies proxy-salt-broker-image: * Version 5.0.10: * Image rebuilt to the newest version with updated dependencies proxy-squid-image: * Version 5.0.10: * Set maximal cache time for metadata to 5 minutes * Image rebuilt to the newest version with updated dependencies proxy-ssh-image: * version 5.0.10: * Image rebuilt to the newest version with updated dependencies proxy-tftpd-image: * Version 5.0.10: * Fixed possible collisions replacing FQDNs for proxies (bsc#1236601) * Replaced server hostname in chained proxy tftp container (bsc#1236166) * Image rebuilt to the newest version with updated dependencies ## Recommended update 5.0.4 for Multi-Linux Manager Retail Branch Server ### Description: This update fixes the following issues: proxy-helm: * Version 5.0.12: * Image rebuilt to the newest version with updated dependencies proxy-httpd-image: * Version 5.0.10: * Fixed wrong IP address set on susemanager-tftpsync-recv.conf * Image rebuilt to the newest version with updated dependencies proxy-salt-broker-image: * Version 5.0.10: * Image rebuilt to the newest version with updated dependencies proxy-squid-image: * Version 5.0.10: * Set maximal cache time for metadata to 5 minutes * Image rebuilt to the newest version with updated dependencies proxy-ssh-image: * version 5.0.10: * Image rebuilt to the newest version with updated dependencies proxy-tftpd-image: * Version 5.0.10: * Fixed possible collisions replacing FQDNs for proxies (bsc#1236601) * Replaced server hostname in chained proxy tftp container (bsc#1236166) * Image rebuilt to the newest version with updated dependencies ## Recommended update 5.0.4 for Multi-Linux Manager Server ### Description: This update fixes the following issues: server-attestation-image: * Version 5.0.8: * Image rebuilt to the newest version with updated dependencies server-hub-xmlrpc-api-image: * Version 5.0.10: * Image rebuilt to the newest version with updated dependencies server-image: * Version 5.0.13: * Image rebuilt to the newest version with updated dependencies server-migration-14-16-image: * Version 5.0.11: * Image rebuilt to the newest version with updated dependencies ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 5.0 Extension zypper in -t patch SUSE-SUSE-Manager-Proxy-5.0-2025-1297=1 * SUSE Manager Retail Branch Server 5.0 Extension zypper in -t patch SUSE-SUSE-Manager-Retail-Branch-Server-5.0-2025-1297=1 * SUSE Manager Server 5.0 Extension zypper in -t patch SUSE-SUSE-Manager-Server-5.0-2025-1297=1 ## Package List: * SUSE Manager Proxy 5.0 Extension (aarch64) * suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.4-7.12.29 * suse-manager-5.0-aarch64-proxy-squid-image-5.0.4-7.12.12 * suse-manager-5.0-aarch64-proxy-ssh-image-5.0.4-7.12.14 * suse-manager-5.0-aarch64-proxy-httpd-image-5.0.4-7.12.28 * suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.4-7.12.13 * SUSE Manager Proxy 5.0 Extension (ppc64le) * suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.4-7.12.13 * suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.4-7.12.29 * suse-manager-5.0-ppc64le-proxy-squid-image-5.0.4-7.12.12 * suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.4-7.12.14 * suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.4-7.12.28 * SUSE Manager Proxy 5.0 Extension (s390x) * suse-manager-5.0-s390x-proxy-squid-image-5.0.4-7.12.12 * suse-manager-5.0-s390x-proxy-httpd-image-5.0.4-7.12.28 * suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.4-7.12.29 * suse-manager-5.0-s390x-proxy-ssh-image-5.0.4-7.12.14 * suse-manager-5.0-s390x-proxy-tftpd-image-5.0.4-7.12.13 * SUSE Manager Proxy 5.0 Extension (x86_64) * suse-manager-5.0-x86_64-proxy-ssh-image-5.0.4-7.12.14 * suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.4-7.12.29 * suse-manager-5.0-x86_64-proxy-squid-image-5.0.4-7.12.12 * suse-manager-5.0-x86_64-proxy-httpd-image-5.0.4-7.12.28 * suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.4-7.12.13 * SUSE Manager Retail Branch Server 5.0 Extension (aarch64) * suse-manager-5.0-aarch64-proxy-salt-broker-image-5.0.4-7.12.29 * suse-manager-5.0-aarch64-proxy-squid-image-5.0.4-7.12.12 * suse-manager-5.0-aarch64-proxy-ssh-image-5.0.4-7.12.14 * suse-manager-5.0-aarch64-proxy-httpd-image-5.0.4-7.12.28 * suse-manager-5.0-aarch64-proxy-tftpd-image-5.0.4-7.12.13 * SUSE Manager Retail Branch Server 5.0 Extension (ppc64le) * suse-manager-5.0-ppc64le-proxy-tftpd-image-5.0.4-7.12.13 * suse-manager-5.0-ppc64le-proxy-salt-broker-image-5.0.4-7.12.29 * suse-manager-5.0-ppc64le-proxy-squid-image-5.0.4-7.12.12 * suse-manager-5.0-ppc64le-proxy-ssh-image-5.0.4-7.12.14 * suse-manager-5.0-ppc64le-proxy-httpd-image-5.0.4-7.12.28 * SUSE Manager Retail Branch Server 5.0 Extension (s390x) * suse-manager-5.0-s390x-proxy-squid-image-5.0.4-7.12.12 * suse-manager-5.0-s390x-proxy-httpd-image-5.0.4-7.12.28 * suse-manager-5.0-s390x-proxy-salt-broker-image-5.0.4-7.12.29 * suse-manager-5.0-s390x-proxy-ssh-image-5.0.4-7.12.14 * suse-manager-5.0-s390x-proxy-tftpd-image-5.0.4-7.12.13 * SUSE Manager Retail Branch Server 5.0 Extension (x86_64) * suse-manager-5.0-x86_64-proxy-ssh-image-5.0.4-7.12.14 * suse-manager-5.0-x86_64-proxy-salt-broker-image-5.0.4-7.12.29 * suse-manager-5.0-x86_64-proxy-squid-image-5.0.4-7.12.12 * suse-manager-5.0-x86_64-proxy-httpd-image-5.0.4-7.12.28 * suse-manager-5.0-x86_64-proxy-tftpd-image-5.0.4-7.12.13 * SUSE Manager Server 5.0 Extension (aarch64) * suse-manager-5.0-aarch64-server-attestation-image-5.0.4-6.12.11 * suse-manager-5.0-aarch64-server-hub-xmlrpc-api-image-5.0.4-6.12.14 * suse-manager-5.0-aarch64-server-migration-14-16-image-5.0.4-7.12.23 * suse-manager-5.0-aarch64-server-image-5.0.4-7.17.29 * SUSE Manager Server 5.0 Extension (ppc64le) * suse-manager-5.0-ppc64le-server-hub-xmlrpc-api-image-5.0.4-6.12.14 * suse-manager-5.0-ppc64le-server-migration-14-16-image-5.0.4-7.12.23 * suse-manager-5.0-ppc64le-server-image-5.0.4-7.17.29 * suse-manager-5.0-ppc64le-server-attestation-image-5.0.4-6.12.11 * SUSE Manager Server 5.0 Extension (s390x) * suse-manager-5.0-s390x-server-hub-xmlrpc-api-image-5.0.4-6.12.14 * suse-manager-5.0-s390x-server-attestation-image-5.0.4-6.12.11 * suse-manager-5.0-s390x-server-migration-14-16-image-5.0.4-7.12.23 * suse-manager-5.0-s390x-server-image-5.0.4-7.17.29 * SUSE Manager Server 5.0 Extension (x86_64) * suse-manager-5.0-x86_64-server-hub-xmlrpc-api-image-5.0.4-6.12.14 * suse-manager-5.0-x86_64-server-attestation-image-5.0.4-6.12.11 * suse-manager-5.0-x86_64-server-image-5.0.4-7.17.29 * suse-manager-5.0-x86_64-server-migration-14-16-image-5.0.4-7.12.23 ## References: * https://www.suse.com/security/cve/CVE-2025-23392.html * https://bugzilla.suse.com/show_bug.cgi?id=1221505 * https://bugzilla.suse.com/show_bug.cgi?id=1225287 * https://bugzilla.suse.com/show_bug.cgi?id=1226273 * https://bugzilla.suse.com/show_bug.cgi?id=1227118 * https://bugzilla.suse.com/show_bug.cgi?id=1227859 * https://bugzilla.suse.com/show_bug.cgi?id=1231983 * https://bugzilla.suse.com/show_bug.cgi?id=1233500 * https://bugzilla.suse.com/show_bug.cgi?id=1234033 * https://bugzilla.suse.com/show_bug.cgi?id=1234202 * https://bugzilla.suse.com/show_bug.cgi?id=1234226 * https://bugzilla.suse.com/show_bug.cgi?id=1234442 * https://bugzilla.suse.com/show_bug.cgi?id=1235527 * https://bugzilla.suse.com/show_bug.cgi?id=1235696 * https://bugzilla.suse.com/show_bug.cgi?id=1235825 * https://bugzilla.suse.com/show_bug.cgi?id=1235853 * https://bugzilla.suse.com/show_bug.cgi?id=1235970 * https://bugzilla.suse.com/show_bug.cgi?id=1236011 * https://bugzilla.suse.com/show_bug.cgi?id=1236118 * https://bugzilla.suse.com/show_bug.cgi?id=1236166 * https://bugzilla.suse.com/show_bug.cgi?id=1236234 * https://bugzilla.suse.com/show_bug.cgi?id=1236268 * https://bugzilla.suse.com/show_bug.cgi?id=1236323 * https://bugzilla.suse.com/show_bug.cgi?id=1236601 * https://bugzilla.suse.com/show_bug.cgi?id=1236625 * https://bugzilla.suse.com/show_bug.cgi?id=1236678 * https://bugzilla.suse.com/show_bug.cgi?id=1236707 * https://bugzilla.suse.com/show_bug.cgi?id=1237060 * https://bugzilla.suse.com/show_bug.cgi?id=1237403 * https://bugzilla.suse.com/show_bug.cgi?id=1237535 * https://bugzilla.suse.com/show_bug.cgi?id=1237694 * https://bugzilla.suse.com/show_bug.cgi?id=1238924 * https://bugzilla.suse.com/show_bug.cgi?id=1239826 * https://bugzilla.suse.com/show_bug.cgi?id=1240960 * https://jira.suse.com/browse/MSQA-934 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 08:34:40 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 16 Apr 2025 08:34:40 -0000 Subject: SUSE-SU-2025:1295-1: important: Security update for expat Message-ID: <174479248031.29284.835623091378111439@smelt2.prg2.suse.org> # Security update for expat Announcement ID: SUSE-SU-2025:1295-1 Release Date: 2025-04-16T07:54:00Z Rating: important References: * bsc#1239618 * jsc#PED-12500 * jsc#SLE-21253 Cross-References: * CVE-2024-8176 CVSS scores: * CVE-2024-8176 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-8176 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8176 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability and contains two features can now be installed. ## Description: This update for expat fixes the following issues: \- CVE-2024-8176: Fixed denial of service from chaining a large number of entities caused by stack overflow by resolving use of recursion (bsc#1239618) Other fixes: \- version update to 2.7.1 (jsc#PED-12500) Bug fixes: #980 #989 Restore event pointer behavior from Expat 2.6.4 (that the fix to CVE-2024-8176 changed in 2.7.0); affected API functions are: \- XML_GetCurrentByteCount \- XML_GetCurrentByteIndex \- XML_GetCurrentColumnNumber \- XML_GetCurrentLineNumber \- XML_GetInputContext Other changes: #976 #977 Autotools: Integrate files "fuzz/xml_lpm_fuzzer.{cpp,proto}" with Automake that were missing from 2.7.0 release tarballs #983 #984 Fix printf format specifiers for 32bit Emscripten #992 docs: Promote OpenSSF Best Practices self- certification #978 tests/benchmark: Resolve mistaken double close #986 Address compiler warnings #990 #993 Version info bumped from 11:1:10 (libexpat _.so.1.10.1) to 11:2:10 (libexpat_.so.1.10.2); see https://verbump.de/ for what these numbers do Infrastructure: #982 CI: Start running Perl XML::Parser integration tests #987 CI: Enforce Clang Static Analyzer clean code #991 CI: Re- enable warning clang-analyzer-valist.Uninitialized for clang-tidy #981 CI: Cover compilation with musl #983 #984 CI: Cover compilation with 32bit Emscripten #976 #977 CI: Protect against fuzzer files missing from future release archives * version update to 2.7.0 #935 #937 Autotools: Make generated CMake files look for libexpat. at SO_MAJOR@.dylib on macOS #925 Autotools: Sync CMake templates with CMake 3.29 #945 #962 #966 CMake: Drop support for CMake <3.13 #942 CMake: Small fuzzing related improvements #921 docs: Add missing documentation of error code XML_ERROR_NOT_STARTED that was introduced with 2.6.4 #941 docs: Document need for C++11 compiler for use from C++ #959 tests/benchmark: Fix a (harmless) TOCTTOU #944 Windows: Fix installer target location of file xmlwf.xml for CMake #953 Windows: Address warning -Wunknown-warning-option about -Wno-pedantic-ms-format from LLVM MinGW #971 Address Cppcheck warnings #969 #970 Mass-migrate links from http:// to https:// #947 #958 .. #974 #975 Document changes since the previous release #974 #975 Version info bumped from 11:0:10 (libexpat _.so.1.10.0) to 11:1:10 (libexpat_.so.1.10.1); see https://verbump.de/ for what these numbers do ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1295=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1295=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * expat-debuginfo-2.7.1-21.43.1 * libexpat1-2.7.1-21.43.1 * libexpat1-debuginfo-2.7.1-21.43.1 * expat-debugsource-2.7.1-21.43.1 * libexpat-devel-2.7.1-21.43.1 * expat-2.7.1-21.43.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libexpat1-debuginfo-32bit-2.7.1-21.43.1 * expat-debuginfo-32bit-2.7.1-21.43.1 * libexpat1-32bit-2.7.1-21.43.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * expat-debuginfo-2.7.1-21.43.1 * libexpat1-2.7.1-21.43.1 * libexpat1-debuginfo-32bit-2.7.1-21.43.1 * libexpat1-32bit-2.7.1-21.43.1 * libexpat1-debuginfo-2.7.1-21.43.1 * expat-debugsource-2.7.1-21.43.1 * expat-debuginfo-32bit-2.7.1-21.43.1 * libexpat-devel-2.7.1-21.43.1 * expat-2.7.1-21.43.1 ## References: * https://www.suse.com/security/cve/CVE-2024-8176.html * https://bugzilla.suse.com/show_bug.cgi?id=1239618 * https://jira.suse.com/browse/PED-12500 * https://jira.suse.com/browse/SLE-21253 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 08:34:44 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 16 Apr 2025 08:34:44 -0000 Subject: SUSE-SU-2025:1294-1: important: Security update for rubygem-bundler Message-ID: <174479248485.29284.18189867221399564528@smelt2.prg2.suse.org> # Security update for rubygem-bundler Announcement ID: SUSE-SU-2025:1294-1 Release Date: 2025-04-16T07:53:41Z Rating: important References: * bsc#1185842 Cross-References: * CVE-2020-36327 CVSS scores: * CVE-2020-36327 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2020-36327 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for rubygem-bundler fixes the following issues: * CVE-2020-36327: Fixed bundler choosing a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen (bsc#1185842) Other fixes: \- Updated to version 2.2.34 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1294=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1294=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1294=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1294=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1294=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1294=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1294=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1294=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1294=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1294=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1294=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1294=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1294=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1294=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1294=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1294=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1294=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-bundler-doc-2.2.34-150000.3.11.1 * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Manager Proxy 4.3 (x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * ruby2.5-rubygem-bundler-2.2.34-150000.3.11.1 ## References: * https://www.suse.com/security/cve/CVE-2020-36327.html * https://bugzilla.suse.com/show_bug.cgi?id=1185842 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 12:30:05 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 16 Apr 2025 12:30:05 -0000 Subject: SUSE-SU-2025:1330-1: moderate: Security update for rsync Message-ID: <174480660589.29196.11297888272108314712@smelt2.prg2.suse.org> # Security update for rsync Announcement ID: SUSE-SU-2025:1330-1 Release Date: 2025-04-16T11:49:27Z Rating: moderate References: * bsc#1239649 Cross-References: * CVE-2024-12088 CVSS scores: * CVE-2024-12088 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2024-12088 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N * CVE-2024-12088 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for rsync fixes the following issues: * Fixed bwlimit=0 option broken by CVE-2024-12088 fix (bsc#1239649). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1330=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * rsync-debugsource-3.1.3-3.28.1 * rsync-debuginfo-3.1.3-3.28.1 * rsync-3.1.3-3.28.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12088.html * https://bugzilla.suse.com/show_bug.cgi?id=1239649 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 12:30:24 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 16 Apr 2025 12:30:24 -0000 Subject: SUSE-SU-2025:1326-1: important: Security update for pgadmin4 Message-ID: <174480662446.29196.4268187062908135438@smelt2.prg2.suse.org> # Security update for pgadmin4 Announcement ID: SUSE-SU-2025:1326-1 Release Date: 2025-04-16T08:37:33Z Rating: important References: * bsc#1224295 * bsc#1234840 * bsc#1239308 Cross-References: * CVE-2023-1907 * CVE-2024-4068 * CVE-2025-27152 CVSS scores: * CVE-2023-1907 ( SUSE ): 7.5 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-1907 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2023-1907 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H * CVE-2024-4068 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27152 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-27152 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-27152 ( NVD ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.3 * Python 3 Module 15-SP6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves three vulnerabilities can now be installed. ## Description: This update for pgadmin4 fixes the following issues: * CVE-2025-27152: Fixed SSRF and creadential leakage due to requests sent to absolute URL even when baseURL is set (bsc#1239308) * CVE-2023-1907: Fixed an issue which could result in users being authenticated in another user's session if two users authenticate simultaneously via ldap (bsc#1234840) * CVE-2024-4068: Fixed a possible memory exhaustion (bsc#1224295) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1326=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2025-1326=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1326=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1326=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1326=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1326=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1326=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1326=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1326=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1326=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1326=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1326=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1326=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1326=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1326=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1326=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1326=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * openSUSE Leap 15.3 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-web-uwsgi-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * Python 3 Module 15-SP6 (s390x) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * Python 3 Module 15-SP6 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Manager Proxy 4.3 (x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Manager Proxy 4.3 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Manager Server 4.3 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * pgadmin4-debuginfo-4.30-150300.3.18.1 * pgadmin4-4.30-150300.3.18.1 * SUSE Enterprise Storage 7.1 (noarch) * pgadmin4-web-4.30-150300.3.18.1 * pgadmin4-doc-4.30-150300.3.18.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1907.html * https://www.suse.com/security/cve/CVE-2024-4068.html * https://www.suse.com/security/cve/CVE-2025-27152.html * https://bugzilla.suse.com/show_bug.cgi?id=1224295 * https://bugzilla.suse.com/show_bug.cgi?id=1234840 * https://bugzilla.suse.com/show_bug.cgi?id=1239308 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 12:30:35 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 16 Apr 2025 12:30:35 -0000 Subject: SUSE-SU-2025:1325-1: important: Security update for webkit2gtk3 Message-ID: <174480663587.29196.255828869238297756@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2025:1325-1 Release Date: 2025-04-16T08:36:24Z Rating: important References: * bsc#1239863 * bsc#1239864 * bsc#1240958 * bsc#1240961 * bsc#1240962 * bsc#1240963 * bsc#1240964 * bsc#1240986 * bsc#1240987 Cross-References: * CVE-2024-44192 * CVE-2024-54467 * CVE-2024-54551 * CVE-2025-24208 * CVE-2025-24209 * CVE-2025-24213 * CVE-2025-24216 * CVE-2025-24264 * CVE-2025-30427 CVSS scores: * CVE-2024-44192 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-44192 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-44192 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-44192 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-54467 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-54467 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-54467 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-54467 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2024-54551 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54551 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-54551 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-24208 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-24208 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-24208 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-24209 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-24209 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24209 ( NVD ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-24213 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-24213 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24213 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24216 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-24216 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-24216 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-24264 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-24264 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24264 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-30427 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-30427 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-30427 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves nine vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: * Update to version 2.48.1 * CVE-2024-54551: improper memory handling may lead to a denial-of-service when processing certain web content (bsc#1240962) * CVE-2025-24208: permissions issue may lead to a cross-site scripting attack when loading a malicious iframe (bsc#1240961) * CVE-2025-24209: buffer overflow may lead to crash when processing maliciously crafted web content (bsc#1240964) * CVE-2025-24213: type confusion issue may lead to memory corruption (bsc#1240963) * CVE-2025-24216: improper memory handling may lead to an unexpected crash when processing certain web content (bsc#1240986) * CVE-2025-24264: improper memory handling may lead to unexpected crash when processing certain web content (bsc#1240987) * CVE-2025-30427: use-after-free issue may lead to an unexpected Safari crash when processing maliciously crafted web content (bsc#1240958) * CVE-2024-44192: processing maliciously crafted web content may lead to an unexpected process crash (bsc#1239863) * CVE-2024-54467: a malicious website may exfiltrate data cross-origin due to a cookie management issue (bsc#1239864) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1325=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1325=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * webkit2gtk3-debugsource-2.48.1-4.34.1 * libjavascriptcoregtk-4_0-18-2.48.1-4.34.1 * libwebkit2gtk-4_0-37-2.48.1-4.34.1 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-4.34.1 * typelib-1_0-JavaScriptCore-4_0-2.48.1-4.34.1 * webkit2gtk-4_0-injected-bundles-2.48.1-4.34.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-4.34.1 * webkit2gtk3-devel-2.48.1-4.34.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-4.34.1 * typelib-1_0-WebKit2-4_0-2.48.1-4.34.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * libwebkit2gtk3-lang-2.48.1-4.34.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (ppc64le s390x x86_64) * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-4.34.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * webkit2gtk3-debugsource-2.48.1-4.34.1 * libjavascriptcoregtk-4_0-18-2.48.1-4.34.1 * libwebkit2gtk-4_0-37-2.48.1-4.34.1 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-4.34.1 * typelib-1_0-JavaScriptCore-4_0-2.48.1-4.34.1 * webkit2gtk-4_0-injected-bundles-2.48.1-4.34.1 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-4.34.1 * webkit2gtk3-devel-2.48.1-4.34.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-4.34.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-4.34.1 * typelib-1_0-WebKit2-4_0-2.48.1-4.34.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * libwebkit2gtk3-lang-2.48.1-4.34.1 ## References: * https://www.suse.com/security/cve/CVE-2024-44192.html * https://www.suse.com/security/cve/CVE-2024-54467.html * https://www.suse.com/security/cve/CVE-2024-54551.html * https://www.suse.com/security/cve/CVE-2025-24208.html * https://www.suse.com/security/cve/CVE-2025-24209.html * https://www.suse.com/security/cve/CVE-2025-24213.html * https://www.suse.com/security/cve/CVE-2025-24216.html * https://www.suse.com/security/cve/CVE-2025-24264.html * https://www.suse.com/security/cve/CVE-2025-30427.html * https://bugzilla.suse.com/show_bug.cgi?id=1239863 * https://bugzilla.suse.com/show_bug.cgi?id=1239864 * https://bugzilla.suse.com/show_bug.cgi?id=1240958 * https://bugzilla.suse.com/show_bug.cgi?id=1240961 * https://bugzilla.suse.com/show_bug.cgi?id=1240962 * https://bugzilla.suse.com/show_bug.cgi?id=1240963 * https://bugzilla.suse.com/show_bug.cgi?id=1240964 * https://bugzilla.suse.com/show_bug.cgi?id=1240986 * https://bugzilla.suse.com/show_bug.cgi?id=1240987 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 12:30:39 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 16 Apr 2025 12:30:39 -0000 Subject: SUSE-SU-2025:1324-1: important: Security update for apache2-mod_auth_openidc Message-ID: <174480663984.29196.8656440818177831003@smelt2.prg2.suse.org> # Security update for apache2-mod_auth_openidc Announcement ID: SUSE-SU-2025:1324-1 Release Date: 2025-04-16T08:36:12Z Rating: important References: * bsc#1240893 Cross-References: * CVE-2025-31492 CVSS scores: * CVE-2025-31492 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-31492 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-31492 ( NVD ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for apache2-mod_auth_openidc fixes the following issues: * CVE-2025-31492: Fixed a bug where OIDCProviderAuthRequestMethod POSTs can leak protected data. (bsc#1240893) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1324=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1324=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1324=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1324=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1324=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1324=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1324=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1324=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1324=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1324=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1324=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1324=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1324=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1324=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1324=1 ## Package List: * SUSE Manager Proxy 4.3 (x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * apache2-mod_auth_openidc-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debuginfo-2.3.8-150100.3.31.1 * apache2-mod_auth_openidc-debugsource-2.3.8-150100.3.31.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31492.html * https://bugzilla.suse.com/show_bug.cgi?id=1240893 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 12:30:50 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 16 Apr 2025 12:30:50 -0000 Subject: SUSE-SU-2025:1321-1: important: Maintenance update for Multi-Linux Manager 4.3: Server Message-ID: <174480665095.29196.15156908580035230552@smelt2.prg2.suse.org> # Maintenance update for Multi-Linux Manager 4.3: Server Announcement ID: SUSE-SU-2025:1321-1 Release Date: 2025-04-16T08:14:57Z Rating: important References: * bsc#1239826 * jsc#MSQA-936 Cross-References: * CVE-2025-23392 CVSS scores: * CVE-2025-23392 ( SUSE ): 5.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-23392 ( SUSE ): 5.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N Affected Products: * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 Module An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update fixes the following issues: spacewalk-java: * Version 4.3.85-0: * CVE-2025-23392: Filter user input in systems list page. (bsc#1239826) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Server 4.3 Module zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2025-1321=1 ## Package List: * SUSE Manager Server 4.3 Module (noarch) * spacewalk-java-lib-4.3.85-150400.3.105.3 * spacewalk-java-config-4.3.85-150400.3.105.3 * spacewalk-taskomatic-4.3.85-150400.3.105.3 * spacewalk-java-4.3.85-150400.3.105.3 * spacewalk-java-postgresql-4.3.85-150400.3.105.3 ## References: * https://www.suse.com/security/cve/CVE-2025-23392.html * https://bugzilla.suse.com/show_bug.cgi?id=1239826 * https://jira.suse.com/browse/MSQA-936 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 16 16:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 16 Apr 2025 16:30:12 -0000 Subject: SUSE-SU-2025:1331-1: important: Security update for webkit2gtk3 Message-ID: <174482101221.29284.10718220857283351252@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2025:1331-1 Release Date: 2025-04-16T15:15:09Z Rating: important References: * bsc#1240958 * bsc#1240961 * bsc#1240962 * bsc#1240963 * bsc#1240964 * bsc#1240986 * bsc#1240987 Cross-References: * CVE-2024-54551 * CVE-2025-24208 * CVE-2025-24209 * CVE-2025-24213 * CVE-2025-24216 * CVE-2025-24264 * CVE-2025-30427 CVSS scores: * CVE-2024-54551 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54551 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-54551 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-24208 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-24208 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-24208 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-24209 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-24209 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24209 ( NVD ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-24213 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-24213 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24213 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24216 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-24216 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-24216 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-24264 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-24264 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24264 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-30427 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-30427 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-30427 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP6 * Desktop Applications Module 15-SP6 * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves seven vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: * Update to version 2.48.1 * CVE-2024-54551: improper memory handling may lead to a denial-of-service when processing certain web content (bsc#1240962) * CVE-2025-24208: permissions issue may lead to a cross-site scripting attack when loading a malicious iframe (bsc#1240961) * CVE-2025-24209: buffer overflow may lead to crash when processing maliciously crafted web content (bsc#1240964) * CVE-2025-24213: type confusion issue may lead to memory corruption (bsc#1240963) * CVE-2025-24216: improper memory handling may lead to an unexpected crash when processing certain web content (bsc#1240986) * CVE-2025-24264: improper memory handling may lead to unexpected crash when processing certain web content (bsc#1240987) * CVE-2025-30427: use-after-free issue may lead to an unexpected Safari crash when processing maliciously crafted web content (bsc#1240958) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1331=1 openSUSE-SLE-15.6-2025-1331=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1331=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-1331=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-1331=1 ## Package List: * openSUSE Leap 15.6 (noarch) * WebKitGTK-6.0-lang-2.48.1-150600.12.36.5 * WebKitGTK-4.1-lang-2.48.1-150600.12.36.5 * WebKitGTK-4.0-lang-2.48.1-150600.12.36.5 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * webkit2gtk3-soup2-debugsource-2.48.1-150600.12.36.5 * webkitgtk-6_0-injected-bundles-2.48.1-150600.12.36.5 * libjavascriptcoregtk-6_0-1-2.48.1-150600.12.36.5 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150600.12.36.5 * webkit2gtk4-devel-2.48.1-150600.12.36.5 * libjavascriptcoregtk-4_1-0-2.48.1-150600.12.36.5 * typelib-1_0-JavaScriptCore-6_0-2.48.1-150600.12.36.5 * libwebkit2gtk-4_1-0-debuginfo-2.48.1-150600.12.36.5 * webkit-jsc-4.1-debuginfo-2.48.1-150600.12.36.5 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150600.12.36.5 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150600.12.36.5 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150600.12.36.5 * webkit2gtk3-debugsource-2.48.1-150600.12.36.5 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150600.12.36.5 * typelib-1_0-WebKit2-4_0-2.48.1-150600.12.36.5 * typelib-1_0-WebKitWebProcessExtension-6_0-2.48.1-150600.12.36.5 * webkit2gtk3-soup2-devel-2.48.1-150600.12.36.5 * webkit2gtk3-soup2-minibrowser-debuginfo-2.48.1-150600.12.36.5 * webkit2gtk4-minibrowser-2.48.1-150600.12.36.5 * webkit2gtk3-minibrowser-debuginfo-2.48.1-150600.12.36.5 * webkit2gtk-4_0-injected-bundles-2.48.1-150600.12.36.5 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150600.12.36.5 * typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150600.12.36.5 * webkit2gtk4-debugsource-2.48.1-150600.12.36.5 * webkit-jsc-6.0-2.48.1-150600.12.36.5 * libwebkit2gtk-4_1-0-2.48.1-150600.12.36.5 * webkit2gtk3-minibrowser-2.48.1-150600.12.36.5 * webkit-jsc-4-2.48.1-150600.12.36.5 * libjavascriptcoregtk-4_0-18-2.48.1-150600.12.36.5 * webkit-jsc-4-debuginfo-2.48.1-150600.12.36.5 * libwebkit2gtk-4_0-37-2.48.1-150600.12.36.5 * typelib-1_0-JavaScriptCore-4_1-2.48.1-150600.12.36.5 * webkit-jsc-4.1-2.48.1-150600.12.36.5 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150600.12.36.5 * libwebkitgtk-6_0-4-debuginfo-2.48.1-150600.12.36.5 * webkit-jsc-6.0-debuginfo-2.48.1-150600.12.36.5 * webkit2gtk3-devel-2.48.1-150600.12.36.5 * webkit2gtk3-soup2-minibrowser-2.48.1-150600.12.36.5 * libwebkitgtk-6_0-4-2.48.1-150600.12.36.5 * webkit2gtk4-minibrowser-debuginfo-2.48.1-150600.12.36.5 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150600.12.36.5 * webkitgtk-6_0-injected-bundles-debuginfo-2.48.1-150600.12.36.5 * typelib-1_0-WebKit2-4_1-2.48.1-150600.12.36.5 * webkit2gtk-4_1-injected-bundles-2.48.1-150600.12.36.5 * typelib-1_0-WebKit-6_0-2.48.1-150600.12.36.5 * openSUSE Leap 15.6 (x86_64) * libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.48.1-150600.12.36.5 * libwebkit2gtk-4_1-0-32bit-debuginfo-2.48.1-150600.12.36.5 * libwebkit2gtk-4_1-0-32bit-2.48.1-150600.12.36.5 * libjavascriptcoregtk-4_1-0-32bit-2.48.1-150600.12.36.5 * libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.48.1-150600.12.36.5 * libwebkit2gtk-4_0-37-32bit-2.48.1-150600.12.36.5 * libjavascriptcoregtk-4_0-18-32bit-2.48.1-150600.12.36.5 * libwebkit2gtk-4_0-37-32bit-debuginfo-2.48.1-150600.12.36.5 * openSUSE Leap 15.6 (aarch64_ilp32) * libjavascriptcoregtk-4_0-18-64bit-2.48.1-150600.12.36.5 * libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.48.1-150600.12.36.5 * libwebkit2gtk-4_1-0-64bit-debuginfo-2.48.1-150600.12.36.5 * libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.48.1-150600.12.36.5 * libwebkit2gtk-4_1-0-64bit-2.48.1-150600.12.36.5 * libwebkit2gtk-4_0-37-64bit-2.48.1-150600.12.36.5 * libjavascriptcoregtk-4_1-0-64bit-2.48.1-150600.12.36.5 * libwebkit2gtk-4_0-37-64bit-debuginfo-2.48.1-150600.12.36.5 * Basesystem Module 15-SP6 (noarch) * WebKitGTK-6.0-lang-2.48.1-150600.12.36.5 * WebKitGTK-4.0-lang-2.48.1-150600.12.36.5 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * webkit2gtk3-soup2-debugsource-2.48.1-150600.12.36.5 * libwebkitgtk-6_0-4-2.48.1-150600.12.36.5 * libjavascriptcoregtk-6_0-1-2.48.1-150600.12.36.5 * webkit2gtk4-debugsource-2.48.1-150600.12.36.5 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150600.12.36.5 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150600.12.36.5 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150600.12.36.5 * webkitgtk-6_0-injected-bundles-2.48.1-150600.12.36.5 * typelib-1_0-WebKit2-4_0-2.48.1-150600.12.36.5 * webkitgtk-6_0-injected-bundles-debuginfo-2.48.1-150600.12.36.5 * libjavascriptcoregtk-4_0-18-2.48.1-150600.12.36.5 * webkit2gtk3-soup2-devel-2.48.1-150600.12.36.5 * libwebkit2gtk-4_0-37-2.48.1-150600.12.36.5 * webkit2gtk-4_0-injected-bundles-2.48.1-150600.12.36.5 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150600.12.36.5 * libwebkitgtk-6_0-4-debuginfo-2.48.1-150600.12.36.5 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150600.12.36.5 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150600.12.36.5 * Desktop Applications Module 15-SP6 (noarch) * WebKitGTK-4.1-lang-2.48.1-150600.12.36.5 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_1-0-2.48.1-150600.12.36.5 * libwebkit2gtk-4_1-0-debuginfo-2.48.1-150600.12.36.5 * typelib-1_0-WebKit2-4_1-2.48.1-150600.12.36.5 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150600.12.36.5 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150600.12.36.5 * webkit2gtk-4_1-injected-bundles-2.48.1-150600.12.36.5 * typelib-1_0-JavaScriptCore-4_1-2.48.1-150600.12.36.5 * typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150600.12.36.5 * webkit2gtk3-debugsource-2.48.1-150600.12.36.5 * webkit2gtk3-devel-2.48.1-150600.12.36.5 * libwebkit2gtk-4_1-0-2.48.1-150600.12.36.5 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * webkit2gtk4-devel-2.48.1-150600.12.36.5 * typelib-1_0-JavaScriptCore-6_0-2.48.1-150600.12.36.5 * typelib-1_0-WebKitWebProcessExtension-6_0-2.48.1-150600.12.36.5 * typelib-1_0-WebKit-6_0-2.48.1-150600.12.36.5 * webkit2gtk4-debugsource-2.48.1-150600.12.36.5 ## References: * https://www.suse.com/security/cve/CVE-2024-54551.html * https://www.suse.com/security/cve/CVE-2025-24208.html * https://www.suse.com/security/cve/CVE-2025-24209.html * https://www.suse.com/security/cve/CVE-2025-24213.html * https://www.suse.com/security/cve/CVE-2025-24216.html * https://www.suse.com/security/cve/CVE-2025-24264.html * https://www.suse.com/security/cve/CVE-2025-30427.html * https://bugzilla.suse.com/show_bug.cgi?id=1240958 * https://bugzilla.suse.com/show_bug.cgi?id=1240961 * https://bugzilla.suse.com/show_bug.cgi?id=1240962 * https://bugzilla.suse.com/show_bug.cgi?id=1240963 * https://bugzilla.suse.com/show_bug.cgi?id=1240964 * https://bugzilla.suse.com/show_bug.cgi?id=1240986 * https://bugzilla.suse.com/show_bug.cgi?id=1240987 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 17 08:30:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 17 Apr 2025 08:30:07 -0000 Subject: SUSE-SU-2025:1334-1: moderate: Security update for pam Message-ID: <174487860723.29284.10144469845856041149@smelt2.prg2.suse.org> # Security update for pam Announcement ID: SUSE-SU-2025:1334-1 Release Date: 2025-04-17T07:03:26Z Rating: moderate References: * bsc#1232234 Cross-References: * CVE-2024-10041 CVSS scores: * CVE-2024-10041 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-10041 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2024-10041 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP6 * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for pam fixes the following issues: * CVE-2024-10041: sensitive data exposure while performing authentications. (bsc#1232234) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1334=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1334=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1334=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1334=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1334=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1334=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1334=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-1334=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1334=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1334=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1334=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * pam-extra-debuginfo-1.3.0-150000.6.76.1 * pam-debugsource-1.3.0-150000.6.76.1 * pam-extra-1.3.0-150000.6.76.1 * pam-devel-1.3.0-150000.6.76.1 * pam-1.3.0-150000.6.76.1 * pam-debuginfo-1.3.0-150000.6.76.1 * openSUSE Leap 15.6 (x86_64) * pam-devel-32bit-1.3.0-150000.6.76.1 * pam-extra-32bit-1.3.0-150000.6.76.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.76.1 * pam-32bit-1.3.0-150000.6.76.1 * pam-32bit-debuginfo-1.3.0-150000.6.76.1 * openSUSE Leap 15.6 (noarch) * pam-doc-1.3.0-150000.6.76.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * pam-1.3.0-150000.6.76.1 * pam-debuginfo-1.3.0-150000.6.76.1 * pam-debugsource-1.3.0-150000.6.76.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * pam-1.3.0-150000.6.76.1 * pam-debuginfo-1.3.0-150000.6.76.1 * pam-debugsource-1.3.0-150000.6.76.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * pam-1.3.0-150000.6.76.1 * pam-debuginfo-1.3.0-150000.6.76.1 * pam-debugsource-1.3.0-150000.6.76.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * pam-1.3.0-150000.6.76.1 * pam-debuginfo-1.3.0-150000.6.76.1 * pam-debugsource-1.3.0-150000.6.76.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * pam-1.3.0-150000.6.76.1 * pam-debuginfo-1.3.0-150000.6.76.1 * pam-debugsource-1.3.0-150000.6.76.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * pam-extra-debuginfo-1.3.0-150000.6.76.1 * pam-debugsource-1.3.0-150000.6.76.1 * pam-extra-1.3.0-150000.6.76.1 * pam-devel-1.3.0-150000.6.76.1 * pam-1.3.0-150000.6.76.1 * pam-debuginfo-1.3.0-150000.6.76.1 * Basesystem Module 15-SP6 (noarch) * pam-doc-1.3.0-150000.6.76.1 * Basesystem Module 15-SP6 (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.76.1 * pam-extra-32bit-debuginfo-1.3.0-150000.6.76.1 * pam-extra-32bit-1.3.0-150000.6.76.1 * pam-32bit-1.3.0-150000.6.76.1 * Development Tools Module 15-SP6 (x86_64) * pam-32bit-debuginfo-1.3.0-150000.6.76.1 * pam-devel-32bit-1.3.0-150000.6.76.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * pam-1.3.0-150000.6.76.1 * pam-debuginfo-1.3.0-150000.6.76.1 * pam-debugsource-1.3.0-150000.6.76.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * pam-1.3.0-150000.6.76.1 * pam-debuginfo-1.3.0-150000.6.76.1 * pam-debugsource-1.3.0-150000.6.76.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * pam-1.3.0-150000.6.76.1 * pam-debuginfo-1.3.0-150000.6.76.1 * pam-debugsource-1.3.0-150000.6.76.1 ## References: * https://www.suse.com/security/cve/CVE-2024-10041.html * https://bugzilla.suse.com/show_bug.cgi?id=1232234 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 17 08:30:14 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 17 Apr 2025 08:30:14 -0000 Subject: SUSE-SU-2025:1333-1: important: Security update for cosign Message-ID: <174487861430.29284.13918778704123000820@smelt2.prg2.suse.org> # Security update for cosign Announcement ID: SUSE-SU-2025:1333-1 Release Date: 2025-04-17T01:38:48Z Rating: important References: * bsc#1227031 * bsc#1232985 * bsc#1237682 * bsc#1238693 * bsc#1239204 * bsc#1239337 * jsc#SLE-23476 Cross-References: * CVE-2024-51744 * CVE-2024-6104 * CVE-2025-22868 * CVE-2025-22869 * CVE-2025-22870 * CVE-2025-27144 CVSS scores: * CVE-2024-51744 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-51744 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2024-51744 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-22868 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-22870 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-27144 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-27144 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27144 ( NVD ): 6.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves six vulnerabilities and contains one feature can now be installed. ## Description: This update for cosign fixes the following issues: * CVE-2024-6104: cosign: hashicorp/go-retryablehttp: Fixed sensitive information disclosure to log file (bsc#1227031) * CVE-2024-51744: cosign: github.com/golang-jwt/jwt/v4: Fixed bad documentation of error handling in ParseWithClaims leading to potentially dangerous situations (bsc#1232985) * CVE-2025-27144: cosign: github.com/go-jose/go-jose/v4,github.com/go-jose/go- jose/v3: Fixed denial of service in Go JOSE's Parsing (bsc#1237682) * CVE-2025-22870: cosign: golang.org/x/net/proxy: Fixed proxy bypass using IPv6 zone IDs (bsc#1238693) * CVE-2025-22868: cosign: golang.org/x/oauth2/jws: Fixed unexpected memory consumption during token parsing (bsc#1239204) * CVE-2025-22869: cosign: golang.org/x/crypto/ssh: Fixed denial of service in the Key Exchange (bsc#1239337) Other fixes: * Update to version 2.5.0 (jsc#SLE-23476): * Update sigstore-go to pick up bug fixes (#4150) * Update golangci-lint to v2, update golangci-lint-action (#4143) * Feat/non filename completions (#4115) * update builder to use go1.24.1 (#4116) * Add support for new bundle specification for attesting/verifying OCI image attestations (#3889) * Remove cert log line (#4113) * cmd/cosign/cli: fix typo in ignoreTLogMessage (#4111) * bump to latest scaffolding release for testing (#4099) * increase 2e2_test docker compose tiemout to 180s (#4091) * Fix replace with compliant image mediatype (#4077) * Add TSA certificate related flags and fields for cosign attest (#4079) * Update to version 2.4.3 (jsc#SLE-23476): * Enable fetching signatures without remote get. (#4047) * Bump sigstore/sigstore to support KMS plugins (#4073) * sort properly Go imports (#4071) * sync comment with parameter name in function signature (#4063) * fix go imports order to be alphabetical (#4062) * fix comment typo and imports order (#4061) * Feat/file flag completion improvements (#4028) * Udpate builder to use go1.23.6 (#4052) * Refactor verifyNewBundle into library function (#4013) * fix parsing error in --only for cosign copy (#4049) * Fix codeowners syntax, add dep-maintainers (#4046) * Update to version 2.4.2 (jsc#SLE-23476): * Updated open-policy-agent to 1.1.0 library (#4036) * Note that only Rego v0 policies are supported at this time * Add UseSignedTimestamps to CheckOpts, refactor TSA options (#4006) * Add support for verifying root checksum in cosign initialize (#3953) * Detect if user supplied a valid protobuf bundle (#3931) * Add a log message if user doesn't provide --trusted-root (#3933) * Support mTLS towards container registry (#3922) * Add bundle create helper command (#3901) * Add trusted-root create helper command (#3876) Bug Fixes: * fix: set tls config while retaining other fields from default http transport (#4007) * policy fuzzer: ignore known panics (#3993) * Fix for multiple WithRemote options (#3982) * Add nightly conformance test workflow (#3979) * Fix copy --only for signatures + update/align docs (#3904) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1333=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1333=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1333=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1333=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1333=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1333=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1333=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1333=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1333=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1333=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1333=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1333=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1333=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1333=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * cosign-2.5.0-150400.3.27.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * cosign-2.5.0-150400.3.27.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * cosign-2.5.0-150400.3.27.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * cosign-2.5.0-150400.3.27.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * cosign-2.5.0-150400.3.27.1 * SUSE Manager Proxy 4.3 (x86_64) * cosign-2.5.0-150400.3.27.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * cosign-2.5.0-150400.3.27.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * cosign-2.5.0-150400.3.27.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * cosign-2.5.0-150400.3.27.1 * cosign-debuginfo-2.5.0-150400.3.27.1 * openSUSE Leap 15.4 (noarch) * cosign-bash-completion-2.5.0-150400.3.27.1 * cosign-fish-completion-2.5.0-150400.3.27.1 * cosign-zsh-completion-2.5.0-150400.3.27.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * cosign-2.5.0-150400.3.27.1 * cosign-debuginfo-2.5.0-150400.3.27.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * cosign-2.5.0-150400.3.27.1 * cosign-debuginfo-2.5.0-150400.3.27.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * cosign-2.5.0-150400.3.27.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * cosign-2.5.0-150400.3.27.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * cosign-2.5.0-150400.3.27.1 ## References: * https://www.suse.com/security/cve/CVE-2024-51744.html * https://www.suse.com/security/cve/CVE-2024-6104.html * https://www.suse.com/security/cve/CVE-2025-22868.html * https://www.suse.com/security/cve/CVE-2025-22869.html * https://www.suse.com/security/cve/CVE-2025-22870.html * https://www.suse.com/security/cve/CVE-2025-27144.html * https://bugzilla.suse.com/show_bug.cgi?id=1227031 * https://bugzilla.suse.com/show_bug.cgi?id=1232985 * https://bugzilla.suse.com/show_bug.cgi?id=1237682 * https://bugzilla.suse.com/show_bug.cgi?id=1238693 * https://bugzilla.suse.com/show_bug.cgi?id=1239204 * https://bugzilla.suse.com/show_bug.cgi?id=1239337 * https://jira.suse.com/browse/SLE-23476 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 17 08:30:21 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 17 Apr 2025 08:30:21 -0000 Subject: SUSE-SU-2025:1332-1: important: Security update for rekor Message-ID: <174487862154.29284.12875071162446683389@smelt2.prg2.suse.org> # Security update for rekor Announcement ID: SUSE-SU-2025:1332-1 Release Date: 2025-04-17T01:37:48Z Rating: important References: * bsc#1227053 * bsc#1236519 * bsc#1237638 * bsc#1239191 * bsc#1239327 * bsc#1240468 * jsc#SLE-23476 Cross-References: * CVE-2023-45288 * CVE-2024-6104 * CVE-2025-22868 * CVE-2025-22869 * CVE-2025-27144 * CVE-2025-30204 CVSS scores: * CVE-2023-45288 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N * CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-22868 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22868 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22869 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27144 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-27144 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27144 ( NVD ): 6.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-30204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-30204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-30204 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves six vulnerabilities and contains one feature can now be installed. ## Description: This update for rekor fixes the following issues: * CVE-2023-45288: rekor: golang.org/x/net/http2: Fixed close connections when receiving too many headers (bsc#1236519) * CVE-2024-6104: rekor: hashicorp/go-retryablehttp: Fixed sensitive information disclosure inside log file (bsc#1227053) * CVE-2025-22868: rekor: golang.org/x/oauth2/jws: Fixed unexpected memory consumption during token parsing (bsc#1239191) * CVE-2025-22869: rekor: golang.org/x/crypto/ssh: Fixed denial of service in the Key Exchange (bsc#1239327) * CVE-2025-27144: rekor: gopkg.in/go-jose/go-jose.v2,github.com/go-jose/go- jose/v4,github.com/go-jose/go-jose/v3: Fixed denial of service in Go JOSE's parsing (bsc#1237638) * CVE-2025-30204: rekor: github.com/golang-jwt/jwt/v5: Fixed jwt-go allowing excessive memory allocation during header parsing (bsc#1240468) Other fixes: * Update to version 1.3.10: * Features * Added --client-signing-algorithms flag (#1974) * Fixes / Misc * emit unpopulated values when marshalling (#2438) * pkg/api: better logs when algorithm registry rejects a key (#2429) * chore: improve mysql readiness checks (#2397) * Added --client-signing-algorithms flag (#1974) * Update to version 1.3.9 (jsc#SLE-23476): * Cache checkpoint for inactive shards (#2332) * Support per-shard signing keys (#2330) * Update to version 1.3.8: * Bug Fixes * fix zizmor issues (#2298) * remove unneeded value in log message (#2282) * Quality Enhancements * chore: relax go directive to permit 1.22.x * fetch minisign from homebrew instead of custom ppa (#2329) * fix(ci): simplify GOVERSION extraction * chore(deps): bump actions pins to latest * Updates go and golangci-lint (#2302) * update builder to use go1.23.4 (#2301) * clean up spaces * log request body on 500 error to aid debugging (#2283) * Update to version 1.3.7: * New Features * log request body on 500 error to aid debugging (#2283) * Add support for signing with Tink keyset (#2228) * Add public key hash check in Signed Note verification (#2214) * update Trillian TLS configuration (#2202) * Add TLS support for Trillian server (#2164) * Replace docker-compose with plugin if available (#2153) * Add flags to backfill script (#2146) * Unset DisableKeepalive for backfill HTTP client (#2137) * Add script to delete indexes from Redis (#2120) * Run CREATE statement in backfill script (#2109) * Add MySQL support to backfill script (#2081) * Run e2e tests on mysql and redis index backends (#2079) * Bug Fixes * remove unneeded value in log message (#2282) * Add error message when computing consistency proof (#2278) * fix validation error handling on API (#2217) * fix error in pretty-printed inclusion proof from verify subcommand (#2210) * Fix index scripts (#2203) * fix failing sharding test * Better error handling in backfill script (#2148) * Batch entries in cleanup script (#2158) * Add missing workflow for index cleanup test (#2121) * hashedrekord: fix schema $id (#2092) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1332=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1332=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1332=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1332=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1332=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1332=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1332=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1332=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1332=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1332=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1332=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1332=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1332=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1332=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * rekor-debuginfo-1.3.10-150400.4.25.1 * rekor-1.3.10-150400.4.25.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * rekor-debuginfo-1.3.10-150400.4.25.1 * rekor-1.3.10-150400.4.25.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * rekor-debuginfo-1.3.10-150400.4.25.1 * rekor-1.3.10-150400.4.25.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * rekor-1.3.10-150400.4.25.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * rekor-1.3.10-150400.4.25.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * rekor-1.3.10-150400.4.25.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * rekor-1.3.10-150400.4.25.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * rekor-1.3.10-150400.4.25.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * rekor-1.3.10-150400.4.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * rekor-1.3.10-150400.4.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * rekor-1.3.10-150400.4.25.1 * SUSE Manager Proxy 4.3 (x86_64) * rekor-1.3.10-150400.4.25.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * rekor-1.3.10-150400.4.25.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * rekor-1.3.10-150400.4.25.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45288.html * https://www.suse.com/security/cve/CVE-2024-6104.html * https://www.suse.com/security/cve/CVE-2025-22868.html * https://www.suse.com/security/cve/CVE-2025-22869.html * https://www.suse.com/security/cve/CVE-2025-27144.html * https://www.suse.com/security/cve/CVE-2025-30204.html * https://bugzilla.suse.com/show_bug.cgi?id=1227053 * https://bugzilla.suse.com/show_bug.cgi?id=1236519 * https://bugzilla.suse.com/show_bug.cgi?id=1237638 * https://bugzilla.suse.com/show_bug.cgi?id=1239191 * https://bugzilla.suse.com/show_bug.cgi?id=1239327 * https://bugzilla.suse.com/show_bug.cgi?id=1240468 * https://jira.suse.com/browse/SLE-23476 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 17 12:30:03 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 17 Apr 2025 12:30:03 -0000 Subject: SUSE-SU-2025:1340-1: moderate: Security update for mozjs52 Message-ID: <174489300315.29284.851120116539079532@smelt2.prg2.suse.org> # Security update for mozjs52 Announcement ID: SUSE-SU-2025:1340-1 Release Date: 2025-04-17T11:45:56Z Rating: moderate References: * bsc#1234837 Cross-References: * CVE-2024-56431 CVSS scores: * CVE-2024-56431 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56431 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56431 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for mozjs52 fixes the following issues: * CVE-2024-56431: Fixed a negative shift in huffdec.c (bsc#1234837). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-1340=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1340=1 openSUSE-SLE-15.6-2025-1340=1 ## Package List: * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libmozjs-115-0-debuginfo-115.4.0-150600.3.9.1 * mozjs115-devel-115.4.0-150600.3.9.1 * libmozjs-115-0-115.4.0-150600.3.9.1 * mozjs115-debugsource-115.4.0-150600.3.9.1 * mozjs115-debuginfo-115.4.0-150600.3.9.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i686) * libmozjs-115-0-debuginfo-115.4.0-150600.3.9.1 * mozjs115-115.4.0-150600.3.9.1 * mozjs115-devel-115.4.0-150600.3.9.1 * libmozjs-115-0-115.4.0-150600.3.9.1 * mozjs115-debugsource-115.4.0-150600.3.9.1 * mozjs115-debuginfo-115.4.0-150600.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56431.html * https://bugzilla.suse.com/show_bug.cgi?id=1234837 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 17 12:30:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 17 Apr 2025 12:30:07 -0000 Subject: SUSE-SU-2025:1339-1: moderate: Security update for poppler Message-ID: <174489300780.29284.7965527539778200445@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2025:1339-1 Release Date: 2025-04-17T11:02:49Z Rating: moderate References: * bsc#1240880 * bsc#1240881 Cross-References: * CVE-2025-32364 * CVE-2025-32365 CVSS scores: * CVE-2025-32364 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-32364 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32364 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32365 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-32365 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32365 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2025-32364: Fixed a floating point exception. (bsc#1240880) * CVE-2025-32365: Fixed the isOk check in JBIG2Bitmap::combine function in JBIG2Stream.cc. (bsc#1240881) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1339=1 ## Package List: * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libpoppler89-debuginfo-0.79.0-150200.3.38.1 * libpoppler89-0.79.0-150200.3.38.1 * poppler-debugsource-0.79.0-150200.3.38.1 ## References: * https://www.suse.com/security/cve/CVE-2025-32364.html * https://www.suse.com/security/cve/CVE-2025-32365.html * https://bugzilla.suse.com/show_bug.cgi?id=1240880 * https://bugzilla.suse.com/show_bug.cgi?id=1240881 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 17 12:30:10 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 17 Apr 2025 12:30:10 -0000 Subject: SUSE-SU-2025:1338-1: moderate: Security update for haproxy Message-ID: <174489301014.29284.3276861540898166830@smelt2.prg2.suse.org> # Security update for haproxy Announcement ID: SUSE-SU-2025:1338-1 Release Date: 2025-04-17T11:02:36Z Rating: moderate References: * bsc#1240971 Cross-References: * CVE-2025-32464 CVSS scores: * CVE-2025-32464 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-32464 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2025-32464 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Availability Extension 15 SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for haproxy fixes the following issues: * CVE-2025-32464: Fixed heap-based buffer overflow in sample_conv_regsub. (bsc#1240971) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1338=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1338=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1338=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1338=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1338=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2025-1338=1 * SUSE Linux Enterprise High Availability Extension 15 SP5 zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2025-1338=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1338=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * haproxy-debuginfo-2.4.22+git0.f8e3218e2-150400.3.22.1 * haproxy-debugsource-2.4.22+git0.f8e3218e2-150400.3.22.1 * haproxy-2.4.22+git0.f8e3218e2-150400.3.22.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * haproxy-debuginfo-2.4.22+git0.f8e3218e2-150400.3.22.1 * haproxy-debugsource-2.4.22+git0.f8e3218e2-150400.3.22.1 * haproxy-2.4.22+git0.f8e3218e2-150400.3.22.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * haproxy-debuginfo-2.4.22+git0.f8e3218e2-150400.3.22.1 * haproxy-debugsource-2.4.22+git0.f8e3218e2-150400.3.22.1 * haproxy-2.4.22+git0.f8e3218e2-150400.3.22.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * haproxy-debuginfo-2.4.22+git0.f8e3218e2-150400.3.22.1 * haproxy-debugsource-2.4.22+git0.f8e3218e2-150400.3.22.1 * haproxy-2.4.22+git0.f8e3218e2-150400.3.22.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * haproxy-debuginfo-2.4.22+git0.f8e3218e2-150400.3.22.1 * haproxy-debugsource-2.4.22+git0.f8e3218e2-150400.3.22.1 * haproxy-2.4.22+git0.f8e3218e2-150400.3.22.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * haproxy-debuginfo-2.4.22+git0.f8e3218e2-150400.3.22.1 * haproxy-debugsource-2.4.22+git0.f8e3218e2-150400.3.22.1 * haproxy-2.4.22+git0.f8e3218e2-150400.3.22.1 * SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le s390x x86_64) * haproxy-debuginfo-2.4.22+git0.f8e3218e2-150400.3.22.1 * haproxy-debugsource-2.4.22+git0.f8e3218e2-150400.3.22.1 * haproxy-2.4.22+git0.f8e3218e2-150400.3.22.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * haproxy-debuginfo-2.4.22+git0.f8e3218e2-150400.3.22.1 * haproxy-debugsource-2.4.22+git0.f8e3218e2-150400.3.22.1 * haproxy-2.4.22+git0.f8e3218e2-150400.3.22.1 ## References: * https://www.suse.com/security/cve/CVE-2025-32464.html * https://bugzilla.suse.com/show_bug.cgi?id=1240971 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 17 12:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 17 Apr 2025 12:30:12 -0000 Subject: SUSE-SU-2025:1337-1: important: Security update for apache2-mod_auth_openidc Message-ID: <174489301263.29284.8739986790262802934@smelt2.prg2.suse.org> # Security update for apache2-mod_auth_openidc Announcement ID: SUSE-SU-2025:1337-1 Release Date: 2025-04-17T11:02:08Z Rating: important References: * bsc#1240893 Cross-References: * CVE-2025-31492 CVSS scores: * CVE-2025-31492 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-31492 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-31492 ( NVD ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for apache2-mod_auth_openidc fixes the following issues: * CVE-2025-31492: Fixed a bug where OIDCProviderAuthRequestMethod POSTs can leak protected data. (bsc#1240893) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1337=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1337=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * apache2-mod_auth_openidc-debuginfo-2.4.0-7.15.1 * apache2-mod_auth_openidc-2.4.0-7.15.1 * apache2-mod_auth_openidc-debugsource-2.4.0-7.15.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * apache2-mod_auth_openidc-debuginfo-2.4.0-7.15.1 * apache2-mod_auth_openidc-2.4.0-7.15.1 * apache2-mod_auth_openidc-debugsource-2.4.0-7.15.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31492.html * https://bugzilla.suse.com/show_bug.cgi?id=1240893 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 17 12:30:20 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 17 Apr 2025 12:30:20 -0000 Subject: SUSE-SU-2025:1336-1: important: Security update for webkit2gtk3 Message-ID: <174489302087.29284.2584058928280002318@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2025:1336-1 Release Date: 2025-04-17T11:01:57Z Rating: important References: * bsc#1240958 * bsc#1240961 * bsc#1240962 * bsc#1240963 * bsc#1240964 * bsc#1240986 * bsc#1240987 Cross-References: * CVE-2024-54551 * CVE-2025-24208 * CVE-2025-24209 * CVE-2025-24213 * CVE-2025-24216 * CVE-2025-24264 * CVE-2025-30427 CVSS scores: * CVE-2024-54551 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-54551 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2024-54551 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-24208 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-24208 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-24208 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-24209 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-24209 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24209 ( NVD ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-24213 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-24213 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24213 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24216 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-24216 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-24216 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-24264 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-24264 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-24264 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-30427 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-30427 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-30427 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves seven vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: * Update to version 2.48.1 * CVE-2024-54551: improper memory handling may lead to a denial-of-service when processing certain web content (bsc#1240962) * CVE-2025-24208: permissions issue may lead to a cross-site scripting attack when loading a malicious iframe (bsc#1240961) * CVE-2025-24209: buffer overflow may lead to crash when processing maliciously crafted web content (bsc#1240964) * CVE-2025-24213: type confusion issue may lead to memory corruption (bsc#1240963) * CVE-2025-24216: improper memory handling may lead to an unexpected crash when processing certain web content (bsc#1240986) * CVE-2025-24264: improper memory handling may lead to unexpected crash when processing certain web content (bsc#1240987) * CVE-2025-30427: use-after-free issue may lead to an unexpected Safari crash when processing maliciously crafted web content (bsc#1240958) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1336=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1336=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1336=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1336=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1336=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1336=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1336=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1336=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1336=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1336=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1336=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1336=1 ## Package List: * openSUSE Leap 15.4 (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * WebKitGTK-4.1-lang-2.48.1-150400.4.115.2 * WebKitGTK-6.0-lang-2.48.1-150400.4.115.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * typelib-1_0-WebKitWebProcessExtension-6_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * webkit-jsc-4-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * webkit-jsc-4-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * webkitgtk-6_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-minibrowser-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk4-devel-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150400.4.115.2 * webkit-jsc-4.1-2.48.1-150400.4.115.2 * webkit2gtk3-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-minibrowser-2.48.1-150400.4.115.2 * webkitgtk-6_0-injected-bundles-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * typelib-1_0-WebKit-6_0-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_1-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-6_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk4-minibrowser-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk3-devel-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-2.48.1-150400.4.115.2 * webkit-jsc-6.0-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * webkit-jsc-6.0-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk4-debugsource-2.48.1-150400.4.115.2 * webkit2gtk4-minibrowser-2.48.1-150400.4.115.2 * webkit2gtk3-minibrowser-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * webkit-jsc-4.1-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-minibrowser-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * openSUSE Leap 15.4 (x86_64) * libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-32bit-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-32bit-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-32bit-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-32bit-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-32bit-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-32bit-2.48.1-150400.4.115.2 * openSUSE Leap 15.4 (aarch64_ilp32) * libjavascriptcoregtk-4_1-0-64bit-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-64bit-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-64bit-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-64bit-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-64bit-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-64bit-2.48.1-150400.4.115.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * WebKitGTK-4.1-lang-2.48.1-150400.4.115.2 * WebKitGTK-6.0-lang-2.48.1-150400.4.115.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150400.4.115.2 * webkit2gtk3-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * webkitgtk-6_0-injected-bundles-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk3-devel-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk4-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * WebKitGTK-4.1-lang-2.48.1-150400.4.115.2 * WebKitGTK-6.0-lang-2.48.1-150400.4.115.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150400.4.115.2 * webkit2gtk3-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * webkitgtk-6_0-injected-bundles-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk3-devel-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk4-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * WebKitGTK-4.1-lang-2.48.1-150400.4.115.2 * WebKitGTK-6.0-lang-2.48.1-150400.4.115.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150400.4.115.2 * webkit2gtk3-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * webkitgtk-6_0-injected-bundles-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk3-devel-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk4-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * WebKitGTK-4.1-lang-2.48.1-150400.4.115.2 * WebKitGTK-6.0-lang-2.48.1-150400.4.115.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150400.4.115.2 * webkit2gtk3-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * webkitgtk-6_0-injected-bundles-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk3-devel-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk4-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * WebKitGTK-4.1-lang-2.48.1-150400.4.115.2 * WebKitGTK-6.0-lang-2.48.1-150400.4.115.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150400.4.115.2 * webkit2gtk3-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * webkitgtk-6_0-injected-bundles-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk3-devel-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk4-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * WebKitGTK-4.1-lang-2.48.1-150400.4.115.2 * WebKitGTK-6.0-lang-2.48.1-150400.4.115.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150400.4.115.2 * webkit2gtk3-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * webkitgtk-6_0-injected-bundles-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk3-devel-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk4-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * WebKitGTK-4.1-lang-2.48.1-150400.4.115.2 * WebKitGTK-6.0-lang-2.48.1-150400.4.115.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150400.4.115.2 * webkit2gtk3-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * webkitgtk-6_0-injected-bundles-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk3-devel-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk4-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * WebKitGTK-4.1-lang-2.48.1-150400.4.115.2 * WebKitGTK-6.0-lang-2.48.1-150400.4.115.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_1-2.48.1-150400.4.115.2 * webkit2gtk3-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * webkitgtk-6_0-injected-bundles-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-2.48.1-150400.4.115.2 * webkit2gtk-4_1-injected-bundles-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * libwebkit2gtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk3-devel-2.48.1-150400.4.115.2 * libwebkitgtk-6_0-4-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_1-0-2.48.1-150400.4.115.2 * webkit2gtk4-debugsource-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_1-2.48.1-150400.4.115.2 * libjavascriptcoregtk-6_0-1-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * SUSE Manager Proxy 4.3 (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * SUSE Manager Proxy 4.3 (x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * SUSE Manager Retail Branch Server 4.3 (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 * SUSE Manager Server 4.3 (noarch) * WebKitGTK-4.0-lang-2.48.1-150400.4.115.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * libjavascriptcoregtk-4_0-18-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2-4_0-2.48.1-150400.4.115.2 * libjavascriptcoregtk-4_0-18-debuginfo-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-2.48.1-150400.4.115.2 * typelib-1_0-WebKit2WebExtension-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-debugsource-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-debuginfo-2.48.1-150400.4.115.2 * webkit2gtk-4_0-injected-bundles-2.48.1-150400.4.115.2 * libwebkit2gtk-4_0-37-debuginfo-2.48.1-150400.4.115.2 * typelib-1_0-JavaScriptCore-4_0-2.48.1-150400.4.115.2 * webkit2gtk3-soup2-devel-2.48.1-150400.4.115.2 ## References: * https://www.suse.com/security/cve/CVE-2024-54551.html * https://www.suse.com/security/cve/CVE-2025-24208.html * https://www.suse.com/security/cve/CVE-2025-24209.html * https://www.suse.com/security/cve/CVE-2025-24213.html * https://www.suse.com/security/cve/CVE-2025-24216.html * https://www.suse.com/security/cve/CVE-2025-24264.html * https://www.suse.com/security/cve/CVE-2025-30427.html * https://bugzilla.suse.com/show_bug.cgi?id=1240958 * https://bugzilla.suse.com/show_bug.cgi?id=1240961 * https://bugzilla.suse.com/show_bug.cgi?id=1240962 * https://bugzilla.suse.com/show_bug.cgi?id=1240963 * https://bugzilla.suse.com/show_bug.cgi?id=1240964 * https://bugzilla.suse.com/show_bug.cgi?id=1240986 * https://bugzilla.suse.com/show_bug.cgi?id=1240987 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 17 16:30:05 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 17 Apr 2025 16:30:05 -0000 Subject: SUSE-SU-2025:1346-1: moderate: Security update for containerd Message-ID: <174490740575.29284.4435500219532996426@smelt2.prg2.suse.org> # Security update for containerd Announcement ID: SUSE-SU-2025:1346-1 Release Date: 2025-04-17T15:15:09Z Rating: moderate References: * bsc#1239749 Cross-References: * CVE-2024-40635 CVSS scores: * CVE-2024-40635 ( SUSE ): 4.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N * CVE-2024-40635 ( NVD ): 4.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for containerd fixes the following issues: * CVE-2024-40635: Fixed integer overflow in User ID handling (bsc#1239749) Other fixes: \- Update to containerd v1.7.27. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1346=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * containerd-ctr-1.7.27-16.100.1 * containerd-1.7.27-16.100.1 * containerd-devel-1.7.27-16.100.1 ## References: * https://www.suse.com/security/cve/CVE-2024-40635.html * https://bugzilla.suse.com/show_bug.cgi?id=1239749 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 17 16:30:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 17 Apr 2025 16:30:07 -0000 Subject: SUSE-SU-2025:1345-1: moderate: Security update for containerd Message-ID: <174490740798.29284.5856412288916751042@smelt2.prg2.suse.org> # Security update for containerd Announcement ID: SUSE-SU-2025:1345-1 Release Date: 2025-04-17T15:14:48Z Rating: moderate References: * bsc#1239749 Cross-References: * CVE-2024-40635 CVSS scores: * CVE-2024-40635 ( SUSE ): 4.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N * CVE-2024-40635 ( NVD ): 4.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N Affected Products: * Containers Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for containerd fixes the following issues: * CVE-2024-40635: Fixed integer overflow in User ID handling (bsc#1239749) Other fixes: \- Update to containerd v1.7.27. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1345=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1345=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1345=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1345=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1345=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1345=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-1345=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1345=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1345=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1345=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * containerd-devel-1.7.27-150000.123.1 * containerd-ctr-1.7.27-150000.123.1 * containerd-1.7.27-150000.123.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * containerd-1.7.27-150000.123.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * containerd-1.7.27-150000.123.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * containerd-1.7.27-150000.123.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * containerd-1.7.27-150000.123.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * containerd-1.7.27-150000.123.1 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * containerd-devel-1.7.27-150000.123.1 * containerd-ctr-1.7.27-150000.123.1 * containerd-1.7.27-150000.123.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * containerd-1.7.27-150000.123.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * containerd-1.7.27-150000.123.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * containerd-1.7.27-150000.123.1 ## References: * https://www.suse.com/security/cve/CVE-2024-40635.html * https://bugzilla.suse.com/show_bug.cgi?id=1239749 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 17 16:30:10 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 17 Apr 2025 16:30:10 -0000 Subject: SUSE-SU-2025:1344-1: moderate: Security update for docker-stable Message-ID: <174490741056.29284.13316380009886234797@smelt2.prg2.suse.org> # Security update for docker-stable Announcement ID: SUSE-SU-2025:1344-1 Release Date: 2025-04-17T15:14:06Z Rating: moderate References: * bsc#1239765 * jsc#PED-12534 * jsc#PED-8905 Cross-References: * CVE-2025-0495 CVSS scores: * CVE-2025-0495 ( SUSE ): 4.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-0495 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N * CVE-2025-0495 ( NVD ): 4.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability and contains two features can now be installed. ## Description: This update for docker-stable fixes the following issues: * CVE-2025-0495: buildx: Fixed credential leakage to telemetry endpoints when credentials allowed to be set as attribute values in cache-to/cache-from configuration (bsc#1239765) Other fixes: * Update to docker-buildx v0.22.0. * Disable transparent SUSEConnect support for SLE-16. (jsc#PED-12534) * Now that the only blocker for docker-buildx support was removed for SLE-16, enable docker-buildx for SLE-16 as well. (jsc#PED-8905) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1344=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * docker-stable-debuginfo-24.0.9_ce-1.14.1 * docker-stable-24.0.9_ce-1.14.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * docker-stable-bash-completion-24.0.9_ce-1.14.1 ## References: * https://www.suse.com/security/cve/CVE-2025-0495.html * https://bugzilla.suse.com/show_bug.cgi?id=1239765 * https://jira.suse.com/browse/PED-12534 * https://jira.suse.com/browse/PED-8905 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 17 16:30:15 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 17 Apr 2025 16:30:15 -0000 Subject: SUSE-SU-2025:1342-1: moderate: Security update for poppler Message-ID: <174490741514.29284.6360179821004119555@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2025:1342-1 Release Date: 2025-04-17T14:01:47Z Rating: moderate References: * bsc#1239939 * bsc#1240880 * bsc#1240881 Cross-References: * CVE-2025-32364 * CVE-2025-32365 CVSS scores: * CVE-2025-32364 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-32364 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32364 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32365 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-32365 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-32365 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2025-32364: Fixed a floating point exception. (bsc#1240880) * CVE-2025-32365: Fixed the isOk check in JBIG2Bitmap::combine function in JBIG2Stream.cc. (bsc#1240881) * Adding -fpie compile flag to GCC for Position Independent Executable (PIE) support (bsc#1239939). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1342=1 openSUSE-SLE-15.6-2025-1342=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1342=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1342=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * poppler-tools-24.03.0-150600.3.10.1 * libpoppler-glib8-debuginfo-24.03.0-150600.3.10.1 * libpoppler-qt5-devel-24.03.0-150600.3.10.1 * libpoppler-qt5-1-debuginfo-24.03.0-150600.3.10.1 * poppler-qt5-debugsource-24.03.0-150600.3.10.1 * poppler-qt6-debugsource-24.03.0-150600.3.10.1 * poppler-debugsource-24.03.0-150600.3.10.1 * libpoppler-qt5-1-24.03.0-150600.3.10.1 * libpoppler-qt6-devel-24.03.0-150600.3.10.1 * libpoppler-cpp0-24.03.0-150600.3.10.1 * libpoppler-cpp0-debuginfo-24.03.0-150600.3.10.1 * libpoppler-qt6-3-24.03.0-150600.3.10.1 * poppler-tools-debuginfo-24.03.0-150600.3.10.1 * libpoppler-glib8-24.03.0-150600.3.10.1 * libpoppler-glib-devel-24.03.0-150600.3.10.1 * libpoppler-devel-24.03.0-150600.3.10.1 * libpoppler-qt6-3-debuginfo-24.03.0-150600.3.10.1 * libpoppler135-24.03.0-150600.3.10.1 * libpoppler135-debuginfo-24.03.0-150600.3.10.1 * typelib-1_0-Poppler-0_18-24.03.0-150600.3.10.1 * openSUSE Leap 15.6 (x86_64) * libpoppler-glib8-32bit-24.03.0-150600.3.10.1 * libpoppler-cpp0-32bit-debuginfo-24.03.0-150600.3.10.1 * libpoppler-cpp0-32bit-24.03.0-150600.3.10.1 * libpoppler135-32bit-24.03.0-150600.3.10.1 * libpoppler135-32bit-debuginfo-24.03.0-150600.3.10.1 * libpoppler-qt5-1-32bit-debuginfo-24.03.0-150600.3.10.1 * libpoppler-qt5-1-32bit-24.03.0-150600.3.10.1 * libpoppler-glib8-32bit-debuginfo-24.03.0-150600.3.10.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libpoppler135-64bit-debuginfo-24.03.0-150600.3.10.1 * libpoppler-qt5-1-64bit-debuginfo-24.03.0-150600.3.10.1 * libpoppler135-64bit-24.03.0-150600.3.10.1 * libpoppler-cpp0-64bit-24.03.0-150600.3.10.1 * libpoppler-cpp0-64bit-debuginfo-24.03.0-150600.3.10.1 * libpoppler-glib8-64bit-debuginfo-24.03.0-150600.3.10.1 * libpoppler-qt5-1-64bit-24.03.0-150600.3.10.1 * libpoppler-glib8-64bit-24.03.0-150600.3.10.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * poppler-tools-24.03.0-150600.3.10.1 * libpoppler-glib8-debuginfo-24.03.0-150600.3.10.1 * poppler-debugsource-24.03.0-150600.3.10.1 * libpoppler-cpp0-24.03.0-150600.3.10.1 * libpoppler-cpp0-debuginfo-24.03.0-150600.3.10.1 * poppler-tools-debuginfo-24.03.0-150600.3.10.1 * libpoppler-glib8-24.03.0-150600.3.10.1 * libpoppler-glib-devel-24.03.0-150600.3.10.1 * libpoppler-devel-24.03.0-150600.3.10.1 * libpoppler135-24.03.0-150600.3.10.1 * libpoppler135-debuginfo-24.03.0-150600.3.10.1 * typelib-1_0-Poppler-0_18-24.03.0-150600.3.10.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * poppler-qt5-debugsource-24.03.0-150600.3.10.1 * libpoppler-qt5-devel-24.03.0-150600.3.10.1 * libpoppler-qt5-1-debuginfo-24.03.0-150600.3.10.1 * libpoppler-qt5-1-24.03.0-150600.3.10.1 * libpoppler-qt6-devel-24.03.0-150600.3.10.1 * libpoppler-cpp0-24.03.0-150600.3.10.1 * libpoppler-cpp0-debuginfo-24.03.0-150600.3.10.1 * libpoppler-qt6-3-24.03.0-150600.3.10.1 * libpoppler-devel-24.03.0-150600.3.10.1 * libpoppler-qt6-3-debuginfo-24.03.0-150600.3.10.1 * poppler-qt6-debugsource-24.03.0-150600.3.10.1 * poppler-debugsource-24.03.0-150600.3.10.1 * SUSE Package Hub 15 15-SP6 (x86_64) * libpoppler135-32bit-24.03.0-150600.3.10.1 * libpoppler-glib8-32bit-24.03.0-150600.3.10.1 * libpoppler-glib8-32bit-debuginfo-24.03.0-150600.3.10.1 * libpoppler135-32bit-debuginfo-24.03.0-150600.3.10.1 ## References: * https://www.suse.com/security/cve/CVE-2025-32364.html * https://www.suse.com/security/cve/CVE-2025-32365.html * https://bugzilla.suse.com/show_bug.cgi?id=1239939 * https://bugzilla.suse.com/show_bug.cgi?id=1240880 * https://bugzilla.suse.com/show_bug.cgi?id=1240881 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 17 16:30:18 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 17 Apr 2025 16:30:18 -0000 Subject: SUSE-SU-2025:1341-1: moderate: Security update for docker Message-ID: <174490741854.29284.16734166054972422102@smelt2.prg2.suse.org> # Security update for docker Announcement ID: SUSE-SU-2025:1341-1 Release Date: 2025-04-17T14:01:24Z Rating: moderate References: * bsc#1239765 * jsc#PED-12534 * jsc#PED-8905 Cross-References: * CVE-2025-0495 CVSS scores: * CVE-2025-0495 ( SUSE ): 4.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-0495 ( SUSE ): 5.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N * CVE-2025-0495 ( NVD ): 4.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability and contains two features can now be installed. ## Description: This update for docker fixes the following issues: * Update to docker-buildx v0.22.0 * CVE-2025-0495: Fixed an integer overflow in User ID handling in containerd. (bsc#1239765) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1341=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * docker-27.5.1_ce-98.129.1 * docker-debuginfo-27.5.1_ce-98.129.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * docker-bash-completion-27.5.1_ce-98.129.1 ## References: * https://www.suse.com/security/cve/CVE-2025-0495.html * https://bugzilla.suse.com/show_bug.cgi?id=1239765 * https://jira.suse.com/browse/PED-12534 * https://jira.suse.com/browse/PED-8905 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Apr 18 12:30:05 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 18 Apr 2025 12:30:05 -0000 Subject: SUSE-SU-2025:1349-1: moderate: Security update for GraphicsMagick Message-ID: <174497940508.29196.3582426877105823089@smelt2.prg2.suse.org> # Security update for GraphicsMagick Announcement ID: SUSE-SU-2025:1349-1 Release Date: 2025-04-18T10:06:22Z Rating: moderate References: * bsc#1241150 Cross-References: * CVE-2025-32460 CVSS scores: * CVE-2025-32460 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-32460 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-32460 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves one vulnerability can now be installed. ## Description: This update for GraphicsMagick fixes the following issues: * CVE-2025-32460: Fixed a heap-based buffer over-read in ReadJXLImage. (bsc#1241150) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1349=1 openSUSE-SLE-15.6-2025-1349=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1349=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libGraphicsMagick-Q16-3-1.3.42-150600.3.7.1 * GraphicsMagick-debuginfo-1.3.42-150600.3.7.1 * libGraphicsMagick-Q16-3-debuginfo-1.3.42-150600.3.7.1 * GraphicsMagick-1.3.42-150600.3.7.1 * perl-GraphicsMagick-1.3.42-150600.3.7.1 * GraphicsMagick-debugsource-1.3.42-150600.3.7.1 * perl-GraphicsMagick-debuginfo-1.3.42-150600.3.7.1 * libGraphicsMagick3-config-1.3.42-150600.3.7.1 * libGraphicsMagickWand-Q16-2-1.3.42-150600.3.7.1 * GraphicsMagick-devel-1.3.42-150600.3.7.1 * libGraphicsMagick++-devel-1.3.42-150600.3.7.1 * libGraphicsMagick++-Q16-12-debuginfo-1.3.42-150600.3.7.1 * libGraphicsMagickWand-Q16-2-debuginfo-1.3.42-150600.3.7.1 * libGraphicsMagick++-Q16-12-1.3.42-150600.3.7.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * libGraphicsMagick-Q16-3-1.3.42-150600.3.7.1 * GraphicsMagick-debuginfo-1.3.42-150600.3.7.1 * libGraphicsMagick-Q16-3-debuginfo-1.3.42-150600.3.7.1 * GraphicsMagick-1.3.42-150600.3.7.1 * perl-GraphicsMagick-1.3.42-150600.3.7.1 * GraphicsMagick-debugsource-1.3.42-150600.3.7.1 * perl-GraphicsMagick-debuginfo-1.3.42-150600.3.7.1 * libGraphicsMagick3-config-1.3.42-150600.3.7.1 * libGraphicsMagickWand-Q16-2-1.3.42-150600.3.7.1 * GraphicsMagick-devel-1.3.42-150600.3.7.1 * libGraphicsMagick++-devel-1.3.42-150600.3.7.1 * libGraphicsMagick++-Q16-12-debuginfo-1.3.42-150600.3.7.1 * libGraphicsMagickWand-Q16-2-debuginfo-1.3.42-150600.3.7.1 * libGraphicsMagick++-Q16-12-1.3.42-150600.3.7.1 ## References: * https://www.suse.com/security/cve/CVE-2025-32460.html * https://bugzilla.suse.com/show_bug.cgi?id=1241150 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 22 12:30:02 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 22 Apr 2025 12:30:02 -0000 Subject: SUSE-SU-2025:1359-1: moderate: Security update for govulncheck-vulndb Message-ID: <174532500218.5631.12656252721064354165@smelt2.prg2.suse.org> # Security update for govulncheck-vulndb Announcement ID: SUSE-SU-2025:1359-1 Release Date: 2025-04-22T10:49:22Z Rating: moderate References: * jsc#PED-11136 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that contains one feature can now be installed. ## Description: This update for govulncheck-vulndb fixes the following issues: * Update to version 0.0.20250416T165455 2025-04-16T16:54:55Z. (jsc#PED-11136): * GO-2025-3595 * Update to version 0.0.20250410T162706 2025-04-10T16:27:06Z. (jsc#PED-11136): * GO-2025-3601 * GO-2025-3602 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1359=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1359=1 ## Package List: * openSUSE Leap 15.6 (noarch) * govulncheck-vulndb-0.0.20250416T165455-150000.1.60.1 * SUSE Package Hub 15 15-SP6 (noarch) * govulncheck-vulndb-0.0.20250416T165455-150000.1.60.1 ## References: * https://jira.suse.com/browse/PED-11136 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 22 12:30:05 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 22 Apr 2025 12:30:05 -0000 Subject: SUSE-SU-2025:1357-1: critical: Security update for erlang Message-ID: <174532500503.5631.3148380355594736978@smelt2.prg2.suse.org> # Security update for erlang Announcement ID: SUSE-SU-2025:1357-1 Release Date: 2025-04-22T09:30:46Z Rating: critical References: * bsc#1241300 Cross-References: * CVE-2025-32433 CVSS scores: * CVE-2025-32433 ( SUSE ): 10.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-32433 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-32433 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for erlang fixes the following issues: * CVE-2025-32433: Fixed unauthenticated remote code execution in Erlang/OTP SSH (bsc#1241300) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1357=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1357=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-1357=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1357=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1357=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1357=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1357=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1357=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1357=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1357=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1357=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1357=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1357=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1357=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1357=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1357=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1357=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1357=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * erlang-diameter-23.3.4.19-150300.3.20.1 * erlang-observer-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-wx-23.3.4.19-150300.3.20.1 * erlang-dialyzer-src-23.3.4.19-150300.3.20.1 * erlang-doc-23.3.4.19-150300.3.20.1 * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debugger-23.3.4.19-150300.3.20.1 * erlang-wx-src-23.3.4.19-150300.3.20.1 * erlang-jinterface-src-23.3.4.19-150300.3.20.1 * erlang-dialyzer-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * erlang-reltool-23.3.4.19-150300.3.20.1 * erlang-wx-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-src-23.3.4.19-150300.3.20.1 * erlang-observer-src-23.3.4.19-150300.3.20.1 * erlang-reltool-src-23.3.4.19-150300.3.20.1 * erlang-diameter-src-23.3.4.19-150300.3.20.1 * erlang-et-src-23.3.4.19-150300.3.20.1 * erlang-dialyzer-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debugger-src-23.3.4.19-150300.3.20.1 * erlang-jinterface-23.3.4.19-150300.3.20.1 * erlang-et-23.3.4.19-150300.3.20.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * erlang-diameter-23.3.4.19-150300.3.20.1 * erlang-observer-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-wx-23.3.4.19-150300.3.20.1 * erlang-dialyzer-src-23.3.4.19-150300.3.20.1 * erlang-doc-23.3.4.19-150300.3.20.1 * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debugger-23.3.4.19-150300.3.20.1 * erlang-wx-src-23.3.4.19-150300.3.20.1 * erlang-jinterface-src-23.3.4.19-150300.3.20.1 * erlang-dialyzer-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * erlang-reltool-23.3.4.19-150300.3.20.1 * erlang-wx-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-src-23.3.4.19-150300.3.20.1 * erlang-observer-src-23.3.4.19-150300.3.20.1 * erlang-reltool-src-23.3.4.19-150300.3.20.1 * erlang-diameter-src-23.3.4.19-150300.3.20.1 * erlang-et-src-23.3.4.19-150300.3.20.1 * erlang-dialyzer-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debugger-src-23.3.4.19-150300.3.20.1 * erlang-jinterface-23.3.4.19-150300.3.20.1 * erlang-et-23.3.4.19-150300.3.20.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Manager Proxy 4.3 (x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * erlang-debugsource-23.3.4.19-150300.3.20.1 * erlang-epmd-debuginfo-23.3.4.19-150300.3.20.1 * erlang-debuginfo-23.3.4.19-150300.3.20.1 * erlang-epmd-23.3.4.19-150300.3.20.1 * erlang-23.3.4.19-150300.3.20.1 ## References: * https://www.suse.com/security/cve/CVE-2025-32433.html * https://bugzilla.suse.com/show_bug.cgi?id=1241300 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 22 12:30:10 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 22 Apr 2025 12:30:10 -0000 Subject: SUSE-SU-2025:1356-1: critical: Security update for erlang26 Message-ID: <174532501014.5631.3351057162812240081@smelt2.prg2.suse.org> # Security update for erlang26 Announcement ID: SUSE-SU-2025:1356-1 Release Date: 2025-04-22T09:29:33Z Rating: critical References: * bsc#1240390 * bsc#1241300 Cross-References: * CVE-2025-30211 * CVE-2025-32433 CVSS scores: * CVE-2025-30211 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-30211 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-30211 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-32433 ( SUSE ): 10.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-32433 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-32433 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for erlang26 fixes the following issues: * CVE-2025-30211: Fixed KEX init error results with excessive memory usage (bsc#1240390) * CVE-2025-32433: Fixed unauthenticated remote code execution in Erlang/OTP SSH (bsc#1241300) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1356=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-1356=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1356=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * erlang26-debugger-26.2.1-150300.7.11.1 * erlang26-jinterface-26.2.1-150300.7.11.1 * erlang26-diameter-src-26.2.1-150300.7.11.1 * erlang26-src-26.2.1-150300.7.11.1 * erlang26-diameter-26.2.1-150300.7.11.1 * erlang26-jinterface-src-26.2.1-150300.7.11.1 * erlang26-doc-26.2.1-150300.7.11.1 * erlang26-reltool-src-26.2.1-150300.7.11.1 * erlang26-dialyzer-debuginfo-26.2.1-150300.7.11.1 * erlang26-epmd-debuginfo-26.2.1-150300.7.11.1 * erlang26-dialyzer-26.2.1-150300.7.11.1 * erlang26-observer-26.2.1-150300.7.11.1 * erlang26-debuginfo-26.2.1-150300.7.11.1 * erlang26-dialyzer-src-26.2.1-150300.7.11.1 * erlang26-wx-debuginfo-26.2.1-150300.7.11.1 * erlang26-debugger-src-26.2.1-150300.7.11.1 * erlang26-debugsource-26.2.1-150300.7.11.1 * erlang26-et-26.2.1-150300.7.11.1 * erlang26-et-src-26.2.1-150300.7.11.1 * erlang26-26.2.1-150300.7.11.1 * erlang26-wx-26.2.1-150300.7.11.1 * erlang26-epmd-26.2.1-150300.7.11.1 * erlang26-wx-src-26.2.1-150300.7.11.1 * erlang26-observer-src-26.2.1-150300.7.11.1 * erlang26-reltool-26.2.1-150300.7.11.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * erlang26-debugsource-26.2.1-150300.7.11.1 * erlang26-26.2.1-150300.7.11.1 * erlang26-epmd-26.2.1-150300.7.11.1 * erlang26-epmd-debuginfo-26.2.1-150300.7.11.1 * erlang26-debuginfo-26.2.1-150300.7.11.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * erlang26-debugger-26.2.1-150300.7.11.1 * erlang26-jinterface-26.2.1-150300.7.11.1 * erlang26-diameter-src-26.2.1-150300.7.11.1 * erlang26-src-26.2.1-150300.7.11.1 * erlang26-diameter-26.2.1-150300.7.11.1 * erlang26-jinterface-src-26.2.1-150300.7.11.1 * erlang26-doc-26.2.1-150300.7.11.1 * erlang26-reltool-src-26.2.1-150300.7.11.1 * erlang26-dialyzer-debuginfo-26.2.1-150300.7.11.1 * erlang26-epmd-debuginfo-26.2.1-150300.7.11.1 * erlang26-dialyzer-26.2.1-150300.7.11.1 * erlang26-observer-26.2.1-150300.7.11.1 * erlang26-debuginfo-26.2.1-150300.7.11.1 * erlang26-dialyzer-src-26.2.1-150300.7.11.1 * erlang26-wx-debuginfo-26.2.1-150300.7.11.1 * erlang26-debugger-src-26.2.1-150300.7.11.1 * erlang26-debugsource-26.2.1-150300.7.11.1 * erlang26-et-26.2.1-150300.7.11.1 * erlang26-et-src-26.2.1-150300.7.11.1 * erlang26-26.2.1-150300.7.11.1 * erlang26-wx-26.2.1-150300.7.11.1 * erlang26-epmd-26.2.1-150300.7.11.1 * erlang26-wx-src-26.2.1-150300.7.11.1 * erlang26-observer-src-26.2.1-150300.7.11.1 * erlang26-reltool-26.2.1-150300.7.11.1 ## References: * https://www.suse.com/security/cve/CVE-2025-30211.html * https://www.suse.com/security/cve/CVE-2025-32433.html * https://bugzilla.suse.com/show_bug.cgi?id=1240390 * https://bugzilla.suse.com/show_bug.cgi?id=1241300 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 24 16:30:03 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 24 Apr 2025 16:30:03 -0000 Subject: SUSE-SU-2025:1367-1: moderate: Security update for glib2 Message-ID: <174551220352.15914.4602590086085076596@smelt2.prg2.suse.org> # Security update for glib2 Announcement ID: SUSE-SU-2025:1367-1 Release Date: 2025-04-24T14:38:56Z Rating: moderate References: * bsc#1240897 Cross-References: * CVE-2025-3360 CVSS scores: * CVE-2025-3360 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-3360 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-3360 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for glib2 fixes the following issues: * CVE-2025-3360: Fixed integer overflow and buffer underread when parsing a very long and invalid ISO 8601 timestamp with g_date_time_new_from_iso8601() (bsc#1240897) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-1367=1 openSUSE-SLE-15.6-2025-1367=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1367=1 ## Package List: * openSUSE Leap 15.6 (noarch) * gio-branding-upstream-2.78.6-150600.4.11.1 * glib2-lang-2.78.6-150600.4.11.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libgmodule-2_0-0-2.78.6-150600.4.11.1 * glib2-devel-debuginfo-2.78.6-150600.4.11.1 * libgio-2_0-0-2.78.6-150600.4.11.1 * glib2-debugsource-2.78.6-150600.4.11.1 * glib2-tools-debuginfo-2.78.6-150600.4.11.1 * libgthread-2_0-0-debuginfo-2.78.6-150600.4.11.1 * glib2-tests-devel-debuginfo-2.78.6-150600.4.11.1 * libgmodule-2_0-0-debuginfo-2.78.6-150600.4.11.1 * libglib-2_0-0-debuginfo-2.78.6-150600.4.11.1 * glib2-devel-static-2.78.6-150600.4.11.1 * glib2-devel-2.78.6-150600.4.11.1 * libgio-2_0-0-debuginfo-2.78.6-150600.4.11.1 * libgobject-2_0-0-debuginfo-2.78.6-150600.4.11.1 * libgthread-2_0-0-2.78.6-150600.4.11.1 * libgobject-2_0-0-2.78.6-150600.4.11.1 * glib2-tests-devel-2.78.6-150600.4.11.1 * glib2-tools-2.78.6-150600.4.11.1 * libglib-2_0-0-2.78.6-150600.4.11.1 * glib2-doc-2.78.6-150600.4.11.1 * openSUSE Leap 15.6 (x86_64) * glib2-devel-32bit-2.78.6-150600.4.11.1 * glib2-tools-32bit-2.78.6-150600.4.11.1 * libglib-2_0-0-32bit-debuginfo-2.78.6-150600.4.11.1 * libgio-2_0-0-32bit-debuginfo-2.78.6-150600.4.11.1 * libgthread-2_0-0-32bit-2.78.6-150600.4.11.1 * glib2-tools-32bit-debuginfo-2.78.6-150600.4.11.1 * libglib-2_0-0-32bit-2.78.6-150600.4.11.1 * libgthread-2_0-0-32bit-debuginfo-2.78.6-150600.4.11.1 * libgmodule-2_0-0-32bit-debuginfo-2.78.6-150600.4.11.1 * libgobject-2_0-0-32bit-2.78.6-150600.4.11.1 * libgmodule-2_0-0-32bit-2.78.6-150600.4.11.1 * libgobject-2_0-0-32bit-debuginfo-2.78.6-150600.4.11.1 * libgio-2_0-0-32bit-2.78.6-150600.4.11.1 * glib2-devel-32bit-debuginfo-2.78.6-150600.4.11.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libgobject-2_0-0-64bit-debuginfo-2.78.6-150600.4.11.1 * libgthread-2_0-0-64bit-debuginfo-2.78.6-150600.4.11.1 * glib2-devel-64bit-2.78.6-150600.4.11.1 * libgmodule-2_0-0-64bit-2.78.6-150600.4.11.1 * glib2-devel-64bit-debuginfo-2.78.6-150600.4.11.1 * glib2-tools-64bit-2.78.6-150600.4.11.1 * libgmodule-2_0-0-64bit-debuginfo-2.78.6-150600.4.11.1 * libgobject-2_0-0-64bit-2.78.6-150600.4.11.1 * libglib-2_0-0-64bit-debuginfo-2.78.6-150600.4.11.1 * libgio-2_0-0-64bit-2.78.6-150600.4.11.1 * libglib-2_0-0-64bit-2.78.6-150600.4.11.1 * libgio-2_0-0-64bit-debuginfo-2.78.6-150600.4.11.1 * libgthread-2_0-0-64bit-2.78.6-150600.4.11.1 * glib2-tools-64bit-debuginfo-2.78.6-150600.4.11.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libgmodule-2_0-0-2.78.6-150600.4.11.1 * glib2-devel-debuginfo-2.78.6-150600.4.11.1 * libgio-2_0-0-2.78.6-150600.4.11.1 * glib2-debugsource-2.78.6-150600.4.11.1 * glib2-tools-debuginfo-2.78.6-150600.4.11.1 * libgthread-2_0-0-debuginfo-2.78.6-150600.4.11.1 * libgmodule-2_0-0-debuginfo-2.78.6-150600.4.11.1 * libglib-2_0-0-debuginfo-2.78.6-150600.4.11.1 * glib2-devel-2.78.6-150600.4.11.1 * libgio-2_0-0-debuginfo-2.78.6-150600.4.11.1 * libgthread-2_0-0-2.78.6-150600.4.11.1 * libgobject-2_0-0-2.78.6-150600.4.11.1 * glib2-tools-2.78.6-150600.4.11.1 * libgobject-2_0-0-debuginfo-2.78.6-150600.4.11.1 * libglib-2_0-0-2.78.6-150600.4.11.1 * Basesystem Module 15-SP6 (noarch) * glib2-lang-2.78.6-150600.4.11.1 * Basesystem Module 15-SP6 (x86_64) * libglib-2_0-0-32bit-debuginfo-2.78.6-150600.4.11.1 * libgio-2_0-0-32bit-debuginfo-2.78.6-150600.4.11.1 * libglib-2_0-0-32bit-2.78.6-150600.4.11.1 * libgmodule-2_0-0-32bit-debuginfo-2.78.6-150600.4.11.1 * libgobject-2_0-0-32bit-2.78.6-150600.4.11.1 * libgmodule-2_0-0-32bit-2.78.6-150600.4.11.1 * libgobject-2_0-0-32bit-debuginfo-2.78.6-150600.4.11.1 * libgio-2_0-0-32bit-2.78.6-150600.4.11.1 ## References: * https://www.suse.com/security/cve/CVE-2025-3360.html * https://bugzilla.suse.com/show_bug.cgi?id=1240897 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 24 16:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 24 Apr 2025 16:30:06 -0000 Subject: SUSE-SU-2025:1366-1: important: Security update for MozillaThunderbird Message-ID: <174551220698.15914.11276304472511925842@smelt2.prg2.suse.org> # Security update for MozillaThunderbird Announcement ID: SUSE-SU-2025:1366-1 Release Date: 2025-04-24T12:42:13Z Rating: important References: * bsc#1241277 Cross-References: * CVE-2025-2830 * CVE-2025-3522 * CVE-2025-3523 CVSS scores: * CVE-2025-2830 ( SUSE ): 4.6 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-2830 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N * CVE-2025-2830 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-3522 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-3522 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N * CVE-2025-3522 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-3523 ( SUSE ): 6.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-3523 ( SUSE ): 6.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L * CVE-2025-3523 ( NVD ): 6.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Package Hub 15 15-SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for MozillaThunderbird fixes the following issues: * Mozilla Thunderbird 128.9.2 (bsc#1241277) * CVE-2025-3522: Leak of hashed Window credentials via crafted attachment URL * CVE-2025-2830: Information Disclosure of /tmp directory listing * CVE-2025-3523: User Interface (UI) Misrepresentation of attachment URL ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1366=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1366=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-1366=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-debuginfo-128.9.2-150200.8.209.1 * MozillaThunderbird-translations-common-128.9.2-150200.8.209.1 * MozillaThunderbird-translations-other-128.9.2-150200.8.209.1 * MozillaThunderbird-debugsource-128.9.2-150200.8.209.1 * MozillaThunderbird-128.9.2-150200.8.209.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x) * MozillaThunderbird-debuginfo-128.9.2-150200.8.209.1 * MozillaThunderbird-translations-common-128.9.2-150200.8.209.1 * MozillaThunderbird-translations-other-128.9.2-150200.8.209.1 * MozillaThunderbird-debugsource-128.9.2-150200.8.209.1 * MozillaThunderbird-128.9.2-150200.8.209.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * MozillaThunderbird-debuginfo-128.9.2-150200.8.209.1 * MozillaThunderbird-translations-common-128.9.2-150200.8.209.1 * MozillaThunderbird-translations-other-128.9.2-150200.8.209.1 * MozillaThunderbird-debugsource-128.9.2-150200.8.209.1 * MozillaThunderbird-128.9.2-150200.8.209.1 ## References: * https://www.suse.com/security/cve/CVE-2025-2830.html * https://www.suse.com/security/cve/CVE-2025-3522.html * https://www.suse.com/security/cve/CVE-2025-3523.html * https://bugzilla.suse.com/show_bug.cgi?id=1241277 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 24 16:30:10 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 24 Apr 2025 16:30:10 -0000 Subject: SUSE-SU-2025:1365-1: moderate: Security update for mozjs60 Message-ID: <174551221082.15914.6002917203769913562@smelt2.prg2.suse.org> # Security update for mozjs60 Announcement ID: SUSE-SU-2025:1365-1 Release Date: 2025-04-24T12:07:43Z Rating: moderate References: * bsc#1234837 Cross-References: * CVE-2024-56431 CVSS scores: * CVE-2024-56431 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56431 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56431 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * Desktop Applications Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for mozjs60 fixes the following issues: * CVE-2024-56431: Fixed a negative shift in huffdec.c (bsc#1234837). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1365=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1365=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1365=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1365=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1365=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1365=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-1365=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1365=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1365=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1365=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libmozjs-60-debuginfo-60.9.0-150200.6.3.1 * mozjs60-60.9.0-150200.6.3.1 * mozjs60-debuginfo-60.9.0-150200.6.3.1 * mozjs60-devel-60.9.0-150200.6.3.1 * libmozjs-60-60.9.0-150200.6.3.1 * mozjs60-debugsource-60.9.0-150200.6.3.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libmozjs-60-debuginfo-60.9.0-150200.6.3.1 * mozjs60-debuginfo-60.9.0-150200.6.3.1 * mozjs60-debugsource-60.9.0-150200.6.3.1 * libmozjs-60-60.9.0-150200.6.3.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libmozjs-60-debuginfo-60.9.0-150200.6.3.1 * mozjs60-debuginfo-60.9.0-150200.6.3.1 * mozjs60-debugsource-60.9.0-150200.6.3.1 * libmozjs-60-60.9.0-150200.6.3.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libmozjs-60-debuginfo-60.9.0-150200.6.3.1 * mozjs60-debuginfo-60.9.0-150200.6.3.1 * mozjs60-debugsource-60.9.0-150200.6.3.1 * libmozjs-60-60.9.0-150200.6.3.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libmozjs-60-debuginfo-60.9.0-150200.6.3.1 * mozjs60-debuginfo-60.9.0-150200.6.3.1 * mozjs60-debugsource-60.9.0-150200.6.3.1 * libmozjs-60-60.9.0-150200.6.3.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libmozjs-60-debuginfo-60.9.0-150200.6.3.1 * mozjs60-debuginfo-60.9.0-150200.6.3.1 * mozjs60-debugsource-60.9.0-150200.6.3.1 * libmozjs-60-60.9.0-150200.6.3.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * mozjs60-debuginfo-60.9.0-150200.6.3.1 * mozjs60-devel-60.9.0-150200.6.3.1 * mozjs60-debugsource-60.9.0-150200.6.3.1 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * libmozjs-60-debuginfo-60.9.0-150200.6.3.1 * mozjs60-debuginfo-60.9.0-150200.6.3.1 * mozjs60-debugsource-60.9.0-150200.6.3.1 * libmozjs-60-60.9.0-150200.6.3.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libmozjs-60-debuginfo-60.9.0-150200.6.3.1 * mozjs60-debuginfo-60.9.0-150200.6.3.1 * mozjs60-debugsource-60.9.0-150200.6.3.1 * libmozjs-60-60.9.0-150200.6.3.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libmozjs-60-debuginfo-60.9.0-150200.6.3.1 * mozjs60-debuginfo-60.9.0-150200.6.3.1 * mozjs60-debugsource-60.9.0-150200.6.3.1 * libmozjs-60-60.9.0-150200.6.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56431.html * https://bugzilla.suse.com/show_bug.cgi?id=1234837 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Apr 24 20:30:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Thu, 24 Apr 2025 20:30:07 -0000 Subject: SUSE-SU-2025:1369-1: important: Security update for ruby2.5 Message-ID: <174552660767.26189.1303946734775562672@smelt2.prg2.suse.org> # Security update for ruby2.5 Announcement ID: SUSE-SU-2025:1369-1 Release Date: 2025-04-24T17:12:13Z Rating: important References: * bsc#1230930 * bsc#1235773 * bsc#1237804 * bsc#1237806 Cross-References: * CVE-2024-47220 * CVE-2025-27219 * CVE-2025-27220 CVSS scores: * CVE-2024-47220 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-47220 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N * CVE-2024-47220 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-27219 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-27219 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-27219 ( NVD ): 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L * CVE-2025-27219 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-27220 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-27220 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-27220 ( NVD ): 4.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L * CVE-2025-27220 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves three vulnerabilities and has one security fix can now be installed. ## Description: This update for ruby2.5 fixes the following issues: * CVE-2025-27219: Fixed denial of service in CGI::Cookie.parse (bsc#1237804) * CVE-2025-27220: Fixed ReDoS in CGI::Util#escapeElement (bsc#1237806) Other fixes: \- Improved fix for CVE-2024-47220 (bsc#1230930, bsc#1235773) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1369=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-1369=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1369=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1369=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1369=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1369=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1369=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-1369=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1369=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1369=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-1369=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1369=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1369=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1369=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1369=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-1369=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1369=1 ## Package List: * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Manager Proxy 4.3 (x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-doc-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * openSUSE Leap 15.6 (noarch) * ruby2.5-doc-ri-2.5.9-150000.4.41.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * ruby2.5-devel-extra-2.5.9-150000.4.41.1 * ruby2.5-stdlib-2.5.9-150000.4.41.1 * ruby2.5-stdlib-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-debuginfo-2.5.9-150000.4.41.1 * libruby2_5-2_5-2.5.9-150000.4.41.1 * ruby2.5-debugsource-2.5.9-150000.4.41.1 * ruby2.5-debuginfo-2.5.9-150000.4.41.1 * ruby2.5-devel-2.5.9-150000.4.41.1 * ruby2.5-2.5.9-150000.4.41.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47220.html * https://www.suse.com/security/cve/CVE-2025-27219.html * https://www.suse.com/security/cve/CVE-2025-27220.html * https://bugzilla.suse.com/show_bug.cgi?id=1230930 * https://bugzilla.suse.com/show_bug.cgi?id=1235773 * https://bugzilla.suse.com/show_bug.cgi?id=1237804 * https://bugzilla.suse.com/show_bug.cgi?id=1237806 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Apr 25 12:30:12 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 25 Apr 2025 12:30:12 -0000 Subject: SUSE-SU-2025:1370-1: important: Security update for govulncheck-vulndb Message-ID: <174558421246.26189.14924017613501846167@smelt2.prg2.suse.org> # Security update for govulncheck-vulndb Announcement ID: SUSE-SU-2025:1370-1 Release Date: 2025-04-25T08:23:32Z Rating: important References: * jsc#PED-11136 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Package Hub 15 15-SP6 An update that contains one feature can now be installed. ## Description: This update for govulncheck-vulndb fixes the following issues: * Update to version 0.0.20250422T181640 2025-04-22T18:16:40Z (jsc#PED-11136) * GO-2025-3603 * GO-2025-3604 * GO-2025-3607 * GO-2025-3608 * GO-2025-3609 * GO-2025-3610 * GO-2025-3611 * GO-2025-3612 * GO-2025-3615 * GO-2025-3618 * GO-2025-3619 * GO-2025-3620 * GO-2025-3621 * GO-2025-3622 * GO-2025-3623 * GO-2025-3625 * GO-2025-3627 * GO-2025-3630 * GO-2025-3631 * GO-2025-3632 * GO-2025-3633 * GO-2025-3634 * GO-2025-3635 * GO-2025-3636 * GO-2025-3637 * Update to version 0.0.20250422T152923 (jsc#PED-11136) * GO-2025-3600 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1370=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-1370=1 ## Package List: * openSUSE Leap 15.6 (noarch) * govulncheck-vulndb-0.0.20250422T181640-150000.1.65.1 * SUSE Package Hub 15 15-SP6 (noarch) * govulncheck-vulndb-0.0.20250422T181640-150000.1.65.1 ## References: * https://jira.suse.com/browse/PED-11136 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Apr 25 16:30:09 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Fri, 25 Apr 2025 16:30:09 -0000 Subject: SUSE-SU-2025:1374-1: low: Security update for runc Message-ID: <174559860966.23999.14597979894171961902@smelt2.prg2.suse.org> # Security update for runc Announcement ID: SUSE-SU-2025:1374-1 Release Date: 2025-04-25T12:39:30Z Rating: low References: * bsc#1230092 Cross-References: * CVE-2024-45310 CVSS scores: * CVE-2024-45310 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N * CVE-2024-45310 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for runc fixes the following issues: * CVE-2024-45310: Fixed unintentional creation of empty files/directories on host (bsc#1230092) Other fixes: * Update to runc v1.2.6. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1374=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1374=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * runc-1.2.6-16.60.2 * runc-debuginfo-1.2.6-16.60.2 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * runc-1.2.6-16.60.2 * runc-debuginfo-1.2.6-16.60.2 ## References: * https://www.suse.com/security/cve/CVE-2024-45310.html * https://bugzilla.suse.com/show_bug.cgi?id=1230092 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 28 08:30:04 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 28 Apr 2025 08:30:04 -0000 Subject: SUSE-SU-2025:1381-1: moderate: Security update for cifs-utils Message-ID: <174582900439.25998.557685061213554040@smelt2.prg2.suse.org> # Security update for cifs-utils Announcement ID: SUSE-SU-2025:1381-1 Release Date: 2025-04-28T07:37:21Z Rating: moderate References: * bsc#1239680 Cross-References: * CVE-2025-2312 CVSS scores: * CVE-2025-2312 ( SUSE ): 6.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-2312 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-2312 ( NVD ): 5.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for cifs-utils fixes the following issues: * CVE-2025-2312: Fixed cifs.upcall making an upcall to the wrong namespace in containerized environments while trying to get Kerberos credentials (bsc#1239680) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1381=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-1381=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1381=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1381=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1381=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1381=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1381=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-1381=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * pam_cifscreds-debuginfo-6.15-150400.3.12.1 * cifs-utils-debuginfo-6.15-150400.3.12.1 * cifs-utils-devel-6.15-150400.3.12.1 * cifs-utils-debugsource-6.15-150400.3.12.1 * cifs-utils-6.15-150400.3.12.1 * pam_cifscreds-6.15-150400.3.12.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * pam_cifscreds-debuginfo-6.15-150400.3.12.1 * cifs-utils-debuginfo-6.15-150400.3.12.1 * cifs-utils-devel-6.15-150400.3.12.1 * cifs-utils-debugsource-6.15-150400.3.12.1 * cifs-utils-6.15-150400.3.12.1 * pam_cifscreds-6.15-150400.3.12.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * cifs-utils-debuginfo-6.15-150400.3.12.1 * cifs-utils-debugsource-6.15-150400.3.12.1 * cifs-utils-6.15-150400.3.12.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * cifs-utils-debuginfo-6.15-150400.3.12.1 * cifs-utils-debugsource-6.15-150400.3.12.1 * cifs-utils-6.15-150400.3.12.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * cifs-utils-debuginfo-6.15-150400.3.12.1 * cifs-utils-debugsource-6.15-150400.3.12.1 * cifs-utils-6.15-150400.3.12.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * cifs-utils-debuginfo-6.15-150400.3.12.1 * cifs-utils-debugsource-6.15-150400.3.12.1 * cifs-utils-6.15-150400.3.12.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * cifs-utils-debuginfo-6.15-150400.3.12.1 * cifs-utils-debugsource-6.15-150400.3.12.1 * cifs-utils-6.15-150400.3.12.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * cifs-utils-devel-6.15-150400.3.12.1 * cifs-utils-debuginfo-6.15-150400.3.12.1 * cifs-utils-debugsource-6.15-150400.3.12.1 * cifs-utils-6.15-150400.3.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-2312.html * https://bugzilla.suse.com/show_bug.cgi?id=1239680 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 28 08:30:07 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 28 Apr 2025 08:30:07 -0000 Subject: SUSE-SU-2025:1380-1: moderate: Security update for libraw Message-ID: <174582900785.25998.8044891085010434256@smelt2.prg2.suse.org> # Security update for libraw Announcement ID: SUSE-SU-2025:1380-1 Release Date: 2025-04-28T07:36:42Z Rating: moderate References: * bsc#1241584 * bsc#1241585 Cross-References: * CVE-2015-3885 * CVE-2015-8367 * CVE-2025-43962 * CVE-2025-43964 CVSS scores: * CVE-2015-8367 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-43962 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-43962 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-43962 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-43964 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-43964 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-43964 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves four vulnerabilities can now be installed. ## Description: This update for libraw fixes the following issues: * CVE-2025-43962: Fixed out-of-bounds read when tag 0x412 processing in phase_one_correct function (bsc#1241585) * CVE-2025-43964: Fixed tag 0x412 processing in phase_one_correct does not enforce minimum w0 and w1 values (bsc#1241584) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1380=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libraw-devel-static-0.15.4-45.1 * libraw-devel-0.15.4-45.1 ## References: * https://www.suse.com/security/cve/CVE-2015-3885.html * https://www.suse.com/security/cve/CVE-2015-8367.html * https://www.suse.com/security/cve/CVE-2025-43962.html * https://www.suse.com/security/cve/CVE-2025-43964.html * https://bugzilla.suse.com/show_bug.cgi?id=1241584 * https://bugzilla.suse.com/show_bug.cgi?id=1241585 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 28 16:30:04 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 28 Apr 2025 16:30:04 -0000 Subject: SUSE-SU-2025:1392-1: important: Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP6) Message-ID: <174585780469.25998.16698250666983410207@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 7 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:1392-1 Release Date: 2025-04-28T13:41:00Z Rating: important References: * bsc#1235431 Cross-References: * CVE-2024-56650 CVSS scores: * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_23 fixes one issue. The following security issue was fixed: * CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1392=1 SUSE-SLE- Module-Live-Patching-15-SP6-2025-1388=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_10_23-rt-debuginfo-5-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_7-debugsource-5-150600.2.1 * kernel-livepatch-6_4_0-150600_10_20-rt-debuginfo-5-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_6-debugsource-5-150600.2.1 * kernel-livepatch-6_4_0-150600_10_23-rt-5-150600.2.1 * kernel-livepatch-6_4_0-150600_10_20-rt-5-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56650.html * https://bugzilla.suse.com/show_bug.cgi?id=1235431 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 28 16:30:10 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 28 Apr 2025 16:30:10 -0000 Subject: SUSE-SU-2025:1387-1: important: Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6) Message-ID: <174585781016.25998.2691086403335348986@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 5 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:1387-1 Release Date: 2025-04-28T13:10:56Z Rating: important References: * bsc#1233677 * bsc#1235008 * bsc#1235431 Cross-References: * CVE-2024-53082 * CVE-2024-53237 * CVE-2024-56650 CVSS scores: * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_17 fixes several issues. The following security issues were fixed: * CVE-2024-53237: Bluetooth: fix use-after-free in device_for_each_child() (bsc#1235008). * CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233677). * CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1387=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-6_4_0-150600_10_17-rt-debuginfo-7-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_5-debugsource-7-150600.2.1 * kernel-livepatch-6_4_0-150600_10_17-rt-7-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://bugzilla.suse.com/show_bug.cgi?id=1233677 * https://bugzilla.suse.com/show_bug.cgi?id=1235008 * https://bugzilla.suse.com/show_bug.cgi?id=1235431 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Apr 28 16:30:14 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Mon, 28 Apr 2025 16:30:14 -0000 Subject: SUSE-SU-2025:1385-1: important: Security update for the Linux Kernel RT (Live Patch 4 for SLE 15 SP6) Message-ID: <174585781431.25998.5484613803009160960@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 4 for SLE 15 SP6) Announcement ID: SUSE-SU-2025:1385-1 Release Date: 2025-04-28T13:40:56Z Rating: important References: * bsc#1233677 * bsc#1235008 * bsc#1235431 * bsc#1240840 Cross-References: * CVE-2024-53082 * CVE-2024-53237 * CVE-2024-56650 * CVE-2024-8805 CVSS scores: * CVE-2024-53082 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53082 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53237 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53237 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53237 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 6.4.0-150600_10_14 fixes several issues. The following security issues were fixed: * CVE-2024-53237: Bluetooth: fix use-after-free in device_for_each_child() (bsc#1235008). * CVE-2024-53082: virtio_net: Add hash_key_length check (bsc#1233677). * CVE-2024-8805: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (bsc#1240840). * CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-1385=1 SUSE-SLE- Module-Live-Patching-15-SP6-2025-1389=1 SUSE-SLE-Module-Live- Patching-15-SP6-2025-1390=1 SUSE-SLE-Module-Live-Patching-15-SP6-2025-1391=1 SUSE-SLE-Module-Live-Patching-15-SP6-2025-1386=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP6 (x86_64) * kernel-livepatch-SLE15-SP6-RT_Update_1-debugsource-13-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_0-debugsource-14-150600.3.1 * kernel-livepatch-6_4_0-150600_10_8-rt-debuginfo-9-150600.2.1 * kernel-livepatch-6_4_0-150600_10_11-rt-debuginfo-9-150600.2.1 * kernel-livepatch-6_4_0-150600_10_5-rt-debuginfo-13-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_2-debugsource-9-150600.2.1 * kernel-livepatch-6_4_0-150600_10_11-rt-9-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_3-debugsource-9-150600.2.1 * kernel-livepatch-6_4_0-150600_8-rt-14-150600.3.1 * kernel-livepatch-6_4_0-150600_10_14-rt-debuginfo-8-150600.2.1 * kernel-livepatch-SLE15-SP6-RT_Update_4-debugsource-8-150600.2.1 * kernel-livepatch-6_4_0-150600_10_8-rt-9-150600.2.1 * kernel-livepatch-6_4_0-150600_8-rt-debuginfo-14-150600.3.1 * kernel-livepatch-6_4_0-150600_10_5-rt-13-150600.2.1 * kernel-livepatch-6_4_0-150600_10_14-rt-8-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-53082.html * https://www.suse.com/security/cve/CVE-2024-53237.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://bugzilla.suse.com/show_bug.cgi?id=1233677 * https://bugzilla.suse.com/show_bug.cgi?id=1235008 * https://bugzilla.suse.com/show_bug.cgi?id=1235431 * https://bugzilla.suse.com/show_bug.cgi?id=1240840 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 29 16:30:19 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 29 Apr 2025 16:30:19 -0000 Subject: SUSE-SU-2025:1399-1: important: Security update for java-11-openjdk Message-ID: <174594421937.26189.7459267638222112465@smelt2.prg2.suse.org> # Security update for java-11-openjdk Announcement ID: SUSE-SU-2025:1399-1 Release Date: 2025-04-29T13:35:11Z Rating: important References: * bsc#1241274 * bsc#1241275 * bsc#1241276 Cross-References: * CVE-2025-21587 * CVE-2025-30691 * CVE-2025-30698 CVSS scores: * CVE-2025-21587 ( SUSE ): 9.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-21587 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-21587 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-30691 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-30691 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-30691 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-30698 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-30698 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-30698 ( NVD ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for java-11-openjdk fixes the following issues: Upgrade to upstream tag jdk-11.0.27+6 (April 2025 CPU) CVEs: * CVE-2025-21587: Fixed JSSE unauthorized access, deletion or modification of critical data (bsc#1241274) * CVE-2025-30691: Fixed Oracle Java SE Compiler Unauthorized Data Access (bsc#1241275) * CVE-2025-30698: Fixed Oracle Java 2D unauthorized data access and DoS (bsc#1241276) Changes: + JDK-8195675: Call to insertText with single character from custom Input Method ignored + JDK-8202926: Test java/awt/Focus/ /WindowUpdateFocusabilityTest/ /WindowUpdateFocusabilityTest.html fails + JDK-8216539: tools/jar/modularJar/Basic.java timed out + JDK-8268364: jmethod clearing should be done during unloading + JDK-8273914: Indy string concat changes order of operations + JDK-8294316: SA core file support is broken on macosx-x64 starting with macOS 12.x + JDK-8306408: Fix the format of several tables in building.md + JDK-8309841: Jarsigner should print a warning if an entry is removed + JDK-8312049: runtime/logging/ClassLoadUnloadTest can be improved + JDK-8320916: jdk/jfr/event/gc/stacktrace/ /TestParallelMarkSweepAllocationPendingStackTrace.java failed with "OutOfMemoryError: GC overhead limit exceeded" + JDK-8327650: Test java/nio/channels/DatagramChannel/ /StressNativeSignal.java timed out + JDK-8328242: Add a log area to the PassFailJFrame + JDK-8331863: DUIterator_Fast used before it is constructed + JDK-8336012: Fix usages of jtreg-reserved properties + JDK-8337494: Clarify JarInputStream behavior + JDK-8337692: Better TLS connection support + JDK-8338430: Improve compiler transformations + JDK-8339560: Unaddressed comments during code review of JDK-8337664 + JDK-8339810: Clean up the code in sun.tools.jar.Main to properly close resources and use ZipFile during extract + JDK-8339931: Update problem list for WindowUpdateFocusabilityTest.java + JDK-8340387: Update OS detection code to recognize Windows Server 2025 + JDK-8341424: GHA: Collect hs_errs from build time failures + JDK-8342562: Enhance Deflater operations + JDK-8342704: GHA: Report truncation is broken after JDK-8341424 + JDK-8343007: Enhance Buffered Image handling + JDK-8343474: [updates] Customize README.md to specifics of update project + JDK-8343599: Kmem limit and max values swapped when printing container information + JDK-8343786: [11u] GHA: Bump macOS and Xcode versions to macos-13 and XCode 14.3.1 + JDK-8344589: Update IANA Language Subtag Registry to Version 2024-11-19 + JDK-8345509: Bump update version of OpenJDK: 11.0.27 + JDK-8346587: Distrust TLS server certificates anchored by Camerfirma Root CAs + JDK-8347427: JTabbedPane/8134116/Bug8134116.java has no license header + JDK-8347847: Enhance jar file support + JDK-8347965: (tz) Update Timezone Data to 2025a + JDK-8349603: [21u, 17u, 11u] Update GHA JDKs after Jan/25 updates + JDK-8352097: (tz) zone.tab update missed in 2025a backport + JDK-8354087: [11u] Remove designator DEFAULT_PROMOTED_VERSION_PRE=ea for release 11.0.27 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1399=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1399=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * java-11-openjdk-headless-11.0.27.0-3.87.1 * java-11-openjdk-demo-11.0.27.0-3.87.1 * java-11-openjdk-devel-11.0.27.0-3.87.1 * java-11-openjdk-11.0.27.0-3.87.1 * java-11-openjdk-debuginfo-11.0.27.0-3.87.1 * java-11-openjdk-debugsource-11.0.27.0-3.87.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * java-11-openjdk-headless-11.0.27.0-3.87.1 * java-11-openjdk-demo-11.0.27.0-3.87.1 * java-11-openjdk-devel-11.0.27.0-3.87.1 * java-11-openjdk-11.0.27.0-3.87.1 * java-11-openjdk-debuginfo-11.0.27.0-3.87.1 * java-11-openjdk-debugsource-11.0.27.0-3.87.1 ## References: * https://www.suse.com/security/cve/CVE-2025-21587.html * https://www.suse.com/security/cve/CVE-2025-30691.html * https://www.suse.com/security/cve/CVE-2025-30698.html * https://bugzilla.suse.com/show_bug.cgi?id=1241274 * https://bugzilla.suse.com/show_bug.cgi?id=1241275 * https://bugzilla.suse.com/show_bug.cgi?id=1241276 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Apr 29 20:30:10 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Tue, 29 Apr 2025 20:30:10 -0000 Subject: SUSE-SU-2025:1402-1: important: Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5) Message-ID: <174595861001.14487.4847511545545153616@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 60 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:1402-1 Release Date: 2025-04-29T19:10:57Z Rating: important References: * bsc#1235431 * bsc#1240840 Cross-References: * CVE-2024-56650 * CVE-2024-8805 CVSS scores: * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_228 fixes several issues. The following security issues were fixed: * CVE-2024-8805: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (bsc#1240840). * CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1402=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_228-default-8-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56650.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://bugzilla.suse.com/show_bug.cgi?id=1235431 * https://bugzilla.suse.com/show_bug.cgi?id=1240840 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 30 08:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 30 Apr 2025 08:30:06 -0000 Subject: SUSE-SU-2025:1408-1: important: Security update for the Linux Kernel (Live Patch 64 for SLE 12 SP5) Message-ID: <174600180638.25998.4759110856107112737@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 64 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:1408-1 Release Date: 2025-04-29T23:17:49Z Rating: important References: * bsc#1235431 Cross-References: * CVE-2024-56650 CVSS scores: * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_244 fixes one issue. The following security issue was fixed: * CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1408=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_244-default-3-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56650.html * https://bugzilla.suse.com/show_bug.cgi?id=1235431 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 30 08:30:11 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 30 Apr 2025 08:30:11 -0000 Subject: SUSE-SU-2025:1403-1: important: Security update for the Linux Kernel (Live Patch 63 for SLE 12 SP5) Message-ID: <174600181143.25998.17382908028050035930@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 63 for SLE 12 SP5) Announcement ID: SUSE-SU-2025:1403-1 Release Date: 2025-04-30T00:41:04Z Rating: important References: * bsc#1235431 * bsc#1240840 Cross-References: * CVE-2024-56650 * CVE-2024-8805 CVSS scores: * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 4.12.14-122_237 fixes several issues. The following security issues were fixed: * CVE-2024-8805: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (bsc#1240840). * CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1403=1 SUSE-SLE-Live- Patching-12-SP5-2025-1409=1 SUSE-SLE-Live-Patching-12-SP5-2025-1410=1 SUSE-SLE- Live-Patching-12-SP5-2025-1404=1 SUSE-SLE-Live-Patching-12-SP5-2025-1405=1 SUSE- SLE-Live-Patching-12-SP5-2025-1406=1 SUSE-SLE-Live-Patching-12-SP5-2025-1407=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_222-default-10-2.1 * kgraft-patch-4_12_14-122_234-default-7-2.1 * kgraft-patch-4_12_14-122_231-default-7-2.1 * kgraft-patch-4_12_14-122_216-default-15-2.1 * kgraft-patch-4_12_14-122_237-default-3-2.1 * kgraft-patch-4_12_14-122_219-default-12-2.1 * kgraft-patch-4_12_14-122_225-default-9-2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56650.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://bugzilla.suse.com/show_bug.cgi?id=1235431 * https://bugzilla.suse.com/show_bug.cgi?id=1240840 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 30 08:30:17 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 30 Apr 2025 08:30:17 -0000 Subject: SUSE-SU-2025:1414-1: important: Security update for MozillaFirefox Message-ID: <174600181722.25998.12969984671778100199@smelt2.prg2.suse.org> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2025:1414-1 Release Date: 2025-04-30T06:59:28Z Rating: important References: * bsc#1241621 Cross-References: * CVE-2025-2817 CVSS scores: * CVE-2025-2817 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-2817 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-2817 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: * Firefox Extended Support Release 128.10.0 ESR MFSA 2025-29 (bsc#1241621): * CVE-2025-2817: Potential privilege escalation in Firefox Updater * MFSA-RESERVE-2025-193709: WebGL shader attribute memory corruption in Firefox for macOS * MFSA-RESERVE-2025-1958350: Process isolation bypass using `javascript:` URI links in cross-origin frames * MFSA-RESERVE-2025-1949994: Potential local code execution in "copy as cURL" command * MFSA-RESERVE-2025-1952465: Unsafe attribute access during XPath parsing * MFSA-RESERVE-2025-3: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10 * MFSA-RESERVE-2025-7: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1414=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1414=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debugsource-128.10.0-112.255.1 * MozillaFirefox-128.10.0-112.255.1 * MozillaFirefox-translations-common-128.10.0-112.255.1 * MozillaFirefox-debuginfo-128.10.0-112.255.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * MozillaFirefox-devel-128.10.0-112.255.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * MozillaFirefox-debugsource-128.10.0-112.255.1 * MozillaFirefox-128.10.0-112.255.1 * MozillaFirefox-translations-common-128.10.0-112.255.1 * MozillaFirefox-debuginfo-128.10.0-112.255.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * MozillaFirefox-devel-128.10.0-112.255.1 ## References: * https://www.suse.com/security/cve/CVE-2025-2817.html * https://bugzilla.suse.com/show_bug.cgi?id=1241621 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 30 08:30:19 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 30 Apr 2025 08:30:19 -0000 Subject: SUSE-SU-2025:1413-1: low: Security update for augeas Message-ID: <174600181955.25998.18050354787314757587@smelt2.prg2.suse.org> # Security update for augeas Announcement ID: SUSE-SU-2025:1413-1 Release Date: 2025-04-30T06:59:13Z Rating: low References: * bsc#1239909 Cross-References: * CVE-2025-2588 CVSS scores: * CVE-2025-2588 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-2588 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-2588 ( NVD ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-2588 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-2588 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that solves one vulnerability can now be installed. ## Description: This update for augeas fixes the following issues: * CVE-2025-2588: Check for NULL pointers when calling re_case_expand in function fa_expand_nocase. (bsc#1239909) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1413=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1413=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-1413=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1413=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1413=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1413=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * augeas-debuginfo-1.12.0-150400.3.8.1 * libaugeas0-debuginfo-1.12.0-150400.3.8.1 * augeas-debugsource-1.12.0-150400.3.8.1 * libaugeas0-1.12.0-150400.3.8.1 * augeas-1.12.0-150400.3.8.1 * augeas-lenses-1.12.0-150400.3.8.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * augeas-debuginfo-1.12.0-150400.3.8.1 * libaugeas0-debuginfo-1.12.0-150400.3.8.1 * augeas-debugsource-1.12.0-150400.3.8.1 * libaugeas0-1.12.0-150400.3.8.1 * augeas-1.12.0-150400.3.8.1 * augeas-lenses-1.12.0-150400.3.8.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * augeas-debuginfo-1.12.0-150400.3.8.1 * libaugeas0-debuginfo-1.12.0-150400.3.8.1 * augeas-debugsource-1.12.0-150400.3.8.1 * libaugeas0-1.12.0-150400.3.8.1 * augeas-1.12.0-150400.3.8.1 * augeas-lenses-1.12.0-150400.3.8.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * augeas-devel-1.12.0-150400.3.8.1 * augeas-debuginfo-1.12.0-150400.3.8.1 * libaugeas0-debuginfo-1.12.0-150400.3.8.1 * augeas-debugsource-1.12.0-150400.3.8.1 * augeas-lense-tests-1.12.0-150400.3.8.1 * libaugeas0-1.12.0-150400.3.8.1 * augeas-1.12.0-150400.3.8.1 * augeas-lenses-1.12.0-150400.3.8.1 * openSUSE Leap 15.4 (x86_64) * augeas-devel-32bit-1.12.0-150400.3.8.1 * libaugeas0-32bit-debuginfo-1.12.0-150400.3.8.1 * libaugeas0-32bit-1.12.0-150400.3.8.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libaugeas0-64bit-debuginfo-1.12.0-150400.3.8.1 * libaugeas0-64bit-1.12.0-150400.3.8.1 * augeas-devel-64bit-1.12.0-150400.3.8.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * augeas-debuginfo-1.12.0-150400.3.8.1 * libaugeas0-debuginfo-1.12.0-150400.3.8.1 * augeas-debugsource-1.12.0-150400.3.8.1 * libaugeas0-1.12.0-150400.3.8.1 * augeas-1.12.0-150400.3.8.1 * augeas-lenses-1.12.0-150400.3.8.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * augeas-debuginfo-1.12.0-150400.3.8.1 * libaugeas0-debuginfo-1.12.0-150400.3.8.1 * augeas-debugsource-1.12.0-150400.3.8.1 * libaugeas0-1.12.0-150400.3.8.1 * augeas-1.12.0-150400.3.8.1 * augeas-lenses-1.12.0-150400.3.8.1 ## References: * https://www.suse.com/security/cve/CVE-2025-2588.html * https://bugzilla.suse.com/show_bug.cgi?id=1239909 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 30 12:30:06 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 30 Apr 2025 12:30:06 -0000 Subject: SUSE-SU-2025:1416-1: important: Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP3) Message-ID: <174601620683.25998.13532587883938482150@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 50 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:1416-1 Release Date: 2025-04-30T09:10:35Z Rating: important References: * bsc#1233294 * bsc#1235431 Cross-References: * CVE-2024-50205 * CVE-2024-56650 CVSS scores: * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves two vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_182 fixes several issues. The following security issues were fixed: * CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233294). * CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1416=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1416=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_182-default-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_182-default-debuginfo-6-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_50-debugsource-6-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_182-preempt-6-150300.2.1 * kernel-livepatch-5_3_18-150300_59_182-preempt-debuginfo-6-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_182-default-6-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://bugzilla.suse.com/show_bug.cgi?id=1233294 * https://bugzilla.suse.com/show_bug.cgi?id=1235431 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 30 16:30:04 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 30 Apr 2025 16:30:04 -0000 Subject: SUSE-SU-2025:1418-1: important: Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3) Message-ID: <174603060453.26033.15866746263464901268@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:1418-1 Release Date: 2025-04-30T12:09:47Z Rating: important References: * bsc#1235431 Cross-References: * CVE-2024-56650 CVSS scores: * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves one vulnerability can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_188 fixes one issue. The following security issue was fixed: * CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1418=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1418=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP3_Update_52-debugsource-4-150300.2.1 * kernel-livepatch-5_3_18-150300_59_188-default-debuginfo-4-150300.2.1 * kernel-livepatch-5_3_18-150300_59_188-default-4-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_188-preempt-debuginfo-4-150300.2.1 * kernel-livepatch-5_3_18-150300_59_188-preempt-4-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_188-default-4-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2024-56650.html * https://bugzilla.suse.com/show_bug.cgi?id=1235431 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 30 16:30:11 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 30 Apr 2025 16:30:11 -0000 Subject: SUSE-SU-2025:1420-1: important: Security update for redis Message-ID: <174603061101.26033.4540623244773717301@smelt2.prg2.suse.org> # Security update for redis Announcement ID: SUSE-SU-2025:1420-1 Release Date: 2025-04-30T12:55:41Z Rating: important References: * bsc#1241708 Cross-References: * CVE-2025-21605 CVSS scores: * CVE-2025-21605 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21605 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21605 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for redis fixes the following issues: * CVE-2025-21605: Fixed an output buffer denial of service. (bsc#1241708) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1420=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1420=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1420=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1420=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1420=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1420=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1420=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1420=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1420=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1420=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1420=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1420=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * redis-debugsource-6.2.6-150400.3.34.1 * redis-debuginfo-6.2.6-150400.3.34.1 * redis-6.2.6-150400.3.34.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * redis-debugsource-6.2.6-150400.3.34.1 * redis-debuginfo-6.2.6-150400.3.34.1 * redis-6.2.6-150400.3.34.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * redis-debugsource-6.2.6-150400.3.34.1 * redis-debuginfo-6.2.6-150400.3.34.1 * redis-6.2.6-150400.3.34.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * redis-debugsource-6.2.6-150400.3.34.1 * redis-debuginfo-6.2.6-150400.3.34.1 * redis-6.2.6-150400.3.34.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * redis-debugsource-6.2.6-150400.3.34.1 * redis-debuginfo-6.2.6-150400.3.34.1 * redis-6.2.6-150400.3.34.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * redis-debugsource-6.2.6-150400.3.34.1 * redis-debuginfo-6.2.6-150400.3.34.1 * redis-6.2.6-150400.3.34.1 * SUSE Manager Proxy 4.3 (x86_64) * redis-debugsource-6.2.6-150400.3.34.1 * redis-debuginfo-6.2.6-150400.3.34.1 * redis-6.2.6-150400.3.34.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * redis-debugsource-6.2.6-150400.3.34.1 * redis-debuginfo-6.2.6-150400.3.34.1 * redis-6.2.6-150400.3.34.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * redis-debugsource-6.2.6-150400.3.34.1 * redis-debuginfo-6.2.6-150400.3.34.1 * redis-6.2.6-150400.3.34.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * redis-debugsource-6.2.6-150400.3.34.1 * redis-debuginfo-6.2.6-150400.3.34.1 * redis-6.2.6-150400.3.34.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * redis-debugsource-6.2.6-150400.3.34.1 * redis-debuginfo-6.2.6-150400.3.34.1 * redis-6.2.6-150400.3.34.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * redis-debugsource-6.2.6-150400.3.34.1 * redis-debuginfo-6.2.6-150400.3.34.1 * redis-6.2.6-150400.3.34.1 ## References: * https://www.suse.com/security/cve/CVE-2025-21605.html * https://bugzilla.suse.com/show_bug.cgi?id=1241708 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 30 16:30:14 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 30 Apr 2025 16:30:14 -0000 Subject: SUSE-SU-2025:1419-1: important: Security update for redis Message-ID: <174603061453.26033.10554957310528001584@smelt2.prg2.suse.org> # Security update for redis Announcement ID: SUSE-SU-2025:1419-1 Release Date: 2025-04-30T12:55:00Z Rating: important References: * bsc#1241708 Cross-References: * CVE-2025-21605 CVSS scores: * CVE-2025-21605 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21605 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21605 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for redis fixes the following issues: * CVE-2025-21605: Fixed an output buffer denial of service. (bsc#1241708) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-1419=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1419=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1419=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1419=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1419=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * redis7-debuginfo-7.0.8-150500.3.18.1 * redis7-debugsource-7.0.8-150500.3.18.1 * redis7-7.0.8-150500.3.18.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * redis7-debuginfo-7.0.8-150500.3.18.1 * redis7-debugsource-7.0.8-150500.3.18.1 * redis7-7.0.8-150500.3.18.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * redis7-debuginfo-7.0.8-150500.3.18.1 * redis7-debugsource-7.0.8-150500.3.18.1 * redis7-7.0.8-150500.3.18.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * redis7-debuginfo-7.0.8-150500.3.18.1 * redis7-debugsource-7.0.8-150500.3.18.1 * redis7-7.0.8-150500.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * redis7-debuginfo-7.0.8-150500.3.18.1 * redis7-debugsource-7.0.8-150500.3.18.1 * redis7-7.0.8-150500.3.18.1 ## References: * https://www.suse.com/security/cve/CVE-2025-21605.html * https://bugzilla.suse.com/show_bug.cgi?id=1241708 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Apr 30 20:30:08 2025 From: null at suse.de (SLE-SECURITY-UPDATES) Date: Wed, 30 Apr 2025 20:30:08 -0000 Subject: SUSE-SU-2025:1422-1: important: Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) Message-ID: <174604500831.6692.4351942085272066107@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3) Announcement ID: SUSE-SU-2025:1422-1 Release Date: 2025-04-30T19:10:00Z Rating: important References: * bsc#1227753 * bsc#1233294 * bsc#1235431 * bsc#1240840 Cross-References: * CVE-2023-52885 * CVE-2024-50205 * CVE-2024-56650 * CVE-2024-8805 CVSS scores: * CVE-2023-52885 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52885 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50205 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-50205 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-50205 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56650 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that solves four vulnerabilities can now be installed. ## Description: This update for the Linux Kernel 5.3.18-150300_59_161 fixes several issues. The following security issues were fixed: * CVE-2024-8805: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (bsc#1240840). * CVE-2023-52885: SUNRPC: Fix UAF in svc_tcp_listen_data_ready() (bsc#1227753). * CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233294). * CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-1422=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-1422=1 ## Package List: * openSUSE Leap 15.3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_161-default-debuginfo-16-150300.2.1 * kernel-livepatch-SLE15-SP3_Update_44-debugsource-16-150300.2.1 * kernel-livepatch-5_3_18-150300_59_161-default-16-150300.2.1 * openSUSE Leap 15.3 (x86_64) * kernel-livepatch-5_3_18-150300_59_161-preempt-debuginfo-16-150300.2.1 * kernel-livepatch-5_3_18-150300_59_161-preempt-16-150300.2.1 * SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64) * kernel-livepatch-5_3_18-150300_59_161-default-16-150300.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-52885.html * https://www.suse.com/security/cve/CVE-2024-50205.html * https://www.suse.com/security/cve/CVE-2024-56650.html * https://www.suse.com/security/cve/CVE-2024-8805.html * https://bugzilla.suse.com/show_bug.cgi?id=1227753 * https://bugzilla.suse.com/show_bug.cgi?id=1233294 * https://bugzilla.suse.com/show_bug.cgi?id=1235431 * https://bugzilla.suse.com/show_bug.cgi?id=1240840 -------------- next part -------------- An HTML attachment was scrubbed... URL: