SUSE-SU-2025:1293-1: important: Security update for the Linux Kernel
SLE-SECURITY-UPDATES
null at suse.de
Wed Apr 16 08:33:25 UTC 2025
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2025:1293-1
Release Date: 2025-04-16T07:51:31Z
Rating: important
References:
* bsc#1051510
* bsc#1054914
* bsc#1065729
* bsc#1129770
* bsc#1190317
* bsc#1195823
* bsc#1197158
* bsc#1197227
* bsc#1197331
* bsc#1197661
* bsc#1198577
* bsc#1198660
* bsc#1200571
* bsc#1200807
* bsc#1200809
* bsc#1200810
* bsc#1200871
* bsc#1200872
* bsc#1201381
* bsc#1201610
* bsc#1201726
* bsc#1202672
* bsc#1202712
* bsc#1203769
* bsc#1207186
* bsc#1209547
* bsc#1210647
* bsc#1213167
* bsc#1218450
* bsc#1220466
* bsc#1224489
* bsc#1225742
* bsc#1226130
* bsc#1226323
* bsc#1226785
* bsc#1227858
* bsc#1228909
* bsc#1231375
* bsc#1231854
* bsc#1232370
* bsc#1232812
* bsc#1233458
* bsc#1233479
* bsc#1233557
* bsc#1234074
* bsc#1234222
* bsc#1234480
* bsc#1235436
* bsc#1235485
* bsc#1235637
* bsc#1235715
* bsc#1235733
* bsc#1235973
* bsc#1237313
* bsc#1237721
* bsc#1237722
* bsc#1237725
* bsc#1237728
* bsc#1237733
* bsc#1237735
* bsc#1237739
* bsc#1237751
* bsc#1237752
* bsc#1237767
* bsc#1237768
* bsc#1237782
* bsc#1237800
* bsc#1237813
* bsc#1237814
* bsc#1237815
* bsc#1237823
* bsc#1237831
* bsc#1237836
* bsc#1237842
* bsc#1237897
* bsc#1237903
* bsc#1237906
* bsc#1237918
* bsc#1237925
* bsc#1237932
* bsc#1237933
* bsc#1237934
* bsc#1237936
* bsc#1237941
* bsc#1237953
* bsc#1237969
* bsc#1237973
* bsc#1237983
* bsc#1237988
* bsc#1238007
* bsc#1238030
* bsc#1238036
* bsc#1238079
* bsc#1238108
* bsc#1238127
* bsc#1238133
* bsc#1238146
* bsc#1238168
* bsc#1238169
* bsc#1238170
* bsc#1238171
* bsc#1238172
* bsc#1238180
* bsc#1238181
* bsc#1238183
* bsc#1238231
* bsc#1238236
* bsc#1238240
* bsc#1238251
* bsc#1238252
* bsc#1238257
* bsc#1238266
* bsc#1238268
* bsc#1238269
* bsc#1238271
* bsc#1238272
* bsc#1238274
* bsc#1238276
* bsc#1238279
* bsc#1238282
* bsc#1238293
* bsc#1238313
* bsc#1238336
* bsc#1238372
* bsc#1238373
* bsc#1238376
* bsc#1238378
* bsc#1238382
* bsc#1238393
* bsc#1238396
* bsc#1238413
* bsc#1238416
* bsc#1238417
* bsc#1238419
* bsc#1238430
* bsc#1238433
* bsc#1238434
* bsc#1238443
* bsc#1238447
* bsc#1238454
* bsc#1238467
* bsc#1238469
* bsc#1238512
* bsc#1238521
* bsc#1238531
* bsc#1238540
* bsc#1238598
* bsc#1238599
* bsc#1238600
* bsc#1238612
* bsc#1238613
* bsc#1238615
* bsc#1238618
* bsc#1238623
* bsc#1238625
* bsc#1238626
* bsc#1238630
* bsc#1238633
* bsc#1238635
* bsc#1238647
* bsc#1238654
* bsc#1238705
* bsc#1238707
* bsc#1238710
* bsc#1238716
* bsc#1238719
* bsc#1238721
* bsc#1238729
* bsc#1238738
* bsc#1238747
* bsc#1238750
* bsc#1238751
* bsc#1238754
* bsc#1238763
* bsc#1238780
* bsc#1238787
* bsc#1238789
* bsc#1238794
* bsc#1238805
* bsc#1238816
* bsc#1238817
* bsc#1238819
* bsc#1238843
* bsc#1238889
* bsc#1238903
* bsc#1238909
* bsc#1238916
* bsc#1238925
* bsc#1238933
* bsc#1238943
* bsc#1238944
* bsc#1238946
* bsc#1238949
* bsc#1238950
* bsc#1238951
* bsc#1238952
* bsc#1238953
* bsc#1238954
* bsc#1238964
* bsc#1238970
* bsc#1238986
* bsc#1239002
* bsc#1239003
* bsc#1239035
* bsc#1239036
* bsc#1239039
* bsc#1239040
* bsc#1239041
* bsc#1239059
* bsc#1239076
* bsc#1239087
* bsc#1239109
* bsc#1239117
* bsc#1239174
* bsc#1239448
* bsc#1239454
* bsc#1239468
* bsc#1239479
* bsc#1239481
* bsc#1239484
* bsc#1239508
* bsc#1239994
* bsc#1240133
* bsc#1240172
* bsc#1240183
* bsc#1240186
* bsc#1240208
* bsc#1240213
* bsc#1240218
* bsc#1240227
* bsc#1240229
* bsc#1240233
* bsc#1240272
* bsc#1240275
* bsc#1240276
* bsc#1240282
* bsc#1240285
* bsc#1240286
* bsc#1240288
* bsc#1240290
* bsc#1240303
* bsc#1240318
* bsc#1240582
* bsc#1240639
* bsc#1240700
* bsc#1240708
* bsc#1240784
* bsc#1240797
* bsc#1240801
Cross-References:
* CVE-2017-5753
* CVE-2021-46925
* CVE-2021-47633
* CVE-2021-47645
* CVE-2021-47648
* CVE-2021-47652
* CVE-2022-1016
* CVE-2022-1048
* CVE-2022-1184
* CVE-2022-26373
* CVE-2022-2977
* CVE-2022-3303
* CVE-2022-49046
* CVE-2022-49051
* CVE-2022-49053
* CVE-2022-49058
* CVE-2022-49059
* CVE-2022-49065
* CVE-2022-49066
* CVE-2022-49074
* CVE-2022-49075
* CVE-2022-49084
* CVE-2022-49085
* CVE-2022-49095
* CVE-2022-49098
* CVE-2022-49100
* CVE-2022-49107
* CVE-2022-49109
* CVE-2022-49114
* CVE-2022-49119
* CVE-2022-49120
* CVE-2022-49122
* CVE-2022-49155
* CVE-2022-49156
* CVE-2022-49157
* CVE-2022-49158
* CVE-2022-49159
* CVE-2022-49160
* CVE-2022-49164
* CVE-2022-49191
* CVE-2022-49196
* CVE-2022-49204
* CVE-2022-49209
* CVE-2022-49217
* CVE-2022-49220
* CVE-2022-49226
* CVE-2022-49259
* CVE-2022-49264
* CVE-2022-49271
* CVE-2022-49272
* CVE-2022-49275
* CVE-2022-49280
* CVE-2022-49281
* CVE-2022-49286
* CVE-2022-49287
* CVE-2022-49288
* CVE-2022-49291
* CVE-2022-49292
* CVE-2022-49293
* CVE-2022-49295
* CVE-2022-49297
* CVE-2022-49300
* CVE-2022-49308
* CVE-2022-49313
* CVE-2022-49321
* CVE-2022-49322
* CVE-2022-49330
* CVE-2022-49331
* CVE-2022-49332
* CVE-2022-49337
* CVE-2022-49343
* CVE-2022-49344
* CVE-2022-49347
* CVE-2022-49349
* CVE-2022-49367
* CVE-2022-49370
* CVE-2022-49372
* CVE-2022-49388
* CVE-2022-49389
* CVE-2022-49395
* CVE-2022-49397
* CVE-2022-49404
* CVE-2022-49407
* CVE-2022-49409
* CVE-2022-49413
* CVE-2022-49414
* CVE-2022-49416
* CVE-2022-49421
* CVE-2022-49429
* CVE-2022-49432
* CVE-2022-49433
* CVE-2022-49434
* CVE-2022-49437
* CVE-2022-49443
* CVE-2022-49444
* CVE-2022-49472
* CVE-2022-49488
* CVE-2022-49492
* CVE-2022-49495
* CVE-2022-49497
* CVE-2022-49505
* CVE-2022-49513
* CVE-2022-49516
* CVE-2022-49519
* CVE-2022-49524
* CVE-2022-49526
* CVE-2022-49530
* CVE-2022-49532
* CVE-2022-49538
* CVE-2022-49544
* CVE-2022-49545
* CVE-2022-49546
* CVE-2022-49555
* CVE-2022-49563
* CVE-2022-49564
* CVE-2022-49566
* CVE-2022-49578
* CVE-2022-49581
* CVE-2022-49584
* CVE-2022-49589
* CVE-2022-49605
* CVE-2022-49607
* CVE-2022-49610
* CVE-2022-49611
* CVE-2022-49619
* CVE-2022-49620
* CVE-2022-49623
* CVE-2022-49638
* CVE-2022-49640
* CVE-2022-49641
* CVE-2022-49647
* CVE-2022-49649
* CVE-2022-49657
* CVE-2022-49667
* CVE-2022-49672
* CVE-2022-49673
* CVE-2022-49674
* CVE-2022-49687
* CVE-2022-49707
* CVE-2022-49708
* CVE-2022-49710
* CVE-2022-49711
* CVE-2022-49713
* CVE-2022-49727
* CVE-2022-49733
* CVE-2022-49740
* CVE-2023-2162
* CVE-2023-3567
* CVE-2023-52933
* CVE-2023-52935
* CVE-2023-52973
* CVE-2023-52974
* CVE-2023-52979
* CVE-2023-52997
* CVE-2023-53000
* CVE-2023-53006
* CVE-2023-53007
* CVE-2023-53008
* CVE-2023-53010
* CVE-2023-53015
* CVE-2023-53019
* CVE-2023-53024
* CVE-2023-53031
* CVE-2024-35910
* CVE-2024-36968
* CVE-2024-38559
* CVE-2024-41005
* CVE-2024-47678
* CVE-2024-49571
* CVE-2024-49935
* CVE-2024-49940
* CVE-2024-50269
* CVE-2024-50290
* CVE-2024-53063
* CVE-2024-53124
* CVE-2024-53140
* CVE-2024-53680
* CVE-2024-56633
* CVE-2024-56640
* CVE-2024-56770
* CVE-2024-57900
* CVE-2024-57973
* CVE-2024-57979
* CVE-2024-57996
* CVE-2024-58014
* CVE-2024-58052
* CVE-2024-58071
* CVE-2024-58072
* CVE-2024-58083
* CVE-2025-21703
* CVE-2025-21708
* CVE-2025-21744
* CVE-2025-21759
* CVE-2025-21760
* CVE-2025-21762
* CVE-2025-21763
* CVE-2025-21765
* CVE-2025-21766
* CVE-2025-21776
* CVE-2025-21782
* CVE-2025-21785
* CVE-2025-21791
* CVE-2025-21796
* CVE-2025-21802
* CVE-2025-21821
* CVE-2025-21831
* CVE-2025-21846
* CVE-2025-21848
* CVE-2025-21855
* CVE-2025-21858
* CVE-2025-21865
* CVE-2025-21871
* CVE-2025-21877
* CVE-2025-21891
* CVE-2025-21916
* CVE-2025-21922
* CVE-2025-21934
* CVE-2025-21935
* CVE-2025-21969
* CVE-2025-21993
* CVE-2025-21996
* CVE-2025-22007
CVSS scores:
* CVE-2017-5753 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2017-5753 ( SUSE ): 7.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
* CVE-2017-5753 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2017-5753 ( NVD ): 5.6 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2021-46925 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46925 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-46925 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47633 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47633 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2021-47645 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47645 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47645 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47648 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47648 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47652 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47652 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-1016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-1016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-1048 ( SUSE ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-1048 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-1184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-1184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-26373 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-26373 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-2977 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
* CVE-2022-2977 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-3303 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-3303 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49046 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49051 ( SUSE ): 4.3
CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2022-49051 ( SUSE ): 4.9 CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N
* CVE-2022-49053 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49053 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49053 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49058 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49059 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49059 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49059 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49065 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49065 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49066 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49074 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49075 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49084 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49085 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49085 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49095 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49098 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49098 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49100 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49107 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49107 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49114 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49114 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49114 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49119 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49119 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49120 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49122 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49155 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49156 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49157 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49157 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49158 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2022-49158 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2022-49159 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49159 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49160 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49164 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49191 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49196 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49209 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49226 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49271 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49271 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49275 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49275 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49275 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49280 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49280 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49281 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49286 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49286 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49287 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49288 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49291 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49291 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49291 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49292 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49292 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49293 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49295 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49295 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49295 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49297 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49297 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49300 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49300 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49300 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49308 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49313 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49313 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49321 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49321 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49321 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49322 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49322 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49322 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49330 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49330 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49331 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49332 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49337 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49343 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49343 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49344 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49344 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49347 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49347 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49349 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49349 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49367 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49367 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49370 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49370 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49370 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49372 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49388 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49389 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49395 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49404 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49407 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49409 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49413 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49413 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49413 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49414 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49416 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49416 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49421 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49429 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49429 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49432 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49432 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49433 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49434 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49434 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49437 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49437 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49443 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49444 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49472 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49472 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49488 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49492 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49492 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49495 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49497 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49497 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49505 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49505 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49513 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49516 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49516 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49519 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49519 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49524 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49524 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49524 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49526 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49526 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49530 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49530 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49530 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49532 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49532 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49538 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49538 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49538 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49544 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49544 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49544 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49545 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49545 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49546 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49546 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49555 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49563 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49563 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49563 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49564 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49564 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49564 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49566 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49578 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2022-49578 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-49578 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49581 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49584 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49605 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49607 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49607 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49610 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
* CVE-2022-49610 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
* CVE-2022-49611 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49619 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49619 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49619 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49620 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49620 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49620 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49623 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2022-49638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49638 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49640 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49641 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49647 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49649 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49657 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49657 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49667 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49673 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49673 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49674 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49687 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49707 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49707 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49711 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49711 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49713 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49713 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49727 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49727 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-49727 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49733 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49740 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49740 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-2162 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-3567 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52935 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52973 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52979 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53008 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53015 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35910 ( NVD ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-36968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36968 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2024-38559 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38559 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-47678 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-47678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-49571 ( SUSE ): 5.9
CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49571 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-49935 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49940 ( SUSE ): 6.1
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49940 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50269 ( SUSE ): 4.3 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50269 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53124 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53680 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53680 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-56633 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56640 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56640 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56770 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57900 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57900 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57973 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57979 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57996 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57996 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58014 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58014 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58052 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58071 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21708 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21708 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21744 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21744 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21760 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21760 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21762 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21763 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21766 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21776 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21782 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21782 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-21782 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-21785 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21785 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21785 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21791 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21791 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21791 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21796 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21846 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21846 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21848 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21855 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21855 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21855 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21858 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21865 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21877 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21916 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21922 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-21922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21934 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21934 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21935 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21969 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21969 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21993 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21993 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-21996 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21996 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22007 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22007 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* SUSE Linux Enterprise High Performance Computing 12 SP5
* SUSE Linux Enterprise Live Patching 12-SP5
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server 12 SP5 LTSS
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
An update that solves 222 vulnerabilities and has 27 security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2021-46925: Fixed kernel panic caused by race of smc_sock (bsc#1220466).
* CVE-2021-47645: media: staging: media: zoran: calculate the right buffer
number for zoran_reap_stat_com (bsc#1237767).
* CVE-2021-47648: gpu: host1x: Fix a memory leak in 'host1x_remove()'
(bsc#1237725).
* CVE-2022-49046: i2c: dev: check return value when calling dev_set_name()
(bsc#1237842).
* CVE-2022-49051: net: usb: aqc111: Fix out-of-bounds accesses in RX fixup
(bsc#1237903).
* CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918).
* CVE-2022-49059: nfc: nci: add flush_workqueue to prevent uaf (bsc#1238007).
* CVE-2022-49074: irqchip/gic-v3: Fix GICR_CTLR.RWP polling (bsc#1237728).
* CVE-2022-49075: btrfs: fix qgroup reserve overflow the qgroup limit
(bsc#1237733).
* CVE-2022-49084: qede: confirm skb is allocated before using (bsc#1237751).
* CVE-2022-49107: ceph: fix memory leak in ceph_readdir when note_last_dentry
returns error (bsc#1237973).
* CVE-2022-49109: ceph: fix inode reference leakage in ceph_get_snapdir()
(bsc#1237836).
* CVE-2022-49119: scsi: pm8001: Fix memory leak in
pm8001_chip_fw_flash_update_req() (bsc#1237925).
* CVE-2022-49120: scsi: pm8001: Fix task leak in pm8001_send_abort_all()
(bsc#1237969).
* CVE-2022-49209: bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is
full (bsc#1238252).
* CVE-2022-49220: dax: make sure inodes are flushed before destroy cache
(bsc#1237936).
* CVE-2022-49275: can: m_can: m_can_tx_handler(): fix use after free of skb
(bsc#1238719).
* CVE-2022-49286: tpm: use try_get_ops() in tpm-space.c (bsc#1238647).
* CVE-2022-49292: ALSA: oss: Fix PCM OSS buffer allocation overflow
(bsc#1238625).
* CVE-2022-49308: extcon: Modify extcon device to be created after driver data
is set (bsc#1238654).
* CVE-2022-49331: nfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling
(bsc#1237813).
* CVE-2022-49344: af_unix: Fix a data-race in unix_dgram_peer_wake_me()
(bsc#1237988).
* CVE-2022-49367: net: dsa: mv88e6xxx: Fix refcount leak in
mv88e6xxx_mdios_register (bsc#1238447).
* CVE-2022-49370: firmware: dmi-sysfs: Fix memory leak in
dmi_sysfs_register_handle (bsc#1238467).
* CVE-2022-49372: tcp: tcp_rtx_synack() can be called from process context
(bsc#1238251).
* CVE-2022-49388: ubi: ubi_create_volume: Fix use-after-free when volume
creation failed (bsc#1237934).
* CVE-2022-49395: um: Fix out-of-bounds read in LDT setup (bsc#1237953).
* CVE-2022-49397: phy: qcom-qmp: fix struct clk leak on probe errors
(bsc#1237823).
* CVE-2022-49404: RDMA/hfi1: Fix potential integer multiplication overflow
errors (bsc#1238430).
* CVE-2022-49416: wifi: mac80211: fix use-after-free in chanctx code
(bsc#1238293).
* CVE-2022-49433: RDMA/hfi1: Prevent use of lock before it is initialized
(bsc#1238268).
* CVE-2022-49472: net: phy: micrel: Allow probing without .driver_data
(bsc#1238951).
* CVE-2022-49488: drm/msm/mdp5: Return error code in mdp5_mixer_release when
deadlock (bsc#1238600).
* CVE-2022-49495: drm/msm/hdmi: check return value after calling
platform_get_resource_byname() (bsc#1237932).
* CVE-2022-49497: net: remove two BUG() from skb_checksum_help()
(bsc#1238946).
* CVE-2022-49505: NFC: NULL out the dev->rfkill to prevent UAF (bsc#1238615).
* CVE-2022-49516: ice: always check VF VSI pointer values (bsc#1238953).
* CVE-2022-49519: ath10k: skip ath10k_halt during suspend for driver state
RESTARTING (bsc#1238943).
* CVE-2022-49524: media: pci: cx23885: Fix the error handling in
cx23885_initdev() (bsc#1238949).
* CVE-2022-49530: drm/amd/pm: fix double free in si_parse_power_table()
(bsc#1238944).
* CVE-2022-49538: ALSA: jack: Fix mutex call in snd_jack_report()
(bsc#1238843).
* CVE-2022-49544: ipw2x00: Fix potential NULL dereference in libipw_xmit()
(bsc#1238721).
* CVE-2022-49545: ALSA: usb-audio: Cancel pending work at closing a MIDI
substream (bsc#1238729).
* CVE-2022-49546: x86/kexec: Fix double-free of elf header buffer
(bsc#1238750).
* CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238787).
* CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238789).
* CVE-2022-49578: ip: Fix data-races around sysctl_ip_prot_sock.
(bsc#1238794).
* CVE-2022-49581: be2net: Fix buffer overflow in be_get_module_eeprom
(bsc#1238540).
* CVE-2022-49589: kABI: protect mr_ifc_count change (bsc#1238598).
* CVE-2022-49605: igc: Reinstate IGC_REMOVED logic and implement it properly
(bsc#1238433).
* CVE-2022-49607: perf/core: Fix data race between perf_event_set_output() and
perf_mmap_close() (bsc#1238817).
* CVE-2022-49610: KVM: VMX: Prevent RSB underflow before vmenter
(bsc#1238952).
* CVE-2022-49619: net: sfp: fix memory leak in sfp_probe() (bsc#1239003).
* CVE-2022-49620: net: tipc: fix possible refcount leak in tipc_sk_create()
(bsc#1239002).
* CVE-2022-49640: sysctl: Fix data races in proc_douintvec_minmax()
(bsc#1237782).
* CVE-2022-49641: sysctl: Fix data races in proc_douintvec() (bsc#1237831).
* CVE-2022-49667: net: bonding: fix use-after-free after 802.3ad slave unbind
(bsc#1238282).
* CVE-2022-49672: net: tun: unlink NAPI from device on destruction
(bsc#1238816).
* CVE-2022-49711: bus: fsl-mc-bus: fix KASAN use-after-free in
fsl_mc_bus_remove() (bsc#1238416).
* CVE-2022-49727: ipv6: Fix signed integer overflow in l2tp_ip6_sendmsg
(bsc#1239059).
* CVE-2022-49740: wifi: brcmfmac: Check the count value of channel spec to
prevent out-of-bounds reads (bsc#1240233).
* CVE-2023-52935: mm/khugepaged: fix ->anon_vma race (bsc#1240276).
* CVE-2023-52997: ipv4: prevent potential spectre v1 gadget in
ip_metrics_convert() (bsc#1240303).
* CVE-2023-53010: bnxt: Do not read past the end of test names (bsc#1240290).
* CVE-2023-53019: net: mdio: validate parameter addr in mdiobus_get_phy()
(bsc#1240286).
* CVE-2024-35910: kABI fix for tcp: properly terminate timers for kernel
sockets (bsc#1224489).
* CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init()
(bsc#1226130).
* CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated
(bsc#1226785).
* CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active
(bsc#1227858).
* CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when
receiving proposal msg (bsc#1235733).
* CVE-2024-49935: ACPI: PAD: fix crash in exit_round_robin() (bsc#1232370).
* CVE-2024-49940: l2tp: prevent possible tunnel refcount underflow
(bsc#1232812).
* CVE-2024-50269: usb: musb: sunxi: Fix accessing an released usb phy
(bsc#1233458).
* CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc
(bsc#1234074).
* CVE-2024-53140: netlink: terminate outstanding dump on socket close
(bsc#1234222).
* CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in
ip_vs_protocol_init() (bsc#1235715).
* CVE-2024-56640: net/smc: fix LGR and link use-after-free issue
(bsc#1235436).
* CVE-2024-56770: net/sched: netem: account for backlog updates from child
qdisc (bsc#1235637).
* CVE-2024-57900: ila: serialize calls to nf_register_net_hooks()
(bsc#1235973).
* CVE-2024-57973: rdma/cxgb4: Prevent potential integer overflow on 32bit
(bsc#1238531).
* CVE-2024-57979: kABI workaround for pps changes (bsc#1238521).
* CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit
(bsc#1239076).
* CVE-2024-58014: wifi: brcmsmac: add gain range check to
wlc_phy_iqcal_gainparams_nphy() (bsc#1239109).
* CVE-2024-58052: drm/amdgpu: Fix potential NULL pointer dereference in
atomctrl_get_smc_sclk_range_table (bsc#1238986).
* CVE-2024-58071: team: prevent adding a device which is already a team device
lower (bsc#1238970)
* CVE-2024-58072: wifi: rtlwifi: remove unused check_buddy_priv (bsc#1238964).
* CVE-2024-58083: KVM: Explicitly verify target vCPU is online in
kvm_get_vcpu() (bsc#1239036).
* CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog()
(bsc#1237313).
* CVE-2025-21708: net: usb: rtl8150: enable basic endpoint checking
(bsc#1239087).
* CVE-2025-21744: wifi: brcmfmac: fix NULL pointer dereference in
brcmf_txfinalize() (bsc#1238903).
* CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send()
(bsc#1238738).
* CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb()
(bsc#1238763).
* CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780).
* CVE-2025-21763: neighbour: use RCU protection in __neigh_notify()
(bsc#1237897).
* CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss()
(bsc#1237906).
* CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu()
(bsc#1238754).
* CVE-2025-21776: USB: hub: Ignore non-compliant devices with too many configs
or interfaces (bsc#1238909).
* CVE-2025-21782: orangefs: fix a oob in orangefs_debug_write (bsc#1239117).
* CVE-2025-21785: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo
array (bsc#1238747).
* CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512).
* CVE-2025-21796: nfsd: clear acl_access/acl_default after releasing them
(bsc#1238716).
* CVE-2025-21802: net: hns3: fix oops when unload drivers paralleling
(bsc#1238751).
* CVE-2025-21821: fbdev: omap: use threaded IRQ for LCD DMA (bsc#1239174).
* CVE-2025-21831: PCI: Avoid putting some root ports into D3 on TUXEDO Sirius
Gen1 (bsc#1239039).
* CVE-2025-21846: acct: perform last write from workqueue (bsc#1239508).
* CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc()
(bsc#1239479).
* CVE-2025-21865: gtp: Suppress list corruption splat in
gtp_net_exit_batch_rtnl() (bsc#1239481).
* CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183).
* CVE-2025-21877: usbnet: gl620a: fix endpoint checking in genelink_bind()
(bsc#1240172).
* CVE-2025-21891: ipvlan: ensure network headers are in skb linear part
(bsc#1240186).
* CVE-2025-21916: usb: atm: cxacru: fix a flaw in existing endpoint checks
(bsc#1240582).
* CVE-2025-21922: ppp: Fix KMSAN uninit-value warning with bpf (bsc#1240639).
* CVE-2025-21934: rapidio: fix an API misues when rio_add_net() fails
(bsc#1240708).
* CVE-2025-21935: rapidio: add check for rio_add_net() in rio_scan_alloc_net()
(bsc#1240700).
* CVE-2025-21969: Bluetooth: L2CAP: Fix build errors in some archs
(bsc#1240784).
* CVE-2025-21993: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in
ibft_attr_show_nic() (bsc#1240797).
* CVE-2025-21996: drm/radeon: fix uninitialized size issue in
radeon_vce_cs_parse() (bsc#1240801).
* CVE-2025-22007: Bluetooth: Fix error code in chan_alloc_skb_cb()
(bsc#1240582).
The following non-security bugs were fixed:
* ceph: fix up error handling with snapdirs (bsc#1237836)
* cpufreq: governor: Use kobject release() method to free dbs_data
(bsc#1237800).
* firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle
(bsc#1238467)
* gro_cells: Avoid packet re-ordering for cloned skbs (bsc#1226323).
* ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994).
* ipv4: use RCU protection in inet_select_addr() (bsc#1239994).
* ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994).
* ipv4: use RCU protection in rt_is_expired() (bsc#1239994).
* ipv6: icmp: convert to dev_net_rcu() (bsc#1239994).
* ipv6: Use RCU in ip6_input() (bsc#1239994).
* kernel/sysctl.c: define minmax conv functions in terms of non-minmax
versions (bsc#1237782)
* ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994).
* ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994).
* net: add dev_net_rcu() helper (bsc#1239994).
* net: fix SO_REUSEPORT return code (bsc#1239448)
* net: mana: Support holes in device list reply msg (bsc#1240133).
* net: treat possible_net_t net pointer as an RCU one and add read_pnet_rcu()
(bsc#1239994).
* net: usb: usbnet: restore usb%d name exception for local mac addresses
(bsc#1234480).
* pipe, sysctl: drop 'min' parameter from pipe-max-size converter
(bsc#1237782)
* pipe, sysctl: remove pipe_proc_fn() (bsc#1237782)
* pipe: add proc_dopipe_max_size() to safely assign pipe_max_size
(bsc#1237782)
* pipe: reject F_SETPIPE_SZ with size over UINT_MAX (bsc#1237782)
* scripts: fix incorrect regex escape With Tumbleweed's recent switch to
Python 3.13
* sysctl: check for UINT_MAX before unsigned int min/max (bsc#1237782)
* team: add ethtool get_link_ksettings (bsc#1228909).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1293=1
* SUSE Linux Enterprise Live Patching 12-SP5
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1293=1
* SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1293=1
## Package List:
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
* kernel-default-base-debuginfo-4.12.14-122.255.1
* ocfs2-kmp-default-4.12.14-122.255.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.255.1
* kernel-default-base-4.12.14-122.255.1
* gfs2-kmp-default-4.12.14-122.255.1
* kernel-syms-4.12.14-122.255.1
* dlm-kmp-default-debuginfo-4.12.14-122.255.1
* kernel-default-devel-debuginfo-4.12.14-122.255.1
* cluster-md-kmp-default-debuginfo-4.12.14-122.255.1
* gfs2-kmp-default-debuginfo-4.12.14-122.255.1
* dlm-kmp-default-4.12.14-122.255.1
* kernel-default-devel-4.12.14-122.255.1
* cluster-md-kmp-default-4.12.14-122.255.1
* kernel-default-debuginfo-4.12.14-122.255.1
* kernel-default-debugsource-4.12.14-122.255.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64)
* kernel-default-4.12.14-122.255.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
* kernel-source-4.12.14-122.255.1
* kernel-devel-4.12.14-122.255.1
* kernel-macros-4.12.14-122.255.1
* SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
* kernel-default-4.12.14-122.255.1
* SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
* kernel-default-kgraft-devel-4.12.14-122.255.1
* kernel-default-kgraft-4.12.14-122.255.1
* kgraft-patch-4_12_14-122_255-default-1-8.5.1
* kernel-default-debuginfo-4.12.14-122.255.1
* kernel-default-debugsource-4.12.14-122.255.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* kernel-default-base-debuginfo-4.12.14-122.255.1
* ocfs2-kmp-default-4.12.14-122.255.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.255.1
* kernel-default-base-4.12.14-122.255.1
* gfs2-kmp-default-4.12.14-122.255.1
* kernel-syms-4.12.14-122.255.1
* dlm-kmp-default-debuginfo-4.12.14-122.255.1
* cluster-md-kmp-default-debuginfo-4.12.14-122.255.1
* gfs2-kmp-default-debuginfo-4.12.14-122.255.1
* dlm-kmp-default-4.12.14-122.255.1
* kernel-default-devel-4.12.14-122.255.1
* cluster-md-kmp-default-4.12.14-122.255.1
* kernel-default-debuginfo-4.12.14-122.255.1
* kernel-default-debugsource-4.12.14-122.255.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-4.12.14-122.255.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
* kernel-source-4.12.14-122.255.1
* kernel-devel-4.12.14-122.255.1
* kernel-macros-4.12.14-122.255.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (s390x)
* kernel-default-man-4.12.14-122.255.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64)
* kernel-default-devel-debuginfo-4.12.14-122.255.1
## References:
* https://www.suse.com/security/cve/CVE-2017-5753.html
* https://www.suse.com/security/cve/CVE-2021-46925.html
* https://www.suse.com/security/cve/CVE-2021-47633.html
* https://www.suse.com/security/cve/CVE-2021-47645.html
* https://www.suse.com/security/cve/CVE-2021-47648.html
* https://www.suse.com/security/cve/CVE-2021-47652.html
* https://www.suse.com/security/cve/CVE-2022-1016.html
* https://www.suse.com/security/cve/CVE-2022-1048.html
* https://www.suse.com/security/cve/CVE-2022-1184.html
* https://www.suse.com/security/cve/CVE-2022-26373.html
* https://www.suse.com/security/cve/CVE-2022-2977.html
* https://www.suse.com/security/cve/CVE-2022-3303.html
* https://www.suse.com/security/cve/CVE-2022-49046.html
* https://www.suse.com/security/cve/CVE-2022-49051.html
* https://www.suse.com/security/cve/CVE-2022-49053.html
* https://www.suse.com/security/cve/CVE-2022-49058.html
* https://www.suse.com/security/cve/CVE-2022-49059.html
* https://www.suse.com/security/cve/CVE-2022-49065.html
* https://www.suse.com/security/cve/CVE-2022-49066.html
* https://www.suse.com/security/cve/CVE-2022-49074.html
* https://www.suse.com/security/cve/CVE-2022-49075.html
* https://www.suse.com/security/cve/CVE-2022-49084.html
* https://www.suse.com/security/cve/CVE-2022-49085.html
* https://www.suse.com/security/cve/CVE-2022-49095.html
* https://www.suse.com/security/cve/CVE-2022-49098.html
* https://www.suse.com/security/cve/CVE-2022-49100.html
* https://www.suse.com/security/cve/CVE-2022-49107.html
* https://www.suse.com/security/cve/CVE-2022-49109.html
* https://www.suse.com/security/cve/CVE-2022-49114.html
* https://www.suse.com/security/cve/CVE-2022-49119.html
* https://www.suse.com/security/cve/CVE-2022-49120.html
* https://www.suse.com/security/cve/CVE-2022-49122.html
* https://www.suse.com/security/cve/CVE-2022-49155.html
* https://www.suse.com/security/cve/CVE-2022-49156.html
* https://www.suse.com/security/cve/CVE-2022-49157.html
* https://www.suse.com/security/cve/CVE-2022-49158.html
* https://www.suse.com/security/cve/CVE-2022-49159.html
* https://www.suse.com/security/cve/CVE-2022-49160.html
* https://www.suse.com/security/cve/CVE-2022-49164.html
* https://www.suse.com/security/cve/CVE-2022-49191.html
* https://www.suse.com/security/cve/CVE-2022-49196.html
* https://www.suse.com/security/cve/CVE-2022-49204.html
* https://www.suse.com/security/cve/CVE-2022-49209.html
* https://www.suse.com/security/cve/CVE-2022-49217.html
* https://www.suse.com/security/cve/CVE-2022-49220.html
* https://www.suse.com/security/cve/CVE-2022-49226.html
* https://www.suse.com/security/cve/CVE-2022-49259.html
* https://www.suse.com/security/cve/CVE-2022-49264.html
* https://www.suse.com/security/cve/CVE-2022-49271.html
* https://www.suse.com/security/cve/CVE-2022-49272.html
* https://www.suse.com/security/cve/CVE-2022-49275.html
* https://www.suse.com/security/cve/CVE-2022-49280.html
* https://www.suse.com/security/cve/CVE-2022-49281.html
* https://www.suse.com/security/cve/CVE-2022-49286.html
* https://www.suse.com/security/cve/CVE-2022-49287.html
* https://www.suse.com/security/cve/CVE-2022-49288.html
* https://www.suse.com/security/cve/CVE-2022-49291.html
* https://www.suse.com/security/cve/CVE-2022-49292.html
* https://www.suse.com/security/cve/CVE-2022-49293.html
* https://www.suse.com/security/cve/CVE-2022-49295.html
* https://www.suse.com/security/cve/CVE-2022-49297.html
* https://www.suse.com/security/cve/CVE-2022-49300.html
* https://www.suse.com/security/cve/CVE-2022-49308.html
* https://www.suse.com/security/cve/CVE-2022-49313.html
* https://www.suse.com/security/cve/CVE-2022-49321.html
* https://www.suse.com/security/cve/CVE-2022-49322.html
* https://www.suse.com/security/cve/CVE-2022-49330.html
* https://www.suse.com/security/cve/CVE-2022-49331.html
* https://www.suse.com/security/cve/CVE-2022-49332.html
* https://www.suse.com/security/cve/CVE-2022-49337.html
* https://www.suse.com/security/cve/CVE-2022-49343.html
* https://www.suse.com/security/cve/CVE-2022-49344.html
* https://www.suse.com/security/cve/CVE-2022-49347.html
* https://www.suse.com/security/cve/CVE-2022-49349.html
* https://www.suse.com/security/cve/CVE-2022-49367.html
* https://www.suse.com/security/cve/CVE-2022-49370.html
* https://www.suse.com/security/cve/CVE-2022-49372.html
* https://www.suse.com/security/cve/CVE-2022-49388.html
* https://www.suse.com/security/cve/CVE-2022-49389.html
* https://www.suse.com/security/cve/CVE-2022-49395.html
* https://www.suse.com/security/cve/CVE-2022-49397.html
* https://www.suse.com/security/cve/CVE-2022-49404.html
* https://www.suse.com/security/cve/CVE-2022-49407.html
* https://www.suse.com/security/cve/CVE-2022-49409.html
* https://www.suse.com/security/cve/CVE-2022-49413.html
* https://www.suse.com/security/cve/CVE-2022-49414.html
* https://www.suse.com/security/cve/CVE-2022-49416.html
* https://www.suse.com/security/cve/CVE-2022-49421.html
* https://www.suse.com/security/cve/CVE-2022-49429.html
* https://www.suse.com/security/cve/CVE-2022-49432.html
* https://www.suse.com/security/cve/CVE-2022-49433.html
* https://www.suse.com/security/cve/CVE-2022-49434.html
* https://www.suse.com/security/cve/CVE-2022-49437.html
* https://www.suse.com/security/cve/CVE-2022-49443.html
* https://www.suse.com/security/cve/CVE-2022-49444.html
* https://www.suse.com/security/cve/CVE-2022-49472.html
* https://www.suse.com/security/cve/CVE-2022-49488.html
* https://www.suse.com/security/cve/CVE-2022-49492.html
* https://www.suse.com/security/cve/CVE-2022-49495.html
* https://www.suse.com/security/cve/CVE-2022-49497.html
* https://www.suse.com/security/cve/CVE-2022-49505.html
* https://www.suse.com/security/cve/CVE-2022-49513.html
* https://www.suse.com/security/cve/CVE-2022-49516.html
* https://www.suse.com/security/cve/CVE-2022-49519.html
* https://www.suse.com/security/cve/CVE-2022-49524.html
* https://www.suse.com/security/cve/CVE-2022-49526.html
* https://www.suse.com/security/cve/CVE-2022-49530.html
* https://www.suse.com/security/cve/CVE-2022-49532.html
* https://www.suse.com/security/cve/CVE-2022-49538.html
* https://www.suse.com/security/cve/CVE-2022-49544.html
* https://www.suse.com/security/cve/CVE-2022-49545.html
* https://www.suse.com/security/cve/CVE-2022-49546.html
* https://www.suse.com/security/cve/CVE-2022-49555.html
* https://www.suse.com/security/cve/CVE-2022-49563.html
* https://www.suse.com/security/cve/CVE-2022-49564.html
* https://www.suse.com/security/cve/CVE-2022-49566.html
* https://www.suse.com/security/cve/CVE-2022-49578.html
* https://www.suse.com/security/cve/CVE-2022-49581.html
* https://www.suse.com/security/cve/CVE-2022-49584.html
* https://www.suse.com/security/cve/CVE-2022-49589.html
* https://www.suse.com/security/cve/CVE-2022-49605.html
* https://www.suse.com/security/cve/CVE-2022-49607.html
* https://www.suse.com/security/cve/CVE-2022-49610.html
* https://www.suse.com/security/cve/CVE-2022-49611.html
* https://www.suse.com/security/cve/CVE-2022-49619.html
* https://www.suse.com/security/cve/CVE-2022-49620.html
* https://www.suse.com/security/cve/CVE-2022-49623.html
* https://www.suse.com/security/cve/CVE-2022-49638.html
* https://www.suse.com/security/cve/CVE-2022-49640.html
* https://www.suse.com/security/cve/CVE-2022-49641.html
* https://www.suse.com/security/cve/CVE-2022-49647.html
* https://www.suse.com/security/cve/CVE-2022-49649.html
* https://www.suse.com/security/cve/CVE-2022-49657.html
* https://www.suse.com/security/cve/CVE-2022-49667.html
* https://www.suse.com/security/cve/CVE-2022-49672.html
* https://www.suse.com/security/cve/CVE-2022-49673.html
* https://www.suse.com/security/cve/CVE-2022-49674.html
* https://www.suse.com/security/cve/CVE-2022-49687.html
* https://www.suse.com/security/cve/CVE-2022-49707.html
* https://www.suse.com/security/cve/CVE-2022-49708.html
* https://www.suse.com/security/cve/CVE-2022-49710.html
* https://www.suse.com/security/cve/CVE-2022-49711.html
* https://www.suse.com/security/cve/CVE-2022-49713.html
* https://www.suse.com/security/cve/CVE-2022-49727.html
* https://www.suse.com/security/cve/CVE-2022-49733.html
* https://www.suse.com/security/cve/CVE-2022-49740.html
* https://www.suse.com/security/cve/CVE-2023-2162.html
* https://www.suse.com/security/cve/CVE-2023-3567.html
* https://www.suse.com/security/cve/CVE-2023-52933.html
* https://www.suse.com/security/cve/CVE-2023-52935.html
* https://www.suse.com/security/cve/CVE-2023-52973.html
* https://www.suse.com/security/cve/CVE-2023-52974.html
* https://www.suse.com/security/cve/CVE-2023-52979.html
* https://www.suse.com/security/cve/CVE-2023-52997.html
* https://www.suse.com/security/cve/CVE-2023-53000.html
* https://www.suse.com/security/cve/CVE-2023-53006.html
* https://www.suse.com/security/cve/CVE-2023-53007.html
* https://www.suse.com/security/cve/CVE-2023-53008.html
* https://www.suse.com/security/cve/CVE-2023-53010.html
* https://www.suse.com/security/cve/CVE-2023-53015.html
* https://www.suse.com/security/cve/CVE-2023-53019.html
* https://www.suse.com/security/cve/CVE-2023-53024.html
* https://www.suse.com/security/cve/CVE-2023-53031.html
* https://www.suse.com/security/cve/CVE-2024-35910.html
* https://www.suse.com/security/cve/CVE-2024-36968.html
* https://www.suse.com/security/cve/CVE-2024-38559.html
* https://www.suse.com/security/cve/CVE-2024-41005.html
* https://www.suse.com/security/cve/CVE-2024-47678.html
* https://www.suse.com/security/cve/CVE-2024-49571.html
* https://www.suse.com/security/cve/CVE-2024-49935.html
* https://www.suse.com/security/cve/CVE-2024-49940.html
* https://www.suse.com/security/cve/CVE-2024-50269.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://www.suse.com/security/cve/CVE-2024-53124.html
* https://www.suse.com/security/cve/CVE-2024-53140.html
* https://www.suse.com/security/cve/CVE-2024-53680.html
* https://www.suse.com/security/cve/CVE-2024-56633.html
* https://www.suse.com/security/cve/CVE-2024-56640.html
* https://www.suse.com/security/cve/CVE-2024-56770.html
* https://www.suse.com/security/cve/CVE-2024-57900.html
* https://www.suse.com/security/cve/CVE-2024-57973.html
* https://www.suse.com/security/cve/CVE-2024-57979.html
* https://www.suse.com/security/cve/CVE-2024-57996.html
* https://www.suse.com/security/cve/CVE-2024-58014.html
* https://www.suse.com/security/cve/CVE-2024-58052.html
* https://www.suse.com/security/cve/CVE-2024-58071.html
* https://www.suse.com/security/cve/CVE-2024-58072.html
* https://www.suse.com/security/cve/CVE-2024-58083.html
* https://www.suse.com/security/cve/CVE-2025-21703.html
* https://www.suse.com/security/cve/CVE-2025-21708.html
* https://www.suse.com/security/cve/CVE-2025-21744.html
* https://www.suse.com/security/cve/CVE-2025-21759.html
* https://www.suse.com/security/cve/CVE-2025-21760.html
* https://www.suse.com/security/cve/CVE-2025-21762.html
* https://www.suse.com/security/cve/CVE-2025-21763.html
* https://www.suse.com/security/cve/CVE-2025-21765.html
* https://www.suse.com/security/cve/CVE-2025-21766.html
* https://www.suse.com/security/cve/CVE-2025-21776.html
* https://www.suse.com/security/cve/CVE-2025-21782.html
* https://www.suse.com/security/cve/CVE-2025-21785.html
* https://www.suse.com/security/cve/CVE-2025-21791.html
* https://www.suse.com/security/cve/CVE-2025-21796.html
* https://www.suse.com/security/cve/CVE-2025-21802.html
* https://www.suse.com/security/cve/CVE-2025-21821.html
* https://www.suse.com/security/cve/CVE-2025-21831.html
* https://www.suse.com/security/cve/CVE-2025-21846.html
* https://www.suse.com/security/cve/CVE-2025-21848.html
* https://www.suse.com/security/cve/CVE-2025-21855.html
* https://www.suse.com/security/cve/CVE-2025-21858.html
* https://www.suse.com/security/cve/CVE-2025-21865.html
* https://www.suse.com/security/cve/CVE-2025-21871.html
* https://www.suse.com/security/cve/CVE-2025-21877.html
* https://www.suse.com/security/cve/CVE-2025-21891.html
* https://www.suse.com/security/cve/CVE-2025-21916.html
* https://www.suse.com/security/cve/CVE-2025-21922.html
* https://www.suse.com/security/cve/CVE-2025-21934.html
* https://www.suse.com/security/cve/CVE-2025-21935.html
* https://www.suse.com/security/cve/CVE-2025-21969.html
* https://www.suse.com/security/cve/CVE-2025-21993.html
* https://www.suse.com/security/cve/CVE-2025-21996.html
* https://www.suse.com/security/cve/CVE-2025-22007.html
* https://bugzilla.suse.com/show_bug.cgi?id=1051510
* https://bugzilla.suse.com/show_bug.cgi?id=1054914
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1129770
* https://bugzilla.suse.com/show_bug.cgi?id=1190317
* https://bugzilla.suse.com/show_bug.cgi?id=1195823
* https://bugzilla.suse.com/show_bug.cgi?id=1197158
* https://bugzilla.suse.com/show_bug.cgi?id=1197227
* https://bugzilla.suse.com/show_bug.cgi?id=1197331
* https://bugzilla.suse.com/show_bug.cgi?id=1197661
* https://bugzilla.suse.com/show_bug.cgi?id=1198577
* https://bugzilla.suse.com/show_bug.cgi?id=1198660
* https://bugzilla.suse.com/show_bug.cgi?id=1200571
* https://bugzilla.suse.com/show_bug.cgi?id=1200807
* https://bugzilla.suse.com/show_bug.cgi?id=1200809
* https://bugzilla.suse.com/show_bug.cgi?id=1200810
* https://bugzilla.suse.com/show_bug.cgi?id=1200871
* https://bugzilla.suse.com/show_bug.cgi?id=1200872
* https://bugzilla.suse.com/show_bug.cgi?id=1201381
* https://bugzilla.suse.com/show_bug.cgi?id=1201610
* https://bugzilla.suse.com/show_bug.cgi?id=1201726
* https://bugzilla.suse.com/show_bug.cgi?id=1202672
* https://bugzilla.suse.com/show_bug.cgi?id=1202712
* https://bugzilla.suse.com/show_bug.cgi?id=1203769
* https://bugzilla.suse.com/show_bug.cgi?id=1207186
* https://bugzilla.suse.com/show_bug.cgi?id=1209547
* https://bugzilla.suse.com/show_bug.cgi?id=1210647
* https://bugzilla.suse.com/show_bug.cgi?id=1213167
* https://bugzilla.suse.com/show_bug.cgi?id=1218450
* https://bugzilla.suse.com/show_bug.cgi?id=1220466
* https://bugzilla.suse.com/show_bug.cgi?id=1224489
* https://bugzilla.suse.com/show_bug.cgi?id=1225742
* https://bugzilla.suse.com/show_bug.cgi?id=1226130
* https://bugzilla.suse.com/show_bug.cgi?id=1226323
* https://bugzilla.suse.com/show_bug.cgi?id=1226785
* https://bugzilla.suse.com/show_bug.cgi?id=1227858
* https://bugzilla.suse.com/show_bug.cgi?id=1228909
* https://bugzilla.suse.com/show_bug.cgi?id=1231375
* https://bugzilla.suse.com/show_bug.cgi?id=1231854
* https://bugzilla.suse.com/show_bug.cgi?id=1232370
* https://bugzilla.suse.com/show_bug.cgi?id=1232812
* https://bugzilla.suse.com/show_bug.cgi?id=1233458
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://bugzilla.suse.com/show_bug.cgi?id=1234074
* https://bugzilla.suse.com/show_bug.cgi?id=1234222
* https://bugzilla.suse.com/show_bug.cgi?id=1234480
* https://bugzilla.suse.com/show_bug.cgi?id=1235436
* https://bugzilla.suse.com/show_bug.cgi?id=1235485
* https://bugzilla.suse.com/show_bug.cgi?id=1235637
* https://bugzilla.suse.com/show_bug.cgi?id=1235715
* https://bugzilla.suse.com/show_bug.cgi?id=1235733
* https://bugzilla.suse.com/show_bug.cgi?id=1235973
* https://bugzilla.suse.com/show_bug.cgi?id=1237313
* https://bugzilla.suse.com/show_bug.cgi?id=1237721
* https://bugzilla.suse.com/show_bug.cgi?id=1237722
* https://bugzilla.suse.com/show_bug.cgi?id=1237725
* https://bugzilla.suse.com/show_bug.cgi?id=1237728
* https://bugzilla.suse.com/show_bug.cgi?id=1237733
* https://bugzilla.suse.com/show_bug.cgi?id=1237735
* https://bugzilla.suse.com/show_bug.cgi?id=1237739
* https://bugzilla.suse.com/show_bug.cgi?id=1237751
* https://bugzilla.suse.com/show_bug.cgi?id=1237752
* https://bugzilla.suse.com/show_bug.cgi?id=1237767
* https://bugzilla.suse.com/show_bug.cgi?id=1237768
* https://bugzilla.suse.com/show_bug.cgi?id=1237782
* https://bugzilla.suse.com/show_bug.cgi?id=1237800
* https://bugzilla.suse.com/show_bug.cgi?id=1237813
* https://bugzilla.suse.com/show_bug.cgi?id=1237814
* https://bugzilla.suse.com/show_bug.cgi?id=1237815
* https://bugzilla.suse.com/show_bug.cgi?id=1237823
* https://bugzilla.suse.com/show_bug.cgi?id=1237831
* https://bugzilla.suse.com/show_bug.cgi?id=1237836
* https://bugzilla.suse.com/show_bug.cgi?id=1237842
* https://bugzilla.suse.com/show_bug.cgi?id=1237897
* https://bugzilla.suse.com/show_bug.cgi?id=1237903
* https://bugzilla.suse.com/show_bug.cgi?id=1237906
* https://bugzilla.suse.com/show_bug.cgi?id=1237918
* https://bugzilla.suse.com/show_bug.cgi?id=1237925
* https://bugzilla.suse.com/show_bug.cgi?id=1237932
* https://bugzilla.suse.com/show_bug.cgi?id=1237933
* https://bugzilla.suse.com/show_bug.cgi?id=1237934
* https://bugzilla.suse.com/show_bug.cgi?id=1237936
* https://bugzilla.suse.com/show_bug.cgi?id=1237941
* https://bugzilla.suse.com/show_bug.cgi?id=1237953
* https://bugzilla.suse.com/show_bug.cgi?id=1237969
* https://bugzilla.suse.com/show_bug.cgi?id=1237973
* https://bugzilla.suse.com/show_bug.cgi?id=1237983
* https://bugzilla.suse.com/show_bug.cgi?id=1237988
* https://bugzilla.suse.com/show_bug.cgi?id=1238007
* https://bugzilla.suse.com/show_bug.cgi?id=1238030
* https://bugzilla.suse.com/show_bug.cgi?id=1238036
* https://bugzilla.suse.com/show_bug.cgi?id=1238079
* https://bugzilla.suse.com/show_bug.cgi?id=1238108
* https://bugzilla.suse.com/show_bug.cgi?id=1238127
* https://bugzilla.suse.com/show_bug.cgi?id=1238133
* https://bugzilla.suse.com/show_bug.cgi?id=1238146
* https://bugzilla.suse.com/show_bug.cgi?id=1238168
* https://bugzilla.suse.com/show_bug.cgi?id=1238169
* https://bugzilla.suse.com/show_bug.cgi?id=1238170
* https://bugzilla.suse.com/show_bug.cgi?id=1238171
* https://bugzilla.suse.com/show_bug.cgi?id=1238172
* https://bugzilla.suse.com/show_bug.cgi?id=1238180
* https://bugzilla.suse.com/show_bug.cgi?id=1238181
* https://bugzilla.suse.com/show_bug.cgi?id=1238183
* https://bugzilla.suse.com/show_bug.cgi?id=1238231
* https://bugzilla.suse.com/show_bug.cgi?id=1238236
* https://bugzilla.suse.com/show_bug.cgi?id=1238240
* https://bugzilla.suse.com/show_bug.cgi?id=1238251
* https://bugzilla.suse.com/show_bug.cgi?id=1238252
* https://bugzilla.suse.com/show_bug.cgi?id=1238257
* https://bugzilla.suse.com/show_bug.cgi?id=1238266
* https://bugzilla.suse.com/show_bug.cgi?id=1238268
* https://bugzilla.suse.com/show_bug.cgi?id=1238269
* https://bugzilla.suse.com/show_bug.cgi?id=1238271
* https://bugzilla.suse.com/show_bug.cgi?id=1238272
* https://bugzilla.suse.com/show_bug.cgi?id=1238274
* https://bugzilla.suse.com/show_bug.cgi?id=1238276
* https://bugzilla.suse.com/show_bug.cgi?id=1238279
* https://bugzilla.suse.com/show_bug.cgi?id=1238282
* https://bugzilla.suse.com/show_bug.cgi?id=1238293
* https://bugzilla.suse.com/show_bug.cgi?id=1238313
* https://bugzilla.suse.com/show_bug.cgi?id=1238336
* https://bugzilla.suse.com/show_bug.cgi?id=1238372
* https://bugzilla.suse.com/show_bug.cgi?id=1238373
* https://bugzilla.suse.com/show_bug.cgi?id=1238376
* https://bugzilla.suse.com/show_bug.cgi?id=1238378
* https://bugzilla.suse.com/show_bug.cgi?id=1238382
* https://bugzilla.suse.com/show_bug.cgi?id=1238393
* https://bugzilla.suse.com/show_bug.cgi?id=1238396
* https://bugzilla.suse.com/show_bug.cgi?id=1238413
* https://bugzilla.suse.com/show_bug.cgi?id=1238416
* https://bugzilla.suse.com/show_bug.cgi?id=1238417
* https://bugzilla.suse.com/show_bug.cgi?id=1238419
* https://bugzilla.suse.com/show_bug.cgi?id=1238430
* https://bugzilla.suse.com/show_bug.cgi?id=1238433
* https://bugzilla.suse.com/show_bug.cgi?id=1238434
* https://bugzilla.suse.com/show_bug.cgi?id=1238443
* https://bugzilla.suse.com/show_bug.cgi?id=1238447
* https://bugzilla.suse.com/show_bug.cgi?id=1238454
* https://bugzilla.suse.com/show_bug.cgi?id=1238467
* https://bugzilla.suse.com/show_bug.cgi?id=1238469
* https://bugzilla.suse.com/show_bug.cgi?id=1238512
* https://bugzilla.suse.com/show_bug.cgi?id=1238521
* https://bugzilla.suse.com/show_bug.cgi?id=1238531
* https://bugzilla.suse.com/show_bug.cgi?id=1238540
* https://bugzilla.suse.com/show_bug.cgi?id=1238598
* https://bugzilla.suse.com/show_bug.cgi?id=1238599
* https://bugzilla.suse.com/show_bug.cgi?id=1238600
* https://bugzilla.suse.com/show_bug.cgi?id=1238612
* https://bugzilla.suse.com/show_bug.cgi?id=1238613
* https://bugzilla.suse.com/show_bug.cgi?id=1238615
* https://bugzilla.suse.com/show_bug.cgi?id=1238618
* https://bugzilla.suse.com/show_bug.cgi?id=1238623
* https://bugzilla.suse.com/show_bug.cgi?id=1238625
* https://bugzilla.suse.com/show_bug.cgi?id=1238626
* https://bugzilla.suse.com/show_bug.cgi?id=1238630
* https://bugzilla.suse.com/show_bug.cgi?id=1238633
* https://bugzilla.suse.com/show_bug.cgi?id=1238635
* https://bugzilla.suse.com/show_bug.cgi?id=1238647
* https://bugzilla.suse.com/show_bug.cgi?id=1238654
* https://bugzilla.suse.com/show_bug.cgi?id=1238705
* https://bugzilla.suse.com/show_bug.cgi?id=1238707
* https://bugzilla.suse.com/show_bug.cgi?id=1238710
* https://bugzilla.suse.com/show_bug.cgi?id=1238716
* https://bugzilla.suse.com/show_bug.cgi?id=1238719
* https://bugzilla.suse.com/show_bug.cgi?id=1238721
* https://bugzilla.suse.com/show_bug.cgi?id=1238729
* https://bugzilla.suse.com/show_bug.cgi?id=1238738
* https://bugzilla.suse.com/show_bug.cgi?id=1238747
* https://bugzilla.suse.com/show_bug.cgi?id=1238750
* https://bugzilla.suse.com/show_bug.cgi?id=1238751
* https://bugzilla.suse.com/show_bug.cgi?id=1238754
* https://bugzilla.suse.com/show_bug.cgi?id=1238763
* https://bugzilla.suse.com/show_bug.cgi?id=1238780
* https://bugzilla.suse.com/show_bug.cgi?id=1238787
* https://bugzilla.suse.com/show_bug.cgi?id=1238789
* https://bugzilla.suse.com/show_bug.cgi?id=1238794
* https://bugzilla.suse.com/show_bug.cgi?id=1238805
* https://bugzilla.suse.com/show_bug.cgi?id=1238816
* https://bugzilla.suse.com/show_bug.cgi?id=1238817
* https://bugzilla.suse.com/show_bug.cgi?id=1238819
* https://bugzilla.suse.com/show_bug.cgi?id=1238843
* https://bugzilla.suse.com/show_bug.cgi?id=1238889
* https://bugzilla.suse.com/show_bug.cgi?id=1238903
* https://bugzilla.suse.com/show_bug.cgi?id=1238909
* https://bugzilla.suse.com/show_bug.cgi?id=1238916
* https://bugzilla.suse.com/show_bug.cgi?id=1238925
* https://bugzilla.suse.com/show_bug.cgi?id=1238933
* https://bugzilla.suse.com/show_bug.cgi?id=1238943
* https://bugzilla.suse.com/show_bug.cgi?id=1238944
* https://bugzilla.suse.com/show_bug.cgi?id=1238946
* https://bugzilla.suse.com/show_bug.cgi?id=1238949
* https://bugzilla.suse.com/show_bug.cgi?id=1238950
* https://bugzilla.suse.com/show_bug.cgi?id=1238951
* https://bugzilla.suse.com/show_bug.cgi?id=1238952
* https://bugzilla.suse.com/show_bug.cgi?id=1238953
* https://bugzilla.suse.com/show_bug.cgi?id=1238954
* https://bugzilla.suse.com/show_bug.cgi?id=1238964
* https://bugzilla.suse.com/show_bug.cgi?id=1238970
* https://bugzilla.suse.com/show_bug.cgi?id=1238986
* https://bugzilla.suse.com/show_bug.cgi?id=1239002
* https://bugzilla.suse.com/show_bug.cgi?id=1239003
* https://bugzilla.suse.com/show_bug.cgi?id=1239035
* https://bugzilla.suse.com/show_bug.cgi?id=1239036
* https://bugzilla.suse.com/show_bug.cgi?id=1239039
* https://bugzilla.suse.com/show_bug.cgi?id=1239040
* https://bugzilla.suse.com/show_bug.cgi?id=1239041
* https://bugzilla.suse.com/show_bug.cgi?id=1239059
* https://bugzilla.suse.com/show_bug.cgi?id=1239076
* https://bugzilla.suse.com/show_bug.cgi?id=1239087
* https://bugzilla.suse.com/show_bug.cgi?id=1239109
* https://bugzilla.suse.com/show_bug.cgi?id=1239117
* https://bugzilla.suse.com/show_bug.cgi?id=1239174
* https://bugzilla.suse.com/show_bug.cgi?id=1239448
* https://bugzilla.suse.com/show_bug.cgi?id=1239454
* https://bugzilla.suse.com/show_bug.cgi?id=1239468
* https://bugzilla.suse.com/show_bug.cgi?id=1239479
* https://bugzilla.suse.com/show_bug.cgi?id=1239481
* https://bugzilla.suse.com/show_bug.cgi?id=1239484
* https://bugzilla.suse.com/show_bug.cgi?id=1239508
* https://bugzilla.suse.com/show_bug.cgi?id=1239994
* https://bugzilla.suse.com/show_bug.cgi?id=1240133
* https://bugzilla.suse.com/show_bug.cgi?id=1240172
* https://bugzilla.suse.com/show_bug.cgi?id=1240183
* https://bugzilla.suse.com/show_bug.cgi?id=1240186
* https://bugzilla.suse.com/show_bug.cgi?id=1240208
* https://bugzilla.suse.com/show_bug.cgi?id=1240213
* https://bugzilla.suse.com/show_bug.cgi?id=1240218
* https://bugzilla.suse.com/show_bug.cgi?id=1240227
* https://bugzilla.suse.com/show_bug.cgi?id=1240229
* https://bugzilla.suse.com/show_bug.cgi?id=1240233
* https://bugzilla.suse.com/show_bug.cgi?id=1240272
* https://bugzilla.suse.com/show_bug.cgi?id=1240275
* https://bugzilla.suse.com/show_bug.cgi?id=1240276
* https://bugzilla.suse.com/show_bug.cgi?id=1240282
* https://bugzilla.suse.com/show_bug.cgi?id=1240285
* https://bugzilla.suse.com/show_bug.cgi?id=1240286
* https://bugzilla.suse.com/show_bug.cgi?id=1240288
* https://bugzilla.suse.com/show_bug.cgi?id=1240290
* https://bugzilla.suse.com/show_bug.cgi?id=1240303
* https://bugzilla.suse.com/show_bug.cgi?id=1240318
* https://bugzilla.suse.com/show_bug.cgi?id=1240582
* https://bugzilla.suse.com/show_bug.cgi?id=1240639
* https://bugzilla.suse.com/show_bug.cgi?id=1240700
* https://bugzilla.suse.com/show_bug.cgi?id=1240708
* https://bugzilla.suse.com/show_bug.cgi?id=1240784
* https://bugzilla.suse.com/show_bug.cgi?id=1240797
* https://bugzilla.suse.com/show_bug.cgi?id=1240801
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20250416/1adf48c9/attachment.htm>
More information about the sle-security-updates
mailing list