Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: SUSE-SU-2025:01600-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Live Patching 12-SP5, SUSE Linux Enterprise Server 12 SP5, SUSE Linux Enterprise High Performance Computing 12 SP5, SUSE Linux Enterprise Server for SAP Applications 12 SP5, SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security, SUSE Linux Enterprise Server 12 SP5 LTSS
Datum: So, 13. Juli 2025, 20:38
Referenzen: https://www.cve.org/CVERecord?id=CVE-2022-49749
https://www.cve.org/CVERecord?id=CVE-2023-53023
https://www.cve.org/CVERecord?id=CVE-2022-49188
https://www.cve.org/CVERecord?id=CVE-2022-49537
https://www.cve.org/CVERecord?id=CVE-2022-49179
https://www.cve.org/CVERecord?id=CVE-2022-49086
https://www.cve.org/CVERecord?id=CVE-2024-58017
https://www.cve.org/CVERecord?id=CVE-2024-58009
https://www.cve.org/CVERecord?id=CVE-2022-49465
https://www.cve.org/CVERecord?id=CVE-2022-49478
https://www.cve.org/CVERecord?id=CVE-2025-21948
https://www.cve.org/CVERecord?id=CVE-2024-54683
https://www.cve.org/CVERecord?id=CVE-2025-21941
https://www.cve.org/CVERecord?id=CVE-2022-49561
https://www.cve.org/CVERecord?id=CVE-2025-37785
https://www.cve.org/CVERecord?id=CVE-2022-49693
https://www.cve.org/CVERecord?id=CVE-2022-49335
https://www.cve.org/CVERecord?id=CVE-2022-49525
https://www.cve.org/CVERecord?id=CVE-2025-22004
https://www.cve.org/CVERecord?id=CVE-2025-21956
https://www.cve.org/CVERecord?id=CVE-2025-21750
https://www.cve.org/CVERecord?id=CVE-2025-21758
https://www.cve.org/CVERecord?id=CVE-2024-49994
https://www.cve.org/CVERecord?id=CVE-2024-58063
https://www.cve.org/CVERecord?id=CVE-2022-49060
https://www.cve.org/CVERecord?id=CVE-2022-49055
https://www.cve.org/CVERecord?id=CVE-2025-21976
https://www.cve.org/CVERecord?id=CVE-2022-49197
https://www.cve.org/CVERecord?id=CVE-2022-49753
https://www.cve.org/CVERecord?id=CVE-2025-21926
https://www.cve.org/CVERecord?id=CVE-2024-57924
https://www.cve.org/CVERecord?id=CVE-2022-49542
https://www.cve.org/CVERecord?id=CVE-2022-49290
https://www.cve.org/CVERecord?id=CVE-2025-22055
https://www.cve.org/CVERecord?id=CVE-2022-49137
https://www.cve.org/CVERecord?id=CVE-2022-49442
https://www.cve.org/CVERecord?id=CVE-2022-49171
https://www.cve.org/CVERecord?id=CVE-2024-56590
https://www.cve.org/CVERecord?id=CVE-2025-21806
https://www.cve.org/CVERecord?id=CVE-2024-57980
https://www.cve.org/CVERecord?id=CVE-2025-21910
https://www.cve.org/CVERecord?id=CVE-2024-46865
https://www.cve.org/CVERecord?id=CVE-2025-21779
https://www.cve.org/CVERecord?id=CVE-2025-21772
https://www.cve.org/CVERecord?id=CVE-2021-47668
https://www.cve.org/CVERecord?id=CVE-2025-22053
https://www.cve.org/CVERecord?id=CVE-2022-49351
https://www.cve.org/CVERecord?id=CVE-2025-22018
https://www.cve.org/CVERecord?id=CVE-2022-49521
https://www.cve.org/CVERecord?id=CVE-2021-47659
https://www.cve.org/CVERecord?id=CVE-2022-49668
https://www.cve.org/CVERecord?id=CVE-2022-49411
https://www.cve.org/CVERecord?id=CVE-2025-21964
https://www.cve.org/CVERecord?id=CVE-2025-21862
https://www.cve.org/CVERecord?id=CVE-2025-21927
https://www.cve.org/CVERecord?id=CVE-2024-57981
https://www.cve.org/CVERecord?id=CVE-2022-49118
https://www.cve.org/CVERecord?id=CVE-2025-21735
https://www.cve.org/CVERecord?id=CVE-2022-49175
https://www.cve.org/CVERecord?id=CVE-2025-22060
https://www.cve.org/CVERecord?id=CVE-2022-49489
https://www.cve.org/CVERecord?id=CVE-2021-47669
https://www.cve.org/CVERecord?id=CVE-2022-49590
https://www.cve.org/CVERecord?id=CVE-2025-21635
https://www.cve.org/CVERecord?id=CVE-2025-23131
https://www.cve.org/CVERecord?id=CVE-2025-21768
https://www.cve.org/CVERecord?id=CVE-2022-49232
https://www.cve.org/CVERecord?id=CVE-2024-46763
https://www.cve.org/CVERecord?id=CVE-2023-53032
https://www.cve.org/CVERecord?id=CVE-2022-49658
https://www.cve.org/CVERecord?id=CVE-2025-21963
https://www.cve.org/CVERecord?id=CVE-2022-49504
https://www.cve.org/CVERecord?id=CVE-2025-22010
https://www.cve.org/CVERecord?id=CVE-2022-49390
https://www.cve.org/CVERecord?id=CVE-2022-49385
https://www.cve.org/CVERecord?id=CVE-2020-36789
https://www.cve.org/CVERecord?id=CVE-2024-52559
https://www.cve.org/CVERecord?id=CVE-2024-58005
https://www.cve.org/CVERecord?id=CVE-2025-21881
https://www.cve.org/CVERecord?id=CVE-2022-49176
https://www.cve.org/CVERecord?id=CVE-2022-49730
https://www.cve.org/CVERecord?id=CVE-2022-49536
https://www.cve.org/CVERecord?id=CVE-2022-49111
https://www.cve.org/CVERecord?id=CVE-2025-21931
https://www.cve.org/CVERecord?id=CVE-2025-22086
https://www.cve.org/CVERecord?id=CVE-2024-58093
https://www.cve.org/CVERecord?id=CVE-2022-49325
https://www.cve.org/CVERecord?id=CVE-2025-22008
https://www.cve.org/CVERecord?id=CVE-2022-49534
https://www.cve.org/CVERecord?id=CVE-2022-49205
https://www.cve.org/CVERecord?id=CVE-2022-49535
https://www.cve.org/CVERecord?id=CVE-2025-21909
https://www.cve.org/CVERecord?id=CVE-2022-49728
https://www.cve.org/CVERecord?id=CVE-2022-49725
https://www.cve.org/CVERecord?id=CVE-2024-56641
https://www.cve.org/CVERecord?id=CVE-2022-49305
https://www.cve.org/CVERecord?id=CVE-2022-49044
https://www.cve.org/CVERecord?id=CVE-2024-50038
https://www.cve.org/CVERecord?id=CVE-2025-21957
https://www.cve.org/CVERecord?id=CVE-2024-50272
https://www.cve.org/CVERecord?id=CVE-2025-21764
https://www.cve.org/CVERecord?id=CVE-2022-49121
Applikationen: Linux

Originalnachricht

--===============0384149799675688810==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:01600-1
Release Date: 2025-05-20T11:49:39Z
Rating: important
References:

* bsc#1205495
* bsc#1230764
* bsc#1231103
* bsc#1231450
* bsc#1231910
* bsc#1233461
* bsc#1234209
* bsc#1235038
* bsc#1235526
* bsc#1235729
* bsc#1235870
* bsc#1236086
* bsc#1236111
* bsc#1237757
* bsc#1237839
* bsc#1237840
* bsc#1237845
* bsc#1237868
* bsc#1237873
* bsc#1237885
* bsc#1237911
* bsc#1237912
* bsc#1237926
* bsc#1237939
* bsc#1237950
* bsc#1237951
* bsc#1237954
* bsc#1237957
* bsc#1237979
* bsc#1237984
* bsc#1238000
* bsc#1238016
* bsc#1238022
* bsc#1238037
* bsc#1238092
* bsc#1238093
* bsc#1238097
* bsc#1238099
* bsc#1238138
* bsc#1238139
* bsc#1238155
* bsc#1238156
* bsc#1238233
* bsc#1238243
* bsc#1238244
* bsc#1238307
* bsc#1238335
* bsc#1238377
* bsc#1238398
* bsc#1238455
* bsc#1238497
* bsc#1238507
* bsc#1238537
* bsc#1238645
* bsc#1238714
* bsc#1238722
* bsc#1238737
* bsc#1238746
* bsc#1238760
* bsc#1238768
* bsc#1238803
* bsc#1238835
* bsc#1238838
* bsc#1238844
* bsc#1238893
* bsc#1238905
* bsc#1238911
* bsc#1238919
* bsc#1238930
* bsc#1238937
* bsc#1238938
* bsc#1238984
* bsc#1239070
* bsc#1239111
* bsc#1239112
* bsc#1239474
* bsc#1239994
* bsc#1240185
* bsc#1240243
* bsc#1240250
* bsc#1240270
* bsc#1240309
* bsc#1240583
* bsc#1240590
* bsc#1240701
* bsc#1240703
* bsc#1240709
* bsc#1240712
* bsc#1240714
* bsc#1240717
* bsc#1240739
* bsc#1240740
* bsc#1240742
* bsc#1240835
* bsc#1240942
* bsc#1240943
* bsc#1241145
* bsc#1241266
* bsc#1241347
* bsc#1241371
* bsc#1241373
* bsc#1241404
* bsc#1241405
* bsc#1241408
* bsc#1241458
* bsc#1241526
* bsc#1241601
* bsc#1241640
* bsc#1242778


Cross-References:

* CVE-2020-36789
* CVE-2021-47659
* CVE-2021-47668
* CVE-2021-47669
* CVE-2022-49044
* CVE-2022-49055
* CVE-2022-49060
* CVE-2022-49086
* CVE-2022-49111
* CVE-2022-49118
* CVE-2022-49121
* CVE-2022-49137
* CVE-2022-49171
* CVE-2022-49175
* CVE-2022-49176
* CVE-2022-49179
* CVE-2022-49188
* CVE-2022-49197
* CVE-2022-49205
* CVE-2022-49232
* CVE-2022-49290
* CVE-2022-49305
* CVE-2022-49325
* CVE-2022-49335
* CVE-2022-49351
* CVE-2022-49385
* CVE-2022-49390
* CVE-2022-49411
* CVE-2022-49442
* CVE-2022-49465
* CVE-2022-49478
* CVE-2022-49489
* CVE-2022-49504
* CVE-2022-49521
* CVE-2022-49525
* CVE-2022-49534
* CVE-2022-49535
* CVE-2022-49536
* CVE-2022-49537
* CVE-2022-49542
* CVE-2022-49561
* CVE-2022-49590
* CVE-2022-49658
* CVE-2022-49668
* CVE-2022-49693
* CVE-2022-49725
* CVE-2022-49728
* CVE-2022-49730
* CVE-2022-49749
* CVE-2022-49753
* CVE-2023-53023
* CVE-2023-53032
* CVE-2024-46763
* CVE-2024-46865
* CVE-2024-49994
* CVE-2024-50038
* CVE-2024-50272
* CVE-2024-52559
* CVE-2024-54683
* CVE-2024-56590
* CVE-2024-56641
* CVE-2024-57924
* CVE-2024-57980
* CVE-2024-57981
* CVE-2024-58005
* CVE-2024-58009
* CVE-2024-58017
* CVE-2024-58063
* CVE-2024-58093
* CVE-2025-21635
* CVE-2025-21735
* CVE-2025-21750
* CVE-2025-21758
* CVE-2025-21764
* CVE-2025-21768
* CVE-2025-21772
* CVE-2025-21779
* CVE-2025-21806
* CVE-2025-21862
* CVE-2025-21881
* CVE-2025-21909
* CVE-2025-21910
* CVE-2025-21926
* CVE-2025-21927
* CVE-2025-21931
* CVE-2025-21941
* CVE-2025-21948
* CVE-2025-21956
* CVE-2025-21957
* CVE-2025-21963
* CVE-2025-21964
* CVE-2025-21976
* CVE-2025-22004
* CVE-2025-22008
* CVE-2025-22010
* CVE-2025-22018
* CVE-2025-22053
* CVE-2025-22055
* CVE-2025-22060
* CVE-2025-22086
* CVE-2025-23131
* CVE-2025-37785


CVSS scores:

* CVE-2020-36789 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2020-36789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2020-36789 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47659 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2021-47659 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47668 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47668 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47669 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47669 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49044 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49044 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-49055 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49060 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49086 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49086 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49111 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49118 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49121 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49137 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49137 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49137 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49171 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49175 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49176 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49176 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49179 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49188 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49197 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49197 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-49205 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49232 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49232 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49290 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49290 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2022-49290 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49305 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49305 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49325 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49335 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49335 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49351 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49385 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49390 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49390 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49411 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49411 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49465 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49465 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49465 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49489 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49489 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49504 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49521 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49521 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49525 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49525 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49534 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49534 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49534 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49535 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49535 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49535 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49536 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49536 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49536 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49537 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49537 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49542 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49561 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49590 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2022-49590 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-49590 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49668 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49693 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49728 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49728 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-49728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49730 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49749 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49753 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53023 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46865 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49994 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50272 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-52559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54683 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-54683 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56590 ( SUSE ): 6.9
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56590 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56641 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57924 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58017 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58017 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-58017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58063 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58093 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21635 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21735 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21750 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21772 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21909 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21910 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21926 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21927 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21927 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21931 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21941 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21948 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21956 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-21956 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-21957 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21957 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21963 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21964 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21976 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-22004 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22004 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-22004 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-22008 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22010 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22018 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22053 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22055 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22055 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-22060 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22086 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23131 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-23131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37785 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37785 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-37785 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H


Affected Products:

* SUSE Linux Enterprise High Performance Computing 12 SP5
* SUSE Linux Enterprise Live Patching 12-SP5
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server 12 SP5 LTSS
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
* SUSE Linux Enterprise Server for SAP Applications 12 SP5



An update that solves 102 vulnerabilities and has seven security fixes can now
be installed.

## Description:

The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

* CVE-2021-47659: drm/plane: Move range check for format_count earlier
(bsc#1237839).
* CVE-2022-49044: dm integrity: fix memory corruption when tag_size is less
than digest size (bsc#1237840).
* CVE-2022-49055: drm/amdkfd: Check for potential null return of
kmalloc_array() (bsc#1237868).
* CVE-2022-49060: net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()
(bsc#1237845).
* CVE-2022-49086: net: openvswitch: fix leak of nested actions (bsc#1238037).
* CVE-2022-49111: Bluetooth: Fix use after free in hci_send_acl
(bsc#1237984).
* CVE-2022-49118: scsi: hisi_sas: Free irq vectors in order for v3 HW
(bsc#1237979).
* CVE-2022-49121: scsi: pm8001: Fix tag leaks on error (bsc#1237926).
* CVE-2022-49137: drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence
obj (bsc#1238155).
* CVE-2022-49175: PM: core: keep irq flags in device_pm_check_callbacks()
(bsc#1238099).
* CVE-2022-49176: bfq: fix use-after-free in bfq_dispatch_request
(bsc#1238097).
* CVE-2022-49179: block, bfq: do not move oom_bfqq (bsc#1238092).
* CVE-2022-49188: remoteproc: qcom_q6v5_mss: Fix some leaks in
q6v5_alloc_memory_region (bsc#1238138).
* CVE-2022-49197: af_netlink: Fix shift out of bounds in group mask
calculation (bsc#1238455).
* CVE-2022-49205: bpf, sockmap: Fix double uncharge the mem of sk_msg
(bsc#1238335).
* CVE-2022-49232: drm/amd/display: Fix a NULL pointer dereference in
amdgpu_dm_connector_add_common_modes() (bsc#1238139).
* CVE-2022-49290: mac80211: fix potential double free on mesh join
(bsc#1238156).
* CVE-2022-49305: drivers: staging: rtl8192u: Fix deadlock in
ieee80211_beacons_stop() (bsc#1238645).
* CVE-2022-49325: tcp: add accessors to read/set tp->snd_cwnd
(bsc#1238398).
* CVE-2022-49335: drm/amdgpu/cs: make commands with 0 chunks illegal
behaviour
(bsc#1238377).
* CVE-2022-49351: net: altera: Fix refcount leak in altera_tse_mdio_create
(bsc#1237939).
* CVE-2022-49385: driver: base: fix UAF when driver_attach failed
(bsc#1237951).
* CVE-2022-49390: macsec: fix UAF bug for real_dev (bsc#1238233).
* CVE-2022-49411: bfq: Make sure bfqg for which we are queueing requests is
online (bsc#1238307).
* CVE-2022-49442: drivers/base/node.c: fix compaction sysfs file leak
(bsc#1238243).
* CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled
(bsc#1238919).
* CVE-2022-49478: media: pvrusb2: fix array-index-out-of-bounds in
pvr2_i2c_core_init (bsc#1238000).
* CVE-2022-49489: drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use
after memory free during pm runtime resume (bsc#1238244).
* CVE-2022-49504: scsi: lpfc: Inhibit aborts if external loopback plug is
inserted (bsc#1238835).
* CVE-2022-49521: scsi: lpfc: Fix resource leak in
lpfc_sli4_send_seq_to_ulp()
(bsc#1238938).
* CVE-2022-49525: media: cx25821: Fix the warning when removing the module
(bsc#1238022).
* CVE-2022-49534: scsi: lpfc: Protect memory leak for NPIV ports sending
PLOGI_RJT (bsc#1238893).
* CVE-2022-49535: scsi: lpfc: Fix null pointer dereference after failing to
issue FLOGI and PLOGI (bsc#1238937).
* CVE-2022-49536: scsi: lpfc: Fix SCSI I/O completion and abort handler
deadlock (bsc#1238838).
* CVE-2022-49537: scsi: lpfc: Fix call trace observed during I/O with CMF
enabled (bsc#1238930).
* CVE-2022-49542: scsi: lpfc: Move cfg_log_verbose check before calling
lpfc_dmp_dbg() (bsc#1238722).
* CVE-2022-49561: netfilter: conntrack: re-fetch conntrack after insertion
(bsc#1238537).
* CVE-2022-49590: igmp: Fix data-races around sysctl_igmp_llm_reports
(bsc#1238844).
* CVE-2022-49658: bpf, selftests: Add verifier test case for
imm=0,umin=0,umax=1 scalar (bsc#1238803).
* CVE-2022-49668: PM / devfreq: exynos-ppmu: Fix refcount leak in
of_get_devfreq_events (bsc#1237957).
* CVE-2022-49693: drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf
(bsc#1237954).
* CVE-2022-49725: i40e: Fix call trace in setup_tx_descriptors (bsc#1238016).
* CVE-2022-49728: kABI workaround for changeing the variable length type to
size_t (bsc#1239111).
* CVE-2022-49730: scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO
is aborted (bsc#1239070).
* CVE-2022-49749: i2c: designware: use casting of u64 in clock multiplication
to avoid overflow (bsc#1240243).
* CVE-2022-49753: dmaengine: Fix double increment of client_count in
dma_chan_get() (bsc#1240250).
* CVE-2023-53023: net: nfc: Fix use-after-free in local_cleanup()
(bsc#1240309).
* CVE-2023-53032: netfilter: ipset: Fix overflow before widen in the
bitmap_ip_create() function (bsc#1240270).
* CVE-2024-49994: block: fix integer overflow in BLKSECDISCARD (bsc#1237757).
* CVE-2024-50038: netfilter: xtables: fix typo causing some targets not to
load on IPv6 (bsc#1231910).
* CVE-2024-50272: filemap: Fix bounds checking in filemap_read() (bsc#1233461
bsc#1234209).
* CVE-2024-52559: drm/msm/gem: prevent integer overflow in
msm_ioctl_gem_submit() (bsc#1238507).
* CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock
(bsc#1235729).
* CVE-2024-56590: skbuff: introduce skb_pull_data (bsc#1235038).
* CVE-2024-56641: net/smc: initialize close_work early to avoid warning
(bsc#1235526).
* CVE-2024-57924: fs: relax assertions on failure to encode file handles
(bsc#1236086).
* CVE-2024-57980: media: uvcvideo: Fix double free in error path
(bsc#1237911).
* CVE-2024-57981: usb: xhci: Fix NULL pointer dereference on certain command
aborts (bsc#1237912).
* CVE-2024-58005: tpm: Change to kvalloc() in eventlog/acpi.c (bsc#1237873).
* CVE-2024-58009: Bluetooth: L2CAP: handle NULL sock pointer in
l2cap_sock_alloc (bsc#1238760).
* CVE-2024-58017: printk: Fix signed integer overflow when defining
LOG_BUF_LEN_MAX (bsc#1237950 bsc#1239112).
* CVE-2024-58063: wifi: rtlwifi: fix memory leaks and invalid access at probe
error path (bsc#1238984).
* CVE-2024-58093: PCI/ASPM: Fix link state exit during switch upstream
function removal (bsc#1241347).
* CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using
current->nsproxy (bsc#1236111).
* CVE-2025-21735: NFC: nci: Add bounds checking in nci_hci_create_pipe()
(bsc#1238497).
* CVE-2025-21750: wifi: brcmfmac: Check the return value of
of_property_read_string_index() (bsc#1238905).
* CVE-2025-21758: ipv6: mcast: add RCU protection to mld_newpack()
(bsc#1238737).
* CVE-2025-21768: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6
lwtunnels (bsc#1238714).
* CVE-2025-21772: partitions: mac: fix handling of bogus partition table
(bsc#1238911).
* CVE-2025-21779: KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local
APIC
isn't in-kernel (bsc#1238768).
* CVE-2025-21806: net: let net.core.dev_weight always be non-zero
(bsc#1238746).
* CVE-2025-21862: drop_monitor: fix incorrect initialization order
(bsc#1239474).
* CVE-2025-21881: uprobes: Reject the shared zeropage in
uprobe_write_opcode()
(bsc#1240185).
* CVE-2025-21909: wifi: nl80211: reject cooked mode if it is set along with
other flags (bsc#1240590).
* CVE-2025-21910: wifi: cfg80211: regulatory: improve invalid hints checking
(bsc#1240583).
* CVE-2025-21926: net: gso: fix ownership in __udp_gso_segment (bsc#1240712).
* CVE-2025-21927: nvme-tcp: fix potential memory corruption in
nvme_tcp_recv_pdu() (bsc#1240714).
* CVE-2025-21931: hwpoison, memory_hotplug: lock folio before unmap
hwpoisoned
folio (bsc#1240709).
* CVE-2025-21941: drm/amd/display: Fix null check for
pipe_ctx->plane_state in
(bsc#1240701).
* CVE-2025-21948: HID: appleir: Fix potential NULL dereference at raw event
handle (bsc#1240703).
* CVE-2025-21956: drm/amd/display: Assign normalized_pix_clk when color depth
= 14 (bsc#1240739).
* CVE-2025-21957: scsi: qla1280: Fix kernel oops when debug level > 2
(bsc#1240742).
* CVE-2025-21963: cifs: Fix integer overflow while processing acdirmax mount
option (bsc#1240717).
* CVE-2025-21964: cifs: Fix integer overflow while processing acregmax mount
option (bsc#1240740).
* CVE-2025-21976: fbdev: hyperv_fb: Allow graceful removal of framebuffer
(bsc#1241145).
* CVE-2025-22004: net: atm: fix use after free in lec_send() (bsc#1240835).
* CVE-2025-22008: regulator: check that dummy regulator has been probed
before
using it (bsc#1240942).
* CVE-2025-22010: RDMA/hns: Fix soft lockup during bt pages loop
(bsc#1240943).
* CVE-2025-22018: atm: Fix NULL pointer dereference (bsc#1241266).
* CVE-2025-22053: net: ibmveth: make veth_pool_store stop hanging
(bsc#1241373).
* CVE-2025-22055: net: fix geneve_opt length integer overflow (bsc#1241371).
* CVE-2025-22060: net: mvpp2: Prevent parser TCAM memory corruption
(bsc#1241526).
* CVE-2025-22086: RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow
(bsc#1241458).
* CVE-2025-23131: dlm: prevent NPD when writing a positive value to
event_done
(bsc#1241601).
* CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640).

The following non-security bugs were fixed:

* Revert "ipv6: Fix signed integer overflow in __ip6_append_data"
* Revert "kABI workaround for changeing the variable length type to
size_t"
* audit: Send netlink ACK before setting connection in auditd_set
(bsc#1231450).
* brcmfmac: of: Use devm_kstrdup for board_type & check for errors
(bsc#1238905)
* brcmfmac: of: remove redundant variable len (bsc#1238905)
* cifs: Fix integer overflow while processing actimeo mount option (git-
fixes).
* fbdev: hyperv_fb: Simplify hvfb_putmem (git-fixes).
* net: Fix data-races around weight_p and dev_weight_[rt]x_bias (bsc#1238746)
* remoteproc: qcom_q6v5_mss: Extract mba/mpss from memory-region
(bsc#1238138)
* tpm, tpm_tis: Workaround failed command reception on Infineon devices
(bsc#1235870).
* tpm: tis: Double the timeout B to 4s (bsc#1235870).
* wifi: brcmfmac: use strreplace() in brcmf_of_probe() (bsc#1238905)
* x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778).
* x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778).
* x86/bpf: Call branch history clearing sequence on exit (bsc#1242778).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch
SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1600=1

* SUSE Linux Enterprise Live Patching 12-SP5
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1600=1

* SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1600=1

## Package List:

* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
* dlm-kmp-default-4.12.14-122.258.1
* gfs2-kmp-default-4.12.14-122.258.1
* cluster-md-kmp-default-4.12.14-122.258.1
* kernel-default-base-debuginfo-4.12.14-122.258.1
* cluster-md-kmp-default-debuginfo-4.12.14-122.258.1
* kernel-syms-4.12.14-122.258.1
* dlm-kmp-default-debuginfo-4.12.14-122.258.1
* kernel-default-debugsource-4.12.14-122.258.1
* kernel-default-devel-debuginfo-4.12.14-122.258.1
* kernel-default-base-4.12.14-122.258.1
* ocfs2-kmp-default-4.12.14-122.258.1
* kernel-default-debuginfo-4.12.14-122.258.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.258.1
* gfs2-kmp-default-debuginfo-4.12.14-122.258.1
* kernel-default-devel-4.12.14-122.258.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64)
* kernel-default-4.12.14-122.258.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
* kernel-devel-4.12.14-122.258.1
* kernel-macros-4.12.14-122.258.1
* kernel-source-4.12.14-122.258.1
* SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
* kernel-default-4.12.14-122.258.1
* SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
* kernel-default-kgraft-devel-4.12.14-122.258.1
* kgraft-patch-4_12_14-122_258-default-1-8.3.1
* kernel-default-kgraft-4.12.14-122.258.1
* kernel-default-debugsource-4.12.14-122.258.1
* kernel-default-debuginfo-4.12.14-122.258.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* dlm-kmp-default-4.12.14-122.258.1
* gfs2-kmp-default-4.12.14-122.258.1
* cluster-md-kmp-default-4.12.14-122.258.1
* kernel-default-base-debuginfo-4.12.14-122.258.1
* cluster-md-kmp-default-debuginfo-4.12.14-122.258.1
* kernel-syms-4.12.14-122.258.1
* dlm-kmp-default-debuginfo-4.12.14-122.258.1
* kernel-default-debugsource-4.12.14-122.258.1
* ocfs2-kmp-default-4.12.14-122.258.1
* kernel-default-base-4.12.14-122.258.1
* kernel-default-debuginfo-4.12.14-122.258.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.258.1
* gfs2-kmp-default-debuginfo-4.12.14-122.258.1
* kernel-default-devel-4.12.14-122.258.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-4.12.14-122.258.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
* kernel-devel-4.12.14-122.258.1
* kernel-macros-4.12.14-122.258.1
* kernel-source-4.12.14-122.258.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (s390x)
* kernel-default-man-4.12.14-122.258.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64)
* kernel-default-devel-debuginfo-4.12.14-122.258.1

## References:

* https://www.suse.com/security/cve/CVE-2020-36789.html
* https://www.suse.com/security/cve/CVE-2021-47659.html
* https://www.suse.com/security/cve/CVE-2021-47668.html
* https://www.suse.com/security/cve/CVE-2021-47669.html
* https://www.suse.com/security/cve/CVE-2022-49044.html
* https://www.suse.com/security/cve/CVE-2022-49055.html
* https://www.suse.com/security/cve/CVE-2022-49060.html
* https://www.suse.com/security/cve/CVE-2022-49086.html
* https://www.suse.com/security/cve/CVE-2022-49111.html
* https://www.suse.com/security/cve/CVE-2022-49118.html
* https://www.suse.com/security/cve/CVE-2022-49121.html
* https://www.suse.com/security/cve/CVE-2022-49137.html
* https://www.suse.com/security/cve/CVE-2022-49171.html
* https://www.suse.com/security/cve/CVE-2022-49175.html
* https://www.suse.com/security/cve/CVE-2022-49176.html
* https://www.suse.com/security/cve/CVE-2022-49179.html
* https://www.suse.com/security/cve/CVE-2022-49188.html
* https://www.suse.com/security/cve/CVE-2022-49197.html
* https://www.suse.com/security/cve/CVE-2022-49205.html
* https://www.suse.com/security/cve/CVE-2022-49232.html
* https://www.suse.com/security/cve/CVE-2022-49290.html
* https://www.suse.com/security/cve/CVE-2022-49305.html
* https://www.suse.com/security/cve/CVE-2022-49325.html
* https://www.suse.com/security/cve/CVE-2022-49335.html
* https://www.suse.com/security/cve/CVE-2022-49351.html
* https://www.suse.com/security/cve/CVE-2022-49385.html
* https://www.suse.com/security/cve/CVE-2022-49390.html
* https://www.suse.com/security/cve/CVE-2022-49411.html
* https://www.suse.com/security/cve/CVE-2022-49442.html
* https://www.suse.com/security/cve/CVE-2022-49465.html
* https://www.suse.com/security/cve/CVE-2022-49478.html
* https://www.suse.com/security/cve/CVE-2022-49489.html
* https://www.suse.com/security/cve/CVE-2022-49504.html
* https://www.suse.com/security/cve/CVE-2022-49521.html
* https://www.suse.com/security/cve/CVE-2022-49525.html
* https://www.suse.com/security/cve/CVE-2022-49534.html
* https://www.suse.com/security/cve/CVE-2022-49535.html
* https://www.suse.com/security/cve/CVE-2022-49536.html
* https://www.suse.com/security/cve/CVE-2022-49537.html
* https://www.suse.com/security/cve/CVE-2022-49542.html
* https://www.suse.com/security/cve/CVE-2022-49561.html
* https://www.suse.com/security/cve/CVE-2022-49590.html
* https://www.suse.com/security/cve/CVE-2022-49658.html
* https://www.suse.com/security/cve/CVE-2022-49668.html
* https://www.suse.com/security/cve/CVE-2022-49693.html
* https://www.suse.com/security/cve/CVE-2022-49725.html
* https://www.suse.com/security/cve/CVE-2022-49728.html
* https://www.suse.com/security/cve/CVE-2022-49730.html
* https://www.suse.com/security/cve/CVE-2022-49749.html
* https://www.suse.com/security/cve/CVE-2022-49753.html
* https://www.suse.com/security/cve/CVE-2023-53023.html
* https://www.suse.com/security/cve/CVE-2023-53032.html
* https://www.suse.com/security/cve/CVE-2024-46763.html
* https://www.suse.com/security/cve/CVE-2024-46865.html
* https://www.suse.com/security/cve/CVE-2024-49994.html
* https://www.suse.com/security/cve/CVE-2024-50038.html
* https://www.suse.com/security/cve/CVE-2024-50272.html
* https://www.suse.com/security/cve/CVE-2024-52559.html
* https://www.suse.com/security/cve/CVE-2024-54683.html
* https://www.suse.com/security/cve/CVE-2024-56590.html
* https://www.suse.com/security/cve/CVE-2024-56641.html
* https://www.suse.com/security/cve/CVE-2024-57924.html
* https://www.suse.com/security/cve/CVE-2024-57980.html
* https://www.suse.com/security/cve/CVE-2024-57981.html
* https://www.suse.com/security/cve/CVE-2024-58005.html
* https://www.suse.com/security/cve/CVE-2024-58009.html
* https://www.suse.com/security/cve/CVE-2024-58017.html
* https://www.suse.com/security/cve/CVE-2024-58063.html
* https://www.suse.com/security/cve/CVE-2024-58093.html
* https://www.suse.com/security/cve/CVE-2025-21635.html
* https://www.suse.com/security/cve/CVE-2025-21735.html
* https://www.suse.com/security/cve/CVE-2025-21750.html
* https://www.suse.com/security/cve/CVE-2025-21758.html
* https://www.suse.com/security/cve/CVE-2025-21764.html
* https://www.suse.com/security/cve/CVE-2025-21768.html
* https://www.suse.com/security/cve/CVE-2025-21772.html
* https://www.suse.com/security/cve/CVE-2025-21779.html
* https://www.suse.com/security/cve/CVE-2025-21806.html
* https://www.suse.com/security/cve/CVE-2025-21862.html
* https://www.suse.com/security/cve/CVE-2025-21881.html
* https://www.suse.com/security/cve/CVE-2025-21909.html
* https://www.suse.com/security/cve/CVE-2025-21910.html
* https://www.suse.com/security/cve/CVE-2025-21926.html
* https://www.suse.com/security/cve/CVE-2025-21927.html
* https://www.suse.com/security/cve/CVE-2025-21931.html
* https://www.suse.com/security/cve/CVE-2025-21941.html
* https://www.suse.com/security/cve/CVE-2025-21948.html
* https://www.suse.com/security/cve/CVE-2025-21956.html
* https://www.suse.com/security/cve/CVE-2025-21957.html
* https://www.suse.com/security/cve/CVE-2025-21963.html
* https://www.suse.com/security/cve/CVE-2025-21964.html
* https://www.suse.com/security/cve/CVE-2025-21976.html
* https://www.suse.com/security/cve/CVE-2025-22004.html
* https://www.suse.com/security/cve/CVE-2025-22008.html
* https://www.suse.com/security/cve/CVE-2025-22010.html
* https://www.suse.com/security/cve/CVE-2025-22018.html
* https://www.suse.com/security/cve/CVE-2025-22053.html
* https://www.suse.com/security/cve/CVE-2025-22055.html
* https://www.suse.com/security/cve/CVE-2025-22060.html
* https://www.suse.com/security/cve/CVE-2025-22086.html
* https://www.suse.com/security/cve/CVE-2025-23131.html
* https://www.suse.com/security/cve/CVE-2025-37785.html
* https://bugzilla.suse.com/show_bug.cgi?id=1205495
* https://bugzilla.suse.com/show_bug.cgi?id=1230764
* https://bugzilla.suse.com/show_bug.cgi?id=1231103
* https://bugzilla.suse.com/show_bug.cgi?id=1231450
* https://bugzilla.suse.com/show_bug.cgi?id=1231910
* https://bugzilla.suse.com/show_bug.cgi?id=1233461
* https://bugzilla.suse.com/show_bug.cgi?id=1234209
* https://bugzilla.suse.com/show_bug.cgi?id=1235038
* https://bugzilla.suse.com/show_bug.cgi?id=1235526
* https://bugzilla.suse.com/show_bug.cgi?id=1235729
* https://bugzilla.suse.com/show_bug.cgi?id=1235870
* https://bugzilla.suse.com/show_bug.cgi?id=1236086
* https://bugzilla.suse.com/show_bug.cgi?id=1236111
* https://bugzilla.suse.com/show_bug.cgi?id=1237757
* https://bugzilla.suse.com/show_bug.cgi?id=1237839
* https://bugzilla.suse.com/show_bug.cgi?id=1237840
* https://bugzilla.suse.com/show_bug.cgi?id=1237845
* https://bugzilla.suse.com/show_bug.cgi?id=1237868
* https://bugzilla.suse.com/show_bug.cgi?id=1237873
* https://bugzilla.suse.com/show_bug.cgi?id=1237885
* https://bugzilla.suse.com/show_bug.cgi?id=1237911
* https://bugzilla.suse.com/show_bug.cgi?id=1237912
* https://bugzilla.suse.com/show_bug.cgi?id=1237926
* https://bugzilla.suse.com/show_bug.cgi?id=1237939
* https://bugzilla.suse.com/show_bug.cgi?id=1237950
* https://bugzilla.suse.com/show_bug.cgi?id=1237951
* https://bugzilla.suse.com/show_bug.cgi?id=1237954
* https://bugzilla.suse.com/show_bug.cgi?id=1237957
* https://bugzilla.suse.com/show_bug.cgi?id=1237979
* https://bugzilla.suse.com/show_bug.cgi?id=1237984
* https://bugzilla.suse.com/show_bug.cgi?id=1238000
* https://bugzilla.suse.com/show_bug.cgi?id=1238016
* https://bugzilla.suse.com/show_bug.cgi?id=1238022
* https://bugzilla.suse.com/show_bug.cgi?id=1238037
* https://bugzilla.suse.com/show_bug.cgi?id=1238092
* https://bugzilla.suse.com/show_bug.cgi?id=1238093
* https://bugzilla.suse.com/show_bug.cgi?id=1238097
* https://bugzilla.suse.com/show_bug.cgi?id=1238099
* https://bugzilla.suse.com/show_bug.cgi?id=1238138
* https://bugzilla.suse.com/show_bug.cgi?id=1238139
* https://bugzilla.suse.com/show_bug.cgi?id=1238155
* https://bugzilla.suse.com/show_bug.cgi?id=1238156
* https://bugzilla.suse.com/show_bug.cgi?id=1238233
* https://bugzilla.suse.com/show_bug.cgi?id=1238243
* https://bugzilla.suse.com/show_bug.cgi?id=1238244
* https://bugzilla.suse.com/show_bug.cgi?id=1238307
* https://bugzilla.suse.com/show_bug.cgi?id=1238335
* https://bugzilla.suse.com/show_bug.cgi?id=1238377
* https://bugzilla.suse.com/show_bug.cgi?id=1238398
* https://bugzilla.suse.com/show_bug.cgi?id=1238455
* https://bugzilla.suse.com/show_bug.cgi?id=1238497
* https://bugzilla.suse.com/show_bug.cgi?id=1238507
* https://bugzilla.suse.com/show_bug.cgi?id=1238537
* https://bugzilla.suse.com/show_bug.cgi?id=1238645
* https://bugzilla.suse.com/show_bug.cgi?id=1238714
* https://bugzilla.suse.com/show_bug.cgi?id=1238722
* https://bugzilla.suse.com/show_bug.cgi?id=1238737
* https://bugzilla.suse.com/show_bug.cgi?id=1238746
* https://bugzilla.suse.com/show_bug.cgi?id=1238760
* https://bugzilla.suse.com/show_bug.cgi?id=1238768
* https://bugzilla.suse.com/show_bug.cgi?id=1238803
* https://bugzilla.suse.com/show_bug.cgi?id=1238835
* https://bugzilla.suse.com/show_bug.cgi?id=1238838
* https://bugzilla.suse.com/show_bug.cgi?id=1238844
* https://bugzilla.suse.com/show_bug.cgi?id=1238893
* https://bugzilla.suse.com/show_bug.cgi?id=1238905
* https://bugzilla.suse.com/show_bug.cgi?id=1238911
* https://bugzilla.suse.com/show_bug.cgi?id=1238919
* https://bugzilla.suse.com/show_bug.cgi?id=1238930
* https://bugzilla.suse.com/show_bug.cgi?id=1238937
* https://bugzilla.suse.com/show_bug.cgi?id=1238938
* https://bugzilla.suse.com/show_bug.cgi?id=1238984
* https://bugzilla.suse.com/show_bug.cgi?id=1239070
* https://bugzilla.suse.com/show_bug.cgi?id=1239111
* https://bugzilla.suse.com/show_bug.cgi?id=1239112
* https://bugzilla.suse.com/show_bug.cgi?id=1239474
* https://bugzilla.suse.com/show_bug.cgi?id=1239994
* https://bugzilla.suse.com/show_bug.cgi?id=1240185
* https://bugzilla.suse.com/show_bug.cgi?id=1240243
* https://bugzilla.suse.com/show_bug.cgi?id=1240250
* https://bugzilla.suse.com/show_bug.cgi?id=1240270
* https://bugzilla.suse.com/show_bug.cgi?id=1240309
* https://bugzilla.suse.com/show_bug.cgi?id=1240583
* https://bugzilla.suse.com/show_bug.cgi?id=1240590
* https://bugzilla.suse.com/show_bug.cgi?id=1240701
* https://bugzilla.suse.com/show_bug.cgi?id=1240703
* https://bugzilla.suse.com/show_bug.cgi?id=1240709
* https://bugzilla.suse.com/show_bug.cgi?id=1240712
* https://bugzilla.suse.com/show_bug.cgi?id=1240714
* https://bugzilla.suse.com/show_bug.cgi?id=1240717
* https://bugzilla.suse.com/show_bug.cgi?id=1240739
* https://bugzilla.suse.com/show_bug.cgi?id=1240740
* https://bugzilla.suse.com/show_bug.cgi?id=1240742
* https://bugzilla.suse.com/show_bug.cgi?id=1240835
* https://bugzilla.suse.com/show_bug.cgi?id=1240942
* https://bugzilla.suse.com/show_bug.cgi?id=1240943
* https://bugzilla.suse.com/show_bug.cgi?id=1241145
* https://bugzilla.suse.com/show_bug.cgi?id=1241266
* https://bugzilla.suse.com/show_bug.cgi?id=1241347
* https://bugzilla.suse.com/show_bug.cgi?id=1241371
* https://bugzilla.suse.com/show_bug.cgi?id=1241373
* https://bugzilla.suse.com/show_bug.cgi?id=1241404
* https://bugzilla.suse.com/show_bug.cgi?id=1241405
* https://bugzilla.suse.com/show_bug.cgi?id=1241408
* https://bugzilla.suse.com/show_bug.cgi?id=1241458
* https://bugzilla.suse.com/show_bug.cgi?id=1241526
* https://bugzilla.suse.com/show_bug.cgi?id=1241601
* https://bugzilla.suse.com/show_bug.cgi?id=1241640
* https://bugzilla.suse.com/show_bug.cgi?id=1242778


--===============0384149799675688810==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for the Linux Kernel</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2025:01600-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2025-05-20T11:49:39Z</td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1205495">bsc#1205495</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230764">bsc#1230764</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231103">bsc#1231103</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231450">bsc#1231450</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231910">bsc#1231910</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233461">bsc#1233461</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234209">bsc#1234209</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235038">bsc#1235038</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235526">bsc#1235526</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235729">bsc#1235729</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235870">bsc#1235870</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236086">bsc#1236086</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236111">bsc#1236111</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237757">bsc#1237757</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237839">bsc#1237839</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237840">bsc#1237840</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237845">bsc#1237845</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237868">bsc#1237868</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237873">bsc#1237873</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237885">bsc#1237885</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237911">bsc#1237911</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237912">bsc#1237912</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237926">bsc#1237926</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237939">bsc#1237939</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237950">bsc#1237950</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237951">bsc#1237951</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237954">bsc#1237954</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237957">bsc#1237957</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237979">bsc#1237979</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237984">bsc#1237984</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238000">bsc#1238000</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238016">bsc#1238016</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238022">bsc#1238022</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238037">bsc#1238037</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238092">bsc#1238092</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238093">bsc#1238093</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238097">bsc#1238097</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238099">bsc#1238099</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238138">bsc#1238138</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238139">bsc#1238139</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238155">bsc#1238155</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238156">bsc#1238156</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238233">bsc#1238233</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238243">bsc#1238243</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238244">bsc#1238244</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238307">bsc#1238307</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238335">bsc#1238335</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238377">bsc#1238377</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238398">bsc#1238398</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238455">bsc#1238455</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238497">bsc#1238497</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238507">bsc#1238507</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238537">bsc#1238537</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238645">bsc#1238645</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238714">bsc#1238714</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238722">bsc#1238722</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238737">bsc#1238737</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238746">bsc#1238746</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238760">bsc#1238760</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238768">bsc#1238768</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238803">bsc#1238803</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238835">bsc#1238835</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238838">bsc#1238838</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238844">bsc#1238844</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238893">bsc#1238893</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238905">bsc#1238905</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238911">bsc#1238911</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238919">bsc#1238919</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238930">bsc#1238930</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238937">bsc#1238937</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238938">bsc#1238938</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238984">bsc#1238984</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239070">bsc#1239070</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239111">bsc#1239111</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239112">bsc#1239112</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239474">bsc#1239474</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239994">bsc#1239994</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240185">bsc#1240185</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240243">bsc#1240243</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240250">bsc#1240250</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240270">bsc#1240270</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240309">bsc#1240309</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240583">bsc#1240583</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240590">bsc#1240590</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240701">bsc#1240701</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240703">bsc#1240703</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240709">bsc#1240709</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240712">bsc#1240712</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240714">bsc#1240714</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240717">bsc#1240717</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240739">bsc#1240739</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240740">bsc#1240740</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240742">bsc#1240742</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240835">bsc#1240835</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240942">bsc#1240942</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240943">bsc#1240943</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241145">bsc#1241145</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241266">bsc#1241266</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241347">bsc#1241347</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241371">bsc#1241371</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241373">bsc#1241373</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241404">bsc#1241404</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241405">bsc#1241405</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241408">bsc#1241408</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241458">bsc#1241458</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241526">bsc#1241526</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241601">bsc#1241601</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241640">bsc#1241640</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1242778">bsc#1242778</a>
</li>


</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2020-36789.html">CVE-2020-36789</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47659.html">CVE-2021-47659</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47668.html">CVE-2021-47668</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-47669.html">CVE-2021-47669</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49044.html">CVE-2022-49044</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49055.html">CVE-2022-49055</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49060.html">CVE-2022-49060</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49086.html">CVE-2022-49086</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49111.html">CVE-2022-49111</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49118.html">CVE-2022-49118</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49121.html">CVE-2022-49121</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49137.html">CVE-2022-49137</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49171.html">CVE-2022-49171</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49175.html">CVE-2022-49175</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49176.html">CVE-2022-49176</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49179.html">CVE-2022-49179</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49188.html">CVE-2022-49188</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49197.html">CVE-2022-49197</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49205.html">CVE-2022-49205</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49232.html">CVE-2022-49232</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49290.html">CVE-2022-49290</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49305.html">CVE-2022-49305</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49325.html">CVE-2022-49325</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49335.html">CVE-2022-49335</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49351.html">CVE-2022-49351</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49385.html">CVE-2022-49385</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49390.html">CVE-2022-49390</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49411.html">CVE-2022-49411</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49442.html">CVE-2022-49442</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49465.html">CVE-2022-49465</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49478.html">CVE-2022-49478</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49489.html">CVE-2022-49489</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49504.html">CVE-2022-49504</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49521.html">CVE-2022-49521</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49525.html">CVE-2022-49525</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49534.html">CVE-2022-49534</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49535.html">CVE-2022-49535</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49536.html">CVE-2022-49536</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49537.html">CVE-2022-49537</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49542.html">CVE-2022-49542</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49561.html">CVE-2022-49561</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49590.html">CVE-2022-49590</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49658.html">CVE-2022-49658</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49668.html">CVE-2022-49668</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49693.html">CVE-2022-49693</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49725.html">CVE-2022-49725</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49728.html">CVE-2022-49728</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49730.html">CVE-2022-49730</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49749.html">CVE-2022-49749</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49753.html">CVE-2022-49753</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-53023.html">CVE-2023-53023</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-53032.html">CVE-2023-53032</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46763.html">CVE-2024-46763</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-46865.html">CVE-2024-46865</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-49994.html">CVE-2024-49994</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50038.html">CVE-2024-50038</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50272.html">CVE-2024-50272</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-52559.html">CVE-2024-52559</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-54683.html">CVE-2024-54683</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56590.html">CVE-2024-56590</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56641.html">CVE-2024-56641</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57924.html">CVE-2024-57924</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57980.html">CVE-2024-57980</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57981.html">CVE-2024-57981</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58005.html">CVE-2024-58005</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58009.html">CVE-2024-58009</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58017.html">CVE-2024-58017</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58063.html">CVE-2024-58063</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58093.html">CVE-2024-58093</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21635.html">CVE-2025-21635</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21735.html">CVE-2025-21735</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21750.html">CVE-2025-21750</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21758.html">CVE-2025-21758</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21764.html">CVE-2025-21764</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21768.html">CVE-2025-21768</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21772.html">CVE-2025-21772</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21779.html">CVE-2025-21779</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21806.html">CVE-2025-21806</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21862.html">CVE-2025-21862</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21881.html">CVE-2025-21881</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21909.html">CVE-2025-21909</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21910.html">CVE-2025-21910</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21926.html">CVE-2025-21926</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21927.html">CVE-2025-21927</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21931.html">CVE-2025-21931</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21941.html">CVE-2025-21941</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21948.html">CVE-2025-21948</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21956.html">CVE-2025-21956</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21957.html">CVE-2025-21957</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21963.html">CVE-2025-21963</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21964.html">CVE-2025-21964</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21976.html">CVE-2025-21976</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-22004.html">CVE-2025-22004</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-22008.html">CVE-2025-22008</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-22010.html">CVE-2025-22010</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-22018.html">CVE-2025-22018</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-22053.html">CVE-2025-22053</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-22055.html">CVE-2025-22055</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-22060.html">CVE-2025-22060</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-22086.html">CVE-2025-22086</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-23131.html">CVE-2025-23131</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-37785.html">CVE-2025-37785</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2020-36789</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2020-36789</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2020-36789</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47659</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47659</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47668</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47668</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47668</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47669</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47669</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-47669</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49044</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49044</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49055</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49055</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49055</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49060</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49060</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49060</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49086</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49086</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49111</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49111</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49111</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49118</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49118</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49121</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49121</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49137</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49137</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49137</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49171</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49171</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49175</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49175</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49176</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49176</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49176</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49179</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49179</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49179</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49188</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49188</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49197</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.6</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49197</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49205</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49205</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49232</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49232</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49232</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49290</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49290</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49290</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49305</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49305</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49305</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49325</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49325</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49335</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49335</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49335</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49351</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49351</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49385</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49385</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49390</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49390</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49411</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49411</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49442</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49465</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49465</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49465</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49478</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49489</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49489</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49504</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49504</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49521</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49521</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49525</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49525</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49534</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49534</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49534</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49535</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49535</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49535</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49536</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49536</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49536</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49537</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49537</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49542</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49542</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49542</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49561</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49590</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49590</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49590</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49658</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49668</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49668</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49693</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49693</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49725</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49728</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49728</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49728</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49730</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49730</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49730</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49749</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49749</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49749</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49753</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49753</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49753</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53023</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53023</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53032</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46763</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46763</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46865</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-46865</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49994</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49994</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-49994</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50038</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50038</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50272</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50272</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-52559</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-52559</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-54683</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-54683</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-54683</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56590</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56590</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56641</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56641</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57924</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57924</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57980</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57980</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57981</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57981</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58005</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58005</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58009</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58017</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58017</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58017</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58063</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58063</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58093</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58093</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21635</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21635</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21735</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21735</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21750</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21750</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21758</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21764</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21764</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21768</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21772</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21772</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21779</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21779</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21806</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21862</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21862</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21881</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21909</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21909</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21910</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21910</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21926</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21926</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21927</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21927</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21927</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21931</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21931</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21941</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21941</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21941</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21948</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21948</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21948</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21956</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21956</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21957</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21957</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21957</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21963</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21963</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21963</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21964</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21964</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21964</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21976</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">2.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-22004</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-22004</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-22004</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-22008</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-22008</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-22010</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-22010</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-22010</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-22018</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-22018</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-22018</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-22053</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-22053</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-22055</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-22055</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-22060</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-22060</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-22086</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-22086</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-23131</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-23131</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-37785</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-37785</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-37785</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 12 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Live Patching 12-SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 12 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 12 SP5 LTSS</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 12 SP5 LTSS Extended Security</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 12 SP5</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves 102 vulnerabilities and has seven security
fixes can now be installed.</p>





<h2>Description:</h2>

<p>The SUSE Linux Enterprise 12 SP5 kernel was updated to receive
various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2021-47659: drm/plane: Move range check for format_count earlier
(bsc#1237839).</li>
<li>CVE-2022-49044: dm integrity: fix memory corruption when tag_size is
less than digest size (bsc#1237840).</li>
<li>CVE-2022-49055: drm/amdkfd: Check for potential null return of
kmalloc_array() (bsc#1237868).</li>
<li>CVE-2022-49060: net/smc: Fix NULL pointer dereference in
smc_pnet_find_ib() (bsc#1237845).</li>
<li>CVE-2022-49086: net: openvswitch: fix leak of nested actions
(bsc#1238037).</li>
<li>CVE-2022-49111: Bluetooth: Fix use after free in hci_send_acl
(bsc#1237984).</li>
<li>CVE-2022-49118: scsi: hisi_sas: Free irq vectors in order for v3 HW
(bsc#1237979).</li>
<li>CVE-2022-49121: scsi: pm8001: Fix tag leaks on error
(bsc#1237926).</li>
<li>CVE-2022-49137: drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a
dma_fence obj (bsc#1238155).</li>
<li>CVE-2022-49175: PM: core: keep irq flags in
device_pm_check_callbacks() (bsc#1238099).</li>
<li>CVE-2022-49176: bfq: fix use-after-free in bfq_dispatch_request
(bsc#1238097).</li>
<li>CVE-2022-49179: block, bfq: do not move oom_bfqq
(bsc#1238092).</li>
<li>CVE-2022-49188: remoteproc: qcom_q6v5_mss: Fix some leaks in
q6v5_alloc_memory_region (bsc#1238138).</li>
<li>CVE-2022-49197: af_netlink: Fix shift out of bounds in group mask
calculation (bsc#1238455).</li>
<li>CVE-2022-49205: bpf, sockmap: Fix double uncharge the mem of sk_msg
(bsc#1238335).</li>
<li>CVE-2022-49232: drm/amd/display: Fix a NULL pointer dereference in
amdgpu_dm_connector_add_common_modes() (bsc#1238139).</li>
<li>CVE-2022-49290: mac80211: fix potential double free on mesh join
(bsc#1238156).</li>
<li>CVE-2022-49305: drivers: staging: rtl8192u: Fix deadlock in
ieee80211_beacons_stop() (bsc#1238645).</li>
<li>CVE-2022-49325: tcp: add accessors to read/set tp-&gt;snd_cwnd
(bsc#1238398).</li>
<li>CVE-2022-49335: drm/amdgpu/cs: make commands with 0 chunks illegal
behaviour (bsc#1238377).</li>
<li>CVE-2022-49351: net: altera: Fix refcount leak in
altera_tse_mdio_create (bsc#1237939).</li>
<li>CVE-2022-49385: driver: base: fix UAF when driver_attach failed
(bsc#1237951).</li>
<li>CVE-2022-49390: macsec: fix UAF bug for real_dev
(bsc#1238233).</li>
<li>CVE-2022-49411: bfq: Make sure bfqg for which we are queueing
requests is online (bsc#1238307).</li>
<li>CVE-2022-49442: drivers/base/node.c: fix compaction sysfs file leak
(bsc#1238243).</li>
<li>CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been
throttled (bsc#1238919).</li>
<li>CVE-2022-49478: media: pvrusb2: fix array-index-out-of-bounds in
pvr2_i2c_core_init (bsc#1238000).</li>
<li>CVE-2022-49489: drm/msm/disp/dpu1: set vbif hw config to NULL to
avoid use after memory free during pm runtime resume (bsc#1238244).</li>
<li>CVE-2022-49504: scsi: lpfc: Inhibit aborts if external loopback plug
is inserted (bsc#1238835).</li>
<li>CVE-2022-49521: scsi: lpfc: Fix resource leak in
lpfc_sli4_send_seq_to_ulp() (bsc#1238938).</li>
<li>CVE-2022-49525: media: cx25821: Fix the warning when removing the
module (bsc#1238022).</li>
<li>CVE-2022-49534: scsi: lpfc: Protect memory leak for NPIV ports
sending PLOGI_RJT (bsc#1238893).</li>
<li>CVE-2022-49535: scsi: lpfc: Fix null pointer dereference after
failing to issue FLOGI and PLOGI (bsc#1238937).</li>
<li>CVE-2022-49536: scsi: lpfc: Fix SCSI I/O completion and abort handler
deadlock (bsc#1238838).</li>
<li>CVE-2022-49537: scsi: lpfc: Fix call trace observed during I/O with
CMF enabled (bsc#1238930).</li>
<li>CVE-2022-49542: scsi: lpfc: Move cfg_log_verbose check before calling
lpfc_dmp_dbg() (bsc#1238722).</li>
<li>CVE-2022-49561: netfilter: conntrack: re-fetch conntrack after
insertion (bsc#1238537).</li>
<li>CVE-2022-49590: igmp: Fix data-races around sysctl_igmp_llm_reports
(bsc#1238844).</li>
<li>CVE-2022-49658: bpf, selftests: Add verifier test case for
imm=0,umin=0,umax=1 scalar (bsc#1238803).</li>
<li>CVE-2022-49668: PM / devfreq: exynos-ppmu: Fix refcount leak in
of_get_devfreq_events (bsc#1237957).</li>
<li>CVE-2022-49693: drm/msm/mdp4: Fix refcount leak in
mdp4_modeset_init_intf (bsc#1237954).</li>
<li>CVE-2022-49725: i40e: Fix call trace in setup_tx_descriptors
(bsc#1238016).</li>
<li>CVE-2022-49728: kABI workaround for changeing the variable length
type to size_t (bsc#1239111).</li>
<li>CVE-2022-49730: scsi: lpfc: Resolve NULL ptr dereference after an ELS
LOGO is aborted (bsc#1239070).</li>
<li>CVE-2022-49749: i2c: designware: use casting of u64 in clock
multiplication to avoid overflow (bsc#1240243).</li>
<li>CVE-2022-49753: dmaengine: Fix double increment of client_count in
dma_chan_get() (bsc#1240250).</li>
<li>CVE-2023-53023: net: nfc: Fix use-after-free in local_cleanup()
(bsc#1240309).</li>
<li>CVE-2023-53032: netfilter: ipset: Fix overflow before widen in the
bitmap_ip_create() function (bsc#1240270).</li>
<li>CVE-2024-49994: block: fix integer overflow in BLKSECDISCARD
(bsc#1237757).</li>
<li>CVE-2024-50038: netfilter: xtables: fix typo causing some targets not
to load on IPv6 (bsc#1231910).</li>
<li>CVE-2024-50272: filemap: Fix bounds checking in filemap_read()
(bsc#1233461 bsc#1234209).</li>
<li>CVE-2024-52559: drm/msm/gem: prevent integer overflow in
msm_ioctl_gem_submit() (bsc#1238507).</li>
<li>CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock
(bsc#1235729).</li>
<li>CVE-2024-56590: skbuff: introduce skb_pull_data
(bsc#1235038).</li>
<li>CVE-2024-56641: net/smc: initialize close_work early to avoid warning
(bsc#1235526).</li>
<li>CVE-2024-57924: fs: relax assertions on failure to encode file
handles (bsc#1236086).</li>
<li>CVE-2024-57980: media: uvcvideo: Fix double free in error path
(bsc#1237911).</li>
<li>CVE-2024-57981: usb: xhci: Fix NULL pointer dereference on certain
command aborts (bsc#1237912).</li>
<li>CVE-2024-58005: tpm: Change to kvalloc() in eventlog/acpi.c
(bsc#1237873).</li>
<li>CVE-2024-58009: Bluetooth: L2CAP: handle NULL sock pointer in
l2cap_sock_alloc (bsc#1238760).</li>
<li>CVE-2024-58017: printk: Fix signed integer overflow when defining
LOG_BUF_LEN_MAX (bsc#1237950 bsc#1239112).</li>
<li>CVE-2024-58063: wifi: rtlwifi: fix memory leaks and invalid access at
probe error path (bsc#1238984).</li>
<li>CVE-2024-58093: PCI/ASPM: Fix link state exit during switch upstream
function removal (bsc#1241347).</li>
<li>CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using
current-&gt;nsproxy (bsc#1236111).</li>
<li>CVE-2025-21735: NFC: nci: Add bounds checking in
nci_hci_create_pipe() (bsc#1238497).</li>
<li>CVE-2025-21750: wifi: brcmfmac: Check the return value of
of_property_read_string_index() (bsc#1238905).</li>
<li>CVE-2025-21758: ipv6: mcast: add RCU protection to mld_newpack()
(bsc#1238737).</li>
<li>CVE-2025-21768: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6
lwtunnels (bsc#1238714).</li>
<li>CVE-2025-21772: partitions: mac: fix handling of bogus partition
table (bsc#1238911).</li>
<li>CVE-2025-21779: KVM: x86: Reject Hyper-V&#x27;s SEND_IPI
hypercalls if local APIC isn&#x27;t in-kernel (bsc#1238768).</li>
<li>CVE-2025-21806: net: let net.core.dev_weight always be non-zero
(bsc#1238746).</li>
<li>CVE-2025-21862: drop_monitor: fix incorrect initialization order
(bsc#1239474).</li>
<li>CVE-2025-21881: uprobes: Reject the shared zeropage in
uprobe_write_opcode() (bsc#1240185).</li>
<li>CVE-2025-21909: wifi: nl80211: reject cooked mode if it is set along
with other flags (bsc#1240590).</li>
<li>CVE-2025-21910: wifi: cfg80211: regulatory: improve invalid hints
checking (bsc#1240583).</li>
<li>CVE-2025-21926: net: gso: fix ownership in __udp_gso_segment
(bsc#1240712).</li>
<li>CVE-2025-21927: nvme-tcp: fix potential memory corruption in
nvme_tcp_recv_pdu() (bsc#1240714).</li>
<li>CVE-2025-21931: hwpoison, memory_hotplug: lock folio before unmap
hwpoisoned folio (bsc#1240709).</li>
<li>CVE-2025-21941: drm/amd/display: Fix null check for
pipe_ctx-&gt;plane_state in (bsc#1240701).</li>
<li>CVE-2025-21948: HID: appleir: Fix potential NULL dereference at raw
event handle (bsc#1240703).</li>
<li>CVE-2025-21956: drm/amd/display: Assign normalized_pix_clk when color
depth = 14 (bsc#1240739).</li>
<li>CVE-2025-21957: scsi: qla1280: Fix kernel oops when debug level
&gt; 2 (bsc#1240742).</li>
<li>CVE-2025-21963: cifs: Fix integer overflow while processing acdirmax
mount option (bsc#1240717).</li>
<li>CVE-2025-21964: cifs: Fix integer overflow while processing acregmax
mount option (bsc#1240740).</li>
<li>CVE-2025-21976: fbdev: hyperv_fb: Allow graceful removal of
framebuffer (bsc#1241145).</li>
<li>CVE-2025-22004: net: atm: fix use after free in lec_send()
(bsc#1240835).</li>
<li>CVE-2025-22008: regulator: check that dummy regulator has been probed
before using it (bsc#1240942).</li>
<li>CVE-2025-22010: RDMA/hns: Fix soft lockup during bt pages loop
(bsc#1240943).</li>
<li>CVE-2025-22018: atm: Fix NULL pointer dereference
(bsc#1241266).</li>
<li>CVE-2025-22053: net: ibmveth: make veth_pool_store stop hanging
(bsc#1241373).</li>
<li>CVE-2025-22055: net: fix geneve_opt length integer overflow
(bsc#1241371).</li>
<li>CVE-2025-22060: net: mvpp2: Prevent parser TCAM memory corruption
(bsc#1241526).</li>
<li>CVE-2025-22086: RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow
(bsc#1241458).</li>
<li>CVE-2025-23131: dlm: prevent NPD when writing a positive value to
event_done (bsc#1241601).</li>
<li>CVE-2025-37785: ext4: fix OOB read when checking dotdot dir
(bsc#1241640).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>Revert &quot;ipv6: Fix signed integer overflow in
__ip6_append_data&quot;</li>
<li>Revert &quot;kABI workaround for changeing the variable length
type to size_t&quot;</li>
<li>audit: Send netlink ACK before setting connection in auditd_set
(bsc#1231450).</li>
<li>brcmfmac: of: Use devm_kstrdup for board_type &amp; check for
errors (bsc#1238905)</li>
<li>brcmfmac: of: remove redundant variable len (bsc#1238905)</li>
<li>cifs: Fix integer overflow while processing actimeo mount option
(git-fixes).</li>
<li>fbdev: hyperv_fb: Simplify hvfb_putmem (git-fixes).</li>
<li>net: Fix data-races around weight_p and dev_weight_[rt]x_bias
(bsc#1238746)</li>
<li>remoteproc: qcom_q6v5_mss: Extract mba/mpss from memory-region
(bsc#1238138)</li>
<li>tpm, tpm_tis: Workaround failed command reception on Infineon devices
(bsc#1235870).</li>
<li>tpm: tis: Double the timeout B to 4s (bsc#1235870).</li>
<li>wifi: brcmfmac: use strreplace() in brcmf_of_probe()
(bsc#1238905)</li>
<li>x86/bhi: Do not set BHI_DIS_S in 32-bit mode
(bsc#1242778).</li>
<li>x86/bpf: Add IBHF call at end of classic BPF
(bsc#1242778).</li>
<li>x86/bpf: Call branch history clearing sequence on exit
(bsc#1242778).</li>
</ul>




<h2>Special Instructions and Notes:</h2>
<ul>


<li>Please reboot the system after installing this
update.</li>


</ul>


<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security


<br/>
<code>zypper in -t patch
SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1600=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Live Patching 12-SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-Live-Patching-12-SP5-2025-1600=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server 12 SP5 LTSS


<br/>
<code>zypper in -t patch
SUSE-SLE-SERVER-12-SP5-LTSS-2025-1600=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
(x86_64)
<ul>


<li>dlm-kmp-default-4.12.14-122.258.1</li>


<li>gfs2-kmp-default-4.12.14-122.258.1</li>


<li>cluster-md-kmp-default-4.12.14-122.258.1</li>


<li>kernel-default-base-debuginfo-4.12.14-122.258.1</li>


<li>cluster-md-kmp-default-debuginfo-4.12.14-122.258.1</li>

<li>kernel-syms-4.12.14-122.258.1</li>


<li>dlm-kmp-default-debuginfo-4.12.14-122.258.1</li>


<li>kernel-default-debugsource-4.12.14-122.258.1</li>


<li>kernel-default-devel-debuginfo-4.12.14-122.258.1</li>


<li>kernel-default-base-4.12.14-122.258.1</li>


<li>ocfs2-kmp-default-4.12.14-122.258.1</li>


<li>kernel-default-debuginfo-4.12.14-122.258.1</li>


<li>ocfs2-kmp-default-debuginfo-4.12.14-122.258.1</li>


<li>gfs2-kmp-default-debuginfo-4.12.14-122.258.1</li>


<li>kernel-default-devel-4.12.14-122.258.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
(nosrc x86_64)
<ul>


<li>kernel-default-4.12.14-122.258.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
(noarch)
<ul>

<li>kernel-devel-4.12.14-122.258.1</li>


<li>kernel-macros-4.12.14-122.258.1</li>


<li>kernel-source-4.12.14-122.258.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
<ul>


<li>kernel-default-4.12.14-122.258.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x
x86_64)
<ul>


<li>kernel-default-kgraft-devel-4.12.14-122.258.1</li>


<li>kgraft-patch-4_12_14-122_258-default-1-8.3.1</li>


<li>kernel-default-kgraft-4.12.14-122.258.1</li>


<li>kernel-default-debugsource-4.12.14-122.258.1</li>


<li>kernel-default-debuginfo-4.12.14-122.258.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le
s390x x86_64)
<ul>


<li>dlm-kmp-default-4.12.14-122.258.1</li>


<li>gfs2-kmp-default-4.12.14-122.258.1</li>


<li>cluster-md-kmp-default-4.12.14-122.258.1</li>


<li>kernel-default-base-debuginfo-4.12.14-122.258.1</li>


<li>cluster-md-kmp-default-debuginfo-4.12.14-122.258.1</li>

<li>kernel-syms-4.12.14-122.258.1</li>


<li>dlm-kmp-default-debuginfo-4.12.14-122.258.1</li>


<li>kernel-default-debugsource-4.12.14-122.258.1</li>


<li>ocfs2-kmp-default-4.12.14-122.258.1</li>


<li>kernel-default-base-4.12.14-122.258.1</li>


<li>kernel-default-debuginfo-4.12.14-122.258.1</li>


<li>ocfs2-kmp-default-debuginfo-4.12.14-122.258.1</li>


<li>gfs2-kmp-default-debuginfo-4.12.14-122.258.1</li>


<li>kernel-default-devel-4.12.14-122.258.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le
s390x x86_64 nosrc)
<ul>


<li>kernel-default-4.12.14-122.258.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
<ul>

<li>kernel-devel-4.12.14-122.258.1</li>


<li>kernel-macros-4.12.14-122.258.1</li>


<li>kernel-source-4.12.14-122.258.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 12 SP5 LTSS (s390x)
<ul>


<li>kernel-default-man-4.12.14-122.258.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64)
<ul>


<li>kernel-default-devel-debuginfo-4.12.14-122.258.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2020-36789.html">https://www.suse.com/security/cve/CVE-2020-36789.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47659.html">https://www.suse.com/security/cve/CVE-2021-47659.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47668.html">https://www.suse.com/security/cve/CVE-2021-47668.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-47669.html">https://www.suse.com/security/cve/CVE-2021-47669.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49044.html">https://www.suse.com/security/cve/CVE-2022-49044.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49055.html">https://www.suse.com/security/cve/CVE-2022-49055.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49060.html">https://www.suse.com/security/cve/CVE-2022-49060.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49086.html">https://www.suse.com/security/cve/CVE-2022-49086.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49111.html">https://www.suse.com/security/cve/CVE-2022-49111.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49118.html">https://www.suse.com/security/cve/CVE-2022-49118.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49121.html">https://www.suse.com/security/cve/CVE-2022-49121.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49137.html">https://www.suse.com/security/cve/CVE-2022-49137.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49171.html">https://www.suse.com/security/cve/CVE-2022-49171.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49175.html">https://www.suse.com/security/cve/CVE-2022-49175.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49176.html">https://www.suse.com/security/cve/CVE-2022-49176.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49179.html">https://www.suse.com/security/cve/CVE-2022-49179.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49188.html">https://www.suse.com/security/cve/CVE-2022-49188.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49197.html">https://www.suse.com/security/cve/CVE-2022-49197.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49205.html">https://www.suse.com/security/cve/CVE-2022-49205.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49232.html">https://www.suse.com/security/cve/CVE-2022-49232.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49290.html">https://www.suse.com/security/cve/CVE-2022-49290.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49305.html">https://www.suse.com/security/cve/CVE-2022-49305.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49325.html">https://www.suse.com/security/cve/CVE-2022-49325.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49335.html">https://www.suse.com/security/cve/CVE-2022-49335.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49351.html">https://www.suse.com/security/cve/CVE-2022-49351.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49385.html">https://www.suse.com/security/cve/CVE-2022-49385.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49390.html">https://www.suse.com/security/cve/CVE-2022-49390.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49411.html">https://www.suse.com/security/cve/CVE-2022-49411.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49442.html">https://www.suse.com/security/cve/CVE-2022-49442.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49465.html">https://www.suse.com/security/cve/CVE-2022-49465.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49478.html">https://www.suse.com/security/cve/CVE-2022-49478.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49489.html">https://www.suse.com/security/cve/CVE-2022-49489.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49504.html">https://www.suse.com/security/cve/CVE-2022-49504.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49521.html">https://www.suse.com/security/cve/CVE-2022-49521.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49525.html">https://www.suse.com/security/cve/CVE-2022-49525.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49534.html">https://www.suse.com/security/cve/CVE-2022-49534.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49535.html">https://www.suse.com/security/cve/CVE-2022-49535.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49536.html">https://www.suse.com/security/cve/CVE-2022-49536.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49537.html">https://www.suse.com/security/cve/CVE-2022-49537.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49542.html">https://www.suse.com/security/cve/CVE-2022-49542.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49561.html">https://www.suse.com/security/cve/CVE-2022-49561.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49590.html">https://www.suse.com/security/cve/CVE-2022-49590.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49658.html">https://www.suse.com/security/cve/CVE-2022-49658.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49668.html">https://www.suse.com/security/cve/CVE-2022-49668.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49693.html">https://www.suse.com/security/cve/CVE-2022-49693.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49725.html">https://www.suse.com/security/cve/CVE-2022-49725.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49728.html">https://www.suse.com/security/cve/CVE-2022-49728.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49730.html">https://www.suse.com/security/cve/CVE-2022-49730.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49749.html">https://www.suse.com/security/cve/CVE-2022-49749.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49753.html">https://www.suse.com/security/cve/CVE-2022-49753.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-53023.html">https://www.suse.com/security/cve/CVE-2023-53023.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-53032.html">https://www.suse.com/security/cve/CVE-2023-53032.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46763.html">https://www.suse.com/security/cve/CVE-2024-46763.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-46865.html">https://www.suse.com/security/cve/CVE-2024-46865.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-49994.html">https://www.suse.com/security/cve/CVE-2024-49994.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50038.html">https://www.suse.com/security/cve/CVE-2024-50038.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50272.html">https://www.suse.com/security/cve/CVE-2024-50272.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-52559.html">https://www.suse.com/security/cve/CVE-2024-52559.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-54683.html">https://www.suse.com/security/cve/CVE-2024-54683.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56590.html">https://www.suse.com/security/cve/CVE-2024-56590.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56641.html">https://www.suse.com/security/cve/CVE-2024-56641.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57924.html">https://www.suse.com/security/cve/CVE-2024-57924.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57980.html">https://www.suse.com/security/cve/CVE-2024-57980.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57981.html">https://www.suse.com/security/cve/CVE-2024-57981.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58005.html">https://www.suse.com/security/cve/CVE-2024-58005.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58009.html">https://www.suse.com/security/cve/CVE-2024-58009.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58017.html">https://www.suse.com/security/cve/CVE-2024-58017.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58063.html">https://www.suse.com/security/cve/CVE-2024-58063.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58093.html">https://www.suse.com/security/cve/CVE-2024-58093.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21635.html">https://www.suse.com/security/cve/CVE-2025-21635.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21735.html">https://www.suse.com/security/cve/CVE-2025-21735.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21750.html">https://www.suse.com/security/cve/CVE-2025-21750.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21758.html">https://www.suse.com/security/cve/CVE-2025-21758.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21764.html">https://www.suse.com/security/cve/CVE-2025-21764.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21768.html">https://www.suse.com/security/cve/CVE-2025-21768.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21772.html">https://www.suse.com/security/cve/CVE-2025-21772.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21779.html">https://www.suse.com/security/cve/CVE-2025-21779.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21806.html">https://www.suse.com/security/cve/CVE-2025-21806.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21862.html">https://www.suse.com/security/cve/CVE-2025-21862.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21881.html">https://www.suse.com/security/cve/CVE-2025-21881.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21909.html">https://www.suse.com/security/cve/CVE-2025-21909.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21910.html">https://www.suse.com/security/cve/CVE-2025-21910.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21926.html">https://www.suse.com/security/cve/CVE-2025-21926.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21927.html">https://www.suse.com/security/cve/CVE-2025-21927.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21931.html">https://www.suse.com/security/cve/CVE-2025-21931.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21941.html">https://www.suse.com/security/cve/CVE-2025-21941.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21948.html">https://www.suse.com/security/cve/CVE-2025-21948.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21956.html">https://www.suse.com/security/cve/CVE-2025-21956.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21957.html">https://www.suse.com/security/cve/CVE-2025-21957.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21963.html">https://www.suse.com/security/cve/CVE-2025-21963.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21964.html">https://www.suse.com/security/cve/CVE-2025-21964.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21976.html">https://www.suse.com/security/cve/CVE-2025-21976.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-22004.html">https://www.suse.com/security/cve/CVE-2025-22004.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-22008.html">https://www.suse.com/security/cve/CVE-2025-22008.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-22010.html">https://www.suse.com/security/cve/CVE-2025-22010.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-22018.html">https://www.suse.com/security/cve/CVE-2025-22018.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-22053.html">https://www.suse.com/security/cve/CVE-2025-22053.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-22055.html">https://www.suse.com/security/cve/CVE-2025-22055.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-22060.html">https://www.suse.com/security/cve/CVE-2025-22060.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-22086.html">https://www.suse.com/security/cve/CVE-2025-22086.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-23131.html">https://www.suse.com/security/cve/CVE-2025-23131.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-37785.html">https://www.suse.com/security/cve/CVE-2025-37785.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1205495">https://bugzilla.suse.com/show_bug.cgi?id=1205495</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1230764">https://bugzilla.suse.com/show_bug.cgi?id=1230764</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231103">https://bugzilla.suse.com/show_bug.cgi?id=1231103</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231450">https://bugzilla.suse.com/show_bug.cgi?id=1231450</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231910">https://bugzilla.suse.com/show_bug.cgi?id=1231910</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233461">https://bugzilla.suse.com/show_bug.cgi?id=1233461</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234209">https://bugzilla.suse.com/show_bug.cgi?id=1234209</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235038">https://bugzilla.suse.com/show_bug.cgi?id=1235038</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235526">https://bugzilla.suse.com/show_bug.cgi?id=1235526</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235729">https://bugzilla.suse.com/show_bug.cgi?id=1235729</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235870">https://bugzilla.suse.com/show_bug.cgi?id=1235870</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236086">https://bugzilla.suse.com/show_bug.cgi?id=1236086</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236111">https://bugzilla.suse.com/show_bug.cgi?id=1236111</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237757">https://bugzilla.suse.com/show_bug.cgi?id=1237757</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237839">https://bugzilla.suse.com/show_bug.cgi?id=1237839</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237840">https://bugzilla.suse.com/show_bug.cgi?id=1237840</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237845">https://bugzilla.suse.com/show_bug.cgi?id=1237845</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237868">https://bugzilla.suse.com/show_bug.cgi?id=1237868</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237873">https://bugzilla.suse.com/show_bug.cgi?id=1237873</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237885">https://bugzilla.suse.com/show_bug.cgi?id=1237885</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237911">https://bugzilla.suse.com/show_bug.cgi?id=1237911</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237912">https://bugzilla.suse.com/show_bug.cgi?id=1237912</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237926">https://bugzilla.suse.com/show_bug.cgi?id=1237926</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237939">https://bugzilla.suse.com/show_bug.cgi?id=1237939</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237950">https://bugzilla.suse.com/show_bug.cgi?id=1237950</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237951">https://bugzilla.suse.com/show_bug.cgi?id=1237951</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237954">https://bugzilla.suse.com/show_bug.cgi?id=1237954</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237957">https://bugzilla.suse.com/show_bug.cgi?id=1237957</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237979">https://bugzilla.suse.com/show_bug.cgi?id=1237979</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237984">https://bugzilla.suse.com/show_bug.cgi?id=1237984</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238000">https://bugzilla.suse.com/show_bug.cgi?id=1238000</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238016">https://bugzilla.suse.com/show_bug.cgi?id=1238016</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238022">https://bugzilla.suse.com/show_bug.cgi?id=1238022</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238037">https://bugzilla.suse.com/show_bug.cgi?id=1238037</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238092">https://bugzilla.suse.com/show_bug.cgi?id=1238092</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238093">https://bugzilla.suse.com/show_bug.cgi?id=1238093</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238097">https://bugzilla.suse.com/show_bug.cgi?id=1238097</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238099">https://bugzilla.suse.com/show_bug.cgi?id=1238099</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238138">https://bugzilla.suse.com/show_bug.cgi?id=1238138</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238139">https://bugzilla.suse.com/show_bug.cgi?id=1238139</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238155">https://bugzilla.suse.com/show_bug.cgi?id=1238155</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238156">https://bugzilla.suse.com/show_bug.cgi?id=1238156</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238233">https://bugzilla.suse.com/show_bug.cgi?id=1238233</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238243">https://bugzilla.suse.com/show_bug.cgi?id=1238243</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238244">https://bugzilla.suse.com/show_bug.cgi?id=1238244</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238307">https://bugzilla.suse.com/show_bug.cgi?id=1238307</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238335">https://bugzilla.suse.com/show_bug.cgi?id=1238335</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238377">https://bugzilla.suse.com/show_bug.cgi?id=1238377</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238398">https://bugzilla.suse.com/show_bug.cgi?id=1238398</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238455">https://bugzilla.suse.com/show_bug.cgi?id=1238455</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238497">https://bugzilla.suse.com/show_bug.cgi?id=1238497</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238507">https://bugzilla.suse.com/show_bug.cgi?id=1238507</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238537">https://bugzilla.suse.com/show_bug.cgi?id=1238537</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238645">https://bugzilla.suse.com/show_bug.cgi?id=1238645</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238714">https://bugzilla.suse.com/show_bug.cgi?id=1238714</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238722">https://bugzilla.suse.com/show_bug.cgi?id=1238722</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238737">https://bugzilla.suse.com/show_bug.cgi?id=1238737</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238746">https://bugzilla.suse.com/show_bug.cgi?id=1238746</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238760">https://bugzilla.suse.com/show_bug.cgi?id=1238760</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238768">https://bugzilla.suse.com/show_bug.cgi?id=1238768</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238803">https://bugzilla.suse.com/show_bug.cgi?id=1238803</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238835">https://bugzilla.suse.com/show_bug.cgi?id=1238835</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238838">https://bugzilla.suse.com/show_bug.cgi?id=1238838</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238844">https://bugzilla.suse.com/show_bug.cgi?id=1238844</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238893">https://bugzilla.suse.com/show_bug.cgi?id=1238893</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238905">https://bugzilla.suse.com/show_bug.cgi?id=1238905</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238911">https://bugzilla.suse.com/show_bug.cgi?id=1238911</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238919">https://bugzilla.suse.com/show_bug.cgi?id=1238919</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238930">https://bugzilla.suse.com/show_bug.cgi?id=1238930</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238937">https://bugzilla.suse.com/show_bug.cgi?id=1238937</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238938">https://bugzilla.suse.com/show_bug.cgi?id=1238938</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238984">https://bugzilla.suse.com/show_bug.cgi?id=1238984</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239070">https://bugzilla.suse.com/show_bug.cgi?id=1239070</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239111">https://bugzilla.suse.com/show_bug.cgi?id=1239111</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239112">https://bugzilla.suse.com/show_bug.cgi?id=1239112</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239474">https://bugzilla.suse.com/show_bug.cgi?id=1239474</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239994">https://bugzilla.suse.com/show_bug.cgi?id=1239994</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240185">https://bugzilla.suse.com/show_bug.cgi?id=1240185</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240243">https://bugzilla.suse.com/show_bug.cgi?id=1240243</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240250">https://bugzilla.suse.com/show_bug.cgi?id=1240250</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240270">https://bugzilla.suse.com/show_bug.cgi?id=1240270</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240309">https://bugzilla.suse.com/show_bug.cgi?id=1240309</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240583">https://bugzilla.suse.com/show_bug.cgi?id=1240583</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240590">https://bugzilla.suse.com/show_bug.cgi?id=1240590</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240701">https://bugzilla.suse.com/show_bug.cgi?id=1240701</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240703">https://bugzilla.suse.com/show_bug.cgi?id=1240703</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240709">https://bugzilla.suse.com/show_bug.cgi?id=1240709</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240712">https://bugzilla.suse.com/show_bug.cgi?id=1240712</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240714">https://bugzilla.suse.com/show_bug.cgi?id=1240714</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240717">https://bugzilla.suse.com/show_bug.cgi?id=1240717</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240739">https://bugzilla.suse.com/show_bug.cgi?id=1240739</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240740">https://bugzilla.suse.com/show_bug.cgi?id=1240740</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240742">https://bugzilla.suse.com/show_bug.cgi?id=1240742</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240835">https://bugzilla.suse.com/show_bug.cgi?id=1240835</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240942">https://bugzilla.suse.com/show_bug.cgi?id=1240942</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240943">https://bugzilla.suse.com/show_bug.cgi?id=1240943</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241145">https://bugzilla.suse.com/show_bug.cgi?id=1241145</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241266">https://bugzilla.suse.com/show_bug.cgi?id=1241266</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241347">https://bugzilla.suse.com/show_bug.cgi?id=1241347</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241371">https://bugzilla.suse.com/show_bug.cgi?id=1241371</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241373">https://bugzilla.suse.com/show_bug.cgi?id=1241373</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241404">https://bugzilla.suse.com/show_bug.cgi?id=1241404</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241405">https://bugzilla.suse.com/show_bug.cgi?id=1241405</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241408">https://bugzilla.suse.com/show_bug.cgi?id=1241408</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241458">https://bugzilla.suse.com/show_bug.cgi?id=1241458</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241526">https://bugzilla.suse.com/show_bug.cgi?id=1241526</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241601">https://bugzilla.suse.com/show_bug.cgi?id=1241601</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1241640">https://bugzilla.suse.com/show_bug.cgi?id=1241640</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1242778">https://bugzilla.suse.com/show_bug.cgi?id=1242778</a>
</li>


</ul>

</div>

--===============0384149799675688810==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung