Known vulnerabilities in SUSE samba-libs-python3-debuginfo-32bit

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER

Main › Vulnerability Database › SUSE › samba-libs-python3-debuginfo-32bit

Known vulnerabilities in SUSE samba-libs-python3-debuginfo-32bit

Vendor: SUSE
Website: https://www.suse.com/
Total Security Bulletins: 11
4.15.13+git.664.e8416d8d213-3.99.1 4.15.13+git.659.be30c436f5a-3.96.1 4.15.13+git.625.ac658f2f12-3.88.1 4.15.13+git.621.c8ae836ff82-3.85.1 4.15.13+git.594.449ec4a79a1-3.80.1 4.15.8+git.462.e73f4310487-3.68.1 4.15.4+git.324.8332acf1a63-3.54.1 4.10.18+git.339.c912385a5e1-3.41.1 4.10.18+git.269.dd608524c88-3.27.1 4.15.13+git.534.0d9f8ece26-3.77.1 4.15.13+git.482.1ac2c665c7-3.74.1 4.15.8+git.473.1a1018e0a0b-3.71.2

Security bulletins (11)

Secuity bulletin Severity Status Published
SB20251015152: SUSE update for samba High
Patched Public exploit
15.10.2025
SB2023101138: SUSE update for samba Low
Patched
11.10.2023
SB2023072432: SUSE update for samba Medium
Patched
24.07.2023
SB2023032951: SUSE update for samba Low
Patched
29.03.2023
SB2023012661: SUSE update for samba High
Patched
26.01.2023
SB2023011230: SUSE update for samba High
Patched
12.01.2023
SB2022091448: SUSE update for samba Low
Patched
14.09.2022
SB2022072939: SUSE update for samba Medium
Patched
29.07.2022
SB2022020342: SUSE update for samba High
Patched
03.02.2022
SB2021111060: SUSE update for samba High
Patched
10.11.2021
SB2021042947: SUSE update for samba Medium
Patched
29.04.2021


Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or