SUSE-SU-2023:2534-1: important: Security update for the Linux Kernel
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Mon Jun 19 08:30:18 UTC 2023
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2023:2534-1
Rating: important
References:
* #1172073
* #1191731
* #1199046
* #1204405
* #1205756
* #1205758
* #1205760
* #1205762
* #1205803
* #1206878
* #1208600
* #1209287
* #1209366
* #1210629
* #1210715
* #1210783
* #1210791
* #1210940
* #1211037
* #1211089
* #1211105
* #1211186
* #1211519
* #1211592
* #1211622
* #1211796
Cross-References:
* CVE-2022-3566
* CVE-2022-45884
* CVE-2022-45885
* CVE-2022-45886
* CVE-2022-45887
* CVE-2022-45919
* CVE-2023-1077
* CVE-2023-1380
* CVE-2023-2176
* CVE-2023-2194
* CVE-2023-2483
* CVE-2023-2513
* CVE-2023-28466
* CVE-2023-31084
* CVE-2023-31436
* CVE-2023-32269
CVSS scores:
* CVE-2022-3566 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-3566 ( NVD ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-45884 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-45884 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-45885 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-45885 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-45886 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-45886 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-45887 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-45887 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-45919 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-45919 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1077 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1077 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1380 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2023-1380 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-2176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2176 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2194 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L
* CVE-2023-2194 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2483 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2513 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2513 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-28466 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-28466 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-31084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-31084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-31436 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-31436 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-32269 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-32269 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE CaaS Platform 4.0
* SUSE Linux Enterprise High Availability Extension 15 SP1
* SUSE Linux Enterprise High Performance Computing 15 SP1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
* SUSE Linux Enterprise Live Patching 15-SP1
* SUSE Linux Enterprise Server 15 SP1
* SUSE Linux Enterprise Server 15 SP1 Business Critical Linux 15-SP1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
* SUSE Manager Proxy 4.0
* SUSE Manager Retail Branch Server 4.0
* SUSE Manager Server 4.0
An update that solves 16 vulnerabilities and has 10 fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security
and bugfixes.
The following security bugs were fixed:
* CVE-2023-1077: Fixed a type confusion in pick_next_rt_entity(), that could
cause memory corruption (bsc#1208600).
* CVE-2022-3566: Fixed race condition in the TCP Handler (bsc#1204405).
* CVE-2022-45886: Fixed a .disconnect versus dvb_device_open race condition in
dvb_net.c that lead to a use-after-free (bsc#1205760).
* CVE-2022-45885: Fixed a race condition in dvb_frontend.c that could cause a
use-after-free when a device is disconnected (bsc#1205758).
* CVE-2022-45887: Fixed a memory leak in ttusb_dec.c caused by the lack of a
dvb_frontend_detach call (bsc#1205762).
* CVE-2022-45919: Fixed a use-after-free in dvb_ca_en50221.c that could occur
if there is a disconnect after an open, because of the lack of a wait_event
(bsc#1205803).
* CVE-2022-45884: Fixed a use-after-free in dvbdev.c, related to
dvb_register_device dynamically allocating fops (bsc#1205756).
* CVE-2023-31084: Fixed a blocking issue in drivers/media/dvb-
core/dvb_frontend.c (bsc#1210783).
* CVE-2023-31436: Fixed an out-of-bounds write in qfq_change_class() because
lmax can exceed QFQ_MIN_LMAX (bsc#1210940).
* CVE-2023-2194: Fixed an out-of-bounds write vulnerability in the SLIMpro I2C
device driver (bsc#1210715).
* CVE-2023-32269: Fixed a use-after-free in af_netrom.c, related to the fact
that accept() was also allowed for a successfully connected AF_NETROM socket
(bsc#1211186).
* CVE-2023-28466: Fixed race condition that could lead to use-after-free or
NULL pointer dereference in do_tls_getsockopt in net/tls/tls_main.c
(bsc#1209366).
* CVE-2023-1380: Fixed a slab-out-of-bound read problem in
brcmf_get_assoc_ies() (bsc#1209287).
* CVE-2023-2513: Fixed a use-after-free vulnerability in the ext4 filesystem
(bsc#1211105).
* CVE-2023-2483: Fixed a use after free bug in emac_remove caused by a race
condition (bsc#1211037).
* CVE-2023-2176: Fixed an out-of-boundary read in compare_netdev_and_ip in
drivers/infiniband/core/cma.c in RDMA (bsc#1210629).
The following non-security bugs were fixed:
* ext4: add EXT4_INODE_HAS_XATTR_SPACE macro in xattr.h (bsc#1206878).
* google/gve:fix repeated words in comments (bsc#1211519).
* gve: Adding a new AdminQ command to verify driver (bsc#1211519).
* gve: Cache link_speed value from device (bsc#1211519).
* gve: Fix GFP flags when allocing pages (bsc#1211519).
* gve: Fix error return code in gve_prefill_rx_pages() (bsc#1211519).
* gve: Fix spelling mistake "droping" -> "dropping" (bsc#1211519).
* gve: Handle alternate miss completions (bsc#1211519).
* gve: Reduce alloc and copy costs in the GQ rx path (bsc#1211519).
* gve: Remove the code of clearing PBA bit (bsc#1211519).
* gve: Secure enough bytes in the first TX desc for all TCP pkts
(bsc#1211519).
* gve: enhance no queue page list detection (bsc#1211519).
* hv: vmbus: Optimize vmbus_on_event (bsc#1211622).
* ipv6: sr: fix out-of-bounds read when setting HMAC data (bsc#1211592).
* kernel-binary: install expoline.o (boo#1210791 bsc#1211089)
* scsi: storvsc: Parameterize number hardware queues (bsc#1211622).
* usrmerge: Compatibility with earlier rpm (boo#1211796)
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE Important update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-2534=1
* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2023-2534=1
* SUSE Linux Enterprise Live Patching 15-SP1
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2023-2534=1
* SUSE Linux Enterprise High Availability Extension 15 SP1
zypper in -t patch SUSE-SLE-Product-HA-15-SP1-2023-2534=1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2534=1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1
zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2534=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2534=1
* SUSE CaaS Platform 4.0
To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform
you if it detects new updates and let you then trigger updating of the complete
cluster in a controlled way.
## Package List:
* openSUSE Leap 15.4 (nosrc)
* kernel-kvmsmall-4.12.14-150100.197.148.1
* kernel-zfcpdump-4.12.14-150100.197.148.1
* kernel-default-4.12.14-150100.197.148.1
* kernel-debug-4.12.14-150100.197.148.1
* openSUSE Leap 15.4 (ppc64le x86_64)
* kernel-debug-base-4.12.14-150100.197.148.1
* kernel-debug-base-debuginfo-4.12.14-150100.197.148.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* kernel-vanilla-devel-4.12.14-150100.197.148.1
* kernel-vanilla-base-debuginfo-4.12.14-150100.197.148.1
* kernel-vanilla-livepatch-devel-4.12.14-150100.197.148.1
* kernel-vanilla-devel-debuginfo-4.12.14-150100.197.148.1
* kernel-vanilla-debugsource-4.12.14-150100.197.148.1
* kernel-default-base-debuginfo-4.12.14-150100.197.148.1
* kernel-vanilla-debuginfo-4.12.14-150100.197.148.1
* kernel-vanilla-base-4.12.14-150100.197.148.1
* openSUSE Leap 15.4 (x86_64)
* kernel-kvmsmall-base-4.12.14-150100.197.148.1
* kernel-kvmsmall-base-debuginfo-4.12.14-150100.197.148.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-vanilla-4.12.14-150100.197.148.1
* openSUSE Leap 15.4 (s390x)
* kernel-zfcpdump-man-4.12.14-150100.197.148.1
* kernel-default-man-4.12.14-150100.197.148.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-vanilla-4.12.14-150100.197.148.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kernel-vanilla-devel-4.12.14-150100.197.148.1
* kernel-vanilla-base-debuginfo-4.12.14-150100.197.148.1
* kernel-vanilla-livepatch-devel-4.12.14-150100.197.148.1
* kernel-vanilla-devel-debuginfo-4.12.14-150100.197.148.1
* kernel-vanilla-debugsource-4.12.14-150100.197.148.1
* kernel-vanilla-debuginfo-4.12.14-150100.197.148.1
* kernel-vanilla-base-4.12.14-150100.197.148.1
* SUSE Linux Enterprise Live Patching 15-SP1 (nosrc)
* kernel-default-4.12.14-150100.197.148.1
* SUSE Linux Enterprise Live Patching 15-SP1 (ppc64le x86_64)
* kernel-default-livepatch-devel-4.12.14-150100.197.148.1
* kernel-default-debuginfo-4.12.14-150100.197.148.1
* kernel-livepatch-4_12_14-150100_197_148-default-1-150100.3.3.1
* kernel-default-debugsource-4.12.14-150100.197.148.1
* kernel-default-livepatch-4.12.14-150100.197.148.1
* SUSE Linux Enterprise High Availability Extension 15 SP1 (aarch64 ppc64le
s390x x86_64)
* cluster-md-kmp-default-debuginfo-4.12.14-150100.197.148.1
* dlm-kmp-default-debuginfo-4.12.14-150100.197.148.1
* cluster-md-kmp-default-4.12.14-150100.197.148.1
* gfs2-kmp-default-4.12.14-150100.197.148.1
* kernel-default-debuginfo-4.12.14-150100.197.148.1
* dlm-kmp-default-4.12.14-150100.197.148.1
* kernel-default-debugsource-4.12.14-150100.197.148.1
* gfs2-kmp-default-debuginfo-4.12.14-150100.197.148.1
* ocfs2-kmp-default-4.12.14-150100.197.148.1
* ocfs2-kmp-default-debuginfo-4.12.14-150100.197.148.1
* SUSE Linux Enterprise High Availability Extension 15 SP1 (nosrc)
* kernel-default-4.12.14-150100.197.148.1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64
nosrc x86_64)
* kernel-default-4.12.14-150100.197.148.1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (aarch64
x86_64)
* kernel-default-base-4.12.14-150100.197.148.1
* kernel-obs-build-debugsource-4.12.14-150100.197.148.1
* kernel-obs-build-4.12.14-150100.197.148.1
* kernel-default-debuginfo-4.12.14-150100.197.148.1
* kernel-syms-4.12.14-150100.197.148.1
* kernel-default-debugsource-4.12.14-150100.197.148.1
* kernel-default-base-debuginfo-4.12.14-150100.197.148.1
* kernel-default-devel-debuginfo-4.12.14-150100.197.148.1
* kernel-default-devel-4.12.14-150100.197.148.1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch)
* kernel-macros-4.12.14-150100.197.148.1
* kernel-source-4.12.14-150100.197.148.1
* kernel-devel-4.12.14-150100.197.148.1
* SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (noarch
nosrc)
* kernel-docs-4.12.14-150100.197.148.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x
x86_64 nosrc)
* kernel-default-4.12.14-150100.197.148.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (aarch64 ppc64le s390x
x86_64)
* kernel-default-base-4.12.14-150100.197.148.1
* reiserfs-kmp-default-debuginfo-4.12.14-150100.197.148.1
* reiserfs-kmp-default-4.12.14-150100.197.148.1
* kernel-obs-build-debugsource-4.12.14-150100.197.148.1
* kernel-obs-build-4.12.14-150100.197.148.1
* kernel-default-debuginfo-4.12.14-150100.197.148.1
* kernel-syms-4.12.14-150100.197.148.1
* kernel-default-debugsource-4.12.14-150100.197.148.1
* kernel-default-base-debuginfo-4.12.14-150100.197.148.1
* kernel-default-devel-debuginfo-4.12.14-150100.197.148.1
* kernel-default-devel-4.12.14-150100.197.148.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch)
* kernel-macros-4.12.14-150100.197.148.1
* kernel-source-4.12.14-150100.197.148.1
* kernel-devel-4.12.14-150100.197.148.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (noarch nosrc)
* kernel-docs-4.12.14-150100.197.148.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (s390x)
* kernel-zfcpdump-debugsource-4.12.14-150100.197.148.1
* kernel-default-man-4.12.14-150100.197.148.1
* kernel-zfcpdump-debuginfo-4.12.14-150100.197.148.1
* SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (nosrc)
* kernel-zfcpdump-4.12.14-150100.197.148.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 (nosrc ppc64le
x86_64)
* kernel-default-4.12.14-150100.197.148.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 (ppc64le x86_64)
* kernel-default-base-4.12.14-150100.197.148.1
* reiserfs-kmp-default-debuginfo-4.12.14-150100.197.148.1
* reiserfs-kmp-default-4.12.14-150100.197.148.1
* kernel-obs-build-debugsource-4.12.14-150100.197.148.1
* kernel-obs-build-4.12.14-150100.197.148.1
* kernel-default-debuginfo-4.12.14-150100.197.148.1
* kernel-syms-4.12.14-150100.197.148.1
* kernel-default-debugsource-4.12.14-150100.197.148.1
* kernel-default-base-debuginfo-4.12.14-150100.197.148.1
* kernel-default-devel-debuginfo-4.12.14-150100.197.148.1
* kernel-default-devel-4.12.14-150100.197.148.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch)
* kernel-macros-4.12.14-150100.197.148.1
* kernel-source-4.12.14-150100.197.148.1
* kernel-devel-4.12.14-150100.197.148.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP1 (noarch nosrc)
* kernel-docs-4.12.14-150100.197.148.1
* SUSE CaaS Platform 4.0 (nosrc x86_64)
* kernel-default-4.12.14-150100.197.148.1
* SUSE CaaS Platform 4.0 (x86_64)
* kernel-default-base-4.12.14-150100.197.148.1
* reiserfs-kmp-default-debuginfo-4.12.14-150100.197.148.1
* reiserfs-kmp-default-4.12.14-150100.197.148.1
* kernel-obs-build-debugsource-4.12.14-150100.197.148.1
* kernel-obs-build-4.12.14-150100.197.148.1
* kernel-default-debuginfo-4.12.14-150100.197.148.1
* kernel-syms-4.12.14-150100.197.148.1
* kernel-default-debugsource-4.12.14-150100.197.148.1
* kernel-default-base-debuginfo-4.12.14-150100.197.148.1
* kernel-default-devel-debuginfo-4.12.14-150100.197.148.1
* kernel-default-devel-4.12.14-150100.197.148.1
* SUSE CaaS Platform 4.0 (noarch)
* kernel-macros-4.12.14-150100.197.148.1
* kernel-source-4.12.14-150100.197.148.1
* kernel-devel-4.12.14-150100.197.148.1
* SUSE CaaS Platform 4.0 (noarch nosrc)
* kernel-docs-4.12.14-150100.197.148.1
## References:
* https://www.suse.com/security/cve/CVE-2022-3566.html
* https://www.suse.com/security/cve/CVE-2022-45884.html
* https://www.suse.com/security/cve/CVE-2022-45885.html
* https://www.suse.com/security/cve/CVE-2022-45886.html
* https://www.suse.com/security/cve/CVE-2022-45887.html
* https://www.suse.com/security/cve/CVE-2022-45919.html
* https://www.suse.com/security/cve/CVE-2023-1077.html
* https://www.suse.com/security/cve/CVE-2023-1380.html
* https://www.suse.com/security/cve/CVE-2023-2176.html
* https://www.suse.com/security/cve/CVE-2023-2194.html
* https://www.suse.com/security/cve/CVE-2023-2483.html
* https://www.suse.com/security/cve/CVE-2023-2513.html
* https://www.suse.com/security/cve/CVE-2023-28466.html
* https://www.suse.com/security/cve/CVE-2023-31084.html
* https://www.suse.com/security/cve/CVE-2023-31436.html
* https://www.suse.com/security/cve/CVE-2023-32269.html
* https://bugzilla.suse.com/show_bug.cgi?id=1172073
* https://bugzilla.suse.com/show_bug.cgi?id=1191731
* https://bugzilla.suse.com/show_bug.cgi?id=1199046
* https://bugzilla.suse.com/show_bug.cgi?id=1204405
* https://bugzilla.suse.com/show_bug.cgi?id=1205756
* https://bugzilla.suse.com/show_bug.cgi?id=1205758
* https://bugzilla.suse.com/show_bug.cgi?id=1205760
* https://bugzilla.suse.com/show_bug.cgi?id=1205762
* https://bugzilla.suse.com/show_bug.cgi?id=1205803
* https://bugzilla.suse.com/show_bug.cgi?id=1206878
* https://bugzilla.suse.com/show_bug.cgi?id=1208600
* https://bugzilla.suse.com/show_bug.cgi?id=1209287
* https://bugzilla.suse.com/show_bug.cgi?id=1209366
* https://bugzilla.suse.com/show_bug.cgi?id=1210629
* https://bugzilla.suse.com/show_bug.cgi?id=1210715
* https://bugzilla.suse.com/show_bug.cgi?id=1210783
* https://bugzilla.suse.com/show_bug.cgi?id=1210791
* https://bugzilla.suse.com/show_bug.cgi?id=1210940
* https://bugzilla.suse.com/show_bug.cgi?id=1211037
* https://bugzilla.suse.com/show_bug.cgi?id=1211089
* https://bugzilla.suse.com/show_bug.cgi?id=1211105
* https://bugzilla.suse.com/show_bug.cgi?id=1211186
* https://bugzilla.suse.com/show_bug.cgi?id=1211519
* https://bugzilla.suse.com/show_bug.cgi?id=1211592
* https://bugzilla.suse.com/show_bug.cgi?id=1211622
* https://bugzilla.suse.com/show_bug.cgi?id=1211796
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20230619/4e14f804/attachment.htm>
More information about the sle-security-updates
mailing list