SUSE-SU-2025:4515-1: important: Security update for the Linux Kernel

SLE-SECURITY-UPDATES null at suse.de
Wed Dec 24 08:31:44 UTC 2025



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:4515-1  
Release Date: 2025-12-23T16:20:28Z  
Rating: important  
References:

  * bsc#1070872
  * bsc#1220419
  * bsc#1228688
  * bsc#1247227
  * bsc#1249650
  * bsc#1250009
  * bsc#1250083
  * bsc#1250176
  * bsc#1250206
  * bsc#1250374
  * bsc#1250650
  * bsc#1250705
  * bsc#1251154
  * bsc#1251159
  * bsc#1251173
  * bsc#1251285
  * bsc#1251322
  * bsc#1251728
  * bsc#1251786
  * bsc#1252033
  * bsc#1252303
  * bsc#1252519
  * bsc#1252640
  * bsc#1252763
  * bsc#1252773
  * bsc#1252780
  * bsc#1252821
  * bsc#1252836
  * bsc#1252862
  * bsc#1252912
  * bsc#1253237
  * bsc#1253421
  * bsc#1253436
  * bsc#1253438
  * bsc#1253456

  
Cross-References:

  * CVE-2022-50364
  * CVE-2022-50368
  * CVE-2022-50494
  * CVE-2022-50545
  * CVE-2022-50551
  * CVE-2022-50569
  * CVE-2022-50578
  * CVE-2023-53229
  * CVE-2023-53369
  * CVE-2023-53431
  * CVE-2023-53542
  * CVE-2023-53597
  * CVE-2023-53641
  * CVE-2023-53676
  * CVE-2025-38436
  * CVE-2025-39819
  * CVE-2025-39967
  * CVE-2025-40001
  * CVE-2025-40027
  * CVE-2025-40030
  * CVE-2025-40040
  * CVE-2025-40048
  * CVE-2025-40055
  * CVE-2025-40070
  * CVE-2025-40083
  * CVE-2025-40173
  * CVE-2025-40186
  * CVE-2025-40204
  * CVE-2025-40205

  
CVSS scores:

  * CVE-2022-50364 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50364 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50368 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2022-50368 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2022-50368 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50494 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50494 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50545 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50551 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50551 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50569 ( SUSE ):  8.2
    CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50569 ( SUSE ):  5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50578 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50578 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53229 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53229 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53369 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53369 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53431 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53431 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53542 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53542 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53597 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53641 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53641 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53676 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53676 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38436 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38436 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38436 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39819 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39819 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39967 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39967 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-40001 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40001 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-40027 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40027 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-40030 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40030 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40040 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40040 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40048 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40055 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40055 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40070 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40083 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40083 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40173 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40173 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40186 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40186 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40204 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-40204 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  * CVE-2025-40205 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40205 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * SUSE Linux Enterprise High Performance Computing 12 SP5
  * SUSE Linux Enterprise Live Patching 12-SP5
  * SUSE Linux Enterprise Server 12 SP5
  * SUSE Linux Enterprise Server 12 SP5 LTSS
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5

  
  
An update that solves 29 vulnerabilities and has six security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

  * CVE-2022-50364: i2c: mux: reg: check return value after calling
    platform_get_resource() (bsc#1250083).
  * CVE-2022-50368: drm/msm/dsi: fix memory corruption with too many bridges
    (bsc#1250009).
  * CVE-2022-50494: thermal: intel_powerclamp: Use get_cpu() instead of
    smp_processor_id() to avoid crash (bsc#1251173).
  * CVE-2022-50545: r6040: Fix kmemleak in probe and remove (bsc#1251285).
  * CVE-2022-50551: wifi: brcmfmac: Fix potential shift-out-of-bounds in
    brcmf_fw_alloc_request() (bsc#1251322).
  * CVE-2022-50569: xfrm: Update ipcomp_scratches with NULL when freed
    (bsc#1252640).
  * CVE-2022-50578: class: fix possible memory leak in __class_register()
    (bsc#1252519).
  * CVE-2023-53229: wifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for
    non-uploaded sta (bsc#1249650).
  * CVE-2023-53369: net: dcb: choose correct policy to parse DCB_ATTR_BCN
    (bsc#1250206).
  * CVE-2023-53431: scsi: ses: Don't attach if enclosure has no components
    (bsc#1250374).
  * CVE-2023-53542: ARM: dts: exynos: Use Exynos5420 compatible for the MIPI
    video phy (bsc#1251154).
  * CVE-2023-53597: cifs: fix mid leak during reconnection after timeout
    threshold (bsc#1251159).
  * CVE-2023-53641: wifi: ath9k: hif_usb: fix memory leak of remain_skbs
    (bsc#1251728).
  * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in
    lio_target_nacl_info_show() (bsc#1251786).
  * CVE-2025-38436: drm/scheduler: signal scheduled fence when kill job
    (bsc#1247227).
  * CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).
  * CVE-2025-39967: fbcon: fix integer overflow in fbcon_do_set_font
    (bsc#1252033).
  * CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue
    (bsc#1252303).
  * CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).
  * CVE-2025-40030: pinctrl: check the return value of
    pinmux_ops::get_function_name() (bsc#1252773).
  * CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise
    (bsc#1252780).
  * CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask
    (bsc#1252862).
  * CVE-2025-40055: ocfs2: fix double free in user_cluster_connect()
    (bsc#1252821).
  * CVE-2025-40070: pps: fix warning in pps_register_cdev when register device
    fail (bsc#1252836).
  * CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue
    (bsc#1252912).
  * CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth
    (bsc#1253421).
  * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).
  * CVE-2025-40205: btrfs: avoid potential out-of-bounds in btrfs_encode_fh()
    (bsc#1253456).

The following non-security bugs were fixed:

  * KVM: x86: Give a hint when Win2016 might fail to boot due to XSAVES erratum
    (git-fixes).
  * PCI: aardvark: Fix checking for MEM resource type (git-fixes).
  * cifs: Check the lease context if we actually got a lease (bsc#1228688).
  * cifs: return a single-use cfid if we did not get a lease (bsc#1228688).
  * dmaengine: bcm2835: Avoid GFP_KERNEL in device_prep_slave_sg (bsc#1070872).
  * kabi/severities: Update info about kvm_86_ops.
  * net/sched: sch_hfsc: upgrade 'rt' to 'sc' when it becomes a inner curve
    (bsc#1220419).
  * skmsg: Return copied bytes in sk_msg_memcopy_from_iter (bsc#1250650).
  * smb3: fix Open files on server counter going negative (git-fixes).
  * tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate
    psock->cork (bsc#1250705).
  * tcp_bpf: Fix copied value in tcp_bpf_sendmsg (bsc#1250650).
  * thermal: intel_powerclamp: Use first online CPU as control_cpu
    (bsc#1251173).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Server 12 SP5 LTSS  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-4515=1

  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4515=1

  * SUSE Linux Enterprise Live Patching 12-SP5  
    zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-4515=1

## Package List:

  * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
    * kernel-default-base-debuginfo-4.12.14-122.283.1
    * cluster-md-kmp-default-4.12.14-122.283.1
    * dlm-kmp-default-debuginfo-4.12.14-122.283.1
    * gfs2-kmp-default-debuginfo-4.12.14-122.283.1
    * kernel-default-debugsource-4.12.14-122.283.1
    * kernel-default-debuginfo-4.12.14-122.283.1
    * cluster-md-kmp-default-debuginfo-4.12.14-122.283.1
    * kernel-syms-4.12.14-122.283.1
    * dlm-kmp-default-4.12.14-122.283.1
    * gfs2-kmp-default-4.12.14-122.283.1
    * ocfs2-kmp-default-debuginfo-4.12.14-122.283.1
    * ocfs2-kmp-default-4.12.14-122.283.1
    * kernel-default-devel-4.12.14-122.283.1
    * kernel-default-base-4.12.14-122.283.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64
    nosrc)
    * kernel-default-4.12.14-122.283.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
    * kernel-source-4.12.14-122.283.1
    * kernel-macros-4.12.14-122.283.1
    * kernel-devel-4.12.14-122.283.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x)
    * kernel-default-man-4.12.14-122.283.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64)
    * kernel-default-devel-debuginfo-4.12.14-122.283.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
    * kernel-default-base-debuginfo-4.12.14-122.283.1
    * cluster-md-kmp-default-4.12.14-122.283.1
    * dlm-kmp-default-debuginfo-4.12.14-122.283.1
    * gfs2-kmp-default-debuginfo-4.12.14-122.283.1
    * kernel-default-devel-debuginfo-4.12.14-122.283.1
    * kernel-default-debugsource-4.12.14-122.283.1
    * kernel-default-debuginfo-4.12.14-122.283.1
    * cluster-md-kmp-default-debuginfo-4.12.14-122.283.1
    * kernel-syms-4.12.14-122.283.1
    * dlm-kmp-default-4.12.14-122.283.1
    * gfs2-kmp-default-4.12.14-122.283.1
    * ocfs2-kmp-default-debuginfo-4.12.14-122.283.1
    * ocfs2-kmp-default-4.12.14-122.283.1
    * kernel-default-devel-4.12.14-122.283.1
    * kernel-default-base-4.12.14-122.283.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64)
    * kernel-default-4.12.14-122.283.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
    * kernel-source-4.12.14-122.283.1
    * kernel-macros-4.12.14-122.283.1
    * kernel-devel-4.12.14-122.283.1
  * SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
    * kernel-default-4.12.14-122.283.1
  * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
    * kernel-default-debugsource-4.12.14-122.283.1
    * kgraft-patch-4_12_14-122_283-default-1-8.3.1
    * kernel-default-kgraft-devel-4.12.14-122.283.1
    * kernel-default-debuginfo-4.12.14-122.283.1
    * kernel-default-kgraft-4.12.14-122.283.1

## References:

  * https://www.suse.com/security/cve/CVE-2022-50364.html
  * https://www.suse.com/security/cve/CVE-2022-50368.html
  * https://www.suse.com/security/cve/CVE-2022-50494.html
  * https://www.suse.com/security/cve/CVE-2022-50545.html
  * https://www.suse.com/security/cve/CVE-2022-50551.html
  * https://www.suse.com/security/cve/CVE-2022-50569.html
  * https://www.suse.com/security/cve/CVE-2022-50578.html
  * https://www.suse.com/security/cve/CVE-2023-53229.html
  * https://www.suse.com/security/cve/CVE-2023-53369.html
  * https://www.suse.com/security/cve/CVE-2023-53431.html
  * https://www.suse.com/security/cve/CVE-2023-53542.html
  * https://www.suse.com/security/cve/CVE-2023-53597.html
  * https://www.suse.com/security/cve/CVE-2023-53641.html
  * https://www.suse.com/security/cve/CVE-2023-53676.html
  * https://www.suse.com/security/cve/CVE-2025-38436.html
  * https://www.suse.com/security/cve/CVE-2025-39819.html
  * https://www.suse.com/security/cve/CVE-2025-39967.html
  * https://www.suse.com/security/cve/CVE-2025-40001.html
  * https://www.suse.com/security/cve/CVE-2025-40027.html
  * https://www.suse.com/security/cve/CVE-2025-40030.html
  * https://www.suse.com/security/cve/CVE-2025-40040.html
  * https://www.suse.com/security/cve/CVE-2025-40048.html
  * https://www.suse.com/security/cve/CVE-2025-40055.html
  * https://www.suse.com/security/cve/CVE-2025-40070.html
  * https://www.suse.com/security/cve/CVE-2025-40083.html
  * https://www.suse.com/security/cve/CVE-2025-40173.html
  * https://www.suse.com/security/cve/CVE-2025-40186.html
  * https://www.suse.com/security/cve/CVE-2025-40204.html
  * https://www.suse.com/security/cve/CVE-2025-40205.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1070872
  * https://bugzilla.suse.com/show_bug.cgi?id=1220419
  * https://bugzilla.suse.com/show_bug.cgi?id=1228688
  * https://bugzilla.suse.com/show_bug.cgi?id=1247227
  * https://bugzilla.suse.com/show_bug.cgi?id=1249650
  * https://bugzilla.suse.com/show_bug.cgi?id=1250009
  * https://bugzilla.suse.com/show_bug.cgi?id=1250083
  * https://bugzilla.suse.com/show_bug.cgi?id=1250176
  * https://bugzilla.suse.com/show_bug.cgi?id=1250206
  * https://bugzilla.suse.com/show_bug.cgi?id=1250374
  * https://bugzilla.suse.com/show_bug.cgi?id=1250650
  * https://bugzilla.suse.com/show_bug.cgi?id=1250705
  * https://bugzilla.suse.com/show_bug.cgi?id=1251154
  * https://bugzilla.suse.com/show_bug.cgi?id=1251159
  * https://bugzilla.suse.com/show_bug.cgi?id=1251173
  * https://bugzilla.suse.com/show_bug.cgi?id=1251285
  * https://bugzilla.suse.com/show_bug.cgi?id=1251322
  * https://bugzilla.suse.com/show_bug.cgi?id=1251728
  * https://bugzilla.suse.com/show_bug.cgi?id=1251786
  * https://bugzilla.suse.com/show_bug.cgi?id=1252033
  * https://bugzilla.suse.com/show_bug.cgi?id=1252303
  * https://bugzilla.suse.com/show_bug.cgi?id=1252519
  * https://bugzilla.suse.com/show_bug.cgi?id=1252640
  * https://bugzilla.suse.com/show_bug.cgi?id=1252763
  * https://bugzilla.suse.com/show_bug.cgi?id=1252773
  * https://bugzilla.suse.com/show_bug.cgi?id=1252780
  * https://bugzilla.suse.com/show_bug.cgi?id=1252821
  * https://bugzilla.suse.com/show_bug.cgi?id=1252836
  * https://bugzilla.suse.com/show_bug.cgi?id=1252862
  * https://bugzilla.suse.com/show_bug.cgi?id=1252912
  * https://bugzilla.suse.com/show_bug.cgi?id=1253237
  * https://bugzilla.suse.com/show_bug.cgi?id=1253421
  * https://bugzilla.suse.com/show_bug.cgi?id=1253436
  * https://bugzilla.suse.com/show_bug.cgi?id=1253438
  * https://bugzilla.suse.com/show_bug.cgi?id=1253456

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20251224/c88af0b6/attachment.htm>


More information about the sle-security-updates mailing list