SUSE-SU-2025:4515-1: important: Security update for the Linux Kernel
SLE-SECURITY-UPDATES
null at suse.de
Wed Dec 24 08:31:44 UTC 2025
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2025:4515-1
Release Date: 2025-12-23T16:20:28Z
Rating: important
References:
* bsc#1070872
* bsc#1220419
* bsc#1228688
* bsc#1247227
* bsc#1249650
* bsc#1250009
* bsc#1250083
* bsc#1250176
* bsc#1250206
* bsc#1250374
* bsc#1250650
* bsc#1250705
* bsc#1251154
* bsc#1251159
* bsc#1251173
* bsc#1251285
* bsc#1251322
* bsc#1251728
* bsc#1251786
* bsc#1252033
* bsc#1252303
* bsc#1252519
* bsc#1252640
* bsc#1252763
* bsc#1252773
* bsc#1252780
* bsc#1252821
* bsc#1252836
* bsc#1252862
* bsc#1252912
* bsc#1253237
* bsc#1253421
* bsc#1253436
* bsc#1253438
* bsc#1253456
Cross-References:
* CVE-2022-50364
* CVE-2022-50368
* CVE-2022-50494
* CVE-2022-50545
* CVE-2022-50551
* CVE-2022-50569
* CVE-2022-50578
* CVE-2023-53229
* CVE-2023-53369
* CVE-2023-53431
* CVE-2023-53542
* CVE-2023-53597
* CVE-2023-53641
* CVE-2023-53676
* CVE-2025-38436
* CVE-2025-39819
* CVE-2025-39967
* CVE-2025-40001
* CVE-2025-40027
* CVE-2025-40030
* CVE-2025-40040
* CVE-2025-40048
* CVE-2025-40055
* CVE-2025-40070
* CVE-2025-40083
* CVE-2025-40173
* CVE-2025-40186
* CVE-2025-40204
* CVE-2025-40205
CVSS scores:
* CVE-2022-50364 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50364 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50368 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2022-50368 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-50368 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50494 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50545 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50551 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50551 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50569 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50569 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50578 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50578 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53229 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53369 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53369 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53431 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53431 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53542 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53597 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53641 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53641 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53676 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38436 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38436 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38436 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39819 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39967 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39967 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40001 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40001 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40027 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40027 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40030 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40040 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40055 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40083 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40173 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40173 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40186 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40186 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40204 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-40205 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* SUSE Linux Enterprise High Performance Computing 12 SP5
* SUSE Linux Enterprise Live Patching 12-SP5
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server 12 SP5 LTSS
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
An update that solves 29 vulnerabilities and has six security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2022-50364: i2c: mux: reg: check return value after calling
platform_get_resource() (bsc#1250083).
* CVE-2022-50368: drm/msm/dsi: fix memory corruption with too many bridges
(bsc#1250009).
* CVE-2022-50494: thermal: intel_powerclamp: Use get_cpu() instead of
smp_processor_id() to avoid crash (bsc#1251173).
* CVE-2022-50545: r6040: Fix kmemleak in probe and remove (bsc#1251285).
* CVE-2022-50551: wifi: brcmfmac: Fix potential shift-out-of-bounds in
brcmf_fw_alloc_request() (bsc#1251322).
* CVE-2022-50569: xfrm: Update ipcomp_scratches with NULL when freed
(bsc#1252640).
* CVE-2022-50578: class: fix possible memory leak in __class_register()
(bsc#1252519).
* CVE-2023-53229: wifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for
non-uploaded sta (bsc#1249650).
* CVE-2023-53369: net: dcb: choose correct policy to parse DCB_ATTR_BCN
(bsc#1250206).
* CVE-2023-53431: scsi: ses: Don't attach if enclosure has no components
(bsc#1250374).
* CVE-2023-53542: ARM: dts: exynos: Use Exynos5420 compatible for the MIPI
video phy (bsc#1251154).
* CVE-2023-53597: cifs: fix mid leak during reconnection after timeout
threshold (bsc#1251159).
* CVE-2023-53641: wifi: ath9k: hif_usb: fix memory leak of remain_skbs
(bsc#1251728).
* CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in
lio_target_nacl_info_show() (bsc#1251786).
* CVE-2025-38436: drm/scheduler: signal scheduled fence when kill job
(bsc#1247227).
* CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).
* CVE-2025-39967: fbcon: fix integer overflow in fbcon_do_set_font
(bsc#1252033).
* CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue
(bsc#1252303).
* CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).
* CVE-2025-40030: pinctrl: check the return value of
pinmux_ops::get_function_name() (bsc#1252773).
* CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise
(bsc#1252780).
* CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask
(bsc#1252862).
* CVE-2025-40055: ocfs2: fix double free in user_cluster_connect()
(bsc#1252821).
* CVE-2025-40070: pps: fix warning in pps_register_cdev when register device
fail (bsc#1252836).
* CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue
(bsc#1252912).
* CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth
(bsc#1253421).
* CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).
* CVE-2025-40205: btrfs: avoid potential out-of-bounds in btrfs_encode_fh()
(bsc#1253456).
The following non-security bugs were fixed:
* KVM: x86: Give a hint when Win2016 might fail to boot due to XSAVES erratum
(git-fixes).
* PCI: aardvark: Fix checking for MEM resource type (git-fixes).
* cifs: Check the lease context if we actually got a lease (bsc#1228688).
* cifs: return a single-use cfid if we did not get a lease (bsc#1228688).
* dmaengine: bcm2835: Avoid GFP_KERNEL in device_prep_slave_sg (bsc#1070872).
* kabi/severities: Update info about kvm_86_ops.
* net/sched: sch_hfsc: upgrade 'rt' to 'sc' when it becomes a inner curve
(bsc#1220419).
* skmsg: Return copied bytes in sk_msg_memcopy_from_iter (bsc#1250650).
* smb3: fix Open files on server counter going negative (git-fixes).
* tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate
psock->cork (bsc#1250705).
* tcp_bpf: Fix copied value in tcp_bpf_sendmsg (bsc#1250650).
* thermal: intel_powerclamp: Use first online CPU as control_cpu
(bsc#1251173).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-4515=1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4515=1
* SUSE Linux Enterprise Live Patching 12-SP5
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-4515=1
## Package List:
* SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* kernel-default-base-debuginfo-4.12.14-122.283.1
* cluster-md-kmp-default-4.12.14-122.283.1
* dlm-kmp-default-debuginfo-4.12.14-122.283.1
* gfs2-kmp-default-debuginfo-4.12.14-122.283.1
* kernel-default-debugsource-4.12.14-122.283.1
* kernel-default-debuginfo-4.12.14-122.283.1
* cluster-md-kmp-default-debuginfo-4.12.14-122.283.1
* kernel-syms-4.12.14-122.283.1
* dlm-kmp-default-4.12.14-122.283.1
* gfs2-kmp-default-4.12.14-122.283.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.283.1
* ocfs2-kmp-default-4.12.14-122.283.1
* kernel-default-devel-4.12.14-122.283.1
* kernel-default-base-4.12.14-122.283.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-4.12.14-122.283.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
* kernel-source-4.12.14-122.283.1
* kernel-macros-4.12.14-122.283.1
* kernel-devel-4.12.14-122.283.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (s390x)
* kernel-default-man-4.12.14-122.283.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64)
* kernel-default-devel-debuginfo-4.12.14-122.283.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
* kernel-default-base-debuginfo-4.12.14-122.283.1
* cluster-md-kmp-default-4.12.14-122.283.1
* dlm-kmp-default-debuginfo-4.12.14-122.283.1
* gfs2-kmp-default-debuginfo-4.12.14-122.283.1
* kernel-default-devel-debuginfo-4.12.14-122.283.1
* kernel-default-debugsource-4.12.14-122.283.1
* kernel-default-debuginfo-4.12.14-122.283.1
* cluster-md-kmp-default-debuginfo-4.12.14-122.283.1
* kernel-syms-4.12.14-122.283.1
* dlm-kmp-default-4.12.14-122.283.1
* gfs2-kmp-default-4.12.14-122.283.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.283.1
* ocfs2-kmp-default-4.12.14-122.283.1
* kernel-default-devel-4.12.14-122.283.1
* kernel-default-base-4.12.14-122.283.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64)
* kernel-default-4.12.14-122.283.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
* kernel-source-4.12.14-122.283.1
* kernel-macros-4.12.14-122.283.1
* kernel-devel-4.12.14-122.283.1
* SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
* kernel-default-4.12.14-122.283.1
* SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
* kernel-default-debugsource-4.12.14-122.283.1
* kgraft-patch-4_12_14-122_283-default-1-8.3.1
* kernel-default-kgraft-devel-4.12.14-122.283.1
* kernel-default-debuginfo-4.12.14-122.283.1
* kernel-default-kgraft-4.12.14-122.283.1
## References:
* https://www.suse.com/security/cve/CVE-2022-50364.html
* https://www.suse.com/security/cve/CVE-2022-50368.html
* https://www.suse.com/security/cve/CVE-2022-50494.html
* https://www.suse.com/security/cve/CVE-2022-50545.html
* https://www.suse.com/security/cve/CVE-2022-50551.html
* https://www.suse.com/security/cve/CVE-2022-50569.html
* https://www.suse.com/security/cve/CVE-2022-50578.html
* https://www.suse.com/security/cve/CVE-2023-53229.html
* https://www.suse.com/security/cve/CVE-2023-53369.html
* https://www.suse.com/security/cve/CVE-2023-53431.html
* https://www.suse.com/security/cve/CVE-2023-53542.html
* https://www.suse.com/security/cve/CVE-2023-53597.html
* https://www.suse.com/security/cve/CVE-2023-53641.html
* https://www.suse.com/security/cve/CVE-2023-53676.html
* https://www.suse.com/security/cve/CVE-2025-38436.html
* https://www.suse.com/security/cve/CVE-2025-39819.html
* https://www.suse.com/security/cve/CVE-2025-39967.html
* https://www.suse.com/security/cve/CVE-2025-40001.html
* https://www.suse.com/security/cve/CVE-2025-40027.html
* https://www.suse.com/security/cve/CVE-2025-40030.html
* https://www.suse.com/security/cve/CVE-2025-40040.html
* https://www.suse.com/security/cve/CVE-2025-40048.html
* https://www.suse.com/security/cve/CVE-2025-40055.html
* https://www.suse.com/security/cve/CVE-2025-40070.html
* https://www.suse.com/security/cve/CVE-2025-40083.html
* https://www.suse.com/security/cve/CVE-2025-40173.html
* https://www.suse.com/security/cve/CVE-2025-40186.html
* https://www.suse.com/security/cve/CVE-2025-40204.html
* https://www.suse.com/security/cve/CVE-2025-40205.html
* https://bugzilla.suse.com/show_bug.cgi?id=1070872
* https://bugzilla.suse.com/show_bug.cgi?id=1220419
* https://bugzilla.suse.com/show_bug.cgi?id=1228688
* https://bugzilla.suse.com/show_bug.cgi?id=1247227
* https://bugzilla.suse.com/show_bug.cgi?id=1249650
* https://bugzilla.suse.com/show_bug.cgi?id=1250009
* https://bugzilla.suse.com/show_bug.cgi?id=1250083
* https://bugzilla.suse.com/show_bug.cgi?id=1250176
* https://bugzilla.suse.com/show_bug.cgi?id=1250206
* https://bugzilla.suse.com/show_bug.cgi?id=1250374
* https://bugzilla.suse.com/show_bug.cgi?id=1250650
* https://bugzilla.suse.com/show_bug.cgi?id=1250705
* https://bugzilla.suse.com/show_bug.cgi?id=1251154
* https://bugzilla.suse.com/show_bug.cgi?id=1251159
* https://bugzilla.suse.com/show_bug.cgi?id=1251173
* https://bugzilla.suse.com/show_bug.cgi?id=1251285
* https://bugzilla.suse.com/show_bug.cgi?id=1251322
* https://bugzilla.suse.com/show_bug.cgi?id=1251728
* https://bugzilla.suse.com/show_bug.cgi?id=1251786
* https://bugzilla.suse.com/show_bug.cgi?id=1252033
* https://bugzilla.suse.com/show_bug.cgi?id=1252303
* https://bugzilla.suse.com/show_bug.cgi?id=1252519
* https://bugzilla.suse.com/show_bug.cgi?id=1252640
* https://bugzilla.suse.com/show_bug.cgi?id=1252763
* https://bugzilla.suse.com/show_bug.cgi?id=1252773
* https://bugzilla.suse.com/show_bug.cgi?id=1252780
* https://bugzilla.suse.com/show_bug.cgi?id=1252821
* https://bugzilla.suse.com/show_bug.cgi?id=1252836
* https://bugzilla.suse.com/show_bug.cgi?id=1252862
* https://bugzilla.suse.com/show_bug.cgi?id=1252912
* https://bugzilla.suse.com/show_bug.cgi?id=1253237
* https://bugzilla.suse.com/show_bug.cgi?id=1253421
* https://bugzilla.suse.com/show_bug.cgi?id=1253436
* https://bugzilla.suse.com/show_bug.cgi?id=1253438
* https://bugzilla.suse.com/show_bug.cgi?id=1253456
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20251224/c88af0b6/attachment.htm>
More information about the sle-security-updates
mailing list