SUSE-SU-2025:01600-1: important: Security update for the Linux Kernel
SLE-SECURITY-UPDATES
null at suse.de
Tue May 20 12:31:34 UTC 2025
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2025:01600-1
Release Date: 2025-05-20T11:49:39Z
Rating: important
References:
* bsc#1205495
* bsc#1230764
* bsc#1231103
* bsc#1231450
* bsc#1231910
* bsc#1233461
* bsc#1234209
* bsc#1235038
* bsc#1235526
* bsc#1235729
* bsc#1235870
* bsc#1236086
* bsc#1236111
* bsc#1237757
* bsc#1237839
* bsc#1237840
* bsc#1237845
* bsc#1237868
* bsc#1237873
* bsc#1237885
* bsc#1237911
* bsc#1237912
* bsc#1237926
* bsc#1237939
* bsc#1237950
* bsc#1237951
* bsc#1237954
* bsc#1237957
* bsc#1237979
* bsc#1237984
* bsc#1238000
* bsc#1238016
* bsc#1238022
* bsc#1238037
* bsc#1238092
* bsc#1238093
* bsc#1238097
* bsc#1238099
* bsc#1238138
* bsc#1238139
* bsc#1238155
* bsc#1238156
* bsc#1238233
* bsc#1238243
* bsc#1238244
* bsc#1238307
* bsc#1238335
* bsc#1238377
* bsc#1238398
* bsc#1238455
* bsc#1238497
* bsc#1238507
* bsc#1238537
* bsc#1238645
* bsc#1238714
* bsc#1238722
* bsc#1238737
* bsc#1238746
* bsc#1238760
* bsc#1238768
* bsc#1238803
* bsc#1238835
* bsc#1238838
* bsc#1238844
* bsc#1238893
* bsc#1238905
* bsc#1238911
* bsc#1238919
* bsc#1238930
* bsc#1238937
* bsc#1238938
* bsc#1238984
* bsc#1239070
* bsc#1239111
* bsc#1239112
* bsc#1239474
* bsc#1239994
* bsc#1240185
* bsc#1240243
* bsc#1240250
* bsc#1240270
* bsc#1240309
* bsc#1240583
* bsc#1240590
* bsc#1240701
* bsc#1240703
* bsc#1240709
* bsc#1240712
* bsc#1240714
* bsc#1240717
* bsc#1240739
* bsc#1240740
* bsc#1240742
* bsc#1240835
* bsc#1240942
* bsc#1240943
* bsc#1241145
* bsc#1241266
* bsc#1241347
* bsc#1241371
* bsc#1241373
* bsc#1241404
* bsc#1241405
* bsc#1241408
* bsc#1241458
* bsc#1241526
* bsc#1241601
* bsc#1241640
* bsc#1242778
Cross-References:
* CVE-2020-36789
* CVE-2021-47659
* CVE-2021-47668
* CVE-2021-47669
* CVE-2022-49044
* CVE-2022-49055
* CVE-2022-49060
* CVE-2022-49086
* CVE-2022-49111
* CVE-2022-49118
* CVE-2022-49121
* CVE-2022-49137
* CVE-2022-49171
* CVE-2022-49175
* CVE-2022-49176
* CVE-2022-49179
* CVE-2022-49188
* CVE-2022-49197
* CVE-2022-49205
* CVE-2022-49232
* CVE-2022-49290
* CVE-2022-49305
* CVE-2022-49325
* CVE-2022-49335
* CVE-2022-49351
* CVE-2022-49385
* CVE-2022-49390
* CVE-2022-49411
* CVE-2022-49442
* CVE-2022-49465
* CVE-2022-49478
* CVE-2022-49489
* CVE-2022-49504
* CVE-2022-49521
* CVE-2022-49525
* CVE-2022-49534
* CVE-2022-49535
* CVE-2022-49536
* CVE-2022-49537
* CVE-2022-49542
* CVE-2022-49561
* CVE-2022-49590
* CVE-2022-49658
* CVE-2022-49668
* CVE-2022-49693
* CVE-2022-49725
* CVE-2022-49728
* CVE-2022-49730
* CVE-2022-49749
* CVE-2022-49753
* CVE-2023-53023
* CVE-2023-53032
* CVE-2024-46763
* CVE-2024-46865
* CVE-2024-49994
* CVE-2024-50038
* CVE-2024-50272
* CVE-2024-52559
* CVE-2024-54683
* CVE-2024-56590
* CVE-2024-56641
* CVE-2024-57924
* CVE-2024-57980
* CVE-2024-57981
* CVE-2024-58005
* CVE-2024-58009
* CVE-2024-58017
* CVE-2024-58063
* CVE-2024-58093
* CVE-2025-21635
* CVE-2025-21735
* CVE-2025-21750
* CVE-2025-21758
* CVE-2025-21764
* CVE-2025-21768
* CVE-2025-21772
* CVE-2025-21779
* CVE-2025-21806
* CVE-2025-21862
* CVE-2025-21881
* CVE-2025-21909
* CVE-2025-21910
* CVE-2025-21926
* CVE-2025-21927
* CVE-2025-21931
* CVE-2025-21941
* CVE-2025-21948
* CVE-2025-21956
* CVE-2025-21957
* CVE-2025-21963
* CVE-2025-21964
* CVE-2025-21976
* CVE-2025-22004
* CVE-2025-22008
* CVE-2025-22010
* CVE-2025-22018
* CVE-2025-22053
* CVE-2025-22055
* CVE-2025-22060
* CVE-2025-22086
* CVE-2025-23131
* CVE-2025-37785
CVSS scores:
* CVE-2020-36789 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2020-36789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2020-36789 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47659 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2021-47659 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2021-47668 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47668 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47669 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-47669 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49044 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49044 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2022-49055 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49060 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49086 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49086 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49111 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49118 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49121 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49137 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49137 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49137 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49171 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49175 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49176 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49176 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49179 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49188 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49197 ( SUSE ): 4.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49197 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
* CVE-2022-49205 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49232 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49232 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49232 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49290 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49290 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
* CVE-2022-49290 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49305 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49305 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49325 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49325 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49335 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49335 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49351 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49385 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49385 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49390 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49390 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49411 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49411 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49442 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49465 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49465 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49465 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49478 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49489 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49489 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49504 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49521 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49521 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49525 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49525 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49534 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-49534 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-49534 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49535 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49535 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49535 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49536 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49536 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49536 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49537 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49537 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49542 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49542 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49542 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49561 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49590 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2022-49590 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2022-49590 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49668 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49693 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49693 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49725 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49728 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49728 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-49728 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49730 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49730 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49749 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49749 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49749 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49753 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53023 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46763 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46763 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46865 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-49994 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49994 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50272 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-52559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-52559 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54683 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-54683 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54683 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56590 ( SUSE ): 6.9
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56590 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56641 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56641 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57924 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57980 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57980 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58005 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58017 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58017 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-58017 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58063 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58093 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-58093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21635 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21735 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21750 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21764 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21764 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21772 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21806 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21862 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21909 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21910 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21926 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21926 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21927 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21927 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21931 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21941 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21941 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21948 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21956 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-21956 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-21957 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21957 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21963 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21964 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21964 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21976 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-22004 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22004 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-22004 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-22008 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22010 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22018 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22018 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22053 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22055 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22055 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-22060 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22086 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22086 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-23131 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-23131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37785 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37785 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-37785 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
Affected Products:
* SUSE Linux Enterprise High Performance Computing 12 SP5
* SUSE Linux Enterprise Live Patching 12-SP5
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server 12 SP5 LTSS
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
An update that solves 102 vulnerabilities and has seven security fixes can now
be installed.
## Description:
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2021-47659: drm/plane: Move range check for format_count earlier
(bsc#1237839).
* CVE-2022-49044: dm integrity: fix memory corruption when tag_size is less
than digest size (bsc#1237840).
* CVE-2022-49055: drm/amdkfd: Check for potential null return of
kmalloc_array() (bsc#1237868).
* CVE-2022-49060: net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()
(bsc#1237845).
* CVE-2022-49086: net: openvswitch: fix leak of nested actions (bsc#1238037).
* CVE-2022-49111: Bluetooth: Fix use after free in hci_send_acl (bsc#1237984).
* CVE-2022-49118: scsi: hisi_sas: Free irq vectors in order for v3 HW
(bsc#1237979).
* CVE-2022-49121: scsi: pm8001: Fix tag leaks on error (bsc#1237926).
* CVE-2022-49137: drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence
obj (bsc#1238155).
* CVE-2022-49175: PM: core: keep irq flags in device_pm_check_callbacks()
(bsc#1238099).
* CVE-2022-49176: bfq: fix use-after-free in bfq_dispatch_request
(bsc#1238097).
* CVE-2022-49179: block, bfq: do not move oom_bfqq (bsc#1238092).
* CVE-2022-49188: remoteproc: qcom_q6v5_mss: Fix some leaks in
q6v5_alloc_memory_region (bsc#1238138).
* CVE-2022-49197: af_netlink: Fix shift out of bounds in group mask
calculation (bsc#1238455).
* CVE-2022-49205: bpf, sockmap: Fix double uncharge the mem of sk_msg
(bsc#1238335).
* CVE-2022-49232: drm/amd/display: Fix a NULL pointer dereference in
amdgpu_dm_connector_add_common_modes() (bsc#1238139).
* CVE-2022-49290: mac80211: fix potential double free on mesh join
(bsc#1238156).
* CVE-2022-49305: drivers: staging: rtl8192u: Fix deadlock in
ieee80211_beacons_stop() (bsc#1238645).
* CVE-2022-49325: tcp: add accessors to read/set tp->snd_cwnd (bsc#1238398).
* CVE-2022-49335: drm/amdgpu/cs: make commands with 0 chunks illegal behaviour
(bsc#1238377).
* CVE-2022-49351: net: altera: Fix refcount leak in altera_tse_mdio_create
(bsc#1237939).
* CVE-2022-49385: driver: base: fix UAF when driver_attach failed
(bsc#1237951).
* CVE-2022-49390: macsec: fix UAF bug for real_dev (bsc#1238233).
* CVE-2022-49411: bfq: Make sure bfqg for which we are queueing requests is
online (bsc#1238307).
* CVE-2022-49442: drivers/base/node.c: fix compaction sysfs file leak
(bsc#1238243).
* CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled
(bsc#1238919).
* CVE-2022-49478: media: pvrusb2: fix array-index-out-of-bounds in
pvr2_i2c_core_init (bsc#1238000).
* CVE-2022-49489: drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use
after memory free during pm runtime resume (bsc#1238244).
* CVE-2022-49504: scsi: lpfc: Inhibit aborts if external loopback plug is
inserted (bsc#1238835).
* CVE-2022-49521: scsi: lpfc: Fix resource leak in lpfc_sli4_send_seq_to_ulp()
(bsc#1238938).
* CVE-2022-49525: media: cx25821: Fix the warning when removing the module
(bsc#1238022).
* CVE-2022-49534: scsi: lpfc: Protect memory leak for NPIV ports sending
PLOGI_RJT (bsc#1238893).
* CVE-2022-49535: scsi: lpfc: Fix null pointer dereference after failing to
issue FLOGI and PLOGI (bsc#1238937).
* CVE-2022-49536: scsi: lpfc: Fix SCSI I/O completion and abort handler
deadlock (bsc#1238838).
* CVE-2022-49537: scsi: lpfc: Fix call trace observed during I/O with CMF
enabled (bsc#1238930).
* CVE-2022-49542: scsi: lpfc: Move cfg_log_verbose check before calling
lpfc_dmp_dbg() (bsc#1238722).
* CVE-2022-49561: netfilter: conntrack: re-fetch conntrack after insertion
(bsc#1238537).
* CVE-2022-49590: igmp: Fix data-races around sysctl_igmp_llm_reports
(bsc#1238844).
* CVE-2022-49658: bpf, selftests: Add verifier test case for
imm=0,umin=0,umax=1 scalar (bsc#1238803).
* CVE-2022-49668: PM / devfreq: exynos-ppmu: Fix refcount leak in
of_get_devfreq_events (bsc#1237957).
* CVE-2022-49693: drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf
(bsc#1237954).
* CVE-2022-49725: i40e: Fix call trace in setup_tx_descriptors (bsc#1238016).
* CVE-2022-49728: kABI workaround for changeing the variable length type to
size_t (bsc#1239111).
* CVE-2022-49730: scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO
is aborted (bsc#1239070).
* CVE-2022-49749: i2c: designware: use casting of u64 in clock multiplication
to avoid overflow (bsc#1240243).
* CVE-2022-49753: dmaengine: Fix double increment of client_count in
dma_chan_get() (bsc#1240250).
* CVE-2023-53023: net: nfc: Fix use-after-free in local_cleanup()
(bsc#1240309).
* CVE-2023-53032: netfilter: ipset: Fix overflow before widen in the
bitmap_ip_create() function (bsc#1240270).
* CVE-2024-49994: block: fix integer overflow in BLKSECDISCARD (bsc#1237757).
* CVE-2024-50038: netfilter: xtables: fix typo causing some targets not to
load on IPv6 (bsc#1231910).
* CVE-2024-50272: filemap: Fix bounds checking in filemap_read() (bsc#1233461
bsc#1234209).
* CVE-2024-52559: drm/msm/gem: prevent integer overflow in
msm_ioctl_gem_submit() (bsc#1238507).
* CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock
(bsc#1235729).
* CVE-2024-56590: skbuff: introduce skb_pull_data (bsc#1235038).
* CVE-2024-56641: net/smc: initialize close_work early to avoid warning
(bsc#1235526).
* CVE-2024-57924: fs: relax assertions on failure to encode file handles
(bsc#1236086).
* CVE-2024-57980: media: uvcvideo: Fix double free in error path
(bsc#1237911).
* CVE-2024-57981: usb: xhci: Fix NULL pointer dereference on certain command
aborts (bsc#1237912).
* CVE-2024-58005: tpm: Change to kvalloc() in eventlog/acpi.c (bsc#1237873).
* CVE-2024-58009: Bluetooth: L2CAP: handle NULL sock pointer in
l2cap_sock_alloc (bsc#1238760).
* CVE-2024-58017: printk: Fix signed integer overflow when defining
LOG_BUF_LEN_MAX (bsc#1237950 bsc#1239112).
* CVE-2024-58063: wifi: rtlwifi: fix memory leaks and invalid access at probe
error path (bsc#1238984).
* CVE-2024-58093: PCI/ASPM: Fix link state exit during switch upstream
function removal (bsc#1241347).
* CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using
current->nsproxy (bsc#1236111).
* CVE-2025-21735: NFC: nci: Add bounds checking in nci_hci_create_pipe()
(bsc#1238497).
* CVE-2025-21750: wifi: brcmfmac: Check the return value of
of_property_read_string_index() (bsc#1238905).
* CVE-2025-21758: ipv6: mcast: add RCU protection to mld_newpack()
(bsc#1238737).
* CVE-2025-21768: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6
lwtunnels (bsc#1238714).
* CVE-2025-21772: partitions: mac: fix handling of bogus partition table
(bsc#1238911).
* CVE-2025-21779: KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC
isn't in-kernel (bsc#1238768).
* CVE-2025-21806: net: let net.core.dev_weight always be non-zero
(bsc#1238746).
* CVE-2025-21862: drop_monitor: fix incorrect initialization order
(bsc#1239474).
* CVE-2025-21881: uprobes: Reject the shared zeropage in uprobe_write_opcode()
(bsc#1240185).
* CVE-2025-21909: wifi: nl80211: reject cooked mode if it is set along with
other flags (bsc#1240590).
* CVE-2025-21910: wifi: cfg80211: regulatory: improve invalid hints checking
(bsc#1240583).
* CVE-2025-21926: net: gso: fix ownership in __udp_gso_segment (bsc#1240712).
* CVE-2025-21927: nvme-tcp: fix potential memory corruption in
nvme_tcp_recv_pdu() (bsc#1240714).
* CVE-2025-21931: hwpoison, memory_hotplug: lock folio before unmap hwpoisoned
folio (bsc#1240709).
* CVE-2025-21941: drm/amd/display: Fix null check for pipe_ctx->plane_state in
(bsc#1240701).
* CVE-2025-21948: HID: appleir: Fix potential NULL dereference at raw event
handle (bsc#1240703).
* CVE-2025-21956: drm/amd/display: Assign normalized_pix_clk when color depth
= 14 (bsc#1240739).
* CVE-2025-21957: scsi: qla1280: Fix kernel oops when debug level > 2
(bsc#1240742).
* CVE-2025-21963: cifs: Fix integer overflow while processing acdirmax mount
option (bsc#1240717).
* CVE-2025-21964: cifs: Fix integer overflow while processing acregmax mount
option (bsc#1240740).
* CVE-2025-21976: fbdev: hyperv_fb: Allow graceful removal of framebuffer
(bsc#1241145).
* CVE-2025-22004: net: atm: fix use after free in lec_send() (bsc#1240835).
* CVE-2025-22008: regulator: check that dummy regulator has been probed before
using it (bsc#1240942).
* CVE-2025-22010: RDMA/hns: Fix soft lockup during bt pages loop
(bsc#1240943).
* CVE-2025-22018: atm: Fix NULL pointer dereference (bsc#1241266).
* CVE-2025-22053: net: ibmveth: make veth_pool_store stop hanging
(bsc#1241373).
* CVE-2025-22055: net: fix geneve_opt length integer overflow (bsc#1241371).
* CVE-2025-22060: net: mvpp2: Prevent parser TCAM memory corruption
(bsc#1241526).
* CVE-2025-22086: RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow
(bsc#1241458).
* CVE-2025-23131: dlm: prevent NPD when writing a positive value to event_done
(bsc#1241601).
* CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640).
The following non-security bugs were fixed:
* Revert "ipv6: Fix signed integer overflow in __ip6_append_data"
* Revert "kABI workaround for changeing the variable length type to size_t"
* audit: Send netlink ACK before setting connection in auditd_set
(bsc#1231450).
* brcmfmac: of: Use devm_kstrdup for board_type & check for errors
(bsc#1238905)
* brcmfmac: of: remove redundant variable len (bsc#1238905)
* cifs: Fix integer overflow while processing actimeo mount option (git-
fixes).
* fbdev: hyperv_fb: Simplify hvfb_putmem (git-fixes).
* net: Fix data-races around weight_p and dev_weight_[rt]x_bias (bsc#1238746)
* remoteproc: qcom_q6v5_mss: Extract mba/mpss from memory-region (bsc#1238138)
* tpm, tpm_tis: Workaround failed command reception on Infineon devices
(bsc#1235870).
* tpm: tis: Double the timeout B to 4s (bsc#1235870).
* wifi: brcmfmac: use strreplace() in brcmf_of_probe() (bsc#1238905)
* x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778).
* x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778).
* x86/bpf: Call branch history clearing sequence on exit (bsc#1242778).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1600=1
* SUSE Linux Enterprise Live Patching 12-SP5
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1600=1
* SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1600=1
## Package List:
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
* dlm-kmp-default-4.12.14-122.258.1
* gfs2-kmp-default-4.12.14-122.258.1
* cluster-md-kmp-default-4.12.14-122.258.1
* kernel-default-base-debuginfo-4.12.14-122.258.1
* cluster-md-kmp-default-debuginfo-4.12.14-122.258.1
* kernel-syms-4.12.14-122.258.1
* dlm-kmp-default-debuginfo-4.12.14-122.258.1
* kernel-default-debugsource-4.12.14-122.258.1
* kernel-default-devel-debuginfo-4.12.14-122.258.1
* kernel-default-base-4.12.14-122.258.1
* ocfs2-kmp-default-4.12.14-122.258.1
* kernel-default-debuginfo-4.12.14-122.258.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.258.1
* gfs2-kmp-default-debuginfo-4.12.14-122.258.1
* kernel-default-devel-4.12.14-122.258.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64)
* kernel-default-4.12.14-122.258.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
* kernel-devel-4.12.14-122.258.1
* kernel-macros-4.12.14-122.258.1
* kernel-source-4.12.14-122.258.1
* SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
* kernel-default-4.12.14-122.258.1
* SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
* kernel-default-kgraft-devel-4.12.14-122.258.1
* kgraft-patch-4_12_14-122_258-default-1-8.3.1
* kernel-default-kgraft-4.12.14-122.258.1
* kernel-default-debugsource-4.12.14-122.258.1
* kernel-default-debuginfo-4.12.14-122.258.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* dlm-kmp-default-4.12.14-122.258.1
* gfs2-kmp-default-4.12.14-122.258.1
* cluster-md-kmp-default-4.12.14-122.258.1
* kernel-default-base-debuginfo-4.12.14-122.258.1
* cluster-md-kmp-default-debuginfo-4.12.14-122.258.1
* kernel-syms-4.12.14-122.258.1
* dlm-kmp-default-debuginfo-4.12.14-122.258.1
* kernel-default-debugsource-4.12.14-122.258.1
* ocfs2-kmp-default-4.12.14-122.258.1
* kernel-default-base-4.12.14-122.258.1
* kernel-default-debuginfo-4.12.14-122.258.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.258.1
* gfs2-kmp-default-debuginfo-4.12.14-122.258.1
* kernel-default-devel-4.12.14-122.258.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-4.12.14-122.258.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
* kernel-devel-4.12.14-122.258.1
* kernel-macros-4.12.14-122.258.1
* kernel-source-4.12.14-122.258.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (s390x)
* kernel-default-man-4.12.14-122.258.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64)
* kernel-default-devel-debuginfo-4.12.14-122.258.1
## References:
* https://www.suse.com/security/cve/CVE-2020-36789.html
* https://www.suse.com/security/cve/CVE-2021-47659.html
* https://www.suse.com/security/cve/CVE-2021-47668.html
* https://www.suse.com/security/cve/CVE-2021-47669.html
* https://www.suse.com/security/cve/CVE-2022-49044.html
* https://www.suse.com/security/cve/CVE-2022-49055.html
* https://www.suse.com/security/cve/CVE-2022-49060.html
* https://www.suse.com/security/cve/CVE-2022-49086.html
* https://www.suse.com/security/cve/CVE-2022-49111.html
* https://www.suse.com/security/cve/CVE-2022-49118.html
* https://www.suse.com/security/cve/CVE-2022-49121.html
* https://www.suse.com/security/cve/CVE-2022-49137.html
* https://www.suse.com/security/cve/CVE-2022-49171.html
* https://www.suse.com/security/cve/CVE-2022-49175.html
* https://www.suse.com/security/cve/CVE-2022-49176.html
* https://www.suse.com/security/cve/CVE-2022-49179.html
* https://www.suse.com/security/cve/CVE-2022-49188.html
* https://www.suse.com/security/cve/CVE-2022-49197.html
* https://www.suse.com/security/cve/CVE-2022-49205.html
* https://www.suse.com/security/cve/CVE-2022-49232.html
* https://www.suse.com/security/cve/CVE-2022-49290.html
* https://www.suse.com/security/cve/CVE-2022-49305.html
* https://www.suse.com/security/cve/CVE-2022-49325.html
* https://www.suse.com/security/cve/CVE-2022-49335.html
* https://www.suse.com/security/cve/CVE-2022-49351.html
* https://www.suse.com/security/cve/CVE-2022-49385.html
* https://www.suse.com/security/cve/CVE-2022-49390.html
* https://www.suse.com/security/cve/CVE-2022-49411.html
* https://www.suse.com/security/cve/CVE-2022-49442.html
* https://www.suse.com/security/cve/CVE-2022-49465.html
* https://www.suse.com/security/cve/CVE-2022-49478.html
* https://www.suse.com/security/cve/CVE-2022-49489.html
* https://www.suse.com/security/cve/CVE-2022-49504.html
* https://www.suse.com/security/cve/CVE-2022-49521.html
* https://www.suse.com/security/cve/CVE-2022-49525.html
* https://www.suse.com/security/cve/CVE-2022-49534.html
* https://www.suse.com/security/cve/CVE-2022-49535.html
* https://www.suse.com/security/cve/CVE-2022-49536.html
* https://www.suse.com/security/cve/CVE-2022-49537.html
* https://www.suse.com/security/cve/CVE-2022-49542.html
* https://www.suse.com/security/cve/CVE-2022-49561.html
* https://www.suse.com/security/cve/CVE-2022-49590.html
* https://www.suse.com/security/cve/CVE-2022-49658.html
* https://www.suse.com/security/cve/CVE-2022-49668.html
* https://www.suse.com/security/cve/CVE-2022-49693.html
* https://www.suse.com/security/cve/CVE-2022-49725.html
* https://www.suse.com/security/cve/CVE-2022-49728.html
* https://www.suse.com/security/cve/CVE-2022-49730.html
* https://www.suse.com/security/cve/CVE-2022-49749.html
* https://www.suse.com/security/cve/CVE-2022-49753.html
* https://www.suse.com/security/cve/CVE-2023-53023.html
* https://www.suse.com/security/cve/CVE-2023-53032.html
* https://www.suse.com/security/cve/CVE-2024-46763.html
* https://www.suse.com/security/cve/CVE-2024-46865.html
* https://www.suse.com/security/cve/CVE-2024-49994.html
* https://www.suse.com/security/cve/CVE-2024-50038.html
* https://www.suse.com/security/cve/CVE-2024-50272.html
* https://www.suse.com/security/cve/CVE-2024-52559.html
* https://www.suse.com/security/cve/CVE-2024-54683.html
* https://www.suse.com/security/cve/CVE-2024-56590.html
* https://www.suse.com/security/cve/CVE-2024-56641.html
* https://www.suse.com/security/cve/CVE-2024-57924.html
* https://www.suse.com/security/cve/CVE-2024-57980.html
* https://www.suse.com/security/cve/CVE-2024-57981.html
* https://www.suse.com/security/cve/CVE-2024-58005.html
* https://www.suse.com/security/cve/CVE-2024-58009.html
* https://www.suse.com/security/cve/CVE-2024-58017.html
* https://www.suse.com/security/cve/CVE-2024-58063.html
* https://www.suse.com/security/cve/CVE-2024-58093.html
* https://www.suse.com/security/cve/CVE-2025-21635.html
* https://www.suse.com/security/cve/CVE-2025-21735.html
* https://www.suse.com/security/cve/CVE-2025-21750.html
* https://www.suse.com/security/cve/CVE-2025-21758.html
* https://www.suse.com/security/cve/CVE-2025-21764.html
* https://www.suse.com/security/cve/CVE-2025-21768.html
* https://www.suse.com/security/cve/CVE-2025-21772.html
* https://www.suse.com/security/cve/CVE-2025-21779.html
* https://www.suse.com/security/cve/CVE-2025-21806.html
* https://www.suse.com/security/cve/CVE-2025-21862.html
* https://www.suse.com/security/cve/CVE-2025-21881.html
* https://www.suse.com/security/cve/CVE-2025-21909.html
* https://www.suse.com/security/cve/CVE-2025-21910.html
* https://www.suse.com/security/cve/CVE-2025-21926.html
* https://www.suse.com/security/cve/CVE-2025-21927.html
* https://www.suse.com/security/cve/CVE-2025-21931.html
* https://www.suse.com/security/cve/CVE-2025-21941.html
* https://www.suse.com/security/cve/CVE-2025-21948.html
* https://www.suse.com/security/cve/CVE-2025-21956.html
* https://www.suse.com/security/cve/CVE-2025-21957.html
* https://www.suse.com/security/cve/CVE-2025-21963.html
* https://www.suse.com/security/cve/CVE-2025-21964.html
* https://www.suse.com/security/cve/CVE-2025-21976.html
* https://www.suse.com/security/cve/CVE-2025-22004.html
* https://www.suse.com/security/cve/CVE-2025-22008.html
* https://www.suse.com/security/cve/CVE-2025-22010.html
* https://www.suse.com/security/cve/CVE-2025-22018.html
* https://www.suse.com/security/cve/CVE-2025-22053.html
* https://www.suse.com/security/cve/CVE-2025-22055.html
* https://www.suse.com/security/cve/CVE-2025-22060.html
* https://www.suse.com/security/cve/CVE-2025-22086.html
* https://www.suse.com/security/cve/CVE-2025-23131.html
* https://www.suse.com/security/cve/CVE-2025-37785.html
* https://bugzilla.suse.com/show_bug.cgi?id=1205495
* https://bugzilla.suse.com/show_bug.cgi?id=1230764
* https://bugzilla.suse.com/show_bug.cgi?id=1231103
* https://bugzilla.suse.com/show_bug.cgi?id=1231450
* https://bugzilla.suse.com/show_bug.cgi?id=1231910
* https://bugzilla.suse.com/show_bug.cgi?id=1233461
* https://bugzilla.suse.com/show_bug.cgi?id=1234209
* https://bugzilla.suse.com/show_bug.cgi?id=1235038
* https://bugzilla.suse.com/show_bug.cgi?id=1235526
* https://bugzilla.suse.com/show_bug.cgi?id=1235729
* https://bugzilla.suse.com/show_bug.cgi?id=1235870
* https://bugzilla.suse.com/show_bug.cgi?id=1236086
* https://bugzilla.suse.com/show_bug.cgi?id=1236111
* https://bugzilla.suse.com/show_bug.cgi?id=1237757
* https://bugzilla.suse.com/show_bug.cgi?id=1237839
* https://bugzilla.suse.com/show_bug.cgi?id=1237840
* https://bugzilla.suse.com/show_bug.cgi?id=1237845
* https://bugzilla.suse.com/show_bug.cgi?id=1237868
* https://bugzilla.suse.com/show_bug.cgi?id=1237873
* https://bugzilla.suse.com/show_bug.cgi?id=1237885
* https://bugzilla.suse.com/show_bug.cgi?id=1237911
* https://bugzilla.suse.com/show_bug.cgi?id=1237912
* https://bugzilla.suse.com/show_bug.cgi?id=1237926
* https://bugzilla.suse.com/show_bug.cgi?id=1237939
* https://bugzilla.suse.com/show_bug.cgi?id=1237950
* https://bugzilla.suse.com/show_bug.cgi?id=1237951
* https://bugzilla.suse.com/show_bug.cgi?id=1237954
* https://bugzilla.suse.com/show_bug.cgi?id=1237957
* https://bugzilla.suse.com/show_bug.cgi?id=1237979
* https://bugzilla.suse.com/show_bug.cgi?id=1237984
* https://bugzilla.suse.com/show_bug.cgi?id=1238000
* https://bugzilla.suse.com/show_bug.cgi?id=1238016
* https://bugzilla.suse.com/show_bug.cgi?id=1238022
* https://bugzilla.suse.com/show_bug.cgi?id=1238037
* https://bugzilla.suse.com/show_bug.cgi?id=1238092
* https://bugzilla.suse.com/show_bug.cgi?id=1238093
* https://bugzilla.suse.com/show_bug.cgi?id=1238097
* https://bugzilla.suse.com/show_bug.cgi?id=1238099
* https://bugzilla.suse.com/show_bug.cgi?id=1238138
* https://bugzilla.suse.com/show_bug.cgi?id=1238139
* https://bugzilla.suse.com/show_bug.cgi?id=1238155
* https://bugzilla.suse.com/show_bug.cgi?id=1238156
* https://bugzilla.suse.com/show_bug.cgi?id=1238233
* https://bugzilla.suse.com/show_bug.cgi?id=1238243
* https://bugzilla.suse.com/show_bug.cgi?id=1238244
* https://bugzilla.suse.com/show_bug.cgi?id=1238307
* https://bugzilla.suse.com/show_bug.cgi?id=1238335
* https://bugzilla.suse.com/show_bug.cgi?id=1238377
* https://bugzilla.suse.com/show_bug.cgi?id=1238398
* https://bugzilla.suse.com/show_bug.cgi?id=1238455
* https://bugzilla.suse.com/show_bug.cgi?id=1238497
* https://bugzilla.suse.com/show_bug.cgi?id=1238507
* https://bugzilla.suse.com/show_bug.cgi?id=1238537
* https://bugzilla.suse.com/show_bug.cgi?id=1238645
* https://bugzilla.suse.com/show_bug.cgi?id=1238714
* https://bugzilla.suse.com/show_bug.cgi?id=1238722
* https://bugzilla.suse.com/show_bug.cgi?id=1238737
* https://bugzilla.suse.com/show_bug.cgi?id=1238746
* https://bugzilla.suse.com/show_bug.cgi?id=1238760
* https://bugzilla.suse.com/show_bug.cgi?id=1238768
* https://bugzilla.suse.com/show_bug.cgi?id=1238803
* https://bugzilla.suse.com/show_bug.cgi?id=1238835
* https://bugzilla.suse.com/show_bug.cgi?id=1238838
* https://bugzilla.suse.com/show_bug.cgi?id=1238844
* https://bugzilla.suse.com/show_bug.cgi?id=1238893
* https://bugzilla.suse.com/show_bug.cgi?id=1238905
* https://bugzilla.suse.com/show_bug.cgi?id=1238911
* https://bugzilla.suse.com/show_bug.cgi?id=1238919
* https://bugzilla.suse.com/show_bug.cgi?id=1238930
* https://bugzilla.suse.com/show_bug.cgi?id=1238937
* https://bugzilla.suse.com/show_bug.cgi?id=1238938
* https://bugzilla.suse.com/show_bug.cgi?id=1238984
* https://bugzilla.suse.com/show_bug.cgi?id=1239070
* https://bugzilla.suse.com/show_bug.cgi?id=1239111
* https://bugzilla.suse.com/show_bug.cgi?id=1239112
* https://bugzilla.suse.com/show_bug.cgi?id=1239474
* https://bugzilla.suse.com/show_bug.cgi?id=1239994
* https://bugzilla.suse.com/show_bug.cgi?id=1240185
* https://bugzilla.suse.com/show_bug.cgi?id=1240243
* https://bugzilla.suse.com/show_bug.cgi?id=1240250
* https://bugzilla.suse.com/show_bug.cgi?id=1240270
* https://bugzilla.suse.com/show_bug.cgi?id=1240309
* https://bugzilla.suse.com/show_bug.cgi?id=1240583
* https://bugzilla.suse.com/show_bug.cgi?id=1240590
* https://bugzilla.suse.com/show_bug.cgi?id=1240701
* https://bugzilla.suse.com/show_bug.cgi?id=1240703
* https://bugzilla.suse.com/show_bug.cgi?id=1240709
* https://bugzilla.suse.com/show_bug.cgi?id=1240712
* https://bugzilla.suse.com/show_bug.cgi?id=1240714
* https://bugzilla.suse.com/show_bug.cgi?id=1240717
* https://bugzilla.suse.com/show_bug.cgi?id=1240739
* https://bugzilla.suse.com/show_bug.cgi?id=1240740
* https://bugzilla.suse.com/show_bug.cgi?id=1240742
* https://bugzilla.suse.com/show_bug.cgi?id=1240835
* https://bugzilla.suse.com/show_bug.cgi?id=1240942
* https://bugzilla.suse.com/show_bug.cgi?id=1240943
* https://bugzilla.suse.com/show_bug.cgi?id=1241145
* https://bugzilla.suse.com/show_bug.cgi?id=1241266
* https://bugzilla.suse.com/show_bug.cgi?id=1241347
* https://bugzilla.suse.com/show_bug.cgi?id=1241371
* https://bugzilla.suse.com/show_bug.cgi?id=1241373
* https://bugzilla.suse.com/show_bug.cgi?id=1241404
* https://bugzilla.suse.com/show_bug.cgi?id=1241405
* https://bugzilla.suse.com/show_bug.cgi?id=1241408
* https://bugzilla.suse.com/show_bug.cgi?id=1241458
* https://bugzilla.suse.com/show_bug.cgi?id=1241526
* https://bugzilla.suse.com/show_bug.cgi?id=1241601
* https://bugzilla.suse.com/show_bug.cgi?id=1241640
* https://bugzilla.suse.com/show_bug.cgi?id=1242778
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20250520/174b4771/attachment.htm>
More information about the sle-security-updates
mailing list