SUSE-SU-2025:01600-1: important: Security update for the Linux Kernel

SLE-SECURITY-UPDATES null at suse.de
Tue May 20 12:31:34 UTC 2025



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:01600-1  
Release Date: 2025-05-20T11:49:39Z  
Rating: important  
References:

  * bsc#1205495
  * bsc#1230764
  * bsc#1231103
  * bsc#1231450
  * bsc#1231910
  * bsc#1233461
  * bsc#1234209
  * bsc#1235038
  * bsc#1235526
  * bsc#1235729
  * bsc#1235870
  * bsc#1236086
  * bsc#1236111
  * bsc#1237757
  * bsc#1237839
  * bsc#1237840
  * bsc#1237845
  * bsc#1237868
  * bsc#1237873
  * bsc#1237885
  * bsc#1237911
  * bsc#1237912
  * bsc#1237926
  * bsc#1237939
  * bsc#1237950
  * bsc#1237951
  * bsc#1237954
  * bsc#1237957
  * bsc#1237979
  * bsc#1237984
  * bsc#1238000
  * bsc#1238016
  * bsc#1238022
  * bsc#1238037
  * bsc#1238092
  * bsc#1238093
  * bsc#1238097
  * bsc#1238099
  * bsc#1238138
  * bsc#1238139
  * bsc#1238155
  * bsc#1238156
  * bsc#1238233
  * bsc#1238243
  * bsc#1238244
  * bsc#1238307
  * bsc#1238335
  * bsc#1238377
  * bsc#1238398
  * bsc#1238455
  * bsc#1238497
  * bsc#1238507
  * bsc#1238537
  * bsc#1238645
  * bsc#1238714
  * bsc#1238722
  * bsc#1238737
  * bsc#1238746
  * bsc#1238760
  * bsc#1238768
  * bsc#1238803
  * bsc#1238835
  * bsc#1238838
  * bsc#1238844
  * bsc#1238893
  * bsc#1238905
  * bsc#1238911
  * bsc#1238919
  * bsc#1238930
  * bsc#1238937
  * bsc#1238938
  * bsc#1238984
  * bsc#1239070
  * bsc#1239111
  * bsc#1239112
  * bsc#1239474
  * bsc#1239994
  * bsc#1240185
  * bsc#1240243
  * bsc#1240250
  * bsc#1240270
  * bsc#1240309
  * bsc#1240583
  * bsc#1240590
  * bsc#1240701
  * bsc#1240703
  * bsc#1240709
  * bsc#1240712
  * bsc#1240714
  * bsc#1240717
  * bsc#1240739
  * bsc#1240740
  * bsc#1240742
  * bsc#1240835
  * bsc#1240942
  * bsc#1240943
  * bsc#1241145
  * bsc#1241266
  * bsc#1241347
  * bsc#1241371
  * bsc#1241373
  * bsc#1241404
  * bsc#1241405
  * bsc#1241408
  * bsc#1241458
  * bsc#1241526
  * bsc#1241601
  * bsc#1241640
  * bsc#1242778

  
Cross-References:

  * CVE-2020-36789
  * CVE-2021-47659
  * CVE-2021-47668
  * CVE-2021-47669
  * CVE-2022-49044
  * CVE-2022-49055
  * CVE-2022-49060
  * CVE-2022-49086
  * CVE-2022-49111
  * CVE-2022-49118
  * CVE-2022-49121
  * CVE-2022-49137
  * CVE-2022-49171
  * CVE-2022-49175
  * CVE-2022-49176
  * CVE-2022-49179
  * CVE-2022-49188
  * CVE-2022-49197
  * CVE-2022-49205
  * CVE-2022-49232
  * CVE-2022-49290
  * CVE-2022-49305
  * CVE-2022-49325
  * CVE-2022-49335
  * CVE-2022-49351
  * CVE-2022-49385
  * CVE-2022-49390
  * CVE-2022-49411
  * CVE-2022-49442
  * CVE-2022-49465
  * CVE-2022-49478
  * CVE-2022-49489
  * CVE-2022-49504
  * CVE-2022-49521
  * CVE-2022-49525
  * CVE-2022-49534
  * CVE-2022-49535
  * CVE-2022-49536
  * CVE-2022-49537
  * CVE-2022-49542
  * CVE-2022-49561
  * CVE-2022-49590
  * CVE-2022-49658
  * CVE-2022-49668
  * CVE-2022-49693
  * CVE-2022-49725
  * CVE-2022-49728
  * CVE-2022-49730
  * CVE-2022-49749
  * CVE-2022-49753
  * CVE-2023-53023
  * CVE-2023-53032
  * CVE-2024-46763
  * CVE-2024-46865
  * CVE-2024-49994
  * CVE-2024-50038
  * CVE-2024-50272
  * CVE-2024-52559
  * CVE-2024-54683
  * CVE-2024-56590
  * CVE-2024-56641
  * CVE-2024-57924
  * CVE-2024-57980
  * CVE-2024-57981
  * CVE-2024-58005
  * CVE-2024-58009
  * CVE-2024-58017
  * CVE-2024-58063
  * CVE-2024-58093
  * CVE-2025-21635
  * CVE-2025-21735
  * CVE-2025-21750
  * CVE-2025-21758
  * CVE-2025-21764
  * CVE-2025-21768
  * CVE-2025-21772
  * CVE-2025-21779
  * CVE-2025-21806
  * CVE-2025-21862
  * CVE-2025-21881
  * CVE-2025-21909
  * CVE-2025-21910
  * CVE-2025-21926
  * CVE-2025-21927
  * CVE-2025-21931
  * CVE-2025-21941
  * CVE-2025-21948
  * CVE-2025-21956
  * CVE-2025-21957
  * CVE-2025-21963
  * CVE-2025-21964
  * CVE-2025-21976
  * CVE-2025-22004
  * CVE-2025-22008
  * CVE-2025-22010
  * CVE-2025-22018
  * CVE-2025-22053
  * CVE-2025-22055
  * CVE-2025-22060
  * CVE-2025-22086
  * CVE-2025-23131
  * CVE-2025-37785

  
CVSS scores:

  * CVE-2020-36789 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2020-36789 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2020-36789 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47659 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2021-47659 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2021-47668 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2021-47668 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47668 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47669 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2021-47669 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-47669 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49044 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-49044 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2022-49055 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49055 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49055 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49060 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49060 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49060 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49086 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-49086 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-49111 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49111 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49111 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49118 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49118 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49121 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49121 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49137 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-49137 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-49137 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49171 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49171 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49175 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49175 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49176 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49176 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49176 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49179 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49179 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49179 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49188 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49188 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49197 ( SUSE ):  4.6
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-49197 ( SUSE ):  4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
  * CVE-2022-49205 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49205 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49232 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49232 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49232 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49290 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49290 ( SUSE ):  6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
  * CVE-2022-49290 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49305 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49305 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49305 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49325 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49325 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49335 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49335 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49335 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49351 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49351 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49385 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49385 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49390 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49390 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49411 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49411 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49442 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49465 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49465 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49465 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49478 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49489 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49489 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49504 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49504 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49521 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49521 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49525 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49525 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49534 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-49534 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-49534 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49535 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49535 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49535 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49536 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49536 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49536 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49537 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49537 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49542 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49542 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49542 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49561 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49590 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2022-49590 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2022-49590 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49658 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49668 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49668 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49693 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49693 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49725 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49728 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49728 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2022-49728 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49730 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49730 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49730 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49749 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49749 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49749 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49753 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49753 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49753 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53023 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53023 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53032 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46763 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46763 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46865 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46865 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-49994 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49994 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49994 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50038 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50038 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50272 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50272 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-52559 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-52559 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-54683 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-54683 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-54683 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56590 ( SUSE ):  6.9
    CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56590 ( SUSE ):  5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56641 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56641 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57924 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-57924 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57980 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57980 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-57981 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57981 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58005 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58005 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58009 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58017 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-58017 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-58017 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58063 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58063 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58093 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-58093 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21635 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21635 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21735 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21735 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21750 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21750 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21758 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21764 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21764 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21768 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21772 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21772 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21779 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21779 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21806 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21862 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21862 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21881 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21909 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21909 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21910 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21910 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21926 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21926 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21927 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21927 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21927 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21931 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21931 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21941 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21941 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21941 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21948 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21948 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21948 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21956 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-21956 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2025-21957 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21957 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21957 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21963 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21963 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21963 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21964 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21964 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21964 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21976 ( SUSE ):  2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-22004 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22004 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-22004 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-22008 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22008 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22010 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22010 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22010 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22018 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22018 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22018 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22053 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22053 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22055 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22055 ( SUSE ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-22060 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22060 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-22086 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-22086 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-23131 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-23131 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37785 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37785 ( SUSE ):  6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-37785 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

  
Affected Products:

  * SUSE Linux Enterprise High Performance Computing 12 SP5
  * SUSE Linux Enterprise Live Patching 12-SP5
  * SUSE Linux Enterprise Server 12 SP5
  * SUSE Linux Enterprise Server 12 SP5 LTSS
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5

  
  
An update that solves 102 vulnerabilities and has seven security fixes can now
be installed.

## Description:

The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

  * CVE-2021-47659: drm/plane: Move range check for format_count earlier
    (bsc#1237839).
  * CVE-2022-49044: dm integrity: fix memory corruption when tag_size is less
    than digest size (bsc#1237840).
  * CVE-2022-49055: drm/amdkfd: Check for potential null return of
    kmalloc_array() (bsc#1237868).
  * CVE-2022-49060: net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()
    (bsc#1237845).
  * CVE-2022-49086: net: openvswitch: fix leak of nested actions (bsc#1238037).
  * CVE-2022-49111: Bluetooth: Fix use after free in hci_send_acl (bsc#1237984).
  * CVE-2022-49118: scsi: hisi_sas: Free irq vectors in order for v3 HW
    (bsc#1237979).
  * CVE-2022-49121: scsi: pm8001: Fix tag leaks on error (bsc#1237926).
  * CVE-2022-49137: drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence
    obj (bsc#1238155).
  * CVE-2022-49175: PM: core: keep irq flags in device_pm_check_callbacks()
    (bsc#1238099).
  * CVE-2022-49176: bfq: fix use-after-free in bfq_dispatch_request
    (bsc#1238097).
  * CVE-2022-49179: block, bfq: do not move oom_bfqq (bsc#1238092).
  * CVE-2022-49188: remoteproc: qcom_q6v5_mss: Fix some leaks in
    q6v5_alloc_memory_region (bsc#1238138).
  * CVE-2022-49197: af_netlink: Fix shift out of bounds in group mask
    calculation (bsc#1238455).
  * CVE-2022-49205: bpf, sockmap: Fix double uncharge the mem of sk_msg
    (bsc#1238335).
  * CVE-2022-49232: drm/amd/display: Fix a NULL pointer dereference in
    amdgpu_dm_connector_add_common_modes() (bsc#1238139).
  * CVE-2022-49290: mac80211: fix potential double free on mesh join
    (bsc#1238156).
  * CVE-2022-49305: drivers: staging: rtl8192u: Fix deadlock in
    ieee80211_beacons_stop() (bsc#1238645).
  * CVE-2022-49325: tcp: add accessors to read/set tp->snd_cwnd (bsc#1238398).
  * CVE-2022-49335: drm/amdgpu/cs: make commands with 0 chunks illegal behaviour
    (bsc#1238377).
  * CVE-2022-49351: net: altera: Fix refcount leak in altera_tse_mdio_create
    (bsc#1237939).
  * CVE-2022-49385: driver: base: fix UAF when driver_attach failed
    (bsc#1237951).
  * CVE-2022-49390: macsec: fix UAF bug for real_dev (bsc#1238233).
  * CVE-2022-49411: bfq: Make sure bfqg for which we are queueing requests is
    online (bsc#1238307).
  * CVE-2022-49442: drivers/base/node.c: fix compaction sysfs file leak
    (bsc#1238243).
  * CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled
    (bsc#1238919).
  * CVE-2022-49478: media: pvrusb2: fix array-index-out-of-bounds in
    pvr2_i2c_core_init (bsc#1238000).
  * CVE-2022-49489: drm/msm/disp/dpu1: set vbif hw config to NULL to avoid use
    after memory free during pm runtime resume (bsc#1238244).
  * CVE-2022-49504: scsi: lpfc: Inhibit aborts if external loopback plug is
    inserted (bsc#1238835).
  * CVE-2022-49521: scsi: lpfc: Fix resource leak in lpfc_sli4_send_seq_to_ulp()
    (bsc#1238938).
  * CVE-2022-49525: media: cx25821: Fix the warning when removing the module
    (bsc#1238022).
  * CVE-2022-49534: scsi: lpfc: Protect memory leak for NPIV ports sending
    PLOGI_RJT (bsc#1238893).
  * CVE-2022-49535: scsi: lpfc: Fix null pointer dereference after failing to
    issue FLOGI and PLOGI (bsc#1238937).
  * CVE-2022-49536: scsi: lpfc: Fix SCSI I/O completion and abort handler
    deadlock (bsc#1238838).
  * CVE-2022-49537: scsi: lpfc: Fix call trace observed during I/O with CMF
    enabled (bsc#1238930).
  * CVE-2022-49542: scsi: lpfc: Move cfg_log_verbose check before calling
    lpfc_dmp_dbg() (bsc#1238722).
  * CVE-2022-49561: netfilter: conntrack: re-fetch conntrack after insertion
    (bsc#1238537).
  * CVE-2022-49590: igmp: Fix data-races around sysctl_igmp_llm_reports
    (bsc#1238844).
  * CVE-2022-49658: bpf, selftests: Add verifier test case for
    imm=0,umin=0,umax=1 scalar (bsc#1238803).
  * CVE-2022-49668: PM / devfreq: exynos-ppmu: Fix refcount leak in
    of_get_devfreq_events (bsc#1237957).
  * CVE-2022-49693: drm/msm/mdp4: Fix refcount leak in mdp4_modeset_init_intf
    (bsc#1237954).
  * CVE-2022-49725: i40e: Fix call trace in setup_tx_descriptors (bsc#1238016).
  * CVE-2022-49728: kABI workaround for changeing the variable length type to
    size_t (bsc#1239111).
  * CVE-2022-49730: scsi: lpfc: Resolve NULL ptr dereference after an ELS LOGO
    is aborted (bsc#1239070).
  * CVE-2022-49749: i2c: designware: use casting of u64 in clock multiplication
    to avoid overflow (bsc#1240243).
  * CVE-2022-49753: dmaengine: Fix double increment of client_count in
    dma_chan_get() (bsc#1240250).
  * CVE-2023-53023: net: nfc: Fix use-after-free in local_cleanup()
    (bsc#1240309).
  * CVE-2023-53032: netfilter: ipset: Fix overflow before widen in the
    bitmap_ip_create() function (bsc#1240270).
  * CVE-2024-49994: block: fix integer overflow in BLKSECDISCARD (bsc#1237757).
  * CVE-2024-50038: netfilter: xtables: fix typo causing some targets not to
    load on IPv6 (bsc#1231910).
  * CVE-2024-50272: filemap: Fix bounds checking in filemap_read() (bsc#1233461
    bsc#1234209).
  * CVE-2024-52559: drm/msm/gem: prevent integer overflow in
    msm_ioctl_gem_submit() (bsc#1238507).
  * CVE-2024-54683: netfilter: IDLETIMER: Fix for possible ABBA deadlock
    (bsc#1235729).
  * CVE-2024-56590: skbuff: introduce skb_pull_data (bsc#1235038).
  * CVE-2024-56641: net/smc: initialize close_work early to avoid warning
    (bsc#1235526).
  * CVE-2024-57924: fs: relax assertions on failure to encode file handles
    (bsc#1236086).
  * CVE-2024-57980: media: uvcvideo: Fix double free in error path
    (bsc#1237911).
  * CVE-2024-57981: usb: xhci: Fix NULL pointer dereference on certain command
    aborts (bsc#1237912).
  * CVE-2024-58005: tpm: Change to kvalloc() in eventlog/acpi.c (bsc#1237873).
  * CVE-2024-58009: Bluetooth: L2CAP: handle NULL sock pointer in
    l2cap_sock_alloc (bsc#1238760).
  * CVE-2024-58017: printk: Fix signed integer overflow when defining
    LOG_BUF_LEN_MAX (bsc#1237950 bsc#1239112).
  * CVE-2024-58063: wifi: rtlwifi: fix memory leaks and invalid access at probe
    error path (bsc#1238984).
  * CVE-2024-58093: PCI/ASPM: Fix link state exit during switch upstream
    function removal (bsc#1241347).
  * CVE-2025-21635: rds: sysctl: rds_tcp_{rcv,snd}buf: avoid using
    current->nsproxy (bsc#1236111).
  * CVE-2025-21735: NFC: nci: Add bounds checking in nci_hci_create_pipe()
    (bsc#1238497).
  * CVE-2025-21750: wifi: brcmfmac: Check the return value of
    of_property_read_string_index() (bsc#1238905).
  * CVE-2025-21758: ipv6: mcast: add RCU protection to mld_newpack()
    (bsc#1238737).
  * CVE-2025-21768: net: ipv6: fix dst ref loops in rpl, seg6 and ioam6
    lwtunnels (bsc#1238714).
  * CVE-2025-21772: partitions: mac: fix handling of bogus partition table
    (bsc#1238911).
  * CVE-2025-21779: KVM: x86: Reject Hyper-V's SEND_IPI hypercalls if local APIC
    isn't in-kernel (bsc#1238768).
  * CVE-2025-21806: net: let net.core.dev_weight always be non-zero
    (bsc#1238746).
  * CVE-2025-21862: drop_monitor: fix incorrect initialization order
    (bsc#1239474).
  * CVE-2025-21881: uprobes: Reject the shared zeropage in uprobe_write_opcode()
    (bsc#1240185).
  * CVE-2025-21909: wifi: nl80211: reject cooked mode if it is set along with
    other flags (bsc#1240590).
  * CVE-2025-21910: wifi: cfg80211: regulatory: improve invalid hints checking
    (bsc#1240583).
  * CVE-2025-21926: net: gso: fix ownership in __udp_gso_segment (bsc#1240712).
  * CVE-2025-21927: nvme-tcp: fix potential memory corruption in
    nvme_tcp_recv_pdu() (bsc#1240714).
  * CVE-2025-21931: hwpoison, memory_hotplug: lock folio before unmap hwpoisoned
    folio (bsc#1240709).
  * CVE-2025-21941: drm/amd/display: Fix null check for pipe_ctx->plane_state in
    (bsc#1240701).
  * CVE-2025-21948: HID: appleir: Fix potential NULL dereference at raw event
    handle (bsc#1240703).
  * CVE-2025-21956: drm/amd/display: Assign normalized_pix_clk when color depth
    = 14 (bsc#1240739).
  * CVE-2025-21957: scsi: qla1280: Fix kernel oops when debug level > 2
    (bsc#1240742).
  * CVE-2025-21963: cifs: Fix integer overflow while processing acdirmax mount
    option (bsc#1240717).
  * CVE-2025-21964: cifs: Fix integer overflow while processing acregmax mount
    option (bsc#1240740).
  * CVE-2025-21976: fbdev: hyperv_fb: Allow graceful removal of framebuffer
    (bsc#1241145).
  * CVE-2025-22004: net: atm: fix use after free in lec_send() (bsc#1240835).
  * CVE-2025-22008: regulator: check that dummy regulator has been probed before
    using it (bsc#1240942).
  * CVE-2025-22010: RDMA/hns: Fix soft lockup during bt pages loop
    (bsc#1240943).
  * CVE-2025-22018: atm: Fix NULL pointer dereference (bsc#1241266).
  * CVE-2025-22053: net: ibmveth: make veth_pool_store stop hanging
    (bsc#1241373).
  * CVE-2025-22055: net: fix geneve_opt length integer overflow (bsc#1241371).
  * CVE-2025-22060: net: mvpp2: Prevent parser TCAM memory corruption
    (bsc#1241526).
  * CVE-2025-22086: RDMA/mlx5: Fix mlx5_poll_one() cur_qp update flow
    (bsc#1241458).
  * CVE-2025-23131: dlm: prevent NPD when writing a positive value to event_done
    (bsc#1241601).
  * CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640).

The following non-security bugs were fixed:

  * Revert "ipv6: Fix signed integer overflow in __ip6_append_data"
  * Revert "kABI workaround for changeing the variable length type to size_t"
  * audit: Send netlink ACK before setting connection in auditd_set
    (bsc#1231450).
  * brcmfmac: of: Use devm_kstrdup for board_type & check for errors
    (bsc#1238905)
  * brcmfmac: of: remove redundant variable len (bsc#1238905)
  * cifs: Fix integer overflow while processing actimeo mount option (git-
    fixes).
  * fbdev: hyperv_fb: Simplify hvfb_putmem (git-fixes).
  * net: Fix data-races around weight_p and dev_weight_[rt]x_bias (bsc#1238746)
  * remoteproc: qcom_q6v5_mss: Extract mba/mpss from memory-region (bsc#1238138)
  * tpm, tpm_tis: Workaround failed command reception on Infineon devices
    (bsc#1235870).
  * tpm: tis: Double the timeout B to 4s (bsc#1235870).
  * wifi: brcmfmac: use strreplace() in brcmf_of_probe() (bsc#1238905)
  * x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778).
  * x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778).
  * x86/bpf: Call branch history clearing sequence on exit (bsc#1242778).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1600=1

  * SUSE Linux Enterprise Live Patching 12-SP5  
    zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-1600=1

  * SUSE Linux Enterprise Server 12 SP5 LTSS  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1600=1

## Package List:

  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
    * dlm-kmp-default-4.12.14-122.258.1
    * gfs2-kmp-default-4.12.14-122.258.1
    * cluster-md-kmp-default-4.12.14-122.258.1
    * kernel-default-base-debuginfo-4.12.14-122.258.1
    * cluster-md-kmp-default-debuginfo-4.12.14-122.258.1
    * kernel-syms-4.12.14-122.258.1
    * dlm-kmp-default-debuginfo-4.12.14-122.258.1
    * kernel-default-debugsource-4.12.14-122.258.1
    * kernel-default-devel-debuginfo-4.12.14-122.258.1
    * kernel-default-base-4.12.14-122.258.1
    * ocfs2-kmp-default-4.12.14-122.258.1
    * kernel-default-debuginfo-4.12.14-122.258.1
    * ocfs2-kmp-default-debuginfo-4.12.14-122.258.1
    * gfs2-kmp-default-debuginfo-4.12.14-122.258.1
    * kernel-default-devel-4.12.14-122.258.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64)
    * kernel-default-4.12.14-122.258.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
    * kernel-devel-4.12.14-122.258.1
    * kernel-macros-4.12.14-122.258.1
    * kernel-source-4.12.14-122.258.1
  * SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
    * kernel-default-4.12.14-122.258.1
  * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
    * kernel-default-kgraft-devel-4.12.14-122.258.1
    * kgraft-patch-4_12_14-122_258-default-1-8.3.1
    * kernel-default-kgraft-4.12.14-122.258.1
    * kernel-default-debugsource-4.12.14-122.258.1
    * kernel-default-debuginfo-4.12.14-122.258.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
    * dlm-kmp-default-4.12.14-122.258.1
    * gfs2-kmp-default-4.12.14-122.258.1
    * cluster-md-kmp-default-4.12.14-122.258.1
    * kernel-default-base-debuginfo-4.12.14-122.258.1
    * cluster-md-kmp-default-debuginfo-4.12.14-122.258.1
    * kernel-syms-4.12.14-122.258.1
    * dlm-kmp-default-debuginfo-4.12.14-122.258.1
    * kernel-default-debugsource-4.12.14-122.258.1
    * ocfs2-kmp-default-4.12.14-122.258.1
    * kernel-default-base-4.12.14-122.258.1
    * kernel-default-debuginfo-4.12.14-122.258.1
    * ocfs2-kmp-default-debuginfo-4.12.14-122.258.1
    * gfs2-kmp-default-debuginfo-4.12.14-122.258.1
    * kernel-default-devel-4.12.14-122.258.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64
    nosrc)
    * kernel-default-4.12.14-122.258.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
    * kernel-devel-4.12.14-122.258.1
    * kernel-macros-4.12.14-122.258.1
    * kernel-source-4.12.14-122.258.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x)
    * kernel-default-man-4.12.14-122.258.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64)
    * kernel-default-devel-debuginfo-4.12.14-122.258.1

## References:

  * https://www.suse.com/security/cve/CVE-2020-36789.html
  * https://www.suse.com/security/cve/CVE-2021-47659.html
  * https://www.suse.com/security/cve/CVE-2021-47668.html
  * https://www.suse.com/security/cve/CVE-2021-47669.html
  * https://www.suse.com/security/cve/CVE-2022-49044.html
  * https://www.suse.com/security/cve/CVE-2022-49055.html
  * https://www.suse.com/security/cve/CVE-2022-49060.html
  * https://www.suse.com/security/cve/CVE-2022-49086.html
  * https://www.suse.com/security/cve/CVE-2022-49111.html
  * https://www.suse.com/security/cve/CVE-2022-49118.html
  * https://www.suse.com/security/cve/CVE-2022-49121.html
  * https://www.suse.com/security/cve/CVE-2022-49137.html
  * https://www.suse.com/security/cve/CVE-2022-49171.html
  * https://www.suse.com/security/cve/CVE-2022-49175.html
  * https://www.suse.com/security/cve/CVE-2022-49176.html
  * https://www.suse.com/security/cve/CVE-2022-49179.html
  * https://www.suse.com/security/cve/CVE-2022-49188.html
  * https://www.suse.com/security/cve/CVE-2022-49197.html
  * https://www.suse.com/security/cve/CVE-2022-49205.html
  * https://www.suse.com/security/cve/CVE-2022-49232.html
  * https://www.suse.com/security/cve/CVE-2022-49290.html
  * https://www.suse.com/security/cve/CVE-2022-49305.html
  * https://www.suse.com/security/cve/CVE-2022-49325.html
  * https://www.suse.com/security/cve/CVE-2022-49335.html
  * https://www.suse.com/security/cve/CVE-2022-49351.html
  * https://www.suse.com/security/cve/CVE-2022-49385.html
  * https://www.suse.com/security/cve/CVE-2022-49390.html
  * https://www.suse.com/security/cve/CVE-2022-49411.html
  * https://www.suse.com/security/cve/CVE-2022-49442.html
  * https://www.suse.com/security/cve/CVE-2022-49465.html
  * https://www.suse.com/security/cve/CVE-2022-49478.html
  * https://www.suse.com/security/cve/CVE-2022-49489.html
  * https://www.suse.com/security/cve/CVE-2022-49504.html
  * https://www.suse.com/security/cve/CVE-2022-49521.html
  * https://www.suse.com/security/cve/CVE-2022-49525.html
  * https://www.suse.com/security/cve/CVE-2022-49534.html
  * https://www.suse.com/security/cve/CVE-2022-49535.html
  * https://www.suse.com/security/cve/CVE-2022-49536.html
  * https://www.suse.com/security/cve/CVE-2022-49537.html
  * https://www.suse.com/security/cve/CVE-2022-49542.html
  * https://www.suse.com/security/cve/CVE-2022-49561.html
  * https://www.suse.com/security/cve/CVE-2022-49590.html
  * https://www.suse.com/security/cve/CVE-2022-49658.html
  * https://www.suse.com/security/cve/CVE-2022-49668.html
  * https://www.suse.com/security/cve/CVE-2022-49693.html
  * https://www.suse.com/security/cve/CVE-2022-49725.html
  * https://www.suse.com/security/cve/CVE-2022-49728.html
  * https://www.suse.com/security/cve/CVE-2022-49730.html
  * https://www.suse.com/security/cve/CVE-2022-49749.html
  * https://www.suse.com/security/cve/CVE-2022-49753.html
  * https://www.suse.com/security/cve/CVE-2023-53023.html
  * https://www.suse.com/security/cve/CVE-2023-53032.html
  * https://www.suse.com/security/cve/CVE-2024-46763.html
  * https://www.suse.com/security/cve/CVE-2024-46865.html
  * https://www.suse.com/security/cve/CVE-2024-49994.html
  * https://www.suse.com/security/cve/CVE-2024-50038.html
  * https://www.suse.com/security/cve/CVE-2024-50272.html
  * https://www.suse.com/security/cve/CVE-2024-52559.html
  * https://www.suse.com/security/cve/CVE-2024-54683.html
  * https://www.suse.com/security/cve/CVE-2024-56590.html
  * https://www.suse.com/security/cve/CVE-2024-56641.html
  * https://www.suse.com/security/cve/CVE-2024-57924.html
  * https://www.suse.com/security/cve/CVE-2024-57980.html
  * https://www.suse.com/security/cve/CVE-2024-57981.html
  * https://www.suse.com/security/cve/CVE-2024-58005.html
  * https://www.suse.com/security/cve/CVE-2024-58009.html
  * https://www.suse.com/security/cve/CVE-2024-58017.html
  * https://www.suse.com/security/cve/CVE-2024-58063.html
  * https://www.suse.com/security/cve/CVE-2024-58093.html
  * https://www.suse.com/security/cve/CVE-2025-21635.html
  * https://www.suse.com/security/cve/CVE-2025-21735.html
  * https://www.suse.com/security/cve/CVE-2025-21750.html
  * https://www.suse.com/security/cve/CVE-2025-21758.html
  * https://www.suse.com/security/cve/CVE-2025-21764.html
  * https://www.suse.com/security/cve/CVE-2025-21768.html
  * https://www.suse.com/security/cve/CVE-2025-21772.html
  * https://www.suse.com/security/cve/CVE-2025-21779.html
  * https://www.suse.com/security/cve/CVE-2025-21806.html
  * https://www.suse.com/security/cve/CVE-2025-21862.html
  * https://www.suse.com/security/cve/CVE-2025-21881.html
  * https://www.suse.com/security/cve/CVE-2025-21909.html
  * https://www.suse.com/security/cve/CVE-2025-21910.html
  * https://www.suse.com/security/cve/CVE-2025-21926.html
  * https://www.suse.com/security/cve/CVE-2025-21927.html
  * https://www.suse.com/security/cve/CVE-2025-21931.html
  * https://www.suse.com/security/cve/CVE-2025-21941.html
  * https://www.suse.com/security/cve/CVE-2025-21948.html
  * https://www.suse.com/security/cve/CVE-2025-21956.html
  * https://www.suse.com/security/cve/CVE-2025-21957.html
  * https://www.suse.com/security/cve/CVE-2025-21963.html
  * https://www.suse.com/security/cve/CVE-2025-21964.html
  * https://www.suse.com/security/cve/CVE-2025-21976.html
  * https://www.suse.com/security/cve/CVE-2025-22004.html
  * https://www.suse.com/security/cve/CVE-2025-22008.html
  * https://www.suse.com/security/cve/CVE-2025-22010.html
  * https://www.suse.com/security/cve/CVE-2025-22018.html
  * https://www.suse.com/security/cve/CVE-2025-22053.html
  * https://www.suse.com/security/cve/CVE-2025-22055.html
  * https://www.suse.com/security/cve/CVE-2025-22060.html
  * https://www.suse.com/security/cve/CVE-2025-22086.html
  * https://www.suse.com/security/cve/CVE-2025-23131.html
  * https://www.suse.com/security/cve/CVE-2025-37785.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1205495
  * https://bugzilla.suse.com/show_bug.cgi?id=1230764
  * https://bugzilla.suse.com/show_bug.cgi?id=1231103
  * https://bugzilla.suse.com/show_bug.cgi?id=1231450
  * https://bugzilla.suse.com/show_bug.cgi?id=1231910
  * https://bugzilla.suse.com/show_bug.cgi?id=1233461
  * https://bugzilla.suse.com/show_bug.cgi?id=1234209
  * https://bugzilla.suse.com/show_bug.cgi?id=1235038
  * https://bugzilla.suse.com/show_bug.cgi?id=1235526
  * https://bugzilla.suse.com/show_bug.cgi?id=1235729
  * https://bugzilla.suse.com/show_bug.cgi?id=1235870
  * https://bugzilla.suse.com/show_bug.cgi?id=1236086
  * https://bugzilla.suse.com/show_bug.cgi?id=1236111
  * https://bugzilla.suse.com/show_bug.cgi?id=1237757
  * https://bugzilla.suse.com/show_bug.cgi?id=1237839
  * https://bugzilla.suse.com/show_bug.cgi?id=1237840
  * https://bugzilla.suse.com/show_bug.cgi?id=1237845
  * https://bugzilla.suse.com/show_bug.cgi?id=1237868
  * https://bugzilla.suse.com/show_bug.cgi?id=1237873
  * https://bugzilla.suse.com/show_bug.cgi?id=1237885
  * https://bugzilla.suse.com/show_bug.cgi?id=1237911
  * https://bugzilla.suse.com/show_bug.cgi?id=1237912
  * https://bugzilla.suse.com/show_bug.cgi?id=1237926
  * https://bugzilla.suse.com/show_bug.cgi?id=1237939
  * https://bugzilla.suse.com/show_bug.cgi?id=1237950
  * https://bugzilla.suse.com/show_bug.cgi?id=1237951
  * https://bugzilla.suse.com/show_bug.cgi?id=1237954
  * https://bugzilla.suse.com/show_bug.cgi?id=1237957
  * https://bugzilla.suse.com/show_bug.cgi?id=1237979
  * https://bugzilla.suse.com/show_bug.cgi?id=1237984
  * https://bugzilla.suse.com/show_bug.cgi?id=1238000
  * https://bugzilla.suse.com/show_bug.cgi?id=1238016
  * https://bugzilla.suse.com/show_bug.cgi?id=1238022
  * https://bugzilla.suse.com/show_bug.cgi?id=1238037
  * https://bugzilla.suse.com/show_bug.cgi?id=1238092
  * https://bugzilla.suse.com/show_bug.cgi?id=1238093
  * https://bugzilla.suse.com/show_bug.cgi?id=1238097
  * https://bugzilla.suse.com/show_bug.cgi?id=1238099
  * https://bugzilla.suse.com/show_bug.cgi?id=1238138
  * https://bugzilla.suse.com/show_bug.cgi?id=1238139
  * https://bugzilla.suse.com/show_bug.cgi?id=1238155
  * https://bugzilla.suse.com/show_bug.cgi?id=1238156
  * https://bugzilla.suse.com/show_bug.cgi?id=1238233
  * https://bugzilla.suse.com/show_bug.cgi?id=1238243
  * https://bugzilla.suse.com/show_bug.cgi?id=1238244
  * https://bugzilla.suse.com/show_bug.cgi?id=1238307
  * https://bugzilla.suse.com/show_bug.cgi?id=1238335
  * https://bugzilla.suse.com/show_bug.cgi?id=1238377
  * https://bugzilla.suse.com/show_bug.cgi?id=1238398
  * https://bugzilla.suse.com/show_bug.cgi?id=1238455
  * https://bugzilla.suse.com/show_bug.cgi?id=1238497
  * https://bugzilla.suse.com/show_bug.cgi?id=1238507
  * https://bugzilla.suse.com/show_bug.cgi?id=1238537
  * https://bugzilla.suse.com/show_bug.cgi?id=1238645
  * https://bugzilla.suse.com/show_bug.cgi?id=1238714
  * https://bugzilla.suse.com/show_bug.cgi?id=1238722
  * https://bugzilla.suse.com/show_bug.cgi?id=1238737
  * https://bugzilla.suse.com/show_bug.cgi?id=1238746
  * https://bugzilla.suse.com/show_bug.cgi?id=1238760
  * https://bugzilla.suse.com/show_bug.cgi?id=1238768
  * https://bugzilla.suse.com/show_bug.cgi?id=1238803
  * https://bugzilla.suse.com/show_bug.cgi?id=1238835
  * https://bugzilla.suse.com/show_bug.cgi?id=1238838
  * https://bugzilla.suse.com/show_bug.cgi?id=1238844
  * https://bugzilla.suse.com/show_bug.cgi?id=1238893
  * https://bugzilla.suse.com/show_bug.cgi?id=1238905
  * https://bugzilla.suse.com/show_bug.cgi?id=1238911
  * https://bugzilla.suse.com/show_bug.cgi?id=1238919
  * https://bugzilla.suse.com/show_bug.cgi?id=1238930
  * https://bugzilla.suse.com/show_bug.cgi?id=1238937
  * https://bugzilla.suse.com/show_bug.cgi?id=1238938
  * https://bugzilla.suse.com/show_bug.cgi?id=1238984
  * https://bugzilla.suse.com/show_bug.cgi?id=1239070
  * https://bugzilla.suse.com/show_bug.cgi?id=1239111
  * https://bugzilla.suse.com/show_bug.cgi?id=1239112
  * https://bugzilla.suse.com/show_bug.cgi?id=1239474
  * https://bugzilla.suse.com/show_bug.cgi?id=1239994
  * https://bugzilla.suse.com/show_bug.cgi?id=1240185
  * https://bugzilla.suse.com/show_bug.cgi?id=1240243
  * https://bugzilla.suse.com/show_bug.cgi?id=1240250
  * https://bugzilla.suse.com/show_bug.cgi?id=1240270
  * https://bugzilla.suse.com/show_bug.cgi?id=1240309
  * https://bugzilla.suse.com/show_bug.cgi?id=1240583
  * https://bugzilla.suse.com/show_bug.cgi?id=1240590
  * https://bugzilla.suse.com/show_bug.cgi?id=1240701
  * https://bugzilla.suse.com/show_bug.cgi?id=1240703
  * https://bugzilla.suse.com/show_bug.cgi?id=1240709
  * https://bugzilla.suse.com/show_bug.cgi?id=1240712
  * https://bugzilla.suse.com/show_bug.cgi?id=1240714
  * https://bugzilla.suse.com/show_bug.cgi?id=1240717
  * https://bugzilla.suse.com/show_bug.cgi?id=1240739
  * https://bugzilla.suse.com/show_bug.cgi?id=1240740
  * https://bugzilla.suse.com/show_bug.cgi?id=1240742
  * https://bugzilla.suse.com/show_bug.cgi?id=1240835
  * https://bugzilla.suse.com/show_bug.cgi?id=1240942
  * https://bugzilla.suse.com/show_bug.cgi?id=1240943
  * https://bugzilla.suse.com/show_bug.cgi?id=1241145
  * https://bugzilla.suse.com/show_bug.cgi?id=1241266
  * https://bugzilla.suse.com/show_bug.cgi?id=1241347
  * https://bugzilla.suse.com/show_bug.cgi?id=1241371
  * https://bugzilla.suse.com/show_bug.cgi?id=1241373
  * https://bugzilla.suse.com/show_bug.cgi?id=1241404
  * https://bugzilla.suse.com/show_bug.cgi?id=1241405
  * https://bugzilla.suse.com/show_bug.cgi?id=1241408
  * https://bugzilla.suse.com/show_bug.cgi?id=1241458
  * https://bugzilla.suse.com/show_bug.cgi?id=1241526
  * https://bugzilla.suse.com/show_bug.cgi?id=1241601
  * https://bugzilla.suse.com/show_bug.cgi?id=1241640
  * https://bugzilla.suse.com/show_bug.cgi?id=1242778

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20250520/174b4771/attachment.htm>


More information about the sle-security-updates mailing list