SUSE-SU-2025:4135-1: important: Security update for the Linux Kernel

SLE-SECURITY-UPDATES null at suse.de
Tue Nov 18 20:30:55 UTC 2025



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:4135-1  
Release Date: 2025-11-18T17:31:50Z  
Rating: important  
References:

  * bsc#1065729
  * bsc#1199304
  * bsc#1205128
  * bsc#1206893
  * bsc#1210124
  * bsc#1243919
  * bsc#1247317
  * bsc#1249186
  * bsc#1249857
  * bsc#1249859
  * bsc#1249988
  * bsc#1250293
  * bsc#1250311
  * bsc#1250358
  * bsc#1250742
  * bsc#1250784
  * bsc#1250816
  * bsc#1250851
  * bsc#1250946
  * bsc#1251040
  * bsc#1251047
  * bsc#1251052
  * bsc#1251072
  * bsc#1251088
  * bsc#1251091
  * bsc#1251115
  * bsc#1251169
  * bsc#1251173
  * bsc#1251182
  * bsc#1251201
  * bsc#1251202
  * bsc#1251208
  * bsc#1251222
  * bsc#1251292
  * bsc#1251300
  * bsc#1251550
  * bsc#1251723
  * bsc#1251725
  * bsc#1251730
  * bsc#1251741
  * bsc#1251743
  * bsc#1251747
  * bsc#1251763
  * bsc#1251930
  * bsc#1252035
  * bsc#1252047
  * bsc#1252480
  * bsc#1252499
  * bsc#1252516
  * bsc#1252554
  * bsc#1252688
  * bsc#1252775
  * jsc#PED-4593
  * jsc#PED-568

  
Cross-References:

  * CVE-2022-43945
  * CVE-2022-50327
  * CVE-2022-50334
  * CVE-2022-50388
  * CVE-2022-50423
  * CVE-2022-50432
  * CVE-2022-50470
  * CVE-2022-50480
  * CVE-2022-50484
  * CVE-2022-50487
  * CVE-2022-50488
  * CVE-2022-50489
  * CVE-2022-50493
  * CVE-2022-50494
  * CVE-2022-50496
  * CVE-2022-50504
  * CVE-2022-50513
  * CVE-2022-50516
  * CVE-2022-50532
  * CVE-2022-50534
  * CVE-2022-50544
  * CVE-2022-50546
  * CVE-2022-50549
  * CVE-2022-50563
  * CVE-2022-50574
  * CVE-2023-53282
  * CVE-2023-53365
  * CVE-2023-53395
  * CVE-2023-53500
  * CVE-2023-53559
  * CVE-2023-53564
  * CVE-2023-53566
  * CVE-2023-53574
  * CVE-2023-53619
  * CVE-2023-53673
  * CVE-2023-53705
  * CVE-2023-53722
  * CVE-2025-38476
  * CVE-2025-39968
  * CVE-2025-39973
  * CVE-2025-40018
  * CVE-2025-40082

  
CVSS scores:

  * CVE-2022-43945 ( SUSE ):  8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-43945 ( NVD ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-43945 ( NVD ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50327 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50327 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50334 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50334 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50388 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50388 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50423 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50423 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50432 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50432 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50470 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50470 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2022-50480 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-50480 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-50484 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50484 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50487 ( SUSE ):  7.1
    CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50487 ( SUSE ):  7.1 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
  * CVE-2022-50488 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50488 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50489 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-50489 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-50493 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50493 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50494 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50494 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50496 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50496 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50504 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50504 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50513 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-50513 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-50516 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50516 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50532 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50534 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50544 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50544 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50546 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50549 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50563 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50563 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2022-50574 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53282 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53282 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53365 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53395 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53395 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53500 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53559 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53564 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53564 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53566 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53574 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53574 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53619 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53619 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53673 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53673 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53705 ( SUSE ):  6.9
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53705 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
  * CVE-2023-53722 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53722 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38476 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38476 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39968 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-39968 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-39973 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39973 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40018 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40018 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40082 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * SUSE Linux Enterprise Micro 5.2
  * SUSE Linux Enterprise Micro for Rancher 5.2

  
  
An update that solves 42 vulnerabilities, contains two features and has 10
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise FIXME kernel was updated to fix various security
issues

The following security issues were fixed:

  * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return
    value (bsc#1249859).
  * CVE-2022-50334: hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param()
    (bsc#1249857).
  * CVE-2022-50388: nvme: fix multipath crash caused by flush request when
    blktrace is enabled (bsc#1250293).
  * CVE-2022-50423: ACPICA: Fix use-after-free in
    acpi_ut_copy_ipackage_to_ipackage() (bsc#1250784).
  * CVE-2022-50432: kernfs: fix use-after-free in __kernfs_remove (bsc#1250851).
  * CVE-2022-50488: block, bfq: fix possible uaf for 'bfqq->bic' (bsc#1251201).
  * CVE-2022-50516: fs: dlm: fix invalid derefence of sb_lvbptr (bsc#1251741).
  * CVE-2023-53282: scsi: lpfc: Fix use-after-free KFENCE violation during sysfs
    firmware write (bsc#1250311).
  * CVE-2023-53365: ip6mr: Fix skb_under_panic in ip6mr_cache_report()
    (bsc#1249988).
  * CVE-2023-53395: ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer
    (bsc#1250358).
  * CVE-2023-53500: xfrm: fix slab-use-after-free in decode_session6
    (bsc#1250816).
  * CVE-2023-53559: ip_vti: fix potential slab-use-after-free in decode_session6
    (bsc#1251052).
  * CVE-2023-53574: wifi: rtw88: delete timer and free skb queue when unloading
    (bsc#1251222).
  * CVE-2023-53619: netfilter: conntrack: Avoid nf_ct_helper_hash uses after
    free (bsc#1251743).
  * CVE-2023-53673: Bluetooth: hci_event: call disconnect callback before
    deleting conn (bsc#1251763).
  * CVE-2023-53705: ipv6: Fix out-of-bounds access in ipv6_find_tlv()
    (bsc#1252554).
  * CVE-2023-53722: md: raid1: fix potential OOB in raid1_remove_disk()
    (bsc#1252499).
  * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline()
    (bsc#1247317).
  * CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047).
  * CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).
  * CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup
    (bsc#1252688).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Micro 5.2  
    zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4135=1

  * SUSE Linux Enterprise Micro for Rancher 5.2  
    zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4135=1

## Package List:

  * SUSE Linux Enterprise Micro 5.2 (nosrc x86_64)
    * kernel-rt-5.3.18-150300.226.1
  * SUSE Linux Enterprise Micro 5.2 (x86_64)
    * kernel-rt-debugsource-5.3.18-150300.226.1
    * kernel-rt-debuginfo-5.3.18-150300.226.1
  * SUSE Linux Enterprise Micro 5.2 (noarch)
    * kernel-source-rt-5.3.18-150300.226.1
  * SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64)
    * kernel-rt-5.3.18-150300.226.1
  * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
    * kernel-rt-debugsource-5.3.18-150300.226.1
    * kernel-rt-debuginfo-5.3.18-150300.226.1
  * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch)
    * kernel-source-rt-5.3.18-150300.226.1

## References:

  * https://www.suse.com/security/cve/CVE-2022-43945.html
  * https://www.suse.com/security/cve/CVE-2022-50327.html
  * https://www.suse.com/security/cve/CVE-2022-50334.html
  * https://www.suse.com/security/cve/CVE-2022-50388.html
  * https://www.suse.com/security/cve/CVE-2022-50423.html
  * https://www.suse.com/security/cve/CVE-2022-50432.html
  * https://www.suse.com/security/cve/CVE-2022-50470.html
  * https://www.suse.com/security/cve/CVE-2022-50480.html
  * https://www.suse.com/security/cve/CVE-2022-50484.html
  * https://www.suse.com/security/cve/CVE-2022-50487.html
  * https://www.suse.com/security/cve/CVE-2022-50488.html
  * https://www.suse.com/security/cve/CVE-2022-50489.html
  * https://www.suse.com/security/cve/CVE-2022-50493.html
  * https://www.suse.com/security/cve/CVE-2022-50494.html
  * https://www.suse.com/security/cve/CVE-2022-50496.html
  * https://www.suse.com/security/cve/CVE-2022-50504.html
  * https://www.suse.com/security/cve/CVE-2022-50513.html
  * https://www.suse.com/security/cve/CVE-2022-50516.html
  * https://www.suse.com/security/cve/CVE-2022-50532.html
  * https://www.suse.com/security/cve/CVE-2022-50534.html
  * https://www.suse.com/security/cve/CVE-2022-50544.html
  * https://www.suse.com/security/cve/CVE-2022-50546.html
  * https://www.suse.com/security/cve/CVE-2022-50549.html
  * https://www.suse.com/security/cve/CVE-2022-50563.html
  * https://www.suse.com/security/cve/CVE-2022-50574.html
  * https://www.suse.com/security/cve/CVE-2023-53282.html
  * https://www.suse.com/security/cve/CVE-2023-53365.html
  * https://www.suse.com/security/cve/CVE-2023-53395.html
  * https://www.suse.com/security/cve/CVE-2023-53500.html
  * https://www.suse.com/security/cve/CVE-2023-53559.html
  * https://www.suse.com/security/cve/CVE-2023-53564.html
  * https://www.suse.com/security/cve/CVE-2023-53566.html
  * https://www.suse.com/security/cve/CVE-2023-53574.html
  * https://www.suse.com/security/cve/CVE-2023-53619.html
  * https://www.suse.com/security/cve/CVE-2023-53673.html
  * https://www.suse.com/security/cve/CVE-2023-53705.html
  * https://www.suse.com/security/cve/CVE-2023-53722.html
  * https://www.suse.com/security/cve/CVE-2025-38476.html
  * https://www.suse.com/security/cve/CVE-2025-39968.html
  * https://www.suse.com/security/cve/CVE-2025-39973.html
  * https://www.suse.com/security/cve/CVE-2025-40018.html
  * https://www.suse.com/security/cve/CVE-2025-40082.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1065729
  * https://bugzilla.suse.com/show_bug.cgi?id=1199304
  * https://bugzilla.suse.com/show_bug.cgi?id=1205128
  * https://bugzilla.suse.com/show_bug.cgi?id=1206893
  * https://bugzilla.suse.com/show_bug.cgi?id=1210124
  * https://bugzilla.suse.com/show_bug.cgi?id=1243919
  * https://bugzilla.suse.com/show_bug.cgi?id=1247317
  * https://bugzilla.suse.com/show_bug.cgi?id=1249186
  * https://bugzilla.suse.com/show_bug.cgi?id=1249857
  * https://bugzilla.suse.com/show_bug.cgi?id=1249859
  * https://bugzilla.suse.com/show_bug.cgi?id=1249988
  * https://bugzilla.suse.com/show_bug.cgi?id=1250293
  * https://bugzilla.suse.com/show_bug.cgi?id=1250311
  * https://bugzilla.suse.com/show_bug.cgi?id=1250358
  * https://bugzilla.suse.com/show_bug.cgi?id=1250742
  * https://bugzilla.suse.com/show_bug.cgi?id=1250784
  * https://bugzilla.suse.com/show_bug.cgi?id=1250816
  * https://bugzilla.suse.com/show_bug.cgi?id=1250851
  * https://bugzilla.suse.com/show_bug.cgi?id=1250946
  * https://bugzilla.suse.com/show_bug.cgi?id=1251040
  * https://bugzilla.suse.com/show_bug.cgi?id=1251047
  * https://bugzilla.suse.com/show_bug.cgi?id=1251052
  * https://bugzilla.suse.com/show_bug.cgi?id=1251072
  * https://bugzilla.suse.com/show_bug.cgi?id=1251088
  * https://bugzilla.suse.com/show_bug.cgi?id=1251091
  * https://bugzilla.suse.com/show_bug.cgi?id=1251115
  * https://bugzilla.suse.com/show_bug.cgi?id=1251169
  * https://bugzilla.suse.com/show_bug.cgi?id=1251173
  * https://bugzilla.suse.com/show_bug.cgi?id=1251182
  * https://bugzilla.suse.com/show_bug.cgi?id=1251201
  * https://bugzilla.suse.com/show_bug.cgi?id=1251202
  * https://bugzilla.suse.com/show_bug.cgi?id=1251208
  * https://bugzilla.suse.com/show_bug.cgi?id=1251222
  * https://bugzilla.suse.com/show_bug.cgi?id=1251292
  * https://bugzilla.suse.com/show_bug.cgi?id=1251300
  * https://bugzilla.suse.com/show_bug.cgi?id=1251550
  * https://bugzilla.suse.com/show_bug.cgi?id=1251723
  * https://bugzilla.suse.com/show_bug.cgi?id=1251725
  * https://bugzilla.suse.com/show_bug.cgi?id=1251730
  * https://bugzilla.suse.com/show_bug.cgi?id=1251741
  * https://bugzilla.suse.com/show_bug.cgi?id=1251743
  * https://bugzilla.suse.com/show_bug.cgi?id=1251747
  * https://bugzilla.suse.com/show_bug.cgi?id=1251763
  * https://bugzilla.suse.com/show_bug.cgi?id=1251930
  * https://bugzilla.suse.com/show_bug.cgi?id=1252035
  * https://bugzilla.suse.com/show_bug.cgi?id=1252047
  * https://bugzilla.suse.com/show_bug.cgi?id=1252480
  * https://bugzilla.suse.com/show_bug.cgi?id=1252499
  * https://bugzilla.suse.com/show_bug.cgi?id=1252516
  * https://bugzilla.suse.com/show_bug.cgi?id=1252554
  * https://bugzilla.suse.com/show_bug.cgi?id=1252688
  * https://bugzilla.suse.com/show_bug.cgi?id=1252775
  * https://jira.suse.com/browse/PED-4593
  * https://jira.suse.com/browse/PED-568

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20251118/0223baa7/attachment.htm>


More information about the sle-security-updates mailing list