SUSE-SU-2025:4135-1: important: Security update for the Linux Kernel
SLE-SECURITY-UPDATES
null at suse.de
Tue Nov 18 20:30:55 UTC 2025
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2025:4135-1
Release Date: 2025-11-18T17:31:50Z
Rating: important
References:
* bsc#1065729
* bsc#1199304
* bsc#1205128
* bsc#1206893
* bsc#1210124
* bsc#1243919
* bsc#1247317
* bsc#1249186
* bsc#1249857
* bsc#1249859
* bsc#1249988
* bsc#1250293
* bsc#1250311
* bsc#1250358
* bsc#1250742
* bsc#1250784
* bsc#1250816
* bsc#1250851
* bsc#1250946
* bsc#1251040
* bsc#1251047
* bsc#1251052
* bsc#1251072
* bsc#1251088
* bsc#1251091
* bsc#1251115
* bsc#1251169
* bsc#1251173
* bsc#1251182
* bsc#1251201
* bsc#1251202
* bsc#1251208
* bsc#1251222
* bsc#1251292
* bsc#1251300
* bsc#1251550
* bsc#1251723
* bsc#1251725
* bsc#1251730
* bsc#1251741
* bsc#1251743
* bsc#1251747
* bsc#1251763
* bsc#1251930
* bsc#1252035
* bsc#1252047
* bsc#1252480
* bsc#1252499
* bsc#1252516
* bsc#1252554
* bsc#1252688
* bsc#1252775
* jsc#PED-4593
* jsc#PED-568
Cross-References:
* CVE-2022-43945
* CVE-2022-50327
* CVE-2022-50334
* CVE-2022-50388
* CVE-2022-50423
* CVE-2022-50432
* CVE-2022-50470
* CVE-2022-50480
* CVE-2022-50484
* CVE-2022-50487
* CVE-2022-50488
* CVE-2022-50489
* CVE-2022-50493
* CVE-2022-50494
* CVE-2022-50496
* CVE-2022-50504
* CVE-2022-50513
* CVE-2022-50516
* CVE-2022-50532
* CVE-2022-50534
* CVE-2022-50544
* CVE-2022-50546
* CVE-2022-50549
* CVE-2022-50563
* CVE-2022-50574
* CVE-2023-53282
* CVE-2023-53365
* CVE-2023-53395
* CVE-2023-53500
* CVE-2023-53559
* CVE-2023-53564
* CVE-2023-53566
* CVE-2023-53574
* CVE-2023-53619
* CVE-2023-53673
* CVE-2023-53705
* CVE-2023-53722
* CVE-2025-38476
* CVE-2025-39968
* CVE-2025-39973
* CVE-2025-40018
* CVE-2025-40082
CVSS scores:
* CVE-2022-43945 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-43945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-43945 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50327 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50334 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50334 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50388 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50388 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50423 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50423 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50432 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50432 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50470 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50470 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50480 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50480 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50484 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50484 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50487 ( SUSE ): 7.1
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50487 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2022-50488 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50488 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50489 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50489 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50493 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50493 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50494 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50494 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50496 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50496 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50504 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50504 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50513 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2022-50513 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-50516 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50516 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50532 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50534 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50544 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50544 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50546 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50549 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50563 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50563 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2022-50574 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53282 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53282 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53365 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53395 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53395 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53500 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53559 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53564 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53564 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53566 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53574 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53574 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53619 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53619 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53673 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53705 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-53705 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
* CVE-2023-53722 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53722 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38476 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39968 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-39968 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-39973 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39973 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40018 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40018 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro for Rancher 5.2
An update that solves 42 vulnerabilities, contains two features and has 10
security fixes can now be installed.
## Description:
The SUSE Linux Enterprise FIXME kernel was updated to fix various security
issues
The following security issues were fixed:
* CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return
value (bsc#1249859).
* CVE-2022-50334: hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param()
(bsc#1249857).
* CVE-2022-50388: nvme: fix multipath crash caused by flush request when
blktrace is enabled (bsc#1250293).
* CVE-2022-50423: ACPICA: Fix use-after-free in
acpi_ut_copy_ipackage_to_ipackage() (bsc#1250784).
* CVE-2022-50432: kernfs: fix use-after-free in __kernfs_remove (bsc#1250851).
* CVE-2022-50488: block, bfq: fix possible uaf for 'bfqq->bic' (bsc#1251201).
* CVE-2022-50516: fs: dlm: fix invalid derefence of sb_lvbptr (bsc#1251741).
* CVE-2023-53282: scsi: lpfc: Fix use-after-free KFENCE violation during sysfs
firmware write (bsc#1250311).
* CVE-2023-53365: ip6mr: Fix skb_under_panic in ip6mr_cache_report()
(bsc#1249988).
* CVE-2023-53395: ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer
(bsc#1250358).
* CVE-2023-53500: xfrm: fix slab-use-after-free in decode_session6
(bsc#1250816).
* CVE-2023-53559: ip_vti: fix potential slab-use-after-free in decode_session6
(bsc#1251052).
* CVE-2023-53574: wifi: rtw88: delete timer and free skb queue when unloading
(bsc#1251222).
* CVE-2023-53619: netfilter: conntrack: Avoid nf_ct_helper_hash uses after
free (bsc#1251743).
* CVE-2023-53673: Bluetooth: hci_event: call disconnect callback before
deleting conn (bsc#1251763).
* CVE-2023-53705: ipv6: Fix out-of-bounds access in ipv6_find_tlv()
(bsc#1252554).
* CVE-2023-53722: md: raid1: fix potential OOB in raid1_remove_disk()
(bsc#1252499).
* CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline()
(bsc#1247317).
* CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047).
* CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).
* CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup
(bsc#1252688).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4135=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4135=1
## Package List:
* SUSE Linux Enterprise Micro 5.2 (nosrc x86_64)
* kernel-rt-5.3.18-150300.226.1
* SUSE Linux Enterprise Micro 5.2 (x86_64)
* kernel-rt-debugsource-5.3.18-150300.226.1
* kernel-rt-debuginfo-5.3.18-150300.226.1
* SUSE Linux Enterprise Micro 5.2 (noarch)
* kernel-source-rt-5.3.18-150300.226.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64)
* kernel-rt-5.3.18-150300.226.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
* kernel-rt-debugsource-5.3.18-150300.226.1
* kernel-rt-debuginfo-5.3.18-150300.226.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (noarch)
* kernel-source-rt-5.3.18-150300.226.1
## References:
* https://www.suse.com/security/cve/CVE-2022-43945.html
* https://www.suse.com/security/cve/CVE-2022-50327.html
* https://www.suse.com/security/cve/CVE-2022-50334.html
* https://www.suse.com/security/cve/CVE-2022-50388.html
* https://www.suse.com/security/cve/CVE-2022-50423.html
* https://www.suse.com/security/cve/CVE-2022-50432.html
* https://www.suse.com/security/cve/CVE-2022-50470.html
* https://www.suse.com/security/cve/CVE-2022-50480.html
* https://www.suse.com/security/cve/CVE-2022-50484.html
* https://www.suse.com/security/cve/CVE-2022-50487.html
* https://www.suse.com/security/cve/CVE-2022-50488.html
* https://www.suse.com/security/cve/CVE-2022-50489.html
* https://www.suse.com/security/cve/CVE-2022-50493.html
* https://www.suse.com/security/cve/CVE-2022-50494.html
* https://www.suse.com/security/cve/CVE-2022-50496.html
* https://www.suse.com/security/cve/CVE-2022-50504.html
* https://www.suse.com/security/cve/CVE-2022-50513.html
* https://www.suse.com/security/cve/CVE-2022-50516.html
* https://www.suse.com/security/cve/CVE-2022-50532.html
* https://www.suse.com/security/cve/CVE-2022-50534.html
* https://www.suse.com/security/cve/CVE-2022-50544.html
* https://www.suse.com/security/cve/CVE-2022-50546.html
* https://www.suse.com/security/cve/CVE-2022-50549.html
* https://www.suse.com/security/cve/CVE-2022-50563.html
* https://www.suse.com/security/cve/CVE-2022-50574.html
* https://www.suse.com/security/cve/CVE-2023-53282.html
* https://www.suse.com/security/cve/CVE-2023-53365.html
* https://www.suse.com/security/cve/CVE-2023-53395.html
* https://www.suse.com/security/cve/CVE-2023-53500.html
* https://www.suse.com/security/cve/CVE-2023-53559.html
* https://www.suse.com/security/cve/CVE-2023-53564.html
* https://www.suse.com/security/cve/CVE-2023-53566.html
* https://www.suse.com/security/cve/CVE-2023-53574.html
* https://www.suse.com/security/cve/CVE-2023-53619.html
* https://www.suse.com/security/cve/CVE-2023-53673.html
* https://www.suse.com/security/cve/CVE-2023-53705.html
* https://www.suse.com/security/cve/CVE-2023-53722.html
* https://www.suse.com/security/cve/CVE-2025-38476.html
* https://www.suse.com/security/cve/CVE-2025-39968.html
* https://www.suse.com/security/cve/CVE-2025-39973.html
* https://www.suse.com/security/cve/CVE-2025-40018.html
* https://www.suse.com/security/cve/CVE-2025-40082.html
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1199304
* https://bugzilla.suse.com/show_bug.cgi?id=1205128
* https://bugzilla.suse.com/show_bug.cgi?id=1206893
* https://bugzilla.suse.com/show_bug.cgi?id=1210124
* https://bugzilla.suse.com/show_bug.cgi?id=1243919
* https://bugzilla.suse.com/show_bug.cgi?id=1247317
* https://bugzilla.suse.com/show_bug.cgi?id=1249186
* https://bugzilla.suse.com/show_bug.cgi?id=1249857
* https://bugzilla.suse.com/show_bug.cgi?id=1249859
* https://bugzilla.suse.com/show_bug.cgi?id=1249988
* https://bugzilla.suse.com/show_bug.cgi?id=1250293
* https://bugzilla.suse.com/show_bug.cgi?id=1250311
* https://bugzilla.suse.com/show_bug.cgi?id=1250358
* https://bugzilla.suse.com/show_bug.cgi?id=1250742
* https://bugzilla.suse.com/show_bug.cgi?id=1250784
* https://bugzilla.suse.com/show_bug.cgi?id=1250816
* https://bugzilla.suse.com/show_bug.cgi?id=1250851
* https://bugzilla.suse.com/show_bug.cgi?id=1250946
* https://bugzilla.suse.com/show_bug.cgi?id=1251040
* https://bugzilla.suse.com/show_bug.cgi?id=1251047
* https://bugzilla.suse.com/show_bug.cgi?id=1251052
* https://bugzilla.suse.com/show_bug.cgi?id=1251072
* https://bugzilla.suse.com/show_bug.cgi?id=1251088
* https://bugzilla.suse.com/show_bug.cgi?id=1251091
* https://bugzilla.suse.com/show_bug.cgi?id=1251115
* https://bugzilla.suse.com/show_bug.cgi?id=1251169
* https://bugzilla.suse.com/show_bug.cgi?id=1251173
* https://bugzilla.suse.com/show_bug.cgi?id=1251182
* https://bugzilla.suse.com/show_bug.cgi?id=1251201
* https://bugzilla.suse.com/show_bug.cgi?id=1251202
* https://bugzilla.suse.com/show_bug.cgi?id=1251208
* https://bugzilla.suse.com/show_bug.cgi?id=1251222
* https://bugzilla.suse.com/show_bug.cgi?id=1251292
* https://bugzilla.suse.com/show_bug.cgi?id=1251300
* https://bugzilla.suse.com/show_bug.cgi?id=1251550
* https://bugzilla.suse.com/show_bug.cgi?id=1251723
* https://bugzilla.suse.com/show_bug.cgi?id=1251725
* https://bugzilla.suse.com/show_bug.cgi?id=1251730
* https://bugzilla.suse.com/show_bug.cgi?id=1251741
* https://bugzilla.suse.com/show_bug.cgi?id=1251743
* https://bugzilla.suse.com/show_bug.cgi?id=1251747
* https://bugzilla.suse.com/show_bug.cgi?id=1251763
* https://bugzilla.suse.com/show_bug.cgi?id=1251930
* https://bugzilla.suse.com/show_bug.cgi?id=1252035
* https://bugzilla.suse.com/show_bug.cgi?id=1252047
* https://bugzilla.suse.com/show_bug.cgi?id=1252480
* https://bugzilla.suse.com/show_bug.cgi?id=1252499
* https://bugzilla.suse.com/show_bug.cgi?id=1252516
* https://bugzilla.suse.com/show_bug.cgi?id=1252554
* https://bugzilla.suse.com/show_bug.cgi?id=1252688
* https://bugzilla.suse.com/show_bug.cgi?id=1252775
* https://jira.suse.com/browse/PED-4593
* https://jira.suse.com/browse/PED-568
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20251118/0223baa7/attachment.htm>
More information about the sle-security-updates
mailing list