SUSE-SU-2026:0473-1: important: Security update for the Linux Kernel

SLE-SECURITY-UPDATES null at suse.de
Thu Feb 12 16:32:08 UTC 2026



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2026:0473-1  
Release Date: 2026-02-12T11:26:39Z  
Rating: important  
References:

  * bsc#1205462
  * bsc#1214285
  * bsc#1220840
  * bsc#1223007
  * bsc#1223675
  * bsc#1225527
  * bsc#1225741
  * bsc#1227863
  * bsc#1227988
  * bsc#1231908
  * bsc#1235428
  * bsc#1236702
  * bsc#1239346
  * bsc#1240299
  * bsc#1243471
  * bsc#1244904
  * bsc#1244938
  * bsc#1245110
  * bsc#1248211
  * bsc#1248341
  * bsc#1248363
  * bsc#1248643
  * bsc#1249307
  * bsc#1249658
  * bsc#1249827
  * bsc#1249842
  * bsc#1249854
  * bsc#1249928
  * bsc#1250032
  * bsc#1250082
  * bsc#1250705
  * bsc#1250759
  * bsc#1250868
  * bsc#1251770
  * bsc#1252542
  * bsc#1252909
  * bsc#1253318
  * bsc#1253453
  * bsc#1253739
  * bsc#1254244
  * bsc#1254572
  * bsc#1254657
  * bsc#1254673
  * bsc#1254689
  * bsc#1254707
  * bsc#1254835
  * bsc#1254839
  * bsc#1254845
  * bsc#1254986
  * bsc#1255094
  * bsc#1255102
  * bsc#1255122
  * bsc#1255128
  * bsc#1255131
  * bsc#1255157
  * bsc#1255164
  * bsc#1255169
  * bsc#1255171
  * bsc#1255246
  * bsc#1255268
  * bsc#1255269
  * bsc#1255279
  * bsc#1255297
  * bsc#1255351
  * bsc#1255380
  * bsc#1255428
  * bsc#1255482
  * bsc#1255537
  * bsc#1255544
  * bsc#1255547
  * bsc#1255553
  * bsc#1255565
  * bsc#1255571
  * bsc#1255594
  * bsc#1255611
  * bsc#1255622
  * bsc#1255695
  * bsc#1255762
  * bsc#1255773
  * bsc#1255804
  * bsc#1255810
  * bsc#1255812
  * bsc#1255839
  * bsc#1255844
  * bsc#1255874
  * bsc#1255880
  * bsc#1255905
  * bsc#1255908
  * bsc#1255925
  * bsc#1255939
  * bsc#1255943
  * bsc#1255961
  * bsc#1255970
  * bsc#1255983
  * bsc#1256038
  * bsc#1256058
  * bsc#1256106
  * bsc#1256122
  * bsc#1256125
  * bsc#1256127
  * bsc#1256130
  * bsc#1256131
  * bsc#1256132
  * bsc#1256149
  * bsc#1256155
  * bsc#1256165
  * bsc#1256168
  * bsc#1256184
  * bsc#1256191
  * bsc#1256216
  * bsc#1256219
  * bsc#1256221
  * bsc#1256229
  * bsc#1256258
  * bsc#1256267
  * bsc#1256282
  * bsc#1256305
  * bsc#1256320
  * bsc#1256354
  * bsc#1256369
  * bsc#1256386
  * bsc#1256395
  * bsc#1256398
  * bsc#1256580
  * bsc#1256582
  * bsc#1256585
  * bsc#1256591
  * bsc#1256606
  * bsc#1256611
  * bsc#1256623
  * bsc#1256628
  * bsc#1256638
  * bsc#1256641
  * bsc#1256650
  * bsc#1256654
  * bsc#1256660
  * bsc#1256674
  * bsc#1256688
  * bsc#1256726
  * bsc#1256730
  * bsc#1256757
  * bsc#1256773
  * bsc#1256774
  * bsc#1256777
  * bsc#1256779
  * bsc#1256792
  * bsc#1257035
  * bsc#1257207
  * bsc#1257227
  * bsc#1257229
  * bsc#1257232
  * bsc#1257236
  * bsc#1257282

  
Cross-References:

  * CVE-2022-48838
  * CVE-2022-49943
  * CVE-2022-49980
  * CVE-2022-50347
  * CVE-2022-50580
  * CVE-2022-50676
  * CVE-2022-50697
  * CVE-2022-50709
  * CVE-2022-50716
  * CVE-2022-50717
  * CVE-2022-50719
  * CVE-2022-50740
  * CVE-2022-50744
  * CVE-2022-50749
  * CVE-2022-50751
  * CVE-2022-50760
  * CVE-2022-50770
  * CVE-2022-50777
  * CVE-2022-50780
  * CVE-2022-50782
  * CVE-2022-50786
  * CVE-2022-50816
  * CVE-2022-50834
  * CVE-2022-50865
  * CVE-2022-50868
  * CVE-2022-50880
  * CVE-2022-50881
  * CVE-2022-50884
  * CVE-2022-50885
  * CVE-2022-50887
  * CVE-2023-50756
  * CVE-2023-52525
  * CVE-2023-52999
  * CVE-2023-53148
  * CVE-2023-53178
  * CVE-2023-53226
  * CVE-2023-53464
  * CVE-2023-53685
  * CVE-2023-53747
  * CVE-2023-53751
  * CVE-2023-53825
  * CVE-2023-53853
  * CVE-2023-53863
  * CVE-2023-53992
  * CVE-2023-54012
  * CVE-2023-54047
  * CVE-2023-54048
  * CVE-2023-54067
  * CVE-2023-54111
  * CVE-2023-54112
  * CVE-2023-54118
  * CVE-2023-54121
  * CVE-2023-54134
  * CVE-2023-54198
  * CVE-2023-54202
  * CVE-2023-54207
  * CVE-2023-54218
  * CVE-2023-54230
  * CVE-2023-54243
  * CVE-2023-54265
  * CVE-2023-54274
  * CVE-2023-54282
  * CVE-2023-54287
  * CVE-2023-54311
  * CVE-2023-54321
  * CVE-2024-26832
  * CVE-2024-26935
  * CVE-2024-36903
  * CVE-2024-41007
  * CVE-2024-50040
  * CVE-2024-56690
  * CVE-2024-58020
  * CVE-2025-21681
  * CVE-2025-37913
  * CVE-2025-38007
  * CVE-2025-38539
  * CVE-2025-38591
  * CVE-2025-38602
  * CVE-2025-38656
  * CVE-2025-39689
  * CVE-2025-39813
  * CVE-2025-39829
  * CVE-2025-39913
  * CVE-2025-40087
  * CVE-2025-40088
  * CVE-2025-40115
  * CVE-2025-40198
  * CVE-2025-40259
  * CVE-2025-40261
  * CVE-2025-40264
  * CVE-2025-40271
  * CVE-2025-40323
  * CVE-2025-40339
  * CVE-2025-40345
  * CVE-2025-40363
  * CVE-2025-68188
  * CVE-2025-68190
  * CVE-2025-68192
  * CVE-2025-68241
  * CVE-2025-68245
  * CVE-2025-68261
  * CVE-2025-68264
  * CVE-2025-68286
  * CVE-2025-68296
  * CVE-2025-68303
  * CVE-2025-68305
  * CVE-2025-68312
  * CVE-2025-68337
  * CVE-2025-68349
  * CVE-2025-68354
  * CVE-2025-68362
  * CVE-2025-68366
  * CVE-2025-68367
  * CVE-2025-68372
  * CVE-2025-68379
  * CVE-2025-68740
  * CVE-2025-68757
  * CVE-2025-68767
  * CVE-2025-68771
  * CVE-2025-68774
  * CVE-2025-68783
  * CVE-2025-68788
  * CVE-2025-68795
  * CVE-2025-68797
  * CVE-2025-68813
  * CVE-2025-68816
  * CVE-2025-71064
  * CVE-2025-71082
  * CVE-2025-71085
  * CVE-2025-71087
  * CVE-2025-71091
  * CVE-2025-71093
  * CVE-2025-71096
  * CVE-2025-71098
  * CVE-2025-71108
  * CVE-2025-71112
  * CVE-2025-71119
  * CVE-2025-71120
  * CVE-2025-71123
  * CVE-2026-22976
  * CVE-2026-22978
  * CVE-2026-22988
  * CVE-2026-22999
  * CVE-2026-23001
  * CVE-2026-23011

  
CVSS scores:

  * CVE-2022-48838 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48838 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49943 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49943 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2022-49943 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49980 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49980 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49980 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50347 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50347 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50347 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50580 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50580 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2022-50676 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50697 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50697 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50709 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50709 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2022-50716 ( SUSE ):  7.0
    CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50716 ( SUSE ):  6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50717 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50717 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50719 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
  * CVE-2022-50740 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-50740 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-50744 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50744 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50749 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-50749 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
  * CVE-2022-50751 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-50751 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-50760 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50770 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50770 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50777 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50777 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50780 ( SUSE ):  5.9
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50780 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
  * CVE-2022-50782 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50782 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50786 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50816 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50834 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50865 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50868 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50880 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50881 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50884 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50885 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50887 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52525 ( SUSE ):  3.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
  * CVE-2023-52525 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2023-52999 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52999 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53148 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53148 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53178 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53178 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53226 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53226 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53226 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53464 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53464 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53685 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-53685 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-53685 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53747 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53751 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53751 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53825 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53853 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53863 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53992 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54012 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54047 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54048 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54067 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54111 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54111 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54112 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54118 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54118 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2023-54121 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54134 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54134 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54198 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54198 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54202 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54207 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54207 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-54218 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-54218 ( SUSE ):  3.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2023-54230 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54230 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54243 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54243 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2023-54265 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54265 ( SUSE ):  6.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
  * CVE-2023-54274 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54274 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54282 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-54282 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-54287 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54287 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54311 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54311 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54321 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54321 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26832 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26832 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26935 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-26935 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-36903 ( SUSE ):  5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
  * CVE-2024-36903 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41007 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-41007 ( NVD ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-50040 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50040 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56690 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56690 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56690 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58020 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-58020 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-58020 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21681 ( SUSE ):  8.2
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
  * CVE-2025-21681 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
  * CVE-2025-21681 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37913 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-37913 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2025-37913 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38007 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38007 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38539 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38539 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-38539 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38591 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-38591 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
  * CVE-2025-38591 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38602 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38602 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38602 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38656 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38656 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38656 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39689 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39689 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39813 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39813 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39829 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39829 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39829 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39913 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39913 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40087 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40088 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40088 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2025-40115 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40115 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40198 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40198 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40259 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40261 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40264 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40271 ( SUSE ):  5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-40323 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40323 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40339 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40345 ( SUSE ):  7.0
    CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40345 ( SUSE ):  6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40363 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-40363 ( SUSE ):  2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-68188 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68188 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-68190 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68190 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68192 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68241 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68245 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68261 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68264 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68264 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-68286 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68296 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68303 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68305 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68305 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68312 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68312 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68337 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68349 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68354 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68362 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68366 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68367 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68372 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68372 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68379 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68379 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68379 ( SUSE ):  5.5 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68740 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68740 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68757 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68757 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68767 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68767 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68771 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68771 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68774 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68774 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68783 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68783 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68788 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-68788 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2025-68795 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68795 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-68797 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68797 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68813 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68813 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68816 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71064 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71082 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71082 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71085 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71085 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71087 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71087 ( SUSE ):  5.6 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-71091 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71091 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71093 ( SUSE ):  6.9
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-71093 ( SUSE ):  5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
  * CVE-2025-71096 ( SUSE ):  5.9
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71096 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H
  * CVE-2025-71098 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71098 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71108 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71108 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71112 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71112 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-71119 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-71119 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-71120 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71120 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71123 ( SUSE ):  5.9
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71123 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
  * CVE-2026-22976 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22976 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22978 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2026-22988 ( SUSE ):  6.0
    CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22988 ( SUSE ):  5.9 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
  * CVE-2026-22999 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-22999 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23001 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2026-23001 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2026-23011 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * SUSE Linux Enterprise High Performance Computing 12 SP5
  * SUSE Linux Enterprise Live Patching 12-SP5
  * SUSE Linux Enterprise Server 12 SP5
  * SUSE Linux Enterprise Server 12 SP5 LTSS
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5

  
  
An update that solves 145 vulnerabilities and has eight security fixes can now
be installed.

## Description:

The SUSE Linux Enterprise 12 SP5 kernel was updated to fix various security
issues

The following security issues were fixed:

  * CVE-2022-50347: mmc: rtsx_usb_sdmmc: fix return value check of
    mmc_add_host() (bsc#1249928).
  * CVE-2022-50580: blk-throttle: prevent overflow while calculating wait time
    (bsc#1252542).
  * CVE-2022-50676: net: rds: don't hold sock lock when cancelling work from
    rds_tcp_reset_callbacks() (bsc#1254689).
  * CVE-2022-50697: mrp: introduce active flags to prevent UAF when applicant
    uninit (bsc#1255594).
  * CVE-2022-50709: wifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg()
    (bsc#1255565).
  * CVE-2022-50716: wifi: ar5523: Fix use-after-free on ar5523_cmd() timed out
    (bsc#1255839).
  * CVE-2022-50717: nvmet-tcp: add bounds check on Transfer Tag (bsc#1255844).
  * CVE-2022-50719: ALSA: line6: fix stack overflow in line6_midi_transmit
    (bsc#1255939).
  * CVE-2022-50740: wifi: ath9k: hif_usb: fix memory leak of urbs in
    ath9k_hif_usb_dealloc_tx_urbs() (bsc#1256155).
  * CVE-2022-50744: scsi: lpfc: Fix hard lockup when reading the rx_monitor from
    debugfs (bsc#1256165).
  * CVE-2022-50749: acct: fix potential integer overflow in encode_comp_t()
    (bsc#1256191).
  * CVE-2022-50751: configfs: fix possible memory leak in configfs_create_dir()
    (bsc#1256184).
  * CVE-2022-50760: drm/amdgpu: Fix PCI device refcount leak in
    amdgpu_atrm_get_bios() (bsc#1255983).
  * CVE-2022-50770: ocfs2: fix memory leak in ocfs2_mount_volume()
    (bsc#1256221).
  * CVE-2022-50777: net: phy: xgmiitorgmii: Fix refcount leak in
    xgmiitorgmii_probe (bsc#1256320).
  * CVE-2022-50780: net: fix UAF issue in nfqnl_nf_hook_drop() when ops_init()
    failed (bsc#1256305).
  * CVE-2022-50782: ext4: fix bug_on in __es_tree_search caused by bad quota
    inode (bsc#1256282).
  * CVE-2022-50786: media: s5p-mfc: Clear workbit to handle error condition
    (bsc#1256258).
  * CVE-2022-50816: ipv6: ensure sane device mtu in tunnels (bsc#1256038).
  * CVE-2022-50834: nfc: Fix potential resource leaks (bsc#1256219).
  * CVE-2022-50865: tcp: fix a signed-integer-overflow bug in tcp_add_backlog()
    (bsc#1256168).
  * CVE-2022-50868: hwrng: amd - Fix PCI device refcount leak (bsc#1256386).
  * CVE-2022-50880: wifi: ath10k: add peer map clean up for peer delete in
    ath10k_sta_state() (bsc#1256132).
  * CVE-2022-50881: ath9k: Fix typo in function name (bsc#1256130).
  * CVE-2022-50884: drm: Prevent drm_copy_field() to attempt copying a NULL
    pointer (bsc#1256127).
  * CVE-2022-50885: RDMA/rxe: Fix NULL-ptr-deref in rxe_qp_do_cleanup() when
    socket create failed (bsc#1256122).
  * CVE-2022-50887: regulator: core: fix unbalanced of node refcount in
    regulator_dev_lookup() (bsc#1256125).
  * CVE-2023-50756: nvme-pci: fix mempool alloc size (bsc#1256216).
  * CVE-2023-53685: tun: Fix memory leak for detached NAPI queue (bsc#1251770).
  * CVE-2023-53747: vc_screen: reload load of struct vc_data pointer in
    vcs_write() to avoid UAF (bsc#1254572).
  * CVE-2023-53751: cifs: fix potential use-after-free bugs in
    TCP_Server_Info::hostname (bsc#1254986).
  * CVE-2023-53825: kcm: Fix error handling for SOCK_DGRAM in kcm_sendmsg()
    (bsc#1254707).
  * CVE-2023-53853: netlink: annotate accesses to nlk->cb_running (bsc#1254673).
  * CVE-2023-53863: netlink: do not hard code device address lenth in fdb dumps
    (bsc#1254657).
  * CVE-2023-53992: wifi: cfg80211: ocb: don't leave if not joined
    (bsc#1256058).
  * CVE-2023-54012: net: fix stack overflow when LRO is disabled for virtual
    interfaces (bsc#1255571).
  * CVE-2023-54047: drm/rockchip: dw_hdmi: cleanup drm encoder during unbind
    (bsc#1256398).
  * CVE-2023-54048: RDMA/bnxt_re: Prevent handling any completions after qp
    destroy (bsc#1256395).
  * CVE-2023-54067: btrfs: fix race when deleting free space root from the dirty
    cow roots list (bsc#1256369).
  * CVE-2023-54111: pinctrl: rockchip: Fix refcount leak in
    rockchip_pinctrl_parse_groups (bsc#1256149).
  * CVE-2023-54112: kcm: Fix memory leak in error path of kcm_sendmsg()
    (bsc#1256354).
  * CVE-2023-54118: serial: sc16is7xx: setup GPIO controller later in probe
    (bsc#1256131).
  * CVE-2023-54121: btrfs: fix incorrect splitting in
    btrfs_drop_extent_map_range (bsc#1256267).
  * CVE-2023-54134: autofs: fix memory leak of waitqueues in
    autofs_catatonic_mode (bsc#1256106).
  * CVE-2023-54198: tty: fix out-of-bounds access in tty_driver_lookup_tty()
    (bsc#1255970).
  * CVE-2023-54202: drm/i915: fix race condition UAF in
    i915_perf_add_config_ioctl (bsc#1255880).
  * CVE-2023-54207: HID: uclogic: Correct devm device reference for hidinput
    input_dev name (bsc#1255961).
  * CVE-2023-54218: sock: Make sock->sk_stamp thread-safe (bsc#1256229).
  * CVE-2023-54230: amba: bus: fix refcount leak (bsc#1255925).
  * CVE-2023-54243: netfilter: ebtables: fix table blob use-after-free
    (bsc#1255908).
  * CVE-2023-54265: ipv6: Fix an uninit variable access bug in __ip6_make_skb()
    (bsc#1255874).
  * CVE-2023-54274: RDMA/srpt: Add a check for valid 'mad_agent' pointer
    (bsc#1255905).
  * CVE-2023-54282: media: tuners: qt1010: replace BUG_ON with a regular error
    (bsc#1255810).
  * CVE-2023-54287: tty: serial: imx: disable Ageing Timer interrupt request irq
    (bsc#1255804).
  * CVE-2023-54311: ext4: fix deadlock when converting an inline directory in
    nojournal mode (bsc#1255773).
  * CVE-2023-54321: driver core: fix potential null-ptr-deref in device_add()
    (bsc#1255762).
  * CVE-2024-41007: tcp: use signed arithmetic in tcp_rtx_probe0_timed_out()
    (bsc#1227863).
  * CVE-2025-40115: scsi: mpt3sas: Fix crash in transport port remove by using
    ioc_info() (bsc#1253318).
  * CVE-2025-40259: scsi: sg: Do not sleep in atomic context (bsc#1254845).
  * CVE-2025-40261: nvme: nvme-fc: Ensure ->ioerr_work is cancelled in
    nvme_fc_delete_ctrl() (bsc#1254839).
  * CVE-2025-40264: be2net: pass wrb_params in case of OS2BMC (bsc#1254835).
  * CVE-2025-40271: fs/proc: fix uaf in proc_readdir_de() (bsc#1255297).
  * CVE-2025-40323: fbcon: Set fb_display[i]->mode to NULL when the mode is
    released (bsc#1255094).
  * CVE-2025-40339: drm/amdgpu: fix nullptr err of vm_handle_moved
    (bsc#1255428).
  * CVE-2025-40345: usb: storage: sddr55: Reject out-of-bound new_pba
    (bsc#1255279).
  * CVE-2025-40363: net: ipv6: fix field-spanning memcpy warning in AH output
    (bsc#1255102).
  * CVE-2025-68188: tcp: use dst_dev_rcu() in
    tcp_fastopen_active_disable_ofo_check() (bsc#1255269).
  * CVE-2025-68190: drm/amdgpu/atom: Check kcalloc() for WS buffer in
    amdgpu_atom_execute_table_locked() (bsc#1255131).
  * CVE-2025-68192: net: usb: qmi_wwan: initialize MAC header offset in
    qmimux_rx_fixup (bsc#1255246).
  * CVE-2025-68241: ipv4: route: Prevent rt_bind_exception() from rebinding
    stale fnhe (bsc#1255157).
  * CVE-2025-68245: net: netpoll: fix incorrect refcount handling causing
    incorrect cleanup (bsc#1255268).
  * CVE-2025-68261: ext4: add i_data_sem protection in
    ext4_destroy_inline_data_nolock() (bsc#1255164).
  * CVE-2025-68264: ext4: refresh inline data size before write operations
    (bsc#1255380).
  * CVE-2025-68286: drm/amd/display: Check NULL before accessing (bsc#1255351).
  * CVE-2025-68296: drm, fbcon, vga_switcheroo: Avoid race condition in fbcon
    setup (bsc#1255128).
  * CVE-2025-68303: platform/x86: intel: punit_ipc: fix memory corruption
    (bsc#1255122).
  * CVE-2025-68305: Bluetooth: hci_sock: Prevent race in socket write iter and
    sock bind (bsc#1255169).
  * CVE-2025-68312: usbnet: Prevents free active kevent (bsc#1255171).
  * CVE-2025-68337: jbd2: avoid bug_on in jbd2_journal_get_create_access() when
    file system corrupted (bsc#1255482).
  * CVE-2025-68349: NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in
    pnfs_mark_layout_stateid_invalid (bsc#1255544).
  * CVE-2025-68354: regulator: core: Protect regulator_supply_alias_list with
    regulator_list_mutex (bsc#1255553).
  * CVE-2025-68362: wifi: rtl818x: rtl8187: Fix potential buffer underflow in
    rtl8187_rx_cb() (bsc#1255611).
  * CVE-2025-68366: nbd: defer config unlock in nbd_genl_connect (bsc#1255622).
  * CVE-2025-68367: macintosh/mac_hid: fix race condition in
    mac_hid_toggle_emumouse (bsc#1255547).
  * CVE-2025-68372: nbd: defer config put in recv_work (bsc#1255537).
  * CVE-2025-68379: RDMA/rxe: Fix null deref on srq->rq.queue after resize
    failure (bsc#1255695).
  * CVE-2025-68740: ima: Handle error code returned by ima_filter_rule_match()
    (bsc#1255812).
  * CVE-2025-68757: drm/vgem-fence: Fix potential deadlock on release
    (bsc#1255943).
  * CVE-2025-68767: hfsplus: Verify inode mode when loading from disk
    (bsc#1256580).
  * CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain
    (bsc#1256582).
  * CVE-2025-68774: hfsplus: fix missing hfs_bnode_get() in __hfs_bnode_create
    (bsc#1256585).
  * CVE-2025-68783: ALSA: usb-mixer: us16x08: validate meter packet indices
    (bsc#1256650).
  * CVE-2025-68788: fsnotify: do not generate ACCESS/MODIFY events on child for
    special files (bsc#1256638).
  * CVE-2025-68795: ethtool: Avoid overflowing userspace buffer on stats query
    (bsc#1256688).
  * CVE-2025-68797: char: applicom: fix NULL pointer dereference in ac_ioctl
    (bsc#1256660).
  * CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path
    (bsc#1256641).
  * CVE-2025-68816: net/mlx5: fw_tracer, Validate format string parameters
    (bsc#1256674).
  * CVE-2025-71064: net: hns3: using the num_tqps in the vf driver to apply for
    resources (bsc#1256654).
  * CVE-2025-71082: Bluetooth: btusb: revert use of devm_kzalloc in btusb
    (bsc#1256611).
  * CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of
    calipso_skbuff_setattr() (bsc#1256623).
  * CVE-2025-71087: iavf: fix off-by-one issues in iavf_config_rss_reg()
    (bsc#1256628).
  * CVE-2025-71091: team: fix check for port enabled in
    team_queue_override_port_prio_changed() (bsc#1256773).
  * CVE-2025-71093: e1000: fix OOB in e1000_tbi_should_accept() (bsc#1256777).
  * CVE-2025-71096: RDMA/core: Check for the presence of LS_NLA_TYPE_DGID
    correctly (bsc#1256606).
  * CVE-2025-71098: ip6_gre: make ip6gre_header() robust (bsc#1256591).
  * CVE-2025-71108: usb: typec: ucsi: Handle incorrect num_connectors capability
    (bsc#1256774).
  * CVE-2025-71112: net: hns3: add VLAN id validation before using
    (bsc#1256726).
  * CVE-2025-71119: powerpc/kexec: Enable SMT before waking offline CPUs
    (bsc#1205462).
  * CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length
    gss_token in gss_read_proxy_verf (bsc#1256779).
  * CVE-2026-22976: net_sched: qfq: Fix double list add in class with netem as
    child qdisc (bsc#1257035).
  * CVE-2026-22978: wifi: avoid kernel-infoleak from struct iw_point
    (bsc#1257227).
  * CVE-2026-22999: net/sched: sch_qfq: do not free existing class in
    qfq_change_class() (bsc#1257236).
  * CVE-2026-23001: macvlan: Use 'hash' iterators to simplify code
    (bsc#1257232).
  * CVE-2026-23011: ipv4: ip_gre: make ipgre_header() robust (bsc#1257207).

The following non security issues were fixed:

  * RDMA/rxe: Fix the error caused by qp->sk (bsc#1256122).
  * RDMA/srpt: Fix disabling device management (bsc#1255905).
  * RDMA/srpt: Fix handling of SR-IOV and iWARP ports (bsc#1255905).
  * configfs: factor dirent removal into helpers (bsc#1256184).
  * drm/amdgpu: Remove explicit wait after VM validate (bsc#1255428).
  * drm/amdgpu: update mappings not managed by KFD (bsc#1255428).
  * hwrng: amd - Convert PCIBIOS_* return codes to errnos (bsc#1256386).
  * nvmet-tcp: Fix NULL dereference when a connect data comes in h2cdata pdu
    (bsc#1255844).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Live Patching 12-SP5  
    zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2026-473=1

  * SUSE Linux Enterprise Server 12 SP5 LTSS  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-473=1

  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-473=1

## Package List:

  * SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
    * kernel-default-4.12.14-122.293.1
  * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
    * kernel-default-kgraft-devel-4.12.14-122.293.1
    * kernel-default-debugsource-4.12.14-122.293.1
    * kernel-default-debuginfo-4.12.14-122.293.1
    * kernel-default-kgraft-4.12.14-122.293.1
    * kgraft-patch-4_12_14-122_293-default-1-8.3.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
    * cluster-md-kmp-default-debuginfo-4.12.14-122.293.1
    * kernel-default-base-debuginfo-4.12.14-122.293.1
    * gfs2-kmp-default-4.12.14-122.293.1
    * dlm-kmp-default-debuginfo-4.12.14-122.293.1
    * dlm-kmp-default-4.12.14-122.293.1
    * cluster-md-kmp-default-4.12.14-122.293.1
    * kernel-default-debugsource-4.12.14-122.293.1
    * kernel-default-base-4.12.14-122.293.1
    * ocfs2-kmp-default-debuginfo-4.12.14-122.293.1
    * kernel-default-debuginfo-4.12.14-122.293.1
    * ocfs2-kmp-default-4.12.14-122.293.1
    * kernel-default-devel-4.12.14-122.293.1
    * kernel-syms-4.12.14-122.293.1
    * gfs2-kmp-default-debuginfo-4.12.14-122.293.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64
    nosrc)
    * kernel-default-4.12.14-122.293.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
    * kernel-source-4.12.14-122.293.1
    * kernel-devel-4.12.14-122.293.1
    * kernel-macros-4.12.14-122.293.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x)
    * kernel-default-man-4.12.14-122.293.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64)
    * kernel-default-devel-debuginfo-4.12.14-122.293.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
    * cluster-md-kmp-default-debuginfo-4.12.14-122.293.1
    * kernel-default-base-debuginfo-4.12.14-122.293.1
    * dlm-kmp-default-4.12.14-122.293.1
    * kernel-default-devel-debuginfo-4.12.14-122.293.1
    * dlm-kmp-default-debuginfo-4.12.14-122.293.1
    * cluster-md-kmp-default-4.12.14-122.293.1
    * kernel-default-debugsource-4.12.14-122.293.1
    * gfs2-kmp-default-4.12.14-122.293.1
    * kernel-default-base-4.12.14-122.293.1
    * kernel-default-debuginfo-4.12.14-122.293.1
    * ocfs2-kmp-default-debuginfo-4.12.14-122.293.1
    * ocfs2-kmp-default-4.12.14-122.293.1
    * kernel-default-devel-4.12.14-122.293.1
    * kernel-syms-4.12.14-122.293.1
    * gfs2-kmp-default-debuginfo-4.12.14-122.293.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
    * kernel-source-4.12.14-122.293.1
    * kernel-devel-4.12.14-122.293.1
    * kernel-macros-4.12.14-122.293.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64)
    * kernel-default-4.12.14-122.293.1

## References:

  * https://www.suse.com/security/cve/CVE-2022-48838.html
  * https://www.suse.com/security/cve/CVE-2022-49943.html
  * https://www.suse.com/security/cve/CVE-2022-49980.html
  * https://www.suse.com/security/cve/CVE-2022-50347.html
  * https://www.suse.com/security/cve/CVE-2022-50580.html
  * https://www.suse.com/security/cve/CVE-2022-50676.html
  * https://www.suse.com/security/cve/CVE-2022-50697.html
  * https://www.suse.com/security/cve/CVE-2022-50709.html
  * https://www.suse.com/security/cve/CVE-2022-50716.html
  * https://www.suse.com/security/cve/CVE-2022-50717.html
  * https://www.suse.com/security/cve/CVE-2022-50719.html
  * https://www.suse.com/security/cve/CVE-2022-50740.html
  * https://www.suse.com/security/cve/CVE-2022-50744.html
  * https://www.suse.com/security/cve/CVE-2022-50749.html
  * https://www.suse.com/security/cve/CVE-2022-50751.html
  * https://www.suse.com/security/cve/CVE-2022-50760.html
  * https://www.suse.com/security/cve/CVE-2022-50770.html
  * https://www.suse.com/security/cve/CVE-2022-50777.html
  * https://www.suse.com/security/cve/CVE-2022-50780.html
  * https://www.suse.com/security/cve/CVE-2022-50782.html
  * https://www.suse.com/security/cve/CVE-2022-50786.html
  * https://www.suse.com/security/cve/CVE-2022-50816.html
  * https://www.suse.com/security/cve/CVE-2022-50834.html
  * https://www.suse.com/security/cve/CVE-2022-50865.html
  * https://www.suse.com/security/cve/CVE-2022-50868.html
  * https://www.suse.com/security/cve/CVE-2022-50880.html
  * https://www.suse.com/security/cve/CVE-2022-50881.html
  * https://www.suse.com/security/cve/CVE-2022-50884.html
  * https://www.suse.com/security/cve/CVE-2022-50885.html
  * https://www.suse.com/security/cve/CVE-2022-50887.html
  * https://www.suse.com/security/cve/CVE-2023-50756.html
  * https://www.suse.com/security/cve/CVE-2023-52525.html
  * https://www.suse.com/security/cve/CVE-2023-52999.html
  * https://www.suse.com/security/cve/CVE-2023-53148.html
  * https://www.suse.com/security/cve/CVE-2023-53178.html
  * https://www.suse.com/security/cve/CVE-2023-53226.html
  * https://www.suse.com/security/cve/CVE-2023-53464.html
  * https://www.suse.com/security/cve/CVE-2023-53685.html
  * https://www.suse.com/security/cve/CVE-2023-53747.html
  * https://www.suse.com/security/cve/CVE-2023-53751.html
  * https://www.suse.com/security/cve/CVE-2023-53825.html
  * https://www.suse.com/security/cve/CVE-2023-53853.html
  * https://www.suse.com/security/cve/CVE-2023-53863.html
  * https://www.suse.com/security/cve/CVE-2023-53992.html
  * https://www.suse.com/security/cve/CVE-2023-54012.html
  * https://www.suse.com/security/cve/CVE-2023-54047.html
  * https://www.suse.com/security/cve/CVE-2023-54048.html
  * https://www.suse.com/security/cve/CVE-2023-54067.html
  * https://www.suse.com/security/cve/CVE-2023-54111.html
  * https://www.suse.com/security/cve/CVE-2023-54112.html
  * https://www.suse.com/security/cve/CVE-2023-54118.html
  * https://www.suse.com/security/cve/CVE-2023-54121.html
  * https://www.suse.com/security/cve/CVE-2023-54134.html
  * https://www.suse.com/security/cve/CVE-2023-54198.html
  * https://www.suse.com/security/cve/CVE-2023-54202.html
  * https://www.suse.com/security/cve/CVE-2023-54207.html
  * https://www.suse.com/security/cve/CVE-2023-54218.html
  * https://www.suse.com/security/cve/CVE-2023-54230.html
  * https://www.suse.com/security/cve/CVE-2023-54243.html
  * https://www.suse.com/security/cve/CVE-2023-54265.html
  * https://www.suse.com/security/cve/CVE-2023-54274.html
  * https://www.suse.com/security/cve/CVE-2023-54282.html
  * https://www.suse.com/security/cve/CVE-2023-54287.html
  * https://www.suse.com/security/cve/CVE-2023-54311.html
  * https://www.suse.com/security/cve/CVE-2023-54321.html
  * https://www.suse.com/security/cve/CVE-2024-26832.html
  * https://www.suse.com/security/cve/CVE-2024-26935.html
  * https://www.suse.com/security/cve/CVE-2024-36903.html
  * https://www.suse.com/security/cve/CVE-2024-41007.html
  * https://www.suse.com/security/cve/CVE-2024-50040.html
  * https://www.suse.com/security/cve/CVE-2024-56690.html
  * https://www.suse.com/security/cve/CVE-2024-58020.html
  * https://www.suse.com/security/cve/CVE-2025-21681.html
  * https://www.suse.com/security/cve/CVE-2025-37913.html
  * https://www.suse.com/security/cve/CVE-2025-38007.html
  * https://www.suse.com/security/cve/CVE-2025-38539.html
  * https://www.suse.com/security/cve/CVE-2025-38591.html
  * https://www.suse.com/security/cve/CVE-2025-38602.html
  * https://www.suse.com/security/cve/CVE-2025-38656.html
  * https://www.suse.com/security/cve/CVE-2025-39689.html
  * https://www.suse.com/security/cve/CVE-2025-39813.html
  * https://www.suse.com/security/cve/CVE-2025-39829.html
  * https://www.suse.com/security/cve/CVE-2025-39913.html
  * https://www.suse.com/security/cve/CVE-2025-40087.html
  * https://www.suse.com/security/cve/CVE-2025-40088.html
  * https://www.suse.com/security/cve/CVE-2025-40115.html
  * https://www.suse.com/security/cve/CVE-2025-40198.html
  * https://www.suse.com/security/cve/CVE-2025-40259.html
  * https://www.suse.com/security/cve/CVE-2025-40261.html
  * https://www.suse.com/security/cve/CVE-2025-40264.html
  * https://www.suse.com/security/cve/CVE-2025-40271.html
  * https://www.suse.com/security/cve/CVE-2025-40323.html
  * https://www.suse.com/security/cve/CVE-2025-40339.html
  * https://www.suse.com/security/cve/CVE-2025-40345.html
  * https://www.suse.com/security/cve/CVE-2025-40363.html
  * https://www.suse.com/security/cve/CVE-2025-68188.html
  * https://www.suse.com/security/cve/CVE-2025-68190.html
  * https://www.suse.com/security/cve/CVE-2025-68192.html
  * https://www.suse.com/security/cve/CVE-2025-68241.html
  * https://www.suse.com/security/cve/CVE-2025-68245.html
  * https://www.suse.com/security/cve/CVE-2025-68261.html
  * https://www.suse.com/security/cve/CVE-2025-68264.html
  * https://www.suse.com/security/cve/CVE-2025-68286.html
  * https://www.suse.com/security/cve/CVE-2025-68296.html
  * https://www.suse.com/security/cve/CVE-2025-68303.html
  * https://www.suse.com/security/cve/CVE-2025-68305.html
  * https://www.suse.com/security/cve/CVE-2025-68312.html
  * https://www.suse.com/security/cve/CVE-2025-68337.html
  * https://www.suse.com/security/cve/CVE-2025-68349.html
  * https://www.suse.com/security/cve/CVE-2025-68354.html
  * https://www.suse.com/security/cve/CVE-2025-68362.html
  * https://www.suse.com/security/cve/CVE-2025-68366.html
  * https://www.suse.com/security/cve/CVE-2025-68367.html
  * https://www.suse.com/security/cve/CVE-2025-68372.html
  * https://www.suse.com/security/cve/CVE-2025-68379.html
  * https://www.suse.com/security/cve/CVE-2025-68740.html
  * https://www.suse.com/security/cve/CVE-2025-68757.html
  * https://www.suse.com/security/cve/CVE-2025-68767.html
  * https://www.suse.com/security/cve/CVE-2025-68771.html
  * https://www.suse.com/security/cve/CVE-2025-68774.html
  * https://www.suse.com/security/cve/CVE-2025-68783.html
  * https://www.suse.com/security/cve/CVE-2025-68788.html
  * https://www.suse.com/security/cve/CVE-2025-68795.html
  * https://www.suse.com/security/cve/CVE-2025-68797.html
  * https://www.suse.com/security/cve/CVE-2025-68813.html
  * https://www.suse.com/security/cve/CVE-2025-68816.html
  * https://www.suse.com/security/cve/CVE-2025-71064.html
  * https://www.suse.com/security/cve/CVE-2025-71082.html
  * https://www.suse.com/security/cve/CVE-2025-71085.html
  * https://www.suse.com/security/cve/CVE-2025-71087.html
  * https://www.suse.com/security/cve/CVE-2025-71091.html
  * https://www.suse.com/security/cve/CVE-2025-71093.html
  * https://www.suse.com/security/cve/CVE-2025-71096.html
  * https://www.suse.com/security/cve/CVE-2025-71098.html
  * https://www.suse.com/security/cve/CVE-2025-71108.html
  * https://www.suse.com/security/cve/CVE-2025-71112.html
  * https://www.suse.com/security/cve/CVE-2025-71119.html
  * https://www.suse.com/security/cve/CVE-2025-71120.html
  * https://www.suse.com/security/cve/CVE-2025-71123.html
  * https://www.suse.com/security/cve/CVE-2026-22976.html
  * https://www.suse.com/security/cve/CVE-2026-22978.html
  * https://www.suse.com/security/cve/CVE-2026-22988.html
  * https://www.suse.com/security/cve/CVE-2026-22999.html
  * https://www.suse.com/security/cve/CVE-2026-23001.html
  * https://www.suse.com/security/cve/CVE-2026-23011.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1205462
  * https://bugzilla.suse.com/show_bug.cgi?id=1214285
  * https://bugzilla.suse.com/show_bug.cgi?id=1220840
  * https://bugzilla.suse.com/show_bug.cgi?id=1223007
  * https://bugzilla.suse.com/show_bug.cgi?id=1223675
  * https://bugzilla.suse.com/show_bug.cgi?id=1225527
  * https://bugzilla.suse.com/show_bug.cgi?id=1225741
  * https://bugzilla.suse.com/show_bug.cgi?id=1227863
  * https://bugzilla.suse.com/show_bug.cgi?id=1227988
  * https://bugzilla.suse.com/show_bug.cgi?id=1231908
  * https://bugzilla.suse.com/show_bug.cgi?id=1235428
  * https://bugzilla.suse.com/show_bug.cgi?id=1236702
  * https://bugzilla.suse.com/show_bug.cgi?id=1239346
  * https://bugzilla.suse.com/show_bug.cgi?id=1240299
  * https://bugzilla.suse.com/show_bug.cgi?id=1243471
  * https://bugzilla.suse.com/show_bug.cgi?id=1244904
  * https://bugzilla.suse.com/show_bug.cgi?id=1244938
  * https://bugzilla.suse.com/show_bug.cgi?id=1245110
  * https://bugzilla.suse.com/show_bug.cgi?id=1248211
  * https://bugzilla.suse.com/show_bug.cgi?id=1248341
  * https://bugzilla.suse.com/show_bug.cgi?id=1248363
  * https://bugzilla.suse.com/show_bug.cgi?id=1248643
  * https://bugzilla.suse.com/show_bug.cgi?id=1249307
  * https://bugzilla.suse.com/show_bug.cgi?id=1249658
  * https://bugzilla.suse.com/show_bug.cgi?id=1249827
  * https://bugzilla.suse.com/show_bug.cgi?id=1249842
  * https://bugzilla.suse.com/show_bug.cgi?id=1249854
  * https://bugzilla.suse.com/show_bug.cgi?id=1249928
  * https://bugzilla.suse.com/show_bug.cgi?id=1250032
  * https://bugzilla.suse.com/show_bug.cgi?id=1250082
  * https://bugzilla.suse.com/show_bug.cgi?id=1250705
  * https://bugzilla.suse.com/show_bug.cgi?id=1250759
  * https://bugzilla.suse.com/show_bug.cgi?id=1250868
  * https://bugzilla.suse.com/show_bug.cgi?id=1251770
  * https://bugzilla.suse.com/show_bug.cgi?id=1252542
  * https://bugzilla.suse.com/show_bug.cgi?id=1252909
  * https://bugzilla.suse.com/show_bug.cgi?id=1253318
  * https://bugzilla.suse.com/show_bug.cgi?id=1253453
  * https://bugzilla.suse.com/show_bug.cgi?id=1253739
  * https://bugzilla.suse.com/show_bug.cgi?id=1254244
  * https://bugzilla.suse.com/show_bug.cgi?id=1254572
  * https://bugzilla.suse.com/show_bug.cgi?id=1254657
  * https://bugzilla.suse.com/show_bug.cgi?id=1254673
  * https://bugzilla.suse.com/show_bug.cgi?id=1254689
  * https://bugzilla.suse.com/show_bug.cgi?id=1254707
  * https://bugzilla.suse.com/show_bug.cgi?id=1254835
  * https://bugzilla.suse.com/show_bug.cgi?id=1254839
  * https://bugzilla.suse.com/show_bug.cgi?id=1254845
  * https://bugzilla.suse.com/show_bug.cgi?id=1254986
  * https://bugzilla.suse.com/show_bug.cgi?id=1255094
  * https://bugzilla.suse.com/show_bug.cgi?id=1255102
  * https://bugzilla.suse.com/show_bug.cgi?id=1255122
  * https://bugzilla.suse.com/show_bug.cgi?id=1255128
  * https://bugzilla.suse.com/show_bug.cgi?id=1255131
  * https://bugzilla.suse.com/show_bug.cgi?id=1255157
  * https://bugzilla.suse.com/show_bug.cgi?id=1255164
  * https://bugzilla.suse.com/show_bug.cgi?id=1255169
  * https://bugzilla.suse.com/show_bug.cgi?id=1255171
  * https://bugzilla.suse.com/show_bug.cgi?id=1255246
  * https://bugzilla.suse.com/show_bug.cgi?id=1255268
  * https://bugzilla.suse.com/show_bug.cgi?id=1255269
  * https://bugzilla.suse.com/show_bug.cgi?id=1255279
  * https://bugzilla.suse.com/show_bug.cgi?id=1255297
  * https://bugzilla.suse.com/show_bug.cgi?id=1255351
  * https://bugzilla.suse.com/show_bug.cgi?id=1255380
  * https://bugzilla.suse.com/show_bug.cgi?id=1255428
  * https://bugzilla.suse.com/show_bug.cgi?id=1255482
  * https://bugzilla.suse.com/show_bug.cgi?id=1255537
  * https://bugzilla.suse.com/show_bug.cgi?id=1255544
  * https://bugzilla.suse.com/show_bug.cgi?id=1255547
  * https://bugzilla.suse.com/show_bug.cgi?id=1255553
  * https://bugzilla.suse.com/show_bug.cgi?id=1255565
  * https://bugzilla.suse.com/show_bug.cgi?id=1255571
  * https://bugzilla.suse.com/show_bug.cgi?id=1255594
  * https://bugzilla.suse.com/show_bug.cgi?id=1255611
  * https://bugzilla.suse.com/show_bug.cgi?id=1255622
  * https://bugzilla.suse.com/show_bug.cgi?id=1255695
  * https://bugzilla.suse.com/show_bug.cgi?id=1255762
  * https://bugzilla.suse.com/show_bug.cgi?id=1255773
  * https://bugzilla.suse.com/show_bug.cgi?id=1255804
  * https://bugzilla.suse.com/show_bug.cgi?id=1255810
  * https://bugzilla.suse.com/show_bug.cgi?id=1255812
  * https://bugzilla.suse.com/show_bug.cgi?id=1255839
  * https://bugzilla.suse.com/show_bug.cgi?id=1255844
  * https://bugzilla.suse.com/show_bug.cgi?id=1255874
  * https://bugzilla.suse.com/show_bug.cgi?id=1255880
  * https://bugzilla.suse.com/show_bug.cgi?id=1255905
  * https://bugzilla.suse.com/show_bug.cgi?id=1255908
  * https://bugzilla.suse.com/show_bug.cgi?id=1255925
  * https://bugzilla.suse.com/show_bug.cgi?id=1255939
  * https://bugzilla.suse.com/show_bug.cgi?id=1255943
  * https://bugzilla.suse.com/show_bug.cgi?id=1255961
  * https://bugzilla.suse.com/show_bug.cgi?id=1255970
  * https://bugzilla.suse.com/show_bug.cgi?id=1255983
  * https://bugzilla.suse.com/show_bug.cgi?id=1256038
  * https://bugzilla.suse.com/show_bug.cgi?id=1256058
  * https://bugzilla.suse.com/show_bug.cgi?id=1256106
  * https://bugzilla.suse.com/show_bug.cgi?id=1256122
  * https://bugzilla.suse.com/show_bug.cgi?id=1256125
  * https://bugzilla.suse.com/show_bug.cgi?id=1256127
  * https://bugzilla.suse.com/show_bug.cgi?id=1256130
  * https://bugzilla.suse.com/show_bug.cgi?id=1256131
  * https://bugzilla.suse.com/show_bug.cgi?id=1256132
  * https://bugzilla.suse.com/show_bug.cgi?id=1256149
  * https://bugzilla.suse.com/show_bug.cgi?id=1256155
  * https://bugzilla.suse.com/show_bug.cgi?id=1256165
  * https://bugzilla.suse.com/show_bug.cgi?id=1256168
  * https://bugzilla.suse.com/show_bug.cgi?id=1256184
  * https://bugzilla.suse.com/show_bug.cgi?id=1256191
  * https://bugzilla.suse.com/show_bug.cgi?id=1256216
  * https://bugzilla.suse.com/show_bug.cgi?id=1256219
  * https://bugzilla.suse.com/show_bug.cgi?id=1256221
  * https://bugzilla.suse.com/show_bug.cgi?id=1256229
  * https://bugzilla.suse.com/show_bug.cgi?id=1256258
  * https://bugzilla.suse.com/show_bug.cgi?id=1256267
  * https://bugzilla.suse.com/show_bug.cgi?id=1256282
  * https://bugzilla.suse.com/show_bug.cgi?id=1256305
  * https://bugzilla.suse.com/show_bug.cgi?id=1256320
  * https://bugzilla.suse.com/show_bug.cgi?id=1256354
  * https://bugzilla.suse.com/show_bug.cgi?id=1256369
  * https://bugzilla.suse.com/show_bug.cgi?id=1256386
  * https://bugzilla.suse.com/show_bug.cgi?id=1256395
  * https://bugzilla.suse.com/show_bug.cgi?id=1256398
  * https://bugzilla.suse.com/show_bug.cgi?id=1256580
  * https://bugzilla.suse.com/show_bug.cgi?id=1256582
  * https://bugzilla.suse.com/show_bug.cgi?id=1256585
  * https://bugzilla.suse.com/show_bug.cgi?id=1256591
  * https://bugzilla.suse.com/show_bug.cgi?id=1256606
  * https://bugzilla.suse.com/show_bug.cgi?id=1256611
  * https://bugzilla.suse.com/show_bug.cgi?id=1256623
  * https://bugzilla.suse.com/show_bug.cgi?id=1256628
  * https://bugzilla.suse.com/show_bug.cgi?id=1256638
  * https://bugzilla.suse.com/show_bug.cgi?id=1256641
  * https://bugzilla.suse.com/show_bug.cgi?id=1256650
  * https://bugzilla.suse.com/show_bug.cgi?id=1256654
  * https://bugzilla.suse.com/show_bug.cgi?id=1256660
  * https://bugzilla.suse.com/show_bug.cgi?id=1256674
  * https://bugzilla.suse.com/show_bug.cgi?id=1256688
  * https://bugzilla.suse.com/show_bug.cgi?id=1256726
  * https://bugzilla.suse.com/show_bug.cgi?id=1256730
  * https://bugzilla.suse.com/show_bug.cgi?id=1256757
  * https://bugzilla.suse.com/show_bug.cgi?id=1256773
  * https://bugzilla.suse.com/show_bug.cgi?id=1256774
  * https://bugzilla.suse.com/show_bug.cgi?id=1256777
  * https://bugzilla.suse.com/show_bug.cgi?id=1256779
  * https://bugzilla.suse.com/show_bug.cgi?id=1256792
  * https://bugzilla.suse.com/show_bug.cgi?id=1257035
  * https://bugzilla.suse.com/show_bug.cgi?id=1257207
  * https://bugzilla.suse.com/show_bug.cgi?id=1257227
  * https://bugzilla.suse.com/show_bug.cgi?id=1257229
  * https://bugzilla.suse.com/show_bug.cgi?id=1257232
  * https://bugzilla.suse.com/show_bug.cgi?id=1257236
  * https://bugzilla.suse.com/show_bug.cgi?id=1257282

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20260212/860ee334/attachment.htm>


More information about the sle-security-updates mailing list