SUSE-SU-2025:21080-1: important: Security update for the Linux Kernel
SLE-SECURITY-UPDATES
null at suse.de
Fri Nov 28 13:51:32 UTC 2025
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2025:21080-1
Release Date: 2025-11-26T15:35:13Z
Rating: important
References:
* bsc#1218644
* bsc#1238472
* bsc#1239206
* bsc#1241166
* bsc#1241637
* bsc#1247222
* bsc#1248630
* bsc#1249161
* bsc#1249226
* bsc#1249302
* bsc#1249317
* bsc#1249397
* bsc#1249398
* bsc#1249495
* bsc#1249512
* bsc#1249608
* bsc#1249735
* bsc#1250202
* bsc#1250379
* bsc#1250400
* bsc#1250455
* bsc#1250491
* bsc#1250704
* bsc#1250721
* bsc#1250749
* bsc#1250946
* bsc#1251176
* bsc#1251177
* bsc#1251232
* bsc#1251233
* bsc#1251804
* bsc#1251809
* bsc#1251819
* bsc#1251930
* bsc#1251967
* bsc#1252033
* bsc#1252035
* bsc#1252039
* bsc#1252044
* bsc#1252047
* bsc#1252051
* bsc#1252052
* bsc#1252056
* bsc#1252060
* bsc#1252062
* bsc#1252064
* bsc#1252065
* bsc#1252067
* bsc#1252069
* bsc#1252070
* bsc#1252072
* bsc#1252074
* bsc#1252075
* bsc#1252076
* bsc#1252078
* bsc#1252079
* bsc#1252081
* bsc#1252082
* bsc#1252083
* bsc#1252253
* bsc#1252265
* bsc#1252267
* bsc#1252270
* bsc#1252330
* bsc#1252333
* bsc#1252336
* bsc#1252346
* bsc#1252348
* bsc#1252349
* bsc#1252678
* bsc#1252679
* bsc#1252688
* bsc#1252725
* bsc#1252734
* bsc#1252772
* bsc#1252774
* bsc#1252780
* bsc#1252785
* bsc#1252787
* bsc#1252789
* bsc#1252797
* bsc#1252819
* bsc#1252822
* bsc#1252826
* bsc#1252841
* bsc#1252848
* bsc#1252849
* bsc#1252850
* bsc#1252851
* bsc#1252854
* bsc#1252858
* bsc#1252862
* bsc#1252865
* bsc#1252866
* bsc#1252873
* bsc#1252902
* bsc#1252909
* bsc#1252915
* bsc#1252918
* bsc#1252921
* bsc#1252939
* jsc#PED-348
* jsc#PED-4593
* jsc#PED-9891
Cross-References:
* CVE-2025-21816
* CVE-2025-38653
* CVE-2025-38718
* CVE-2025-39676
* CVE-2025-39702
* CVE-2025-39756
* CVE-2025-39779
* CVE-2025-39797
* CVE-2025-39812
* CVE-2025-39866
* CVE-2025-39876
* CVE-2025-39881
* CVE-2025-39895
* CVE-2025-39903
* CVE-2025-39911
* CVE-2025-39947
* CVE-2025-39948
* CVE-2025-39949
* CVE-2025-39950
* CVE-2025-39955
* CVE-2025-39956
* CVE-2025-39963
* CVE-2025-39965
* CVE-2025-39967
* CVE-2025-39968
* CVE-2025-39969
* CVE-2025-39970
* CVE-2025-39971
* CVE-2025-39972
* CVE-2025-39973
* CVE-2025-39978
* CVE-2025-39979
* CVE-2025-39981
* CVE-2025-39982
* CVE-2025-39984
* CVE-2025-39985
* CVE-2025-39986
* CVE-2025-39987
* CVE-2025-39988
* CVE-2025-39991
* CVE-2025-39992
* CVE-2025-39993
* CVE-2025-39994
* CVE-2025-39995
* CVE-2025-39996
* CVE-2025-39997
* CVE-2025-40000
* CVE-2025-40005
* CVE-2025-40009
* CVE-2025-40011
* CVE-2025-40012
* CVE-2025-40013
* CVE-2025-40016
* CVE-2025-40018
* CVE-2025-40019
* CVE-2025-40020
* CVE-2025-40029
* CVE-2025-40032
* CVE-2025-40035
* CVE-2025-40036
* CVE-2025-40037
* CVE-2025-40040
* CVE-2025-40043
* CVE-2025-40044
* CVE-2025-40048
* CVE-2025-40049
* CVE-2025-40051
* CVE-2025-40052
* CVE-2025-40056
* CVE-2025-40058
* CVE-2025-40060
* CVE-2025-40061
* CVE-2025-40062
* CVE-2025-40071
* CVE-2025-40078
* CVE-2025-40080
* CVE-2025-40085
* CVE-2025-40087
* CVE-2025-40091
* CVE-2025-40096
* CVE-2025-40100
* CVE-2025-40104
* CVE-2025-40364
CVSS scores:
* CVE-2025-21816 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21816 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38653 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38653 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39676 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39756 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39779 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39779 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39797 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39797 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39797 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39812 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-39812 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-39866 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39866 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39895 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39895 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39903 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39903 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39911 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39947 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39947 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39948 ( SUSE ): 5.3
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-39948 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-39949 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39949 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-39950 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39950 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39955 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39955 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-39956 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39956 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-39963 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39963 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39965 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39965 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-39967 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39967 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-39968 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-39968 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-39969 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-39969 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-39970 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39970 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-39971 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39971 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-39972 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39972 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-39973 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39973 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39978 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39978 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39979 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39979 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39981 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39981 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40005 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40005 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40009 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40009 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40011 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40012 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40012 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40013 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40013 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40016 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40016 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40018 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40018 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40019 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40019 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40020 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40020 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40029 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40032 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40032 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40037 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40040 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40043 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40043 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-40044 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40044 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-40048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40049 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40049 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-40051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40056 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40056 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40071 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40080 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40085 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40085 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40091 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40091 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-40096 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40096 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40100 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40104 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40104 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-40364 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40364 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40364 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* SUSE Linux Micro 6.2
An update that solves 83 vulnerabilities, contains three features and has 18
fixes can now be installed.
## Description:
The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues
The following security issues were fixed:
* CVE-2025-21816: hrtimers: Force migrate away hrtimers queued after
(bsc#1238472).
* CVE-2025-38653: proc: use the same treatment to check proc_lseek as ones for
proc_read_iter et.al (bsc#1248630).
* CVE-2025-38718: sctp: linearize cloned gso packets in sctp_rcv
(bsc#1249161).
* CVE-2025-39676: scsi: qla4xxx: Prevent a potential error pointer dereference
(bsc#1249302).
* CVE-2025-39702: ipv6: sr: Fix MAC comparison to be constant-time
(bsc#1249317).
* CVE-2025-39756: fs: Prevent file descriptor table allocations exceeding
INT_MAX (bsc#1249512).
* CVE-2025-39779: btrfs: subpage: keep TOWRITE tag until folio is cleaned
(bsc#1249495).
* CVE-2025-39812: sctp: initialize more fields in sctp_v6_from_sk()
(bsc#1250202).
* CVE-2025-39866: fs: writeback: fix use-after-free in __mark_inode_dirty()
(bsc#1250455).
* CVE-2025-39876: net: fec: Fix possible NPD in
fec_enet_phy_reset_after_clk_enable() (bsc#1250400).
* CVE-2025-39881: kernfs: Fix UAF in polling when open file is released
(bsc#1250379).
* CVE-2025-39895: sched: Fix sched_numa_find_nth_cpu() if mask offline
(bsc#1250721).
* CVE-2025-39903: of_numa: fix uninitialized memory nodes causing kernel panic
(bsc#1250749).
* CVE-2025-39911: i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error
path (bsc#1250704).
* CVE-2025-39947: net/mlx5e: Harden uplink netdev access against device unbind
(bsc#1251232).
* CVE-2025-39948: ice: fix Rx page leak on multi-buffer frames (bsc#1251233).
* CVE-2025-39949: qed: Don't collect too many protection override GRC elements
(bsc#1251177).
* CVE-2025-39950: net/tcp: Fix a NULL pointer dereference when using TCP-AO
with TCP_REPAIR (bsc#1251176).
* CVE-2025-39955: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect()
(bsc#1251804).
* CVE-2025-39956: igc: don't fail igc_probe() on LED setup error
(bsc#1251809).
* CVE-2025-39963: io_uring: fix incorrect io_kiocb reference in io_link_skb
(bsc#1251819).
* CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047).
* CVE-2025-39969: i40e: fix validation of VF state in get resources
(bsc#1252044).
* CVE-2025-39970: i40e: fix input validation logic for action_meta
(bsc#1252051).
* CVE-2025-39971: i40e: fix idx validation in config queues msg (bsc#1252052).
* CVE-2025-39972: i40e: fix idx validation in i40e_validate_queue_map
(bsc#1252039).
* CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).
* CVE-2025-39978: octeontx2-pf: Fix potential use after free in
otx2_tc_add_flow() (bsc#1252069).
* CVE-2025-39979: net/mlx5: fs, add API for sharing HWS action by refcount
(bsc#1252067).
* CVE-2025-39984: net: tun: Update napi->skb after XDP process (bsc#1252081).
* CVE-2025-39992: mm: swap: check for stable address space before operating on
the VMA (bsc#1252076).
* CVE-2025-40000: wifi: rtw89: fix use-after-free in
rtw89_core_tx_kick_off_and_wait() (bsc#1252062).
* CVE-2025-40005: spi: cadence-quadspi: Implement refcount to handle unbind
during busy (bsc#1252349).
* CVE-2025-40012: net/smc: fix warning in smc_rx_splice() when calling
get_page() (bsc#1252330).
* CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup
(bsc#1252688).
* CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise
(bsc#1252780).
* CVE-2025-40051: vhost: vringh: Modify the return value check (bsc#1252858).
* CVE-2025-40056: vhost: vringh: Fix copy_to_iter return value check
(bsc#1252826).
* CVE-2025-40060: coresight: trbe: Return NULL pointer for allocation failures
(bsc#1252848).
* CVE-2025-40078: bpf: Explicitly check accesses to bpf_sock_addr
(bsc#1252789).
* CVE-2025-40080: nbd: restrict sockets to TCP and UDP (bsc#1252774).
* CVE-2025-40100: btrfs: do not assert we found block group item when creating
free space tree (bsc#1252918).
The following non security issues were fixed:
* add bug reference to existing hv_netvsc change (bsc#1252265)
* amd-pstate-ut: Reset amd-pstate driver mode after running selftests
(bsc#1249226).
* cgroup/cpuset: Remove remote_partition_check() & make update_cpumasks_hier()
handle remote partition (bsc#1241166).
* cpuset: Use new excpus for nocpu error check when enabling root partition
(bsc#1241166).
* cpuset: fix failure to enable isolated partition when containing isolcpus
(bsc#1241166).
* doc/README.SUSE: Correct the character used for TAINT_NO_SUPPORT The
character was previously 'N', but upstream used it for TAINT_TEST, which
prompted the change of TAINT_NO_SUPPORT to 'n'.
* dpll: zl3073x: Add firmware loading functionality (bsc#1252253).
* dpll: zl3073x: Add functions to access hardware registers (bsc#1252253).
* dpll: zl3073x: Add low-level flash functions (bsc#1252253).
* dpll: zl3073x: Add support to get fractional frequency offset (bsc#1252253).
* dpll: zl3073x: Add support to get phase offset on connected input pin
(bsc#1252253).
* dpll: zl3073x: Add support to get/set esync on pins (bsc#1252253).
* dpll: zl3073x: Fix double free in zl3073x_devlink_flash_update()
(bsc#1252253).
* dpll: zl3073x: Handle missing or corrupted flash configuration
(bsc#1252253).
* dpll: zl3073x: Implement devlink flash callback (bsc#1252253).
* dpll: zl3073x: Increase maximum size of flash utility (bsc#1252253).
* dpll: zl3073x: Refactor DPLL initialization (bsc#1252253).
* drm/amd/pm: fix smu table id bound check issue in smu_cmn_update_table()
(git-fixes).
* drm/xe/guc: Prepare GuC register list and update ADS size for error capture
(stable-fixes).
* ixgbe: handle IXGBE_VF_FEATURES_NEGOTIATE mbox cmd (bsc#1247222).
* ixgbe: handle IXGBE_VF_GET_PF_LINK_STATE mailbox operation (bsc#1247222).
* ixgbevf: fix getting link speed data for E610 devices (bsc#1247222).
* ixgbevf: fix mailbox API compatibility by negotiating supported features
(bsc#1247222).
* kbuild/modfinal: Link livepatches with module-common.o (bsc#1218644,
bsc#1252270).
* kdb: Replace deprecated strcpy() with memmove() in vkdb_printf()
(bsc#1252939).
* kernel-subpackage-spec: Do not doubly-sign modules (bsc#1251930).
* nvme-auth: update sc_c in host response (git-fixes bsc#1249397).
* perf hwmon_pmu: Fix uninitialized variable warning (perf-
sle16-v6.13-userspace-update, git-fixes).
* phy: cadence: cdns-dphy: Update calibration wait time for startup state
machine (git-fixes).
* powerpc/fadump: skip parameter area allocation when fadump is disabled
(jsc#PED-9891 git-fixes).
* proc: fix missing pde_set_flags() for net proc files (bsc#1248630)
* proc: fix type confusion in pde_set_flags() (bsc#1248630)
* rpm/check-for-config-changes: ignore CONFIG_SCHED_PROXY_EXEC, too
(bsc#1250946)
* scsi: storvsc: Prefer returning channel with the same CPU as on the I/O
issuing CPU (bsc#1252267).
* x86/microcode/AMD: Limit Entrysign signature checking to known generations
(bsc#1252725).
* x86/resctrl: Fix miscount of bandwidth event when reactivating previously
unavailable RMID (bsc#1252734).
* x86/resctrl: Refactor resctrl_arch_rmid_read() (bsc#1252734).
* x86/virt/tdx: Mark memory cache state incoherent when making SEAMCALL
(jsc#PED-348).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Micro 6.2
zypper in -t patch SUSE-SL-Micro-6.2-58=1
## Package List:
* SUSE Linux Micro 6.2 (noarch)
* kernel-source-6.12.0-160000.7.1
* kernel-macros-6.12.0-160000.7.1
* kernel-devel-6.12.0-160000.7.1
* SUSE Linux Micro 6.2 (aarch64 ppc64le x86_64)
* kernel-default-base-6.12.0-160000.6.1.160000.2.4
* SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-6.12.0-160000.7.1
* SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64)
* kernel-default-debugsource-6.12.0-160000.7.1
* kernel-default-devel-6.12.0-160000.7.1
* kernel-default-extra-debuginfo-6.12.0-160000.7.1
* kernel-default-debuginfo-6.12.0-160000.7.1
* kernel-default-extra-6.12.0-160000.7.1
* SUSE Linux Micro 6.2 (x86_64)
* kernel-default-devel-debuginfo-6.12.0-160000.7.1
* kernel-rt-livepatch-6.12.0-160000.7.1
* kernel-rt-devel-debuginfo-6.12.0-160000.7.1
* SUSE Linux Micro 6.2 (ppc64le s390x x86_64)
* kernel-default-livepatch-6.12.0-160000.7.1
* SUSE Linux Micro 6.2 (aarch64 nosrc x86_64)
* kernel-rt-6.12.0-160000.7.1
* SUSE Linux Micro 6.2 (aarch64 x86_64)
* kernel-rt-debugsource-6.12.0-160000.7.1
* kernel-rt-devel-6.12.0-160000.7.1
* kernel-rt-debuginfo-6.12.0-160000.7.1
* SUSE Linux Micro 6.2 (aarch64 nosrc)
* kernel-64kb-6.12.0-160000.7.1
* SUSE Linux Micro 6.2 (aarch64)
* kernel-64kb-debuginfo-6.12.0-160000.7.1
* kernel-64kb-devel-6.12.0-160000.7.1
* kernel-64kb-debugsource-6.12.0-160000.7.1
## References:
* https://www.suse.com/security/cve/CVE-2025-21816.html
* https://www.suse.com/security/cve/CVE-2025-38653.html
* https://www.suse.com/security/cve/CVE-2025-38718.html
* https://www.suse.com/security/cve/CVE-2025-39676.html
* https://www.suse.com/security/cve/CVE-2025-39702.html
* https://www.suse.com/security/cve/CVE-2025-39756.html
* https://www.suse.com/security/cve/CVE-2025-39779.html
* https://www.suse.com/security/cve/CVE-2025-39797.html
* https://www.suse.com/security/cve/CVE-2025-39812.html
* https://www.suse.com/security/cve/CVE-2025-39866.html
* https://www.suse.com/security/cve/CVE-2025-39876.html
* https://www.suse.com/security/cve/CVE-2025-39881.html
* https://www.suse.com/security/cve/CVE-2025-39895.html
* https://www.suse.com/security/cve/CVE-2025-39903.html
* https://www.suse.com/security/cve/CVE-2025-39911.html
* https://www.suse.com/security/cve/CVE-2025-39947.html
* https://www.suse.com/security/cve/CVE-2025-39948.html
* https://www.suse.com/security/cve/CVE-2025-39949.html
* https://www.suse.com/security/cve/CVE-2025-39950.html
* https://www.suse.com/security/cve/CVE-2025-39955.html
* https://www.suse.com/security/cve/CVE-2025-39956.html
* https://www.suse.com/security/cve/CVE-2025-39963.html
* https://www.suse.com/security/cve/CVE-2025-39965.html
* https://www.suse.com/security/cve/CVE-2025-39967.html
* https://www.suse.com/security/cve/CVE-2025-39968.html
* https://www.suse.com/security/cve/CVE-2025-39969.html
* https://www.suse.com/security/cve/CVE-2025-39970.html
* https://www.suse.com/security/cve/CVE-2025-39971.html
* https://www.suse.com/security/cve/CVE-2025-39972.html
* https://www.suse.com/security/cve/CVE-2025-39973.html
* https://www.suse.com/security/cve/CVE-2025-39978.html
* https://www.suse.com/security/cve/CVE-2025-39979.html
* https://www.suse.com/security/cve/CVE-2025-39981.html
* https://www.suse.com/security/cve/CVE-2025-39982.html
* https://www.suse.com/security/cve/CVE-2025-39984.html
* https://www.suse.com/security/cve/CVE-2025-39985.html
* https://www.suse.com/security/cve/CVE-2025-39986.html
* https://www.suse.com/security/cve/CVE-2025-39987.html
* https://www.suse.com/security/cve/CVE-2025-39988.html
* https://www.suse.com/security/cve/CVE-2025-39991.html
* https://www.suse.com/security/cve/CVE-2025-39992.html
* https://www.suse.com/security/cve/CVE-2025-39993.html
* https://www.suse.com/security/cve/CVE-2025-39994.html
* https://www.suse.com/security/cve/CVE-2025-39995.html
* https://www.suse.com/security/cve/CVE-2025-39996.html
* https://www.suse.com/security/cve/CVE-2025-39997.html
* https://www.suse.com/security/cve/CVE-2025-40000.html
* https://www.suse.com/security/cve/CVE-2025-40005.html
* https://www.suse.com/security/cve/CVE-2025-40009.html
* https://www.suse.com/security/cve/CVE-2025-40011.html
* https://www.suse.com/security/cve/CVE-2025-40012.html
* https://www.suse.com/security/cve/CVE-2025-40013.html
* https://www.suse.com/security/cve/CVE-2025-40016.html
* https://www.suse.com/security/cve/CVE-2025-40018.html
* https://www.suse.com/security/cve/CVE-2025-40019.html
* https://www.suse.com/security/cve/CVE-2025-40020.html
* https://www.suse.com/security/cve/CVE-2025-40029.html
* https://www.suse.com/security/cve/CVE-2025-40032.html
* https://www.suse.com/security/cve/CVE-2025-40035.html
* https://www.suse.com/security/cve/CVE-2025-40036.html
* https://www.suse.com/security/cve/CVE-2025-40037.html
* https://www.suse.com/security/cve/CVE-2025-40040.html
* https://www.suse.com/security/cve/CVE-2025-40043.html
* https://www.suse.com/security/cve/CVE-2025-40044.html
* https://www.suse.com/security/cve/CVE-2025-40048.html
* https://www.suse.com/security/cve/CVE-2025-40049.html
* https://www.suse.com/security/cve/CVE-2025-40051.html
* https://www.suse.com/security/cve/CVE-2025-40052.html
* https://www.suse.com/security/cve/CVE-2025-40056.html
* https://www.suse.com/security/cve/CVE-2025-40058.html
* https://www.suse.com/security/cve/CVE-2025-40060.html
* https://www.suse.com/security/cve/CVE-2025-40061.html
* https://www.suse.com/security/cve/CVE-2025-40062.html
* https://www.suse.com/security/cve/CVE-2025-40071.html
* https://www.suse.com/security/cve/CVE-2025-40078.html
* https://www.suse.com/security/cve/CVE-2025-40080.html
* https://www.suse.com/security/cve/CVE-2025-40085.html
* https://www.suse.com/security/cve/CVE-2025-40087.html
* https://www.suse.com/security/cve/CVE-2025-40091.html
* https://www.suse.com/security/cve/CVE-2025-40096.html
* https://www.suse.com/security/cve/CVE-2025-40100.html
* https://www.suse.com/security/cve/CVE-2025-40104.html
* https://www.suse.com/security/cve/CVE-2025-40364.html
* https://bugzilla.suse.com/show_bug.cgi?id=1218644
* https://bugzilla.suse.com/show_bug.cgi?id=1238472
* https://bugzilla.suse.com/show_bug.cgi?id=1239206
* https://bugzilla.suse.com/show_bug.cgi?id=1241166
* https://bugzilla.suse.com/show_bug.cgi?id=1241637
* https://bugzilla.suse.com/show_bug.cgi?id=1247222
* https://bugzilla.suse.com/show_bug.cgi?id=1248630
* https://bugzilla.suse.com/show_bug.cgi?id=1249161
* https://bugzilla.suse.com/show_bug.cgi?id=1249226
* https://bugzilla.suse.com/show_bug.cgi?id=1249302
* https://bugzilla.suse.com/show_bug.cgi?id=1249317
* https://bugzilla.suse.com/show_bug.cgi?id=1249397
* https://bugzilla.suse.com/show_bug.cgi?id=1249398
* https://bugzilla.suse.com/show_bug.cgi?id=1249495
* https://bugzilla.suse.com/show_bug.cgi?id=1249512
* https://bugzilla.suse.com/show_bug.cgi?id=1249608
* https://bugzilla.suse.com/show_bug.cgi?id=1249735
* https://bugzilla.suse.com/show_bug.cgi?id=1250202
* https://bugzilla.suse.com/show_bug.cgi?id=1250379
* https://bugzilla.suse.com/show_bug.cgi?id=1250400
* https://bugzilla.suse.com/show_bug.cgi?id=1250455
* https://bugzilla.suse.com/show_bug.cgi?id=1250491
* https://bugzilla.suse.com/show_bug.cgi?id=1250704
* https://bugzilla.suse.com/show_bug.cgi?id=1250721
* https://bugzilla.suse.com/show_bug.cgi?id=1250749
* https://bugzilla.suse.com/show_bug.cgi?id=1250946
* https://bugzilla.suse.com/show_bug.cgi?id=1251176
* https://bugzilla.suse.com/show_bug.cgi?id=1251177
* https://bugzilla.suse.com/show_bug.cgi?id=1251232
* https://bugzilla.suse.com/show_bug.cgi?id=1251233
* https://bugzilla.suse.com/show_bug.cgi?id=1251804
* https://bugzilla.suse.com/show_bug.cgi?id=1251809
* https://bugzilla.suse.com/show_bug.cgi?id=1251819
* https://bugzilla.suse.com/show_bug.cgi?id=1251930
* https://bugzilla.suse.com/show_bug.cgi?id=1251967
* https://bugzilla.suse.com/show_bug.cgi?id=1252033
* https://bugzilla.suse.com/show_bug.cgi?id=1252035
* https://bugzilla.suse.com/show_bug.cgi?id=1252039
* https://bugzilla.suse.com/show_bug.cgi?id=1252044
* https://bugzilla.suse.com/show_bug.cgi?id=1252047
* https://bugzilla.suse.com/show_bug.cgi?id=1252051
* https://bugzilla.suse.com/show_bug.cgi?id=1252052
* https://bugzilla.suse.com/show_bug.cgi?id=1252056
* https://bugzilla.suse.com/show_bug.cgi?id=1252060
* https://bugzilla.suse.com/show_bug.cgi?id=1252062
* https://bugzilla.suse.com/show_bug.cgi?id=1252064
* https://bugzilla.suse.com/show_bug.cgi?id=1252065
* https://bugzilla.suse.com/show_bug.cgi?id=1252067
* https://bugzilla.suse.com/show_bug.cgi?id=1252069
* https://bugzilla.suse.com/show_bug.cgi?id=1252070
* https://bugzilla.suse.com/show_bug.cgi?id=1252072
* https://bugzilla.suse.com/show_bug.cgi?id=1252074
* https://bugzilla.suse.com/show_bug.cgi?id=1252075
* https://bugzilla.suse.com/show_bug.cgi?id=1252076
* https://bugzilla.suse.com/show_bug.cgi?id=1252078
* https://bugzilla.suse.com/show_bug.cgi?id=1252079
* https://bugzilla.suse.com/show_bug.cgi?id=1252081
* https://bugzilla.suse.com/show_bug.cgi?id=1252082
* https://bugzilla.suse.com/show_bug.cgi?id=1252083
* https://bugzilla.suse.com/show_bug.cgi?id=1252253
* https://bugzilla.suse.com/show_bug.cgi?id=1252265
* https://bugzilla.suse.com/show_bug.cgi?id=1252267
* https://bugzilla.suse.com/show_bug.cgi?id=1252270
* https://bugzilla.suse.com/show_bug.cgi?id=1252330
* https://bugzilla.suse.com/show_bug.cgi?id=1252333
* https://bugzilla.suse.com/show_bug.cgi?id=1252336
* https://bugzilla.suse.com/show_bug.cgi?id=1252346
* https://bugzilla.suse.com/show_bug.cgi?id=1252348
* https://bugzilla.suse.com/show_bug.cgi?id=1252349
* https://bugzilla.suse.com/show_bug.cgi?id=1252678
* https://bugzilla.suse.com/show_bug.cgi?id=1252679
* https://bugzilla.suse.com/show_bug.cgi?id=1252688
* https://bugzilla.suse.com/show_bug.cgi?id=1252725
* https://bugzilla.suse.com/show_bug.cgi?id=1252734
* https://bugzilla.suse.com/show_bug.cgi?id=1252772
* https://bugzilla.suse.com/show_bug.cgi?id=1252774
* https://bugzilla.suse.com/show_bug.cgi?id=1252780
* https://bugzilla.suse.com/show_bug.cgi?id=1252785
* https://bugzilla.suse.com/show_bug.cgi?id=1252787
* https://bugzilla.suse.com/show_bug.cgi?id=1252789
* https://bugzilla.suse.com/show_bug.cgi?id=1252797
* https://bugzilla.suse.com/show_bug.cgi?id=1252819
* https://bugzilla.suse.com/show_bug.cgi?id=1252822
* https://bugzilla.suse.com/show_bug.cgi?id=1252826
* https://bugzilla.suse.com/show_bug.cgi?id=1252841
* https://bugzilla.suse.com/show_bug.cgi?id=1252848
* https://bugzilla.suse.com/show_bug.cgi?id=1252849
* https://bugzilla.suse.com/show_bug.cgi?id=1252850
* https://bugzilla.suse.com/show_bug.cgi?id=1252851
* https://bugzilla.suse.com/show_bug.cgi?id=1252854
* https://bugzilla.suse.com/show_bug.cgi?id=1252858
* https://bugzilla.suse.com/show_bug.cgi?id=1252862
* https://bugzilla.suse.com/show_bug.cgi?id=1252865
* https://bugzilla.suse.com/show_bug.cgi?id=1252866
* https://bugzilla.suse.com/show_bug.cgi?id=1252873
* https://bugzilla.suse.com/show_bug.cgi?id=1252902
* https://bugzilla.suse.com/show_bug.cgi?id=1252909
* https://bugzilla.suse.com/show_bug.cgi?id=1252915
* https://bugzilla.suse.com/show_bug.cgi?id=1252918
* https://bugzilla.suse.com/show_bug.cgi?id=1252921
* https://bugzilla.suse.com/show_bug.cgi?id=1252939
* https://jira.suse.com/browse/PED-348
* https://jira.suse.com/browse/PED-4593
* https://jira.suse.com/browse/PED-9891
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20251128/0e125175/attachment.htm>
More information about the sle-security-updates
mailing list