SUSE-SU-2026:20021-1: important: Security update for the Linux Kernel
SLE-SECURITY-UPDATES
null at suse.de
Fri Jan 9 20:31:32 UTC 2026
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2026:20021-1
Release Date: 2025-12-19T16:19:41Z
Rating: important
References:
* bsc#1235463
* bsc#1243474
* bsc#1245193
* bsc#1245431
* bsc#1245498
* bsc#1245499
* bsc#1246328
* bsc#1246843
* bsc#1247500
* bsc#1248792
* bsc#1249256
* bsc#1249397
* bsc#1249912
* bsc#1249977
* bsc#1249982
* bsc#1250034
* bsc#1250176
* bsc#1250237
* bsc#1250252
* bsc#1250705
* bsc#1250723
* bsc#1250746
* bsc#1251120
* bsc#1251817
* bsc#1252054
* bsc#1252063
* bsc#1252301
* bsc#1252303
* bsc#1252342
* bsc#1252352
* bsc#1252357
* bsc#1252681
* bsc#1252686
* bsc#1252763
* bsc#1252776
* bsc#1252779
* bsc#1252790
* bsc#1252794
* bsc#1252795
* bsc#1252808
* bsc#1252809
* bsc#1252817
* bsc#1252821
* bsc#1252824
* bsc#1252836
* bsc#1252845
* bsc#1252901
* bsc#1252912
* bsc#1252917
* bsc#1252919
* bsc#1252923
* bsc#1252928
* bsc#1253018
* bsc#1253155
* bsc#1253176
* bsc#1253238
* bsc#1253275
* bsc#1253318
* bsc#1253324
* bsc#1253328
* bsc#1253330
* bsc#1253342
* bsc#1253348
* bsc#1253349
* bsc#1253352
* bsc#1253355
* bsc#1253360
* bsc#1253362
* bsc#1253363
* bsc#1253367
* bsc#1253369
* bsc#1253386
* bsc#1253394
* bsc#1253395
* bsc#1253402
* bsc#1253403
* bsc#1253405
* bsc#1253407
* bsc#1253408
* bsc#1253409
* bsc#1253410
* bsc#1253412
* bsc#1253416
* bsc#1253421
* bsc#1253422
* bsc#1253423
* bsc#1253424
* bsc#1253425
* bsc#1253426
* bsc#1253427
* bsc#1253428
* bsc#1253431
* bsc#1253433
* bsc#1253436
* bsc#1253438
* bsc#1253440
* bsc#1253441
* bsc#1253443
* bsc#1253445
* bsc#1253448
* bsc#1253449
* bsc#1253450
* bsc#1253451
* bsc#1253453
* bsc#1253455
* bsc#1253456
* bsc#1253457
* bsc#1253463
* bsc#1253472
* bsc#1253622
* bsc#1253624
* bsc#1253635
* bsc#1253643
* bsc#1253647
* bsc#1254119
* bsc#1254181
* bsc#1254221
* bsc#1254308
* bsc#1254315
* jsc#PED-13611
* jsc#PED-13949
* jsc#PED-14062
* jsc#PED-14115
* jsc#PED-14353
Cross-References:
* CVE-2022-50253
* CVE-2025-37916
* CVE-2025-38084
* CVE-2025-38085
* CVE-2025-38321
* CVE-2025-38728
* CVE-2025-39805
* CVE-2025-39819
* CVE-2025-39822
* CVE-2025-39831
* CVE-2025-39859
* CVE-2025-39897
* CVE-2025-39917
* CVE-2025-39944
* CVE-2025-39961
* CVE-2025-39980
* CVE-2025-39990
* CVE-2025-40001
* CVE-2025-40003
* CVE-2025-40006
* CVE-2025-40021
* CVE-2025-40024
* CVE-2025-40027
* CVE-2025-40031
* CVE-2025-40033
* CVE-2025-40038
* CVE-2025-40047
* CVE-2025-40053
* CVE-2025-40055
* CVE-2025-40059
* CVE-2025-40064
* CVE-2025-40070
* CVE-2025-40074
* CVE-2025-40075
* CVE-2025-40081
* CVE-2025-40083
* CVE-2025-40086
* CVE-2025-40098
* CVE-2025-40101
* CVE-2025-40102
* CVE-2025-40105
* CVE-2025-40107
* CVE-2025-40109
* CVE-2025-40110
* CVE-2025-40111
* CVE-2025-40115
* CVE-2025-40116
* CVE-2025-40118
* CVE-2025-40120
* CVE-2025-40121
* CVE-2025-40127
* CVE-2025-40129
* CVE-2025-40132
* CVE-2025-40133
* CVE-2025-40134
* CVE-2025-40135
* CVE-2025-40139
* CVE-2025-40140
* CVE-2025-40141
* CVE-2025-40142
* CVE-2025-40149
* CVE-2025-40153
* CVE-2025-40154
* CVE-2025-40156
* CVE-2025-40157
* CVE-2025-40158
* CVE-2025-40159
* CVE-2025-40161
* CVE-2025-40162
* CVE-2025-40164
* CVE-2025-40165
* CVE-2025-40166
* CVE-2025-40168
* CVE-2025-40169
* CVE-2025-40171
* CVE-2025-40172
* CVE-2025-40173
* CVE-2025-40175
* CVE-2025-40176
* CVE-2025-40177
* CVE-2025-40178
* CVE-2025-40180
* CVE-2025-40183
* CVE-2025-40185
* CVE-2025-40186
* CVE-2025-40187
* CVE-2025-40188
* CVE-2025-40192
* CVE-2025-40194
* CVE-2025-40196
* CVE-2025-40197
* CVE-2025-40198
* CVE-2025-40200
* CVE-2025-40201
* CVE-2025-40202
* CVE-2025-40203
* CVE-2025-40204
* CVE-2025-40205
* CVE-2025-40206
* CVE-2025-40207
CVSS scores:
* CVE-2022-50253 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50253 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37916 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37916 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-37916 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38084 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38084 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38085 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38085 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38085 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38321 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-38321 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
* CVE-2025-38321 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38728 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38728 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-39805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39819 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39831 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39897 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39897 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-39897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39917 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-39917 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-39917 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39961 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39961 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-39980 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39980 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39990 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40001 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40001 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40003 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40003 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40006 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40021 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40021 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2025-40024 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40027 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40027 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40031 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40033 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40038 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40047 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40047 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40053 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40055 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40059 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40083 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40086 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40086 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40098 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40101 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40101 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40102 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40102 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2025-40105 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40105 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40107 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40109 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40110 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40110 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40111 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40115 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40115 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40116 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40118 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40118 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40120 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40121 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40121 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40127 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40129 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40129 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40132 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40133 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40133 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
* CVE-2025-40134 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40134 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40135 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40135 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40139 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40139 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40140 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40140 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40141 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40141 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-40142 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40142 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40149 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40149 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-40153 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40153 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40154 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40154 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40156 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40157 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40157 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40158 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40158 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-40159 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40159 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40161 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40161 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40162 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40164 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40164 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40165 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40165 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40166 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40168 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40168 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-40169 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40169 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40171 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40171 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40172 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40173 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40173 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40175 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40175 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40176 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40176 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40177 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40177 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-40178 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40180 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40180 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-40183 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40183 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40185 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40186 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40186 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40187 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40188 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40192 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40194 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40194 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40196 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40196 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40197 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40198 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40200 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40201 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40202 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40203 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40204 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-40205 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40206 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40206 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40207 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* SUSE Linux Enterprise Server 16.0
* SUSE Linux Enterprise Server High Availability Extension 16.0
An update that solves 100 vulnerabilities, contains five features and has 19
fixes can now be installed.
## Description:
The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues
The following security issues were fixed:
* CVE-2022-50253: bpf: make sure skb->len != 0 when redirecting to a tunneling
device (bsc#1249912).
* CVE-2025-37916: pds_core: remove write-after-free of client_id
(bsc#1243474).
* CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before
(bsc#1245431 bsc#1245498).
* CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race
(bsc#1245431 bsc#1245499).
* CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails
(bsc#1246328).
* CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd
(bsc#1249256).
* CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove()
(bsc#1249982).
* CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).
* CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation
(bsc#1250034).
* CVE-2025-39831: fbnic: Move phylink resume out of service_task and into
open/close (bsc#1249977).
* CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by
ptp_ocp_watchdog (bsc#1250252).
* CVE-2025-39897: net: xilinx: axienet: Add error handling for RX metadata
pointer retrieval (bsc#1250746).
* CVE-2025-39917: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt
(bsc#1250723).
* CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()
(bsc#1251120).
* CVE-2025-39961: iommu/amd/pgtbl: Fix possible race while increase page table
level (bsc#1251817).
* CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a
group (bsc#1252063).
* CVE-2025-39990: bpf: Check the helper function is valid in get_helper_proto
(bsc#1252054).
* CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue
(bsc#1252303).
* CVE-2025-40003: net: mscc: ocelot: Fix use-after-free caused by cyclic
delayed work (bsc#1252301).
* CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted
(bsc#1252342).
* CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent
(bsc#1252681).
* CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task
(bsc#1252686).
* CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).
* CVE-2025-40031: tee: fix register_shm_helper() (bsc#1252779).
* CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in
pru_rproc_set_ctable() (bsc#1252824).
* CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP
isn't valid (bsc#1252817).
* CVE-2025-40047: io_uring/waitid: always prune wait queue entry in
io_waitid_wait() (bsc#1252790).
* CVE-2025-40053: net: dlink: handle copy_thresh allocation failure
(bsc#1252808).
* CVE-2025-40055: ocfs2: fix double free in user_cluster_connect()
(bsc#1252821).
* CVE-2025-40059: coresight: Fix incorrect handling for return value of
devm_kzalloc (bsc#1252809).
* CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev()
(bsc#1252845).
* CVE-2025-40070: pps: fix warning in pps_register_cdev when register device
fail (bsc#1252836).
* CVE-2025-40074: tcp: convert to dev_net_rcu() (bsc#1252794).
* CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).
* CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF()
(bsc#1252776).
* CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue
(bsc#1252912).
* CVE-2025-40086: drm/xe: Don't allow evicting of BOs in same VM in array of
VM binds (bsc#1252923).
* CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in
cs35l41_get_acpi_mute_state() (bsc#1252917).
* CVE-2025-40101: btrfs: fix memory leaks when rejecting a non SINGLE data
profile without an RST (bsc#1252901).
* CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init
(bsc#1252919).
* CVE-2025-40105: vfs: Don't leak disconnected dentries on umount
(bsc#1252928).
* CVE-2025-40133: mptcp: Call dst_release() in mptcp_active_enable()
(bsc#1253328).
* CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend()
(bsc#1253386).
* CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).
* CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in
smc_clc_prfx_set() (bsc#1253409).
* CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in
get_netdev_for_sock() (bsc#1253355).
* CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory
area (bsc#1253408).
* CVE-2025-40157: EDAC/i10nm: Skip DIMM enumeration on a disabled memory
controller (bsc#1253423).
* CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).
* CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation
(bsc#1253403).
* CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in
smc_clc_prfx_match() (bsc#1253427).
* CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).
* CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth
(bsc#1253421).
* CVE-2025-40175: idpf: cleanup remaining SKBs in PTP flows (bsc#1253426).
* CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold
fails (bsc#1253425).
* CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).
* CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation
failure (bsc#1253394).
* CVE-2025-40201: kernel/sys.c: fix the racy usage of
task_lock(tsk->group_leader) in sys_prlimit64() paths (bsc#1253455).
* CVE-2025-40203: listmount: don't call path_put() under namespace semaphore
(bsc#1253457).
The following non security issues were fixed:
* ACPI: scan: Update honor list for RPMI System MSI (stable-fixes).
* ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-
fixes).
* Disable CONFIG_CPU5_WDT The cpu5wdt driver doesn't implement a proper
watchdog interface and has many code issues. It only handles obscure and
obsolete hardware. Stop building and supporting this driver (jsc#PED-14062).
* Fix "drm/xe: Don't allow evicting of BOs in same VM in array of VM binds"
(bsc#1252923)
* KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-
fixes).
* KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing
(git-fixes).
* KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-
fixes).
* KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).
* KVM: s390: kABI backport for 'last_sleep_cpu' (bsc#1252352).
* KVM: x86/mmu: Return -EAGAIN if userspace deletes/moves memslot during
prefault (git-fixes).
* PCI/ERR: Update device error_state already after reset (stable-fixes).
* PM: EM: Slightly reduce em_check_capacity_update() overhead (stable-fixes).
* Revert "net/mlx5e: Update and set Xon/Xoff upon MTU set" (git-fixes).
* Revert "net/mlx5e: Update and set Xon/Xoff upon port speed set" (git-fixes).
* Update config files: enable zstd module decompression (jsc#PED-14115).
* bpf/selftests: Fix test_tcpnotify_user (bsc#1253635).
* btrfs: do not clear read-only when adding sprout device (bsc#1253238).
* btrfs: do not update last_log_commit when logging inode due to a new name
(git-fixes).
* dm: fix queue start/stop imbalance under suspend/load/resume races
(bsc#1253386)
* drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream
(stable-fixes).
* drm/amd/display: update color on atomic commit time (stable-fixes).
* drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).
* drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-
fixes).
* hwmon: (lenovo-ec-sensors) Update P8 supprt (stable-fixes).
* media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).
* mount: handle NULL values in mnt_ns_release() (bsc#1254308)
* net/smc: Remove validation of reserved bits in CLC Decline (bsc#1252357).
* net: phy: move realtek PHY driver to its own subdirectory (jsc#PED-14353).
* net: phy: realtek: add defines for shadowed c45 standard registers
(jsc#PED-14353).
* net: phy: realtek: add helper RTL822X_VND2_C22_REG (jsc#PED-14353).
* net: phy: realtek: change order of calls in C22 read_status()
(jsc#PED-14353).
* net: phy: realtek: clear 1000Base-T link partner advertisement
(jsc#PED-14353).
* net: phy: realtek: improve mmd register access for internal PHY's
(jsc#PED-14353).
* net: phy: realtek: read duplex and gbit master from PHYSR register
(jsc#PED-14353).
* net: phy: realtek: switch from paged to MMD ops in rtl822x functions
(jsc#PED-14353).
* net: phy: realtek: use string choices helpers (jsc#PED-14353).
* net: xilinx: axienet: Fix IRQ coalescing packet count overflow (bsc#1250746)
* net: xilinx: axienet: Fix RX skb ring management in DMAengine mode
(bsc#1250746)
* net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in
dmaengine xmit (bsc#1250746)
* nvmet-auth: update sc_c in host response (git-fixes bsc#1249397).
* nvmet-auth: update sc_c in target host hash calculation (git-fixes).
* perf list: Add IBM z17 event descriptions (jsc#PED-13611).
* platform/x86:intel/pmc: Update Arrow Lake telemetry GUID (git-fixes).
* powercap: intel_rapl: Add support for Panther Lake platform (jsc#PED-13949).
* pwm: pca9685: Use bulk write to atomicially update registers (stable-fixes).
* r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353).
* r8169: add support for Intel Killer E5000 (jsc#PED-14353).
* r8169: add support for RTL8125BP rev.b (jsc#PED-14353).
* r8169: add support for RTL8125D rev.b (jsc#PED-14353).
* r8169: adjust version numbering for RTL8126 (jsc#PED-14353).
* r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353).
* r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353).
* r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353).
* r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers
(jsc#PED-14353).
* r8169: avoid duplicated messages if loading firmware fails and switch to
warn level (jsc#PED-14353).
* r8169: don't take RTNL lock in rtl_task() (jsc#PED-14353).
* r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353).
* r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353).
* r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats
(jsc#PED-14353).
* r8169: implement additional ethtool stats ops (jsc#PED-14353).
* r8169: improve __rtl8169_set_wol (jsc#PED-14353).
* r8169: improve initialization of RSS registers on RTL8125/RTL8126
(jsc#PED-14353).
* r8169: improve rtl_set_d3_pll_down (jsc#PED-14353).
* r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353).
* r8169: remove leftover locks after reverted change (jsc#PED-14353).
* r8169: remove original workaround for RTL8125 broken rx issue
(jsc#PED-14353).
* r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353).
* r8169: remove support for chip version 11 (jsc#PED-14353).
* r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353).
* r8169: replace custom flag with disable_work() et al (jsc#PED-14353).
* r8169: switch away from deprecated pcim_iomap_table (jsc#PED-14353).
* r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config
(jsc#PED-14353).
* ring-buffer: Update pages_touched to reflect persistent buffer content (git-
fixes).
* s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253643).
* sched/fair: Get rid of sched_domains_curr_level hack for tl->cpumask()
(bsc#1246843).
* sched/fair: Have SD_SERIALIZE affect newidle balancing (bsc#1248792).
* sched/fair: Proportional newidle balance (bsc#1248792).
* sched/fair: Proportional newidle balance -KABI (bsc#1248792).
* sched/fair: Revert max_newidle_lb_cost bump (bsc#1248792).
* sched/fair: Skip sched_balance_running cmpxchg when balance is not due
(bsc#1248792).
* sched/fair: Small cleanup to sched_balance_newidle() (bsc#1248792).
* sched/fair: Small cleanup to update_newidle_cost() (bsc#1248792).
* scsi: lpfc: Add capability to register Platform Name ID to fabric
(bsc#1254119).
* scsi: lpfc: Allow support for BB credit recovery in point-to-point topology
(bsc#1254119).
* scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).
* scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology
(bsc#1254119).
* scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI
(bsc#1254119).
* scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).
* scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb()
(bsc#1254119).
* scsi: lpfc: Revise discovery related function headers and comments
(bsc#1254119).
* scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).
* scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).
* selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).
* smpboot: introduce SDTL_INIT() helper to tidy sched topology setup
(bsc#1246843).
* soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).
* spi: tegra210-quad: Check hardware status on timeout (bsc#1253155)
* spi: tegra210-quad: Fix timeout handling (bsc#1253155)
* spi: tegra210-quad: Refactor error handling into helper functions
(bsc#1253155)
* spi: tegra210-quad: Update dummy sequence configuration (git-fixes)
* tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate
psock->cork (bsc#1250705).
* wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).
* wifi: mt76: do not add wcid entries to sta poll list during MCU reset
(bsc#1254315).
* wifi: mt76: introduce mt792x_config_mac_addr_list routine (bsc#1254315).
* wifi: mt76: mt7925: Fix logical vs bitwise typo (bsc#1254315).
* wifi: mt76: mt7925: Remove unnecessary if-check (bsc#1254315).
* wifi: mt76: mt7925: Simplify HIF suspend handling to avoid suspend fail
(bsc#1254315).
* wifi: mt76: mt7925: add EHT control support based on the CLC data
(bsc#1254315).
* wifi: mt76: mt7925: add handler to hif suspend/resume event (bsc#1254315).
* wifi: mt76: mt7925: add pci restore for hibernate (bsc#1254315).
* wifi: mt76: mt7925: config the dwell time by firmware (bsc#1254315).
* wifi: mt76: mt7925: extend MCU support for testmode (bsc#1254315).
* wifi: mt76: mt7925: fix CLC command timeout when suspend/resume
(bsc#1254315).
* wifi: mt76: mt7925: fix missing hdr_trans_tlv command for broadcast wtbl
(bsc#1254315).
* wifi: mt76: mt7925: fix the unfinished command of regd_notifier before
suspend (bsc#1254315).
* wifi: mt76: mt7925: refine the txpower initialization flow (bsc#1254315).
* wifi: mt76: mt7925: replace zero-length array with flexible-array member
(bsc#1254315).
* wifi: mt76: mt7925: update the channel usage when the regd domain changed
(bsc#1254315).
* wifi: mt76: mt7925e: fix too long of wifi resume time (bsc#1254315).
* x86/smpboot: avoid SMT domain attach/destroy if SMT is not enabled
(bsc#1246843).
* x86/smpboot: moves x86_topology to static initialize and truncate
(bsc#1246843).
* x86/smpboot: remove redundant CONFIG_SCHED_SMT (bsc#1246843).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server High Availability Extension 16.0
zypper in -t patch SUSE-SLES-HA-16.0-113=1
## Package List:
* SUSE Linux Enterprise Server High Availability Extension 16.0 (ppc64le s390x
x86_64)
* dlm-kmp-default-6.12.0-160000.8.1
* kernel-default-debugsource-6.12.0-160000.8.1
* cluster-md-kmp-default-debuginfo-6.12.0-160000.8.1
* dlm-kmp-default-debuginfo-6.12.0-160000.8.1
* gfs2-kmp-default-debuginfo-6.12.0-160000.8.1
* gfs2-kmp-default-6.12.0-160000.8.1
* kernel-default-debuginfo-6.12.0-160000.8.1
* cluster-md-kmp-default-6.12.0-160000.8.1
* SUSE Linux Enterprise Server High Availability Extension 16.0 (nosrc)
* kernel-default-6.12.0-160000.8.1
## References:
* https://www.suse.com/security/cve/CVE-2022-50253.html
* https://www.suse.com/security/cve/CVE-2025-37916.html
* https://www.suse.com/security/cve/CVE-2025-38084.html
* https://www.suse.com/security/cve/CVE-2025-38085.html
* https://www.suse.com/security/cve/CVE-2025-38321.html
* https://www.suse.com/security/cve/CVE-2025-38728.html
* https://www.suse.com/security/cve/CVE-2025-39805.html
* https://www.suse.com/security/cve/CVE-2025-39819.html
* https://www.suse.com/security/cve/CVE-2025-39822.html
* https://www.suse.com/security/cve/CVE-2025-39831.html
* https://www.suse.com/security/cve/CVE-2025-39859.html
* https://www.suse.com/security/cve/CVE-2025-39897.html
* https://www.suse.com/security/cve/CVE-2025-39917.html
* https://www.suse.com/security/cve/CVE-2025-39944.html
* https://www.suse.com/security/cve/CVE-2025-39961.html
* https://www.suse.com/security/cve/CVE-2025-39980.html
* https://www.suse.com/security/cve/CVE-2025-39990.html
* https://www.suse.com/security/cve/CVE-2025-40001.html
* https://www.suse.com/security/cve/CVE-2025-40003.html
* https://www.suse.com/security/cve/CVE-2025-40006.html
* https://www.suse.com/security/cve/CVE-2025-40021.html
* https://www.suse.com/security/cve/CVE-2025-40024.html
* https://www.suse.com/security/cve/CVE-2025-40027.html
* https://www.suse.com/security/cve/CVE-2025-40031.html
* https://www.suse.com/security/cve/CVE-2025-40033.html
* https://www.suse.com/security/cve/CVE-2025-40038.html
* https://www.suse.com/security/cve/CVE-2025-40047.html
* https://www.suse.com/security/cve/CVE-2025-40053.html
* https://www.suse.com/security/cve/CVE-2025-40055.html
* https://www.suse.com/security/cve/CVE-2025-40059.html
* https://www.suse.com/security/cve/CVE-2025-40064.html
* https://www.suse.com/security/cve/CVE-2025-40070.html
* https://www.suse.com/security/cve/CVE-2025-40074.html
* https://www.suse.com/security/cve/CVE-2025-40075.html
* https://www.suse.com/security/cve/CVE-2025-40081.html
* https://www.suse.com/security/cve/CVE-2025-40083.html
* https://www.suse.com/security/cve/CVE-2025-40086.html
* https://www.suse.com/security/cve/CVE-2025-40098.html
* https://www.suse.com/security/cve/CVE-2025-40101.html
* https://www.suse.com/security/cve/CVE-2025-40102.html
* https://www.suse.com/security/cve/CVE-2025-40105.html
* https://www.suse.com/security/cve/CVE-2025-40107.html
* https://www.suse.com/security/cve/CVE-2025-40109.html
* https://www.suse.com/security/cve/CVE-2025-40110.html
* https://www.suse.com/security/cve/CVE-2025-40111.html
* https://www.suse.com/security/cve/CVE-2025-40115.html
* https://www.suse.com/security/cve/CVE-2025-40116.html
* https://www.suse.com/security/cve/CVE-2025-40118.html
* https://www.suse.com/security/cve/CVE-2025-40120.html
* https://www.suse.com/security/cve/CVE-2025-40121.html
* https://www.suse.com/security/cve/CVE-2025-40127.html
* https://www.suse.com/security/cve/CVE-2025-40129.html
* https://www.suse.com/security/cve/CVE-2025-40132.html
* https://www.suse.com/security/cve/CVE-2025-40133.html
* https://www.suse.com/security/cve/CVE-2025-40134.html
* https://www.suse.com/security/cve/CVE-2025-40135.html
* https://www.suse.com/security/cve/CVE-2025-40139.html
* https://www.suse.com/security/cve/CVE-2025-40140.html
* https://www.suse.com/security/cve/CVE-2025-40141.html
* https://www.suse.com/security/cve/CVE-2025-40142.html
* https://www.suse.com/security/cve/CVE-2025-40149.html
* https://www.suse.com/security/cve/CVE-2025-40153.html
* https://www.suse.com/security/cve/CVE-2025-40154.html
* https://www.suse.com/security/cve/CVE-2025-40156.html
* https://www.suse.com/security/cve/CVE-2025-40157.html
* https://www.suse.com/security/cve/CVE-2025-40158.html
* https://www.suse.com/security/cve/CVE-2025-40159.html
* https://www.suse.com/security/cve/CVE-2025-40161.html
* https://www.suse.com/security/cve/CVE-2025-40162.html
* https://www.suse.com/security/cve/CVE-2025-40164.html
* https://www.suse.com/security/cve/CVE-2025-40165.html
* https://www.suse.com/security/cve/CVE-2025-40166.html
* https://www.suse.com/security/cve/CVE-2025-40168.html
* https://www.suse.com/security/cve/CVE-2025-40169.html
* https://www.suse.com/security/cve/CVE-2025-40171.html
* https://www.suse.com/security/cve/CVE-2025-40172.html
* https://www.suse.com/security/cve/CVE-2025-40173.html
* https://www.suse.com/security/cve/CVE-2025-40175.html
* https://www.suse.com/security/cve/CVE-2025-40176.html
* https://www.suse.com/security/cve/CVE-2025-40177.html
* https://www.suse.com/security/cve/CVE-2025-40178.html
* https://www.suse.com/security/cve/CVE-2025-40180.html
* https://www.suse.com/security/cve/CVE-2025-40183.html
* https://www.suse.com/security/cve/CVE-2025-40185.html
* https://www.suse.com/security/cve/CVE-2025-40186.html
* https://www.suse.com/security/cve/CVE-2025-40187.html
* https://www.suse.com/security/cve/CVE-2025-40188.html
* https://www.suse.com/security/cve/CVE-2025-40192.html
* https://www.suse.com/security/cve/CVE-2025-40194.html
* https://www.suse.com/security/cve/CVE-2025-40196.html
* https://www.suse.com/security/cve/CVE-2025-40197.html
* https://www.suse.com/security/cve/CVE-2025-40198.html
* https://www.suse.com/security/cve/CVE-2025-40200.html
* https://www.suse.com/security/cve/CVE-2025-40201.html
* https://www.suse.com/security/cve/CVE-2025-40202.html
* https://www.suse.com/security/cve/CVE-2025-40203.html
* https://www.suse.com/security/cve/CVE-2025-40204.html
* https://www.suse.com/security/cve/CVE-2025-40205.html
* https://www.suse.com/security/cve/CVE-2025-40206.html
* https://www.suse.com/security/cve/CVE-2025-40207.html
* https://bugzilla.suse.com/show_bug.cgi?id=1235463
* https://bugzilla.suse.com/show_bug.cgi?id=1243474
* https://bugzilla.suse.com/show_bug.cgi?id=1245193
* https://bugzilla.suse.com/show_bug.cgi?id=1245431
* https://bugzilla.suse.com/show_bug.cgi?id=1245498
* https://bugzilla.suse.com/show_bug.cgi?id=1245499
* https://bugzilla.suse.com/show_bug.cgi?id=1246328
* https://bugzilla.suse.com/show_bug.cgi?id=1246843
* https://bugzilla.suse.com/show_bug.cgi?id=1247500
* https://bugzilla.suse.com/show_bug.cgi?id=1248792
* https://bugzilla.suse.com/show_bug.cgi?id=1249256
* https://bugzilla.suse.com/show_bug.cgi?id=1249397
* https://bugzilla.suse.com/show_bug.cgi?id=1249912
* https://bugzilla.suse.com/show_bug.cgi?id=1249977
* https://bugzilla.suse.com/show_bug.cgi?id=1249982
* https://bugzilla.suse.com/show_bug.cgi?id=1250034
* https://bugzilla.suse.com/show_bug.cgi?id=1250176
* https://bugzilla.suse.com/show_bug.cgi?id=1250237
* https://bugzilla.suse.com/show_bug.cgi?id=1250252
* https://bugzilla.suse.com/show_bug.cgi?id=1250705
* https://bugzilla.suse.com/show_bug.cgi?id=1250723
* https://bugzilla.suse.com/show_bug.cgi?id=1250746
* https://bugzilla.suse.com/show_bug.cgi?id=1251120
* https://bugzilla.suse.com/show_bug.cgi?id=1251817
* https://bugzilla.suse.com/show_bug.cgi?id=1252054
* https://bugzilla.suse.com/show_bug.cgi?id=1252063
* https://bugzilla.suse.com/show_bug.cgi?id=1252301
* https://bugzilla.suse.com/show_bug.cgi?id=1252303
* https://bugzilla.suse.com/show_bug.cgi?id=1252342
* https://bugzilla.suse.com/show_bug.cgi?id=1252352
* https://bugzilla.suse.com/show_bug.cgi?id=1252357
* https://bugzilla.suse.com/show_bug.cgi?id=1252681
* https://bugzilla.suse.com/show_bug.cgi?id=1252686
* https://bugzilla.suse.com/show_bug.cgi?id=1252763
* https://bugzilla.suse.com/show_bug.cgi?id=1252776
* https://bugzilla.suse.com/show_bug.cgi?id=1252779
* https://bugzilla.suse.com/show_bug.cgi?id=1252790
* https://bugzilla.suse.com/show_bug.cgi?id=1252794
* https://bugzilla.suse.com/show_bug.cgi?id=1252795
* https://bugzilla.suse.com/show_bug.cgi?id=1252808
* https://bugzilla.suse.com/show_bug.cgi?id=1252809
* https://bugzilla.suse.com/show_bug.cgi?id=1252817
* https://bugzilla.suse.com/show_bug.cgi?id=1252821
* https://bugzilla.suse.com/show_bug.cgi?id=1252824
* https://bugzilla.suse.com/show_bug.cgi?id=1252836
* https://bugzilla.suse.com/show_bug.cgi?id=1252845
* https://bugzilla.suse.com/show_bug.cgi?id=1252901
* https://bugzilla.suse.com/show_bug.cgi?id=1252912
* https://bugzilla.suse.com/show_bug.cgi?id=1252917
* https://bugzilla.suse.com/show_bug.cgi?id=1252919
* https://bugzilla.suse.com/show_bug.cgi?id=1252923
* https://bugzilla.suse.com/show_bug.cgi?id=1252928
* https://bugzilla.suse.com/show_bug.cgi?id=1253018
* https://bugzilla.suse.com/show_bug.cgi?id=1253155
* https://bugzilla.suse.com/show_bug.cgi?id=1253176
* https://bugzilla.suse.com/show_bug.cgi?id=1253238
* https://bugzilla.suse.com/show_bug.cgi?id=1253275
* https://bugzilla.suse.com/show_bug.cgi?id=1253318
* https://bugzilla.suse.com/show_bug.cgi?id=1253324
* https://bugzilla.suse.com/show_bug.cgi?id=1253328
* https://bugzilla.suse.com/show_bug.cgi?id=1253330
* https://bugzilla.suse.com/show_bug.cgi?id=1253342
* https://bugzilla.suse.com/show_bug.cgi?id=1253348
* https://bugzilla.suse.com/show_bug.cgi?id=1253349
* https://bugzilla.suse.com/show_bug.cgi?id=1253352
* https://bugzilla.suse.com/show_bug.cgi?id=1253355
* https://bugzilla.suse.com/show_bug.cgi?id=1253360
* https://bugzilla.suse.com/show_bug.cgi?id=1253362
* https://bugzilla.suse.com/show_bug.cgi?id=1253363
* https://bugzilla.suse.com/show_bug.cgi?id=1253367
* https://bugzilla.suse.com/show_bug.cgi?id=1253369
* https://bugzilla.suse.com/show_bug.cgi?id=1253386
* https://bugzilla.suse.com/show_bug.cgi?id=1253394
* https://bugzilla.suse.com/show_bug.cgi?id=1253395
* https://bugzilla.suse.com/show_bug.cgi?id=1253402
* https://bugzilla.suse.com/show_bug.cgi?id=1253403
* https://bugzilla.suse.com/show_bug.cgi?id=1253405
* https://bugzilla.suse.com/show_bug.cgi?id=1253407
* https://bugzilla.suse.com/show_bug.cgi?id=1253408
* https://bugzilla.suse.com/show_bug.cgi?id=1253409
* https://bugzilla.suse.com/show_bug.cgi?id=1253410
* https://bugzilla.suse.com/show_bug.cgi?id=1253412
* https://bugzilla.suse.com/show_bug.cgi?id=1253416
* https://bugzilla.suse.com/show_bug.cgi?id=1253421
* https://bugzilla.suse.com/show_bug.cgi?id=1253422
* https://bugzilla.suse.com/show_bug.cgi?id=1253423
* https://bugzilla.suse.com/show_bug.cgi?id=1253424
* https://bugzilla.suse.com/show_bug.cgi?id=1253425
* https://bugzilla.suse.com/show_bug.cgi?id=1253426
* https://bugzilla.suse.com/show_bug.cgi?id=1253427
* https://bugzilla.suse.com/show_bug.cgi?id=1253428
* https://bugzilla.suse.com/show_bug.cgi?id=1253431
* https://bugzilla.suse.com/show_bug.cgi?id=1253433
* https://bugzilla.suse.com/show_bug.cgi?id=1253436
* https://bugzilla.suse.com/show_bug.cgi?id=1253438
* https://bugzilla.suse.com/show_bug.cgi?id=1253440
* https://bugzilla.suse.com/show_bug.cgi?id=1253441
* https://bugzilla.suse.com/show_bug.cgi?id=1253443
* https://bugzilla.suse.com/show_bug.cgi?id=1253445
* https://bugzilla.suse.com/show_bug.cgi?id=1253448
* https://bugzilla.suse.com/show_bug.cgi?id=1253449
* https://bugzilla.suse.com/show_bug.cgi?id=1253450
* https://bugzilla.suse.com/show_bug.cgi?id=1253451
* https://bugzilla.suse.com/show_bug.cgi?id=1253453
* https://bugzilla.suse.com/show_bug.cgi?id=1253455
* https://bugzilla.suse.com/show_bug.cgi?id=1253456
* https://bugzilla.suse.com/show_bug.cgi?id=1253457
* https://bugzilla.suse.com/show_bug.cgi?id=1253463
* https://bugzilla.suse.com/show_bug.cgi?id=1253472
* https://bugzilla.suse.com/show_bug.cgi?id=1253622
* https://bugzilla.suse.com/show_bug.cgi?id=1253624
* https://bugzilla.suse.com/show_bug.cgi?id=1253635
* https://bugzilla.suse.com/show_bug.cgi?id=1253643
* https://bugzilla.suse.com/show_bug.cgi?id=1253647
* https://bugzilla.suse.com/show_bug.cgi?id=1254119
* https://bugzilla.suse.com/show_bug.cgi?id=1254181
* https://bugzilla.suse.com/show_bug.cgi?id=1254221
* https://bugzilla.suse.com/show_bug.cgi?id=1254308
* https://bugzilla.suse.com/show_bug.cgi?id=1254315
* https://jira.suse.com/browse/PED-13611
* https://jira.suse.com/browse/PED-13949
* https://jira.suse.com/browse/PED-14062
* https://jira.suse.com/browse/PED-14115
* https://jira.suse.com/browse/PED-14353
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20260109/f5e33ded/attachment.htm>
More information about the sle-security-updates
mailing list