SUSE-SU-2026:20021-1: important: Security update for the Linux Kernel

SLE-SECURITY-UPDATES null at suse.de
Fri Jan 9 20:31:32 UTC 2026



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2026:20021-1  
Release Date: 2025-12-19T16:19:41Z  
Rating: important  
References:

  * bsc#1235463
  * bsc#1243474
  * bsc#1245193
  * bsc#1245431
  * bsc#1245498
  * bsc#1245499
  * bsc#1246328
  * bsc#1246843
  * bsc#1247500
  * bsc#1248792
  * bsc#1249256
  * bsc#1249397
  * bsc#1249912
  * bsc#1249977
  * bsc#1249982
  * bsc#1250034
  * bsc#1250176
  * bsc#1250237
  * bsc#1250252
  * bsc#1250705
  * bsc#1250723
  * bsc#1250746
  * bsc#1251120
  * bsc#1251817
  * bsc#1252054
  * bsc#1252063
  * bsc#1252301
  * bsc#1252303
  * bsc#1252342
  * bsc#1252352
  * bsc#1252357
  * bsc#1252681
  * bsc#1252686
  * bsc#1252763
  * bsc#1252776
  * bsc#1252779
  * bsc#1252790
  * bsc#1252794
  * bsc#1252795
  * bsc#1252808
  * bsc#1252809
  * bsc#1252817
  * bsc#1252821
  * bsc#1252824
  * bsc#1252836
  * bsc#1252845
  * bsc#1252901
  * bsc#1252912
  * bsc#1252917
  * bsc#1252919
  * bsc#1252923
  * bsc#1252928
  * bsc#1253018
  * bsc#1253155
  * bsc#1253176
  * bsc#1253238
  * bsc#1253275
  * bsc#1253318
  * bsc#1253324
  * bsc#1253328
  * bsc#1253330
  * bsc#1253342
  * bsc#1253348
  * bsc#1253349
  * bsc#1253352
  * bsc#1253355
  * bsc#1253360
  * bsc#1253362
  * bsc#1253363
  * bsc#1253367
  * bsc#1253369
  * bsc#1253386
  * bsc#1253394
  * bsc#1253395
  * bsc#1253402
  * bsc#1253403
  * bsc#1253405
  * bsc#1253407
  * bsc#1253408
  * bsc#1253409
  * bsc#1253410
  * bsc#1253412
  * bsc#1253416
  * bsc#1253421
  * bsc#1253422
  * bsc#1253423
  * bsc#1253424
  * bsc#1253425
  * bsc#1253426
  * bsc#1253427
  * bsc#1253428
  * bsc#1253431
  * bsc#1253433
  * bsc#1253436
  * bsc#1253438
  * bsc#1253440
  * bsc#1253441
  * bsc#1253443
  * bsc#1253445
  * bsc#1253448
  * bsc#1253449
  * bsc#1253450
  * bsc#1253451
  * bsc#1253453
  * bsc#1253455
  * bsc#1253456
  * bsc#1253457
  * bsc#1253463
  * bsc#1253472
  * bsc#1253622
  * bsc#1253624
  * bsc#1253635
  * bsc#1253643
  * bsc#1253647
  * bsc#1254119
  * bsc#1254181
  * bsc#1254221
  * bsc#1254308
  * bsc#1254315
  * jsc#PED-13611
  * jsc#PED-13949
  * jsc#PED-14062
  * jsc#PED-14115
  * jsc#PED-14353

  
Cross-References:

  * CVE-2022-50253
  * CVE-2025-37916
  * CVE-2025-38084
  * CVE-2025-38085
  * CVE-2025-38321
  * CVE-2025-38728
  * CVE-2025-39805
  * CVE-2025-39819
  * CVE-2025-39822
  * CVE-2025-39831
  * CVE-2025-39859
  * CVE-2025-39897
  * CVE-2025-39917
  * CVE-2025-39944
  * CVE-2025-39961
  * CVE-2025-39980
  * CVE-2025-39990
  * CVE-2025-40001
  * CVE-2025-40003
  * CVE-2025-40006
  * CVE-2025-40021
  * CVE-2025-40024
  * CVE-2025-40027
  * CVE-2025-40031
  * CVE-2025-40033
  * CVE-2025-40038
  * CVE-2025-40047
  * CVE-2025-40053
  * CVE-2025-40055
  * CVE-2025-40059
  * CVE-2025-40064
  * CVE-2025-40070
  * CVE-2025-40074
  * CVE-2025-40075
  * CVE-2025-40081
  * CVE-2025-40083
  * CVE-2025-40086
  * CVE-2025-40098
  * CVE-2025-40101
  * CVE-2025-40102
  * CVE-2025-40105
  * CVE-2025-40107
  * CVE-2025-40109
  * CVE-2025-40110
  * CVE-2025-40111
  * CVE-2025-40115
  * CVE-2025-40116
  * CVE-2025-40118
  * CVE-2025-40120
  * CVE-2025-40121
  * CVE-2025-40127
  * CVE-2025-40129
  * CVE-2025-40132
  * CVE-2025-40133
  * CVE-2025-40134
  * CVE-2025-40135
  * CVE-2025-40139
  * CVE-2025-40140
  * CVE-2025-40141
  * CVE-2025-40142
  * CVE-2025-40149
  * CVE-2025-40153
  * CVE-2025-40154
  * CVE-2025-40156
  * CVE-2025-40157
  * CVE-2025-40158
  * CVE-2025-40159
  * CVE-2025-40161
  * CVE-2025-40162
  * CVE-2025-40164
  * CVE-2025-40165
  * CVE-2025-40166
  * CVE-2025-40168
  * CVE-2025-40169
  * CVE-2025-40171
  * CVE-2025-40172
  * CVE-2025-40173
  * CVE-2025-40175
  * CVE-2025-40176
  * CVE-2025-40177
  * CVE-2025-40178
  * CVE-2025-40180
  * CVE-2025-40183
  * CVE-2025-40185
  * CVE-2025-40186
  * CVE-2025-40187
  * CVE-2025-40188
  * CVE-2025-40192
  * CVE-2025-40194
  * CVE-2025-40196
  * CVE-2025-40197
  * CVE-2025-40198
  * CVE-2025-40200
  * CVE-2025-40201
  * CVE-2025-40202
  * CVE-2025-40203
  * CVE-2025-40204
  * CVE-2025-40205
  * CVE-2025-40206
  * CVE-2025-40207

  
CVSS scores:

  * CVE-2022-50253 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50253 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50253 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-37916 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-37916 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-37916 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38084 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38084 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-38084 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38085 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38085 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-38085 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38321 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-38321 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
  * CVE-2025-38321 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38728 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38728 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-38728 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-39805 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39805 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39819 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39819 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39822 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39822 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39831 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39831 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39859 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39859 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39897 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39897 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-39897 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39917 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-39917 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
  * CVE-2025-39917 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-39944 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39961 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39961 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-39980 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39980 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-39990 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-39990 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40001 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40001 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-40003 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40003 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-40006 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40006 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40021 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-40021 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
  * CVE-2025-40024 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40024 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40027 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40027 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-40031 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40031 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40033 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40033 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40038 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40038 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40047 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40047 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40053 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40053 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40055 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40055 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40059 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40059 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40064 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40070 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40074 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40075 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40081 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40083 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40083 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40086 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40086 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-40098 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40098 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40101 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-40101 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-40102 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-40102 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2025-40105 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-40105 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-40107 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40107 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40109 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40109 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40110 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40110 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40111 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-40115 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40115 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40116 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40116 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40118 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40118 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-40120 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40120 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40121 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40121 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40127 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40127 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40129 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40129 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40132 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40132 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40133 ( SUSE ):  5.9
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40133 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H
  * CVE-2025-40134 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40134 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40135 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40135 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-40139 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40139 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40140 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-40140 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-40141 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40141 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-40142 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40142 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40149 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40149 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-40153 ( SUSE ):  2.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-40153 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-40154 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40154 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40156 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40156 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40157 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40157 ( SUSE ):  5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-40158 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40158 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-40159 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40159 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40161 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40161 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-40162 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40162 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40164 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40164 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40165 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40165 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40166 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40166 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40168 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40168 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-40169 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40169 ( SUSE ):  5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2025-40171 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40171 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-40172 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40172 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40173 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40173 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40175 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40175 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40176 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40176 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40177 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40177 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-40178 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40180 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40180 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-40183 ( SUSE ):  6.9
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-40183 ( SUSE ):  5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-40185 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40185 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40186 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40186 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40187 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40188 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40188 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40192 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40192 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40194 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40194 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40196 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2025-40196 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2025-40197 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40197 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40198 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40198 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40200 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40200 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40201 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40201 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40202 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40202 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40203 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40203 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40204 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-40204 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  * CVE-2025-40205 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40205 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40206 ( SUSE ):  5.9
    CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40206 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40207 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40207 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * SUSE Linux Enterprise Server 16.0
  * SUSE Linux Enterprise Server High Availability Extension 16.0

  
  
An update that solves 100 vulnerabilities, contains five features and has 19
fixes can now be installed.

## Description:

The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues

The following security issues were fixed:

  * CVE-2022-50253: bpf: make sure skb->len != 0 when redirecting to a tunneling
    device (bsc#1249912).
  * CVE-2025-37916: pds_core: remove write-after-free of client_id
    (bsc#1243474).
  * CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before
    (bsc#1245431 bsc#1245498).
  * CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race
    (bsc#1245431 bsc#1245499).
  * CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails
    (bsc#1246328).
  * CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd
    (bsc#1249256).
  * CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove()
    (bsc#1249982).
  * CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).
  * CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation
    (bsc#1250034).
  * CVE-2025-39831: fbnic: Move phylink resume out of service_task and into
    open/close (bsc#1249977).
  * CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by
    ptp_ocp_watchdog (bsc#1250252).
  * CVE-2025-39897: net: xilinx: axienet: Add error handling for RX metadata
    pointer retrieval (bsc#1250746).
  * CVE-2025-39917: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt
    (bsc#1250723).
  * CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()
    (bsc#1251120).
  * CVE-2025-39961: iommu/amd/pgtbl: Fix possible race while increase page table
    level (bsc#1251817).
  * CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a
    group (bsc#1252063).
  * CVE-2025-39990: bpf: Check the helper function is valid in get_helper_proto
    (bsc#1252054).
  * CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue
    (bsc#1252303).
  * CVE-2025-40003: net: mscc: ocelot: Fix use-after-free caused by cyclic
    delayed work (bsc#1252301).
  * CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted
    (bsc#1252342).
  * CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent
    (bsc#1252681).
  * CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task
    (bsc#1252686).
  * CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).
  * CVE-2025-40031: tee: fix register_shm_helper() (bsc#1252779).
  * CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in
    pru_rproc_set_ctable() (bsc#1252824).
  * CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP
    isn't valid (bsc#1252817).
  * CVE-2025-40047: io_uring/waitid: always prune wait queue entry in
    io_waitid_wait() (bsc#1252790).
  * CVE-2025-40053: net: dlink: handle copy_thresh allocation failure
    (bsc#1252808).
  * CVE-2025-40055: ocfs2: fix double free in user_cluster_connect()
    (bsc#1252821).
  * CVE-2025-40059: coresight: Fix incorrect handling for return value of
    devm_kzalloc (bsc#1252809).
  * CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev()
    (bsc#1252845).
  * CVE-2025-40070: pps: fix warning in pps_register_cdev when register device
    fail (bsc#1252836).
  * CVE-2025-40074: tcp: convert to dev_net_rcu() (bsc#1252794).
  * CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).
  * CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF()
    (bsc#1252776).
  * CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue
    (bsc#1252912).
  * CVE-2025-40086: drm/xe: Don't allow evicting of BOs in same VM in array of
    VM binds (bsc#1252923).
  * CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in
    cs35l41_get_acpi_mute_state() (bsc#1252917).
  * CVE-2025-40101: btrfs: fix memory leaks when rejecting a non SINGLE data
    profile without an RST (bsc#1252901).
  * CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init
    (bsc#1252919).
  * CVE-2025-40105: vfs: Don't leak disconnected dentries on umount
    (bsc#1252928).
  * CVE-2025-40133: mptcp: Call dst_release() in mptcp_active_enable()
    (bsc#1253328).
  * CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend()
    (bsc#1253386).
  * CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342).
  * CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in
    smc_clc_prfx_set() (bsc#1253409).
  * CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in
    get_netdev_for_sock() (bsc#1253355).
  * CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory
    area (bsc#1253408).
  * CVE-2025-40157: EDAC/i10nm: Skip DIMM enumeration on a disabled memory
    controller (bsc#1253423).
  * CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402).
  * CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation
    (bsc#1253403).
  * CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in
    smc_clc_prfx_match() (bsc#1253427).
  * CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).
  * CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth
    (bsc#1253421).
  * CVE-2025-40175: idpf: cleanup remaining SKBs in PTP flows (bsc#1253426).
  * CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold
    fails (bsc#1253425).
  * CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463).
  * CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation
    failure (bsc#1253394).
  * CVE-2025-40201: kernel/sys.c: fix the racy usage of
    task_lock(tsk->group_leader) in sys_prlimit64() paths (bsc#1253455).
  * CVE-2025-40203: listmount: don't call path_put() under namespace semaphore
    (bsc#1253457).

The following non security issues were fixed:

  * ACPI: scan: Update honor list for RPMI System MSI (stable-fixes).
  * ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-
    fixes).
  * Disable CONFIG_CPU5_WDT The cpu5wdt driver doesn't implement a proper
    watchdog interface and has many code issues. It only handles obscure and
    obsolete hardware. Stop building and supporting this driver (jsc#PED-14062).
  * Fix "drm/xe: Don't allow evicting of BOs in same VM in array of VM binds"
    (bsc#1252923)
  * KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-
    fixes).
  * KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing
    (git-fixes).
  * KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-
    fixes).
  * KVM: s390: improve interrupt cpu for wakeup (bsc#1235463).
  * KVM: s390: kABI backport for 'last_sleep_cpu' (bsc#1252352).
  * KVM: x86/mmu: Return -EAGAIN if userspace deletes/moves memslot during
    prefault (git-fixes).
  * PCI/ERR: Update device error_state already after reset (stable-fixes).
  * PM: EM: Slightly reduce em_check_capacity_update() overhead (stable-fixes).
  * Revert "net/mlx5e: Update and set Xon/Xoff upon MTU set" (git-fixes).
  * Revert "net/mlx5e: Update and set Xon/Xoff upon port speed set" (git-fixes).
  * Update config files: enable zstd module decompression (jsc#PED-14115).
  * bpf/selftests: Fix test_tcpnotify_user (bsc#1253635).
  * btrfs: do not clear read-only when adding sprout device (bsc#1253238).
  * btrfs: do not update last_log_commit when logging inode due to a new name
    (git-fixes).
  * dm: fix queue start/stop imbalance under suspend/load/resume races
    (bsc#1253386)
  * drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream
    (stable-fixes).
  * drm/amd/display: update color on atomic commit time (stable-fixes).
  * drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).
  * drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable-
    fixes).
  * hwmon: (lenovo-ec-sensors) Update P8 supprt (stable-fixes).
  * media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).
  * mount: handle NULL values in mnt_ns_release() (bsc#1254308)
  * net/smc: Remove validation of reserved bits in CLC Decline (bsc#1252357).
  * net: phy: move realtek PHY driver to its own subdirectory (jsc#PED-14353).
  * net: phy: realtek: add defines for shadowed c45 standard registers
    (jsc#PED-14353).
  * net: phy: realtek: add helper RTL822X_VND2_C22_REG (jsc#PED-14353).
  * net: phy: realtek: change order of calls in C22 read_status()
    (jsc#PED-14353).
  * net: phy: realtek: clear 1000Base-T link partner advertisement
    (jsc#PED-14353).
  * net: phy: realtek: improve mmd register access for internal PHY's
    (jsc#PED-14353).
  * net: phy: realtek: read duplex and gbit master from PHYSR register
    (jsc#PED-14353).
  * net: phy: realtek: switch from paged to MMD ops in rtl822x functions
    (jsc#PED-14353).
  * net: phy: realtek: use string choices helpers (jsc#PED-14353).
  * net: xilinx: axienet: Fix IRQ coalescing packet count overflow (bsc#1250746)
  * net: xilinx: axienet: Fix RX skb ring management in DMAengine mode
    (bsc#1250746)
  * net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in
    dmaengine xmit (bsc#1250746)
  * nvmet-auth: update sc_c in host response (git-fixes bsc#1249397).
  * nvmet-auth: update sc_c in target host hash calculation (git-fixes).
  * perf list: Add IBM z17 event descriptions (jsc#PED-13611).
  * platform/x86:intel/pmc: Update Arrow Lake telemetry GUID (git-fixes).
  * powercap: intel_rapl: Add support for Panther Lake platform (jsc#PED-13949).
  * pwm: pca9685: Use bulk write to atomicially update registers (stable-fixes).
  * r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353).
  * r8169: add support for Intel Killer E5000 (jsc#PED-14353).
  * r8169: add support for RTL8125BP rev.b (jsc#PED-14353).
  * r8169: add support for RTL8125D rev.b (jsc#PED-14353).
  * r8169: adjust version numbering for RTL8126 (jsc#PED-14353).
  * r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353).
  * r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353).
  * r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353).
  * r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers
    (jsc#PED-14353).
  * r8169: avoid duplicated messages if loading firmware fails and switch to
    warn level (jsc#PED-14353).
  * r8169: don't take RTNL lock in rtl_task() (jsc#PED-14353).
  * r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353).
  * r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353).
  * r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats
    (jsc#PED-14353).
  * r8169: implement additional ethtool stats ops (jsc#PED-14353).
  * r8169: improve __rtl8169_set_wol (jsc#PED-14353).
  * r8169: improve initialization of RSS registers on RTL8125/RTL8126
    (jsc#PED-14353).
  * r8169: improve rtl_set_d3_pll_down (jsc#PED-14353).
  * r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353).
  * r8169: remove leftover locks after reverted change (jsc#PED-14353).
  * r8169: remove original workaround for RTL8125 broken rx issue
    (jsc#PED-14353).
  * r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353).
  * r8169: remove support for chip version 11 (jsc#PED-14353).
  * r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353).
  * r8169: replace custom flag with disable_work() et al (jsc#PED-14353).
  * r8169: switch away from deprecated pcim_iomap_table (jsc#PED-14353).
  * r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config
    (jsc#PED-14353).
  * ring-buffer: Update pages_touched to reflect persistent buffer content (git-
    fixes).
  * s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253643).
  * sched/fair: Get rid of sched_domains_curr_level hack for tl->cpumask()
    (bsc#1246843).
  * sched/fair: Have SD_SERIALIZE affect newidle balancing (bsc#1248792).
  * sched/fair: Proportional newidle balance (bsc#1248792).
  * sched/fair: Proportional newidle balance -KABI (bsc#1248792).
  * sched/fair: Revert max_newidle_lb_cost bump (bsc#1248792).
  * sched/fair: Skip sched_balance_running cmpxchg when balance is not due
    (bsc#1248792).
  * sched/fair: Small cleanup to sched_balance_newidle() (bsc#1248792).
  * sched/fair: Small cleanup to update_newidle_cost() (bsc#1248792).
  * scsi: lpfc: Add capability to register Platform Name ID to fabric
    (bsc#1254119).
  * scsi: lpfc: Allow support for BB credit recovery in point-to-point topology
    (bsc#1254119).
  * scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119).
  * scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology
    (bsc#1254119).
  * scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI
    (bsc#1254119).
  * scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119).
  * scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb()
    (bsc#1254119).
  * scsi: lpfc: Revise discovery related function headers and comments
    (bsc#1254119).
  * scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119).
  * scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119).
  * selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221).
  * smpboot: introduce SDTL_INIT() helper to tidy sched topology setup
    (bsc#1246843).
  * soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes).
  * spi: tegra210-quad: Check hardware status on timeout (bsc#1253155)
  * spi: tegra210-quad: Fix timeout handling (bsc#1253155)
  * spi: tegra210-quad: Refactor error handling into helper functions
    (bsc#1253155)
  * spi: tegra210-quad: Update dummy sequence configuration (git-fixes)
  * tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate
    psock->cork (bsc#1250705).
  * wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181).
  * wifi: mt76: do not add wcid entries to sta poll list during MCU reset
    (bsc#1254315).
  * wifi: mt76: introduce mt792x_config_mac_addr_list routine (bsc#1254315).
  * wifi: mt76: mt7925: Fix logical vs bitwise typo (bsc#1254315).
  * wifi: mt76: mt7925: Remove unnecessary if-check (bsc#1254315).
  * wifi: mt76: mt7925: Simplify HIF suspend handling to avoid suspend fail
    (bsc#1254315).
  * wifi: mt76: mt7925: add EHT control support based on the CLC data
    (bsc#1254315).
  * wifi: mt76: mt7925: add handler to hif suspend/resume event (bsc#1254315).
  * wifi: mt76: mt7925: add pci restore for hibernate (bsc#1254315).
  * wifi: mt76: mt7925: config the dwell time by firmware (bsc#1254315).
  * wifi: mt76: mt7925: extend MCU support for testmode (bsc#1254315).
  * wifi: mt76: mt7925: fix CLC command timeout when suspend/resume
    (bsc#1254315).
  * wifi: mt76: mt7925: fix missing hdr_trans_tlv command for broadcast wtbl
    (bsc#1254315).
  * wifi: mt76: mt7925: fix the unfinished command of regd_notifier before
    suspend (bsc#1254315).
  * wifi: mt76: mt7925: refine the txpower initialization flow (bsc#1254315).
  * wifi: mt76: mt7925: replace zero-length array with flexible-array member
    (bsc#1254315).
  * wifi: mt76: mt7925: update the channel usage when the regd domain changed
    (bsc#1254315).
  * wifi: mt76: mt7925e: fix too long of wifi resume time (bsc#1254315).
  * x86/smpboot: avoid SMT domain attach/destroy if SMT is not enabled
    (bsc#1246843).
  * x86/smpboot: moves x86_topology to static initialize and truncate
    (bsc#1246843).
  * x86/smpboot: remove redundant CONFIG_SCHED_SMT (bsc#1246843).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Server High Availability Extension 16.0  
    zypper in -t patch SUSE-SLES-HA-16.0-113=1

## Package List:

  * SUSE Linux Enterprise Server High Availability Extension 16.0 (ppc64le s390x
    x86_64)
    * dlm-kmp-default-6.12.0-160000.8.1
    * kernel-default-debugsource-6.12.0-160000.8.1
    * cluster-md-kmp-default-debuginfo-6.12.0-160000.8.1
    * dlm-kmp-default-debuginfo-6.12.0-160000.8.1
    * gfs2-kmp-default-debuginfo-6.12.0-160000.8.1
    * gfs2-kmp-default-6.12.0-160000.8.1
    * kernel-default-debuginfo-6.12.0-160000.8.1
    * cluster-md-kmp-default-6.12.0-160000.8.1
  * SUSE Linux Enterprise Server High Availability Extension 16.0 (nosrc)
    * kernel-default-6.12.0-160000.8.1

## References:

  * https://www.suse.com/security/cve/CVE-2022-50253.html
  * https://www.suse.com/security/cve/CVE-2025-37916.html
  * https://www.suse.com/security/cve/CVE-2025-38084.html
  * https://www.suse.com/security/cve/CVE-2025-38085.html
  * https://www.suse.com/security/cve/CVE-2025-38321.html
  * https://www.suse.com/security/cve/CVE-2025-38728.html
  * https://www.suse.com/security/cve/CVE-2025-39805.html
  * https://www.suse.com/security/cve/CVE-2025-39819.html
  * https://www.suse.com/security/cve/CVE-2025-39822.html
  * https://www.suse.com/security/cve/CVE-2025-39831.html
  * https://www.suse.com/security/cve/CVE-2025-39859.html
  * https://www.suse.com/security/cve/CVE-2025-39897.html
  * https://www.suse.com/security/cve/CVE-2025-39917.html
  * https://www.suse.com/security/cve/CVE-2025-39944.html
  * https://www.suse.com/security/cve/CVE-2025-39961.html
  * https://www.suse.com/security/cve/CVE-2025-39980.html
  * https://www.suse.com/security/cve/CVE-2025-39990.html
  * https://www.suse.com/security/cve/CVE-2025-40001.html
  * https://www.suse.com/security/cve/CVE-2025-40003.html
  * https://www.suse.com/security/cve/CVE-2025-40006.html
  * https://www.suse.com/security/cve/CVE-2025-40021.html
  * https://www.suse.com/security/cve/CVE-2025-40024.html
  * https://www.suse.com/security/cve/CVE-2025-40027.html
  * https://www.suse.com/security/cve/CVE-2025-40031.html
  * https://www.suse.com/security/cve/CVE-2025-40033.html
  * https://www.suse.com/security/cve/CVE-2025-40038.html
  * https://www.suse.com/security/cve/CVE-2025-40047.html
  * https://www.suse.com/security/cve/CVE-2025-40053.html
  * https://www.suse.com/security/cve/CVE-2025-40055.html
  * https://www.suse.com/security/cve/CVE-2025-40059.html
  * https://www.suse.com/security/cve/CVE-2025-40064.html
  * https://www.suse.com/security/cve/CVE-2025-40070.html
  * https://www.suse.com/security/cve/CVE-2025-40074.html
  * https://www.suse.com/security/cve/CVE-2025-40075.html
  * https://www.suse.com/security/cve/CVE-2025-40081.html
  * https://www.suse.com/security/cve/CVE-2025-40083.html
  * https://www.suse.com/security/cve/CVE-2025-40086.html
  * https://www.suse.com/security/cve/CVE-2025-40098.html
  * https://www.suse.com/security/cve/CVE-2025-40101.html
  * https://www.suse.com/security/cve/CVE-2025-40102.html
  * https://www.suse.com/security/cve/CVE-2025-40105.html
  * https://www.suse.com/security/cve/CVE-2025-40107.html
  * https://www.suse.com/security/cve/CVE-2025-40109.html
  * https://www.suse.com/security/cve/CVE-2025-40110.html
  * https://www.suse.com/security/cve/CVE-2025-40111.html
  * https://www.suse.com/security/cve/CVE-2025-40115.html
  * https://www.suse.com/security/cve/CVE-2025-40116.html
  * https://www.suse.com/security/cve/CVE-2025-40118.html
  * https://www.suse.com/security/cve/CVE-2025-40120.html
  * https://www.suse.com/security/cve/CVE-2025-40121.html
  * https://www.suse.com/security/cve/CVE-2025-40127.html
  * https://www.suse.com/security/cve/CVE-2025-40129.html
  * https://www.suse.com/security/cve/CVE-2025-40132.html
  * https://www.suse.com/security/cve/CVE-2025-40133.html
  * https://www.suse.com/security/cve/CVE-2025-40134.html
  * https://www.suse.com/security/cve/CVE-2025-40135.html
  * https://www.suse.com/security/cve/CVE-2025-40139.html
  * https://www.suse.com/security/cve/CVE-2025-40140.html
  * https://www.suse.com/security/cve/CVE-2025-40141.html
  * https://www.suse.com/security/cve/CVE-2025-40142.html
  * https://www.suse.com/security/cve/CVE-2025-40149.html
  * https://www.suse.com/security/cve/CVE-2025-40153.html
  * https://www.suse.com/security/cve/CVE-2025-40154.html
  * https://www.suse.com/security/cve/CVE-2025-40156.html
  * https://www.suse.com/security/cve/CVE-2025-40157.html
  * https://www.suse.com/security/cve/CVE-2025-40158.html
  * https://www.suse.com/security/cve/CVE-2025-40159.html
  * https://www.suse.com/security/cve/CVE-2025-40161.html
  * https://www.suse.com/security/cve/CVE-2025-40162.html
  * https://www.suse.com/security/cve/CVE-2025-40164.html
  * https://www.suse.com/security/cve/CVE-2025-40165.html
  * https://www.suse.com/security/cve/CVE-2025-40166.html
  * https://www.suse.com/security/cve/CVE-2025-40168.html
  * https://www.suse.com/security/cve/CVE-2025-40169.html
  * https://www.suse.com/security/cve/CVE-2025-40171.html
  * https://www.suse.com/security/cve/CVE-2025-40172.html
  * https://www.suse.com/security/cve/CVE-2025-40173.html
  * https://www.suse.com/security/cve/CVE-2025-40175.html
  * https://www.suse.com/security/cve/CVE-2025-40176.html
  * https://www.suse.com/security/cve/CVE-2025-40177.html
  * https://www.suse.com/security/cve/CVE-2025-40178.html
  * https://www.suse.com/security/cve/CVE-2025-40180.html
  * https://www.suse.com/security/cve/CVE-2025-40183.html
  * https://www.suse.com/security/cve/CVE-2025-40185.html
  * https://www.suse.com/security/cve/CVE-2025-40186.html
  * https://www.suse.com/security/cve/CVE-2025-40187.html
  * https://www.suse.com/security/cve/CVE-2025-40188.html
  * https://www.suse.com/security/cve/CVE-2025-40192.html
  * https://www.suse.com/security/cve/CVE-2025-40194.html
  * https://www.suse.com/security/cve/CVE-2025-40196.html
  * https://www.suse.com/security/cve/CVE-2025-40197.html
  * https://www.suse.com/security/cve/CVE-2025-40198.html
  * https://www.suse.com/security/cve/CVE-2025-40200.html
  * https://www.suse.com/security/cve/CVE-2025-40201.html
  * https://www.suse.com/security/cve/CVE-2025-40202.html
  * https://www.suse.com/security/cve/CVE-2025-40203.html
  * https://www.suse.com/security/cve/CVE-2025-40204.html
  * https://www.suse.com/security/cve/CVE-2025-40205.html
  * https://www.suse.com/security/cve/CVE-2025-40206.html
  * https://www.suse.com/security/cve/CVE-2025-40207.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1235463
  * https://bugzilla.suse.com/show_bug.cgi?id=1243474
  * https://bugzilla.suse.com/show_bug.cgi?id=1245193
  * https://bugzilla.suse.com/show_bug.cgi?id=1245431
  * https://bugzilla.suse.com/show_bug.cgi?id=1245498
  * https://bugzilla.suse.com/show_bug.cgi?id=1245499
  * https://bugzilla.suse.com/show_bug.cgi?id=1246328
  * https://bugzilla.suse.com/show_bug.cgi?id=1246843
  * https://bugzilla.suse.com/show_bug.cgi?id=1247500
  * https://bugzilla.suse.com/show_bug.cgi?id=1248792
  * https://bugzilla.suse.com/show_bug.cgi?id=1249256
  * https://bugzilla.suse.com/show_bug.cgi?id=1249397
  * https://bugzilla.suse.com/show_bug.cgi?id=1249912
  * https://bugzilla.suse.com/show_bug.cgi?id=1249977
  * https://bugzilla.suse.com/show_bug.cgi?id=1249982
  * https://bugzilla.suse.com/show_bug.cgi?id=1250034
  * https://bugzilla.suse.com/show_bug.cgi?id=1250176
  * https://bugzilla.suse.com/show_bug.cgi?id=1250237
  * https://bugzilla.suse.com/show_bug.cgi?id=1250252
  * https://bugzilla.suse.com/show_bug.cgi?id=1250705
  * https://bugzilla.suse.com/show_bug.cgi?id=1250723
  * https://bugzilla.suse.com/show_bug.cgi?id=1250746
  * https://bugzilla.suse.com/show_bug.cgi?id=1251120
  * https://bugzilla.suse.com/show_bug.cgi?id=1251817
  * https://bugzilla.suse.com/show_bug.cgi?id=1252054
  * https://bugzilla.suse.com/show_bug.cgi?id=1252063
  * https://bugzilla.suse.com/show_bug.cgi?id=1252301
  * https://bugzilla.suse.com/show_bug.cgi?id=1252303
  * https://bugzilla.suse.com/show_bug.cgi?id=1252342
  * https://bugzilla.suse.com/show_bug.cgi?id=1252352
  * https://bugzilla.suse.com/show_bug.cgi?id=1252357
  * https://bugzilla.suse.com/show_bug.cgi?id=1252681
  * https://bugzilla.suse.com/show_bug.cgi?id=1252686
  * https://bugzilla.suse.com/show_bug.cgi?id=1252763
  * https://bugzilla.suse.com/show_bug.cgi?id=1252776
  * https://bugzilla.suse.com/show_bug.cgi?id=1252779
  * https://bugzilla.suse.com/show_bug.cgi?id=1252790
  * https://bugzilla.suse.com/show_bug.cgi?id=1252794
  * https://bugzilla.suse.com/show_bug.cgi?id=1252795
  * https://bugzilla.suse.com/show_bug.cgi?id=1252808
  * https://bugzilla.suse.com/show_bug.cgi?id=1252809
  * https://bugzilla.suse.com/show_bug.cgi?id=1252817
  * https://bugzilla.suse.com/show_bug.cgi?id=1252821
  * https://bugzilla.suse.com/show_bug.cgi?id=1252824
  * https://bugzilla.suse.com/show_bug.cgi?id=1252836
  * https://bugzilla.suse.com/show_bug.cgi?id=1252845
  * https://bugzilla.suse.com/show_bug.cgi?id=1252901
  * https://bugzilla.suse.com/show_bug.cgi?id=1252912
  * https://bugzilla.suse.com/show_bug.cgi?id=1252917
  * https://bugzilla.suse.com/show_bug.cgi?id=1252919
  * https://bugzilla.suse.com/show_bug.cgi?id=1252923
  * https://bugzilla.suse.com/show_bug.cgi?id=1252928
  * https://bugzilla.suse.com/show_bug.cgi?id=1253018
  * https://bugzilla.suse.com/show_bug.cgi?id=1253155
  * https://bugzilla.suse.com/show_bug.cgi?id=1253176
  * https://bugzilla.suse.com/show_bug.cgi?id=1253238
  * https://bugzilla.suse.com/show_bug.cgi?id=1253275
  * https://bugzilla.suse.com/show_bug.cgi?id=1253318
  * https://bugzilla.suse.com/show_bug.cgi?id=1253324
  * https://bugzilla.suse.com/show_bug.cgi?id=1253328
  * https://bugzilla.suse.com/show_bug.cgi?id=1253330
  * https://bugzilla.suse.com/show_bug.cgi?id=1253342
  * https://bugzilla.suse.com/show_bug.cgi?id=1253348
  * https://bugzilla.suse.com/show_bug.cgi?id=1253349
  * https://bugzilla.suse.com/show_bug.cgi?id=1253352
  * https://bugzilla.suse.com/show_bug.cgi?id=1253355
  * https://bugzilla.suse.com/show_bug.cgi?id=1253360
  * https://bugzilla.suse.com/show_bug.cgi?id=1253362
  * https://bugzilla.suse.com/show_bug.cgi?id=1253363
  * https://bugzilla.suse.com/show_bug.cgi?id=1253367
  * https://bugzilla.suse.com/show_bug.cgi?id=1253369
  * https://bugzilla.suse.com/show_bug.cgi?id=1253386
  * https://bugzilla.suse.com/show_bug.cgi?id=1253394
  * https://bugzilla.suse.com/show_bug.cgi?id=1253395
  * https://bugzilla.suse.com/show_bug.cgi?id=1253402
  * https://bugzilla.suse.com/show_bug.cgi?id=1253403
  * https://bugzilla.suse.com/show_bug.cgi?id=1253405
  * https://bugzilla.suse.com/show_bug.cgi?id=1253407
  * https://bugzilla.suse.com/show_bug.cgi?id=1253408
  * https://bugzilla.suse.com/show_bug.cgi?id=1253409
  * https://bugzilla.suse.com/show_bug.cgi?id=1253410
  * https://bugzilla.suse.com/show_bug.cgi?id=1253412
  * https://bugzilla.suse.com/show_bug.cgi?id=1253416
  * https://bugzilla.suse.com/show_bug.cgi?id=1253421
  * https://bugzilla.suse.com/show_bug.cgi?id=1253422
  * https://bugzilla.suse.com/show_bug.cgi?id=1253423
  * https://bugzilla.suse.com/show_bug.cgi?id=1253424
  * https://bugzilla.suse.com/show_bug.cgi?id=1253425
  * https://bugzilla.suse.com/show_bug.cgi?id=1253426
  * https://bugzilla.suse.com/show_bug.cgi?id=1253427
  * https://bugzilla.suse.com/show_bug.cgi?id=1253428
  * https://bugzilla.suse.com/show_bug.cgi?id=1253431
  * https://bugzilla.suse.com/show_bug.cgi?id=1253433
  * https://bugzilla.suse.com/show_bug.cgi?id=1253436
  * https://bugzilla.suse.com/show_bug.cgi?id=1253438
  * https://bugzilla.suse.com/show_bug.cgi?id=1253440
  * https://bugzilla.suse.com/show_bug.cgi?id=1253441
  * https://bugzilla.suse.com/show_bug.cgi?id=1253443
  * https://bugzilla.suse.com/show_bug.cgi?id=1253445
  * https://bugzilla.suse.com/show_bug.cgi?id=1253448
  * https://bugzilla.suse.com/show_bug.cgi?id=1253449
  * https://bugzilla.suse.com/show_bug.cgi?id=1253450
  * https://bugzilla.suse.com/show_bug.cgi?id=1253451
  * https://bugzilla.suse.com/show_bug.cgi?id=1253453
  * https://bugzilla.suse.com/show_bug.cgi?id=1253455
  * https://bugzilla.suse.com/show_bug.cgi?id=1253456
  * https://bugzilla.suse.com/show_bug.cgi?id=1253457
  * https://bugzilla.suse.com/show_bug.cgi?id=1253463
  * https://bugzilla.suse.com/show_bug.cgi?id=1253472
  * https://bugzilla.suse.com/show_bug.cgi?id=1253622
  * https://bugzilla.suse.com/show_bug.cgi?id=1253624
  * https://bugzilla.suse.com/show_bug.cgi?id=1253635
  * https://bugzilla.suse.com/show_bug.cgi?id=1253643
  * https://bugzilla.suse.com/show_bug.cgi?id=1253647
  * https://bugzilla.suse.com/show_bug.cgi?id=1254119
  * https://bugzilla.suse.com/show_bug.cgi?id=1254181
  * https://bugzilla.suse.com/show_bug.cgi?id=1254221
  * https://bugzilla.suse.com/show_bug.cgi?id=1254308
  * https://bugzilla.suse.com/show_bug.cgi?id=1254315
  * https://jira.suse.com/browse/PED-13611
  * https://jira.suse.com/browse/PED-13949
  * https://jira.suse.com/browse/PED-14062
  * https://jira.suse.com/browse/PED-14115
  * https://jira.suse.com/browse/PED-14353

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20260109/f5e33ded/attachment.htm>


More information about the sle-security-updates mailing list