SUSE-SU-2026:1078-1: important: Security update for the Linux Kernel
SLE-SECURITY-UPDATES
null at suse.de
Thu Mar 26 20:37:39 UTC 2026
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2026:1078-1
Release Date: 2026-03-26T12:43:14Z
Rating: important
References:
* bsc#1215420
* bsc#1218752
* bsc#1238917
* bsc#1241414
* bsc#1241596
* bsc#1249587
* bsc#1249998
* bsc#1250887
* bsc#1251966
* bsc#1252073
* bsc#1252911
* bsc#1252924
* bsc#1254518
* bsc#1254520
* bsc#1254723
* bsc#1254725
* bsc#1254958
* bsc#1254992
* bsc#1255049
* bsc#1255075
* bsc#1255129
* bsc#1255152
* bsc#1255163
* bsc#1255274
* bsc#1255357
* bsc#1255379
* bsc#1255401
* bsc#1255416
* bsc#1255550
* bsc#1255991
* bsc#1256629
* bsc#1256675
* bsc#1256708
* bsc#1256716
* bsc#1256742
* bsc#1256744
* bsc#1257209
* bsc#1257220
* bsc#1257231
* bsc#1257246
* bsc#1257473
* bsc#1257631
* bsc#1257635
* bsc#1257672
* bsc#1257687
* bsc#1257732
* bsc#1257735
* bsc#1257745
* bsc#1257749
* bsc#1257755
* bsc#1257757
* bsc#1257758
* bsc#1257765
* bsc#1257775
* bsc#1257790
* bsc#1257808
* bsc#1257816
* bsc#1257830
* bsc#1257942
* bsc#1257949
* bsc#1258153
* bsc#1258184
* bsc#1258226
* bsc#1258293
* bsc#1258321
* bsc#1258340
* bsc#1258377
* bsc#1258395
* bsc#1258442
* bsc#1258468
* bsc#1258518
* bsc#1258824
* bsc#1258849
* bsc#1258850
* bsc#1259069
* bsc#1259857
Cross-References:
* CVE-2022-50453
* CVE-2023-53794
* CVE-2023-53802
* CVE-2023-53808
* CVE-2023-53816
* CVE-2023-53817
* CVE-2023-53827
* CVE-2023-54184
* CVE-2023-6040
* CVE-2025-21738
* CVE-2025-22083
* CVE-2025-22125
* CVE-2025-39748
* CVE-2025-39817
* CVE-2025-39964
* CVE-2025-39998
* CVE-2025-40099
* CVE-2025-40103
* CVE-2025-40219
* CVE-2025-40220
* CVE-2025-40242
* CVE-2025-40342
* CVE-2025-68223
* CVE-2025-68234
* CVE-2025-68283
* CVE-2025-68285
* CVE-2025-68287
* CVE-2025-68295
* CVE-2025-68724
* CVE-2025-68818
* CVE-2025-71075
* CVE-2025-71104
* CVE-2025-71113
* CVE-2025-71116
* CVE-2025-71131
* CVE-2025-71183
* CVE-2025-71184
* CVE-2025-71194
* CVE-2025-71224
* CVE-2025-71236
* CVE-2026-22991
* CVE-2026-22998
* CVE-2026-23003
* CVE-2026-23004
* CVE-2026-23054
* CVE-2026-23060
* CVE-2026-23064
* CVE-2026-23069
* CVE-2026-23074
* CVE-2026-23083
* CVE-2026-23084
* CVE-2026-23085
* CVE-2026-23086
* CVE-2026-23089
* CVE-2026-23095
* CVE-2026-23099
* CVE-2026-23105
* CVE-2026-23112
* CVE-2026-23125
* CVE-2026-23141
* CVE-2026-23191
* CVE-2026-23198
* CVE-2026-23204
* CVE-2026-23208
* CVE-2026-23209
* CVE-2026-23268
* CVE-2026-23269
* CVE-2026-25702
CVSS scores:
* CVE-2022-50453 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50453 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53794 ( SUSE ): 7.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53794 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53816 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
* CVE-2023-53817 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53827 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53827 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-54184 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-54184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-6040 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2023-6040 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-6040 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21738 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21738 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21738 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22083 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-22125 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22125 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39748 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39817 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-39964 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39964 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-39964 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-39998 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39998 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40099 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40099 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-40103 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40103 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40219 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40219 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40220 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40220 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40242 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40242 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40342 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40342 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68223 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68223 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68234 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68283 ( SUSE ): 5.9
CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68283 ( SUSE ): 6.4 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-68285 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-68285 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-68287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-68818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71075 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-71104 ( SUSE ): 8.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
* CVE-2025-71104 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2025-71104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71113 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71113 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-71113 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71116 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71116 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-71116 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-71131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71131 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71183 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71194 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71194 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71224 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-71224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71236 ( SUSE ): 5.1
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-71236 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-71236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22991 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22998 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-22998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-22998 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23003 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23003 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-23003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23004 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23004 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23004 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23054 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23060 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23060 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23064 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23069 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23069 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23074 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23074 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23083 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2026-23083 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2026-23083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23084 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23085 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23086 ( SUSE ): 6.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H
* CVE-2026-23086 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2026-23086 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23089 ( SUSE ): 5.2
CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23089 ( SUSE ): 5.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-23089 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23095 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23099 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23099 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-23105 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23105 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23105 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23112 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23112 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2026-23112 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23125 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23125 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23141 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23191 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23191 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-23191 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23198 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23198 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2026-23204 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2026-23204 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2026-23208 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2026-23208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23209 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23268 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23268 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2026-23269 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2026-23269 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2026-25702 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-25702 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2026-25702 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* SUSE Linux Enterprise High Performance Computing 12 SP5
* SUSE Linux Enterprise Live Patching 12-SP5
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server 12 SP5 LTSS
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
An update that solves 68 vulnerabilities and has eight security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2022-50453: gpiolib: cdev: fix NULL-pointer dereferences (bsc#1250887).
* CVE-2023-53794: cifs: fix session state check in reconnect to avoid use-
after-free issue (bsc#1255163).
* CVE-2023-53802: wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if
there is no callback function (bsc#1254725).
* CVE-2023-53808: wifi: mwifiex: fix memory leak in mwifiex_histogram_read()
(bsc#1254723).
* CVE-2023-53816: drm/amdkfd: fix potential kgd_mem UAFs (bsc#1254958).
* CVE-2023-53817: crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui()
(bsc#1254992).
* CVE-2023-53827: Bluetooth: L2CAP: Fix use-after-free in
l2cap_disconnect_{req,rsp} (bsc#1255049).
* CVE-2023-54184: scsi: target: iscsit: Free cmds before session free
(bsc#1255991).
* CVE-2025-21738: ata: libata-sff: Ensure that we cannot write outside the
allocated buffer (bsc#1238917).
* CVE-2025-22083: vhost-scsi: Fix handling of multiple calls to
vhost_scsi_set_endpoint (bsc#1241414).
* CVE-2025-22125: md/raid1,raid10: do not ignore IO flags (bsc#1241596).
* CVE-2025-39748: bpf: Forget ranges when refining tnum after JSET
(bsc#1249587).
* CVE-2025-39817: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare
(bsc#1249998).
* CVE-2025-39964: crypto: af_alg - Disallow concurrent writes in
af_alg_sendmsg (bsc#1251966).
* CVE-2025-39998: scsi: target: target_core_configfs: Add length check to
avoid buffer overflow (bsc#1252073).
* CVE-2025-40099: cifs: parse_dfs_referrals: prevent oob on malformed input
(bsc#1252911).
* CVE-2025-40103: smb: client: Fix refcount leak for cifs_sb_tlink
(bsc#1252924).
* CVE-2025-40219: PCI/IOV: Add PCI rescan-remove locking when
enabling/disabling SR-IOV (bsc#1254518).
* CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk
workers (bsc#1254520).
* CVE-2025-40242: gfs2: Fix unlikely race in gdlm_put_lock (bsc#1255075).
* CVE-2025-40342: nvme-fc: use lock accessing port_state and rport state
(bsc#1255274).
* CVE-2025-68223: drm/radeon: delete radeon_fence_process in is_signaled, no
deadlock (bsc#1255357).
* CVE-2025-68234: scsi: imm: Fix use-after-free bug caused by unfinished
delayed work (bsc#1255416).
* CVE-2025-68283: libceph: replace BUG_ON with bounds check for map->max_osd
(bsc#1255379).
* CVE-2025-68285: libceph: fix potential use-after-free in
have_mon_and_osd_map() (bsc#1255401).
* CVE-2025-68287: usb: dwc3: Fix race condition between concurrent
dwc3_remove_requests() call paths (bsc#1255152).
* CVE-2025-68295: smb: client: fix memory leak in cifs_construct_tcon()
(bsc#1255129).
* CVE-2025-68724: crypto: asymmetric_keys - prevent overflow in
asymmetric_key_generate_id (bsc#1255550).
* CVE-2025-68818: scsi: qla2xxx: Perform lockless command completion in abort
path (bsc#1256675).
* CVE-2025-71075: scsi: aic94xx: fix use-after-free in device removal path
(bsc#1256629).
* CVE-2025-71104: KVM: x86: Fix VM hard lockup after prolonged inactivity with
periodic HV timer (bsc#1256708).
* CVE-2025-71113: crypto: af_alg - zero initialize memory allocated via
sock_kmalloc (bsc#1256716).
* CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted
osdmaps (bsc#1256744).
* CVE-2025-71131: crypto: seqiv - Do not use req->iv after crypto_aead_encrypt
(bsc#1256742).
* CVE-2025-71183: btrfs: always detect conflicting inodes when logging inode
refs (bsc#1257631).
* CVE-2025-71184: btrfs: fix NULL dereference on root when tracing inode
eviction (bsc#1257635).
* CVE-2025-71194: btrfs: fix deadlock in wait_current_trans() due to ignored
transaction type (bsc#1257687).
* CVE-2025-71224: wifi: mac80211: ocb: skip rx_no_sta when interface is not
joined (bsc#1258824).
* CVE-2025-71236: scsi: qla2xxx: Validate sp before freeing associated memory
(bsc#1258442).
* CVE-2026-22991: libceph: make free_choose_arg_map() resilient to partial
allocation (bsc#1257220).
* CVE-2026-22998: nvme-tcp: fix NULL pointer dereferences in
nvmet_tcp_build_pdu_iovec (bsc#1257209).
* CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and
rt_del_uncached_list() (bsc#1257231).
* CVE-2026-23054: net: hv_netvsc: reject RSS hash key programming without RX
indirection table (bsc#1257732).
* CVE-2026-23060: crypto: authencesn - reject too-short AAD (assoclen<8) to
match ESP/ESN spec (bsc#1257735).
* CVE-2026-23064: net/sched: act_ife: avoid possible NULL deref (bsc#1257765).
* CVE-2026-23069: vsock/virtio: fix potential underflow in
virtio_transport_get_credit() (bsc#1257755).
* CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc
(bsc#1257749).
* CVE-2026-23083: fou: Don't allow 0 for FOU_ATTR_IPPROTO (bsc#1257745).
* CVE-2026-23084: be2net: Fix NULL pointer dereference in
be_cmd_get_mac_from_list (bsc#1257830).
* CVE-2026-23085: irqchip/gic-v3-its: Avoid truncating memory addresses
(bsc#1257758).
* CVE-2026-23086: vsock/virtio: cap TX credit to local buffer size
(bsc#1257757).
* CVE-2026-23089: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free()
(bsc#1257790).
* CVE-2026-23095: gue: Fix skb memleak with inner IP protocol 0 (bsc#1257808).
* CVE-2026-23099: bonding: limit BOND_MODE_8023AD to Ethernet devices
(bsc#1257816).
* CVE-2026-23105: net/sched: qfq: Use cl_is_active to determine whether class
is active in qfq_rm_from_ag (bsc#1257775).
* CVE-2026-23112: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec
(bsc#1258184).
* CVE-2026-23125: sctp: move SCTP_CMD_ASSOC_SHKEY right after
SCTP_CMD_PEER_INIT (bsc#1258293).
* CVE-2026-23141: btrfs: send: check for inline extents in
range_is_hole_in_parent() (bsc#1258377).
* CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258395).
* CVE-2026-23198: KVM: Don't clobber irqfd routing type when deassigning irqfd
(bsc#1258321).
* CVE-2026-23204: net/sched: cls_u32: use skb_header_pointer_careful()
(bsc#1258340).
* CVE-2026-23208: ALSA: usb-audio: Prevent excessive number of frames
(bsc#1258468).
* CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink()
(bsc#1258518).
* CVE-2026-23268: apparmor: fix unprivileged local user can do privileged
policy management (bsc#1258850).
* CVE-2026-23269: apparmor: validate DFA start states are in bounds in
unpack_pdb (bsc#1259857).
The following non-security bugs were fixed:
* apparmor: Fix double free of ns_name in aa_replace_profiles() (bsc#1258849).
* apparmor: fix memory leak in verify_header (bsc#1258849).
* apparmor: fix unprivileged local user can do privileged policy management
(bsc#1258849).
* apparmor: fix: limit the number of levels of policy namespaces
(bsc#1258849).
* apparmor: replace recursive profile removal with iterative approach
(bsc#1258849).
* apparmor: validate DFA start states are in bounds in unpack_pdb
(bsc#1258849).
* drm/mgag200: fix mgag200_bmc_stop_scanout() (bsc#1258153 bsc#1258226)
* md/raid1,raid10: do not handle IO error for REQ_RAHEAD and REQ_NOWAIT (git-
fixes).
* md/raid1,raid10: strip REQ_NOWAIT from member bios (git-fixes).
* net/mlx5: Ensure fw pages are always allocated on same NUMA (git-fixes).
* usb: storage: Fix memory leak in USB bulk transport (bsc#1257949).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 12-SP5
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2026-1078=1
* SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-1078=1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-1078=1
## Package List:
* SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
* kernel-default-4.12.14-122.296.1
* SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
* kernel-default-debuginfo-4.12.14-122.296.1
* kernel-default-kgraft-4.12.14-122.296.1
* kernel-default-kgraft-devel-4.12.14-122.296.1
* kernel-default-debugsource-4.12.14-122.296.1
* kgraft-patch-4_12_14-122_296-default-1-8.3.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* ocfs2-kmp-default-4.12.14-122.296.1
* dlm-kmp-default-4.12.14-122.296.1
* kernel-default-debuginfo-4.12.14-122.296.1
* kernel-syms-4.12.14-122.296.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.296.1
* kernel-default-base-4.12.14-122.296.1
* kernel-default-base-debuginfo-4.12.14-122.296.1
* kernel-default-devel-4.12.14-122.296.1
* gfs2-kmp-default-debuginfo-4.12.14-122.296.1
* cluster-md-kmp-default-4.12.14-122.296.1
* kernel-default-debugsource-4.12.14-122.296.1
* gfs2-kmp-default-4.12.14-122.296.1
* cluster-md-kmp-default-debuginfo-4.12.14-122.296.1
* dlm-kmp-default-debuginfo-4.12.14-122.296.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-4.12.14-122.296.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
* kernel-macros-4.12.14-122.296.1
* kernel-source-4.12.14-122.296.1
* kernel-devel-4.12.14-122.296.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (s390x)
* kernel-default-man-4.12.14-122.296.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64)
* kernel-default-devel-debuginfo-4.12.14-122.296.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
* ocfs2-kmp-default-4.12.14-122.296.1
* dlm-kmp-default-4.12.14-122.296.1
* kernel-default-debuginfo-4.12.14-122.296.1
* kernel-syms-4.12.14-122.296.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.296.1
* kernel-default-base-4.12.14-122.296.1
* kernel-default-base-debuginfo-4.12.14-122.296.1
* kernel-default-devel-4.12.14-122.296.1
* gfs2-kmp-default-debuginfo-4.12.14-122.296.1
* cluster-md-kmp-default-4.12.14-122.296.1
* kernel-default-devel-debuginfo-4.12.14-122.296.1
* kernel-default-debugsource-4.12.14-122.296.1
* gfs2-kmp-default-4.12.14-122.296.1
* cluster-md-kmp-default-debuginfo-4.12.14-122.296.1
* dlm-kmp-default-debuginfo-4.12.14-122.296.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64)
* kernel-default-4.12.14-122.296.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
* kernel-macros-4.12.14-122.296.1
* kernel-source-4.12.14-122.296.1
* kernel-devel-4.12.14-122.296.1
## References:
* https://www.suse.com/security/cve/CVE-2022-50453.html
* https://www.suse.com/security/cve/CVE-2023-53794.html
* https://www.suse.com/security/cve/CVE-2023-53802.html
* https://www.suse.com/security/cve/CVE-2023-53808.html
* https://www.suse.com/security/cve/CVE-2023-53816.html
* https://www.suse.com/security/cve/CVE-2023-53817.html
* https://www.suse.com/security/cve/CVE-2023-53827.html
* https://www.suse.com/security/cve/CVE-2023-54184.html
* https://www.suse.com/security/cve/CVE-2023-6040.html
* https://www.suse.com/security/cve/CVE-2025-21738.html
* https://www.suse.com/security/cve/CVE-2025-22083.html
* https://www.suse.com/security/cve/CVE-2025-22125.html
* https://www.suse.com/security/cve/CVE-2025-39748.html
* https://www.suse.com/security/cve/CVE-2025-39817.html
* https://www.suse.com/security/cve/CVE-2025-39964.html
* https://www.suse.com/security/cve/CVE-2025-39998.html
* https://www.suse.com/security/cve/CVE-2025-40099.html
* https://www.suse.com/security/cve/CVE-2025-40103.html
* https://www.suse.com/security/cve/CVE-2025-40219.html
* https://www.suse.com/security/cve/CVE-2025-40220.html
* https://www.suse.com/security/cve/CVE-2025-40242.html
* https://www.suse.com/security/cve/CVE-2025-40342.html
* https://www.suse.com/security/cve/CVE-2025-68223.html
* https://www.suse.com/security/cve/CVE-2025-68234.html
* https://www.suse.com/security/cve/CVE-2025-68283.html
* https://www.suse.com/security/cve/CVE-2025-68285.html
* https://www.suse.com/security/cve/CVE-2025-68287.html
* https://www.suse.com/security/cve/CVE-2025-68295.html
* https://www.suse.com/security/cve/CVE-2025-68724.html
* https://www.suse.com/security/cve/CVE-2025-68818.html
* https://www.suse.com/security/cve/CVE-2025-71075.html
* https://www.suse.com/security/cve/CVE-2025-71104.html
* https://www.suse.com/security/cve/CVE-2025-71113.html
* https://www.suse.com/security/cve/CVE-2025-71116.html
* https://www.suse.com/security/cve/CVE-2025-71131.html
* https://www.suse.com/security/cve/CVE-2025-71183.html
* https://www.suse.com/security/cve/CVE-2025-71184.html
* https://www.suse.com/security/cve/CVE-2025-71194.html
* https://www.suse.com/security/cve/CVE-2025-71224.html
* https://www.suse.com/security/cve/CVE-2025-71236.html
* https://www.suse.com/security/cve/CVE-2026-22991.html
* https://www.suse.com/security/cve/CVE-2026-22998.html
* https://www.suse.com/security/cve/CVE-2026-23003.html
* https://www.suse.com/security/cve/CVE-2026-23004.html
* https://www.suse.com/security/cve/CVE-2026-23054.html
* https://www.suse.com/security/cve/CVE-2026-23060.html
* https://www.suse.com/security/cve/CVE-2026-23064.html
* https://www.suse.com/security/cve/CVE-2026-23069.html
* https://www.suse.com/security/cve/CVE-2026-23074.html
* https://www.suse.com/security/cve/CVE-2026-23083.html
* https://www.suse.com/security/cve/CVE-2026-23084.html
* https://www.suse.com/security/cve/CVE-2026-23085.html
* https://www.suse.com/security/cve/CVE-2026-23086.html
* https://www.suse.com/security/cve/CVE-2026-23089.html
* https://www.suse.com/security/cve/CVE-2026-23095.html
* https://www.suse.com/security/cve/CVE-2026-23099.html
* https://www.suse.com/security/cve/CVE-2026-23105.html
* https://www.suse.com/security/cve/CVE-2026-23112.html
* https://www.suse.com/security/cve/CVE-2026-23125.html
* https://www.suse.com/security/cve/CVE-2026-23141.html
* https://www.suse.com/security/cve/CVE-2026-23191.html
* https://www.suse.com/security/cve/CVE-2026-23198.html
* https://www.suse.com/security/cve/CVE-2026-23204.html
* https://www.suse.com/security/cve/CVE-2026-23208.html
* https://www.suse.com/security/cve/CVE-2026-23209.html
* https://www.suse.com/security/cve/CVE-2026-23268.html
* https://www.suse.com/security/cve/CVE-2026-23269.html
* https://www.suse.com/security/cve/CVE-2026-25702.html
* https://bugzilla.suse.com/show_bug.cgi?id=1215420
* https://bugzilla.suse.com/show_bug.cgi?id=1218752
* https://bugzilla.suse.com/show_bug.cgi?id=1238917
* https://bugzilla.suse.com/show_bug.cgi?id=1241414
* https://bugzilla.suse.com/show_bug.cgi?id=1241596
* https://bugzilla.suse.com/show_bug.cgi?id=1249587
* https://bugzilla.suse.com/show_bug.cgi?id=1249998
* https://bugzilla.suse.com/show_bug.cgi?id=1250887
* https://bugzilla.suse.com/show_bug.cgi?id=1251966
* https://bugzilla.suse.com/show_bug.cgi?id=1252073
* https://bugzilla.suse.com/show_bug.cgi?id=1252911
* https://bugzilla.suse.com/show_bug.cgi?id=1252924
* https://bugzilla.suse.com/show_bug.cgi?id=1254518
* https://bugzilla.suse.com/show_bug.cgi?id=1254520
* https://bugzilla.suse.com/show_bug.cgi?id=1254723
* https://bugzilla.suse.com/show_bug.cgi?id=1254725
* https://bugzilla.suse.com/show_bug.cgi?id=1254958
* https://bugzilla.suse.com/show_bug.cgi?id=1254992
* https://bugzilla.suse.com/show_bug.cgi?id=1255049
* https://bugzilla.suse.com/show_bug.cgi?id=1255075
* https://bugzilla.suse.com/show_bug.cgi?id=1255129
* https://bugzilla.suse.com/show_bug.cgi?id=1255152
* https://bugzilla.suse.com/show_bug.cgi?id=1255163
* https://bugzilla.suse.com/show_bug.cgi?id=1255274
* https://bugzilla.suse.com/show_bug.cgi?id=1255357
* https://bugzilla.suse.com/show_bug.cgi?id=1255379
* https://bugzilla.suse.com/show_bug.cgi?id=1255401
* https://bugzilla.suse.com/show_bug.cgi?id=1255416
* https://bugzilla.suse.com/show_bug.cgi?id=1255550
* https://bugzilla.suse.com/show_bug.cgi?id=1255991
* https://bugzilla.suse.com/show_bug.cgi?id=1256629
* https://bugzilla.suse.com/show_bug.cgi?id=1256675
* https://bugzilla.suse.com/show_bug.cgi?id=1256708
* https://bugzilla.suse.com/show_bug.cgi?id=1256716
* https://bugzilla.suse.com/show_bug.cgi?id=1256742
* https://bugzilla.suse.com/show_bug.cgi?id=1256744
* https://bugzilla.suse.com/show_bug.cgi?id=1257209
* https://bugzilla.suse.com/show_bug.cgi?id=1257220
* https://bugzilla.suse.com/show_bug.cgi?id=1257231
* https://bugzilla.suse.com/show_bug.cgi?id=1257246
* https://bugzilla.suse.com/show_bug.cgi?id=1257473
* https://bugzilla.suse.com/show_bug.cgi?id=1257631
* https://bugzilla.suse.com/show_bug.cgi?id=1257635
* https://bugzilla.suse.com/show_bug.cgi?id=1257672
* https://bugzilla.suse.com/show_bug.cgi?id=1257687
* https://bugzilla.suse.com/show_bug.cgi?id=1257732
* https://bugzilla.suse.com/show_bug.cgi?id=1257735
* https://bugzilla.suse.com/show_bug.cgi?id=1257745
* https://bugzilla.suse.com/show_bug.cgi?id=1257749
* https://bugzilla.suse.com/show_bug.cgi?id=1257755
* https://bugzilla.suse.com/show_bug.cgi?id=1257757
* https://bugzilla.suse.com/show_bug.cgi?id=1257758
* https://bugzilla.suse.com/show_bug.cgi?id=1257765
* https://bugzilla.suse.com/show_bug.cgi?id=1257775
* https://bugzilla.suse.com/show_bug.cgi?id=1257790
* https://bugzilla.suse.com/show_bug.cgi?id=1257808
* https://bugzilla.suse.com/show_bug.cgi?id=1257816
* https://bugzilla.suse.com/show_bug.cgi?id=1257830
* https://bugzilla.suse.com/show_bug.cgi?id=1257942
* https://bugzilla.suse.com/show_bug.cgi?id=1257949
* https://bugzilla.suse.com/show_bug.cgi?id=1258153
* https://bugzilla.suse.com/show_bug.cgi?id=1258184
* https://bugzilla.suse.com/show_bug.cgi?id=1258226
* https://bugzilla.suse.com/show_bug.cgi?id=1258293
* https://bugzilla.suse.com/show_bug.cgi?id=1258321
* https://bugzilla.suse.com/show_bug.cgi?id=1258340
* https://bugzilla.suse.com/show_bug.cgi?id=1258377
* https://bugzilla.suse.com/show_bug.cgi?id=1258395
* https://bugzilla.suse.com/show_bug.cgi?id=1258442
* https://bugzilla.suse.com/show_bug.cgi?id=1258468
* https://bugzilla.suse.com/show_bug.cgi?id=1258518
* https://bugzilla.suse.com/show_bug.cgi?id=1258824
* https://bugzilla.suse.com/show_bug.cgi?id=1258849
* https://bugzilla.suse.com/show_bug.cgi?id=1258850
* https://bugzilla.suse.com/show_bug.cgi?id=1259069
* https://bugzilla.suse.com/show_bug.cgi?id=1259857
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20260326/50f25870/attachment.htm>
More information about the sle-security-updates
mailing list