|
|
Log in / Subscribe / Register

SUSE alert SUSE-SU-2026:1078-1 (kernel)

From:  SLE-SECURITY-UPDATES <null@suse.de>
To:  sle-security-updates@lists.suse.com
Subject:  SUSE-SU-2026:1078-1: important: Security update for the Linux Kernel
Date:  Thu, 26 Mar 2026 20:37:39 -0000
Message-ID:  <177455745932.1119.624517335461957620@c498d0a85550>

# Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:1078-1 Release Date: 2026-03-26T12:43:14Z Rating: important References: * bsc#1215420 * bsc#1218752 * bsc#1238917 * bsc#1241414 * bsc#1241596 * bsc#1249587 * bsc#1249998 * bsc#1250887 * bsc#1251966 * bsc#1252073 * bsc#1252911 * bsc#1252924 * bsc#1254518 * bsc#1254520 * bsc#1254723 * bsc#1254725 * bsc#1254958 * bsc#1254992 * bsc#1255049 * bsc#1255075 * bsc#1255129 * bsc#1255152 * bsc#1255163 * bsc#1255274 * bsc#1255357 * bsc#1255379 * bsc#1255401 * bsc#1255416 * bsc#1255550 * bsc#1255991 * bsc#1256629 * bsc#1256675 * bsc#1256708 * bsc#1256716 * bsc#1256742 * bsc#1256744 * bsc#1257209 * bsc#1257220 * bsc#1257231 * bsc#1257246 * bsc#1257473 * bsc#1257631 * bsc#1257635 * bsc#1257672 * bsc#1257687 * bsc#1257732 * bsc#1257735 * bsc#1257745 * bsc#1257749 * bsc#1257755 * bsc#1257757 * bsc#1257758 * bsc#1257765 * bsc#1257775 * bsc#1257790 * bsc#1257808 * bsc#1257816 * bsc#1257830 * bsc#1257942 * bsc#1257949 * bsc#1258153 * bsc#1258184 * bsc#1258226 * bsc#1258293 * bsc#1258321 * bsc#1258340 * bsc#1258377 * bsc#1258395 * bsc#1258442 * bsc#1258468 * bsc#1258518 * bsc#1258824 * bsc#1258849 * bsc#1258850 * bsc#1259069 * bsc#1259857 Cross-References: * CVE-2022-50453 * CVE-2023-53794 * CVE-2023-53802 * CVE-2023-53808 * CVE-2023-53816 * CVE-2023-53817 * CVE-2023-53827 * CVE-2023-54184 * CVE-2023-6040 * CVE-2025-21738 * CVE-2025-22083 * CVE-2025-22125 * CVE-2025-39748 * CVE-2025-39817 * CVE-2025-39964 * CVE-2025-39998 * CVE-2025-40099 * CVE-2025-40103 * CVE-2025-40219 * CVE-2025-40220 * CVE-2025-40242 * CVE-2025-40342 * CVE-2025-68223 * CVE-2025-68234 * CVE-2025-68283 * CVE-2025-68285 * CVE-2025-68287 * CVE-2025-68295 * CVE-2025-68724 * CVE-2025-68818 * CVE-2025-71075 * CVE-2025-71104 * CVE-2025-71113 * CVE-2025-71116 * CVE-2025-71131 * CVE-2025-71183 * CVE-2025-71184 * CVE-2025-71194 * CVE-2025-71224 * CVE-2025-71236 * CVE-2026-22991 * CVE-2026-22998 * CVE-2026-23003 * CVE-2026-23004 * CVE-2026-23054 * CVE-2026-23060 * CVE-2026-23064 * CVE-2026-23069 * CVE-2026-23074 * CVE-2026-23083 * CVE-2026-23084 * CVE-2026-23085 * CVE-2026-23086 * CVE-2026-23089 * CVE-2026-23095 * CVE-2026-23099 * CVE-2026-23105 * CVE-2026-23112 * CVE-2026-23125 * CVE-2026-23141 * CVE-2026-23191 * CVE-2026-23198 * CVE-2026-23204 * CVE-2026-23208 * CVE-2026-23209 * CVE-2026-23268 * CVE-2026-23269 * CVE-2026-25702 CVSS scores: * CVE-2022-50453 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50453 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50453 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53794 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53794 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53816 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53817 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53827 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53827 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54184 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-6040 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2023-6040 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-6040 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21738 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21738 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21738 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22083 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22125 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39748 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39817 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39817 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39964 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39964 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-39964 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-39998 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39998 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40099 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40099 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40103 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40103 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40219 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40219 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40220 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40220 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40242 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40242 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40342 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40342 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68223 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68223 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68223 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68234 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68283 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68283 ( SUSE ): 6.4 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-68285 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68285 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68295 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71075 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-71104 ( SUSE ): 8.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H * CVE-2025-71104 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2025-71104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71113 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-71113 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-71113 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71116 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71116 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-71116 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-71131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71131 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71183 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71183 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71184 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71194 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71194 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71224 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71224 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71236 ( SUSE ): 5.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-71236 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71236 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22991 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22998 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-22998 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23003 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2026-23003 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2026-23003 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23004 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-23004 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-23004 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23054 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23060 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23060 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23064 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23069 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23069 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23069 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23074 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-23074 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-23074 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-23083 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-23083 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2026-23083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-23084 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23085 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23085 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23085 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23086 ( SUSE ): 6.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H * CVE-2026-23086 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2026-23086 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23089 ( SUSE ): 5.2 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23089 ( SUSE ): 5.9 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2026-23089 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-23095 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23095 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23099 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23099 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2026-23105 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23105 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23105 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23112 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23112 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2026-23112 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-23125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23125 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23191 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23191 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2026-23191 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-23198 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23198 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23204 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2026-23204 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2026-23208 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2026-23208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-23209 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-23209 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-23209 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-23268 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-23268 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-23269 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-23269 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2026-25702 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-25702 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2026-25702 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves 68 vulnerabilities and has eight security fixes can now be installed. ## Description: The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-50453: gpiolib: cdev: fix NULL-pointer dereferences (bsc#1250887). * CVE-2023-53794: cifs: fix session state check in reconnect to avoid use- after-free issue (bsc#1255163). * CVE-2023-53802: wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function (bsc#1254725). * CVE-2023-53808: wifi: mwifiex: fix memory leak in mwifiex_histogram_read() (bsc#1254723). * CVE-2023-53816: drm/amdkfd: fix potential kgd_mem UAFs (bsc#1254958). * CVE-2023-53817: crypto: lib/mpi - avoid null pointer deref in mpi_cmp_ui() (bsc#1254992). * CVE-2023-53827: Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp} (bsc#1255049). * CVE-2023-54184: scsi: target: iscsit: Free cmds before session free (bsc#1255991). * CVE-2025-21738: ata: libata-sff: Ensure that we cannot write outside the allocated buffer (bsc#1238917). * CVE-2025-22083: vhost-scsi: Fix handling of multiple calls to vhost_scsi_set_endpoint (bsc#1241414). * CVE-2025-22125: md/raid1,raid10: do not ignore IO flags (bsc#1241596). * CVE-2025-39748: bpf: Forget ranges when refining tnum after JSET (bsc#1249587). * CVE-2025-39817: efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare (bsc#1249998). * CVE-2025-39964: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg (bsc#1251966). * CVE-2025-39998: scsi: target: target_core_configfs: Add length check to avoid buffer overflow (bsc#1252073). * CVE-2025-40099: cifs: parse_dfs_referrals: prevent oob on malformed input (bsc#1252911). * CVE-2025-40103: smb: client: Fix refcount leak for cifs_sb_tlink (bsc#1252924). * CVE-2025-40219: PCI/IOV: Add PCI rescan-remove locking when enabling/disabling SR-IOV (bsc#1254518). * CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520). * CVE-2025-40242: gfs2: Fix unlikely race in gdlm_put_lock (bsc#1255075). * CVE-2025-40342: nvme-fc: use lock accessing port_state and rport state (bsc#1255274). * CVE-2025-68223: drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (bsc#1255357). * CVE-2025-68234: scsi: imm: Fix use-after-free bug caused by unfinished delayed work (bsc#1255416). * CVE-2025-68283: libceph: replace BUG_ON with bounds check for map->max_osd (bsc#1255379). * CVE-2025-68285: libceph: fix potential use-after-free in have_mon_and_osd_map() (bsc#1255401). * CVE-2025-68287: usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths (bsc#1255152). * CVE-2025-68295: smb: client: fix memory leak in cifs_construct_tcon() (bsc#1255129). * CVE-2025-68724: crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id (bsc#1255550). * CVE-2025-68818: scsi: qla2xxx: Perform lockless command completion in abort path (bsc#1256675). * CVE-2025-71075: scsi: aic94xx: fix use-after-free in device removal path (bsc#1256629). * CVE-2025-71104: KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer (bsc#1256708). * CVE-2025-71113: crypto: af_alg - zero initialize memory allocated via sock_kmalloc (bsc#1256716). * CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted osdmaps (bsc#1256744). * CVE-2025-71131: crypto: seqiv - Do not use req->iv after crypto_aead_encrypt (bsc#1256742). * CVE-2025-71183: btrfs: always detect conflicting inodes when logging inode refs (bsc#1257631). * CVE-2025-71184: btrfs: fix NULL dereference on root when tracing inode eviction (bsc#1257635). * CVE-2025-71194: btrfs: fix deadlock in wait_current_trans() due to ignored transaction type (bsc#1257687). * CVE-2025-71224: wifi: mac80211: ocb: skip rx_no_sta when interface is not joined (bsc#1258824). * CVE-2025-71236: scsi: qla2xxx: Validate sp before freeing associated memory (bsc#1258442). * CVE-2026-22991: libceph: make free_choose_arg_map() resilient to partial allocation (bsc#1257220). * CVE-2026-22998: nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec (bsc#1257209). * CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() (bsc#1257231). * CVE-2026-23054: net: hv_netvsc: reject RSS hash key programming without RX indirection table (bsc#1257732). * CVE-2026-23060: crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec (bsc#1257735). * CVE-2026-23064: net/sched: act_ife: avoid possible NULL deref (bsc#1257765). * CVE-2026-23069: vsock/virtio: fix potential underflow in virtio_transport_get_credit() (bsc#1257755). * CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1257749). * CVE-2026-23083: fou: Don't allow 0 for FOU_ATTR_IPPROTO (bsc#1257745). * CVE-2026-23084: be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list (bsc#1257830). * CVE-2026-23085: irqchip/gic-v3-its: Avoid truncating memory addresses (bsc#1257758). * CVE-2026-23086: vsock/virtio: cap TX credit to local buffer size (bsc#1257757). * CVE-2026-23089: ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free() (bsc#1257790). * CVE-2026-23095: gue: Fix skb memleak with inner IP protocol 0 (bsc#1257808). * CVE-2026-23099: bonding: limit BOND_MODE_8023AD to Ethernet devices (bsc#1257816). * CVE-2026-23105: net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag (bsc#1257775). * CVE-2026-23112: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec (bsc#1258184). * CVE-2026-23125: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT (bsc#1258293). * CVE-2026-23141: btrfs: send: check for inline extents in range_is_hole_in_parent() (bsc#1258377). * CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258395). * CVE-2026-23198: KVM: Don't clobber irqfd routing type when deassigning irqfd (bsc#1258321). * CVE-2026-23204: net/sched: cls_u32: use skb_header_pointer_careful() (bsc#1258340). * CVE-2026-23208: ALSA: usb-audio: Prevent excessive number of frames (bsc#1258468). * CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258518). * CVE-2026-23268: apparmor: fix unprivileged local user can do privileged policy management (bsc#1258850). * CVE-2026-23269: apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1259857). The following non-security bugs were fixed: * apparmor: Fix double free of ns_name in aa_replace_profiles() (bsc#1258849). * apparmor: fix memory leak in verify_header (bsc#1258849). * apparmor: fix unprivileged local user can do privileged policy management (bsc#1258849). * apparmor: fix: limit the number of levels of policy namespaces (bsc#1258849). * apparmor: replace recursive profile removal with iterative approach (bsc#1258849). * apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1258849). * drm/mgag200: fix mgag200_bmc_stop_scanout() (bsc#1258153 bsc#1258226) * md/raid1,raid10: do not handle IO error for REQ_RAHEAD and REQ_NOWAIT (git- fixes). * md/raid1,raid10: strip REQ_NOWAIT from member bios (git-fixes). * net/mlx5: Ensure fw pages are always allocated on same NUMA (git-fixes). * usb: storage: Fix memory leak in USB bulk transport (bsc#1257949). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2026-1078=1 * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-1078=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-1078=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (nosrc) * kernel-default-4.12.14-122.296.1 * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kernel-default-debuginfo-4.12.14-122.296.1 * kernel-default-kgraft-4.12.14-122.296.1 * kernel-default-kgraft-devel-4.12.14-122.296.1 * kernel-default-debugsource-4.12.14-122.296.1 * kgraft-patch-4_12_14-122_296-default-1-8.3.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * ocfs2-kmp-default-4.12.14-122.296.1 * dlm-kmp-default-4.12.14-122.296.1 * kernel-default-debuginfo-4.12.14-122.296.1 * kernel-syms-4.12.14-122.296.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.296.1 * kernel-default-base-4.12.14-122.296.1 * kernel-default-base-debuginfo-4.12.14-122.296.1 * kernel-default-devel-4.12.14-122.296.1 * gfs2-kmp-default-debuginfo-4.12.14-122.296.1 * cluster-md-kmp-default-4.12.14-122.296.1 * kernel-default-debugsource-4.12.14-122.296.1 * gfs2-kmp-default-4.12.14-122.296.1 * cluster-md-kmp-default-debuginfo-4.12.14-122.296.1 * dlm-kmp-default-debuginfo-4.12.14-122.296.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-4.12.14-122.296.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * kernel-macros-4.12.14-122.296.1 * kernel-source-4.12.14-122.296.1 * kernel-devel-4.12.14-122.296.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x) * kernel-default-man-4.12.14-122.296.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64) * kernel-default-devel-debuginfo-4.12.14-122.296.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * ocfs2-kmp-default-4.12.14-122.296.1 * dlm-kmp-default-4.12.14-122.296.1 * kernel-default-debuginfo-4.12.14-122.296.1 * kernel-syms-4.12.14-122.296.1 * ocfs2-kmp-default-debuginfo-4.12.14-122.296.1 * kernel-default-base-4.12.14-122.296.1 * kernel-default-base-debuginfo-4.12.14-122.296.1 * kernel-default-devel-4.12.14-122.296.1 * gfs2-kmp-default-debuginfo-4.12.14-122.296.1 * cluster-md-kmp-default-4.12.14-122.296.1 * kernel-default-devel-debuginfo-4.12.14-122.296.1 * kernel-default-debugsource-4.12.14-122.296.1 * gfs2-kmp-default-4.12.14-122.296.1 * cluster-md-kmp-default-debuginfo-4.12.14-122.296.1 * dlm-kmp-default-debuginfo-4.12.14-122.296.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64) * kernel-default-4.12.14-122.296.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * kernel-macros-4.12.14-122.296.1 * kernel-source-4.12.14-122.296.1 * kernel-devel-4.12.14-122.296.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50453.html * https://www.suse.com/security/cve/CVE-2023-53794.html * https://www.suse.com/security/cve/CVE-2023-53802.html * https://www.suse.com/security/cve/CVE-2023-53808.html * https://www.suse.com/security/cve/CVE-2023-53816.html * https://www.suse.com/security/cve/CVE-2023-53817.html * https://www.suse.com/security/cve/CVE-2023-53827.html * https://www.suse.com/security/cve/CVE-2023-54184.html * https://www.suse.com/security/cve/CVE-2023-6040.html * https://www.suse.com/security/cve/CVE-2025-21738.html * https://www.suse.com/security/cve/CVE-2025-22083.html * https://www.suse.com/security/cve/CVE-2025-22125.html * https://www.suse.com/security/cve/CVE-2025-39748.html * https://www.suse.com/security/cve/CVE-2025-39817.html * https://www.suse.com/security/cve/CVE-2025-39964.html * https://www.suse.com/security/cve/CVE-2025-39998.html * https://www.suse.com/security/cve/CVE-2025-40099.html * https://www.suse.com/security/cve/CVE-2025-40103.html * https://www.suse.com/security/cve/CVE-2025-40219.html * https://www.suse.com/security/cve/CVE-2025-40220.html * https://www.suse.com/security/cve/CVE-2025-40242.html * https://www.suse.com/security/cve/CVE-2025-40342.html * https://www.suse.com/security/cve/CVE-2025-68223.html * https://www.suse.com/security/cve/CVE-2025-68234.html * https://www.suse.com/security/cve/CVE-2025-68283.html * https://www.suse.com/security/cve/CVE-2025-68285.html * https://www.suse.com/security/cve/CVE-2025-68287.html * https://www.suse.com/security/cve/CVE-2025-68295.html * https://www.suse.com/security/cve/CVE-2025-68724.html * https://www.suse.com/security/cve/CVE-2025-68818.html * https://www.suse.com/security/cve/CVE-2025-71075.html * https://www.suse.com/security/cve/CVE-2025-71104.html * https://www.suse.com/security/cve/CVE-2025-71113.html * https://www.suse.com/security/cve/CVE-2025-71116.html * https://www.suse.com/security/cve/CVE-2025-71131.html * https://www.suse.com/security/cve/CVE-2025-71183.html * https://www.suse.com/security/cve/CVE-2025-71184.html * https://www.suse.com/security/cve/CVE-2025-71194.html * https://www.suse.com/security/cve/CVE-2025-71224.html * https://www.suse.com/security/cve/CVE-2025-71236.html * https://www.suse.com/security/cve/CVE-2026-22991.html * https://www.suse.com/security/cve/CVE-2026-22998.html * https://www.suse.com/security/cve/CVE-2026-23003.html * https://www.suse.com/security/cve/CVE-2026-23004.html * https://www.suse.com/security/cve/CVE-2026-23054.html * https://www.suse.com/security/cve/CVE-2026-23060.html * https://www.suse.com/security/cve/CVE-2026-23064.html * https://www.suse.com/security/cve/CVE-2026-23069.html * https://www.suse.com/security/cve/CVE-2026-23074.html * https://www.suse.com/security/cve/CVE-2026-23083.html * https://www.suse.com/security/cve/CVE-2026-23084.html * https://www.suse.com/security/cve/CVE-2026-23085.html * https://www.suse.com/security/cve/CVE-2026-23086.html * https://www.suse.com/security/cve/CVE-2026-23089.html * https://www.suse.com/security/cve/CVE-2026-23095.html * https://www.suse.com/security/cve/CVE-2026-23099.html * https://www.suse.com/security/cve/CVE-2026-23105.html * https://www.suse.com/security/cve/CVE-2026-23112.html * https://www.suse.com/security/cve/CVE-2026-23125.html * https://www.suse.com/security/cve/CVE-2026-23141.html * https://www.suse.com/security/cve/CVE-2026-23191.html * https://www.suse.com/security/cve/CVE-2026-23198.html * https://www.suse.com/security/cve/CVE-2026-23204.html * https://www.suse.com/security/cve/CVE-2026-23208.html * https://www.suse.com/security/cve/CVE-2026-23209.html * https://www.suse.com/security/cve/CVE-2026-23268.html * https://www.suse.com/security/cve/CVE-2026-23269.html * https://www.suse.com/security/cve/CVE-2026-25702.html * https://bugzilla.suse.com/show_bug.cgi?id=1215420 * https://bugzilla.suse.com/show_bug.cgi?id=1218752 * https://bugzilla.suse.com/show_bug.cgi?id=1238917 * https://bugzilla.suse.com/show_bug.cgi?id=1241414 * https://bugzilla.suse.com/show_bug.cgi?id=1241596 * https://bugzilla.suse.com/show_bug.cgi?id=1249587 * https://bugzilla.suse.com/show_bug.cgi?id=1249998 * https://bugzilla.suse.com/show_bug.cgi?id=1250887 * https://bugzilla.suse.com/show_bug.cgi?id=1251966 * https://bugzilla.suse.com/show_bug.cgi?id=1252073 * https://bugzilla.suse.com/show_bug.cgi?id=1252911 * https://bugzilla.suse.com/show_bug.cgi?id=1252924 * https://bugzilla.suse.com/show_bug.cgi?id=1254518 * https://bugzilla.suse.com/show_bug.cgi?id=1254520 * https://bugzilla.suse.com/show_bug.cgi?id=1254723 * https://bugzilla.suse.com/show_bug.cgi?id=1254725 * https://bugzilla.suse.com/show_bug.cgi?id=1254958 * https://bugzilla.suse.com/show_bug.cgi?id=1254992 * https://bugzilla.suse.com/show_bug.cgi?id=1255049 * https://bugzilla.suse.com/show_bug.cgi?id=1255075 * https://bugzilla.suse.com/show_bug.cgi?id=1255129 * https://bugzilla.suse.com/show_bug.cgi?id=1255152 * https://bugzilla.suse.com/show_bug.cgi?id=1255163 * https://bugzilla.suse.com/show_bug.cgi?id=1255274 * https://bugzilla.suse.com/show_bug.cgi?id=1255357 * https://bugzilla.suse.com/show_bug.cgi?id=1255379 * https://bugzilla.suse.com/show_bug.cgi?id=1255401 * https://bugzilla.suse.com/show_bug.cgi?id=1255416 * https://bugzilla.suse.com/show_bug.cgi?id=1255550 * https://bugzilla.suse.com/show_bug.cgi?id=1255991 * https://bugzilla.suse.com/show_bug.cgi?id=1256629 * https://bugzilla.suse.com/show_bug.cgi?id=1256675 * https://bugzilla.suse.com/show_bug.cgi?id=1256708 * https://bugzilla.suse.com/show_bug.cgi?id=1256716 * https://bugzilla.suse.com/show_bug.cgi?id=1256742 * https://bugzilla.suse.com/show_bug.cgi?id=1256744 * https://bugzilla.suse.com/show_bug.cgi?id=1257209 * https://bugzilla.suse.com/show_bug.cgi?id=1257220 * https://bugzilla.suse.com/show_bug.cgi?id=1257231 * https://bugzilla.suse.com/show_bug.cgi?id=1257246 * https://bugzilla.suse.com/show_bug.cgi?id=1257473 * https://bugzilla.suse.com/show_bug.cgi?id=1257631 * https://bugzilla.suse.com/show_bug.cgi?id=1257635 * https://bugzilla.suse.com/show_bug.cgi?id=1257672 * https://bugzilla.suse.com/show_bug.cgi?id=1257687 * https://bugzilla.suse.com/show_bug.cgi?id=1257732 * https://bugzilla.suse.com/show_bug.cgi?id=1257735 * https://bugzilla.suse.com/show_bug.cgi?id=1257745 * https://bugzilla.suse.com/show_bug.cgi?id=1257749 * https://bugzilla.suse.com/show_bug.cgi?id=1257755 * https://bugzilla.suse.com/show_bug.cgi?id=1257757 * https://bugzilla.suse.com/show_bug.cgi?id=1257758 * https://bugzilla.suse.com/show_bug.cgi?id=1257765 * https://bugzilla.suse.com/show_bug.cgi?id=1257775 * https://bugzilla.suse.com/show_bug.cgi?id=1257790 * https://bugzilla.suse.com/show_bug.cgi?id=1257808 * https://bugzilla.suse.com/show_bug.cgi?id=1257816 * https://bugzilla.suse.com/show_bug.cgi?id=1257830 * https://bugzilla.suse.com/show_bug.cgi?id=1257942 * https://bugzilla.suse.com/show_bug.cgi?id=1257949 * https://bugzilla.suse.com/show_bug.cgi?id=1258153 * https://bugzilla.suse.com/show_bug.cgi?id=1258184 * https://bugzilla.suse.com/show_bug.cgi?id=1258226 * https://bugzilla.suse.com/show_bug.cgi?id=1258293 * https://bugzilla.suse.com/show_bug.cgi?id=1258321 * https://bugzilla.suse.com/show_bug.cgi?id=1258340 * https://bugzilla.suse.com/show_bug.cgi?id=1258377 * https://bugzilla.suse.com/show_bug.cgi?id=1258395 * https://bugzilla.suse.com/show_bug.cgi?id=1258442 * https://bugzilla.suse.com/show_bug.cgi?id=1258468 * https://bugzilla.suse.com/show_bug.cgi?id=1258518 * https://bugzilla.suse.com/show_bug.cgi?id=1258824 * https://bugzilla.suse.com/show_bug.cgi?id=1258849 * https://bugzilla.suse.com/show_bug.cgi?id=1258850 * https://bugzilla.suse.com/show_bug.cgi?id=1259069 * https://bugzilla.suse.com/show_bug.cgi?id=1259857


Attachment: None (type=text/html)

(HTML attachment elided)


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds