Security update for the Linux Kernel
| Announcement ID: | SUSE-SU-2026:20228-1 |
|---|---|
| Release Date: | 2026-02-02T09:27:27Z |
| Rating: | important |
| References: |
|
| Cross-References: |
|
| CVSS scores: |
|
| Affected Products: |
|
An update that solves 215 vulnerabilities, contains three features and has 23 fixes can now be installed.
Description:
The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues
The following security issues were fixed:
- CVE-2025-38704: rcu/nocb: Fix possible invalid rdp's->nocb_cb_kthread pointer (bsc#1254408).
- CVE-2025-39880: ceph: fix race condition validating r_parent before applying state (bsc#1250388).
- CVE-2025-39977: futex: Prevent use-after-free during requeue-PI (bsc#1252046).
- CVE-2025-40042: tracing: Fix race condition in kprobe initialization causing NULL pointer dereference (bsc#1252861).
- CVE-2025-40123: bpf: Enforce expected_attach_type for tailcall compatibility (bsc#1253365).
- CVE-2025-40130: scsi: ufs: core: Fix data race in CPU latency PM QoS request handling
- CVE-2025-40160: xen/events: Cleanup find_virq() return codes (bsc#1253400).
- CVE-2025-40167: ext4: detect invalid INLINE_DATA + EXTENTS flag combination (bsc#1253458).
- CVE-2025-40170: net: use dst_dev_rcu() in sk_setup_caps() (bsc#1253413).
- CVE-2025-40179: ext4: verify orphan file size is not too big (bsc#1253442).
- CVE-2025-40190: ext4: guard against EA inode refcount underflow in xattr update (bsc#1253623).
- CVE-2025-40214: af_unix: Initialise scc_index in unix_add_edge() (bsc#1254961).
- CVE-2025-40215: xfrm: delete x->tunnel as we delete x (bsc#1254959).
- CVE-2025-40218: mm/damon/vaddr: do not repeat pte_offset_map_lock() until success (bsc#1254964).
- CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520).
- CVE-2025-40231: vsock: fix lock inversion in vsock_assign_transport() (bsc#1254815).
- CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813).
- CVE-2025-40237: fs/notify: call exportfs_encode_fid with s_umount (bsc#1254809).
- CVE-2025-40238: net/mlx5: Fix IPsec cleanup over MPV device (bsc#1254871).
- CVE-2025-40239: net: phy: micrel: always set shared->phydev for LAN8814 (bsc#1254868).
- CVE-2025-40242: gfs2: Fix unlikely race in gdlm_put_lock (bsc#1255075).
- CVE-2025-40246: xfs: fix out of bounds memory read error in symlink repair (bsc#1254861).
- CVE-2025-40248: vsock: Ignore signal/timeout on connect() if already established (bsc#1254864).
- CVE-2025-40250: net/mlx5: Clean up only new IRQ glue on request_irq() failure (bsc#1254854).
- CVE-2025-40251: devlink: rate: Unset parent pointer in devl_rate_nodes_destroy (bsc#1254856).
- CVE-2025-40252: net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() (bsc#1254849).
- CVE-2025-40254: net: openvswitch: remove never-working support for setting nsh fields (bsc#1254852).
- CVE-2025-40255: net: core: prevent NULL deref in generic_hwtstamp_ioctl_lower() (bsc#1255156).
- CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1254843).
- CVE-2025-40264: be2net: pass wrb_params in case of OS2BMC (bsc#1254835).
- CVE-2025-40268: cifs: client: fix memory leak in smb3_fs_context_parse_param (bsc#1255082).
- CVE-2025-40271: fs/proc: fix uaf in proc_readdir_de() (bsc#1255297).
- CVE-2025-40274: KVM: guest_memfd: Remove bindings on memslot deletion when gmem is dying (bsc#1254830).
- CVE-2025-40276: drm/panthor: Flush shmem writes before mapping buffers CPU-uncached (bsc#1254824).
- CVE-2025-40278: net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak (bsc#1254825).
- CVE-2025-40279: net: sched: act_connmark: initialize struct tc_ife to fix kernel leak (bsc#1254846).
- CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self() (bsc#1254847).
- CVE-2025-40292: virtio-net: fix received length check in big packets (bsc#1255175).
- CVE-2025-40293: iommufd: Don't overflow during division for dirty tracking (bsc#1255179).
- CVE-2025-40297: net: bridge: fix use-after-free due to MST port state bypass (bsc#1255187).
- CVE-2025-40319: bpf: Sync pending IRQ work before freeing ring buffer (bsc#1254794).
- CVE-2025-40328: smb: client: fix potential UAF in smb2_close_cached_fid() (bsc#1254624).
- CVE-2025-40330: bnxt_en: Shutdown FW DMA in bnxt_shutdown() (bsc#1254616).
- CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).
- CVE-2025-40338: ASoC: Intel: avs: Do not share the name pointer between components (bsc#1255273).
- CVE-2025-40346: arch_topology: Fix incorrect error check in topology_parse_cpu_capacity() (bsc#1255318).
- CVE-2025-40347: net: enetc: fix the deadlock of enetc_mdio_lock (bsc#1255262).
- CVE-2025-40350: net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding RQ (bsc#1255260).
- CVE-2025-40355: sysfs: check visibility before changing group attribute ownership (bsc#1255261).
- CVE-2025-40357: net/smc: fix general protection fault in __smc_diag_dump (bsc#1255097).
- CVE-2025-40359: perf/x86/intel: Fix KASAN global-out-of-bounds warning (bsc#1255087).
- CVE-2025-40362: ceph: fix multifs mds auth caps issue (bsc#1255103).
- CVE-2025-68171: x86/fpu: Ensure XFD state on signal delivery (bsc#1255255).
- CVE-2025-68197: bnxt_en: Fix null pointer dereference in bnxt_bs_trace_check_wrap() (bsc#1255242).
- CVE-2025-68198: crash: fix crashkernel resource shrink (bsc#1255243).
- CVE-2025-68202: sched_ext: Fix unsafe locking in the scx_dump_state() (bsc#1255223).
- CVE-2025-68206: netfilter: nft_ct: add seqadj extension for natted connections (bsc#1255142).
- CVE-2025-68208: bpf: account for current allocated stack depth in widen_imprecise_scalars() (bsc#1255227).
- CVE-2025-68209: mlx5: Fix default values in create CQ (bsc#1255230).
- CVE-2025-68215: ice: fix PTP cleanup on driver removal in error path (bsc#1255226).
- CVE-2025-68239: binfmt_misc: restore write access before closing files opened by open_exec() (bsc#1255272).
- CVE-2025-68259: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced (bsc#1255199).
- CVE-2025-68264: ext4: refresh inline data size before write operations (bsc#1255380).
- CVE-2025-68283: libceph: replace BUG_ON with bounds check for map->max_osd (bsc#1255379).
- CVE-2025-68284: libceph: prevent potential out-of-bounds writes in handle_auth_session_key() (bsc#1255377).
- CVE-2025-68285: libceph: fix potential use-after-free in have_mon_and_osd_map() (bsc#1255401).
- CVE-2025-68293: mm/huge_memory: fix NULL pointer deference when splitting folio (bsc#1255150).
- CVE-2025-68301: net: atlantic: fix fragment overflow handling in RX path (bsc#1255120).
- CVE-2025-68302: net: sxgbe: fix potential NULL dereference in sxgbe_rx() (bsc#1255121).
- CVE-2025-68317: io_uring/zctx: check chained notif contexts (bsc#1255354).
- CVE-2025-68340: team: Move team device type change at the end of team_port_add (bsc#1255507).
- CVE-2025-68353: net: vxlan: prevent NULL deref in vxlan_xmit_one (bsc#1255533).
- CVE-2025-68363: bpf: Check skb->transport_header is set in bpf_skb_check_mtu (bsc#1255552).
- CVE-2025-68378: bpf: Refactor stack map trace depth calculation into helper function (bsc#1255614).
- CVE-2025-68736: landlock: Optimize file path walks and prepare for audit support (bsc#1255698).
- CVE-2025-68742: bpf: Fix invalid prog->stats access when update_effective_progs fails (bsc#1255707).
- CVE-2025-68744: bpf: Free special fields when update [lru_,]percpu_hash maps (bsc#1255709).
- CVE-2025-71096: RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly (bsc#1256606).
The following non security issues were fixed:
- KVM: SEV: Drop GHCB_VERSION_DEFAULT and open code it (bsc#1255672).
- Set HZ=1000 for ppc64 default configuration (jsc#PED-14344)
- bpf: Do not limit bpf_cgroup_from_id to current's namespace (bsc#1255433).
- btrfs: handle aligned EOF truncation correctly for subpage cases (bsc#1253238).
- cgroup: rstat: use LOCK CMPXCHG in css_rstat_updated (bsc#1255434).
- cifs: update dstaddr whenever channel iface is updated (git-fixes).
- cpuidle: menu: Use residency threshold in polling state override decisions (bsc#1255026).
- cpuset: fix warning when disabling remote partition (bsc#1256794).
- ext4: use optimized mballoc scanning regardless of inode format (bsc#1254378).
- net: usb: pegasus: fix memory leak in update_eth_regs_async() (git-fixes).
- netdevsim: print human readable IP address (bsc#1255071).
- powerpc/eeh: fix recursive pci_lock_rescan_remove locking in EEH event handling (bsc#1253262 ltc#216029).
- powerpc/kexec: Enable SMT before waking offline CPUs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes bsc#1253739 ltc#211493 bsc#1254244 ltc#216496).
- sched: Increase sched_tick_remote timeout (bsc#1254510).
- selftests: net: fib-onlink-tests: Set high metric for default IPv6 route (bsc#1255346).
- selftests: net: use slowwait to make sure IPv6 setup finished (bsc#1255349).
- selftests: net: use slowwait to stabilize vrf_route_leaking test (bsc#1255349).
- serial: xilinx_uartps: Use helper function hrtimer_update_function() (stable-fixes).
- supported.conf: Mark lan 743x supported (jsc#PED-14571)
- tick/sched: Limit non-timekeeper CPUs calling jiffies update (bsc#1254477).
- wifi: ath10k: Avoid vdev delete timeout when firmware is already down (stable-fixes).
- x86/microcode/AMD: Fix Entrysign revision check for Zen5/Strix Halo (bsc#1256495).
- x86/microcode/AMD: Make __verify_patch_size() return bool (bsc#1256495).
- x86/microcode/AMD: Remove bogus comment from parse_container() (bsc#1256495).
- x86/microcode/AMD: Select which microcode patch to load (bsc#1256495).
- x86/microcode/AMD: Use sha256() instead of init/update/final (bsc#1256495).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server High Availability Extension 16.0
zypper in -t patch SUSE-SLES-HA-16.0-230=1
Package List:
-
SUSE Linux Enterprise Server High Availability Extension 16.0 (ppc64le s390x x86_64)
- dlm-kmp-default-debuginfo-6.12.0-160000.9.1
- kernel-default-debuginfo-6.12.0-160000.9.1
- gfs2-kmp-default-6.12.0-160000.9.1
- kernel-default-debugsource-6.12.0-160000.9.1
- gfs2-kmp-default-debuginfo-6.12.0-160000.9.1
- dlm-kmp-default-6.12.0-160000.9.1
- cluster-md-kmp-default-6.12.0-160000.9.1
- cluster-md-kmp-default-debuginfo-6.12.0-160000.9.1
-
SUSE Linux Enterprise Server High Availability Extension 16.0 (nosrc)
- kernel-default-6.12.0-160000.9.1
References:
- https://www.suse.com/security/cve/CVE-2025-38704.html
- https://www.suse.com/security/cve/CVE-2025-39880.html
- https://www.suse.com/security/cve/CVE-2025-39977.html
- https://www.suse.com/security/cve/CVE-2025-40042.html
- https://www.suse.com/security/cve/CVE-2025-40123.html
- https://www.suse.com/security/cve/CVE-2025-40130.html
- https://www.suse.com/security/cve/CVE-2025-40160.html
- https://www.suse.com/security/cve/CVE-2025-40167.html
- https://www.suse.com/security/cve/CVE-2025-40170.html
- https://www.suse.com/security/cve/CVE-2025-40179.html
- https://www.suse.com/security/cve/CVE-2025-40190.html
- https://www.suse.com/security/cve/CVE-2025-40209.html
- https://www.suse.com/security/cve/CVE-2025-40211.html
- https://www.suse.com/security/cve/CVE-2025-40212.html
- https://www.suse.com/security/cve/CVE-2025-40213.html
- https://www.suse.com/security/cve/CVE-2025-40214.html
- https://www.suse.com/security/cve/CVE-2025-40215.html
- https://www.suse.com/security/cve/CVE-2025-40218.html
- https://www.suse.com/security/cve/CVE-2025-40219.html
- https://www.suse.com/security/cve/CVE-2025-40220.html
- https://www.suse.com/security/cve/CVE-2025-40221.html
- https://www.suse.com/security/cve/CVE-2025-40223.html
- https://www.suse.com/security/cve/CVE-2025-40225.html
- https://www.suse.com/security/cve/CVE-2025-40226.html
- https://www.suse.com/security/cve/CVE-2025-40231.html
- https://www.suse.com/security/cve/CVE-2025-40233.html
- https://www.suse.com/security/cve/CVE-2025-40235.html
- https://www.suse.com/security/cve/CVE-2025-40237.html
- https://www.suse.com/security/cve/CVE-2025-40238.html
- https://www.suse.com/security/cve/CVE-2025-40239.html
- https://www.suse.com/security/cve/CVE-2025-40240.html
- https://www.suse.com/security/cve/CVE-2025-40242.html
- https://www.suse.com/security/cve/CVE-2025-40246.html
- https://www.suse.com/security/cve/CVE-2025-40248.html
- https://www.suse.com/security/cve/CVE-2025-40250.html
- https://www.suse.com/security/cve/CVE-2025-40251.html
- https://www.suse.com/security/cve/CVE-2025-40252.html
- https://www.suse.com/security/cve/CVE-2025-40254.html
- https://www.suse.com/security/cve/CVE-2025-40255.html
- https://www.suse.com/security/cve/CVE-2025-40256.html
- https://www.suse.com/security/cve/CVE-2025-40258.html
- https://www.suse.com/security/cve/CVE-2025-40262.html
- https://www.suse.com/security/cve/CVE-2025-40263.html
- https://www.suse.com/security/cve/CVE-2025-40264.html
- https://www.suse.com/security/cve/CVE-2025-40266.html
- https://www.suse.com/security/cve/CVE-2025-40268.html
- https://www.suse.com/security/cve/CVE-2025-40269.html
- https://www.suse.com/security/cve/CVE-2025-40271.html
- https://www.suse.com/security/cve/CVE-2025-40272.html
- https://www.suse.com/security/cve/CVE-2025-40273.html
- https://www.suse.com/security/cve/CVE-2025-40274.html
- https://www.suse.com/security/cve/CVE-2025-40275.html
- https://www.suse.com/security/cve/CVE-2025-40276.html
- https://www.suse.com/security/cve/CVE-2025-40277.html
- https://www.suse.com/security/cve/CVE-2025-40278.html
- https://www.suse.com/security/cve/CVE-2025-40279.html
- https://www.suse.com/security/cve/CVE-2025-40280.html
- https://www.suse.com/security/cve/CVE-2025-40282.html
- https://www.suse.com/security/cve/CVE-2025-40283.html
- https://www.suse.com/security/cve/CVE-2025-40284.html
- https://www.suse.com/security/cve/CVE-2025-40287.html
- https://www.suse.com/security/cve/CVE-2025-40288.html
- https://www.suse.com/security/cve/CVE-2025-40289.html
- https://www.suse.com/security/cve/CVE-2025-40292.html
- https://www.suse.com/security/cve/CVE-2025-40293.html
- https://www.suse.com/security/cve/CVE-2025-40294.html
- https://www.suse.com/security/cve/CVE-2025-40297.html
- https://www.suse.com/security/cve/CVE-2025-40301.html
- https://www.suse.com/security/cve/CVE-2025-40302.html
- https://www.suse.com/security/cve/CVE-2025-40303.html
- https://www.suse.com/security/cve/CVE-2025-40304.html
- https://www.suse.com/security/cve/CVE-2025-40307.html
- https://www.suse.com/security/cve/CVE-2025-40308.html
- https://www.suse.com/security/cve/CVE-2025-40309.html
- https://www.suse.com/security/cve/CVE-2025-40310.html
- https://www.suse.com/security/cve/CVE-2025-40311.html
- https://www.suse.com/security/cve/CVE-2025-40314.html
- https://www.suse.com/security/cve/CVE-2025-40315.html
- https://www.suse.com/security/cve/CVE-2025-40316.html
- https://www.suse.com/security/cve/CVE-2025-40317.html
- https://www.suse.com/security/cve/CVE-2025-40318.html
- https://www.suse.com/security/cve/CVE-2025-40319.html
- https://www.suse.com/security/cve/CVE-2025-40320.html
- https://www.suse.com/security/cve/CVE-2025-40321.html
- https://www.suse.com/security/cve/CVE-2025-40322.html
- https://www.suse.com/security/cve/CVE-2025-40323.html
- https://www.suse.com/security/cve/CVE-2025-40324.html
- https://www.suse.com/security/cve/CVE-2025-40328.html
- https://www.suse.com/security/cve/CVE-2025-40329.html
- https://www.suse.com/security/cve/CVE-2025-40330.html
- https://www.suse.com/security/cve/CVE-2025-40331.html
- https://www.suse.com/security/cve/CVE-2025-40332.html
- https://www.suse.com/security/cve/CVE-2025-40337.html
- https://www.suse.com/security/cve/CVE-2025-40338.html
- https://www.suse.com/security/cve/CVE-2025-40339.html
- https://www.suse.com/security/cve/CVE-2025-40340.html
- https://www.suse.com/security/cve/CVE-2025-40342.html
- https://www.suse.com/security/cve/CVE-2025-40343.html
- https://www.suse.com/security/cve/CVE-2025-40344.html
- https://www.suse.com/security/cve/CVE-2025-40345.html
- https://www.suse.com/security/cve/CVE-2025-40346.html
- https://www.suse.com/security/cve/CVE-2025-40347.html
- https://www.suse.com/security/cve/CVE-2025-40350.html
- https://www.suse.com/security/cve/CVE-2025-40353.html
- https://www.suse.com/security/cve/CVE-2025-40354.html
- https://www.suse.com/security/cve/CVE-2025-40355.html
- https://www.suse.com/security/cve/CVE-2025-40357.html
- https://www.suse.com/security/cve/CVE-2025-40359.html
- https://www.suse.com/security/cve/CVE-2025-40360.html
- https://www.suse.com/security/cve/CVE-2025-40362.html
- https://www.suse.com/security/cve/CVE-2025-68167.html
- https://www.suse.com/security/cve/CVE-2025-68170.html
- https://www.suse.com/security/cve/CVE-2025-68171.html
- https://www.suse.com/security/cve/CVE-2025-68172.html
- https://www.suse.com/security/cve/CVE-2025-68176.html
- https://www.suse.com/security/cve/CVE-2025-68180.html
- https://www.suse.com/security/cve/CVE-2025-68181.html
- https://www.suse.com/security/cve/CVE-2025-68183.html
- https://www.suse.com/security/cve/CVE-2025-68184.html
- https://www.suse.com/security/cve/CVE-2025-68185.html
- https://www.suse.com/security/cve/CVE-2025-68190.html
- https://www.suse.com/security/cve/CVE-2025-68192.html
- https://www.suse.com/security/cve/CVE-2025-68194.html
- https://www.suse.com/security/cve/CVE-2025-68195.html
- https://www.suse.com/security/cve/CVE-2025-68197.html
- https://www.suse.com/security/cve/CVE-2025-68198.html
- https://www.suse.com/security/cve/CVE-2025-68201.html
- https://www.suse.com/security/cve/CVE-2025-68202.html
- https://www.suse.com/security/cve/CVE-2025-68206.html
- https://www.suse.com/security/cve/CVE-2025-68207.html
- https://www.suse.com/security/cve/CVE-2025-68208.html
- https://www.suse.com/security/cve/CVE-2025-68209.html
- https://www.suse.com/security/cve/CVE-2025-68210.html
- https://www.suse.com/security/cve/CVE-2025-68213.html
- https://www.suse.com/security/cve/CVE-2025-68215.html
- https://www.suse.com/security/cve/CVE-2025-68217.html
- https://www.suse.com/security/cve/CVE-2025-68222.html
- https://www.suse.com/security/cve/CVE-2025-68223.html
- https://www.suse.com/security/cve/CVE-2025-68230.html
- https://www.suse.com/security/cve/CVE-2025-68233.html
- https://www.suse.com/security/cve/CVE-2025-68235.html
- https://www.suse.com/security/cve/CVE-2025-68237.html
- https://www.suse.com/security/cve/CVE-2025-68238.html
- https://www.suse.com/security/cve/CVE-2025-68239.html
- https://www.suse.com/security/cve/CVE-2025-68242.html
- https://www.suse.com/security/cve/CVE-2025-68244.html
- https://www.suse.com/security/cve/CVE-2025-68249.html
- https://www.suse.com/security/cve/CVE-2025-68252.html
- https://www.suse.com/security/cve/CVE-2025-68254.html
- https://www.suse.com/security/cve/CVE-2025-68255.html
- https://www.suse.com/security/cve/CVE-2025-68256.html
- https://www.suse.com/security/cve/CVE-2025-68257.html
- https://www.suse.com/security/cve/CVE-2025-68258.html
- https://www.suse.com/security/cve/CVE-2025-68259.html
- https://www.suse.com/security/cve/CVE-2025-68264.html
- https://www.suse.com/security/cve/CVE-2025-68283.html
- https://www.suse.com/security/cve/CVE-2025-68284.html
- https://www.suse.com/security/cve/CVE-2025-68285.html
- https://www.suse.com/security/cve/CVE-2025-68286.html
- https://www.suse.com/security/cve/CVE-2025-68287.html
- https://www.suse.com/security/cve/CVE-2025-68289.html
- https://www.suse.com/security/cve/CVE-2025-68290.html
- https://www.suse.com/security/cve/CVE-2025-68293.html
- https://www.suse.com/security/cve/CVE-2025-68298.html
- https://www.suse.com/security/cve/CVE-2025-68301.html
- https://www.suse.com/security/cve/CVE-2025-68302.html
- https://www.suse.com/security/cve/CVE-2025-68303.html
- https://www.suse.com/security/cve/CVE-2025-68305.html
- https://www.suse.com/security/cve/CVE-2025-68306.html
- https://www.suse.com/security/cve/CVE-2025-68307.html
- https://www.suse.com/security/cve/CVE-2025-68308.html
- https://www.suse.com/security/cve/CVE-2025-68311.html
- https://www.suse.com/security/cve/CVE-2025-68312.html
- https://www.suse.com/security/cve/CVE-2025-68313.html
- https://www.suse.com/security/cve/CVE-2025-68317.html
- https://www.suse.com/security/cve/CVE-2025-68327.html
- https://www.suse.com/security/cve/CVE-2025-68328.html
- https://www.suse.com/security/cve/CVE-2025-68330.html
- https://www.suse.com/security/cve/CVE-2025-68331.html
- https://www.suse.com/security/cve/CVE-2025-68332.html
- https://www.suse.com/security/cve/CVE-2025-68335.html
- https://www.suse.com/security/cve/CVE-2025-68339.html
- https://www.suse.com/security/cve/CVE-2025-68340.html
- https://www.suse.com/security/cve/CVE-2025-68342.html
- https://www.suse.com/security/cve/CVE-2025-68343.html
- https://www.suse.com/security/cve/CVE-2025-68344.html
- https://www.suse.com/security/cve/CVE-2025-68345.html
- https://www.suse.com/security/cve/CVE-2025-68346.html
- https://www.suse.com/security/cve/CVE-2025-68347.html
- https://www.suse.com/security/cve/CVE-2025-68351.html
- https://www.suse.com/security/cve/CVE-2025-68352.html
- https://www.suse.com/security/cve/CVE-2025-68353.html
- https://www.suse.com/security/cve/CVE-2025-68354.html
- https://www.suse.com/security/cve/CVE-2025-68362.html
- https://www.suse.com/security/cve/CVE-2025-68363.html
- https://www.suse.com/security/cve/CVE-2025-68378.html
- https://www.suse.com/security/cve/CVE-2025-68380.html
- https://www.suse.com/security/cve/CVE-2025-68724.html
- https://www.suse.com/security/cve/CVE-2025-68732.html
- https://www.suse.com/security/cve/CVE-2025-68736.html
- https://www.suse.com/security/cve/CVE-2025-68740.html
- https://www.suse.com/security/cve/CVE-2025-68742.html
- https://www.suse.com/security/cve/CVE-2025-68744.html
- https://www.suse.com/security/cve/CVE-2025-68746.html
- https://www.suse.com/security/cve/CVE-2025-68747.html
- https://www.suse.com/security/cve/CVE-2025-68748.html
- https://www.suse.com/security/cve/CVE-2025-68749.html
- https://www.suse.com/security/cve/CVE-2025-68750.html
- https://www.suse.com/security/cve/CVE-2025-68753.html
- https://www.suse.com/security/cve/CVE-2025-68757.html
- https://www.suse.com/security/cve/CVE-2025-68758.html
- https://www.suse.com/security/cve/CVE-2025-68759.html
- https://www.suse.com/security/cve/CVE-2025-68765.html
- https://www.suse.com/security/cve/CVE-2025-68766.html
- https://www.suse.com/security/cve/CVE-2025-71096.html
- https://bugzilla.suse.com/show_bug.cgi?id=1205462
- https://bugzilla.suse.com/show_bug.cgi?id=1214285
- https://bugzilla.suse.com/show_bug.cgi?id=1243112
- https://bugzilla.suse.com/show_bug.cgi?id=1245193
- https://bugzilla.suse.com/show_bug.cgi?id=1247500
- https://bugzilla.suse.com/show_bug.cgi?id=1250388
- https://bugzilla.suse.com/show_bug.cgi?id=1252046
- https://bugzilla.suse.com/show_bug.cgi?id=1252861
- https://bugzilla.suse.com/show_bug.cgi?id=1253155
- https://bugzilla.suse.com/show_bug.cgi?id=1253238
- https://bugzilla.suse.com/show_bug.cgi?id=1253262
- https://bugzilla.suse.com/show_bug.cgi?id=1253365
- https://bugzilla.suse.com/show_bug.cgi?id=1253400
- https://bugzilla.suse.com/show_bug.cgi?id=1253413
- https://bugzilla.suse.com/show_bug.cgi?id=1253414
- https://bugzilla.suse.com/show_bug.cgi?id=1253442
- https://bugzilla.suse.com/show_bug.cgi?id=1253458
- https://bugzilla.suse.com/show_bug.cgi?id=1253623
- https://bugzilla.suse.com/show_bug.cgi?id=1253674
- https://bugzilla.suse.com/show_bug.cgi?id=1253739
- https://bugzilla.suse.com/show_bug.cgi?id=1254126
- https://bugzilla.suse.com/show_bug.cgi?id=1254128
- https://bugzilla.suse.com/show_bug.cgi?id=1254195
- https://bugzilla.suse.com/show_bug.cgi?id=1254244
- https://bugzilla.suse.com/show_bug.cgi?id=1254363
- https://bugzilla.suse.com/show_bug.cgi?id=1254378
- https://bugzilla.suse.com/show_bug.cgi?id=1254408
- https://bugzilla.suse.com/show_bug.cgi?id=1254477
- https://bugzilla.suse.com/show_bug.cgi?id=1254510
- https://bugzilla.suse.com/show_bug.cgi?id=1254518
- https://bugzilla.suse.com/show_bug.cgi?id=1254519
- https://bugzilla.suse.com/show_bug.cgi?id=1254520
- https://bugzilla.suse.com/show_bug.cgi?id=1254615
- https://bugzilla.suse.com/show_bug.cgi?id=1254616
- https://bugzilla.suse.com/show_bug.cgi?id=1254618
- https://bugzilla.suse.com/show_bug.cgi?id=1254621
- https://bugzilla.suse.com/show_bug.cgi?id=1254624
- https://bugzilla.suse.com/show_bug.cgi?id=1254791
- https://bugzilla.suse.com/show_bug.cgi?id=1254793
- https://bugzilla.suse.com/show_bug.cgi?id=1254794
- https://bugzilla.suse.com/show_bug.cgi?id=1254795
- https://bugzilla.suse.com/show_bug.cgi?id=1254796
- https://bugzilla.suse.com/show_bug.cgi?id=1254797
- https://bugzilla.suse.com/show_bug.cgi?id=1254798
- https://bugzilla.suse.com/show_bug.cgi?id=1254808
- https://bugzilla.suse.com/show_bug.cgi?id=1254809
- https://bugzilla.suse.com/show_bug.cgi?id=1254813
- https://bugzilla.suse.com/show_bug.cgi?id=1254815
- https://bugzilla.suse.com/show_bug.cgi?id=1254821
- https://bugzilla.suse.com/show_bug.cgi?id=1254824
- https://bugzilla.suse.com/show_bug.cgi?id=1254825
- https://bugzilla.suse.com/show_bug.cgi?id=1254827
- https://bugzilla.suse.com/show_bug.cgi?id=1254828
- https://bugzilla.suse.com/show_bug.cgi?id=1254829
- https://bugzilla.suse.com/show_bug.cgi?id=1254830
- https://bugzilla.suse.com/show_bug.cgi?id=1254832
- https://bugzilla.suse.com/show_bug.cgi?id=1254835
- https://bugzilla.suse.com/show_bug.cgi?id=1254840
- https://bugzilla.suse.com/show_bug.cgi?id=1254843
- https://bugzilla.suse.com/show_bug.cgi?id=1254846
- https://bugzilla.suse.com/show_bug.cgi?id=1254847
- https://bugzilla.suse.com/show_bug.cgi?id=1254849
- https://bugzilla.suse.com/show_bug.cgi?id=1254850
- https://bugzilla.suse.com/show_bug.cgi?id=1254851
- https://bugzilla.suse.com/show_bug.cgi?id=1254852
- https://bugzilla.suse.com/show_bug.cgi?id=1254854
- https://bugzilla.suse.com/show_bug.cgi?id=1254856
- https://bugzilla.suse.com/show_bug.cgi?id=1254858
- https://bugzilla.suse.com/show_bug.cgi?id=1254860
- https://bugzilla.suse.com/show_bug.cgi?id=1254861
- https://bugzilla.suse.com/show_bug.cgi?id=1254864
- https://bugzilla.suse.com/show_bug.cgi?id=1254868
- https://bugzilla.suse.com/show_bug.cgi?id=1254869
- https://bugzilla.suse.com/show_bug.cgi?id=1254871
- https://bugzilla.suse.com/show_bug.cgi?id=1254894
- https://bugzilla.suse.com/show_bug.cgi?id=1254957
- https://bugzilla.suse.com/show_bug.cgi?id=1254959
- https://bugzilla.suse.com/show_bug.cgi?id=1254961
- https://bugzilla.suse.com/show_bug.cgi?id=1254964
- https://bugzilla.suse.com/show_bug.cgi?id=1254996
- https://bugzilla.suse.com/show_bug.cgi?id=1255026
- https://bugzilla.suse.com/show_bug.cgi?id=1255030
- https://bugzilla.suse.com/show_bug.cgi?id=1255034
- https://bugzilla.suse.com/show_bug.cgi?id=1255035
- https://bugzilla.suse.com/show_bug.cgi?id=1255039
- https://bugzilla.suse.com/show_bug.cgi?id=1255040
- https://bugzilla.suse.com/show_bug.cgi?id=1255041
- https://bugzilla.suse.com/show_bug.cgi?id=1255042
- https://bugzilla.suse.com/show_bug.cgi?id=1255057
- https://bugzilla.suse.com/show_bug.cgi?id=1255058
- https://bugzilla.suse.com/show_bug.cgi?id=1255064
- https://bugzilla.suse.com/show_bug.cgi?id=1255065
- https://bugzilla.suse.com/show_bug.cgi?id=1255068
- https://bugzilla.suse.com/show_bug.cgi?id=1255071
- https://bugzilla.suse.com/show_bug.cgi?id=1255072
- https://bugzilla.suse.com/show_bug.cgi?id=1255075
- https://bugzilla.suse.com/show_bug.cgi?id=1255077
- https://bugzilla.suse.com/show_bug.cgi?id=1255081
- https://bugzilla.suse.com/show_bug.cgi?id=1255082
- https://bugzilla.suse.com/show_bug.cgi?id=1255083
- https://bugzilla.suse.com/show_bug.cgi?id=1255087
- https://bugzilla.suse.com/show_bug.cgi?id=1255092
- https://bugzilla.suse.com/show_bug.cgi?id=1255094
- https://bugzilla.suse.com/show_bug.cgi?id=1255095
- https://bugzilla.suse.com/show_bug.cgi?id=1255097
- https://bugzilla.suse.com/show_bug.cgi?id=1255099
- https://bugzilla.suse.com/show_bug.cgi?id=1255103
- https://bugzilla.suse.com/show_bug.cgi?id=1255116
- https://bugzilla.suse.com/show_bug.cgi?id=1255120
- https://bugzilla.suse.com/show_bug.cgi?id=1255121
- https://bugzilla.suse.com/show_bug.cgi?id=1255122
- https://bugzilla.suse.com/show_bug.cgi?id=1255124
- https://bugzilla.suse.com/show_bug.cgi?id=1255131
- https://bugzilla.suse.com/show_bug.cgi?id=1255134
- https://bugzilla.suse.com/show_bug.cgi?id=1255135
- https://bugzilla.suse.com/show_bug.cgi?id=1255136
- https://bugzilla.suse.com/show_bug.cgi?id=1255138
- https://bugzilla.suse.com/show_bug.cgi?id=1255140
- https://bugzilla.suse.com/show_bug.cgi?id=1255142
- https://bugzilla.suse.com/show_bug.cgi?id=1255145
- https://bugzilla.suse.com/show_bug.cgi?id=1255146
- https://bugzilla.suse.com/show_bug.cgi?id=1255149
- https://bugzilla.suse.com/show_bug.cgi?id=1255150
- https://bugzilla.suse.com/show_bug.cgi?id=1255152
- https://bugzilla.suse.com/show_bug.cgi?id=1255154
- https://bugzilla.suse.com/show_bug.cgi?id=1255155
- https://bugzilla.suse.com/show_bug.cgi?id=1255156
- https://bugzilla.suse.com/show_bug.cgi?id=1255161
- https://bugzilla.suse.com/show_bug.cgi?id=1255167
- https://bugzilla.suse.com/show_bug.cgi?id=1255169
- https://bugzilla.suse.com/show_bug.cgi?id=1255171
- https://bugzilla.suse.com/show_bug.cgi?id=1255175
- https://bugzilla.suse.com/show_bug.cgi?id=1255179
- https://bugzilla.suse.com/show_bug.cgi?id=1255181
- https://bugzilla.suse.com/show_bug.cgi?id=1255182
- https://bugzilla.suse.com/show_bug.cgi?id=1255186
- https://bugzilla.suse.com/show_bug.cgi?id=1255187
- https://bugzilla.suse.com/show_bug.cgi?id=1255190
- https://bugzilla.suse.com/show_bug.cgi?id=1255193
- https://bugzilla.suse.com/show_bug.cgi?id=1255196
- https://bugzilla.suse.com/show_bug.cgi?id=1255197
- https://bugzilla.suse.com/show_bug.cgi?id=1255199
- https://bugzilla.suse.com/show_bug.cgi?id=1255202
- https://bugzilla.suse.com/show_bug.cgi?id=1255203
- https://bugzilla.suse.com/show_bug.cgi?id=1255206
- https://bugzilla.suse.com/show_bug.cgi?id=1255209
- https://bugzilla.suse.com/show_bug.cgi?id=1255218
- https://bugzilla.suse.com/show_bug.cgi?id=1255220
- https://bugzilla.suse.com/show_bug.cgi?id=1255221
- https://bugzilla.suse.com/show_bug.cgi?id=1255223
- https://bugzilla.suse.com/show_bug.cgi?id=1255226
- https://bugzilla.suse.com/show_bug.cgi?id=1255227
- https://bugzilla.suse.com/show_bug.cgi?id=1255228
- https://bugzilla.suse.com/show_bug.cgi?id=1255230
- https://bugzilla.suse.com/show_bug.cgi?id=1255231
- https://bugzilla.suse.com/show_bug.cgi?id=1255233
- https://bugzilla.suse.com/show_bug.cgi?id=1255234
- https://bugzilla.suse.com/show_bug.cgi?id=1255242
- https://bugzilla.suse.com/show_bug.cgi?id=1255243
- https://bugzilla.suse.com/show_bug.cgi?id=1255246
- https://bugzilla.suse.com/show_bug.cgi?id=1255247
- https://bugzilla.suse.com/show_bug.cgi?id=1255251
- https://bugzilla.suse.com/show_bug.cgi?id=1255252
- https://bugzilla.suse.com/show_bug.cgi?id=1255253
- https://bugzilla.suse.com/show_bug.cgi?id=1255255
- https://bugzilla.suse.com/show_bug.cgi?id=1255256
- https://bugzilla.suse.com/show_bug.cgi?id=1255259
- https://bugzilla.suse.com/show_bug.cgi?id=1255260
- https://bugzilla.suse.com/show_bug.cgi?id=1255261
- https://bugzilla.suse.com/show_bug.cgi?id=1255262
- https://bugzilla.suse.com/show_bug.cgi?id=1255272
- https://bugzilla.suse.com/show_bug.cgi?id=1255273
- https://bugzilla.suse.com/show_bug.cgi?id=1255274
- https://bugzilla.suse.com/show_bug.cgi?id=1255276
- https://bugzilla.suse.com/show_bug.cgi?id=1255279
- https://bugzilla.suse.com/show_bug.cgi?id=1255297
- https://bugzilla.suse.com/show_bug.cgi?id=1255312
- https://bugzilla.suse.com/show_bug.cgi?id=1255316
- https://bugzilla.suse.com/show_bug.cgi?id=1255318
- https://bugzilla.suse.com/show_bug.cgi?id=1255325
- https://bugzilla.suse.com/show_bug.cgi?id=1255329
- https://bugzilla.suse.com/show_bug.cgi?id=1255346
- https://bugzilla.suse.com/show_bug.cgi?id=1255349
- https://bugzilla.suse.com/show_bug.cgi?id=1255351
- https://bugzilla.suse.com/show_bug.cgi?id=1255354
- https://bugzilla.suse.com/show_bug.cgi?id=1255357
- https://bugzilla.suse.com/show_bug.cgi?id=1255377
- https://bugzilla.suse.com/show_bug.cgi?id=1255379
- https://bugzilla.suse.com/show_bug.cgi?id=1255380
- https://bugzilla.suse.com/show_bug.cgi?id=1255395
- https://bugzilla.suse.com/show_bug.cgi?id=1255401
- https://bugzilla.suse.com/show_bug.cgi?id=1255415
- https://bugzilla.suse.com/show_bug.cgi?id=1255428
- https://bugzilla.suse.com/show_bug.cgi?id=1255433
- https://bugzilla.suse.com/show_bug.cgi?id=1255434
- https://bugzilla.suse.com/show_bug.cgi?id=1255480
- https://bugzilla.suse.com/show_bug.cgi?id=1255483
- https://bugzilla.suse.com/show_bug.cgi?id=1255488
- https://bugzilla.suse.com/show_bug.cgi?id=1255489
- https://bugzilla.suse.com/show_bug.cgi?id=1255493
- https://bugzilla.suse.com/show_bug.cgi?id=1255495
- https://bugzilla.suse.com/show_bug.cgi?id=1255505
- https://bugzilla.suse.com/show_bug.cgi?id=1255507
- https://bugzilla.suse.com/show_bug.cgi?id=1255508
- https://bugzilla.suse.com/show_bug.cgi?id=1255509
- https://bugzilla.suse.com/show_bug.cgi?id=1255533
- https://bugzilla.suse.com/show_bug.cgi?id=1255541
- https://bugzilla.suse.com/show_bug.cgi?id=1255550
- https://bugzilla.suse.com/show_bug.cgi?id=1255552
- https://bugzilla.suse.com/show_bug.cgi?id=1255553
- https://bugzilla.suse.com/show_bug.cgi?id=1255567
- https://bugzilla.suse.com/show_bug.cgi?id=1255580
- https://bugzilla.suse.com/show_bug.cgi?id=1255601
- https://bugzilla.suse.com/show_bug.cgi?id=1255603
- https://bugzilla.suse.com/show_bug.cgi?id=1255611
- https://bugzilla.suse.com/show_bug.cgi?id=1255614
- https://bugzilla.suse.com/show_bug.cgi?id=1255672
- https://bugzilla.suse.com/show_bug.cgi?id=1255688
- https://bugzilla.suse.com/show_bug.cgi?id=1255698
- https://bugzilla.suse.com/show_bug.cgi?id=1255706
- https://bugzilla.suse.com/show_bug.cgi?id=1255707
- https://bugzilla.suse.com/show_bug.cgi?id=1255709
- https://bugzilla.suse.com/show_bug.cgi?id=1255722
- https://bugzilla.suse.com/show_bug.cgi?id=1255723
- https://bugzilla.suse.com/show_bug.cgi?id=1255724
- https://bugzilla.suse.com/show_bug.cgi?id=1255812
- https://bugzilla.suse.com/show_bug.cgi?id=1255813
- https://bugzilla.suse.com/show_bug.cgi?id=1255814
- https://bugzilla.suse.com/show_bug.cgi?id=1255816
- https://bugzilla.suse.com/show_bug.cgi?id=1255931
- https://bugzilla.suse.com/show_bug.cgi?id=1255932
- https://bugzilla.suse.com/show_bug.cgi?id=1255934
- https://bugzilla.suse.com/show_bug.cgi?id=1255943
- https://bugzilla.suse.com/show_bug.cgi?id=1255944
- https://bugzilla.suse.com/show_bug.cgi?id=1256238
- https://bugzilla.suse.com/show_bug.cgi?id=1256495
- https://bugzilla.suse.com/show_bug.cgi?id=1256606
- https://bugzilla.suse.com/show_bug.cgi?id=1256794
- https://jira.suse.com/browse/PED-12745
- https://jira.suse.com/browse/PED-14344
- https://jira.suse.com/browse/PED-14571