Security update for the Linux Kernel
| Announcement ID: | SUSE-SU-2026:20838-1 |
|---|---|
| Release Date: | 2026-03-25T08:52:20Z |
| Rating: | important |
| References: |
|
| Cross-References: |
|
| CVSS scores: |
|
| Affected Products: |
|
An update that solves 176 vulnerabilities, contains two features and has 24 fixes can now be installed.
Description:
The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues.
The following security issues were fixed:
- CVE-2025-39753: gfs2: Set .migrate_folio in gfs2_{rgrp,meta}_aops (bsc#1249590).
- CVE-2025-39964: crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg (bsc#1251966).
- CVE-2025-40099: cifs: parse_dfs_referrals: prevent oob on malformed input (bsc#1252911).
- CVE-2025-40103: smb: client: Fix refcount leak for cifs_sb_tlink (bsc#1252924).
- CVE-2025-40230: mm: prevent poison consumption when splitting THP (bsc#1254817).
- CVE-2025-68173: ftrace: Fix softlockup in ftrace_module_enable (bsc#1255311).
- CVE-2025-68186: ring-buffer: Do not warn in ring_buffer_map_get_reader() when reader catches up (bsc#1255144).
- CVE-2025-68292: mm/memfd: fix information leak in hugetlb folios (bsc#1255148).
- CVE-2025-68295: smb: client: fix memory leak in cifs_construct_tcon() (bsc#1255129).
- CVE-2025-68329: tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs (bsc#1255490).
- CVE-2025-68371: scsi: smartpqi: Fix device resources accessed after device removal (bsc#1255572).
- CVE-2025-68745: scsi: qla2xxx: Clear cmds after chip reset (bsc#1255721).
- CVE-2025-68785: net: openvswitch: fix middle attribute validation in push_nsh() action (bsc#1256640).
- CVE-2025-68810: KVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot (bsc#1256679).
- CVE-2025-71071: iommu/mediatek: fix use-after-free on probe deferral (bsc#1256802).
- CVE-2025-71104: KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer (bsc#1256708).
- CVE-2025-71125: tracing: Do not register unsupported perf events (bsc#1256784).
- CVE-2025-71134: mm/page_alloc: change all pageblocks migrate type on coalescing (bsc#1256732).
- CVE-2025-71161: dm-verity: disable recursive forward error correction (bsc#1257174).
- CVE-2025-71184: btrfs: tracepoints: use btrfs_root_id() to get the id of a root (bsc#1257635).
- CVE-2025-71193: phy: qcom-qusb2: Fix NULL pointer dereference on early suspend (bsc#1257686).
- CVE-2025-71225: md: suspend array while updating raid_disks via sysfs (bsc#1258411).
- CVE-2026-22979: net: fix memory leak in skb_segment_list for GRO packets (bsc#1257228).
- CVE-2026-22998: nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec (bsc#1257209).
- CVE-2026-23003: ip6_tunnel: use skb_vlan_inet_prepare() in __ip6_tnl_rcv() (bsc#1257246).
- CVE-2026-23004: dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list() (bsc#1257231).
- CVE-2026-23010: ipv6: Fix use-after-free in inet6_addr_del() (bsc#1257332).
- CVE-2026-23017: idpf: fix error handling in the init_task on load (bsc#1257552).
- CVE-2026-23022: idpf: fix memory leak in idpf_vc_core_deinit() (bsc#1257581).
- CVE-2026-23023: idpf: fix memory leak in idpf_vport_rel() (bsc#1257556).
- CVE-2026-23024: idpf: fix memory leak of flow steer list on rmmod (bsc#1257572).
- CVE-2026-23035: net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv (bsc#1257559).
- CVE-2026-23042: idpf: fix aux device unplugging when rdma is not supported by vport (bsc#1257705).
- CVE-2026-23047: libceph: make calc_target() set t->paused, not just clear it (bsc#1257682).
- CVE-2026-23053: NFS: Fix a deadlock involving nfs_release_folio() (bsc#1257718).
- CVE-2026-23057: vsock/virtio: Coalesce only linear skb (bsc#1257740).
- CVE-2026-23064: net/sched: act_ife: avoid possible NULL deref (bsc#1257765).
- CVE-2026-23066: rxrpc: Fix recvmsg() unconditional requeue (bsc#1257726).
- CVE-2026-23068: spi: spi-sprd-adi: Fix double free in probe error path (bsc#1257805).
- CVE-2026-23069: vsock/virtio: fix potential underflow in virtio_transport_get_credit() (bsc#1257755).
- CVE-2026-23070: Octeontx2-af: Add proper checks for fwdata (bsc#1257709).
- CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1257749).
- CVE-2026-23083: tools: ynl-gen: use big-endian netlink attribute types (bsc#1257745).
- CVE-2026-23084: be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list (bsc#1257830).
- CVE-2026-23085: irqchip/gic-v3-its: Avoid truncating memory addresses (bsc#1257758).
- CVE-2026-23086: vsock/virtio: cap TX credit to local buffer size (bsc#1257757).
- CVE-2026-23088: tracing: Fix crash on synthetic stacktrace field usage (bsc#1257814).
- CVE-2026-23095: gue: Fix skb memleak with inner IP protocol 0 (bsc#1257808).
- CVE-2026-23097: migrate: correct lock ordering for hugetlb file folios (bsc#1257815).
- CVE-2026-23099: bonding: limit BOND_MODE_8023AD to Ethernet devices (bsc#1257816).
- CVE-2026-23100: mm/hugetlb: fix hugetlb_pmd_shared() (bsc#1257817).
- CVE-2026-23102: arm64/fpsimd: signal: Fix restoration of SVE context (bsc#1257772).
- CVE-2026-23104: ice: fix devlink reload call trace (bsc#1257763).
- CVE-2026-23105: net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag (bsc#1257775).
- CVE-2026-23107: arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA (bsc#1257762).
- CVE-2026-23110: scsi: core: Wake up the error handler when final completions race against each other (bsc#1257761).
- CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() (bsc#1258181).
- CVE-2026-23112: nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec (bsc#1258184).
- CVE-2026-23116: pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu (bsc#1258277).
- CVE-2026-23119: bonding: provide a net pointer to __skb_flow_dissect() (bsc#1258273).
- CVE-2026-23136: libceph: reset sparse-read state in osd_fault() (bsc#1258303).
- CVE-2026-23139: netfilter: nf_conncount: update last_gc only when GC has been performed (bsc#1258304).
- CVE-2026-23141: btrfs: send: check for inline extents in range_is_hole_in_parent() (bsc#1258377).
- CVE-2026-23142: mm/damon/sysfs-scheme: cleanup access_pattern subdirs on scheme dir setup failure (bsc#1258289).
- CVE-2026-23144: mm/damon/sysfs: cleanup attrs subdirs on context dir setup failure (bsc#1258290).
- CVE-2026-23148: nvmet: fix race in nvmet_bio_done() leading to NULL pointer dereference (bsc#1258258).
- CVE-2026-23154: net: fix segmentation of forwarding fraglist GRO (bsc#1258286).
- CVE-2026-23161: mm/shmem, swap: fix race of truncate and swap entry split (bsc#1258355).
- CVE-2026-23166: ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues (bsc#1258272).
- CVE-2026-23169: mptcp: fix race in mptcp_pm_nl_flush_addrs_doit() (bsc#1258389).
- CVE-2026-23171: bonding: fix use-after-free due to enslave fail after slave array update (bsc#1258349).
- CVE-2026-23173: net/mlx5e: TC, delete flows only for existing peers (bsc#1258520).
- CVE-2026-23179: nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready() (bsc#1258394).
- CVE-2026-23189: ceph: fix NULL pointer dereference in ceph_mds_auth_match() (bsc#1258308).
- CVE-2026-23198: KVM: Don't clobber irqfd routing type when deassigning irqfd (bsc#1258321).
- CVE-2026-23208: ALSA: usb-audio: Prevent excessive number of frames (bsc#1258468).
- CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258518).
- CVE-2026-23210: ice: Fix PTP NULL pointer dereference during VSI rebuild (bsc#1258517).
- CVE-2026-23214: btrfs: reject new transactions if the fs is fully read-only (bsc#1258464).
- CVE-2026-23223: xfs: fix UAF in xchk_btree_check_block_owner (bsc#1258483).
- CVE-2026-23224: erofs: fix UAF issue for file-backed mounts w/ directio option (bsc#1258461).
The following non security issues were fixed:
- ALSA: usb-audio: Update the number of packets properly at receiving (stable-fixes).
- ALSA: usb-audio: fix broken logic in snd_audigy2nx_led_update() (git-fixes).
- ASoC: SOF: ipc4-control: If there is no data do not send bytes update (git-fixes).
- Add bugnumber to existing mana and mana_ib changes (bsc#1251135 bsc#1251971).
- HID: apple: Add EPOMAKER TH87 to the non-apple keyboards list (bsc#1258455).
- HID: intel-ish-hid: Update ishtp bus match to support device ID table (stable-fixes).
- PCI/DOE: Poll DOE Busy bit for up to 1 second in pci_doe_send_req() (bsc#1255868).
- PCI: Add ASPEED vendor ID to pci_ids.h (bsc#1258672)
- PCI: Add PCI_BRIDGE_NO_ALIAS quirk for ASPEED AST1150 (bsc#1258672)
- PM: sleep: wakeirq: Update outdated documentation comments (git-fixes).
- Refresh and move upstreamed ath12k patch into sorted section
- Update "drm/mgag200: fix mgag200_bmc_stop_scanout()" bug number (bsc#1258153)
- add bugnumber to existing mana change (bsc#1252266).
- arm64: contpte: fix set_access_flags() no-op check for SMMU/ATS (bsc#1259329)
- bonding: only set speed/duplex to unknown, if getting speed failed (bsc#1253691).
- can: bcm: fix locking for bcm_op runtime updates (git-fixes).
- clk: qcom: gcc-sm8450: Update the SDCC RCGs to use shared_floor_ops (git-fixes).
- clocksource: Fix the CPUs' choice in the watchdog per CPU verification (bsc#1257818).
- clocksource: Print durations for sync check unconditionally (bsc#1257818).
- clocksource: Reduce watchdog readout delay limit to prevent false positives (bsc#1257818).
- clocksource: Use pr_info() for "Checking clocksource synchronization" message (bsc#1257818).
- dm: Fix deadlock when reloading a multipath table (bsc#1254928).
- drm/i915/display: Add quirk to skip retraining of dp link (bsc#1253129).
- ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref (git-fixes).
- gpiolib-acpi: Update file references in the Documentation and MAINTAINERS (git-fixes).
- i3c: master: Update hot-join flag only on success (git-fixes).
- ktls, sockmap: Fix missing uncharge operation (bsc#1252008).
- media: qcom: camss: vfe: Fix out-of-bounds access in vfe_isr_reg_update() (git-fixes).
- modpost: Ensure exported symbol namespaces are not quoted (bsc#1258489).
- net: mana: Handle hardware recovery events when probing the device (bsc#1257466).
- net: mana: Implement ndo_tx_timeout and serialize queue resets per port (bsc#1257472).
- platform/x86/amd: amd_3d_vcache: Add AMD 3D V-Cache optimizer driver (jsc#PED-11563).
- sched/core: Avoid direct access to hrtimer clockbase (bsc#1234634).
- sched/deadline: Fix race in push_dl_task() (bsc#1234634).
- sched/deadline: Stop dl_server before CPU goes offline (bsc#1234634).
- sched/fair: Fix pelt clock sync when entering idle (bsc#1234634).
- sched/fair: Fix pelt lost idle time detection (bsc#1234634).
- staging: rtl8723bs: fix missing status update on sdio_alloc_irq() failure (stable-fixes).
- wifi: cfg80211: Fix use_for flag update on BSS refresh (git-fixes).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Micro 6.2
zypper in -t patch SUSE-SL-Micro-6.2-435=1
Package List:
-
SUSE Linux Micro 6.2 (noarch)
- kernel-devel-6.12.0-160000.27.1
- kernel-source-6.12.0-160000.27.1
- kernel-macros-6.12.0-160000.27.1
-
SUSE Linux Micro 6.2 (aarch64 ppc64le x86_64)
- kernel-default-base-6.12.0-160000.27.1.160000.2.8
-
SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64 nosrc)
- kernel-default-6.12.0-160000.27.1
-
SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64)
- kernel-default-extra-6.12.0-160000.27.1
- kernel-default-extra-debuginfo-6.12.0-160000.27.1
- kernel-default-debugsource-6.12.0-160000.27.1
- kernel-default-debuginfo-6.12.0-160000.27.1
- kernel-default-devel-6.12.0-160000.27.1
-
SUSE Linux Micro 6.2 (x86_64)
- kernel-rt-devel-debuginfo-6.12.0-160000.27.1
- kernel-rt-livepatch-6.12.0-160000.27.1
- kernel-default-devel-debuginfo-6.12.0-160000.27.1
-
SUSE Linux Micro 6.2 (ppc64le s390x x86_64)
- kernel-default-livepatch-6.12.0-160000.27.1
-
SUSE Linux Micro 6.2 (aarch64 nosrc x86_64)
- kernel-rt-6.12.0-160000.27.1
-
SUSE Linux Micro 6.2 (aarch64 x86_64)
- kernel-rt-debugsource-6.12.0-160000.27.1
- kernel-rt-devel-6.12.0-160000.27.1
- kernel-rt-debuginfo-6.12.0-160000.27.1
-
SUSE Linux Micro 6.2 (aarch64 nosrc)
- kernel-64kb-6.12.0-160000.27.1
-
SUSE Linux Micro 6.2 (aarch64)
- kernel-64kb-debugsource-6.12.0-160000.27.1
- kernel-64kb-debuginfo-6.12.0-160000.27.1
- kernel-64kb-devel-6.12.0-160000.27.1
References:
- https://www.suse.com/security/cve/CVE-2025-39753.html
- https://www.suse.com/security/cve/CVE-2025-39964.html
- https://www.suse.com/security/cve/CVE-2025-40099.html
- https://www.suse.com/security/cve/CVE-2025-40103.html
- https://www.suse.com/security/cve/CVE-2025-40230.html
- https://www.suse.com/security/cve/CVE-2025-68173.html
- https://www.suse.com/security/cve/CVE-2025-68186.html
- https://www.suse.com/security/cve/CVE-2025-68292.html
- https://www.suse.com/security/cve/CVE-2025-68295.html
- https://www.suse.com/security/cve/CVE-2025-68329.html
- https://www.suse.com/security/cve/CVE-2025-68371.html
- https://www.suse.com/security/cve/CVE-2025-68745.html
- https://www.suse.com/security/cve/CVE-2025-68785.html
- https://www.suse.com/security/cve/CVE-2025-68810.html
- https://www.suse.com/security/cve/CVE-2025-68818.html
- https://www.suse.com/security/cve/CVE-2025-71071.html
- https://www.suse.com/security/cve/CVE-2025-71104.html
- https://www.suse.com/security/cve/CVE-2025-71125.html
- https://www.suse.com/security/cve/CVE-2025-71134.html
- https://www.suse.com/security/cve/CVE-2025-71161.html
- https://www.suse.com/security/cve/CVE-2025-71182.html
- https://www.suse.com/security/cve/CVE-2025-71183.html
- https://www.suse.com/security/cve/CVE-2025-71184.html
- https://www.suse.com/security/cve/CVE-2025-71185.html
- https://www.suse.com/security/cve/CVE-2025-71186.html
- https://www.suse.com/security/cve/CVE-2025-71188.html
- https://www.suse.com/security/cve/CVE-2025-71189.html
- https://www.suse.com/security/cve/CVE-2025-71190.html
- https://www.suse.com/security/cve/CVE-2025-71191.html
- https://www.suse.com/security/cve/CVE-2025-71192.html
- https://www.suse.com/security/cve/CVE-2025-71193.html
- https://www.suse.com/security/cve/CVE-2025-71194.html
- https://www.suse.com/security/cve/CVE-2025-71195.html
- https://www.suse.com/security/cve/CVE-2025-71196.html
- https://www.suse.com/security/cve/CVE-2025-71197.html
- https://www.suse.com/security/cve/CVE-2025-71198.html
- https://www.suse.com/security/cve/CVE-2025-71199.html
- https://www.suse.com/security/cve/CVE-2025-71200.html
- https://www.suse.com/security/cve/CVE-2025-71222.html
- https://www.suse.com/security/cve/CVE-2025-71224.html
- https://www.suse.com/security/cve/CVE-2025-71225.html
- https://www.suse.com/security/cve/CVE-2025-71229.html
- https://www.suse.com/security/cve/CVE-2025-71231.html
- https://www.suse.com/security/cve/CVE-2025-71232.html
- https://www.suse.com/security/cve/CVE-2025-71233.html
- https://www.suse.com/security/cve/CVE-2025-71234.html
- https://www.suse.com/security/cve/CVE-2025-71235.html
- https://www.suse.com/security/cve/CVE-2025-71236.html
- https://www.suse.com/security/cve/CVE-2026-22979.html
- https://www.suse.com/security/cve/CVE-2026-22980.html
- https://www.suse.com/security/cve/CVE-2026-22998.html
- https://www.suse.com/security/cve/CVE-2026-23003.html
- https://www.suse.com/security/cve/CVE-2026-23004.html
- https://www.suse.com/security/cve/CVE-2026-23010.html
- https://www.suse.com/security/cve/CVE-2026-23017.html
- https://www.suse.com/security/cve/CVE-2026-23018.html
- https://www.suse.com/security/cve/CVE-2026-23021.html
- https://www.suse.com/security/cve/CVE-2026-23022.html
- https://www.suse.com/security/cve/CVE-2026-23023.html
- https://www.suse.com/security/cve/CVE-2026-23024.html
- https://www.suse.com/security/cve/CVE-2026-23026.html
- https://www.suse.com/security/cve/CVE-2026-23030.html
- https://www.suse.com/security/cve/CVE-2026-23031.html
- https://www.suse.com/security/cve/CVE-2026-23033.html
- https://www.suse.com/security/cve/CVE-2026-23035.html
- https://www.suse.com/security/cve/CVE-2026-23037.html
- https://www.suse.com/security/cve/CVE-2026-23038.html
- https://www.suse.com/security/cve/CVE-2026-23042.html
- https://www.suse.com/security/cve/CVE-2026-23047.html
- https://www.suse.com/security/cve/CVE-2026-23049.html
- https://www.suse.com/security/cve/CVE-2026-23050.html
- https://www.suse.com/security/cve/CVE-2026-23053.html
- https://www.suse.com/security/cve/CVE-2026-23054.html
- https://www.suse.com/security/cve/CVE-2026-23055.html
- https://www.suse.com/security/cve/CVE-2026-23056.html
- https://www.suse.com/security/cve/CVE-2026-23057.html
- https://www.suse.com/security/cve/CVE-2026-23058.html
- https://www.suse.com/security/cve/CVE-2026-23059.html
- https://www.suse.com/security/cve/CVE-2026-23060.html
- https://www.suse.com/security/cve/CVE-2026-23061.html
- https://www.suse.com/security/cve/CVE-2026-23062.html
- https://www.suse.com/security/cve/CVE-2026-23063.html
- https://www.suse.com/security/cve/CVE-2026-23064.html
- https://www.suse.com/security/cve/CVE-2026-23065.html
- https://www.suse.com/security/cve/CVE-2026-23066.html
- https://www.suse.com/security/cve/CVE-2026-23068.html
- https://www.suse.com/security/cve/CVE-2026-23069.html
- https://www.suse.com/security/cve/CVE-2026-23070.html
- https://www.suse.com/security/cve/CVE-2026-23071.html
- https://www.suse.com/security/cve/CVE-2026-23073.html
- https://www.suse.com/security/cve/CVE-2026-23074.html
- https://www.suse.com/security/cve/CVE-2026-23076.html
- https://www.suse.com/security/cve/CVE-2026-23078.html
- https://www.suse.com/security/cve/CVE-2026-23080.html
- https://www.suse.com/security/cve/CVE-2026-23082.html
- https://www.suse.com/security/cve/CVE-2026-23083.html
- https://www.suse.com/security/cve/CVE-2026-23084.html
- https://www.suse.com/security/cve/CVE-2026-23085.html
- https://www.suse.com/security/cve/CVE-2026-23086.html
- https://www.suse.com/security/cve/CVE-2026-23088.html
- https://www.suse.com/security/cve/CVE-2026-23089.html
- https://www.suse.com/security/cve/CVE-2026-23090.html
- https://www.suse.com/security/cve/CVE-2026-23091.html
- https://www.suse.com/security/cve/CVE-2026-23094.html
- https://www.suse.com/security/cve/CVE-2026-23095.html
- https://www.suse.com/security/cve/CVE-2026-23096.html
- https://www.suse.com/security/cve/CVE-2026-23097.html
- https://www.suse.com/security/cve/CVE-2026-23099.html
- https://www.suse.com/security/cve/CVE-2026-23100.html
- https://www.suse.com/security/cve/CVE-2026-23101.html
- https://www.suse.com/security/cve/CVE-2026-23102.html
- https://www.suse.com/security/cve/CVE-2026-23104.html
- https://www.suse.com/security/cve/CVE-2026-23105.html
- https://www.suse.com/security/cve/CVE-2026-23107.html
- https://www.suse.com/security/cve/CVE-2026-23108.html
- https://www.suse.com/security/cve/CVE-2026-23110.html
- https://www.suse.com/security/cve/CVE-2026-23111.html
- https://www.suse.com/security/cve/CVE-2026-23112.html
- https://www.suse.com/security/cve/CVE-2026-23116.html
- https://www.suse.com/security/cve/CVE-2026-23119.html
- https://www.suse.com/security/cve/CVE-2026-23121.html
- https://www.suse.com/security/cve/CVE-2026-23123.html
- https://www.suse.com/security/cve/CVE-2026-23128.html
- https://www.suse.com/security/cve/CVE-2026-23129.html
- https://www.suse.com/security/cve/CVE-2026-23131.html
- https://www.suse.com/security/cve/CVE-2026-23133.html
- https://www.suse.com/security/cve/CVE-2026-23135.html
- https://www.suse.com/security/cve/CVE-2026-23136.html
- https://www.suse.com/security/cve/CVE-2026-23137.html
- https://www.suse.com/security/cve/CVE-2026-23139.html
- https://www.suse.com/security/cve/CVE-2026-23141.html
- https://www.suse.com/security/cve/CVE-2026-23142.html
- https://www.suse.com/security/cve/CVE-2026-23144.html
- https://www.suse.com/security/cve/CVE-2026-23145.html
- https://www.suse.com/security/cve/CVE-2026-23146.html
- https://www.suse.com/security/cve/CVE-2026-23148.html
- https://www.suse.com/security/cve/CVE-2026-23150.html
- https://www.suse.com/security/cve/CVE-2026-23151.html
- https://www.suse.com/security/cve/CVE-2026-23152.html
- https://www.suse.com/security/cve/CVE-2026-23154.html
- https://www.suse.com/security/cve/CVE-2026-23155.html
- https://www.suse.com/security/cve/CVE-2026-23156.html
- https://www.suse.com/security/cve/CVE-2026-23157.html
- https://www.suse.com/security/cve/CVE-2026-23158.html
- https://www.suse.com/security/cve/CVE-2026-23161.html
- https://www.suse.com/security/cve/CVE-2026-23163.html
- https://www.suse.com/security/cve/CVE-2026-23166.html
- https://www.suse.com/security/cve/CVE-2026-23167.html
- https://www.suse.com/security/cve/CVE-2026-23169.html
- https://www.suse.com/security/cve/CVE-2026-23170.html
- https://www.suse.com/security/cve/CVE-2026-23171.html
- https://www.suse.com/security/cve/CVE-2026-23172.html
- https://www.suse.com/security/cve/CVE-2026-23173.html
- https://www.suse.com/security/cve/CVE-2026-23176.html
- https://www.suse.com/security/cve/CVE-2026-23177.html
- https://www.suse.com/security/cve/CVE-2026-23178.html
- https://www.suse.com/security/cve/CVE-2026-23179.html
- https://www.suse.com/security/cve/CVE-2026-23182.html
- https://www.suse.com/security/cve/CVE-2026-23188.html
- https://www.suse.com/security/cve/CVE-2026-23189.html
- https://www.suse.com/security/cve/CVE-2026-23190.html
- https://www.suse.com/security/cve/CVE-2026-23191.html
- https://www.suse.com/security/cve/CVE-2026-23198.html
- https://www.suse.com/security/cve/CVE-2026-23202.html
- https://www.suse.com/security/cve/CVE-2026-23207.html
- https://www.suse.com/security/cve/CVE-2026-23208.html
- https://www.suse.com/security/cve/CVE-2026-23209.html
- https://www.suse.com/security/cve/CVE-2026-23210.html
- https://www.suse.com/security/cve/CVE-2026-23213.html
- https://www.suse.com/security/cve/CVE-2026-23214.html
- https://www.suse.com/security/cve/CVE-2026-23221.html
- https://www.suse.com/security/cve/CVE-2026-23222.html
- https://www.suse.com/security/cve/CVE-2026-23223.html
- https://www.suse.com/security/cve/CVE-2026-23224.html
- https://www.suse.com/security/cve/CVE-2026-23229.html
- https://www.suse.com/security/cve/CVE-2026-23230.html
- https://bugzilla.suse.com/show_bug.cgi?id=1234634
- https://bugzilla.suse.com/show_bug.cgi?id=1249590
- https://bugzilla.suse.com/show_bug.cgi?id=1250748
- https://bugzilla.suse.com/show_bug.cgi?id=1251135
- https://bugzilla.suse.com/show_bug.cgi?id=1251966
- https://bugzilla.suse.com/show_bug.cgi?id=1251971
- https://bugzilla.suse.com/show_bug.cgi?id=1252008
- https://bugzilla.suse.com/show_bug.cgi?id=1252266
- https://bugzilla.suse.com/show_bug.cgi?id=1252911
- https://bugzilla.suse.com/show_bug.cgi?id=1252924
- https://bugzilla.suse.com/show_bug.cgi?id=1253129
- https://bugzilla.suse.com/show_bug.cgi?id=1253691
- https://bugzilla.suse.com/show_bug.cgi?id=1254817
- https://bugzilla.suse.com/show_bug.cgi?id=1254928
- https://bugzilla.suse.com/show_bug.cgi?id=1255129
- https://bugzilla.suse.com/show_bug.cgi?id=1255144
- https://bugzilla.suse.com/show_bug.cgi?id=1255148
- https://bugzilla.suse.com/show_bug.cgi?id=1255311
- https://bugzilla.suse.com/show_bug.cgi?id=1255490
- https://bugzilla.suse.com/show_bug.cgi?id=1255572
- https://bugzilla.suse.com/show_bug.cgi?id=1255721
- https://bugzilla.suse.com/show_bug.cgi?id=1255868
- https://bugzilla.suse.com/show_bug.cgi?id=1256640
- https://bugzilla.suse.com/show_bug.cgi?id=1256675
- https://bugzilla.suse.com/show_bug.cgi?id=1256679
- https://bugzilla.suse.com/show_bug.cgi?id=1256708
- https://bugzilla.suse.com/show_bug.cgi?id=1256732
- https://bugzilla.suse.com/show_bug.cgi?id=1256784
- https://bugzilla.suse.com/show_bug.cgi?id=1256802
- https://bugzilla.suse.com/show_bug.cgi?id=1256865
- https://bugzilla.suse.com/show_bug.cgi?id=1256867
- https://bugzilla.suse.com/show_bug.cgi?id=1257154
- https://bugzilla.suse.com/show_bug.cgi?id=1257174
- https://bugzilla.suse.com/show_bug.cgi?id=1257209
- https://bugzilla.suse.com/show_bug.cgi?id=1257222
- https://bugzilla.suse.com/show_bug.cgi?id=1257228
- https://bugzilla.suse.com/show_bug.cgi?id=1257231
- https://bugzilla.suse.com/show_bug.cgi?id=1257246
- https://bugzilla.suse.com/show_bug.cgi?id=1257332
- https://bugzilla.suse.com/show_bug.cgi?id=1257466
- https://bugzilla.suse.com/show_bug.cgi?id=1257472
- https://bugzilla.suse.com/show_bug.cgi?id=1257473
- https://bugzilla.suse.com/show_bug.cgi?id=1257551
- https://bugzilla.suse.com/show_bug.cgi?id=1257552
- https://bugzilla.suse.com/show_bug.cgi?id=1257553
- https://bugzilla.suse.com/show_bug.cgi?id=1257554
- https://bugzilla.suse.com/show_bug.cgi?id=1257556
- https://bugzilla.suse.com/show_bug.cgi?id=1257557
- https://bugzilla.suse.com/show_bug.cgi?id=1257559
- https://bugzilla.suse.com/show_bug.cgi?id=1257560
- https://bugzilla.suse.com/show_bug.cgi?id=1257561
- https://bugzilla.suse.com/show_bug.cgi?id=1257562
- https://bugzilla.suse.com/show_bug.cgi?id=1257565
- https://bugzilla.suse.com/show_bug.cgi?id=1257570
- https://bugzilla.suse.com/show_bug.cgi?id=1257572
- https://bugzilla.suse.com/show_bug.cgi?id=1257573
- https://bugzilla.suse.com/show_bug.cgi?id=1257576
- https://bugzilla.suse.com/show_bug.cgi?id=1257579
- https://bugzilla.suse.com/show_bug.cgi?id=1257580
- https://bugzilla.suse.com/show_bug.cgi?id=1257581
- https://bugzilla.suse.com/show_bug.cgi?id=1257586
- https://bugzilla.suse.com/show_bug.cgi?id=1257600
- https://bugzilla.suse.com/show_bug.cgi?id=1257631
- https://bugzilla.suse.com/show_bug.cgi?id=1257635
- https://bugzilla.suse.com/show_bug.cgi?id=1257679
- https://bugzilla.suse.com/show_bug.cgi?id=1257682
- https://bugzilla.suse.com/show_bug.cgi?id=1257686
- https://bugzilla.suse.com/show_bug.cgi?id=1257687
- https://bugzilla.suse.com/show_bug.cgi?id=1257688
- https://bugzilla.suse.com/show_bug.cgi?id=1257704
- https://bugzilla.suse.com/show_bug.cgi?id=1257705
- https://bugzilla.suse.com/show_bug.cgi?id=1257706
- https://bugzilla.suse.com/show_bug.cgi?id=1257707
- https://bugzilla.suse.com/show_bug.cgi?id=1257709
- https://bugzilla.suse.com/show_bug.cgi?id=1257714
- https://bugzilla.suse.com/show_bug.cgi?id=1257715
- https://bugzilla.suse.com/show_bug.cgi?id=1257716
- https://bugzilla.suse.com/show_bug.cgi?id=1257718
- https://bugzilla.suse.com/show_bug.cgi?id=1257722
- https://bugzilla.suse.com/show_bug.cgi?id=1257723
- https://bugzilla.suse.com/show_bug.cgi?id=1257726
- https://bugzilla.suse.com/show_bug.cgi?id=1257729
- https://bugzilla.suse.com/show_bug.cgi?id=1257730
- https://bugzilla.suse.com/show_bug.cgi?id=1257732
- https://bugzilla.suse.com/show_bug.cgi?id=1257734
- https://bugzilla.suse.com/show_bug.cgi?id=1257735
- https://bugzilla.suse.com/show_bug.cgi?id=1257737
- https://bugzilla.suse.com/show_bug.cgi?id=1257739
- https://bugzilla.suse.com/show_bug.cgi?id=1257740
- https://bugzilla.suse.com/show_bug.cgi?id=1257741
- https://bugzilla.suse.com/show_bug.cgi?id=1257742
- https://bugzilla.suse.com/show_bug.cgi?id=1257743
- https://bugzilla.suse.com/show_bug.cgi?id=1257745
- https://bugzilla.suse.com/show_bug.cgi?id=1257749
- https://bugzilla.suse.com/show_bug.cgi?id=1257750
- https://bugzilla.suse.com/show_bug.cgi?id=1257755
- https://bugzilla.suse.com/show_bug.cgi?id=1257757
- https://bugzilla.suse.com/show_bug.cgi?id=1257758
- https://bugzilla.suse.com/show_bug.cgi?id=1257759
- https://bugzilla.suse.com/show_bug.cgi?id=1257761
- https://bugzilla.suse.com/show_bug.cgi?id=1257762
- https://bugzilla.suse.com/show_bug.cgi?id=1257763
- https://bugzilla.suse.com/show_bug.cgi?id=1257765
- https://bugzilla.suse.com/show_bug.cgi?id=1257768
- https://bugzilla.suse.com/show_bug.cgi?id=1257770
- https://bugzilla.suse.com/show_bug.cgi?id=1257772
- https://bugzilla.suse.com/show_bug.cgi?id=1257775
- https://bugzilla.suse.com/show_bug.cgi?id=1257776
- https://bugzilla.suse.com/show_bug.cgi?id=1257788
- https://bugzilla.suse.com/show_bug.cgi?id=1257789
- https://bugzilla.suse.com/show_bug.cgi?id=1257790
- https://bugzilla.suse.com/show_bug.cgi?id=1257805
- https://bugzilla.suse.com/show_bug.cgi?id=1257808
- https://bugzilla.suse.com/show_bug.cgi?id=1257809
- https://bugzilla.suse.com/show_bug.cgi?id=1257811
- https://bugzilla.suse.com/show_bug.cgi?id=1257813
- https://bugzilla.suse.com/show_bug.cgi?id=1257814
- https://bugzilla.suse.com/show_bug.cgi?id=1257815
- https://bugzilla.suse.com/show_bug.cgi?id=1257816
- https://bugzilla.suse.com/show_bug.cgi?id=1257817
- https://bugzilla.suse.com/show_bug.cgi?id=1257818
- https://bugzilla.suse.com/show_bug.cgi?id=1257830
- https://bugzilla.suse.com/show_bug.cgi?id=1257942
- https://bugzilla.suse.com/show_bug.cgi?id=1257952
- https://bugzilla.suse.com/show_bug.cgi?id=1258153
- https://bugzilla.suse.com/show_bug.cgi?id=1258181
- https://bugzilla.suse.com/show_bug.cgi?id=1258184
- https://bugzilla.suse.com/show_bug.cgi?id=1258222
- https://bugzilla.suse.com/show_bug.cgi?id=1258232
- https://bugzilla.suse.com/show_bug.cgi?id=1258234
- https://bugzilla.suse.com/show_bug.cgi?id=1258237
- https://bugzilla.suse.com/show_bug.cgi?id=1258245
- https://bugzilla.suse.com/show_bug.cgi?id=1258249
- https://bugzilla.suse.com/show_bug.cgi?id=1258252
- https://bugzilla.suse.com/show_bug.cgi?id=1258256
- https://bugzilla.suse.com/show_bug.cgi?id=1258258
- https://bugzilla.suse.com/show_bug.cgi?id=1258259
- https://bugzilla.suse.com/show_bug.cgi?id=1258272
- https://bugzilla.suse.com/show_bug.cgi?id=1258273
- https://bugzilla.suse.com/show_bug.cgi?id=1258276
- https://bugzilla.suse.com/show_bug.cgi?id=1258277
- https://bugzilla.suse.com/show_bug.cgi?id=1258279
- https://bugzilla.suse.com/show_bug.cgi?id=1258286
- https://bugzilla.suse.com/show_bug.cgi?id=1258289
- https://bugzilla.suse.com/show_bug.cgi?id=1258290
- https://bugzilla.suse.com/show_bug.cgi?id=1258297
- https://bugzilla.suse.com/show_bug.cgi?id=1258298
- https://bugzilla.suse.com/show_bug.cgi?id=1258299
- https://bugzilla.suse.com/show_bug.cgi?id=1258303
- https://bugzilla.suse.com/show_bug.cgi?id=1258304
- https://bugzilla.suse.com/show_bug.cgi?id=1258308
- https://bugzilla.suse.com/show_bug.cgi?id=1258309
- https://bugzilla.suse.com/show_bug.cgi?id=1258313
- https://bugzilla.suse.com/show_bug.cgi?id=1258317
- https://bugzilla.suse.com/show_bug.cgi?id=1258321
- https://bugzilla.suse.com/show_bug.cgi?id=1258323
- https://bugzilla.suse.com/show_bug.cgi?id=1258324
- https://bugzilla.suse.com/show_bug.cgi?id=1258326
- https://bugzilla.suse.com/show_bug.cgi?id=1258331
- https://bugzilla.suse.com/show_bug.cgi?id=1258338
- https://bugzilla.suse.com/show_bug.cgi?id=1258349
- https://bugzilla.suse.com/show_bug.cgi?id=1258354
- https://bugzilla.suse.com/show_bug.cgi?id=1258355
- https://bugzilla.suse.com/show_bug.cgi?id=1258358
- https://bugzilla.suse.com/show_bug.cgi?id=1258374
- https://bugzilla.suse.com/show_bug.cgi?id=1258376
- https://bugzilla.suse.com/show_bug.cgi?id=1258377
- https://bugzilla.suse.com/show_bug.cgi?id=1258379
- https://bugzilla.suse.com/show_bug.cgi?id=1258389
- https://bugzilla.suse.com/show_bug.cgi?id=1258394
- https://bugzilla.suse.com/show_bug.cgi?id=1258395
- https://bugzilla.suse.com/show_bug.cgi?id=1258397
- https://bugzilla.suse.com/show_bug.cgi?id=1258411
- https://bugzilla.suse.com/show_bug.cgi?id=1258415
- https://bugzilla.suse.com/show_bug.cgi?id=1258419
- https://bugzilla.suse.com/show_bug.cgi?id=1258421
- https://bugzilla.suse.com/show_bug.cgi?id=1258422
- https://bugzilla.suse.com/show_bug.cgi?id=1258424
- https://bugzilla.suse.com/show_bug.cgi?id=1258429
- https://bugzilla.suse.com/show_bug.cgi?id=1258430
- https://bugzilla.suse.com/show_bug.cgi?id=1258442
- https://bugzilla.suse.com/show_bug.cgi?id=1258455
- https://bugzilla.suse.com/show_bug.cgi?id=1258461
- https://bugzilla.suse.com/show_bug.cgi?id=1258464
- https://bugzilla.suse.com/show_bug.cgi?id=1258465
- https://bugzilla.suse.com/show_bug.cgi?id=1258468
- https://bugzilla.suse.com/show_bug.cgi?id=1258469
- https://bugzilla.suse.com/show_bug.cgi?id=1258483
- https://bugzilla.suse.com/show_bug.cgi?id=1258484
- https://bugzilla.suse.com/show_bug.cgi?id=1258489
- https://bugzilla.suse.com/show_bug.cgi?id=1258517
- https://bugzilla.suse.com/show_bug.cgi?id=1258518
- https://bugzilla.suse.com/show_bug.cgi?id=1258519
- https://bugzilla.suse.com/show_bug.cgi?id=1258520
- https://bugzilla.suse.com/show_bug.cgi?id=1258524
- https://bugzilla.suse.com/show_bug.cgi?id=1258544
- https://bugzilla.suse.com/show_bug.cgi?id=1258660
- https://bugzilla.suse.com/show_bug.cgi?id=1258672
- https://bugzilla.suse.com/show_bug.cgi?id=1258824
- https://bugzilla.suse.com/show_bug.cgi?id=1259329
- https://jira.suse.com/browse/PED-11563
- https://jira.suse.com/browse/PED-14156