Security update for the Linux Kernel (Live Patch 0 for SUSE Linux Enterprise 16)
| Announcement ID: | SUSE-SU-2026:20169-1 |
|---|---|
| Release Date: | 2026-01-26T11:26:25Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves 14 vulnerabilities and has three fixes can now be installed.
Description:
This update for the SUSE Linux Enterprise kernel 6.12.0-160000.5.1 fixes various security issues
The following security issues were fixed:
- CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019).
- CVE-2025-38500: xfrm: interface: fix use-after-free after changing collect_md xfrm interface (bsc#1248672).
- CVE-2025-38554: mm: fix a UAF when vma->mm is freed after vma->vm_refcnt got dropped (bsc#1248301).
- CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400).
- CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size() (bsc#1249241).
- CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670).
- CVE-2025-38616: tls: handle data disappearing from under the TLS ULP (bsc#1249537).
- CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1249208).
- CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1249207).
- CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248631).
- CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1250192).
- CVE-2025-39963: io_uring: fix incorrect io_kiocb reference in io_link_skb (bsc#1251982).
- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437).
- CVE-2025-40212: nfsd: fix refcount leak in nfsd_set_fh_dentry() (bsc#1254196).
The following non security issues were fixed:
- Explicitly add module-common.c with vermagic and retpoline modinfo (bsc#1252270).
- powerpc64/modules: correctly iterate over stubs in setup_ftrace_ool_stubs (bsc#1251956).
- fix addr_bit_set() issue on big-endian machines (bsc#1256928).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Micro 6.2
zypper in -t patch SUSE-SL-Micro-6.2-196=1
Package List:
-
SUSE Linux Micro 6.2 (ppc64le s390x x86_64)
- kernel-livepatch-SLE16_Update_0-debugsource-5-160000.4.3
- kernel-livepatch-6_12_0-160000_5-default-5-160000.4.3
- kernel-livepatch-6_12_0-160000_5-default-debuginfo-5-160000.4.3
References:
- https://www.suse.com/security/cve/CVE-2024-53164.html
- https://www.suse.com/security/cve/CVE-2025-38500.html
- https://www.suse.com/security/cve/CVE-2025-38554.html
- https://www.suse.com/security/cve/CVE-2025-38572.html
- https://www.suse.com/security/cve/CVE-2025-38588.html
- https://www.suse.com/security/cve/CVE-2025-38608.html
- https://www.suse.com/security/cve/CVE-2025-38616.html
- https://www.suse.com/security/cve/CVE-2025-38617.html
- https://www.suse.com/security/cve/CVE-2025-38618.html
- https://www.suse.com/security/cve/CVE-2025-38664.html
- https://www.suse.com/security/cve/CVE-2025-39682.html
- https://www.suse.com/security/cve/CVE-2025-39963.html
- https://www.suse.com/security/cve/CVE-2025-40204.html
- https://www.suse.com/security/cve/CVE-2025-40212.html
- https://bugzilla.suse.com/show_bug.cgi?id=1246019
- https://bugzilla.suse.com/show_bug.cgi?id=1248301
- https://bugzilla.suse.com/show_bug.cgi?id=1248400
- https://bugzilla.suse.com/show_bug.cgi?id=1248631
- https://bugzilla.suse.com/show_bug.cgi?id=1248670
- https://bugzilla.suse.com/show_bug.cgi?id=1248672
- https://bugzilla.suse.com/show_bug.cgi?id=1249207
- https://bugzilla.suse.com/show_bug.cgi?id=1249208
- https://bugzilla.suse.com/show_bug.cgi?id=1249241
- https://bugzilla.suse.com/show_bug.cgi?id=1249537
- https://bugzilla.suse.com/show_bug.cgi?id=1250192
- https://bugzilla.suse.com/show_bug.cgi?id=1251956
- https://bugzilla.suse.com/show_bug.cgi?id=1251982
- https://bugzilla.suse.com/show_bug.cgi?id=1252270
- https://bugzilla.suse.com/show_bug.cgi?id=1253437
- https://bugzilla.suse.com/show_bug.cgi?id=1254196
- https://bugzilla.suse.com/show_bug.cgi?id=1256928