|
|
Log in / Subscribe / Register

SUSE alert SUSE-SU-2026:0350-1 (kernel)

From:  SLE-SECURITY-UPDATES <null@suse.de>
To:  sle-security-updates@lists.suse.com
Subject:  SUSE-SU-2026:0350-1: important: Security update for the Linux Kernel
Date:  Fri, 30 Jan 2026 20:31:34 -0000
Message-ID:  <176980509451.9916.15480089758404093597@smelt2.prg2.suse.org>

# Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:0350-1 Release Date: 2026-01-30T13:42:59Z Rating: important References: * bsc#1065729 * bsc#1196823 * bsc#1204957 * bsc#1206889 * bsc#1207051 * bsc#1207088 * bsc#1207653 * bsc#1209799 * bsc#1213653 * bsc#1213969 * bsc#1225109 * bsc#1228015 * bsc#1245210 * bsc#1245751 * bsc#1249739 * bsc#1249871 * bsc#1250397 * bsc#1252678 * bsc#1254520 * bsc#1254592 * bsc#1254614 * bsc#1254615 * bsc#1254632 * bsc#1254634 * bsc#1254686 * bsc#1254711 * bsc#1254751 * bsc#1254763 * bsc#1254775 * bsc#1254785 * bsc#1254792 * bsc#1254813 * bsc#1254847 * bsc#1254851 * bsc#1254894 * bsc#1254902 * bsc#1254959 * bsc#1255002 * bsc#1255565 * bsc#1255576 * bsc#1255607 * bsc#1255609 * bsc#1255636 * bsc#1255844 * bsc#1255901 * bsc#1255908 * bsc#1255919 * bsc#1256040 * bsc#1256045 * bsc#1256048 * bsc#1256049 * bsc#1256053 * bsc#1256056 * bsc#1256064 * bsc#1256095 * bsc#1256127 * bsc#1256132 * bsc#1256136 * bsc#1256137 * bsc#1256143 * bsc#1256154 * bsc#1256165 * bsc#1256194 * bsc#1256203 * bsc#1256207 * bsc#1256208 * bsc#1256216 * bsc#1256230 * bsc#1256242 * bsc#1256248 * bsc#1256333 * bsc#1256344 * bsc#1256353 * bsc#1256426 * bsc#1256641 * bsc#1256779 * jsc#SLE-13847 Cross-References: * CVE-2022-0854 * CVE-2022-48853 * CVE-2022-50282 * CVE-2022-50623 * CVE-2022-50630 * CVE-2022-50635 * CVE-2022-50640 * CVE-2022-50641 * CVE-2022-50644 * CVE-2022-50646 * CVE-2022-50649 * CVE-2022-50668 * CVE-2022-50671 * CVE-2022-50678 * CVE-2022-50700 * CVE-2022-50703 * CVE-2022-50709 * CVE-2022-50717 * CVE-2022-50726 * CVE-2022-50730 * CVE-2022-50731 * CVE-2022-50733 * CVE-2022-50736 * CVE-2022-50742 * CVE-2022-50744 * CVE-2022-50756 * CVE-2022-50758 * CVE-2022-50767 * CVE-2022-50814 * CVE-2022-50821 * CVE-2022-50823 * CVE-2022-50827 * CVE-2022-50828 * CVE-2022-50840 * CVE-2022-50843 * CVE-2022-50850 * CVE-2022-50870 * CVE-2022-50876 * CVE-2022-50880 * CVE-2022-50884 * CVE-2022-50889 * CVE-2023-23559 * CVE-2023-4132 * CVE-2023-53215 * CVE-2023-53254 * CVE-2023-53761 * CVE-2023-53781 * CVE-2023-54019 * CVE-2023-54024 * CVE-2023-54110 * CVE-2023-54142 * CVE-2023-54168 * CVE-2023-54170 * CVE-2023-54242 * CVE-2023-54243 * CVE-2023-54270 * CVE-2025-38068 * CVE-2025-38159 * CVE-2025-40019 * CVE-2025-40215 * CVE-2025-40220 * CVE-2025-40233 * CVE-2025-40256 * CVE-2025-40277 * CVE-2025-40280 * CVE-2025-40331 * CVE-2025-68813 * CVE-2025-71120 CVSS scores: * CVE-2022-0854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-0854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-50282 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50282 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50282 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50641 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50641 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50644 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50644 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50646 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50646 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50649 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50700 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50709 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50709 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2022-50717 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50717 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50726 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50733 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50736 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50736 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50742 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50742 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50756 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50756 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50758 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50758 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50767 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50823 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50827 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-23559 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L * CVE-2023-23559 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-23559 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-4132 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4132 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-4132 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53215 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53215 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53215 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53254 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53254 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53254 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-53254 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-53761 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53761 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53781 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53781 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54142 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54168 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54170 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54242 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54242 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54243 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54243 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-54270 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54270 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38068 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38068 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-38068 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38159 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38159 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38159 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40019 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40019 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40215 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40215 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40220 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40220 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40280 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40280 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68813 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68813 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-71120 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-71120 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves 68 vulnerabilities, contains one feature and has eight security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP3 RT kernel was updated to fix various security issues The following security issues were fixed: * CVE-2022-50282: chardev: fix error handling in cdev_device_add() (bsc#1249739). * CVE-2022-50630: mm: hugetlb: fix UAF in hugetlb_handle_userfault (bsc#1254785). * CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255576). * CVE-2022-50717: nvmet-tcp: add bounds check on Transfer Tag (bsc#1255844). * CVE-2022-50726: net/mlx5: Fix possible use-after-free in async command interface (bsc#1256040). * CVE-2022-50736: RDMA/siw: Fix immediate work request flush to completion queue (bsc#1256137). * CVE-2022-50756: nvme-core: replace ctrl page size with a macro (bsc#1256216). * CVE-2023-53215: sched/fair: Don't balance task to its current running CPU (bsc#1250397). * CVE-2023-53254: cacheinfo: Fix shared_cpu_map to handle shared caches at different levels (bsc#1249871). * CVE-2023-53761: USB: usbtmc: Fix direction for 0-length ioctl control messages (bsc#1255002). * CVE-2023-53781: smc: Fix use-after-free in tcp_write_timer_handler() (bsc#1254751). * CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy() (bsc#1256095). * CVE-2023-54168: RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() (bsc#1256053). * CVE-2023-54243: netfilter: ebtables: fix table blob use-after-free (bsc#1255908). * CVE-2025-38068: crypto: lzo - Fix compression buffer overrun (bsc#1245210). * CVE-2025-38159: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (bsc#1245751). * CVE-2025-40019: crypto: essiv - Check ssize for decryption and in-place encryption (bsc#1252678). * CVE-2025-40215: kABI: xfrm: delete x->tunnel as we delete x (bsc#1254959). * CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520). * CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813). * CVE-2025-40277: drm/vmwgfx: Validate command header size against (bsc#1254894). * CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self() (bsc#1254847). * CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615). * CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256641). * CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256779). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-350=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-350=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.232.1 * SUSE Linux Enterprise Micro 5.2 (x86_64) * kernel-rt-debugsource-5.3.18-150300.232.1 * kernel-rt-debuginfo-5.3.18-150300.232.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * kernel-source-rt-5.3.18-150300.232.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.232.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64) * kernel-rt-debugsource-5.3.18-150300.232.1 * kernel-rt-debuginfo-5.3.18-150300.232.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * kernel-source-rt-5.3.18-150300.232.1 ## References: * https://www.suse.com/security/cve/CVE-2022-0854.html * https://www.suse.com/security/cve/CVE-2022-48853.html * https://www.suse.com/security/cve/CVE-2022-50282.html * https://www.suse.com/security/cve/CVE-2022-50623.html * https://www.suse.com/security/cve/CVE-2022-50630.html * https://www.suse.com/security/cve/CVE-2022-50635.html * https://www.suse.com/security/cve/CVE-2022-50640.html * https://www.suse.com/security/cve/CVE-2022-50641.html * https://www.suse.com/security/cve/CVE-2022-50644.html * https://www.suse.com/security/cve/CVE-2022-50646.html * https://www.suse.com/security/cve/CVE-2022-50649.html * https://www.suse.com/security/cve/CVE-2022-50668.html * https://www.suse.com/security/cve/CVE-2022-50671.html * https://www.suse.com/security/cve/CVE-2022-50678.html * https://www.suse.com/security/cve/CVE-2022-50700.html * https://www.suse.com/security/cve/CVE-2022-50703.html * https://www.suse.com/security/cve/CVE-2022-50709.html * https://www.suse.com/security/cve/CVE-2022-50717.html * https://www.suse.com/security/cve/CVE-2022-50726.html * https://www.suse.com/security/cve/CVE-2022-50730.html * https://www.suse.com/security/cve/CVE-2022-50731.html * https://www.suse.com/security/cve/CVE-2022-50733.html * https://www.suse.com/security/cve/CVE-2022-50736.html * https://www.suse.com/security/cve/CVE-2022-50742.html * https://www.suse.com/security/cve/CVE-2022-50744.html * https://www.suse.com/security/cve/CVE-2022-50756.html * https://www.suse.com/security/cve/CVE-2022-50758.html * https://www.suse.com/security/cve/CVE-2022-50767.html * https://www.suse.com/security/cve/CVE-2022-50814.html * https://www.suse.com/security/cve/CVE-2022-50821.html * https://www.suse.com/security/cve/CVE-2022-50823.html * https://www.suse.com/security/cve/CVE-2022-50827.html * https://www.suse.com/security/cve/CVE-2022-50828.html * https://www.suse.com/security/cve/CVE-2022-50840.html * https://www.suse.com/security/cve/CVE-2022-50843.html * https://www.suse.com/security/cve/CVE-2022-50850.html * https://www.suse.com/security/cve/CVE-2022-50870.html * https://www.suse.com/security/cve/CVE-2022-50876.html * https://www.suse.com/security/cve/CVE-2022-50880.html * https://www.suse.com/security/cve/CVE-2022-50884.html * https://www.suse.com/security/cve/CVE-2022-50889.html * https://www.suse.com/security/cve/CVE-2023-23559.html * https://www.suse.com/security/cve/CVE-2023-4132.html * https://www.suse.com/security/cve/CVE-2023-53215.html * https://www.suse.com/security/cve/CVE-2023-53254.html * https://www.suse.com/security/cve/CVE-2023-53761.html * https://www.suse.com/security/cve/CVE-2023-53781.html * https://www.suse.com/security/cve/CVE-2023-54019.html * https://www.suse.com/security/cve/CVE-2023-54024.html * https://www.suse.com/security/cve/CVE-2023-54110.html * https://www.suse.com/security/cve/CVE-2023-54142.html * https://www.suse.com/security/cve/CVE-2023-54168.html * https://www.suse.com/security/cve/CVE-2023-54170.html * https://www.suse.com/security/cve/CVE-2023-54242.html * https://www.suse.com/security/cve/CVE-2023-54243.html * https://www.suse.com/security/cve/CVE-2023-54270.html * https://www.suse.com/security/cve/CVE-2025-38068.html * https://www.suse.com/security/cve/CVE-2025-38159.html * https://www.suse.com/security/cve/CVE-2025-40019.html * https://www.suse.com/security/cve/CVE-2025-40215.html * https://www.suse.com/security/cve/CVE-2025-40220.html * https://www.suse.com/security/cve/CVE-2025-40233.html * https://www.suse.com/security/cve/CVE-2025-40256.html * https://www.suse.com/security/cve/CVE-2025-40277.html * https://www.suse.com/security/cve/CVE-2025-40280.html * https://www.suse.com/security/cve/CVE-2025-40331.html * https://www.suse.com/security/cve/CVE-2025-68813.html * https://www.suse.com/security/cve/CVE-2025-71120.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1196823 * https://bugzilla.suse.com/show_bug.cgi?id=1204957 * https://bugzilla.suse.com/show_bug.cgi?id=1206889 * https://bugzilla.suse.com/show_bug.cgi?id=1207051 * https://bugzilla.suse.com/show_bug.cgi?id=1207088 * https://bugzilla.suse.com/show_bug.cgi?id=1207653 * https://bugzilla.suse.com/show_bug.cgi?id=1209799 * https://bugzilla.suse.com/show_bug.cgi?id=1213653 * https://bugzilla.suse.com/show_bug.cgi?id=1213969 * https://bugzilla.suse.com/show_bug.cgi?id=1225109 * https://bugzilla.suse.com/show_bug.cgi?id=1228015 * https://bugzilla.suse.com/show_bug.cgi?id=1245210 * https://bugzilla.suse.com/show_bug.cgi?id=1245751 * https://bugzilla.suse.com/show_bug.cgi?id=1249739 * https://bugzilla.suse.com/show_bug.cgi?id=1249871 * https://bugzilla.suse.com/show_bug.cgi?id=1250397 * https://bugzilla.suse.com/show_bug.cgi?id=1252678 * https://bugzilla.suse.com/show_bug.cgi?id=1254520 * https://bugzilla.suse.com/show_bug.cgi?id=1254592 * https://bugzilla.suse.com/show_bug.cgi?id=1254614 * https://bugzilla.suse.com/show_bug.cgi?id=1254615 * https://bugzilla.suse.com/show_bug.cgi?id=1254632 * https://bugzilla.suse.com/show_bug.cgi?id=1254634 * https://bugzilla.suse.com/show_bug.cgi?id=1254686 * https://bugzilla.suse.com/show_bug.cgi?id=1254711 * https://bugzilla.suse.com/show_bug.cgi?id=1254751 * https://bugzilla.suse.com/show_bug.cgi?id=1254763 * https://bugzilla.suse.com/show_bug.cgi?id=1254775 * https://bugzilla.suse.com/show_bug.cgi?id=1254785 * https://bugzilla.suse.com/show_bug.cgi?id=1254792 * https://bugzilla.suse.com/show_bug.cgi?id=1254813 * https://bugzilla.suse.com/show_bug.cgi?id=1254847 * https://bugzilla.suse.com/show_bug.cgi?id=1254851 * https://bugzilla.suse.com/show_bug.cgi?id=1254894 * https://bugzilla.suse.com/show_bug.cgi?id=1254902 * https://bugzilla.suse.com/show_bug.cgi?id=1254959 * https://bugzilla.suse.com/show_bug.cgi?id=1255002 * https://bugzilla.suse.com/show_bug.cgi?id=1255565 * https://bugzilla.suse.com/show_bug.cgi?id=1255576 * https://bugzilla.suse.com/show_bug.cgi?id=1255607 * https://bugzilla.suse.com/show_bug.cgi?id=1255609 * https://bugzilla.suse.com/show_bug.cgi?id=1255636 * https://bugzilla.suse.com/show_bug.cgi?id=1255844 * https://bugzilla.suse.com/show_bug.cgi?id=1255901 * https://bugzilla.suse.com/show_bug.cgi?id=1255908 * https://bugzilla.suse.com/show_bug.cgi?id=1255919 * https://bugzilla.suse.com/show_bug.cgi?id=1256040 * https://bugzilla.suse.com/show_bug.cgi?id=1256045 * https://bugzilla.suse.com/show_bug.cgi?id=1256048 * https://bugzilla.suse.com/show_bug.cgi?id=1256049 * https://bugzilla.suse.com/show_bug.cgi?id=1256053 * https://bugzilla.suse.com/show_bug.cgi?id=1256056 * https://bugzilla.suse.com/show_bug.cgi?id=1256064 * https://bugzilla.suse.com/show_bug.cgi?id=1256095 * https://bugzilla.suse.com/show_bug.cgi?id=1256127 * https://bugzilla.suse.com/show_bug.cgi?id=1256132 * https://bugzilla.suse.com/show_bug.cgi?id=1256136 * https://bugzilla.suse.com/show_bug.cgi?id=1256137 * https://bugzilla.suse.com/show_bug.cgi?id=1256143 * https://bugzilla.suse.com/show_bug.cgi?id=1256154 * https://bugzilla.suse.com/show_bug.cgi?id=1256165 * https://bugzilla.suse.com/show_bug.cgi?id=1256194 * https://bugzilla.suse.com/show_bug.cgi?id=1256203 * https://bugzilla.suse.com/show_bug.cgi?id=1256207 * https://bugzilla.suse.com/show_bug.cgi?id=1256208 * https://bugzilla.suse.com/show_bug.cgi?id=1256216 * https://bugzilla.suse.com/show_bug.cgi?id=1256230 * https://bugzilla.suse.com/show_bug.cgi?id=1256242 * https://bugzilla.suse.com/show_bug.cgi?id=1256248 * https://bugzilla.suse.com/show_bug.cgi?id=1256333 * https://bugzilla.suse.com/show_bug.cgi?id=1256344 * https://bugzilla.suse.com/show_bug.cgi?id=1256353 * https://bugzilla.suse.com/show_bug.cgi?id=1256426 * https://bugzilla.suse.com/show_bug.cgi?id=1256641 * https://bugzilla.suse.com/show_bug.cgi?id=1256779 * https://jira.suse.com/browse/SLE-13847


Attachment: None (type=text/html)

(HTML attachment elided)


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds