SUSE-SU-2026:0350-1: important: Security update for the Linux Kernel

SLE-SECURITY-UPDATES null at suse.de
Fri Jan 30 20:31:34 UTC 2026



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2026:0350-1  
Release Date: 2026-01-30T13:42:59Z  
Rating: important  
References:

  * bsc#1065729
  * bsc#1196823
  * bsc#1204957
  * bsc#1206889
  * bsc#1207051
  * bsc#1207088
  * bsc#1207653
  * bsc#1209799
  * bsc#1213653
  * bsc#1213969
  * bsc#1225109
  * bsc#1228015
  * bsc#1245210
  * bsc#1245751
  * bsc#1249739
  * bsc#1249871
  * bsc#1250397
  * bsc#1252678
  * bsc#1254520
  * bsc#1254592
  * bsc#1254614
  * bsc#1254615
  * bsc#1254632
  * bsc#1254634
  * bsc#1254686
  * bsc#1254711
  * bsc#1254751
  * bsc#1254763
  * bsc#1254775
  * bsc#1254785
  * bsc#1254792
  * bsc#1254813
  * bsc#1254847
  * bsc#1254851
  * bsc#1254894
  * bsc#1254902
  * bsc#1254959
  * bsc#1255002
  * bsc#1255565
  * bsc#1255576
  * bsc#1255607
  * bsc#1255609
  * bsc#1255636
  * bsc#1255844
  * bsc#1255901
  * bsc#1255908
  * bsc#1255919
  * bsc#1256040
  * bsc#1256045
  * bsc#1256048
  * bsc#1256049
  * bsc#1256053
  * bsc#1256056
  * bsc#1256064
  * bsc#1256095
  * bsc#1256127
  * bsc#1256132
  * bsc#1256136
  * bsc#1256137
  * bsc#1256143
  * bsc#1256154
  * bsc#1256165
  * bsc#1256194
  * bsc#1256203
  * bsc#1256207
  * bsc#1256208
  * bsc#1256216
  * bsc#1256230
  * bsc#1256242
  * bsc#1256248
  * bsc#1256333
  * bsc#1256344
  * bsc#1256353
  * bsc#1256426
  * bsc#1256641
  * bsc#1256779
  * jsc#SLE-13847

  
Cross-References:

  * CVE-2022-0854
  * CVE-2022-48853
  * CVE-2022-50282
  * CVE-2022-50623
  * CVE-2022-50630
  * CVE-2022-50635
  * CVE-2022-50640
  * CVE-2022-50641
  * CVE-2022-50644
  * CVE-2022-50646
  * CVE-2022-50649
  * CVE-2022-50668
  * CVE-2022-50671
  * CVE-2022-50678
  * CVE-2022-50700
  * CVE-2022-50703
  * CVE-2022-50709
  * CVE-2022-50717
  * CVE-2022-50726
  * CVE-2022-50730
  * CVE-2022-50731
  * CVE-2022-50733
  * CVE-2022-50736
  * CVE-2022-50742
  * CVE-2022-50744
  * CVE-2022-50756
  * CVE-2022-50758
  * CVE-2022-50767
  * CVE-2022-50814
  * CVE-2022-50821
  * CVE-2022-50823
  * CVE-2022-50827
  * CVE-2022-50828
  * CVE-2022-50840
  * CVE-2022-50843
  * CVE-2022-50850
  * CVE-2022-50870
  * CVE-2022-50876
  * CVE-2022-50880
  * CVE-2022-50884
  * CVE-2022-50889
  * CVE-2023-23559
  * CVE-2023-4132
  * CVE-2023-53215
  * CVE-2023-53254
  * CVE-2023-53761
  * CVE-2023-53781
  * CVE-2023-54019
  * CVE-2023-54024
  * CVE-2023-54110
  * CVE-2023-54142
  * CVE-2023-54168
  * CVE-2023-54170
  * CVE-2023-54242
  * CVE-2023-54243
  * CVE-2023-54270
  * CVE-2025-38068
  * CVE-2025-38159
  * CVE-2025-40019
  * CVE-2025-40215
  * CVE-2025-40220
  * CVE-2025-40233
  * CVE-2025-40256
  * CVE-2025-40277
  * CVE-2025-40280
  * CVE-2025-40331
  * CVE-2025-68813
  * CVE-2025-71120

  
CVSS scores:

  * CVE-2022-0854 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-0854 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-48853 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48853 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2022-50282 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50282 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50282 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50623 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50630 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50635 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50640 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50640 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50641 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-50641 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-50644 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-50644 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-50646 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-50646 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-50649 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2022-50649 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50668 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50671 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50678 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50700 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50700 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50703 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50709 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50709 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2022-50717 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50717 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50726 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50726 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50730 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50731 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50733 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50733 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50736 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50736 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50742 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50742 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50744 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50744 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50756 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50756 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-50758 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50758 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50767 ( SUSE ):  5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
  * CVE-2022-50814 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50821 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50823 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50823 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50827 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-50827 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50828 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50840 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50843 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50850 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50870 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50876 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50880 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50884 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-50889 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-23559 ( SUSE ):  6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
  * CVE-2023-23559 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-23559 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-4132 ( SUSE ):  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-4132 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-4132 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-53215 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2023-53215 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2023-53215 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53215 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53254 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53254 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53254 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2023-53254 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2023-53761 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53761 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-53781 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-53781 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-54019 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54024 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54110 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54142 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54142 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-54168 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-54170 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54242 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54242 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-54243 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54243 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2023-54270 ( SUSE ):  5.4
    CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-54270 ( SUSE ):  6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38068 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38068 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-38068 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38159 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-38159 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-38159 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2025-40019 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40019 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40215 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40215 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40220 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40220 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2025-40233 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40256 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40277 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-40280 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-40280 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-40331 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-68813 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-68813 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-71120 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-71120 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

  
Affected Products:

  * SUSE Linux Enterprise Micro 5.2
  * SUSE Linux Enterprise Micro for Rancher 5.2

  
  
An update that solves 68 vulnerabilities, contains one feature and has eight
security fixes can now be installed.

## Description:

The SUSE Linux Enterprise 15 SP3 RT kernel was updated to fix various security
issues

The following security issues were fixed:

  * CVE-2022-50282: chardev: fix error handling in cdev_device_add()
    (bsc#1249739).
  * CVE-2022-50630: mm: hugetlb: fix UAF in hugetlb_handle_userfault
    (bsc#1254785).
  * CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer
    (bsc#1255576).
  * CVE-2022-50717: nvmet-tcp: add bounds check on Transfer Tag (bsc#1255844).
  * CVE-2022-50726: net/mlx5: Fix possible use-after-free in async command
    interface (bsc#1256040).
  * CVE-2022-50736: RDMA/siw: Fix immediate work request flush to completion
    queue (bsc#1256137).
  * CVE-2022-50756: nvme-core: replace ctrl page size with a macro
    (bsc#1256216).
  * CVE-2023-53215: sched/fair: Don't balance task to its current running CPU
    (bsc#1250397).
  * CVE-2023-53254: cacheinfo: Fix shared_cpu_map to handle shared caches at
    different levels (bsc#1249871).
  * CVE-2023-53761: USB: usbtmc: Fix direction for 0-length ioctl control
    messages (bsc#1255002).
  * CVE-2023-53781: smc: Fix use-after-free in tcp_write_timer_handler()
    (bsc#1254751).
  * CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy()
    (bsc#1256095).
  * CVE-2023-54168: RDMA/mlx4: Prevent shift wrapping in set_user_sq_size()
    (bsc#1256053).
  * CVE-2023-54243: netfilter: ebtables: fix table blob use-after-free
    (bsc#1255908).
  * CVE-2025-38068: crypto: lzo - Fix compression buffer overrun (bsc#1245210).
  * CVE-2025-38159: wifi: rtw88: fix the 'para' buffer size to avoid reading out
    of bounds (bsc#1245751).
  * CVE-2025-40019: crypto: essiv - Check ssize for decryption and in-place
    encryption (bsc#1252678).
  * CVE-2025-40215: kABI: xfrm: delete x->tunnel as we delete x (bsc#1254959).
  * CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk
    workers (bsc#1254520).
  * CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents
    (bsc#1254813).
  * CVE-2025-40277: drm/vmwgfx: Validate command header size against
    (bsc#1254894).
  * CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self()
    (bsc#1254847).
  * CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).
  * CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path
    (bsc#1256641).
  * CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length
    gss_token in gss_read_proxy_verf (bsc#1256779).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Micro 5.2  
    zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-350=1

  * SUSE Linux Enterprise Micro for Rancher 5.2  
    zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-350=1

## Package List:

  * SUSE Linux Enterprise Micro 5.2 (nosrc x86_64)
    * kernel-rt-5.3.18-150300.232.1
  * SUSE Linux Enterprise Micro 5.2 (x86_64)
    * kernel-rt-debugsource-5.3.18-150300.232.1
    * kernel-rt-debuginfo-5.3.18-150300.232.1
  * SUSE Linux Enterprise Micro 5.2 (noarch)
    * kernel-source-rt-5.3.18-150300.232.1
  * SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64)
    * kernel-rt-5.3.18-150300.232.1
  * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
    * kernel-rt-debugsource-5.3.18-150300.232.1
    * kernel-rt-debuginfo-5.3.18-150300.232.1
  * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch)
    * kernel-source-rt-5.3.18-150300.232.1

## References:

  * https://www.suse.com/security/cve/CVE-2022-0854.html
  * https://www.suse.com/security/cve/CVE-2022-48853.html
  * https://www.suse.com/security/cve/CVE-2022-50282.html
  * https://www.suse.com/security/cve/CVE-2022-50623.html
  * https://www.suse.com/security/cve/CVE-2022-50630.html
  * https://www.suse.com/security/cve/CVE-2022-50635.html
  * https://www.suse.com/security/cve/CVE-2022-50640.html
  * https://www.suse.com/security/cve/CVE-2022-50641.html
  * https://www.suse.com/security/cve/CVE-2022-50644.html
  * https://www.suse.com/security/cve/CVE-2022-50646.html
  * https://www.suse.com/security/cve/CVE-2022-50649.html
  * https://www.suse.com/security/cve/CVE-2022-50668.html
  * https://www.suse.com/security/cve/CVE-2022-50671.html
  * https://www.suse.com/security/cve/CVE-2022-50678.html
  * https://www.suse.com/security/cve/CVE-2022-50700.html
  * https://www.suse.com/security/cve/CVE-2022-50703.html
  * https://www.suse.com/security/cve/CVE-2022-50709.html
  * https://www.suse.com/security/cve/CVE-2022-50717.html
  * https://www.suse.com/security/cve/CVE-2022-50726.html
  * https://www.suse.com/security/cve/CVE-2022-50730.html
  * https://www.suse.com/security/cve/CVE-2022-50731.html
  * https://www.suse.com/security/cve/CVE-2022-50733.html
  * https://www.suse.com/security/cve/CVE-2022-50736.html
  * https://www.suse.com/security/cve/CVE-2022-50742.html
  * https://www.suse.com/security/cve/CVE-2022-50744.html
  * https://www.suse.com/security/cve/CVE-2022-50756.html
  * https://www.suse.com/security/cve/CVE-2022-50758.html
  * https://www.suse.com/security/cve/CVE-2022-50767.html
  * https://www.suse.com/security/cve/CVE-2022-50814.html
  * https://www.suse.com/security/cve/CVE-2022-50821.html
  * https://www.suse.com/security/cve/CVE-2022-50823.html
  * https://www.suse.com/security/cve/CVE-2022-50827.html
  * https://www.suse.com/security/cve/CVE-2022-50828.html
  * https://www.suse.com/security/cve/CVE-2022-50840.html
  * https://www.suse.com/security/cve/CVE-2022-50843.html
  * https://www.suse.com/security/cve/CVE-2022-50850.html
  * https://www.suse.com/security/cve/CVE-2022-50870.html
  * https://www.suse.com/security/cve/CVE-2022-50876.html
  * https://www.suse.com/security/cve/CVE-2022-50880.html
  * https://www.suse.com/security/cve/CVE-2022-50884.html
  * https://www.suse.com/security/cve/CVE-2022-50889.html
  * https://www.suse.com/security/cve/CVE-2023-23559.html
  * https://www.suse.com/security/cve/CVE-2023-4132.html
  * https://www.suse.com/security/cve/CVE-2023-53215.html
  * https://www.suse.com/security/cve/CVE-2023-53254.html
  * https://www.suse.com/security/cve/CVE-2023-53761.html
  * https://www.suse.com/security/cve/CVE-2023-53781.html
  * https://www.suse.com/security/cve/CVE-2023-54019.html
  * https://www.suse.com/security/cve/CVE-2023-54024.html
  * https://www.suse.com/security/cve/CVE-2023-54110.html
  * https://www.suse.com/security/cve/CVE-2023-54142.html
  * https://www.suse.com/security/cve/CVE-2023-54168.html
  * https://www.suse.com/security/cve/CVE-2023-54170.html
  * https://www.suse.com/security/cve/CVE-2023-54242.html
  * https://www.suse.com/security/cve/CVE-2023-54243.html
  * https://www.suse.com/security/cve/CVE-2023-54270.html
  * https://www.suse.com/security/cve/CVE-2025-38068.html
  * https://www.suse.com/security/cve/CVE-2025-38159.html
  * https://www.suse.com/security/cve/CVE-2025-40019.html
  * https://www.suse.com/security/cve/CVE-2025-40215.html
  * https://www.suse.com/security/cve/CVE-2025-40220.html
  * https://www.suse.com/security/cve/CVE-2025-40233.html
  * https://www.suse.com/security/cve/CVE-2025-40256.html
  * https://www.suse.com/security/cve/CVE-2025-40277.html
  * https://www.suse.com/security/cve/CVE-2025-40280.html
  * https://www.suse.com/security/cve/CVE-2025-40331.html
  * https://www.suse.com/security/cve/CVE-2025-68813.html
  * https://www.suse.com/security/cve/CVE-2025-71120.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1065729
  * https://bugzilla.suse.com/show_bug.cgi?id=1196823
  * https://bugzilla.suse.com/show_bug.cgi?id=1204957
  * https://bugzilla.suse.com/show_bug.cgi?id=1206889
  * https://bugzilla.suse.com/show_bug.cgi?id=1207051
  * https://bugzilla.suse.com/show_bug.cgi?id=1207088
  * https://bugzilla.suse.com/show_bug.cgi?id=1207653
  * https://bugzilla.suse.com/show_bug.cgi?id=1209799
  * https://bugzilla.suse.com/show_bug.cgi?id=1213653
  * https://bugzilla.suse.com/show_bug.cgi?id=1213969
  * https://bugzilla.suse.com/show_bug.cgi?id=1225109
  * https://bugzilla.suse.com/show_bug.cgi?id=1228015
  * https://bugzilla.suse.com/show_bug.cgi?id=1245210
  * https://bugzilla.suse.com/show_bug.cgi?id=1245751
  * https://bugzilla.suse.com/show_bug.cgi?id=1249739
  * https://bugzilla.suse.com/show_bug.cgi?id=1249871
  * https://bugzilla.suse.com/show_bug.cgi?id=1250397
  * https://bugzilla.suse.com/show_bug.cgi?id=1252678
  * https://bugzilla.suse.com/show_bug.cgi?id=1254520
  * https://bugzilla.suse.com/show_bug.cgi?id=1254592
  * https://bugzilla.suse.com/show_bug.cgi?id=1254614
  * https://bugzilla.suse.com/show_bug.cgi?id=1254615
  * https://bugzilla.suse.com/show_bug.cgi?id=1254632
  * https://bugzilla.suse.com/show_bug.cgi?id=1254634
  * https://bugzilla.suse.com/show_bug.cgi?id=1254686
  * https://bugzilla.suse.com/show_bug.cgi?id=1254711
  * https://bugzilla.suse.com/show_bug.cgi?id=1254751
  * https://bugzilla.suse.com/show_bug.cgi?id=1254763
  * https://bugzilla.suse.com/show_bug.cgi?id=1254775
  * https://bugzilla.suse.com/show_bug.cgi?id=1254785
  * https://bugzilla.suse.com/show_bug.cgi?id=1254792
  * https://bugzilla.suse.com/show_bug.cgi?id=1254813
  * https://bugzilla.suse.com/show_bug.cgi?id=1254847
  * https://bugzilla.suse.com/show_bug.cgi?id=1254851
  * https://bugzilla.suse.com/show_bug.cgi?id=1254894
  * https://bugzilla.suse.com/show_bug.cgi?id=1254902
  * https://bugzilla.suse.com/show_bug.cgi?id=1254959
  * https://bugzilla.suse.com/show_bug.cgi?id=1255002
  * https://bugzilla.suse.com/show_bug.cgi?id=1255565
  * https://bugzilla.suse.com/show_bug.cgi?id=1255576
  * https://bugzilla.suse.com/show_bug.cgi?id=1255607
  * https://bugzilla.suse.com/show_bug.cgi?id=1255609
  * https://bugzilla.suse.com/show_bug.cgi?id=1255636
  * https://bugzilla.suse.com/show_bug.cgi?id=1255844
  * https://bugzilla.suse.com/show_bug.cgi?id=1255901
  * https://bugzilla.suse.com/show_bug.cgi?id=1255908
  * https://bugzilla.suse.com/show_bug.cgi?id=1255919
  * https://bugzilla.suse.com/show_bug.cgi?id=1256040
  * https://bugzilla.suse.com/show_bug.cgi?id=1256045
  * https://bugzilla.suse.com/show_bug.cgi?id=1256048
  * https://bugzilla.suse.com/show_bug.cgi?id=1256049
  * https://bugzilla.suse.com/show_bug.cgi?id=1256053
  * https://bugzilla.suse.com/show_bug.cgi?id=1256056
  * https://bugzilla.suse.com/show_bug.cgi?id=1256064
  * https://bugzilla.suse.com/show_bug.cgi?id=1256095
  * https://bugzilla.suse.com/show_bug.cgi?id=1256127
  * https://bugzilla.suse.com/show_bug.cgi?id=1256132
  * https://bugzilla.suse.com/show_bug.cgi?id=1256136
  * https://bugzilla.suse.com/show_bug.cgi?id=1256137
  * https://bugzilla.suse.com/show_bug.cgi?id=1256143
  * https://bugzilla.suse.com/show_bug.cgi?id=1256154
  * https://bugzilla.suse.com/show_bug.cgi?id=1256165
  * https://bugzilla.suse.com/show_bug.cgi?id=1256194
  * https://bugzilla.suse.com/show_bug.cgi?id=1256203
  * https://bugzilla.suse.com/show_bug.cgi?id=1256207
  * https://bugzilla.suse.com/show_bug.cgi?id=1256208
  * https://bugzilla.suse.com/show_bug.cgi?id=1256216
  * https://bugzilla.suse.com/show_bug.cgi?id=1256230
  * https://bugzilla.suse.com/show_bug.cgi?id=1256242
  * https://bugzilla.suse.com/show_bug.cgi?id=1256248
  * https://bugzilla.suse.com/show_bug.cgi?id=1256333
  * https://bugzilla.suse.com/show_bug.cgi?id=1256344
  * https://bugzilla.suse.com/show_bug.cgi?id=1256353
  * https://bugzilla.suse.com/show_bug.cgi?id=1256426
  * https://bugzilla.suse.com/show_bug.cgi?id=1256641
  * https://bugzilla.suse.com/show_bug.cgi?id=1256779
  * https://jira.suse.com/browse/SLE-13847

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20260130/7cf34294/attachment.htm>


More information about the sle-security-updates mailing list