Security update for the Linux Kernel
| Announcement ID: | SUSE-SU-2026:0350-1 |
|---|---|
| Release Date: | 2026-01-30T13:42:59Z |
| Rating: | important |
| References: |
|
| Cross-References: |
|
| CVSS scores: |
|
| Affected Products: |
|
An update that solves 68 vulnerabilities, contains one feature and has eight security fixes can now be installed.
Description:
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to fix various security issues
The following security issues were fixed:
- CVE-2022-50282: chardev: fix error handling in cdev_device_add() (bsc#1249739).
- CVE-2022-50630: mm: hugetlb: fix UAF in hugetlb_handle_userfault (bsc#1254785).
- CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255576).
- CVE-2022-50717: nvmet-tcp: add bounds check on Transfer Tag (bsc#1255844).
- CVE-2022-50726: net/mlx5: Fix possible use-after-free in async command interface (bsc#1256040).
- CVE-2022-50736: RDMA/siw: Fix immediate work request flush to completion queue (bsc#1256137).
- CVE-2022-50756: nvme-core: replace ctrl page size with a macro (bsc#1256216).
- CVE-2023-53215: sched/fair: Don't balance task to its current running CPU (bsc#1250397).
- CVE-2023-53254: cacheinfo: Fix shared_cpu_map to handle shared caches at different levels (bsc#1249871).
- CVE-2023-53761: USB: usbtmc: Fix direction for 0-length ioctl control messages (bsc#1255002).
- CVE-2023-53781: smc: Fix use-after-free in tcp_write_timer_handler() (bsc#1254751).
- CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy() (bsc#1256095).
- CVE-2023-54168: RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() (bsc#1256053).
- CVE-2023-54243: netfilter: ebtables: fix table blob use-after-free (bsc#1255908).
- CVE-2025-38068: crypto: lzo - Fix compression buffer overrun (bsc#1245210).
- CVE-2025-38159: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (bsc#1245751).
- CVE-2025-40019: crypto: essiv - Check ssize for decryption and in-place encryption (bsc#1252678).
- CVE-2025-40215: kABI: xfrm: delete x->tunnel as we delete x (bsc#1254959).
- CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520).
- CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813).
- CVE-2025-40277: drm/vmwgfx: Validate command header size against (bsc#1254894).
- CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self() (bsc#1254847).
- CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).
- CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256641).
- CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256779).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-350=1 -
SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-350=1
Package List:
-
SUSE Linux Enterprise Micro 5.2 (nosrc x86_64)
- kernel-rt-5.3.18-150300.232.1
-
SUSE Linux Enterprise Micro 5.2 (x86_64)
- kernel-rt-debugsource-5.3.18-150300.232.1
- kernel-rt-debuginfo-5.3.18-150300.232.1
-
SUSE Linux Enterprise Micro 5.2 (noarch)
- kernel-source-rt-5.3.18-150300.232.1
-
SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64)
- kernel-rt-5.3.18-150300.232.1
-
SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
- kernel-rt-debugsource-5.3.18-150300.232.1
- kernel-rt-debuginfo-5.3.18-150300.232.1
-
SUSE Linux Enterprise Micro for Rancher 5.2 (noarch)
- kernel-source-rt-5.3.18-150300.232.1
References:
- https://www.suse.com/security/cve/CVE-2022-0854.html
- https://www.suse.com/security/cve/CVE-2022-48853.html
- https://www.suse.com/security/cve/CVE-2022-50282.html
- https://www.suse.com/security/cve/CVE-2022-50623.html
- https://www.suse.com/security/cve/CVE-2022-50630.html
- https://www.suse.com/security/cve/CVE-2022-50635.html
- https://www.suse.com/security/cve/CVE-2022-50640.html
- https://www.suse.com/security/cve/CVE-2022-50641.html
- https://www.suse.com/security/cve/CVE-2022-50644.html
- https://www.suse.com/security/cve/CVE-2022-50646.html
- https://www.suse.com/security/cve/CVE-2022-50649.html
- https://www.suse.com/security/cve/CVE-2022-50668.html
- https://www.suse.com/security/cve/CVE-2022-50671.html
- https://www.suse.com/security/cve/CVE-2022-50678.html
- https://www.suse.com/security/cve/CVE-2022-50700.html
- https://www.suse.com/security/cve/CVE-2022-50703.html
- https://www.suse.com/security/cve/CVE-2022-50709.html
- https://www.suse.com/security/cve/CVE-2022-50717.html
- https://www.suse.com/security/cve/CVE-2022-50726.html
- https://www.suse.com/security/cve/CVE-2022-50730.html
- https://www.suse.com/security/cve/CVE-2022-50731.html
- https://www.suse.com/security/cve/CVE-2022-50733.html
- https://www.suse.com/security/cve/CVE-2022-50736.html
- https://www.suse.com/security/cve/CVE-2022-50742.html
- https://www.suse.com/security/cve/CVE-2022-50744.html
- https://www.suse.com/security/cve/CVE-2022-50756.html
- https://www.suse.com/security/cve/CVE-2022-50758.html
- https://www.suse.com/security/cve/CVE-2022-50767.html
- https://www.suse.com/security/cve/CVE-2022-50814.html
- https://www.suse.com/security/cve/CVE-2022-50821.html
- https://www.suse.com/security/cve/CVE-2022-50823.html
- https://www.suse.com/security/cve/CVE-2022-50827.html
- https://www.suse.com/security/cve/CVE-2022-50828.html
- https://www.suse.com/security/cve/CVE-2022-50840.html
- https://www.suse.com/security/cve/CVE-2022-50843.html
- https://www.suse.com/security/cve/CVE-2022-50850.html
- https://www.suse.com/security/cve/CVE-2022-50870.html
- https://www.suse.com/security/cve/CVE-2022-50876.html
- https://www.suse.com/security/cve/CVE-2022-50880.html
- https://www.suse.com/security/cve/CVE-2022-50884.html
- https://www.suse.com/security/cve/CVE-2022-50889.html
- https://www.suse.com/security/cve/CVE-2023-23559.html
- https://www.suse.com/security/cve/CVE-2023-4132.html
- https://www.suse.com/security/cve/CVE-2023-53215.html
- https://www.suse.com/security/cve/CVE-2023-53254.html
- https://www.suse.com/security/cve/CVE-2023-53761.html
- https://www.suse.com/security/cve/CVE-2023-53781.html
- https://www.suse.com/security/cve/CVE-2023-54019.html
- https://www.suse.com/security/cve/CVE-2023-54024.html
- https://www.suse.com/security/cve/CVE-2023-54110.html
- https://www.suse.com/security/cve/CVE-2023-54142.html
- https://www.suse.com/security/cve/CVE-2023-54168.html
- https://www.suse.com/security/cve/CVE-2023-54170.html
- https://www.suse.com/security/cve/CVE-2023-54242.html
- https://www.suse.com/security/cve/CVE-2023-54243.html
- https://www.suse.com/security/cve/CVE-2023-54270.html
- https://www.suse.com/security/cve/CVE-2025-38068.html
- https://www.suse.com/security/cve/CVE-2025-38159.html
- https://www.suse.com/security/cve/CVE-2025-40019.html
- https://www.suse.com/security/cve/CVE-2025-40215.html
- https://www.suse.com/security/cve/CVE-2025-40220.html
- https://www.suse.com/security/cve/CVE-2025-40233.html
- https://www.suse.com/security/cve/CVE-2025-40256.html
- https://www.suse.com/security/cve/CVE-2025-40277.html
- https://www.suse.com/security/cve/CVE-2025-40280.html
- https://www.suse.com/security/cve/CVE-2025-40331.html
- https://www.suse.com/security/cve/CVE-2025-68813.html
- https://www.suse.com/security/cve/CVE-2025-71120.html
- https://bugzilla.suse.com/show_bug.cgi?id=1065729
- https://bugzilla.suse.com/show_bug.cgi?id=1196823
- https://bugzilla.suse.com/show_bug.cgi?id=1204957
- https://bugzilla.suse.com/show_bug.cgi?id=1206889
- https://bugzilla.suse.com/show_bug.cgi?id=1207051
- https://bugzilla.suse.com/show_bug.cgi?id=1207088
- https://bugzilla.suse.com/show_bug.cgi?id=1207653
- https://bugzilla.suse.com/show_bug.cgi?id=1209799
- https://bugzilla.suse.com/show_bug.cgi?id=1213653
- https://bugzilla.suse.com/show_bug.cgi?id=1213969
- https://bugzilla.suse.com/show_bug.cgi?id=1225109
- https://bugzilla.suse.com/show_bug.cgi?id=1228015
- https://bugzilla.suse.com/show_bug.cgi?id=1245210
- https://bugzilla.suse.com/show_bug.cgi?id=1245751
- https://bugzilla.suse.com/show_bug.cgi?id=1249739
- https://bugzilla.suse.com/show_bug.cgi?id=1249871
- https://bugzilla.suse.com/show_bug.cgi?id=1250397
- https://bugzilla.suse.com/show_bug.cgi?id=1252678
- https://bugzilla.suse.com/show_bug.cgi?id=1254520
- https://bugzilla.suse.com/show_bug.cgi?id=1254592
- https://bugzilla.suse.com/show_bug.cgi?id=1254614
- https://bugzilla.suse.com/show_bug.cgi?id=1254615
- https://bugzilla.suse.com/show_bug.cgi?id=1254632
- https://bugzilla.suse.com/show_bug.cgi?id=1254634
- https://bugzilla.suse.com/show_bug.cgi?id=1254686
- https://bugzilla.suse.com/show_bug.cgi?id=1254711
- https://bugzilla.suse.com/show_bug.cgi?id=1254751
- https://bugzilla.suse.com/show_bug.cgi?id=1254763
- https://bugzilla.suse.com/show_bug.cgi?id=1254775
- https://bugzilla.suse.com/show_bug.cgi?id=1254785
- https://bugzilla.suse.com/show_bug.cgi?id=1254792
- https://bugzilla.suse.com/show_bug.cgi?id=1254813
- https://bugzilla.suse.com/show_bug.cgi?id=1254847
- https://bugzilla.suse.com/show_bug.cgi?id=1254851
- https://bugzilla.suse.com/show_bug.cgi?id=1254894
- https://bugzilla.suse.com/show_bug.cgi?id=1254902
- https://bugzilla.suse.com/show_bug.cgi?id=1254959
- https://bugzilla.suse.com/show_bug.cgi?id=1255002
- https://bugzilla.suse.com/show_bug.cgi?id=1255565
- https://bugzilla.suse.com/show_bug.cgi?id=1255576
- https://bugzilla.suse.com/show_bug.cgi?id=1255607
- https://bugzilla.suse.com/show_bug.cgi?id=1255609
- https://bugzilla.suse.com/show_bug.cgi?id=1255636
- https://bugzilla.suse.com/show_bug.cgi?id=1255844
- https://bugzilla.suse.com/show_bug.cgi?id=1255901
- https://bugzilla.suse.com/show_bug.cgi?id=1255908
- https://bugzilla.suse.com/show_bug.cgi?id=1255919
- https://bugzilla.suse.com/show_bug.cgi?id=1256040
- https://bugzilla.suse.com/show_bug.cgi?id=1256045
- https://bugzilla.suse.com/show_bug.cgi?id=1256048
- https://bugzilla.suse.com/show_bug.cgi?id=1256049
- https://bugzilla.suse.com/show_bug.cgi?id=1256053
- https://bugzilla.suse.com/show_bug.cgi?id=1256056
- https://bugzilla.suse.com/show_bug.cgi?id=1256064
- https://bugzilla.suse.com/show_bug.cgi?id=1256095
- https://bugzilla.suse.com/show_bug.cgi?id=1256127
- https://bugzilla.suse.com/show_bug.cgi?id=1256132
- https://bugzilla.suse.com/show_bug.cgi?id=1256136
- https://bugzilla.suse.com/show_bug.cgi?id=1256137
- https://bugzilla.suse.com/show_bug.cgi?id=1256143
- https://bugzilla.suse.com/show_bug.cgi?id=1256154
- https://bugzilla.suse.com/show_bug.cgi?id=1256165
- https://bugzilla.suse.com/show_bug.cgi?id=1256194
- https://bugzilla.suse.com/show_bug.cgi?id=1256203
- https://bugzilla.suse.com/show_bug.cgi?id=1256207
- https://bugzilla.suse.com/show_bug.cgi?id=1256208
- https://bugzilla.suse.com/show_bug.cgi?id=1256216
- https://bugzilla.suse.com/show_bug.cgi?id=1256230
- https://bugzilla.suse.com/show_bug.cgi?id=1256242
- https://bugzilla.suse.com/show_bug.cgi?id=1256248
- https://bugzilla.suse.com/show_bug.cgi?id=1256333
- https://bugzilla.suse.com/show_bug.cgi?id=1256344
- https://bugzilla.suse.com/show_bug.cgi?id=1256353
- https://bugzilla.suse.com/show_bug.cgi?id=1256426
- https://bugzilla.suse.com/show_bug.cgi?id=1256641
- https://bugzilla.suse.com/show_bug.cgi?id=1256779
- https://jira.suse.com/browse/SLE-13847