{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default":"5.3.18-150300.59.232.1","kernel-default-base":"5.3.18-150300.59.232.1.150300.18.138.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.232.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"5.3.18-150300.59.232.1","kernel-default-base":"5.3.18-150300.59.232.1.150300.18.138.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"kernel-default-base","purl":"pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.232.1.150300.18.138.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 15 SP3 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50282: chardev: fix error handling in cdev_device_add() (bsc#1249739).\n- CVE-2022-50630: mm: hugetlb: fix UAF in hugetlb_handle_userfault (bsc#1254785).\n- CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255576).\n- CVE-2022-50717: nvmet-tcp: add bounds check on Transfer Tag (bsc#1255844).\n- CVE-2022-50726: net/mlx5: Fix possible use-after-free in async command interface (bsc#1256040).\n- CVE-2022-50736: RDMA/siw: Fix immediate work request flush to completion queue (bsc#1256137).\n- CVE-2022-50756: nvme-core: replace ctrl page size with a macro (bsc#1256216).\n- CVE-2023-53215: sched/fair: Don't balance task to its current running CPU (bsc#1250397).\n- CVE-2023-53254: cacheinfo: Fix shared_cpu_map to handle shared caches at different levels (bsc#1249871).\n- CVE-2023-53761: USB: usbtmc: Fix direction for 0-length ioctl control messages (bsc#1255002).\n- CVE-2023-53781: smc: Fix use-after-free in tcp_write_timer_handler() (bsc#1254751).\n- CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy() (bsc#1256095).\n- CVE-2023-54168: RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() (bsc#1256053).\n- CVE-2023-54243: netfilter: ebtables: fix table blob use-after-free (bsc#1255908).\n- CVE-2025-38068: crypto: lzo - Fix compression buffer overrun (bsc#1245210).\n- CVE-2025-38159: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (bsc#1245751).\n- CVE-2025-40019: crypto: essiv - Check ssize for decryption and in-place encryption (bsc#1252678).\n- CVE-2025-40215: kABI: xfrm: delete x->tunnel as we delete x (bsc#1254959).\n- CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520).\n- CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813).\n- CVE-2025-40277: drm/vmwgfx: Validate command header size against (bsc#1254894).\n- CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self() (bsc#1254847).\n- CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).\n- CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256641).\n- CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256779).\n","id":"SUSE-SU-2026:0369-1","modified":"2026-02-03T13:42:47Z","published":"2026-02-03T13:42:47Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260369-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1065729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196823"},{"type":"REPORT","url":"https://bugzilla.suse.com/1204957"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206889"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207051"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207088"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207653"},{"type":"REPORT","url":"https://bugzilla.suse.com/1209799"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213653"},{"type":"REPORT","url":"https://bugzilla.suse.com/1213969"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225109"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228015"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245210"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245751"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249739"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249871"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250397"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252678"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254520"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254592"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254614"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254615"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254632"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254634"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254686"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254711"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254751"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254763"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254775"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254785"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254792"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254813"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254847"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254851"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254894"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254902"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254959"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255002"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255565"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255576"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255607"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255609"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255636"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255844"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255901"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255908"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255919"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256040"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256045"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256048"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256049"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256053"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256056"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256064"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256095"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256127"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256132"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256136"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256137"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256143"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256154"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256165"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256194"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256203"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256207"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256208"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256216"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256230"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256242"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256248"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256333"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256344"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256353"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256426"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256641"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256779"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-0854"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48853"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50282"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50623"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50630"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50635"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50640"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50641"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50644"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50646"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50649"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50668"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50671"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50678"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50700"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50703"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50709"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50717"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50726"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50730"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50731"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50733"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50736"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50742"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50744"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50756"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50758"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50767"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50814"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50821"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50823"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50827"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50828"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50840"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50843"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50850"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50870"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50876"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50880"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50889"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-23559"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-4132"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53215"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53254"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53761"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53781"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54019"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54024"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54110"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54142"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54168"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54170"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54242"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54243"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54270"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38068"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38159"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40019"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40215"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40220"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40233"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40256"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40277"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40280"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40331"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68813"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71120"}],"related":["CVE-2022-0854","CVE-2022-48853","CVE-2022-50282","CVE-2022-50623","CVE-2022-50630","CVE-2022-50635","CVE-2022-50640","CVE-2022-50641","CVE-2022-50644","CVE-2022-50646","CVE-2022-50649","CVE-2022-50668","CVE-2022-50671","CVE-2022-50678","CVE-2022-50700","CVE-2022-50703","CVE-2022-50709","CVE-2022-50717","CVE-2022-50726","CVE-2022-50730","CVE-2022-50731","CVE-2022-50733","CVE-2022-50736","CVE-2022-50742","CVE-2022-50744","CVE-2022-50756","CVE-2022-50758","CVE-2022-50767","CVE-2022-50814","CVE-2022-50821","CVE-2022-50823","CVE-2022-50827","CVE-2022-50828","CVE-2022-50840","CVE-2022-50843","CVE-2022-50850","CVE-2022-50870","CVE-2022-50876","CVE-2022-50880","CVE-2022-50884","CVE-2022-50889","CVE-2023-23559","CVE-2023-4132","CVE-2023-53215","CVE-2023-53254","CVE-2023-53761","CVE-2023-53781","CVE-2023-54019","CVE-2023-54024","CVE-2023-54110","CVE-2023-54142","CVE-2023-54168","CVE-2023-54170","CVE-2023-54242","CVE-2023-54243","CVE-2023-54270","CVE-2025-38068","CVE-2025-38159","CVE-2025-40019","CVE-2025-40215","CVE-2025-40220","CVE-2025-40233","CVE-2025-40256","CVE-2025-40277","CVE-2025-40280","CVE-2025-40331","CVE-2025-68813","CVE-2025-71120"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2022-0854","CVE-2022-48853","CVE-2022-50282","CVE-2022-50623","CVE-2022-50630","CVE-2022-50635","CVE-2022-50640","CVE-2022-50641","CVE-2022-50644","CVE-2022-50646","CVE-2022-50649","CVE-2022-50668","CVE-2022-50671","CVE-2022-50678","CVE-2022-50700","CVE-2022-50703","CVE-2022-50709","CVE-2022-50717","CVE-2022-50726","CVE-2022-50730","CVE-2022-50731","CVE-2022-50733","CVE-2022-50736","CVE-2022-50742","CVE-2022-50744","CVE-2022-50756","CVE-2022-50758","CVE-2022-50767","CVE-2022-50814","CVE-2022-50821","CVE-2022-50823","CVE-2022-50827","CVE-2022-50828","CVE-2022-50840","CVE-2022-50843","CVE-2022-50850","CVE-2022-50870","CVE-2022-50876","CVE-2022-50880","CVE-2022-50884","CVE-2022-50889","CVE-2023-23559","CVE-2023-4132","CVE-2023-53215","CVE-2023-53254","CVE-2023-53761","CVE-2023-53781","CVE-2023-54019","CVE-2023-54024","CVE-2023-54110","CVE-2023-54142","CVE-2023-54168","CVE-2023-54170","CVE-2023-54242","CVE-2023-54243","CVE-2023-54270","CVE-2025-38068","CVE-2025-38159","CVE-2025-40019","CVE-2025-40215","CVE-2025-40220","CVE-2025-40233","CVE-2025-40256","CVE-2025-40277","CVE-2025-40280","CVE-2025-40331","CVE-2025-68813","CVE-2025-71120"]}