SUSE-SU-2026:0350-1

Vulnerability from csaf_suse - Published: 2026-01-30 13:42 - Updated: 2026-01-30 13:42
Summary
Security update for the Linux Kernel

Notes

Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to fix various security issues The following security issues were fixed: - CVE-2022-50282: chardev: fix error handling in cdev_device_add() (bsc#1249739). - CVE-2022-50630: mm: hugetlb: fix UAF in hugetlb_handle_userfault (bsc#1254785). - CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255576). - CVE-2022-50717: nvmet-tcp: add bounds check on Transfer Tag (bsc#1255844). - CVE-2022-50726: net/mlx5: Fix possible use-after-free in async command interface (bsc#1256040). - CVE-2022-50736: RDMA/siw: Fix immediate work request flush to completion queue (bsc#1256137). - CVE-2022-50756: nvme-core: replace ctrl page size with a macro (bsc#1256216). - CVE-2023-53215: sched/fair: Don't balance task to its current running CPU (bsc#1250397). - CVE-2023-53254: cacheinfo: Fix shared_cpu_map to handle shared caches at different levels (bsc#1249871). - CVE-2023-53761: USB: usbtmc: Fix direction for 0-length ioctl control messages (bsc#1255002). - CVE-2023-53781: smc: Fix use-after-free in tcp_write_timer_handler() (bsc#1254751). - CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy() (bsc#1256095). - CVE-2023-54168: RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() (bsc#1256053). - CVE-2023-54243: netfilter: ebtables: fix table blob use-after-free (bsc#1255908). - CVE-2025-38068: crypto: lzo - Fix compression buffer overrun (bsc#1245210). - CVE-2025-38159: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (bsc#1245751). - CVE-2025-40019: crypto: essiv - Check ssize for decryption and in-place encryption (bsc#1252678). - CVE-2025-40215: kABI: xfrm: delete x->tunnel as we delete x (bsc#1254959). - CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520). - CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813). - CVE-2025-40277: drm/vmwgfx: Validate command header size against (bsc#1254894). - CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self() (bsc#1254847). - CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615). - CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256641). - CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256779).
Patchnames
SUSE-2026-350,SUSE-SUSE-MicroOS-5.2-2026-350
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 SP3 RT kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50282: chardev: fix error handling in cdev_device_add() (bsc#1249739).\n- CVE-2022-50630: mm: hugetlb: fix UAF in hugetlb_handle_userfault (bsc#1254785).\n- CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255576).\n- CVE-2022-50717: nvmet-tcp: add bounds check on Transfer Tag (bsc#1255844).\n- CVE-2022-50726: net/mlx5: Fix possible use-after-free in async command interface (bsc#1256040).\n- CVE-2022-50736: RDMA/siw: Fix immediate work request flush to completion queue (bsc#1256137).\n- CVE-2022-50756: nvme-core: replace ctrl page size with a macro (bsc#1256216).\n- CVE-2023-53215: sched/fair: Don\u0027t balance task to its current running CPU (bsc#1250397).\n- CVE-2023-53254: cacheinfo: Fix shared_cpu_map to handle shared caches at different levels (bsc#1249871).\n- CVE-2023-53761: USB: usbtmc: Fix direction for 0-length ioctl control messages (bsc#1255002).\n- CVE-2023-53781: smc: Fix use-after-free in tcp_write_timer_handler() (bsc#1254751).\n- CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy() (bsc#1256095).\n- CVE-2023-54168: RDMA/mlx4: Prevent shift wrapping in set_user_sq_size() (bsc#1256053).\n- CVE-2023-54243: netfilter: ebtables: fix table blob use-after-free (bsc#1255908).\n- CVE-2025-38068: crypto: lzo - Fix compression buffer overrun (bsc#1245210).\n- CVE-2025-38159: wifi: rtw88: fix the \u0027para\u0027 buffer size to avoid reading out of bounds (bsc#1245751).\n- CVE-2025-40019: crypto: essiv - Check ssize for decryption and in-place encryption (bsc#1252678).\n- CVE-2025-40215: kABI: xfrm: delete x-\u003etunnel as we delete x (bsc#1254959).\n- CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520).\n- CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813).\n- CVE-2025-40277: drm/vmwgfx: Validate command header size against (bsc#1254894).\n- CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self() (bsc#1254847).\n- CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).\n- CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256641).\n- CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256779).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2026-350,SUSE-SUSE-MicroOS-5.2-2026-350",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0350-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2026:0350-1",
        "url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260350-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2026:0350-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196823",
        "url": "https://bugzilla.suse.com/1196823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1204957",
        "url": "https://bugzilla.suse.com/1204957"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1206889",
        "url": "https://bugzilla.suse.com/1206889"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1207051",
        "url": "https://bugzilla.suse.com/1207051"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1207088",
        "url": "https://bugzilla.suse.com/1207088"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1207653",
        "url": "https://bugzilla.suse.com/1207653"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1209799",
        "url": "https://bugzilla.suse.com/1209799"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1213653",
        "url": "https://bugzilla.suse.com/1213653"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1213969",
        "url": "https://bugzilla.suse.com/1213969"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225109",
        "url": "https://bugzilla.suse.com/1225109"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1228015",
        "url": "https://bugzilla.suse.com/1228015"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245210",
        "url": "https://bugzilla.suse.com/1245210"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1245751",
        "url": "https://bugzilla.suse.com/1245751"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1249739",
        "url": "https://bugzilla.suse.com/1249739"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1249871",
        "url": "https://bugzilla.suse.com/1249871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1250397",
        "url": "https://bugzilla.suse.com/1250397"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1252678",
        "url": "https://bugzilla.suse.com/1252678"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1254520",
        "url": "https://bugzilla.suse.com/1254520"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1254592",
        "url": "https://bugzilla.suse.com/1254592"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1254614",
        "url": "https://bugzilla.suse.com/1254614"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1254615",
        "url": "https://bugzilla.suse.com/1254615"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1254632",
        "url": "https://bugzilla.suse.com/1254632"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1254634",
        "url": "https://bugzilla.suse.com/1254634"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1254686",
        "url": "https://bugzilla.suse.com/1254686"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1254711",
        "url": "https://bugzilla.suse.com/1254711"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1254751",
        "url": "https://bugzilla.suse.com/1254751"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1254763",
        "url": "https://bugzilla.suse.com/1254763"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1254775",
        "url": "https://bugzilla.suse.com/1254775"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1254785",
        "url": "https://bugzilla.suse.com/1254785"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1254792",
        "url": "https://bugzilla.suse.com/1254792"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1254813",
        "url": "https://bugzilla.suse.com/1254813"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1254847",
        "url": "https://bugzilla.suse.com/1254847"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1254851",
        "url": "https://bugzilla.suse.com/1254851"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1254894",
        "url": "https://bugzilla.suse.com/1254894"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1254902",
        "url": "https://bugzilla.suse.com/1254902"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1254959",
        "url": "https://bugzilla.suse.com/1254959"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1255002",
        "url": "https://bugzilla.suse.com/1255002"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1255565",
        "url": "https://bugzilla.suse.com/1255565"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1255576",
        "url": "https://bugzilla.suse.com/1255576"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1255607",
        "url": "https://bugzilla.suse.com/1255607"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1255609",
        "url": "https://bugzilla.suse.com/1255609"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1255636",
        "url": "https://bugzilla.suse.com/1255636"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1255844",
        "url": "https://bugzilla.suse.com/1255844"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1255901",
        "url": "https://bugzilla.suse.com/1255901"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1255908",
        "url": "https://bugzilla.suse.com/1255908"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1255919",
        "url": "https://bugzilla.suse.com/1255919"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256040",
        "url": "https://bugzilla.suse.com/1256040"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256045",
        "url": "https://bugzilla.suse.com/1256045"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256048",
        "url": "https://bugzilla.suse.com/1256048"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256049",
        "url": "https://bugzilla.suse.com/1256049"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256053",
        "url": "https://bugzilla.suse.com/1256053"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256056",
        "url": "https://bugzilla.suse.com/1256056"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256064",
        "url": "https://bugzilla.suse.com/1256064"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256095",
        "url": "https://bugzilla.suse.com/1256095"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256127",
        "url": "https://bugzilla.suse.com/1256127"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256132",
        "url": "https://bugzilla.suse.com/1256132"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256136",
        "url": "https://bugzilla.suse.com/1256136"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256137",
        "url": "https://bugzilla.suse.com/1256137"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256143",
        "url": "https://bugzilla.suse.com/1256143"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256154",
        "url": "https://bugzilla.suse.com/1256154"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256165",
        "url": "https://bugzilla.suse.com/1256165"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256194",
        "url": "https://bugzilla.suse.com/1256194"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256203",
        "url": "https://bugzilla.suse.com/1256203"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256207",
        "url": "https://bugzilla.suse.com/1256207"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256208",
        "url": "https://bugzilla.suse.com/1256208"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256216",
        "url": "https://bugzilla.suse.com/1256216"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256230",
        "url": "https://bugzilla.suse.com/1256230"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256242",
        "url": "https://bugzilla.suse.com/1256242"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256248",
        "url": "https://bugzilla.suse.com/1256248"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256333",
        "url": "https://bugzilla.suse.com/1256333"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256344",
        "url": "https://bugzilla.suse.com/1256344"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256353",
        "url": "https://bugzilla.suse.com/1256353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256426",
        "url": "https://bugzilla.suse.com/1256426"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256641",
        "url": "https://bugzilla.suse.com/1256641"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1256779",
        "url": "https://bugzilla.suse.com/1256779"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0854 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0854/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-48853 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-48853/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50282 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50282/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50623 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50623/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50630 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50630/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50635 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50635/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50640 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50640/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50641 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50641/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50644 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50644/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50646 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50646/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50649 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50649/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50668 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50668/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50671 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50671/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50678 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50678/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50700 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50700/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50703 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50703/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50709 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50709/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50717 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50717/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50726 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50726/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50730 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50730/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50731 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50731/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50733 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50733/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50736 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50736/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50742 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50742/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50744 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50744/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50756 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50756/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50758 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50758/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50767 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50767/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50814 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50814/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50821 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50821/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50823 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50823/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50827 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50827/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50828 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50828/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50840 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50840/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50843 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50843/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50850 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50850/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50870 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50870/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50876 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50876/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50880 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50880/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50884 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50884/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-50889 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-50889/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-23559 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-23559/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-4132 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-4132/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53215 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53215/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53254 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53254/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53761 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53761/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53781 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53781/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-54019 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-54019/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-54024 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-54024/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-54110 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-54110/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-54142 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-54142/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-54168 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-54168/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-54170 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-54170/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-54242 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-54242/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-54243 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-54243/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-54270 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-54270/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-38068 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-38068/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-38159 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-38159/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40019 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40019/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40215 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40215/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40220 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40220/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40233 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40233/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40256 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40256/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40277 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40277/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40280 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40280/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-40331 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-40331/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-68813 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-68813/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-71120 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-71120/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2026-01-30T13:42:59Z",
      "generator": {
        "date": "2026-01-30T13:42:59Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2026:0350-1",
      "initial_release_date": "2026-01-30T13:42:59Z",
      "revision_history": [
        {
          "date": "2026-01-30T13:42:59Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-rt-5.3.18-150300.232.1.noarch",
                "product": {
                  "name": "kernel-devel-rt-5.3.18-150300.232.1.noarch",
                  "product_id": "kernel-devel-rt-5.3.18-150300.232.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-rt-5.3.18-150300.232.1.noarch",
                "product": {
                  "name": "kernel-source-rt-5.3.18-150300.232.1.noarch",
                  "product_id": "kernel-source-rt-5.3.18-150300.232.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-rt-5.3.18-150300.232.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-rt-5.3.18-150300.232.1.x86_64",
                  "product_id": "cluster-md-kmp-rt-5.3.18-150300.232.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-rt-5.3.18-150300.232.1.x86_64",
                "product": {
                  "name": "dlm-kmp-rt-5.3.18-150300.232.1.x86_64",
                  "product_id": "dlm-kmp-rt-5.3.18-150300.232.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-rt-5.3.18-150300.232.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-rt-5.3.18-150300.232.1.x86_64",
                  "product_id": "gfs2-kmp-rt-5.3.18-150300.232.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-5.3.18-150300.232.1.x86_64",
                "product": {
                  "name": "kernel-rt-5.3.18-150300.232.1.x86_64",
                  "product_id": "kernel-rt-5.3.18-150300.232.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-devel-5.3.18-150300.232.1.x86_64",
                "product": {
                  "name": "kernel-rt-devel-5.3.18-150300.232.1.x86_64",
                  "product_id": "kernel-rt-devel-5.3.18-150300.232.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-extra-5.3.18-150300.232.1.x86_64",
                "product": {
                  "name": "kernel-rt-extra-5.3.18-150300.232.1.x86_64",
                  "product_id": "kernel-rt-extra-5.3.18-150300.232.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-livepatch-devel-5.3.18-150300.232.1.x86_64",
                "product": {
                  "name": "kernel-rt-livepatch-devel-5.3.18-150300.232.1.x86_64",
                  "product_id": "kernel-rt-livepatch-devel-5.3.18-150300.232.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-rt-optional-5.3.18-150300.232.1.x86_64",
                "product": {
                  "name": "kernel-rt-optional-5.3.18-150300.232.1.x86_64",
                  "product_id": "kernel-rt-optional-5.3.18-150300.232.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-rt-5.3.18-150300.232.1.x86_64",
                "product": {
                  "name": "kernel-syms-rt-5.3.18-150300.232.1.x86_64",
                  "product_id": "kernel-syms-rt-5.3.18-150300.232.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-rt-5.3.18-150300.232.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-rt-5.3.18-150300.232.1.x86_64",
                  "product_id": "kselftests-kmp-rt-5.3.18-150300.232.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-rt-5.3.18-150300.232.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-rt-5.3.18-150300.232.1.x86_64",
                  "product_id": "ocfs2-kmp-rt-5.3.18-150300.232.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-rt-5.3.18-150300.232.1.x86_64",
                "product": {
                  "name": "reiserfs-kmp-rt-5.3.18-150300.232.1.x86_64",
                  "product_id": "reiserfs-kmp-rt-5.3.18-150300.232.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Micro 5.2",
                "product": {
                  "name": "SUSE Linux Enterprise Micro 5.2",
                  "product_id": "SUSE Linux Enterprise Micro 5.2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-microos:5.2"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-rt-5.3.18-150300.232.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64"
        },
        "product_reference": "kernel-rt-5.3.18-150300.232.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-rt-5.3.18-150300.232.1.noarch as component of SUSE Linux Enterprise Micro 5.2",
          "product_id": "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        },
        "product_reference": "kernel-source-rt-5.3.18-150300.232.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-0854",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0854"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A memory leak flaw was found in the Linux kernel\u0027s DMA subsystem, in the way a user calls DMA_FROM_DEVICE. This flaw allows a local user to read random memory from the kernel space.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0854",
          "url": "https://www.suse.com/security/cve/CVE-2022-0854"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1196823 for CVE-2022-0854",
          "url": "https://bugzilla.suse.com/1196823"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-0854"
    },
    {
      "cve": "CVE-2022-48853",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-48853"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nswiotlb: fix info leak with DMA_FROM_DEVICE\n\nThe problem I\u0027m addressing was discovered by the LTP test covering\ncve-2018-1000204.\n\nA short description of what happens follows:\n1) The test case issues a command code 00 (TEST UNIT READY) via the SG_IO\n   interface with: dxfer_len == 524288, dxdfer_dir == SG_DXFER_FROM_DEV\n   and a corresponding dxferp. The peculiar thing about this is that TUR\n   is not reading from the device.\n2) In sg_start_req() the invocation of blk_rq_map_user() effectively\n   bounces the user-space buffer. As if the device was to transfer into\n   it. Since commit a45b599ad808 (\"scsi: sg: allocate with __GFP_ZERO in\n   sg_build_indirect()\") we make sure this first bounce buffer is\n   allocated with GFP_ZERO.\n3) For the rest of the story we keep ignoring that we have a TUR, so the\n   device won\u0027t touch the buffer we prepare as if the we had a\n   DMA_FROM_DEVICE type of situation. My setup uses a virtio-scsi device\n   and the  buffer allocated by SG is mapped by the function\n   virtqueue_add_split() which uses DMA_FROM_DEVICE for the \"in\" sgs (here\n   scatter-gather and not scsi generics). This mapping involves bouncing\n   via the swiotlb (we need swiotlb to do virtio in protected guest like\n   s390 Secure Execution, or AMD SEV).\n4) When the SCSI TUR is done, we first copy back the content of the second\n   (that is swiotlb) bounce buffer (which most likely contains some\n   previous IO data), to the first bounce buffer, which contains all\n   zeros.  Then we copy back the content of the first bounce buffer to\n   the user-space buffer.\n5) The test case detects that the buffer, which it zero-initialized,\n  ain\u0027t all zeros and fails.\n\nOne can argue that this is an swiotlb problem, because without swiotlb\nwe leak all zeros, and the swiotlb should be transparent in a sense that\nit does not affect the outcome (if all other participants are well\nbehaved).\n\nCopying the content of the original buffer into the swiotlb buffer is\nthe only way I can think of to make swiotlb transparent in such\nscenarios. So let\u0027s do just that if in doubt, but allow the driver\nto tell us that the whole mapped buffer is going to be overwritten,\nin which case we can preserve the old behavior and avoid the performance\nimpact of the extra bounce.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-48853",
          "url": "https://www.suse.com/security/cve/CVE-2022-48853"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1228015 for CVE-2022-48853",
          "url": "https://bugzilla.suse.com/1228015"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-48853"
    },
    {
      "cve": "CVE-2022-50282",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50282"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nchardev: fix error handling in cdev_device_add()\n\nWhile doing fault injection test, I got the following report:\n\n------------[ cut here ]------------\nkobject: \u0027(null)\u0027 (0000000039956980): is not initialized, yet kobject_put() is being called.\nWARNING: CPU: 3 PID: 6306 at kobject_put+0x23d/0x4e0\nCPU: 3 PID: 6306 Comm: 283 Tainted: G        W          6.1.0-rc2-00005-g307c1086d7c9 #1253\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.13.0-1ubuntu1.1 04/01/2014\nRIP: 0010:kobject_put+0x23d/0x4e0\nCall Trace:\n \u003cTASK\u003e\n cdev_device_add+0x15e/0x1b0\n __iio_device_register+0x13b4/0x1af0 [industrialio]\n __devm_iio_device_register+0x22/0x90 [industrialio]\n max517_probe+0x3d8/0x6b4 [max517]\n i2c_device_probe+0xa81/0xc00\n\nWhen device_add() is injected fault and returns error, if dev-\u003edevt is not set,\ncdev_add() is not called, cdev_del() is not needed. Fix this by checking dev-\u003edevt\nin error path.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50282",
          "url": "https://www.suse.com/security/cve/CVE-2022-50282"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1249739 for CVE-2022-50282",
          "url": "https://bugzilla.suse.com/1249739"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1249764 for CVE-2022-50282",
          "url": "https://bugzilla.suse.com/1249764"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-50282"
    },
    {
      "cve": "CVE-2022-50623",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50623"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfpga: prevent integer overflow in dfl_feature_ioctl_set_irq()\n\nThe \"hdr.count * sizeof(s32)\" multiplication can overflow on 32 bit\nsystems leading to memory corruption.  Use array_size() to fix that.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50623",
          "url": "https://www.suse.com/security/cve/CVE-2022-50623"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254792 for CVE-2022-50623",
          "url": "https://bugzilla.suse.com/1254792"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50623"
    },
    {
      "cve": "CVE-2022-50630",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50630"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: hugetlb: fix UAF in hugetlb_handle_userfault\n\nThe vma_lock and hugetlb_fault_mutex are dropped before handling userfault\nand reacquire them again after handle_userfault(), but reacquire the\nvma_lock could lead to UAF[1,2] due to the following race,\n\nhugetlb_fault\n  hugetlb_no_page\n    /*unlock vma_lock */\n    hugetlb_handle_userfault\n      handle_userfault\n        /* unlock mm-\u003emmap_lock*/\n                                           vm_mmap_pgoff\n                                             do_mmap\n                                               mmap_region\n                                                 munmap_vma_range\n                                                   /* clean old vma */\n        /* lock vma_lock again  \u003c--- UAF */\n    /* unlock vma_lock */\n\nSince the vma_lock will unlock immediately after\nhugetlb_handle_userfault(), let\u0027s drop the unneeded lock and unlock in\nhugetlb_handle_userfault() to fix the issue.\n\n[1] https://lore.kernel.org/linux-mm/000000000000d5e00a05e834962e@google.com/\n[2] https://lore.kernel.org/linux-mm/20220921014457.1668-1-liuzixian4@huawei.com/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50630",
          "url": "https://www.suse.com/security/cve/CVE-2022-50630"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254785 for CVE-2022-50630",
          "url": "https://bugzilla.suse.com/1254785"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50630"
    },
    {
      "cve": "CVE-2022-50635",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50635"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/kprobes: Fix null pointer reference in arch_prepare_kprobe()\n\nI found a null pointer reference in arch_prepare_kprobe():\n\n  # echo \u0027p cmdline_proc_show\u0027 \u003e kprobe_events\n  # echo \u0027p cmdline_proc_show+16\u0027 \u003e\u003e kprobe_events\n  Kernel attempted to read user page (0) - exploit attempt? (uid: 0)\n  BUG: Kernel NULL pointer dereference on read at 0x00000000\n  Faulting instruction address: 0xc000000000050bfc\n  Oops: Kernel access of bad area, sig: 11 [#1]\n  LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA PowerNV\n  Modules linked in:\n  CPU: 0 PID: 122 Comm: sh Not tainted 6.0.0-rc3-00007-gdcf8e5633e2e #10\n  NIP:  c000000000050bfc LR: c000000000050bec CTR: 0000000000005bdc\n  REGS: c0000000348475b0 TRAP: 0300   Not tainted  (6.0.0-rc3-00007-gdcf8e5633e2e)\n  MSR:  9000000000009033 \u003cSF,HV,EE,ME,IR,DR,RI,LE\u003e  CR: 88002444  XER: 20040006\n  CFAR: c00000000022d100 DAR: 0000000000000000 DSISR: 40000000 IRQMASK: 0\n  ...\n  NIP arch_prepare_kprobe+0x10c/0x2d0\n  LR  arch_prepare_kprobe+0xfc/0x2d0\n  Call Trace:\n    0xc0000000012f77a0 (unreliable)\n    register_kprobe+0x3c0/0x7a0\n    __register_trace_kprobe+0x140/0x1a0\n    __trace_kprobe_create+0x794/0x1040\n    trace_probe_create+0xc4/0xe0\n    create_or_delete_trace_kprobe+0x2c/0x80\n    trace_parse_run_command+0xf0/0x210\n    probes_write+0x20/0x40\n    vfs_write+0xfc/0x450\n    ksys_write+0x84/0x140\n    system_call_exception+0x17c/0x3a0\n    system_call_vectored_common+0xe8/0x278\n  --- interrupt: 3000 at 0x7fffa5682de0\n  NIP:  00007fffa5682de0 LR: 0000000000000000 CTR: 0000000000000000\n  REGS: c000000034847e80 TRAP: 3000   Not tainted  (6.0.0-rc3-00007-gdcf8e5633e2e)\n  MSR:  900000000280f033 \u003cSF,HV,VEC,VSX,EE,PR,FP,ME,IR,DR,RI,LE\u003e  CR: 44002408  XER: 00000000\n\nThe address being probed has some special:\n\n  cmdline_proc_show: Probe based on ftrace\n  cmdline_proc_show+16: Probe for the next instruction at the ftrace location\n\nThe ftrace-based kprobe does not generate kprobe::ainsn::insn, it gets\nset to NULL. In arch_prepare_kprobe() it will check for:\n\n  ...\n  prev = get_kprobe(p-\u003eaddr - 1);\n  preempt_enable_no_resched();\n  if (prev \u0026\u0026 ppc_inst_prefixed(ppc_inst_read(prev-\u003eainsn.insn))) {\n  ...\n\nIf prev is based on ftrace, \u0027ppc_inst_read(prev-\u003eainsn.insn)\u0027 will occur\nwith a null pointer reference. At this point prev-\u003eaddr will not be a\nprefixed instruction, so the check can be skipped.\n\nCheck if prev is ftrace-based kprobe before reading \u0027prev-\u003eainsn.insn\u0027\nto fix this problem.\n\n[mpe: Trim oops]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50635",
          "url": "https://www.suse.com/security/cve/CVE-2022-50635"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254592 for CVE-2022-50635",
          "url": "https://bugzilla.suse.com/1254592"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50635"
    },
    {
      "cve": "CVE-2022-50640",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50640"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmmc: core: Fix kernel panic when remove non-standard SDIO card\n\nSDIO tuple is only allocated for standard SDIO card, especially it causes\nmemory corruption issues when the non-standard SDIO card has removed, which\nis because the card device\u0027s reference counter does not increase for it at\nsdio_init_func(), but all SDIO card device reference counter gets decreased\nat sdio_release_func().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50640",
          "url": "https://www.suse.com/security/cve/CVE-2022-50640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254686 for CVE-2022-50640",
          "url": "https://bugzilla.suse.com/1254686"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50640"
    },
    {
      "cve": "CVE-2022-50641",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50641"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHSI: omap_ssi: Fix refcount leak in ssi_probe\n\nWhen returning or breaking early from a\nfor_each_available_child_of_node() loop, we need to explicitly call\nof_node_put() on the child node to possibly release the node.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50641",
          "url": "https://www.suse.com/security/cve/CVE-2022-50641"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254614 for CVE-2022-50641",
          "url": "https://bugzilla.suse.com/1254614"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-50641"
    },
    {
      "cve": "CVE-2022-50644",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50644"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe\n\npm_runtime_get_sync() will increment pm usage counter.\nForgetting to putting operation will result in reference leak.\nAdd missing pm_runtime_put_sync in some error paths.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50644",
          "url": "https://www.suse.com/security/cve/CVE-2022-50644"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254632 for CVE-2022-50644",
          "url": "https://bugzilla.suse.com/1254632"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-50644"
    },
    {
      "cve": "CVE-2022-50646",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50646"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: hpsa: Fix possible memory leak in hpsa_init_one()\n\nThe hpda_alloc_ctlr_info() allocates h and its field reply_map. However, in\nhpsa_init_one(), if alloc_percpu() failed, the hpsa_init_one() jumps to\nclean1 directly, which frees h and leaks the h-\u003ereply_map.\n\nFix by calling hpda_free_ctlr_info() to release h-\u003ereplay_map and h instead\nfree h directly.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50646",
          "url": "https://www.suse.com/security/cve/CVE-2022-50646"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254634 for CVE-2022-50646",
          "url": "https://bugzilla.suse.com/1254634"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-50646"
    },
    {
      "cve": "CVE-2022-50649",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50649"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npower: supply: adp5061: fix out-of-bounds read in adp5061_get_chg_type()\n\nADP5061_CHG_STATUS_1_CHG_STATUS is masked with 0x07, which means a length\nof 8, but adp5061_chg_type array size is 4, may end up reading 4 elements\nbeyond the end of the adp5061_chg_type[] array.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50649",
          "url": "https://www.suse.com/security/cve/CVE-2022-50649"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254775 for CVE-2022-50649",
          "url": "https://bugzilla.suse.com/1254775"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50649"
    },
    {
      "cve": "CVE-2022-50668",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50668"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix deadlock due to mbcache entry corruption\n\nWhen manipulating xattr blocks, we can deadlock infinitely looping\ninside ext4_xattr_block_set() where we constantly keep finding xattr\nblock for reuse in mbcache but we are unable to reuse it because its\nreference count is too big. This happens because cache entry for the\nxattr block is marked as reusable (e_reusable set) although its\nreference count is too big. When this inconsistency happens, this\ninconsistent state is kept indefinitely and so ext4_xattr_block_set()\nkeeps retrying indefinitely.\n\nThe inconsistent state is caused by non-atomic update of e_reusable bit.\ne_reusable is part of a bitfield and e_reusable update can race with\nupdate of e_referenced bit in the same bitfield resulting in loss of one\nof the updates. Fix the problem by using atomic bitops instead.\n\nThis bug has been around for many years, but it became *much* easier\nto hit after commit 65f8b80053a1 (\"ext4: fix race when reusing xattr\nblocks\").",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50668",
          "url": "https://www.suse.com/security/cve/CVE-2022-50668"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254763 for CVE-2022-50668",
          "url": "https://bugzilla.suse.com/1254763"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50668"
    },
    {
      "cve": "CVE-2022-50671",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50671"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix \"kernel NULL pointer dereference\" error\n\nWhen rxe_queue_init in the function rxe_qp_init_req fails,\nboth qp-\u003ereq.task.func and qp-\u003ereq.task.arg are not initialized.\n\nBecause of creation of qp fails, the function rxe_create_qp will\ncall rxe_qp_do_cleanup to handle allocated resource.\n\nBefore calling __rxe_do_task, both qp-\u003ereq.task.func and\nqp-\u003ereq.task.arg should be checked.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50671",
          "url": "https://www.suse.com/security/cve/CVE-2022-50671"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254711 for CVE-2022-50671",
          "url": "https://bugzilla.suse.com/1254711"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50671"
    },
    {
      "cve": "CVE-2022-50678",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50678"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: fix invalid address access when enabling SCAN log level\n\nThe variable i is changed when setting random MAC address and causes\ninvalid address access when printing the value of pi-\u003ereqs[i]-\u003ereqid.\n\nWe replace reqs index with ri to fix the issue.\n\n[  136.726473] Unable to handle kernel access to user memory outside uaccess routines at virtual address 0000000000000000\n[  136.737365] Mem abort info:\n[  136.740172]   ESR = 0x96000004\n[  136.743359]   Exception class = DABT (current EL), IL = 32 bits\n[  136.749294]   SET = 0, FnV = 0\n[  136.752481]   EA = 0, S1PTW = 0\n[  136.755635] Data abort info:\n[  136.758514]   ISV = 0, ISS = 0x00000004\n[  136.762487]   CM = 0, WnR = 0\n[  136.765522] user pgtable: 4k pages, 48-bit VAs, pgdp = 000000005c4e2577\n[  136.772265] [0000000000000000] pgd=0000000000000000\n[  136.777160] Internal error: Oops: 96000004 [#1] PREEMPT SMP\n[  136.782732] Modules linked in: brcmfmac(O) brcmutil(O) cfg80211(O) compat(O)\n[  136.789788] Process wificond (pid: 3175, stack limit = 0x00000000053048fb)\n[  136.796664] CPU: 3 PID: 3175 Comm: wificond Tainted: G           O      4.19.42-00001-g531a5f5 #1\n[  136.805532] Hardware name: Freescale i.MX8MQ EVK (DT)\n[  136.810584] pstate: 60400005 (nZCv daif +PAN -UAO)\n[  136.815429] pc : brcmf_pno_config_sched_scans+0x6cc/0xa80 [brcmfmac]\n[  136.821811] lr : brcmf_pno_config_sched_scans+0x67c/0xa80 [brcmfmac]\n[  136.828162] sp : ffff00000e9a3880\n[  136.831475] x29: ffff00000e9a3890 x28: ffff800020543400\n[  136.836786] x27: ffff8000b1008880 x26: ffff0000012bf6a0\n[  136.842098] x25: ffff80002054345c x24: ffff800088d22400\n[  136.847409] x23: ffff0000012bf638 x22: ffff0000012bf6d8\n[  136.852721] x21: ffff8000aced8fc0 x20: ffff8000ac164400\n[  136.858032] x19: ffff00000e9a3946 x18: 0000000000000000\n[  136.863343] x17: 0000000000000000 x16: 0000000000000000\n[  136.868655] x15: ffff0000093f3b37 x14: 0000000000000050\n[  136.873966] x13: 0000000000003135 x12: 0000000000000000\n[  136.879277] x11: 0000000000000000 x10: ffff000009a61888\n[  136.884589] x9 : 000000000000000f x8 : 0000000000000008\n[  136.889900] x7 : 303a32303d726464 x6 : ffff00000a1f957d\n[  136.895211] x5 : 0000000000000000 x4 : ffff00000e9a3942\n[  136.900523] x3 : 0000000000000000 x2 : ffff0000012cead8\n[  136.905834] x1 : ffff0000012bf6d8 x0 : 0000000000000000\n[  136.911146] Call trace:\n[  136.913623]  brcmf_pno_config_sched_scans+0x6cc/0xa80 [brcmfmac]\n[  136.919658]  brcmf_pno_start_sched_scan+0xa4/0x118 [brcmfmac]\n[  136.925430]  brcmf_cfg80211_sched_scan_start+0x80/0xe0 [brcmfmac]\n[  136.931636]  nl80211_start_sched_scan+0x140/0x308 [cfg80211]\n[  136.937298]  genl_rcv_msg+0x358/0x3f4\n[  136.940960]  netlink_rcv_skb+0xb4/0x118\n[  136.944795]  genl_rcv+0x34/0x48\n[  136.947935]  netlink_unicast+0x264/0x300\n[  136.951856]  netlink_sendmsg+0x2e4/0x33c\n[  136.955781]  __sys_sendto+0x120/0x19c",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50678",
          "url": "https://www.suse.com/security/cve/CVE-2022-50678"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254902 for CVE-2022-50678",
          "url": "https://bugzilla.suse.com/1254902"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50678"
    },
    {
      "cve": "CVE-2022-50700",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50700"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath10k: Delay the unmapping of the buffer\n\nOn WCN3990, we are seeing a rare scenario where copy engine hardware is\nsending a copy complete interrupt to the host driver while still\nprocessing the buffer that the driver has sent, this is leading into an\nSMMU fault triggering kernel panic. This is happening on copy engine\nchannel 3 (CE3) where the driver normally enqueues WMI commands to the\nfirmware. Upon receiving a copy complete interrupt, host driver will\nimmediately unmap and frees the buffer presuming that hardware has\nprocessed the buffer. In the issue case, upon receiving copy complete\ninterrupt, host driver will unmap and free the buffer but since hardware\nis still accessing the buffer (which in this case got unmapped in\nparallel), SMMU hardware will trigger an SMMU fault resulting in a\nkernel panic.\n\nIn order to avoid this, as a work around, add a delay before unmapping\nthe copy engine source DMA buffer. This is conditionally done for\nWCN3990 and only for the CE3 channel where issue is seen.\n\nBelow is the crash signature:\n\nwifi smmu error: kernel: [ 10.120965] arm-smmu 15000000.iommu: Unhandled\ncontext fault: fsr=0x402, iova=0x7fdfd8ac0,\nfsynr=0x500003,cbfrsynra=0xc1, cb=6 arm-smmu 15000000.iommu: Unhandled\ncontext fault:fsr=0x402, iova=0x7fe06fdc0, fsynr=0x710003,\ncbfrsynra=0xc1, cb=6 qcom-q6v5-mss 4080000.remoteproc: fatal error\nreceived: err_qdi.c:1040:EF:wlan_process:0x1:WLAN RT:0x2091:\ncmnos_thread.c:3998:Asserted in copy_engine.c:AXI_ERROR_DETECTED:2149\nremoteproc remoteproc0: crash detected in\n4080000.remoteproc: type fatal error \u003c3\u003e remoteproc remoteproc0:\nhandling crash #1 in 4080000.remoteproc\n\npc : __arm_lpae_unmap+0x500/0x514\nlr : __arm_lpae_unmap+0x4bc/0x514\nsp : ffffffc011ffb530\nx29: ffffffc011ffb590 x28: 0000000000000000\nx27: 0000000000000000 x26: 0000000000000004\nx25: 0000000000000003 x24: ffffffc011ffb890\nx23: ffffffa762ef9be0 x22: ffffffa77244ef00\nx21: 0000000000000009 x20: 00000007fff7c000\nx19: 0000000000000003 x18: 0000000000000000\nx17: 0000000000000004 x16: ffffffd7a357d9f0\nx15: 0000000000000000 x14: 00fd5d4fa7ffffff\nx13: 000000000000000e x12: 0000000000000000\nx11: 00000000ffffffff x10: 00000000fffffe00\nx9 : 000000000000017c x8 : 000000000000000c\nx7 : 0000000000000000 x6 : ffffffa762ef9000\nx5 : 0000000000000003 x4 : 0000000000000004\nx3 : 0000000000001000 x2 : 00000007fff7c000\nx1 : ffffffc011ffb890 x0 : 0000000000000000 Call trace:\n__arm_lpae_unmap+0x500/0x514\n__arm_lpae_unmap+0x4bc/0x514\n__arm_lpae_unmap+0x4bc/0x514\narm_lpae_unmap_pages+0x78/0xa4\narm_smmu_unmap_pages+0x78/0x104\n__iommu_unmap+0xc8/0x1e4\niommu_unmap_fast+0x38/0x48\n__iommu_dma_unmap+0x84/0x104\niommu_dma_free+0x34/0x50\ndma_free_attrs+0xa4/0xd0\nath10k_htt_rx_free+0xc4/0xf4 [ath10k_core] ath10k_core_stop+0x64/0x7c\n[ath10k_core]\nath10k_halt+0x11c/0x180 [ath10k_core]\nath10k_stop+0x54/0x94 [ath10k_core]\ndrv_stop+0x48/0x1c8 [mac80211]\nieee80211_do_open+0x638/0x77c [mac80211] ieee80211_open+0x48/0x5c\n[mac80211]\n__dev_open+0xb4/0x174\n__dev_change_flags+0xc4/0x1dc\ndev_change_flags+0x3c/0x7c\ndevinet_ioctl+0x2b4/0x580\ninet_ioctl+0xb0/0x1b4\nsock_do_ioctl+0x4c/0x16c\ncompat_ifreq_ioctl+0x1cc/0x35c\ncompat_sock_ioctl+0x110/0x2ac\n__arm64_compat_sys_ioctl+0xf4/0x3e0\nel0_svc_common+0xb4/0x17c\nel0_svc_compat_handler+0x2c/0x58\nel0_svc_compat+0x8/0x2c\n\nTested-on: WCN3990 hw1.0 SNOC WLAN.HL.2.0-01387-QCAHLSWMTPLZ-1",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50700",
          "url": "https://www.suse.com/security/cve/CVE-2022-50700"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255576 for CVE-2022-50700",
          "url": "https://bugzilla.suse.com/1255576"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255577 for CVE-2022-50700",
          "url": "https://bugzilla.suse.com/1255577"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-50700"
    },
    {
      "cve": "CVE-2022-50703",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50703"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: qcom: smsm: Fix refcount leak bugs in qcom_smsm_probe()\n\nThere are two refcount leak bugs in qcom_smsm_probe():\n\n(1) The \u0027local_node\u0027 is escaped out from for_each_child_of_node() as\nthe break of iteration, we should call of_node_put() for it in error\npath or when it is not used anymore.\n(2) The \u0027node\u0027 is escaped out from for_each_available_child_of_node()\nas the \u0027goto\u0027, we should call of_node_put() for it in goto target.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50703",
          "url": "https://www.suse.com/security/cve/CVE-2022-50703"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255607 for CVE-2022-50703",
          "url": "https://bugzilla.suse.com/1255607"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50703"
    },
    {
      "cve": "CVE-2022-50709",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50709"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath9k: avoid uninit memory read in ath9k_htc_rx_msg()\n\nsyzbot is reporting uninit value at ath9k_htc_rx_msg() [1], for\nioctl(USB_RAW_IOCTL_EP_WRITE) can call ath9k_hif_usb_rx_stream() with\npkt_len = 0 but ath9k_hif_usb_rx_stream() uses\n__dev_alloc_skb(pkt_len + 32, GFP_ATOMIC) based on an assumption that\npkt_len is valid. As a result, ath9k_hif_usb_rx_stream() allocates skb\nwith uninitialized memory and ath9k_htc_rx_msg() is reading from\nuninitialized memory.\n\nSince bytes accessed by ath9k_htc_rx_msg() is not known until\nath9k_htc_rx_msg() is called, it would be difficult to check minimal valid\npkt_len at \"if (pkt_len \u003e 2 * MAX_RX_BUF_SIZE) {\" line in\nath9k_hif_usb_rx_stream().\n\nWe have two choices. One is to workaround by adding __GFP_ZERO so that\nath9k_htc_rx_msg() sees 0 if pkt_len is invalid. The other is to let\nath9k_htc_rx_msg() validate pkt_len before accessing. This patch chose\nthe latter.\n\nNote that I\u0027m not sure threshold condition is correct, for I can\u0027t find\ndetails on possible packet length used by this protocol.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50709",
          "url": "https://www.suse.com/security/cve/CVE-2022-50709"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255565 for CVE-2022-50709",
          "url": "https://bugzilla.suse.com/1255565"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50709"
    },
    {
      "cve": "CVE-2022-50717",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50717"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-tcp: add bounds check on Transfer Tag\n\nttag is used as an index to get cmd in nvmet_tcp_handle_h2c_data_pdu(),\nadd a bounds check to avoid out-of-bounds access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50717",
          "url": "https://www.suse.com/security/cve/CVE-2022-50717"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255844 for CVE-2022-50717",
          "url": "https://bugzilla.suse.com/1255844"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255845 for CVE-2022-50717",
          "url": "https://bugzilla.suse.com/1255845"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-50717"
    },
    {
      "cve": "CVE-2022-50726",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50726"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Fix possible use-after-free in async command interface\n\nmlx5_cmd_cleanup_async_ctx should return only after all its callback\nhandlers were completed. Before this patch, the below race between\nmlx5_cmd_cleanup_async_ctx and mlx5_cmd_exec_cb_handler was possible and\nlead to a use-after-free:\n\n1. mlx5_cmd_cleanup_async_ctx is called while num_inflight is 2 (i.e.\n   elevated by 1, a single inflight callback).\n2. mlx5_cmd_cleanup_async_ctx decreases num_inflight to 1.\n3. mlx5_cmd_exec_cb_handler is called, decreases num_inflight to 0 and\n   is about to call wake_up().\n4. mlx5_cmd_cleanup_async_ctx calls wait_event, which returns\n   immediately as the condition (num_inflight == 0) holds.\n5. mlx5_cmd_cleanup_async_ctx returns.\n6. The caller of mlx5_cmd_cleanup_async_ctx frees the mlx5_async_ctx\n   object.\n7. mlx5_cmd_exec_cb_handler goes on and calls wake_up() on the freed\n   object.\n\nFix it by syncing using a completion object. Mark it completed when\nnum_inflight reaches 0.\n\nTrace:\n\nBUG: KASAN: use-after-free in do_raw_spin_lock+0x23d/0x270\nRead of size 4 at addr ffff888139cd12f4 by task swapper/5/0\n\nCPU: 5 PID: 0 Comm: swapper/5 Not tainted 6.0.0-rc3_for_upstream_debug_2022_08_30_13_10 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl+0x57/0x7d\n print_report.cold+0x2d5/0x684\n ? do_raw_spin_lock+0x23d/0x270\n kasan_report+0xb1/0x1a0\n ? do_raw_spin_lock+0x23d/0x270\n do_raw_spin_lock+0x23d/0x270\n ? rwlock_bug.part.0+0x90/0x90\n ? __delete_object+0xb8/0x100\n ? lock_downgrade+0x6e0/0x6e0\n _raw_spin_lock_irqsave+0x43/0x60\n ? __wake_up_common_lock+0xb9/0x140\n __wake_up_common_lock+0xb9/0x140\n ? __wake_up_common+0x650/0x650\n ? destroy_tis_callback+0x53/0x70 [mlx5_core]\n ? kasan_set_track+0x21/0x30\n ? destroy_tis_callback+0x53/0x70 [mlx5_core]\n ? kfree+0x1ba/0x520\n ? do_raw_spin_unlock+0x54/0x220\n mlx5_cmd_exec_cb_handler+0x136/0x1a0 [mlx5_core]\n ? mlx5_cmd_cleanup_async_ctx+0x220/0x220 [mlx5_core]\n ? mlx5_cmd_cleanup_async_ctx+0x220/0x220 [mlx5_core]\n mlx5_cmd_comp_handler+0x65a/0x12b0 [mlx5_core]\n ? dump_command+0xcc0/0xcc0 [mlx5_core]\n ? lockdep_hardirqs_on_prepare+0x400/0x400\n ? cmd_comp_notifier+0x7e/0xb0 [mlx5_core]\n cmd_comp_notifier+0x7e/0xb0 [mlx5_core]\n atomic_notifier_call_chain+0xd7/0x1d0\n mlx5_eq_async_int+0x3ce/0xa20 [mlx5_core]\n atomic_notifier_call_chain+0xd7/0x1d0\n ? irq_release+0x140/0x140 [mlx5_core]\n irq_int_handler+0x19/0x30 [mlx5_core]\n __handle_irq_event_percpu+0x1f2/0x620\n handle_irq_event+0xb2/0x1d0\n handle_edge_irq+0x21e/0xb00\n __common_interrupt+0x79/0x1a0\n common_interrupt+0x78/0xa0\n \u003c/IRQ\u003e\n \u003cTASK\u003e\n asm_common_interrupt+0x22/0x40\nRIP: 0010:default_idle+0x42/0x60\nCode: c1 83 e0 07 48 c1 e9 03 83 c0 03 0f b6 14 11 38 d0 7c 04 84 d2 75 14 8b 05 eb 47 22 02 85 c0 7e 07 0f 00 2d e0 9f 48 00 fb f4 \u003cc3\u003e 48 c7 c7 80 08 7f 85 e8 d1 d3 3e fe eb de 66 66 2e 0f 1f 84 00\nRSP: 0018:ffff888100dbfdf0 EFLAGS: 00000242\nRAX: 0000000000000001 RBX: ffffffff84ecbd48 RCX: 1ffffffff0afe110\nRDX: 0000000000000004 RSI: 0000000000000000 RDI: ffffffff835cc9bc\nRBP: 0000000000000005 R08: 0000000000000001 R09: ffff88881dec4ac3\nR10: ffffed1103bd8958 R11: 0000017d0ca571c9 R12: 0000000000000005\nR13: ffffffff84f024e0 R14: 0000000000000000 R15: dffffc0000000000\n ? default_idle_call+0xcc/0x450\n default_idle_call+0xec/0x450\n do_idle+0x394/0x450\n ? arch_cpu_idle_exit+0x40/0x40\n ? do_idle+0x17/0x450\n cpu_startup_entry+0x19/0x20\n start_secondary+0x221/0x2b0\n ? set_cpu_sibling_map+0x2070/0x2070\n secondary_startup_64_no_verify+0xcd/0xdb\n \u003c/TASK\u003e\n\nAllocated by task 49502:\n kasan_save_stack+0x1e/0x40\n __kasan_kmalloc+0x81/0xa0\n kvmalloc_node+0x48/0xe0\n mlx5e_bulk_async_init+0x35/0x110 [mlx5_core]\n mlx5e_tls_priv_tx_list_cleanup+0x84/0x3e0 [mlx5_core]\n mlx5e_ktls_cleanup_tx+0x38f/0x760 [mlx5_core]\n mlx5e_cleanup_nic_tx+0xa7/0x100 [mlx5_core]\n mlx5e_detach_netdev+0x1c\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50726",
          "url": "https://www.suse.com/security/cve/CVE-2022-50726"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256040 for CVE-2022-50726",
          "url": "https://bugzilla.suse.com/1256040"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256255 for CVE-2022-50726",
          "url": "https://bugzilla.suse.com/1256255"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-50726"
    },
    {
      "cve": "CVE-2022-50730",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50730"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: silence the warning when evicting inode with dioread_nolock\n\nWhen evicting an inode with default dioread_nolock, it could be raced by\nthe unwritten extents converting kworker after writeback some new\nallocated dirty blocks. It convert unwritten extents to written, the\nextents could be merged to upper level and free extent blocks, so it\ncould mark the inode dirty again even this inode has been marked\nI_FREEING. But the inode-\u003ei_io_list check and warning in\next4_evict_inode() missing this corner case. Fortunately,\next4_evict_inode() will wait all extents converting finished before this\ncheck, so it will not lead to inode use-after-free problem, every thing\nis OK besides this warning. The WARN_ON_ONCE was originally designed\nfor finding inode use-after-free issues in advance, but if we add\ncurrent dioread_nolock case in, it will become not quite useful, so fix\nthis warning by just remove this check.\n\n ======\n WARNING: CPU: 7 PID: 1092 at fs/ext4/inode.c:227\n ext4_evict_inode+0x875/0xc60\n ...\n RIP: 0010:ext4_evict_inode+0x875/0xc60\n ...\n Call Trace:\n  \u003cTASK\u003e\n  evict+0x11c/0x2b0\n  iput+0x236/0x3a0\n  do_unlinkat+0x1b4/0x490\n  __x64_sys_unlinkat+0x4c/0xb0\n  do_syscall_64+0x3b/0x90\n  entry_SYSCALL_64_after_hwframe+0x46/0xb0\n RIP: 0033:0x7fa933c1115b\n ======\n\nrm                          kworker\n                            ext4_end_io_end()\nvfs_unlink()\n ext4_unlink()\n                             ext4_convert_unwritten_io_end_vec()\n                              ext4_convert_unwritten_extents()\n                               ext4_map_blocks()\n                                ext4_ext_map_blocks()\n                                 ext4_ext_try_to_merge_up()\n                                  __mark_inode_dirty()\n                                   check !I_FREEING\n                                   locked_inode_to_wb_and_lock_list()\n iput()\n  iput_final()\n   evict()\n    ext4_evict_inode()\n     truncate_inode_pages_final() //wait release io_end\n                                    inode_io_list_move_locked()\n                             ext4_release_io_end()\n     trigger WARN_ON_ONCE()",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50730",
          "url": "https://www.suse.com/security/cve/CVE-2022-50730"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256048 for CVE-2022-50730",
          "url": "https://bugzilla.suse.com/1256048"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50730"
    },
    {
      "cve": "CVE-2022-50731",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50731"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: akcipher - default implementation for setting a private key\n\nChanges from v1:\n  * removed the default implementation from set_pub_key: it is assumed that\n    an implementation must always have this callback defined as there are\n    no use case for an algorithm, which doesn\u0027t need a public key\n\nMany akcipher implementations (like ECDSA) support only signature\nverifications, so they don\u0027t have all callbacks defined.\n\nCommit 78a0324f4a53 (\"crypto: akcipher - default implementations for\nrequest callbacks\") introduced default callbacks for sign/verify\noperations, which just return an error code.\n\nHowever, these are not enough, because before calling sign the caller would\nlikely call set_priv_key first on the instantiated transform (as the\nin-kernel testmgr does). This function does not have a default stub, so the\nkernel crashes, when trying to set a private key on an akcipher, which\ndoesn\u0027t support signature generation.\n\nI\u0027ve noticed this, when trying to add a KAT vector for ECDSA signature to\nthe testmgr.\n\nWith this patch the testmgr returns an error in dmesg (as it should)\ninstead of crashing the kernel NULL ptr dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50731",
          "url": "https://www.suse.com/security/cve/CVE-2022-50731"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256049 for CVE-2022-50731",
          "url": "https://bugzilla.suse.com/1256049"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50731"
    },
    {
      "cve": "CVE-2022-50733",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50733"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: idmouse: fix an uninit-value in idmouse_open\n\nIn idmouse_create_image, if any ftip_command fails, it will\ngo to the reset label. However, this leads to the data in\nbulk_in_buffer[HEADER..IMGSIZE] uninitialized. And the check\nfor valid image incurs an uninitialized dereference.\n\nFix this by moving the check before reset label since this\ncheck only be valid if the data after bulk_in_buffer[HEADER]\nhas concrete data.\n\nNote that this is found by KMSAN, so only kernel compilation\nis tested.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50733",
          "url": "https://www.suse.com/security/cve/CVE-2022-50733"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256064 for CVE-2022-50733",
          "url": "https://bugzilla.suse.com/1256064"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50733"
    },
    {
      "cve": "CVE-2022-50736",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50736"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/siw: Fix immediate work request flush to completion queue\n\nCorrectly set send queue element opcode during immediate work request\nflushing in post sendqueue operation, if the QP is in ERROR state.\nAn undefined ocode value results in out-of-bounds access to an array\nfor mapping the opcode between siw internal and RDMA core representation\nin work completion generation. It resulted in a KASAN BUG report\nof type \u0027global-out-of-bounds\u0027 during NFSoRDMA testing.\n\nThis patch further fixes a potential case of a malicious user which may\nwrite undefined values for completion queue elements status or opcode,\nif the CQ is memory mapped to user land. It avoids the same out-of-bounds\naccess to arrays for status and opcode mapping as described above.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50736",
          "url": "https://www.suse.com/security/cve/CVE-2022-50736"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256137 for CVE-2022-50736",
          "url": "https://bugzilla.suse.com/1256137"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256138 for CVE-2022-50736",
          "url": "https://bugzilla.suse.com/1256138"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-50736"
    },
    {
      "cve": "CVE-2022-50742",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50742"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: ocxl: fix possible refcount leak in afu_ioctl()\n\neventfd_ctx_put need to be called to put the refcount that gotten by\neventfd_ctx_fdget when ocxl_irq_set_handler fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50742",
          "url": "https://www.suse.com/security/cve/CVE-2022-50742"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256143 for CVE-2022-50742",
          "url": "https://bugzilla.suse.com/1256143"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50742"
    },
    {
      "cve": "CVE-2022-50744",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50744"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix hard lockup when reading the rx_monitor from debugfs\n\nDuring I/O and simultaneous cat of /sys/kernel/debug/lpfc/fnX/rx_monitor, a\nhard lockup similar to the call trace below may occur.\n\nThe spin_lock_bh in lpfc_rx_monitor_report is not protecting from timer\ninterrupts as expected, so change the strength of the spin lock to _irq.\n\nKernel panic - not syncing: Hard LOCKUP\nCPU: 3 PID: 110402 Comm: cat Kdump: loaded\n\nexception RIP: native_queued_spin_lock_slowpath+91\n\n[IRQ stack]\n native_queued_spin_lock_slowpath at ffffffffb814e30b\n _raw_spin_lock at ffffffffb89a667a\n lpfc_rx_monitor_record at ffffffffc0a73a36 [lpfc]\n lpfc_cmf_timer at ffffffffc0abbc67 [lpfc]\n __hrtimer_run_queues at ffffffffb8184250\n hrtimer_interrupt at ffffffffb8184ab0\n smp_apic_timer_interrupt at ffffffffb8a026ba\n apic_timer_interrupt at ffffffffb8a01c4f\n[End of IRQ stack]\n\n apic_timer_interrupt at ffffffffb8a01c4f\n lpfc_rx_monitor_report at ffffffffc0a73c80 [lpfc]\n lpfc_rx_monitor_read at ffffffffc0addde1 [lpfc]\n full_proxy_read at ffffffffb83e7fc3\n vfs_read at ffffffffb833fe71\n ksys_read at ffffffffb83402af\n do_syscall_64 at ffffffffb800430b\n entry_SYSCALL_64_after_hwframe at ffffffffb8a000ad",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50744",
          "url": "https://www.suse.com/security/cve/CVE-2022-50744"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256165 for CVE-2022-50744",
          "url": "https://bugzilla.suse.com/1256165"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50744"
    },
    {
      "cve": "CVE-2022-50756",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50756"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-pci: fix mempool alloc size\n\nConvert the max size to bytes to match the units of the divisor that\ncalculates the worst-case number of PRP entries.\n\nThe result is used to determine how many PRP Lists are required. The\ncode was previously rounding this to 1 list, but we can require 2 in the\nworst case. In that scenario, the driver would corrupt memory beyond the\nsize provided by the mempool.\n\nWhile unlikely to occur (you\u0027d need a 4MB in exactly 127 phys segments\non a queue that doesn\u0027t support SGLs), this memory corruption has been\nobserved by kfence.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50756",
          "url": "https://www.suse.com/security/cve/CVE-2022-50756"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256216 for CVE-2022-50756",
          "url": "https://bugzilla.suse.com/1256216"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256217 for CVE-2022-50756",
          "url": "https://bugzilla.suse.com/1256217"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-50756"
    },
    {
      "cve": "CVE-2022-50758",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50758"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: vt6655: fix potential memory leak\n\nIn function device_init_td0_ring, memory is allocated for member\ntd_info of priv-\u003eapTD0Rings[i], with i increasing from 0. In case of\nallocation failure, the memory is freed in reversed order, with i\ndecreasing to 0. However, the case i=0 is left out and thus memory is\nleaked.\n\nModify the memory freeing loop to include the case i=0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50758",
          "url": "https://www.suse.com/security/cve/CVE-2022-50758"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256207 for CVE-2022-50758",
          "url": "https://bugzilla.suse.com/1256207"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50758"
    },
    {
      "cve": "CVE-2022-50767",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50767"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: smscufx: Fix several use-after-free bugs\n\nSeveral types of UAFs can occur when physically removing a USB device.\n\nAdds ufx_ops_destroy() function to .fb_destroy of fb_ops, and\nin this function, there is kref_put() that finally calls ufx_free().\n\nThis fix prevents multiple UAFs.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50767",
          "url": "https://www.suse.com/security/cve/CVE-2022-50767"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256426 for CVE-2022-50767",
          "url": "https://bugzilla.suse.com/1256426"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50767"
    },
    {
      "cve": "CVE-2022-50814",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50814"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: hisilicon/zip - fix mismatch in get/set sgl_sge_nr\n\nKASAN reported this Bug:\n\n\t[17619.659757] BUG: KASAN: global-out-of-bounds in param_get_int+0x34/0x60\n\t[17619.673193] Read of size 4 at addr fffff01332d7ed00 by task read_all/1507958\n\t...\n\t[17619.698934] The buggy address belongs to the variable:\n\t[17619.708371]  sgl_sge_nr+0x0/0xffffffffffffa300 [hisi_zip]\n\nThere is a mismatch in hisi_zip when get/set the variable sgl_sge_nr.\nThe type of sgl_sge_nr is u16, and get/set sgl_sge_nr by\nparam_get/set_int.\n\nReplacing param_get/set_int to param_get/set_ushort can fix this bug.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50814",
          "url": "https://www.suse.com/security/cve/CVE-2022-50814"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256248 for CVE-2022-50814",
          "url": "https://bugzilla.suse.com/1256248"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50814"
    },
    {
      "cve": "CVE-2022-50821",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50821"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Don\u0027t leak netobj memory when gss_read_proxy_verf() fails",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50821",
          "url": "https://www.suse.com/security/cve/CVE-2022-50821"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256242 for CVE-2022-50821",
          "url": "https://bugzilla.suse.com/1256242"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50821"
    },
    {
      "cve": "CVE-2022-50823",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50823"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: tegra: Fix refcount leak in tegra114_clock_init\n\nof_find_matching_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when not need anymore.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50823",
          "url": "https://www.suse.com/security/cve/CVE-2022-50823"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256333 for CVE-2022-50823",
          "url": "https://bugzilla.suse.com/1256333"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50823"
    },
    {
      "cve": "CVE-2022-50827",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50827"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix memory leak in lpfc_create_port()\n\nCommit 5e633302ace1 (\"scsi: lpfc: vmid: Add support for VMID in mailbox\ncommand\") introduced allocations for the VMID resources in\nlpfc_create_port() after the call to scsi_host_alloc(). Upon failure on the\nVMID allocations, the new code would branch to the \u0027out\u0027 label, which\nreturns NULL without unwinding anything, thus skipping the call to\nscsi_host_put().\n\nFix the problem by creating a separate label \u0027out_free_vmid\u0027 to unwind the\nVMID resources and make the \u0027out_put_shost\u0027 label call only\nscsi_host_put(), as was done before the introduction of allocations for\nVMID.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50827",
          "url": "https://www.suse.com/security/cve/CVE-2022-50827"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256344 for CVE-2022-50827",
          "url": "https://bugzilla.suse.com/1256344"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50827"
    },
    {
      "cve": "CVE-2022-50828",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50828"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: zynqmp: Fix stack-out-of-bounds in strncpy`\n\n\"BUG: KASAN: stack-out-of-bounds in strncpy+0x30/0x68\"\n\nLinux-ATF interface is using 16 bytes of SMC payload. In case clock name is\nlonger than 15 bytes, string terminated NULL character will not be received\nby Linux. Add explicit NULL character at last byte to fix issues when clock\nname is longer.\n\nThis fixes below bug reported by KASAN:\n\n ==================================================================\n BUG: KASAN: stack-out-of-bounds in strncpy+0x30/0x68\n Read of size 1 at addr ffff0008c89a7410 by task swapper/0/1\n\n CPU: 1 PID: 1 Comm: swapper/0 Not tainted 5.4.0-00396-g81ef9e7-dirty #3\n Hardware name: Xilinx Versal vck190 Eval board revA (QSPI) (DT)\n Call trace:\n  dump_backtrace+0x0/0x1e8\n  show_stack+0x14/0x20\n  dump_stack+0xd4/0x108\n  print_address_description.isra.0+0xbc/0x37c\n  __kasan_report+0x144/0x198\n  kasan_report+0xc/0x18\n  __asan_load1+0x5c/0x68\n  strncpy+0x30/0x68\n  zynqmp_clock_probe+0x238/0x7b8\n  platform_drv_probe+0x6c/0xc8\n  really_probe+0x14c/0x418\n  driver_probe_device+0x74/0x130\n  __device_attach_driver+0xc4/0xe8\n  bus_for_each_drv+0xec/0x150\n  __device_attach+0x160/0x1d8\n  device_initial_probe+0x10/0x18\n  bus_probe_device+0xe0/0xf0\n  device_add+0x528/0x950\n  of_device_add+0x5c/0x80\n  of_platform_device_create_pdata+0x120/0x168\n  of_platform_bus_create+0x244/0x4e0\n  of_platform_populate+0x50/0xe8\n  zynqmp_firmware_probe+0x370/0x3a8\n  platform_drv_probe+0x6c/0xc8\n  really_probe+0x14c/0x418\n  driver_probe_device+0x74/0x130\n  device_driver_attach+0x94/0xa0\n  __driver_attach+0x70/0x108\n  bus_for_each_dev+0xe4/0x158\n  driver_attach+0x30/0x40\n  bus_add_driver+0x21c/0x2b8\n  driver_register+0xbc/0x1d0\n  __platform_driver_register+0x7c/0x88\n  zynqmp_firmware_driver_init+0x1c/0x24\n  do_one_initcall+0xa4/0x234\n  kernel_init_freeable+0x1b0/0x24c\n  kernel_init+0x10/0x110\n  ret_from_fork+0x10/0x18\n\n The buggy address belongs to the page:\n page:ffff0008f9be1c88 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0\n raw: 0008d00000000000 ffff0008f9be1c90 ffff0008f9be1c90 0000000000000000\n raw: 0000000000000000 0000000000000000 00000000ffffffff\n page dumped because: kasan: bad access detected\n\n addr ffff0008c89a7410 is located in stack of task swapper/0/1 at offset 112 in frame:\n  zynqmp_clock_probe+0x0/0x7b8\n\n this frame has 3 objects:\n  [32, 44) \u0027response\u0027\n  [64, 80) \u0027ret_payload\u0027\n  [96, 112) \u0027name\u0027\n\n Memory state around the buggy address:\n  ffff0008c89a7300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n  ffff0008c89a7380: 00 00 00 00 f1 f1 f1 f1 00 04 f2 f2 00 00 f2 f2\n \u003effff0008c89a7400: 00 00 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00\n                          ^\n  ffff0008c89a7480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n  ffff0008c89a7500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ==================================================================",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50828",
          "url": "https://www.suse.com/security/cve/CVE-2022-50828"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256230 for CVE-2022-50828",
          "url": "https://bugzilla.suse.com/1256230"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50828"
    },
    {
      "cve": "CVE-2022-50840",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50840"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: snic: Fix possible UAF in snic_tgt_create()\n\nSmatch reports a warning as follows:\n\ndrivers/scsi/snic/snic_disc.c:307 snic_tgt_create() warn:\n  \u0027\u0026tgt-\u003elist\u0027 not removed from list\n\nIf device_add() fails in snic_tgt_create(), tgt will be freed, but\ntgt-\u003elist will not be removed from snic-\u003edisc.tgt_list, then list traversal\nmay cause UAF.\n\nRemove from snic-\u003edisc.tgt_list before free().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50840",
          "url": "https://www.suse.com/security/cve/CVE-2022-50840"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256208 for CVE-2022-50840",
          "url": "https://bugzilla.suse.com/1256208"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50840"
    },
    {
      "cve": "CVE-2022-50843",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50843"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm clone: Fix UAF in clone_dtr()\n\nDm_clone also has the same UAF problem when dm_resume()\nand dm_destroy() are concurrent.\n\nTherefore, cancelling timer again in clone_dtr().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50843",
          "url": "https://www.suse.com/security/cve/CVE-2022-50843"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256203 for CVE-2022-50843",
          "url": "https://bugzilla.suse.com/1256203"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50843"
    },
    {
      "cve": "CVE-2022-50850",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50850"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ipr: Fix WARNING in ipr_init()\n\nipr_init() will not call unregister_reboot_notifier() when\npci_register_driver() fails, which causes a WARNING. Call\nunregister_reboot_notifier() when pci_register_driver() fails.\n\nnotifier callback ipr_halt [ipr] already registered\nWARNING: CPU: 3 PID: 299 at kernel/notifier.c:29\nnotifier_chain_register+0x16d/0x230\nModules linked in: ipr(+) xhci_pci_renesas xhci_hcd ehci_hcd usbcore\nled_class gpu_sched drm_buddy video wmi drm_ttm_helper ttm\ndrm_display_helper drm_kms_helper drm drm_panel_orientation_quirks\nagpgart cfbft\nCPU: 3 PID: 299 Comm: modprobe Tainted: G        W\n6.1.0-rc1-00190-g39508d23b672-dirty #332\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\nrel-1.15.0-0-g2dd4b9b3f840-prebuilt.qemu.org 04/01/2014\nRIP: 0010:notifier_chain_register+0x16d/0x230\nCall Trace:\n \u003cTASK\u003e\n __blocking_notifier_chain_register+0x73/0xb0\n ipr_init+0x30/0x1000 [ipr]\n do_one_initcall+0xdb/0x480\n do_init_module+0x1cf/0x680\n load_module+0x6a50/0x70a0\n __do_sys_finit_module+0x12f/0x1c0\n do_syscall_64+0x3f/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50850",
          "url": "https://www.suse.com/security/cve/CVE-2022-50850"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256194 for CVE-2022-50850",
          "url": "https://bugzilla.suse.com/1256194"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50850"
    },
    {
      "cve": "CVE-2022-50870",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50870"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/rtas: avoid device tree lookups in rtas_os_term()\n\nrtas_os_term() is called during panic. Its behavior depends on a couple\nof conditions in the /rtas node of the device tree, the traversal of\nwhich entails locking and local IRQ state changes. If the kernel panics\nwhile devtree_lock is held, rtas_os_term() as currently written could\nhang.\n\nInstead of discovering the relevant characteristics at panic time,\ncache them in file-static variables at boot. Note the lookup for\n\"ibm,extended-os-term\" is converted to of_property_read_bool() since it\nis a boolean property, not an RTAS function token.\n\n[mpe: Incorporate suggested change from Nick]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50870",
          "url": "https://www.suse.com/security/cve/CVE-2022-50870"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256154 for CVE-2022-50870",
          "url": "https://bugzilla.suse.com/1256154"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50870"
    },
    {
      "cve": "CVE-2022-50876",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50876"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: musb: Fix musb_gadget.c rxstate overflow bug\n\nThe usb function device call musb_gadget_queue() adds the passed\nrequest to musb_ep::req_list,If the (request-\u003elength \u003e musb_ep-\u003epacket_sz)\nand (is_buffer_mapped(req) return false),the rxstate() will copy all data\nin fifo to request-\u003ebuf which may cause request-\u003ebuf out of bounds.\n\nFix it by add the length check :\nfifocnt = min_t(unsigned, request-\u003elength - request-\u003eactual, fifocnt);",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50876",
          "url": "https://www.suse.com/security/cve/CVE-2022-50876"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256136 for CVE-2022-50876",
          "url": "https://bugzilla.suse.com/1256136"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50876"
    },
    {
      "cve": "CVE-2022-50880",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50880"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath10k: add peer map clean up for peer delete in ath10k_sta_state()\n\nWhen peer delete failed in a disconnect operation, use-after-free\ndetected by KFENCE in below log. It is because for each vdev_id and\naddress, it has only one struct ath10k_peer, it is allocated in\nath10k_peer_map_event(). When connected to an AP, it has more than\none HTT_T2H_MSG_TYPE_PEER_MAP reported from firmware, then the\narray peer_map of struct ath10k will be set muti-elements to the\nsame ath10k_peer in ath10k_peer_map_event(). When peer delete failed\nin ath10k_sta_state(), the ath10k_peer will be free for the 1st peer\nid in array peer_map of struct ath10k, and then use-after-free happened\nfor the 2nd peer id because they map to the same ath10k_peer.\n\nAnd clean up all peers in array peer_map for the ath10k_peer, then\nuser-after-free disappeared\n\npeer map event log:\n[  306.911021] wlan0: authenticate with b0:2a:43:e6:75:0e\n[  306.957187] ath10k_pci 0000:01:00.0: mac vdev 0 peer create b0:2a:43:e6:75:0e (new sta) sta 1 / 32 peer 1 / 33\n[  306.957395] ath10k_pci 0000:01:00.0: htt peer map vdev 0 peer b0:2a:43:e6:75:0e id 246\n[  306.957404] ath10k_pci 0000:01:00.0: htt peer map vdev 0 peer b0:2a:43:e6:75:0e id 198\n[  306.986924] ath10k_pci 0000:01:00.0: htt peer map vdev 0 peer b0:2a:43:e6:75:0e id 166\n\npeer unmap event log:\n[  435.715691] wlan0: deauthenticating from b0:2a:43:e6:75:0e by local choice (Reason: 3=DEAUTH_LEAVING)\n[  435.716802] ath10k_pci 0000:01:00.0: mac vdev 0 peer delete b0:2a:43:e6:75:0e sta ffff990e0e9c2b50 (sta gone)\n[  435.717177] ath10k_pci 0000:01:00.0: htt peer unmap vdev 0 peer b0:2a:43:e6:75:0e id 246\n[  435.717186] ath10k_pci 0000:01:00.0: htt peer unmap vdev 0 peer b0:2a:43:e6:75:0e id 198\n[  435.717193] ath10k_pci 0000:01:00.0: htt peer unmap vdev 0 peer b0:2a:43:e6:75:0e id 166\n\nuse-after-free log:\n[21705.888627] wlan0: deauthenticating from d0:76:8f:82:be:75 by local choice (Reason: 3=DEAUTH_LEAVING)\n[21713.799910] ath10k_pci 0000:01:00.0: failed to delete peer d0:76:8f:82:be:75 for vdev 0: -110\n[21713.799925] ath10k_pci 0000:01:00.0: found sta peer d0:76:8f:82:be:75 (ptr 0000000000000000 id 102) entry on vdev 0 after it was supposedly removed\n[21713.799968] ==================================================================\n[21713.799991] BUG: KFENCE: use-after-free read in ath10k_sta_state+0x265/0xb8a [ath10k_core]\n[21713.799991]\n[21713.799997] Use-after-free read at 0x00000000abe1c75e (in kfence-#69):\n[21713.800010]  ath10k_sta_state+0x265/0xb8a [ath10k_core]\n[21713.800041]  drv_sta_state+0x115/0x677 [mac80211]\n[21713.800059]  __sta_info_destroy_part2+0xb1/0x133 [mac80211]\n[21713.800076]  __sta_info_flush+0x11d/0x162 [mac80211]\n[21713.800093]  ieee80211_set_disassoc+0x12d/0x2f4 [mac80211]\n[21713.800110]  ieee80211_mgd_deauth+0x26c/0x29b [mac80211]\n[21713.800137]  cfg80211_mlme_deauth+0x13f/0x1bb [cfg80211]\n[21713.800153]  nl80211_deauthenticate+0xf8/0x121 [cfg80211]\n[21713.800161]  genl_rcv_msg+0x38e/0x3be\n[21713.800166]  netlink_rcv_skb+0x89/0xf7\n[21713.800171]  genl_rcv+0x28/0x36\n[21713.800176]  netlink_unicast+0x179/0x24b\n[21713.800181]  netlink_sendmsg+0x3a0/0x40e\n[21713.800187]  sock_sendmsg+0x72/0x76\n[21713.800192]  ____sys_sendmsg+0x16d/0x1e3\n[21713.800196]  ___sys_sendmsg+0x95/0xd1\n[21713.800200]  __sys_sendmsg+0x85/0xbf\n[21713.800205]  do_syscall_64+0x43/0x55\n[21713.800210]  entry_SYSCALL_64_after_hwframe+0x44/0xa9\n[21713.800213]\n[21713.800219] kfence-#69: 0x000000009149b0d5-0x000000004c0697fb, size=1064, cache=kmalloc-2k\n[21713.800219]\n[21713.800224] allocated by task 13 on cpu 0 at 21705.501373s:\n[21713.800241]  ath10k_peer_map_event+0x7e/0x154 [ath10k_core]\n[21713.800254]  ath10k_htt_t2h_msg_handler+0x586/0x1039 [ath10k_core]\n[21713.800265]  ath10k_htt_htc_t2h_msg_handler+0x12/0x28 [ath10k_core]\n[21713.800277]  ath10k_htc_rx_completion_handler+0x14c/0x1b5 [ath10k_core]\n[21713.800283]  ath10k_pci_process_rx_cb+0x195/0x1d\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50880",
          "url": "https://www.suse.com/security/cve/CVE-2022-50880"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256132 for CVE-2022-50880",
          "url": "https://bugzilla.suse.com/1256132"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50880"
    },
    {
      "cve": "CVE-2022-50884",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50884"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: Prevent drm_copy_field() to attempt copying a NULL pointer\n\nThere are some struct drm_driver fields that are required by drivers since\ndrm_copy_field() attempts to copy them to user-space via DRM_IOCTL_VERSION.\n\nBut it can be possible that a driver has a bug and did not set some of the\nfields, which leads to drm_copy_field() attempting to copy a NULL pointer:\n\n[ +10.395966] Unable to handle kernel access to user memory outside uaccess routines at virtual address 0000000000000000\n[  +0.010955] Mem abort info:\n[  +0.002835]   ESR = 0x0000000096000004\n[  +0.003872]   EC = 0x25: DABT (current EL), IL = 32 bits\n[  +0.005395]   SET = 0, FnV = 0\n[  +0.003113]   EA = 0, S1PTW = 0\n[  +0.003182]   FSC = 0x04: level 0 translation fault\n[  +0.004964] Data abort info:\n[  +0.002919]   ISV = 0, ISS = 0x00000004\n[  +0.003886]   CM = 0, WnR = 0\n[  +0.003040] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000115dad000\n[  +0.006536] [0000000000000000] pgd=0000000000000000, p4d=0000000000000000\n[  +0.006925] Internal error: Oops: 96000004 [#1] SMP\n...\n[  +0.011113] pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[  +0.007061] pc : __pi_strlen+0x14/0x150\n[  +0.003895] lr : drm_copy_field+0x30/0x1a4\n[  +0.004156] sp : ffff8000094b3a50\n[  +0.003355] x29: ffff8000094b3a50 x28: ffff8000094b3b70 x27: 0000000000000040\n[  +0.007242] x26: ffff443743c2ba00 x25: 0000000000000000 x24: 0000000000000040\n[  +0.007243] x23: ffff443743c2ba00 x22: ffff8000094b3b70 x21: 0000000000000000\n[  +0.007241] x20: 0000000000000000 x19: ffff8000094b3b90 x18: 0000000000000000\n[  +0.007241] x17: 0000000000000000 x16: 0000000000000000 x15: 0000aaab14b9af40\n[  +0.007241] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\n[  +0.007239] x11: 0000000000000000 x10: 0000000000000000 x9 : ffffa524ad67d4d8\n[  +0.007242] x8 : 0101010101010101 x7 : 7f7f7f7f7f7f7f7f x6 : 6c6e6263606e7141\n[  +0.007239] x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\n[  +0.007241] x2 : 0000000000000000 x1 : ffff8000094b3b90 x0 : 0000000000000000\n[  +0.007240] Call trace:\n[  +0.002475]  __pi_strlen+0x14/0x150\n[  +0.003537]  drm_version+0x84/0xac\n[  +0.003448]  drm_ioctl_kernel+0xa8/0x16c\n[  +0.003975]  drm_ioctl+0x270/0x580\n[  +0.003448]  __arm64_sys_ioctl+0xb8/0xfc\n[  +0.003978]  invoke_syscall+0x78/0x100\n[  +0.003799]  el0_svc_common.constprop.0+0x4c/0xf4\n[  +0.004767]  do_el0_svc+0x38/0x4c\n[  +0.003357]  el0_svc+0x34/0x100\n[  +0.003185]  el0t_64_sync_handler+0x11c/0x150\n[  +0.004418]  el0t_64_sync+0x190/0x194\n[  +0.003716] Code: 92402c04 b200c3e8 f13fc09f 5400088c (a9400c02)\n[  +0.006180] ---[ end trace 0000000000000000 ]---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50884",
          "url": "https://www.suse.com/security/cve/CVE-2022-50884"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256127 for CVE-2022-50884",
          "url": "https://bugzilla.suse.com/1256127"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50884"
    },
    {
      "cve": "CVE-2022-50889",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-50889"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm integrity: Fix UAF in dm_integrity_dtr()\n\nDm_integrity also has the same UAF problem when dm_resume()\nand dm_destroy() are concurrent.\n\nTherefore, cancelling timer again in dm_integrity_dtr().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-50889",
          "url": "https://www.suse.com/security/cve/CVE-2022-50889"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256056 for CVE-2022-50889",
          "url": "https://bugzilla.suse.com/1256056"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-50889"
    },
    {
      "cve": "CVE-2023-23559",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-23559"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In rndis_query_oid in drivers/net/wireless/rndis_wlan.c in the Linux kernel through 6.1.5, there is an integer overflow in an addition.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-23559",
          "url": "https://www.suse.com/security/cve/CVE-2023-23559"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1207051 for CVE-2023-23559",
          "url": "https://bugzilla.suse.com/1207051"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-23559"
    },
    {
      "cve": "CVE-2023-4132",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-4132"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability was found in the siano smsusb module in the Linux kernel. The bug occurs during device initialization when the siano device is plugged in. This flaw allows a local user to crash the system, causing a denial of service condition.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-4132",
          "url": "https://www.suse.com/security/cve/CVE-2023-4132"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213969 for CVE-2023-4132",
          "url": "https://bugzilla.suse.com/1213969"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-4132"
    },
    {
      "cve": "CVE-2023-53215",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53215"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/fair: Don\u0027t balance task to its current running CPU\n\nWe\u0027ve run into the case that the balancer tries to balance a migration\ndisabled task and trigger the warning in set_task_cpu() like below:\n\n ------------[ cut here ]------------\n WARNING: CPU: 7 PID: 0 at kernel/sched/core.c:3115 set_task_cpu+0x188/0x240\n Modules linked in: hclgevf xt_CHECKSUM ipt_REJECT nf_reject_ipv4 \u003c...snip\u003e\n CPU: 7 PID: 0 Comm: swapper/7 Kdump: loaded Tainted: G           O       6.1.0-rc4+ #1\n Hardware name: Huawei TaiShan 2280 V2/BC82AMDC, BIOS 2280-V2 CS V5.B221.01 12/09/2021\n pstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : set_task_cpu+0x188/0x240\n lr : load_balance+0x5d0/0xc60\n sp : ffff80000803bc70\n x29: ffff80000803bc70 x28: ffff004089e190e8 x27: ffff004089e19040\n x26: ffff007effcabc38 x25: 0000000000000000 x24: 0000000000000001\n x23: ffff80000803be84 x22: 000000000000000c x21: ffffb093e79e2a78\n x20: 000000000000000c x19: ffff004089e19040 x18: 0000000000000000\n x17: 0000000000001fad x16: 0000000000000030 x15: 0000000000000000\n x14: 0000000000000003 x13: 0000000000000000 x12: 0000000000000000\n x11: 0000000000000001 x10: 0000000000000400 x9 : ffffb093e4cee530\n x8 : 00000000fffffffe x7 : 0000000000ce168a x6 : 000000000000013e\n x5 : 00000000ffffffe1 x4 : 0000000000000001 x3 : 0000000000000b2a\n x2 : 0000000000000b2a x1 : ffffb093e6d6c510 x0 : 0000000000000001\n Call trace:\n  set_task_cpu+0x188/0x240\n  load_balance+0x5d0/0xc60\n  rebalance_domains+0x26c/0x380\n  _nohz_idle_balance.isra.0+0x1e0/0x370\n  run_rebalance_domains+0x6c/0x80\n  __do_softirq+0x128/0x3d8\n  ____do_softirq+0x18/0x24\n  call_on_irq_stack+0x2c/0x38\n  do_softirq_own_stack+0x24/0x3c\n  __irq_exit_rcu+0xcc/0xf4\n  irq_exit_rcu+0x18/0x24\n  el1_interrupt+0x4c/0xe4\n  el1h_64_irq_handler+0x18/0x2c\n  el1h_64_irq+0x74/0x78\n  arch_cpu_idle+0x18/0x4c\n  default_idle_call+0x58/0x194\n  do_idle+0x244/0x2b0\n  cpu_startup_entry+0x30/0x3c\n  secondary_start_kernel+0x14c/0x190\n  __secondary_switched+0xb0/0xb4\n ---[ end trace 0000000000000000 ]---\n\nFurther investigation shows that the warning is superfluous, the migration\ndisabled task is just going to be migrated to its current running CPU.\nThis is because that on load balance if the dst_cpu is not allowed by the\ntask, we\u0027ll re-select a new_dst_cpu as a candidate. If no task can be\nbalanced to dst_cpu we\u0027ll try to balance the task to the new_dst_cpu\ninstead. In this case when the migration disabled task is not on CPU it\nonly allows to run on its current CPU, load balance will select its\ncurrent CPU as new_dst_cpu and later triggers the warning above.\n\nThe new_dst_cpu is chosen from the env-\u003edst_grpmask. Currently it\ncontains CPUs in sched_group_span() and if we have overlapped groups it\u0027s\npossible to run into this case. This patch makes env-\u003edst_grpmask of\ngroup_balance_mask() which exclude any CPUs from the busiest group and\nsolve the issue. For balancing in a domain with no overlapped groups\nthe behaviour keeps same as before.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53215",
          "url": "https://www.suse.com/security/cve/CVE-2023-53215"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1250397 for CVE-2023-53215",
          "url": "https://bugzilla.suse.com/1250397"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53215"
    },
    {
      "cve": "CVE-2023-53254",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53254"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncacheinfo: Fix shared_cpu_map to handle shared caches at different levels\n\nThe cacheinfo sets up the shared_cpu_map by checking whether the caches\nwith the same index are shared between CPUs. However, this will trigger\nslab-out-of-bounds access if the CPUs do not have the same cache hierarchy.\nAnother problem is the mismatched shared_cpu_map when the shared cache does\nnot have the same index between CPUs.\n\nCPU0\tI\tD\tL3\nindex\t0\t1\t2\tx\n\t^\t^\t^\t^\nindex\t0\t1\t2\t3\nCPU1\tI\tD\tL2\tL3\n\nThis patch checks each cache is shared with all caches on other CPUs.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53254",
          "url": "https://www.suse.com/security/cve/CVE-2023-53254"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1249871 for CVE-2023-53254",
          "url": "https://bugzilla.suse.com/1249871"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1250731 for CVE-2023-53254",
          "url": "https://bugzilla.suse.com/1250731"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-53254"
    },
    {
      "cve": "CVE-2023-53761",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53761"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: usbtmc: Fix direction for 0-length ioctl control messages\n\nThe syzbot fuzzer found a problem in the usbtmc driver: When a user\nsubmits an ioctl for a 0-length control transfer, the driver does not\ncheck that the direction is set to OUT:\n\n------------[ cut here ]------------\nusb 3-1: BOGUS control dir, pipe 80000b80 doesn\u0027t match bRequestType fd\nWARNING: CPU: 0 PID: 5100 at drivers/usb/core/urb.c:411 usb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411\nModules linked in:\nCPU: 0 PID: 5100 Comm: syz-executor428 Not tainted 6.3.0-syzkaller-12049-g58390c8ce1bd #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/14/2023\nRIP: 0010:usb_submit_urb+0x14a7/0x1880 drivers/usb/core/urb.c:411\nCode: 7c 24 40 e8 1b 13 5c fb 48 8b 7c 24 40 e8 21 1d f0 fe 45 89 e8 44 89 f1 4c 89 e2 48 89 c6 48 c7 c7 e0 b5 fc 8a e8 19 c8 23 fb \u003c0f\u003e 0b e9 9f ee ff ff e8 ed 12 5c fb 0f b6 1d 12 8a 3c 08 31 ff 41\nRSP: 0018:ffffc90003d2fb00 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffff8880789e9058 RCX: 0000000000000000\nRDX: ffff888029593b80 RSI: ffffffff814c1447 RDI: 0000000000000001\nRBP: ffff88801ea742f8 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000001 R11: 0000000000000001 R12: ffff88802915e528\nR13: 00000000000000fd R14: 0000000080000b80 R15: ffff8880222b3100\nFS:  0000555556ca63c0(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f9ef4d18150 CR3: 0000000073e5b000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n usb_start_wait_urb+0x101/0x4b0 drivers/usb/core/message.c:58\n usb_internal_control_msg drivers/usb/core/message.c:102 [inline]\n usb_control_msg+0x320/0x4a0 drivers/usb/core/message.c:153\n usbtmc_ioctl_request drivers/usb/class/usbtmc.c:1954 [inline]\n usbtmc_ioctl+0x1b3d/0x2840 drivers/usb/class/usbtmc.c:2097\n\nTo fix this, we must override the direction in the bRequestType field\nof the control request structure when the length is 0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53761",
          "url": "https://www.suse.com/security/cve/CVE-2023-53761"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255002 for CVE-2023-53761",
          "url": "https://bugzilla.suse.com/1255002"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255003 for CVE-2023-53761",
          "url": "https://bugzilla.suse.com/1255003"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-53761"
    },
    {
      "cve": "CVE-2023-53781",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53781"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmc: Fix use-after-free in tcp_write_timer_handler().\n\nWith Eric\u0027s ref tracker, syzbot finally found a repro for\nuse-after-free in tcp_write_timer_handler() by kernel TCP\nsockets. [0]\n\nIf SMC creates a kernel socket in __smc_create(), the kernel\nsocket is supposed to be freed in smc_clcsock_release() by\ncalling sock_release() when we close() the parent SMC socket.\n\nHowever, at the end of smc_clcsock_release(), the kernel\nsocket\u0027s sk_state might not be TCP_CLOSE.  This means that\nwe have not called inet_csk_destroy_sock() in __tcp_close()\nand have not stopped the TCP timers.\n\nThe kernel socket\u0027s TCP timers can be fired later, so we\nneed to hold a refcnt for net as we do for MPTCP subflows\nin mptcp_subflow_create_socket().\n\n[0]:\nleaked reference.\n sk_alloc (./include/net/net_namespace.h:335 net/core/sock.c:2108)\n inet_create (net/ipv4/af_inet.c:319 net/ipv4/af_inet.c:244)\n __sock_create (net/socket.c:1546)\n smc_create (net/smc/af_smc.c:3269 net/smc/af_smc.c:3284)\n __sock_create (net/socket.c:1546)\n __sys_socket (net/socket.c:1634 net/socket.c:1618 net/socket.c:1661)\n __x64_sys_socket (net/socket.c:1672)\n do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80)\n entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:120)\n==================================================================\nBUG: KASAN: slab-use-after-free in tcp_write_timer_handler (net/ipv4/tcp_timer.c:378 net/ipv4/tcp_timer.c:624 net/ipv4/tcp_timer.c:594)\nRead of size 1 at addr ffff888052b65e0d by task syzrepro/18091\n\nCPU: 0 PID: 18091 Comm: syzrepro Tainted: G        W          6.3.0-rc4-01174-gb5d54eb5899a #7\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-1.amzn2022.0.1 04/01/2014\nCall Trace:\n \u003cIRQ\u003e\n dump_stack_lvl (lib/dump_stack.c:107)\n print_report (mm/kasan/report.c:320 mm/kasan/report.c:430)\n kasan_report (mm/kasan/report.c:538)\n tcp_write_timer_handler (net/ipv4/tcp_timer.c:378 net/ipv4/tcp_timer.c:624 net/ipv4/tcp_timer.c:594)\n tcp_write_timer (./include/linux/spinlock.h:390 net/ipv4/tcp_timer.c:643)\n call_timer_fn (./arch/x86/include/asm/jump_label.h:27 ./include/linux/jump_label.h:207 ./include/trace/events/timer.h:127 kernel/time/timer.c:1701)\n __run_timers.part.0 (kernel/time/timer.c:1752 kernel/time/timer.c:2022)\n run_timer_softirq (kernel/time/timer.c:2037)\n __do_softirq (./arch/x86/include/asm/jump_label.h:27 ./include/linux/jump_label.h:207 ./include/trace/events/irq.h:142 kernel/softirq.c:572)\n __irq_exit_rcu (kernel/softirq.c:445 kernel/softirq.c:650)\n irq_exit_rcu (kernel/softirq.c:664)\n sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1107 (discriminator 14))\n \u003c/IRQ\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53781",
          "url": "https://www.suse.com/security/cve/CVE-2023-53781"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254751 for CVE-2023-53781",
          "url": "https://bugzilla.suse.com/1254751"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254755 for CVE-2023-53781",
          "url": "https://bugzilla.suse.com/1254755"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-53781"
    },
    {
      "cve": "CVE-2023-54019",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-54019"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/psi: use kernfs polling functions for PSI trigger polling\n\nDestroying psi trigger in cgroup_file_release causes UAF issues when\na cgroup is removed from under a polling process. This is happening\nbecause cgroup removal causes a call to cgroup_file_release while the\nactual file is still alive. Destroying the trigger at this point would\nalso destroy its waitqueue head and if there is still a polling process\non that file accessing the waitqueue, it will step on the freed pointer:\n\ndo_select\n  vfs_poll\n                           do_rmdir\n                             cgroup_rmdir\n                               kernfs_drain_open_files\n                                 cgroup_file_release\n                                   cgroup_pressure_release\n                                     psi_trigger_destroy\n                                       wake_up_pollfree(\u0026t-\u003eevent_wait)\n// vfs_poll is unblocked\n                                       synchronize_rcu\n                                       kfree(t)\n  poll_freewait -\u003e UAF access to the trigger\u0027s waitqueue head\n\nPatch [1] fixed this issue for epoll() case using wake_up_pollfree(),\nhowever the same issue exists for synchronous poll() case.\nThe root cause of this issue is that the lifecycles of the psi trigger\u0027s\nwaitqueue and of the file associated with the trigger are different. Fix\nthis by using kernfs_generic_poll function when polling on cgroup-specific\npsi triggers. It internally uses kernfs_open_node-\u003epoll waitqueue head\nwith its lifecycle tied to the file\u0027s lifecycle. This also renders the\nfix in [1] obsolete, so revert it.\n\n[1] commit c2dbe32d5db5 (\"sched/psi: Fix use-after-free in ep_remove_wait_queue()\")",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-54019",
          "url": "https://www.suse.com/security/cve/CVE-2023-54019"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255636 for CVE-2023-54019",
          "url": "https://bugzilla.suse.com/1255636"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-54019"
    },
    {
      "cve": "CVE-2023-54024",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-54024"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Destroy target device if coalesced MMIO unregistration fails\n\nDestroy and free the target coalesced MMIO device if unregistering said\ndevice fails.  As clearly noted in the code, kvm_io_bus_unregister_dev()\ndoes not destroy the target device.\n\n  BUG: memory leak\n  unreferenced object 0xffff888112a54880 (size 64):\n    comm \"syz-executor.2\", pid 5258, jiffies 4297861402 (age 14.129s)\n    hex dump (first 32 bytes):\n      38 c7 67 15 00 c9 ff ff 38 c7 67 15 00 c9 ff ff  8.g.....8.g.....\n      e0 c7 e1 83 ff ff ff ff 00 30 67 15 00 c9 ff ff  .........0g.....\n    backtrace:\n      [\u003c0000000006995a8a\u003e] kmalloc include/linux/slab.h:556 [inline]\n      [\u003c0000000006995a8a\u003e] kzalloc include/linux/slab.h:690 [inline]\n      [\u003c0000000006995a8a\u003e] kvm_vm_ioctl_register_coalesced_mmio+0x8e/0x3d0 arch/x86/kvm/../../../virt/kvm/coalesced_mmio.c:150\n      [\u003c00000000022550c2\u003e] kvm_vm_ioctl+0x47d/0x1600 arch/x86/kvm/../../../virt/kvm/kvm_main.c:3323\n      [\u003c000000008a75102f\u003e] vfs_ioctl fs/ioctl.c:46 [inline]\n      [\u003c000000008a75102f\u003e] file_ioctl fs/ioctl.c:509 [inline]\n      [\u003c000000008a75102f\u003e] do_vfs_ioctl+0xbab/0x1160 fs/ioctl.c:696\n      [\u003c0000000080e3f669\u003e] ksys_ioctl+0x76/0xa0 fs/ioctl.c:713\n      [\u003c0000000059ef4888\u003e] __do_sys_ioctl fs/ioctl.c:720 [inline]\n      [\u003c0000000059ef4888\u003e] __se_sys_ioctl fs/ioctl.c:718 [inline]\n      [\u003c0000000059ef4888\u003e] __x64_sys_ioctl+0x6f/0xb0 fs/ioctl.c:718\n      [\u003c000000006444fa05\u003e] do_syscall_64+0x9f/0x4e0 arch/x86/entry/common.c:290\n      [\u003c000000009a4ed50b\u003e] entry_SYSCALL_64_after_hwframe+0x49/0xbe\n\n  BUG: leak checking failed",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-54024",
          "url": "https://www.suse.com/security/cve/CVE-2023-54024"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255609 for CVE-2023-54024",
          "url": "https://bugzilla.suse.com/1255609"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-54024"
    },
    {
      "cve": "CVE-2023-54110",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-54110"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: rndis_host: Secure rndis_query check against int overflow\n\nVariables off and len typed as uint32 in rndis_query function\nare controlled by incoming RNDIS response message thus their\nvalue may be manipulated. Setting off to a unexpectetly large\nvalue will cause the sum with len and 8 to overflow and pass\nthe implemented validation step. Consequently the response\npointer will be referring to a location past the expected\nbuffer boundaries allowing information leakage e.g. via\nRNDIS_OID_802_3_PERMANENT_ADDRESS OID.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-54110",
          "url": "https://www.suse.com/security/cve/CVE-2023-54110"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256353 for CVE-2023-54110",
          "url": "https://bugzilla.suse.com/1256353"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-54110"
    },
    {
      "cve": "CVE-2023-54142",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-54142"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngtp: Fix use-after-free in __gtp_encap_destroy().\n\nsyzkaller reported use-after-free in __gtp_encap_destroy(). [0]\n\nIt shows the same process freed sk and touched it illegally.\n\nCommit e198987e7dd7 (\"gtp: fix suspicious RCU usage\") added lock_sock()\nand release_sock() in __gtp_encap_destroy() to protect sk-\u003esk_user_data,\nbut release_sock() is called after sock_put() releases the last refcnt.\n\n[0]:\nBUG: KASAN: slab-use-after-free in instrument_atomic_read_write include/linux/instrumented.h:96 [inline]\nBUG: KASAN: slab-use-after-free in atomic_try_cmpxchg_acquire include/linux/atomic/atomic-instrumented.h:541 [inline]\nBUG: KASAN: slab-use-after-free in queued_spin_lock include/asm-generic/qspinlock.h:111 [inline]\nBUG: KASAN: slab-use-after-free in do_raw_spin_lock include/linux/spinlock.h:186 [inline]\nBUG: KASAN: slab-use-after-free in __raw_spin_lock_bh include/linux/spinlock_api_smp.h:127 [inline]\nBUG: KASAN: slab-use-after-free in _raw_spin_lock_bh+0x75/0xe0 kernel/locking/spinlock.c:178\nWrite of size 4 at addr ffff88800dbef398 by task syz-executor.2/2401\n\nCPU: 1 PID: 2401 Comm: syz-executor.2 Not tainted 6.4.0-rc5-01219-gfa0e21fa4443 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x72/0xa0 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:351 [inline]\n print_report+0xcc/0x620 mm/kasan/report.c:462\n kasan_report+0xb2/0xe0 mm/kasan/report.c:572\n check_region_inline mm/kasan/generic.c:181 [inline]\n kasan_check_range+0x39/0x1c0 mm/kasan/generic.c:187\n instrument_atomic_read_write include/linux/instrumented.h:96 [inline]\n atomic_try_cmpxchg_acquire include/linux/atomic/atomic-instrumented.h:541 [inline]\n queued_spin_lock include/asm-generic/qspinlock.h:111 [inline]\n do_raw_spin_lock include/linux/spinlock.h:186 [inline]\n __raw_spin_lock_bh include/linux/spinlock_api_smp.h:127 [inline]\n _raw_spin_lock_bh+0x75/0xe0 kernel/locking/spinlock.c:178\n spin_lock_bh include/linux/spinlock.h:355 [inline]\n release_sock+0x1f/0x1a0 net/core/sock.c:3526\n gtp_encap_disable_sock drivers/net/gtp.c:651 [inline]\n gtp_encap_disable+0xb9/0x220 drivers/net/gtp.c:664\n gtp_dev_uninit+0x19/0x50 drivers/net/gtp.c:728\n unregister_netdevice_many_notify+0x97e/0x1520 net/core/dev.c:10841\n rtnl_delete_link net/core/rtnetlink.c:3216 [inline]\n rtnl_dellink+0x3c0/0xb30 net/core/rtnetlink.c:3268\n rtnetlink_rcv_msg+0x450/0xb10 net/core/rtnetlink.c:6423\n netlink_rcv_skb+0x15d/0x450 net/netlink/af_netlink.c:2548\n netlink_unicast_kernel net/netlink/af_netlink.c:1339 [inline]\n netlink_unicast+0x700/0x930 net/netlink/af_netlink.c:1365\n netlink_sendmsg+0x91c/0xe30 net/netlink/af_netlink.c:1913\n sock_sendmsg_nosec net/socket.c:724 [inline]\n sock_sendmsg+0x1b7/0x200 net/socket.c:747\n ____sys_sendmsg+0x75a/0x990 net/socket.c:2493\n ___sys_sendmsg+0x11d/0x1c0 net/socket.c:2547\n __sys_sendmsg+0xfe/0x1d0 net/socket.c:2576\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3f/0x90 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x72/0xdc\nRIP: 0033:0x7f1168b1fe5d\nCode: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48\nRSP: 002b:00007f1167edccc8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\nRAX: ffffffffffffffda RBX: 00000000004bbf80 RCX: 00007f1168b1fe5d\nRDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000003\nRBP: 00000000004bbf80 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000000b R14: 00007f1168b80530 R15: 0000000000000000\n \u003c/TASK\u003e\n\nAllocated by task 1483:\n kasan_save_stack+0x22/0x50 mm/kasan/common.c:45\n kasan_set_track+0x25/0x30 mm/kasan/common.c:52\n __kasan_slab_alloc+0x\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-54142",
          "url": "https://www.suse.com/security/cve/CVE-2023-54142"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256095 for CVE-2023-54142",
          "url": "https://bugzilla.suse.com/1256095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256097 for CVE-2023-54142",
          "url": "https://bugzilla.suse.com/1256097"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-54142"
    },
    {
      "cve": "CVE-2023-54168",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-54168"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/mlx4: Prevent shift wrapping in set_user_sq_size()\n\nThe ucmd-\u003elog_sq_bb_count variable is controlled by the user so this\nshift can wrap.  Fix it by using check_shl_overflow() in the same way\nthat it was done in commit 515f60004ed9 (\"RDMA/hns: Prevent undefined\nbehavior in hns_roce_set_user_sq_size()\").",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-54168",
          "url": "https://www.suse.com/security/cve/CVE-2023-54168"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256053 for CVE-2023-54168",
          "url": "https://bugzilla.suse.com/1256053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256054 for CVE-2023-54168",
          "url": "https://bugzilla.suse.com/1256054"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-54168"
    },
    {
      "cve": "CVE-2023-54170",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-54170"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nkeys: Fix linking a duplicate key to a keyring\u0027s assoc_array\n\nWhen making a DNS query inside the kernel using dns_query(), the request\ncode can in rare cases end up creating a duplicate index key in the\nassoc_array of the destination keyring. It is eventually found by\na BUG_ON() check in the assoc_array implementation and results in\na crash.\n\nExample report:\n[2158499.700025] kernel BUG at ../lib/assoc_array.c:652!\n[2158499.700039] invalid opcode: 0000 [#1] SMP PTI\n[2158499.700065] CPU: 3 PID: 31985 Comm: kworker/3:1 Kdump: loaded Not tainted 5.3.18-150300.59.90-default #1 SLE15-SP3\n[2158499.700096] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020\n[2158499.700351] Workqueue: cifsiod cifs_resolve_server [cifs]\n[2158499.700380] RIP: 0010:assoc_array_insert+0x85f/0xa40\n[2158499.700401] Code: ff 74 2b 48 8b 3b 49 8b 45 18 4c 89 e6 48 83 e7 fe e8 95 ec 74 00 3b 45 88 7d db 85 c0 79 d4 0f 0b 0f 0b 0f 0b e8 41 f2 be ff \u003c0f\u003e 0b 0f 0b 81 7d 88 ff ff ff 7f 4c 89 eb 4c 8b ad 58 ff ff ff 0f\n[2158499.700448] RSP: 0018:ffffc0bd6187faf0 EFLAGS: 00010282\n[2158499.700470] RAX: ffff9f1ea7da2fe8 RBX: ffff9f1ea7da2fc1 RCX: 0000000000000005\n[2158499.700492] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000000\n[2158499.700515] RBP: ffffc0bd6187fbb0 R08: ffff9f185faf1100 R09: 0000000000000000\n[2158499.700538] R10: ffff9f1ea7da2cc0 R11: 000000005ed8cec8 R12: ffffc0bd6187fc28\n[2158499.700561] R13: ffff9f15feb8d000 R14: ffff9f1ea7da2fc0 R15: ffff9f168dc0d740\n[2158499.700585] FS:  0000000000000000(0000) GS:ffff9f185fac0000(0000) knlGS:0000000000000000\n[2158499.700610] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[2158499.700630] CR2: 00007fdd94fca238 CR3: 0000000809d8c006 CR4: 00000000003706e0\n[2158499.700702] Call Trace:\n[2158499.700741]  ? key_alloc+0x447/0x4b0\n[2158499.700768]  ? __key_link_begin+0x43/0xa0\n[2158499.700790]  __key_link_begin+0x43/0xa0\n[2158499.700814]  request_key_and_link+0x2c7/0x730\n[2158499.700847]  ? dns_resolver_read+0x20/0x20 [dns_resolver]\n[2158499.700873]  ? key_default_cmp+0x20/0x20\n[2158499.700898]  request_key_tag+0x43/0xa0\n[2158499.700926]  dns_query+0x114/0x2ca [dns_resolver]\n[2158499.701127]  dns_resolve_server_name_to_ip+0x194/0x310 [cifs]\n[2158499.701164]  ? scnprintf+0x49/0x90\n[2158499.701190]  ? __switch_to_asm+0x40/0x70\n[2158499.701211]  ? __switch_to_asm+0x34/0x70\n[2158499.701405]  reconn_set_ipaddr_from_hostname+0x81/0x2a0 [cifs]\n[2158499.701603]  cifs_resolve_server+0x4b/0xd0 [cifs]\n[2158499.701632]  process_one_work+0x1f8/0x3e0\n[2158499.701658]  worker_thread+0x2d/0x3f0\n[2158499.701682]  ? process_one_work+0x3e0/0x3e0\n[2158499.701703]  kthread+0x10d/0x130\n[2158499.701723]  ? kthread_park+0xb0/0xb0\n[2158499.701746]  ret_from_fork+0x1f/0x40\n\nThe situation occurs as follows:\n* Some kernel facility invokes dns_query() to resolve a hostname, for\n  example, \"abcdef\". The function registers its global DNS resolver\n  cache as current-\u003ecred.thread_keyring and passes the query to\n  request_key_net() -\u003e request_key_tag() -\u003e request_key_and_link().\n* Function request_key_and_link() creates a keyring_search_context\n  object. Its match_data.cmp method gets set via a call to\n  type-\u003ematch_preparse() (resolves to dns_resolver_match_preparse()) to\n  dns_resolver_cmp().\n* Function request_key_and_link() continues and invokes\n  search_process_keyrings_rcu() which returns that a given key was not\n  found. The control is then passed to request_key_and_link() -\u003e\n  construct_alloc_key().\n* Concurrently to that, a second task similarly makes a DNS query for\n  \"abcdef.\" and its result gets inserted into the DNS resolver cache.\n* Back on the first task, function construct_alloc_key() first runs\n  __key_link_begin() to determine an assoc_array_edit operation to\n  insert a new key. Index keys in the array are compared exactly as-is,\n  using keyring_compare_object(). The operation \n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-54170",
          "url": "https://www.suse.com/security/cve/CVE-2023-54170"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256045 for CVE-2023-54170",
          "url": "https://bugzilla.suse.com/1256045"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-54170"
    },
    {
      "cve": "CVE-2023-54242",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-54242"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock, bfq: Fix division by zero error on zero wsum\n\nWhen the weighted sum is zero the calculation of limit causes\na division by zero error. Fix this by continuing to the next level.\n\nThis was discovered by running as root:\n\nstress-ng --ioprio 0\n\nFixes divison by error oops:\n\n[  521.450556] divide error: 0000 [#1] SMP NOPTI\n[  521.450766] CPU: 2 PID: 2684464 Comm: stress-ng-iopri Not tainted 6.2.1-1280.native #1\n[  521.451117] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.1-0-g3208b098f51a-prebuilt.qemu.org 04/01/2014\n[  521.451627] RIP: 0010:bfqq_request_over_limit+0x207/0x400\n[  521.451875] Code: 01 48 8d 0c c8 74 0b 48 8b 82 98 00 00 00 48 8d 0c c8 8b 85 34 ff ff ff 48 89 ca 41 0f af 41 50 48 d1 ea 48 98 48 01 d0 31 d2 \u003c48\u003e f7 f1 41 39 41 48 89 85 34 ff ff ff 0f 8c 7b 01 00 00 49 8b 44\n[  521.452699] RSP: 0018:ffffb1af84eb3948 EFLAGS: 00010046\n[  521.452938] RAX: 000000000000003c RBX: 0000000000000000 RCX: 0000000000000000\n[  521.453262] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffb1af84eb3978\n[  521.453584] RBP: ffffb1af84eb3a30 R08: 0000000000000001 R09: ffff8f88ab8a4ba0\n[  521.453905] R10: 0000000000000000 R11: 0000000000000001 R12: ffff8f88ab8a4b18\n[  521.454224] R13: ffff8f8699093000 R14: 0000000000000001 R15: ffffb1af84eb3970\n[  521.454549] FS:  00005640b6b0b580(0000) GS:ffff8f88b3880000(0000) knlGS:0000000000000000\n[  521.454912] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  521.455170] CR2: 00007ffcbcae4e38 CR3: 00000002e46de001 CR4: 0000000000770ee0\n[  521.455491] PKRU: 55555554\n[  521.455619] Call Trace:\n[  521.455736]  \u003cTASK\u003e\n[  521.455837]  ? bfq_request_merge+0x3a/0xc0\n[  521.456027]  ? elv_merge+0x115/0x140\n[  521.456191]  bfq_limit_depth+0xc8/0x240\n[  521.456366]  __blk_mq_alloc_requests+0x21a/0x2c0\n[  521.456577]  blk_mq_submit_bio+0x23c/0x6c0\n[  521.456766]  __submit_bio+0xb8/0x140\n[  521.457236]  submit_bio_noacct_nocheck+0x212/0x300\n[  521.457748]  submit_bio_noacct+0x1a6/0x580\n[  521.458220]  submit_bio+0x43/0x80\n[  521.458660]  ext4_io_submit+0x23/0x80\n[  521.459116]  ext4_do_writepages+0x40a/0xd00\n[  521.459596]  ext4_writepages+0x65/0x100\n[  521.460050]  do_writepages+0xb7/0x1c0\n[  521.460492]  __filemap_fdatawrite_range+0xa6/0x100\n[  521.460979]  file_write_and_wait_range+0xbf/0x140\n[  521.461452]  ext4_sync_file+0x105/0x340\n[  521.461882]  __x64_sys_fsync+0x67/0x100\n[  521.462305]  ? syscall_exit_to_user_mode+0x2c/0x1c0\n[  521.462768]  do_syscall_64+0x3b/0xc0\n[  521.463165]  entry_SYSCALL_64_after_hwframe+0x5a/0xc4\n[  521.463621] RIP: 0033:0x5640b6c56590\n[  521.464006] Code: 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 80 3d 71 70 0e 00 00 74 17 b8 4a 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 48 c3 0f 1f 80 00 00 00 00 48 83 ec 18 89 7c",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-54242",
          "url": "https://www.suse.com/security/cve/CVE-2023-54242"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255919 for CVE-2023-54242",
          "url": "https://bugzilla.suse.com/1255919"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-54242"
    },
    {
      "cve": "CVE-2023-54243",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-54243"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ebtables: fix table blob use-after-free\n\nWe are not allowed to return an error at this point.\nLooking at the code it looks like ret is always 0 at this\npoint, but its not.\n\nt = find_table_lock(net, repl-\u003ename, \u0026ret, \u0026ebt_mutex);\n\n... this can return a valid table, with ret != 0.\n\nThis bug causes update of table-\u003eprivate with the new\nblob, but then frees the blob right away in the caller.\n\nSyzbot report:\n\nBUG: KASAN: vmalloc-out-of-bounds in __ebt_unregister_table+0xc00/0xcd0 net/bridge/netfilter/ebtables.c:1168\nRead of size 4 at addr ffffc90005425000 by task kworker/u4:4/74\nWorkqueue: netns cleanup_net\nCall Trace:\n kasan_report+0xbf/0x1f0 mm/kasan/report.c:517\n __ebt_unregister_table+0xc00/0xcd0 net/bridge/netfilter/ebtables.c:1168\n ebt_unregister_table+0x35/0x40 net/bridge/netfilter/ebtables.c:1372\n ops_exit_list+0xb0/0x170 net/core/net_namespace.c:169\n cleanup_net+0x4ee/0xb10 net/core/net_namespace.c:613\n...\n\nip(6)tables appears to be ok (ret should be 0 at this point) but make\nthis more obvious.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-54243",
          "url": "https://www.suse.com/security/cve/CVE-2023-54243"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255908 for CVE-2023-54243",
          "url": "https://bugzilla.suse.com/1255908"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-54243"
    },
    {
      "cve": "CVE-2023-54270",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-54270"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: usb: siano: Fix use after free bugs caused by do_submit_urb\n\nThere are UAF bugs caused by do_submit_urb(). One of the KASan reports\nis shown below:\n\n[   36.403605] BUG: KASAN: use-after-free in worker_thread+0x4a2/0x890\n[   36.406105] Read of size 8 at addr ffff8880059600e8 by task kworker/0:2/49\n[   36.408316]\n[   36.408867] CPU: 0 PID: 49 Comm: kworker/0:2 Not tainted 6.2.0-rc3-15798-g5a41237ad1d4-dir8\n[   36.411696] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g15584\n[   36.416157] Workqueue:  0x0 (events)\n[   36.417654] Call Trace:\n[   36.418546]  \u003cTASK\u003e\n[   36.419320]  dump_stack_lvl+0x96/0xd0\n[   36.420522]  print_address_description+0x75/0x350\n[   36.421992]  print_report+0x11b/0x250\n[   36.423174]  ? _raw_spin_lock_irqsave+0x87/0xd0\n[   36.424806]  ? __virt_addr_valid+0xcf/0x170\n[   36.426069]  ? worker_thread+0x4a2/0x890\n[   36.427355]  kasan_report+0x131/0x160\n[   36.428556]  ? worker_thread+0x4a2/0x890\n[   36.430053]  worker_thread+0x4a2/0x890\n[   36.431297]  ? worker_clr_flags+0x90/0x90\n[   36.432479]  kthread+0x166/0x190\n[   36.433493]  ? kthread_blkcg+0x50/0x50\n[   36.434669]  ret_from_fork+0x22/0x30\n[   36.435923]  \u003c/TASK\u003e\n[   36.436684]\n[   36.437215] Allocated by task 24:\n[   36.438289]  kasan_set_track+0x50/0x80\n[   36.439436]  __kasan_kmalloc+0x89/0xa0\n[   36.440566]  smsusb_probe+0x374/0xc90\n[   36.441920]  usb_probe_interface+0x2d1/0x4c0\n[   36.443253]  really_probe+0x1d5/0x580\n[   36.444539]  __driver_probe_device+0xe3/0x130\n[   36.446085]  driver_probe_device+0x49/0x220\n[   36.447423]  __device_attach_driver+0x19e/0x1b0\n[   36.448931]  bus_for_each_drv+0xcb/0x110\n[   36.450217]  __device_attach+0x132/0x1f0\n[   36.451470]  bus_probe_device+0x59/0xf0\n[   36.452563]  device_add+0x4ec/0x7b0\n[   36.453830]  usb_set_configuration+0xc63/0xe10\n[   36.455230]  usb_generic_driver_probe+0x3b/0x80\n[   36.456166] printk: console [ttyGS0] disabled\n[   36.456569]  usb_probe_device+0x90/0x110\n[   36.459523]  really_probe+0x1d5/0x580\n[   36.461027]  __driver_probe_device+0xe3/0x130\n[   36.462465]  driver_probe_device+0x49/0x220\n[   36.463847]  __device_attach_driver+0x19e/0x1b0\n[   36.465229]  bus_for_each_drv+0xcb/0x110\n[   36.466466]  __device_attach+0x132/0x1f0\n[   36.467799]  bus_probe_device+0x59/0xf0\n[   36.469010]  device_add+0x4ec/0x7b0\n[   36.470125]  usb_new_device+0x863/0xa00\n[   36.471374]  hub_event+0x18c7/0x2220\n[   36.472746]  process_one_work+0x34c/0x5b0\n[   36.474041]  worker_thread+0x4b7/0x890\n[   36.475216]  kthread+0x166/0x190\n[   36.476267]  ret_from_fork+0x22/0x30\n[   36.477447]\n[   36.478160] Freed by task 24:\n[   36.479239]  kasan_set_track+0x50/0x80\n[   36.480512]  kasan_save_free_info+0x2b/0x40\n[   36.481808]  ____kasan_slab_free+0x122/0x1a0\n[   36.483173]  __kmem_cache_free+0xc4/0x200\n[   36.484563]  smsusb_term_device+0xcd/0xf0\n[   36.485896]  smsusb_probe+0xc85/0xc90\n[   36.486976]  usb_probe_interface+0x2d1/0x4c0\n[   36.488303]  really_probe+0x1d5/0x580\n[   36.489498]  __driver_probe_device+0xe3/0x130\n[   36.491140]  driver_probe_device+0x49/0x220\n[   36.492475]  __device_attach_driver+0x19e/0x1b0\n[   36.493988]  bus_for_each_drv+0xcb/0x110\n[   36.495171]  __device_attach+0x132/0x1f0\n[   36.496617]  bus_probe_device+0x59/0xf0\n[   36.497875]  device_add+0x4ec/0x7b0\n[   36.498972]  usb_set_configuration+0xc63/0xe10\n[   36.500264]  usb_generic_driver_probe+0x3b/0x80\n[   36.501740]  usb_probe_device+0x90/0x110\n[   36.503084]  really_probe+0x1d5/0x580\n[   36.504241]  __driver_probe_device+0xe3/0x130\n[   36.505548]  driver_probe_device+0x49/0x220\n[   36.506766]  __device_attach_driver+0x19e/0x1b0\n[   36.508368]  bus_for_each_drv+0xcb/0x110\n[   36.509646]  __device_attach+0x132/0x1f0\n[   36.510911]  bus_probe_device+0x59/0xf0\n[   36.512103]  device_add+0x4ec/0x7b0\n[   36.513215]  usb_new_device+0x863/0xa00\n[   36.514736]  hub_event+0x18c7/0x2220\n[   36.516130]  process_one_work+\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-54270",
          "url": "https://www.suse.com/security/cve/CVE-2023-54270"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255901 for CVE-2023-54270",
          "url": "https://bugzilla.suse.com/1255901"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-54270"
    },
    {
      "cve": "CVE-2025-38068",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-38068"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: lzo - Fix compression buffer overrun\n\nUnlike the decompression code, the compression code in LZO never\nchecked for output overruns.  It instead assumes that the caller\nalways provides enough buffer space, disregarding the buffer length\nprovided by the caller.\n\nAdd a safe compression interface that checks for the end of buffer\nbefore each write.  Use the safe interface in crypto/lzo.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-38068",
          "url": "https://www.suse.com/security/cve/CVE-2025-38068"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245210 for CVE-2025-38068",
          "url": "https://bugzilla.suse.com/1245210"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-38068"
    },
    {
      "cve": "CVE-2025-38159",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-38159"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw88: fix the \u0027para\u0027 buffer size to avoid reading out of bounds\n\nSet the size to 6 instead of 2, since \u0027para\u0027 array is passed to\n\u0027rtw_fw_bt_wifi_control(rtwdev, para[0], \u0026para[1])\u0027, which reads\n5 bytes:\n\nvoid rtw_fw_bt_wifi_control(struct rtw_dev *rtwdev, u8 op_code, u8 *data)\n{\n    ...\n    SET_BT_WIFI_CONTROL_DATA1(h2c_pkt, *data);\n    SET_BT_WIFI_CONTROL_DATA2(h2c_pkt, *(data + 1));\n    ...\n    SET_BT_WIFI_CONTROL_DATA5(h2c_pkt, *(data + 4));\n\nDetected using the static analysis tool - Svace.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-38159",
          "url": "https://www.suse.com/security/cve/CVE-2025-38159"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245751 for CVE-2025-38159",
          "url": "https://bugzilla.suse.com/1245751"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-38159"
    },
    {
      "cve": "CVE-2025-40019",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40019"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: essiv - Check ssize for decryption and in-place encryption\n\nMove the ssize check to the start in essiv_aead_crypt so that\nit\u0027s also checked for decryption and in-place encryption.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40019",
          "url": "https://www.suse.com/security/cve/CVE-2025-40019"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252678 for CVE-2025-40019",
          "url": "https://bugzilla.suse.com/1252678"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1252719 for CVE-2025-40019",
          "url": "https://bugzilla.suse.com/1252719"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-40019"
    },
    {
      "cve": "CVE-2025-40215",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40215"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: delete x-\u003etunnel as we delete x\n\nThe ipcomp fallback tunnels currently get deleted (from the various\nlists and hashtables) as the last user state that needed that fallback\nis destroyed (not deleted). If a reference to that user state still\nexists, the fallback state will remain on the hashtables/lists,\ntriggering the WARN in xfrm_state_fini. Because of those remaining\nreferences, the fix in commit f75a2804da39 (\"xfrm: destroy xfrm_state\nsynchronously on net exit path\") is not complete.\n\nWe recently fixed one such situation in TCP due to defered freeing of\nskbs (commit 9b6412e6979f (\"tcp: drop secpath at the same time as we\ncurrently drop dst\")). This can also happen due to IP reassembly: skbs\nwith a secpath remain on the reassembly queue until netns\ndestruction. If we can\u0027t guarantee that the queues are flushed by the\ntime xfrm_state_fini runs, there may still be references to a (user)\nxfrm_state, preventing the timely deletion of the corresponding\nfallback state.\n\nInstead of chasing each instance of skbs holding a secpath one by one,\nthis patch fixes the issue directly within xfrm, by deleting the\nfallback state as soon as the last user state depending on it has been\ndeleted. Destruction will still happen when the final reference is\ndropped.\n\nA separate lockdep class for the fallback state is required since\nwe\u0027re going to lock x-\u003etunnel while x is locked.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40215",
          "url": "https://www.suse.com/security/cve/CVE-2025-40215"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254959 for CVE-2025-40215",
          "url": "https://bugzilla.suse.com/1254959"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1255054 for CVE-2025-40215",
          "url": "https://bugzilla.suse.com/1255054"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-40215"
    },
    {
      "cve": "CVE-2025-40220",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40220"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfuse: fix livelock in synchronous file put from fuseblk workers\n\nI observed a hang when running generic/323 against a fuseblk server.\nThis test opens a file, initiates a lot of AIO writes to that file\ndescriptor, and closes the file descriptor before the writes complete.\nUnsurprisingly, the AIO exerciser threads are mostly stuck waiting for\nresponses from the fuseblk server:\n\n# cat /proc/372265/task/372313/stack\n[\u003c0\u003e] request_wait_answer+0x1fe/0x2a0 [fuse]\n[\u003c0\u003e] __fuse_simple_request+0xd3/0x2b0 [fuse]\n[\u003c0\u003e] fuse_do_getattr+0xfc/0x1f0 [fuse]\n[\u003c0\u003e] fuse_file_read_iter+0xbe/0x1c0 [fuse]\n[\u003c0\u003e] aio_read+0x130/0x1e0\n[\u003c0\u003e] io_submit_one+0x542/0x860\n[\u003c0\u003e] __x64_sys_io_submit+0x98/0x1a0\n[\u003c0\u003e] do_syscall_64+0x37/0xf0\n[\u003c0\u003e] entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\nBut the /weird/ part is that the fuseblk server threads are waiting for\nresponses from itself:\n\n# cat /proc/372210/task/372232/stack\n[\u003c0\u003e] request_wait_answer+0x1fe/0x2a0 [fuse]\n[\u003c0\u003e] __fuse_simple_request+0xd3/0x2b0 [fuse]\n[\u003c0\u003e] fuse_file_put+0x9a/0xd0 [fuse]\n[\u003c0\u003e] fuse_release+0x36/0x50 [fuse]\n[\u003c0\u003e] __fput+0xec/0x2b0\n[\u003c0\u003e] task_work_run+0x55/0x90\n[\u003c0\u003e] syscall_exit_to_user_mode+0xe9/0x100\n[\u003c0\u003e] do_syscall_64+0x43/0xf0\n[\u003c0\u003e] entry_SYSCALL_64_after_hwframe+0x4b/0x53\n\nThe fuseblk server is fuse2fs so there\u0027s nothing all that exciting in\nthe server itself.  So why is the fuse server calling fuse_file_put?\nThe commit message for the fstest sheds some light on that:\n\n\"By closing the file descriptor before calling io_destroy, you pretty\nmuch guarantee that the last put on the ioctx will be done in interrupt\ncontext (during I/O completion).\n\nAha.  AIO fgets a new struct file from the fd when it queues the ioctx.\nThe completion of the FUSE_WRITE command from userspace causes the fuse\nserver to call the AIO completion function.  The completion puts the\nstruct file, queuing a delayed fput to the fuse server task.  When the\nfuse server task returns to userspace, it has to run the delayed fput,\nwhich in the case of a fuseblk server, it does synchronously.\n\nSending the FUSE_RELEASE command sychronously from fuse server threads\nis a bad idea because a client program can initiate enough simultaneous\nAIOs such that all the fuse server threads end up in delayed_fput, and\nnow there aren\u0027t any threads left to handle the queued fuse commands.\n\nFix this by only using asynchronous fputs when closing files, and leave\na comment explaining why.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40220",
          "url": "https://www.suse.com/security/cve/CVE-2025-40220"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254520 for CVE-2025-40220",
          "url": "https://bugzilla.suse.com/1254520"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40220"
    },
    {
      "cve": "CVE-2025-40233",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40233"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: clear extent cache after moving/defragmenting extents\n\nThe extent map cache can become stale when extents are moved or\ndefragmented, causing subsequent operations to see outdated extent flags. \nThis triggers a BUG_ON in ocfs2_refcount_cal_cow_clusters().\n\nThe problem occurs when:\n1. copy_file_range() creates a reflinked extent with OCFS2_EXT_REFCOUNTED\n2. ioctl(FITRIM) triggers ocfs2_move_extents()\n3. __ocfs2_move_extents_range() reads and caches the extent (flags=0x2)\n4. ocfs2_move_extent()/ocfs2_defrag_extent() calls __ocfs2_move_extent()\n   which clears OCFS2_EXT_REFCOUNTED flag on disk (flags=0x0)\n5. The extent map cache is not invalidated after the move\n6. Later write() operations read stale cached flags (0x2) but disk has\n   updated flags (0x0), causing a mismatch\n7. BUG_ON(!(rec-\u003ee_flags \u0026 OCFS2_EXT_REFCOUNTED)) triggers\n\nFix by clearing the extent map cache after each extent move/defrag\noperation in __ocfs2_move_extents_range().  This ensures subsequent\noperations read fresh extent data from disk.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40233",
          "url": "https://www.suse.com/security/cve/CVE-2025-40233"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254813 for CVE-2025-40233",
          "url": "https://bugzilla.suse.com/1254813"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40233"
    },
    {
      "cve": "CVE-2025-40256",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40256"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added\n\nIn commit b441cf3f8c4b (\"xfrm: delete x-\u003etunnel as we delete x\"), I\nmissed the case where state creation fails between full\ninitialization (-\u003einit_state has been called) and being inserted on\nthe lists.\n\nIn this situation, -\u003einit_state has been called, so for IPcomp\ntunnels, the fallback tunnel has been created and added onto the\nlists, but the user state never gets added, because we fail before\nthat. The user state doesn\u0027t go through __xfrm_state_delete, so we\ndon\u0027t call xfrm_state_delete_tunnel for those states, and we end up\nleaking the FB tunnel.\n\nThere are several codepaths affected by this: the add/update paths, in\nboth net/key and xfrm, and the migrate code (xfrm_migrate,\nxfrm_state_migrate). A \"proper\" rollback of the init_state work would\nprobably be doable in the add/update code, but for migrate it gets\nmore complicated as multiple states may be involved.\n\nAt some point, the new (not-inserted) state will be destroyed, so call\nxfrm_state_delete_tunnel during xfrm_state_gc_destroy. Most states\nwill have their fallback tunnel cleaned up during __xfrm_state_delete,\nwhich solves the issue that b441cf3f8c4b (and other patches before it)\naimed at. All states (including FB tunnels) will be removed from the\nlists once xfrm_state_fini has called flush_work(\u0026xfrm_state_gc_work).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40256",
          "url": "https://www.suse.com/security/cve/CVE-2025-40256"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254851 for CVE-2025-40256",
          "url": "https://bugzilla.suse.com/1254851"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40256"
    },
    {
      "cve": "CVE-2025-40277",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40277"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE\n\nThis data originates from userspace and is used in buffer offset\ncalculations which could potentially overflow causing an out-of-bounds\naccess.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40277",
          "url": "https://www.suse.com/security/cve/CVE-2025-40277"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254894 for CVE-2025-40277",
          "url": "https://bugzilla.suse.com/1254894"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40277"
    },
    {
      "cve": "CVE-2025-40280",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40280"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: Fix use-after-free in tipc_mon_reinit_self().\n\nsyzbot reported use-after-free of tipc_net(net)-\u003emonitors[]\nin tipc_mon_reinit_self(). [0]\n\nThe array is protected by RTNL, but tipc_mon_reinit_self()\niterates over it without RTNL.\n\ntipc_mon_reinit_self() is called from tipc_net_finalize(),\nwhich is always under RTNL except for tipc_net_finalize_work().\n\nLet\u0027s hold RTNL in tipc_net_finalize_work().\n\n[0]:\nBUG: KASAN: slab-use-after-free in __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]\nBUG: KASAN: slab-use-after-free in _raw_spin_lock_irqsave+0xa7/0xf0 kernel/locking/spinlock.c:162\nRead of size 1 at addr ffff88805eae1030 by task kworker/0:7/5989\n\nCPU: 0 UID: 0 PID: 5989 Comm: kworker/0:7 Not tainted syzkaller #0 PREEMPT_{RT,(full)}\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025\nWorkqueue: events tipc_net_finalize_work\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0xca/0x240 mm/kasan/report.c:482\n kasan_report+0x118/0x150 mm/kasan/report.c:595\n __kasan_check_byte+0x2a/0x40 mm/kasan/common.c:568\n kasan_check_byte include/linux/kasan.h:399 [inline]\n lock_acquire+0x8d/0x360 kernel/locking/lockdep.c:5842\n __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]\n _raw_spin_lock_irqsave+0xa7/0xf0 kernel/locking/spinlock.c:162\n rtlock_slowlock kernel/locking/rtmutex.c:1894 [inline]\n rwbase_rtmutex_lock_state kernel/locking/spinlock_rt.c:160 [inline]\n rwbase_write_lock+0xd3/0x7e0 kernel/locking/rwbase_rt.c:244\n rt_write_lock+0x76/0x110 kernel/locking/spinlock_rt.c:243\n write_lock_bh include/linux/rwlock_rt.h:99 [inline]\n tipc_mon_reinit_self+0x79/0x430 net/tipc/monitor.c:718\n tipc_net_finalize+0x115/0x190 net/tipc/net.c:140\n process_one_work kernel/workqueue.c:3236 [inline]\n process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3319\n worker_thread+0x8a0/0xda0 kernel/workqueue.c:3400\n kthread+0x70e/0x8a0 kernel/kthread.c:463\n ret_from_fork+0x439/0x7d0 arch/x86/kernel/process.c:148\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245\n \u003c/TASK\u003e\n\nAllocated by task 6089:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3e/0x80 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:388 [inline]\n __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:405\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __kmalloc_cache_noprof+0x1a8/0x320 mm/slub.c:4407\n kmalloc_noprof include/linux/slab.h:905 [inline]\n kzalloc_noprof include/linux/slab.h:1039 [inline]\n tipc_mon_create+0xc3/0x4d0 net/tipc/monitor.c:657\n tipc_enable_bearer net/tipc/bearer.c:357 [inline]\n __tipc_nl_bearer_enable+0xe16/0x13f0 net/tipc/bearer.c:1047\n __tipc_nl_compat_doit net/tipc/netlink_compat.c:371 [inline]\n tipc_nl_compat_doit+0x3bc/0x5f0 net/tipc/netlink_compat.c:393\n tipc_nl_compat_handle net/tipc/netlink_compat.c:-1 [inline]\n tipc_nl_compat_recv+0x83c/0xbe0 net/tipc/netlink_compat.c:1321\n genl_family_rcv_msg_doit+0x215/0x300 net/netlink/genetlink.c:1115\n genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]\n genl_rcv_msg+0x60e/0x790 net/netlink/genetlink.c:1210\n netlink_rcv_skb+0x208/0x470 net/netlink/af_netlink.c:2552\n genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219\n netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline]\n netlink_unicast+0x846/0xa10 net/netlink/af_netlink.c:1346\n netlink_sendmsg+0x805/0xb30 net/netlink/af_netlink.c:1896\n sock_sendmsg_nosec net/socket.c:714 [inline]\n __sock_sendmsg+0x21c/0x270 net/socket.c:729\n ____sys_sendmsg+0x508/0x820 net/socket.c:2614\n ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2668\n __sys_sendmsg net/socket.c:2700 [inline]\n __do_sys_sendmsg net/socket.c:2705 [inline]\n __se_sys_sendmsg net/socket.c:2703 [inline]\n __x64_sys_sendmsg+0x1a1/0x260 net/socket.c:2703\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xfa/0x3b0 arch/\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40280",
          "url": "https://www.suse.com/security/cve/CVE-2025-40280"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254847 for CVE-2025-40280",
          "url": "https://bugzilla.suse.com/1254847"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254951 for CVE-2025-40280",
          "url": "https://bugzilla.suse.com/1254951"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-40280"
    },
    {
      "cve": "CVE-2025-40331",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-40331"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Prevent TOCTOU out-of-bounds write\n\nFor the following path not holding the sock lock,\n\n  sctp_diag_dump() -\u003e sctp_for_each_endpoint() -\u003e sctp_ep_dump()\n\nmake sure not to exceed bounds in case the address list has grown\nbetween buffer allocation (time-of-check) and write (time-of-use).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-40331",
          "url": "https://www.suse.com/security/cve/CVE-2025-40331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1254615 for CVE-2025-40331",
          "url": "https://bugzilla.suse.com/1254615"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-40331"
    },
    {
      "cve": "CVE-2025-68813",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-68813"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvs: fix ipv4 null-ptr-deref in route error path\n\nThe IPv4 code path in __ip_vs_get_out_rt() calls dst_link_failure()\nwithout ensuring skb-\u003edev is set, leading to a NULL pointer dereference\nin fib_compute_spec_dst() when ipv4_link_failure() attempts to send\nICMP destination unreachable messages.\n\nThe issue emerged after commit ed0de45a1008 (\"ipv4: recompile ip options\nin ipv4_link_failure\") started calling __ip_options_compile() from\nipv4_link_failure(). This code path eventually calls fib_compute_spec_dst()\nwhich dereferences skb-\u003edev. An attempt was made to fix the NULL skb-\u003edev\ndereference in commit 0113d9c9d1cc (\"ipv4: fix null-deref in\nipv4_link_failure\"), but it only addressed the immediate dev_net(skb-\u003edev)\ndereference by using a fallback device. The fix was incomplete because\nfib_compute_spec_dst() later in the call chain still accesses skb-\u003edev\ndirectly, which remains NULL when IPVS calls dst_link_failure().\n\nThe crash occurs when:\n1. IPVS processes a packet in NAT mode with a misconfigured destination\n2. Route lookup fails in __ip_vs_get_out_rt() before establishing a route\n3. The error path calls dst_link_failure(skb) with skb-\u003edev == NULL\n4. ipv4_link_failure() -\u003e ipv4_send_dest_unreach() -\u003e\n   __ip_options_compile() -\u003e fib_compute_spec_dst()\n5. fib_compute_spec_dst() dereferences NULL skb-\u003edev\n\nApply the same fix used for IPv6 in commit 326bf17ea5d4 (\"ipvs: fix\nipv6 route unreach panic\"): set skb-\u003edev from skb_dst(skb)-\u003edev before\ncalling dst_link_failure().\n\nKASAN: null-ptr-deref in range [0x0000000000000328-0x000000000000032f]\nCPU: 1 PID: 12732 Comm: syz.1.3469 Not tainted 6.6.114 #2\nRIP: 0010:__in_dev_get_rcu include/linux/inetdevice.h:233\nRIP: 0010:fib_compute_spec_dst+0x17a/0x9f0 net/ipv4/fib_frontend.c:285\nCall Trace:\n  \u003cTASK\u003e\n  spec_dst_fill net/ipv4/ip_options.c:232\n  spec_dst_fill net/ipv4/ip_options.c:229\n  __ip_options_compile+0x13a1/0x17d0 net/ipv4/ip_options.c:330\n  ipv4_send_dest_unreach net/ipv4/route.c:1252\n  ipv4_link_failure+0x702/0xb80 net/ipv4/route.c:1265\n  dst_link_failure include/net/dst.h:437\n  __ip_vs_get_out_rt+0x15fd/0x19e0 net/netfilter/ipvs/ip_vs_xmit.c:412\n  ip_vs_nat_xmit+0x1d8/0xc80 net/netfilter/ipvs/ip_vs_xmit.c:764",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-68813",
          "url": "https://www.suse.com/security/cve/CVE-2025-68813"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256641 for CVE-2025-68813",
          "url": "https://bugzilla.suse.com/1256641"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-68813"
    },
    {
      "cve": "CVE-2025-71120",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-71120"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf\n\nA zero length gss_token results in pages == 0 and in_token-\u003epages[0]\nis NULL. The code unconditionally evaluates\npage_address(in_token-\u003epages[0]) for the initial memcpy, which can\ndereference NULL even when the copy length is 0. Guard the first\nmemcpy so it only runs when length \u003e 0.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
          "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-71120",
          "url": "https://www.suse.com/security/cve/CVE-2025-71120"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1256779 for CVE-2025-71120",
          "url": "https://bugzilla.suse.com/1256779"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.232.1.x86_64",
            "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.232.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-30T13:42:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-71120"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…