ESB-2026.4101
PUBLISHED
CVSS 8.199999809265137 HIGH
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2026.4101
Security update for the Linux Kernel
23 April 2026
===========================================================================
AUSCERT Security Bulletin Summary
---------------------------------
Product: Linux Kernel
Publisher: SUSE
Operating System: SUSE
Resolution: Patch/Upgrade
CVE Names: CVE-2025-71239 CVE-2026-23138 CVE-2026-23140
CVE-2026-23239 CVE-2026-23120 CVE-2026-23240
CVE-2026-23242 CVE-2026-23255 CVE-2026-23262
CVE-2026-23270 CVE-2026-23243 CVE-2026-23281
CVE-2026-23272 CVE-2026-23297 CVE-2026-23274
CVE-2026-23277 CVE-2026-23278 CVE-2026-23293
CVE-2026-23292 CVE-2026-23304 CVE-2026-23319
CVE-2026-23326 CVE-2026-23335 CVE-2026-23343
CVE-2026-23361 CVE-2026-23379 CVE-2026-23381
CVE-2026-23383 CVE-2026-23386 CVE-2026-23393
CVE-2026-23413 CVE-2026-23414 CVE-2026-23419
CVE-2025-68794 CVE-2026-23425 CVE-2026-23187
CVE-2026-23193 CVE-2026-23201 CVE-2026-23125
CVE-2026-23204 CVE-2026-23215 CVE-2026-23216
CVE-2025-40253 CVE-2026-31788 CVE-2026-23072
CVE-2025-39998 CVE-2026-23398 CVE-2026-23103
CVE-2026-23231
Original Bulletin:
https://www.suse.com/support/update/announcement/2026/suse-su-202621237-1
Comment: CVSS (Max): 8.2 CVE-2026-31788 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)
CVSS Source: SUSE, [kernel.org]
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS (Max): 0.2% (43rd) CVE-2025-39998 2026-04-22
- --------------------------BEGIN INCLUDED TEXT--------------------
Security update for the Linux Kernel
Announcement ID: SUSE-SU-2026:21237-1
Release Date: 2026-04-20T15:11:07Z
Rating: important
o bsc#1191256
o bsc#1191270
o bsc#1194778
o bsc#1207184
o bsc#1217845
o bsc#1222768
o bsc#1243208
o bsc#1252073
o bsc#1253129
o bsc#1254214
o bsc#1254306
o bsc#1254307
o bsc#1255084
o bsc#1255687
o bsc#1256647
o bsc#1257183
o bsc#1257511
o bsc#1257708
o bsc#1257773
o bsc#1257777
o bsc#1258175
o bsc#1258280
o bsc#1258293
o bsc#1258301
o bsc#1258305
o bsc#1258330
o bsc#1258337
o bsc#1258340
o bsc#1258414
o bsc#1258447
o bsc#1258476
o bsc#1258849
o bsc#1259188
o bsc#1259461
o bsc#1259484
o bsc#1259485
o bsc#1259580
o bsc#1259707
References: o bsc#1259759
o bsc#1259795
o bsc#1259797
o bsc#1259870
o bsc#1259886
o bsc#1259891
o bsc#1259955
o bsc#1259997
o bsc#1259998
o bsc#1260005
o bsc#1260009
o bsc#1260347
o bsc#1260459
o bsc#1260464
o bsc#1260471
o bsc#1260481
o bsc#1260486
o bsc#1260490
o bsc#1260497
o bsc#1260500
o bsc#1260522
o bsc#1260527
o bsc#1260544
o bsc#1260550
o bsc#1260606
o bsc#1260730
o bsc#1260732
o bsc#1260735
o bsc#1260799
o bsc#1261496
o bsc#1261498
o bsc#1261506
o bsc#1261507
o bsc#1261669
o jsc#PED-11175
o jsc#PED-15042
o jsc#PED-15441
o jsc#PED-15986
o CVE-2025-39998
o CVE-2025-40253
o CVE-2025-68794
o CVE-2025-71239
o CVE-2026-23072
o CVE-2026-23103
o CVE-2026-23120
o CVE-2026-23125
o CVE-2026-23138
o CVE-2026-23140
o CVE-2026-23187
o CVE-2026-23193
o CVE-2026-23201
o CVE-2026-23204
o CVE-2026-23215
o CVE-2026-23216
o CVE-2026-23231
o CVE-2026-23239
o CVE-2026-23240
o CVE-2026-23242
o CVE-2026-23243
o CVE-2026-23255
o CVE-2026-23262
o CVE-2026-23270
Cross-References: o CVE-2026-23272
o CVE-2026-23274
o CVE-2026-23277
o CVE-2026-23278
o CVE-2026-23281
o CVE-2026-23292
o CVE-2026-23293
o CVE-2026-23297
o CVE-2026-23304
o CVE-2026-23319
o CVE-2026-23326
o CVE-2026-23335
o CVE-2026-23343
o CVE-2026-23361
o CVE-2026-23379
o CVE-2026-23381
o CVE-2026-23383
o CVE-2026-23386
o CVE-2026-23393
o CVE-2026-23398
o CVE-2026-23413
o CVE-2026-23414
o CVE-2026-23419
o CVE-2026-23425
o CVE-2026-31788
o CVE-2025-39998 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L
/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
o CVE-2025-39998 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:L/A:H
o CVE-2025-40253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2025-68794 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L
/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N
o CVE-2025-68794 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
/S:U/C:H/I:N/A:H
o CVE-2025-71239 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L
/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
o CVE-2025-71239 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:L/A:N
o CVE-2026-23072 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L
/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:N/I:N/A:H
o CVE-2026-23103 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L
/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:N/I:N/A:H
o CVE-2026-23103 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:H/I:H/A:H
o CVE-2026-23120 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L
/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23120 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:N/I:N/A:H
o CVE-2026-23125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L
/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23125 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:N/I:N/A:H
o CVE-2026-23138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L
/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:N/I:N/A:H
o CVE-2026-23140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L
/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:N/I:N/A:H
o CVE-2026-23187 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L
/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
o CVE-2026-23187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:H/I:N/A:N
o CVE-2026-23187 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:H/I:N/A:H
o CVE-2026-23193 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
/S:U/C:L/I:L/A:H
o CVE-2026-23193 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:H/I:H/A:H
o CVE-2026-23193 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/
S:U/C:H/I:H/A:H
o CVE-2026-23201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L
/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:N/I:N/A:H
o CVE-2026-23204 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L
/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
o CVE-2026-23204 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
/S:U/C:H/I:H/A:H
o CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:H/I:N/A:H
o CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:H/I:N/A:H
o CVE-2026-23215 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L
/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23215 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:N/I:N/A:H
o CVE-2026-23216 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L
/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23216 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:H/I:H/A:H
o CVE-2026-23231 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L
/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23231 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
/S:U/C:H/I:H/A:H
o CVE-2026-23231 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:H/I:H/A:H
o CVE-2026-23231 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:H/I:H/A:H
o CVE-2026-23239 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L
/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
/S:U/C:H/I:H/A:H
o CVE-2026-23239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:H/I:H/A:H
o CVE-2026-23240 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L
/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23240 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
/S:U/C:H/I:H/A:H
o CVE-2026-23240 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/
S:U/C:H/I:H/A:H
o CVE-2026-23242 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L
/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23242 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23242 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/
S:U/C:N/I:N/A:H
o CVE-2026-23243 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L
CVSS scores: /UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23243 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:H/I:H/A:H
o CVE-2026-23243 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:H/I:H/A:H
o CVE-2026-23255 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L
/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23255 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23262 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L
/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23262 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
/S:U/C:N/I:H/A:H
o CVE-2026-23270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23270 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:H/I:H/A:H
o CVE-2026-23272 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L
/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23272 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
/S:U/C:H/I:H/A:H
o CVE-2026-23272 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:H/I:H/A:H
o CVE-2026-23274 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L
/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23274 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
/S:U/C:H/I:H/A:H
o CVE-2026-23274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:H/I:H/A:H
o CVE-2026-23277 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N
/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23277 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23278 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L
/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23278 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
/S:U/C:H/I:H/A:H
o CVE-2026-23278 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:H/I:H/A:H
o CVE-2026-23281 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:L/AT:P/PR:L
/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23281 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N
/S:U/C:H/I:H/A:H
o CVE-2026-23292 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H
/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23292 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23293 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N
/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23293 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23297 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23304 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L
/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23304 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23319 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H
/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23319 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N
/S:U/C:H/I:H/A:H
o CVE-2026-23326 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L
/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23326 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23335 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L
/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
o CVE-2026-23335 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:L/I:N/A:N
o CVE-2026-23343 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L
/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23343 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23361 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H
/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
o CVE-2026-23361 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N
/S:U/C:N/I:H/A:N
o CVE-2026-23379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23383 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23383 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:H/I:H/A:H
o CVE-2026-23386 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L
/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23393 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L
/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23393 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
/S:U/C:H/I:H/A:H
o CVE-2026-23393 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/
S:U/C:H/I:H/A:H
o CVE-2026-23398 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:N
/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23398 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23413 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H
/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23413 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N
/S:U/C:H/I:H/A:H
o CVE-2026-23414 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L
/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23414 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23419 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L
/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N
/S:U/C:N/I:N/A:H
o CVE-2026-23425 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L
/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
o CVE-2026-23425 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N
/S:U/C:N/I:H/A:H
o CVE-2026-31788 ( NVD ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/
S:C/C:H/I:H/A:H
Affected o SUSE Linux Micro 6.2
Products:
An update that solves 49 vulnerabilities, contains four features and has 23
fixes can now be installed.
Description:
The SUSE Linux Enterprise 16.0 kernel was updated to fix various security
issues
The following security issues were fixed:
o CVE-2025-39998: scsi: target: target_core_configfs: Add length check to
avoid buffer overflow (bsc#1252073).
o CVE-2025-40253: s390/ctcm: Fix double-kfree (bsc#1255084).
o CVE-2025-68794: iomap: adjust read range correctly for non-block-aligned
positions (bsc#1256647).
o CVE-2025-71239: audit: add fchmodat2() to change attributes class (bsc#
1259759).
o CVE-2026-23072: l2tp: Fix memleak in l2tp_udp_encap_recv() (bsc#1257708).
o CVE-2026-23103: ipvlan: Make the addrs_lock be per port (bsc#1257773).
o CVE-2026-23120: l2tp: avoid one data-race in l2tp_tunnel_del_work() (bsc#
1258280).
o CVE-2026-23125: sctp: move SCTP_CMD_ASSOC_SHKEY right after
SCTP_CMD_PEER_INIT (bsc#1258293).
o CVE-2026-23138: kABI: Preserve values of the trace recursion bits (bsc#
1258301).
o CVE-2026-23140: bpf, test_run: Subtract size of xdp_frame from allowed
metadata size (bsc#1258305).
o CVE-2026-23187: pmdomain: imx8m-blk-ctrl: fix out-of-range access of bc->
domains (bsc#1258330).
o CVE-2026-23193: scsi: target: iscsi: Fix use-after-free in
iscsit_dec_session_usage_count() (bsc#1258414).
o CVE-2026-23201: ceph: fix oops due to invalid pointer for kfree() in
parse_longname() (bsc#1258337).
o CVE-2026-23204: net: add skb_header_pointer_careful() helper (bsc#1258340).
o CVE-2026-23215: x86/vmware: Fix hypercall clobbers (bsc#1258476).
o CVE-2026-23216: scsi: target: iscsi: Fix use-after-free in
iscsit_dec_conn_usage_count() (bsc#1258447).
o CVE-2026-23231: netfilter: nf_tables: fix use-after-free in
nf_tables_addchain() (bsc#1259188).
o CVE-2026-23239: espintcp: Fix race condition in espintcp_close() (bsc#
1259485).
o CVE-2026-23240: tls: Fix race condition in tls_sw_cancel_work_tx() (bsc#
1259484).
o CVE-2026-23242: RDMA/siw: Fix potential NULL pointer dereference in header
processing (bsc#1259795).
o CVE-2026-23243: RDMA/umad: Reject negative data_len in ib_umad_write (bsc#
1259797).
o CVE-2026-23255: net: add proper RCU protection to /proc/net/ptype (bsc#
1259891).
o CVE-2026-23262: gve: Fix stats report corruption on queue count change (bsc
#1259870).
o CVE-2026-23270: net/sched: Only allow act_ct to bind to clsact/ingress
qdiscs and shared blocks (bsc#1259886).
o CVE-2026-23272: netfilter: nf_tables: unconditionally bump set->nelems
before insertion (bsc#1260009).
o CVE-2026-23274: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer
labels (bsc#1260005).
o CVE-2026-23277: net/sched: teql: fix NULL pointer dereference in
iptunnel_xmit on TEQL slave xmit (bsc#1259997).
o CVE-2026-23278: netfilter: nf_tables: always walk all pending catchall
elements (bsc#1259998).
o CVE-2026-23281: wifi: libertas: fix use-after-free in lbs_free_adapter()
(bsc#1260464).
o CVE-2026-23292: scsi: target: Fix recursive locking in __configfs_open_file
() (bsc#1260500).
o CVE-2026-23293: net: vxlan: fix nd_tbl NULL dereference when IPv6 is
disabled (bsc#1260486).
o CVE-2026-23297: nfsd: Fix cred ref leak in nfsd_nl_threads_set_doit() (bsc#
1260490).
o CVE-2026-23304: ipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu() (bsc#
1260544).
o CVE-2026-23319: bpf: Fix a UAF issue in bpf_trampoline_link_cgroup_shim
(bsc#1260735).
o CVE-2026-23326: xsk: Fix fragment node deletion to prevent buffer leak (bsc
#1260606).
o CVE-2026-23335: RDMA/irdma: Fix kernel stack leak in irdma_create_user_ah()
(bsc#1260550).
o CVE-2026-23343: xdp: produce a warning when calculated tailroom is negative
(bsc#1260527).
o CVE-2026-23361: PCI: dwc: ep: Flush MSI-X write before unmapping its ATU
entry (bsc#1260732).
o CVE-2026-23379: net/sched: ets: fix divide by zero in the offload path (bsc
#1260481).
o CVE-2026-23381: net: bridge: fix nd_tbl NULL dereference when IPv6 is
disabled (bsc#1260471).
o CVE-2026-23383: bpf, arm64: Force 8-byte alignment for JIT buffer to
prevent atomic tearing (bsc#1260497).
o CVE-2026-23386: gve: fix incorrect buffer cleanup in
gve_tx_clean_pending_packets for QPL (bsc#1260799).
o CVE-2026-23393: bridge: cfm: Fix race condition in peer_mep deletion (bsc#
1260522).
o CVE-2026-23398: icmp: fix NULL pointer dereference in icmp_tag_validation()
(bsc#1260730).
o CVE-2026-23413: clsact: Fix use-after-free in init/destroy rollback
asymmetry (bsc#1261498).
o CVE-2026-23414: tls: Purge async_hold in tls_decrypt_async_wait() (bsc#
1261496).
o CVE-2026-23419: net/rds: Fix circular locking dependency in rds_tcp_tune
(bsc#1261507).
o CVE-2026-23425: KVM: arm64: Fix ID register initialization for
non-protected pKVM guests (bsc#1261506).
o CVE-2026-31788: xen/privcmd: restrict usage in unprivileged domU (bsc#
1259707).
The following non security issues were fixed:
o KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO
SPTE (bsc#1259461).
o KVM: x86: synthesize CPUID bits only if CPU capability is set (bsc#
1257511).
o Revert "drm/i915/display: Add quirk to skip retraining of dp link (bsc#
1253129)."
o Update config files (bsc#1254307).
o apparmor: Fix double free of ns_name in aa_replace_profiles() (bsc#
1258849).
o apparmor: fix differential encoding verification (bsc#1258849).
o apparmor: fix memory leak in verify_header (bsc#1258849).
o apparmor: fix missing bounds check on DEFAULT table in verify_dfa() (bsc#
1258849).
o apparmor: fix race between freeing data and fs accessing it (bsc#1258849).
o apparmor: fix race on rawdata dereference (bsc#1258849).
o apparmor: fix side-effect bug in match_char() macro usage (bsc#1258849).
o apparmor: fix unprivileged local user can do privileged policy management
(bsc#1258849).
o apparmor: fix: limit the number of levels of policy namespaces (bsc#
1258849).
o apparmor: replace recursive profile removal with iterative approach (bsc#
1258849).
o apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#
1258849).
o bpf, btf: Enforce destructor kfunc type with CFI (bsc#1259955).
o bpf: crypto: Use the correct destructor kfunc type (bsc#1259955).
o btrfs: only enforce free space tree if v1 cache is required for bs < ps
cases (bsc#1260459).
o btrfs: tracepoints: get correct superblock from dentry in event
btrfs_sync_file() (bsc#1257777).
o dmaengine: sh: rz-dmac: Move CHCTRL updates under spinlock (git-fixes).
o drm/amdkfd: Unreserve bo if queue update failed (git-fixes).
o drm/i915/display: Add module param to skip retraining of dp link (bsc#
1253129).
o drm/i915/dsc: Add Selective Update register definitions (stable-fixes).
o drm/i915/dsc: Add helper for writing DSC Selective Update ET parameters
(stable-fixes).
o firmware: microchip: fail auto-update probe if no flash found (git-fixes).
o kABI: Include trace recursion bits in kABI tracking (bsc#1258301).
o net: mana: Trigger VF reset/recovery on health check failure due to HWC
timeout (bsc#1259580).
o nvme: add support for dynamic quirk configuration via module parameter (bsc
#1243208).
o nvme: expose active quirks in sysfs (bsc#1243208).
o nvme: fix memory leak in quirks_param_set() (bsc#1243208).
o powerpc/crash: adjust the elfcorehdr size (jsc#PED-11175 git-fixes).
o powerpc/kdump: Fix size calculation for hot-removed memory ranges (jsc#
PED-11175 git-fixes).
o s390/cio: Update purge function to unregister the unused subchannels (bsc#
1254214).
o s390/ipl: Clear SBP flag when bootprog is set (bsc#1258175).
o s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP (bsc#1254306).
o scsi: fnic: Add Cisco hardware model names (jsc#PED-15441).
o scsi: fnic: Add and integrate support for FDMI (jsc#PED-15441).
o scsi: fnic: Add and integrate support for FIP (jsc#PED-15441).
o scsi: fnic: Add functionality in fnic to support FDLS (jsc#PED-15441).
o scsi: fnic: Add headers and definitions for FDLS (jsc#PED-15441).
o scsi: fnic: Add stats and related functionality (jsc#PED-15441).
o scsi: fnic: Add support for fabric based solicited requests and responses
(jsc#PED-15441).
o scsi: fnic: Add support for target based solicited requests and responses
(jsc#PED-15441).
o scsi: fnic: Add support for unsolicited requests and responses (jsc#
PED-15441).
o scsi: fnic: Add support to handle port channel RSCN (jsc#PED-15441).
o scsi: fnic: Code cleanup (jsc#PED-15441).
o scsi: fnic: Delete incorrect debugfs error handling (jsc#PED-15441).
o scsi: fnic: Fix crash in fnic_wq_cmpl_handler when FDMI times out (jsc#
PED-15441).
o scsi: fnic: Fix indentation and remove unnecessary parenthesis (jsc#
PED-15441).
o scsi: fnic: Fix missing DMA mapping error in fnic_send_frame() (jsc#
PED-15441).
o scsi: fnic: Fix use of uninitialized value in debug message (jsc#
PED-15441).
o scsi: fnic: Increment driver version (jsc#PED-15441).
o scsi: fnic: Modify IO path to use FDLS (jsc#PED-15441).
o scsi: fnic: Modify fnic interfaces to use FDLS (jsc#PED-15441).
o scsi: fnic: Propagate SCSI error code from fnic_scsi_drv_init() (jsc#
PED-15441).
o scsi: fnic: Remove always-true IS_FNIC_FCP_INITIATOR macro (jsc#PED-15441).
o scsi: fnic: Remove extern definition from .c files (jsc#PED-15441).
o scsi: fnic: Remove unnecessary debug print (jsc#PED-15441).
o scsi: fnic: Remove unnecessary else and unnecessary break in FDLS (jsc#
PED-15441).
o scsi: fnic: Remove unnecessary else to fix warning in FDLS FIP (jsc#
PED-15441).
o scsi: fnic: Remove unnecessary spinlock locking and unlocking (jsc#
PED-15441).
o scsi: fnic: Replace fnic->lock_flags with local flags (jsc#PED-15441).
o scsi: fnic: Replace shost_printk() with dev_info()/dev_err() (jsc#
PED-15441).
o scsi: fnic: Replace use of sizeof with standard usage (jsc#PED-15441).
o scsi: fnic: Return appropriate error code for mem alloc failure (jsc#
PED-15441).
o scsi: fnic: Return appropriate error code from failure of scsi drv init
(jsc#PED-15441).
o scsi: fnic: Test for memory allocation failure and return error code (jsc#
PED-15441).
o scsi: fnic: Turn off FDMI ACTIVE flags on link down (jsc#PED-15441).
o scsi: hisi_sas: Fix NULL pointer exception during user_scan() (bsc#
1255687).
o scsi: scsi_transport_sas: Fix the maximum channel scanning issue (bsc#
1255687, git-fixes).
o scsi: smartpqi: Fix memory leak in pqi_report_phys_luns() (git-fixes, jsc#
PED-15042).
o selftests/bpf: Use the correct destructor kfunc type (bsc#1259955).
o selftests/powerpc: Suppress -Wmaybe-uninitialized with GCC 15 (bsc#1261669
ltc#212590).
o tg3: Fix race for querying speed/duplex (bsc#1257183).
o x86/platform/uv: Handle deconfigured sockets (bsc#1260347).
Special Instructions and Notes:
o Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
o SUSE Linux Micro 6.2
zypper in -t patch SUSE-SL-Micro-6.2-596=1
Package List:
o SUSE Linux Micro 6.2 (noarch)
kernel-macros-6.12.0-160000.28.1
kernel-devel-6.12.0-160000.28.1
kernel-source-6.12.0-160000.28.1
o SUSE Linux Micro 6.2 (aarch64 ppc64le x86_64)
kernel-default-base-6.12.0-160000.27.1.160000.2.8
o SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64 nosrc)
kernel-default-6.12.0-160000.28.1
o SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64)
kernel-default-debuginfo-6.12.0-160000.28.1
kernel-default-extra-6.12.0-160000.28.1
kernel-default-devel-6.12.0-160000.28.1
kernel-default-debugsource-6.12.0-160000.28.1
kernel-default-extra-debuginfo-6.12.0-160000.28.1
o SUSE Linux Micro 6.2 (x86_64)
kernel-rt-devel-debuginfo-6.12.0-160000.28.1
kernel-rt-livepatch-6.12.0-160000.28.1
kernel-default-devel-debuginfo-6.12.0-160000.28.1
o SUSE Linux Micro 6.2 (ppc64le s390x x86_64)
kernel-default-livepatch-6.12.0-160000.28.1
o SUSE Linux Micro 6.2 (aarch64 nosrc x86_64)
kernel-rt-6.12.0-160000.28.1
o SUSE Linux Micro 6.2 (aarch64 x86_64)
kernel-rt-devel-6.12.0-160000.28.1
kernel-rt-debugsource-6.12.0-160000.28.1
kernel-rt-debuginfo-6.12.0-160000.28.1
o SUSE Linux Micro 6.2 (aarch64 nosrc)
kernel-64kb-6.12.0-160000.28.1
o SUSE Linux Micro 6.2 (aarch64)
kernel-64kb-debugsource-6.12.0-160000.28.1
kernel-64kb-devel-6.12.0-160000.28.1
kernel-64kb-debuginfo-6.12.0-160000.28.1
References:
o https://www.suse.com/security/cve/CVE-2025-39998.html
o https://www.suse.com/security/cve/CVE-2025-40253.html
o https://www.suse.com/security/cve/CVE-2025-68794.html
o https://www.suse.com/security/cve/CVE-2025-71239.html
o https://www.suse.com/security/cve/CVE-2026-23072.html
o https://www.suse.com/security/cve/CVE-2026-23103.html
o https://www.suse.com/security/cve/CVE-2026-23120.html
o https://www.suse.com/security/cve/CVE-2026-23125.html
o https://www.suse.com/security/cve/CVE-2026-23138.html
o https://www.suse.com/security/cve/CVE-2026-23140.html
o https://www.suse.com/security/cve/CVE-2026-23187.html
o https://www.suse.com/security/cve/CVE-2026-23193.html
o https://www.suse.com/security/cve/CVE-2026-23201.html
o https://www.suse.com/security/cve/CVE-2026-23204.html
o https://www.suse.com/security/cve/CVE-2026-23215.html
o https://www.suse.com/security/cve/CVE-2026-23216.html
o https://www.suse.com/security/cve/CVE-2026-23231.html
o https://www.suse.com/security/cve/CVE-2026-23239.html
o https://www.suse.com/security/cve/CVE-2026-23240.html
o https://www.suse.com/security/cve/CVE-2026-23242.html
o https://www.suse.com/security/cve/CVE-2026-23243.html
o https://www.suse.com/security/cve/CVE-2026-23255.html
o https://www.suse.com/security/cve/CVE-2026-23262.html
o https://www.suse.com/security/cve/CVE-2026-23270.html
o https://www.suse.com/security/cve/CVE-2026-23272.html
o https://www.suse.com/security/cve/CVE-2026-23274.html
o https://www.suse.com/security/cve/CVE-2026-23277.html
o https://www.suse.com/security/cve/CVE-2026-23278.html
o https://www.suse.com/security/cve/CVE-2026-23281.html
o https://www.suse.com/security/cve/CVE-2026-23292.html
o https://www.suse.com/security/cve/CVE-2026-23293.html
o https://www.suse.com/security/cve/CVE-2026-23297.html
o https://www.suse.com/security/cve/CVE-2026-23304.html
o https://www.suse.com/security/cve/CVE-2026-23319.html
o https://www.suse.com/security/cve/CVE-2026-23326.html
o https://www.suse.com/security/cve/CVE-2026-23335.html
o https://www.suse.com/security/cve/CVE-2026-23343.html
o https://www.suse.com/security/cve/CVE-2026-23361.html
o https://www.suse.com/security/cve/CVE-2026-23379.html
o https://www.suse.com/security/cve/CVE-2026-23381.html
o https://www.suse.com/security/cve/CVE-2026-23383.html
o https://www.suse.com/security/cve/CVE-2026-23386.html
o https://www.suse.com/security/cve/CVE-2026-23393.html
o https://www.suse.com/security/cve/CVE-2026-23398.html
o https://www.suse.com/security/cve/CVE-2026-23413.html
o https://www.suse.com/security/cve/CVE-2026-23414.html
o https://www.suse.com/security/cve/CVE-2026-23419.html
o https://www.suse.com/security/cve/CVE-2026-23425.html
o https://www.suse.com/security/cve/CVE-2026-31788.html
o https://bugzilla.suse.com/show_bug.cgi?id=1191256
o https://bugzilla.suse.com/show_bug.cgi?id=1191270
o https://bugzilla.suse.com/show_bug.cgi?id=1194778
o https://bugzilla.suse.com/show_bug.cgi?id=1207184
o https://bugzilla.suse.com/show_bug.cgi?id=1217845
o https://bugzilla.suse.com/show_bug.cgi?id=1222768
o https://bugzilla.suse.com/show_bug.cgi?id=1243208
o https://bugzilla.suse.com/show_bug.cgi?id=1252073
o https://bugzilla.suse.com/show_bug.cgi?id=1253129
o https://bugzilla.suse.com/show_bug.cgi?id=1254214
o https://bugzilla.suse.com/show_bug.cgi?id=1254306
o https://bugzilla.suse.com/show_bug.cgi?id=1254307
o https://bugzilla.suse.com/show_bug.cgi?id=1255084
o https://bugzilla.suse.com/show_bug.cgi?id=1255687
o https://bugzilla.suse.com/show_bug.cgi?id=1256647
o https://bugzilla.suse.com/show_bug.cgi?id=1257183
o https://bugzilla.suse.com/show_bug.cgi?id=1257511
o https://bugzilla.suse.com/show_bug.cgi?id=1257708
o https://bugzilla.suse.com/show_bug.cgi?id=1257773
o https://bugzilla.suse.com/show_bug.cgi?id=1257777
o https://bugzilla.suse.com/show_bug.cgi?id=1258175
o https://bugzilla.suse.com/show_bug.cgi?id=1258280
o https://bugzilla.suse.com/show_bug.cgi?id=1258293
o https://bugzilla.suse.com/show_bug.cgi?id=1258301
o https://bugzilla.suse.com/show_bug.cgi?id=1258305
o https://bugzilla.suse.com/show_bug.cgi?id=1258330
o https://bugzilla.suse.com/show_bug.cgi?id=1258337
o https://bugzilla.suse.com/show_bug.cgi?id=1258340
o https://bugzilla.suse.com/show_bug.cgi?id=1258414
o https://bugzilla.suse.com/show_bug.cgi?id=1258447
o https://bugzilla.suse.com/show_bug.cgi?id=1258476
o https://bugzilla.suse.com/show_bug.cgi?id=1258849
o https://bugzilla.suse.com/show_bug.cgi?id=1259188
o https://bugzilla.suse.com/show_bug.cgi?id=1259461
o https://bugzilla.suse.com/show_bug.cgi?id=1259484
o https://bugzilla.suse.com/show_bug.cgi?id=1259485
o https://bugzilla.suse.com/show_bug.cgi?id=1259580
o https://bugzilla.suse.com/show_bug.cgi?id=1259707
o https://bugzilla.suse.com/show_bug.cgi?id=1259759
o https://bugzilla.suse.com/show_bug.cgi?id=1259795
o https://bugzilla.suse.com/show_bug.cgi?id=1259797
o https://bugzilla.suse.com/show_bug.cgi?id=1259870
o https://bugzilla.suse.com/show_bug.cgi?id=1259886
o https://bugzilla.suse.com/show_bug.cgi?id=1259891
o https://bugzilla.suse.com/show_bug.cgi?id=1259955
o https://bugzilla.suse.com/show_bug.cgi?id=1259997
o https://bugzilla.suse.com/show_bug.cgi?id=1259998
o https://bugzilla.suse.com/show_bug.cgi?id=1260005
o https://bugzilla.suse.com/show_bug.cgi?id=1260009
o https://bugzilla.suse.com/show_bug.cgi?id=1260347
o https://bugzilla.suse.com/show_bug.cgi?id=1260459
o https://bugzilla.suse.com/show_bug.cgi?id=1260464
o https://bugzilla.suse.com/show_bug.cgi?id=1260471
o https://bugzilla.suse.com/show_bug.cgi?id=1260481
o https://bugzilla.suse.com/show_bug.cgi?id=1260486
o https://bugzilla.suse.com/show_bug.cgi?id=1260490
o https://bugzilla.suse.com/show_bug.cgi?id=1260497
o https://bugzilla.suse.com/show_bug.cgi?id=1260500
o https://bugzilla.suse.com/show_bug.cgi?id=1260522
o https://bugzilla.suse.com/show_bug.cgi?id=1260527
o https://bugzilla.suse.com/show_bug.cgi?id=1260544
o https://bugzilla.suse.com/show_bug.cgi?id=1260550
o https://bugzilla.suse.com/show_bug.cgi?id=1260606
o https://bugzilla.suse.com/show_bug.cgi?id=1260730
o https://bugzilla.suse.com/show_bug.cgi?id=1260732
o https://bugzilla.suse.com/show_bug.cgi?id=1260735
o https://bugzilla.suse.com/show_bug.cgi?id=1260799
o https://bugzilla.suse.com/show_bug.cgi?id=1261496
o https://bugzilla.suse.com/show_bug.cgi?id=1261498
o https://bugzilla.suse.com/show_bug.cgi?id=1261506
o https://bugzilla.suse.com/show_bug.cgi?id=1261507
o https://bugzilla.suse.com/show_bug.cgi?id=1261669
o https://jira.suse.com/browse/PED-11175
o https://jira.suse.com/browse/PED-15042
o https://jira.suse.com/browse/PED-15441
o https://jira.suse.com/browse/PED-15986
- --------------------------END INCLUDED TEXT----------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AUSCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AUSCERT's members. As
AUSCERT did not write the document quoted above, AUSCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AUSCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://portal.auscert.org.au/bulletins/
===========================================================================
AUSCERT
The University of Queensland, Brisbane QLD 4072 Australia
e: auscert@auscert.org.au
t: +61 (0)7 3365 4417
Allies in Cyber Security
===========================================================================