ESB-2026.4102 PUBLISHED CVSS 8.199999809265137 HIGH

=========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2026.4102 Security update for the Linux Kernel 23 April 2026 =========================================================================== AUSCERT Security Bulletin Summary --------------------------------- Product: Linux Kernel Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2025-71239 CVE-2026-23138 CVE-2026-23140 CVE-2026-23239 CVE-2026-23120 CVE-2026-23240 CVE-2026-23242 CVE-2026-23255 CVE-2026-23262 CVE-2026-23270 CVE-2026-23243 CVE-2026-23281 CVE-2026-23272 CVE-2026-23297 CVE-2026-23274 CVE-2026-23277 CVE-2026-23278 CVE-2026-23293 CVE-2026-23292 CVE-2026-23304 CVE-2026-23319 CVE-2026-23326 CVE-2026-23335 CVE-2026-23343 CVE-2026-23361 CVE-2026-23379 CVE-2026-23381 CVE-2026-23383 CVE-2026-23386 CVE-2026-23393 CVE-2026-23413 CVE-2026-23414 CVE-2026-23419 CVE-2025-68794 CVE-2026-23425 CVE-2026-23187 CVE-2026-23193 CVE-2026-23201 CVE-2026-23125 CVE-2026-23204 CVE-2026-23215 CVE-2026-23216 CVE-2025-40253 CVE-2026-31788 CVE-2026-5201 CVE-2026-23072 CVE-2025-39998 CVE-2026-23398 CVE-2026-23103 CVE-2026-23231 Original Bulletin: https://www.suse.com/support/update/announcement/2026/suse-su-202621230-1 Comment: CVSS (Max): 8.2 CVE-2026-31788 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H) CVSS Source: SUSE, [kernel.org] Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H EPSS (Max): 0.2% (43rd) CVE-2025-39998 2026-04-22 - --------------------------BEGIN INCLUDED TEXT-------------------- Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:21230-1 Release Date: 2026-04-20T15:09:00Z Rating: important o bsc#1191256 o bsc#1191270 o bsc#1194778 o bsc#1207184 o bsc#1217845 o bsc#1222768 o bsc#1243208 o bsc#1252073 o bsc#1253129 o bsc#1254214 o bsc#1254306 o bsc#1254307 o bsc#1255084 o bsc#1255687 o bsc#1256647 o bsc#1257183 o bsc#1257511 o bsc#1257708 o bsc#1257773 o bsc#1257777 o bsc#1258175 o bsc#1258280 o bsc#1258293 o bsc#1258301 o bsc#1258305 o bsc#1258330 o bsc#1258337 o bsc#1258340 o bsc#1258414 o bsc#1258447 o bsc#1258476 o bsc#1258849 o bsc#1259188 o bsc#1259461 o bsc#1259484 o bsc#1259485 o bsc#1259580 o bsc#1259707 References: o bsc#1259759 o bsc#1259795 o bsc#1259797 o bsc#1259870 o bsc#1259886 o bsc#1259891 o bsc#1259955 o bsc#1259997 o bsc#1259998 o bsc#1260005 o bsc#1260009 o bsc#1260347 o bsc#1260459 o bsc#1260464 o bsc#1260471 o bsc#1260481 o bsc#1260486 o bsc#1260490 o bsc#1260497 o bsc#1260500 o bsc#1260522 o bsc#1260527 o bsc#1260544 o bsc#1260550 o bsc#1260606 o bsc#1260730 o bsc#1260732 o bsc#1260735 o bsc#1260799 o bsc#1261210 o bsc#1261496 o bsc#1261498 o bsc#1261506 o bsc#1261507 o bsc#1261669 o jsc#PED-11175 o jsc#PED-15042 o jsc#PED-15441 o jsc#PED-15986 o CVE-2025-39998 o CVE-2025-40253 o CVE-2025-68794 o CVE-2025-71239 o CVE-2026-23072 o CVE-2026-23103 o CVE-2026-23120 o CVE-2026-23125 o CVE-2026-23138 o CVE-2026-23140 o CVE-2026-23187 o CVE-2026-23193 o CVE-2026-23201 o CVE-2026-23204 o CVE-2026-23215 o CVE-2026-23216 o CVE-2026-23231 o CVE-2026-23239 o CVE-2026-23240 o CVE-2026-23242 o CVE-2026-23243 o CVE-2026-23255 o CVE-2026-23262 o CVE-2026-23270 o CVE-2026-23272 Cross-References: o CVE-2026-23274 o CVE-2026-23277 o CVE-2026-23278 o CVE-2026-23281 o CVE-2026-23292 o CVE-2026-23293 o CVE-2026-23297 o CVE-2026-23304 o CVE-2026-23319 o CVE-2026-23326 o CVE-2026-23335 o CVE-2026-23343 o CVE-2026-23361 o CVE-2026-23379 o CVE-2026-23381 o CVE-2026-23383 o CVE-2026-23386 o CVE-2026-23393 o CVE-2026-23398 o CVE-2026-23413 o CVE-2026-23414 o CVE-2026-23419 o CVE-2026-23425 o CVE-2026-31788 o CVE-2026-5201 o CVE-2025-39998 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L /UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N o CVE-2025-39998 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:L/A:H o CVE-2025-40253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2025-68794 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L /UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N o CVE-2025-68794 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:H/I:N/A:H o CVE-2025-71239 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L /UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N o CVE-2025-71239 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:L/A:N o CVE-2026-23072 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L /UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-23072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23072 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:N/I:N/A:H o CVE-2026-23103 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L /UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-23103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23103 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:N/I:N/A:H o CVE-2026-23103 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H o CVE-2026-23120 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L /UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-23120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23120 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:N/I:N/A:H o CVE-2026-23125 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L /UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-23125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23125 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:N/I:N/A:H o CVE-2026-23138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L /UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-23138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:N/I:N/A:H o CVE-2026-23140 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L /UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-23140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:N/I:N/A:H o CVE-2026-23187 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L /UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N o CVE-2026-23187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:H/I:N/A:N o CVE-2026-23187 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:N/A:H o CVE-2026-23193 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:L/I:L/A:H o CVE-2026-23193 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H o CVE-2026-23193 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H o CVE-2026-23201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L /UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-23201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:N/I:N/A:H o CVE-2026-23204 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L /UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N o CVE-2026-23204 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:H/I:H/A:H o CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:N/A:H o CVE-2026-23204 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:N/A:H o CVE-2026-23215 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L /UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-23215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23215 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:N/I:N/A:H o CVE-2026-23216 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L /UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-23216 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23216 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H o CVE-2026-23231 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L /UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N o CVE-2026-23231 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:H/I:H/A:H o CVE-2026-23231 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H o CVE-2026-23231 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H o CVE-2026-23239 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L /UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N o CVE-2026-23239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:H/I:H/A:H o CVE-2026-23239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H o CVE-2026-23240 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L /UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N o CVE-2026-23240 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:H/I:H/A:H o CVE-2026-23240 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/ S:U/C:H/I:H/A:H o CVE-2026-23242 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L /UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-23242 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23242 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/ S:U/C:N/I:N/A:H o CVE-2026-23243 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L /UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N o CVE-2026-23243 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:H/I:H/A:H CVSS scores: o CVE-2026-23243 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H o CVE-2026-23255 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L /UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-23255 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23262 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L /UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N o CVE-2026-23262 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:N/I:H/A:H o CVE-2026-23270 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23270 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H o CVE-2026-23272 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L /UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N o CVE-2026-23272 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:H/I:H/A:H o CVE-2026-23272 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H o CVE-2026-23274 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L /UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N o CVE-2026-23274 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:H/I:H/A:H o CVE-2026-23274 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H o CVE-2026-23277 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N /UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-23277 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23278 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L /UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N o CVE-2026-23278 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:H/I:H/A:H o CVE-2026-23278 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H o CVE-2026-23281 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:L/AT:P/PR:L /UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N o CVE-2026-23281 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N /S:U/C:H/I:H/A:H o CVE-2026-23292 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H /UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-23292 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23293 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N /UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-23293 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23297 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23304 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L /UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-23304 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23319 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H /UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N o CVE-2026-23319 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N /S:U/C:H/I:H/A:H o CVE-2026-23326 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L /UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-23326 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23335 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L /UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N o CVE-2026-23335 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:L/I:N/A:N o CVE-2026-23343 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L /UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-23343 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23361 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H /UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N o CVE-2026-23361 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N /S:U/C:N/I:H/A:N o CVE-2026-23379 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23381 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23383 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23383 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H o CVE-2026-23386 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L /UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-23386 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23393 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L /UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N o CVE-2026-23393 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:H/I:H/A:H o CVE-2026-23393 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/ S:U/C:H/I:H/A:H o CVE-2026-23398 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:N /UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-23398 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23413 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H /UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N o CVE-2026-23413 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N /S:U/C:H/I:H/A:H o CVE-2026-23414 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L /UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-23414 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23419 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L /UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-23419 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N /S:U/C:N/I:N/A:H o CVE-2026-23425 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L /UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N o CVE-2026-23425 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N /S:U/C:N/I:H/A:H o CVE-2026-31788 ( NVD ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/ S:C/C:H/I:H/A:H o CVE-2026-5201 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/ UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N o CVE-2026-5201 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/ S:U/C:N/I:N/A:H o CVE-2026-5201 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/ S:U/C:N/I:N/A:H Affected o SUSE Linux Micro 6.2 Products: o SUSE Linux Micro Extras 6.2 An update that solves 50 vulnerabilities, contains four features and has 23 fixes can now be installed. Security update for the Linux Kernel Description: The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues The following security issues were fixed: o CVE-2025-39998: scsi: target: target_core_configfs: Add length check to avoid buffer overflow (bsc#1252073). o CVE-2025-40253: s390/ctcm: Fix double-kfree (bsc#1255084). o CVE-2025-68794: iomap: adjust read range correctly for non-block-aligned positions (bsc#1256647). o CVE-2025-71239: audit: add fchmodat2() to change attributes class (bsc# 1259759). o CVE-2026-23072: l2tp: Fix memleak in l2tp_udp_encap_recv() (bsc#1257708). o CVE-2026-23103: ipvlan: Make the addrs_lock be per port (bsc#1257773). o CVE-2026-23120: l2tp: avoid one data-race in l2tp_tunnel_del_work() (bsc# 1258280). o CVE-2026-23125: sctp: move SCTP_CMD_ASSOC_SHKEY right after SCTP_CMD_PEER_INIT (bsc#1258293). o CVE-2026-23138: kABI: Preserve values of the trace recursion bits (bsc# 1258301). o CVE-2026-23140: bpf, test_run: Subtract size of xdp_frame from allowed metadata size (bsc#1258305). o CVE-2026-23187: pmdomain: imx8m-blk-ctrl: fix out-of-range access of bc-> domains (bsc#1258330). o CVE-2026-23193: scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count() (bsc#1258414). o CVE-2026-23201: ceph: fix oops due to invalid pointer for kfree() in parse_longname() (bsc#1258337). o CVE-2026-23204: net: add skb_header_pointer_careful() helper (bsc#1258340). o CVE-2026-23215: x86/vmware: Fix hypercall clobbers (bsc#1258476). o CVE-2026-23216: scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count() (bsc#1258447). o CVE-2026-23231: netfilter: nf_tables: fix use-after-free in nf_tables_addchain() (bsc#1259188). o CVE-2026-23239: espintcp: Fix race condition in espintcp_close() (bsc# 1259485). o CVE-2026-23240: tls: Fix race condition in tls_sw_cancel_work_tx() (bsc# 1259484). o CVE-2026-23242: RDMA/siw: Fix potential NULL pointer dereference in header processing (bsc#1259795). o CVE-2026-23243: RDMA/umad: Reject negative data_len in ib_umad_write (bsc# 1259797). o CVE-2026-23255: net: add proper RCU protection to /proc/net/ptype (bsc# 1259891). o CVE-2026-23262: gve: Fix stats report corruption on queue count change (bsc #1259870). o CVE-2026-23270: net/sched: Only allow act_ct to bind to clsact/ingress qdiscs and shared blocks (bsc#1259886). o CVE-2026-23272: netfilter: nf_tables: unconditionally bump set->nelems before insertion (bsc#1260009). o CVE-2026-23274: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels (bsc#1260005). o CVE-2026-23277: net/sched: teql: fix NULL pointer dereference in iptunnel_xmit on TEQL slave xmit (bsc#1259997). o CVE-2026-23278: netfilter: nf_tables: always walk all pending catchall elements (bsc#1259998). o CVE-2026-23281: wifi: libertas: fix use-after-free in lbs_free_adapter() (bsc#1260464). o CVE-2026-23292: scsi: target: Fix recursive locking in __configfs_open_file () (bsc#1260500). o CVE-2026-23293: net: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled (bsc#1260486). o CVE-2026-23297: nfsd: Fix cred ref leak in nfsd_nl_threads_set_doit() (bsc# 1260490). o CVE-2026-23304: ipv6: fix NULL pointer deref in ip6_rt_get_dev_rcu() (bsc# 1260544). o CVE-2026-23319: bpf: Fix a UAF issue in bpf_trampoline_link_cgroup_shim (bsc#1260735). o CVE-2026-23326: xsk: Fix fragment node deletion to prevent buffer leak (bsc #1260606). o CVE-2026-23335: RDMA/irdma: Fix kernel stack leak in irdma_create_user_ah() (bsc#1260550). o CVE-2026-23343: xdp: produce a warning when calculated tailroom is negative (bsc#1260527). o CVE-2026-23361: PCI: dwc: ep: Flush MSI-X write before unmapping its ATU entry (bsc#1260732). o CVE-2026-23379: net/sched: ets: fix divide by zero in the offload path (bsc #1260481). o CVE-2026-23381: net: bridge: fix nd_tbl NULL dereference when IPv6 is disabled (bsc#1260471). o CVE-2026-23383: bpf, arm64: Force 8-byte alignment for JIT buffer to prevent atomic tearing (bsc#1260497). o CVE-2026-23386: gve: fix incorrect buffer cleanup in gve_tx_clean_pending_packets for QPL (bsc#1260799). o CVE-2026-23393: bridge: cfm: Fix race condition in peer_mep deletion (bsc# 1260522). o CVE-2026-23398: icmp: fix NULL pointer dereference in icmp_tag_validation() (bsc#1260730). o CVE-2026-23413: clsact: Fix use-after-free in init/destroy rollback asymmetry (bsc#1261498). o CVE-2026-23414: tls: Purge async_hold in tls_decrypt_async_wait() (bsc# 1261496). o CVE-2026-23419: net/rds: Fix circular locking dependency in rds_tcp_tune (bsc#1261507). o CVE-2026-23425: KVM: arm64: Fix ID register initialization for non-protected pKVM guests (bsc#1261506). o CVE-2026-31788: xen/privcmd: restrict usage in unprivileged domU (bsc# 1259707). The following non security issues were fixed: o KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE (bsc#1259461). o KVM: x86: synthesize CPUID bits only if CPU capability is set (bsc# 1257511). o Revert "drm/i915/display: Add quirk to skip retraining of dp link (bsc# 1253129)." o Update config files (bsc#1254307). o apparmor: Fix double free of ns_name in aa_replace_profiles() (bsc# 1258849). o apparmor: fix differential encoding verification (bsc#1258849). o apparmor: fix memory leak in verify_header (bsc#1258849). o apparmor: fix missing bounds check on DEFAULT table in verify_dfa() (bsc# 1258849). o apparmor: fix race between freeing data and fs accessing it (bsc#1258849). o apparmor: fix race on rawdata dereference (bsc#1258849). o apparmor: fix side-effect bug in match_char() macro usage (bsc#1258849). o apparmor: fix unprivileged local user can do privileged policy management (bsc#1258849). o apparmor: fix: limit the number of levels of policy namespaces (bsc# 1258849). o apparmor: replace recursive profile removal with iterative approach (bsc# 1258849). o apparmor: validate DFA start states are in bounds in unpack_pdb (bsc# 1258849). o bpf, btf: Enforce destructor kfunc type with CFI (bsc#1259955). o bpf: crypto: Use the correct destructor kfunc type (bsc#1259955). o btrfs: only enforce free space tree if v1 cache is required for bs < ps cases (bsc#1260459). o btrfs: tracepoints: get correct superblock from dentry in event btrfs_sync_file() (bsc#1257777). o dmaengine: sh: rz-dmac: Move CHCTRL updates under spinlock (git-fixes). o drm/amdkfd: Unreserve bo if queue update failed (git-fixes). o drm/i915/display: Add module param to skip retraining of dp link (bsc# 1253129). o drm/i915/dsc: Add Selective Update register definitions (stable-fixes). o drm/i915/dsc: Add helper for writing DSC Selective Update ET parameters (stable-fixes). o firmware: microchip: fail auto-update probe if no flash found (git-fixes). o kABI: Include trace recursion bits in kABI tracking (bsc#1258301). o net: mana: Trigger VF reset/recovery on health check failure due to HWC timeout (bsc#1259580). o nvme: add support for dynamic quirk configuration via module parameter (bsc #1243208). o nvme: expose active quirks in sysfs (bsc#1243208). o nvme: fix memory leak in quirks_param_set() (bsc#1243208). o powerpc/crash: adjust the elfcorehdr size (jsc#PED-11175 git-fixes). o powerpc/kdump: Fix size calculation for hot-removed memory ranges (jsc# PED-11175 git-fixes). o s390/cio: Update purge function to unregister the unused subchannels (bsc# 1254214). o s390/ipl: Clear SBP flag when bootprog is set (bsc#1258175). o s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP (bsc#1254306). o scsi: fnic: Add Cisco hardware model names (jsc#PED-15441). o scsi: fnic: Add and integrate support for FDMI (jsc#PED-15441). o scsi: fnic: Add and integrate support for FIP (jsc#PED-15441). o scsi: fnic: Add functionality in fnic to support FDLS (jsc#PED-15441). o scsi: fnic: Add headers and definitions for FDLS (jsc#PED-15441). o scsi: fnic: Add stats and related functionality (jsc#PED-15441). o scsi: fnic: Add support for fabric based solicited requests and responses (jsc#PED-15441). o scsi: fnic: Add support for target based solicited requests and responses (jsc#PED-15441). o scsi: fnic: Add support for unsolicited requests and responses (jsc# PED-15441). o scsi: fnic: Add support to handle port channel RSCN (jsc#PED-15441). o scsi: fnic: Code cleanup (jsc#PED-15441). o scsi: fnic: Delete incorrect debugfs error handling (jsc#PED-15441). o scsi: fnic: Fix crash in fnic_wq_cmpl_handler when FDMI times out (jsc# PED-15441). o scsi: fnic: Fix indentation and remove unnecessary parenthesis (jsc# PED-15441). o scsi: fnic: Fix missing DMA mapping error in fnic_send_frame() (jsc# PED-15441). o scsi: fnic: Fix use of uninitialized value in debug message (jsc# PED-15441). o scsi: fnic: Increment driver version (jsc#PED-15441). o scsi: fnic: Modify IO path to use FDLS (jsc#PED-15441). o scsi: fnic: Modify fnic interfaces to use FDLS (jsc#PED-15441). o scsi: fnic: Propagate SCSI error code from fnic_scsi_drv_init() (jsc# PED-15441). o scsi: fnic: Remove always-true IS_FNIC_FCP_INITIATOR macro (jsc#PED-15441). o scsi: fnic: Remove extern definition from .c files (jsc#PED-15441). o scsi: fnic: Remove unnecessary debug print (jsc#PED-15441). o scsi: fnic: Remove unnecessary else and unnecessary break in FDLS (jsc# PED-15441). o scsi: fnic: Remove unnecessary else to fix warning in FDLS FIP (jsc# PED-15441). o scsi: fnic: Remove unnecessary spinlock locking and unlocking (jsc# PED-15441). o scsi: fnic: Replace fnic->lock_flags with local flags (jsc#PED-15441). o scsi: fnic: Replace shost_printk() with dev_info()/dev_err() (jsc# PED-15441). o scsi: fnic: Replace use of sizeof with standard usage (jsc#PED-15441). o scsi: fnic: Return appropriate error code for mem alloc failure (jsc# PED-15441). o scsi: fnic: Return appropriate error code from failure of scsi drv init (jsc#PED-15441). o scsi: fnic: Test for memory allocation failure and return error code (jsc# PED-15441). o scsi: fnic: Turn off FDMI ACTIVE flags on link down (jsc#PED-15441). o scsi: hisi_sas: Fix NULL pointer exception during user_scan() (bsc# 1255687). o scsi: scsi_transport_sas: Fix the maximum channel scanning issue (bsc# 1255687, git-fixes). o scsi: smartpqi: Fix memory leak in pqi_report_phys_luns() (git-fixes, jsc# PED-15042). o selftests/bpf: Use the correct destructor kfunc type (bsc#1259955). o selftests/powerpc: Suppress -Wmaybe-uninitialized with GCC 15 (bsc#1261669 ltc#212590). o tg3: Fix race for querying speed/duplex (bsc#1257183). o x86/platform/uv: Handle deconfigured sockets (bsc#1260347). Security update for gdk-pixbuf Description: This update for gdk-pixbuf fixes the following issue: o CVE-2026-5201: Denial of Service via heap-based buffer overflow when processing a specially crafted JPEG image (bsc#1261210). Special Instructions and Notes: o Please reboot the system after installing this update. Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o SUSE Linux Micro Extras 6.2 zypper in -t patch SUSE-SLE-Micro-Extras-6.2-596=1 o SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-581=1 Package List: o SUSE Linux Micro Extras 6.2 (aarch64 ppc64le s390x x86_64) kernel-syms-6.12.0-160000.28.1 kernel-obs-build-6.12.0-160000.28.1 kernel-obs-build-debugsource-6.12.0-160000.28.1 o SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) libgdk_pixbuf-2_0-0-2.42.12-160000.4.1 typelib-1_0-GdkPixbuf-2_0-2.42.12-160000.4.1 gdk-pixbuf-query-loaders-2.42.12-160000.4.1 gdk-pixbuf-query-loaders-debuginfo-2.42.12-160000.4.1 gdk-pixbuf-debugsource-2.42.12-160000.4.1 libgdk_pixbuf-2_0-0-debuginfo-2.42.12-160000.4.1 References: o https://www.suse.com/security/cve/CVE-2025-39998.html o https://www.suse.com/security/cve/CVE-2025-40253.html o https://www.suse.com/security/cve/CVE-2025-68794.html o https://www.suse.com/security/cve/CVE-2025-71239.html o https://www.suse.com/security/cve/CVE-2026-23072.html o https://www.suse.com/security/cve/CVE-2026-23103.html o https://www.suse.com/security/cve/CVE-2026-23120.html o https://www.suse.com/security/cve/CVE-2026-23125.html o https://www.suse.com/security/cve/CVE-2026-23138.html o https://www.suse.com/security/cve/CVE-2026-23140.html o https://www.suse.com/security/cve/CVE-2026-23187.html o https://www.suse.com/security/cve/CVE-2026-23193.html o https://www.suse.com/security/cve/CVE-2026-23201.html o https://www.suse.com/security/cve/CVE-2026-23204.html o https://www.suse.com/security/cve/CVE-2026-23215.html o https://www.suse.com/security/cve/CVE-2026-23216.html o https://www.suse.com/security/cve/CVE-2026-23231.html o https://www.suse.com/security/cve/CVE-2026-23239.html o https://www.suse.com/security/cve/CVE-2026-23240.html o https://www.suse.com/security/cve/CVE-2026-23242.html o https://www.suse.com/security/cve/CVE-2026-23243.html o https://www.suse.com/security/cve/CVE-2026-23255.html o https://www.suse.com/security/cve/CVE-2026-23262.html o https://www.suse.com/security/cve/CVE-2026-23270.html o https://www.suse.com/security/cve/CVE-2026-23272.html o https://www.suse.com/security/cve/CVE-2026-23274.html o https://www.suse.com/security/cve/CVE-2026-23277.html o https://www.suse.com/security/cve/CVE-2026-23278.html o https://www.suse.com/security/cve/CVE-2026-23281.html o https://www.suse.com/security/cve/CVE-2026-23292.html o https://www.suse.com/security/cve/CVE-2026-23293.html o https://www.suse.com/security/cve/CVE-2026-23297.html o https://www.suse.com/security/cve/CVE-2026-23304.html o https://www.suse.com/security/cve/CVE-2026-23319.html o https://www.suse.com/security/cve/CVE-2026-23326.html o https://www.suse.com/security/cve/CVE-2026-23335.html o https://www.suse.com/security/cve/CVE-2026-23343.html o https://www.suse.com/security/cve/CVE-2026-23361.html o https://www.suse.com/security/cve/CVE-2026-23379.html o https://www.suse.com/security/cve/CVE-2026-23381.html o https://www.suse.com/security/cve/CVE-2026-23383.html o https://www.suse.com/security/cve/CVE-2026-23386.html o https://www.suse.com/security/cve/CVE-2026-23393.html o https://www.suse.com/security/cve/CVE-2026-23398.html o https://www.suse.com/security/cve/CVE-2026-23413.html o https://www.suse.com/security/cve/CVE-2026-23414.html o https://www.suse.com/security/cve/CVE-2026-23419.html o https://www.suse.com/security/cve/CVE-2026-23425.html o https://www.suse.com/security/cve/CVE-2026-31788.html o https://www.suse.com/security/cve/CVE-2026-5201.html o https://bugzilla.suse.com/show_bug.cgi?id=1191256 o https://bugzilla.suse.com/show_bug.cgi?id=1191270 o https://bugzilla.suse.com/show_bug.cgi?id=1194778 o https://bugzilla.suse.com/show_bug.cgi?id=1207184 o https://bugzilla.suse.com/show_bug.cgi?id=1217845 o https://bugzilla.suse.com/show_bug.cgi?id=1222768 o https://bugzilla.suse.com/show_bug.cgi?id=1243208 o https://bugzilla.suse.com/show_bug.cgi?id=1252073 o https://bugzilla.suse.com/show_bug.cgi?id=1253129 o https://bugzilla.suse.com/show_bug.cgi?id=1254214 o https://bugzilla.suse.com/show_bug.cgi?id=1254306 o https://bugzilla.suse.com/show_bug.cgi?id=1254307 o https://bugzilla.suse.com/show_bug.cgi?id=1255084 o https://bugzilla.suse.com/show_bug.cgi?id=1255687 o https://bugzilla.suse.com/show_bug.cgi?id=1256647 o https://bugzilla.suse.com/show_bug.cgi?id=1257183 o https://bugzilla.suse.com/show_bug.cgi?id=1257511 o https://bugzilla.suse.com/show_bug.cgi?id=1257708 o https://bugzilla.suse.com/show_bug.cgi?id=1257773 o https://bugzilla.suse.com/show_bug.cgi?id=1257777 o https://bugzilla.suse.com/show_bug.cgi?id=1258175 o https://bugzilla.suse.com/show_bug.cgi?id=1258280 o https://bugzilla.suse.com/show_bug.cgi?id=1258293 o https://bugzilla.suse.com/show_bug.cgi?id=1258301 o https://bugzilla.suse.com/show_bug.cgi?id=1258305 o https://bugzilla.suse.com/show_bug.cgi?id=1258330 o https://bugzilla.suse.com/show_bug.cgi?id=1258337 o https://bugzilla.suse.com/show_bug.cgi?id=1258340 o https://bugzilla.suse.com/show_bug.cgi?id=1258414 o https://bugzilla.suse.com/show_bug.cgi?id=1258447 o https://bugzilla.suse.com/show_bug.cgi?id=1258476 o https://bugzilla.suse.com/show_bug.cgi?id=1258849 o https://bugzilla.suse.com/show_bug.cgi?id=1259188 o https://bugzilla.suse.com/show_bug.cgi?id=1259461 o https://bugzilla.suse.com/show_bug.cgi?id=1259484 o https://bugzilla.suse.com/show_bug.cgi?id=1259485 o https://bugzilla.suse.com/show_bug.cgi?id=1259580 o https://bugzilla.suse.com/show_bug.cgi?id=1259707 o https://bugzilla.suse.com/show_bug.cgi?id=1259759 o https://bugzilla.suse.com/show_bug.cgi?id=1259795 o https://bugzilla.suse.com/show_bug.cgi?id=1259797 o https://bugzilla.suse.com/show_bug.cgi?id=1259870 o https://bugzilla.suse.com/show_bug.cgi?id=1259886 o https://bugzilla.suse.com/show_bug.cgi?id=1259891 o https://bugzilla.suse.com/show_bug.cgi?id=1259955 o https://bugzilla.suse.com/show_bug.cgi?id=1259997 o https://bugzilla.suse.com/show_bug.cgi?id=1259998 o https://bugzilla.suse.com/show_bug.cgi?id=1260005 o https://bugzilla.suse.com/show_bug.cgi?id=1260009 o https://bugzilla.suse.com/show_bug.cgi?id=1260347 o https://bugzilla.suse.com/show_bug.cgi?id=1260459 o https://bugzilla.suse.com/show_bug.cgi?id=1260464 o https://bugzilla.suse.com/show_bug.cgi?id=1260471 o https://bugzilla.suse.com/show_bug.cgi?id=1260481 o https://bugzilla.suse.com/show_bug.cgi?id=1260486 o https://bugzilla.suse.com/show_bug.cgi?id=1260490 o https://bugzilla.suse.com/show_bug.cgi?id=1260497 o https://bugzilla.suse.com/show_bug.cgi?id=1260500 o https://bugzilla.suse.com/show_bug.cgi?id=1260522 o https://bugzilla.suse.com/show_bug.cgi?id=1260527 o https://bugzilla.suse.com/show_bug.cgi?id=1260544 o https://bugzilla.suse.com/show_bug.cgi?id=1260550 o https://bugzilla.suse.com/show_bug.cgi?id=1260606 o https://bugzilla.suse.com/show_bug.cgi?id=1260730 o https://bugzilla.suse.com/show_bug.cgi?id=1260732 o https://bugzilla.suse.com/show_bug.cgi?id=1260735 o https://bugzilla.suse.com/show_bug.cgi?id=1260799 o https://bugzilla.suse.com/show_bug.cgi?id=1261210 o https://bugzilla.suse.com/show_bug.cgi?id=1261496 o https://bugzilla.suse.com/show_bug.cgi?id=1261498 o https://bugzilla.suse.com/show_bug.cgi?id=1261506 o https://bugzilla.suse.com/show_bug.cgi?id=1261507 o https://bugzilla.suse.com/show_bug.cgi?id=1261669 o https://jira.suse.com/browse/PED-11175 o https://jira.suse.com/browse/PED-15042 o https://jira.suse.com/browse/PED-15441 o https://jira.suse.com/browse/PED-15986 - --------------------------END INCLUDED TEXT---------------------- You have received this e-mail bulletin as a result of your organisation's registration with AUSCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AUSCERT's members. As AUSCERT did not write the document quoted above, AUSCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AUSCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://portal.auscert.org.au/bulletins/ =========================================================================== AUSCERT The University of Queensland, Brisbane QLD 4072 Australia e: auscert@auscert.org.au t: +61 (0)7 3365 4417 Allies in Cyber Security ===========================================================================

Risk Scores

CVSS v3.1
8.199999809265137
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Affected Products

VendorProductVersions
SUSELinux Kernel

Timeline

References

Open in Interactive Console →