Fyi there is a new problem in the linux kernel similar to Copy Fail that was fixed a few days ago. Unfortunately there is again an exploit published
The current 16.0 kernel 6.12.0-160000.29-default and the current Tumbleweed kernel 7.0.3-1-default are affected. For mitigation create a file /etc/modprobe.d/10-dirtyfrag.conf with content
blacklist esp4
install esp4 /bin/false
blacklist esp6
install esp6 /bin/false
blacklist rxrpc
install rxrpc /bin/false
and then unload these modules or reboot. Please be aware that this mitigation will break IPSEC VPN that use the ESP protocol. There is no CVE number as fa as i know for this.