SUSE-SU-2026:1557-1

Source
https://www.suse.com/support/update/announcement/2026/suse-su-20261557-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:1557-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2026:1557-1
Upstream
Related
Published
2026-04-22T16:24:13Z
Modified
2026-04-24T08:15:07.953528Z
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2025-38234: sched/rt: Fix race in pushrttask (bsc#1246057).
  • CVE-2025-68818: scsi: Revert 'scsi: qla2xxx: Perform lockless command completion in abort path' (bsc#1256675).
  • CVE-2026-23103: ipvlan: Make the addrs_lock be per port (bsc#1257773).
  • CVE-2026-23243: RDMA/umad: Reject negative datalen in ibumad_write (bsc#1259797).
  • CVE-2026-23272: netfilter: nf_tables: unconditionally bump set->nelems before insertion (bsc#1260009).
  • CVE-2026-23274: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels (bsc#1260005).

The following non-security bugs were fixed:

  • watchdog/perf: properly initialize the turbo mode timestamp and rearm counter (bsc#1256504).
References

Affected packages

SUSE:Linux Enterprise Micro 5.3
kernel-rt

Package

Name
kernel-rt
Purl
pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.14.21-150400.15.148.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.14.21-150400.15.148.1",
            "kernel-rt": "5.14.21-150400.15.148.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:1557-1.json"
kernel-source-rt

Package

Name
kernel-source-rt
Purl
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.14.21-150400.15.148.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.14.21-150400.15.148.1",
            "kernel-rt": "5.14.21-150400.15.148.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:1557-1.json"
SUSE:Linux Enterprise Micro 5.4
kernel-rt

Package

Name
kernel-rt
Purl
pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.14.21-150400.15.148.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.14.21-150400.15.148.1",
            "kernel-rt": "5.14.21-150400.15.148.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:1557-1.json"
kernel-source-rt

Package

Name
kernel-source-rt
Purl
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.14.21-150400.15.148.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.14.21-150400.15.148.1",
            "kernel-rt": "5.14.21-150400.15.148.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:1557-1.json"