SUSE-SU-2026:0274-1

Source
https://www.suse.com/support/update/announcement/2026/suse-su-20260274-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:0274-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2026:0274-1
Upstream
Related
Published
2026-01-23T12:04:25Z
Modified
2026-03-11T07:31:32.608390Z
Summary
Security update for the Linux Kernel (Live Patch 10 for SUSE Linux Enterprise 15 SP6)
Details

This update for the SUSE Linux Enterprise kernel 6.4.0-150600.23.47 fixes various security issues

The following security issues were fixed:

  • CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in liotargetnaclinfoshow() (bsc#1251787).
  • CVE-2025-38476: rpl: Fix use-after-free in rpldosrh_inline() (bsc#1251203).
  • CVE-2025-38572: ipv6: reject malicious packets in ipv6gsosegment() (bsc#1248400).
  • CVE-2025-38588: ipv6: prevent infinite loop in rt6nlmsgsize() (bsc#1249241).
  • CVE-2025-38608: bpf, ktls: Fix data corruption when using bpfmsgpop_data() in ktls (bsc#1248670).
  • CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1250192).
  • CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437).

The following non security issue was fixed:

  • fix addrbitset() issue on big-endian machines (bsc#1256928).
References

Affected packages

SUSE:Linux Enterprise Live Patching 15 SP6 / kernel-livepatch-SLE15-SP6_Update_10

Package

Name
kernel-livepatch-SLE15-SP6_Update_10
Purl
pkg:rpm/suse/kernel-livepatch-SLE15-SP6_Update_10&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
11-150600.2.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-livepatch-6_4_0-150600_23_47-default": "11-150600.2.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:0274-1.json"