SUSE-SU-2026:1077-1

Source
https://www.suse.com/support/update/announcement/2026/suse-su-20261077-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:1077-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2026:1077-1
Upstream
Related
Published
2026-03-26T12:42:31Z
Modified
2026-03-27T08:50:03.118177Z
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to fix various security issues

The following security issues were fixed:

  • CVE-2025-21738: ata: libata-sff: Ensure that we cannot write outside the allocated buffer (bsc#1238917).
  • CVE-2025-40242: gfs2: Fix unlikely race in gdlmputlock (bsc#1255075).
  • CVE-2025-71066: net/sched: ets: Always remove class from active list before deleting in etsqdiscchange (bsc#1256645).
  • CVE-2026-23004: dst: fix races in rt6uncachedlistdel() and rtdeluncachedlist() (bsc#1257231).
  • CVE-2026-23060: crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec (bsc#1257735).
  • CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1257749).
  • CVE-2026-23089: ALSA: usb-audio: Fix use-after-free in sndusbmixer_free() (bsc#1257790).
  • CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258395).
  • CVE-2026-23204: net: add skbheaderpointer_careful() helper (bsc#1258340).
  • CVE-2026-23209: macvlan: fix error recovery in macvlancommonnewlink() (bsc#1258518).
  • CVE-2026-23268: apparmor: fix unprivileged local user can do privileged policy management (bsc#1258850).
  • CVE-2026-23269: apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1259857).

The following non security issues were fixed:

  • apparmor: fix differential encoding verification (bsc#1258849).
  • apparmor: Fix double free of nsname in aareplace_profiles() (bsc#1258849).
  • apparmor: fix memory leak in verify_header (bsc#1258849).
  • apparmor: fix missing bounds check on DEFAULT table in verify_dfa() (bsc#1258849).
  • apparmor: fix race between freeing data and fs accessing it (bsc#1258849).
  • apparmor: fix race on rawdata dereference (bsc#1258849).
  • apparmor: fix side-effect bug in match_char() macro usage (bsc#1258849).
  • apparmor: fix unprivileged local user can do privileged policy management (bsc#1258849).
  • apparmor: fix: limit the number of levels of policy namespaces (bsc#1258849).
  • apparmor: replace recursive profile removal with iterative approach (bsc#1258849).
  • apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1258849).
References

Affected packages

SUSE:Linux Enterprise Micro 5.5 / kernel-rt

Package

Name
kernel-rt
Purl
pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.14.21-150500.13.124.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-rt": "5.14.21-150500.13.124.1",
            "kernel-devel-rt": "5.14.21-150500.13.124.1",
            "kernel-source-rt": "5.14.21-150500.13.124.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:1077-1.json"

SUSE:Linux Enterprise Micro 5.5 / kernel-source-rt

Package

Name
kernel-source-rt
Purl
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.14.21-150500.13.124.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-rt": "5.14.21-150500.13.124.1",
            "kernel-devel-rt": "5.14.21-150500.13.124.1",
            "kernel-source-rt": "5.14.21-150500.13.124.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:1077-1.json"