SUSE-SU-2026:1131-1

Source
https://www.suse.com/support/update/announcement/2026/suse-su-20261131-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:1131-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2026:1131-1
Upstream
Related
Published
2026-03-27T16:02:21Z
Modified
2026-03-31T17:23:54.809162Z
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 15 SP4 RT kernel was updated to fix various security issues

The following security issues were fixed:

  • CVE-2024-46854: net: dpaa: Pad packets to ETH_ZLEN (bsc#1231084).
  • CVE-2025-21738: ata: libata-sff: Ensure that we cannot write outside the allocated buffer (bsc#1238917).
  • CVE-2025-40242: gfs2: Fix unlikely race in gdlmputlock (bsc#1255075).
  • CVE-2025-68312: usbnet: Prevents free active kevent (bsc#1255171).
  • CVE-2025-71066: net/sched: ets: Always remove class from active list before deleting in etsqdiscchange (bsc#1256645).
  • CVE-2025-71085: ipv6: BUG() in pskbexpandhead() as part of calipsoskbuffsetattr() (bsc#1256623).
  • CVE-2025-71112: net: hns3: add VLAN id validation before using (bsc#1256726).
  • CVE-2026-22999: net/sched: schqfq: do not free existing class in qfqchange_class() (bsc#1257236).
  • CVE-2026-23001: macvlan: fix possible UAF in macvlanforwardsource() (bsc#1257232).
  • CVE-2026-23004: dst: fix races in rt6uncachedlistdel() and rtdeluncachedlist() (bsc#1257231).
  • CVE-2026-23060: crypto: authencesn - reject too-short AAD (assoclen<8) to match ESP/ESN spec (bsc#1257735).
  • CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1257749).
  • CVE-2026-23089: ALSA: usb-audio: Fix use-after-free in sndusbmixer_free() (bsc#1257790).
  • CVE-2026-23191: ALSA: aloop: Fix racy access at PCM trigger (bsc#1258395).
  • CVE-2026-23204: net: add skbheaderpointer_careful() helper (bsc#1258340).
  • CVE-2026-23209: macvlan: fix error recovery in macvlancommonnewlink() (bsc#1258518).
  • CVE-2026-23268: apparmor: fix unprivileged local user can do privileged policy management (bsc#1258850).
  • CVE-2026-23269: apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1259857).

The following non security issues were fixed:

  • apparmor: fix differential encoding verification (bsc#1258849).
  • apparmor: Fix double free of nsname in aareplace_profiles() (bsc#1258849).
  • apparmor: fix memory leak in verify_header (bsc#1258849).
  • apparmor: fix missing bounds check on DEFAULT table in verify_dfa() (bsc#1258849).
  • apparmor: fix race between freeing data and fs accessing it (bsc#1258849).
  • apparmor: fix race on rawdata dereference (bsc#1258849).
  • apparmor: fix side-effect bug in match_char() macro usage (bsc#1258849).
  • apparmor: fix unprivileged local user can do privileged policy management (bsc#1258849).
  • apparmor: fix: limit the number of levels of policy namespaces (bsc#1258849).
  • apparmor: replace recursive profile removal with iterative approach (bsc#1258849).
  • apparmor: validate DFA start states are in bounds in unpack_pdb (bsc#1258849).
  • net: hv_netvsc: reject RSS hash key programming without RX indirection table (bsc#1257473).
  • net: tcp: allow zero-window ACK update the window (bsc#1254767).
  • net: tcp: send zero-window ACK when no memory (bsc#1254767).
  • scsi: storvsc: Process unsupported MODESENSE10 (bsc#1257296).
  • tcp: correct handling of extreme memory squeeze (bsc#1254767).
  • x86/its: Fix crash during dynamic its initialization (bsc#1257771).
  • x86/modules: Set VMFLUSHRESETPERMS in modulealloc() (bsc#1257771).
References

Affected packages

SUSE:Linux Enterprise Micro 5.3
kernel-rt

Package

Name
kernel-rt
Purl
pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.14.21-150400.15.145.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-rt": "5.14.21-150400.15.145.1",
            "kernel-source-rt": "5.14.21-150400.15.145.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:1131-1.json"
kernel-source-rt

Package

Name
kernel-source-rt
Purl
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.14.21-150400.15.145.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-rt": "5.14.21-150400.15.145.1",
            "kernel-source-rt": "5.14.21-150400.15.145.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:1131-1.json"
SUSE:Linux Enterprise Micro 5.4
kernel-rt

Package

Name
kernel-rt
Purl
pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.14.21-150400.15.145.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-rt": "5.14.21-150400.15.145.1",
            "kernel-source-rt": "5.14.21-150400.15.145.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:1131-1.json"
kernel-source-rt

Package

Name
kernel-source-rt
Purl
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.14.21-150400.15.145.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-rt": "5.14.21-150400.15.145.1",
            "kernel-source-rt": "5.14.21-150400.15.145.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:1131-1.json"