SUSE-SU-2026:20249-1

Source
https://www.suse.com/support/update/announcement/2026/suse-su-202620249-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:20249-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2026:20249-1
Upstream
Related
Published
2026-01-19T15:28:20Z
Modified
2026-03-11T07:31:45.600096Z
Summary
Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise Micro 6.0)
Details

This update for the SUSE Linux Enterprise kernel 6.4.0-28.1 fixes various security issues

The following security issues were fixed:

  • CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in liotargetnaclinfoshow() (bsc#1251787).
  • CVE-2025-38476: rpl: Fix use-after-free in rpldosrh_inline() (bsc#1251203).
  • CVE-2025-38572: ipv6: reject malicious packets in ipv6gsosegment() (bsc#1248400).
  • CVE-2025-38588: ipv6: prevent infinite loop in rt6nlmsgsize() (bsc#1249241).
  • CVE-2025-38608: bpf, ktls: Fix data corruption when using bpfmsgpop_data() in ktls (bsc#1248670).
  • CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1250192).
  • CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437).
References

Affected packages

SUSE:Linux Micro 6.0 / kernel-livepatch-MICRO-6-0-RT_Update_6

Package

Name
kernel-livepatch-MICRO-6-0-RT_Update_6
Purl
pkg:rpm/suse/kernel-livepatch-MICRO-6-0-RT_Update_6&distro=SUSE%20Linux%20Micro%206.0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
11-3.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-livepatch-6_4_0-28-rt": "11-3.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:20249-1.json"