SUSE-SU-2026:20847-1

Source
https://www.suse.com/support/update/announcement/2026/suse-su-202620847-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:20847-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2026:20847-1
Upstream
Related
Published
2026-03-24T16:48:26Z
Modified
2026-03-28T17:24:22.461176Z
Summary
Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise Micro 6.0)
Details

This update for the SUSE Linux Enterprise Kernel 6.4.0-25.1 fixes various security issues

The following security issues were fixed:

  • CVE-2025-21738: ata: libata-sff: ensure that we cannot write outside the allocated buffer (bsc#1257118).
  • CVE-2025-38159: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (bsc#1257629).
  • CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247240).
  • CVE-2025-40258: mptcp: fix race condition in mptcpschedulework() (bsc#1255053).
  • CVE-2025-40284: Bluetooth: MGMT: cancel mesh send timer when hdev removed (bsc#1257669).
  • CVE-2025-40297: net: bridge: fix use-after-free due to MST port state bypass (bsc#1255895).
  • CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256644).
  • CVE-2025-71085: ipv6: BUG() in pskbexpandhead() as part of calipsoskbuffsetattr() (bsc#1256624).
References

Affected packages

SUSE:Linux Micro 6.0 / kernel-livepatch-MICRO-6-0-RT_Update_5

Package

Name
kernel-livepatch-MICRO-6-0-RT_Update_5
Purl
pkg:rpm/suse/kernel-livepatch-MICRO-6-0-RT_Update_5&distro=SUSE%20Linux%20Micro%206.0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
16-1.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-livepatch-6_4_0-25-rt": "16-1.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:20847-1.json"