Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

Linux Kernel Update Fixes Multiple Security Risks in SUSE Linux Enterprise 15 SP5

SUSE-SU-2026:1222-1
Summary

This update addresses six security risks in the Linux Kernel for SUSE Linux Enterprise 15 SP5. If left unpatched, these vulnerabilities could allow attackers to disrupt network services, gain unauthorized access, or inject malicious code into the system. Apply the latest update to ensure the security and stability of your system.

What to do
  • Update kernel-livepatch-sle15-sp4_update_43 to version 11-150400.2.1.
  • Update kernel-livepatch-sle15-sp5_update_31 to version 7-150500.2.1.
Affected software
VendorProductAffected versionsFix available
kernel-livepatch-sle15-sp4_update_43 <= 11-150400.2.1 11-150400.2.1
kernel-livepatch-sle15-sp5_update_31 <= 7-150500.2.1 7-150500.2.1
Original title
Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5)
Original description

This update for the SUSE Linux Enterprise Kernel 5.14.21-150500.55.124 fixes various security issues

The following security issues were fixed:

- CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252036).
- CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252689).
- CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256780).
- CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).
- CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).
- CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).
Published: 8 Apr 2026 · Updated: 10 Apr 2026 · First seen: 10 Apr 2026