Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
Linux Kernel Update for SUSE Linux Enterprise 15 SP7: Fix Security Issues
SUSE-SU-2026:1279-1
Summary
This update fixes several security issues in the Linux Kernel for SUSE Linux Enterprise 15 SP7. These issues could allow an attacker to crash the system, access unauthorized data, or disrupt network traffic. To stay secure, update your system with the latest Linux Kernel patch.
What to do
- Update kernel-livepatch-sle15-sp7_update_8 to version 3-150700.2.1.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | kernel-livepatch-sle15-sp7_update_8 | <= 3-150700.2.1 | 3-150700.2.1 |
Original title
Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP7)
Original description
This update for the SUSE Linux Enterprise Kernel 6.4.0-150700.53.28 fixes various security issues
The following security issues were fixed:
- CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256780).
- CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).
- CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).
- CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() (bsc#1258183).
- CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).
- https://www.suse.com/support/update/announcement/2026/suse-su-20261279-1/ Vendor Advisory
- https://bugzilla.suse.com/1256780 Third Party Advisory
- https://bugzilla.suse.com/1257238 Third Party Advisory
- https://bugzilla.suse.com/1258051 Third Party Advisory
- https://bugzilla.suse.com/1258183 Third Party Advisory
- https://bugzilla.suse.com/1258784 Third Party Advisory
- https://www.suse.com/security/cve/CVE-2025-71120 URL
- https://www.suse.com/security/cve/CVE-2026-22999 URL
- https://www.suse.com/security/cve/CVE-2026-23074 URL
- https://www.suse.com/security/cve/CVE-2026-23111 URL
- https://www.suse.com/security/cve/CVE-2026-23209 URL
Published: 12 Apr 2026 · Updated: 14 Apr 2026 · First seen: 14 Apr 2026