{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default":"5.3.18-150300.59.235.1","kernel-default-base":"5.3.18-150300.59.235.1.150300.18.140.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.235.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default":"5.3.18-150300.59.235.1","kernel-default-base":"5.3.18-150300.59.235.1.150300.18.140.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"kernel-default-base","purl":"pkg:rpm/suse/kernel-default-base&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.59.235.1.150300.18.140.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 15 SP3 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50697: mrp: introduce active flags to prevent UAF when applicant uninit (bsc#1255594).\n- CVE-2025-38129: page_pool: fix inconsistency for page_pool_ring_lock() (bsc#1245723).\n- CVE-2025-40139: net: ipv4: Consolidate ipv4_mtu and ip_dst_mtu_maybe_forward (bsc#1253409).\n- CVE-2025-68312: usbnet: Prevents free active kevent (bsc#1255171).\n- CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256623).\n- CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612).\n- CVE-2025-71112: net: hns3: add VLAN id validation before using (bsc#1256726).\n- CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257236).\n- CVE-2026-23001: macvlan: Use 'hash' iterators to simplify code (bsc#1257232).\n","id":"SUSE-SU-2026:0475-1","modified":"2026-02-12T11:32:54Z","published":"2026-02-12T11:32:54Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260475-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223007"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235905"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236104"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237885"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237906"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238414"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238754"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238763"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240284"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244904"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245110"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245723"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248306"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248377"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249699"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249827"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251201"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253409"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255171"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255594"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256612"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256623"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256726"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256792"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257232"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257236"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49604"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49943"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49980"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50329"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50488"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50697"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52923"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52983"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53178"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26832"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-54031"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21760"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21764"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21765"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21766"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38129"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38563"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38565"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40139"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68312"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71085"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71089"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71112"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-22999"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23001"}],"related":["CVE-2022-49604","CVE-2022-49943","CVE-2022-49980","CVE-2022-50329","CVE-2022-50488","CVE-2022-50697","CVE-2023-52923","CVE-2023-52983","CVE-2023-53178","CVE-2024-26832","CVE-2024-54031","CVE-2025-21760","CVE-2025-21764","CVE-2025-21765","CVE-2025-21766","CVE-2025-38129","CVE-2025-38563","CVE-2025-38565","CVE-2025-40139","CVE-2025-68312","CVE-2025-71085","CVE-2025-71089","CVE-2025-71112","CVE-2026-22999","CVE-2026-23001"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2022-49604","CVE-2022-49943","CVE-2022-49980","CVE-2022-50329","CVE-2022-50488","CVE-2022-50697","CVE-2023-52923","CVE-2023-52983","CVE-2023-53178","CVE-2024-26832","CVE-2024-54031","CVE-2025-21760","CVE-2025-21764","CVE-2025-21765","CVE-2025-21766","CVE-2025-38129","CVE-2025-38563","CVE-2025-38565","CVE-2025-40139","CVE-2025-68312","CVE-2025-71085","CVE-2025-71089","CVE-2025-71112","CVE-2026-22999","CVE-2026-23001"]}