{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-devel-rt":"5.14.21-150500.13.121.1","kernel-rt":"5.14.21-150500.13.121.1","kernel-source-rt":"5.14.21-150500.13.121.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.5","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.121.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-devel-rt":"5.14.21-150500.13.121.1","kernel-rt":"5.14.21-150500.13.121.1","kernel-source-rt":"5.14.21-150500.13.121.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.5","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.14.21-150500.13.121.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise 15 SP5 RT kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50697: mrp: introduce active flags to prevent UAF when applicant uninit (bsc#1255594).\n- CVE-2023-54142: gtp: Fix use-after-free in __gtp_encap_destroy() (bsc#1256095).\n- CVE-2023-54243: netfilter: ebtables: fix table blob use-after-free (bsc#1255908).\n- CVE-2025-38068: crypto: lzo - Fix compression buffer overrun (bsc#1245210).\n- CVE-2025-38129: page_pool: fix inconsistency for page_pool_ring_lock() (bsc#1245723).\n- CVE-2025-38159: wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds (bsc#1245751).\n- CVE-2025-38375: virtio-net: ensure the received length does not exceed allocated size (bsc#1247177).\n- CVE-2025-40257: mptcp: fix a race in mptcp_pm_del_add_timer() (bsc#1254842).\n- CVE-2025-40300: Documentation/hw-vuln: Add VMSCAPE documentation (bsc#1247483).\n- CVE-2025-68183: ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr (bsc#1255251).\n- CVE-2025-68284: libceph: prevent potential out-of-bounds writes in handle_auth_session_key() (bsc#1255377).\n- CVE-2025-68285: libceph: fix potential use-after-free in have_mon_and_osd_map() (bsc#1255401).\n- CVE-2025-68312: usbnet: Prevents free active kevent (bsc#1255171).\n- CVE-2025-68771: ocfs2: fix kernel BUG in ocfs2_find_victim_chain (bsc#1256582).\n- CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256641).\n- CVE-2025-71085: ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr() (bsc#1256623).\n- CVE-2025-71089: iommu: disable SVA when CONFIG_X86 is set (bsc#1256612).\n- CVE-2025-71112: net: hns3: add VLAN id validation before using (bsc#1256726).\n- CVE-2025-71116: libceph: make decode_pool() more resilient against corrupted osdmaps (bsc#1256744).\n- CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256779).\n- CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257236).\n- CVE-2026-23001: macvlan: fix possible UAF in macvlan_forward_source() (bsc#1257232).\n- CVE-2023-53215: sched/fair: Don't balance task to its current running CPU (bsc#1250397).\n- CVE-2024-44987: ipv6: prevent UAF in ip6_send_skb() (bsc#1230185).\n\nThe following non security issues were fixed:\n\n- Revert 'ocfs2: fix kernel BUG in ocfs2_find_victim_chain (bsc#1256582)'.\n- mm, page_alloc, thp: prevent reclaim for __GFP_THISNODE THP allocations (bsc#1253087 bsc#1254447).\n- net: hv_netvsc: reject RSS hash key programming without RX indirection table (bsc#1257473).\n- net: tcp: allow zero-window ACK update the window (bsc#1254767).\n- net: tcp: send zero-window ACK when no memory (bsc#1254767).\n- scsi: storvsc: Process unsupported MODE_SENSE_10 (bsc#1257296).\n- tcp: correct handling of extreme memory squeeze (bsc#1254767).\n- x86: make page fault handling disable interrupts properly (git-fixes).\n","id":"SUSE-SU-2026:0496-1","modified":"2026-02-13T10:52:18Z","published":"2026-02-13T10:52:18Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260496-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220137"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220144"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222323"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223007"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225049"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233038"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235905"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236104"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236208"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237885"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237906"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238414"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238754"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238763"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244758"},{"type":"REPORT","url":"https://bugzilla.suse.com/1244904"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245110"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245210"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245723"},{"type":"REPORT","url":"https://bugzilla.suse.com/1245751"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247177"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247483"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248306"},{"type":"REPORT","url":"https://bugzilla.suse.com/1248377"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249156"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249158"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249827"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252785"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253028"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253087"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253409"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253702"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254447"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254462"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254463"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254464"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254465"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254767"},{"type":"REPORT","url":"https://bugzilla.suse.com/1254842"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255171"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255251"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255377"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255401"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255594"},{"type":"REPORT","url":"https://bugzilla.suse.com/1255908"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256095"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256582"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256612"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256623"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256641"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256726"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256744"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256779"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256792"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257232"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257236"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257296"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257473"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49604"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49943"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49980"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50232"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50697"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52433"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52874"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52923"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53178"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53407"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53412"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53417"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53418"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53714"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54142"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-54243"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26581"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26661"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26832"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50143"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-54031"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21658"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21760"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21764"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21765"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21766"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38068"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38129"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38159"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38375"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38563"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38565"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38684"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40044"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40139"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40257"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40300"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68183"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68284"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68285"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68312"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68771"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-68813"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71085"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71089"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71112"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71116"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71120"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-22999"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23001"}],"related":["CVE-2022-49604","CVE-2022-49943","CVE-2022-49980","CVE-2022-50232","CVE-2022-50697","CVE-2023-52433","CVE-2023-52874","CVE-2023-52923","CVE-2023-53178","CVE-2023-53407","CVE-2023-53412","CVE-2023-53417","CVE-2023-53418","CVE-2023-53714","CVE-2023-54142","CVE-2023-54243","CVE-2024-26581","CVE-2024-26661","CVE-2024-26832","CVE-2024-50143","CVE-2024-54031","CVE-2025-21658","CVE-2025-21760","CVE-2025-21764","CVE-2025-21765","CVE-2025-21766","CVE-2025-38068","CVE-2025-38129","CVE-2025-38159","CVE-2025-38375","CVE-2025-38563","CVE-2025-38565","CVE-2025-38684","CVE-2025-40044","CVE-2025-40139","CVE-2025-40257","CVE-2025-40300","CVE-2025-68183","CVE-2025-68284","CVE-2025-68285","CVE-2025-68312","CVE-2025-68771","CVE-2025-68813","CVE-2025-71085","CVE-2025-71089","CVE-2025-71112","CVE-2025-71116","CVE-2025-71120","CVE-2026-22999","CVE-2026-23001"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2022-49604","CVE-2022-49943","CVE-2022-49980","CVE-2022-50232","CVE-2022-50697","CVE-2023-52433","CVE-2023-52874","CVE-2023-52923","CVE-2023-53178","CVE-2023-53407","CVE-2023-53412","CVE-2023-53417","CVE-2023-53418","CVE-2023-53714","CVE-2023-54142","CVE-2023-54243","CVE-2024-26581","CVE-2024-26661","CVE-2024-26832","CVE-2024-50143","CVE-2024-54031","CVE-2025-21658","CVE-2025-21760","CVE-2025-21764","CVE-2025-21765","CVE-2025-21766","CVE-2025-38068","CVE-2025-38129","CVE-2025-38159","CVE-2025-38375","CVE-2025-38563","CVE-2025-38565","CVE-2025-38684","CVE-2025-40044","CVE-2025-40139","CVE-2025-40257","CVE-2025-40300","CVE-2025-68183","CVE-2025-68284","CVE-2025-68285","CVE-2025-68312","CVE-2025-68771","CVE-2025-68813","CVE-2025-71085","CVE-2025-71089","CVE-2025-71112","CVE-2025-71116","CVE-2025-71120","CVE-2026-22999","CVE-2026-23001"]}