SUSE-SU-2026:0964-1

Source
https://www.suse.com/support/update/announcement/2026/suse-su-20260964-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:0964-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2026:0964-1
Upstream
Related
Published
2026-03-23T13:05:59Z
Modified
2026-03-24T08:45:06.639798Z
Summary
Security update for the Linux Kernel (Live Patch 75 for SUSE Linux Enterprise 12 SP5)
Details

This update for the SUSE Linux Enterprise Kernel 4.12.14-122.283 fixes various security issues

The following security issues were fixed:

  • CVE-2022-50697: mrp: introduce active flags to prevent UAF when applicant uninit (bsc#1255595).
  • CVE-2022-50756: nvme-pci: fix mempool alloc size (bsc#1256217).
  • CVE-2023-53781: smc: Fix use-after-free in tcpwritetimer_handler() (bsc#1254755).
  • CVE-2025-21738: ata: libata-sff: ensure that we cannot write outside the allocated buffer (bsc#1257118).
  • CVE-2025-68285: libceph: fix potential use-after-free in havemonandosdmap() (bsc#1255402).
  • CVE-2025-68813: ipvs: fix ipv4 null-ptr-deref in route error path (bsc#1256644).
  • CVE-2025-71085: ipv6: BUG() in pskbexpandhead() as part of calipsoskbuffsetattr() (bsc#1256624).
References

Affected packages

SUSE:Linux Enterprise Live Patching 12 SP5 / kgraft-patch-SLE12-SP5_Update_75

Package

Name
kgraft-patch-SLE12-SP5_Update_75
Purl
pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_75&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3-2.1

Ecosystem specific

{
    "binaries": [
        {
            "kgraft-patch-4_12_14-122_283-default": "3-2.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:0964-1.json"