{"id":"SUSE-SU-2026:1643-1","summary":"Security update for the Linux Kernel","details":"\nThe SUSE Linux Enterprise 15 SP6 kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2025-39998: scsi: target: target_core_configfs: Add length check to avoid buffer overflow (bsc#1252073).\n- CVE-2026-23103: ipvlan: Make the addrs_lock be per port (bsc#1257773).\n- CVE-2026-23231: netfilter: nf_tables: fix use-after-free in nf_tables_addchain() (bsc#1259188).\n- CVE-2026-23243: RDMA/umad: Reject negative data_len in ib_umad_write (bsc#1259797).\n- CVE-2026-23272: netfilter: nf_tables: unconditionally bump set-\u003enelems before insertion (bsc#1260009).\n- CVE-2026-23274: netfilter: xt_IDLETIMER: reject rev0 reuse of ALARM timer labels (bsc#1260005).\n- CVE-2026-23278: netfilter: nf_tables: always walk all pending catchall elements (bsc#1259998).\n- CVE-2026-23293: net: vxlan: fix nd_tbl NULL dereference when IPv6 is disabled (bsc#1260486).\n- CVE-2026-23317: drm/vmwgfx: Return the correct value in vmw_translate_ptr functions (bsc#1260562).\n- CVE-2026-23381: net: bridge: fix nd_tbl NULL dereference when IPv6 is disabled (bsc#1260471).\n- CVE-2026-23398: icmp: fix NULL pointer dereference in icmp_tag_validation() (bsc#1260730).\n- CVE-2026-23412: netfilter: bpf: defer hook memory release until rcu readers are done (bsc#1261412).\n- CVE-2026-23413: clsact: Fix use-after-free in init/destroy rollback asymmetry (bsc#1261498).\n- CVE-2026-31788: xen/privcmd: restrict usage in unprivileged domU (bsc#1259707).\n\nThe following non security issues were fixed:\n\n- KVM: x86/mmu: Drop/zap existing present SPTE even when creating an MMIO SPTE (bsc#1259461).\n- KVM: x86/mmu: Retry fault before acquiring mmu_lock if mapping is changing (bsc#1253122).\n- net: mana: fix use-after-free in add_adev() error path (git-fixes).\n- net: mana: Trigger VF reset/recovery on health check failure due to HWC timeout (bsc#1259580).\n- x86/platform/uv: Handle deconfigured sockets (bsc#1260347).\n- xen/privcmd: unregister xenstore notifier on module exit (git-fixes).\n","modified":"2026-04-30T18:24:15.617097Z","published":"2026-04-28T13:27:21Z","related":["CVE-2025-39998","CVE-2026-23103","CVE-2026-23231","CVE-2026-23243","CVE-2026-23272","CVE-2026-23274","CVE-2026-23278","CVE-2026-23293","CVE-2026-23317","CVE-2026-23381","CVE-2026-23398","CVE-2026-23412","CVE-2026-23413","CVE-2026-31788"],"upstream":["CVE-2025-39998","CVE-2026-23103","CVE-2026-23231","CVE-2026-23243","CVE-2026-23272","CVE-2026-23274","CVE-2026-23278","CVE-2026-23293","CVE-2026-23317","CVE-2026-23381","CVE-2026-23398","CVE-2026-23412","CVE-2026-23413","CVE-2026-31788"],"references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20261643-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253122"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257506"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257773"},{"type":"REPORT","url":"https://bugzilla.suse.com/1259188"},{"type":"REPORT","url":"https://bugzilla.suse.com/1259461"},{"type":"REPORT","url":"https://bugzilla.suse.com/1259580"},{"type":"REPORT","url":"https://bugzilla.suse.com/1259707"},{"type":"REPORT","url":"https://bugzilla.suse.com/1259797"},{"type":"REPORT","url":"https://bugzilla.suse.com/1259998"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260005"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260009"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260347"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260471"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260486"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260562"},{"type":"REPORT","url":"https://bugzilla.suse.com/1260730"},{"type":"REPORT","url":"https://bugzilla.suse.com/1261412"},{"type":"REPORT","url":"https://bugzilla.suse.com/1261498"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39998"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23103"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23231"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23243"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23272"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23274"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23278"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23293"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23317"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23381"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23398"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23412"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23413"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-31788"}],"schema_version":"1.7.5"}