{"id":"SUSE-SU-2026:21220-1","summary":"Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 16)","details":"\nThis update for the SUSE Linux Enterprise Kernel 6.12.0-160000.8.1 fixes various security issues\n\nThe following security issues were fixed:\n\n- CVE-2025-71120: SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf (bsc#1256780).\n- CVE-2026-22999: net/sched: sch_qfq: do not free existing class in qfq_change_class() (bsc#1257238).\n- CVE-2026-23074: net/sched: Enforce that teql can only be used as root qdisc (bsc#1258051).\n- CVE-2026-23111: netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate() (bsc#1258183).\n- CVE-2026-23209: macvlan: fix error recovery in macvlan_common_newlink() (bsc#1258784).\n","modified":"2026-04-22T20:09:50.737581Z","published":"2026-04-13T03:18:11Z","related":["CVE-2025-71120","CVE-2026-22999","CVE-2026-23074","CVE-2026-23111","CVE-2026-23209"],"upstream":["CVE-2025-71120","CVE-2026-22999","CVE-2026-23074","CVE-2026-23111","CVE-2026-23209"],"references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-202621220-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256780"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257238"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258051"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258183"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258784"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-71120"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-22999"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23074"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23111"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-23209"}],"affected":[{"package":{"name":"kernel-livepatch-SLE16_Update_3","ecosystem":"SUSE:Linux Enterprise Server 16.0","purl":"pkg:rpm/suse/kernel-livepatch-SLE16_Update_3&distro=SUSE%20Linux%20Enterprise%20Server%2016.0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4-160000.1.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-livepatch-6_12_0-160000_8-default":"4-160000.1.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:21220-1.json"}},{"package":{"name":"kernel-livepatch-SLE16_Update_3","ecosystem":"SUSE:Linux Enterprise Server for SAP applications 16.0","purl":"pkg:rpm/suse/kernel-livepatch-SLE16_Update_3&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20applications%2016.0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4-160000.1.1"}]}],"ecosystem_specific":{"binaries":[{"kernel-livepatch-6_12_0-160000_8-default":"4-160000.1.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:21220-1.json"}}],"schema_version":"1.7.5"}