SUSE-SU-2025:03283-1

Source
https://www.suse.com/support/update/announcement/2025/suse-su-202503283-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:03283-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2025:03283-1
Upstream
Related
Published
2025-09-19T17:49:42Z
Modified
2025-09-20T15:31:59.236202Z
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2022-49980: USB: gadget: fix use-after-free read in usbudcuevent() (bsc#1245110).
  • CVE-2022-50116: tty: n_gsm: fix deadlock and link starvation in outgoing data path (bsc#1244824).
  • CVE-2023-53117: fs: prevent out-of-bounds array speculation when closing a file descriptor (bsc#1242780).
  • CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334).
  • CVE-2024-53093: nvme-multipath: defer partition scanning (bsc#122824 bsc#1233640).
  • CVE-2024-53177: smb: prevent use-after-free due to opencacheddir error paths (bsc#1234896).
  • CVE-2024-58239: tls: stop recv() if initial processrxlist gave us non-DATA (bsc#1248614).
  • CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970).
  • CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956).
  • CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473).
  • CVE-2025-38352: posix-cpu-timers: fix race between handleposixcputimers() and posixcputimerdel() (bsc#1246911).
  • CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd() (bsc#1247143).
  • CVE-2025-38498: dochangetype(): refuse to operate on unmounted/not ours mounts (bsc#1247374).
  • CVE-2025-38499: cloneprivatemnt(): make sure that caller has CAPSYSADMIN in the right userns (bsc#1247976).
  • CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223).
  • CVE-2025-38555: usb: gadget : fix use-after-free in compositedevcleanup() (bsc#1248297).
  • CVE-2025-38560: x86/sev: Evict cache lines during SNP memory validation (bsc#1248312).
  • CVE-2025-38563: perf/core: Prevent VMA split of buffer mappings (bsc#1248306).
  • CVE-2025-38608: bpf, ktls: Fix data corruption when using bpfmsgpop_data() in ktls (bsc#1248338).
  • CVE-2025-38617: net/packet: fix a race in packetsetring() and packet_notifier() (bsc#1248621).
  • CVE-2025-38618: vsock: Do not allow binding to VMADDRPORTANY (bsc#1248511).
  • CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248748).

The following non-security bugs were fixed:

  • Disable N_GSM (jsc#PED-8240, bsc#1244824).
  • NFSv4.1: fix backchannel maxrespsz verification check (bsc#1247518).
  • NFSv4: fairly test all delegations on a SEQ4_ revocation (bsc#1246211).
  • kabi fix for NFSv4: fairly test all delegations on a SEQ4_ revocation (bsc#1246211).
  • security, lsm: Introduce securitymptcpadd_subflow() (bsc#1240375).
  • selinux: Implement mptcpaddsubflow hook (bsc#1240375).
References

Affected packages

SUSE:Linux Enterprise Micro 5.5 / kernel-rt

Package

Name
kernel-rt
Purl
pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.14.21-150500.13.106.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.14.21-150500.13.106.1",
            "kernel-rt": "5.14.21-150500.13.106.1",
            "kernel-devel-rt": "5.14.21-150500.13.106.1"
        }
    ]
}

SUSE:Linux Enterprise Micro 5.5 / kernel-source-rt

Package

Name
kernel-source-rt
Purl
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.14.21-150500.13.106.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.14.21-150500.13.106.1",
            "kernel-rt": "5.14.21-150500.13.106.1",
            "kernel-devel-rt": "5.14.21-150500.13.106.1"
        }
    ]
}