SUSE-SU-2025:03613-1

Source
https://www.suse.com/support/update/announcement/2025/suse-su-202503613-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:03613-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2025:03613-1
Upstream
  • CVE-2021-4460
Related
Published
2025-10-16T05:47:42Z
Modified
2025-10-18T08:33:00.261825Z
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2022-49980: USB: gadget: fix use-after-free read in usbudcuevent() (bsc#1245110).
  • CVE-2022-50233: Bluetooth: eir: Fix using strlen with hdev->{devname,shortname} (bsc#1246968).
  • CVE-2022-50248: wifi: iwlwifi: mvm: fix double free on tx path (bsc#1249840).
  • CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249846).
  • CVE-2022-50258: wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmfcpreinit_dcmds() (bsc#1249947).
  • CVE-2022-50381: md: fix a crash in mempool_free (bsc#1250257).
  • CVE-2022-50386: Bluetooth: L2CAP: Fix user-after-free (bsc#1250301).
  • CVE-2022-50401: nfsd: under NFSv4.1, fix double svcxprtput on rpc_create failure (bsc#1250140).
  • CVE-2022-50408: wifi: brcmfmac: fix use-after-free bug in brcmfnetdevstart_xmit() (bsc#1250391).
  • CVE-2022-50409: net: If sock is dead do not access sock's skwq in skstreamwaitmemory (bsc#1250392).
  • CVE-2023-53178: mm: fix zswap writeback race condition (bsc#1249827).
  • CVE-2023-53321: wifi: mac80211_hwsim: drop short frames (bsc#1250313).
  • CVE-2023-53438: x86/MCE: Always save CS register on AMD Zen IF Poison errors (bsc#1250180).
  • CVE-2025-21969: kABI workaround for l2cap_conn changes (bsc#1240784).
  • CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956).
  • CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239).
  • CVE-2025-38553: net/sched: Restrict conditions for adding duplicating netems to qdisc tree (bsc#1248255).
  • CVE-2025-38572: ipv6: reject malicious packets in ipv6gsosegment() (bsc#1248399).
  • CVE-2025-38664: ice: Fix a null pointer dereference in icecopyandinitpkg() (bsc#1248628).
  • CVE-2025-38685: fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (bsc#1249220).
  • CVE-2025-38713: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (bsc#1249200).
  • CVE-2025-39751: ALSA: hda/ca0132: Fix buffer overflow in addtuningcontrol (bsc#1249538).
  • CVE-2025-39823: KVM: x86: use arrayindexnospec with indices that come from guest (bsc#1250002).

The following non-security bugs were fixed:

  • Limit patch filenames to 100 characters (bsc#1249604).
  • Move pesign-obs-integration requirement from kernel-syms to kernel devel subpackage (bsc#1248108).
  • hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (git-fixes).
  • kernel-binary: Another installation ordering fix (bsc#1241353).
  • kernel-source: Do not list mkspec and its inputs as sources (bsc#1250522).
  • kernel-subpackage-build: Decompress ghost file when compressed version exists (bsc#1249346)
  • kernel-syms.spec: Drop old rpm release number hack (bsc#1247172).
  • rpm/kernel-subpackage-spec: Skip brp-strip-debug to avoid file truncation (bsc#1246879)
  • rpm/mkspec: Fix missing kernel-syms-rt creation (bsc#1244337)
  • rpm: Configure KABI checkingness macro (bsc#1249186)
  • rpm: Drop support for kabi/arch/ignore-flavor (bsc#1249186)
  • rpm: Link arch-symbols script from scripts directory.
  • rpm: Link guards script from scripts directory.
  • use uniform permission checks for all mount propagation changes (git-fixes).
References

Affected packages

SUSE:Linux Enterprise Micro 5.1

kernel-rt

Package

Name
kernel-rt
Purl
pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.223.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.3.18-150300.223.1",
            "kernel-rt": "5.3.18-150300.223.1"
        }
    ]
}

kernel-source-rt

Package

Name
kernel-source-rt
Purl
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.223.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.3.18-150300.223.1",
            "kernel-rt": "5.3.18-150300.223.1"
        }
    ]
}

SUSE:Linux Enterprise Micro 5.2

kernel-rt

Package

Name
kernel-rt
Purl
pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.223.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.3.18-150300.223.1",
            "kernel-rt": "5.3.18-150300.223.1"
        }
    ]
}

kernel-source-rt

Package

Name
kernel-source-rt
Purl
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.223.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.3.18-150300.223.1",
            "kernel-rt": "5.3.18-150300.223.1"
        }
    ]
}