SUSE-SU-2025:1194-1

Source
https://www.suse.com/support/update/announcement/2025/suse-su-20251194-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:1194-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2025:1194-1
Upstream
Related
Published
2025-04-10T13:46:40Z
Modified
2025-04-11T12:45:56.762605Z
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2021-47248: udp: fix race between close() and udp_abort() (bsc#1224867).
  • CVE-2022-49051: net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (bsc#1237903).
  • CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918).
  • CVE-2022-49275: can: mcan: mcantxhandler(): fix use after free of skb (bsc#1238719).
  • CVE-2022-49413: bfq: Update cgroup information before merging bio (bsc#1238710).
  • CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled (bsc#1238919).
  • CVE-2022-49545: ALSA: usb-audio: Cancel pending work at closing a MIDI substream (bsc#1238729).
  • CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238787).
  • CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238789).
  • CVE-2022-49739: gfs2: Always check inode size of inline inodes (bsc#1240207).
  • CVE-2023-52935: mm/khugepaged: fix ->anon_vma race (bsc#1240276).
  • CVE-2024-56642: tipc: Fix use-after-free of kernel socket in cleanup_bearer() (bsc#1235433).
  • CVE-2024-56651: can: hi311x: hi3110canist(): fix potential use-after-free (bsc#1235528).
  • CVE-2024-57996: netsched: schsfq: do not allow 1 packet limit (bsc#1239076).
  • CVE-2024-58014: wifi: brcmsmac: add gain range check to wlcphyiqcalgainparamsnphy() (bsc#1239109).
  • CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238911).
  • CVE-2025-21780: drm/amdgpu: avoid buffer overflow attach in smusyssetpptable() (bsc#1239115).

The following non-security bugs were fixed:

  • ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530).
  • btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1239969).
  • btrfs: send: fix invalid clone operation for file that got its size decreased (bsc#1239969).
  • btrfs: send: use btrfsfileextentend() in sendwriteorclone() (bsc#1239969).
References

Affected packages

SUSE:Linux Enterprise Micro 5.1 / kernel-rt

Package

Name
kernel-rt
Purl
pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.205.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.3.18-150300.205.1",
            "kernel-rt": "5.3.18-150300.205.1"
        }
    ]
}

SUSE:Linux Enterprise Micro 5.1 / kernel-source-rt

Package

Name
kernel-source-rt
Purl
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.205.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.3.18-150300.205.1",
            "kernel-rt": "5.3.18-150300.205.1"
        }
    ]
}

SUSE:Linux Enterprise Micro 5.2 / kernel-rt

Package

Name
kernel-rt
Purl
pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.205.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.3.18-150300.205.1",
            "kernel-rt": "5.3.18-150300.205.1"
        }
    ]
}

SUSE:Linux Enterprise Micro 5.2 / kernel-source-rt

Package

Name
kernel-source-rt
Purl
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.205.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.3.18-150300.205.1",
            "kernel-rt": "5.3.18-150300.205.1"
        }
    ]
}