SUSE-SU-2025:4135-1

Source
https://www.suse.com/support/update/announcement/2025/suse-su-20254135-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:4135-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2025:4135-1
Upstream
Related
Published
2025-11-18T17:31:49Z
Modified
2025-11-19T17:04:07.315680Z
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise FIXME kernel was updated to fix various security issues

The following security issues were fixed:

  • CVE-2022-50327: ACPI: processor: idle: Check acpifetchacpi_dev() return value (bsc#1249859).
  • CVE-2022-50334: hugetlbfs: fix null-ptr-deref in hugetlbfsparseparam() (bsc#1249857).
  • CVE-2022-50388: nvme: fix multipath crash caused by flush request when blktrace is enabled (bsc#1250293).
  • CVE-2022-50423: ACPICA: Fix use-after-free in acpiutcopyipackageto_ipackage() (bsc#1250784).
  • CVE-2022-50432: kernfs: fix use-after-free in _kernfsremove (bsc#1250851).
  • CVE-2022-50488: block, bfq: fix possible uaf for 'bfqq->bic' (bsc#1251201).
  • CVE-2022-50516: fs: dlm: fix invalid derefence of sb_lvbptr (bsc#1251741).
  • CVE-2023-53282: scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1250311).
  • CVE-2023-53365: ip6mr: Fix skbunderpanic in ip6mrcachereport() (bsc#1249988).
  • CVE-2023-53395: ACPICA: Add AMLNOOPERAND_RESOLVE flag to Timer (bsc#1250358).
  • CVE-2023-53500: xfrm: fix slab-use-after-free in decode_session6 (bsc#1250816).
  • CVE-2023-53559: ipvti: fix potential slab-use-after-free in decodesession6 (bsc#1251052).
  • CVE-2023-53574: wifi: rtw88: delete timer and free skb queue when unloading (bsc#1251222).
  • CVE-2023-53619: netfilter: conntrack: Avoid nfcthelper_hash uses after free (bsc#1251743).
  • CVE-2023-53673: Bluetooth: hci_event: call disconnect callback before deleting conn (bsc#1251763).
  • CVE-2023-53705: ipv6: Fix out-of-bounds access in ipv6findtlv() (bsc#1252554).
  • CVE-2023-53722: md: raid1: fix potential OOB in raid1removedisk() (bsc#1252499).
  • CVE-2025-38476: rpl: Fix use-after-free in rpldosrh_inline() (bsc#1247317).
  • CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047).
  • CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).
  • CVE-2025-40018: ipvs: Defer ipvsftp unregister during netns cleanup (bsc#1252688).
References

Affected packages

SUSE:Linux Enterprise Micro 5.2 / kernel-rt

Package

Name
kernel-rt
Purl
pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.226.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.3.18-150300.226.1",
            "kernel-rt": "5.3.18-150300.226.1"
        }
    ]
}

SUSE:Linux Enterprise Micro 5.2 / kernel-source-rt

Package

Name
kernel-source-rt
Purl
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.226.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.3.18-150300.226.1",
            "kernel-rt": "5.3.18-150300.226.1"
        }
    ]
}