SUSE-SU-2025:4515-1

Source
https://www.suse.com/support/update/announcement/2025/suse-su-20254515-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:4515-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2025:4515-1
Upstream
Related
Published
2025-12-23T16:19:45Z
Modified
2026-03-11T07:31:27.952691Z
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2022-50364: i2c: mux: reg: check return value after calling platformgetresource() (bsc#1250083).
  • CVE-2022-50368: drm/msm/dsi: fix memory corruption with too many bridges (bsc#1250009).
  • CVE-2022-50494: thermal: intelpowerclamp: Use getcpu() instead of smpprocessorid() to avoid crash (bsc#1251173).
  • CVE-2022-50545: r6040: Fix kmemleak in probe and remove (bsc#1251285).
  • CVE-2022-50551: wifi: brcmfmac: Fix potential shift-out-of-bounds in brcmffwalloc_request() (bsc#1251322).
  • CVE-2022-50569: xfrm: Update ipcomp_scratches with NULL when freed (bsc#1252640).
  • CVE-2022-50578: class: fix possible memory leak in _classregister() (bsc#1252519).
  • CVE-2023-53229: wifi: mac80211: fix invalid drvstaprercuremove calls for non-uploaded sta (bsc#1249650).
  • CVE-2023-53369: net: dcb: choose correct policy to parse DCBATTRBCN (bsc#1250206).
  • CVE-2023-53431: scsi: ses: Don't attach if enclosure has no components (bsc#1250374).
  • CVE-2023-53542: ARM: dts: exynos: Use Exynos5420 compatible for the MIPI video phy (bsc#1251154).
  • CVE-2023-53597: cifs: fix mid leak during reconnection after timeout threshold (bsc#1251159).
  • CVE-2023-53641: wifi: ath9k: hifusb: fix memory leak of remainskbs (bsc#1251728).
  • CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in liotargetnaclinfoshow() (bsc#1251786).
  • CVE-2025-38436: drm/scheduler: signal scheduled fence when kill job (bsc#1247227).
  • CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).
  • CVE-2025-39967: fbcon: fix integer overflow in fbcondoset_font (bsc#1252033).
  • CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvsworkqueue (bsc#1252303).
  • CVE-2025-40027: net/9p: fix double req put in p9fdcancelled (bsc#1252763).
  • CVE-2025-40030: pinctrl: check the return value of pinmuxops::getfunction_name() (bsc#1252773).
  • CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).
  • CVE-2025-40048: uiohvgeneric: Let userspace take care of interrupt mask (bsc#1252862).
  • CVE-2025-40055: ocfs2: fix double free in userclusterconnect() (bsc#1252821).
  • CVE-2025-40070: pps: fix warning in ppsregistercdev when register device fail (bsc#1252836).
  • CVE-2025-40083: net/sched: schqfq: Fix null-deref in aggdequeue (bsc#1252912).
  • CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).
  • CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).
  • CVE-2025-40205: btrfs: avoid potential out-of-bounds in btrfsencodefh() (bsc#1253456).

The following non-security bugs were fixed:

  • KVM: x86: Give a hint when Win2016 might fail to boot due to XSAVES erratum (git-fixes).
  • PCI: aardvark: Fix checking for MEM resource type (git-fixes).
  • cifs: Check the lease context if we actually got a lease (bsc#1228688).
  • cifs: return a single-use cfid if we did not get a lease (bsc#1228688).
  • dmaengine: bcm2835: Avoid GFPKERNEL in deviceprepslavesg (bsc#1070872).
  • kabi/severities: Update info about kvm86ops.
  • net/sched: sch_hfsc: upgrade 'rt' to 'sc' when it becomes a inner curve (bsc#1220419).
  • skmsg: Return copied bytes in skmsgmemcopyfromiter (bsc#1250650).
  • smb3: fix Open files on server counter going negative (git-fixes).
  • tcpbpf: Call skmsgfree() when tcpbpfsendverdict() fails to allocate psock->cork (bsc#1250705).
  • tcpbpf: Fix copied value in tcpbpf_sendmsg (bsc#1250650).
  • thermal: intelpowerclamp: Use first online CPU as controlcpu (bsc#1251173).
References

Affected packages

SUSE:Linux Enterprise Live Patching 12 SP5
kernel-default

Package

Name
kernel-default
Purl
pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.283.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-kgraft": "4.12.14-122.283.1",
            "kgraft-patch-4_12_14-122_283-default": "1-8.3.1",
            "kernel-default-kgraft-devel": "4.12.14-122.283.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:4515-1.json"
kgraft-patch-SLE12-SP5_Update_75

Package

Name
kgraft-patch-SLE12-SP5_Update_75
Purl
pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_75&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1-8.3.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-default-kgraft": "4.12.14-122.283.1",
            "kgraft-patch-4_12_14-122_283-default": "1-8.3.1",
            "kernel-default-kgraft-devel": "4.12.14-122.283.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:4515-1.json"
SUSE:Linux Enterprise Server 12 SP5-LTSS
kernel-default

Package

Name
kernel-default
Purl
pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.283.1

Ecosystem specific

{
    "binaries": [
        {
            "cluster-md-kmp-default": "4.12.14-122.283.1",
            "kernel-default-man": "4.12.14-122.283.1",
            "ocfs2-kmp-default": "4.12.14-122.283.1",
            "kernel-default-base": "4.12.14-122.283.1",
            "kernel-source": "4.12.14-122.283.1",
            "gfs2-kmp-default": "4.12.14-122.283.1",
            "kernel-default": "4.12.14-122.283.1",
            "kernel-devel": "4.12.14-122.283.1",
            "kernel-default-devel": "4.12.14-122.283.1",
            "kernel-macros": "4.12.14-122.283.1",
            "kernel-syms": "4.12.14-122.283.1",
            "dlm-kmp-default": "4.12.14-122.283.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:4515-1.json"
kernel-source

Package

Name
kernel-source
Purl
pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.283.1

Ecosystem specific

{
    "binaries": [
        {
            "cluster-md-kmp-default": "4.12.14-122.283.1",
            "kernel-default-man": "4.12.14-122.283.1",
            "ocfs2-kmp-default": "4.12.14-122.283.1",
            "kernel-default-base": "4.12.14-122.283.1",
            "kernel-source": "4.12.14-122.283.1",
            "gfs2-kmp-default": "4.12.14-122.283.1",
            "kernel-default": "4.12.14-122.283.1",
            "kernel-devel": "4.12.14-122.283.1",
            "kernel-default-devel": "4.12.14-122.283.1",
            "kernel-macros": "4.12.14-122.283.1",
            "kernel-syms": "4.12.14-122.283.1",
            "dlm-kmp-default": "4.12.14-122.283.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:4515-1.json"
kernel-syms

Package

Name
kernel-syms
Purl
pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.283.1

Ecosystem specific

{
    "binaries": [
        {
            "cluster-md-kmp-default": "4.12.14-122.283.1",
            "kernel-default-man": "4.12.14-122.283.1",
            "ocfs2-kmp-default": "4.12.14-122.283.1",
            "kernel-default-base": "4.12.14-122.283.1",
            "kernel-source": "4.12.14-122.283.1",
            "gfs2-kmp-default": "4.12.14-122.283.1",
            "kernel-default": "4.12.14-122.283.1",
            "kernel-devel": "4.12.14-122.283.1",
            "kernel-default-devel": "4.12.14-122.283.1",
            "kernel-macros": "4.12.14-122.283.1",
            "kernel-syms": "4.12.14-122.283.1",
            "dlm-kmp-default": "4.12.14-122.283.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:4515-1.json"
SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5
kernel-default

Package

Name
kernel-default
Purl
pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.283.1

Ecosystem specific

{
    "binaries": [
        {
            "cluster-md-kmp-default": "4.12.14-122.283.1",
            "ocfs2-kmp-default": "4.12.14-122.283.1",
            "kernel-default-base": "4.12.14-122.283.1",
            "kernel-source": "4.12.14-122.283.1",
            "gfs2-kmp-default": "4.12.14-122.283.1",
            "kernel-default": "4.12.14-122.283.1",
            "kernel-devel": "4.12.14-122.283.1",
            "kernel-default-devel": "4.12.14-122.283.1",
            "kernel-macros": "4.12.14-122.283.1",
            "kernel-syms": "4.12.14-122.283.1",
            "dlm-kmp-default": "4.12.14-122.283.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:4515-1.json"
kernel-source

Package

Name
kernel-source
Purl
pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.283.1

Ecosystem specific

{
    "binaries": [
        {
            "cluster-md-kmp-default": "4.12.14-122.283.1",
            "ocfs2-kmp-default": "4.12.14-122.283.1",
            "kernel-default-base": "4.12.14-122.283.1",
            "kernel-source": "4.12.14-122.283.1",
            "gfs2-kmp-default": "4.12.14-122.283.1",
            "kernel-default": "4.12.14-122.283.1",
            "kernel-devel": "4.12.14-122.283.1",
            "kernel-default-devel": "4.12.14-122.283.1",
            "kernel-macros": "4.12.14-122.283.1",
            "kernel-syms": "4.12.14-122.283.1",
            "dlm-kmp-default": "4.12.14-122.283.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:4515-1.json"
kernel-syms

Package

Name
kernel-syms
Purl
pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.283.1

Ecosystem specific

{
    "binaries": [
        {
            "cluster-md-kmp-default": "4.12.14-122.283.1",
            "ocfs2-kmp-default": "4.12.14-122.283.1",
            "kernel-default-base": "4.12.14-122.283.1",
            "kernel-source": "4.12.14-122.283.1",
            "gfs2-kmp-default": "4.12.14-122.283.1",
            "kernel-default": "4.12.14-122.283.1",
            "kernel-devel": "4.12.14-122.283.1",
            "kernel-default-devel": "4.12.14-122.283.1",
            "kernel-macros": "4.12.14-122.283.1",
            "kernel-syms": "4.12.14-122.283.1",
            "dlm-kmp-default": "4.12.14-122.283.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:4515-1.json"