SUSE-SU-2025:01966-1

Source
https://www.suse.com/support/update/announcement/2025/suse-su-202501966-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:01966-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2025:01966-1
Related
Published
2025-06-16T14:55:49Z
Modified
2025-06-17T13:14:29.258280Z
Upstream
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2022-49775: tcp: cdg: allow tcpcdgrelease() to be called multiple times (bsc#1242245).
  • CVE-2024-53168: net: make sockinuseadd() available (bsc#1234887).
  • CVE-2024-56558: nfsd: make sure exp active before svcexportshow (bsc#1235100).
  • CVE-2025-21999: proc: fix UAF in procgetinode() (bsc#1240802).
  • CVE-2025-22056: netfilter: nfttunnel: fix geneveopt type confusion addition (bsc#1241525).
  • CVE-2025-23145: mptcp: fix NULL pointer in canacceptnew_subflow (bsc#1242596).
  • CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762).

The following non-security bugs were fixed:

  • Drivers: hv: Allow vmbussendpacketmpb_desc() to create multiple ranges (bsc#1243737).
  • Remove debug flavor (bsc#1243919).
  • arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (bsc#1242778).
  • arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (bsc#1242778).
  • arm64: insn: Add support for encoding DSB (bsc#1242778).
  • arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (bsc#1242778).
  • arm64: proton-pack: Expose whether the branchy loop k value (bsc#1242778).
  • arm64: proton-pack: Expose whether the platform is mitigated by firmware (bsc#1242778).
  • hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (bsc#1243737).
  • hvnetvsc: Remove rmsgpgcnt (bsc#1243737).
  • hvnetvsc: Use vmbussendpacketmpbdesc() to send VMBus messages (bsc#1243737).
  • mtd: phram: Add the kernel lock down check (bsc#1232649).
  • net :mana :Add remaining GDMA stats for MANA to ethtool (bsc#1234395).
  • net :mana :Request a V2 response version for MANAQUERYGF_STAT (bsc#1234395).
  • net: mana: Add gdma stats to ethtool output for mana (bsc#1234395).
  • nvme-pci: acquire cqpolllock in nvmepollirqdisable (bsc#1223096).
  • ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes).
  • powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW (bsc#1218470 ltc#204531).
  • scsi: core: Fix unremoved procfs host directory regression (git-fixes).
  • tcp: Dump bound-only sockets in inet_diag (bsc#1204562).
  • tpm, tpm_tis: Workaround failed command reception on Infineon devices (bsc#1235870).
  • tpm: tis: Double the timeout B to 4s (bsc#1235870).
  • x86/bhi: Do not set BHIDISS in 32-bit mode (bsc#1242778).
  • x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778).
  • x86/bpf: Call branch history clearing sequence on exit (bsc#1242778).
References

Affected packages

SUSE:Linux Enterprise Micro 5.5 / kernel-rt

Package

Name
kernel-rt
Purl
pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.14.21-150500.13.97.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-devel-rt": "5.14.21-150500.13.97.1",
            "kernel-rt": "5.14.21-150500.13.97.1",
            "kernel-source-rt": "5.14.21-150500.13.97.1"
        }
    ]
}

SUSE:Linux Enterprise Micro 5.5 / kernel-source-rt

Package

Name
kernel-source-rt
Purl
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.14.21-150500.13.97.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-devel-rt": "5.14.21-150500.13.97.1",
            "kernel-rt": "5.14.21-150500.13.97.1",
            "kernel-source-rt": "5.14.21-150500.13.97.1"
        }
    ]
}