SUSE-SU-2025:1194-1

Source
https://www.suse.com/support/update/announcement/2025/suse-su-20251194-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:1194-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2025:1194-1
Related
Published
2025-04-10T13:46:40Z
Modified
2025-04-11T12:45:24.690806Z
Upstream
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2021-47248: udp: fix race between close() and udp_abort() (bsc#1224867).
  • CVE-2022-49051: net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (bsc#1237903).
  • CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918).
  • CVE-2022-49275: can: mcan: mcantxhandler(): fix use after free of skb (bsc#1238719).
  • CVE-2022-49413: bfq: Update cgroup information before merging bio (bsc#1238710).
  • CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled (bsc#1238919).
  • CVE-2022-49545: ALSA: usb-audio: Cancel pending work at closing a MIDI substream (bsc#1238729).
  • CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238787).
  • CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238789).
  • CVE-2022-49739: gfs2: Always check inode size of inline inodes (bsc#1240207).
  • CVE-2023-52935: mm/khugepaged: fix ->anon_vma race (bsc#1240276).
  • CVE-2024-56642: tipc: Fix use-after-free of kernel socket in cleanup_bearer() (bsc#1235433).
  • CVE-2024-56651: can: hi311x: hi3110canist(): fix potential use-after-free (bsc#1235528).
  • CVE-2024-57996: netsched: schsfq: do not allow 1 packet limit (bsc#1239076).
  • CVE-2024-58014: wifi: brcmsmac: add gain range check to wlcphyiqcalgainparamsnphy() (bsc#1239109).
  • CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238911).
  • CVE-2025-21780: drm/amdgpu: avoid buffer overflow attach in smusyssetpptable() (bsc#1239115).

The following non-security bugs were fixed:

  • ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530).
  • btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1239969).
  • btrfs: send: fix invalid clone operation for file that got its size decreased (bsc#1239969).
  • btrfs: send: use btrfsfileextentend() in sendwriteorclone() (bsc#1239969).
References

Affected packages

SUSE:Linux Enterprise Micro 5.1 / kernel-rt

Package

Name
kernel-rt
Purl
pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.205.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.3.18-150300.205.1",
            "kernel-rt": "5.3.18-150300.205.1"
        }
    ]
}

SUSE:Linux Enterprise Micro 5.1 / kernel-source-rt

Package

Name
kernel-source-rt
Purl
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.205.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.3.18-150300.205.1",
            "kernel-rt": "5.3.18-150300.205.1"
        }
    ]
}

SUSE:Linux Enterprise Micro 5.2 / kernel-rt

Package

Name
kernel-rt
Purl
pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.205.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.3.18-150300.205.1",
            "kernel-rt": "5.3.18-150300.205.1"
        }
    ]
}

SUSE:Linux Enterprise Micro 5.2 / kernel-source-rt

Package

Name
kernel-source-rt
Purl
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.3.18-150300.205.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-source-rt": "5.3.18-150300.205.1",
            "kernel-rt": "5.3.18-150300.205.1"
        }
    ]
}