SUSE-SU-2025:1293-1

Source
https://www.suse.com/support/update/announcement/2025/suse-su-20251293-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:1293-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2025:1293-1
Related
Published
2025-04-16T07:51:20Z
Modified
2025-04-16T13:31:45.437724Z
Upstream
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2021-46925: Fixed kernel panic caused by race of smc_sock (bsc#1220466).
  • CVE-2021-47645: media: staging: media: zoran: calculate the right buffer number for zoranreapstat_com (bsc#1237767).
  • CVE-2021-47648: gpu: host1x: Fix a memory leak in 'host1x_remove()' (bsc#1237725).
  • CVE-2022-49046: i2c: dev: check return value when calling devsetname() (bsc#1237842).
  • CVE-2022-49051: net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (bsc#1237903).
  • CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918).
  • CVE-2022-49059: nfc: nci: add flush_workqueue to prevent uaf (bsc#1238007).
  • CVE-2022-49074: irqchip/gic-v3: Fix GICR_CTLR.RWP polling (bsc#1237728).
  • CVE-2022-49075: btrfs: fix qgroup reserve overflow the qgroup limit (bsc#1237733).
  • CVE-2022-49084: qede: confirm skb is allocated before using (bsc#1237751).
  • CVE-2022-49107: ceph: fix memory leak in cephreaddir when notelast_dentry returns error (bsc#1237973).
  • CVE-2022-49109: ceph: fix inode reference leakage in cephgetsnapdir() (bsc#1237836).
  • CVE-2022-49119: scsi: pm8001: Fix memory leak in pm8001chipfwflashupdate_req() (bsc#1237925).
  • CVE-2022-49120: scsi: pm8001: Fix task leak in pm8001sendabort_all() (bsc#1237969).
  • CVE-2022-49209: bpf, sockmap: Fix memleak in tcpbpfsendmsg while sk msg is full (bsc#1238252).
  • CVE-2022-49220: dax: make sure inodes are flushed before destroy cache (bsc#1237936).
  • CVE-2022-49275: can: mcan: mcantxhandler(): fix use after free of skb (bsc#1238719).
  • CVE-2022-49286: tpm: use trygetops() in tpm-space.c (bsc#1238647).
  • CVE-2022-49292: ALSA: oss: Fix PCM OSS buffer allocation overflow (bsc#1238625).
  • CVE-2022-49308: extcon: Modify extcon device to be created after driver data is set (bsc#1238654).
  • CVE-2022-49331: nfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling (bsc#1237813).
  • CVE-2022-49344: afunix: Fix a data-race in unixdgrampeerwake_me() (bsc#1237988).
  • CVE-2022-49367: net: dsa: mv88e6xxx: Fix refcount leak in mv88e6xxxmdiosregister (bsc#1238447).
  • CVE-2022-49370: firmware: dmi-sysfs: Fix memory leak in dmisysfsregister_handle (bsc#1238467).
  • CVE-2022-49372: tcp: tcprtxsynack() can be called from process context (bsc#1238251).
  • CVE-2022-49388: ubi: ubicreatevolume: Fix use-after-free when volume creation failed (bsc#1237934).
  • CVE-2022-49395: um: Fix out-of-bounds read in LDT setup (bsc#1237953).
  • CVE-2022-49397: phy: qcom-qmp: fix struct clk leak on probe errors (bsc#1237823).
  • CVE-2022-49404: RDMA/hfi1: Fix potential integer multiplication overflow errors (bsc#1238430).
  • CVE-2022-49416: wifi: mac80211: fix use-after-free in chanctx code (bsc#1238293).
  • CVE-2022-49433: RDMA/hfi1: Prevent use of lock before it is initialized (bsc#1238268).
  • CVE-2022-49472: net: phy: micrel: Allow probing without .driver_data (bsc#1238951).
  • CVE-2022-49488: drm/msm/mdp5: Return error code in mdp5mixerrelease when deadlock (bsc#1238600).
  • CVE-2022-49495: drm/msm/hdmi: check return value after calling platformgetresource_byname() (bsc#1237932).
  • CVE-2022-49497: net: remove two BUG() from skbchecksumhelp() (bsc#1238946).
  • CVE-2022-49505: NFC: NULL out the dev->rfkill to prevent UAF (bsc#1238615).
  • CVE-2022-49516: ice: always check VF VSI pointer values (bsc#1238953).
  • CVE-2022-49519: ath10k: skip ath10k_halt during suspend for driver state RESTARTING (bsc#1238943).
  • CVE-2022-49524: media: pci: cx23885: Fix the error handling in cx23885_initdev() (bsc#1238949).
  • CVE-2022-49530: drm/amd/pm: fix double free in siparsepower_table() (bsc#1238944).
  • CVE-2022-49538: ALSA: jack: Fix mutex call in sndjackreport() (bsc#1238843).
  • CVE-2022-49544: ipw2x00: Fix potential NULL dereference in libipw_xmit() (bsc#1238721).
  • CVE-2022-49545: ALSA: usb-audio: Cancel pending work at closing a MIDI substream (bsc#1238729).
  • CVE-2022-49546: x86/kexec: Fix double-free of elf header buffer (bsc#1238750).
  • CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238787).
  • CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238789).
  • CVE-2022-49578: ip: Fix data-races around sysctlipprot_sock. (bsc#1238794).
  • CVE-2022-49581: be2net: Fix buffer overflow in begetmodule_eeprom (bsc#1238540).
  • CVE-2022-49589: kABI: protect mrifccount change (bsc#1238598).
  • CVE-2022-49605: igc: Reinstate IGC_REMOVED logic and implement it properly (bsc#1238433).
  • CVE-2022-49607: perf/core: Fix data race between perfeventsetoutput() and perfmmap_close() (bsc#1238817).
  • CVE-2022-49610: KVM: VMX: Prevent RSB underflow before vmenter (bsc#1238952).
  • CVE-2022-49619: net: sfp: fix memory leak in sfp_probe() (bsc#1239003).
  • CVE-2022-49620: net: tipc: fix possible refcount leak in tipcskcreate() (bsc#1239002).
  • CVE-2022-49640: sysctl: Fix data races in procdouintvecminmax() (bsc#1237782).
  • CVE-2022-49641: sysctl: Fix data races in proc_douintvec() (bsc#1237831).
  • CVE-2022-49667: net: bonding: fix use-after-free after 802.3ad slave unbind (bsc#1238282).
  • CVE-2022-49672: net: tun: unlink NAPI from device on destruction (bsc#1238816).
  • CVE-2022-49711: bus: fsl-mc-bus: fix KASAN use-after-free in fslmcbus_remove() (bsc#1238416).
  • CVE-2022-49727: ipv6: Fix signed integer overflow in l2tpip6sendmsg (bsc#1239059).
  • CVE-2022-49740: wifi: brcmfmac: Check the count value of channel spec to prevent out-of-bounds reads (bsc#1240233).
  • CVE-2023-52935: mm/khugepaged: fix ->anon_vma race (bsc#1240276).
  • CVE-2023-52997: ipv4: prevent potential spectre v1 gadget in ipmetricsconvert() (bsc#1240303).
  • CVE-2023-53010: bnxt: Do not read past the end of test names (bsc#1240290).
  • CVE-2023-53019: net: mdio: validate parameter addr in mdiobusgetphy() (bsc#1240286).
  • CVE-2024-35910: kABI fix for tcp: properly terminate timers for kernel sockets (bsc#1224489).
  • CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2capleflowctl_init() (bsc#1226130).
  • CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).
  • CVE-2024-41005: netpoll: Fix race condition in netpollowneractive (bsc#1227858).
  • CVE-2024-49571: net/smc: check ipareaoffset and ipv6prefixes_cnt when receiving proposal msg (bsc#1235733).
  • CVE-2024-49935: ACPI: PAD: fix crash in exitroundrobin() (bsc#1232370).
  • CVE-2024-49940: l2tp: prevent possible tunnel refcount underflow (bsc#1232812).
  • CVE-2024-50269: usb: musb: sunxi: Fix accessing an released usb phy (bsc#1233458).
  • CVE-2024-53124: net: fix data-races around sk->skforwardalloc (bsc#1234074).
  • CVE-2024-53140: netlink: terminate outstanding dump on socket close (bsc#1234222).
  • CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in ipvsprotocol_init() (bsc#1235715).
  • CVE-2024-56640: net/smc: fix LGR and link use-after-free issue (bsc#1235436).
  • CVE-2024-56770: net/sched: netem: account for backlog updates from child qdisc (bsc#1235637).
  • CVE-2024-57900: ila: serialize calls to nfregisternet_hooks() (bsc#1235973).
  • CVE-2024-57973: rdma/cxgb4: Prevent potential integer overflow on 32bit (bsc#1238531).
  • CVE-2024-57979: kABI workaround for pps changes (bsc#1238521).
  • CVE-2024-57996: netsched: schsfq: do not allow 1 packet limit (bsc#1239076).
  • CVE-2024-58014: wifi: brcmsmac: add gain range check to wlcphyiqcalgainparamsnphy() (bsc#1239109).
  • CVE-2024-58052: drm/amdgpu: Fix potential NULL pointer dereference in atomctrlgetsmcsclkrange_table (bsc#1238986).
  • CVE-2024-58071: team: prevent adding a device which is already a team device lower (bsc#1238970)
  • CVE-2024-58072: wifi: rtlwifi: remove unused checkbuddypriv (bsc#1238964).
  • CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvmgetvcpu() (bsc#1239036).
  • CVE-2025-21703: netem: Update sch->q.qlen before qdisctreereduce_backlog() (bsc#1237313).
  • CVE-2025-21708: net: usb: rtl8150: enable basic endpoint checking (bsc#1239087).
  • CVE-2025-21744: wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() (bsc#1238903).
  • CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send() (bsc#1238738).
  • CVE-2025-21760: ndisc: extend RCU protection in ndiscsendskb() (bsc#1238763).
  • CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780).
  • CVE-2025-21763: neighbour: use RCU protection in _neighnotify() (bsc#1237897).
  • CVE-2025-21765: ipv6: use RCU protection in ip6defaultadvmss() (bsc#1237906).
  • CVE-2025-21766: ipv4: use RCU protection in _iprtupdatepmtu() (bsc#1238754).
  • CVE-2025-21776: USB: hub: Ignore non-compliant devices with too many configs or interfaces (bsc#1238909).
  • CVE-2025-21782: orangefs: fix a oob in orangefsdebugwrite (bsc#1239117).
  • CVE-2025-21785: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (bsc#1238747).
  • CVE-2025-21791: vrf: use RCU protection in l3mdevl3out() (bsc#1238512).
  • CVE-2025-21796: nfsd: clear aclaccess/acldefault after releasing them (bsc#1238716).
  • CVE-2025-21802: net: hns3: fix oops when unload drivers paralleling (bsc#1238751).
  • CVE-2025-21821: fbdev: omap: use threaded IRQ for LCD DMA (bsc#1239174).
  • CVE-2025-21831: PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1 (bsc#1239039).
  • CVE-2025-21846: acct: perform last write from workqueue (bsc#1239508).
  • CVE-2025-21848: nfp: bpf: Add check for nfpappctrlmsgalloc() (bsc#1239479).
  • CVE-2025-21865: gtp: Suppress list corruption splat in gtpnetexitbatchrtnl() (bsc#1239481).
  • CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183).
  • CVE-2025-21877: usbnet: gl620a: fix endpoint checking in genelink_bind() (bsc#1240172).
  • CVE-2025-21891: ipvlan: ensure network headers are in skb linear part (bsc#1240186).
  • CVE-2025-21916: usb: atm: cxacru: fix a flaw in existing endpoint checks (bsc#1240582).
  • CVE-2025-21922: ppp: Fix KMSAN uninit-value warning with bpf (bsc#1240639).
  • CVE-2025-21934: rapidio: fix an API misues when rioaddnet() fails (bsc#1240708).
  • CVE-2025-21935: rapidio: add check for rioaddnet() in rioscanalloc_net() (bsc#1240700).
  • CVE-2025-21969: Bluetooth: L2CAP: Fix build errors in some archs (bsc#1240784).
  • CVE-2025-21993: iscsiibft: Fix UBSAN shift-out-of-bounds warning in ibftattrshownic() (bsc#1240797).
  • CVE-2025-21996: drm/radeon: fix uninitialized size issue in radeonvcecs_parse() (bsc#1240801).
  • CVE-2025-22007: Bluetooth: Fix error code in chanallocskb_cb() (bsc#1240582).

The following non-security bugs were fixed:

  • ceph: fix up error handling with snapdirs (bsc#1237836)
  • cpufreq: governor: Use kobject release() method to free dbs_data (bsc#1237800).
  • firmware: dmi-sysfs: Fix null-ptr-deref in dmisysfsregister_handle (bsc#1238467)
  • gro_cells: Avoid packet re-ordering for cloned skbs (bsc#1226323).
  • ipv4: add RCU protection to ip4dsthoplimit() (bsc#1239994).
  • ipv4: use RCU protection in inetselectaddr() (bsc#1239994).
  • ipv4: use RCU protection in ipdstmtumaybeforward() (bsc#1239994).
  • ipv4: use RCU protection in rtisexpired() (bsc#1239994).
  • ipv6: icmp: convert to devnetrcu() (bsc#1239994).
  • ipv6: Use RCU in ip6_input() (bsc#1239994).
  • kernel/sysctl.c: define minmax conv functions in terms of non-minmax versions (bsc#1237782)
  • ndisc: ndiscsendredirect() must use devgetbyindexrcu() (bsc#1239994).
  • ndisc: use RCU protection in ndiscallocskb() (bsc#1239994).
  • net: add devnetrcu() helper (bsc#1239994).
  • net: fix SO_REUSEPORT return code (bsc#1239448)
  • net: mana: Support holes in device list reply msg (bsc#1240133).
  • net: treat possiblenett net pointer as an RCU one and add readpnetrcu() (bsc#1239994).
  • net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480).
  • pipe, sysctl: drop 'min' parameter from pipe-max-size converter (bsc#1237782)
  • pipe, sysctl: remove pipeprocfn() (bsc#1237782)
  • pipe: add procdopipemaxsize() to safely assign pipemax_size (bsc#1237782)
  • pipe: reject FSETPIPESZ with size over UINT_MAX (bsc#1237782)
  • scripts: fix incorrect regex escape With Tumbleweed's recent switch to Python 3.13
  • sysctl: check for UINT_MAX before unsigned int min/max (bsc#1237782)
  • team: add ethtool getlinkksettings (bsc#1228909).
References

Affected packages

SUSE:Linux Enterprise Live Patching 12 SP5 / kernel-default

Package

Name
kernel-default
Purl
pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.255.1

Ecosystem specific

{
    "binaries": [
        {
            "kgraft-patch-4_12_14-122_255-default": "1-8.5.1",
            "kernel-default-kgraft": "4.12.14-122.255.1",
            "kernel-default-kgraft-devel": "4.12.14-122.255.1"
        }
    ]
}

SUSE:Linux Enterprise Live Patching 12 SP5 / kgraft-patch-SLE12-SP5_Update_67

Package

Name
kgraft-patch-SLE12-SP5_Update_67
Purl
pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_67&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1-8.5.1

Ecosystem specific

{
    "binaries": [
        {
            "kgraft-patch-4_12_14-122_255-default": "1-8.5.1",
            "kernel-default-kgraft": "4.12.14-122.255.1",
            "kernel-default-kgraft-devel": "4.12.14-122.255.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP5-LTSS / kernel-default

Package

Name
kernel-default
Purl
pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.255.1

Ecosystem specific

{
    "binaries": [
        {
            "dlm-kmp-default": "4.12.14-122.255.1",
            "kernel-devel": "4.12.14-122.255.1",
            "kernel-default-base": "4.12.14-122.255.1",
            "kernel-macros": "4.12.14-122.255.1",
            "kernel-default-man": "4.12.14-122.255.1",
            "kernel-source": "4.12.14-122.255.1",
            "cluster-md-kmp-default": "4.12.14-122.255.1",
            "kernel-default": "4.12.14-122.255.1",
            "gfs2-kmp-default": "4.12.14-122.255.1",
            "kernel-syms": "4.12.14-122.255.1",
            "kernel-default-devel": "4.12.14-122.255.1",
            "ocfs2-kmp-default": "4.12.14-122.255.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP5-LTSS / kernel-source

Package

Name
kernel-source
Purl
pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.255.1

Ecosystem specific

{
    "binaries": [
        {
            "dlm-kmp-default": "4.12.14-122.255.1",
            "kernel-devel": "4.12.14-122.255.1",
            "kernel-default-base": "4.12.14-122.255.1",
            "kernel-macros": "4.12.14-122.255.1",
            "kernel-default-man": "4.12.14-122.255.1",
            "kernel-source": "4.12.14-122.255.1",
            "cluster-md-kmp-default": "4.12.14-122.255.1",
            "kernel-default": "4.12.14-122.255.1",
            "gfs2-kmp-default": "4.12.14-122.255.1",
            "kernel-syms": "4.12.14-122.255.1",
            "kernel-default-devel": "4.12.14-122.255.1",
            "ocfs2-kmp-default": "4.12.14-122.255.1"
        }
    ]
}

SUSE:Linux Enterprise Server 12 SP5-LTSS / kernel-syms

Package

Name
kernel-syms
Purl
pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.255.1

Ecosystem specific

{
    "binaries": [
        {
            "dlm-kmp-default": "4.12.14-122.255.1",
            "kernel-devel": "4.12.14-122.255.1",
            "kernel-default-base": "4.12.14-122.255.1",
            "kernel-macros": "4.12.14-122.255.1",
            "kernel-default-man": "4.12.14-122.255.1",
            "kernel-source": "4.12.14-122.255.1",
            "cluster-md-kmp-default": "4.12.14-122.255.1",
            "kernel-default": "4.12.14-122.255.1",
            "gfs2-kmp-default": "4.12.14-122.255.1",
            "kernel-syms": "4.12.14-122.255.1",
            "kernel-default-devel": "4.12.14-122.255.1",
            "ocfs2-kmp-default": "4.12.14-122.255.1"
        }
    ]
}

SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5 / kernel-default

Package

Name
kernel-default
Purl
pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.255.1

Ecosystem specific

{
    "binaries": [
        {
            "dlm-kmp-default": "4.12.14-122.255.1",
            "kernel-devel": "4.12.14-122.255.1",
            "kernel-default-base": "4.12.14-122.255.1",
            "kernel-macros": "4.12.14-122.255.1",
            "kernel-source": "4.12.14-122.255.1",
            "cluster-md-kmp-default": "4.12.14-122.255.1",
            "kernel-default": "4.12.14-122.255.1",
            "gfs2-kmp-default": "4.12.14-122.255.1",
            "kernel-syms": "4.12.14-122.255.1",
            "kernel-default-devel": "4.12.14-122.255.1",
            "ocfs2-kmp-default": "4.12.14-122.255.1"
        }
    ]
}

SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5 / kernel-source

Package

Name
kernel-source
Purl
pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.255.1

Ecosystem specific

{
    "binaries": [
        {
            "dlm-kmp-default": "4.12.14-122.255.1",
            "kernel-devel": "4.12.14-122.255.1",
            "kernel-default-base": "4.12.14-122.255.1",
            "kernel-macros": "4.12.14-122.255.1",
            "kernel-source": "4.12.14-122.255.1",
            "cluster-md-kmp-default": "4.12.14-122.255.1",
            "kernel-default": "4.12.14-122.255.1",
            "gfs2-kmp-default": "4.12.14-122.255.1",
            "kernel-syms": "4.12.14-122.255.1",
            "kernel-default-devel": "4.12.14-122.255.1",
            "ocfs2-kmp-default": "4.12.14-122.255.1"
        }
    ]
}

SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5 / kernel-syms

Package

Name
kernel-syms
Purl
pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.12.14-122.255.1

Ecosystem specific

{
    "binaries": [
        {
            "dlm-kmp-default": "4.12.14-122.255.1",
            "kernel-devel": "4.12.14-122.255.1",
            "kernel-default-base": "4.12.14-122.255.1",
            "kernel-macros": "4.12.14-122.255.1",
            "kernel-source": "4.12.14-122.255.1",
            "cluster-md-kmp-default": "4.12.14-122.255.1",
            "kernel-default": "4.12.14-122.255.1",
            "gfs2-kmp-default": "4.12.14-122.255.1",
            "kernel-syms": "4.12.14-122.255.1",
            "kernel-default-devel": "4.12.14-122.255.1",
            "ocfs2-kmp-default": "4.12.14-122.255.1"
        }
    ]
}