SUSE-SU-2025:3761-1

Source
https://www.suse.com/support/update/announcement/2025/suse-su-20253761-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2025:3761-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2025:3761-1
Upstream
Related
Published
2025-10-23T15:04:37Z
Modified
2025-10-23T21:17:25.615187Z
Summary
Security update for the Linux Kernel
Details

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

  • CVE-2022-49138: Bluetooth: hcievent: Fix checking conn for leconncompleteevt (bsc#1238160).
  • CVE-2022-50233: Bluetooth: eir: Fix using strlen with hdev->{devname,shortname} (bsc#1246968).
  • CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249846).
  • CVE-2022-50409: net: If sock is dead do not access sock's skwq in skstreamwaitmemory (bsc#1250392).
  • CVE-2023-53178: mm: fix zswap writeback race condition (bsc#1249827).
  • CVE-2023-53257: wifi: mac80211: check S1G action frame size (bsc#1249869).
  • CVE-2023-53321: wifi: mac80211_hwsim: drop short frames (bsc#1250313).
  • CVE-2023-53438: x86/MCE: Always save CS register on AMD Zen IF Poison errors (bsc#1250180).
  • CVE-2025-37738: ext4: ignore xattrs past end (bsc#1242846).
  • CVE-2025-37958: mm/huge_memory: fix dereferencing invalid pmd migration entry (bsc#1243539).
  • CVE-2025-38014: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (bsc#1244732).
  • CVE-2025-38111: net/mdiobus: Fix potential out-of-bounds read/write access (bsc#1245666).
  • CVE-2025-38380: i2c/designware: Fix an initialization issue (bsc#1247028).
  • CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239).
  • CVE-2025-38553: net/sched: Restrict conditions for adding duplicating netems to qdisc tree (bsc#1248255).
  • CVE-2025-38572: ipv6: reject malicious packets in ipv6gsosegment() (bsc#1248399).
  • CVE-2025-38659: gfs2: No more self recovery (bsc#1248639).
  • CVE-2025-38664: ice: Fix a null pointer dereference in icecopyandinitpkg() (bsc#1248628).
  • CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249126).
  • CVE-2025-38685: fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (bsc#1249220).
  • CVE-2025-38706: ASoC: core: Check for rtd == NULL in sndsocremovepcmruntime() (bsc#1249195).
  • CVE-2025-38713: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (bsc#1249200).
  • CVE-2025-38734: net/smc: fix UAF on smcsk after smclistenout() (bsc#1249324).
  • CVE-2025-39691: fs/buffer: fix use-after-free when call bh_read() helper (bsc#1249374).
  • CVE-2025-39703: net, hsr: reject HSR frame if skb can't hold tag (bsc#1249315).
  • CVE-2025-39726: s390/ism: fix concurrency management in ism_cmd() (bsc#1249266).
  • CVE-2025-39746: wifi: ath10k: shutdown driver when hardware is unreliable (bsc#1249516).
  • CVE-2025-39751: ALSA: hda/ca0132: Fix buffer overflow in addtuningcontrol (bsc#1249538).
  • CVE-2025-39790: bus: mhi: host: Detect events pointing to unexpected TREs (bsc#1249548).
  • CVE-2025-39823: KVM: x86: use arrayindexnospec with indices that come from guest (bsc#1250002).
  • CVE-2025-39824: HID: asus: fix UAF via HIDCLAIMEDINPUT validation (bsc#1250007).
  • CVE-2025-39860: Bluetooth: Fix use-after-free in l2capsockcleanup_listen() (bsc#1250247).
  • CVE-2025-39869: dmaengine: ti: edma: Fix memory allocation size for queueprioritymap (bsc#1250406).

The following non-security bugs were fixed:

  • Kconfig.suse: Add KABI checkiness macro (config) (bsc#1249186).
  • Limit patch filenames to 100 characters (bsc#1249604).
  • Move pesign-obs-integration requirement from kernel-syms to kernel devel subpackage (bsc#1248108).
  • Revert selinux patches that caused regressions (bsc#1249353).
  • btrfs: avoid NULL pointer dereference if no valid extent tree (bsc#1249158).
  • build_bug.h: Add KABI assert (bsc#1249186).
  • hv_netvsc: Fix panic during namespace deletion with VF (bsc#1248111).
  • kabi/severities: ignore kABI for atheros helper modules The symbols are used only internally by atheros drivers.
  • kernel-binary: Another installation ordering fix (bsc#1241353).
  • kernel-source: Do not list mkspec and its inputs as sources (bsc#1250522).
  • kernel-subpackage-build: Decompress ghost file when compressed version exists (bsc#1249346)
  • kernel-syms.spec: Drop old rpm release number hack (bsc#1247172).
  • net/sched: ets: use old 'nbands' while purging unused classes (git-fixes).
  • rpm/kernel-subpackage-spec: Skip brp-strip-debug to avoid file truncation (bsc#1246879).
  • rpm/mkspec: Fix missing kernel-syms-rt creation (bsc#1244337).
  • rpm: Configure KABI checkingness macro (bsc#1249186).
  • rpm: Drop support for kabi/arch/ignore-flavor (bsc#1249186).
  • rpm: Link arch-symbols script from scripts directory.
  • rpm: Link guards script from scripts directory.
  • supported.conf: mark hyperv_drm as external
  • use uniform permission checks for all mount propagation changes (git-fixes).
  • xfs: rework datasync tracking and execution (bsc#1237449).
References

Affected packages

SUSE:Linux Enterprise Micro 5.5 / kernel-rt

Package

Name
kernel-rt
Purl
pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.14.21-150500.13.109.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-devel-rt": "5.14.21-150500.13.109.1",
            "kernel-source-rt": "5.14.21-150500.13.109.1",
            "kernel-rt": "5.14.21-150500.13.109.1"
        }
    ]
}

SUSE:Linux Enterprise Micro 5.5 / kernel-source-rt

Package

Name
kernel-source-rt
Purl
pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.14.21-150500.13.109.1

Ecosystem specific

{
    "binaries": [
        {
            "kernel-devel-rt": "5.14.21-150500.13.109.1",
            "kernel-source-rt": "5.14.21-150500.13.109.1",
            "kernel-rt": "5.14.21-150500.13.109.1"
        }
    ]
}