Security update for the Linux Kernel
Announcement ID: | SUSE-SU-2025:01640-1 |
---|---|
Release Date: | 2025-05-21T11:52:09Z |
Rating: | important |
References: |
|
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 40 vulnerabilities and has seven security fixes can now be installed.
Description:
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2022-48933: netfilter: nf_tables: fix memory leak during stateful obj update (bsc#1229621).
- CVE-2022-49110: netfilter: conntrack: revisit gc autotuning (bsc#1237981).
- CVE-2022-49139: Bluetooth: fix null ptr deref on hci_sync_conn_complete_evt (bsc#1238032).
- CVE-2022-49767: 9p/trans_fd: always use O_NONBLOCK read/write (bsc#1242493).
- CVE-2024-46763: fou: Fix null-ptr-deref in GRO (bsc#1230764).
- CVE-2024-50038: netfilter: xtables: avoid NFPROTO_UNSPEC where needed (bsc#1231910).
- CVE-2025-21726: padata: avoid UAF for reorder_work (bsc#1238865).
- CVE-2025-21785: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (bsc#1238747).
- CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512).
- CVE-2025-21812: ax25: rcu protect dev->ax25_ptr (bsc#1238471).
- CVE-2025-21839: KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop (bsc#1239061).
- CVE-2025-22004: net: atm: fix use after free in lec_send() (bsc#1240835).
- CVE-2025-22020: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (bsc#1241280).
- CVE-2025-22045: x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs (bsc#1241433).
- CVE-2025-22055: net: fix geneve_opt length integer overflow (bsc#1241371).
- CVE-2025-22097: drm/vkms: Fix use after free and double free on init error (bsc#1241541).
- CVE-2025-2312: CIFS: New mount option for cifs.upcall namespace resolution (bsc#1239684).
- CVE-2025-23138: watch_queue: fix pipe accounting mismatch (bsc#1241648).
- CVE-2025-39735: jfs: fix slab-out-of-bounds read in ea_get() (bsc#1241625).
The following non-security bugs were fixed:
- cpufreq: ACPI: Mark boost policy as enabled when setting boost (bsc#1236777).
- cpufreq: Allow drivers to advertise boost enabled (bsc#1236777).
- cpufreq: Fix per-policy boost behavior on SoCs using cpufreq_boost_set_sw() (bsc#1236777).
- cpufreq: Support per-policy performance boost (bsc#1236777).
- x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778).
- x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778).
- x86/bpf: Call branch history clearing sequence on exit (bsc#1242778).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.5
zypper in -t patch SUSE-2025-1640=1
-
SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-1640=1
Package List:
-
openSUSE Leap 15.5 (noarch)
- kernel-source-rt-5.14.21-150500.13.94.1
- kernel-devel-rt-5.14.21-150500.13.94.1
-
openSUSE Leap 15.5 (x86_64)
- kernel-rt_debug-debugsource-5.14.21-150500.13.94.1
- kernel-rt_debug-devel-5.14.21-150500.13.94.1
- kernel-rt-extra-debuginfo-5.14.21-150500.13.94.1
- kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.94.1
- kernel-rt-optional-debuginfo-5.14.21-150500.13.94.1
- kselftests-kmp-rt-debuginfo-5.14.21-150500.13.94.1
- kernel-rt-extra-5.14.21-150500.13.94.1
- ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.94.1
- kernel-rt-livepatch-devel-5.14.21-150500.13.94.1
- dlm-kmp-rt-5.14.21-150500.13.94.1
- kernel-rt-debugsource-5.14.21-150500.13.94.1
- kernel-rt-vdso-5.14.21-150500.13.94.1
- reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.94.1
- reiserfs-kmp-rt-5.14.21-150500.13.94.1
- kselftests-kmp-rt-5.14.21-150500.13.94.1
- cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.94.1
- kernel-rt-optional-5.14.21-150500.13.94.1
- kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.94.1
- ocfs2-kmp-rt-5.14.21-150500.13.94.1
- cluster-md-kmp-rt-5.14.21-150500.13.94.1
- kernel-rt-livepatch-5.14.21-150500.13.94.1
- gfs2-kmp-rt-debuginfo-5.14.21-150500.13.94.1
- kernel-rt-vdso-debuginfo-5.14.21-150500.13.94.1
- kernel-rt_debug-vdso-5.14.21-150500.13.94.1
- kernel-rt-devel-5.14.21-150500.13.94.1
- kernel-syms-rt-5.14.21-150500.13.94.1
- dlm-kmp-rt-debuginfo-5.14.21-150500.13.94.1
- kernel-rt-debuginfo-5.14.21-150500.13.94.1
- gfs2-kmp-rt-5.14.21-150500.13.94.1
- kernel-rt_debug-debuginfo-5.14.21-150500.13.94.1
- kernel-rt-devel-debuginfo-5.14.21-150500.13.94.1
-
openSUSE Leap 15.5 (nosrc x86_64)
- kernel-rt-5.14.21-150500.13.94.1
- kernel-rt_debug-5.14.21-150500.13.94.1
-
SUSE Linux Enterprise Micro 5.5 (noarch)
- kernel-source-rt-5.14.21-150500.13.94.1
- kernel-devel-rt-5.14.21-150500.13.94.1
-
SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
- kernel-rt-5.14.21-150500.13.94.1
-
SUSE Linux Enterprise Micro 5.5 (x86_64)
- kernel-rt-debugsource-5.14.21-150500.13.94.1
- kernel-rt-debuginfo-5.14.21-150500.13.94.1
References:
- https://www.suse.com/security/cve/CVE-2021-47671.html
- https://www.suse.com/security/cve/CVE-2022-48933.html
- https://www.suse.com/security/cve/CVE-2022-49110.html
- https://www.suse.com/security/cve/CVE-2022-49139.html
- https://www.suse.com/security/cve/CVE-2022-49741.html
- https://www.suse.com/security/cve/CVE-2022-49745.html
- https://www.suse.com/security/cve/CVE-2022-49767.html
- https://www.suse.com/security/cve/CVE-2023-52928.html
- https://www.suse.com/security/cve/CVE-2023-52931.html
- https://www.suse.com/security/cve/CVE-2023-52936.html
- https://www.suse.com/security/cve/CVE-2023-52937.html
- https://www.suse.com/security/cve/CVE-2023-52938.html
- https://www.suse.com/security/cve/CVE-2023-52981.html
- https://www.suse.com/security/cve/CVE-2023-52982.html
- https://www.suse.com/security/cve/CVE-2023-52986.html
- https://www.suse.com/security/cve/CVE-2023-52994.html
- https://www.suse.com/security/cve/CVE-2023-53001.html
- https://www.suse.com/security/cve/CVE-2023-53002.html
- https://www.suse.com/security/cve/CVE-2023-53009.html
- https://www.suse.com/security/cve/CVE-2023-53014.html
- https://www.suse.com/security/cve/CVE-2023-53018.html
- https://www.suse.com/security/cve/CVE-2023-53031.html
- https://www.suse.com/security/cve/CVE-2023-53051.html
- https://www.suse.com/security/cve/CVE-2024-42307.html
- https://www.suse.com/security/cve/CVE-2024-46763.html
- https://www.suse.com/security/cve/CVE-2024-46865.html
- https://www.suse.com/security/cve/CVE-2024-50038.html
- https://www.suse.com/security/cve/CVE-2025-21726.html
- https://www.suse.com/security/cve/CVE-2025-21785.html
- https://www.suse.com/security/cve/CVE-2025-21791.html
- https://www.suse.com/security/cve/CVE-2025-21812.html
- https://www.suse.com/security/cve/CVE-2025-21839.html
- https://www.suse.com/security/cve/CVE-2025-22004.html
- https://www.suse.com/security/cve/CVE-2025-22020.html
- https://www.suse.com/security/cve/CVE-2025-22045.html
- https://www.suse.com/security/cve/CVE-2025-22055.html
- https://www.suse.com/security/cve/CVE-2025-22097.html
- https://www.suse.com/security/cve/CVE-2025-2312.html
- https://www.suse.com/security/cve/CVE-2025-23138.html
- https://www.suse.com/security/cve/CVE-2025-39735.html
- https://bugzilla.suse.com/show_bug.cgi?id=1054914
- https://bugzilla.suse.com/show_bug.cgi?id=1206843
- https://bugzilla.suse.com/show_bug.cgi?id=1210409
- https://bugzilla.suse.com/show_bug.cgi?id=1225903
- https://bugzilla.suse.com/show_bug.cgi?id=1229361
- https://bugzilla.suse.com/show_bug.cgi?id=1229621
- https://bugzilla.suse.com/show_bug.cgi?id=1230764
- https://bugzilla.suse.com/show_bug.cgi?id=1231103
- https://bugzilla.suse.com/show_bug.cgi?id=1231910
- https://bugzilla.suse.com/show_bug.cgi?id=1236777
- https://bugzilla.suse.com/show_bug.cgi?id=1237981
- https://bugzilla.suse.com/show_bug.cgi?id=1238032
- https://bugzilla.suse.com/show_bug.cgi?id=1238471
- https://bugzilla.suse.com/show_bug.cgi?id=1238512
- https://bugzilla.suse.com/show_bug.cgi?id=1238747
- https://bugzilla.suse.com/show_bug.cgi?id=1238865
- https://bugzilla.suse.com/show_bug.cgi?id=1239061
- https://bugzilla.suse.com/show_bug.cgi?id=1239684
- https://bugzilla.suse.com/show_bug.cgi?id=1239968
- https://bugzilla.suse.com/show_bug.cgi?id=1240209
- https://bugzilla.suse.com/show_bug.cgi?id=1240211
- https://bugzilla.suse.com/show_bug.cgi?id=1240214
- https://bugzilla.suse.com/show_bug.cgi?id=1240228
- https://bugzilla.suse.com/show_bug.cgi?id=1240230
- https://bugzilla.suse.com/show_bug.cgi?id=1240246
- https://bugzilla.suse.com/show_bug.cgi?id=1240248
- https://bugzilla.suse.com/show_bug.cgi?id=1240269
- https://bugzilla.suse.com/show_bug.cgi?id=1240271
- https://bugzilla.suse.com/show_bug.cgi?id=1240274
- https://bugzilla.suse.com/show_bug.cgi?id=1240285
- https://bugzilla.suse.com/show_bug.cgi?id=1240295
- https://bugzilla.suse.com/show_bug.cgi?id=1240306
- https://bugzilla.suse.com/show_bug.cgi?id=1240314
- https://bugzilla.suse.com/show_bug.cgi?id=1240315
- https://bugzilla.suse.com/show_bug.cgi?id=1240321
- https://bugzilla.suse.com/show_bug.cgi?id=1240747
- https://bugzilla.suse.com/show_bug.cgi?id=1240835
- https://bugzilla.suse.com/show_bug.cgi?id=1241280
- https://bugzilla.suse.com/show_bug.cgi?id=1241371
- https://bugzilla.suse.com/show_bug.cgi?id=1241421
- https://bugzilla.suse.com/show_bug.cgi?id=1241433
- https://bugzilla.suse.com/show_bug.cgi?id=1241541
- https://bugzilla.suse.com/show_bug.cgi?id=1241625
- https://bugzilla.suse.com/show_bug.cgi?id=1241648
- https://bugzilla.suse.com/show_bug.cgi?id=1242284
- https://bugzilla.suse.com/show_bug.cgi?id=1242493
- https://bugzilla.suse.com/show_bug.cgi?id=1242778