Security update for the Linux Kernel
| Announcement ID: | SUSE-SU-2025:01995-1 |
|---|---|
| Release Date: | 2025-06-18T08:34:45Z |
| Rating: | important |
| References: |
|
| Cross-References: |
|
| CVSS scores: |
|
| Affected Products: |
|
An update that solves 89 vulnerabilities and has 22 security fixes can now be installed.
Description:
The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2022-49110: netfilter: conntrack: revisit gc autotuning (bsc#1237981).
- CVE-2022-49139: Bluetooth: fix null ptr deref on hci_sync_conn_complete_evt (bsc#1238032).
- CVE-2022-49767: 9p/trans_fd: always use O_NONBLOCK read/write (bsc#1242493).
- CVE-2022-49769: gfs2: Check sb_bsize_shift after reading superblock (bsc#1242440).
- CVE-2022-49770: ceph: avoid putting the realm twice when decoding snaps fails (bsc#1242597).
- CVE-2022-49775: tcp: cdg: allow tcp_cdg_release() to be called multiple times (bsc#1242245).
- CVE-2022-49789: scsi: zfcp: Fix double free of FSF request when qdio send fails (bsc#1242366).
- CVE-2023-53039: HID: intel-ish-hid: ipc: Fix potential use-after-free in work function (bsc#1242745).
- CVE-2024-53168: sunrpc: fix one UAF issue caused by sunrpc kernel tcp socket (bsc#1234887).
- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1235100).
- CVE-2025-21812: ax25: rcu protect dev->ax25_ptr (bsc#1238471).
- CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1240802).
- CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762).
The following non-security bugs were fixed:
- HID: intel-ish-hid: ipc: Fix dev_err usage with uninitialized dev->devc (bsc#1242745).
- devm-helpers: Add resource managed version of work init (bsc#1242745).
- mtd: phram: Add the kernel lock down check (bsc#1232649).
- ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes).
- workqueue: Add resource managed version of delayed work init (bsc#1242745).
- Remove debug flavor (bsc#1243919).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-1995=1 -
SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1995=1 -
SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-1995=1
Package List:
-
SUSE Linux Enterprise Micro 5.1 (nosrc x86_64)
- kernel-rt-5.3.18-150300.211.1
-
SUSE Linux Enterprise Micro 5.1 (x86_64)
- kernel-rt-debugsource-5.3.18-150300.211.1
- kernel-rt-debuginfo-5.3.18-150300.211.1
-
SUSE Linux Enterprise Micro 5.1 (noarch)
- kernel-source-rt-5.3.18-150300.211.1
-
SUSE Linux Enterprise Micro 5.2 (nosrc x86_64)
- kernel-rt-5.3.18-150300.211.1
-
SUSE Linux Enterprise Micro 5.2 (x86_64)
- kernel-rt-debugsource-5.3.18-150300.211.1
- kernel-rt-debuginfo-5.3.18-150300.211.1
-
SUSE Linux Enterprise Micro 5.2 (noarch)
- kernel-source-rt-5.3.18-150300.211.1
-
SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64)
- kernel-rt-5.3.18-150300.211.1
-
SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
- kernel-rt-debugsource-5.3.18-150300.211.1
- kernel-rt-debuginfo-5.3.18-150300.211.1
-
SUSE Linux Enterprise Micro for Rancher 5.2 (noarch)
- kernel-source-rt-5.3.18-150300.211.1
References:
- https://www.suse.com/security/cve/CVE-2020-36790.html
- https://www.suse.com/security/cve/CVE-2020-36791.html
- https://www.suse.com/security/cve/CVE-2021-32399.html
- https://www.suse.com/security/cve/CVE-2021-3743.html
- https://www.suse.com/security/cve/CVE-2021-47100.html
- https://www.suse.com/security/cve/CVE-2021-47220.html
- https://www.suse.com/security/cve/CVE-2021-47229.html
- https://www.suse.com/security/cve/CVE-2021-47231.html
- https://www.suse.com/security/cve/CVE-2021-47236.html
- https://www.suse.com/security/cve/CVE-2021-47239.html
- https://www.suse.com/security/cve/CVE-2021-47240.html
- https://www.suse.com/security/cve/CVE-2021-47246.html
- https://www.suse.com/security/cve/CVE-2021-47252.html
- https://www.suse.com/security/cve/CVE-2021-47255.html
- https://www.suse.com/security/cve/CVE-2021-47260.html
- https://www.suse.com/security/cve/CVE-2021-47288.html
- https://www.suse.com/security/cve/CVE-2021-47296.html
- https://www.suse.com/security/cve/CVE-2021-47314.html
- https://www.suse.com/security/cve/CVE-2021-47315.html
- https://www.suse.com/security/cve/CVE-2021-47485.html
- https://www.suse.com/security/cve/CVE-2021-47500.html
- https://www.suse.com/security/cve/CVE-2021-47511.html
- https://www.suse.com/security/cve/CVE-2022-3564.html
- https://www.suse.com/security/cve/CVE-2022-48704.html
- https://www.suse.com/security/cve/CVE-2022-49110.html
- https://www.suse.com/security/cve/CVE-2022-49139.html
- https://www.suse.com/security/cve/CVE-2022-49767.html
- https://www.suse.com/security/cve/CVE-2022-49769.html
- https://www.suse.com/security/cve/CVE-2022-49770.html
- https://www.suse.com/security/cve/CVE-2022-49771.html
- https://www.suse.com/security/cve/CVE-2022-49772.html
- https://www.suse.com/security/cve/CVE-2022-49775.html
- https://www.suse.com/security/cve/CVE-2022-49777.html
- https://www.suse.com/security/cve/CVE-2022-49787.html
- https://www.suse.com/security/cve/CVE-2022-49788.html
- https://www.suse.com/security/cve/CVE-2022-49789.html
- https://www.suse.com/security/cve/CVE-2022-49790.html
- https://www.suse.com/security/cve/CVE-2022-49793.html
- https://www.suse.com/security/cve/CVE-2022-49794.html
- https://www.suse.com/security/cve/CVE-2022-49799.html
- https://www.suse.com/security/cve/CVE-2022-49802.html
- https://www.suse.com/security/cve/CVE-2022-49809.html
- https://www.suse.com/security/cve/CVE-2022-49818.html
- https://www.suse.com/security/cve/CVE-2022-49821.html
- https://www.suse.com/security/cve/CVE-2022-49823.html
- https://www.suse.com/security/cve/CVE-2022-49824.html
- https://www.suse.com/security/cve/CVE-2022-49825.html
- https://www.suse.com/security/cve/CVE-2022-49826.html
- https://www.suse.com/security/cve/CVE-2022-49827.html
- https://www.suse.com/security/cve/CVE-2022-49830.html
- https://www.suse.com/security/cve/CVE-2022-49832.html
- https://www.suse.com/security/cve/CVE-2022-49835.html
- https://www.suse.com/security/cve/CVE-2022-49836.html
- https://www.suse.com/security/cve/CVE-2022-49839.html
- https://www.suse.com/security/cve/CVE-2022-49841.html
- https://www.suse.com/security/cve/CVE-2022-49842.html
- https://www.suse.com/security/cve/CVE-2022-49846.html
- https://www.suse.com/security/cve/CVE-2022-49861.html
- https://www.suse.com/security/cve/CVE-2022-49870.html
- https://www.suse.com/security/cve/CVE-2022-49879.html
- https://www.suse.com/security/cve/CVE-2022-49880.html
- https://www.suse.com/security/cve/CVE-2022-49881.html
- https://www.suse.com/security/cve/CVE-2022-49887.html
- https://www.suse.com/security/cve/CVE-2022-49889.html
- https://www.suse.com/security/cve/CVE-2022-49892.html
- https://www.suse.com/security/cve/CVE-2022-49906.html
- https://www.suse.com/security/cve/CVE-2022-49910.html
- https://www.suse.com/security/cve/CVE-2022-49915.html
- https://www.suse.com/security/cve/CVE-2022-49922.html
- https://www.suse.com/security/cve/CVE-2022-49927.html
- https://www.suse.com/security/cve/CVE-2023-0160.html
- https://www.suse.com/security/cve/CVE-2023-1990.html
- https://www.suse.com/security/cve/CVE-2023-47233.html
- https://www.suse.com/security/cve/CVE-2023-52508.html
- https://www.suse.com/security/cve/CVE-2023-52591.html
- https://www.suse.com/security/cve/CVE-2023-52654.html
- https://www.suse.com/security/cve/CVE-2023-53039.html
- https://www.suse.com/security/cve/CVE-2023-53052.html
- https://www.suse.com/security/cve/CVE-2023-53106.html
- https://www.suse.com/security/cve/CVE-2023-6531.html
- https://www.suse.com/security/cve/CVE-2024-35811.html
- https://www.suse.com/security/cve/CVE-2024-35895.html
- https://www.suse.com/security/cve/CVE-2024-35914.html
- https://www.suse.com/security/cve/CVE-2024-46814.html
- https://www.suse.com/security/cve/CVE-2024-53168.html
- https://www.suse.com/security/cve/CVE-2024-56558.html
- https://www.suse.com/security/cve/CVE-2025-21812.html
- https://www.suse.com/security/cve/CVE-2025-21999.html
- https://www.suse.com/security/cve/CVE-2025-37789.html
- https://bugzilla.suse.com/show_bug.cgi?id=1154353
- https://bugzilla.suse.com/show_bug.cgi?id=1156395
- https://bugzilla.suse.com/show_bug.cgi?id=1170891
- https://bugzilla.suse.com/show_bug.cgi?id=1173139
- https://bugzilla.suse.com/show_bug.cgi?id=1184350
- https://bugzilla.suse.com/show_bug.cgi?id=1184611
- https://bugzilla.suse.com/show_bug.cgi?id=1185010
- https://bugzilla.suse.com/show_bug.cgi?id=1188772
- https://bugzilla.suse.com/show_bug.cgi?id=1189883
- https://bugzilla.suse.com/show_bug.cgi?id=1190358
- https://bugzilla.suse.com/show_bug.cgi?id=1190428
- https://bugzilla.suse.com/show_bug.cgi?id=1201644
- https://bugzilla.suse.com/show_bug.cgi?id=1201664
- https://bugzilla.suse.com/show_bug.cgi?id=1201672
- https://bugzilla.suse.com/show_bug.cgi?id=1201673
- https://bugzilla.suse.com/show_bug.cgi?id=1201676
- https://bugzilla.suse.com/show_bug.cgi?id=1206073
- https://bugzilla.suse.com/show_bug.cgi?id=1206649
- https://bugzilla.suse.com/show_bug.cgi?id=1206886
- https://bugzilla.suse.com/show_bug.cgi?id=1206887
- https://bugzilla.suse.com/show_bug.cgi?id=1207198
- https://bugzilla.suse.com/show_bug.cgi?id=1209657
- https://bugzilla.suse.com/show_bug.cgi?id=1210337
- https://bugzilla.suse.com/show_bug.cgi?id=1213476
- https://bugzilla.suse.com/show_bug.cgi?id=1214842
- https://bugzilla.suse.com/show_bug.cgi?id=1216702
- https://bugzilla.suse.com/show_bug.cgi?id=1220754
- https://bugzilla.suse.com/show_bug.cgi?id=1220985
- https://bugzilla.suse.com/show_bug.cgi?id=1221015
- https://bugzilla.suse.com/show_bug.cgi?id=1221044
- https://bugzilla.suse.com/show_bug.cgi?id=1223932
- https://bugzilla.suse.com/show_bug.cgi?id=1224099
- https://bugzilla.suse.com/show_bug.cgi?id=1224482
- https://bugzilla.suse.com/show_bug.cgi?id=1224511
- https://bugzilla.suse.com/show_bug.cgi?id=1224592
- https://bugzilla.suse.com/show_bug.cgi?id=1224831
- https://bugzilla.suse.com/show_bug.cgi?id=1224832
- https://bugzilla.suse.com/show_bug.cgi?id=1224834
- https://bugzilla.suse.com/show_bug.cgi?id=1224841
- https://bugzilla.suse.com/show_bug.cgi?id=1224843
- https://bugzilla.suse.com/show_bug.cgi?id=1224846
- https://bugzilla.suse.com/show_bug.cgi?id=1224849
- https://bugzilla.suse.com/show_bug.cgi?id=1224854
- https://bugzilla.suse.com/show_bug.cgi?id=1224859
- https://bugzilla.suse.com/show_bug.cgi?id=1224882
- https://bugzilla.suse.com/show_bug.cgi?id=1224889
- https://bugzilla.suse.com/show_bug.cgi?id=1224891
- https://bugzilla.suse.com/show_bug.cgi?id=1224892
- https://bugzilla.suse.com/show_bug.cgi?id=1224893
- https://bugzilla.suse.com/show_bug.cgi?id=1224904
- https://bugzilla.suse.com/show_bug.cgi?id=1225360
- https://bugzilla.suse.com/show_bug.cgi?id=1225411
- https://bugzilla.suse.com/show_bug.cgi?id=1231193
- https://bugzilla.suse.com/show_bug.cgi?id=1232649
- https://bugzilla.suse.com/show_bug.cgi?id=1234887
- https://bugzilla.suse.com/show_bug.cgi?id=1235100
- https://bugzilla.suse.com/show_bug.cgi?id=1237981
- https://bugzilla.suse.com/show_bug.cgi?id=1238032
- https://bugzilla.suse.com/show_bug.cgi?id=1238471
- https://bugzilla.suse.com/show_bug.cgi?id=1240802
- https://bugzilla.suse.com/show_bug.cgi?id=1242145
- https://bugzilla.suse.com/show_bug.cgi?id=1242147
- https://bugzilla.suse.com/show_bug.cgi?id=1242150
- https://bugzilla.suse.com/show_bug.cgi?id=1242154
- https://bugzilla.suse.com/show_bug.cgi?id=1242215
- https://bugzilla.suse.com/show_bug.cgi?id=1242232
- https://bugzilla.suse.com/show_bug.cgi?id=1242245
- https://bugzilla.suse.com/show_bug.cgi?id=1242264
- https://bugzilla.suse.com/show_bug.cgi?id=1242270
- https://bugzilla.suse.com/show_bug.cgi?id=1242352
- https://bugzilla.suse.com/show_bug.cgi?id=1242353
- https://bugzilla.suse.com/show_bug.cgi?id=1242355
- https://bugzilla.suse.com/show_bug.cgi?id=1242366
- https://bugzilla.suse.com/show_bug.cgi?id=1242378
- https://bugzilla.suse.com/show_bug.cgi?id=1242385
- https://bugzilla.suse.com/show_bug.cgi?id=1242387
- https://bugzilla.suse.com/show_bug.cgi?id=1242391
- https://bugzilla.suse.com/show_bug.cgi?id=1242392
- https://bugzilla.suse.com/show_bug.cgi?id=1242402
- https://bugzilla.suse.com/show_bug.cgi?id=1242409
- https://bugzilla.suse.com/show_bug.cgi?id=1242416
- https://bugzilla.suse.com/show_bug.cgi?id=1242440
- https://bugzilla.suse.com/show_bug.cgi?id=1242443
- https://bugzilla.suse.com/show_bug.cgi?id=1242449
- https://bugzilla.suse.com/show_bug.cgi?id=1242452
- https://bugzilla.suse.com/show_bug.cgi?id=1242455
- https://bugzilla.suse.com/show_bug.cgi?id=1242464
- https://bugzilla.suse.com/show_bug.cgi?id=1242473
- https://bugzilla.suse.com/show_bug.cgi?id=1242481
- https://bugzilla.suse.com/show_bug.cgi?id=1242484
- https://bugzilla.suse.com/show_bug.cgi?id=1242493
- https://bugzilla.suse.com/show_bug.cgi?id=1242527
- https://bugzilla.suse.com/show_bug.cgi?id=1242542
- https://bugzilla.suse.com/show_bug.cgi?id=1242545
- https://bugzilla.suse.com/show_bug.cgi?id=1242547
- https://bugzilla.suse.com/show_bug.cgi?id=1242548
- https://bugzilla.suse.com/show_bug.cgi?id=1242549
- https://bugzilla.suse.com/show_bug.cgi?id=1242551
- https://bugzilla.suse.com/show_bug.cgi?id=1242580
- https://bugzilla.suse.com/show_bug.cgi?id=1242597
- https://bugzilla.suse.com/show_bug.cgi?id=1242686
- https://bugzilla.suse.com/show_bug.cgi?id=1242689
- https://bugzilla.suse.com/show_bug.cgi?id=1242716
- https://bugzilla.suse.com/show_bug.cgi?id=1242733
- https://bugzilla.suse.com/show_bug.cgi?id=1242734
- https://bugzilla.suse.com/show_bug.cgi?id=1242736
- https://bugzilla.suse.com/show_bug.cgi?id=1242745
- https://bugzilla.suse.com/show_bug.cgi?id=1242749
- https://bugzilla.suse.com/show_bug.cgi?id=1242762
- https://bugzilla.suse.com/show_bug.cgi?id=1242835
- https://bugzilla.suse.com/show_bug.cgi?id=1243919