Security update for the Linux Kernel
| Announcement ID: | SUSE-SU-2025:4315-1 |
|---|---|
| Release Date: | 2025-12-01T10:12:40Z |
| Rating: | important |
| References: |
|
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves 20 vulnerabilities, contains one feature and has five security fixes can now be installed.
Description:
The SUSE Linux Enterprise 11 SP4 kernel was updated to fix various security issues
The following security issues were fixed:
- CVE-2022-50116: Update config files. Disable N_GSM (bsc#1244824 jsc#PED-8240).
- CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249846).
- CVE-2022-50381: MD: add rdev reference for super write (bsc#1250257).
- CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory (bsc#1250392).
- CVE-2023-53282: scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1250311).
- CVE-2023-53322: scsi: qla2xxx: Wait for io return on terminate rport (bsc#1250323).
- CVE-2023-53365: ip6mr: Fix skb_under_panic in ip6mr_cache_report() (bsc#1249988).
- CVE-2023-53395: ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer (bsc#1250358).
- CVE-2023-53705: ipv6: Fix out-of-bounds access in ipv6_find_tlv() (bsc#1252554).
- CVE-2023-53722: md: raid1: fix potential OOB in raid1_remove_disk() (bsc#1252499).
- CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1246911).
- CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247374).
- CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1248621).
- CVE-2025-38685: fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (bsc#1249220).
- CVE-2025-38713: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (bsc#1249200).
- CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE
zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2025-4315=1 -
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2025-4315=1
Package List:
-
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE (nosrc x86_64)
- kernel-default-3.0.101-108.192.1
- kernel-xen-3.0.101-108.192.1
- kernel-trace-3.0.101-108.192.1
- kernel-ec2-3.0.101-108.192.1
-
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE (x86_64)
- kernel-default-devel-debuginfo-3.0.101-108.192.1
- kernel-trace-debuginfo-3.0.101-108.192.1
- kernel-ec2-debugsource-3.0.101-108.192.1
- kernel-default-base-3.0.101-108.192.1
- kernel-trace-debugsource-3.0.101-108.192.1
- kernel-xen-base-3.0.101-108.192.1
- kernel-trace-base-3.0.101-108.192.1
- kernel-xen-devel-debuginfo-3.0.101-108.192.1
- kernel-trace-devel-debuginfo-3.0.101-108.192.1
- kernel-source-3.0.101-108.192.1
- kernel-syms-3.0.101-108.192.1
- kernel-xen-devel-3.0.101-108.192.1
- kernel-trace-devel-3.0.101-108.192.1
- kernel-default-debugsource-3.0.101-108.192.1
- kernel-ec2-devel-3.0.101-108.192.1
- kernel-ec2-base-3.0.101-108.192.1
- kernel-xen-debuginfo-3.0.101-108.192.1
- kernel-xen-debugsource-3.0.101-108.192.1
- kernel-default-debuginfo-3.0.101-108.192.1
- kernel-default-devel-3.0.101-108.192.1
- kernel-ec2-debuginfo-3.0.101-108.192.1
- kernel-ec2-devel-debuginfo-3.0.101-108.192.1
-
SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE (noarch nosrc)
- kernel-docs-3.0.101-108.192.1
-
SUSE Linux Enterprise Server 11 SP4 (nosrc x86_64)
- kernel-default-3.0.101-108.192.1
- kernel-xen-3.0.101-108.192.1
- kernel-trace-3.0.101-108.192.1
- kernel-ec2-3.0.101-108.192.1
-
SUSE Linux Enterprise Server 11 SP4 (x86_64)
- kernel-default-devel-debuginfo-3.0.101-108.192.1
- kernel-trace-debuginfo-3.0.101-108.192.1
- kernel-ec2-debugsource-3.0.101-108.192.1
- kernel-default-base-3.0.101-108.192.1
- kernel-trace-debugsource-3.0.101-108.192.1
- kernel-xen-base-3.0.101-108.192.1
- kernel-trace-base-3.0.101-108.192.1
- kernel-xen-devel-debuginfo-3.0.101-108.192.1
- kernel-trace-devel-debuginfo-3.0.101-108.192.1
- kernel-source-3.0.101-108.192.1
- kernel-syms-3.0.101-108.192.1
- kernel-xen-devel-3.0.101-108.192.1
- kernel-trace-devel-3.0.101-108.192.1
- kernel-default-debugsource-3.0.101-108.192.1
- kernel-ec2-devel-3.0.101-108.192.1
- kernel-ec2-base-3.0.101-108.192.1
- kernel-xen-debuginfo-3.0.101-108.192.1
- kernel-xen-debugsource-3.0.101-108.192.1
- kernel-default-debuginfo-3.0.101-108.192.1
- kernel-default-devel-3.0.101-108.192.1
- kernel-ec2-debuginfo-3.0.101-108.192.1
- kernel-ec2-devel-debuginfo-3.0.101-108.192.1
-
SUSE Linux Enterprise Server 11 SP4 (noarch nosrc)
- kernel-docs-3.0.101-108.192.1
References:
- https://www.suse.com/security/cve/CVE-2022-50116.html
- https://www.suse.com/security/cve/CVE-2022-50252.html
- https://www.suse.com/security/cve/CVE-2022-50272.html
- https://www.suse.com/security/cve/CVE-2022-50381.html
- https://www.suse.com/security/cve/CVE-2022-50409.html
- https://www.suse.com/security/cve/CVE-2023-28328.html
- https://www.suse.com/security/cve/CVE-2023-3772.html
- https://www.suse.com/security/cve/CVE-2023-53147.html
- https://www.suse.com/security/cve/CVE-2023-53282.html
- https://www.suse.com/security/cve/CVE-2023-53322.html
- https://www.suse.com/security/cve/CVE-2023-53365.html
- https://www.suse.com/security/cve/CVE-2023-53395.html
- https://www.suse.com/security/cve/CVE-2023-53705.html
- https://www.suse.com/security/cve/CVE-2023-53722.html
- https://www.suse.com/security/cve/CVE-2025-38352.html
- https://www.suse.com/security/cve/CVE-2025-38498.html
- https://www.suse.com/security/cve/CVE-2025-38617.html
- https://www.suse.com/security/cve/CVE-2025-38685.html
- https://www.suse.com/security/cve/CVE-2025-38713.html
- https://www.suse.com/security/cve/CVE-2025-39973.html
- https://bugzilla.suse.com/show_bug.cgi?id=1078788
- https://bugzilla.suse.com/show_bug.cgi?id=1209291
- https://bugzilla.suse.com/show_bug.cgi?id=1213666
- https://bugzilla.suse.com/show_bug.cgi?id=1244824
- https://bugzilla.suse.com/show_bug.cgi?id=1246911
- https://bugzilla.suse.com/show_bug.cgi?id=1247374
- https://bugzilla.suse.com/show_bug.cgi?id=1248621
- https://bugzilla.suse.com/show_bug.cgi?id=1249200
- https://bugzilla.suse.com/show_bug.cgi?id=1249220
- https://bugzilla.suse.com/show_bug.cgi?id=1249604
- https://bugzilla.suse.com/show_bug.cgi?id=1249808
- https://bugzilla.suse.com/show_bug.cgi?id=1249846
- https://bugzilla.suse.com/show_bug.cgi?id=1249880
- https://bugzilla.suse.com/show_bug.cgi?id=1249988
- https://bugzilla.suse.com/show_bug.cgi?id=1250257
- https://bugzilla.suse.com/show_bug.cgi?id=1250311
- https://bugzilla.suse.com/show_bug.cgi?id=1250323
- https://bugzilla.suse.com/show_bug.cgi?id=1250358
- https://bugzilla.suse.com/show_bug.cgi?id=1250392
- https://bugzilla.suse.com/show_bug.cgi?id=1250522
- https://bugzilla.suse.com/show_bug.cgi?id=1250742
- https://bugzilla.suse.com/show_bug.cgi?id=1252035
- https://bugzilla.suse.com/show_bug.cgi?id=1252499
- https://bugzilla.suse.com/show_bug.cgi?id=1252554
- https://bugzilla.suse.com/show_bug.cgi?id=963449
- https://jira.suse.com/browse/PED-8240