Security update for the Linux Kernel
| Announcement ID: | SUSE-SU-2025:4135-1 |
|---|---|
| Release Date: | 2025-11-18T17:31:50Z |
| Rating: | important |
| References: |
|
| Cross-References: |
|
| CVSS scores: |
|
| Affected Products: |
|
An update that solves 42 vulnerabilities, contains two features and has 10 security fixes can now be installed.
Description:
The SUSE Linux Enterprise FIXME kernel was updated to fix various security issues
The following security issues were fixed:
- CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1249859).
- CVE-2022-50334: hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param() (bsc#1249857).
- CVE-2022-50388: nvme: fix multipath crash caused by flush request when blktrace is enabled (bsc#1250293).
- CVE-2022-50423: ACPICA: Fix use-after-free in acpi_ut_copy_ipackage_to_ipackage() (bsc#1250784).
- CVE-2022-50432: kernfs: fix use-after-free in __kernfs_remove (bsc#1250851).
- CVE-2022-50488: block, bfq: fix possible uaf for 'bfqq->bic' (bsc#1251201).
- CVE-2022-50516: fs: dlm: fix invalid derefence of sb_lvbptr (bsc#1251741).
- CVE-2023-53282: scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1250311).
- CVE-2023-53365: ip6mr: Fix skb_under_panic in ip6mr_cache_report() (bsc#1249988).
- CVE-2023-53395: ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer (bsc#1250358).
- CVE-2023-53500: xfrm: fix slab-use-after-free in decode_session6 (bsc#1250816).
- CVE-2023-53559: ip_vti: fix potential slab-use-after-free in decode_session6 (bsc#1251052).
- CVE-2023-53574: wifi: rtw88: delete timer and free skb queue when unloading (bsc#1251222).
- CVE-2023-53619: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free (bsc#1251743).
- CVE-2023-53673: Bluetooth: hci_event: call disconnect callback before deleting conn (bsc#1251763).
- CVE-2023-53705: ipv6: Fix out-of-bounds access in ipv6_find_tlv() (bsc#1252554).
- CVE-2023-53722: md: raid1: fix potential OOB in raid1_remove_disk() (bsc#1252499).
- CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1247317).
- CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047).
- CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).
- CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252688).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4135=1 -
SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4135=1
Package List:
-
SUSE Linux Enterprise Micro 5.2 (nosrc x86_64)
- kernel-rt-5.3.18-150300.226.1
-
SUSE Linux Enterprise Micro 5.2 (x86_64)
- kernel-rt-debugsource-5.3.18-150300.226.1
- kernel-rt-debuginfo-5.3.18-150300.226.1
-
SUSE Linux Enterprise Micro 5.2 (noarch)
- kernel-source-rt-5.3.18-150300.226.1
-
SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64)
- kernel-rt-5.3.18-150300.226.1
-
SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64)
- kernel-rt-debugsource-5.3.18-150300.226.1
- kernel-rt-debuginfo-5.3.18-150300.226.1
-
SUSE Linux Enterprise Micro for Rancher 5.2 (noarch)
- kernel-source-rt-5.3.18-150300.226.1
References:
- https://www.suse.com/security/cve/CVE-2022-43945.html
- https://www.suse.com/security/cve/CVE-2022-50327.html
- https://www.suse.com/security/cve/CVE-2022-50334.html
- https://www.suse.com/security/cve/CVE-2022-50388.html
- https://www.suse.com/security/cve/CVE-2022-50423.html
- https://www.suse.com/security/cve/CVE-2022-50432.html
- https://www.suse.com/security/cve/CVE-2022-50470.html
- https://www.suse.com/security/cve/CVE-2022-50480.html
- https://www.suse.com/security/cve/CVE-2022-50484.html
- https://www.suse.com/security/cve/CVE-2022-50487.html
- https://www.suse.com/security/cve/CVE-2022-50488.html
- https://www.suse.com/security/cve/CVE-2022-50489.html
- https://www.suse.com/security/cve/CVE-2022-50493.html
- https://www.suse.com/security/cve/CVE-2022-50494.html
- https://www.suse.com/security/cve/CVE-2022-50496.html
- https://www.suse.com/security/cve/CVE-2022-50504.html
- https://www.suse.com/security/cve/CVE-2022-50513.html
- https://www.suse.com/security/cve/CVE-2022-50516.html
- https://www.suse.com/security/cve/CVE-2022-50532.html
- https://www.suse.com/security/cve/CVE-2022-50534.html
- https://www.suse.com/security/cve/CVE-2022-50544.html
- https://www.suse.com/security/cve/CVE-2022-50546.html
- https://www.suse.com/security/cve/CVE-2022-50549.html
- https://www.suse.com/security/cve/CVE-2022-50563.html
- https://www.suse.com/security/cve/CVE-2022-50574.html
- https://www.suse.com/security/cve/CVE-2023-53282.html
- https://www.suse.com/security/cve/CVE-2023-53365.html
- https://www.suse.com/security/cve/CVE-2023-53395.html
- https://www.suse.com/security/cve/CVE-2023-53500.html
- https://www.suse.com/security/cve/CVE-2023-53559.html
- https://www.suse.com/security/cve/CVE-2023-53564.html
- https://www.suse.com/security/cve/CVE-2023-53566.html
- https://www.suse.com/security/cve/CVE-2023-53574.html
- https://www.suse.com/security/cve/CVE-2023-53619.html
- https://www.suse.com/security/cve/CVE-2023-53673.html
- https://www.suse.com/security/cve/CVE-2023-53705.html
- https://www.suse.com/security/cve/CVE-2023-53722.html
- https://www.suse.com/security/cve/CVE-2025-38476.html
- https://www.suse.com/security/cve/CVE-2025-39968.html
- https://www.suse.com/security/cve/CVE-2025-39973.html
- https://www.suse.com/security/cve/CVE-2025-40018.html
- https://www.suse.com/security/cve/CVE-2025-40082.html
- https://bugzilla.suse.com/show_bug.cgi?id=1065729
- https://bugzilla.suse.com/show_bug.cgi?id=1199304
- https://bugzilla.suse.com/show_bug.cgi?id=1205128
- https://bugzilla.suse.com/show_bug.cgi?id=1206893
- https://bugzilla.suse.com/show_bug.cgi?id=1210124
- https://bugzilla.suse.com/show_bug.cgi?id=1243919
- https://bugzilla.suse.com/show_bug.cgi?id=1247317
- https://bugzilla.suse.com/show_bug.cgi?id=1249186
- https://bugzilla.suse.com/show_bug.cgi?id=1249857
- https://bugzilla.suse.com/show_bug.cgi?id=1249859
- https://bugzilla.suse.com/show_bug.cgi?id=1249988
- https://bugzilla.suse.com/show_bug.cgi?id=1250293
- https://bugzilla.suse.com/show_bug.cgi?id=1250311
- https://bugzilla.suse.com/show_bug.cgi?id=1250358
- https://bugzilla.suse.com/show_bug.cgi?id=1250742
- https://bugzilla.suse.com/show_bug.cgi?id=1250784
- https://bugzilla.suse.com/show_bug.cgi?id=1250816
- https://bugzilla.suse.com/show_bug.cgi?id=1250851
- https://bugzilla.suse.com/show_bug.cgi?id=1250946
- https://bugzilla.suse.com/show_bug.cgi?id=1251040
- https://bugzilla.suse.com/show_bug.cgi?id=1251047
- https://bugzilla.suse.com/show_bug.cgi?id=1251052
- https://bugzilla.suse.com/show_bug.cgi?id=1251072
- https://bugzilla.suse.com/show_bug.cgi?id=1251088
- https://bugzilla.suse.com/show_bug.cgi?id=1251091
- https://bugzilla.suse.com/show_bug.cgi?id=1251115
- https://bugzilla.suse.com/show_bug.cgi?id=1251169
- https://bugzilla.suse.com/show_bug.cgi?id=1251173
- https://bugzilla.suse.com/show_bug.cgi?id=1251182
- https://bugzilla.suse.com/show_bug.cgi?id=1251201
- https://bugzilla.suse.com/show_bug.cgi?id=1251202
- https://bugzilla.suse.com/show_bug.cgi?id=1251208
- https://bugzilla.suse.com/show_bug.cgi?id=1251222
- https://bugzilla.suse.com/show_bug.cgi?id=1251292
- https://bugzilla.suse.com/show_bug.cgi?id=1251300
- https://bugzilla.suse.com/show_bug.cgi?id=1251550
- https://bugzilla.suse.com/show_bug.cgi?id=1251723
- https://bugzilla.suse.com/show_bug.cgi?id=1251725
- https://bugzilla.suse.com/show_bug.cgi?id=1251730
- https://bugzilla.suse.com/show_bug.cgi?id=1251741
- https://bugzilla.suse.com/show_bug.cgi?id=1251743
- https://bugzilla.suse.com/show_bug.cgi?id=1251747
- https://bugzilla.suse.com/show_bug.cgi?id=1251763
- https://bugzilla.suse.com/show_bug.cgi?id=1251930
- https://bugzilla.suse.com/show_bug.cgi?id=1252035
- https://bugzilla.suse.com/show_bug.cgi?id=1252047
- https://bugzilla.suse.com/show_bug.cgi?id=1252480
- https://bugzilla.suse.com/show_bug.cgi?id=1252499
- https://bugzilla.suse.com/show_bug.cgi?id=1252516
- https://bugzilla.suse.com/show_bug.cgi?id=1252554
- https://bugzilla.suse.com/show_bug.cgi?id=1252688
- https://bugzilla.suse.com/show_bug.cgi?id=1252775
- https://jira.suse.com/browse/PED-4593
- https://jira.suse.com/browse/PED-568