Security update for the Linux Kernel
Announcement ID: | SUSE-SU-2025:0556-1 |
---|---|
Release Date: | 2025-02-14T15:26:36Z |
Rating: | important |
References: |
|
Cross-References: |
|
CVSS scores: |
|
Affected Products: |
|
An update that solves 94 vulnerabilities and has 10 security fixes can now be installed.
Description:
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-57897: drm/amdkfd: Correct the migration DMA map direction (bsc#1235969).
- CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages (bsc#1235920).
- CVE-2024-57876: drm/dp_mst: Fix resetting msg rx state after topology removal (bsc#1235806).
- CVE-2024-57849: s390/cpum_sf: Handle CPU hotplug remove during sampling (bsc#1235814).
- CVE-2024-57798: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() (bsc#1235818).
- CVE-2024-57793: virt: tdx-guest: Just leak decrypted memory on unrecoverable errors (bsc#1235768).
- CVE-2024-57792: power: supply: gpio-charger: Fix set charge current limits (bsc#1235764).
- CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining clc data (bsc#1235759).
- CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645).
- CVE-2024-56747: scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() (bsc#1234934).
- CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).
- CVE-2024-56664: bpf, sockmap: Fix race between element replace and close() (bsc#1235249).
- CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441).
- CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430).
- CVE-2024-56648: net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235451).
- CVE-2024-56642: tipc: Fix use-after-free of kernel socket in cleanup_bearer() (bsc#1235433).
- CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release() (bsc#1235480).
- CVE-2024-56623: scsi: qla2xxx: Fix use after free on unload (bsc#1235466).
- CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() (bsc#1235521).
- CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230).
- CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217).
- CVE-2024-56588: scsi: hisi_sas: Create all dump files during debugfs initialization (bsc#1235123).
- CVE-2024-53227: scsi: bfa: Fix use-after-free in bfad_im_module_exit() (bsc#1235011).
- CVE-2024-53209: bnxt_en: Fix receive ring space parameters when XDP is active (bsc#1235002).
- CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896).
- CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234884).
- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).
- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
- CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb() (bsc#1233488).
- CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112).
- CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request (bsc#1233055).
- CVE-2024-50142: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (bsc#1233028).
- CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync (bsc#1231088).
- CVE-2024-36898: gpiolib: cdev: fix uninitialised kfifo (bsc#1225736).
The following non-security bugs were fixed:
- NFS: Adjust the amount of readahead performed by NFS readdir (bsc#1231847).
- NFS: Do not flush the readdir cache in nfs_dentry_iput() (bsc#1231847).
- NFS: Improve heuristic for readdirplus (bsc#1231847).
- NFS: Trigger the "ls -l" readdir heuristic sooner (bsc#1231847).
- VFS: use system_unbound_wq for delayed_mntput (bsc#1234683).
- ceph: improve error handling and short/overflow-read logic in __ceph_sync_read() (bsc#1228592).
- ibmvnic: Free any outstanding tx skbs during scrq reset (bsc#1226980).
- netfilter: nf_tables: validate family when identifying table via handle (bsc#1233778 ZDI-24-1454).
- powerpc/pseries/vas: Add close() callback in vas_vm_ops struct (bsc#1234825).
- tipc: fix NULL deref in cleanup_bearer() (bsc#1235433).
- x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0 (git-fixes).
Special Instructions and Notes:
- Please reboot the system after installing this update.
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.5
zypper in -t patch SUSE-2025-556=1
-
SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-556=1
Package List:
-
openSUSE Leap 15.5 (noarch)
- kernel-devel-rt-5.14.21-150500.13.85.1
- kernel-source-rt-5.14.21-150500.13.85.1
-
openSUSE Leap 15.5 (x86_64)
- kernel-rt-vdso-debuginfo-5.14.21-150500.13.85.1
- kernel-rt-optional-5.14.21-150500.13.85.1
- kernel-rt_debug-devel-5.14.21-150500.13.85.1
- kernel-syms-rt-5.14.21-150500.13.85.1
- kernel-rt-vdso-5.14.21-150500.13.85.1
- ocfs2-kmp-rt-5.14.21-150500.13.85.1
- kernel-rt-optional-debuginfo-5.14.21-150500.13.85.1
- kselftests-kmp-rt-debuginfo-5.14.21-150500.13.85.1
- kernel-rt-livepatch-devel-5.14.21-150500.13.85.1
- cluster-md-kmp-rt-5.14.21-150500.13.85.1
- kernel-rt-debugsource-5.14.21-150500.13.85.1
- kernel-rt-devel-5.14.21-150500.13.85.1
- kernel-rt-extra-debuginfo-5.14.21-150500.13.85.1
- reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.85.1
- kernel-rt-devel-debuginfo-5.14.21-150500.13.85.1
- gfs2-kmp-rt-5.14.21-150500.13.85.1
- dlm-kmp-rt-5.14.21-150500.13.85.1
- kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.85.1
- kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.85.1
- kernel-rt_debug-debuginfo-5.14.21-150500.13.85.1
- kernel-rt_debug-vdso-5.14.21-150500.13.85.1
- kernel-rt_debug-debugsource-5.14.21-150500.13.85.1
- kernel-rt-livepatch-5.14.21-150500.13.85.1
- dlm-kmp-rt-debuginfo-5.14.21-150500.13.85.1
- kselftests-kmp-rt-5.14.21-150500.13.85.1
- gfs2-kmp-rt-debuginfo-5.14.21-150500.13.85.1
- ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.85.1
- kernel-rt-extra-5.14.21-150500.13.85.1
- kernel-rt-debuginfo-5.14.21-150500.13.85.1
- cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.85.1
- reiserfs-kmp-rt-5.14.21-150500.13.85.1
-
openSUSE Leap 15.5 (nosrc x86_64)
- kernel-rt_debug-5.14.21-150500.13.85.1
- kernel-rt-5.14.21-150500.13.85.1
-
SUSE Linux Enterprise Micro 5.5 (nosrc x86_64)
- kernel-rt-5.14.21-150500.13.85.1
-
SUSE Linux Enterprise Micro 5.5 (x86_64)
- kernel-rt-debuginfo-5.14.21-150500.13.85.1
- kernel-rt-debugsource-5.14.21-150500.13.85.1
-
SUSE Linux Enterprise Micro 5.5 (noarch)
- kernel-source-rt-5.14.21-150500.13.85.1
References:
- https://www.suse.com/security/cve/CVE-2024-26758.html
- https://www.suse.com/security/cve/CVE-2024-26943.html
- https://www.suse.com/security/cve/CVE-2024-36898.html
- https://www.suse.com/security/cve/CVE-2024-38599.html
- https://www.suse.com/security/cve/CVE-2024-41047.html
- https://www.suse.com/security/cve/CVE-2024-45019.html
- https://www.suse.com/security/cve/CVE-2024-46858.html
- https://www.suse.com/security/cve/CVE-2024-50051.html
- https://www.suse.com/security/cve/CVE-2024-50136.html
- https://www.suse.com/security/cve/CVE-2024-50142.html
- https://www.suse.com/security/cve/CVE-2024-50151.html
- https://www.suse.com/security/cve/CVE-2024-50195.html
- https://www.suse.com/security/cve/CVE-2024-50199.html
- https://www.suse.com/security/cve/CVE-2024-50210.html
- https://www.suse.com/security/cve/CVE-2024-50275.html
- https://www.suse.com/security/cve/CVE-2024-50299.html
- https://www.suse.com/security/cve/CVE-2024-53095.html
- https://www.suse.com/security/cve/CVE-2024-53103.html
- https://www.suse.com/security/cve/CVE-2024-53104.html
- https://www.suse.com/security/cve/CVE-2024-53112.html
- https://www.suse.com/security/cve/CVE-2024-53121.html
- https://www.suse.com/security/cve/CVE-2024-53127.html
- https://www.suse.com/security/cve/CVE-2024-53129.html
- https://www.suse.com/security/cve/CVE-2024-53138.html
- https://www.suse.com/security/cve/CVE-2024-53141.html
- https://www.suse.com/security/cve/CVE-2024-53144.html
- https://www.suse.com/security/cve/CVE-2024-53148.html
- https://www.suse.com/security/cve/CVE-2024-53151.html
- https://www.suse.com/security/cve/CVE-2024-53166.html
- https://www.suse.com/security/cve/CVE-2024-53169.html
- https://www.suse.com/security/cve/CVE-2024-53171.html
- https://www.suse.com/security/cve/CVE-2024-53174.html
- https://www.suse.com/security/cve/CVE-2024-53177.html
- https://www.suse.com/security/cve/CVE-2024-53208.html
- https://www.suse.com/security/cve/CVE-2024-53209.html
- https://www.suse.com/security/cve/CVE-2024-53215.html
- https://www.suse.com/security/cve/CVE-2024-53217.html
- https://www.suse.com/security/cve/CVE-2024-53224.html
- https://www.suse.com/security/cve/CVE-2024-53227.html
- https://www.suse.com/security/cve/CVE-2024-53229.html
- https://www.suse.com/security/cve/CVE-2024-53690.html
- https://www.suse.com/security/cve/CVE-2024-54680.html
- https://www.suse.com/security/cve/CVE-2024-55916.html
- https://www.suse.com/security/cve/CVE-2024-56531.html
- https://www.suse.com/security/cve/CVE-2024-56532.html
- https://www.suse.com/security/cve/CVE-2024-56533.html
- https://www.suse.com/security/cve/CVE-2024-56557.html
- https://www.suse.com/security/cve/CVE-2024-56558.html
- https://www.suse.com/security/cve/CVE-2024-56562.html
- https://www.suse.com/security/cve/CVE-2024-56567.html
- https://www.suse.com/security/cve/CVE-2024-56588.html
- https://www.suse.com/security/cve/CVE-2024-56595.html
- https://www.suse.com/security/cve/CVE-2024-56596.html
- https://www.suse.com/security/cve/CVE-2024-56597.html
- https://www.suse.com/security/cve/CVE-2024-56600.html
- https://www.suse.com/security/cve/CVE-2024-56601.html
- https://www.suse.com/security/cve/CVE-2024-56602.html
- https://www.suse.com/security/cve/CVE-2024-56623.html
- https://www.suse.com/security/cve/CVE-2024-56629.html
- https://www.suse.com/security/cve/CVE-2024-56631.html
- https://www.suse.com/security/cve/CVE-2024-56642.html
- https://www.suse.com/security/cve/CVE-2024-56644.html
- https://www.suse.com/security/cve/CVE-2024-56645.html
- https://www.suse.com/security/cve/CVE-2024-56648.html
- https://www.suse.com/security/cve/CVE-2024-56650.html
- https://www.suse.com/security/cve/CVE-2024-56658.html
- https://www.suse.com/security/cve/CVE-2024-56661.html
- https://www.suse.com/security/cve/CVE-2024-56664.html
- https://www.suse.com/security/cve/CVE-2024-56678.html
- https://www.suse.com/security/cve/CVE-2024-56681.html
- https://www.suse.com/security/cve/CVE-2024-56698.html
- https://www.suse.com/security/cve/CVE-2024-56701.html
- https://www.suse.com/security/cve/CVE-2024-56704.html
- https://www.suse.com/security/cve/CVE-2024-56722.html
- https://www.suse.com/security/cve/CVE-2024-56739.html
- https://www.suse.com/security/cve/CVE-2024-56745.html
- https://www.suse.com/security/cve/CVE-2024-56747.html
- https://www.suse.com/security/cve/CVE-2024-56754.html
- https://www.suse.com/security/cve/CVE-2024-56756.html
- https://www.suse.com/security/cve/CVE-2024-56759.html
- https://www.suse.com/security/cve/CVE-2024-56765.html
- https://www.suse.com/security/cve/CVE-2024-56776.html
- https://www.suse.com/security/cve/CVE-2024-56777.html
- https://www.suse.com/security/cve/CVE-2024-56778.html
- https://www.suse.com/security/cve/CVE-2024-57791.html
- https://www.suse.com/security/cve/CVE-2024-57792.html
- https://www.suse.com/security/cve/CVE-2024-57793.html
- https://www.suse.com/security/cve/CVE-2024-57798.html
- https://www.suse.com/security/cve/CVE-2024-57849.html
- https://www.suse.com/security/cve/CVE-2024-57850.html
- https://www.suse.com/security/cve/CVE-2024-57876.html
- https://www.suse.com/security/cve/CVE-2024-57893.html
- https://www.suse.com/security/cve/CVE-2024-57897.html
- https://www.suse.com/security/cve/CVE-2024-8805.html
- https://bugzilla.suse.com/show_bug.cgi?id=1194869
- https://bugzilla.suse.com/show_bug.cgi?id=1216813
- https://bugzilla.suse.com/show_bug.cgi?id=1223384
- https://bugzilla.suse.com/show_bug.cgi?id=1225736
- https://bugzilla.suse.com/show_bug.cgi?id=1226848
- https://bugzilla.suse.com/show_bug.cgi?id=1226980
- https://bugzilla.suse.com/show_bug.cgi?id=1228537
- https://bugzilla.suse.com/show_bug.cgi?id=1228592
- https://bugzilla.suse.com/show_bug.cgi?id=1230341
- https://bugzilla.suse.com/show_bug.cgi?id=1230432
- https://bugzilla.suse.com/show_bug.cgi?id=1230527
- https://bugzilla.suse.com/show_bug.cgi?id=1230697
- https://bugzilla.suse.com/show_bug.cgi?id=1231088
- https://bugzilla.suse.com/show_bug.cgi?id=1231847
- https://bugzilla.suse.com/show_bug.cgi?id=1232914
- https://bugzilla.suse.com/show_bug.cgi?id=1233028
- https://bugzilla.suse.com/show_bug.cgi?id=1233055
- https://bugzilla.suse.com/show_bug.cgi?id=1233097
- https://bugzilla.suse.com/show_bug.cgi?id=1233103
- https://bugzilla.suse.com/show_bug.cgi?id=1233112
- https://bugzilla.suse.com/show_bug.cgi?id=1233464
- https://bugzilla.suse.com/show_bug.cgi?id=1233488
- https://bugzilla.suse.com/show_bug.cgi?id=1233642
- https://bugzilla.suse.com/show_bug.cgi?id=1233778
- https://bugzilla.suse.com/show_bug.cgi?id=1234024
- https://bugzilla.suse.com/show_bug.cgi?id=1234025
- https://bugzilla.suse.com/show_bug.cgi?id=1234078
- https://bugzilla.suse.com/show_bug.cgi?id=1234087
- https://bugzilla.suse.com/show_bug.cgi?id=1234153
- https://bugzilla.suse.com/show_bug.cgi?id=1234155
- https://bugzilla.suse.com/show_bug.cgi?id=1234223
- https://bugzilla.suse.com/show_bug.cgi?id=1234381
- https://bugzilla.suse.com/show_bug.cgi?id=1234683
- https://bugzilla.suse.com/show_bug.cgi?id=1234690
- https://bugzilla.suse.com/show_bug.cgi?id=1234825
- https://bugzilla.suse.com/show_bug.cgi?id=1234829
- https://bugzilla.suse.com/show_bug.cgi?id=1234832
- https://bugzilla.suse.com/show_bug.cgi?id=1234884
- https://bugzilla.suse.com/show_bug.cgi?id=1234889
- https://bugzilla.suse.com/show_bug.cgi?id=1234896
- https://bugzilla.suse.com/show_bug.cgi?id=1234899
- https://bugzilla.suse.com/show_bug.cgi?id=1234900
- https://bugzilla.suse.com/show_bug.cgi?id=1234905
- https://bugzilla.suse.com/show_bug.cgi?id=1234909
- https://bugzilla.suse.com/show_bug.cgi?id=1234916
- https://bugzilla.suse.com/show_bug.cgi?id=1234918
- https://bugzilla.suse.com/show_bug.cgi?id=1234922
- https://bugzilla.suse.com/show_bug.cgi?id=1234930
- https://bugzilla.suse.com/show_bug.cgi?id=1234931
- https://bugzilla.suse.com/show_bug.cgi?id=1234934
- https://bugzilla.suse.com/show_bug.cgi?id=1234962
- https://bugzilla.suse.com/show_bug.cgi?id=1234999
- https://bugzilla.suse.com/show_bug.cgi?id=1235002
- https://bugzilla.suse.com/show_bug.cgi?id=1235009
- https://bugzilla.suse.com/show_bug.cgi?id=1235011
- https://bugzilla.suse.com/show_bug.cgi?id=1235053
- https://bugzilla.suse.com/show_bug.cgi?id=1235057
- https://bugzilla.suse.com/show_bug.cgi?id=1235059
- https://bugzilla.suse.com/show_bug.cgi?id=1235100
- https://bugzilla.suse.com/show_bug.cgi?id=1235122
- https://bugzilla.suse.com/show_bug.cgi?id=1235123
- https://bugzilla.suse.com/show_bug.cgi?id=1235133
- https://bugzilla.suse.com/show_bug.cgi?id=1235134
- https://bugzilla.suse.com/show_bug.cgi?id=1235217
- https://bugzilla.suse.com/show_bug.cgi?id=1235222
- https://bugzilla.suse.com/show_bug.cgi?id=1235230
- https://bugzilla.suse.com/show_bug.cgi?id=1235249
- https://bugzilla.suse.com/show_bug.cgi?id=1235410
- https://bugzilla.suse.com/show_bug.cgi?id=1235430
- https://bugzilla.suse.com/show_bug.cgi?id=1235433
- https://bugzilla.suse.com/show_bug.cgi?id=1235441
- https://bugzilla.suse.com/show_bug.cgi?id=1235451
- https://bugzilla.suse.com/show_bug.cgi?id=1235458
- https://bugzilla.suse.com/show_bug.cgi?id=1235466
- https://bugzilla.suse.com/show_bug.cgi?id=1235473
- https://bugzilla.suse.com/show_bug.cgi?id=1235480
- https://bugzilla.suse.com/show_bug.cgi?id=1235491
- https://bugzilla.suse.com/show_bug.cgi?id=1235495
- https://bugzilla.suse.com/show_bug.cgi?id=1235496
- https://bugzilla.suse.com/show_bug.cgi?id=1235521
- https://bugzilla.suse.com/show_bug.cgi?id=1235557
- https://bugzilla.suse.com/show_bug.cgi?id=1235563
- https://bugzilla.suse.com/show_bug.cgi?id=1235570
- https://bugzilla.suse.com/show_bug.cgi?id=1235584
- https://bugzilla.suse.com/show_bug.cgi?id=1235611
- https://bugzilla.suse.com/show_bug.cgi?id=1235635
- https://bugzilla.suse.com/show_bug.cgi?id=1235641
- https://bugzilla.suse.com/show_bug.cgi?id=1235643
- https://bugzilla.suse.com/show_bug.cgi?id=1235645
- https://bugzilla.suse.com/show_bug.cgi?id=1235647
- https://bugzilla.suse.com/show_bug.cgi?id=1235723
- https://bugzilla.suse.com/show_bug.cgi?id=1235739
- https://bugzilla.suse.com/show_bug.cgi?id=1235747
- https://bugzilla.suse.com/show_bug.cgi?id=1235759
- https://bugzilla.suse.com/show_bug.cgi?id=1235764
- https://bugzilla.suse.com/show_bug.cgi?id=1235768
- https://bugzilla.suse.com/show_bug.cgi?id=1235806
- https://bugzilla.suse.com/show_bug.cgi?id=1235812
- https://bugzilla.suse.com/show_bug.cgi?id=1235814
- https://bugzilla.suse.com/show_bug.cgi?id=1235818
- https://bugzilla.suse.com/show_bug.cgi?id=1235842
- https://bugzilla.suse.com/show_bug.cgi?id=1235920
- https://bugzilla.suse.com/show_bug.cgi?id=1235969
- https://bugzilla.suse.com/show_bug.cgi?id=1236628