{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.3.18-150300.202.1","kernel-source-rt":"5.3.18-150300.202.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.1","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.202.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.3.18-150300.202.1","kernel-source-rt":"5.3.18-150300.202.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.1","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.202.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.3.18-150300.202.1","kernel-source-rt":"5.3.18-150300.202.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.202.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.3.18-150300.202.1","kernel-source-rt":"5.3.18-150300.202.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.202.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-47633: ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 (bsc#1237768).\n- CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238033).\n- CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763).\n- CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700).\n- CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112).\n- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).\n- CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217).\n- CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230).\n- CVE-2024-56623: scsi: qla2xxx: Fix use after free on unload (bsc#1235466).\n- CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430).\n- CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441).\n- CVE-2024-56664: bpf, sockmap: Fix race between element replace and close() (bsc#1235249).\n- CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645).\n- CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining clc data (bsc#1235759).\n- CVE-2024-57798: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() (bsc#1235818).\n- CVE-2024-57849: s390/cpum_sf: Handle CPU hotplug remove during sampling (bsc#1235814).\n- CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages (bsc#1235920).\n- CVE-2025-21690: scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (bsc#1237025).\n- CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028).\n- CVE-2025-21699: gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (bsc#1237139).\n\nThe following non-security bugs were fixed:\n\n- net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761).\n- net: netvsc: Update default VMBus channels (bsc#1236757).\n- NFS: Adjust the amount of readahead performed by NFS readdir (bsc#1231847).\n- NFS: Do not flush the readdir cache in nfs_dentry_iput() (bsc#1231847).\n- NFS: Improve heuristic for readdirplus -revert (bsc#1237160).\n- NFS: Improve heuristic for readdirplus (bsc#1231847).\n- NFS: Reduce readdir stack usage (bsc#1231847).\n- NFS: Trigger the 'ls -l' readdir heuristic sooner (bsc#1231847).\n- NFS: Use kmemdup_nul() in nfs_readdir_make_qstr() (bsc#1231847).\n- scsi: storvsc: Handle SRB status value 0x30 (git-fixes).\n\n","id":"SUSE-SU-2025:0867-1","modified":"2025-03-14T09:55:18Z","published":"2025-03-14T09:55:18Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20250867-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215420"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224700"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224763"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225742"},{"type":"REPORT","url":"https://bugzilla.suse.com/1231847"},{"type":"REPORT","url":"https://bugzilla.suse.com/1232919"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233112"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234025"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234853"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234891"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234963"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235054"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235061"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235073"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235217"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235230"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235249"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235430"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235441"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235466"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235645"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235759"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235814"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235818"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235920"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236104"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236757"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236761"},{"type":"REPORT","url":"https://bugzilla.suse.com/1236821"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237025"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237028"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237139"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237160"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237389"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237768"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238033"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47633"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49080"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-4244"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52923"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52924"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35863"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35949"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50115"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50199"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53104"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53173"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53239"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56539"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56548"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56600"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56601"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56605"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56623"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56650"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56658"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56664"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56759"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57791"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57798"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57849"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57893"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21690"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21692"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21699"}],"related":["CVE-2021-47633","CVE-2022-49080","CVE-2023-4244","CVE-2023-52923","CVE-2023-52924","CVE-2024-35863","CVE-2024-35949","CVE-2024-50115","CVE-2024-50199","CVE-2024-53104","CVE-2024-53173","CVE-2024-53239","CVE-2024-56539","CVE-2024-56548","CVE-2024-56600","CVE-2024-56601","CVE-2024-56605","CVE-2024-56623","CVE-2024-56650","CVE-2024-56658","CVE-2024-56664","CVE-2024-56759","CVE-2024-57791","CVE-2024-57798","CVE-2024-57849","CVE-2024-57893","CVE-2025-21690","CVE-2025-21692","CVE-2025-21699"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2021-47633","CVE-2022-49080","CVE-2023-4244","CVE-2023-52923","CVE-2023-52924","CVE-2024-35863","CVE-2024-35949","CVE-2024-50115","CVE-2024-50199","CVE-2024-53104","CVE-2024-53173","CVE-2024-53239","CVE-2024-56539","CVE-2024-56548","CVE-2024-56600","CVE-2024-56601","CVE-2024-56605","CVE-2024-56623","CVE-2024-56650","CVE-2024-56658","CVE-2024-56664","CVE-2024-56759","CVE-2024-57791","CVE-2024-57798","CVE-2024-57849","CVE-2024-57893","CVE-2025-21690","CVE-2025-21692","CVE-2025-21699"]}