{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.3.18-150300.226.1","kernel-source-rt":"5.3.18-150300.226.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.226.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.3.18-150300.226.1","kernel-source-rt":"5.3.18-150300.226.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.226.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThe SUSE Linux Enterprise FIXME kernel was updated to fix various security issues\n\nThe following security issues were fixed:\n\n- CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1249859).\n- CVE-2022-50334: hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param() (bsc#1249857).\n- CVE-2022-50388: nvme: fix multipath crash caused by flush request when blktrace is enabled (bsc#1250293).\n- CVE-2022-50423: ACPICA: Fix use-after-free in acpi_ut_copy_ipackage_to_ipackage() (bsc#1250784).\n- CVE-2022-50432: kernfs: fix use-after-free in __kernfs_remove (bsc#1250851).\n- CVE-2022-50488: block, bfq: fix possible uaf for 'bfqq->bic' (bsc#1251201).\n- CVE-2022-50516: fs: dlm: fix invalid derefence of sb_lvbptr (bsc#1251741).\n- CVE-2023-53282: scsi: lpfc: Fix use-after-free KFENCE violation during sysfs firmware write (bsc#1250311).\n- CVE-2023-53365: ip6mr: Fix skb_under_panic in ip6mr_cache_report() (bsc#1249988).\n- CVE-2023-53395: ACPICA: Add AML_NO_OPERAND_RESOLVE flag to Timer (bsc#1250358).\n- CVE-2023-53500: xfrm: fix slab-use-after-free in decode_session6 (bsc#1250816).\n- CVE-2023-53559: ip_vti: fix potential slab-use-after-free in decode_session6 (bsc#1251052).\n- CVE-2023-53574: wifi: rtw88: delete timer and free skb queue when unloading (bsc#1251222).\n- CVE-2023-53619: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free (bsc#1251743).\n- CVE-2023-53673: Bluetooth: hci_event: call disconnect callback before deleting conn (bsc#1251763).\n- CVE-2023-53705: ipv6: Fix out-of-bounds access in ipv6_find_tlv() (bsc#1252554).\n- CVE-2023-53722: md: raid1: fix potential OOB in raid1_remove_disk() (bsc#1252499).\n- CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1247317).\n- CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047).\n- CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).\n- CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252688).\n","id":"SUSE-SU-2025:4135-1","modified":"2025-11-18T17:31:49Z","published":"2025-11-18T17:31:49Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20254135-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1065729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1199304"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205128"},{"type":"REPORT","url":"https://bugzilla.suse.com/1206893"},{"type":"REPORT","url":"https://bugzilla.suse.com/1210124"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243919"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247317"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249186"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249857"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249859"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249988"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250293"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250311"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250358"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250742"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250784"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250816"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250851"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250946"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251040"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251047"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251052"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251072"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251088"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251091"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251115"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251169"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251173"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251182"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251201"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251202"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251208"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251222"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251292"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251300"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251550"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251723"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251725"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251730"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251741"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251743"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251747"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251763"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251930"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252035"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252047"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252480"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252499"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252516"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252554"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252688"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252775"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-43945"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50327"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50334"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50388"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50423"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50432"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50470"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50480"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50484"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50487"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50488"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50489"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50493"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50494"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50496"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50504"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50513"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50516"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50532"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50534"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50544"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50546"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50549"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50563"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50574"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53282"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53365"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53395"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53500"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53559"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53564"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53566"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53574"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53619"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53673"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53705"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53722"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38476"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39968"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39973"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40018"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40082"}],"related":["CVE-2022-43945","CVE-2022-50327","CVE-2022-50334","CVE-2022-50388","CVE-2022-50423","CVE-2022-50432","CVE-2022-50470","CVE-2022-50480","CVE-2022-50484","CVE-2022-50487","CVE-2022-50488","CVE-2022-50489","CVE-2022-50493","CVE-2022-50494","CVE-2022-50496","CVE-2022-50504","CVE-2022-50513","CVE-2022-50516","CVE-2022-50532","CVE-2022-50534","CVE-2022-50544","CVE-2022-50546","CVE-2022-50549","CVE-2022-50563","CVE-2022-50574","CVE-2023-53282","CVE-2023-53365","CVE-2023-53395","CVE-2023-53500","CVE-2023-53559","CVE-2023-53564","CVE-2023-53566","CVE-2023-53574","CVE-2023-53619","CVE-2023-53673","CVE-2023-53705","CVE-2023-53722","CVE-2025-38476","CVE-2025-39968","CVE-2025-39973","CVE-2025-40018","CVE-2025-40082"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2022-43945","CVE-2022-50327","CVE-2022-50334","CVE-2022-50388","CVE-2022-50423","CVE-2022-50432","CVE-2022-50470","CVE-2022-50480","CVE-2022-50484","CVE-2022-50487","CVE-2022-50488","CVE-2022-50489","CVE-2022-50493","CVE-2022-50494","CVE-2022-50496","CVE-2022-50504","CVE-2022-50513","CVE-2022-50516","CVE-2022-50532","CVE-2022-50534","CVE-2022-50544","CVE-2022-50546","CVE-2022-50549","CVE-2022-50563","CVE-2022-50574","CVE-2023-53282","CVE-2023-53365","CVE-2023-53395","CVE-2023-53500","CVE-2023-53559","CVE-2023-53564","CVE-2023-53566","CVE-2023-53574","CVE-2023-53619","CVE-2023-53673","CVE-2023-53705","CVE-2023-53722","CVE-2025-38476","CVE-2025-39968","CVE-2025-39973","CVE-2025-40018","CVE-2025-40082"]}