Описание
Security update for the Linux Kernel (Live Patch 24 for SUSE Linux Enterprise 15 SP5)
This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.97 fixes various security issues
The following security issues were fixed:
- CVE-2023-53321: wifi: mac80211_hwsim: drop short frames (bsc#1250314).
- CVE-2025-38111: net/mdiobus: Fix potential out-of-bounds read/write access (bsc#1249455).
- CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1249205).
- CVE-2025-39742: RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (bsc#1249480).
Список пакетов
SUSE Linux Enterprise Live Patching 15 SP4
SUSE Linux Enterprise Live Patching 15 SP5
Ссылки
- Link for SUSE-SU-2026:0528-1
- E-Mail link for SUSE-SU-2026:0528-1
- SUSE Security Ratings
- SUSE Bug 1249205
- SUSE Bug 1249455
- SUSE Bug 1249480
- SUSE Bug 1250314
- SUSE CVE CVE-2023-53321 page
- SUSE CVE CVE-2025-38111 page
- SUSE CVE CVE-2025-38352 page
- SUSE CVE CVE-2025-39742 page
Описание
In the Linux kernel, the following vulnerability has been resolved: wifi: mac80211_hwsim: drop short frames While technically some control frames like ACK are shorter and end after Address 1, such frames shouldn't be forwarded through wmediumd or similar userspace, so require the full 3-address header to avoid accessing invalid memory if shorter frames are passed in.
Затронутые продукты
Ссылки
- CVE-2023-53321
- SUSE Bug 1250313
- SUSE Bug 1250314
Описание
In the Linux kernel, the following vulnerability has been resolved: net/mdiobus: Fix potential out-of-bounds read/write access When using publicly available tools like 'mdio-tools' to read/write data from/to network interface and its PHY via mdiobus, there is no verification of parameters passed to the ioctl and it accepts any mdio address. Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define, but it is possible to pass higher value than that via ioctl. While read/write operation should generally fail in this case, mdiobus provides stats array, where wrong address may allow out-of-bounds read/write. Fix that by adding address verification before read/write operation. While this excludes this access from any statistics, it improves security of read/write operation.
Затронутые продукты
Ссылки
- CVE-2025-38111
- SUSE Bug 1245666
- SUSE Bug 1249455
Описание
In the Linux kernel, the following vulnerability has been resolved: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() If an exiting non-autoreaping task has already passed exit_notify() and calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent or debugger right after unlock_task_sighand(). If a concurrent posix_cpu_timer_del() runs at that moment, it won't be able to detect timer->it.cpu.firing != 0: cpu_timer_task_rcu() and/or lock_task_sighand() will fail. Add the tsk->exit_state check into run_posix_cpu_timers() to fix this. This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because exit_task_work() is called before exit_notify(). But the check still makes sense, task_work_add(&tsk->posix_cputimers_work.work) will fail anyway in this case.
Затронутые продукты
Ссылки
- CVE-2025-38352
- SUSE Bug 1246911
- SUSE Bug 1249205
Описание
In the Linux kernel, the following vulnerability has been resolved: RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() The function divides number of online CPUs by num_core_siblings, and later checks the divider by zero. This implies a possibility to get and divide-by-zero runtime error. Fix it by moving the check prior to division. This also helps to save one indentation level.
Затронутые продукты
Ссылки
- CVE-2025-39742
- SUSE Bug 1247374
- SUSE Bug 1249479
- SUSE Bug 1249480
- SUSE Bug 1253291