{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.3.18-150300.208.1","kernel-source-rt":"5.3.18-150300.208.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.1","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.208.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.3.18-150300.208.1","kernel-source-rt":"5.3.18-150300.208.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.1","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.208.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.3.18-150300.208.1","kernel-source-rt":"5.3.18-150300.208.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"kernel-rt","purl":"pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.208.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-rt":"5.3.18-150300.208.1","kernel-source-rt":"5.3.18-150300.208.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Micro 5.2","name":"kernel-source-rt","purl":"pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Micro%205.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"5.3.18-150300.208.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2025-21726: padata: avoid UAF for reorder_work (bsc#1238865).\n- CVE-2025-21785: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (bsc#1238747).\n- CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512).\n- CVE-2025-22004: net: atm: fix use after free in lec_send() (bsc#1240835).\n- CVE-2025-22020: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (bsc#1241280).\n- CVE-2025-22055: net: fix geneve_opt length integer overflow (bsc#1241371).\n\n\n","id":"SUSE-SU-2025:1574-1","modified":"2025-05-16T18:36:34Z","published":"2025-05-16T18:36:34Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20251574-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207034"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207878"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221980"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234931"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235433"},{"type":"REPORT","url":"https://bugzilla.suse.com/1237984"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238512"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238747"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238865"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240210"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240308"},{"type":"REPORT","url":"https://bugzilla.suse.com/1240835"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241280"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241371"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241404"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241405"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241407"},{"type":"REPORT","url":"https://bugzilla.suse.com/1241408"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-36789"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47163"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47668"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47669"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47670"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49111"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-0179"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53026"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53033"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56642"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56661"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21726"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21785"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21791"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22004"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22020"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-22055"}],"related":["CVE-2020-36789","CVE-2021-47163","CVE-2021-47668","CVE-2021-47669","CVE-2021-47670","CVE-2022-49111","CVE-2023-0179","CVE-2023-53026","CVE-2023-53033","CVE-2024-56642","CVE-2024-56661","CVE-2025-21726","CVE-2025-21785","CVE-2025-21791","CVE-2025-22004","CVE-2025-22020","CVE-2025-22055"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2020-36789","CVE-2021-47163","CVE-2021-47668","CVE-2021-47669","CVE-2021-47670","CVE-2022-49111","CVE-2023-0179","CVE-2023-53026","CVE-2023-53033","CVE-2024-56642","CVE-2024-56661","CVE-2025-21726","CVE-2025-21785","CVE-2025-21791","CVE-2025-22004","CVE-2025-22020","CVE-2025-22055"]}