SUSE-SU-2025:0236-1: important: Security update for the Linux Kernel

SLE-SECURITY-UPDATES null at suse.de
Fri Jan 24 20:31:15 UTC 2025



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:0236-1  
Release Date: 2025-01-24T17:02:47Z  
Rating: important  
References:

  * bsc#1117016
  * bsc#1168202
  * bsc#1188924
  * bsc#1215304
  * bsc#1220148
  * bsc#1223635
  * bsc#1224697
  * bsc#1225725
  * bsc#1225730
  * bsc#1226694
  * bsc#1226748
  * bsc#1226872
  * bsc#1228405
  * bsc#1230697
  * bsc#1230766
  * bsc#1231453
  * bsc#1231854
  * bsc#1231877
  * bsc#1231909
  * bsc#1232045
  * bsc#1232048
  * bsc#1232166
  * bsc#1232224
  * bsc#1233038
  * bsc#1233050
  * bsc#1233055
  * bsc#1233096
  * bsc#1233112
  * bsc#1233200
  * bsc#1233204
  * bsc#1233239
  * bsc#1233467
  * bsc#1233469
  * bsc#1233476
  * bsc#1233488
  * bsc#1233551
  * bsc#1233769
  * bsc#1233977
  * bsc#1234087
  * bsc#1234161
  * bsc#1234240
  * bsc#1234241
  * bsc#1234242
  * bsc#1234243
  * bsc#1234281
  * bsc#1234381
  * bsc#1234437
  * bsc#1234690
  * bsc#1234827
  * bsc#1234834
  * bsc#1234846
  * bsc#1234853
  * bsc#1234891
  * bsc#1234898
  * bsc#1234921
  * bsc#1234922
  * bsc#1234923
  * bsc#1234971
  * bsc#1235004
  * bsc#1235009
  * bsc#1235031
  * bsc#1235035
  * bsc#1235054
  * bsc#1235056
  * bsc#1235057
  * bsc#1235061
  * bsc#1235073
  * bsc#1235075
  * bsc#1235125
  * bsc#1235138
  * bsc#1235249
  * bsc#1235415
  * bsc#1235416
  * bsc#1235417
  * bsc#1235427
  * bsc#1235433
  * bsc#1235480
  * bsc#1235577
  * bsc#1235584
  * bsc#1235708
  * bsc#1235759
  * bsc#1235814
  * bsc#1235888
  * bsc#1235918
  * bsc#1235920
  * bsc#1235952
  * bsc#1235964

  
Cross-References:

  * CVE-2022-48742
  * CVE-2022-49033
  * CVE-2022-49035
  * CVE-2023-52434
  * CVE-2023-52922
  * CVE-2024-26976
  * CVE-2024-35847
  * CVE-2024-36484
  * CVE-2024-36883
  * CVE-2024-36886
  * CVE-2024-38589
  * CVE-2024-41013
  * CVE-2024-46771
  * CVE-2024-47141
  * CVE-2024-47666
  * CVE-2024-47678
  * CVE-2024-47709
  * CVE-2024-49925
  * CVE-2024-49944
  * CVE-2024-50039
  * CVE-2024-50143
  * CVE-2024-50151
  * CVE-2024-50166
  * CVE-2024-50199
  * CVE-2024-50211
  * CVE-2024-50228
  * CVE-2024-50256
  * CVE-2024-50262
  * CVE-2024-50278
  * CVE-2024-50280
  * CVE-2024-50287
  * CVE-2024-50299
  * CVE-2024-53057
  * CVE-2024-53101
  * CVE-2024-53112
  * CVE-2024-53136
  * CVE-2024-53141
  * CVE-2024-53144
  * CVE-2024-53146
  * CVE-2024-53150
  * CVE-2024-53156
  * CVE-2024-53157
  * CVE-2024-53172
  * CVE-2024-53173
  * CVE-2024-53179
  * CVE-2024-53198
  * CVE-2024-53210
  * CVE-2024-53214
  * CVE-2024-53224
  * CVE-2024-53239
  * CVE-2024-53240
  * CVE-2024-56531
  * CVE-2024-56548
  * CVE-2024-56551
  * CVE-2024-56569
  * CVE-2024-56570
  * CVE-2024-56587
  * CVE-2024-56599
  * CVE-2024-5660
  * CVE-2024-56603
  * CVE-2024-56604
  * CVE-2024-56605
  * CVE-2024-56606
  * CVE-2024-56616
  * CVE-2024-56631
  * CVE-2024-56642
  * CVE-2024-56664
  * CVE-2024-56704
  * CVE-2024-56724
  * CVE-2024-56756
  * CVE-2024-57791
  * CVE-2024-57849
  * CVE-2024-57887
  * CVE-2024-57888
  * CVE-2024-57892
  * CVE-2024-57893
  * CVE-2024-8805

  
CVSS scores:

  * CVE-2022-48742 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48742 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49033 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49033 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49033 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49035 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49035 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49035 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52434 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  * CVE-2023-52434 ( NVD ):  8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52922 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2023-52922 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2023-52922 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26976 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26976 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-35847 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-35847 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36484 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-36883 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-36886 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-36886 ( NVD ):  8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-38589 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-38589 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-41013 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-46771 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-46771 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47141 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47141 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47666 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47666 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47666 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47678 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-47678 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-47678 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2024-47709 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47709 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47709 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49925 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49925 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49925 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49944 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49944 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50039 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50039 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50143 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50143 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-50143 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50151 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-50151 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
  * CVE-2024-50151 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50166 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50166 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50199 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50211 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50211 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50211 ( NVD ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-50228 ( SUSE ):  0.0
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-50228 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2024-50228 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50256 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50256 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50256 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50262 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50262 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-50262 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50262 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50278 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
  * CVE-2024-50278 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50280 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50280 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50287 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50287 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50299 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50299 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53057 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53057 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53057 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53101 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53101 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-53101 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53112 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53112 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53112 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53136 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53136 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53141 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53141 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53141 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53144 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53146 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53146 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53146 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53150 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53150 ( SUSE ):  6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
  * CVE-2024-53150 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-53156 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53156 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53156 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53157 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53157 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53157 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53172 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53172 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53173 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53173 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53173 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53179 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53179 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53179 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53198 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2024-53198 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
  * CVE-2024-53210 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53210 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53210 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53214 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53214 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53224 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53224 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53239 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53239 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56531 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2024-56531 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2024-56548 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56548 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56551 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56551 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56551 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56569 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56569 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56570 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56570 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56587 ( SUSE ):  5.7
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56587 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56599 ( SUSE ):  6.7
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56599 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56599 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-5660 ( NVD ):  9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56603 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56603 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56603 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56604 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56604 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56604 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56605 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56605 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56605 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56606 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56606 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56606 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56616 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56616 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56631 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56631 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56631 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56642 ( SUSE ):  7.5
    CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56642 ( SUSE ):  7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56642 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56664 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56664 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56664 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56704 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56704 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56704 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56724 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56724 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56724 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56756 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56756 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
  * CVE-2024-56756 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57791 ( SUSE ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-57791 ( SUSE ):  7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57849 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-57849 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-57887 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-57887 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-57887 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-57888 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-57888 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57892 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-57892 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57892 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-57893 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-57893 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-8805 ( SUSE ):  8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-8805 ( NVD ):  8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-8805 ( NVD ):  8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

  
Affected Products:

  * SUSE Linux Enterprise High Availability Extension 12 SP5
  * SUSE Linux Enterprise High Performance Computing 12 SP5
  * SUSE Linux Enterprise Live Patching 12-SP5
  * SUSE Linux Enterprise Server 12 SP5
  * SUSE Linux Enterprise Server 12 SP5 LTSS
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5

  
  
An update that solves 77 vulnerabilities and has 10 security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

  * CVE-2022-48742: rtnetlink: make sure to refresh master_dev/m_ops in
    __rtnl_newlink() (bsc#1226694).
  * CVE-2022-49033: btrfs: qgroup: fix sleep from invalid context bug in
    btrfs_qgroup_inherit() (bsc#1232045).
  * CVE-2022-49035: media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE
    (bsc#1215304).
  * CVE-2023-52434: Fixed potential OOBs in smb2_parse_contexts() (bsc#1220148).
  * CVE-2023-52922: can: bcm: Fix UAF in bcm_proc_show() (bsc#1233977).
  * CVE-2024-26976: KVM: Always flush async #PF workqueue when vCPU is being
    destroyed (bsc#1223635).
  * CVE-2024-35847: irqchip/gic-v3-its: Prevent double free on error
    (bsc#1224697).
  * CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
  * CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
  * CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
    (bsc#1226748).
  * CVE-2024-41013: xfs: do not walk off the end of a directory data block
    (bsc#1228405).
  * CVE-2024-47141: pinmux: Use sequential access to access desc->pinmux data
    (bsc#1235708).
  * CVE-2024-47666: scsi: pm80xx: Set phy->enable_completion only when we wait
    for it (bsc#1231453).
  * CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854).
  * CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in
    sctp_listen_start (bsc#1232166).
  * CVE-2024-50039: kABI: Restore deleted
    EXPORT_SYMBOL(__qdisc_calculate_pkt_len) (bsc#1231909).
  * CVE-2024-50143: udf: fix uninit-value use in udf_get_fileshortad
    (bsc#1233038).
  * CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request
    (bsc#1233055).
  * CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices
    (bsc#1233050).
  * CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112).
  * CVE-2024-50211: udf: refactor inode_bmap() to handle error (bsc#1233096).
  * CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in
    nf_send_reset6() (bsc#1233200).
  * CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key()
    (bsc#1233239).
  * CVE-2024-50287: media: v4l2-tpg: prevent the risk of a division by zero
    (bsc#1233476).
  * CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb()
    (bsc#1233488).
  * CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
    (bsc#1233551).
  * CVE-2024-53101: fs: Fix uninitialized value issue in from_kuid and from_kgid
    (bsc#1233769).
  * CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt
    (bsc#1234381).
  * CVE-2024-53146: NFSD: Prevent a potential integer overflow (bsc#1234853).
  * CVE-2024-53150: ALSA: usb-audio: Fix out of bounds reads when finding clock
    sources (bsc#1234834).
  * CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in
    htc_connect_service() (bsc#1234846).
  * CVE-2024-53157: firmware: arm_scpi: Check the DVFS OPP count returned by the
    firmware (bsc#1234827).
  * CVE-2024-53172: ubi: fastmap: Fix duplicate slab cache names while attaching
    (bsc#1234898).
  * CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous
    open() (bsc#1234891).
  * CVE-2024-53179: smb: client: fix use-after-free of signing key
    (bsc#1234921).
  * CVE-2024-53198: xen: Fix the issue of resource not being properly released
    in xenbus_dev_probe() (bsc#1234923).
  * CVE-2024-53210: s390/iucv: MSG_PEEK causes memory leak in
    iucv_sock_destruct() (bsc#1234971).
  * CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended
    capability (bsc#1235004).
  * CVE-2024-53224: RDMA/mlx5: Cancel pkey work before destroying device
    resources (bsc#1235009).
  * CVE-2024-53239: ALSA: 6fire: Release resources at card release
    (bsc#1235054).
  * CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281).
  * CVE-2024-56531: ALSA: caiaq: Use snd_card_free_when_closed() at
    disconnection (bsc#1235057).
  * CVE-2024-56548: hfsplus: do not query the device logical block size multiple
    times (bsc#1235073).
  * CVE-2024-56551: drm/amdgpu: fix usage slab after free (bsc#1235075).
  * CVE-2024-56569: ftrace: Fix regression with module command in
    stack_trace_filter (bsc#1235031).
  * CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function
    (bsc#1235035).
  * CVE-2024-56587: leds: class: Protect brightness_show() with
    led_cdev->led_access mutex (bsc#1235125).
  * CVE-2024-56599: wifi: ath10k: avoid NULL pointer error during sdio remove
    (bsc#1235138).
  * CVE-2024-56603: net: af_can: do not leave a dangling sk pointer in
    can_create() (bsc#1235415).
  * CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in
    rfcomm_sock_alloc() (bsc#1235056).
  * CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error
    in l2cap_sock_create() (bsc#1235061).
  * CVE-2024-56616: drm/dp_mst: Fix MST sideband message body length check
    (bsc#1235427).
  * CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release()
    (bsc#1235480).
  * CVE-2024-56642: tipc: Fix use-after-free of kernel socket in
    cleanup_bearer() (bsc#1235433).
  * CVE-2024-56664: bpf, sockmap: Fix race between element replace and close()
    (bsc#1235249).
  * CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).
  * CVE-2024-56724: mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device
    (bsc#1235577).
  * CVE-2024-56756: nvme-pci: fix freeing of the HMB descriptor table
    (bsc#1234922).
  * CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining
    clc data (bsc#1235759).
  * CVE-2024-57849: s390/cpum_sf: Handle CPU hotplug remove during sampling
    (bsc#1235814).
  * CVE-2024-57887: drm: adv7511: Fix use-after-free in adv7533_attach_dsi()
    (bsc#1235952).
  * CVE-2024-57888: workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work
    from !WQ_MEM_RECLAIM worker (bsc#1235416 bsc#1235918).
  * CVE-2024-57892: ocfs2: fix slab-use-after-free due to dangling pointer
    dqi_priv (bsc#1235964).
  * CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages
    (bsc#1235920).

The following non-security bugs were fixed:

  * SUNRPC: 'Directory with parent 'rpc_clnt' already present!' (bsc#1168202
    bsc#1188924).
  * SUNRPC: fix use-after-free in rpc_free_client_work() (bsc#1168202
    bsc#1188924).
  * cifs: fix calc signature on big endian systems (bsc#1235888, bsc#1234921).
  * memcg: reduce memcg tree traversals for stats collection (bsc#1231877).
  * mm: memory.stat allow preemption (bsc#1231877).
  * net: marvell: mvpp2: phylink requires the link interrupt (bsc#1117016).
  * smb: client: fix parsing of SMB3.1.1 POSIX create context (git-fixes).
  * tipc: fix NULL deref in cleanup_bearer() (bsc#1235433).
  * udf: Handle error when adding extent to a file (bsc#1234437).
  * udf: refactor udf_current_aext() to handle error (bsc#1234240).
  * udf: refactor udf_next_aext() to handle error (bsc#1234241).
  * workqueue: skip lockdep wq dependency in cancel_work_sync() (bsc#1235918).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Server for SAP Applications 12 SP5  
    zypper in -t patch SUSE-SLE-HA-12-SP5-2025-236=1

  * SUSE Linux Enterprise High Availability Extension 12 SP5  
    zypper in -t patch SUSE-SLE-HA-12-SP5-2025-236=1

  * SUSE Linux Enterprise Live Patching 12-SP5  
    zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-236=1

  * SUSE Linux Enterprise Server 12 SP5 LTSS  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-236=1

  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-236=1

## Package List:

  * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc)
    * kernel-default-4.12.14-122.244.1
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
    * kernel-default-debuginfo-4.12.14-122.244.1
    * kernel-default-debugsource-4.12.14-122.244.1
  * SUSE Linux Enterprise High Availability Extension 12 SP5 (nosrc)
    * kernel-default-4.12.14-122.244.1
  * SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x
    x86_64)
    * kernel-default-debuginfo-4.12.14-122.244.1
    * kernel-default-debugsource-4.12.14-122.244.1
  * SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
    * kernel-default-4.12.14-122.244.1
  * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
    * kgraft-patch-4_12_14-122_244-default-1-8.5.1
    * kernel-default-debugsource-4.12.14-122.244.1
    * kernel-default-kgraft-4.12.14-122.244.1
    * kernel-default-debuginfo-4.12.14-122.244.1
    * kernel-default-kgraft-devel-4.12.14-122.244.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
    * kernel-default-base-debuginfo-4.12.14-122.244.1
    * kernel-default-devel-4.12.14-122.244.1
    * cluster-md-kmp-default-debuginfo-4.12.14-122.244.1
    * kernel-default-debugsource-4.12.14-122.244.1
    * ocfs2-kmp-default-4.12.14-122.244.1
    * dlm-kmp-default-debuginfo-4.12.14-122.244.1
    * dlm-kmp-default-4.12.14-122.244.1
    * gfs2-kmp-default-4.12.14-122.244.1
    * cluster-md-kmp-default-4.12.14-122.244.1
    * gfs2-kmp-default-debuginfo-4.12.14-122.244.1
    * kernel-default-debuginfo-4.12.14-122.244.1
    * kernel-default-base-4.12.14-122.244.1
    * ocfs2-kmp-default-debuginfo-4.12.14-122.244.1
    * kernel-syms-4.12.14-122.244.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64
    nosrc)
    * kernel-default-4.12.14-122.244.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
    * kernel-macros-4.12.14-122.244.1
    * kernel-devel-4.12.14-122.244.1
    * kernel-source-4.12.14-122.244.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x)
    * kernel-default-man-4.12.14-122.244.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64)
    * kernel-default-devel-debuginfo-4.12.14-122.244.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
    * kernel-default-base-debuginfo-4.12.14-122.244.1
    * kernel-default-devel-4.12.14-122.244.1
    * cluster-md-kmp-default-debuginfo-4.12.14-122.244.1
    * kernel-default-debugsource-4.12.14-122.244.1
    * ocfs2-kmp-default-4.12.14-122.244.1
    * dlm-kmp-default-debuginfo-4.12.14-122.244.1
    * dlm-kmp-default-4.12.14-122.244.1
    * gfs2-kmp-default-4.12.14-122.244.1
    * cluster-md-kmp-default-4.12.14-122.244.1
    * gfs2-kmp-default-debuginfo-4.12.14-122.244.1
    * kernel-default-debuginfo-4.12.14-122.244.1
    * kernel-default-base-4.12.14-122.244.1
    * ocfs2-kmp-default-debuginfo-4.12.14-122.244.1
    * kernel-default-devel-debuginfo-4.12.14-122.244.1
    * kernel-syms-4.12.14-122.244.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64)
    * kernel-default-4.12.14-122.244.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
    * kernel-macros-4.12.14-122.244.1
    * kernel-devel-4.12.14-122.244.1
    * kernel-source-4.12.14-122.244.1

## References:

  * https://www.suse.com/security/cve/CVE-2022-48742.html
  * https://www.suse.com/security/cve/CVE-2022-49033.html
  * https://www.suse.com/security/cve/CVE-2022-49035.html
  * https://www.suse.com/security/cve/CVE-2023-52434.html
  * https://www.suse.com/security/cve/CVE-2023-52922.html
  * https://www.suse.com/security/cve/CVE-2024-26976.html
  * https://www.suse.com/security/cve/CVE-2024-35847.html
  * https://www.suse.com/security/cve/CVE-2024-36484.html
  * https://www.suse.com/security/cve/CVE-2024-36883.html
  * https://www.suse.com/security/cve/CVE-2024-36886.html
  * https://www.suse.com/security/cve/CVE-2024-38589.html
  * https://www.suse.com/security/cve/CVE-2024-41013.html
  * https://www.suse.com/security/cve/CVE-2024-46771.html
  * https://www.suse.com/security/cve/CVE-2024-47141.html
  * https://www.suse.com/security/cve/CVE-2024-47666.html
  * https://www.suse.com/security/cve/CVE-2024-47678.html
  * https://www.suse.com/security/cve/CVE-2024-47709.html
  * https://www.suse.com/security/cve/CVE-2024-49925.html
  * https://www.suse.com/security/cve/CVE-2024-49944.html
  * https://www.suse.com/security/cve/CVE-2024-50039.html
  * https://www.suse.com/security/cve/CVE-2024-50143.html
  * https://www.suse.com/security/cve/CVE-2024-50151.html
  * https://www.suse.com/security/cve/CVE-2024-50166.html
  * https://www.suse.com/security/cve/CVE-2024-50199.html
  * https://www.suse.com/security/cve/CVE-2024-50211.html
  * https://www.suse.com/security/cve/CVE-2024-50228.html
  * https://www.suse.com/security/cve/CVE-2024-50256.html
  * https://www.suse.com/security/cve/CVE-2024-50262.html
  * https://www.suse.com/security/cve/CVE-2024-50278.html
  * https://www.suse.com/security/cve/CVE-2024-50280.html
  * https://www.suse.com/security/cve/CVE-2024-50287.html
  * https://www.suse.com/security/cve/CVE-2024-50299.html
  * https://www.suse.com/security/cve/CVE-2024-53057.html
  * https://www.suse.com/security/cve/CVE-2024-53101.html
  * https://www.suse.com/security/cve/CVE-2024-53112.html
  * https://www.suse.com/security/cve/CVE-2024-53136.html
  * https://www.suse.com/security/cve/CVE-2024-53141.html
  * https://www.suse.com/security/cve/CVE-2024-53144.html
  * https://www.suse.com/security/cve/CVE-2024-53146.html
  * https://www.suse.com/security/cve/CVE-2024-53150.html
  * https://www.suse.com/security/cve/CVE-2024-53156.html
  * https://www.suse.com/security/cve/CVE-2024-53157.html
  * https://www.suse.com/security/cve/CVE-2024-53172.html
  * https://www.suse.com/security/cve/CVE-2024-53173.html
  * https://www.suse.com/security/cve/CVE-2024-53179.html
  * https://www.suse.com/security/cve/CVE-2024-53198.html
  * https://www.suse.com/security/cve/CVE-2024-53210.html
  * https://www.suse.com/security/cve/CVE-2024-53214.html
  * https://www.suse.com/security/cve/CVE-2024-53224.html
  * https://www.suse.com/security/cve/CVE-2024-53239.html
  * https://www.suse.com/security/cve/CVE-2024-53240.html
  * https://www.suse.com/security/cve/CVE-2024-56531.html
  * https://www.suse.com/security/cve/CVE-2024-56548.html
  * https://www.suse.com/security/cve/CVE-2024-56551.html
  * https://www.suse.com/security/cve/CVE-2024-56569.html
  * https://www.suse.com/security/cve/CVE-2024-56570.html
  * https://www.suse.com/security/cve/CVE-2024-56587.html
  * https://www.suse.com/security/cve/CVE-2024-56599.html
  * https://www.suse.com/security/cve/CVE-2024-5660.html
  * https://www.suse.com/security/cve/CVE-2024-56603.html
  * https://www.suse.com/security/cve/CVE-2024-56604.html
  * https://www.suse.com/security/cve/CVE-2024-56605.html
  * https://www.suse.com/security/cve/CVE-2024-56606.html
  * https://www.suse.com/security/cve/CVE-2024-56616.html
  * https://www.suse.com/security/cve/CVE-2024-56631.html
  * https://www.suse.com/security/cve/CVE-2024-56642.html
  * https://www.suse.com/security/cve/CVE-2024-56664.html
  * https://www.suse.com/security/cve/CVE-2024-56704.html
  * https://www.suse.com/security/cve/CVE-2024-56724.html
  * https://www.suse.com/security/cve/CVE-2024-56756.html
  * https://www.suse.com/security/cve/CVE-2024-57791.html
  * https://www.suse.com/security/cve/CVE-2024-57849.html
  * https://www.suse.com/security/cve/CVE-2024-57887.html
  * https://www.suse.com/security/cve/CVE-2024-57888.html
  * https://www.suse.com/security/cve/CVE-2024-57892.html
  * https://www.suse.com/security/cve/CVE-2024-57893.html
  * https://www.suse.com/security/cve/CVE-2024-8805.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1117016
  * https://bugzilla.suse.com/show_bug.cgi?id=1168202
  * https://bugzilla.suse.com/show_bug.cgi?id=1188924
  * https://bugzilla.suse.com/show_bug.cgi?id=1215304
  * https://bugzilla.suse.com/show_bug.cgi?id=1220148
  * https://bugzilla.suse.com/show_bug.cgi?id=1223635
  * https://bugzilla.suse.com/show_bug.cgi?id=1224697
  * https://bugzilla.suse.com/show_bug.cgi?id=1225725
  * https://bugzilla.suse.com/show_bug.cgi?id=1225730
  * https://bugzilla.suse.com/show_bug.cgi?id=1226694
  * https://bugzilla.suse.com/show_bug.cgi?id=1226748
  * https://bugzilla.suse.com/show_bug.cgi?id=1226872
  * https://bugzilla.suse.com/show_bug.cgi?id=1228405
  * https://bugzilla.suse.com/show_bug.cgi?id=1230697
  * https://bugzilla.suse.com/show_bug.cgi?id=1230766
  * https://bugzilla.suse.com/show_bug.cgi?id=1231453
  * https://bugzilla.suse.com/show_bug.cgi?id=1231854
  * https://bugzilla.suse.com/show_bug.cgi?id=1231877
  * https://bugzilla.suse.com/show_bug.cgi?id=1231909
  * https://bugzilla.suse.com/show_bug.cgi?id=1232045
  * https://bugzilla.suse.com/show_bug.cgi?id=1232048
  * https://bugzilla.suse.com/show_bug.cgi?id=1232166
  * https://bugzilla.suse.com/show_bug.cgi?id=1232224
  * https://bugzilla.suse.com/show_bug.cgi?id=1233038
  * https://bugzilla.suse.com/show_bug.cgi?id=1233050
  * https://bugzilla.suse.com/show_bug.cgi?id=1233055
  * https://bugzilla.suse.com/show_bug.cgi?id=1233096
  * https://bugzilla.suse.com/show_bug.cgi?id=1233112
  * https://bugzilla.suse.com/show_bug.cgi?id=1233200
  * https://bugzilla.suse.com/show_bug.cgi?id=1233204
  * https://bugzilla.suse.com/show_bug.cgi?id=1233239
  * https://bugzilla.suse.com/show_bug.cgi?id=1233467
  * https://bugzilla.suse.com/show_bug.cgi?id=1233469
  * https://bugzilla.suse.com/show_bug.cgi?id=1233476
  * https://bugzilla.suse.com/show_bug.cgi?id=1233488
  * https://bugzilla.suse.com/show_bug.cgi?id=1233551
  * https://bugzilla.suse.com/show_bug.cgi?id=1233769
  * https://bugzilla.suse.com/show_bug.cgi?id=1233977
  * https://bugzilla.suse.com/show_bug.cgi?id=1234087
  * https://bugzilla.suse.com/show_bug.cgi?id=1234161
  * https://bugzilla.suse.com/show_bug.cgi?id=1234240
  * https://bugzilla.suse.com/show_bug.cgi?id=1234241
  * https://bugzilla.suse.com/show_bug.cgi?id=1234242
  * https://bugzilla.suse.com/show_bug.cgi?id=1234243
  * https://bugzilla.suse.com/show_bug.cgi?id=1234281
  * https://bugzilla.suse.com/show_bug.cgi?id=1234381
  * https://bugzilla.suse.com/show_bug.cgi?id=1234437
  * https://bugzilla.suse.com/show_bug.cgi?id=1234690
  * https://bugzilla.suse.com/show_bug.cgi?id=1234827
  * https://bugzilla.suse.com/show_bug.cgi?id=1234834
  * https://bugzilla.suse.com/show_bug.cgi?id=1234846
  * https://bugzilla.suse.com/show_bug.cgi?id=1234853
  * https://bugzilla.suse.com/show_bug.cgi?id=1234891
  * https://bugzilla.suse.com/show_bug.cgi?id=1234898
  * https://bugzilla.suse.com/show_bug.cgi?id=1234921
  * https://bugzilla.suse.com/show_bug.cgi?id=1234922
  * https://bugzilla.suse.com/show_bug.cgi?id=1234923
  * https://bugzilla.suse.com/show_bug.cgi?id=1234971
  * https://bugzilla.suse.com/show_bug.cgi?id=1235004
  * https://bugzilla.suse.com/show_bug.cgi?id=1235009
  * https://bugzilla.suse.com/show_bug.cgi?id=1235031
  * https://bugzilla.suse.com/show_bug.cgi?id=1235035
  * https://bugzilla.suse.com/show_bug.cgi?id=1235054
  * https://bugzilla.suse.com/show_bug.cgi?id=1235056
  * https://bugzilla.suse.com/show_bug.cgi?id=1235057
  * https://bugzilla.suse.com/show_bug.cgi?id=1235061
  * https://bugzilla.suse.com/show_bug.cgi?id=1235073
  * https://bugzilla.suse.com/show_bug.cgi?id=1235075
  * https://bugzilla.suse.com/show_bug.cgi?id=1235125
  * https://bugzilla.suse.com/show_bug.cgi?id=1235138
  * https://bugzilla.suse.com/show_bug.cgi?id=1235249
  * https://bugzilla.suse.com/show_bug.cgi?id=1235415
  * https://bugzilla.suse.com/show_bug.cgi?id=1235416
  * https://bugzilla.suse.com/show_bug.cgi?id=1235417
  * https://bugzilla.suse.com/show_bug.cgi?id=1235427
  * https://bugzilla.suse.com/show_bug.cgi?id=1235433
  * https://bugzilla.suse.com/show_bug.cgi?id=1235480
  * https://bugzilla.suse.com/show_bug.cgi?id=1235577
  * https://bugzilla.suse.com/show_bug.cgi?id=1235584
  * https://bugzilla.suse.com/show_bug.cgi?id=1235708
  * https://bugzilla.suse.com/show_bug.cgi?id=1235759
  * https://bugzilla.suse.com/show_bug.cgi?id=1235814
  * https://bugzilla.suse.com/show_bug.cgi?id=1235888
  * https://bugzilla.suse.com/show_bug.cgi?id=1235918
  * https://bugzilla.suse.com/show_bug.cgi?id=1235920
  * https://bugzilla.suse.com/show_bug.cgi?id=1235952
  * https://bugzilla.suse.com/show_bug.cgi?id=1235964

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20250124/1d72f7ac/attachment.htm>


More information about the sle-security-updates mailing list