SUSE-SU-2025:0236-1: important: Security update for the Linux Kernel
SLE-SECURITY-UPDATES
null at suse.de
Fri Jan 24 20:31:15 UTC 2025
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2025:0236-1
Release Date: 2025-01-24T17:02:47Z
Rating: important
References:
* bsc#1117016
* bsc#1168202
* bsc#1188924
* bsc#1215304
* bsc#1220148
* bsc#1223635
* bsc#1224697
* bsc#1225725
* bsc#1225730
* bsc#1226694
* bsc#1226748
* bsc#1226872
* bsc#1228405
* bsc#1230697
* bsc#1230766
* bsc#1231453
* bsc#1231854
* bsc#1231877
* bsc#1231909
* bsc#1232045
* bsc#1232048
* bsc#1232166
* bsc#1232224
* bsc#1233038
* bsc#1233050
* bsc#1233055
* bsc#1233096
* bsc#1233112
* bsc#1233200
* bsc#1233204
* bsc#1233239
* bsc#1233467
* bsc#1233469
* bsc#1233476
* bsc#1233488
* bsc#1233551
* bsc#1233769
* bsc#1233977
* bsc#1234087
* bsc#1234161
* bsc#1234240
* bsc#1234241
* bsc#1234242
* bsc#1234243
* bsc#1234281
* bsc#1234381
* bsc#1234437
* bsc#1234690
* bsc#1234827
* bsc#1234834
* bsc#1234846
* bsc#1234853
* bsc#1234891
* bsc#1234898
* bsc#1234921
* bsc#1234922
* bsc#1234923
* bsc#1234971
* bsc#1235004
* bsc#1235009
* bsc#1235031
* bsc#1235035
* bsc#1235054
* bsc#1235056
* bsc#1235057
* bsc#1235061
* bsc#1235073
* bsc#1235075
* bsc#1235125
* bsc#1235138
* bsc#1235249
* bsc#1235415
* bsc#1235416
* bsc#1235417
* bsc#1235427
* bsc#1235433
* bsc#1235480
* bsc#1235577
* bsc#1235584
* bsc#1235708
* bsc#1235759
* bsc#1235814
* bsc#1235888
* bsc#1235918
* bsc#1235920
* bsc#1235952
* bsc#1235964
Cross-References:
* CVE-2022-48742
* CVE-2022-49033
* CVE-2022-49035
* CVE-2023-52434
* CVE-2023-52922
* CVE-2024-26976
* CVE-2024-35847
* CVE-2024-36484
* CVE-2024-36883
* CVE-2024-36886
* CVE-2024-38589
* CVE-2024-41013
* CVE-2024-46771
* CVE-2024-47141
* CVE-2024-47666
* CVE-2024-47678
* CVE-2024-47709
* CVE-2024-49925
* CVE-2024-49944
* CVE-2024-50039
* CVE-2024-50143
* CVE-2024-50151
* CVE-2024-50166
* CVE-2024-50199
* CVE-2024-50211
* CVE-2024-50228
* CVE-2024-50256
* CVE-2024-50262
* CVE-2024-50278
* CVE-2024-50280
* CVE-2024-50287
* CVE-2024-50299
* CVE-2024-53057
* CVE-2024-53101
* CVE-2024-53112
* CVE-2024-53136
* CVE-2024-53141
* CVE-2024-53144
* CVE-2024-53146
* CVE-2024-53150
* CVE-2024-53156
* CVE-2024-53157
* CVE-2024-53172
* CVE-2024-53173
* CVE-2024-53179
* CVE-2024-53198
* CVE-2024-53210
* CVE-2024-53214
* CVE-2024-53224
* CVE-2024-53239
* CVE-2024-53240
* CVE-2024-56531
* CVE-2024-56548
* CVE-2024-56551
* CVE-2024-56569
* CVE-2024-56570
* CVE-2024-56587
* CVE-2024-56599
* CVE-2024-5660
* CVE-2024-56603
* CVE-2024-56604
* CVE-2024-56605
* CVE-2024-56606
* CVE-2024-56616
* CVE-2024-56631
* CVE-2024-56642
* CVE-2024-56664
* CVE-2024-56704
* CVE-2024-56724
* CVE-2024-56756
* CVE-2024-57791
* CVE-2024-57849
* CVE-2024-57887
* CVE-2024-57888
* CVE-2024-57892
* CVE-2024-57893
* CVE-2024-8805
CVSS scores:
* CVE-2022-48742 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48742 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49033 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49033 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49035 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49035 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49035 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52434 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2023-52434 ( NVD ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52922 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52922 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-52922 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26976 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-35847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-35847 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36484 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-36883 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-36886 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-36886 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-38589 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-38589 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-41013 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-46771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46771 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47141 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47141 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47666 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47666 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47678 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-47678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-47678 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-47709 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47709 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47709 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49925 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49925 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49944 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50039 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50143 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50143 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50143 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50151 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50151 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50166 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50211 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50211 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-50228 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50228 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50228 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50256 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50256 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50262 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50262 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50262 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50278 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
* CVE-2024-50278 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50280 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50287 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50299 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50299 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53101 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53101 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53112 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53136 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53141 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53141 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53146 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53146 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53150 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53150 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-53150 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53156 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53156 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53156 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53157 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53172 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53173 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53179 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53179 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53198 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-53198 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2024-53210 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53214 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53214 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53224 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53224 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53239 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56531 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56531 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56548 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56551 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56551 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56551 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56569 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56569 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56570 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56570 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56587 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56587 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56599 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56599 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56599 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-5660 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56603 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56603 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56603 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56604 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56604 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56604 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56606 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56606 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56606 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56616 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56616 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56631 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56631 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56642 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56642 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56664 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56664 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56704 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56704 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56724 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56724 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56756 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56756 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-56756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57791 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57791 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57849 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57887 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57887 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57887 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57888 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57892 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57893 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57893 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* SUSE Linux Enterprise High Availability Extension 12 SP5
* SUSE Linux Enterprise High Performance Computing 12 SP5
* SUSE Linux Enterprise Live Patching 12-SP5
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server 12 SP5 LTSS
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
An update that solves 77 vulnerabilities and has 10 security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2022-48742: rtnetlink: make sure to refresh master_dev/m_ops in
__rtnl_newlink() (bsc#1226694).
* CVE-2022-49033: btrfs: qgroup: fix sleep from invalid context bug in
btrfs_qgroup_inherit() (bsc#1232045).
* CVE-2022-49035: media: s5p_cec: limit msg.len to CEC_MAX_MSG_SIZE
(bsc#1215304).
* CVE-2023-52434: Fixed potential OOBs in smb2_parse_contexts() (bsc#1220148).
* CVE-2023-52922: can: bcm: Fix UAF in bcm_proc_show() (bsc#1233977).
* CVE-2024-26976: KVM: Always flush async #PF workqueue when vCPU is being
destroyed (bsc#1223635).
* CVE-2024-35847: irqchip/gic-v3-its: Prevent double free on error
(bsc#1224697).
* CVE-2024-36883: net: fix out-of-bounds access in ops_init (bsc#1225725).
* CVE-2024-36886: tipc: fix UAF in error path (bsc#1225730).
* CVE-2024-38589: netrom: fix possible dead-lock in nr_rt_ioctl()
(bsc#1226748).
* CVE-2024-41013: xfs: do not walk off the end of a directory data block
(bsc#1228405).
* CVE-2024-47141: pinmux: Use sequential access to access desc->pinmux data
(bsc#1235708).
* CVE-2024-47666: scsi: pm80xx: Set phy->enable_completion only when we wait
for it (bsc#1231453).
* CVE-2024-47678: icmp: change the order of rate limits (bsc#1231854).
* CVE-2024-49944: sctp: set sk_state back to CLOSED if autobind fails in
sctp_listen_start (bsc#1232166).
* CVE-2024-50039: kABI: Restore deleted
EXPORT_SYMBOL(__qdisc_calculate_pkt_len) (bsc#1231909).
* CVE-2024-50143: udf: fix uninit-value use in udf_get_fileshortad
(bsc#1233038).
* CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request
(bsc#1233055).
* CVE-2024-50166: fsl/fman: Fix refcount handling of fman-related devices
(bsc#1233050).
* CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112).
* CVE-2024-50211: udf: refactor inode_bmap() to handle error (bsc#1233096).
* CVE-2024-50256: netfilter: nf_reject_ipv6: fix potential crash in
nf_send_reset6() (bsc#1233200).
* CVE-2024-50262: bpf: Fix out-of-bounds write in trie_get_next_key()
(bsc#1233239).
* CVE-2024-50287: media: v4l2-tpg: prevent the risk of a division by zero
(bsc#1233476).
* CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb()
(bsc#1233488).
* CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT
(bsc#1233551).
* CVE-2024-53101: fs: Fix uninitialized value issue in from_kuid and from_kgid
(bsc#1233769).
* CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt
(bsc#1234381).
* CVE-2024-53146: NFSD: Prevent a potential integer overflow (bsc#1234853).
* CVE-2024-53150: ALSA: usb-audio: Fix out of bounds reads when finding clock
sources (bsc#1234834).
* CVE-2024-53156: wifi: ath9k: add range check for conn_rsp_epid in
htc_connect_service() (bsc#1234846).
* CVE-2024-53157: firmware: arm_scpi: Check the DVFS OPP count returned by the
firmware (bsc#1234827).
* CVE-2024-53172: ubi: fastmap: Fix duplicate slab cache names while attaching
(bsc#1234898).
* CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous
open() (bsc#1234891).
* CVE-2024-53179: smb: client: fix use-after-free of signing key
(bsc#1234921).
* CVE-2024-53198: xen: Fix the issue of resource not being properly released
in xenbus_dev_probe() (bsc#1234923).
* CVE-2024-53210: s390/iucv: MSG_PEEK causes memory leak in
iucv_sock_destruct() (bsc#1234971).
* CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended
capability (bsc#1235004).
* CVE-2024-53224: RDMA/mlx5: Cancel pkey work before destroying device
resources (bsc#1235009).
* CVE-2024-53239: ALSA: 6fire: Release resources at card release
(bsc#1235054).
* CVE-2024-53240: xen/netfront: fix crash when removing device (bsc#1234281).
* CVE-2024-56531: ALSA: caiaq: Use snd_card_free_when_closed() at
disconnection (bsc#1235057).
* CVE-2024-56548: hfsplus: do not query the device logical block size multiple
times (bsc#1235073).
* CVE-2024-56551: drm/amdgpu: fix usage slab after free (bsc#1235075).
* CVE-2024-56569: ftrace: Fix regression with module command in
stack_trace_filter (bsc#1235031).
* CVE-2024-56570: ovl: Filter invalid inodes with missing lookup function
(bsc#1235035).
* CVE-2024-56587: leds: class: Protect brightness_show() with
led_cdev->led_access mutex (bsc#1235125).
* CVE-2024-56599: wifi: ath10k: avoid NULL pointer error during sdio remove
(bsc#1235138).
* CVE-2024-56603: net: af_can: do not leave a dangling sk pointer in
can_create() (bsc#1235415).
* CVE-2024-56604: Bluetooth: RFCOMM: avoid leaving dangling sk pointer in
rfcomm_sock_alloc() (bsc#1235056).
* CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error
in l2cap_sock_create() (bsc#1235061).
* CVE-2024-56616: drm/dp_mst: Fix MST sideband message body length check
(bsc#1235427).
* CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release()
(bsc#1235480).
* CVE-2024-56642: tipc: Fix use-after-free of kernel socket in
cleanup_bearer() (bsc#1235433).
* CVE-2024-56664: bpf, sockmap: Fix race between element replace and close()
(bsc#1235249).
* CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).
* CVE-2024-56724: mfd: intel_soc_pmic_bxtwc: Use IRQ domain for TMU device
(bsc#1235577).
* CVE-2024-56756: nvme-pci: fix freeing of the HMB descriptor table
(bsc#1234922).
* CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining
clc data (bsc#1235759).
* CVE-2024-57849: s390/cpum_sf: Handle CPU hotplug remove during sampling
(bsc#1235814).
* CVE-2024-57887: drm: adv7511: Fix use-after-free in adv7533_attach_dsi()
(bsc#1235952).
* CVE-2024-57888: workqueue: Do not warn when cancelling WQ_MEM_RECLAIM work
from !WQ_MEM_RECLAIM worker (bsc#1235416 bsc#1235918).
* CVE-2024-57892: ocfs2: fix slab-use-after-free due to dangling pointer
dqi_priv (bsc#1235964).
* CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages
(bsc#1235920).
The following non-security bugs were fixed:
* SUNRPC: 'Directory with parent 'rpc_clnt' already present!' (bsc#1168202
bsc#1188924).
* SUNRPC: fix use-after-free in rpc_free_client_work() (bsc#1168202
bsc#1188924).
* cifs: fix calc signature on big endian systems (bsc#1235888, bsc#1234921).
* memcg: reduce memcg tree traversals for stats collection (bsc#1231877).
* mm: memory.stat allow preemption (bsc#1231877).
* net: marvell: mvpp2: phylink requires the link interrupt (bsc#1117016).
* smb: client: fix parsing of SMB3.1.1 POSIX create context (git-fixes).
* tipc: fix NULL deref in cleanup_bearer() (bsc#1235433).
* udf: Handle error when adding extent to a file (bsc#1234437).
* udf: refactor udf_current_aext() to handle error (bsc#1234240).
* udf: refactor udf_next_aext() to handle error (bsc#1234241).
* workqueue: skip lockdep wq dependency in cancel_work_sync() (bsc#1235918).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
zypper in -t patch SUSE-SLE-HA-12-SP5-2025-236=1
* SUSE Linux Enterprise High Availability Extension 12 SP5
zypper in -t patch SUSE-SLE-HA-12-SP5-2025-236=1
* SUSE Linux Enterprise Live Patching 12-SP5
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-236=1
* SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-236=1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-236=1
## Package List:
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc)
* kernel-default-4.12.14-122.244.1
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
* kernel-default-debuginfo-4.12.14-122.244.1
* kernel-default-debugsource-4.12.14-122.244.1
* SUSE Linux Enterprise High Availability Extension 12 SP5 (nosrc)
* kernel-default-4.12.14-122.244.1
* SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x
x86_64)
* kernel-default-debuginfo-4.12.14-122.244.1
* kernel-default-debugsource-4.12.14-122.244.1
* SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
* kernel-default-4.12.14-122.244.1
* SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
* kgraft-patch-4_12_14-122_244-default-1-8.5.1
* kernel-default-debugsource-4.12.14-122.244.1
* kernel-default-kgraft-4.12.14-122.244.1
* kernel-default-debuginfo-4.12.14-122.244.1
* kernel-default-kgraft-devel-4.12.14-122.244.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* kernel-default-base-debuginfo-4.12.14-122.244.1
* kernel-default-devel-4.12.14-122.244.1
* cluster-md-kmp-default-debuginfo-4.12.14-122.244.1
* kernel-default-debugsource-4.12.14-122.244.1
* ocfs2-kmp-default-4.12.14-122.244.1
* dlm-kmp-default-debuginfo-4.12.14-122.244.1
* dlm-kmp-default-4.12.14-122.244.1
* gfs2-kmp-default-4.12.14-122.244.1
* cluster-md-kmp-default-4.12.14-122.244.1
* gfs2-kmp-default-debuginfo-4.12.14-122.244.1
* kernel-default-debuginfo-4.12.14-122.244.1
* kernel-default-base-4.12.14-122.244.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.244.1
* kernel-syms-4.12.14-122.244.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-4.12.14-122.244.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
* kernel-macros-4.12.14-122.244.1
* kernel-devel-4.12.14-122.244.1
* kernel-source-4.12.14-122.244.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (s390x)
* kernel-default-man-4.12.14-122.244.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64)
* kernel-default-devel-debuginfo-4.12.14-122.244.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
* kernel-default-base-debuginfo-4.12.14-122.244.1
* kernel-default-devel-4.12.14-122.244.1
* cluster-md-kmp-default-debuginfo-4.12.14-122.244.1
* kernel-default-debugsource-4.12.14-122.244.1
* ocfs2-kmp-default-4.12.14-122.244.1
* dlm-kmp-default-debuginfo-4.12.14-122.244.1
* dlm-kmp-default-4.12.14-122.244.1
* gfs2-kmp-default-4.12.14-122.244.1
* cluster-md-kmp-default-4.12.14-122.244.1
* gfs2-kmp-default-debuginfo-4.12.14-122.244.1
* kernel-default-debuginfo-4.12.14-122.244.1
* kernel-default-base-4.12.14-122.244.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.244.1
* kernel-default-devel-debuginfo-4.12.14-122.244.1
* kernel-syms-4.12.14-122.244.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64)
* kernel-default-4.12.14-122.244.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
* kernel-macros-4.12.14-122.244.1
* kernel-devel-4.12.14-122.244.1
* kernel-source-4.12.14-122.244.1
## References:
* https://www.suse.com/security/cve/CVE-2022-48742.html
* https://www.suse.com/security/cve/CVE-2022-49033.html
* https://www.suse.com/security/cve/CVE-2022-49035.html
* https://www.suse.com/security/cve/CVE-2023-52434.html
* https://www.suse.com/security/cve/CVE-2023-52922.html
* https://www.suse.com/security/cve/CVE-2024-26976.html
* https://www.suse.com/security/cve/CVE-2024-35847.html
* https://www.suse.com/security/cve/CVE-2024-36484.html
* https://www.suse.com/security/cve/CVE-2024-36883.html
* https://www.suse.com/security/cve/CVE-2024-36886.html
* https://www.suse.com/security/cve/CVE-2024-38589.html
* https://www.suse.com/security/cve/CVE-2024-41013.html
* https://www.suse.com/security/cve/CVE-2024-46771.html
* https://www.suse.com/security/cve/CVE-2024-47141.html
* https://www.suse.com/security/cve/CVE-2024-47666.html
* https://www.suse.com/security/cve/CVE-2024-47678.html
* https://www.suse.com/security/cve/CVE-2024-47709.html
* https://www.suse.com/security/cve/CVE-2024-49925.html
* https://www.suse.com/security/cve/CVE-2024-49944.html
* https://www.suse.com/security/cve/CVE-2024-50039.html
* https://www.suse.com/security/cve/CVE-2024-50143.html
* https://www.suse.com/security/cve/CVE-2024-50151.html
* https://www.suse.com/security/cve/CVE-2024-50166.html
* https://www.suse.com/security/cve/CVE-2024-50199.html
* https://www.suse.com/security/cve/CVE-2024-50211.html
* https://www.suse.com/security/cve/CVE-2024-50228.html
* https://www.suse.com/security/cve/CVE-2024-50256.html
* https://www.suse.com/security/cve/CVE-2024-50262.html
* https://www.suse.com/security/cve/CVE-2024-50278.html
* https://www.suse.com/security/cve/CVE-2024-50280.html
* https://www.suse.com/security/cve/CVE-2024-50287.html
* https://www.suse.com/security/cve/CVE-2024-50299.html
* https://www.suse.com/security/cve/CVE-2024-53057.html
* https://www.suse.com/security/cve/CVE-2024-53101.html
* https://www.suse.com/security/cve/CVE-2024-53112.html
* https://www.suse.com/security/cve/CVE-2024-53136.html
* https://www.suse.com/security/cve/CVE-2024-53141.html
* https://www.suse.com/security/cve/CVE-2024-53144.html
* https://www.suse.com/security/cve/CVE-2024-53146.html
* https://www.suse.com/security/cve/CVE-2024-53150.html
* https://www.suse.com/security/cve/CVE-2024-53156.html
* https://www.suse.com/security/cve/CVE-2024-53157.html
* https://www.suse.com/security/cve/CVE-2024-53172.html
* https://www.suse.com/security/cve/CVE-2024-53173.html
* https://www.suse.com/security/cve/CVE-2024-53179.html
* https://www.suse.com/security/cve/CVE-2024-53198.html
* https://www.suse.com/security/cve/CVE-2024-53210.html
* https://www.suse.com/security/cve/CVE-2024-53214.html
* https://www.suse.com/security/cve/CVE-2024-53224.html
* https://www.suse.com/security/cve/CVE-2024-53239.html
* https://www.suse.com/security/cve/CVE-2024-53240.html
* https://www.suse.com/security/cve/CVE-2024-56531.html
* https://www.suse.com/security/cve/CVE-2024-56548.html
* https://www.suse.com/security/cve/CVE-2024-56551.html
* https://www.suse.com/security/cve/CVE-2024-56569.html
* https://www.suse.com/security/cve/CVE-2024-56570.html
* https://www.suse.com/security/cve/CVE-2024-56587.html
* https://www.suse.com/security/cve/CVE-2024-56599.html
* https://www.suse.com/security/cve/CVE-2024-5660.html
* https://www.suse.com/security/cve/CVE-2024-56603.html
* https://www.suse.com/security/cve/CVE-2024-56604.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://www.suse.com/security/cve/CVE-2024-56606.html
* https://www.suse.com/security/cve/CVE-2024-56616.html
* https://www.suse.com/security/cve/CVE-2024-56631.html
* https://www.suse.com/security/cve/CVE-2024-56642.html
* https://www.suse.com/security/cve/CVE-2024-56664.html
* https://www.suse.com/security/cve/CVE-2024-56704.html
* https://www.suse.com/security/cve/CVE-2024-56724.html
* https://www.suse.com/security/cve/CVE-2024-56756.html
* https://www.suse.com/security/cve/CVE-2024-57791.html
* https://www.suse.com/security/cve/CVE-2024-57849.html
* https://www.suse.com/security/cve/CVE-2024-57887.html
* https://www.suse.com/security/cve/CVE-2024-57888.html
* https://www.suse.com/security/cve/CVE-2024-57892.html
* https://www.suse.com/security/cve/CVE-2024-57893.html
* https://www.suse.com/security/cve/CVE-2024-8805.html
* https://bugzilla.suse.com/show_bug.cgi?id=1117016
* https://bugzilla.suse.com/show_bug.cgi?id=1168202
* https://bugzilla.suse.com/show_bug.cgi?id=1188924
* https://bugzilla.suse.com/show_bug.cgi?id=1215304
* https://bugzilla.suse.com/show_bug.cgi?id=1220148
* https://bugzilla.suse.com/show_bug.cgi?id=1223635
* https://bugzilla.suse.com/show_bug.cgi?id=1224697
* https://bugzilla.suse.com/show_bug.cgi?id=1225725
* https://bugzilla.suse.com/show_bug.cgi?id=1225730
* https://bugzilla.suse.com/show_bug.cgi?id=1226694
* https://bugzilla.suse.com/show_bug.cgi?id=1226748
* https://bugzilla.suse.com/show_bug.cgi?id=1226872
* https://bugzilla.suse.com/show_bug.cgi?id=1228405
* https://bugzilla.suse.com/show_bug.cgi?id=1230697
* https://bugzilla.suse.com/show_bug.cgi?id=1230766
* https://bugzilla.suse.com/show_bug.cgi?id=1231453
* https://bugzilla.suse.com/show_bug.cgi?id=1231854
* https://bugzilla.suse.com/show_bug.cgi?id=1231877
* https://bugzilla.suse.com/show_bug.cgi?id=1231909
* https://bugzilla.suse.com/show_bug.cgi?id=1232045
* https://bugzilla.suse.com/show_bug.cgi?id=1232048
* https://bugzilla.suse.com/show_bug.cgi?id=1232166
* https://bugzilla.suse.com/show_bug.cgi?id=1232224
* https://bugzilla.suse.com/show_bug.cgi?id=1233038
* https://bugzilla.suse.com/show_bug.cgi?id=1233050
* https://bugzilla.suse.com/show_bug.cgi?id=1233055
* https://bugzilla.suse.com/show_bug.cgi?id=1233096
* https://bugzilla.suse.com/show_bug.cgi?id=1233112
* https://bugzilla.suse.com/show_bug.cgi?id=1233200
* https://bugzilla.suse.com/show_bug.cgi?id=1233204
* https://bugzilla.suse.com/show_bug.cgi?id=1233239
* https://bugzilla.suse.com/show_bug.cgi?id=1233467
* https://bugzilla.suse.com/show_bug.cgi?id=1233469
* https://bugzilla.suse.com/show_bug.cgi?id=1233476
* https://bugzilla.suse.com/show_bug.cgi?id=1233488
* https://bugzilla.suse.com/show_bug.cgi?id=1233551
* https://bugzilla.suse.com/show_bug.cgi?id=1233769
* https://bugzilla.suse.com/show_bug.cgi?id=1233977
* https://bugzilla.suse.com/show_bug.cgi?id=1234087
* https://bugzilla.suse.com/show_bug.cgi?id=1234161
* https://bugzilla.suse.com/show_bug.cgi?id=1234240
* https://bugzilla.suse.com/show_bug.cgi?id=1234241
* https://bugzilla.suse.com/show_bug.cgi?id=1234242
* https://bugzilla.suse.com/show_bug.cgi?id=1234243
* https://bugzilla.suse.com/show_bug.cgi?id=1234281
* https://bugzilla.suse.com/show_bug.cgi?id=1234381
* https://bugzilla.suse.com/show_bug.cgi?id=1234437
* https://bugzilla.suse.com/show_bug.cgi?id=1234690
* https://bugzilla.suse.com/show_bug.cgi?id=1234827
* https://bugzilla.suse.com/show_bug.cgi?id=1234834
* https://bugzilla.suse.com/show_bug.cgi?id=1234846
* https://bugzilla.suse.com/show_bug.cgi?id=1234853
* https://bugzilla.suse.com/show_bug.cgi?id=1234891
* https://bugzilla.suse.com/show_bug.cgi?id=1234898
* https://bugzilla.suse.com/show_bug.cgi?id=1234921
* https://bugzilla.suse.com/show_bug.cgi?id=1234922
* https://bugzilla.suse.com/show_bug.cgi?id=1234923
* https://bugzilla.suse.com/show_bug.cgi?id=1234971
* https://bugzilla.suse.com/show_bug.cgi?id=1235004
* https://bugzilla.suse.com/show_bug.cgi?id=1235009
* https://bugzilla.suse.com/show_bug.cgi?id=1235031
* https://bugzilla.suse.com/show_bug.cgi?id=1235035
* https://bugzilla.suse.com/show_bug.cgi?id=1235054
* https://bugzilla.suse.com/show_bug.cgi?id=1235056
* https://bugzilla.suse.com/show_bug.cgi?id=1235057
* https://bugzilla.suse.com/show_bug.cgi?id=1235061
* https://bugzilla.suse.com/show_bug.cgi?id=1235073
* https://bugzilla.suse.com/show_bug.cgi?id=1235075
* https://bugzilla.suse.com/show_bug.cgi?id=1235125
* https://bugzilla.suse.com/show_bug.cgi?id=1235138
* https://bugzilla.suse.com/show_bug.cgi?id=1235249
* https://bugzilla.suse.com/show_bug.cgi?id=1235415
* https://bugzilla.suse.com/show_bug.cgi?id=1235416
* https://bugzilla.suse.com/show_bug.cgi?id=1235417
* https://bugzilla.suse.com/show_bug.cgi?id=1235427
* https://bugzilla.suse.com/show_bug.cgi?id=1235433
* https://bugzilla.suse.com/show_bug.cgi?id=1235480
* https://bugzilla.suse.com/show_bug.cgi?id=1235577
* https://bugzilla.suse.com/show_bug.cgi?id=1235584
* https://bugzilla.suse.com/show_bug.cgi?id=1235708
* https://bugzilla.suse.com/show_bug.cgi?id=1235759
* https://bugzilla.suse.com/show_bug.cgi?id=1235814
* https://bugzilla.suse.com/show_bug.cgi?id=1235888
* https://bugzilla.suse.com/show_bug.cgi?id=1235918
* https://bugzilla.suse.com/show_bug.cgi?id=1235920
* https://bugzilla.suse.com/show_bug.cgi?id=1235952
* https://bugzilla.suse.com/show_bug.cgi?id=1235964
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20250124/1d72f7ac/attachment.htm>
More information about the sle-security-updates
mailing list