SUSE-SU-2025:0834-1: important: Security update for the Linux Kernel
SLE-SECURITY-UPDATES
null at suse.de
Tue Mar 11 12:31:24 UTC 2025
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2025:0834-1
Release Date: 2025-03-11T10:55:30Z
Rating: important
References:
* bsc#1050081
* bsc#1051510
* bsc#1065729
* bsc#1100823
* bsc#1101669
* bsc#1104731
* bsc#1112246
* bsc#1112894
* bsc#1112899
* bsc#1112902
* bsc#1112903
* bsc#1112905
* bsc#1112906
* bsc#1112907
* bsc#1113295
* bsc#1120902
* bsc#1141539
* bsc#1158082
* bsc#1174206
* bsc#1175165
* bsc#1179444
* bsc#1186482
* bsc#1188601
* bsc#1190358
* bsc#1190428
* bsc#1191881
* bsc#1201420
* bsc#1203410
* bsc#1203935
* bsc#1207168
* bsc#1212051
* bsc#1217947
* bsc#1219169
* bsc#1220946
* bsc#1221816
* bsc#1222803
* bsc#1223432
* bsc#1223509
* bsc#1223512
* bsc#1223524
* bsc#1223626
* bsc#1223627
* bsc#1223712
* bsc#1223715
* bsc#1223744
* bsc#1223819
* bsc#1224095
* bsc#1224988
* bsc#1225742
* bsc#1231885
* bsc#1231912
* bsc#1231920
* bsc#1231941
* bsc#1232104
* bsc#1232147
* bsc#1232159
* bsc#1232163
* bsc#1232198
* bsc#1232201
* bsc#1232262
* bsc#1232416
* bsc#1232520
* bsc#1232919
* bsc#1233248
* bsc#1233522
* bsc#1234853
* bsc#1234891
* bsc#1234963
* bsc#1234999
* bsc#1235054
* bsc#1235061
* bsc#1235073
* bsc#1235435
* bsc#1235441
* bsc#1235485
* bsc#1235538
* bsc#1235965
* bsc#1236115
* bsc#1236122
* bsc#1236123
* bsc#1236689
* bsc#1236757
* bsc#1236761
* bsc#1236821
* bsc#1237017
* bsc#1237025
* bsc#1237159
* bsc#1237738
* bsc#1237758
* bsc#1237766
* bsc#1237778
* bsc#1237783
* bsc#1237788
* bsc#1237875
* bsc#1237982
* bsc#1238006
* bsc#1238033
* bsc#1238041
* bsc#1238107
* bsc#1238148
* bsc#1238256
* bsc#1238260
* bsc#1238270
* bsc#1238275
Cross-References:
* CVE-2021-22543
* CVE-2021-37159
* CVE-2021-47634
* CVE-2021-47644
* CVE-2022-2991
* CVE-2022-48636
* CVE-2022-48650
* CVE-2022-48664
* CVE-2022-48953
* CVE-2022-48975
* CVE-2022-49006
* CVE-2022-49076
* CVE-2022-49080
* CVE-2022-49089
* CVE-2022-49124
* CVE-2022-49134
* CVE-2022-49135
* CVE-2022-49151
* CVE-2022-49178
* CVE-2022-49182
* CVE-2022-49201
* CVE-2022-49247
* CVE-2022-49490
* CVE-2022-49626
* CVE-2022-49661
* CVE-2023-0394
* CVE-2023-52572
* CVE-2023-52646
* CVE-2023-52653
* CVE-2023-52853
* CVE-2023-52924
* CVE-2023-6606
* CVE-2024-23307
* CVE-2024-26810
* CVE-2024-26929
* CVE-2024-26930
* CVE-2024-26931
* CVE-2024-27054
* CVE-2024-27388
* CVE-2024-27397
* CVE-2024-47701
* CVE-2024-49867
* CVE-2024-49884
* CVE-2024-49950
* CVE-2024-49963
* CVE-2024-49975
* CVE-2024-50036
* CVE-2024-50067
* CVE-2024-50073
* CVE-2024-50115
* CVE-2024-50251
* CVE-2024-50304
* CVE-2024-53173
* CVE-2024-53217
* CVE-2024-53239
* CVE-2024-56539
* CVE-2024-56548
* CVE-2024-56605
* CVE-2024-56633
* CVE-2024-56647
* CVE-2024-56658
* CVE-2024-56688
* CVE-2024-57896
* CVE-2025-21638
* CVE-2025-21639
* CVE-2025-21640
* CVE-2025-21673
* CVE-2025-21689
* CVE-2025-21690
* CVE-2025-21700
* CVE-2025-21753
CVSS scores:
* CVE-2021-22543 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-22543 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-37159 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2021-37159 ( NVD ): 6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47634 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2021-47634 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47634 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2021-47644 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2021-47644 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2022-2991 ( SUSE ): 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2022-2991 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-48636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48636 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48650 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48650 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48664 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48953 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-48953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48975 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-48975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49006 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49006 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49006 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49076 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49076 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49080 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49080 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49089 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49089 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2022-49124 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49124 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49134 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49135 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49178 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49182 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49182 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49247 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49490 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49626 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49626 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0394 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0394 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52572 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-52572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52646 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52646 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52653 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-52653 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52853 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52924 ( SUSE ): 1.8
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-52924 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
* CVE-2023-6606 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-6606 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-23307 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-23307 ( NVD ): 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26810 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26810 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26929 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26929 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26930 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-26931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27054 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27388 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27388 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-27397 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47701 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-47701 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49867 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49867 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49867 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49884 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49963 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49975 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50036 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50073 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50073 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50073 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50115 ( SUSE ): 4.5
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50251 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50251 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50304 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53173 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53217 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53217 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53239 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56539 ( SUSE ): 8.6
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-56548 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56633 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56647 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56647 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56647 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56658 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56658 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56688 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56688 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56688 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57896 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57896 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57896 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21638 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21638 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21638 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21639 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21639 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21639 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21640 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21640 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21673 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21673 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-21673 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21689 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21689 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21689 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21690 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21690 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21700 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21700 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21700 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* SUSE Linux Enterprise High Availability Extension 12 SP5
* SUSE Linux Enterprise High Performance Computing 12 SP5
* SUSE Linux Enterprise Live Patching 12-SP5
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server 12 SP5 LTSS
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
An update that solves 71 vulnerabilities and has 33 security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security
bugfixes.
The following security bugs were fixed:
* CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM
(bsc#1186482).
* CVE-2021-47634: ubi: Fix race condition between ctrl_cdev_ioctl and
ubi_cdev_ioctl (bsc#1237758).
* CVE-2021-47644: media: staging: media: zoran: move videodev alloc
(bsc#1237766).
* CVE-2022-48953: rtc: cmos: fix build on non-ACPI platforms (bsc#1231941).
* CVE-2022-48975: gpiolib: fix memory leak in gpiochip_setup_dev()
(bsc#1231885).
* CVE-2022-49006: tracing: Free buffers when a used dynamic event is removed
(bsc#1232163).
* CVE-2022-49076: RDMA/hfi1: Fix use-after-free bug for mm struct
(bsc#1237738).
* CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace
(bsc#1238033).
* CVE-2022-49089: IB/rdmavt: add lock to call to rvt_error_qp to prevent a
race condition (bsc#1238041).
* CVE-2022-49124: x86/mce: Work around an erratum on fast string copy
instructions (bsc#1238148).
* CVE-2022-49134: mlxsw: spectrum: Guard against invalid local ports
(bsc#1237982).
* CVE-2022-49135: drm/amd/display: Fix memory leak (bsc#1238006).
* CVE-2022-49151: can: mcba_usb: properly check endpoint type (bsc#1237778).
* CVE-2022-49178: memstick/mspro_block: fix handling of read-only devices
(bsc#1238107).
* CVE-2022-49182: net: hns3: add vlan list lock to protect vlan list
(bsc#1238260).
* CVE-2022-49201: ibmvnic: fix race between xmit and reset (bsc#1238256).
* CVE-2022-49247: media: stk1160: If start stream fails, return buffers with
VB2_BUF_STATE_QUEUED (bsc#1237783).
* CVE-2022-49490: drm/msm/mdp5: Return error code in mdp5_pipe_release when
deadlock is (bsc#1238275).
* CVE-2022-49626: sfc: fix use after free when disabling sriov (bsc#1238270).
* CVE-2022-49661: can: gs_usb: gs_usb_open/close(): fix memory leak
(bsc#1237788).
* CVE-2023-52572: Fixed UAF in cifs_demultiplex_thread() in cifs
(bsc#1220946).
* CVE-2023-52853: hid: cp2112: Fix duplicate workqueue initialization
(bsc#1224988).
* CVE-2023-52924: netfilter: nf_tables: do not skip expired elements during
walk (bsc#1236821).
* CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving
a malformed length from a server (bsc#1217947).
* CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
and ARM md, raid, raid5 modules (bsc#1219169).
* CVE-2024-27397: netfilter: nf_tables: use timestamp to check for set element
timeout (bsc#1224095).
* CVE-2024-49963: mailbox: bcm2835: Fix timeout during suspend mode
(bsc#1232147).
* CVE-2024-49975: uprobes: fix kernel info leak via "[uprobes]" vma
(bsc#1232104).
* CVE-2024-50036: net: do not delay dst_entries_add() in dst_release()
(bsc#1231912).
* CVE-2024-50067: uprobe: avoid out-of-bounds memory access of fetching args
(bsc#1232416).
* CVE-2024-50251: netfilter: nft_payload: sanitize offset and length before
calling skb_checksum() (bsc#1233248).
* CVE-2024-50304: ipv4: ip_tunnel: Fix suspicious RCU usage warning in
ip_tunnel_find() (bsc#1233522).
* CVE-2024-53217: nfsd: restore callback functionality for NFSv4.0
(bsc#1234999).
* CVE-2024-56633: bpf, sockmap: Fix repeated calls to sock_put() when msg has
more_data (bsc#1235485).
* CVE-2024-56647: net: Fix icmp host relookup triggering ip_rt_bug
(bsc#1235435).
* CVE-2024-56658: net: defer final 'struct net' free in netns dismantle
(bsc#1235441).
* CVE-2024-56688: sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport
(bsc#1235538).
* CVE-2025-21638: sctp: sysctl: auth_enable: avoid using current->nsproxy
(bsc#1236115).
* CVE-2025-21639: sctp: sysctl: rto_min/max: avoid using current->nsproxy
(bsc#1236122).
* CVE-2025-21640: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy
(bsc#1236123).
* CVE-2025-21673: smb: client: fix double free of TCP_Server_Info::hostname
(bsc#1236689).
* CVE-2025-21689: USB: serial: quatech2: fix null-ptr-deref in
qt2_process_read_urb() (bsc#1237017).
* CVE-2025-21690: scsi: storvsc: Ratelimit warning logs to prevent VM denial
of service (bsc#1237025).
* CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one
parent to another (bsc#1237159).
* CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted
transaction (bsc#1237875).
The following non-security bugs were fixed:
* bpf: fix mixed signed/unsigned derived min/max value bounds (bsc#1050081).
* btrfs: add a flag to iterate_inodes_from_logical to find all
* btrfs: add a flag to iterate_inodes_from_logical to find all extent refs for
uncompressed extents (bsc#1174206).
* cifs: Fix use after free of a mid_q_entry (bsc#1112903).
* cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).
* cifs: fix memory leak in SMB2_open() (bsc#1112894).
* crypto: caam/qi - fix IV DMA mapping and updating (bsc#1051510).
* drm/amd/powerplay: Fix missing break in switch (bsc#1120902)
* drm/i915: Remove stale asserts from i915_gem_find_active_request()
(bsc#1051510).
* drm/i915: Restore planes after load detection (bsc#1051510).
* drm/i915: always return something on DDI clock selection (bsc#1120902)
* drm/msm/mdp5: Fix global state lock backoff (bsc#1238275)
* fix SCTP regression (bsc#1158082)
* fixup "rpm: support gz and zst compression methods" once more (bsc#1190428,
bsc#1190358).
* iio: trigger: stm32-timer: fix get/set down count direction (bsc#1051510).
* kABI: Add clear_trace to trace_array (bsc#1232163).
* kABI: Preserve TRACE_EVENT_FL values (bsc#1232163).
* mm, numa: Migrate pages to local nodes quicker early in the lifetime of a
task (bnc#1101669).
* mm, numa: Remove rate-limiting of automatic numa balancing migration
(bnc#1101669).
* net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761).
* net: netvsc: Update default VMBus channels (bsc#1236757).
* powerpc/64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).
* powerpc/papr_scm: Fix DIMM device registration race (FATE#326628,
bsc#1113295, git-fixes).
* powerpc/papr_scm: Fix DIMM device registration race (bsc#1113295, git-
fixes).
* powerpc/papr_scm: Fix resource end address (FATE#326628, bsc#1113295, git-
fixes).
* powerpc/papr_scm: Fix resource end address (bsc#1113295, git-fixes).
* powerpc/papr_scm: Remove endian conversions (FATE#326628, bsc#1113295, git-
fixes).
* powerpc/papr_scm: Remove endian conversions (bsc#1113295, git-fixes).
* powerpc/papr_scm: Update DT properties (FATE#326628, bsc#1113295, git-
fixes).
* powerpc/papr_scm: Update DT properties (bsc#1113295, git-fixes).
* powerpc/papr_scm: Use depend instead of select (FATE#326628, bsc#1113295,
git-fixes).
* powerpc/papr_scm: Use depend instead of select (bsc#1113295, git-fixes).
* powerpc/papr_scm: Use ibm,unit-guid as the iset cookie (FATE#326628,
bsc#1113295, git-fixes).
* powerpc/papr_scm: Use ibm,unit-guid as the iset cookie (bsc#1113295, git-
fixes).
* powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729).
* powerpc/tm: Fix more userspace r13 corruption (bsc#1065729).
* rpm/kernel-binary.spec.in: Fix build regression The previous fix forgot to
take over grep -c option that broke the conditional expression
* rpm/kernel-source.spec.in: Add subpackage-names.conf as source.
* s390/cpum_cf: rename IBM z13/z14 counter names (FATE#326341, LTC#169491,
bsc#1100823).
* s390/cpum_cf: rename IBM z13/z14 counter names (LTC#169491, bsc#1100823).
* s390/dasd: fix hanging offline processing due to canceled worker
(bsc#1175165).
* sched/numa: Avoid task migration for small NUMA improvement (bnc#1101669).
* sched/numa: Pass destination CPU as a parameter to migrate_task_rq
(bnc#1101669).
* sched/numa: Reset scan rate whenever task moves across nodes (bnc#1101669).
* sched/numa: Stop multiple tasks from moving to the CPU at the same time
(bnc#1101669).
* scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).
* scsi: libfc: check fc_frame_payload_get() return value for null
(bsc#1104731).
* scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).
* scsi: storvsc: Add validation for untrusted Hyper-V values (git-fixes).
* scsi: storvsc: Correctly handle multiple flags in srb_status (git-fixes).
* scsi: storvsc: Fix handling of srb_status and capacity change events (git-
fixes).
* scsi: storvsc: Fix spelling mistake (git-fixes).
* scsi: storvsc: Handle SRB status value 0x30 (git-fixes).
* scsi: storvsc: Log TEST_UNIT_READY errors as warnings (git-fixes).
* scsi: storvsc: Miscellaneous code cleanups (git-fixes).
* scsi: storvsc: Return DID_ERROR for invalid commands (git-fixes).
* scsi: storvsc: Update error logging (git-fixes).
* scsi: storvsc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (git-
fixes).
* smb2: fix missing files in root share directory listing (bsc#1112907).
* smb3: fill in statfs fsid and correct namelen (bsc#1112905).
* smb3: fix reset of bytes read and written stats (bsc#1112906).
* smb3: on reconnect set PreviousSessionId field (bsc#1112899).
* tracing: Only have rmmod clear buffers that its events were active in
(bsc#1232163).
* ubi: fastmap: Cancel work upon detach (bsc#1051510).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
zypper in -t patch SUSE-SLE-HA-12-SP5-2025-834=1
* SUSE Linux Enterprise High Availability Extension 12 SP5
zypper in -t patch SUSE-SLE-HA-12-SP5-2025-834=1
* SUSE Linux Enterprise Live Patching 12-SP5
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-834=1
* SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-834=1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-834=1
## Package List:
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc)
* kernel-default-4.12.14-122.250.1
* SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
* kernel-default-debugsource-4.12.14-122.250.1
* kernel-default-debuginfo-4.12.14-122.250.1
* SUSE Linux Enterprise High Availability Extension 12 SP5 (nosrc)
* kernel-default-4.12.14-122.250.1
* SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x
x86_64)
* kernel-default-debugsource-4.12.14-122.250.1
* kernel-default-debuginfo-4.12.14-122.250.1
* SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
* kernel-default-4.12.14-122.250.1
* SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
* kgraft-patch-4_12_14-122_250-default-1-8.3.1
* kernel-default-debugsource-4.12.14-122.250.1
* kernel-default-debuginfo-4.12.14-122.250.1
* kernel-default-kgraft-4.12.14-122.250.1
* kernel-default-kgraft-devel-4.12.14-122.250.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* kernel-default-base-4.12.14-122.250.1
* kernel-syms-4.12.14-122.250.1
* cluster-md-kmp-default-debuginfo-4.12.14-122.250.1
* kernel-default-debugsource-4.12.14-122.250.1
* dlm-kmp-default-4.12.14-122.250.1
* kernel-default-debuginfo-4.12.14-122.250.1
* kernel-default-devel-4.12.14-122.250.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.250.1
* cluster-md-kmp-default-4.12.14-122.250.1
* gfs2-kmp-default-debuginfo-4.12.14-122.250.1
* gfs2-kmp-default-4.12.14-122.250.1
* ocfs2-kmp-default-4.12.14-122.250.1
* dlm-kmp-default-debuginfo-4.12.14-122.250.1
* kernel-default-base-debuginfo-4.12.14-122.250.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-4.12.14-122.250.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
* kernel-source-4.12.14-122.250.1
* kernel-devel-4.12.14-122.250.1
* kernel-macros-4.12.14-122.250.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (s390x)
* kernel-default-man-4.12.14-122.250.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64)
* kernel-default-devel-debuginfo-4.12.14-122.250.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
* kernel-default-base-4.12.14-122.250.1
* kernel-syms-4.12.14-122.250.1
* cluster-md-kmp-default-debuginfo-4.12.14-122.250.1
* kernel-default-debugsource-4.12.14-122.250.1
* dlm-kmp-default-4.12.14-122.250.1
* kernel-default-debuginfo-4.12.14-122.250.1
* kernel-default-devel-4.12.14-122.250.1
* ocfs2-kmp-default-debuginfo-4.12.14-122.250.1
* cluster-md-kmp-default-4.12.14-122.250.1
* kernel-default-devel-debuginfo-4.12.14-122.250.1
* gfs2-kmp-default-debuginfo-4.12.14-122.250.1
* gfs2-kmp-default-4.12.14-122.250.1
* ocfs2-kmp-default-4.12.14-122.250.1
* dlm-kmp-default-debuginfo-4.12.14-122.250.1
* kernel-default-base-debuginfo-4.12.14-122.250.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64)
* kernel-default-4.12.14-122.250.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
* kernel-source-4.12.14-122.250.1
* kernel-devel-4.12.14-122.250.1
* kernel-macros-4.12.14-122.250.1
## References:
* https://www.suse.com/security/cve/CVE-2021-22543.html
* https://www.suse.com/security/cve/CVE-2021-37159.html
* https://www.suse.com/security/cve/CVE-2021-47634.html
* https://www.suse.com/security/cve/CVE-2021-47644.html
* https://www.suse.com/security/cve/CVE-2022-2991.html
* https://www.suse.com/security/cve/CVE-2022-48636.html
* https://www.suse.com/security/cve/CVE-2022-48650.html
* https://www.suse.com/security/cve/CVE-2022-48664.html
* https://www.suse.com/security/cve/CVE-2022-48953.html
* https://www.suse.com/security/cve/CVE-2022-48975.html
* https://www.suse.com/security/cve/CVE-2022-49006.html
* https://www.suse.com/security/cve/CVE-2022-49076.html
* https://www.suse.com/security/cve/CVE-2022-49080.html
* https://www.suse.com/security/cve/CVE-2022-49089.html
* https://www.suse.com/security/cve/CVE-2022-49124.html
* https://www.suse.com/security/cve/CVE-2022-49134.html
* https://www.suse.com/security/cve/CVE-2022-49135.html
* https://www.suse.com/security/cve/CVE-2022-49151.html
* https://www.suse.com/security/cve/CVE-2022-49178.html
* https://www.suse.com/security/cve/CVE-2022-49182.html
* https://www.suse.com/security/cve/CVE-2022-49201.html
* https://www.suse.com/security/cve/CVE-2022-49247.html
* https://www.suse.com/security/cve/CVE-2022-49490.html
* https://www.suse.com/security/cve/CVE-2022-49626.html
* https://www.suse.com/security/cve/CVE-2022-49661.html
* https://www.suse.com/security/cve/CVE-2023-0394.html
* https://www.suse.com/security/cve/CVE-2023-52572.html
* https://www.suse.com/security/cve/CVE-2023-52646.html
* https://www.suse.com/security/cve/CVE-2023-52653.html
* https://www.suse.com/security/cve/CVE-2023-52853.html
* https://www.suse.com/security/cve/CVE-2023-52924.html
* https://www.suse.com/security/cve/CVE-2023-6606.html
* https://www.suse.com/security/cve/CVE-2024-23307.html
* https://www.suse.com/security/cve/CVE-2024-26810.html
* https://www.suse.com/security/cve/CVE-2024-26929.html
* https://www.suse.com/security/cve/CVE-2024-26930.html
* https://www.suse.com/security/cve/CVE-2024-26931.html
* https://www.suse.com/security/cve/CVE-2024-27054.html
* https://www.suse.com/security/cve/CVE-2024-27388.html
* https://www.suse.com/security/cve/CVE-2024-27397.html
* https://www.suse.com/security/cve/CVE-2024-47701.html
* https://www.suse.com/security/cve/CVE-2024-49867.html
* https://www.suse.com/security/cve/CVE-2024-49884.html
* https://www.suse.com/security/cve/CVE-2024-49950.html
* https://www.suse.com/security/cve/CVE-2024-49963.html
* https://www.suse.com/security/cve/CVE-2024-49975.html
* https://www.suse.com/security/cve/CVE-2024-50036.html
* https://www.suse.com/security/cve/CVE-2024-50067.html
* https://www.suse.com/security/cve/CVE-2024-50073.html
* https://www.suse.com/security/cve/CVE-2024-50115.html
* https://www.suse.com/security/cve/CVE-2024-50251.html
* https://www.suse.com/security/cve/CVE-2024-50304.html
* https://www.suse.com/security/cve/CVE-2024-53173.html
* https://www.suse.com/security/cve/CVE-2024-53217.html
* https://www.suse.com/security/cve/CVE-2024-53239.html
* https://www.suse.com/security/cve/CVE-2024-56539.html
* https://www.suse.com/security/cve/CVE-2024-56548.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://www.suse.com/security/cve/CVE-2024-56633.html
* https://www.suse.com/security/cve/CVE-2024-56647.html
* https://www.suse.com/security/cve/CVE-2024-56658.html
* https://www.suse.com/security/cve/CVE-2024-56688.html
* https://www.suse.com/security/cve/CVE-2024-57896.html
* https://www.suse.com/security/cve/CVE-2025-21638.html
* https://www.suse.com/security/cve/CVE-2025-21639.html
* https://www.suse.com/security/cve/CVE-2025-21640.html
* https://www.suse.com/security/cve/CVE-2025-21673.html
* https://www.suse.com/security/cve/CVE-2025-21689.html
* https://www.suse.com/security/cve/CVE-2025-21690.html
* https://www.suse.com/security/cve/CVE-2025-21700.html
* https://www.suse.com/security/cve/CVE-2025-21753.html
* https://bugzilla.suse.com/show_bug.cgi?id=1050081
* https://bugzilla.suse.com/show_bug.cgi?id=1051510
* https://bugzilla.suse.com/show_bug.cgi?id=1065729
* https://bugzilla.suse.com/show_bug.cgi?id=1100823
* https://bugzilla.suse.com/show_bug.cgi?id=1101669
* https://bugzilla.suse.com/show_bug.cgi?id=1104731
* https://bugzilla.suse.com/show_bug.cgi?id=1112246
* https://bugzilla.suse.com/show_bug.cgi?id=1112894
* https://bugzilla.suse.com/show_bug.cgi?id=1112899
* https://bugzilla.suse.com/show_bug.cgi?id=1112902
* https://bugzilla.suse.com/show_bug.cgi?id=1112903
* https://bugzilla.suse.com/show_bug.cgi?id=1112905
* https://bugzilla.suse.com/show_bug.cgi?id=1112906
* https://bugzilla.suse.com/show_bug.cgi?id=1112907
* https://bugzilla.suse.com/show_bug.cgi?id=1113295
* https://bugzilla.suse.com/show_bug.cgi?id=1120902
* https://bugzilla.suse.com/show_bug.cgi?id=1141539
* https://bugzilla.suse.com/show_bug.cgi?id=1158082
* https://bugzilla.suse.com/show_bug.cgi?id=1174206
* https://bugzilla.suse.com/show_bug.cgi?id=1175165
* https://bugzilla.suse.com/show_bug.cgi?id=1179444
* https://bugzilla.suse.com/show_bug.cgi?id=1186482
* https://bugzilla.suse.com/show_bug.cgi?id=1188601
* https://bugzilla.suse.com/show_bug.cgi?id=1190358
* https://bugzilla.suse.com/show_bug.cgi?id=1190428
* https://bugzilla.suse.com/show_bug.cgi?id=1191881
* https://bugzilla.suse.com/show_bug.cgi?id=1201420
* https://bugzilla.suse.com/show_bug.cgi?id=1203410
* https://bugzilla.suse.com/show_bug.cgi?id=1203935
* https://bugzilla.suse.com/show_bug.cgi?id=1207168
* https://bugzilla.suse.com/show_bug.cgi?id=1212051
* https://bugzilla.suse.com/show_bug.cgi?id=1217947
* https://bugzilla.suse.com/show_bug.cgi?id=1219169
* https://bugzilla.suse.com/show_bug.cgi?id=1220946
* https://bugzilla.suse.com/show_bug.cgi?id=1221816
* https://bugzilla.suse.com/show_bug.cgi?id=1222803
* https://bugzilla.suse.com/show_bug.cgi?id=1223432
* https://bugzilla.suse.com/show_bug.cgi?id=1223509
* https://bugzilla.suse.com/show_bug.cgi?id=1223512
* https://bugzilla.suse.com/show_bug.cgi?id=1223524
* https://bugzilla.suse.com/show_bug.cgi?id=1223626
* https://bugzilla.suse.com/show_bug.cgi?id=1223627
* https://bugzilla.suse.com/show_bug.cgi?id=1223712
* https://bugzilla.suse.com/show_bug.cgi?id=1223715
* https://bugzilla.suse.com/show_bug.cgi?id=1223744
* https://bugzilla.suse.com/show_bug.cgi?id=1223819
* https://bugzilla.suse.com/show_bug.cgi?id=1224095
* https://bugzilla.suse.com/show_bug.cgi?id=1224988
* https://bugzilla.suse.com/show_bug.cgi?id=1225742
* https://bugzilla.suse.com/show_bug.cgi?id=1231885
* https://bugzilla.suse.com/show_bug.cgi?id=1231912
* https://bugzilla.suse.com/show_bug.cgi?id=1231920
* https://bugzilla.suse.com/show_bug.cgi?id=1231941
* https://bugzilla.suse.com/show_bug.cgi?id=1232104
* https://bugzilla.suse.com/show_bug.cgi?id=1232147
* https://bugzilla.suse.com/show_bug.cgi?id=1232159
* https://bugzilla.suse.com/show_bug.cgi?id=1232163
* https://bugzilla.suse.com/show_bug.cgi?id=1232198
* https://bugzilla.suse.com/show_bug.cgi?id=1232201
* https://bugzilla.suse.com/show_bug.cgi?id=1232262
* https://bugzilla.suse.com/show_bug.cgi?id=1232416
* https://bugzilla.suse.com/show_bug.cgi?id=1232520
* https://bugzilla.suse.com/show_bug.cgi?id=1232919
* https://bugzilla.suse.com/show_bug.cgi?id=1233248
* https://bugzilla.suse.com/show_bug.cgi?id=1233522
* https://bugzilla.suse.com/show_bug.cgi?id=1234853
* https://bugzilla.suse.com/show_bug.cgi?id=1234891
* https://bugzilla.suse.com/show_bug.cgi?id=1234963
* https://bugzilla.suse.com/show_bug.cgi?id=1234999
* https://bugzilla.suse.com/show_bug.cgi?id=1235054
* https://bugzilla.suse.com/show_bug.cgi?id=1235061
* https://bugzilla.suse.com/show_bug.cgi?id=1235073
* https://bugzilla.suse.com/show_bug.cgi?id=1235435
* https://bugzilla.suse.com/show_bug.cgi?id=1235441
* https://bugzilla.suse.com/show_bug.cgi?id=1235485
* https://bugzilla.suse.com/show_bug.cgi?id=1235538
* https://bugzilla.suse.com/show_bug.cgi?id=1235965
* https://bugzilla.suse.com/show_bug.cgi?id=1236115
* https://bugzilla.suse.com/show_bug.cgi?id=1236122
* https://bugzilla.suse.com/show_bug.cgi?id=1236123
* https://bugzilla.suse.com/show_bug.cgi?id=1236689
* https://bugzilla.suse.com/show_bug.cgi?id=1236757
* https://bugzilla.suse.com/show_bug.cgi?id=1236761
* https://bugzilla.suse.com/show_bug.cgi?id=1236821
* https://bugzilla.suse.com/show_bug.cgi?id=1237017
* https://bugzilla.suse.com/show_bug.cgi?id=1237025
* https://bugzilla.suse.com/show_bug.cgi?id=1237159
* https://bugzilla.suse.com/show_bug.cgi?id=1237738
* https://bugzilla.suse.com/show_bug.cgi?id=1237758
* https://bugzilla.suse.com/show_bug.cgi?id=1237766
* https://bugzilla.suse.com/show_bug.cgi?id=1237778
* https://bugzilla.suse.com/show_bug.cgi?id=1237783
* https://bugzilla.suse.com/show_bug.cgi?id=1237788
* https://bugzilla.suse.com/show_bug.cgi?id=1237875
* https://bugzilla.suse.com/show_bug.cgi?id=1237982
* https://bugzilla.suse.com/show_bug.cgi?id=1238006
* https://bugzilla.suse.com/show_bug.cgi?id=1238033
* https://bugzilla.suse.com/show_bug.cgi?id=1238041
* https://bugzilla.suse.com/show_bug.cgi?id=1238107
* https://bugzilla.suse.com/show_bug.cgi?id=1238148
* https://bugzilla.suse.com/show_bug.cgi?id=1238256
* https://bugzilla.suse.com/show_bug.cgi?id=1238260
* https://bugzilla.suse.com/show_bug.cgi?id=1238270
* https://bugzilla.suse.com/show_bug.cgi?id=1238275
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20250311/1b5b2052/attachment.htm>
More information about the sle-security-updates
mailing list