SUSE-SU-2025:0834-1: important: Security update for the Linux Kernel

SLE-SECURITY-UPDATES null at suse.de
Tue Mar 11 12:31:24 UTC 2025



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:0834-1  
Release Date: 2025-03-11T10:55:30Z  
Rating: important  
References:

  * bsc#1050081
  * bsc#1051510
  * bsc#1065729
  * bsc#1100823
  * bsc#1101669
  * bsc#1104731
  * bsc#1112246
  * bsc#1112894
  * bsc#1112899
  * bsc#1112902
  * bsc#1112903
  * bsc#1112905
  * bsc#1112906
  * bsc#1112907
  * bsc#1113295
  * bsc#1120902
  * bsc#1141539
  * bsc#1158082
  * bsc#1174206
  * bsc#1175165
  * bsc#1179444
  * bsc#1186482
  * bsc#1188601
  * bsc#1190358
  * bsc#1190428
  * bsc#1191881
  * bsc#1201420
  * bsc#1203410
  * bsc#1203935
  * bsc#1207168
  * bsc#1212051
  * bsc#1217947
  * bsc#1219169
  * bsc#1220946
  * bsc#1221816
  * bsc#1222803
  * bsc#1223432
  * bsc#1223509
  * bsc#1223512
  * bsc#1223524
  * bsc#1223626
  * bsc#1223627
  * bsc#1223712
  * bsc#1223715
  * bsc#1223744
  * bsc#1223819
  * bsc#1224095
  * bsc#1224988
  * bsc#1225742
  * bsc#1231885
  * bsc#1231912
  * bsc#1231920
  * bsc#1231941
  * bsc#1232104
  * bsc#1232147
  * bsc#1232159
  * bsc#1232163
  * bsc#1232198
  * bsc#1232201
  * bsc#1232262
  * bsc#1232416
  * bsc#1232520
  * bsc#1232919
  * bsc#1233248
  * bsc#1233522
  * bsc#1234853
  * bsc#1234891
  * bsc#1234963
  * bsc#1234999
  * bsc#1235054
  * bsc#1235061
  * bsc#1235073
  * bsc#1235435
  * bsc#1235441
  * bsc#1235485
  * bsc#1235538
  * bsc#1235965
  * bsc#1236115
  * bsc#1236122
  * bsc#1236123
  * bsc#1236689
  * bsc#1236757
  * bsc#1236761
  * bsc#1236821
  * bsc#1237017
  * bsc#1237025
  * bsc#1237159
  * bsc#1237738
  * bsc#1237758
  * bsc#1237766
  * bsc#1237778
  * bsc#1237783
  * bsc#1237788
  * bsc#1237875
  * bsc#1237982
  * bsc#1238006
  * bsc#1238033
  * bsc#1238041
  * bsc#1238107
  * bsc#1238148
  * bsc#1238256
  * bsc#1238260
  * bsc#1238270
  * bsc#1238275

  
Cross-References:

  * CVE-2021-22543
  * CVE-2021-37159
  * CVE-2021-47634
  * CVE-2021-47644
  * CVE-2022-2991
  * CVE-2022-48636
  * CVE-2022-48650
  * CVE-2022-48664
  * CVE-2022-48953
  * CVE-2022-48975
  * CVE-2022-49006
  * CVE-2022-49076
  * CVE-2022-49080
  * CVE-2022-49089
  * CVE-2022-49124
  * CVE-2022-49134
  * CVE-2022-49135
  * CVE-2022-49151
  * CVE-2022-49178
  * CVE-2022-49182
  * CVE-2022-49201
  * CVE-2022-49247
  * CVE-2022-49490
  * CVE-2022-49626
  * CVE-2022-49661
  * CVE-2023-0394
  * CVE-2023-52572
  * CVE-2023-52646
  * CVE-2023-52653
  * CVE-2023-52853
  * CVE-2023-52924
  * CVE-2023-6606
  * CVE-2024-23307
  * CVE-2024-26810
  * CVE-2024-26929
  * CVE-2024-26930
  * CVE-2024-26931
  * CVE-2024-27054
  * CVE-2024-27388
  * CVE-2024-27397
  * CVE-2024-47701
  * CVE-2024-49867
  * CVE-2024-49884
  * CVE-2024-49950
  * CVE-2024-49963
  * CVE-2024-49975
  * CVE-2024-50036
  * CVE-2024-50067
  * CVE-2024-50073
  * CVE-2024-50115
  * CVE-2024-50251
  * CVE-2024-50304
  * CVE-2024-53173
  * CVE-2024-53217
  * CVE-2024-53239
  * CVE-2024-56539
  * CVE-2024-56548
  * CVE-2024-56605
  * CVE-2024-56633
  * CVE-2024-56647
  * CVE-2024-56658
  * CVE-2024-56688
  * CVE-2024-57896
  * CVE-2025-21638
  * CVE-2025-21639
  * CVE-2025-21640
  * CVE-2025-21673
  * CVE-2025-21689
  * CVE-2025-21690
  * CVE-2025-21700
  * CVE-2025-21753

  
CVSS scores:

  * CVE-2021-22543 ( SUSE ):  8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-22543 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-37159 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2021-37159 ( NVD ):  6.4 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47634 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2021-47634 ( SUSE ):  6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47634 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2021-47644 ( SUSE ):  4.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2021-47644 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2022-2991 ( SUSE ):  8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
  * CVE-2022-2991 ( NVD ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-48636 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48636 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48650 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48650 ( NVD ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48664 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48953 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-48953 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48953 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48975 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-48975 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49006 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49006 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49006 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49076 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49076 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49076 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49080 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49080 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49089 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49089 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2022-49124 ( SUSE ):  5.6
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49124 ( SUSE ):  4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49134 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49134 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49135 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49135 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49151 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49178 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2022-49178 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49182 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49182 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49201 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49247 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49490 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49626 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2022-49626 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2022-49661 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-0394 ( SUSE ):  6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-0394 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52572 ( SUSE ):  0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
  * CVE-2023-52572 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2023-52646 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52646 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52653 ( SUSE ):  3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-52653 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52853 ( SUSE ):  4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2023-52924 ( SUSE ):  1.8
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
  * CVE-2023-52924 ( SUSE ):  1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
  * CVE-2023-6606 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2023-6606 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2023-6606 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-23307 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-23307 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-23307 ( NVD ):  4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26810 ( SUSE ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26810 ( NVD ):  4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-26929 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26929 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26930 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26930 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-26931 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27054 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27054 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27388 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27388 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-27397 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-47701 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-47701 ( SUSE ):  5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-47701 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49867 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-49867 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49867 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49884 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49884 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49950 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49950 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-49963 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49963 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49975 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-49975 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50036 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50036 ( NVD ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50067 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50067 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50067 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50073 ( SUSE ):  6.9
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50073 ( SUSE ):  6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
  * CVE-2024-50073 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50073 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-50115 ( SUSE ):  4.5
    CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
  * CVE-2024-50115 ( SUSE ):  7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
  * CVE-2024-50115 ( NVD ):  7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
  * CVE-2024-50251 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-50251 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50251 ( NVD ):  6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50304 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-50304 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53173 ( SUSE ):  7.3
    CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53173 ( SUSE ):  7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53173 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53173 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53217 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53217 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53217 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-53239 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-53239 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53239 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-53239 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56539 ( SUSE ):  8.6
    CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56539 ( SUSE ):  8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  * CVE-2024-56548 ( SUSE ):  8.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56548 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56548 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56605 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56605 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56605 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56605 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56633 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56633 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56647 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56647 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56647 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56658 ( SUSE ):  8.5
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56658 ( SUSE ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56658 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56658 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-56688 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-56688 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-56688 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57896 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2024-57896 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2024-57896 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2024-57896 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21638 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21638 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21638 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21639 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21639 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21639 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21640 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21640 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21640 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21673 ( SUSE ):  5.8
    CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21673 ( SUSE ):  6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
  * CVE-2025-21673 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21689 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21689 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21689 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21690 ( SUSE ):  6.8
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21690 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21690 ( NVD ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21700 ( SUSE ):  7.1
    CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-21700 ( SUSE ):  6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21700 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-21753 ( SUSE ):  5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  * CVE-2025-21753 ( NVD ):  7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

  
Affected Products:

  * SUSE Linux Enterprise High Availability Extension 12 SP5
  * SUSE Linux Enterprise High Performance Computing 12 SP5
  * SUSE Linux Enterprise Live Patching 12-SP5
  * SUSE Linux Enterprise Server 12 SP5
  * SUSE Linux Enterprise Server 12 SP5 LTSS
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5

  
  
An update that solves 71 vulnerabilities and has 33 security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

  * CVE-2021-22543: Fixed improper handling of VM_IO|VM_PFNMAP vmas in KVM
    (bsc#1186482).
  * CVE-2021-47634: ubi: Fix race condition between ctrl_cdev_ioctl and
    ubi_cdev_ioctl (bsc#1237758).
  * CVE-2021-47644: media: staging: media: zoran: move videodev alloc
    (bsc#1237766).
  * CVE-2022-48953: rtc: cmos: fix build on non-ACPI platforms (bsc#1231941).
  * CVE-2022-48975: gpiolib: fix memory leak in gpiochip_setup_dev()
    (bsc#1231885).
  * CVE-2022-49006: tracing: Free buffers when a used dynamic event is removed
    (bsc#1232163).
  * CVE-2022-49076: RDMA/hfi1: Fix use-after-free bug for mm struct
    (bsc#1237738).
  * CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace
    (bsc#1238033).
  * CVE-2022-49089: IB/rdmavt: add lock to call to rvt_error_qp to prevent a
    race condition (bsc#1238041).
  * CVE-2022-49124: x86/mce: Work around an erratum on fast string copy
    instructions (bsc#1238148).
  * CVE-2022-49134: mlxsw: spectrum: Guard against invalid local ports
    (bsc#1237982).
  * CVE-2022-49135: drm/amd/display: Fix memory leak (bsc#1238006).
  * CVE-2022-49151: can: mcba_usb: properly check endpoint type (bsc#1237778).
  * CVE-2022-49178: memstick/mspro_block: fix handling of read-only devices
    (bsc#1238107).
  * CVE-2022-49182: net: hns3: add vlan list lock to protect vlan list
    (bsc#1238260).
  * CVE-2022-49201: ibmvnic: fix race between xmit and reset (bsc#1238256).
  * CVE-2022-49247: media: stk1160: If start stream fails, return buffers with
    VB2_BUF_STATE_QUEUED (bsc#1237783).
  * CVE-2022-49490: drm/msm/mdp5: Return error code in mdp5_pipe_release when
    deadlock is (bsc#1238275).
  * CVE-2022-49626: sfc: fix use after free when disabling sriov (bsc#1238270).
  * CVE-2022-49661: can: gs_usb: gs_usb_open/close(): fix memory leak
    (bsc#1237788).
  * CVE-2023-52572: Fixed UAF in cifs_demultiplex_thread() in cifs
    (bsc#1220946).
  * CVE-2023-52853: hid: cp2112: Fix duplicate workqueue initialization
    (bsc#1224988).
  * CVE-2023-52924: netfilter: nf_tables: do not skip expired elements during
    walk (bsc#1236821).
  * CVE-2023-6606: Fixed an out of bounds read in the SMB client when receiving
    a malformed length from a server (bsc#1217947).
  * CVE-2024-23307: Fixed Integer Overflow or Wraparound vulnerability in x86
    and ARM md, raid, raid5 modules (bsc#1219169).
  * CVE-2024-27397: netfilter: nf_tables: use timestamp to check for set element
    timeout (bsc#1224095).
  * CVE-2024-49963: mailbox: bcm2835: Fix timeout during suspend mode
    (bsc#1232147).
  * CVE-2024-49975: uprobes: fix kernel info leak via "[uprobes]" vma
    (bsc#1232104).
  * CVE-2024-50036: net: do not delay dst_entries_add() in dst_release()
    (bsc#1231912).
  * CVE-2024-50067: uprobe: avoid out-of-bounds memory access of fetching args
    (bsc#1232416).
  * CVE-2024-50251: netfilter: nft_payload: sanitize offset and length before
    calling skb_checksum() (bsc#1233248).
  * CVE-2024-50304: ipv4: ip_tunnel: Fix suspicious RCU usage warning in
    ip_tunnel_find() (bsc#1233522).
  * CVE-2024-53217: nfsd: restore callback functionality for NFSv4.0
    (bsc#1234999).
  * CVE-2024-56633: bpf, sockmap: Fix repeated calls to sock_put() when msg has
    more_data (bsc#1235485).
  * CVE-2024-56647: net: Fix icmp host relookup triggering ip_rt_bug
    (bsc#1235435).
  * CVE-2024-56658: net: defer final 'struct net' free in netns dismantle
    (bsc#1235441).
  * CVE-2024-56688: sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport
    (bsc#1235538).
  * CVE-2025-21638: sctp: sysctl: auth_enable: avoid using current->nsproxy
    (bsc#1236115).
  * CVE-2025-21639: sctp: sysctl: rto_min/max: avoid using current->nsproxy
    (bsc#1236122).
  * CVE-2025-21640: sctp: sysctl: cookie_hmac_alg: avoid using current->nsproxy
    (bsc#1236123).
  * CVE-2025-21673: smb: client: fix double free of TCP_Server_Info::hostname
    (bsc#1236689).
  * CVE-2025-21689: USB: serial: quatech2: fix null-ptr-deref in
    qt2_process_read_urb() (bsc#1237017).
  * CVE-2025-21690: scsi: storvsc: Ratelimit warning logs to prevent VM denial
    of service (bsc#1237025).
  * CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one
    parent to another (bsc#1237159).
  * CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted
    transaction (bsc#1237875).

The following non-security bugs were fixed:

  * bpf: fix mixed signed/unsigned derived min/max value bounds (bsc#1050081).
  * btrfs: add a flag to iterate_inodes_from_logical to find all
  * btrfs: add a flag to iterate_inodes_from_logical to find all extent refs for
    uncompressed extents (bsc#1174206).
  * cifs: Fix use after free of a mid_q_entry (bsc#1112903).
  * cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).
  * cifs: fix memory leak in SMB2_open() (bsc#1112894).
  * crypto: caam/qi - fix IV DMA mapping and updating (bsc#1051510).
  * drm/amd/powerplay: Fix missing break in switch (bsc#1120902)
  * drm/i915: Remove stale asserts from i915_gem_find_active_request()
    (bsc#1051510).
  * drm/i915: Restore planes after load detection (bsc#1051510).
  * drm/i915: always return something on DDI clock selection (bsc#1120902)
  * drm/msm/mdp5: Fix global state lock backoff (bsc#1238275)
  * fix SCTP regression (bsc#1158082)
  * fixup "rpm: support gz and zst compression methods" once more (bsc#1190428,
    bsc#1190358).
  * iio: trigger: stm32-timer: fix get/set down count direction (bsc#1051510).
  * kABI: Add clear_trace to trace_array (bsc#1232163).
  * kABI: Preserve TRACE_EVENT_FL values (bsc#1232163).
  * mm, numa: Migrate pages to local nodes quicker early in the lifetime of a
    task (bnc#1101669).
  * mm, numa: Remove rate-limiting of automatic numa balancing migration
    (bnc#1101669).
  * net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761).
  * net: netvsc: Update default VMBus channels (bsc#1236757).
  * powerpc/64/kdump: Limit kdump base to 512MB (bsc#1203410 ltc#199904).
  * powerpc/papr_scm: Fix DIMM device registration race (FATE#326628,
    bsc#1113295, git-fixes).
  * powerpc/papr_scm: Fix DIMM device registration race (bsc#1113295, git-
    fixes).
  * powerpc/papr_scm: Fix resource end address (FATE#326628, bsc#1113295, git-
    fixes).
  * powerpc/papr_scm: Fix resource end address (bsc#1113295, git-fixes).
  * powerpc/papr_scm: Remove endian conversions (FATE#326628, bsc#1113295, git-
    fixes).
  * powerpc/papr_scm: Remove endian conversions (bsc#1113295, git-fixes).
  * powerpc/papr_scm: Update DT properties (FATE#326628, bsc#1113295, git-
    fixes).
  * powerpc/papr_scm: Update DT properties (bsc#1113295, git-fixes).
  * powerpc/papr_scm: Use depend instead of select (FATE#326628, bsc#1113295,
    git-fixes).
  * powerpc/papr_scm: Use depend instead of select (bsc#1113295, git-fixes).
  * powerpc/papr_scm: Use ibm,unit-guid as the iset cookie (FATE#326628,
    bsc#1113295, git-fixes).
  * powerpc/papr_scm: Use ibm,unit-guid as the iset cookie (bsc#1113295, git-
    fixes).
  * powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729).
  * powerpc/tm: Fix more userspace r13 corruption (bsc#1065729).
  * rpm/kernel-binary.spec.in: Fix build regression The previous fix forgot to
    take over grep -c option that broke the conditional expression
  * rpm/kernel-source.spec.in: Add subpackage-names.conf as source.
  * s390/cpum_cf: rename IBM z13/z14 counter names (FATE#326341, LTC#169491,
    bsc#1100823).
  * s390/cpum_cf: rename IBM z13/z14 counter names (LTC#169491, bsc#1100823).
  * s390/dasd: fix hanging offline processing due to canceled worker
    (bsc#1175165).
  * sched/numa: Avoid task migration for small NUMA improvement (bnc#1101669).
  * sched/numa: Pass destination CPU as a parameter to migrate_task_rq
    (bnc#1101669).
  * sched/numa: Reset scan rate whenever task moves across nodes (bnc#1101669).
  * sched/numa: Stop multiple tasks from moving to the CPU at the same time
    (bnc#1101669).
  * scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).
  * scsi: libfc: check fc_frame_payload_get() return value for null
    (bsc#1104731).
  * scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).
  * scsi: storvsc: Add validation for untrusted Hyper-V values (git-fixes).
  * scsi: storvsc: Correctly handle multiple flags in srb_status (git-fixes).
  * scsi: storvsc: Fix handling of srb_status and capacity change events (git-
    fixes).
  * scsi: storvsc: Fix spelling mistake (git-fixes).
  * scsi: storvsc: Handle SRB status value 0x30 (git-fixes).
  * scsi: storvsc: Log TEST_UNIT_READY errors as warnings (git-fixes).
  * scsi: storvsc: Miscellaneous code cleanups (git-fixes).
  * scsi: storvsc: Return DID_ERROR for invalid commands (git-fixes).
  * scsi: storvsc: Update error logging (git-fixes).
  * scsi: storvsc: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (git-
    fixes).
  * smb2: fix missing files in root share directory listing (bsc#1112907).
  * smb3: fill in statfs fsid and correct namelen (bsc#1112905).
  * smb3: fix reset of bytes read and written stats (bsc#1112906).
  * smb3: on reconnect set PreviousSessionId field (bsc#1112899).
  * tracing: Only have rmmod clear buffers that its events were active in
    (bsc#1232163).
  * ubi: fastmap: Cancel work upon detach (bsc#1051510).

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Server for SAP Applications 12 SP5  
    zypper in -t patch SUSE-SLE-HA-12-SP5-2025-834=1

  * SUSE Linux Enterprise High Availability Extension 12 SP5  
    zypper in -t patch SUSE-SLE-HA-12-SP5-2025-834=1

  * SUSE Linux Enterprise Live Patching 12-SP5  
    zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-834=1

  * SUSE Linux Enterprise Server 12 SP5 LTSS  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-834=1

  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-834=1

## Package List:

  * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (nosrc)
    * kernel-default-4.12.14-122.250.1
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
    * kernel-default-debugsource-4.12.14-122.250.1
    * kernel-default-debuginfo-4.12.14-122.250.1
  * SUSE Linux Enterprise High Availability Extension 12 SP5 (nosrc)
    * kernel-default-4.12.14-122.250.1
  * SUSE Linux Enterprise High Availability Extension 12 SP5 (ppc64le s390x
    x86_64)
    * kernel-default-debugsource-4.12.14-122.250.1
    * kernel-default-debuginfo-4.12.14-122.250.1
  * SUSE Linux Enterprise Live Patching 12-SP5 (nosrc)
    * kernel-default-4.12.14-122.250.1
  * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
    * kgraft-patch-4_12_14-122_250-default-1-8.3.1
    * kernel-default-debugsource-4.12.14-122.250.1
    * kernel-default-debuginfo-4.12.14-122.250.1
    * kernel-default-kgraft-4.12.14-122.250.1
    * kernel-default-kgraft-devel-4.12.14-122.250.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
    * kernel-default-base-4.12.14-122.250.1
    * kernel-syms-4.12.14-122.250.1
    * cluster-md-kmp-default-debuginfo-4.12.14-122.250.1
    * kernel-default-debugsource-4.12.14-122.250.1
    * dlm-kmp-default-4.12.14-122.250.1
    * kernel-default-debuginfo-4.12.14-122.250.1
    * kernel-default-devel-4.12.14-122.250.1
    * ocfs2-kmp-default-debuginfo-4.12.14-122.250.1
    * cluster-md-kmp-default-4.12.14-122.250.1
    * gfs2-kmp-default-debuginfo-4.12.14-122.250.1
    * gfs2-kmp-default-4.12.14-122.250.1
    * ocfs2-kmp-default-4.12.14-122.250.1
    * dlm-kmp-default-debuginfo-4.12.14-122.250.1
    * kernel-default-base-debuginfo-4.12.14-122.250.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64
    nosrc)
    * kernel-default-4.12.14-122.250.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
    * kernel-source-4.12.14-122.250.1
    * kernel-devel-4.12.14-122.250.1
    * kernel-macros-4.12.14-122.250.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x)
    * kernel-default-man-4.12.14-122.250.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64)
    * kernel-default-devel-debuginfo-4.12.14-122.250.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
    * kernel-default-base-4.12.14-122.250.1
    * kernel-syms-4.12.14-122.250.1
    * cluster-md-kmp-default-debuginfo-4.12.14-122.250.1
    * kernel-default-debugsource-4.12.14-122.250.1
    * dlm-kmp-default-4.12.14-122.250.1
    * kernel-default-debuginfo-4.12.14-122.250.1
    * kernel-default-devel-4.12.14-122.250.1
    * ocfs2-kmp-default-debuginfo-4.12.14-122.250.1
    * cluster-md-kmp-default-4.12.14-122.250.1
    * kernel-default-devel-debuginfo-4.12.14-122.250.1
    * gfs2-kmp-default-debuginfo-4.12.14-122.250.1
    * gfs2-kmp-default-4.12.14-122.250.1
    * ocfs2-kmp-default-4.12.14-122.250.1
    * dlm-kmp-default-debuginfo-4.12.14-122.250.1
    * kernel-default-base-debuginfo-4.12.14-122.250.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (nosrc x86_64)
    * kernel-default-4.12.14-122.250.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
    * kernel-source-4.12.14-122.250.1
    * kernel-devel-4.12.14-122.250.1
    * kernel-macros-4.12.14-122.250.1

## References:

  * https://www.suse.com/security/cve/CVE-2021-22543.html
  * https://www.suse.com/security/cve/CVE-2021-37159.html
  * https://www.suse.com/security/cve/CVE-2021-47634.html
  * https://www.suse.com/security/cve/CVE-2021-47644.html
  * https://www.suse.com/security/cve/CVE-2022-2991.html
  * https://www.suse.com/security/cve/CVE-2022-48636.html
  * https://www.suse.com/security/cve/CVE-2022-48650.html
  * https://www.suse.com/security/cve/CVE-2022-48664.html
  * https://www.suse.com/security/cve/CVE-2022-48953.html
  * https://www.suse.com/security/cve/CVE-2022-48975.html
  * https://www.suse.com/security/cve/CVE-2022-49006.html
  * https://www.suse.com/security/cve/CVE-2022-49076.html
  * https://www.suse.com/security/cve/CVE-2022-49080.html
  * https://www.suse.com/security/cve/CVE-2022-49089.html
  * https://www.suse.com/security/cve/CVE-2022-49124.html
  * https://www.suse.com/security/cve/CVE-2022-49134.html
  * https://www.suse.com/security/cve/CVE-2022-49135.html
  * https://www.suse.com/security/cve/CVE-2022-49151.html
  * https://www.suse.com/security/cve/CVE-2022-49178.html
  * https://www.suse.com/security/cve/CVE-2022-49182.html
  * https://www.suse.com/security/cve/CVE-2022-49201.html
  * https://www.suse.com/security/cve/CVE-2022-49247.html
  * https://www.suse.com/security/cve/CVE-2022-49490.html
  * https://www.suse.com/security/cve/CVE-2022-49626.html
  * https://www.suse.com/security/cve/CVE-2022-49661.html
  * https://www.suse.com/security/cve/CVE-2023-0394.html
  * https://www.suse.com/security/cve/CVE-2023-52572.html
  * https://www.suse.com/security/cve/CVE-2023-52646.html
  * https://www.suse.com/security/cve/CVE-2023-52653.html
  * https://www.suse.com/security/cve/CVE-2023-52853.html
  * https://www.suse.com/security/cve/CVE-2023-52924.html
  * https://www.suse.com/security/cve/CVE-2023-6606.html
  * https://www.suse.com/security/cve/CVE-2024-23307.html
  * https://www.suse.com/security/cve/CVE-2024-26810.html
  * https://www.suse.com/security/cve/CVE-2024-26929.html
  * https://www.suse.com/security/cve/CVE-2024-26930.html
  * https://www.suse.com/security/cve/CVE-2024-26931.html
  * https://www.suse.com/security/cve/CVE-2024-27054.html
  * https://www.suse.com/security/cve/CVE-2024-27388.html
  * https://www.suse.com/security/cve/CVE-2024-27397.html
  * https://www.suse.com/security/cve/CVE-2024-47701.html
  * https://www.suse.com/security/cve/CVE-2024-49867.html
  * https://www.suse.com/security/cve/CVE-2024-49884.html
  * https://www.suse.com/security/cve/CVE-2024-49950.html
  * https://www.suse.com/security/cve/CVE-2024-49963.html
  * https://www.suse.com/security/cve/CVE-2024-49975.html
  * https://www.suse.com/security/cve/CVE-2024-50036.html
  * https://www.suse.com/security/cve/CVE-2024-50067.html
  * https://www.suse.com/security/cve/CVE-2024-50073.html
  * https://www.suse.com/security/cve/CVE-2024-50115.html
  * https://www.suse.com/security/cve/CVE-2024-50251.html
  * https://www.suse.com/security/cve/CVE-2024-50304.html
  * https://www.suse.com/security/cve/CVE-2024-53173.html
  * https://www.suse.com/security/cve/CVE-2024-53217.html
  * https://www.suse.com/security/cve/CVE-2024-53239.html
  * https://www.suse.com/security/cve/CVE-2024-56539.html
  * https://www.suse.com/security/cve/CVE-2024-56548.html
  * https://www.suse.com/security/cve/CVE-2024-56605.html
  * https://www.suse.com/security/cve/CVE-2024-56633.html
  * https://www.suse.com/security/cve/CVE-2024-56647.html
  * https://www.suse.com/security/cve/CVE-2024-56658.html
  * https://www.suse.com/security/cve/CVE-2024-56688.html
  * https://www.suse.com/security/cve/CVE-2024-57896.html
  * https://www.suse.com/security/cve/CVE-2025-21638.html
  * https://www.suse.com/security/cve/CVE-2025-21639.html
  * https://www.suse.com/security/cve/CVE-2025-21640.html
  * https://www.suse.com/security/cve/CVE-2025-21673.html
  * https://www.suse.com/security/cve/CVE-2025-21689.html
  * https://www.suse.com/security/cve/CVE-2025-21690.html
  * https://www.suse.com/security/cve/CVE-2025-21700.html
  * https://www.suse.com/security/cve/CVE-2025-21753.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1050081
  * https://bugzilla.suse.com/show_bug.cgi?id=1051510
  * https://bugzilla.suse.com/show_bug.cgi?id=1065729
  * https://bugzilla.suse.com/show_bug.cgi?id=1100823
  * https://bugzilla.suse.com/show_bug.cgi?id=1101669
  * https://bugzilla.suse.com/show_bug.cgi?id=1104731
  * https://bugzilla.suse.com/show_bug.cgi?id=1112246
  * https://bugzilla.suse.com/show_bug.cgi?id=1112894
  * https://bugzilla.suse.com/show_bug.cgi?id=1112899
  * https://bugzilla.suse.com/show_bug.cgi?id=1112902
  * https://bugzilla.suse.com/show_bug.cgi?id=1112903
  * https://bugzilla.suse.com/show_bug.cgi?id=1112905
  * https://bugzilla.suse.com/show_bug.cgi?id=1112906
  * https://bugzilla.suse.com/show_bug.cgi?id=1112907
  * https://bugzilla.suse.com/show_bug.cgi?id=1113295
  * https://bugzilla.suse.com/show_bug.cgi?id=1120902
  * https://bugzilla.suse.com/show_bug.cgi?id=1141539
  * https://bugzilla.suse.com/show_bug.cgi?id=1158082
  * https://bugzilla.suse.com/show_bug.cgi?id=1174206
  * https://bugzilla.suse.com/show_bug.cgi?id=1175165
  * https://bugzilla.suse.com/show_bug.cgi?id=1179444
  * https://bugzilla.suse.com/show_bug.cgi?id=1186482
  * https://bugzilla.suse.com/show_bug.cgi?id=1188601
  * https://bugzilla.suse.com/show_bug.cgi?id=1190358
  * https://bugzilla.suse.com/show_bug.cgi?id=1190428
  * https://bugzilla.suse.com/show_bug.cgi?id=1191881
  * https://bugzilla.suse.com/show_bug.cgi?id=1201420
  * https://bugzilla.suse.com/show_bug.cgi?id=1203410
  * https://bugzilla.suse.com/show_bug.cgi?id=1203935
  * https://bugzilla.suse.com/show_bug.cgi?id=1207168
  * https://bugzilla.suse.com/show_bug.cgi?id=1212051
  * https://bugzilla.suse.com/show_bug.cgi?id=1217947
  * https://bugzilla.suse.com/show_bug.cgi?id=1219169
  * https://bugzilla.suse.com/show_bug.cgi?id=1220946
  * https://bugzilla.suse.com/show_bug.cgi?id=1221816
  * https://bugzilla.suse.com/show_bug.cgi?id=1222803
  * https://bugzilla.suse.com/show_bug.cgi?id=1223432
  * https://bugzilla.suse.com/show_bug.cgi?id=1223509
  * https://bugzilla.suse.com/show_bug.cgi?id=1223512
  * https://bugzilla.suse.com/show_bug.cgi?id=1223524
  * https://bugzilla.suse.com/show_bug.cgi?id=1223626
  * https://bugzilla.suse.com/show_bug.cgi?id=1223627
  * https://bugzilla.suse.com/show_bug.cgi?id=1223712
  * https://bugzilla.suse.com/show_bug.cgi?id=1223715
  * https://bugzilla.suse.com/show_bug.cgi?id=1223744
  * https://bugzilla.suse.com/show_bug.cgi?id=1223819
  * https://bugzilla.suse.com/show_bug.cgi?id=1224095
  * https://bugzilla.suse.com/show_bug.cgi?id=1224988
  * https://bugzilla.suse.com/show_bug.cgi?id=1225742
  * https://bugzilla.suse.com/show_bug.cgi?id=1231885
  * https://bugzilla.suse.com/show_bug.cgi?id=1231912
  * https://bugzilla.suse.com/show_bug.cgi?id=1231920
  * https://bugzilla.suse.com/show_bug.cgi?id=1231941
  * https://bugzilla.suse.com/show_bug.cgi?id=1232104
  * https://bugzilla.suse.com/show_bug.cgi?id=1232147
  * https://bugzilla.suse.com/show_bug.cgi?id=1232159
  * https://bugzilla.suse.com/show_bug.cgi?id=1232163
  * https://bugzilla.suse.com/show_bug.cgi?id=1232198
  * https://bugzilla.suse.com/show_bug.cgi?id=1232201
  * https://bugzilla.suse.com/show_bug.cgi?id=1232262
  * https://bugzilla.suse.com/show_bug.cgi?id=1232416
  * https://bugzilla.suse.com/show_bug.cgi?id=1232520
  * https://bugzilla.suse.com/show_bug.cgi?id=1232919
  * https://bugzilla.suse.com/show_bug.cgi?id=1233248
  * https://bugzilla.suse.com/show_bug.cgi?id=1233522
  * https://bugzilla.suse.com/show_bug.cgi?id=1234853
  * https://bugzilla.suse.com/show_bug.cgi?id=1234891
  * https://bugzilla.suse.com/show_bug.cgi?id=1234963
  * https://bugzilla.suse.com/show_bug.cgi?id=1234999
  * https://bugzilla.suse.com/show_bug.cgi?id=1235054
  * https://bugzilla.suse.com/show_bug.cgi?id=1235061
  * https://bugzilla.suse.com/show_bug.cgi?id=1235073
  * https://bugzilla.suse.com/show_bug.cgi?id=1235435
  * https://bugzilla.suse.com/show_bug.cgi?id=1235441
  * https://bugzilla.suse.com/show_bug.cgi?id=1235485
  * https://bugzilla.suse.com/show_bug.cgi?id=1235538
  * https://bugzilla.suse.com/show_bug.cgi?id=1235965
  * https://bugzilla.suse.com/show_bug.cgi?id=1236115
  * https://bugzilla.suse.com/show_bug.cgi?id=1236122
  * https://bugzilla.suse.com/show_bug.cgi?id=1236123
  * https://bugzilla.suse.com/show_bug.cgi?id=1236689
  * https://bugzilla.suse.com/show_bug.cgi?id=1236757
  * https://bugzilla.suse.com/show_bug.cgi?id=1236761
  * https://bugzilla.suse.com/show_bug.cgi?id=1236821
  * https://bugzilla.suse.com/show_bug.cgi?id=1237017
  * https://bugzilla.suse.com/show_bug.cgi?id=1237025
  * https://bugzilla.suse.com/show_bug.cgi?id=1237159
  * https://bugzilla.suse.com/show_bug.cgi?id=1237738
  * https://bugzilla.suse.com/show_bug.cgi?id=1237758
  * https://bugzilla.suse.com/show_bug.cgi?id=1237766
  * https://bugzilla.suse.com/show_bug.cgi?id=1237778
  * https://bugzilla.suse.com/show_bug.cgi?id=1237783
  * https://bugzilla.suse.com/show_bug.cgi?id=1237788
  * https://bugzilla.suse.com/show_bug.cgi?id=1237875
  * https://bugzilla.suse.com/show_bug.cgi?id=1237982
  * https://bugzilla.suse.com/show_bug.cgi?id=1238006
  * https://bugzilla.suse.com/show_bug.cgi?id=1238033
  * https://bugzilla.suse.com/show_bug.cgi?id=1238041
  * https://bugzilla.suse.com/show_bug.cgi?id=1238107
  * https://bugzilla.suse.com/show_bug.cgi?id=1238148
  * https://bugzilla.suse.com/show_bug.cgi?id=1238256
  * https://bugzilla.suse.com/show_bug.cgi?id=1238260
  * https://bugzilla.suse.com/show_bug.cgi?id=1238270
  * https://bugzilla.suse.com/show_bug.cgi?id=1238275

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-security-updates/attachments/20250311/1b5b2052/attachment.htm>


More information about the sle-security-updates mailing list