SUSE-SU-2025:02105-1: important: Security update for perl-File-Find-Rule
SUSE-SU-2025:02100-1: important: Security update for gimp
SUSE-SU-2025:02098-1: important: Security update for the Linux Kernel (Live Patch 55 for SLE 15 SP3)
SUSE-SU-2025:02106-1: important: Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)
SUSE-SU-2025:02107-1: important: Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)
SUSE-SU-2025:02110-1: important: Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)
SUSE-SU-2025:02108-1: important: Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP5)
SUSE-SU-2025:02117-1: important: Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)
SUSE-SU-2025:02111-1: important: Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4)
SUSE-SU-2025:02112-1: important: Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP4)
SUSE-SU-2025:02113-1: important: Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5)
SUSE-SU-2025:02116-1: important: Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6)
SUSE-SU-2025:02105-1: important: Security update for perl-File-Find-Rule
# Security update for perl-File-Find-Rule
Announcement ID: SUSE-SU-2025:02105-1
Release Date: 2025-06-25T11:44:40Z
Rating: important
References:
* bsc#1244148
Cross-References:
* CVE-2011-10007
CVSS scores:
* CVE-2011-10007 ( SUSE ): 8.6
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2011-10007 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2011-10007 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* Basesystem Module 15-SP6
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
An update that solves one vulnerability can now be installed.
## Description:
This update for perl-File-Find-Rule fixes the following issues:
* CVE-2011-10007: Fixed arbitrary code execution when `grep()` encounters a
crafted filename (bsc#1244148).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2105=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2105=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2105=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2105=1
* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-2105=1
* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2025-2105=1
* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-2105=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2025-2105=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-2105=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2105=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2105=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2105=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2105=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2105=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2105=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2105=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2105=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2105=1
## Package List:
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* perl-File-Find-Rule-0.34-150000.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* perl-File-Find-Rule-0.34-150000.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* perl-File-Find-Rule-0.34-150000.3.3.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* perl-File-Find-Rule-0.34-150000.3.3.1
* SUSE Manager Proxy 4.3 (noarch)
* perl-File-Find-Rule-0.34-150000.3.3.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* perl-File-Find-Rule-0.34-150000.3.3.1
* SUSE Manager Server 4.3 (noarch)
* perl-File-Find-Rule-0.34-150000.3.3.1
* SUSE Enterprise Storage 7.1 (noarch)
* perl-File-Find-Rule-0.34-150000.3.3.1
* openSUSE Leap 15.6 (noarch)
* perl-File-Find-Rule-0.34-150000.3.3.1
* Basesystem Module 15-SP6 (noarch)
* perl-File-Find-Rule-0.34-150000.3.3.1
* Basesystem Module 15-SP7 (noarch)
* perl-File-Find-Rule-0.34-150000.3.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* perl-File-Find-Rule-0.34-150000.3.3.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* perl-File-Find-Rule-0.34-150000.3.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* perl-File-Find-Rule-0.34-150000.3.3.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* perl-File-Find-Rule-0.34-150000.3.3.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* perl-File-Find-Rule-0.34-150000.3.3.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (noarch)
* perl-File-Find-Rule-0.34-150000.3.3.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* perl-File-Find-Rule-0.34-150000.3.3.1
## References:
* https://www.suse.com/security/cve/CVE-2011-10007.html
* https://bugzilla.suse.com/show_bug.cgi?id=1244148
SUSE-SU-2025:02100-1: important: Security update for gimp
# Security update for gimp
Announcement ID: SUSE-SU-2025:02100-1
Release Date: 2025-06-25T06:03:19Z
Rating: important
References:
* bsc#1244058
Cross-References:
* CVE-2025-5473
CVSS scores:
* CVE-2025-5473 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-5473 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-5473 ( NVD ): 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Linux Enterprise Workstation Extension 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP7
* SUSE Package Hub 15 15-SP6
* SUSE Package Hub 15 15-SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for gimp fixes the following issues:
* CVE-2025-5473: Fix exceed the maximum allowed size (bsc#1244058).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-2100=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-2100=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-2100=1
* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-2100=1
* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-2100=1
* SUSE Linux Enterprise Workstation Extension 15 SP7
zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-2100=1
## Package List:
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* gimp-debuginfo-2.10.30-150400.3.17.1
* gimp-plugin-aa-debuginfo-2.10.30-150400.3.17.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.17.1
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.17.1
* gimp-devel-debuginfo-2.10.30-150400.3.17.1
* gimp-plugin-aa-2.10.30-150400.3.17.1
* libgimpui-2_0-0-2.10.30-150400.3.17.1
* gimp-2.10.30-150400.3.17.1
* libgimp-2_0-0-2.10.30-150400.3.17.1
* gimp-debugsource-2.10.30-150400.3.17.1
* gimp-devel-2.10.30-150400.3.17.1
* openSUSE Leap 15.4 (noarch)
* gimp-lang-2.10.30-150400.3.17.1
* openSUSE Leap 15.4 (x86_64)
* libgimpui-2_0-0-32bit-debuginfo-2.10.30-150400.3.17.1
* libgimp-2_0-0-32bit-debuginfo-2.10.30-150400.3.17.1
* libgimp-2_0-0-32bit-2.10.30-150400.3.17.1
* libgimpui-2_0-0-32bit-2.10.30-150400.3.17.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libgimp-2_0-0-64bit-debuginfo-2.10.30-150400.3.17.1
* libgimp-2_0-0-64bit-2.10.30-150400.3.17.1
* libgimpui-2_0-0-64bit-debuginfo-2.10.30-150400.3.17.1
* libgimpui-2_0-0-64bit-2.10.30-150400.3.17.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* gimp-debuginfo-2.10.30-150400.3.17.1
* gimp-plugin-aa-debuginfo-2.10.30-150400.3.17.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.17.1
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.17.1
* gimp-devel-debuginfo-2.10.30-150400.3.17.1
* gimp-plugin-aa-2.10.30-150400.3.17.1
* libgimpui-2_0-0-2.10.30-150400.3.17.1
* gimp-2.10.30-150400.3.17.1
* libgimp-2_0-0-2.10.30-150400.3.17.1
* gimp-debugsource-2.10.30-150400.3.17.1
* gimp-devel-2.10.30-150400.3.17.1
* openSUSE Leap 15.6 (noarch)
* gimp-lang-2.10.30-150400.3.17.1
* openSUSE Leap 15.6 (x86_64)
* libgimpui-2_0-0-32bit-debuginfo-2.10.30-150400.3.17.1
* libgimp-2_0-0-32bit-debuginfo-2.10.30-150400.3.17.1
* libgimp-2_0-0-32bit-2.10.30-150400.3.17.1
* libgimpui-2_0-0-32bit-2.10.30-150400.3.17.1
* SUSE Package Hub 15 15-SP6 (aarch64)
* gimp-plugin-aa-debuginfo-2.10.30-150400.3.17.1
* gimp-devel-debuginfo-2.10.30-150400.3.17.1
* gimp-plugin-aa-2.10.30-150400.3.17.1
* gimp-2.10.30-150400.3.17.1
* gimp-devel-2.10.30-150400.3.17.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x)
* gimp-debuginfo-2.10.30-150400.3.17.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.17.1
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.17.1
* libgimpui-2_0-0-2.10.30-150400.3.17.1
* libgimp-2_0-0-2.10.30-150400.3.17.1
* gimp-debugsource-2.10.30-150400.3.17.1
* SUSE Package Hub 15 15-SP6 (noarch)
* gimp-lang-2.10.30-150400.3.17.1
* SUSE Package Hub 15 15-SP7 (aarch64)
* gimp-plugin-aa-debuginfo-2.10.30-150400.3.17.1
* gimp-devel-debuginfo-2.10.30-150400.3.17.1
* gimp-plugin-aa-2.10.30-150400.3.17.1
* gimp-2.10.30-150400.3.17.1
* gimp-devel-2.10.30-150400.3.17.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x)
* gimp-debuginfo-2.10.30-150400.3.17.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.17.1
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.17.1
* libgimpui-2_0-0-2.10.30-150400.3.17.1
* libgimp-2_0-0-2.10.30-150400.3.17.1
* gimp-debugsource-2.10.30-150400.3.17.1
* SUSE Package Hub 15 15-SP7 (noarch)
* gimp-lang-2.10.30-150400.3.17.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* gimp-debuginfo-2.10.30-150400.3.17.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.17.1
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.17.1
* gimp-devel-debuginfo-2.10.30-150400.3.17.1
* libgimpui-2_0-0-2.10.30-150400.3.17.1
* gimp-2.10.30-150400.3.17.1
* libgimp-2_0-0-2.10.30-150400.3.17.1
* gimp-debugsource-2.10.30-150400.3.17.1
* gimp-devel-2.10.30-150400.3.17.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (noarch)
* gimp-lang-2.10.30-150400.3.17.1
* SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64)
* gimp-debuginfo-2.10.30-150400.3.17.1
* libgimp-2_0-0-debuginfo-2.10.30-150400.3.17.1
* libgimpui-2_0-0-debuginfo-2.10.30-150400.3.17.1
* gimp-devel-debuginfo-2.10.30-150400.3.17.1
* libgimpui-2_0-0-2.10.30-150400.3.17.1
* gimp-2.10.30-150400.3.17.1
* libgimp-2_0-0-2.10.30-150400.3.17.1
* gimp-debugsource-2.10.30-150400.3.17.1
* gimp-devel-2.10.30-150400.3.17.1
* SUSE Linux Enterprise Workstation Extension 15 SP7 (noarch)
* gimp-lang-2.10.30-150400.3.17.1
## References:
* https://www.suse.com/security/cve/CVE-2025-5473.html
* https://bugzilla.suse.com/show_bug.cgi?id=1244058
SUSE-SU-2025:02098-1: important: Security update for the Linux Kernel (Live Patch 55 for SLE 15 SP3)
# Security update for the Linux Kernel (Live Patch 55 for SLE 15 SP3)
Announcement ID: SUSE-SU-2025:02098-1
Release Date: 2025-06-25T05:33:38Z
Rating: important
References:
* bsc#1238730
Cross-References:
* CVE-2022-49545
CVSS scores:
* CVE-2022-49545 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49545 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves one vulnerability can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_198 fixes one issue.
The following security issue was fixed:
* CVE-2022-49545: ALSA: usb-audio: Cancel pending work at closing a MIDI
substream (bsc#1238730).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2025-2098=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-2098=1
## Package List:
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_198-default-3-150300.2.1
* kernel-livepatch-5_3_18-150300_59_198-default-debuginfo-3-150300.2.1
* kernel-livepatch-SLE15-SP3_Update_55-debugsource-3-150300.2.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_198-preempt-3-150300.2.1
* kernel-livepatch-5_3_18-150300_59_198-preempt-debuginfo-3-150300.2.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_198-default-3-150300.2.1
## References:
* https://www.suse.com/security/cve/CVE-2022-49545.html
* https://bugzilla.suse.com/show_bug.cgi?id=1238730
SUSE-SU-2025:02106-1: important: Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)
# Security update for the Linux Kernel (Live Patch 15 for SLE 15 SP5)
Announcement ID: SUSE-SU-2025:02106-1
Release Date: 2025-06-25T15:04:22Z
Rating: important
References:
* bsc#1227903
* bsc#1232908
* bsc#1232927
* bsc#1232929
* bsc#1233680
* bsc#1233708
* bsc#1235062
* bsc#1235231
* bsc#1236244
Cross-References:
* CVE-2024-40937
* CVE-2024-50124
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50279
* CVE-2024-50301
* CVE-2024-53208
* CVE-2024-56601
* CVE-2024-56605
CVSS scores:
* CVE-2024-40937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53208 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves nine vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_68 fixes several issues.
The following security issues were fixed:
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235231).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232908).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233708).
* CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission
(bsc#1233680).
* CVE-2024-53208: Bluetooth: MGMT: Fix slab-use-after-free Read in
set_powered_sync (bsc#1236244).
* CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error
in l2cap_sock_create() (bsc#1235062).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929).
* CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232927).
* CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any()
(bsc#1227903).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2025-2106=1 SUSE-2025-2109=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-2106=1 SUSE-SLE-
Module-Live-Patching-15-SP5-2025-2109=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_13-debugsource-18-150500.2.1
* kernel-livepatch-5_14_21-150500_55_62-default-18-150500.2.1
* kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-17-150500.3.1
* kernel-livepatch-5_14_21-150500_55_62-default-debuginfo-18-150500.2.1
* kernel-livepatch-5_14_21-150500_55_68-default-17-150500.3.1
* kernel-livepatch-SLE15-SP5_Update_15-debugsource-17-150500.3.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_13-debugsource-18-150500.2.1
* kernel-livepatch-5_14_21-150500_55_62-default-18-150500.2.1
* kernel-livepatch-5_14_21-150500_55_68-default-debuginfo-17-150500.3.1
* kernel-livepatch-5_14_21-150500_55_62-default-debuginfo-18-150500.2.1
* kernel-livepatch-5_14_21-150500_55_68-default-17-150500.3.1
* kernel-livepatch-SLE15-SP5_Update_15-debugsource-17-150500.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-40937.html
* https://www.suse.com/security/cve/CVE-2024-50124.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-53208.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227903
* https://bugzilla.suse.com/show_bug.cgi?id=1232908
* https://bugzilla.suse.com/show_bug.cgi?id=1232927
* https://bugzilla.suse.com/show_bug.cgi?id=1232929
* https://bugzilla.suse.com/show_bug.cgi?id=1233680
* https://bugzilla.suse.com/show_bug.cgi?id=1233708
* https://bugzilla.suse.com/show_bug.cgi?id=1235062
* https://bugzilla.suse.com/show_bug.cgi?id=1235231
* https://bugzilla.suse.com/show_bug.cgi?id=1236244
SUSE-SU-2025:02107-1: important: Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)
# Security update for the Linux Kernel (Live Patch 17 for SLE 15 SP5)
Announcement ID: SUSE-SU-2025:02107-1
Release Date: 2025-06-25T14:03:51Z
Rating: important
References:
* bsc#1232908
* bsc#1232927
* bsc#1232929
* bsc#1233680
* bsc#1233708
* bsc#1235062
* bsc#1235231
* bsc#1236244
Cross-References:
* CVE-2024-50124
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50279
* CVE-2024-50301
* CVE-2024-53208
* CVE-2024-56601
* CVE-2024-56605
CVSS scores:
* CVE-2024-50124 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53208 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves eight vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_73 fixes several issues.
The following security issues were fixed:
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235231).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233708).
* CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission
(bsc#1233680).
* CVE-2024-53208: Bluetooth: MGMT: Fix slab-use-after-free Read in
set_powered_sync (bsc#1236244).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232908).
* CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error
in l2cap_sock_create() (bsc#1235062).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929).
* CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232927).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2025-2107=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-2107=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_73-default-debuginfo-12-150500.3.1
* kernel-livepatch-5_14_21-150500_55_73-default-12-150500.3.1
* kernel-livepatch-SLE15-SP5_Update_17-debugsource-12-150500.3.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_73-default-debuginfo-12-150500.3.1
* kernel-livepatch-5_14_21-150500_55_73-default-12-150500.3.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le x86_64)
* kernel-livepatch-SLE15-SP5_Update_17-debugsource-12-150500.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-50124.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-53208.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://bugzilla.suse.com/show_bug.cgi?id=1232908
* https://bugzilla.suse.com/show_bug.cgi?id=1232927
* https://bugzilla.suse.com/show_bug.cgi?id=1232929
* https://bugzilla.suse.com/show_bug.cgi?id=1233680
* https://bugzilla.suse.com/show_bug.cgi?id=1233708
* https://bugzilla.suse.com/show_bug.cgi?id=1235062
* https://bugzilla.suse.com/show_bug.cgi?id=1235231
* https://bugzilla.suse.com/show_bug.cgi?id=1236244
SUSE-SU-2025:02110-1: important: Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)
# Security update for the Linux Kernel (Live Patch 29 for SLE 15 SP4)
Announcement ID: SUSE-SU-2025:02110-1
Release Date: 2025-06-25T15:33:42Z
Rating: important
References:
* bsc#1232908
* bsc#1232929
* bsc#1233680
* bsc#1233708
* bsc#1235062
* bsc#1235231
Cross-References:
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50279
* CVE-2024-50301
* CVE-2024-56601
* CVE-2024-56605
CVSS scores:
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves six vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_128 fixes several issues.
The following security issues were fixed:
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235231).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233708).
* CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission
(bsc#1233680).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232908).
* CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error
in l2cap_sock_create() (bsc#1235062).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-2110=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-2110=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_128-default-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-12-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_29-debugsource-12-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_128-default-12-150400.2.1
* kernel-livepatch-5_14_21-150400_24_128-default-debuginfo-12-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_29-debugsource-12-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://bugzilla.suse.com/show_bug.cgi?id=1232908
* https://bugzilla.suse.com/show_bug.cgi?id=1232929
* https://bugzilla.suse.com/show_bug.cgi?id=1233680
* https://bugzilla.suse.com/show_bug.cgi?id=1233708
* https://bugzilla.suse.com/show_bug.cgi?id=1235062
* https://bugzilla.suse.com/show_bug.cgi?id=1235231
SUSE-SU-2025:02108-1: important: Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP5)
# Security update for the Linux Kernel (Live Patch 21 for SLE 15 SP5)
Announcement ID: SUSE-SU-2025:02108-1
Release Date: 2025-06-25T14:33:39Z
Rating: important
References:
* bsc#1235062
* bsc#1235231
Cross-References:
* CVE-2024-56601
* CVE-2024-56605
CVSS scores:
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_88 fixes several issues.
The following security issues were fixed:
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235231).
* CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error
in l2cap_sock_create() (bsc#1235062).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2025-2108=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-2108=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_88-default-debuginfo-6-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_21-debugsource-6-150500.2.1
* kernel-livepatch-5_14_21-150500_55_88-default-6-150500.2.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_88-default-debuginfo-6-150500.2.1
* kernel-livepatch-SLE15-SP5_Update_21-debugsource-6-150500.2.1
* kernel-livepatch-5_14_21-150500_55_88-default-6-150500.2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://bugzilla.suse.com/show_bug.cgi?id=1235062
* https://bugzilla.suse.com/show_bug.cgi?id=1235231
SUSE-SU-2025:02117-1: important: Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)
# Security update for the Linux Kernel (Live Patch 1 for SLE 15 SP6)
Announcement ID: SUSE-SU-2025:02117-1
Release Date: 2025-06-25T19:03:57Z
Rating: important
References:
* bsc#1227903
* bsc#1232908
* bsc#1232927
* bsc#1232929
* bsc#1233245
* bsc#1233680
* bsc#1233708
* bsc#1235062
* bsc#1235129
* bsc#1235231
* bsc#1236244
Cross-References:
* CVE-2024-40937
* CVE-2024-50124
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50257
* CVE-2024-50279
* CVE-2024-50301
* CVE-2024-53208
* CVE-2024-56582
* CVE-2024-56601
* CVE-2024-56605
CVSS scores:
* CVE-2024-40937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53208 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56582 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56582 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves 11 vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 6.4.0-150600_23_7 fixes several issues.
The following security issues were fixed:
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235231).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232908).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233708).
* CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission
(bsc#1233680).
* CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio()
(bsc#1235129).
* CVE-2024-53208: Bluetooth: MGMT: Fix slab-use-after-free Read in
set_powered_sync (bsc#1236244).
* CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233245).
* CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error
in l2cap_sock_create() (bsc#1235062).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929).
* CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232927).
* CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any()
(bsc#1227903).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-2117=1 SUSE-2025-2115=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-2117=1 SUSE-SLE-
Module-Live-Patching-15-SP6-2025-2115=1
## Package List:
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_7-default-debuginfo-16-150600.2.1
* kernel-livepatch-6_4_0-150600_21-default-18-150600.4.46.1
* kernel-livepatch-6_4_0-150600_23_7-default-16-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_0-debugsource-18-150600.4.46.1
* kernel-livepatch-SLE15-SP6_Update_1-debugsource-16-150600.2.1
* kernel-livepatch-6_4_0-150600_21-default-debuginfo-18-150600.4.46.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_7-default-debuginfo-16-150600.2.1
* kernel-livepatch-6_4_0-150600_21-default-18-150600.4.46.1
* kernel-livepatch-6_4_0-150600_23_7-default-16-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_0-debugsource-18-150600.4.46.1
* kernel-livepatch-SLE15-SP6_Update_1-debugsource-16-150600.2.1
* kernel-livepatch-6_4_0-150600_21-default-debuginfo-18-150600.4.46.1
## References:
* https://www.suse.com/security/cve/CVE-2024-40937.html
* https://www.suse.com/security/cve/CVE-2024-50124.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50257.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-53208.html
* https://www.suse.com/security/cve/CVE-2024-56582.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227903
* https://bugzilla.suse.com/show_bug.cgi?id=1232908
* https://bugzilla.suse.com/show_bug.cgi?id=1232927
* https://bugzilla.suse.com/show_bug.cgi?id=1232929
* https://bugzilla.suse.com/show_bug.cgi?id=1233245
* https://bugzilla.suse.com/show_bug.cgi?id=1233680
* https://bugzilla.suse.com/show_bug.cgi?id=1233708
* https://bugzilla.suse.com/show_bug.cgi?id=1235062
* https://bugzilla.suse.com/show_bug.cgi?id=1235129
* https://bugzilla.suse.com/show_bug.cgi?id=1235231
* https://bugzilla.suse.com/show_bug.cgi?id=1236244
SUSE-SU-2025:02111-1: important: Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4)
# Security update for the Linux Kernel (Live Patch 32 for SLE 15 SP4)
Announcement ID: SUSE-SU-2025:02111-1
Release Date: 2025-06-25T16:03:47Z
Rating: important
References:
* bsc#1232908
* bsc#1232929
* bsc#1233680
* bsc#1233708
* bsc#1235062
* bsc#1235231
Cross-References:
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50279
* CVE-2024-50301
* CVE-2024-56601
* CVE-2024-56605
CVSS scores:
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves six vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_136 fixes several issues.
The following security issues were fixed:
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235231).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233708).
* CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission
(bsc#1233680).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232908).
* CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error
in l2cap_sock_create() (bsc#1235062).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-2111=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-2111=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_136-default-debuginfo-10-150400.2.1
* kernel-livepatch-5_14_21-150400_24_136-default-10-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_32-debugsource-10-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_136-default-debuginfo-10-150400.2.1
* kernel-livepatch-5_14_21-150400_24_136-default-10-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_32-debugsource-10-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://bugzilla.suse.com/show_bug.cgi?id=1232908
* https://bugzilla.suse.com/show_bug.cgi?id=1232929
* https://bugzilla.suse.com/show_bug.cgi?id=1233680
* https://bugzilla.suse.com/show_bug.cgi?id=1233708
* https://bugzilla.suse.com/show_bug.cgi?id=1235062
* https://bugzilla.suse.com/show_bug.cgi?id=1235231
SUSE-SU-2025:02112-1: important: Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP4)
# Security update for the Linux Kernel (Live Patch 34 for SLE 15 SP4)
Announcement ID: SUSE-SU-2025:02112-1
Release Date: 2025-06-25T16:03:54Z
Rating: important
References:
* bsc#1235062
* bsc#1235231
Cross-References:
* CVE-2024-56601
* CVE-2024-56605
CVSS scores:
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_144 fixes several issues.
The following security issues were fixed:
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235231).
* CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error
in l2cap_sock_create() (bsc#1235062).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-2112=1
* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-2112=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_34-debugsource-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_144-default-debuginfo-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_144-default-8-150400.2.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_34-debugsource-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_144-default-debuginfo-8-150400.2.1
* kernel-livepatch-5_14_21-150400_24_144-default-8-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://bugzilla.suse.com/show_bug.cgi?id=1235062
* https://bugzilla.suse.com/show_bug.cgi?id=1235231
SUSE-SU-2025:02113-1: important: Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5)
# Security update for the Linux Kernel (Live Patch 20 for SLE 15 SP5)
Announcement ID: SUSE-SU-2025:02113-1
Release Date: 2025-06-25T16:33:31Z
Rating: important
References:
* bsc#1232908
* bsc#1232927
* bsc#1232929
* bsc#1233680
* bsc#1233708
* bsc#1235062
* bsc#1235231
* bsc#1236244
Cross-References:
* CVE-2024-50124
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50279
* CVE-2024-50301
* CVE-2024-53208
* CVE-2024-56601
* CVE-2024-56605
CVSS scores:
* CVE-2024-50124 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53208 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves eight vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_83 fixes several issues.
The following security issues were fixed:
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235231).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233708).
* CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission
(bsc#1233680).
* CVE-2024-53208: Bluetooth: MGMT: Fix slab-use-after-free Read in
set_powered_sync (bsc#1236244).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232908).
* CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error
in l2cap_sock_create() (bsc#1235062).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929).
* CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232927).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.5
zypper in -t patch SUSE-2025-2113=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-2113=1
## Package List:
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_83-default-debuginfo-10-150500.3.1
* kernel-livepatch-5_14_21-150500_55_83-default-10-150500.3.1
* kernel-livepatch-SLE15-SP5_Update_20-debugsource-10-150500.3.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150500_55_83-default-debuginfo-10-150500.3.1
* kernel-livepatch-5_14_21-150500_55_83-default-10-150500.3.1
* kernel-livepatch-SLE15-SP5_Update_20-debugsource-10-150500.3.1
## References:
* https://www.suse.com/security/cve/CVE-2024-50124.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-53208.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://bugzilla.suse.com/show_bug.cgi?id=1232908
* https://bugzilla.suse.com/show_bug.cgi?id=1232927
* https://bugzilla.suse.com/show_bug.cgi?id=1232929
* https://bugzilla.suse.com/show_bug.cgi?id=1233680
* https://bugzilla.suse.com/show_bug.cgi?id=1233708
* https://bugzilla.suse.com/show_bug.cgi?id=1235062
* https://bugzilla.suse.com/show_bug.cgi?id=1235231
* https://bugzilla.suse.com/show_bug.cgi?id=1236244
SUSE-SU-2025:02116-1: important: Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6)
# Security update for the Linux Kernel (Live Patch 4 for SLE 15 SP6)
Announcement ID: SUSE-SU-2025:02116-1
Release Date: 2025-06-25T18:03:44Z
Rating: important
References:
* bsc#1232908
* bsc#1232927
* bsc#1232929
* bsc#1233245
* bsc#1233680
* bsc#1233708
* bsc#1235062
* bsc#1235086
* bsc#1235129
* bsc#1235231
* bsc#1236244
Cross-References:
* CVE-2024-50124
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50257
* CVE-2024-50279
* CVE-2024-50301
* CVE-2024-53074
* CVE-2024-53208
* CVE-2024-56582
* CVE-2024-56601
* CVE-2024-56605
CVSS scores:
* CVE-2024-50124 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53208 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56582 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56582 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves 11 vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 6.4.0-150600_23_22 fixes several issues.
The following security issues were fixed:
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235231).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233708).
* CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission
(bsc#1233680).
* CVE-2024-53074: wifi: iwlwifi: mvm: do not leak a link on AP removal
(bsc#1235086).
* CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio()
(bsc#1235129).
* CVE-2024-53208: Bluetooth: MGMT: Fix slab-use-after-free Read in
set_powered_sync (bsc#1236244).
* CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233245).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232908).
* CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error
in l2cap_sock_create() (bsc#1235062).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929).
* CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232927).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-2116=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-2116=1
## Package List:
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_22-default-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_22-default-debuginfo-12-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_4-debugsource-12-150600.2.1
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_22-default-12-150600.2.1
* kernel-livepatch-6_4_0-150600_23_22-default-debuginfo-12-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_4-debugsource-12-150600.2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-50124.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50257.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-53074.html
* https://www.suse.com/security/cve/CVE-2024-53208.html
* https://www.suse.com/security/cve/CVE-2024-56582.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://bugzilla.suse.com/show_bug.cgi?id=1232908
* https://bugzilla.suse.com/show_bug.cgi?id=1232927
* https://bugzilla.suse.com/show_bug.cgi?id=1232929
* https://bugzilla.suse.com/show_bug.cgi?id=1233245
* https://bugzilla.suse.com/show_bug.cgi?id=1233680
* https://bugzilla.suse.com/show_bug.cgi?id=1233708
* https://bugzilla.suse.com/show_bug.cgi?id=1235062
* https://bugzilla.suse.com/show_bug.cgi?id=1235086
* https://bugzilla.suse.com/show_bug.cgi?id=1235129
* https://bugzilla.suse.com/show_bug.cgi?id=1235231
* https://bugzilla.suse.com/show_bug.cgi?id=1236244