Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP4)
Announcement ID: | SUSE-SU-2025:1445-1 |
---|---|
Release Date: | 2025-05-04T16:10:06Z |
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves three vulnerabilities can now be installed.
Description:
This update for the Linux Kernel 5.14.21-150400_24_141 fixes several issues.
The following security issues were fixed:
- CVE-2024-8805: Bluetooth: hci_event: Align BR/EDR JUST_WORKS paring with LE (bsc#1240840).
- CVE-2024-50205: ALSA: firewire-lib: Avoid division by zero in apply_constraint_to_size() (bsc#1233294).
- CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235431).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.4
zypper in -t patch SUSE-2025-1445=1 SUSE-2025-1441=1 SUSE-2025-1443=1
-
SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1445=1 SUSE-SLE-Module-Live-Patching-15-SP4-2025-1441=1 SUSE-SLE-Module-Live-Patching-15-SP4-2025-1443=1
Package List:
-
openSUSE Leap 15.4 (ppc64le s390x x86_64)
- kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-16-150400.2.1
- kernel-livepatch-5_14_21-150400_24_125-default-11-150400.2.1
- kernel-livepatch-5_14_21-150400_24_141-default-6-150400.2.1
- kernel-livepatch-5_14_21-150400_24_125-default-debuginfo-11-150400.2.1
- kernel-livepatch-SLE15-SP4_Update_26-debugsource-16-150400.2.1
- kernel-livepatch-5_14_21-150400_24_119-default-16-150400.2.1
- kernel-livepatch-SLE15-SP4_Update_33-debugsource-6-150400.2.1
- kernel-livepatch-SLE15-SP4_Update_28-debugsource-11-150400.2.1
- kernel-livepatch-5_14_21-150400_24_141-default-debuginfo-6-150400.2.1
-
SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
- kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-16-150400.2.1
- kernel-livepatch-5_14_21-150400_24_125-default-11-150400.2.1
- kernel-livepatch-5_14_21-150400_24_141-default-6-150400.2.1
- kernel-livepatch-5_14_21-150400_24_125-default-debuginfo-11-150400.2.1
- kernel-livepatch-SLE15-SP4_Update_26-debugsource-16-150400.2.1
- kernel-livepatch-5_14_21-150400_24_119-default-16-150400.2.1
- kernel-livepatch-SLE15-SP4_Update_33-debugsource-6-150400.2.1
- kernel-livepatch-SLE15-SP4_Update_28-debugsource-11-150400.2.1
- kernel-livepatch-5_14_21-150400_24_141-default-debuginfo-6-150400.2.1
References:
- https://www.suse.com/security/cve/CVE-2024-50205.html
- https://www.suse.com/security/cve/CVE-2024-56650.html
- https://www.suse.com/security/cve/CVE-2024-8805.html
- https://bugzilla.suse.com/show_bug.cgi?id=1233294
- https://bugzilla.suse.com/show_bug.cgi?id=1235431
- https://bugzilla.suse.com/show_bug.cgi?id=1240840