Security update for the Linux Kernel (Live Patch 58 for SLE 12 SP5)
| Announcement ID: | SUSE-SU-2025:02131-1 | 
|---|---|
| Release Date: | 2025-06-26T11:03:53Z | 
| Rating: | important | 
| References: | |
| Cross-References: | |
| CVSS scores: | 
                    
  | 
            
| Affected Products: | 
                
  | 
        
An update that solves eight vulnerabilities can now be installed.
Description:
This update for the Linux Kernel 4.12.14-122_222 fixes several issues.
The following security issues were fixed:
- CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235231).
 - CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when resizing (bsc#1233708).
 - CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission (bsc#1233680).
 - CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error in l2cap_sock_create() (bsc#1235062).
 - CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929).
 - CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227903).
 - CVE-2022-49545: ALSA: usb-audio: Cancel pending work at closing a MIDI substream (bsc#1238730).
 - CVE-2022-49179: block, bfq: do not move oom_bfqq (bsc#1241331).
 
Patch Instructions:
        To install this SUSE  update use the SUSE recommended
        installation methods like YaST online_update or "zypper patch".
        Alternatively you can run the command listed for your product:
    
- 
                SUSE Linux Enterprise Live Patching 12-SP5
                
                    
                        
zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2025-2131=1 
Package List:
- 
                    SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64)
                    
- kgraft-patch-4_12_14-122_222-default-13-2.1
 
 
References:
- https://www.suse.com/security/cve/CVE-2022-49179.html
 - https://www.suse.com/security/cve/CVE-2022-49545.html
 - https://www.suse.com/security/cve/CVE-2024-40937.html
 - https://www.suse.com/security/cve/CVE-2024-50125.html
 - https://www.suse.com/security/cve/CVE-2024-50279.html
 - https://www.suse.com/security/cve/CVE-2024-50301.html
 - https://www.suse.com/security/cve/CVE-2024-56601.html
 - https://www.suse.com/security/cve/CVE-2024-56605.html
 - https://bugzilla.suse.com/show_bug.cgi?id=1227903
 - https://bugzilla.suse.com/show_bug.cgi?id=1232929
 - https://bugzilla.suse.com/show_bug.cgi?id=1233680
 - https://bugzilla.suse.com/show_bug.cgi?id=1233708
 - https://bugzilla.suse.com/show_bug.cgi?id=1235062
 - https://bugzilla.suse.com/show_bug.cgi?id=1235231
 - https://bugzilla.suse.com/show_bug.cgi?id=1238730
 - https://bugzilla.suse.com/show_bug.cgi?id=1241331