{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.283.1","kernel-default-kgraft-devel":"4.12.14-122.283.1","kgraft-patch-4_12_14-122_283-default":"1-8.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.283.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-default-kgraft":"4.12.14-122.283.1","kernel-default-kgraft-devel":"4.12.14-122.283.1","kgraft-patch-4_12_14-122_283-default":"1-8.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 12 SP5","name":"kgraft-patch-SLE12-SP5_Update_75","purl":"pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_75&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1-8.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.283.1","dlm-kmp-default":"4.12.14-122.283.1","gfs2-kmp-default":"4.12.14-122.283.1","kernel-default":"4.12.14-122.283.1","kernel-default-base":"4.12.14-122.283.1","kernel-default-devel":"4.12.14-122.283.1","kernel-default-man":"4.12.14-122.283.1","kernel-devel":"4.12.14-122.283.1","kernel-macros":"4.12.14-122.283.1","kernel-source":"4.12.14-122.283.1","kernel-syms":"4.12.14-122.283.1","ocfs2-kmp-default":"4.12.14-122.283.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.283.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.283.1","dlm-kmp-default":"4.12.14-122.283.1","gfs2-kmp-default":"4.12.14-122.283.1","kernel-default":"4.12.14-122.283.1","kernel-default-base":"4.12.14-122.283.1","kernel-default-devel":"4.12.14-122.283.1","kernel-default-man":"4.12.14-122.283.1","kernel-devel":"4.12.14-122.283.1","kernel-macros":"4.12.14-122.283.1","kernel-source":"4.12.14-122.283.1","kernel-syms":"4.12.14-122.283.1","ocfs2-kmp-default":"4.12.14-122.283.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.283.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.283.1","dlm-kmp-default":"4.12.14-122.283.1","gfs2-kmp-default":"4.12.14-122.283.1","kernel-default":"4.12.14-122.283.1","kernel-default-base":"4.12.14-122.283.1","kernel-default-devel":"4.12.14-122.283.1","kernel-default-man":"4.12.14-122.283.1","kernel-devel":"4.12.14-122.283.1","kernel-macros":"4.12.14-122.283.1","kernel-source":"4.12.14-122.283.1","kernel-syms":"4.12.14-122.283.1","ocfs2-kmp-default":"4.12.14-122.283.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.283.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.283.1","dlm-kmp-default":"4.12.14-122.283.1","gfs2-kmp-default":"4.12.14-122.283.1","kernel-default":"4.12.14-122.283.1","kernel-default-base":"4.12.14-122.283.1","kernel-default-devel":"4.12.14-122.283.1","kernel-devel":"4.12.14-122.283.1","kernel-macros":"4.12.14-122.283.1","kernel-source":"4.12.14-122.283.1","kernel-syms":"4.12.14-122.283.1","ocfs2-kmp-default":"4.12.14-122.283.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-default","purl":"pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.283.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.283.1","dlm-kmp-default":"4.12.14-122.283.1","gfs2-kmp-default":"4.12.14-122.283.1","kernel-default":"4.12.14-122.283.1","kernel-default-base":"4.12.14-122.283.1","kernel-default-devel":"4.12.14-122.283.1","kernel-devel":"4.12.14-122.283.1","kernel-macros":"4.12.14-122.283.1","kernel-source":"4.12.14-122.283.1","kernel-syms":"4.12.14-122.283.1","ocfs2-kmp-default":"4.12.14-122.283.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-source","purl":"pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.283.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"cluster-md-kmp-default":"4.12.14-122.283.1","dlm-kmp-default":"4.12.14-122.283.1","gfs2-kmp-default":"4.12.14-122.283.1","kernel-default":"4.12.14-122.283.1","kernel-default-base":"4.12.14-122.283.1","kernel-default-devel":"4.12.14-122.283.1","kernel-devel":"4.12.14-122.283.1","kernel-macros":"4.12.14-122.283.1","kernel-source":"4.12.14-122.283.1","kernel-syms":"4.12.14-122.283.1","ocfs2-kmp-default":"4.12.14-122.283.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"kernel-syms","purl":"pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-122.283.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-50364: i2c: mux: reg: check return value after calling platform_get_resource() (bsc#1250083).\n- CVE-2022-50368: drm/msm/dsi: fix memory corruption with too many bridges (bsc#1250009).\n- CVE-2022-50494: thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash (bsc#1251173).\n- CVE-2022-50545: r6040: Fix kmemleak in probe and remove (bsc#1251285).\n- CVE-2022-50551: wifi: brcmfmac: Fix potential shift-out-of-bounds in brcmf_fw_alloc_request() (bsc#1251322).\n- CVE-2022-50569: xfrm: Update ipcomp_scratches with NULL when freed (bsc#1252640).\n- CVE-2022-50578: class: fix possible memory leak in __class_register() (bsc#1252519).\n- CVE-2023-53229: wifi: mac80211: fix invalid drv_sta_pre_rcu_remove calls for non-uploaded sta (bsc#1249650).\n- CVE-2023-53369: net: dcb: choose correct policy to parse DCB_ATTR_BCN (bsc#1250206).\n- CVE-2023-53431: scsi: ses: Don't attach if enclosure has no components (bsc#1250374).\n- CVE-2023-53542: ARM: dts: exynos: Use Exynos5420 compatible for the MIPI video phy (bsc#1251154).\n- CVE-2023-53597: cifs: fix mid leak during reconnection after timeout threshold (bsc#1251159).\n- CVE-2023-53641: wifi: ath9k: hif_usb: fix memory leak of remain_skbs (bsc#1251728).\n- CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786).\n- CVE-2025-38436: drm/scheduler: signal scheduled fence when kill job (bsc#1247227).\n- CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).\n- CVE-2025-39967: fbcon: fix integer overflow in fbcon_do_set_font (bsc#1252033).\n- CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303).\n- CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).\n- CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773).\n- CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780).\n- CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862).\n- CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821).\n- CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836).\n- CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912).\n- CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421).\n- CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).\n- CVE-2025-40205: btrfs: avoid potential out-of-bounds in btrfs_encode_fh() (bsc#1253456).\n\nThe following non-security bugs were fixed:\n\n- KVM: x86: Give a hint when Win2016 might fail to boot due to XSAVES erratum (git-fixes).\n- PCI: aardvark: Fix checking for MEM resource type (git-fixes).\n- cifs: Check the lease context if we actually got a lease (bsc#1228688).\n- cifs: return a single-use cfid if we did not get a lease (bsc#1228688).\n- dmaengine: bcm2835: Avoid GFP_KERNEL in device_prep_slave_sg (bsc#1070872).\n- kabi/severities: Update info about kvm_86_ops.\n- net/sched: sch_hfsc: upgrade 'rt' to 'sc' when it becomes a inner curve (bsc#1220419).\n- skmsg: Return copied bytes in sk_msg_memcopy_from_iter (bsc#1250650).\n- smb3: fix Open files on server counter going negative (git-fixes).\n- tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork (bsc#1250705).\n- tcp_bpf: Fix copied value in tcp_bpf_sendmsg (bsc#1250650).\n- thermal: intel_powerclamp: Use first online CPU as control_cpu (bsc#1251173).\n","id":"SUSE-SU-2025:4515-1","modified":"2025-12-23T16:19:45Z","published":"2025-12-23T16:19:45Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-20254515-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1070872"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220419"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228688"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247227"},{"type":"REPORT","url":"https://bugzilla.suse.com/1249650"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250009"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250083"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250176"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250206"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250374"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250650"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250705"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251154"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251159"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251173"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251285"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251322"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251728"},{"type":"REPORT","url":"https://bugzilla.suse.com/1251786"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252033"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252303"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252519"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252640"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252763"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252773"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252780"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252821"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252836"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252862"},{"type":"REPORT","url":"https://bugzilla.suse.com/1252912"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253237"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253421"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253436"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253438"},{"type":"REPORT","url":"https://bugzilla.suse.com/1253456"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50364"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50368"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50494"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50545"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50551"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50569"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-50578"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53229"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53369"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53431"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53542"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53597"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53641"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-53676"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-38436"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39819"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-39967"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40001"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40027"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40030"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40040"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40048"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40055"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40070"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40083"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40173"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40186"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40204"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-40205"}],"related":["CVE-2022-50364","CVE-2022-50368","CVE-2022-50494","CVE-2022-50545","CVE-2022-50551","CVE-2022-50569","CVE-2022-50578","CVE-2023-53229","CVE-2023-53369","CVE-2023-53431","CVE-2023-53542","CVE-2023-53597","CVE-2023-53641","CVE-2023-53676","CVE-2025-38436","CVE-2025-39819","CVE-2025-39967","CVE-2025-40001","CVE-2025-40027","CVE-2025-40030","CVE-2025-40040","CVE-2025-40048","CVE-2025-40055","CVE-2025-40070","CVE-2025-40083","CVE-2025-40173","CVE-2025-40186","CVE-2025-40204","CVE-2025-40205"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2022-50364","CVE-2022-50368","CVE-2022-50494","CVE-2022-50545","CVE-2022-50551","CVE-2022-50569","CVE-2022-50578","CVE-2023-53229","CVE-2023-53369","CVE-2023-53431","CVE-2023-53542","CVE-2023-53597","CVE-2023-53641","CVE-2023-53676","CVE-2025-38436","CVE-2025-39819","CVE-2025-39967","CVE-2025-40001","CVE-2025-40027","CVE-2025-40030","CVE-2025-40040","CVE-2025-40048","CVE-2025-40055","CVE-2025-40070","CVE-2025-40083","CVE-2025-40173","CVE-2025-40186","CVE-2025-40204","CVE-2025-40205"]}