SUSE-SU-2026:0154-1

Source
https://www.suse.com/support/update/announcement/2026/suse-su-20260154-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:0154-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2026:0154-1
Upstream
Related
Published
2026-01-19T12:08:42Z
Modified
2026-03-23T04:51:58.702181Z
Summary
Security update for the Linux Kernel (Live Patch 63 for SUSE Linux Enterprise 12 SP5)
Details

This update for the SUSE Linux Enterprise kernel 4.12.14-122.237 fixes various security issues

The following security issues were fixed:

  • CVE-2022-50233: bluetooth: device name can cause reading kernel memory by not supplying terminal \0 (bsc#1249242).
  • CVE-2022-50327: ACPI: processor: idle: Check acpifetchacpi_dev() return value (bsc#1254451).
  • CVE-2022-50367: fs: fix UAF/GPF bug in nilfsmdtdestroy (bsc#1250280).
  • CVE-2022-50409: net: If sock is dead don't access sock's skwq in skstreamwaitmemory (bsc#1250665).
  • CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in liotargetnaclinfoshow() (bsc#1251787).
  • CVE-2023-53717: wifi: ath9k: Fix potential stack-out-of-bounds write in ath9kwmirsp_callback() (bsc#1252563).
  • CVE-2024-57849: s390/cpum_sf: handle CPU hotplug remove during sampling (bsc#1235815).
  • CVE-2025-38572: ipv6: reject malicious packets in ipv6gsosegment() (bsc#1248400).
  • CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437).
References

Affected packages

SUSE:Linux Enterprise Live Patching 12 SP5 / kgraft-patch-SLE12-SP5_Update_63

Package

Name
kgraft-patch-SLE12-SP5_Update_63
Purl
pkg:rpm/suse/kgraft-patch-SLE12-SP5_Update_63&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
16-2.1

Ecosystem specific

{
    "binaries": [
        {
            "kgraft-patch-4_12_14-122_237-default": "16-2.1"
        }
    ]
}

Database specific

source
"https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2026:0154-1.json"