Bug 1221979 (CVE-2021-47146)

Summary: VUL-0: CVE-2021-47146: kernel: mld: fix panic in mld_newpack()
Product: [Novell Products] SUSE Security Incidents Reporter: SMASH SMASH <smash_bz>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: IN_PROGRESS --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: gabriel.bertazi, gabriele.sonnu
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/398793/
Whiteboard: CVSSv3.1:SUSE:CVE-2021-47146:5.5:(AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-03-26 10:49:33 UTC
In the Linux kernel, the following vulnerability has been resolved:

mld: fix panic in mld_newpack()

mld_newpack() doesn't allow to allocate high order page,
only order-0 allocation is allowed.
If headroom size is too large, a kernel panic could occur in skb_put().

Test commands:
    ip netns del A
    ip netns del B
    ip netns add A
    ip netns add B
    ip link add veth0 type veth peer name veth1
    ip link set veth0 netns A
    ip link set veth1 netns B

    ip netns exec A ip link set lo up
    ip netns exec A ip link set veth0 up
    ip netns exec A ip -6 a a 2001:db8:0::1/64 dev veth0
    ip netns exec B ip link set lo up
    ip netns exec B ip link set veth1 up
    ip netns exec B ip -6 a a 2001:db8:0::2/64 dev veth1
    for i in {1..99}
    do
        let A=$i-1
        ip netns exec A ip link add ip6gre$i type ip6gre \
	local 2001:db8:$A::1 remote 2001:db8:$A::2 encaplimit 100
        ip netns exec A ip -6 a a 2001:db8:$i::1/64 dev ip6gre$i
        ip netns exec A ip link set ip6gre$i up

        ip netns exec B ip link add ip6gre$i type ip6gre \
	local 2001:db8:$A::2 remote 2001:db8:$A::1 encaplimit 100
        ip netns exec B ip -6 a a 2001:db8:$i::2/64 dev ip6gre$i
        ip netns exec B ip link set ip6gre$i up
    done

Splat looks like:
kernel BUG at net/core/skbuff.c:110!
invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN PTI
CPU: 0 PID: 7 Comm: kworker/0:1 Not tainted 5.12.0+ #891
Workqueue: ipv6_addrconf addrconf_dad_work
RIP: 0010:skb_panic+0x15d/0x15f
Code: 92 fe 4c 8b 4c 24 10 53 8b 4d 70 45 89 e0 48 c7 c7 00 ae 79 83
41 57 41 56 41 55 48 8b 54 24 a6 26 f9 ff <0f> 0b 48 8b 6c 24 20 89
34 24 e8 4a 4e 92 fe 8b 34 24 48 c7 c1 20
RSP: 0018:ffff88810091f820 EFLAGS: 00010282
RAX: 0000000000000089 RBX: ffff8881086e9000 RCX: 0000000000000000
RDX: 0000000000000089 RSI: 0000000000000008 RDI: ffffed1020123efb
RBP: ffff888005f6eac0 R08: ffffed1022fc0031 R09: ffffed1022fc0031
R10: ffff888117e00187 R11: ffffed1022fc0030 R12: 0000000000000028
R13: ffff888008284eb0 R14: 0000000000000ed8 R15: 0000000000000ec0
FS:  0000000000000000(0000) GS:ffff888117c00000(0000)
knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f8b801c5640 CR3: 0000000033c2c006 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 ? ip6_mc_hdr.isra.26.constprop.46+0x12a/0x600
 ? ip6_mc_hdr.isra.26.constprop.46+0x12a/0x600
 skb_put.cold.104+0x22/0x22
 ip6_mc_hdr.isra.26.constprop.46+0x12a/0x600
 ? rcu_read_lock_sched_held+0x91/0xc0
 mld_newpack+0x398/0x8f0
 ? ip6_mc_hdr.isra.26.constprop.46+0x600/0x600
 ? lock_contended+0xc40/0xc40
 add_grhead.isra.33+0x280/0x380
 add_grec+0x5ca/0xff0
 ? mld_sendpack+0xf40/0xf40
 ? lock_downgrade+0x690/0x690
 mld_send_initial_cr.part.34+0xb9/0x180
 ipv6_mc_dad_complete+0x15d/0x1b0
 addrconf_dad_completed+0x8d2/0xbb0
 ? lock_downgrade+0x690/0x690
 ? addrconf_rs_timer+0x660/0x660
 ? addrconf_dad_work+0x73c/0x10e0
 addrconf_dad_work+0x73c/0x10e0

Allowing high order page allocation could fix this problem.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-47146
https://www.cve.org/CVERecord?id=CVE-2021-47146
https://git.kernel.org/stable/c/020ef930b826d21c5446fdc9db80fd72a791bc21
https://git.kernel.org/stable/c/0e35b7457b7b6e73ffeaaca1a577fdf1af0feca1
https://git.kernel.org/stable/c/17728616a4c85baf0edc975c60ba4e4157684d9a
https://git.kernel.org/stable/c/221142038f36d9f28b64e83e954774da4d4ccd17
https://git.kernel.org/stable/c/37d697759958d111439080bab7e14d2b0e7b39f5
https://git.kernel.org/stable/c/4b77ad9097067b31237eeeee0bf70f80849680a0
https://git.kernel.org/stable/c/a76fb9ba545289379acf409653ad5f74417be59c
https://git.kernel.org/stable/c/beb39adb150f8f3b516ddf7c39835a9788704d23
https://bugzilla.redhat.com/show_bug.cgi?id=2271497
Comment 1 Gabriele Sonnu 2024-03-26 10:55:32 UTC
Offending commit (72e09ad107e7) found in:
 - ALP-current
 - cve/linux-4.4-LTSS
 - cve/linux-5.3-LTSS
 - cve/linux-5.14-LTSS
 - SLE11-SP4-LTSS
 - SLE12-SP2-LTSS
 - SLE12-SP3-LTSS
 - SLE12-SP3-TD
 - SLE12-SP4-LTSS
 - SLE12-SP5
 - SLE15-LTSS
 - SLE15-SP1-LTSS
 - SLE15-SP2-LTSS
 - SLE15-SP3-LTSS
 - SLE15-SP4-LTSS
 - SLE15-SP5
 - SLE15-SP6
 - stable

Fixing commit (17728616a4c8) found in:
 - ALP-current
 - cve/linux-5.14-LTSS
 - SLE15-SP4-LTSS
 - SLE15-SP5
 - SLE15-SP6
 - stable

Tracking as affected:
 - cve/linux-4.4-LTSS
 - cve/linux-5.3-LTSS
 - SLE11-SP4-LTSS
 - SLE12-SP2-LTSS
 - SLE12-SP3-LTSS
 - SLE12-SP3-TD
 - SLE12-SP4-LTSS
 - SLE12-SP5
 - SLE15-LTSS
 - SLE15-SP1-LTSS
 - SLE15-SP2-LTSS
 - SLE15-SP3-LTSS
Comment 2 Gabriel Krisman Bertazi 2024-04-26 23:11:28 UTC
Low score, so not really LTSS material, we should fix

 - SLE12-SP5

I'll handle  the backport.
Comment 3 Gabriel Krisman Bertazi 2024-05-01 17:29:46 UTC
../scripts/scripts/check-kernel-fix CVE-2021-47146              020ef930b826 ("mld: fix panic in mld_newpack()") merged v5.13-rc4~29^2~52
Fixes: 72e09ad107e7 ("ipv6: avoid high order allocations") merged v2.6.35-rc2-git4^2~6
Security fix for CVE-2021-47146 bsc#1221979 with CVSS 5.5
Experts candidates: mkubecek@suse.cz denis.kirjanov@suse.com 
..............................
ACTION NEEDED!
SLE12-SP5: MANUAL: backport 020ef930b826d21c5446fdc9db80fd72a791bc21 (Fixes 72e09ad107e7)
SLE12-SP3-TD: MANUAL: backport 020ef930b826d21c5446fdc9db80fd72a791bc21 (Fixes 72e09ad107e7)
Comment 4 Gabriel Krisman Bertazi 2024-05-01 17:38:07 UTC
Queued as:

SLE12-SP3-TD: ebde4a74df4 ("mld: fix panic in mld_newpack() (CVE-2021-47146 bsc#1221979).")

SLE12-SP5: e3d56024191 ("mld: fix panic in mld_newpack() (CVE-2021-47146 bsc#1221979).")

Waiting on merge to reassign to sec team.
Comment 5 Gabriel Krisman Bertazi 2024-05-07 15:08:02 UTC
All branches fixed and references updated.  Reassigning back to security team.
Comment 10 Maintenance Automation 2024-05-14 16:30:22 UTC
SUSE-SU-2024:1648-1: An update that solves 193 vulnerabilities, contains one feature and has 17 security fixes can now be installed.

Category: security (important)
Bug References: 1084332, 1141539, 1184509, 1186060, 1190317, 1190576, 1192145, 1194516, 1203935, 1209657, 1211592, 1212514, 1213456, 1217339, 1217987, 1217988, 1217989, 1218220, 1218336, 1218479, 1218562, 1219104, 1219169, 1219170, 1219618, 1219623, 1219847, 1220320, 1220366, 1220394, 1220411, 1220416, 1220418, 1220422, 1220442, 1220445, 1220505, 1220521, 1220528, 1220536, 1220538, 1220554, 1220572, 1220580, 1220611, 1220625, 1220628, 1220637, 1220640, 1220662, 1220687, 1220692, 1220703, 1220706, 1220739, 1220742, 1220743, 1220745, 1220751, 1220768, 1220769, 1220777, 1220790, 1220794, 1220829, 1220836, 1220843, 1220846, 1220850, 1220871, 1220927, 1220960, 1220985, 1220987, 1221044, 1221046, 1221048, 1221058, 1221060, 1221061, 1221077, 1221082, 1221088, 1221162, 1221277, 1221293, 1221337, 1221532, 1221541, 1221548, 1221575, 1221605, 1221608, 1221617, 1221791, 1221816, 1221825, 1221830, 1221862, 1221934, 1221949, 1221952, 1221953, 1221965, 1221966, 1221967, 1221969, 1221972, 1221973, 1221977, 1221979, 1221988, 1221991, 1221993, 1221994, 1221997, 1221998, 1221999, 1222000, 1222001, 1222002, 1222117, 1222294, 1222300, 1222357, 1222379, 1222422, 1222428, 1222449, 1222503, 1222559, 1222585, 1222609, 1222610, 1222613, 1222618, 1222619, 1222624, 1222630, 1222632, 1222660, 1222662, 1222664, 1222666, 1222669, 1222671, 1222677, 1222706, 1222720, 1222765, 1222770, 1222772, 1222787, 1222790, 1222812, 1222836, 1222869, 1222876, 1222878, 1222881, 1222883, 1222888, 1222952, 1222961, 1222975, 1222976, 1223016, 1223035, 1223049, 1223051, 1223057, 1223058, 1223060, 1223187, 1223189, 1223198, 1223203, 1223315, 1223432, 1223509, 1223512, 1223513, 1223516, 1223518, 1223626, 1223627, 1223664, 1223686, 1223693, 1223712, 1223715, 1223735, 1223744, 1223745, 1223770, 1223781, 1223819, 1223824, 1223827, 1223837, 1223842, 1223843, 1223844, 1223883, 1223885, 1223921, 1223941, 1223952, 1223953, 1223954
CVE References: CVE-2019-25160, CVE-2020-36312, CVE-2021-23134, CVE-2021-46904, CVE-2021-46905, CVE-2021-46907, CVE-2021-46909, CVE-2021-46938, CVE-2021-46939, CVE-2021-46941, CVE-2021-46950, CVE-2021-46958, CVE-2021-46960, CVE-2021-46963, CVE-2021-46964, CVE-2021-46966, CVE-2021-46975, CVE-2021-46981, CVE-2021-46988, CVE-2021-46990, CVE-2021-46998, CVE-2021-47006, CVE-2021-47015, CVE-2021-47024, CVE-2021-47034, CVE-2021-47045, CVE-2021-47049, CVE-2021-47055, CVE-2021-47056, CVE-2021-47060, CVE-2021-47061, CVE-2021-47063, CVE-2021-47068, CVE-2021-47070, CVE-2021-47071, CVE-2021-47073, CVE-2021-47100, CVE-2021-47101, CVE-2021-47104, CVE-2021-47110, CVE-2021-47112, CVE-2021-47114, CVE-2021-47117, CVE-2021-47118, CVE-2021-47119, CVE-2021-47138, CVE-2021-47141, CVE-2021-47142, CVE-2021-47143, CVE-2021-47146, CVE-2021-47149, CVE-2021-47150, CVE-2021-47153, CVE-2021-47159, CVE-2021-47161, CVE-2021-47162, CVE-2021-47165, CVE-2021-47166, CVE-2021-47167, CVE-2021-47168, CVE-2021-47169, CVE-2021-47171, CVE-2021-47173, CVE-2021-47177, CVE-2021-47179, CVE-2021-47180, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47188, CVE-2021-47189, CVE-2021-47198, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47207, CVE-2021-47211, CVE-2021-47216, CVE-2021-47217, CVE-2022-0487, CVE-2022-48619, CVE-2022-48626, CVE-2022-48636, CVE-2022-48650, CVE-2022-48651, CVE-2022-48667, CVE-2022-48668, CVE-2022-48687, CVE-2022-48688, CVE-2022-48695, CVE-2022-48701, CVE-2023-0160, CVE-2023-28746, CVE-2023-35827, CVE-2023-52454, CVE-2023-52469, CVE-2023-52470, CVE-2023-52474, CVE-2023-52476, CVE-2023-52477, CVE-2023-52486, CVE-2023-52488, CVE-2023-52509, CVE-2023-52515, CVE-2023-52524, CVE-2023-52528, CVE-2023-52575, CVE-2023-52583, CVE-2023-52587, CVE-2023-52590, CVE-2023-52591, CVE-2023-52595, CVE-2023-52598, CVE-2023-52607, CVE-2023-52614, CVE-2023-52620, CVE-2023-52628, CVE-2023-52635, CVE-2023-52639, CVE-2023-52644, CVE-2023-52646, CVE-2023-52650, CVE-2023-52652, CVE-2023-52653, CVE-2023-6270, CVE-2023-6356, CVE-2023-6535, CVE-2023-6536, CVE-2023-7042, CVE-2023-7192, CVE-2024-2201, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-24855, CVE-2024-24861, CVE-2024-26614, CVE-2024-26642, CVE-2024-26651, CVE-2024-26671, CVE-2024-26675, CVE-2024-26689, CVE-2024-26704, CVE-2024-26733, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744, CVE-2024-26747, CVE-2024-26754, CVE-2024-26763, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26777, CVE-2024-26778, CVE-2024-26779, CVE-2024-26793, CVE-2024-26805, CVE-2024-26816, CVE-2024-26817, CVE-2024-26839, CVE-2024-26840, CVE-2024-26852, CVE-2024-26855, CVE-2024-26857, CVE-2024-26859, CVE-2024-26878, CVE-2024-26883, CVE-2024-26884, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26907, CVE-2024-26922, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26948, CVE-2024-26993, CVE-2024-27013, CVE-2024-27014, CVE-2024-27043, CVE-2024-27046, CVE-2024-27054, CVE-2024-27072, CVE-2024-27073, CVE-2024-27074, CVE-2024-27075, CVE-2024-27078, CVE-2024-27388
Jira References: PED-5759
Maintenance Incident: [SUSE:Maintenance:33233](https://smelt.suse.de/incident/33233/)
Sources used:
SUSE Linux Enterprise Live Patching 12-SP5 (src):
 kgraft-patch-SLE12-SP5_Update_55-1-8.11.1
SUSE Linux Enterprise Software Development Kit 12 SP5 (src):
 kernel-obs-build-4.12.14-122.212.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src):
 kernel-source-4.12.14-122.212.1, kernel-syms-4.12.14-122.212.1
SUSE Linux Enterprise Server 12 SP5 (src):
 kernel-source-4.12.14-122.212.1, kernel-syms-4.12.14-122.212.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src):
 kernel-source-4.12.14-122.212.1, kernel-syms-4.12.14-122.212.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Maintenance Automation 2024-05-14 16:31:13 UTC
SUSE-SU-2024:1646-1: An update that solves 187 vulnerabilities, contains one feature and has 16 security fixes can now be installed.

Category: security (important)
Bug References: 1141539, 1190317, 1190576, 1192145, 1194516, 1203935, 1209657, 1211592, 1217339, 1217987, 1217988, 1217989, 1218220, 1218336, 1218479, 1218562, 1219104, 1219169, 1219170, 1219618, 1219623, 1219847, 1220320, 1220366, 1220394, 1220411, 1220413, 1220416, 1220418, 1220442, 1220445, 1220521, 1220528, 1220536, 1220538, 1220554, 1220572, 1220580, 1220611, 1220625, 1220628, 1220637, 1220640, 1220662, 1220687, 1220692, 1220703, 1220706, 1220739, 1220742, 1220743, 1220745, 1220751, 1220768, 1220769, 1220777, 1220790, 1220794, 1220829, 1220836, 1220843, 1220846, 1220850, 1220871, 1220927, 1220960, 1220985, 1220987, 1221044, 1221046, 1221048, 1221058, 1221060, 1221061, 1221077, 1221082, 1221088, 1221162, 1221277, 1221293, 1221337, 1221532, 1221541, 1221548, 1221575, 1221605, 1221608, 1221617, 1221791, 1221816, 1221825, 1221830, 1221862, 1221934, 1221949, 1221952, 1221953, 1221965, 1221966, 1221967, 1221969, 1221972, 1221973, 1221977, 1221979, 1221988, 1221991, 1221993, 1221994, 1221997, 1221998, 1221999, 1222000, 1222001, 1222002, 1222117, 1222294, 1222300, 1222357, 1222379, 1222422, 1222428, 1222449, 1222503, 1222559, 1222585, 1222609, 1222610, 1222613, 1222618, 1222619, 1222624, 1222630, 1222632, 1222660, 1222662, 1222664, 1222666, 1222669, 1222671, 1222677, 1222706, 1222720, 1222765, 1222770, 1222772, 1222787, 1222790, 1222812, 1222836, 1222869, 1222876, 1222878, 1222881, 1222883, 1222888, 1222961, 1222975, 1222976, 1223016, 1223035, 1223049, 1223051, 1223057, 1223058, 1223060, 1223187, 1223189, 1223198, 1223203, 1223315, 1223432, 1223509, 1223512, 1223513, 1223516, 1223518, 1223626, 1223627, 1223664, 1223686, 1223693, 1223712, 1223715, 1223735, 1223744, 1223745, 1223770, 1223781, 1223819, 1223824, 1223827, 1223837, 1223842, 1223843, 1223844, 1223883, 1223885, 1223921, 1223941, 1223952, 1223953, 1223954
CVE References: CVE-2019-25160, CVE-2021-46904, CVE-2021-46905, CVE-2021-46909, CVE-2021-46938, CVE-2021-46939, CVE-2021-46941, CVE-2021-46950, CVE-2021-46958, CVE-2021-46960, CVE-2021-46963, CVE-2021-46964, CVE-2021-46966, CVE-2021-46981, CVE-2021-46988, CVE-2021-46990, CVE-2021-46998, CVE-2021-47006, CVE-2021-47015, CVE-2021-47024, CVE-2021-47034, CVE-2021-47045, CVE-2021-47049, CVE-2021-47055, CVE-2021-47056, CVE-2021-47060, CVE-2021-47061, CVE-2021-47063, CVE-2021-47068, CVE-2021-47070, CVE-2021-47071, CVE-2021-47073, CVE-2021-47100, CVE-2021-47101, CVE-2021-47104, CVE-2021-47110, CVE-2021-47112, CVE-2021-47114, CVE-2021-47117, CVE-2021-47118, CVE-2021-47119, CVE-2021-47138, CVE-2021-47141, CVE-2021-47142, CVE-2021-47143, CVE-2021-47146, CVE-2021-47149, CVE-2021-47150, CVE-2021-47153, CVE-2021-47159, CVE-2021-47161, CVE-2021-47162, CVE-2021-47165, CVE-2021-47166, CVE-2021-47167, CVE-2021-47168, CVE-2021-47169, CVE-2021-47171, CVE-2021-47173, CVE-2021-47177, CVE-2021-47179, CVE-2021-47180, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47188, CVE-2021-47189, CVE-2021-47198, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47207, CVE-2021-47211, CVE-2021-47216, CVE-2021-47217, CVE-2022-0487, CVE-2022-48619, CVE-2022-48626, CVE-2022-48636, CVE-2022-48650, CVE-2022-48651, CVE-2022-48667, CVE-2022-48668, CVE-2022-48687, CVE-2022-48688, CVE-2022-48695, CVE-2022-48701, CVE-2023-0160, CVE-2023-52454, CVE-2023-52469, CVE-2023-52470, CVE-2023-52474, CVE-2023-52476, CVE-2023-52477, CVE-2023-52486, CVE-2023-52488, CVE-2023-52509, CVE-2023-52515, CVE-2023-52524, CVE-2023-52528, CVE-2023-52575, CVE-2023-52583, CVE-2023-52587, CVE-2023-52590, CVE-2023-52591, CVE-2023-52595, CVE-2023-52598, CVE-2023-52607, CVE-2023-52614, CVE-2023-52620, CVE-2023-52628, CVE-2023-52635, CVE-2023-52639, CVE-2023-52644, CVE-2023-52646, CVE-2023-52650, CVE-2023-52652, CVE-2023-52653, CVE-2023-6270, CVE-2023-6356, CVE-2023-6535, CVE-2023-6536, CVE-2023-7042, CVE-2023-7192, CVE-2024-2201, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-24855, CVE-2024-24861, CVE-2024-26614, CVE-2024-26642, CVE-2024-26651, CVE-2024-26671, CVE-2024-26675, CVE-2024-26689, CVE-2024-26704, CVE-2024-26733, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744, CVE-2024-26747, CVE-2024-26754, CVE-2024-26763, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26777, CVE-2024-26778, CVE-2024-26779, CVE-2024-26793, CVE-2024-26805, CVE-2024-26816, CVE-2024-26817, CVE-2024-26839, CVE-2024-26840, CVE-2024-26852, CVE-2024-26855, CVE-2024-26857, CVE-2024-26859, CVE-2024-26878, CVE-2024-26883, CVE-2024-26884, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26907, CVE-2024-26922, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26948, CVE-2024-26993, CVE-2024-27013, CVE-2024-27014, CVE-2024-27043, CVE-2024-27046, CVE-2024-27054, CVE-2024-27072, CVE-2024-27073, CVE-2024-27074, CVE-2024-27075, CVE-2024-27078, CVE-2024-27388
Jira References: PED-5759
Maintenance Incident: [SUSE:Maintenance:33362](https://smelt.suse.de/incident/33362/)
Sources used:
SUSE Linux Enterprise Real Time 12 SP5 (src):
 kernel-source-rt-4.12.14-10.182.1, kernel-syms-rt-4.12.14-10.182.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Maintenance Automation 2024-05-14 16:32:52 UTC
SUSE-SU-2024:1643-1: An update that solves 201 vulnerabilities, contains one feature and has 22 security fixes can now be installed.

Category: security (important)
Bug References: 1084332, 1141539, 1184509, 1186060, 1190317, 1190576, 1192145, 1194516, 1197894, 1203935, 1209657, 1211592, 1212514, 1213456, 1215221, 1217339, 1217987, 1217988, 1217989, 1218220, 1218336, 1218479, 1218562, 1218917, 1219104, 1219169, 1219170, 1219618, 1219623, 1219847, 1220320, 1220366, 1220394, 1220411, 1220413, 1220416, 1220418, 1220442, 1220445, 1220513, 1220521, 1220528, 1220536, 1220538, 1220554, 1220572, 1220580, 1220611, 1220625, 1220628, 1220637, 1220640, 1220662, 1220687, 1220692, 1220703, 1220706, 1220739, 1220742, 1220743, 1220745, 1220751, 1220768, 1220769, 1220777, 1220790, 1220794, 1220829, 1220836, 1220843, 1220846, 1220850, 1220871, 1220927, 1220960, 1220985, 1220987, 1221044, 1221046, 1221048, 1221058, 1221060, 1221061, 1221077, 1221082, 1221088, 1221162, 1221277, 1221293, 1221337, 1221532, 1221541, 1221543, 1221545, 1221548, 1221575, 1221605, 1221608, 1221617, 1221791, 1221816, 1221825, 1221830, 1221862, 1221934, 1221949, 1221952, 1221953, 1221965, 1221966, 1221967, 1221969, 1221972, 1221973, 1221977, 1221979, 1221988, 1221991, 1221993, 1221994, 1221997, 1221998, 1221999, 1222000, 1222001, 1222002, 1222117, 1222294, 1222300, 1222357, 1222379, 1222422, 1222428, 1222449, 1222503, 1222559, 1222585, 1222609, 1222610, 1222613, 1222618, 1222619, 1222624, 1222630, 1222632, 1222660, 1222662, 1222664, 1222666, 1222669, 1222671, 1222677, 1222706, 1222720, 1222765, 1222770, 1222772, 1222787, 1222790, 1222793, 1222812, 1222836, 1222869, 1222876, 1222878, 1222881, 1222883, 1222888, 1222952, 1222961, 1222975, 1222976, 1223016, 1223035, 1223049, 1223051, 1223057, 1223058, 1223060, 1223119, 1223187, 1223189, 1223198, 1223203, 1223315, 1223432, 1223509, 1223512, 1223513, 1223516, 1223518, 1223539, 1223540, 1223626, 1223627, 1223664, 1223686, 1223693, 1223712, 1223715, 1223735, 1223744, 1223745, 1223770, 1223781, 1223802, 1223819, 1223824, 1223827, 1223837, 1223842, 1223843, 1223844, 1223883, 1223885, 1223921, 1223923, 1223931, 1223941, 1223952, 1223953, 1223954, 1223969
CVE References: CVE-2019-25160, CVE-2020-36312, CVE-2021-23134, CVE-2021-46904, CVE-2021-46905, CVE-2021-46909, CVE-2021-46938, CVE-2021-46939, CVE-2021-46941, CVE-2021-46950, CVE-2021-46955, CVE-2021-46958, CVE-2021-46960, CVE-2021-46963, CVE-2021-46964, CVE-2021-46966, CVE-2021-46981, CVE-2021-46988, CVE-2021-46990, CVE-2021-46998, CVE-2021-47006, CVE-2021-47015, CVE-2021-47024, CVE-2021-47034, CVE-2021-47045, CVE-2021-47049, CVE-2021-47055, CVE-2021-47056, CVE-2021-47060, CVE-2021-47061, CVE-2021-47063, CVE-2021-47068, CVE-2021-47070, CVE-2021-47071, CVE-2021-47073, CVE-2021-47100, CVE-2021-47101, CVE-2021-47104, CVE-2021-47110, CVE-2021-47112, CVE-2021-47113, CVE-2021-47114, CVE-2021-47117, CVE-2021-47118, CVE-2021-47119, CVE-2021-47131, CVE-2021-47138, CVE-2021-47141, CVE-2021-47142, CVE-2021-47143, CVE-2021-47146, CVE-2021-47149, CVE-2021-47150, CVE-2021-47153, CVE-2021-47159, CVE-2021-47161, CVE-2021-47162, CVE-2021-47165, CVE-2021-47166, CVE-2021-47167, CVE-2021-47168, CVE-2021-47169, CVE-2021-47171, CVE-2021-47173, CVE-2021-47177, CVE-2021-47179, CVE-2021-47180, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47188, CVE-2021-47189, CVE-2021-47198, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47207, CVE-2021-47211, CVE-2021-47216, CVE-2021-47217, CVE-2022-0487, CVE-2022-48619, CVE-2022-48626, CVE-2022-48636, CVE-2022-48650, CVE-2022-48651, CVE-2022-48667, CVE-2022-48668, CVE-2022-48672, CVE-2022-48687, CVE-2022-48688, CVE-2022-48695, CVE-2022-48701, CVE-2022-48702, CVE-2023-0160, CVE-2023-28746, CVE-2023-35827, CVE-2023-4881, CVE-2023-52454, CVE-2023-52469, CVE-2023-52470, CVE-2023-52474, CVE-2023-52476, CVE-2023-52477, CVE-2023-52486, CVE-2023-52488, CVE-2023-52509, CVE-2023-52515, CVE-2023-52524, CVE-2023-52528, CVE-2023-52575, CVE-2023-52583, CVE-2023-52587, CVE-2023-52590, CVE-2023-52591, CVE-2023-52595, CVE-2023-52598, CVE-2023-52607, CVE-2023-52614, CVE-2023-52620, CVE-2023-52628, CVE-2023-52635, CVE-2023-52639, CVE-2023-52644, CVE-2023-52646, CVE-2023-52650, CVE-2023-52652, CVE-2023-52653, CVE-2023-6270, CVE-2023-6356, CVE-2023-6535, CVE-2023-6536, CVE-2023-7042, CVE-2023-7192, CVE-2024-0639, CVE-2024-2201, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-24855, CVE-2024-24861, CVE-2024-26614, CVE-2024-26642, CVE-2024-26651, CVE-2024-26671, CVE-2024-26675, CVE-2024-26689, CVE-2024-26704, CVE-2024-26733, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744, CVE-2024-26747, CVE-2024-26754, CVE-2024-26763, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26777, CVE-2024-26778, CVE-2024-26779, CVE-2024-26791, CVE-2024-26793, CVE-2024-26805, CVE-2024-26816, CVE-2024-26817, CVE-2024-26839, CVE-2024-26840, CVE-2024-26852, CVE-2024-26855, CVE-2024-26857, CVE-2024-26859, CVE-2024-26876, CVE-2024-26878, CVE-2024-26883, CVE-2024-26884, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26907, CVE-2024-26922, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26948, CVE-2024-26993, CVE-2024-27008, CVE-2024-27013, CVE-2024-27014, CVE-2024-27043, CVE-2024-27046, CVE-2024-27054, CVE-2024-27072, CVE-2024-27073, CVE-2024-27074, CVE-2024-27075, CVE-2024-27078, CVE-2024-27388
Jira References: PED-5759
Maintenance Incident: [SUSE:Maintenance:33343](https://smelt.suse.de/incident/33343/)
Sources used:
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src):
 kernel-syms-azure-4.12.14-16.182.1, kernel-source-azure-4.12.14-16.182.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src):
 kernel-syms-azure-4.12.14-16.182.1, kernel-source-azure-4.12.14-16.182.1
SUSE Linux Enterprise Server 12 SP5 (src):
 kernel-syms-azure-4.12.14-16.182.1, kernel-source-azure-4.12.14-16.182.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Maintenance Automation 2024-05-21 16:30:32 UTC
SUSE-SU-2024:1648-2: An update that solves 193 vulnerabilities, contains one feature and has 17 security fixes can now be installed.

Category: security (important)
Bug References: 1084332, 1141539, 1184509, 1186060, 1190317, 1190576, 1192145, 1194516, 1203935, 1209657, 1211592, 1212514, 1213456, 1217339, 1217987, 1217988, 1217989, 1218220, 1218336, 1218479, 1218562, 1219104, 1219169, 1219170, 1219618, 1219623, 1219847, 1220320, 1220366, 1220394, 1220411, 1220416, 1220418, 1220422, 1220442, 1220445, 1220505, 1220521, 1220528, 1220536, 1220538, 1220554, 1220572, 1220580, 1220611, 1220625, 1220628, 1220637, 1220640, 1220662, 1220687, 1220692, 1220703, 1220706, 1220739, 1220742, 1220743, 1220745, 1220751, 1220768, 1220769, 1220777, 1220790, 1220794, 1220829, 1220836, 1220843, 1220846, 1220850, 1220871, 1220927, 1220960, 1220985, 1220987, 1221044, 1221046, 1221048, 1221058, 1221060, 1221061, 1221077, 1221082, 1221088, 1221162, 1221277, 1221293, 1221337, 1221532, 1221541, 1221548, 1221575, 1221605, 1221608, 1221617, 1221791, 1221816, 1221825, 1221830, 1221862, 1221934, 1221949, 1221952, 1221953, 1221965, 1221966, 1221967, 1221969, 1221972, 1221973, 1221977, 1221979, 1221988, 1221991, 1221993, 1221994, 1221997, 1221998, 1221999, 1222000, 1222001, 1222002, 1222117, 1222294, 1222300, 1222357, 1222379, 1222422, 1222428, 1222449, 1222503, 1222559, 1222585, 1222609, 1222610, 1222613, 1222618, 1222619, 1222624, 1222630, 1222632, 1222660, 1222662, 1222664, 1222666, 1222669, 1222671, 1222677, 1222706, 1222720, 1222765, 1222770, 1222772, 1222787, 1222790, 1222812, 1222836, 1222869, 1222876, 1222878, 1222881, 1222883, 1222888, 1222952, 1222961, 1222975, 1222976, 1223016, 1223035, 1223049, 1223051, 1223057, 1223058, 1223060, 1223187, 1223189, 1223198, 1223203, 1223315, 1223432, 1223509, 1223512, 1223513, 1223516, 1223518, 1223626, 1223627, 1223664, 1223686, 1223693, 1223712, 1223715, 1223735, 1223744, 1223745, 1223770, 1223781, 1223819, 1223824, 1223827, 1223837, 1223842, 1223843, 1223844, 1223883, 1223885, 1223921, 1223941, 1223952, 1223953, 1223954
CVE References: CVE-2019-25160, CVE-2020-36312, CVE-2021-23134, CVE-2021-46904, CVE-2021-46905, CVE-2021-46907, CVE-2021-46909, CVE-2021-46938, CVE-2021-46939, CVE-2021-46941, CVE-2021-46950, CVE-2021-46958, CVE-2021-46960, CVE-2021-46963, CVE-2021-46964, CVE-2021-46966, CVE-2021-46975, CVE-2021-46981, CVE-2021-46988, CVE-2021-46990, CVE-2021-46998, CVE-2021-47006, CVE-2021-47015, CVE-2021-47024, CVE-2021-47034, CVE-2021-47045, CVE-2021-47049, CVE-2021-47055, CVE-2021-47056, CVE-2021-47060, CVE-2021-47061, CVE-2021-47063, CVE-2021-47068, CVE-2021-47070, CVE-2021-47071, CVE-2021-47073, CVE-2021-47100, CVE-2021-47101, CVE-2021-47104, CVE-2021-47110, CVE-2021-47112, CVE-2021-47114, CVE-2021-47117, CVE-2021-47118, CVE-2021-47119, CVE-2021-47138, CVE-2021-47141, CVE-2021-47142, CVE-2021-47143, CVE-2021-47146, CVE-2021-47149, CVE-2021-47150, CVE-2021-47153, CVE-2021-47159, CVE-2021-47161, CVE-2021-47162, CVE-2021-47165, CVE-2021-47166, CVE-2021-47167, CVE-2021-47168, CVE-2021-47169, CVE-2021-47171, CVE-2021-47173, CVE-2021-47177, CVE-2021-47179, CVE-2021-47180, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47188, CVE-2021-47189, CVE-2021-47198, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47207, CVE-2021-47211, CVE-2021-47216, CVE-2021-47217, CVE-2022-0487, CVE-2022-48619, CVE-2022-48626, CVE-2022-48636, CVE-2022-48650, CVE-2022-48651, CVE-2022-48667, CVE-2022-48668, CVE-2022-48687, CVE-2022-48688, CVE-2022-48695, CVE-2022-48701, CVE-2023-0160, CVE-2023-28746, CVE-2023-35827, CVE-2023-52454, CVE-2023-52469, CVE-2023-52470, CVE-2023-52474, CVE-2023-52476, CVE-2023-52477, CVE-2023-52486, CVE-2023-52488, CVE-2023-52509, CVE-2023-52515, CVE-2023-52524, CVE-2023-52528, CVE-2023-52575, CVE-2023-52583, CVE-2023-52587, CVE-2023-52590, CVE-2023-52591, CVE-2023-52595, CVE-2023-52598, CVE-2023-52607, CVE-2023-52614, CVE-2023-52620, CVE-2023-52628, CVE-2023-52635, CVE-2023-52639, CVE-2023-52644, CVE-2023-52646, CVE-2023-52650, CVE-2023-52652, CVE-2023-52653, CVE-2023-6270, CVE-2023-6356, CVE-2023-6535, CVE-2023-6536, CVE-2023-7042, CVE-2023-7192, CVE-2024-2201, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-24855, CVE-2024-24861, CVE-2024-26614, CVE-2024-26642, CVE-2024-26651, CVE-2024-26671, CVE-2024-26675, CVE-2024-26689, CVE-2024-26704, CVE-2024-26733, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744, CVE-2024-26747, CVE-2024-26754, CVE-2024-26763, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26777, CVE-2024-26778, CVE-2024-26779, CVE-2024-26793, CVE-2024-26805, CVE-2024-26816, CVE-2024-26817, CVE-2024-26839, CVE-2024-26840, CVE-2024-26852, CVE-2024-26855, CVE-2024-26857, CVE-2024-26859, CVE-2024-26878, CVE-2024-26883, CVE-2024-26884, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26907, CVE-2024-26922, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26948, CVE-2024-26993, CVE-2024-27013, CVE-2024-27014, CVE-2024-27043, CVE-2024-27046, CVE-2024-27054, CVE-2024-27072, CVE-2024-27073, CVE-2024-27074, CVE-2024-27075, CVE-2024-27078, CVE-2024-27388
Jira References: PED-5759
Maintenance Incident: [SUSE:Maintenance:33233](https://smelt.suse.de/incident/33233/)
Sources used:
SUSE Linux Enterprise Live Patching 12-SP5 (src):
 kgraft-patch-SLE12-SP5_Update_55-1-8.11.1
SUSE Linux Enterprise Software Development Kit 12 SP5 (src):
 kernel-obs-build-4.12.14-122.212.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src):
 kernel-source-4.12.14-122.212.1, kernel-syms-4.12.14-122.212.1
SUSE Linux Enterprise Server 12 SP5 (src):
 kernel-source-4.12.14-122.212.1, kernel-syms-4.12.14-122.212.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src):
 kernel-source-4.12.14-122.212.1, kernel-syms-4.12.14-122.212.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 14 Maintenance Automation 2024-05-30 16:30:32 UTC
SUSE-SU-2024:1870-1: An update that solves 193 vulnerabilities, contains one feature and has 18 security fixes can now be installed.

Category: security (important)
Bug References: 1084332, 1141539, 1184509, 1186060, 1190317, 1190576, 1192145, 1194516, 1203935, 1209657, 1211592, 1212514, 1213456, 1217339, 1217987, 1217988, 1217989, 1218220, 1218336, 1218479, 1218562, 1219104, 1219169, 1219170, 1219618, 1219623, 1219847, 1220320, 1220366, 1220394, 1220411, 1220416, 1220418, 1220422, 1220442, 1220445, 1220505, 1220521, 1220528, 1220536, 1220538, 1220554, 1220572, 1220580, 1220611, 1220625, 1220628, 1220637, 1220640, 1220662, 1220687, 1220692, 1220703, 1220706, 1220739, 1220742, 1220743, 1220745, 1220751, 1220768, 1220769, 1220777, 1220790, 1220794, 1220829, 1220836, 1220843, 1220846, 1220850, 1220871, 1220927, 1220960, 1220985, 1220987, 1221044, 1221046, 1221048, 1221058, 1221060, 1221061, 1221077, 1221082, 1221088, 1221162, 1221277, 1221293, 1221337, 1221532, 1221541, 1221548, 1221575, 1221605, 1221608, 1221617, 1221791, 1221816, 1221825, 1221830, 1221862, 1221934, 1221949, 1221952, 1221953, 1221965, 1221966, 1221967, 1221969, 1221972, 1221973, 1221977, 1221979, 1221988, 1221991, 1221993, 1221994, 1221997, 1221998, 1221999, 1222000, 1222001, 1222002, 1222117, 1222294, 1222300, 1222357, 1222379, 1222422, 1222428, 1222449, 1222503, 1222559, 1222585, 1222609, 1222610, 1222613, 1222618, 1222619, 1222624, 1222630, 1222632, 1222660, 1222662, 1222664, 1222666, 1222669, 1222671, 1222677, 1222706, 1222720, 1222765, 1222770, 1222772, 1222787, 1222790, 1222812, 1222836, 1222869, 1222876, 1222878, 1222881, 1222883, 1222888, 1222952, 1222961, 1222975, 1222976, 1223016, 1223035, 1223049, 1223051, 1223057, 1223058, 1223060, 1223187, 1223189, 1223198, 1223203, 1223315, 1223432, 1223509, 1223512, 1223513, 1223516, 1223518, 1223626, 1223627, 1223664, 1223686, 1223693, 1223712, 1223715, 1223735, 1223744, 1223745, 1223770, 1223781, 1223819, 1223824, 1223827, 1223837, 1223842, 1223843, 1223844, 1223883, 1223885, 1223921, 1223941, 1223952, 1223953, 1223954, 1224785
CVE References: CVE-2019-25160, CVE-2020-36312, CVE-2021-23134, CVE-2021-46904, CVE-2021-46905, CVE-2021-46907, CVE-2021-46909, CVE-2021-46938, CVE-2021-46939, CVE-2021-46941, CVE-2021-46950, CVE-2021-46958, CVE-2021-46960, CVE-2021-46963, CVE-2021-46964, CVE-2021-46966, CVE-2021-46975, CVE-2021-46981, CVE-2021-46988, CVE-2021-46990, CVE-2021-46998, CVE-2021-47006, CVE-2021-47015, CVE-2021-47024, CVE-2021-47034, CVE-2021-47045, CVE-2021-47049, CVE-2021-47055, CVE-2021-47056, CVE-2021-47060, CVE-2021-47061, CVE-2021-47063, CVE-2021-47068, CVE-2021-47070, CVE-2021-47071, CVE-2021-47073, CVE-2021-47100, CVE-2021-47101, CVE-2021-47104, CVE-2021-47110, CVE-2021-47112, CVE-2021-47114, CVE-2021-47117, CVE-2021-47118, CVE-2021-47119, CVE-2021-47138, CVE-2021-47141, CVE-2021-47142, CVE-2021-47143, CVE-2021-47146, CVE-2021-47149, CVE-2021-47150, CVE-2021-47153, CVE-2021-47159, CVE-2021-47161, CVE-2021-47162, CVE-2021-47165, CVE-2021-47166, CVE-2021-47167, CVE-2021-47168, CVE-2021-47169, CVE-2021-47171, CVE-2021-47173, CVE-2021-47177, CVE-2021-47179, CVE-2021-47180, CVE-2021-47181, CVE-2021-47182, CVE-2021-47183, CVE-2021-47184, CVE-2021-47185, CVE-2021-47188, CVE-2021-47189, CVE-2021-47198, CVE-2021-47202, CVE-2021-47203, CVE-2021-47204, CVE-2021-47205, CVE-2021-47207, CVE-2021-47211, CVE-2021-47216, CVE-2021-47217, CVE-2022-0487, CVE-2022-48619, CVE-2022-48626, CVE-2022-48636, CVE-2022-48650, CVE-2022-48651, CVE-2022-48667, CVE-2022-48668, CVE-2022-48687, CVE-2022-48688, CVE-2022-48695, CVE-2022-48701, CVE-2023-0160, CVE-2023-28746, CVE-2023-35827, CVE-2023-52454, CVE-2023-52469, CVE-2023-52470, CVE-2023-52474, CVE-2023-52476, CVE-2023-52477, CVE-2023-52486, CVE-2023-52488, CVE-2023-52509, CVE-2023-52515, CVE-2023-52524, CVE-2023-52528, CVE-2023-52575, CVE-2023-52583, CVE-2023-52587, CVE-2023-52590, CVE-2023-52591, CVE-2023-52595, CVE-2023-52598, CVE-2023-52607, CVE-2023-52614, CVE-2023-52620, CVE-2023-52628, CVE-2023-52635, CVE-2023-52639, CVE-2023-52644, CVE-2023-52646, CVE-2023-52650, CVE-2023-52652, CVE-2023-52653, CVE-2023-6270, CVE-2023-6356, CVE-2023-6535, CVE-2023-6536, CVE-2023-7042, CVE-2023-7192, CVE-2024-2201, CVE-2024-22099, CVE-2024-23307, CVE-2024-23848, CVE-2024-24855, CVE-2024-24861, CVE-2024-26614, CVE-2024-26642, CVE-2024-26651, CVE-2024-26671, CVE-2024-26675, CVE-2024-26689, CVE-2024-26704, CVE-2024-26733, CVE-2024-26739, CVE-2024-26743, CVE-2024-26744, CVE-2024-26747, CVE-2024-26754, CVE-2024-26763, CVE-2024-26771, CVE-2024-26772, CVE-2024-26773, CVE-2024-26777, CVE-2024-26778, CVE-2024-26779, CVE-2024-26793, CVE-2024-26805, CVE-2024-26816, CVE-2024-26817, CVE-2024-26839, CVE-2024-26840, CVE-2024-26852, CVE-2024-26855, CVE-2024-26857, CVE-2024-26859, CVE-2024-26878, CVE-2024-26883, CVE-2024-26884, CVE-2024-26898, CVE-2024-26901, CVE-2024-26903, CVE-2024-26907, CVE-2024-26922, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26948, CVE-2024-26993, CVE-2024-27013, CVE-2024-27014, CVE-2024-27043, CVE-2024-27046, CVE-2024-27054, CVE-2024-27072, CVE-2024-27073, CVE-2024-27074, CVE-2024-27075, CVE-2024-27078, CVE-2024-27388
Jira References: PED-5759
Maintenance Incident: [SUSE:Maintenance:34082](https://smelt.suse.de/incident/34082/)
Sources used:
SUSE Linux Enterprise Live Patching 12-SP5 (src):
 kgraft-patch-SLE12-SP5_Update_56-1-8.3.1
SUSE Linux Enterprise Software Development Kit 12 SP5 (src):
 kernel-obs-build-4.12.14-122.216.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src):
 kernel-syms-4.12.14-122.216.1, kernel-source-4.12.14-122.216.1
SUSE Linux Enterprise Server 12 SP5 (src):
 kernel-syms-4.12.14-122.216.1, kernel-source-4.12.14-122.216.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src):
 kernel-syms-4.12.14-122.216.1, kernel-source-4.12.14-122.216.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.