drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Linux
| Name: |
Mehrere Probleme in Linux |
|
| ID: |
SUSE-SU-2025:0833-2 |
|
| Distribution: |
SUSE |
|
| Plattformen: |
SUSE Linux Enterprise Server for SAP Applications 15 SP5, SUSE Linux Enterprise Server 15 SP5, SUSE Linux Enterprise High Performance Computing 15 SP5, SUSE Linux Enterprise Micro 5.5, SUSE Linux Enterprise High Performance Computing LTSS 15 SP5, SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5, SUSE Linux Enterprise Server 15 SP5 LTSS |
|
| Datum: |
Di, 11. März 2025, 19:54 |
|
| Referenzen: |
https://www.cve.org/CVERecord?id=CVE-2024-53135
https://www.cve.org/CVERecord?id=CVE-2025-21699
https://www.cve.org/CVERecord?id=CVE-2023-52572
https://www.cve.org/CVERecord?id=CVE-2025-21692
https://www.cve.org/CVERecord?id=CVE-2024-53173
https://www.cve.org/CVERecord?id=CVE-2025-21647
https://www.cve.org/CVERecord?id=CVE-2024-53226
https://www.cve.org/CVERecord?id=CVE-2024-56605
https://www.cve.org/CVERecord?id=CVE-2023-1192
https://www.cve.org/CVERecord?id=CVE-2024-50115
https://www.cve.org/CVERecord?id=CVE-2024-53239
https://www.cve.org/CVERecord?id=CVE-2024-57948
https://www.cve.org/CVERecord?id=CVE-2024-56539
https://www.cve.org/CVERecord?id=CVE-2025-21690
https://www.cve.org/CVERecord?id=CVE-2022-49080
https://www.cve.org/CVERecord?id=CVE-2024-56548 |
|
| Applikationen: |
Linux |
|
Originalnachricht |
--===============3143193166272016848== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2025:0833-2 Release Date: 2025-03-11T15:28:58Z Rating: important References:
* bsc#1208995 * bsc#1220946 * bsc#1225742 * bsc#1232472 * bsc#1232919 * bsc#1233701 * bsc#1233749 * bsc#1234154 * bsc#1234650 * bsc#1234853 * bsc#1234891 * bsc#1234963 * bsc#1235054 * bsc#1235061 * bsc#1235073 * bsc#1235111 * bsc#1236133 * bsc#1236289 * bsc#1236576 * bsc#1236661 * bsc#1236677 * bsc#1236757 * bsc#1236758 * bsc#1236760 * bsc#1236761 * bsc#1236777 * bsc#1236951 * bsc#1237025 * bsc#1237028 * bsc#1237139 * bsc#1237316 * bsc#1237693 * bsc#1238033
Cross-References:
* CVE-2022-49080 * CVE-2023-1192 * CVE-2023-52572 * CVE-2024-50115 * CVE-2024-53135 * CVE-2024-53173 * CVE-2024-53226 * CVE-2024-53239 * CVE-2024-56539 * CVE-2024-56548 * CVE-2024-56605 * CVE-2024-57948 * CVE-2025-21647 * CVE-2025-21690 * CVE-2025-21692 * CVE-2025-21699
CVSS scores:
* CVE-2022-49080 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49080 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1192 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1192 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52572 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-52572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50115 ( SUSE ): 4.5 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H * CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H * CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53135 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2024-53173 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53226 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-53226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53226 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53239 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56539 ( SUSE ): 8.6 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2024-56548 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57948 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57948 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21647 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21647 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21690 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21690 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21692 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21699 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves 16 vulnerabilities and has 17 security fixes can now be installed.
## Description:
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
* CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238033). * CVE-2024-53135: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN (bsc#1234154). * CVE-2024-53226: RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (bsc#1236576) * CVE-2024-57948: mac802154: check local interfaces before deleting sdata list (bsc#1236677). * CVE-2025-21647: sched: sch_cake: add bounds checks to host bulk flow fairness counts (bsc#1236133). * CVE-2025-21690: scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (bsc#1237025). * CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028). * CVE-2025-21699: gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (bsc#1237139).
The following non-security bugs were fixed:
* cpufreq/amd-pstate: Only print supported EPP values for performance governor (bsc#1236777). * iavf: fix the waiting time for initial reset (bsc#1235111). * ice: add ice_adapter for shared data across PFs on the same NIC (bsc#1235111). * ice: avoid the PTP hardware semaphore in gettimex64 path (bsc#1235111). * ice: fold ice_ptp_read_time into ice_ptp_gettimex64 (bsc#1235111). * idpf: call set_real_num_queues in idpf_open (bsc#1236661 bsc#1237316). * ipv4/tcp: do not use per netns ctl sockets (bsc#1237693). * kabi: hide adding RCU head into struct netdev_name_node (bsc#1233749). * net: Fix undefined behavior in netdev name allocation (bsc#1233749). * net: avoid UAF on deleted altname (bsc#1233749). * net: check for altname conflicts when changing netdev's netns (bsc#1233749). * net: core: Use the bitmap API to allocate bitmaps (bsc#1233749). * net: do not send a MOVE event when netdev changes netns (bsc#1233749). * net: do not use input buffer of __dev_alloc_name() as a scratch space (bsc#1233749). * net: fix ifname in netlink ntf during netns move (bsc#1233749). * net: fix removing a namespace with conflicting altnames (bsc#1233749). * net: free altname using an RCU callback (bsc#1233749). * net: introduce a function to check if a netdev name is in use (bsc#1233749). * net: make dev_alloc_name() call dev_prep_valid_name() (bsc#1233749). * net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761). * net: mana: Cleanup "mana" debugfs dir after cleanup of all children (bsc#1236760). * net: mana: Enable debugfs files for MANA device (bsc#1236758). * net: minor __dev_alloc_name() optimization (bsc#1233749). * net: move altnames together with the netdevice (bsc#1233749). * net: netvsc: Update default VMBus channels (bsc#1236757). * net: reduce indentation of __dev_alloc_name() (bsc#1233749). * net: remove dev_valid_name() check from __dev_alloc_name() (bsc#1233749). * net: remove else after return in dev_prep_valid_name() (bsc#1233749). * net: trust the bitmap in __dev_alloc_name() (bsc#1233749). * nfsd: use explicit lock/unlock for directory ops (bsc#1234650 bsc#1233701 bsc#1232472). * rcu: Remove rcu_is_idle_cpu() (bsc#1236289). * scsi: storvsc: Set correct data length for sending SCSI command without payload (git-fixes). * x86/aperfmperf: Dont wake idle CPUs in arch_freq_get_on_cpu() (bsc#1236289). * x86/aperfmperf: Integrate the fallback code from show_cpuinfo() (bsc#1236289). * x86/aperfmperf: Make parts of the frequency invariance code unconditional (bsc#1236289). * x86/aperfmperf: Put frequency invariance aperf/mperf data into a struct (bsc#1236289). * x86/aperfmperf: Replace aperfmperf_get_khz() (bsc#1236289). * x86/aperfmperf: Replace arch_freq_get_on_cpu() (bsc#1236289). * x86/aperfmperf: Restructure arch_scale_freq_tick() (bsc#1236289). * x86/aperfmperf: Separate AP/BP frequency invariance init (bsc#1236289). * x86/aperfmperf: Store aperf/mperf data for cpu frequency reads (bsc#1236289). * x86/aperfmperf: Untangle Intel and AMD frequency invariance init (bsc#1236289). * x86/aperfperf: Make it correct on 32bit and UP kernels (bsc#1236289). * x86/smp: Move APERF/MPERF code where it belongs (bsc#1236289). * x86/smp: Remove unnecessary assignment to local var freq_scale (bsc#1236289). * x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes). * x86/xen: allow larger contiguous memory regions in PV guests (bsc#1236951). * x86/xen: fix xen_hypercall_hvm() to not clobber %rbx (git-fixes). * xen/swiotlb: relax alignment requirements (bsc#1236951).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-833=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-833=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-833=1
* SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-833=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-833=1
## Package List:
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.97.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) * kernel-default-base-5.14.21-150500.55.97.1.150500.6.45.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-5.14.21-150500.55.97.1 * kernel-default-debuginfo-5.14.21-150500.55.97.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * kernel-macros-5.14.21-150500.55.97.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * ocfs2-kmp-default-5.14.21-150500.55.97.1 * kernel-default-debuginfo-5.14.21-150500.55.97.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1 * kernel-default-devel-5.14.21-150500.55.97.1 * kernel-syms-5.14.21-150500.55.97.1 * kernel-default-debugsource-5.14.21-150500.55.97.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.97.1 * dlm-kmp-default-5.14.21-150500.55.97.1 * kernel-obs-build-debugsource-5.14.21-150500.55.97.1 * kernel-default-base-5.14.21-150500.55.97.1.150500.6.45.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.97.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.97.1 * kernel-obs-build-5.14.21-150500.55.97.1 * cluster-md-kmp-default-5.14.21-150500.55.97.1 * gfs2-kmp-default-5.14.21-150500.55.97.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.97.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64) * kernel-64kb-debugsource-5.14.21-150500.55.97.1 * kernel-64kb-devel-5.14.21-150500.55.97.1 * kernel-64kb-debuginfo-5.14.21-150500.55.97.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.97.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150500.55.97.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * kernel-macros-5.14.21-150500.55.97.1 * kernel-devel-5.14.21-150500.55.97.1 * kernel-source-5.14.21-150500.55.97.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.97.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * ocfs2-kmp-default-5.14.21-150500.55.97.1 * kernel-default-debuginfo-5.14.21-150500.55.97.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1 * kernel-default-devel-5.14.21-150500.55.97.1 * kernel-syms-5.14.21-150500.55.97.1 * kernel-default-debugsource-5.14.21-150500.55.97.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.97.1 * dlm-kmp-default-5.14.21-150500.55.97.1 * kernel-obs-build-debugsource-5.14.21-150500.55.97.1 * kernel-default-base-5.14.21-150500.55.97.1.150500.6.45.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.97.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.97.1 * kernel-obs-build-5.14.21-150500.55.97.1 * cluster-md-kmp-default-5.14.21-150500.55.97.1 * gfs2-kmp-default-5.14.21-150500.55.97.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.97.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64) * kernel-64kb-debugsource-5.14.21-150500.55.97.1 * kernel-64kb-devel-5.14.21-150500.55.97.1 * kernel-64kb-debuginfo-5.14.21-150500.55.97.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.97.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150500.55.97.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * kernel-macros-5.14.21-150500.55.97.1 * kernel-devel-5.14.21-150500.55.97.1 * kernel-source-5.14.21-150500.55.97.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.97.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * ocfs2-kmp-default-5.14.21-150500.55.97.1 * kernel-default-debuginfo-5.14.21-150500.55.97.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1 * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.97.1 * kernel-default-devel-5.14.21-150500.55.97.1 * kernel-syms-5.14.21-150500.55.97.1 * kernel-default-debugsource-5.14.21-150500.55.97.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.97.1 * dlm-kmp-default-5.14.21-150500.55.97.1 * kernel-obs-build-debugsource-5.14.21-150500.55.97.1 * reiserfs-kmp-default-5.14.21-150500.55.97.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.97.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.97.1 * kernel-obs-build-5.14.21-150500.55.97.1 * cluster-md-kmp-default-5.14.21-150500.55.97.1 * gfs2-kmp-default-5.14.21-150500.55.97.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 nosrc) * kernel-64kb-5.14.21-150500.55.97.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64) * kernel-64kb-debugsource-5.14.21-150500.55.97.1 * kernel-64kb-devel-5.14.21-150500.55.97.1 * kernel-64kb-debuginfo-5.14.21-150500.55.97.1 * kernel-64kb-devel-debuginfo-5.14.21-150500.55.97.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150500.55.97.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150500.55.97.1.150500.6.45.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * kernel-macros-5.14.21-150500.55.97.1 * kernel-devel-5.14.21-150500.55.97.1 * kernel-source-5.14.21-150500.55.97.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch nosrc) * kernel-docs-5.14.21-150500.55.97.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (nosrc s390x) * kernel-zfcpdump-5.14.21-150500.55.97.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150500.55.97.1 * kernel-zfcpdump-debugsource-5.14.21-150500.55.97.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * ocfs2-kmp-default-5.14.21-150500.55.97.1 * kernel-default-debuginfo-5.14.21-150500.55.97.1 * ocfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1 * reiserfs-kmp-default-debuginfo-5.14.21-150500.55.97.1 * kernel-default-devel-5.14.21-150500.55.97.1 * kernel-syms-5.14.21-150500.55.97.1 * kernel-default-debugsource-5.14.21-150500.55.97.1 * dlm-kmp-default-debuginfo-5.14.21-150500.55.97.1 * dlm-kmp-default-5.14.21-150500.55.97.1 * kernel-obs-build-debugsource-5.14.21-150500.55.97.1 * kernel-default-base-5.14.21-150500.55.97.1.150500.6.45.1 * kernel-default-devel-debuginfo-5.14.21-150500.55.97.1 * reiserfs-kmp-default-5.14.21-150500.55.97.1 * cluster-md-kmp-default-debuginfo-5.14.21-150500.55.97.1 * kernel-obs-build-5.14.21-150500.55.97.1 * cluster-md-kmp-default-5.14.21-150500.55.97.1 * gfs2-kmp-default-5.14.21-150500.55.97.1 * gfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150500.55.97.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * kernel-macros-5.14.21-150500.55.97.1 * kernel-devel-5.14.21-150500.55.97.1 * kernel-source-5.14.21-150500.55.97.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch nosrc) * kernel-docs-5.14.21-150500.55.97.1
## References:
* https://www.suse.com/security/cve/CVE-2022-49080.html * https://www.suse.com/security/cve/CVE-2023-1192.html * https://www.suse.com/security/cve/CVE-2023-52572.html * https://www.suse.com/security/cve/CVE-2024-50115.html * https://www.suse.com/security/cve/CVE-2024-53135.html * https://www.suse.com/security/cve/CVE-2024-53173.html * https://www.suse.com/security/cve/CVE-2024-53226.html * https://www.suse.com/security/cve/CVE-2024-53239.html * https://www.suse.com/security/cve/CVE-2024-56539.html * https://www.suse.com/security/cve/CVE-2024-56548.html * https://www.suse.com/security/cve/CVE-2024-56605.html * https://www.suse.com/security/cve/CVE-2024-57948.html * https://www.suse.com/security/cve/CVE-2025-21647.html * https://www.suse.com/security/cve/CVE-2025-21690.html * https://www.suse.com/security/cve/CVE-2025-21692.html * https://www.suse.com/security/cve/CVE-2025-21699.html * https://bugzilla.suse.com/show_bug.cgi?id=1208995 * https://bugzilla.suse.com/show_bug.cgi?id=1220946 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1232472 * https://bugzilla.suse.com/show_bug.cgi?id=1232919 * https://bugzilla.suse.com/show_bug.cgi?id=1233701 * https://bugzilla.suse.com/show_bug.cgi?id=1233749 * https://bugzilla.suse.com/show_bug.cgi?id=1234154 * https://bugzilla.suse.com/show_bug.cgi?id=1234650 * https://bugzilla.suse.com/show_bug.cgi?id=1234853 * https://bugzilla.suse.com/show_bug.cgi?id=1234891 * https://bugzilla.suse.com/show_bug.cgi?id=1234963 * https://bugzilla.suse.com/show_bug.cgi?id=1235054 * https://bugzilla.suse.com/show_bug.cgi?id=1235061 * https://bugzilla.suse.com/show_bug.cgi?id=1235073 * https://bugzilla.suse.com/show_bug.cgi?id=1235111 * https://bugzilla.suse.com/show_bug.cgi?id=1236133 * https://bugzilla.suse.com/show_bug.cgi?id=1236289 * https://bugzilla.suse.com/show_bug.cgi?id=1236576 * https://bugzilla.suse.com/show_bug.cgi?id=1236661 * https://bugzilla.suse.com/show_bug.cgi?id=1236677 * https://bugzilla.suse.com/show_bug.cgi?id=1236757 * https://bugzilla.suse.com/show_bug.cgi?id=1236758 * https://bugzilla.suse.com/show_bug.cgi?id=1236760 * https://bugzilla.suse.com/show_bug.cgi?id=1236761 * https://bugzilla.suse.com/show_bug.cgi?id=1236777 * https://bugzilla.suse.com/show_bug.cgi?id=1236951 * https://bugzilla.suse.com/show_bug.cgi?id=1237025 * https://bugzilla.suse.com/show_bug.cgi?id=1237028 * https://bugzilla.suse.com/show_bug.cgi?id=1237139 * https://bugzilla.suse.com/show_bug.cgi?id=1237316 * https://bugzilla.suse.com/show_bug.cgi?id=1237693 * https://bugzilla.suse.com/show_bug.cgi?id=1238033
--===============3143193166272016848== Content-Type: text/html; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
<div class="container"> <h1>Security update for the Linux Kernel</h1>
<table class="table table-striped table-bordered"> <tbody> <tr> <th>Announcement ID:</th> <td>SUSE-SU-2025:0833-2</td> </tr> <tr> <th>Release Date:</th> <td>2025-03-11T15:28:58Z</td> </tr> <tr> <th>Rating:</th> <td>important</td> </tr> <tr> <th>References:</th> <td> <ul> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208995">bsc#1208995</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220946">bsc#1220946</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225742">bsc#1225742</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232472">bsc#1232472</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232919">bsc#1232919</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233701">bsc#1233701</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233749">bsc#1233749</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234154">bsc#1234154</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234650">bsc#1234650</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234853">bsc#1234853</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234891">bsc#1234891</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234963">bsc#1234963</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235054">bsc#1235054</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235061">bsc#1235061</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235073">bsc#1235073</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235111">bsc#1235111</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236133">bsc#1236133</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236289">bsc#1236289</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236576">bsc#1236576</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236661">bsc#1236661</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236677">bsc#1236677</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236757">bsc#1236757</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236758">bsc#1236758</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236760">bsc#1236760</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236761">bsc#1236761</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236777">bsc#1236777</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236951">bsc#1236951</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237025">bsc#1237025</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237028">bsc#1237028</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237139">bsc#1237139</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237316">bsc#1237316</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237693">bsc#1237693</a> </li> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238033">bsc#1238033</a> </li> </ul> </td> </tr> <tr> <th> Cross-References: </th> <td> <ul> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2022-49080.html">CVE-2022-49080</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-1192.html">CVE-2023-1192</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2023-52572.html">CVE-2023-52572</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-50115.html">CVE-2024-50115</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53135.html">CVE-2024-53135</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53173.html">CVE-2024-53173</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53226.html">CVE-2024-53226</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-53239.html">CVE-2024-53239</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-56539.html">CVE-2024-56539</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-56548.html">CVE-2024-56548</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-56605.html">CVE-2024-56605</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2024-57948.html">CVE-2024-57948</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21647.html">CVE-2025-21647</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21690.html">CVE-2025-21690</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21692.html">CVE-2025-21692</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-21699.html">CVE-2025-21699</a> </li> </ul> </td> </tr> <tr> <th>CVSS scores:</th> <td> <ul class="list-group"> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-49080</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.3</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2022-49080</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-1192</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-1192</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52572</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">0.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2023-52572</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50115</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.5</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50115</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.2</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-50115</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53135</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53135</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53173</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.3</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53173</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53173</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53173</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53226</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53226</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53226</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53239</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.5</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53239</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53239</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-53239</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56539</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.6</span> <span class="cvss-vector">CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56539</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.0</span> <span class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56548</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.4</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56548</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56548</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56605</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.5</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56605</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56605</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-56605</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-57948</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.4</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2024-57948</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.7</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21647</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">8.5</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21647</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21690</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21690</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21690</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21692</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.9</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21692</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">7.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21692</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">7.8</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21699</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.8</span> <span class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21699</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-21699</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.5</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span> </li> </ul> </td> </tr> <tr> <th>Affected Products:</th> <td> <ul class="list-group"> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 15 SP5</li> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5</li> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing LTSS 15 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Micro 5.5</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP5 LTSS</li> <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP5</li> </ul> </td> </tr> </tbody> </table>
<p>An update that solves 16 vulnerabilities and has 17 security fixes can now be installed.</p>
<h2>Description:</h2> <p>The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.</p> <p>The following security bugs were fixed:</p> <ul> <li>CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238033).</li> <li>CVE-2024-53135: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN (bsc#1234154).</li> <li>CVE-2024-53226: RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (bsc#1236576)</li> <li>CVE-2024-57948: mac802154: check local interfaces before deleting sdata list (bsc#1236677).</li> <li>CVE-2025-21647: sched: sch_cake: add bounds checks to host bulk flow fairness counts (bsc#1236133).</li> <li>CVE-2025-21690: scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (bsc#1237025).</li> <li>CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028).</li> <li>CVE-2025-21699: gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (bsc#1237139).</li> </ul> <p>The following non-security bugs were fixed:</p> <ul> <li>cpufreq/amd-pstate: Only print supported EPP values for performance governor (bsc#1236777).</li> <li>iavf: fix the waiting time for initial reset (bsc#1235111).</li> <li>ice: add ice_adapter for shared data across PFs on the same NIC (bsc#1235111).</li> <li>ice: avoid the PTP hardware semaphore in gettimex64 path (bsc#1235111).</li> <li>ice: fold ice_ptp_read_time into ice_ptp_gettimex64 (bsc#1235111).</li> <li>idpf: call set_real_num_queues in idpf_open (bsc#1236661 bsc#1237316).</li> <li>ipv4/tcp: do not use per netns ctl sockets (bsc#1237693).</li> <li>kabi: hide adding RCU head into struct netdev_name_node (bsc#1233749).</li> <li>net: Fix undefined behavior in netdev name allocation (bsc#1233749).</li> <li>net: avoid UAF on deleted altname (bsc#1233749).</li> <li>net: check for altname conflicts when changing netdev's netns (bsc#1233749).</li> <li>net: core: Use the bitmap API to allocate bitmaps (bsc#1233749).</li> <li>net: do not send a MOVE event when netdev changes netns (bsc#1233749).</li> <li>net: do not use input buffer of __dev_alloc_name() as a scratch space (bsc#1233749).</li> <li>net: fix ifname in netlink ntf during netns move (bsc#1233749).</li> <li>net: fix removing a namespace with conflicting altnames (bsc#1233749).</li> <li>net: free altname using an RCU callback (bsc#1233749).</li> <li>net: introduce a function to check if a netdev name is in use (bsc#1233749).</li> <li>net: make dev_alloc_name() call dev_prep_valid_name() (bsc#1233749).</li> <li>net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761).</li> <li>net: mana: Cleanup "mana" debugfs dir after cleanup of all children (bsc#1236760).</li> <li>net: mana: Enable debugfs files for MANA device (bsc#1236758).</li> <li>net: minor __dev_alloc_name() optimization (bsc#1233749).</li> <li>net: move altnames together with the netdevice (bsc#1233749).</li> <li>net: netvsc: Update default VMBus channels (bsc#1236757).</li> <li>net: reduce indentation of __dev_alloc_name() (bsc#1233749).</li> <li>net: remove dev_valid_name() check from __dev_alloc_name() (bsc#1233749).</li> <li>net: remove else after return in dev_prep_valid_name() (bsc#1233749).</li> <li>net: trust the bitmap in __dev_alloc_name() (bsc#1233749).</li> <li>nfsd: use explicit lock/unlock for directory ops (bsc#1234650 bsc#1233701 bsc#1232472).</li> <li>rcu: Remove rcu_is_idle_cpu() (bsc#1236289).</li> <li>scsi: storvsc: Set correct data length for sending SCSI command without payload (git-fixes).</li> <li>x86/aperfmperf: Dont wake idle CPUs in arch_freq_get_on_cpu() (bsc#1236289).</li> <li>x86/aperfmperf: Integrate the fallback code from show_cpuinfo() (bsc#1236289).</li> <li>x86/aperfmperf: Make parts of the frequency invariance code unconditional (bsc#1236289).</li> <li>x86/aperfmperf: Put frequency invariance aperf/mperf data into a struct (bsc#1236289).</li> <li>x86/aperfmperf: Replace aperfmperf_get_khz() (bsc#1236289).</li> <li>x86/aperfmperf: Replace arch_freq_get_on_cpu() (bsc#1236289).</li> <li>x86/aperfmperf: Restructure arch_scale_freq_tick() (bsc#1236289).</li> <li>x86/aperfmperf: Separate AP/BP frequency invariance init (bsc#1236289).</li> <li>x86/aperfmperf: Store aperf/mperf data for cpu frequency reads (bsc#1236289).</li> <li>x86/aperfmperf: Untangle Intel and AMD frequency invariance init (bsc#1236289).</li> <li>x86/aperfperf: Make it correct on 32bit and UP kernels (bsc#1236289).</li> <li>x86/smp: Move APERF/MPERF code where it belongs (bsc#1236289).</li> <li>x86/smp: Remove unnecessary assignment to local var freq_scale (bsc#1236289).</li> <li>x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes).</li> <li>x86/xen: allow larger contiguous memory regions in PV guests (bsc#1236951).</li> <li>x86/xen: fix xen_hypercall_hvm() to not clobber %rbx (git-fixes).</li> <li>xen/swiotlb: relax alignment requirements (bsc#1236951).</li> </ul>
<h2>Special Instructions and Notes:</h2> <ul> <li>Please reboot the system after installing this update.</li> </ul>
<h2>Patch Instructions:</h2> <p> To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product: </p> <ul class="list-group"> <li class="list-group-item"> SUSE Linux Enterprise Micro 5.5 <br/> <code>zypper in -t patch SUSE-SLE-Micro-5.5-2025-833=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 <br/> <code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-833=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 <br/> <code>zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-833=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Server 15 SP5 LTSS <br/> <code>zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-833=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Server for SAP Applications 15 SP5 <br/> <code>zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-833=1</code> </li> </ul>
<h2>Package List:</h2> <ul> <li> SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64 nosrc) <ul> <li>kernel-default-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) <ul> <li>kernel-default-base-5.14.21-150500.55.97.1.150500.6.45.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) <ul> <li>kernel-default-debugsource-5.14.21-150500.55.97.1</li> <li>kernel-default-debuginfo-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise Micro 5.5 (noarch) <ul> <li>kernel-macros-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) <ul> <li>ocfs2-kmp-default-5.14.21-150500.55.97.1</li> <li>kernel-default-debuginfo-5.14.21-150500.55.97.1</li> <li>ocfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1</li> <li>kernel-default-devel-5.14.21-150500.55.97.1</li> <li>kernel-syms-5.14.21-150500.55.97.1</li> <li>kernel-default-debugsource-5.14.21-150500.55.97.1</li> <li>dlm-kmp-default-debuginfo-5.14.21-150500.55.97.1</li> <li>dlm-kmp-default-5.14.21-150500.55.97.1</li> <li>kernel-obs-build-debugsource-5.14.21-150500.55.97.1</li> <li>kernel-default-base-5.14.21-150500.55.97.1.150500.6.45.1</li> <li>kernel-default-devel-debuginfo-5.14.21-150500.55.97.1</li> <li>cluster-md-kmp-default-debuginfo-5.14.21-150500.55.97.1</li> <li>kernel-obs-build-5.14.21-150500.55.97.1</li> <li>cluster-md-kmp-default-5.14.21-150500.55.97.1</li> <li>gfs2-kmp-default-5.14.21-150500.55.97.1</li> <li>gfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc) <ul> <li>kernel-64kb-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64) <ul> <li>kernel-64kb-debugsource-5.14.21-150500.55.97.1</li> <li>kernel-64kb-devel-5.14.21-150500.55.97.1</li> <li>kernel-64kb-debuginfo-5.14.21-150500.55.97.1</li> <li>kernel-64kb-devel-debuginfo-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc x86_64) <ul> <li>kernel-default-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) <ul> <li>kernel-macros-5.14.21-150500.55.97.1</li> <li>kernel-devel-5.14.21-150500.55.97.1</li> <li>kernel-source-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch nosrc) <ul> <li>kernel-docs-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) <ul> <li>ocfs2-kmp-default-5.14.21-150500.55.97.1</li> <li>kernel-default-debuginfo-5.14.21-150500.55.97.1</li> <li>ocfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1</li> <li>kernel-default-devel-5.14.21-150500.55.97.1</li> <li>kernel-syms-5.14.21-150500.55.97.1</li> <li>kernel-default-debugsource-5.14.21-150500.55.97.1</li> <li>dlm-kmp-default-debuginfo-5.14.21-150500.55.97.1</li> <li>dlm-kmp-default-5.14.21-150500.55.97.1</li> <li>kernel-obs-build-debugsource-5.14.21-150500.55.97.1</li> <li>kernel-default-base-5.14.21-150500.55.97.1.150500.6.45.1</li> <li>kernel-default-devel-debuginfo-5.14.21-150500.55.97.1</li> <li>cluster-md-kmp-default-debuginfo-5.14.21-150500.55.97.1</li> <li>kernel-obs-build-5.14.21-150500.55.97.1</li> <li>cluster-md-kmp-default-5.14.21-150500.55.97.1</li> <li>gfs2-kmp-default-5.14.21-150500.55.97.1</li> <li>gfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc) <ul> <li>kernel-64kb-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64) <ul> <li>kernel-64kb-debugsource-5.14.21-150500.55.97.1</li> <li>kernel-64kb-devel-5.14.21-150500.55.97.1</li> <li>kernel-64kb-debuginfo-5.14.21-150500.55.97.1</li> <li>kernel-64kb-devel-debuginfo-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc x86_64) <ul> <li>kernel-default-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) <ul> <li>kernel-macros-5.14.21-150500.55.97.1</li> <li>kernel-devel-5.14.21-150500.55.97.1</li> <li>kernel-source-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch nosrc) <ul> <li>kernel-docs-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) <ul> <li>ocfs2-kmp-default-5.14.21-150500.55.97.1</li> <li>kernel-default-debuginfo-5.14.21-150500.55.97.1</li> <li>ocfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1</li> <li>reiserfs-kmp-default-debuginfo-5.14.21-150500.55.97.1</li> <li>kernel-default-devel-5.14.21-150500.55.97.1</li> <li>kernel-syms-5.14.21-150500.55.97.1</li> <li>kernel-default-debugsource-5.14.21-150500.55.97.1</li> <li>dlm-kmp-default-debuginfo-5.14.21-150500.55.97.1</li> <li>dlm-kmp-default-5.14.21-150500.55.97.1</li> <li>kernel-obs-build-debugsource-5.14.21-150500.55.97.1</li> <li>reiserfs-kmp-default-5.14.21-150500.55.97.1</li> <li>kernel-default-devel-debuginfo-5.14.21-150500.55.97.1</li> <li>cluster-md-kmp-default-debuginfo-5.14.21-150500.55.97.1</li> <li>kernel-obs-build-5.14.21-150500.55.97.1</li> <li>cluster-md-kmp-default-5.14.21-150500.55.97.1</li> <li>gfs2-kmp-default-5.14.21-150500.55.97.1</li> <li>gfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 nosrc) <ul> <li>kernel-64kb-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64) <ul> <li>kernel-64kb-debugsource-5.14.21-150500.55.97.1</li> <li>kernel-64kb-devel-5.14.21-150500.55.97.1</li> <li>kernel-64kb-debuginfo-5.14.21-150500.55.97.1</li> <li>kernel-64kb-devel-debuginfo-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64 nosrc) <ul> <li>kernel-default-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le x86_64) <ul> <li>kernel-default-base-5.14.21-150500.55.97.1.150500.6.45.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) <ul> <li>kernel-macros-5.14.21-150500.55.97.1</li> <li>kernel-devel-5.14.21-150500.55.97.1</li> <li>kernel-source-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP5 LTSS (noarch nosrc) <ul> <li>kernel-docs-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP5 LTSS (nosrc s390x) <ul> <li>kernel-zfcpdump-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 15 SP5 LTSS (s390x) <ul> <li>kernel-zfcpdump-debuginfo-5.14.21-150500.55.97.1</li> <li>kernel-zfcpdump-debugsource-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) <ul> <li>ocfs2-kmp-default-5.14.21-150500.55.97.1</li> <li>kernel-default-debuginfo-5.14.21-150500.55.97.1</li> <li>ocfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1</li> <li>reiserfs-kmp-default-debuginfo-5.14.21-150500.55.97.1</li> <li>kernel-default-devel-5.14.21-150500.55.97.1</li> <li>kernel-syms-5.14.21-150500.55.97.1</li> <li>kernel-default-debugsource-5.14.21-150500.55.97.1</li> <li>dlm-kmp-default-debuginfo-5.14.21-150500.55.97.1</li> <li>dlm-kmp-default-5.14.21-150500.55.97.1</li> <li>kernel-obs-build-debugsource-5.14.21-150500.55.97.1</li> <li>kernel-default-base-5.14.21-150500.55.97.1.150500.6.45.1</li> <li>kernel-default-devel-debuginfo-5.14.21-150500.55.97.1</li> <li>reiserfs-kmp-default-5.14.21-150500.55.97.1</li> <li>cluster-md-kmp-default-debuginfo-5.14.21-150500.55.97.1</li> <li>kernel-obs-build-5.14.21-150500.55.97.1</li> <li>cluster-md-kmp-default-5.14.21-150500.55.97.1</li> <li>gfs2-kmp-default-5.14.21-150500.55.97.1</li> <li>gfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 15 SP5 (nosrc ppc64le x86_64) <ul> <li>kernel-default-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) <ul> <li>kernel-macros-5.14.21-150500.55.97.1</li> <li>kernel-devel-5.14.21-150500.55.97.1</li> <li>kernel-source-5.14.21-150500.55.97.1</li> </ul> </li> <li> SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch nosrc) <ul> <li>kernel-docs-5.14.21-150500.55.97.1</li> </ul> </li> </ul>
<h2>References:</h2> <ul> <li> <a href="https://www.suse.com/security/cve/CVE-2022-49080.html">https://www.suse.com/security/cve/CVE-2022-49080.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-1192.html">https://www.suse.com/security/cve/CVE-2023-1192.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2023-52572.html">https://www.suse.com/security/cve/CVE-2023-52572.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-50115.html">https://www.suse.com/security/cve/CVE-2024-50115.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53135.html">https://www.suse.com/security/cve/CVE-2024-53135.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53173.html">https://www.suse.com/security/cve/CVE-2024-53173.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53226.html">https://www.suse.com/security/cve/CVE-2024-53226.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-53239.html">https://www.suse.com/security/cve/CVE-2024-53239.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-56539.html">https://www.suse.com/security/cve/CVE-2024-56539.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-56548.html">https://www.suse.com/security/cve/CVE-2024-56548.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-56605.html">https://www.suse.com/security/cve/CVE-2024-56605.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2024-57948.html">https://www.suse.com/security/cve/CVE-2024-57948.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21647.html">https://www.suse.com/security/cve/CVE-2025-21647.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21690.html">https://www.suse.com/security/cve/CVE-2025-21690.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21692.html">https://www.suse.com/security/cve/CVE-2025-21692.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-21699.html">https://www.suse.com/security/cve/CVE-2025-21699.html</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1208995">https://bugzilla.suse.com/show_bug.cgi?id=1208995</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1220946">https://bugzilla.suse.com/show_bug.cgi?id=1220946</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1225742">https://bugzilla.suse.com/show_bug.cgi?id=1225742</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232472">https://bugzilla.suse.com/show_bug.cgi?id=1232472</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1232919">https://bugzilla.suse.com/show_bug.cgi?id=1232919</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233701">https://bugzilla.suse.com/show_bug.cgi?id=1233701</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1233749">https://bugzilla.suse.com/show_bug.cgi?id=1233749</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234154">https://bugzilla.suse.com/show_bug.cgi?id=1234154</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234650">https://bugzilla.suse.com/show_bug.cgi?id=1234650</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234853">https://bugzilla.suse.com/show_bug.cgi?id=1234853</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234891">https://bugzilla.suse.com/show_bug.cgi?id=1234891</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234963">https://bugzilla.suse.com/show_bug.cgi?id=1234963</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235054">https://bugzilla.suse.com/show_bug.cgi?id=1235054</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235061">https://bugzilla.suse.com/show_bug.cgi?id=1235061</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235073">https://bugzilla.suse.com/show_bug.cgi?id=1235073</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1235111">https://bugzilla.suse.com/show_bug.cgi?id=1235111</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236133">https://bugzilla.suse.com/show_bug.cgi?id=1236133</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236289">https://bugzilla.suse.com/show_bug.cgi?id=1236289</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236576">https://bugzilla.suse.com/show_bug.cgi?id=1236576</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236661">https://bugzilla.suse.com/show_bug.cgi?id=1236661</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236677">https://bugzilla.suse.com/show_bug.cgi?id=1236677</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236757">https://bugzilla.suse.com/show_bug.cgi?id=1236757</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236758">https://bugzilla.suse.com/show_bug.cgi?id=1236758</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236760">https://bugzilla.suse.com/show_bug.cgi?id=1236760</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236761">https://bugzilla.suse.com/show_bug.cgi?id=1236761</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236777">https://bugzilla.suse.com/show_bug.cgi?id=1236777</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1236951">https://bugzilla.suse.com/show_bug.cgi?id=1236951</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237025">https://bugzilla.suse.com/show_bug.cgi?id=1237025</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237028">https://bugzilla.suse.com/show_bug.cgi?id=1237028</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237139">https://bugzilla.suse.com/show_bug.cgi?id=1237139</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237316">https://bugzilla.suse.com/show_bug.cgi?id=1237316</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1237693">https://bugzilla.suse.com/show_bug.cgi?id=1237693</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1238033">https://bugzilla.suse.com/show_bug.cgi?id=1238033</a> </li> </ul> </div>
--===============3143193166272016848==--
|
|
|
|