Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: SUSE-SU-2025:0833-2
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Server for SAP Applications 15 SP5, SUSE Linux Enterprise Server 15 SP5, SUSE Linux Enterprise High Performance Computing 15 SP5, SUSE Linux Enterprise Micro 5.5, SUSE Linux Enterprise High Performance Computing LTSS 15 SP5, SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5, SUSE Linux Enterprise Server 15 SP5 LTSS
Datum: Di, 11. März 2025, 19:54
Referenzen: https://www.cve.org/CVERecord?id=CVE-2024-53135
https://www.cve.org/CVERecord?id=CVE-2025-21699
https://www.cve.org/CVERecord?id=CVE-2023-52572
https://www.cve.org/CVERecord?id=CVE-2025-21692
https://www.cve.org/CVERecord?id=CVE-2024-53173
https://www.cve.org/CVERecord?id=CVE-2025-21647
https://www.cve.org/CVERecord?id=CVE-2024-53226
https://www.cve.org/CVERecord?id=CVE-2024-56605
https://www.cve.org/CVERecord?id=CVE-2023-1192
https://www.cve.org/CVERecord?id=CVE-2024-50115
https://www.cve.org/CVERecord?id=CVE-2024-53239
https://www.cve.org/CVERecord?id=CVE-2024-57948
https://www.cve.org/CVERecord?id=CVE-2024-56539
https://www.cve.org/CVERecord?id=CVE-2025-21690
https://www.cve.org/CVERecord?id=CVE-2022-49080
https://www.cve.org/CVERecord?id=CVE-2024-56548
Applikationen: Linux

Originalnachricht

--===============3143193166272016848==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:0833-2
Release Date: 2025-03-11T15:28:58Z
Rating: important
References:

* bsc#1208995
* bsc#1220946
* bsc#1225742
* bsc#1232472
* bsc#1232919
* bsc#1233701
* bsc#1233749
* bsc#1234154
* bsc#1234650
* bsc#1234853
* bsc#1234891
* bsc#1234963
* bsc#1235054
* bsc#1235061
* bsc#1235073
* bsc#1235111
* bsc#1236133
* bsc#1236289
* bsc#1236576
* bsc#1236661
* bsc#1236677
* bsc#1236757
* bsc#1236758
* bsc#1236760
* bsc#1236761
* bsc#1236777
* bsc#1236951
* bsc#1237025
* bsc#1237028
* bsc#1237139
* bsc#1237316
* bsc#1237693
* bsc#1238033


Cross-References:

* CVE-2022-49080
* CVE-2023-1192
* CVE-2023-52572
* CVE-2024-50115
* CVE-2024-53135
* CVE-2024-53173
* CVE-2024-53226
* CVE-2024-53239
* CVE-2024-56539
* CVE-2024-56548
* CVE-2024-56605
* CVE-2024-57948
* CVE-2025-21647
* CVE-2025-21690
* CVE-2025-21692
* CVE-2025-21699


CVSS scores:

* CVE-2022-49080 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49080 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1192 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-1192 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52572 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2023-52572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50115 ( SUSE ): 4.5
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-50115 ( SUSE ): 7.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-50115 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53135 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53135 ( NVD ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
* CVE-2024-53173 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53173 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53173 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53226 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53226 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53239 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53239 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53239 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56539 ( SUSE ): 8.6
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56539 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-56548 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56548 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56548 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57948 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57948 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21647 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21647 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21690 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21690 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21692 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21692 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2025-21692 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21699 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21699 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H


Affected Products:

* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5



An update that solves 16 vulnerabilities and has 17 security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

* CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace
(bsc#1238033).
* CVE-2024-53135: KVM: VMX: Bury Intel PT virtualization (guest/host mode)
behind CONFIG_BROKEN (bsc#1234154).
* CVE-2024-53226: RDMA/hns: Fix NULL pointer derefernce in
hns_roce_map_mr_sg() (bsc#1236576)
* CVE-2024-57948: mac802154: check local interfaces before deleting sdata
list
(bsc#1236677).
* CVE-2025-21647: sched: sch_cake: add bounds checks to host bulk flow
fairness counts (bsc#1236133).
* CVE-2025-21690: scsi: storvsc: Ratelimit warning logs to prevent VM denial
of service (bsc#1237025).
* CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028).
* CVE-2025-21699: gfs2: Truncate address space when flipping GFS2_DIF_JDATA
flag (bsc#1237139).

The following non-security bugs were fixed:

* cpufreq/amd-pstate: Only print supported EPP values for performance
governor
(bsc#1236777).
* iavf: fix the waiting time for initial reset (bsc#1235111).
* ice: add ice_adapter for shared data across PFs on the same NIC
(bsc#1235111).
* ice: avoid the PTP hardware semaphore in gettimex64 path (bsc#1235111).
* ice: fold ice_ptp_read_time into ice_ptp_gettimex64 (bsc#1235111).
* idpf: call set_real_num_queues in idpf_open (bsc#1236661 bsc#1237316).
* ipv4/tcp: do not use per netns ctl sockets (bsc#1237693).
* kabi: hide adding RCU head into struct netdev_name_node (bsc#1233749).
* net: Fix undefined behavior in netdev name allocation (bsc#1233749).
* net: avoid UAF on deleted altname (bsc#1233749).
* net: check for altname conflicts when changing netdev's netns
(bsc#1233749).
* net: core: Use the bitmap API to allocate bitmaps (bsc#1233749).
* net: do not send a MOVE event when netdev changes netns (bsc#1233749).
* net: do not use input buffer of __dev_alloc_name() as a scratch space
(bsc#1233749).
* net: fix ifname in netlink ntf during netns move (bsc#1233749).
* net: fix removing a namespace with conflicting altnames (bsc#1233749).
* net: free altname using an RCU callback (bsc#1233749).
* net: introduce a function to check if a netdev name is in use
(bsc#1233749).
* net: make dev_alloc_name() call dev_prep_valid_name() (bsc#1233749).
* net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761).
* net: mana: Cleanup "mana" debugfs dir after cleanup of all children
(bsc#1236760).
* net: mana: Enable debugfs files for MANA device (bsc#1236758).
* net: minor __dev_alloc_name() optimization (bsc#1233749).
* net: move altnames together with the netdevice (bsc#1233749).
* net: netvsc: Update default VMBus channels (bsc#1236757).
* net: reduce indentation of __dev_alloc_name() (bsc#1233749).
* net: remove dev_valid_name() check from __dev_alloc_name() (bsc#1233749).
* net: remove else after return in dev_prep_valid_name() (bsc#1233749).
* net: trust the bitmap in __dev_alloc_name() (bsc#1233749).
* nfsd: use explicit lock/unlock for directory ops (bsc#1234650 bsc#1233701
bsc#1232472).
* rcu: Remove rcu_is_idle_cpu() (bsc#1236289).
* scsi: storvsc: Set correct data length for sending SCSI command without
payload (git-fixes).
* x86/aperfmperf: Dont wake idle CPUs in arch_freq_get_on_cpu()
(bsc#1236289).
* x86/aperfmperf: Integrate the fallback code from show_cpuinfo()
(bsc#1236289).
* x86/aperfmperf: Make parts of the frequency invariance code unconditional
(bsc#1236289).
* x86/aperfmperf: Put frequency invariance aperf/mperf data into a struct
(bsc#1236289).
* x86/aperfmperf: Replace aperfmperf_get_khz() (bsc#1236289).
* x86/aperfmperf: Replace arch_freq_get_on_cpu() (bsc#1236289).
* x86/aperfmperf: Restructure arch_scale_freq_tick() (bsc#1236289).
* x86/aperfmperf: Separate AP/BP frequency invariance init (bsc#1236289).
* x86/aperfmperf: Store aperf/mperf data for cpu frequency reads
(bsc#1236289).
* x86/aperfmperf: Untangle Intel and AMD frequency invariance init
(bsc#1236289).
* x86/aperfperf: Make it correct on 32bit and UP kernels (bsc#1236289).
* x86/smp: Move APERF/MPERF code where it belongs (bsc#1236289).
* x86/smp: Remove unnecessary assignment to local var freq_scale
(bsc#1236289).
* x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes).
* x86/xen: allow larger contiguous memory regions in PV guests (bsc#1236951).
* x86/xen: fix xen_hypercall_hvm() to not clobber %rbx (git-fixes).
* xen/swiotlb: relax alignment requirements (bsc#1236951).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-833=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-833=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-833=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-833=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-833=1

## Package List:

* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.97.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* kernel-default-base-5.14.21-150500.55.97.1.150500.6.45.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* kernel-default-debugsource-5.14.21-150500.55.97.1
* kernel-default-debuginfo-5.14.21-150500.55.97.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-macros-5.14.21-150500.55.97.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* ocfs2-kmp-default-5.14.21-150500.55.97.1
* kernel-default-debuginfo-5.14.21-150500.55.97.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1
* kernel-default-devel-5.14.21-150500.55.97.1
* kernel-syms-5.14.21-150500.55.97.1
* kernel-default-debugsource-5.14.21-150500.55.97.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.97.1
* dlm-kmp-default-5.14.21-150500.55.97.1
* kernel-obs-build-debugsource-5.14.21-150500.55.97.1
* kernel-default-base-5.14.21-150500.55.97.1.150500.6.45.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.97.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.97.1
* kernel-obs-build-5.14.21-150500.55.97.1
* cluster-md-kmp-default-5.14.21-150500.55.97.1
* gfs2-kmp-default-5.14.21-150500.55.97.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
nosrc)
* kernel-64kb-5.14.21-150500.55.97.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64)
* kernel-64kb-debugsource-5.14.21-150500.55.97.1
* kernel-64kb-devel-5.14.21-150500.55.97.1
* kernel-64kb-debuginfo-5.14.21-150500.55.97.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.97.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
nosrc
x86_64)
* kernel-default-5.14.21-150500.55.97.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* kernel-macros-5.14.21-150500.55.97.1
* kernel-devel-5.14.21-150500.55.97.1
* kernel-source-5.14.21-150500.55.97.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch
nosrc)
* kernel-docs-5.14.21-150500.55.97.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* ocfs2-kmp-default-5.14.21-150500.55.97.1
* kernel-default-debuginfo-5.14.21-150500.55.97.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1
* kernel-default-devel-5.14.21-150500.55.97.1
* kernel-syms-5.14.21-150500.55.97.1
* kernel-default-debugsource-5.14.21-150500.55.97.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.97.1
* dlm-kmp-default-5.14.21-150500.55.97.1
* kernel-obs-build-debugsource-5.14.21-150500.55.97.1
* kernel-default-base-5.14.21-150500.55.97.1.150500.6.45.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.97.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.97.1
* kernel-obs-build-5.14.21-150500.55.97.1
* cluster-md-kmp-default-5.14.21-150500.55.97.1
* gfs2-kmp-default-5.14.21-150500.55.97.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
nosrc)
* kernel-64kb-5.14.21-150500.55.97.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64)
* kernel-64kb-debugsource-5.14.21-150500.55.97.1
* kernel-64kb-devel-5.14.21-150500.55.97.1
* kernel-64kb-debuginfo-5.14.21-150500.55.97.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.97.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150500.55.97.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* kernel-macros-5.14.21-150500.55.97.1
* kernel-devel-5.14.21-150500.55.97.1
* kernel-source-5.14.21-150500.55.97.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.97.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* ocfs2-kmp-default-5.14.21-150500.55.97.1
* kernel-default-debuginfo-5.14.21-150500.55.97.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.97.1
* kernel-default-devel-5.14.21-150500.55.97.1
* kernel-syms-5.14.21-150500.55.97.1
* kernel-default-debugsource-5.14.21-150500.55.97.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.97.1
* dlm-kmp-default-5.14.21-150500.55.97.1
* kernel-obs-build-debugsource-5.14.21-150500.55.97.1
* reiserfs-kmp-default-5.14.21-150500.55.97.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.97.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.97.1
* kernel-obs-build-5.14.21-150500.55.97.1
* cluster-md-kmp-default-5.14.21-150500.55.97.1
* gfs2-kmp-default-5.14.21-150500.55.97.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.97.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64)
* kernel-64kb-debugsource-5.14.21-150500.55.97.1
* kernel-64kb-devel-5.14.21-150500.55.97.1
* kernel-64kb-debuginfo-5.14.21-150500.55.97.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.97.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-5.14.21-150500.55.97.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150500.55.97.1.150500.6.45.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* kernel-macros-5.14.21-150500.55.97.1
* kernel-devel-5.14.21-150500.55.97.1
* kernel-source-5.14.21-150500.55.97.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch nosrc)
* kernel-docs-5.14.21-150500.55.97.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.97.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.97.1
* kernel-zfcpdump-debugsource-5.14.21-150500.55.97.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* ocfs2-kmp-default-5.14.21-150500.55.97.1
* kernel-default-debuginfo-5.14.21-150500.55.97.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.97.1
* kernel-default-devel-5.14.21-150500.55.97.1
* kernel-syms-5.14.21-150500.55.97.1
* kernel-default-debugsource-5.14.21-150500.55.97.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.97.1
* dlm-kmp-default-5.14.21-150500.55.97.1
* kernel-obs-build-debugsource-5.14.21-150500.55.97.1
* kernel-default-base-5.14.21-150500.55.97.1.150500.6.45.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.97.1
* reiserfs-kmp-default-5.14.21-150500.55.97.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.97.1
* kernel-obs-build-5.14.21-150500.55.97.1
* cluster-md-kmp-default-5.14.21-150500.55.97.1
* gfs2-kmp-default-5.14.21-150500.55.97.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150500.55.97.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* kernel-macros-5.14.21-150500.55.97.1
* kernel-devel-5.14.21-150500.55.97.1
* kernel-source-5.14.21-150500.55.97.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.97.1

## References:

* https://www.suse.com/security/cve/CVE-2022-49080.html
* https://www.suse.com/security/cve/CVE-2023-1192.html
* https://www.suse.com/security/cve/CVE-2023-52572.html
* https://www.suse.com/security/cve/CVE-2024-50115.html
* https://www.suse.com/security/cve/CVE-2024-53135.html
* https://www.suse.com/security/cve/CVE-2024-53173.html
* https://www.suse.com/security/cve/CVE-2024-53226.html
* https://www.suse.com/security/cve/CVE-2024-53239.html
* https://www.suse.com/security/cve/CVE-2024-56539.html
* https://www.suse.com/security/cve/CVE-2024-56548.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://www.suse.com/security/cve/CVE-2024-57948.html
* https://www.suse.com/security/cve/CVE-2025-21647.html
* https://www.suse.com/security/cve/CVE-2025-21690.html
* https://www.suse.com/security/cve/CVE-2025-21692.html
* https://www.suse.com/security/cve/CVE-2025-21699.html
* https://bugzilla.suse.com/show_bug.cgi?id=1208995
* https://bugzilla.suse.com/show_bug.cgi?id=1220946
* https://bugzilla.suse.com/show_bug.cgi?id=1225742
* https://bugzilla.suse.com/show_bug.cgi?id=1232472
* https://bugzilla.suse.com/show_bug.cgi?id=1232919
* https://bugzilla.suse.com/show_bug.cgi?id=1233701
* https://bugzilla.suse.com/show_bug.cgi?id=1233749
* https://bugzilla.suse.com/show_bug.cgi?id=1234154
* https://bugzilla.suse.com/show_bug.cgi?id=1234650
* https://bugzilla.suse.com/show_bug.cgi?id=1234853
* https://bugzilla.suse.com/show_bug.cgi?id=1234891
* https://bugzilla.suse.com/show_bug.cgi?id=1234963
* https://bugzilla.suse.com/show_bug.cgi?id=1235054
* https://bugzilla.suse.com/show_bug.cgi?id=1235061
* https://bugzilla.suse.com/show_bug.cgi?id=1235073
* https://bugzilla.suse.com/show_bug.cgi?id=1235111
* https://bugzilla.suse.com/show_bug.cgi?id=1236133
* https://bugzilla.suse.com/show_bug.cgi?id=1236289
* https://bugzilla.suse.com/show_bug.cgi?id=1236576
* https://bugzilla.suse.com/show_bug.cgi?id=1236661
* https://bugzilla.suse.com/show_bug.cgi?id=1236677
* https://bugzilla.suse.com/show_bug.cgi?id=1236757
* https://bugzilla.suse.com/show_bug.cgi?id=1236758
* https://bugzilla.suse.com/show_bug.cgi?id=1236760
* https://bugzilla.suse.com/show_bug.cgi?id=1236761
* https://bugzilla.suse.com/show_bug.cgi?id=1236777
* https://bugzilla.suse.com/show_bug.cgi?id=1236951
* https://bugzilla.suse.com/show_bug.cgi?id=1237025
* https://bugzilla.suse.com/show_bug.cgi?id=1237028
* https://bugzilla.suse.com/show_bug.cgi?id=1237139
* https://bugzilla.suse.com/show_bug.cgi?id=1237316
* https://bugzilla.suse.com/show_bug.cgi?id=1237693
* https://bugzilla.suse.com/show_bug.cgi?id=1238033


--===============3143193166272016848==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for the Linux Kernel</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2025:0833-2</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2025-03-11T15:28:58Z</td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208995">bsc#1208995</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220946">bsc#1220946</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225742">bsc#1225742</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232472">bsc#1232472</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232919">bsc#1232919</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233701">bsc#1233701</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233749">bsc#1233749</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234154">bsc#1234154</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234650">bsc#1234650</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234853">bsc#1234853</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234891">bsc#1234891</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234963">bsc#1234963</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235054">bsc#1235054</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235061">bsc#1235061</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235073">bsc#1235073</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235111">bsc#1235111</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236133">bsc#1236133</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236289">bsc#1236289</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236576">bsc#1236576</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236661">bsc#1236661</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236677">bsc#1236677</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236757">bsc#1236757</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236758">bsc#1236758</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236760">bsc#1236760</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236761">bsc#1236761</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236777">bsc#1236777</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236951">bsc#1236951</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237025">bsc#1237025</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237028">bsc#1237028</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237139">bsc#1237139</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237316">bsc#1237316</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237693">bsc#1237693</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238033">bsc#1238033</a>
</li>


</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49080.html">CVE-2022-49080</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-1192.html">CVE-2023-1192</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52572.html">CVE-2023-52572</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50115.html">CVE-2024-50115</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53135.html">CVE-2024-53135</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53173.html">CVE-2024-53173</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53226.html">CVE-2024-53226</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53239.html">CVE-2024-53239</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56539.html">CVE-2024-56539</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56548.html">CVE-2024-56548</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56605.html">CVE-2024-56605</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-57948.html">CVE-2024-57948</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21647.html">CVE-2025-21647</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21690.html">CVE-2025-21690</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21692.html">CVE-2025-21692</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21699.html">CVE-2025-21699</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49080</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49080</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-1192</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-1192</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52572</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">0.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52572</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50115</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">4.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50115</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.2</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50115</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53135</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53135</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53173</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53173</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53173</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53173</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53226</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53226</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53226</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53239</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53239</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53239</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53239</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56539</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.6</span>
<span
class="cvss-vector">CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56539</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56548</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.4</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56548</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56548</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56605</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56605</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56605</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56605</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57948</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.4</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-57948</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21647</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21647</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21690</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21690</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21690</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21692</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.9</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21692</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21692</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21699</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21699</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21699</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing ESPOS 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing LTSS 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Micro 5.5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP5 LTSS</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP5</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves 16 vulnerabilities and has 17 security fixes
can now be installed.</p>





<h2>Description:</h2>

<p>The SUSE Linux Enterprise 15 SP5 kernel was updated to receive
various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2022-49080: mm/mempolicy: fix mpol_new leak in
shared_policy_replace (bsc#1238033).</li>
<li>CVE-2024-53135: KVM: VMX: Bury Intel PT virtualization (guest/host
mode) behind CONFIG_BROKEN (bsc#1234154).</li>
<li>CVE-2024-53226: RDMA/hns: Fix NULL pointer derefernce in
hns_roce_map_mr_sg() (bsc#1236576)</li>
<li>CVE-2024-57948: mac802154: check local interfaces before deleting
sdata list (bsc#1236677).</li>
<li>CVE-2025-21647: sched: sch_cake: add bounds checks to host bulk flow
fairness counts (bsc#1236133).</li>
<li>CVE-2025-21690: scsi: storvsc: Ratelimit warning logs to prevent VM
denial of service (bsc#1237025).</li>
<li>CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing
(bsc#1237028).</li>
<li>CVE-2025-21699: gfs2: Truncate address space when flipping
GFS2_DIF_JDATA flag (bsc#1237139).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>cpufreq/amd-pstate: Only print supported EPP values for performance
governor (bsc#1236777).</li>
<li>iavf: fix the waiting time for initial reset
(bsc#1235111).</li>
<li>ice: add ice_adapter for shared data across PFs on the same NIC
(bsc#1235111).</li>
<li>ice: avoid the PTP hardware semaphore in gettimex64 path
(bsc#1235111).</li>
<li>ice: fold ice_ptp_read_time into ice_ptp_gettimex64
(bsc#1235111).</li>
<li>idpf: call set_real_num_queues in idpf_open (bsc#1236661
bsc#1237316).</li>
<li>ipv4/tcp: do not use per netns ctl sockets (bsc#1237693).</li>
<li>kabi: hide adding RCU head into struct netdev_name_node
(bsc#1233749).</li>
<li>net: Fix undefined behavior in netdev name allocation
(bsc#1233749).</li>
<li>net: avoid UAF on deleted altname (bsc#1233749).</li>
<li>net: check for altname conflicts when changing netdev&#x27;s
netns (bsc#1233749).</li>
<li>net: core: Use the bitmap API to allocate bitmaps
(bsc#1233749).</li>
<li>net: do not send a MOVE event when netdev changes netns
(bsc#1233749).</li>
<li>net: do not use input buffer of __dev_alloc_name() as a scratch space
(bsc#1233749).</li>
<li>net: fix ifname in netlink ntf during netns move
(bsc#1233749).</li>
<li>net: fix removing a namespace with conflicting altnames
(bsc#1233749).</li>
<li>net: free altname using an RCU callback (bsc#1233749).</li>
<li>net: introduce a function to check if a netdev name is in use
(bsc#1233749).</li>
<li>net: make dev_alloc_name() call dev_prep_valid_name()
(bsc#1233749).</li>
<li>net: mana: Add get_link and get_link_ksettings in ethtool
(bsc#1236761).</li>
<li>net: mana: Cleanup &quot;mana&quot; debugfs dir after cleanup
of all children (bsc#1236760).</li>
<li>net: mana: Enable debugfs files for MANA device
(bsc#1236758).</li>
<li>net: minor __dev_alloc_name() optimization (bsc#1233749).</li>
<li>net: move altnames together with the netdevice
(bsc#1233749).</li>
<li>net: netvsc: Update default VMBus channels (bsc#1236757).</li>
<li>net: reduce indentation of __dev_alloc_name()
(bsc#1233749).</li>
<li>net: remove dev_valid_name() check from __dev_alloc_name()
(bsc#1233749).</li>
<li>net: remove else after return in dev_prep_valid_name()
(bsc#1233749).</li>
<li>net: trust the bitmap in __dev_alloc_name() (bsc#1233749).</li>
<li>nfsd: use explicit lock/unlock for directory ops (bsc#1234650
bsc#1233701 bsc#1232472).</li>
<li>rcu: Remove rcu_is_idle_cpu() (bsc#1236289).</li>
<li>scsi: storvsc: Set correct data length for sending SCSI command
without payload (git-fixes).</li>
<li>x86/aperfmperf: Dont wake idle CPUs in arch_freq_get_on_cpu()
(bsc#1236289).</li>
<li>x86/aperfmperf: Integrate the fallback code from show_cpuinfo()
(bsc#1236289).</li>
<li>x86/aperfmperf: Make parts of the frequency invariance code
unconditional (bsc#1236289).</li>
<li>x86/aperfmperf: Put frequency invariance aperf/mperf data into a
struct (bsc#1236289).</li>
<li>x86/aperfmperf: Replace aperfmperf_get_khz()
(bsc#1236289).</li>
<li>x86/aperfmperf: Replace arch_freq_get_on_cpu()
(bsc#1236289).</li>
<li>x86/aperfmperf: Restructure arch_scale_freq_tick()
(bsc#1236289).</li>
<li>x86/aperfmperf: Separate AP/BP frequency invariance init
(bsc#1236289).</li>
<li>x86/aperfmperf: Store aperf/mperf data for cpu frequency reads
(bsc#1236289).</li>
<li>x86/aperfmperf: Untangle Intel and AMD frequency invariance init
(bsc#1236289).</li>
<li>x86/aperfperf: Make it correct on 32bit and UP kernels
(bsc#1236289).</li>
<li>x86/smp: Move APERF/MPERF code where it belongs
(bsc#1236289).</li>
<li>x86/smp: Remove unnecessary assignment to local var freq_scale
(bsc#1236289).</li>
<li>x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes).</li>
<li>x86/xen: allow larger contiguous memory regions in PV guests
(bsc#1236951).</li>
<li>x86/xen: fix xen_hypercall_hvm() to not clobber %rbx
(git-fixes).</li>
<li>xen/swiotlb: relax alignment requirements (bsc#1236951).</li>
</ul>




<h2>Special Instructions and Notes:</h2>
<ul>


<li>Please reboot the system after installing this
update.</li>


</ul>


<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
SUSE Linux Enterprise Micro 5.5


<br/>
<code>zypper in -t patch
SUSE-SLE-Micro-5.5-2025-833=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-833=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing LTSS 15 SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-833=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server 15 SP5 LTSS


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-833=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server for SAP Applications 15 SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES_SAP-15-SP5-2025-833=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x
x86_64 nosrc)
<ul>


<li>kernel-default-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
<ul>


<li>kernel-default-base-5.14.21-150500.55.97.1.150500.6.45.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x
x86_64)
<ul>


<li>kernel-default-debugsource-5.14.21-150500.55.97.1</li>


<li>kernel-default-debuginfo-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro 5.5 (noarch)
<ul>


<li>kernel-macros-5.14.21-150500.55.97.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP5 (aarch64 x86_64)
<ul>


<li>ocfs2-kmp-default-5.14.21-150500.55.97.1</li>


<li>kernel-default-debuginfo-5.14.21-150500.55.97.1</li>


<li>ocfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1</li>


<li>kernel-default-devel-5.14.21-150500.55.97.1</li>


<li>kernel-syms-5.14.21-150500.55.97.1</li>


<li>kernel-default-debugsource-5.14.21-150500.55.97.1</li>


<li>dlm-kmp-default-debuginfo-5.14.21-150500.55.97.1</li>


<li>dlm-kmp-default-5.14.21-150500.55.97.1</li>


<li>kernel-obs-build-debugsource-5.14.21-150500.55.97.1</li>


<li>kernel-default-base-5.14.21-150500.55.97.1.150500.6.45.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150500.55.97.1</li>


<li>cluster-md-kmp-default-debuginfo-5.14.21-150500.55.97.1</li>


<li>kernel-obs-build-5.14.21-150500.55.97.1</li>


<li>cluster-md-kmp-default-5.14.21-150500.55.97.1</li>


<li>gfs2-kmp-default-5.14.21-150500.55.97.1</li>


<li>gfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP5 (aarch64 nosrc)
<ul>


<li>kernel-64kb-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP5 (aarch64)
<ul>


<li>kernel-64kb-debugsource-5.14.21-150500.55.97.1</li>


<li>kernel-64kb-devel-5.14.21-150500.55.97.1</li>


<li>kernel-64kb-debuginfo-5.14.21-150500.55.97.1</li>


<li>kernel-64kb-devel-debuginfo-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP5 (aarch64 nosrc x86_64)
<ul>


<li>kernel-default-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP5 (noarch)
<ul>


<li>kernel-macros-5.14.21-150500.55.97.1</li>


<li>kernel-devel-5.14.21-150500.55.97.1</li>


<li>kernel-source-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP5 (noarch nosrc)
<ul>


<li>kernel-docs-5.14.21-150500.55.97.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP5 (aarch64 x86_64)
<ul>


<li>ocfs2-kmp-default-5.14.21-150500.55.97.1</li>


<li>kernel-default-debuginfo-5.14.21-150500.55.97.1</li>


<li>ocfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1</li>


<li>kernel-default-devel-5.14.21-150500.55.97.1</li>


<li>kernel-syms-5.14.21-150500.55.97.1</li>


<li>kernel-default-debugsource-5.14.21-150500.55.97.1</li>


<li>dlm-kmp-default-debuginfo-5.14.21-150500.55.97.1</li>


<li>dlm-kmp-default-5.14.21-150500.55.97.1</li>


<li>kernel-obs-build-debugsource-5.14.21-150500.55.97.1</li>


<li>kernel-default-base-5.14.21-150500.55.97.1.150500.6.45.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150500.55.97.1</li>


<li>cluster-md-kmp-default-debuginfo-5.14.21-150500.55.97.1</li>


<li>kernel-obs-build-5.14.21-150500.55.97.1</li>


<li>cluster-md-kmp-default-5.14.21-150500.55.97.1</li>


<li>gfs2-kmp-default-5.14.21-150500.55.97.1</li>


<li>gfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP5 (aarch64 nosrc)
<ul>


<li>kernel-64kb-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP5 (aarch64)
<ul>


<li>kernel-64kb-debugsource-5.14.21-150500.55.97.1</li>


<li>kernel-64kb-devel-5.14.21-150500.55.97.1</li>


<li>kernel-64kb-debuginfo-5.14.21-150500.55.97.1</li>


<li>kernel-64kb-devel-debuginfo-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP5 (aarch64 nosrc x86_64)
<ul>


<li>kernel-default-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP5 (noarch)
<ul>


<li>kernel-macros-5.14.21-150500.55.97.1</li>


<li>kernel-devel-5.14.21-150500.55.97.1</li>


<li>kernel-source-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP5 (noarch nosrc)
<ul>


<li>kernel-docs-5.14.21-150500.55.97.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le
s390x x86_64)
<ul>


<li>ocfs2-kmp-default-5.14.21-150500.55.97.1</li>


<li>kernel-default-debuginfo-5.14.21-150500.55.97.1</li>


<li>ocfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1</li>


<li>reiserfs-kmp-default-debuginfo-5.14.21-150500.55.97.1</li>


<li>kernel-default-devel-5.14.21-150500.55.97.1</li>


<li>kernel-syms-5.14.21-150500.55.97.1</li>


<li>kernel-default-debugsource-5.14.21-150500.55.97.1</li>


<li>dlm-kmp-default-debuginfo-5.14.21-150500.55.97.1</li>


<li>dlm-kmp-default-5.14.21-150500.55.97.1</li>


<li>kernel-obs-build-debugsource-5.14.21-150500.55.97.1</li>


<li>reiserfs-kmp-default-5.14.21-150500.55.97.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150500.55.97.1</li>


<li>cluster-md-kmp-default-debuginfo-5.14.21-150500.55.97.1</li>


<li>kernel-obs-build-5.14.21-150500.55.97.1</li>


<li>cluster-md-kmp-default-5.14.21-150500.55.97.1</li>


<li>gfs2-kmp-default-5.14.21-150500.55.97.1</li>


<li>gfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 nosrc)
<ul>


<li>kernel-64kb-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64)
<ul>


<li>kernel-64kb-debugsource-5.14.21-150500.55.97.1</li>


<li>kernel-64kb-devel-5.14.21-150500.55.97.1</li>


<li>kernel-64kb-debuginfo-5.14.21-150500.55.97.1</li>


<li>kernel-64kb-devel-debuginfo-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le
s390x x86_64 nosrc)
<ul>


<li>kernel-default-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le
x86_64)
<ul>


<li>kernel-default-base-5.14.21-150500.55.97.1.150500.6.45.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
<ul>


<li>kernel-macros-5.14.21-150500.55.97.1</li>


<li>kernel-devel-5.14.21-150500.55.97.1</li>


<li>kernel-source-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP5 LTSS (noarch nosrc)
<ul>


<li>kernel-docs-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP5 LTSS (nosrc s390x)
<ul>


<li>kernel-zfcpdump-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP5 LTSS (s390x)
<ul>


<li>kernel-zfcpdump-debuginfo-5.14.21-150500.55.97.1</li>


<li>kernel-zfcpdump-debugsource-5.14.21-150500.55.97.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP5
(ppc64le x86_64)
<ul>


<li>ocfs2-kmp-default-5.14.21-150500.55.97.1</li>


<li>kernel-default-debuginfo-5.14.21-150500.55.97.1</li>


<li>ocfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1</li>


<li>reiserfs-kmp-default-debuginfo-5.14.21-150500.55.97.1</li>


<li>kernel-default-devel-5.14.21-150500.55.97.1</li>


<li>kernel-syms-5.14.21-150500.55.97.1</li>


<li>kernel-default-debugsource-5.14.21-150500.55.97.1</li>


<li>dlm-kmp-default-debuginfo-5.14.21-150500.55.97.1</li>


<li>dlm-kmp-default-5.14.21-150500.55.97.1</li>


<li>kernel-obs-build-debugsource-5.14.21-150500.55.97.1</li>


<li>kernel-default-base-5.14.21-150500.55.97.1.150500.6.45.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150500.55.97.1</li>


<li>reiserfs-kmp-default-5.14.21-150500.55.97.1</li>


<li>cluster-md-kmp-default-debuginfo-5.14.21-150500.55.97.1</li>


<li>kernel-obs-build-5.14.21-150500.55.97.1</li>


<li>cluster-md-kmp-default-5.14.21-150500.55.97.1</li>


<li>gfs2-kmp-default-5.14.21-150500.55.97.1</li>


<li>gfs2-kmp-default-debuginfo-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP5
(nosrc ppc64le x86_64)
<ul>


<li>kernel-default-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP5
(noarch)
<ul>


<li>kernel-macros-5.14.21-150500.55.97.1</li>


<li>kernel-devel-5.14.21-150500.55.97.1</li>


<li>kernel-source-5.14.21-150500.55.97.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP5
(noarch nosrc)
<ul>


<li>kernel-docs-5.14.21-150500.55.97.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49080.html">https://www.suse.com/security/cve/CVE-2022-49080.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-1192.html">https://www.suse.com/security/cve/CVE-2023-1192.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52572.html">https://www.suse.com/security/cve/CVE-2023-52572.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50115.html">https://www.suse.com/security/cve/CVE-2024-50115.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53135.html">https://www.suse.com/security/cve/CVE-2024-53135.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53173.html">https://www.suse.com/security/cve/CVE-2024-53173.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53226.html">https://www.suse.com/security/cve/CVE-2024-53226.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53239.html">https://www.suse.com/security/cve/CVE-2024-53239.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56539.html">https://www.suse.com/security/cve/CVE-2024-56539.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56548.html">https://www.suse.com/security/cve/CVE-2024-56548.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56605.html">https://www.suse.com/security/cve/CVE-2024-56605.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-57948.html">https://www.suse.com/security/cve/CVE-2024-57948.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21647.html">https://www.suse.com/security/cve/CVE-2025-21647.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21690.html">https://www.suse.com/security/cve/CVE-2025-21690.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21692.html">https://www.suse.com/security/cve/CVE-2025-21692.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21699.html">https://www.suse.com/security/cve/CVE-2025-21699.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1208995">https://bugzilla.suse.com/show_bug.cgi?id=1208995</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1220946">https://bugzilla.suse.com/show_bug.cgi?id=1220946</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225742">https://bugzilla.suse.com/show_bug.cgi?id=1225742</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232472">https://bugzilla.suse.com/show_bug.cgi?id=1232472</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1232919">https://bugzilla.suse.com/show_bug.cgi?id=1232919</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233701">https://bugzilla.suse.com/show_bug.cgi?id=1233701</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233749">https://bugzilla.suse.com/show_bug.cgi?id=1233749</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234154">https://bugzilla.suse.com/show_bug.cgi?id=1234154</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234650">https://bugzilla.suse.com/show_bug.cgi?id=1234650</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234853">https://bugzilla.suse.com/show_bug.cgi?id=1234853</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234891">https://bugzilla.suse.com/show_bug.cgi?id=1234891</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234963">https://bugzilla.suse.com/show_bug.cgi?id=1234963</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235054">https://bugzilla.suse.com/show_bug.cgi?id=1235054</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235061">https://bugzilla.suse.com/show_bug.cgi?id=1235061</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235073">https://bugzilla.suse.com/show_bug.cgi?id=1235073</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235111">https://bugzilla.suse.com/show_bug.cgi?id=1235111</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236133">https://bugzilla.suse.com/show_bug.cgi?id=1236133</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236289">https://bugzilla.suse.com/show_bug.cgi?id=1236289</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236576">https://bugzilla.suse.com/show_bug.cgi?id=1236576</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236661">https://bugzilla.suse.com/show_bug.cgi?id=1236661</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236677">https://bugzilla.suse.com/show_bug.cgi?id=1236677</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236757">https://bugzilla.suse.com/show_bug.cgi?id=1236757</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236758">https://bugzilla.suse.com/show_bug.cgi?id=1236758</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236760">https://bugzilla.suse.com/show_bug.cgi?id=1236760</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236761">https://bugzilla.suse.com/show_bug.cgi?id=1236761</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236777">https://bugzilla.suse.com/show_bug.cgi?id=1236777</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236951">https://bugzilla.suse.com/show_bug.cgi?id=1236951</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237025">https://bugzilla.suse.com/show_bug.cgi?id=1237025</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237028">https://bugzilla.suse.com/show_bug.cgi?id=1237028</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237139">https://bugzilla.suse.com/show_bug.cgi?id=1237139</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237316">https://bugzilla.suse.com/show_bug.cgi?id=1237316</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237693">https://bugzilla.suse.com/show_bug.cgi?id=1237693</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238033">https://bugzilla.suse.com/show_bug.cgi?id=1238033</a>
</li>


</ul>

</div>

--===============3143193166272016848==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung