Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Linux
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Linux
ID: SUSE-SU-2025:1195-1
Distribution: SUSE
Plattformen: SUSE Manager Proxy 4.3, SUSE Manager Server 4.3, SUSE Manager Retail Branch Server 4.3, SUSE Linux Enterprise Micro 5.3, SUSE Linux Enterprise Real Time 15 SP4, SUSE Linux Enterprise High Performance Computing 15 SP4, SUSE Linux Enterprise Server 15 SP4, SUSE Linux Enterprise Server for SAP Applications 15 SP4, SUSE Linux Enterprise Micro for Rancher 5.3, SUSE Linux Enterprise Micro 5.4, SUSE Linux Enterprise High Availability Extension 15 SP4, SUSE Linux Enterprise Live Patching 15-SP4, SUSE Linux Enterprise Micro for Rancher 5.4, SUSE openSUSE Leap 15.4, SUSE Linux Enterprise High Performance Computing LTSS 15 SP4, SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4, SUSE Linux Enterprise Server 15 SP4 LTSS
Datum: Do, 10. April 2025, 22:22
Referenzen: https://www.cve.org/CVERecord?id=CVE-2025-21714
https://www.cve.org/CVERecord?id=CVE-2024-58083
https://www.cve.org/CVERecord?id=CVE-2025-21693
https://www.cve.org/CVERecord?id=CVE-2023-52989
https://www.cve.org/CVERecord?id=CVE-2023-52973
https://www.cve.org/CVERecord?id=CVE-2023-52992
https://www.cve.org/CVERecord?id=CVE-2022-49759
https://www.cve.org/CVERecord?id=CVE-2022-49053
https://www.cve.org/CVERecord?id=CVE-2023-53023
https://www.cve.org/CVERecord?id=CVE-2023-52988
https://www.cve.org/CVERecord?id=CVE-2023-53000
https://www.cve.org/CVERecord?id=CVE-2024-53064
https://www.cve.org/CVERecord?id=CVE-2023-53010
https://www.cve.org/CVERecord?id=CVE-2023-52976
https://www.cve.org/CVERecord?id=CVE-2022-49739
https://www.cve.org/CVERecord?id=CVE-2023-3567
https://www.cve.org/CVERecord?id=CVE-2023-52975
https://www.cve.org/CVERecord?id=CVE-2023-53008
https://www.cve.org/CVERecord?id=CVE-2022-49465
https://www.cve.org/CVERecord?id=CVE-2023-2162
https://www.cve.org/CVERecord?id=CVE-2023-1652
https://www.cve.org/CVERecord?id=CVE-2023-52979
https://www.cve.org/CVERecord?id=CVE-2022-49650
https://www.cve.org/CVERecord?id=CVE-2023-53028
https://www.cve.org/CVERecord?id=CVE-2023-53026
https://www.cve.org/CVERecord?id=CVE-2023-53025
https://www.cve.org/CVERecord?id=CVE-2023-53029
https://www.cve.org/CVERecord?id=CVE-2024-50290
https://www.cve.org/CVERecord?id=CVE-2023-52930
https://www.cve.org/CVERecord?id=CVE-2023-53006
https://www.cve.org/CVERecord?id=CVE-2023-53005
https://www.cve.org/CVERecord?id=CVE-2022-49746
https://www.cve.org/CVERecord?id=CVE-2023-52983
https://www.cve.org/CVERecord?id=CVE-2023-53007
https://www.cve.org/CVERecord?id=CVE-2022-49748
https://www.cve.org/CVERecord?id=CVE-2023-53033
https://www.cve.org/CVERecord?id=CVE-2023-52933
https://www.cve.org/CVERecord?id=CVE-2023-53024
https://www.cve.org/CVERecord?id=CVE-2023-52984
https://www.cve.org/CVERecord?id=CVE-2023-52974
https://www.cve.org/CVERecord?id=CVE-2023-53030
https://www.cve.org/CVERecord?id=CVE-2023-0179
https://www.cve.org/CVERecord?id=CVE-2024-53063
https://www.cve.org/CVERecord?id=CVE-2022-49293
https://www.cve.org/CVERecord?id=CVE-2017-5753
https://www.cve.org/CVERecord?id=CVE-2025-21753
https://www.cve.org/CVERecord?id=CVE-2022-49751
https://www.cve.org/CVERecord?id=CVE-2025-21839
https://www.cve.org/CVERecord?id=CVE-2023-53019
https://www.cve.org/CVERecord?id=CVE-2023-52935
https://www.cve.org/CVERecord?id=CVE-2023-52993
https://www.cve.org/CVERecord?id=CVE-2023-53015
https://www.cve.org/CVERecord?id=CVE-2023-52941
https://www.cve.org/CVERecord?id=CVE-2022-1016
https://www.cve.org/CVERecord?id=CVE-2022-49755
https://www.cve.org/CVERecord?id=CVE-2024-56651
https://www.cve.org/CVERecord?id=CVE-2025-21772
https://www.cve.org/CVERecord?id=CVE-2022-49753
https://www.cve.org/CVERecord?id=CVE-2021-4454
https://www.cve.org/CVERecord?id=CVE-2023-52939
https://www.cve.org/CVERecord?id=CVE-2023-53016
https://www.cve.org/CVERecord?id=CVE-2025-21732
Applikationen: Linux

Originalnachricht

--===============3652786791710398639==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:1195-1
Release Date: 2025-04-10T13:48:07Z
Rating: important
References:

* bsc#1193629
* bsc#1197227
* bsc#1207034
* bsc#1207186
* bsc#1207878
* bsc#1209262
* bsc#1209547
* bsc#1209788
* bsc#1210647
* bsc#1213167
* bsc#1225742
* bsc#1231375
* bsc#1233479
* bsc#1233557
* bsc#1233558
* bsc#1234464
* bsc#1235528
* bsc#1237029
* bsc#1237530
* bsc#1237875
* bsc#1237877
* bsc#1237890
* bsc#1237918
* bsc#1238911
* bsc#1238919
* bsc#1239016
* bsc#1239036
* bsc#1239061
* bsc#1239126
* bsc#1239452
* bsc#1239454
* bsc#1239968
* bsc#1239969
* bsc#1240133
* bsc#1240195
* bsc#1240205
* bsc#1240207
* bsc#1240208
* bsc#1240210
* bsc#1240212
* bsc#1240213
* bsc#1240218
* bsc#1240220
* bsc#1240227
* bsc#1240229
* bsc#1240231
* bsc#1240242
* bsc#1240245
* bsc#1240247
* bsc#1240250
* bsc#1240254
* bsc#1240256
* bsc#1240264
* bsc#1240266
* bsc#1240272
* bsc#1240275
* bsc#1240276
* bsc#1240278
* bsc#1240279
* bsc#1240280
* bsc#1240281
* bsc#1240282
* bsc#1240283
* bsc#1240284
* bsc#1240286
* bsc#1240288
* bsc#1240290
* bsc#1240292
* bsc#1240293
* bsc#1240297
* bsc#1240304
* bsc#1240308
* bsc#1240309
* bsc#1240317
* bsc#1240318
* bsc#1240322


Cross-References:

* CVE-2017-5753
* CVE-2021-4454
* CVE-2022-1016
* CVE-2022-49053
* CVE-2022-49293
* CVE-2022-49465
* CVE-2022-49650
* CVE-2022-49739
* CVE-2022-49746
* CVE-2022-49748
* CVE-2022-49751
* CVE-2022-49753
* CVE-2022-49755
* CVE-2022-49759
* CVE-2023-0179
* CVE-2023-1652
* CVE-2023-2162
* CVE-2023-3567
* CVE-2023-52930
* CVE-2023-52933
* CVE-2023-52935
* CVE-2023-52939
* CVE-2023-52941
* CVE-2023-52973
* CVE-2023-52974
* CVE-2023-52975
* CVE-2023-52976
* CVE-2023-52979
* CVE-2023-52983
* CVE-2023-52984
* CVE-2023-52988
* CVE-2023-52989
* CVE-2023-52992
* CVE-2023-52993
* CVE-2023-53000
* CVE-2023-53005
* CVE-2023-53006
* CVE-2023-53007
* CVE-2023-53008
* CVE-2023-53010
* CVE-2023-53015
* CVE-2023-53016
* CVE-2023-53019
* CVE-2023-53023
* CVE-2023-53024
* CVE-2023-53025
* CVE-2023-53026
* CVE-2023-53028
* CVE-2023-53029
* CVE-2023-53030
* CVE-2023-53033
* CVE-2024-50290
* CVE-2024-53063
* CVE-2024-53064
* CVE-2024-56651
* CVE-2024-58083
* CVE-2025-21693
* CVE-2025-21714
* CVE-2025-21732
* CVE-2025-21753
* CVE-2025-21772
* CVE-2025-21839


CVSS scores:

* CVE-2017-5753 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2017-5753 ( SUSE ): 7.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
* CVE-2017-5753 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2017-5753 ( NVD ): 5.6 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
* CVE-2021-4454 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2021-4454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-1016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-1016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2022-49053 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49053 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49053 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49293 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49465 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49465 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49465 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49739 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49746 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49748 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49751 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49753 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49755 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-49755 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49759 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-0179 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-0179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1652 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-1652 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-1652 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-2162 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2023-3567 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2023-52930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52935 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52973 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52975 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52975 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-52984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52992 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-52992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-52993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53008 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53023 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53025 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2023-53026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56651 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56651 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21693 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21772 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H


Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Availability Extension 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3



An update that solves 62 vulnerabilities and has 14 security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

* CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918).
* CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled
(bsc#1238919).
* CVE-2022-49739: gfs2: Always check inode size of inline inodes
(bsc#1240207).
* CVE-2023-52935: mm/khugepaged: fix ->anon_vma race (bsc#1240276).
* CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558
bsc#1234464).
* CVE-2024-56651: can: hi311x: hi3110_can_ist(): fix potential use-after-free
(bsc#1235528).
* CVE-2024-58083: KVM: Explicitly verify target vCPU is online in
kvm_get_vcpu() (bsc#1239036).
* CVE-2025-21693: mm: zswap: properly synchronize freeing resources during
CPU
hotunplug (bsc#1237029).
* CVE-2025-21714: RDMA/mlx5: Fix implicit ODP use after free (bsc#1237890).
* CVE-2025-21732: RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with
error (bsc#1237877).
* CVE-2025-21753: btrfs: fix use-after-free when attempting to join an
aborted
transaction (bsc#1237875).
* CVE-2025-21772: partitions: mac: fix handling of bogus partition table
(bsc#1238911).

The following non-security bugs were fixed:

* ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are
invalid (bsc#1237530).
* RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016).
* RDMA/mana_ib: Use v2 version of cfg_rx_steer_req to enable RX coalescing
(bsc#1239016).
* RDMA/mlx5: Fix implicit ODP hang on parent deregistration (git-fixes)
* btrfs: defrag: do not use merged extent map for their generation check
(bsc#1239968).
* btrfs: fix defrag not merging contiguous extents due to merged extent maps
(bsc#1239968).
* btrfs: fix extent map merging not happening for adjacent extents
(bsc#1239968).
* btrfs: send: allow cloning non-aligned extent if it ends at i_size
(bsc#1239969).
* btrfs: send: fix invalid clone operation for file that got its size
decreased (bsc#1239969).
* gfs2: Fix inode height consistency check (git-fixes).
* mm/mmu_notifier.c: fix race in mmu_interval_notifier_remove()
(bsc#1239126).
* mm: zswap: move allocations during CPU init outside the lock (git-fixes).
* net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016).
* net: mana: Allow variable size indirection table (bsc#1239016).
* net: mana: Avoid open coded arithmetic (bsc#1239016).
* net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup
(bsc#1240195).
* net: mana: Support holes in device list reply msg (bsc#1240133).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-1195=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-1195=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-1195=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-1195=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-1195=1

* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1195=1
Please note that this is the initial kernel livepatch without fixes itself,
this
package is later updated by separate standalone kernel livepatch updates.

* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2025-1195=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1195=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1195=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1195=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1195=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1195=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2025-1195=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1195=1

## Package List:

* openSUSE Leap 15.4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.161.1
* openSUSE Leap 15.4 (noarch)
* kernel-macros-5.14.21-150400.24.161.1
* kernel-devel-5.14.21-150400.24.161.1
* kernel-source-5.14.21-150400.24.161.1
* kernel-source-vanilla-5.14.21-150400.24.161.1
* kernel-docs-html-5.14.21-150400.24.161.1
* openSUSE Leap 15.4 (nosrc ppc64le x86_64)
* kernel-debug-5.14.21-150400.24.161.1
* openSUSE Leap 15.4 (ppc64le x86_64)
* kernel-debug-debugsource-5.14.21-150400.24.161.1
* kernel-debug-debuginfo-5.14.21-150400.24.161.1
* kernel-debug-devel-5.14.21-150400.24.161.1
* kernel-debug-devel-debuginfo-5.14.21-150400.24.161.1
* openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-debuginfo-5.14.21-150400.24.161.1
* kernel-kvmsmall-devel-5.14.21-150400.24.161.1
* kernel-kvmsmall-debugsource-5.14.21-150400.24.161.1
* kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1
* kernel-default-base-rebuild-5.14.21-150400.24.161.1.150400.24.80.1
* kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.161.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* kernel-default-extra-debuginfo-5.14.21-150400.24.161.1
* kernel-default-debuginfo-5.14.21-150400.24.161.1
* reiserfs-kmp-default-5.14.21-150400.24.161.1
* kselftests-kmp-default-5.14.21-150400.24.161.1
* cluster-md-kmp-default-5.14.21-150400.24.161.1
* kernel-default-debugsource-5.14.21-150400.24.161.1
* kernel-default-optional-5.14.21-150400.24.161.1
* kernel-default-devel-5.14.21-150400.24.161.1
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.161.1
* kernel-obs-build-debugsource-5.14.21-150400.24.161.1
* kselftests-kmp-default-debuginfo-5.14.21-150400.24.161.1
* kernel-syms-5.14.21-150400.24.161.1
* kernel-obs-build-5.14.21-150400.24.161.1
* kernel-obs-qa-5.14.21-150400.24.161.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.161.1
* kernel-default-extra-5.14.21-150400.24.161.1
* kernel-default-livepatch-5.14.21-150400.24.161.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.161.1
* kernel-default-optional-debuginfo-5.14.21-150400.24.161.1
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.161.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.161.1
* dlm-kmp-default-5.14.21-150400.24.161.1
* ocfs2-kmp-default-5.14.21-150400.24.161.1
* gfs2-kmp-default-5.14.21-150400.24.161.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150400.24.161.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-1-150400.9.3.1
* kernel-default-livepatch-devel-5.14.21-150400.24.161.1
* kernel-livepatch-5_14_21-150400_24_161-default-1-150400.9.3.1
* kernel-livepatch-SLE15-SP4_Update_39-debugsource-1-150400.9.3.1
* openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150400.24.161.1
* openSUSE Leap 15.4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.161.1
* openSUSE Leap 15.4 (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.161.1
* kernel-zfcpdump-debugsource-5.14.21-150400.24.161.1
* openSUSE Leap 15.4 (nosrc)
* dtb-aarch64-5.14.21-150400.24.161.1
* openSUSE Leap 15.4 (aarch64)
* dtb-cavium-5.14.21-150400.24.161.1
* kernel-64kb-debugsource-5.14.21-150400.24.161.1
* reiserfs-kmp-64kb-5.14.21-150400.24.161.1
* kselftests-kmp-64kb-5.14.21-150400.24.161.1
* kernel-64kb-devel-5.14.21-150400.24.161.1
* dtb-altera-5.14.21-150400.24.161.1
* kernel-64kb-extra-debuginfo-5.14.21-150400.24.161.1
* dtb-freescale-5.14.21-150400.24.161.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.161.1
* dtb-arm-5.14.21-150400.24.161.1
* kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.161.1
* dtb-amazon-5.14.21-150400.24.161.1
* cluster-md-kmp-64kb-5.14.21-150400.24.161.1
* kernel-64kb-debuginfo-5.14.21-150400.24.161.1
* kernel-64kb-optional-debuginfo-5.14.21-150400.24.161.1
* cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.161.1
* dlm-kmp-64kb-5.14.21-150400.24.161.1
* gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.161.1
* dtb-mediatek-5.14.21-150400.24.161.1
* dtb-apm-5.14.21-150400.24.161.1
* kernel-64kb-extra-5.14.21-150400.24.161.1
* dtb-apple-5.14.21-150400.24.161.1
* dtb-qcom-5.14.21-150400.24.161.1
* dtb-hisilicon-5.14.21-150400.24.161.1
* dtb-amd-5.14.21-150400.24.161.1
* dtb-lg-5.14.21-150400.24.161.1
* dtb-socionext-5.14.21-150400.24.161.1
* reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.161.1
* dtb-xilinx-5.14.21-150400.24.161.1
* dtb-broadcom-5.14.21-150400.24.161.1
* dtb-nvidia-5.14.21-150400.24.161.1
* dtb-exynos-5.14.21-150400.24.161.1
* ocfs2-kmp-64kb-5.14.21-150400.24.161.1
* kernel-64kb-optional-5.14.21-150400.24.161.1
* dtb-renesas-5.14.21-150400.24.161.1
* ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.161.1
* dtb-sprd-5.14.21-150400.24.161.1
* dtb-amlogic-5.14.21-150400.24.161.1
* dtb-rockchip-5.14.21-150400.24.161.1
* dtb-marvell-5.14.21-150400.24.161.1
* gfs2-kmp-64kb-5.14.21-150400.24.161.1
* dlm-kmp-64kb-debuginfo-5.14.21-150400.24.161.1
* dtb-allwinner-5.14.21-150400.24.161.1
* openSUSE Leap 15.4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.161.1
* kernel-default-debugsource-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.161.1
* kernel-default-debugsource-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.161.1
* kernel-default-debugsource-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debuginfo-5.14.21-150400.24.161.1
* kernel-default-debugsource-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
* kernel-default-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-default-livepatch-devel-5.14.21-150400.24.161.1
* kernel-default-debuginfo-5.14.21-150400.24.161.1
* kernel-livepatch-5_14_21-150400_24_161-default-1-150400.9.3.1
* kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-1-150400.9.3.1
* kernel-livepatch-SLE15-SP4_Update_39-debugsource-1-150400.9.3.1
* kernel-default-debugsource-5.14.21-150400.24.161.1
* kernel-default-livepatch-5.14.21-150400.24.161.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* gfs2-kmp-default-5.14.21-150400.24.161.1
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.161.1
* kernel-default-debuginfo-5.14.21-150400.24.161.1
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.161.1
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.161.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.161.1
* dlm-kmp-default-5.14.21-150400.24.161.1
* ocfs2-kmp-default-5.14.21-150400.24.161.1
* cluster-md-kmp-default-5.14.21-150400.24.161.1
* kernel-default-debugsource-5.14.21-150400.24.161.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
* kernel-default-5.14.21-150400.24.161.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
nosrc)
* kernel-64kb-5.14.21-150400.24.161.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.161.1
* kernel-64kb-debugsource-5.14.21-150400.24.161.1
* kernel-64kb-debuginfo-5.14.21-150400.24.161.1
* kernel-64kb-devel-5.14.21-150400.24.161.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
nosrc
x86_64)
* kernel-default-5.14.21-150400.24.161.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1
* kernel-default-devel-5.14.21-150400.24.161.1
* kernel-obs-build-debugsource-5.14.21-150400.24.161.1
* kernel-default-debuginfo-5.14.21-150400.24.161.1
* kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1
* kernel-syms-5.14.21-150400.24.161.1
* kernel-obs-build-5.14.21-150400.24.161.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.161.1
* reiserfs-kmp-default-5.14.21-150400.24.161.1
* kernel-default-debugsource-5.14.21-150400.24.161.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* kernel-devel-5.14.21-150400.24.161.1
* kernel-source-5.14.21-150400.24.161.1
* kernel-macros-5.14.21-150400.24.161.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch
nosrc)
* kernel-docs-5.14.21-150400.24.161.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
nosrc)
* kernel-64kb-5.14.21-150400.24.161.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.161.1
* kernel-64kb-debugsource-5.14.21-150400.24.161.1
* kernel-64kb-debuginfo-5.14.21-150400.24.161.1
* kernel-64kb-devel-5.14.21-150400.24.161.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.161.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1
* kernel-default-devel-5.14.21-150400.24.161.1
* kernel-obs-build-debugsource-5.14.21-150400.24.161.1
* kernel-default-debuginfo-5.14.21-150400.24.161.1
* kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1
* kernel-syms-5.14.21-150400.24.161.1
* kernel-obs-build-5.14.21-150400.24.161.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.161.1
* reiserfs-kmp-default-5.14.21-150400.24.161.1
* kernel-default-debugsource-5.14.21-150400.24.161.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* kernel-devel-5.14.21-150400.24.161.1
* kernel-source-5.14.21-150400.24.161.1
* kernel-macros-5.14.21-150400.24.161.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64)
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.161.1
* kernel-64kb-debugsource-5.14.21-150400.24.161.1
* kernel-64kb-debuginfo-5.14.21-150400.24.161.1
* kernel-64kb-devel-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1
* kernel-default-devel-5.14.21-150400.24.161.1
* kernel-obs-build-debugsource-5.14.21-150400.24.161.1
* kernel-default-debuginfo-5.14.21-150400.24.161.1
* kernel-syms-5.14.21-150400.24.161.1
* kernel-obs-build-5.14.21-150400.24.161.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.161.1
* reiserfs-kmp-default-5.14.21-150400.24.161.1
* kernel-default-debugsource-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* kernel-devel-5.14.21-150400.24.161.1
* kernel-source-5.14.21-150400.24.161.1
* kernel-macros-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch nosrc)
* kernel-docs-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.161.1
* kernel-zfcpdump-debugsource-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1
* kernel-default-devel-5.14.21-150400.24.161.1
* kernel-obs-build-debugsource-5.14.21-150400.24.161.1
* kernel-default-debuginfo-5.14.21-150400.24.161.1
* kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1
* kernel-syms-5.14.21-150400.24.161.1
* kernel-obs-build-5.14.21-150400.24.161.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.161.1
* reiserfs-kmp-default-5.14.21-150400.24.161.1
* kernel-default-debugsource-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* kernel-devel-5.14.21-150400.24.161.1
* kernel-source-5.14.21-150400.24.161.1
* kernel-macros-5.14.21-150400.24.161.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.161.1
* SUSE Manager Proxy 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.161.1
* SUSE Manager Proxy 4.3 (x86_64)
* kernel-default-devel-5.14.21-150400.24.161.1
* kernel-default-debuginfo-5.14.21-150400.24.161.1
* kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1
* kernel-syms-5.14.21-150400.24.161.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.161.1
* kernel-default-debugsource-5.14.21-150400.24.161.1
* SUSE Manager Proxy 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.161.1
* kernel-source-5.14.21-150400.24.161.1
* kernel-macros-5.14.21-150400.24.161.1
* SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.161.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* kernel-default-devel-5.14.21-150400.24.161.1
* kernel-default-debuginfo-5.14.21-150400.24.161.1
* kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.161.1
* kernel-default-debugsource-5.14.21-150400.24.161.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.161.1
* kernel-macros-5.14.21-150400.24.161.1
* SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
* kernel-default-5.14.21-150400.24.161.1
* SUSE Manager Server 4.3 (ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* kernel-default-devel-5.14.21-150400.24.161.1
* kernel-default-debuginfo-5.14.21-150400.24.161.1
* kernel-syms-5.14.21-150400.24.161.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.161.1
* kernel-default-debugsource-5.14.21-150400.24.161.1
* SUSE Manager Server 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.161.1
* kernel-source-5.14.21-150400.24.161.1
* kernel-macros-5.14.21-150400.24.161.1
* SUSE Manager Server 4.3 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.161.1
* SUSE Manager Server 4.3 (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.161.1
* kernel-zfcpdump-debugsource-5.14.21-150400.24.161.1

## References:

* https://www.suse.com/security/cve/CVE-2017-5753.html
* https://www.suse.com/security/cve/CVE-2021-4454.html
* https://www.suse.com/security/cve/CVE-2022-1016.html
* https://www.suse.com/security/cve/CVE-2022-49053.html
* https://www.suse.com/security/cve/CVE-2022-49293.html
* https://www.suse.com/security/cve/CVE-2022-49465.html
* https://www.suse.com/security/cve/CVE-2022-49650.html
* https://www.suse.com/security/cve/CVE-2022-49739.html
* https://www.suse.com/security/cve/CVE-2022-49746.html
* https://www.suse.com/security/cve/CVE-2022-49748.html
* https://www.suse.com/security/cve/CVE-2022-49751.html
* https://www.suse.com/security/cve/CVE-2022-49753.html
* https://www.suse.com/security/cve/CVE-2022-49755.html
* https://www.suse.com/security/cve/CVE-2022-49759.html
* https://www.suse.com/security/cve/CVE-2023-0179.html
* https://www.suse.com/security/cve/CVE-2023-1652.html
* https://www.suse.com/security/cve/CVE-2023-2162.html
* https://www.suse.com/security/cve/CVE-2023-3567.html
* https://www.suse.com/security/cve/CVE-2023-52930.html
* https://www.suse.com/security/cve/CVE-2023-52933.html
* https://www.suse.com/security/cve/CVE-2023-52935.html
* https://www.suse.com/security/cve/CVE-2023-52939.html
* https://www.suse.com/security/cve/CVE-2023-52941.html
* https://www.suse.com/security/cve/CVE-2023-52973.html
* https://www.suse.com/security/cve/CVE-2023-52974.html
* https://www.suse.com/security/cve/CVE-2023-52975.html
* https://www.suse.com/security/cve/CVE-2023-52976.html
* https://www.suse.com/security/cve/CVE-2023-52979.html
* https://www.suse.com/security/cve/CVE-2023-52983.html
* https://www.suse.com/security/cve/CVE-2023-52984.html
* https://www.suse.com/security/cve/CVE-2023-52988.html
* https://www.suse.com/security/cve/CVE-2023-52989.html
* https://www.suse.com/security/cve/CVE-2023-52992.html
* https://www.suse.com/security/cve/CVE-2023-52993.html
* https://www.suse.com/security/cve/CVE-2023-53000.html
* https://www.suse.com/security/cve/CVE-2023-53005.html
* https://www.suse.com/security/cve/CVE-2023-53006.html
* https://www.suse.com/security/cve/CVE-2023-53007.html
* https://www.suse.com/security/cve/CVE-2023-53008.html
* https://www.suse.com/security/cve/CVE-2023-53010.html
* https://www.suse.com/security/cve/CVE-2023-53015.html
* https://www.suse.com/security/cve/CVE-2023-53016.html
* https://www.suse.com/security/cve/CVE-2023-53019.html
* https://www.suse.com/security/cve/CVE-2023-53023.html
* https://www.suse.com/security/cve/CVE-2023-53024.html
* https://www.suse.com/security/cve/CVE-2023-53025.html
* https://www.suse.com/security/cve/CVE-2023-53026.html
* https://www.suse.com/security/cve/CVE-2023-53028.html
* https://www.suse.com/security/cve/CVE-2023-53029.html
* https://www.suse.com/security/cve/CVE-2023-53030.html
* https://www.suse.com/security/cve/CVE-2023-53033.html
* https://www.suse.com/security/cve/CVE-2024-50290.html
* https://www.suse.com/security/cve/CVE-2024-53063.html
* https://www.suse.com/security/cve/CVE-2024-53064.html
* https://www.suse.com/security/cve/CVE-2024-56651.html
* https://www.suse.com/security/cve/CVE-2024-58083.html
* https://www.suse.com/security/cve/CVE-2025-21693.html
* https://www.suse.com/security/cve/CVE-2025-21714.html
* https://www.suse.com/security/cve/CVE-2025-21732.html
* https://www.suse.com/security/cve/CVE-2025-21753.html
* https://www.suse.com/security/cve/CVE-2025-21772.html
* https://www.suse.com/security/cve/CVE-2025-21839.html
* https://bugzilla.suse.com/show_bug.cgi?id=1193629
* https://bugzilla.suse.com/show_bug.cgi?id=1197227
* https://bugzilla.suse.com/show_bug.cgi?id=1207034
* https://bugzilla.suse.com/show_bug.cgi?id=1207186
* https://bugzilla.suse.com/show_bug.cgi?id=1207878
* https://bugzilla.suse.com/show_bug.cgi?id=1209262
* https://bugzilla.suse.com/show_bug.cgi?id=1209547
* https://bugzilla.suse.com/show_bug.cgi?id=1209788
* https://bugzilla.suse.com/show_bug.cgi?id=1210647
* https://bugzilla.suse.com/show_bug.cgi?id=1213167
* https://bugzilla.suse.com/show_bug.cgi?id=1225742
* https://bugzilla.suse.com/show_bug.cgi?id=1231375
* https://bugzilla.suse.com/show_bug.cgi?id=1233479
* https://bugzilla.suse.com/show_bug.cgi?id=1233557
* https://bugzilla.suse.com/show_bug.cgi?id=1233558
* https://bugzilla.suse.com/show_bug.cgi?id=1234464
* https://bugzilla.suse.com/show_bug.cgi?id=1235528
* https://bugzilla.suse.com/show_bug.cgi?id=1237029
* https://bugzilla.suse.com/show_bug.cgi?id=1237530
* https://bugzilla.suse.com/show_bug.cgi?id=1237875
* https://bugzilla.suse.com/show_bug.cgi?id=1237877
* https://bugzilla.suse.com/show_bug.cgi?id=1237890
* https://bugzilla.suse.com/show_bug.cgi?id=1237918
* https://bugzilla.suse.com/show_bug.cgi?id=1238911
* https://bugzilla.suse.com/show_bug.cgi?id=1238919
* https://bugzilla.suse.com/show_bug.cgi?id=1239016
* https://bugzilla.suse.com/show_bug.cgi?id=1239036
* https://bugzilla.suse.com/show_bug.cgi?id=1239061
* https://bugzilla.suse.com/show_bug.cgi?id=1239126
* https://bugzilla.suse.com/show_bug.cgi?id=1239452
* https://bugzilla.suse.com/show_bug.cgi?id=1239454
* https://bugzilla.suse.com/show_bug.cgi?id=1239968
* https://bugzilla.suse.com/show_bug.cgi?id=1239969
* https://bugzilla.suse.com/show_bug.cgi?id=1240133
* https://bugzilla.suse.com/show_bug.cgi?id=1240195
* https://bugzilla.suse.com/show_bug.cgi?id=1240205
* https://bugzilla.suse.com/show_bug.cgi?id=1240207
* https://bugzilla.suse.com/show_bug.cgi?id=1240208
* https://bugzilla.suse.com/show_bug.cgi?id=1240210
* https://bugzilla.suse.com/show_bug.cgi?id=1240212
* https://bugzilla.suse.com/show_bug.cgi?id=1240213
* https://bugzilla.suse.com/show_bug.cgi?id=1240218
* https://bugzilla.suse.com/show_bug.cgi?id=1240220
* https://bugzilla.suse.com/show_bug.cgi?id=1240227
* https://bugzilla.suse.com/show_bug.cgi?id=1240229
* https://bugzilla.suse.com/show_bug.cgi?id=1240231
* https://bugzilla.suse.com/show_bug.cgi?id=1240242
* https://bugzilla.suse.com/show_bug.cgi?id=1240245
* https://bugzilla.suse.com/show_bug.cgi?id=1240247
* https://bugzilla.suse.com/show_bug.cgi?id=1240250
* https://bugzilla.suse.com/show_bug.cgi?id=1240254
* https://bugzilla.suse.com/show_bug.cgi?id=1240256
* https://bugzilla.suse.com/show_bug.cgi?id=1240264
* https://bugzilla.suse.com/show_bug.cgi?id=1240266
* https://bugzilla.suse.com/show_bug.cgi?id=1240272
* https://bugzilla.suse.com/show_bug.cgi?id=1240275
* https://bugzilla.suse.com/show_bug.cgi?id=1240276
* https://bugzilla.suse.com/show_bug.cgi?id=1240278
* https://bugzilla.suse.com/show_bug.cgi?id=1240279
* https://bugzilla.suse.com/show_bug.cgi?id=1240280
* https://bugzilla.suse.com/show_bug.cgi?id=1240281
* https://bugzilla.suse.com/show_bug.cgi?id=1240282
* https://bugzilla.suse.com/show_bug.cgi?id=1240283
* https://bugzilla.suse.com/show_bug.cgi?id=1240284
* https://bugzilla.suse.com/show_bug.cgi?id=1240286
* https://bugzilla.suse.com/show_bug.cgi?id=1240288
* https://bugzilla.suse.com/show_bug.cgi?id=1240290
* https://bugzilla.suse.com/show_bug.cgi?id=1240292
* https://bugzilla.suse.com/show_bug.cgi?id=1240293
* https://bugzilla.suse.com/show_bug.cgi?id=1240297
* https://bugzilla.suse.com/show_bug.cgi?id=1240304
* https://bugzilla.suse.com/show_bug.cgi?id=1240308
* https://bugzilla.suse.com/show_bug.cgi?id=1240309
* https://bugzilla.suse.com/show_bug.cgi?id=1240317
* https://bugzilla.suse.com/show_bug.cgi?id=1240318
* https://bugzilla.suse.com/show_bug.cgi?id=1240322


--===============3652786791710398639==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for the Linux Kernel</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2025:1195-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2025-04-10T13:48:07Z</td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193629">bsc#1193629</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1197227">bsc#1197227</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207034">bsc#1207034</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207186">bsc#1207186</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207878">bsc#1207878</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209262">bsc#1209262</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209547">bsc#1209547</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209788">bsc#1209788</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1210647">bsc#1210647</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213167">bsc#1213167</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225742">bsc#1225742</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231375">bsc#1231375</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233479">bsc#1233479</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233557">bsc#1233557</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233558">bsc#1233558</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234464">bsc#1234464</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235528">bsc#1235528</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237029">bsc#1237029</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237530">bsc#1237530</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237875">bsc#1237875</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237877">bsc#1237877</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237890">bsc#1237890</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237918">bsc#1237918</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238911">bsc#1238911</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238919">bsc#1238919</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239016">bsc#1239016</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239036">bsc#1239036</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239061">bsc#1239061</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239126">bsc#1239126</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239452">bsc#1239452</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239454">bsc#1239454</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239968">bsc#1239968</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239969">bsc#1239969</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240133">bsc#1240133</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240195">bsc#1240195</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240205">bsc#1240205</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240207">bsc#1240207</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240208">bsc#1240208</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240210">bsc#1240210</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240212">bsc#1240212</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240213">bsc#1240213</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240218">bsc#1240218</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240220">bsc#1240220</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240227">bsc#1240227</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240229">bsc#1240229</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240231">bsc#1240231</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240242">bsc#1240242</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240245">bsc#1240245</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240247">bsc#1240247</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240250">bsc#1240250</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240254">bsc#1240254</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240256">bsc#1240256</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240264">bsc#1240264</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240266">bsc#1240266</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240272">bsc#1240272</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240275">bsc#1240275</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240276">bsc#1240276</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240278">bsc#1240278</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240279">bsc#1240279</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240280">bsc#1240280</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240281">bsc#1240281</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240282">bsc#1240282</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240283">bsc#1240283</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240284">bsc#1240284</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240286">bsc#1240286</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240288">bsc#1240288</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240290">bsc#1240290</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240292">bsc#1240292</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240293">bsc#1240293</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240297">bsc#1240297</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240304">bsc#1240304</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240308">bsc#1240308</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240309">bsc#1240309</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240317">bsc#1240317</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240318">bsc#1240318</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240322">bsc#1240322</a>
</li>


</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2017-5753.html">CVE-2017-5753</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2021-4454.html">CVE-2021-4454</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-1016.html">CVE-2022-1016</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49053.html">CVE-2022-49053</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49293.html">CVE-2022-49293</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49465.html">CVE-2022-49465</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49650.html">CVE-2022-49650</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49739.html">CVE-2022-49739</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49746.html">CVE-2022-49746</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49748.html">CVE-2022-49748</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49751.html">CVE-2022-49751</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49753.html">CVE-2022-49753</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49755.html">CVE-2022-49755</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2022-49759.html">CVE-2022-49759</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-0179.html">CVE-2023-0179</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-1652.html">CVE-2023-1652</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-2162.html">CVE-2023-2162</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-3567.html">CVE-2023-3567</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52930.html">CVE-2023-52930</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52933.html">CVE-2023-52933</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52935.html">CVE-2023-52935</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52939.html">CVE-2023-52939</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52941.html">CVE-2023-52941</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52973.html">CVE-2023-52973</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52974.html">CVE-2023-52974</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52975.html">CVE-2023-52975</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52976.html">CVE-2023-52976</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52979.html">CVE-2023-52979</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52983.html">CVE-2023-52983</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52984.html">CVE-2023-52984</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52988.html">CVE-2023-52988</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52989.html">CVE-2023-52989</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52992.html">CVE-2023-52992</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-52993.html">CVE-2023-52993</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-53000.html">CVE-2023-53000</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-53005.html">CVE-2023-53005</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-53006.html">CVE-2023-53006</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-53007.html">CVE-2023-53007</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-53008.html">CVE-2023-53008</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-53010.html">CVE-2023-53010</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-53015.html">CVE-2023-53015</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-53016.html">CVE-2023-53016</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-53019.html">CVE-2023-53019</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-53023.html">CVE-2023-53023</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-53024.html">CVE-2023-53024</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-53025.html">CVE-2023-53025</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-53026.html">CVE-2023-53026</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-53028.html">CVE-2023-53028</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-53029.html">CVE-2023-53029</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-53030.html">CVE-2023-53030</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2023-53033.html">CVE-2023-53033</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-50290.html">CVE-2024-50290</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53063.html">CVE-2024-53063</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-53064.html">CVE-2024-53064</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-56651.html">CVE-2024-56651</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-58083.html">CVE-2024-58083</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21693.html">CVE-2025-21693</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21714.html">CVE-2025-21714</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21732.html">CVE-2025-21732</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21753.html">CVE-2025-21753</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21772.html">CVE-2025-21772</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-21839.html">CVE-2025-21839</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2017-5753</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2017-5753</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2017-5753</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2017-5753</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.6</span>
<span
class="cvss-vector">CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-4454</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2021-4454</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-1016</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-1016</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49053</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49053</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49053</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49293</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49465</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49465</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49465</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49650</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49739</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49739</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49746</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49746</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49748</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49748</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49751</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49751</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49753</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49753</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49753</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49755</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49755</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49755</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49759</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2022-49759</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-0179</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-0179</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-1652</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-1652</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-1652</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-2162</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-2162</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-2162</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-3567</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-3567</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-3567</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52930</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52933</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52935</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52935</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52939</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52941</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52973</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52973</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52974</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52974</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52975</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52975</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52975</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52976</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52979</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52983</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52983</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52984</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52988</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52989</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52992</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52992</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-52993</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53000</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53005</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53006</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53007</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53008</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.8</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53008</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53010</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53015</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53016</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53019</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53023</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53023</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53024</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53025</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53025</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53026</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53028</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53029</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53030</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2023-53033</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-50290</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53063</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53063</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53064</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-53064</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56651</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56651</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56651</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-56651</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58083</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-58083</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21693</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.3</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21693</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21693</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21714</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21714</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21732</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21753</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21753</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21772</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.5</span>
<span
class="cvss-vector">CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21772</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-21839</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">openSUSE Leap
15.4</li>

<li class="list-group-item">SUSE Linux
Enterprise High Availability Extension 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing ESPOS 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing LTSS 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Live Patching 15-SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Micro 5.3</li>

<li class="list-group-item">SUSE Linux
Enterprise Micro 5.4</li>

<li class="list-group-item">SUSE Linux
Enterprise Micro for Rancher 5.3</li>

<li class="list-group-item">SUSE Linux
Enterprise Micro for Rancher 5.4</li>

<li class="list-group-item">SUSE Linux
Enterprise Real Time 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP4 LTSS</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP4</li>

<li class="list-group-item">SUSE Manager
Proxy 4.3</li>

<li class="list-group-item">SUSE Manager
Retail Branch Server 4.3</li>

<li class="list-group-item">SUSE Manager
Server 4.3</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves 62 vulnerabilities and has 14 security fixes
can now be installed.</p>





<h2>Description:</h2>

<p>The SUSE Linux Enterprise 15 SP4 kernel was updated to receive
various security bugfixes.</p>
<p>The following security bugs were fixed:</p>
<ul>
<li>CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF
(bsc#1237918).</li>
<li>CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been
throttled (bsc#1238919).</li>
<li>CVE-2022-49739: gfs2: Always check inode size of inline inodes
(bsc#1240207).</li>
<li>CVE-2023-52935: mm/khugepaged: fix -&gt;anon_vma race
(bsc#1240276).</li>
<li>CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558
bsc#1234464).</li>
<li>CVE-2024-56651: can: hi311x: hi3110_can_ist(): fix potential
use-after-free (bsc#1235528).</li>
<li>CVE-2024-58083: KVM: Explicitly verify target vCPU is online in
kvm_get_vcpu() (bsc#1239036).</li>
<li>CVE-2025-21693: mm: zswap: properly synchronize freeing resources
during CPU hotunplug (bsc#1237029).</li>
<li>CVE-2025-21714: RDMA/mlx5: Fix implicit ODP use after free
(bsc#1237890).</li>
<li>CVE-2025-21732: RDMA/mlx5: Fix a race for an ODP MR which leads to
CQE with error (bsc#1237877).</li>
<li>CVE-2025-21753: btrfs: fix use-after-free when attempting to join an
aborted transaction (bsc#1237875).</li>
<li>CVE-2025-21772: partitions: mac: fix handling of bogus partition
table (bsc#1238911).</li>
</ul>
<p>The following non-security bugs were fixed:</p>
<ul>
<li>ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states
are invalid (bsc#1237530).</li>
<li>RDMA/mana_ib: Prefer struct_size over open coded arithmetic
(bsc#1239016).</li>
<li>RDMA/mana_ib: Use v2 version of cfg_rx_steer_req to enable RX
coalescing (bsc#1239016).</li>
<li>RDMA/mlx5: Fix implicit ODP hang on parent deregistration
(git-fixes)</li>
<li>btrfs: defrag: do not use merged extent map for their generation
check (bsc#1239968).</li>
<li>btrfs: fix defrag not merging contiguous extents due to merged extent
maps (bsc#1239968).</li>
<li>btrfs: fix extent map merging not happening for adjacent extents
(bsc#1239968).</li>
<li>btrfs: send: allow cloning non-aligned extent if it ends at i_size
(bsc#1239969).</li>
<li>btrfs: send: fix invalid clone operation for file that got its size
decreased (bsc#1239969).</li>
<li>gfs2: Fix inode height consistency check (git-fixes).</li>
<li>mm/mmu_notifier.c: fix race in mmu_interval_notifier_remove()
(bsc#1239126).</li>
<li>mm: zswap: move allocations during CPU init outside the lock
(git-fixes).</li>
<li>net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2
(bsc#1239016).</li>
<li>net: mana: Allow variable size indirection table
(bsc#1239016).</li>
<li>net: mana: Avoid open coded arithmetic (bsc#1239016).</li>
<li>net: mana: Fix error handling in mana_create_txq/rxq&#x27;s NAPI
cleanup (bsc#1240195).</li>
<li>net: mana: Support holes in device list reply msg
(bsc#1240133).</li>
</ul>




<h2>Special Instructions and Notes:</h2>
<ul>


<li>Please reboot the system after installing this
update.</li>


</ul>


<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
openSUSE Leap 15.4


<br/>
<code>zypper in -t patch
SUSE-2025-1195=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Micro for Rancher 5.3


<br/>
<code>zypper in -t patch
SUSE-SLE-Micro-5.3-2025-1195=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Micro 5.3


<br/>
<code>zypper in -t patch
SUSE-SLE-Micro-5.3-2025-1195=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Micro for Rancher 5.4


<br/>
<code>zypper in -t patch
SUSE-SLE-Micro-5.4-2025-1195=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Micro 5.4


<br/>
<code>zypper in -t patch
SUSE-SLE-Micro-5.4-2025-1195=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Live Patching 15-SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Live-Patching-15-SP4-2025-1195=1</code>


<br/>
Please note that this is the initial kernel livepatch
without fixes itself,
this package is later updated by separate standalone
kernel livepatch
updates.


</li>

<li class="list-group-item">
SUSE Linux Enterprise High Availability Extension 15 SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HA-15-SP4-2025-1195=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1195=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1195=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server 15 SP4 LTSS


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1195=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server for SAP Applications 15 SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1195=1</code>



</li>

<li class="list-group-item">
SUSE Manager Proxy 4.3


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1195=1</code>



</li>

<li class="list-group-item">
SUSE Manager Retail Branch Server 4.3


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.3-2025-1195=1</code>



</li>

<li class="list-group-item">
SUSE Manager Server 4.3


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1195=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
openSUSE Leap 15.4 (noarch nosrc)
<ul>


<li>kernel-docs-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (noarch)
<ul>


<li>kernel-macros-5.14.21-150400.24.161.1</li>


<li>kernel-devel-5.14.21-150400.24.161.1</li>


<li>kernel-source-5.14.21-150400.24.161.1</li>


<li>kernel-source-vanilla-5.14.21-150400.24.161.1</li>


<li>kernel-docs-html-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (nosrc ppc64le x86_64)
<ul>


<li>kernel-debug-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (ppc64le x86_64)
<ul>


<li>kernel-debug-debugsource-5.14.21-150400.24.161.1</li>


<li>kernel-debug-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-debug-devel-5.14.21-150400.24.161.1</li>


<li>kernel-debug-devel-debuginfo-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
<ul>


<li>kernel-kvmsmall-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-kvmsmall-devel-5.14.21-150400.24.161.1</li>


<li>kernel-kvmsmall-debugsource-5.14.21-150400.24.161.1</li>


<li>kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1</li>


<li>kernel-default-base-rebuild-5.14.21-150400.24.161.1.150400.24.80.1</li>


<li>kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
<ul>


<li>kernel-default-extra-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>reiserfs-kmp-default-5.14.21-150400.24.161.1</li>


<li>kselftests-kmp-default-5.14.21-150400.24.161.1</li>


<li>cluster-md-kmp-default-5.14.21-150400.24.161.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.161.1</li>


<li>kernel-default-optional-5.14.21-150400.24.161.1</li>


<li>kernel-default-devel-5.14.21-150400.24.161.1</li>


<li>ocfs2-kmp-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-obs-build-debugsource-5.14.21-150400.24.161.1</li>


<li>kselftests-kmp-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-syms-5.14.21-150400.24.161.1</li>


<li>kernel-obs-build-5.14.21-150400.24.161.1</li>


<li>kernel-obs-qa-5.14.21-150400.24.161.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-default-extra-5.14.21-150400.24.161.1</li>


<li>kernel-default-livepatch-5.14.21-150400.24.161.1</li>


<li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>cluster-md-kmp-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-default-optional-debuginfo-5.14.21-150400.24.161.1</li>


<li>gfs2-kmp-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>dlm-kmp-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>dlm-kmp-default-5.14.21-150400.24.161.1</li>


<li>ocfs2-kmp-default-5.14.21-150400.24.161.1</li>


<li>gfs2-kmp-default-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
<ul>


<li>kernel-default-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (ppc64le s390x x86_64)
<ul>


<li>kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-1-150400.9.3.1</li>


<li>kernel-default-livepatch-devel-5.14.21-150400.24.161.1</li>


<li>kernel-livepatch-5_14_21-150400_24_161-default-1-150400.9.3.1</li>


<li>kernel-livepatch-SLE15-SP4_Update_39-debugsource-1-150400.9.3.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
<ul>


<li>kernel-kvmsmall-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (nosrc s390x)
<ul>


<li>kernel-zfcpdump-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (s390x)
<ul>


<li>kernel-zfcpdump-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-zfcpdump-debugsource-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (nosrc)
<ul>


<li>dtb-aarch64-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (aarch64)
<ul>


<li>dtb-cavium-5.14.21-150400.24.161.1</li>


<li>kernel-64kb-debugsource-5.14.21-150400.24.161.1</li>


<li>reiserfs-kmp-64kb-5.14.21-150400.24.161.1</li>


<li>kselftests-kmp-64kb-5.14.21-150400.24.161.1</li>


<li>kernel-64kb-devel-5.14.21-150400.24.161.1</li>


<li>dtb-altera-5.14.21-150400.24.161.1</li>


<li>kernel-64kb-extra-debuginfo-5.14.21-150400.24.161.1</li>


<li>dtb-freescale-5.14.21-150400.24.161.1</li>


<li>kernel-64kb-devel-debuginfo-5.14.21-150400.24.161.1</li>


<li>dtb-arm-5.14.21-150400.24.161.1</li>


<li>kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.161.1</li>


<li>dtb-amazon-5.14.21-150400.24.161.1</li>


<li>cluster-md-kmp-64kb-5.14.21-150400.24.161.1</li>


<li>kernel-64kb-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-64kb-optional-debuginfo-5.14.21-150400.24.161.1</li>


<li>cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.161.1</li>


<li>dlm-kmp-64kb-5.14.21-150400.24.161.1</li>


<li>gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.161.1</li>


<li>dtb-mediatek-5.14.21-150400.24.161.1</li>


<li>dtb-apm-5.14.21-150400.24.161.1</li>


<li>kernel-64kb-extra-5.14.21-150400.24.161.1</li>


<li>dtb-apple-5.14.21-150400.24.161.1</li>


<li>dtb-qcom-5.14.21-150400.24.161.1</li>


<li>dtb-hisilicon-5.14.21-150400.24.161.1</li>


<li>dtb-amd-5.14.21-150400.24.161.1</li>

<li>dtb-lg-5.14.21-150400.24.161.1</li>


<li>dtb-socionext-5.14.21-150400.24.161.1</li>


<li>reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.161.1</li>


<li>dtb-xilinx-5.14.21-150400.24.161.1</li>


<li>dtb-broadcom-5.14.21-150400.24.161.1</li>


<li>dtb-nvidia-5.14.21-150400.24.161.1</li>


<li>dtb-exynos-5.14.21-150400.24.161.1</li>


<li>ocfs2-kmp-64kb-5.14.21-150400.24.161.1</li>


<li>kernel-64kb-optional-5.14.21-150400.24.161.1</li>


<li>dtb-renesas-5.14.21-150400.24.161.1</li>


<li>ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.161.1</li>


<li>dtb-sprd-5.14.21-150400.24.161.1</li>


<li>dtb-amlogic-5.14.21-150400.24.161.1</li>


<li>dtb-rockchip-5.14.21-150400.24.161.1</li>


<li>dtb-marvell-5.14.21-150400.24.161.1</li>


<li>gfs2-kmp-64kb-5.14.21-150400.24.161.1</li>


<li>dlm-kmp-64kb-debuginfo-5.14.21-150400.24.161.1</li>


<li>dtb-allwinner-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
openSUSE Leap 15.4 (aarch64 nosrc)
<ul>


<li>kernel-64kb-5.14.21-150400.24.161.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc
s390x x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64
x86_64)
<ul>


<li>kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x
x86_64)
<ul>


<li>kernel-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.161.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x
x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
<ul>


<li>kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
<ul>


<li>kernel-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.161.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc
s390x x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64
x86_64)
<ul>


<li>kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x
x86_64)
<ul>


<li>kernel-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.161.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x
x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
<ul>


<li>kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
<ul>


<li>kernel-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.161.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
<ul>


<li>kernel-default-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x
x86_64)
<ul>


<li>kernel-default-livepatch-devel-5.14.21-150400.24.161.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-livepatch-5_14_21-150400_24_161-default-1-150400.9.3.1</li>


<li>kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-1-150400.9.3.1</li>


<li>kernel-livepatch-SLE15-SP4_Update_39-debugsource-1-150400.9.3.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.161.1</li>


<li>kernel-default-livepatch-5.14.21-150400.24.161.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Availability Extension 15 SP4
(aarch64 ppc64le s390x x86_64)
<ul>


<li>gfs2-kmp-default-5.14.21-150400.24.161.1</li>


<li>ocfs2-kmp-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>cluster-md-kmp-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>gfs2-kmp-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>dlm-kmp-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>dlm-kmp-default-5.14.21-150400.24.161.1</li>


<li>ocfs2-kmp-default-5.14.21-150400.24.161.1</li>


<li>cluster-md-kmp-default-5.14.21-150400.24.161.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Availability Extension 15 SP4
(nosrc)
<ul>


<li>kernel-default-5.14.21-150400.24.161.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP4 (aarch64 nosrc)
<ul>


<li>kernel-64kb-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP4 (aarch64)
<ul>


<li>kernel-64kb-devel-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-64kb-debugsource-5.14.21-150400.24.161.1</li>


<li>kernel-64kb-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-64kb-devel-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP4 (aarch64 nosrc x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP4 (aarch64 x86_64)
<ul>


<li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-default-devel-5.14.21-150400.24.161.1</li>


<li>kernel-obs-build-debugsource-5.14.21-150400.24.161.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1</li>


<li>kernel-syms-5.14.21-150400.24.161.1</li>


<li>kernel-obs-build-5.14.21-150400.24.161.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150400.24.161.1</li>


<li>reiserfs-kmp-default-5.14.21-150400.24.161.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP4 (noarch)
<ul>


<li>kernel-devel-5.14.21-150400.24.161.1</li>


<li>kernel-source-5.14.21-150400.24.161.1</li>


<li>kernel-macros-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP4 (noarch nosrc)
<ul>


<li>kernel-docs-5.14.21-150400.24.161.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP4 (aarch64 nosrc)
<ul>


<li>kernel-64kb-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP4 (aarch64)
<ul>


<li>kernel-64kb-devel-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-64kb-debugsource-5.14.21-150400.24.161.1</li>


<li>kernel-64kb-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-64kb-devel-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP4 (aarch64 nosrc x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP4 (aarch64 x86_64)
<ul>


<li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-default-devel-5.14.21-150400.24.161.1</li>


<li>kernel-obs-build-debugsource-5.14.21-150400.24.161.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1</li>


<li>kernel-syms-5.14.21-150400.24.161.1</li>


<li>kernel-obs-build-5.14.21-150400.24.161.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150400.24.161.1</li>


<li>reiserfs-kmp-default-5.14.21-150400.24.161.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP4 (noarch)
<ul>


<li>kernel-devel-5.14.21-150400.24.161.1</li>


<li>kernel-source-5.14.21-150400.24.161.1</li>


<li>kernel-macros-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP4 (noarch nosrc)
<ul>


<li>kernel-docs-5.14.21-150400.24.161.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 nosrc)
<ul>


<li>kernel-64kb-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64)
<ul>


<li>kernel-64kb-devel-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-64kb-debugsource-5.14.21-150400.24.161.1</li>


<li>kernel-64kb-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-64kb-devel-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le
s390x x86_64 nosrc)
<ul>


<li>kernel-default-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le
x86_64)
<ul>


<li>kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le
s390x x86_64)
<ul>


<li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-default-devel-5.14.21-150400.24.161.1</li>


<li>kernel-obs-build-debugsource-5.14.21-150400.24.161.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-syms-5.14.21-150400.24.161.1</li>


<li>kernel-obs-build-5.14.21-150400.24.161.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150400.24.161.1</li>


<li>reiserfs-kmp-default-5.14.21-150400.24.161.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
<ul>


<li>kernel-devel-5.14.21-150400.24.161.1</li>


<li>kernel-source-5.14.21-150400.24.161.1</li>


<li>kernel-macros-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP4 LTSS (noarch nosrc)
<ul>


<li>kernel-docs-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc s390x)
<ul>


<li>kernel-zfcpdump-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP4 LTSS (s390x)
<ul>


<li>kernel-zfcpdump-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-zfcpdump-debugsource-5.14.21-150400.24.161.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP4
(nosrc ppc64le x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP4
(ppc64le x86_64)
<ul>


<li>reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-default-devel-5.14.21-150400.24.161.1</li>


<li>kernel-obs-build-debugsource-5.14.21-150400.24.161.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1</li>


<li>kernel-syms-5.14.21-150400.24.161.1</li>


<li>kernel-obs-build-5.14.21-150400.24.161.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150400.24.161.1</li>


<li>reiserfs-kmp-default-5.14.21-150400.24.161.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP4
(noarch)
<ul>


<li>kernel-devel-5.14.21-150400.24.161.1</li>


<li>kernel-source-5.14.21-150400.24.161.1</li>


<li>kernel-macros-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP4
(noarch nosrc)
<ul>


<li>kernel-docs-5.14.21-150400.24.161.1</li>

</ul>
</li>



<li>
SUSE Manager Proxy 4.3 (nosrc x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Manager Proxy 4.3 (x86_64)
<ul>


<li>kernel-default-devel-5.14.21-150400.24.161.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1</li>


<li>kernel-syms-5.14.21-150400.24.161.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Manager Proxy 4.3 (noarch)
<ul>


<li>kernel-devel-5.14.21-150400.24.161.1</li>


<li>kernel-source-5.14.21-150400.24.161.1</li>


<li>kernel-macros-5.14.21-150400.24.161.1</li>

</ul>
</li>



<li>
SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Manager Retail Branch Server 4.3 (x86_64)
<ul>


<li>kernel-default-devel-5.14.21-150400.24.161.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Manager Retail Branch Server 4.3 (noarch)
<ul>


<li>kernel-devel-5.14.21-150400.24.161.1</li>


<li>kernel-macros-5.14.21-150400.24.161.1</li>

</ul>
</li>



<li>
SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
<ul>


<li>kernel-default-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Manager Server 4.3 (ppc64le x86_64)
<ul>


<li>kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1</li>

</ul>
</li>

<li>
SUSE Manager Server 4.3 (ppc64le s390x x86_64)
<ul>


<li>kernel-default-devel-5.14.21-150400.24.161.1</li>


<li>kernel-default-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-syms-5.14.21-150400.24.161.1</li>


<li>kernel-default-devel-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-default-debugsource-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Manager Server 4.3 (noarch)
<ul>


<li>kernel-devel-5.14.21-150400.24.161.1</li>


<li>kernel-source-5.14.21-150400.24.161.1</li>


<li>kernel-macros-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Manager Server 4.3 (nosrc s390x)
<ul>


<li>kernel-zfcpdump-5.14.21-150400.24.161.1</li>

</ul>
</li>

<li>
SUSE Manager Server 4.3 (s390x)
<ul>


<li>kernel-zfcpdump-debuginfo-5.14.21-150400.24.161.1</li>


<li>kernel-zfcpdump-debugsource-5.14.21-150400.24.161.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2017-5753.html">https://www.suse.com/security/cve/CVE-2017-5753.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2021-4454.html">https://www.suse.com/security/cve/CVE-2021-4454.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-1016.html">https://www.suse.com/security/cve/CVE-2022-1016.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49053.html">https://www.suse.com/security/cve/CVE-2022-49053.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49293.html">https://www.suse.com/security/cve/CVE-2022-49293.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49465.html">https://www.suse.com/security/cve/CVE-2022-49465.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49650.html">https://www.suse.com/security/cve/CVE-2022-49650.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49739.html">https://www.suse.com/security/cve/CVE-2022-49739.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49746.html">https://www.suse.com/security/cve/CVE-2022-49746.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49748.html">https://www.suse.com/security/cve/CVE-2022-49748.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49751.html">https://www.suse.com/security/cve/CVE-2022-49751.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49753.html">https://www.suse.com/security/cve/CVE-2022-49753.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49755.html">https://www.suse.com/security/cve/CVE-2022-49755.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2022-49759.html">https://www.suse.com/security/cve/CVE-2022-49759.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-0179.html">https://www.suse.com/security/cve/CVE-2023-0179.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-1652.html">https://www.suse.com/security/cve/CVE-2023-1652.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-2162.html">https://www.suse.com/security/cve/CVE-2023-2162.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-3567.html">https://www.suse.com/security/cve/CVE-2023-3567.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52930.html">https://www.suse.com/security/cve/CVE-2023-52930.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52933.html">https://www.suse.com/security/cve/CVE-2023-52933.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52935.html">https://www.suse.com/security/cve/CVE-2023-52935.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52939.html">https://www.suse.com/security/cve/CVE-2023-52939.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52941.html">https://www.suse.com/security/cve/CVE-2023-52941.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52973.html">https://www.suse.com/security/cve/CVE-2023-52973.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52974.html">https://www.suse.com/security/cve/CVE-2023-52974.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52975.html">https://www.suse.com/security/cve/CVE-2023-52975.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52976.html">https://www.suse.com/security/cve/CVE-2023-52976.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52979.html">https://www.suse.com/security/cve/CVE-2023-52979.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52983.html">https://www.suse.com/security/cve/CVE-2023-52983.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52984.html">https://www.suse.com/security/cve/CVE-2023-52984.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52988.html">https://www.suse.com/security/cve/CVE-2023-52988.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52989.html">https://www.suse.com/security/cve/CVE-2023-52989.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52992.html">https://www.suse.com/security/cve/CVE-2023-52992.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-52993.html">https://www.suse.com/security/cve/CVE-2023-52993.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-53000.html">https://www.suse.com/security/cve/CVE-2023-53000.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-53005.html">https://www.suse.com/security/cve/CVE-2023-53005.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-53006.html">https://www.suse.com/security/cve/CVE-2023-53006.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-53007.html">https://www.suse.com/security/cve/CVE-2023-53007.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-53008.html">https://www.suse.com/security/cve/CVE-2023-53008.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-53010.html">https://www.suse.com/security/cve/CVE-2023-53010.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-53015.html">https://www.suse.com/security/cve/CVE-2023-53015.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-53016.html">https://www.suse.com/security/cve/CVE-2023-53016.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-53019.html">https://www.suse.com/security/cve/CVE-2023-53019.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-53023.html">https://www.suse.com/security/cve/CVE-2023-53023.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-53024.html">https://www.suse.com/security/cve/CVE-2023-53024.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-53025.html">https://www.suse.com/security/cve/CVE-2023-53025.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-53026.html">https://www.suse.com/security/cve/CVE-2023-53026.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-53028.html">https://www.suse.com/security/cve/CVE-2023-53028.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-53029.html">https://www.suse.com/security/cve/CVE-2023-53029.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-53030.html">https://www.suse.com/security/cve/CVE-2023-53030.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2023-53033.html">https://www.suse.com/security/cve/CVE-2023-53033.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-50290.html">https://www.suse.com/security/cve/CVE-2024-50290.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53063.html">https://www.suse.com/security/cve/CVE-2024-53063.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-53064.html">https://www.suse.com/security/cve/CVE-2024-53064.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-56651.html">https://www.suse.com/security/cve/CVE-2024-56651.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-58083.html">https://www.suse.com/security/cve/CVE-2024-58083.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21693.html">https://www.suse.com/security/cve/CVE-2025-21693.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21714.html">https://www.suse.com/security/cve/CVE-2025-21714.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21732.html">https://www.suse.com/security/cve/CVE-2025-21732.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21753.html">https://www.suse.com/security/cve/CVE-2025-21753.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21772.html">https://www.suse.com/security/cve/CVE-2025-21772.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-21839.html">https://www.suse.com/security/cve/CVE-2025-21839.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1193629">https://bugzilla.suse.com/show_bug.cgi?id=1193629</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1197227">https://bugzilla.suse.com/show_bug.cgi?id=1197227</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207034">https://bugzilla.suse.com/show_bug.cgi?id=1207034</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207186">https://bugzilla.suse.com/show_bug.cgi?id=1207186</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1207878">https://bugzilla.suse.com/show_bug.cgi?id=1207878</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209262">https://bugzilla.suse.com/show_bug.cgi?id=1209262</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209547">https://bugzilla.suse.com/show_bug.cgi?id=1209547</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1209788">https://bugzilla.suse.com/show_bug.cgi?id=1209788</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1210647">https://bugzilla.suse.com/show_bug.cgi?id=1210647</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1213167">https://bugzilla.suse.com/show_bug.cgi?id=1213167</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1225742">https://bugzilla.suse.com/show_bug.cgi?id=1225742</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1231375">https://bugzilla.suse.com/show_bug.cgi?id=1231375</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233479">https://bugzilla.suse.com/show_bug.cgi?id=1233479</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233557">https://bugzilla.suse.com/show_bug.cgi?id=1233557</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1233558">https://bugzilla.suse.com/show_bug.cgi?id=1233558</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1234464">https://bugzilla.suse.com/show_bug.cgi?id=1234464</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1235528">https://bugzilla.suse.com/show_bug.cgi?id=1235528</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237029">https://bugzilla.suse.com/show_bug.cgi?id=1237029</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237530">https://bugzilla.suse.com/show_bug.cgi?id=1237530</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237875">https://bugzilla.suse.com/show_bug.cgi?id=1237875</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237877">https://bugzilla.suse.com/show_bug.cgi?id=1237877</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237890">https://bugzilla.suse.com/show_bug.cgi?id=1237890</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1237918">https://bugzilla.suse.com/show_bug.cgi?id=1237918</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238911">https://bugzilla.suse.com/show_bug.cgi?id=1238911</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1238919">https://bugzilla.suse.com/show_bug.cgi?id=1238919</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239016">https://bugzilla.suse.com/show_bug.cgi?id=1239016</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239036">https://bugzilla.suse.com/show_bug.cgi?id=1239036</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239061">https://bugzilla.suse.com/show_bug.cgi?id=1239061</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239126">https://bugzilla.suse.com/show_bug.cgi?id=1239126</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239452">https://bugzilla.suse.com/show_bug.cgi?id=1239452</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239454">https://bugzilla.suse.com/show_bug.cgi?id=1239454</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239968">https://bugzilla.suse.com/show_bug.cgi?id=1239968</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1239969">https://bugzilla.suse.com/show_bug.cgi?id=1239969</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240133">https://bugzilla.suse.com/show_bug.cgi?id=1240133</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240195">https://bugzilla.suse.com/show_bug.cgi?id=1240195</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240205">https://bugzilla.suse.com/show_bug.cgi?id=1240205</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240207">https://bugzilla.suse.com/show_bug.cgi?id=1240207</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240208">https://bugzilla.suse.com/show_bug.cgi?id=1240208</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240210">https://bugzilla.suse.com/show_bug.cgi?id=1240210</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240212">https://bugzilla.suse.com/show_bug.cgi?id=1240212</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240213">https://bugzilla.suse.com/show_bug.cgi?id=1240213</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240218">https://bugzilla.suse.com/show_bug.cgi?id=1240218</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240220">https://bugzilla.suse.com/show_bug.cgi?id=1240220</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240227">https://bugzilla.suse.com/show_bug.cgi?id=1240227</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240229">https://bugzilla.suse.com/show_bug.cgi?id=1240229</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240231">https://bugzilla.suse.com/show_bug.cgi?id=1240231</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240242">https://bugzilla.suse.com/show_bug.cgi?id=1240242</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240245">https://bugzilla.suse.com/show_bug.cgi?id=1240245</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240247">https://bugzilla.suse.com/show_bug.cgi?id=1240247</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240250">https://bugzilla.suse.com/show_bug.cgi?id=1240250</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240254">https://bugzilla.suse.com/show_bug.cgi?id=1240254</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240256">https://bugzilla.suse.com/show_bug.cgi?id=1240256</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240264">https://bugzilla.suse.com/show_bug.cgi?id=1240264</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240266">https://bugzilla.suse.com/show_bug.cgi?id=1240266</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240272">https://bugzilla.suse.com/show_bug.cgi?id=1240272</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240275">https://bugzilla.suse.com/show_bug.cgi?id=1240275</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240276">https://bugzilla.suse.com/show_bug.cgi?id=1240276</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240278">https://bugzilla.suse.com/show_bug.cgi?id=1240278</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240279">https://bugzilla.suse.com/show_bug.cgi?id=1240279</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240280">https://bugzilla.suse.com/show_bug.cgi?id=1240280</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240281">https://bugzilla.suse.com/show_bug.cgi?id=1240281</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240282">https://bugzilla.suse.com/show_bug.cgi?id=1240282</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240283">https://bugzilla.suse.com/show_bug.cgi?id=1240283</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240284">https://bugzilla.suse.com/show_bug.cgi?id=1240284</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240286">https://bugzilla.suse.com/show_bug.cgi?id=1240286</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240288">https://bugzilla.suse.com/show_bug.cgi?id=1240288</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240290">https://bugzilla.suse.com/show_bug.cgi?id=1240290</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240292">https://bugzilla.suse.com/show_bug.cgi?id=1240292</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240293">https://bugzilla.suse.com/show_bug.cgi?id=1240293</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240297">https://bugzilla.suse.com/show_bug.cgi?id=1240297</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240304">https://bugzilla.suse.com/show_bug.cgi?id=1240304</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240308">https://bugzilla.suse.com/show_bug.cgi?id=1240308</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240309">https://bugzilla.suse.com/show_bug.cgi?id=1240309</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240317">https://bugzilla.suse.com/show_bug.cgi?id=1240317</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240318">https://bugzilla.suse.com/show_bug.cgi?id=1240318</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1240322">https://bugzilla.suse.com/show_bug.cgi?id=1240322</a>
</li>


</ul>

</div>

--===============3652786791710398639==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung