# Security update for the Linux Kernel Announcement ID: SUSE-SU-2025:1195-1 Release Date: 2025-04-10T13:48:07Z Rating: important References: * bsc#1193629 * bsc#1197227 * bsc#1207034 * bsc#1207186 * bsc#1207878 * bsc#1209262 * bsc#1209547 * bsc#1209788 * bsc#1210647 * bsc#1213167 * bsc#1225742 * bsc#1231375 * bsc#1233479 * bsc#1233557 * bsc#1233558 * bsc#1234464 * bsc#1235528 * bsc#1237029 * bsc#1237530 * bsc#1237875 * bsc#1237877 * bsc#1237890 * bsc#1237918 * bsc#1238911 * bsc#1238919 * bsc#1239016 * bsc#1239036 * bsc#1239061 * bsc#1239126 * bsc#1239452 * bsc#1239454 * bsc#1239968 * bsc#1239969 * bsc#1240133 * bsc#1240195 * bsc#1240205 * bsc#1240207 * bsc#1240208 * bsc#1240210 * bsc#1240212 * bsc#1240213 * bsc#1240218 * bsc#1240220 * bsc#1240227 * bsc#1240229 * bsc#1240231 * bsc#1240242 * bsc#1240245 * bsc#1240247 * bsc#1240250 * bsc#1240254 * bsc#1240256 * bsc#1240264 * bsc#1240266 * bsc#1240272 * bsc#1240275 * bsc#1240276 * bsc#1240278 * bsc#1240279 * bsc#1240280 * bsc#1240281 * bsc#1240282 * bsc#1240283 * bsc#1240284 * bsc#1240286 * bsc#1240288 * bsc#1240290 * bsc#1240292 * bsc#1240293 * bsc#1240297 * bsc#1240304 * bsc#1240308 * bsc#1240309 * bsc#1240317 * bsc#1240318 * bsc#1240322 Cross-References: * CVE-2017-5753 * CVE-2021-4454 * CVE-2022-1016 * CVE-2022-49053 * CVE-2022-49293 * CVE-2022-49465 * CVE-2022-49650 * CVE-2022-49739 * CVE-2022-49746 * CVE-2022-49748 * CVE-2022-49751 * CVE-2022-49753 * CVE-2022-49755 * CVE-2022-49759 * CVE-2023-0179 * CVE-2023-1652 * CVE-2023-2162 * CVE-2023-3567 * CVE-2023-52930 * CVE-2023-52933 * CVE-2023-52935 * CVE-2023-52939 * CVE-2023-52941 * CVE-2023-52973 * CVE-2023-52974 * CVE-2023-52975 * CVE-2023-52976 * CVE-2023-52979 * CVE-2023-52983 * CVE-2023-52984 * CVE-2023-52988 * CVE-2023-52989 * CVE-2023-52992 * CVE-2023-52993 * CVE-2023-53000 * CVE-2023-53005 * CVE-2023-53006 * CVE-2023-53007 * CVE-2023-53008 * CVE-2023-53010 * CVE-2023-53015 * CVE-2023-53016 * CVE-2023-53019 * CVE-2023-53023 * CVE-2023-53024 * CVE-2023-53025 * CVE-2023-53026 * CVE-2023-53028 * CVE-2023-53029 * CVE-2023-53030 * CVE-2023-53033 * CVE-2024-50290 * CVE-2024-53063 * CVE-2024-53064 * CVE-2024-56651 * CVE-2024-58083 * CVE-2025-21693 * CVE-2025-21714 * CVE-2025-21732 * CVE-2025-21753 * CVE-2025-21772 * CVE-2025-21839 CVSS scores: * CVE-2017-5753 ( SUSE ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( SUSE ): 7.1 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( NVD ): 5.6 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2017-5753 ( NVD ): 5.6 CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2021-4454 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2021-4454 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-1016 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-49053 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49053 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49053 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49293 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49465 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49465 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49465 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49650 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49739 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49746 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49748 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49751 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49753 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49755 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49755 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49759 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-0179 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-0179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1652 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1652 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-1652 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-2162 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-2162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-3567 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-3567 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-52930 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52933 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52935 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52935 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52939 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52941 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52973 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52973 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52974 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52974 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52975 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52975 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52975 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52976 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52979 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52983 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52988 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52992 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-52992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53008 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53016 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53023 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53025 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50290 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2024-53063 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2024-53063 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56651 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56651 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56651 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-58083 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21693 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21693 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21714 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21714 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21753 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-21753 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21772 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21772 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves 62 vulnerabilities and has 14 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918). * CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled (bsc#1238919). * CVE-2022-49739: gfs2: Always check inode size of inline inodes (bsc#1240207). * CVE-2023-52935: mm/khugepaged: fix ->anon_vma race (bsc#1240276). * CVE-2024-53064: idpf: fix idpf_vc_core_init error path (bsc#1233558 bsc#1234464). * CVE-2024-56651: can: hi311x: hi3110_can_ist(): fix potential use-after-free (bsc#1235528). * CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036). * CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029). * CVE-2025-21714: RDMA/mlx5: Fix implicit ODP use after free (bsc#1237890). * CVE-2025-21732: RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error (bsc#1237877). * CVE-2025-21753: btrfs: fix use-after-free when attempting to join an aborted transaction (bsc#1237875). * CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238911). The following non-security bugs were fixed: * ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530). * RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016). * RDMA/mana_ib: Use v2 version of cfg_rx_steer_req to enable RX coalescing (bsc#1239016). * RDMA/mlx5: Fix implicit ODP hang on parent deregistration (git-fixes) * btrfs: defrag: do not use merged extent map for their generation check (bsc#1239968). * btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1239968). * btrfs: fix extent map merging not happening for adjacent extents (bsc#1239968). * btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1239969). * btrfs: send: fix invalid clone operation for file that got its size decreased (bsc#1239969). * gfs2: Fix inode height consistency check (git-fixes). * mm/mmu_notifier.c: fix race in mmu_interval_notifier_remove() (bsc#1239126). * mm: zswap: move allocations during CPU init outside the lock (git-fixes). * net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016). * net: mana: Allow variable size indirection table (bsc#1239016). * net: mana: Avoid open coded arithmetic (bsc#1239016). * net: mana: Fix error handling in mana_create_txq/rxq's NAPI cleanup (bsc#1240195). * net: mana: Support holes in device list reply msg (bsc#1240133). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-1195=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1195=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-1195=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1195=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-1195=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-1195=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2025-1195=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-1195=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-1195=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-1195=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-1195=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-1195=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-1195=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-1195=1 ## Package List: * openSUSE Leap 15.4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (noarch) * kernel-macros-5.14.21-150400.24.161.1 * kernel-devel-5.14.21-150400.24.161.1 * kernel-source-5.14.21-150400.24.161.1 * kernel-source-vanilla-5.14.21-150400.24.161.1 * kernel-docs-html-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (nosrc ppc64le x86_64) * kernel-debug-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (ppc64le x86_64) * kernel-debug-debugsource-5.14.21-150400.24.161.1 * kernel-debug-debuginfo-5.14.21-150400.24.161.1 * kernel-debug-devel-5.14.21-150400.24.161.1 * kernel-debug-devel-debuginfo-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * kernel-kvmsmall-debuginfo-5.14.21-150400.24.161.1 * kernel-kvmsmall-devel-5.14.21-150400.24.161.1 * kernel-kvmsmall-debugsource-5.14.21-150400.24.161.1 * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * kernel-default-base-rebuild-5.14.21-150400.24.161.1.150400.24.80.1 * kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * kernel-default-extra-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * reiserfs-kmp-default-5.14.21-150400.24.161.1 * kselftests-kmp-default-5.14.21-150400.24.161.1 * cluster-md-kmp-default-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * kernel-default-optional-5.14.21-150400.24.161.1 * kernel-default-devel-5.14.21-150400.24.161.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-obs-build-debugsource-5.14.21-150400.24.161.1 * kselftests-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-syms-5.14.21-150400.24.161.1 * kernel-obs-build-5.14.21-150400.24.161.1 * kernel-obs-qa-5.14.21-150400.24.161.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * kernel-default-extra-5.14.21-150400.24.161.1 * kernel-default-livepatch-5.14.21-150400.24.161.1 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-optional-debuginfo-5.14.21-150400.24.161.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.161.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.161.1 * dlm-kmp-default-5.14.21-150400.24.161.1 * ocfs2-kmp-default-5.14.21-150400.24.161.1 * gfs2-kmp-default-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-1-150400.9.3.1 * kernel-default-livepatch-devel-5.14.21-150400.24.161.1 * kernel-livepatch-5_14_21-150400_24_161-default-1-150400.9.3.1 * kernel-livepatch-SLE15-SP4_Update_39-debugsource-1-150400.9.3.1 * openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150400.24.161.1 * kernel-zfcpdump-debugsource-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (nosrc) * dtb-aarch64-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (aarch64) * dtb-cavium-5.14.21-150400.24.161.1 * kernel-64kb-debugsource-5.14.21-150400.24.161.1 * reiserfs-kmp-64kb-5.14.21-150400.24.161.1 * kselftests-kmp-64kb-5.14.21-150400.24.161.1 * kernel-64kb-devel-5.14.21-150400.24.161.1 * dtb-altera-5.14.21-150400.24.161.1 * kernel-64kb-extra-debuginfo-5.14.21-150400.24.161.1 * dtb-freescale-5.14.21-150400.24.161.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.161.1 * dtb-arm-5.14.21-150400.24.161.1 * kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.161.1 * dtb-amazon-5.14.21-150400.24.161.1 * cluster-md-kmp-64kb-5.14.21-150400.24.161.1 * kernel-64kb-debuginfo-5.14.21-150400.24.161.1 * kernel-64kb-optional-debuginfo-5.14.21-150400.24.161.1 * cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.161.1 * dlm-kmp-64kb-5.14.21-150400.24.161.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.161.1 * dtb-mediatek-5.14.21-150400.24.161.1 * dtb-apm-5.14.21-150400.24.161.1 * kernel-64kb-extra-5.14.21-150400.24.161.1 * dtb-apple-5.14.21-150400.24.161.1 * dtb-qcom-5.14.21-150400.24.161.1 * dtb-hisilicon-5.14.21-150400.24.161.1 * dtb-amd-5.14.21-150400.24.161.1 * dtb-lg-5.14.21-150400.24.161.1 * dtb-socionext-5.14.21-150400.24.161.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.161.1 * dtb-xilinx-5.14.21-150400.24.161.1 * dtb-broadcom-5.14.21-150400.24.161.1 * dtb-nvidia-5.14.21-150400.24.161.1 * dtb-exynos-5.14.21-150400.24.161.1 * ocfs2-kmp-64kb-5.14.21-150400.24.161.1 * kernel-64kb-optional-5.14.21-150400.24.161.1 * dtb-renesas-5.14.21-150400.24.161.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.161.1 * dtb-sprd-5.14.21-150400.24.161.1 * dtb-amlogic-5.14.21-150400.24.161.1 * dtb-rockchip-5.14.21-150400.24.161.1 * dtb-marvell-5.14.21-150400.24.161.1 * gfs2-kmp-64kb-5.14.21-150400.24.161.1 * dlm-kmp-64kb-debuginfo-5.14.21-150400.24.161.1 * dtb-allwinner-5.14.21-150400.24.161.1 * openSUSE Leap 15.4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-default-livepatch-devel-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-livepatch-5_14_21-150400_24_161-default-1-150400.9.3.1 * kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-1-150400.9.3.1 * kernel-livepatch-SLE15-SP4_Update_39-debugsource-1-150400.9.3.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * kernel-default-livepatch-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * gfs2-kmp-default-5.14.21-150400.24.161.1 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.161.1 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.161.1 * dlm-kmp-default-debuginfo-5.14.21-150400.24.161.1 * dlm-kmp-default-5.14.21-150400.24.161.1 * ocfs2-kmp-default-5.14.21-150400.24.161.1 * cluster-md-kmp-default-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150400.24.161.1 * kernel-64kb-debugsource-5.14.21-150400.24.161.1 * kernel-64kb-debuginfo-5.14.21-150400.24.161.1 * kernel-64kb-devel-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-devel-5.14.21-150400.24.161.1 * kernel-obs-build-debugsource-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * kernel-syms-5.14.21-150400.24.161.1 * kernel-obs-build-5.14.21-150400.24.161.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * reiserfs-kmp-default-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.161.1 * kernel-source-5.14.21-150400.24.161.1 * kernel-macros-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150400.24.161.1 * kernel-64kb-debugsource-5.14.21-150400.24.161.1 * kernel-64kb-debuginfo-5.14.21-150400.24.161.1 * kernel-64kb-devel-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-devel-5.14.21-150400.24.161.1 * kernel-obs-build-debugsource-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * kernel-syms-5.14.21-150400.24.161.1 * kernel-obs-build-5.14.21-150400.24.161.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * reiserfs-kmp-default-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.161.1 * kernel-source-5.14.21-150400.24.161.1 * kernel-macros-5.14.21-150400.24.161.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64) * kernel-64kb-devel-debuginfo-5.14.21-150400.24.161.1 * kernel-64kb-debugsource-5.14.21-150400.24.161.1 * kernel-64kb-debuginfo-5.14.21-150400.24.161.1 * kernel-64kb-devel-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-devel-5.14.21-150400.24.161.1 * kernel-obs-build-debugsource-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-syms-5.14.21-150400.24.161.1 * kernel-obs-build-5.14.21-150400.24.161.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * reiserfs-kmp-default-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * kernel-devel-5.14.21-150400.24.161.1 * kernel-source-5.14.21-150400.24.161.1 * kernel-macros-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch nosrc) * kernel-docs-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150400.24.161.1 * kernel-zfcpdump-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-devel-5.14.21-150400.24.161.1 * kernel-obs-build-debugsource-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * kernel-syms-5.14.21-150400.24.161.1 * kernel-obs-build-5.14.21-150400.24.161.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * reiserfs-kmp-default-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * kernel-devel-5.14.21-150400.24.161.1 * kernel-source-5.14.21-150400.24.161.1 * kernel-macros-5.14.21-150400.24.161.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.161.1 * SUSE Manager Proxy 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Manager Proxy 4.3 (x86_64) * kernel-default-devel-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * kernel-syms-5.14.21-150400.24.161.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Manager Proxy 4.3 (noarch) * kernel-devel-5.14.21-150400.24.161.1 * kernel-source-5.14.21-150400.24.161.1 * kernel-macros-5.14.21-150400.24.161.1 * SUSE Manager Retail Branch Server 4.3 (nosrc x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * kernel-default-devel-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Manager Retail Branch Server 4.3 (noarch) * kernel-devel-5.14.21-150400.24.161.1 * kernel-macros-5.14.21-150400.24.161.1 * SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64) * kernel-default-5.14.21-150400.24.161.1 * SUSE Manager Server 4.3 (ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.161.1.150400.24.80.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * kernel-default-devel-5.14.21-150400.24.161.1 * kernel-default-debuginfo-5.14.21-150400.24.161.1 * kernel-syms-5.14.21-150400.24.161.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.161.1 * kernel-default-debugsource-5.14.21-150400.24.161.1 * SUSE Manager Server 4.3 (noarch) * kernel-devel-5.14.21-150400.24.161.1 * kernel-source-5.14.21-150400.24.161.1 * kernel-macros-5.14.21-150400.24.161.1 * SUSE Manager Server 4.3 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.161.1 * SUSE Manager Server 4.3 (s390x) * kernel-zfcpdump-debuginfo-5.14.21-150400.24.161.1 * kernel-zfcpdump-debugsource-5.14.21-150400.24.161.1 ## References: * https://www.suse.com/security/cve/CVE-2017-5753.html * https://www.suse.com/security/cve/CVE-2021-4454.html * https://www.suse.com/security/cve/CVE-2022-1016.html * https://www.suse.com/security/cve/CVE-2022-49053.html * https://www.suse.com/security/cve/CVE-2022-49293.html * https://www.suse.com/security/cve/CVE-2022-49465.html * https://www.suse.com/security/cve/CVE-2022-49650.html * https://www.suse.com/security/cve/CVE-2022-49739.html * https://www.suse.com/security/cve/CVE-2022-49746.html * https://www.suse.com/security/cve/CVE-2022-49748.html * https://www.suse.com/security/cve/CVE-2022-49751.html * https://www.suse.com/security/cve/CVE-2022-49753.html * https://www.suse.com/security/cve/CVE-2022-49755.html * https://www.suse.com/security/cve/CVE-2022-49759.html * https://www.suse.com/security/cve/CVE-2023-0179.html * https://www.suse.com/security/cve/CVE-2023-1652.html * https://www.suse.com/security/cve/CVE-2023-2162.html * https://www.suse.com/security/cve/CVE-2023-3567.html * https://www.suse.com/security/cve/CVE-2023-52930.html * https://www.suse.com/security/cve/CVE-2023-52933.html * https://www.suse.com/security/cve/CVE-2023-52935.html * https://www.suse.com/security/cve/CVE-2023-52939.html * https://www.suse.com/security/cve/CVE-2023-52941.html * https://www.suse.com/security/cve/CVE-2023-52973.html * https://www.suse.com/security/cve/CVE-2023-52974.html * https://www.suse.com/security/cve/CVE-2023-52975.html * https://www.suse.com/security/cve/CVE-2023-52976.html * https://www.suse.com/security/cve/CVE-2023-52979.html * https://www.suse.com/security/cve/CVE-2023-52983.html * https://www.suse.com/security/cve/CVE-2023-52984.html * https://www.suse.com/security/cve/CVE-2023-52988.html * https://www.suse.com/security/cve/CVE-2023-52989.html * https://www.suse.com/security/cve/CVE-2023-52992.html * https://www.suse.com/security/cve/CVE-2023-52993.html * https://www.suse.com/security/cve/CVE-2023-53000.html * https://www.suse.com/security/cve/CVE-2023-53005.html * https://www.suse.com/security/cve/CVE-2023-53006.html * https://www.suse.com/security/cve/CVE-2023-53007.html * https://www.suse.com/security/cve/CVE-2023-53008.html * https://www.suse.com/security/cve/CVE-2023-53010.html * https://www.suse.com/security/cve/CVE-2023-53015.html * https://www.suse.com/security/cve/CVE-2023-53016.html * https://www.suse.com/security/cve/CVE-2023-53019.html * https://www.suse.com/security/cve/CVE-2023-53023.html * https://www.suse.com/security/cve/CVE-2023-53024.html * https://www.suse.com/security/cve/CVE-2023-53025.html * https://www.suse.com/security/cve/CVE-2023-53026.html * https://www.suse.com/security/cve/CVE-2023-53028.html * https://www.suse.com/security/cve/CVE-2023-53029.html * https://www.suse.com/security/cve/CVE-2023-53030.html * https://www.suse.com/security/cve/CVE-2023-53033.html * https://www.suse.com/security/cve/CVE-2024-50290.html * https://www.suse.com/security/cve/CVE-2024-53063.html * https://www.suse.com/security/cve/CVE-2024-53064.html * https://www.suse.com/security/cve/CVE-2024-56651.html * https://www.suse.com/security/cve/CVE-2024-58083.html * https://www.suse.com/security/cve/CVE-2025-21693.html * https://www.suse.com/security/cve/CVE-2025-21714.html * https://www.suse.com/security/cve/CVE-2025-21732.html * https://www.suse.com/security/cve/CVE-2025-21753.html * https://www.suse.com/security/cve/CVE-2025-21772.html * https://www.suse.com/security/cve/CVE-2025-21839.html * https://bugzilla.suse.com/show_bug.cgi?id=1193629 * https://bugzilla.suse.com/show_bug.cgi?id=1197227 * https://bugzilla.suse.com/show_bug.cgi?id=1207034 * https://bugzilla.suse.com/show_bug.cgi?id=1207186 * https://bugzilla.suse.com/show_bug.cgi?id=1207878 * https://bugzilla.suse.com/show_bug.cgi?id=1209262 * https://bugzilla.suse.com/show_bug.cgi?id=1209547 * https://bugzilla.suse.com/show_bug.cgi?id=1209788 * https://bugzilla.suse.com/show_bug.cgi?id=1210647 * https://bugzilla.suse.com/show_bug.cgi?id=1213167 * https://bugzilla.suse.com/show_bug.cgi?id=1225742 * https://bugzilla.suse.com/show_bug.cgi?id=1231375 * https://bugzilla.suse.com/show_bug.cgi?id=1233479 * https://bugzilla.suse.com/show_bug.cgi?id=1233557 * https://bugzilla.suse.com/show_bug.cgi?id=1233558 * https://bugzilla.suse.com/show_bug.cgi?id=1234464 * https://bugzilla.suse.com/show_bug.cgi?id=1235528 * https://bugzilla.suse.com/show_bug.cgi?id=1237029 * https://bugzilla.suse.com/show_bug.cgi?id=1237530 * https://bugzilla.suse.com/show_bug.cgi?id=1237875 * https://bugzilla.suse.com/show_bug.cgi?id=1237877 * https://bugzilla.suse.com/show_bug.cgi?id=1237890 * https://bugzilla.suse.com/show_bug.cgi?id=1237918 * https://bugzilla.suse.com/show_bug.cgi?id=1238911 * https://bugzilla.suse.com/show_bug.cgi?id=1238919 * https://bugzilla.suse.com/show_bug.cgi?id=1239016 * https://bugzilla.suse.com/show_bug.cgi?id=1239036 * https://bugzilla.suse.com/show_bug.cgi?id=1239061 * https://bugzilla.suse.com/show_bug.cgi?id=1239126 * https://bugzilla.suse.com/show_bug.cgi?id=1239452 * https://bugzilla.suse.com/show_bug.cgi?id=1239454 * https://bugzilla.suse.com/show_bug.cgi?id=1239968 * https://bugzilla.suse.com/show_bug.cgi?id=1239969 * https://bugzilla.suse.com/show_bug.cgi?id=1240133 * https://bugzilla.suse.com/show_bug.cgi?id=1240195 * https://bugzilla.suse.com/show_bug.cgi?id=1240205 * https://bugzilla.suse.com/show_bug.cgi?id=1240207 * https://bugzilla.suse.com/show_bug.cgi?id=1240208 * https://bugzilla.suse.com/show_bug.cgi?id=1240210 * https://bugzilla.suse.com/show_bug.cgi?id=1240212 * https://bugzilla.suse.com/show_bug.cgi?id=1240213 * https://bugzilla.suse.com/show_bug.cgi?id=1240218 * https://bugzilla.suse.com/show_bug.cgi?id=1240220 * https://bugzilla.suse.com/show_bug.cgi?id=1240227 * https://bugzilla.suse.com/show_bug.cgi?id=1240229 * https://bugzilla.suse.com/show_bug.cgi?id=1240231 * https://bugzilla.suse.com/show_bug.cgi?id=1240242 * https://bugzilla.suse.com/show_bug.cgi?id=1240245 * https://bugzilla.suse.com/show_bug.cgi?id=1240247 * https://bugzilla.suse.com/show_bug.cgi?id=1240250 * https://bugzilla.suse.com/show_bug.cgi?id=1240254 * https://bugzilla.suse.com/show_bug.cgi?id=1240256 * https://bugzilla.suse.com/show_bug.cgi?id=1240264 * https://bugzilla.suse.com/show_bug.cgi?id=1240266 * https://bugzilla.suse.com/show_bug.cgi?id=1240272 * https://bugzilla.suse.com/show_bug.cgi?id=1240275 * https://bugzilla.suse.com/show_bug.cgi?id=1240276 * https://bugzilla.suse.com/show_bug.cgi?id=1240278 * https://bugzilla.suse.com/show_bug.cgi?id=1240279 * https://bugzilla.suse.com/show_bug.cgi?id=1240280 * https://bugzilla.suse.com/show_bug.cgi?id=1240281 * https://bugzilla.suse.com/show_bug.cgi?id=1240282 * https://bugzilla.suse.com/show_bug.cgi?id=1240283 * https://bugzilla.suse.com/show_bug.cgi?id=1240284 * https://bugzilla.suse.com/show_bug.cgi?id=1240286 * https://bugzilla.suse.com/show_bug.cgi?id=1240288 * https://bugzilla.suse.com/show_bug.cgi?id=1240290 * https://bugzilla.suse.com/show_bug.cgi?id=1240292 * https://bugzilla.suse.com/show_bug.cgi?id=1240293 * https://bugzilla.suse.com/show_bug.cgi?id=1240297 * https://bugzilla.suse.com/show_bug.cgi?id=1240304 * https://bugzilla.suse.com/show_bug.cgi?id=1240308 * https://bugzilla.suse.com/show_bug.cgi?id=1240309 * https://bugzilla.suse.com/show_bug.cgi?id=1240317 * https://bugzilla.suse.com/show_bug.cgi?id=1240318 * https://bugzilla.suse.com/show_bug.cgi?id=1240322