{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-livepatch-5_14_21-150400_24_141-default":"10-150400.2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP4","name":"kernel-livepatch-SLE15-SP4_Update_33","purl":"pkg:rpm/suse/kernel-livepatch-SLE15-SP4_Update_33&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"10-150400.2.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for the Linux Kernel 5.14.21-150400_24_141 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2024-53146: NFSD: Prevent a potential integer overflow (bsc#1234854).\n- CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled (bsc#1238920).\n- CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235005).\n- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234892).\n- CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages (bsc#1235921).\n- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238912).\n- CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234885).\n- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1243648).\n","id":"SUSE-SU-2025:02401-1","modified":"2025-07-21T06:34:10Z","published":"2025-07-21T06:34:10Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202502401-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234854"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234885"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234892"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235005"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235921"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238912"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238920"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243648"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49465"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53146"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53166"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53173"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53214"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56558"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57893"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21772"}],"related":["CVE-2022-49465","CVE-2024-53146","CVE-2024-53166","CVE-2024-53173","CVE-2024-53214","CVE-2024-56558","CVE-2024-57893","CVE-2025-21772"],"summary":"Security update for the Linux Kernel (Live Patch 33 for SLE 15 SP4)","upstream":["CVE-2022-49465","CVE-2024-53146","CVE-2024-53166","CVE-2024-53173","CVE-2024-53214","CVE-2024-56558","CVE-2024-57893","CVE-2025-21772"]}