{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-livepatch-5_3_18-150300_59_179-default":"12-150300.2.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Live Patching 15 SP3","name":"kernel-livepatch-SLE15-SP3_Update_49","purl":"pkg:rpm/suse/kernel-livepatch-SLE15-SP3_Update_49&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12-150300.2.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for the Linux Kernel 5.3.18-150300_59_179 fixes several issues.\n\nThe following security issues were fixed:\n\n- CVE-2024-53146: NFSD: Prevent a potential integer overflow (bsc#1234854).\n- CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled (bsc#1238920).\n- CVE-2024-53214: vfio/pci: Properly hide first-in-list PCIe extended capability (bsc#1235005).\n- CVE-2024-53173: NFSv4.0: Fix a use-after-free problem in the asynchronous open() (bsc#1234892).\n- CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages (bsc#1235921).\n- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238912).\n- CVE-2024-50208: RDMA/bnxt_re: Fix a bug while setting up Level-2 PBL pages (bsc#1233118).\n- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1243648).\n","id":"SUSE-SU-2025:02446-1","modified":"2025-07-21T14:33:46Z","published":"2025-07-21T14:33:46Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202502446-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1233118"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234854"},{"type":"REPORT","url":"https://bugzilla.suse.com/1234892"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235005"},{"type":"REPORT","url":"https://bugzilla.suse.com/1235921"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238912"},{"type":"REPORT","url":"https://bugzilla.suse.com/1238920"},{"type":"REPORT","url":"https://bugzilla.suse.com/1243648"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-49465"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-50208"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53146"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53173"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-53214"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-56558"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-57893"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-21772"}],"related":["CVE-2022-49465","CVE-2024-50208","CVE-2024-53146","CVE-2024-53173","CVE-2024-53214","CVE-2024-56558","CVE-2024-57893","CVE-2025-21772"],"summary":"Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)","upstream":["CVE-2022-49465","CVE-2024-50208","CVE-2024-53146","CVE-2024-53173","CVE-2024-53214","CVE-2024-56558","CVE-2024-57893","CVE-2025-21772"]}