SUSE SLES15 : Recommended update for initial livepatch (SUSE-SU-2025:02262-1)

high Nessus Plugin ID 241966

Language:

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:02262-1 advisory.

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2022-49110: netfilter: conntrack: revisit gc autotuning (bsc#1237981).
- CVE-2022-49139: Bluetooth: fix null ptr deref on hci_sync_conn_complete_evt (bsc#1238032).
- CVE-2022-49767: 9p/trans_fd: always use O_NONBLOCK read/write (bsc#1242493).
- CVE-2022-49775: tcp: cdg: allow tcp_cdg_release() to be called multiple times (bsc#1242245).
- CVE-2022-49858: octeontx2-pf: Fix SQE threshold checking (bsc#1242589).
- CVE-2023-53058: net/mlx5: E-Switch, Fix an Oops in error handling code (bsc#1242237).
- CVE-2023-53060: igb: revert rtnl_lock() that causes deadlock (bsc#1242241).
- CVE-2023-53064: iavf: Fix hang on reboot with ice (bsc#1242222).
- CVE-2023-53066: qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info (bsc#1242227).
- CVE-2023-53079: net/mlx5: Fix steering rules cleanup (bsc#1242765).
- CVE-2023-53114: i40e: Fix kernel crash during reboot when adapter is in recovery mode (bsc#1242398).
- CVE-2023-53134: bnxt_en: Avoid order-5 memory allocation for TPA data (bsc#1242380)
- CVE-2024-53168: net: make sock_inuse_add() available (bsc#1234887).
- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1235100).
- CVE-2025-21888: RDMA/mlx5: Fix a WARN during dereg_mr for DM type (bsc#1240177).
- CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1240802).
- CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion addition (bsc#1241525).
- CVE-2025-22060: net: mvpp2: Prevent parser TCAM memory corruption (bsc#1241526).
- CVE-2025-23138: watch_queue: fix pipe accounting mismatch (bsc#1241648).
- CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242596).
- CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640).
- CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762).


Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1184350

https://bugzilla.suse.com/1193629

https://bugzilla.suse.com/1204569

https://bugzilla.suse.com/1204619

https://bugzilla.suse.com/1204705

https://bugzilla.suse.com/1205282

https://bugzilla.suse.com/1206051

https://bugzilla.suse.com/1206073

https://bugzilla.suse.com/1206649

https://bugzilla.suse.com/1206886

https://bugzilla.suse.com/1206887

https://bugzilla.suse.com/1208542

https://bugzilla.suse.com/1209292

https://bugzilla.suse.com/1209556

https://bugzilla.suse.com/1209684

https://bugzilla.suse.com/1210337

https://bugzilla.suse.com/1210763

https://bugzilla.suse.com/1210767

https://bugzilla.suse.com/1211465

https://bugzilla.suse.com/1213012

https://bugzilla.suse.com/1213013

https://bugzilla.suse.com/1213094

https://bugzilla.suse.com/1213096

https://bugzilla.suse.com/1213946

https://bugzilla.suse.com/1214991

https://bugzilla.suse.com/1218470

https://bugzilla.suse.com/1232649

https://bugzilla.suse.com/1234887

https://bugzilla.suse.com/1235100

https://bugzilla.suse.com/1237981

https://bugzilla.suse.com/1238032

https://bugzilla.suse.com/1240177

https://bugzilla.suse.com/1240802

https://bugzilla.suse.com/1241525

https://bugzilla.suse.com/1241526

https://bugzilla.suse.com/1241640

https://bugzilla.suse.com/1241648

https://bugzilla.suse.com/1242147

https://bugzilla.suse.com/1242150

https://bugzilla.suse.com/1242151

https://bugzilla.suse.com/1242154

https://bugzilla.suse.com/1242157

https://bugzilla.suse.com/1242158

https://bugzilla.suse.com/1242164

https://bugzilla.suse.com/1242165

https://bugzilla.suse.com/1242169

https://bugzilla.suse.com/1242215

https://bugzilla.suse.com/1242218

https://bugzilla.suse.com/1242219

https://bugzilla.suse.com/1242222

https://bugzilla.suse.com/1242226

https://bugzilla.suse.com/1242227

https://bugzilla.suse.com/1242228

https://bugzilla.suse.com/1242229

https://bugzilla.suse.com/1242230

https://bugzilla.suse.com/1242231

https://bugzilla.suse.com/1242232

https://bugzilla.suse.com/1242237

https://bugzilla.suse.com/1242239

https://bugzilla.suse.com/1242241

https://bugzilla.suse.com/1242244

https://bugzilla.suse.com/1242245

https://bugzilla.suse.com/1242248

https://bugzilla.suse.com/1242261

https://bugzilla.suse.com/1242264

https://bugzilla.suse.com/1242265

https://bugzilla.suse.com/1242270

https://bugzilla.suse.com/1242276

https://bugzilla.suse.com/1242279

https://bugzilla.suse.com/1242280

https://bugzilla.suse.com/1242281

https://bugzilla.suse.com/1242282

https://bugzilla.suse.com/1242284

https://bugzilla.suse.com/1242285

https://bugzilla.suse.com/1242289

https://bugzilla.suse.com/1242294

https://bugzilla.suse.com/1242305

https://bugzilla.suse.com/1242312

https://bugzilla.suse.com/1242320

https://bugzilla.suse.com/1242338

https://bugzilla.suse.com/1242352

https://bugzilla.suse.com/1242353

https://bugzilla.suse.com/1242355

https://bugzilla.suse.com/1242357

https://bugzilla.suse.com/1242358

https://bugzilla.suse.com/1242361

https://bugzilla.suse.com/1242365

https://bugzilla.suse.com/1242366

https://bugzilla.suse.com/1242369

https://bugzilla.suse.com/1242370

https://bugzilla.suse.com/1242371

https://bugzilla.suse.com/1242372

https://bugzilla.suse.com/1242377

https://bugzilla.suse.com/1242378

https://bugzilla.suse.com/1242380

https://bugzilla.suse.com/1242382

https://bugzilla.suse.com/1242385

https://bugzilla.suse.com/1242387

https://bugzilla.suse.com/1242389

https://bugzilla.suse.com/1242391

https://bugzilla.suse.com/1242392

https://bugzilla.suse.com/1242394

https://bugzilla.suse.com/1242398

https://bugzilla.suse.com/1242399

https://bugzilla.suse.com/1242402

https://bugzilla.suse.com/1242403

https://bugzilla.suse.com/1242409

https://bugzilla.suse.com/1242411

https://bugzilla.suse.com/1242415

https://bugzilla.suse.com/1242416

https://bugzilla.suse.com/1242421

https://bugzilla.suse.com/1242422

https://bugzilla.suse.com/1242426

https://bugzilla.suse.com/1242428

https://bugzilla.suse.com/1242440

https://bugzilla.suse.com/1242443

https://bugzilla.suse.com/1242449

https://bugzilla.suse.com/1242452

https://bugzilla.suse.com/1242453

https://bugzilla.suse.com/1242454

https://bugzilla.suse.com/1242455

https://bugzilla.suse.com/1242456

https://bugzilla.suse.com/1242458

https://bugzilla.suse.com/1242464

https://bugzilla.suse.com/1242467

https://bugzilla.suse.com/1242469

https://bugzilla.suse.com/1242473

https://bugzilla.suse.com/1242478

https://bugzilla.suse.com/1242481

https://bugzilla.suse.com/1242484

https://bugzilla.suse.com/1242489

https://bugzilla.suse.com/1242493

https://bugzilla.suse.com/1242497

https://bugzilla.suse.com/1242527

https://bugzilla.suse.com/1242542

https://bugzilla.suse.com/1242544

https://bugzilla.suse.com/1242545

https://bugzilla.suse.com/1242547

https://bugzilla.suse.com/1242548

https://bugzilla.suse.com/1242549

https://bugzilla.suse.com/1242550

https://bugzilla.suse.com/1242551

https://bugzilla.suse.com/1242558

https://bugzilla.suse.com/1242570

https://bugzilla.suse.com/1242580

https://bugzilla.suse.com/1242586

https://bugzilla.suse.com/1242589

https://bugzilla.suse.com/1242596

https://bugzilla.suse.com/1242597

https://bugzilla.suse.com/1242685

https://bugzilla.suse.com/1242686

https://bugzilla.suse.com/1242688

https://bugzilla.suse.com/1242689

https://bugzilla.suse.com/1242695

https://bugzilla.suse.com/1242716

https://bugzilla.suse.com/1242733

https://bugzilla.suse.com/1242734

https://bugzilla.suse.com/1242735

https://bugzilla.suse.com/1242736

https://bugzilla.suse.com/1242739

https://bugzilla.suse.com/1242743

https://bugzilla.suse.com/1242744

https://bugzilla.suse.com/1242745

https://bugzilla.suse.com/1242746

https://bugzilla.suse.com/1242747

https://bugzilla.suse.com/1242749

https://bugzilla.suse.com/1242752

https://bugzilla.suse.com/1242753

https://bugzilla.suse.com/1242756

https://bugzilla.suse.com/1242759

https://bugzilla.suse.com/1242762

https://bugzilla.suse.com/1242765

https://bugzilla.suse.com/1242767

https://bugzilla.suse.com/1242778

https://bugzilla.suse.com/1242779

https://bugzilla.suse.com/1242790

https://bugzilla.suse.com/1242791

https://bugzilla.suse.com/1243047

https://bugzilla.suse.com/1243133

https://bugzilla.suse.com/1243649

https://bugzilla.suse.com/1243660

https://bugzilla.suse.com/1243737

https://bugzilla.suse.com/1243919

https://lists.suse.com/pipermail/sle-updates/2025-July/040663.html

https://www.suse.com/security/cve/CVE-2022-3564

https://www.suse.com/security/cve/CVE-2022-3619

https://www.suse.com/security/cve/CVE-2022-3640

https://www.suse.com/security/cve/CVE-2022-49110

https://www.suse.com/security/cve/CVE-2022-49139

https://www.suse.com/security/cve/CVE-2022-49767

https://www.suse.com/security/cve/CVE-2022-49769

https://www.suse.com/security/cve/CVE-2022-49770

https://www.suse.com/security/cve/CVE-2022-49771

https://www.suse.com/security/cve/CVE-2022-49772

https://www.suse.com/security/cve/CVE-2022-49775

https://www.suse.com/security/cve/CVE-2022-49776

https://www.suse.com/security/cve/CVE-2022-49777

https://www.suse.com/security/cve/CVE-2022-49779

https://www.suse.com/security/cve/CVE-2022-49783

https://www.suse.com/security/cve/CVE-2022-49787

https://www.suse.com/security/cve/CVE-2022-49788

https://www.suse.com/security/cve/CVE-2022-49789

https://www.suse.com/security/cve/CVE-2022-49790

https://www.suse.com/security/cve/CVE-2022-49792

https://www.suse.com/security/cve/CVE-2022-49793

https://www.suse.com/security/cve/CVE-2022-49794

https://www.suse.com/security/cve/CVE-2022-49796

https://www.suse.com/security/cve/CVE-2022-49797

https://www.suse.com/security/cve/CVE-2022-49799

https://www.suse.com/security/cve/CVE-2022-49800

https://www.suse.com/security/cve/CVE-2022-49801

https://www.suse.com/security/cve/CVE-2022-49802

https://www.suse.com/security/cve/CVE-2022-49807

https://www.suse.com/security/cve/CVE-2022-49809

https://www.suse.com/security/cve/CVE-2022-49810

https://www.suse.com/security/cve/CVE-2022-49812

https://www.suse.com/security/cve/CVE-2022-49813

https://www.suse.com/security/cve/CVE-2022-49818

https://www.suse.com/security/cve/CVE-2022-49821

https://www.suse.com/security/cve/CVE-2022-49822

https://www.suse.com/security/cve/CVE-2022-49823

https://www.suse.com/security/cve/CVE-2022-49824

https://www.suse.com/security/cve/CVE-2022-49825

https://www.suse.com/security/cve/CVE-2022-49826

https://www.suse.com/security/cve/CVE-2022-49827

https://www.suse.com/security/cve/CVE-2022-49830

https://www.suse.com/security/cve/CVE-2022-49832

https://www.suse.com/security/cve/CVE-2022-49834

https://www.suse.com/security/cve/CVE-2022-49835

https://www.suse.com/security/cve/CVE-2022-49836

https://www.suse.com/security/cve/CVE-2022-49839

https://www.suse.com/security/cve/CVE-2022-49841

https://www.suse.com/security/cve/CVE-2022-49842

https://www.suse.com/security/cve/CVE-2022-49845

https://www.suse.com/security/cve/CVE-2022-49846

https://www.suse.com/security/cve/CVE-2022-49850

https://www.suse.com/security/cve/CVE-2022-49853

https://www.suse.com/security/cve/CVE-2022-49858

https://www.suse.com/security/cve/CVE-2022-49860

https://www.suse.com/security/cve/CVE-2022-49861

https://www.suse.com/security/cve/CVE-2022-49863

https://www.suse.com/security/cve/CVE-2022-49864

https://www.suse.com/security/cve/CVE-2022-49865

https://www.suse.com/security/cve/CVE-2022-49868

https://www.suse.com/security/cve/CVE-2022-49869

https://www.suse.com/security/cve/CVE-2022-49870

https://www.suse.com/security/cve/CVE-2022-49871

https://www.suse.com/security/cve/CVE-2022-49874

https://www.suse.com/security/cve/CVE-2022-49879

https://www.suse.com/security/cve/CVE-2022-49880

https://www.suse.com/security/cve/CVE-2022-49881

https://www.suse.com/security/cve/CVE-2022-49885

https://www.suse.com/security/cve/CVE-2022-49887

https://www.suse.com/security/cve/CVE-2022-49888

https://www.suse.com/security/cve/CVE-2022-49889

https://www.suse.com/security/cve/CVE-2022-49890

https://www.suse.com/security/cve/CVE-2022-49891

https://www.suse.com/security/cve/CVE-2022-49892

https://www.suse.com/security/cve/CVE-2022-49900

https://www.suse.com/security/cve/CVE-2022-49905

https://www.suse.com/security/cve/CVE-2022-49906

https://www.suse.com/security/cve/CVE-2022-49908

https://www.suse.com/security/cve/CVE-2022-49909

https://www.suse.com/security/cve/CVE-2022-49910

https://www.suse.com/security/cve/CVE-2022-49915

https://www.suse.com/security/cve/CVE-2022-49916

https://www.suse.com/security/cve/CVE-2022-49922

https://www.suse.com/security/cve/CVE-2022-49923

https://www.suse.com/security/cve/CVE-2022-49924

https://www.suse.com/security/cve/CVE-2022-49925

https://www.suse.com/security/cve/CVE-2022-49927

https://www.suse.com/security/cve/CVE-2022-49928

https://www.suse.com/security/cve/CVE-2022-49931

https://www.suse.com/security/cve/CVE-2023-1990

https://www.suse.com/security/cve/CVE-2023-53035

https://www.suse.com/security/cve/CVE-2023-53038

https://www.suse.com/security/cve/CVE-2023-53039

https://www.suse.com/security/cve/CVE-2023-53040

https://www.suse.com/security/cve/CVE-2023-53041

https://www.suse.com/security/cve/CVE-2023-53044

https://www.suse.com/security/cve/CVE-2023-53045

https://www.suse.com/security/cve/CVE-2023-53049

https://www.suse.com/security/cve/CVE-2023-53051

https://www.suse.com/security/cve/CVE-2023-53052

https://www.suse.com/security/cve/CVE-2023-53054

https://www.suse.com/security/cve/CVE-2023-53056

https://www.suse.com/security/cve/CVE-2023-53058

https://www.suse.com/security/cve/CVE-2023-53059

https://www.suse.com/security/cve/CVE-2023-53060

https://www.suse.com/security/cve/CVE-2023-53062

https://www.suse.com/security/cve/CVE-2023-53064

https://www.suse.com/security/cve/CVE-2023-53065

https://www.suse.com/security/cve/CVE-2023-53066

https://www.suse.com/security/cve/CVE-2023-53068

https://www.suse.com/security/cve/CVE-2023-53075

https://www.suse.com/security/cve/CVE-2023-53077

https://www.suse.com/security/cve/CVE-2023-53078

https://www.suse.com/security/cve/CVE-2023-53079

https://www.suse.com/security/cve/CVE-2023-53081

https://www.suse.com/security/cve/CVE-2023-53084

https://www.suse.com/security/cve/CVE-2023-53087

https://www.suse.com/security/cve/CVE-2023-53089

https://www.suse.com/security/cve/CVE-2023-53090

https://www.suse.com/security/cve/CVE-2023-53091

https://www.suse.com/security/cve/CVE-2023-53092

https://www.suse.com/security/cve/CVE-2023-53093

https://www.suse.com/security/cve/CVE-2023-53096

https://www.suse.com/security/cve/CVE-2023-53098

https://www.suse.com/security/cve/CVE-2023-53099

https://www.suse.com/security/cve/CVE-2023-53100

https://www.suse.com/security/cve/CVE-2023-53101

https://www.suse.com/security/cve/CVE-2023-53106

https://www.suse.com/security/cve/CVE-2023-53108

https://www.suse.com/security/cve/CVE-2023-53111

https://www.suse.com/security/cve/CVE-2023-53114

https://www.suse.com/security/cve/CVE-2023-53116

https://www.suse.com/security/cve/CVE-2023-53118

https://www.suse.com/security/cve/CVE-2023-53119

https://www.suse.com/security/cve/CVE-2023-53123

https://www.suse.com/security/cve/CVE-2023-53124

https://www.suse.com/security/cve/CVE-2023-53125

https://www.suse.com/security/cve/CVE-2023-53131

https://www.suse.com/security/cve/CVE-2023-53134

https://www.suse.com/security/cve/CVE-2023-53137

https://www.suse.com/security/cve/CVE-2023-53139

https://www.suse.com/security/cve/CVE-2023-53140

https://www.suse.com/security/cve/CVE-2023-53142

https://www.suse.com/security/cve/CVE-2023-53143

https://www.suse.com/security/cve/CVE-2023-53145

https://www.suse.com/security/cve/CVE-2024-53168

https://www.suse.com/security/cve/CVE-2024-56558

https://www.suse.com/security/cve/CVE-2025-21888

https://www.suse.com/security/cve/CVE-2025-21999

https://www.suse.com/security/cve/CVE-2025-22056

https://www.suse.com/security/cve/CVE-2025-22060

https://www.suse.com/security/cve/CVE-2025-23138

https://www.suse.com/security/cve/CVE-2025-23145

https://www.suse.com/security/cve/CVE-2025-37785

https://www.suse.com/security/cve/CVE-2025-37789

https://www.suse.com/security/cve/CVE-2025-37948

https://www.suse.com/security/cve/CVE-2025-37963

Plugin Details

Severity: High

ID: 241966

File Name: suse_SU-2025-02262-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 7/11/2025

Updated: 7/11/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 8.3

Temporal Score: 6.5

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2022-3640

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-syms, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-64kb, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150400_24_167-default, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, cpe:/o:novell:suse_linux:15

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/10/2025

Vulnerability Publication Date: 7/21/2021

Reference Information

CVE: CVE-2022-3564, CVE-2022-3619, CVE-2022-3640, CVE-2022-49110, CVE-2022-49139, CVE-2022-49767, CVE-2022-49769, CVE-2022-49770, CVE-2022-49771, CVE-2022-49772, CVE-2022-49775, CVE-2022-49776, CVE-2022-49777, CVE-2022-49779, CVE-2022-49783, CVE-2022-49787, CVE-2022-49788, CVE-2022-49789, CVE-2022-49790, CVE-2022-49792, CVE-2022-49793, CVE-2022-49794, CVE-2022-49796, CVE-2022-49797, CVE-2022-49799, CVE-2022-49800, CVE-2022-49801, CVE-2022-49802, CVE-2022-49807, CVE-2022-49809, CVE-2022-49810, CVE-2022-49812, CVE-2022-49813, CVE-2022-49818, CVE-2022-49821, CVE-2022-49822, CVE-2022-49823, CVE-2022-49824, CVE-2022-49825, CVE-2022-49826, CVE-2022-49827, CVE-2022-49830, CVE-2022-49832, CVE-2022-49834, CVE-2022-49835, CVE-2022-49836, CVE-2022-49839, CVE-2022-49841, CVE-2022-49842, CVE-2022-49845, CVE-2022-49846, CVE-2022-49850, CVE-2022-49853, CVE-2022-49858, CVE-2022-49860, CVE-2022-49861, CVE-2022-49863, CVE-2022-49864, CVE-2022-49865, CVE-2022-49868, CVE-2022-49869, CVE-2022-49870, CVE-2022-49871, CVE-2022-49874, CVE-2022-49879, CVE-2022-49880, CVE-2022-49881, CVE-2022-49885, CVE-2022-49887, CVE-2022-49888, CVE-2022-49889, CVE-2022-49890, CVE-2022-49891, CVE-2022-49892, CVE-2022-49900, CVE-2022-49905, CVE-2022-49906, CVE-2022-49908, CVE-2022-49909, CVE-2022-49910, CVE-2022-49915, CVE-2022-49916, CVE-2022-49922, CVE-2022-49923, CVE-2022-49924, CVE-2022-49925, CVE-2022-49927, CVE-2022-49928, CVE-2022-49931, CVE-2023-1990, CVE-2023-53035, CVE-2023-53038, CVE-2023-53039, CVE-2023-53040, CVE-2023-53041, CVE-2023-53044, CVE-2023-53045, CVE-2023-53049, CVE-2023-53051, CVE-2023-53052, CVE-2023-53054, CVE-2023-53056, CVE-2023-53058, CVE-2023-53059, CVE-2023-53060, CVE-2023-53062, CVE-2023-53064, CVE-2023-53065, CVE-2023-53066, CVE-2023-53068, CVE-2023-53075, CVE-2023-53077, CVE-2023-53078, CVE-2023-53079, CVE-2023-53081, CVE-2023-53084, CVE-2023-53087, CVE-2023-53089, CVE-2023-53090, CVE-2023-53091, CVE-2023-53092, CVE-2023-53093, CVE-2023-53096, CVE-2023-53098, CVE-2023-53099, CVE-2023-53100, CVE-2023-53101, CVE-2023-53106, CVE-2023-53108, CVE-2023-53111, CVE-2023-53114, CVE-2023-53116, CVE-2023-53118, CVE-2023-53119, CVE-2023-53123, CVE-2023-53124, CVE-2023-53125, CVE-2023-53131, CVE-2023-53134, CVE-2023-53137, CVE-2023-53139, CVE-2023-53140, CVE-2023-53142, CVE-2023-53143, CVE-2023-53145, CVE-2024-53168, CVE-2024-56558, CVE-2025-21888, CVE-2025-21999, CVE-2025-22056, CVE-2025-22060, CVE-2025-23138, CVE-2025-23145, CVE-2025-37785, CVE-2025-37789, CVE-2025-37948, CVE-2025-37963

SuSE: SUSE-SU-2025:02262-1