SUSE-IU-2025:1952-1: Security update of suse/sle-micro/rt-5.5

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Wed Jul 16 07:09:48 UTC 2025


SUSE Image Update Advisory: suse/sle-micro/rt-5.5
-----------------------------------------------------------------
Image Advisory ID : SUSE-IU-2025:1952-1
Image Tags        : suse/sle-micro/rt-5.5:2.0.4 , suse/sle-micro/rt-5.5:2.0.4-4.5.431 , suse/sle-micro/rt-5.5:latest
Image Release     : 4.5.431
Severity          : important
Type              : security
References        : 1065729 1156395 1193629 1194869 1198410 1199356 1199487 1201160
                        1201956 1202094 1202095 1202564 1202716 1202823 1202860 1203197
                        1203361 1205220 1205514 1205701 1206451 1206664 1206878 1206880
                        1207361 1207638 1211226 1212051 1213090 1218184 1218234 1218470
                        1222634 1223675 1224095 1224597 1225468 1225820 1226514 1226552
                        1228659 1230827 1231293 1232504 1234156 1234381 1234454 1235464
                        1235637 1236821 1236822 1237159 1237312 1237313 1238303 1238526
                        1238570 1238876 1239986 1240785 1241038 1241640 1241900 1242006
                        1242221 1242414 1242504 1242596 1242778 1242782 1242924 1243330
                        1243543 1243627 1243649 1243660 1243832 1244114 1244179 1244180
                        1244234 1244241 1244277 1244309 1244337 1244732 1244764 1244765
                        1244767 1244770 1244771 1244772 1244773 1244774 1244776 1244779
                        1244780 1244781 1244782 1244783 1244784 1244786 1244787 1244788
                        1244790 1244791 1244793 1244794 1244796 1244797 1244798 1244800
                        1244802 1244804 1244805 1244806 1244807 1244808 1244811 1244813
                        1244814 1244815 1244816 1244819 1244820 1244823 1244824 1244825
                        1244826 1244827 1244830 1244831 1244832 1244834 1244836 1244838
                        1244839 1244840 1244841 1244842 1244843 1244845 1244846 1244848
                        1244849 1244851 1244853 1244854 1244856 1244858 1244860 1244861
                        1244866 1244867 1244868 1244869 1244870 1244871 1244872 1244873
                        1244875 1244876 1244878 1244879 1244881 1244883 1244884 1244886
                        1244887 1244888 1244890 1244892 1244893 1244895 1244898 1244899
                        1244900 1244901 1244902 1244903 1244904 1244905 1244908 1244911
                        1244912 1244914 1244915 1244928 1244936 1244940 1244941 1244942
                        1244943 1244944 1244945 1244948 1244949 1244950 1244953 1244955
                        1244956 1244957 1244958 1244959 1244960 1244961 1244965 1244966
                        1244967 1244968 1244969 1244970 1244973 1244974 1244976 1244977
                        1244978 1244979 1244983 1244984 1244985 1244986 1244987 1244991
                        1244992 1244993 1245006 1245007 1245009 1245011 1245012 1245015
                        1245018 1245019 1245023 1245024 1245028 1245031 1245032 1245033
                        1245038 1245039 1245040 1245041 1245047 1245048 1245051 1245052
                        1245057 1245058 1245060 1245062 1245063 1245064 1245069 1245070
                        1245072 1245073 1245088 1245089 1245092 1245093 1245094 1245098
                        1245103 1245116 1245117 1245118 1245119 1245121 1245122 1245125
                        1245129 1245131 1245133 1245134 1245135 1245136 1245138 1245139
                        1245140 1245142 1245146 1245147 1245149 1245152 1245154 1245155
                        1245180 1245183 1245189 1245191 1245195 1245197 1245265 1245340
                        1245348 1245431 1245455 CVE-2021-47557 CVE-2021-47595 CVE-2022-1679
                        CVE-2022-2585 CVE-2022-2586 CVE-2022-2905 CVE-2022-3903 CVE-2022-4095
                        CVE-2022-4662 CVE-2022-49934 CVE-2022-49935 CVE-2022-49936 CVE-2022-49937
                        CVE-2022-49938 CVE-2022-49940 CVE-2022-49942 CVE-2022-49943 CVE-2022-49944
                        CVE-2022-49945 CVE-2022-49946 CVE-2022-49948 CVE-2022-49949 CVE-2022-49950
                        CVE-2022-49951 CVE-2022-49952 CVE-2022-49954 CVE-2022-49956 CVE-2022-49957
                        CVE-2022-49958 CVE-2022-49960 CVE-2022-49962 CVE-2022-49963 CVE-2022-49964
                        CVE-2022-49965 CVE-2022-49966 CVE-2022-49968 CVE-2022-49969 CVE-2022-49971
                        CVE-2022-49972 CVE-2022-49977 CVE-2022-49978 CVE-2022-49980 CVE-2022-49981
                        CVE-2022-49982 CVE-2022-49983 CVE-2022-49984 CVE-2022-49985 CVE-2022-49986
                        CVE-2022-49987 CVE-2022-49989 CVE-2022-49990 CVE-2022-49993 CVE-2022-49995
                        CVE-2022-49999 CVE-2022-50002 CVE-2022-50003 CVE-2022-50005 CVE-2022-50006
                        CVE-2022-50008 CVE-2022-50010 CVE-2022-50011 CVE-2022-50012 CVE-2022-50015
                        CVE-2022-50016 CVE-2022-50019 CVE-2022-50020 CVE-2022-50021 CVE-2022-50022
                        CVE-2022-50023 CVE-2022-50024 CVE-2022-50026 CVE-2022-50027 CVE-2022-50028
                        CVE-2022-50029 CVE-2022-50030 CVE-2022-50031 CVE-2022-50032 CVE-2022-50033
                        CVE-2022-50034 CVE-2022-50035 CVE-2022-50036 CVE-2022-50037 CVE-2022-50038
                        CVE-2022-50039 CVE-2022-50040 CVE-2022-50041 CVE-2022-50044 CVE-2022-50045
                        CVE-2022-50046 CVE-2022-50047 CVE-2022-50049 CVE-2022-50050 CVE-2022-50051
                        CVE-2022-50052 CVE-2022-50053 CVE-2022-50054 CVE-2022-50055 CVE-2022-50059
                        CVE-2022-50060 CVE-2022-50061 CVE-2022-50062 CVE-2022-50065 CVE-2022-50066
                        CVE-2022-50067 CVE-2022-50068 CVE-2022-50072 CVE-2022-50073 CVE-2022-50074
                        CVE-2022-50076 CVE-2022-50077 CVE-2022-50079 CVE-2022-50083 CVE-2022-50084
                        CVE-2022-50085 CVE-2022-50086 CVE-2022-50087 CVE-2022-50092 CVE-2022-50093
                        CVE-2022-50094 CVE-2022-50095 CVE-2022-50097 CVE-2022-50098 CVE-2022-50099
                        CVE-2022-50100 CVE-2022-50101 CVE-2022-50102 CVE-2022-50103 CVE-2022-50104
                        CVE-2022-50108 CVE-2022-50109 CVE-2022-50110 CVE-2022-50111 CVE-2022-50112
                        CVE-2022-50115 CVE-2022-50116 CVE-2022-50117 CVE-2022-50118 CVE-2022-50120
                        CVE-2022-50121 CVE-2022-50124 CVE-2022-50125 CVE-2022-50126 CVE-2022-50127
                        CVE-2022-50129 CVE-2022-50131 CVE-2022-50132 CVE-2022-50133 CVE-2022-50134
                        CVE-2022-50135 CVE-2022-50136 CVE-2022-50137 CVE-2022-50138 CVE-2022-50139
                        CVE-2022-50140 CVE-2022-50141 CVE-2022-50142 CVE-2022-50143 CVE-2022-50144
                        CVE-2022-50145 CVE-2022-50146 CVE-2022-50149 CVE-2022-50151 CVE-2022-50152
                        CVE-2022-50153 CVE-2022-50154 CVE-2022-50155 CVE-2022-50156 CVE-2022-50157
                        CVE-2022-50158 CVE-2022-50160 CVE-2022-50161 CVE-2022-50162 CVE-2022-50164
                        CVE-2022-50165 CVE-2022-50166 CVE-2022-50169 CVE-2022-50171 CVE-2022-50172
                        CVE-2022-50173 CVE-2022-50175 CVE-2022-50176 CVE-2022-50178 CVE-2022-50179
                        CVE-2022-50181 CVE-2022-50183 CVE-2022-50184 CVE-2022-50185 CVE-2022-50186
                        CVE-2022-50187 CVE-2022-50188 CVE-2022-50190 CVE-2022-50191 CVE-2022-50192
                        CVE-2022-50194 CVE-2022-50196 CVE-2022-50197 CVE-2022-50198 CVE-2022-50199
                        CVE-2022-50200 CVE-2022-50201 CVE-2022-50202 CVE-2022-50203 CVE-2022-50204
                        CVE-2022-50206 CVE-2022-50207 CVE-2022-50208 CVE-2022-50209 CVE-2022-50211
                        CVE-2022-50212 CVE-2022-50213 CVE-2022-50215 CVE-2022-50218 CVE-2022-50220
                        CVE-2022-50221 CVE-2022-50222 CVE-2022-50226 CVE-2022-50228 CVE-2022-50229
                        CVE-2022-50231 CVE-2023-3111 CVE-2023-52924 CVE-2023-52925 CVE-2023-53046
                        CVE-2023-53048 CVE-2023-53076 CVE-2023-53097 CVE-2024-26808 CVE-2024-26924
                        CVE-2024-26935 CVE-2024-27397 CVE-2024-28956 CVE-2024-35840 CVE-2024-36978
                        CVE-2024-46800 CVE-2024-53125 CVE-2024-53141 CVE-2024-53197 CVE-2024-56770
                        CVE-2024-57999 CVE-2025-21700 CVE-2025-21702 CVE-2025-21703 CVE-2025-21756
                        CVE-2025-23141 CVE-2025-23145 CVE-2025-37752 CVE-2025-37785 CVE-2025-37798
                        CVE-2025-37823 CVE-2025-37890 CVE-2025-37932 CVE-2025-37948 CVE-2025-37953
                        CVE-2025-37963 CVE-2025-37997 CVE-2025-38000 CVE-2025-38001 CVE-2025-38014
                        CVE-2025-38060 CVE-2025-38083 
-----------------------------------------------------------------

The container suse/sle-micro/rt-5.5 was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2321-1
Released:    Tue Jul 15 16:31:34 2025
Summary:     Security update for the Linux Kernel
Type:        security
Severity:    important
References:  1065729,1156395,1193629,1194869,1198410,1199356,1199487,1201160,1201956,1202094,1202095,1202564,1202716,1202823,1202860,1203197,1203361,1205220,1205514,1205701,1206451,1206664,1206878,1206880,1207361,1207638,1211226,1212051,1213090,1218184,1218234,1218470,1222634,1223675,1224095,1224597,1225468,1225820,1226514,1226552,1228659,1230827,1231293,1232504,1234156,1234381,1234454,1235464,1235637,1236821,1236822,1237159,1237312,1237313,1238303,1238526,1238570,1238876,1239986,1240785,1241038,1241640,1241900,1242006,1242221,1242414,1242504,1242596,1242778,1242782,1242924,1243330,1243543,1243627,1243649,1243660,1243832,1244114,1244179,1244180,1244234,1244241,1244277,1244309,1244337,1244732,1244764,1244765,1244767,1244770,1244771,1244772,1244773,1244774,1244776,1244779,1244780,1244781,1244782,1244783,1244784,1244786,1244787,1244788,1244790,1244791,1244793,1244794,1244796,1244797,1244798,1244800,1244802,1244804,1244805,1244806,1244807,1244808,1244811,1244813,1244814,1244815,1244816,1
 244819,1244820,1244823,1244824,1244825,1244826,1244827,1244830,1244831,1244832,1244834,1244836,1244838,1244839,1244840,1244841,1244842,1244843,1244845,1244846,1244848,1244849,1244851,1244853,1244854,1244856,1244858,1244860,1244861,1244866,1244867,1244868,1244869,1244870,1244871,1244872,1244873,1244875,1244876,1244878,1244879,1244881,1244883,1244884,1244886,1244887,1244888,1244890,1244892,1244893,1244895,1244898,1244899,1244900,1244901,1244902,1244903,1244904,1244905,1244908,1244911,1244912,1244914,1244915,1244928,1244936,1244940,1244941,1244942,1244943,1244944,1244945,1244948,1244949,1244950,1244953,1244955,1244956,1244957,1244958,1244959,1244960,1244961,1244965,1244966,1244967,1244968,1244969,1244970,1244973,1244974,1244976,1244977,1244978,1244979,1244983,1244984,1244985,1244986,1244987,1244991,1244992,1244993,1245006,1245007,1245009,1245011,1245012,1245015,1245018,1245019,1245023,1245024,1245028,1245031,1245032,1245033,1245038,1245039,1245040,1245041,1245047,1245048,1245051,124505
 2,1245057,1245058,1245060,1245062,1245063,1245064,1245069,1245070,1245072,1245073,1245088,1245089,1245092,1245093,1245094,1245098,1245103,1245116,1245117,1245118,1245119,1245121,1245122,1245125,1245129,1245131,1245133,1245134,1245135,1245136,1245138,1245139,1245140,1245142,1245146,1245147,1245149,1245152,1245154,1245155,1245180,1245183,1245189,1245191,1245195,1245197,1245265,1245340,1245348,1245431,1245455,CVE-2021-47557,CVE-2021-47595,CVE-2022-1679,CVE-2022-2585,CVE-2022-2586,CVE-2022-2905,CVE-2022-3903,CVE-2022-4095,CVE-2022-4662,CVE-2022-49934,CVE-2022-49935,CVE-2022-49936,CVE-2022-49937,CVE-2022-49938,CVE-2022-49940,CVE-2022-49942,CVE-2022-49943,CVE-2022-49944,CVE-2022-49945,CVE-2022-49946,CVE-2022-49948,CVE-2022-49949,CVE-2022-49950,CVE-2022-49951,CVE-2022-49952,CVE-2022-49954,CVE-2022-49956,CVE-2022-49957,CVE-2022-49958,CVE-2022-49960,CVE-2022-49962,CVE-2022-49963,CVE-2022-49964,CVE-2022-49965,CVE-2022-49966,CVE-2022-49968,CVE-2022-49969,CVE-2022-49971,CVE-2022-49972,CVE-2022-
 49977,CVE-2022-49978,CVE-2022-49980,CVE-2022-49981,CVE-2022-49982,CVE-2022-49983,CVE-2022-49984,CVE-2022-49985,CVE-2022-49986,CVE-2022-49987,CVE-2022-49989,CVE-2022-49990,CVE-2022-49993,CVE-2022-49995,CVE-2022-49999,CVE-2022-50002,CVE-2022-50003,CVE-2022-50005,CVE-2022-50006,CVE-2022-50008,CVE-2022-50010,CVE-2022-50011,CVE-2022-50012,CVE-2022-50015,CVE-2022-50016,CVE-2022-50019,CVE-2022-50020,CVE-2022-50021,CVE-2022-50022,CVE-2022-50023,CVE-2022-50024,CVE-2022-50026,CVE-2022-50027,CVE-2022-50028,CVE-2022-50029,CVE-2022-50030,CVE-2022-50031,CVE-2022-50032,CVE-2022-50033,CVE-2022-50034,CVE-2022-50035,CVE-2022-50036,CVE-2022-50037,CVE-2022-50038,CVE-2022-50039,CVE-2022-50040,CVE-2022-50041,CVE-2022-50044,CVE-2022-50045,CVE-2022-50046,CVE-2022-50047,CVE-2022-50049,CVE-2022-50050,CVE-2022-50051,CVE-2022-50052,CVE-2022-50053,CVE-2022-50054,CVE-2022-50055,CVE-2022-50059,CVE-2022-50060,CVE-2022-50061,CVE-2022-50062,CVE-2022-50065,CVE-2022-50066,CVE-2022-50067,CVE-2022-50068,CVE-2022-50072,C
 VE-2022-50073,CVE-2022-50074,CVE-2022-50076,CVE-2022-50077,CVE-2022-50079,CVE-2022-50083,CVE-2022-50084,CVE-2022-50085,CVE-2022-50086,CVE-2022-50087,CVE-2022-50092,CVE-2022-50093,CVE-2022-50094,CVE-2022-50095,CVE-2022-50097,CVE-2022-50098,CVE-2022-50099,CVE-2022-50100,CVE-2022-50101,CVE-2022-50102,CVE-2022-50103,CVE-2022-50104,CVE-2022-50108,CVE-2022-50109,CVE-2022-50110,CVE-2022-50111,CVE-2022-50112,CVE-2022-50115,CVE-2022-50116,CVE-2022-50117,CVE-2022-50118,CVE-2022-50120,CVE-2022-50121,CVE-2022-50124,CVE-2022-50125,CVE-2022-50126,CVE-2022-50127,CVE-2022-50129,CVE-2022-50131,CVE-2022-50132,CVE-2022-50133,CVE-2022-50134,CVE-2022-50135,CVE-2022-50136,CVE-2022-50137,CVE-2022-50138,CVE-2022-50139,CVE-2022-50140,CVE-2022-50141,CVE-2022-50142,CVE-2022-50143,CVE-2022-50144,CVE-2022-50145,CVE-2022-50146,CVE-2022-50149,CVE-2022-50151,CVE-2022-50152,CVE-2022-50153,CVE-2022-50154,CVE-2022-50155,CVE-2022-50156,CVE-2022-50157,CVE-2022-50158,CVE-2022-50160,CVE-2022-50161,CVE-2022-50162,CVE-2022
 -50164,CVE-2022-50165,CVE-2022-50166,CVE-2022-50169,CVE-2022-50171,CVE-2022-50172,CVE-2022-50173,CVE-2022-50175,CVE-2022-50176,CVE-2022-50178,CVE-2022-50179,CVE-2022-50181,CVE-2022-50183,CVE-2022-50184,CVE-2022-50185,CVE-2022-50186,CVE-2022-50187,CVE-2022-50188,CVE-2022-50190,CVE-2022-50191,CVE-2022-50192,CVE-2022-50194,CVE-2022-50196,CVE-2022-50197,CVE-2022-50198,CVE-2022-50199,CVE-2022-50200,CVE-2022-50201,CVE-2022-50202,CVE-2022-50203,CVE-2022-50204,CVE-2022-50206,CVE-2022-50207,CVE-2022-50208,CVE-2022-50209,CVE-2022-50211,CVE-2022-50212,CVE-2022-50213,CVE-2022-50215,CVE-2022-50218,CVE-2022-50220,CVE-2022-50221,CVE-2022-50222,CVE-2022-50226,CVE-2022-50228,CVE-2022-50229,CVE-2022-50231,CVE-2023-3111,CVE-2023-52924,CVE-2023-52925,CVE-2023-53046,CVE-2023-53048,CVE-2023-53076,CVE-2023-53097,CVE-2024-26808,CVE-2024-26924,CVE-2024-26935,CVE-2024-27397,CVE-2024-28956,CVE-2024-35840,CVE-2024-36978,CVE-2024-46800,CVE-2024-53125,CVE-2024-53141,CVE-2024-53197,CVE-2024-56770,CVE-2024-57999,C
 VE-2025-21700,CVE-2025-21702,CVE-2025-21703,CVE-2025-21756,CVE-2025-23141,CVE-2025-23145,CVE-2025-37752,CVE-2025-37785,CVE-2025-37798,CVE-2025-37823,CVE-2025-37890,CVE-2025-37932,CVE-2025-37948,CVE-2025-37953,CVE-2025-37963,CVE-2025-37997,CVE-2025-38000,CVE-2025-38001,CVE-2025-38014,CVE-2025-38060,CVE-2025-38083

The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-47557: net/sched: sch_ets: do not peek at classes beyond 'nbands' (bsc#1207361 bsc#1225468).
- CVE-2021-47595: net/sched: sch_ets: do not remove idle classes from the round-robin list (bsc#1207361 bsc#1226552).
- CVE-2023-52924: netfilter: nf_tables: do not skip expired elements during walk (bsc#1236821).
- CVE-2023-52925: netfilter: nf_tables: do not fail inserts if duplicate has expired (bsc#1236822).
- CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634).
- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).
- CVE-2024-27397: kabi: place tstamp needed for nftables set in a hole (bsc#1224095).
- CVE-2024-28956: x86/its: Add support for ITS-safe indirect thunk (bsc#1242006).
- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).
- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).
- CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156).
- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).
- CVE-2024-53197: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (bsc#1235464).
- CVE-2024-56770: sch/netem: fix use after free in netem_dequeue (bsc#1235637).
- CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).
- CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312).
- CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313).
- CVE-2025-21756: vsock: Orphan socket after transport release (bsc#1238876).
- CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (bsc#1242782).
- CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504).
- CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640).
- CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924).
- CVE-2025-37890: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (bsc#1243330).
- CVE-2025-37997: netfilter: ipset: fix region locking in hash types (bsc#1243832).
- CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1244277).
- CVE-2025-38001: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice (bsc#1244234).
- CVE-2025-38014: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (bsc#1244732).
- CVE-2025-38060: bpf: abort verification if env->cur_state->loop_entry != NULL (bsc#1245155).
- CVE-2025-38083: net_sched: prio: fix a race in prio_tune() (bsc#1245183).

The following non-security bugs were fixed:

- ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes).
- Fix conditional for selecting gcc-13 Fixes: 51dacec21eb1 ('Use gcc-13 for build on SLE16 (jsc#PED-10028).')
- Fix reference in 'net_sched: sch_sfq: use a temporary work area for validating configuration' (bsc#1242504)
- MyBS: Correctly generate build flags for non-multibuild package limit (bsc# 1244241) Fixes: 0999112774fc ('MyBS: Use buildflags to set which package to build')
- MyBS: Do not build kernel-obs-qa with limit_packages Fixes: 58e3f8c34b2b ('bs-upload-kernel: Pass limit_packages also on multibuild')
- MyBS: Simplify qa_expr generation Start with a 0 which makes the expression valid even if there are no QA repositories (currently does not happen). Then separator is always needed.
- Require zstd in kernel-default-devel when module compression is zstd To use ksym-provides tool modules need to be uncompressed. Without zstd at least kernel-default-base does not have provides. Link: https://github.com/openSUSE/rpm-config-SUSE/pull/82
- Use gcc-13 for build on SLE16 (jsc#PED-10028).
- add nf_tables for iptables non-legacy network handling This is needed for example by docker on the Alpine Linux distribution, but can also be used on openSUSE.
- bs-upload-kernel: Pass limit_packages also on multibuild Fixes: 0999112774fc ('MyBS: Use buildflags to set which package to build') Fixes: 747f601d4156 ('bs-upload-kernel, MyBS, Buildresults: Support multibuild (JSC-SLE#5501, boo#1211226, bsc#1218184)')
- check-for-config-changes: Fix flag name typo
- doc/README.SUSE: Point to the updated version of LKMPG
- hugetlb: unshare some PMDs when splitting VMAs (bsc#1245431).
- kernel-obs-qa: Use srchash for dependency as well
- kernel-source: Also replace bin/env
- kernel-source: Also update the search to match bin/env Fixes: dc2037cd8f94 ('kernel-source: Also replace bin/env'
- kernel-source: Remove log.sh from sources
- mkspec: Exclude rt flavor from kernel-syms dependencies (bsc#1244337).
- mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431).
- mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431).
- net_sched: sch_fifo: implement lockless __fifo_dump() (bsc#1237312)
- net_sched: sch_sfq: use a temporary work area for validating configuration (bsc#1232504)
- ovl: fix use inode directly in rcu-walk mode (bsc#1241900).
- packaging: Turn gcc version into config.sh variable Fixes: 51dacec21eb1 ('Use gcc-13 for build on SLE16 (jsc#PED-10028).')
- powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (bsc#1244309 ltc#213790).
- powerpc/vas: Return -EINVAL if the offset is non-zero in mmap() (bsc#1244309 ltc#213790).
- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN
- rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN Both spellings are actually used
- rpm/check-for-config-changes: add LD_CAN_ to IGNORED_CONFIGS_RE
- rpm/check-for-config-changes: add more to IGNORED_CONFIGS_RE Useful when someone tries (needs) to build the kernel with clang.
- rpm/check-for-config-changes: ignore DRM_MSM_VALIDATE_XML This option is dynamically enabled to build-test different configurations. This makes run_oldconfig.sh complain sporadically for arm64.
- rpm/kernel-binary.spec.in: Also order against update-bootloader (boo#1228659, boo#1240785, boo#1241038).
- rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf (bsc#1239986) sle_version was obsoleted for SLE16. It has to be combined with suse_version check.
- rpm/kernel-binary.spec.in: Use OrderWithRequires (boo#1228659 boo#1241038). OrderWithRequires was introduced in rpm 4.9 (ie. SLE12+) to allow a package to inform the order of installation of other package without hard requiring that package. This means our kernel-binary packages no longer need to hard require perl-Bootloader or dracut, resolving the long-commented issue there. This is also needed for udev & systemd-boot to ensure those packages are installed before being called by dracut (boo#1228659)
- rpm/kernel-binary.spec.in: fix KMPs build on 6.13+ (bsc#1234454)
- rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303)
- rpm/package-descriptions: Add rt and rt_debug descriptions
- rpm/release-projects: Update the ALP projects again (bsc#1231293).
- rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570)
- rpm: Stop using is_kotd_qa macro
- scsi: storvsc: Do not report the host packet status as the hv status (git-fixes).
- scsi: storvsc: Increase the timeouts to storvsc_timeout (bsc#1245455).


The following package changes have been done:

- kernel-rt-5.14.21-150500.13.100.2 updated
- dracut-055+suse.396.g701c6212-150500.3.29.2 removed
- elfutils-0.185-150400.5.3.1 removed
- file-5.32-7.14.1 removed
- libasm1-0.185-150400.5.3.1 removed
- perl-Bootloader-0.947-150400.3.12.1 removed
- pigz-2.3.3-1.28 removed
- systemd-sysvinit-249.17-150400.8.46.1 removed
- zstd-1.5.0-150400.3.3.1 removed


More information about the sle-container-updates mailing list