SUSE-IU-2025:1582-1: Security update of suse/sle-micro/rt-5.5
sle-container-updates at lists.suse.com
sle-container-updates at lists.suse.com
Tue Jun 17 07:04:38 UTC 2025
SUSE Image Update Advisory: suse/sle-micro/rt-5.5
-----------------------------------------------------------------
Image Advisory ID : SUSE-IU-2025:1582-1
Image Tags : suse/sle-micro/rt-5.5:2.0.4 , suse/sle-micro/rt-5.5:2.0.4-4.5.402 , suse/sle-micro/rt-5.5:latest
Image Release : 4.5.402
Severity : important
Type : security
References : 1184350 1193629 1204562 1204569 1204619 1204705 1205282 1206051
1206073 1206649 1206843 1206886 1206887 1207361 1208105 1208542
1209292 1209556 1209684 1209780 1209980 1210337 1210763 1210767
1211465 1213012 1213013 1213094 1213096 1213233 1213946 1214991
1218470 1222629 1223096 1225903 1232649 1234395 1234887 1235100
1235870 1240802 1241525 1242146 1242147 1242150 1242151 1242154
1242157 1242158 1242160 1242164 1242165 1242169 1242215 1242217
1242218 1242219 1242222 1242224 1242226 1242227 1242228 1242229
1242230 1242231 1242232 1242237 1242239 1242240 1242241 1242244
1242245 1242248 1242249 1242261 1242264 1242265 1242270 1242276
1242278 1242279 1242280 1242281 1242282 1242285 1242286 1242289
1242294 1242295 1242298 1242302 1242305 1242311 1242312 1242320
1242338 1242349 1242351 1242352 1242353 1242355 1242357 1242358
1242359 1242360 1242361 1242365 1242366 1242369 1242370 1242371
1242372 1242377 1242378 1242380 1242381 1242382 1242385 1242387
1242389 1242391 1242392 1242393 1242394 1242398 1242399 1242400
1242402 1242403 1242405 1242406 1242409 1242410 1242411 1242415
1242416 1242421 1242422 1242425 1242426 1242428 1242440 1242443
1242448 1242449 1242452 1242453 1242454 1242455 1242456 1242458
1242464 1242465 1242467 1242469 1242473 1242474 1242478 1242481
1242484 1242489 1242497 1242527 1242542 1242544 1242545 1242547
1242548 1242549 1242550 1242551 1242558 1242570 1242580 1242586
1242589 1242596 1242597 1242685 1242686 1242688 1242689 1242695
1242716 1242733 1242734 1242735 1242736 1242739 1242740 1242743
1242744 1242745 1242746 1242747 1242748 1242749 1242751 1242752
1242753 1242756 1242759 1242762 1242765 1242767 1242778 1242779
1242790 1242791 1243047 1243133 1243737 1243919 CVE-2022-3564
CVE-2022-3619 CVE-2022-3640 CVE-2022-49762 CVE-2022-49763 CVE-2022-49769
CVE-2022-49770 CVE-2022-49771 CVE-2022-49772 CVE-2022-49773 CVE-2022-49775
CVE-2022-49776 CVE-2022-49777 CVE-2022-49779 CVE-2022-49781 CVE-2022-49783
CVE-2022-49784 CVE-2022-49786 CVE-2022-49787 CVE-2022-49788 CVE-2022-49789
CVE-2022-49790 CVE-2022-49792 CVE-2022-49793 CVE-2022-49794 CVE-2022-49795
CVE-2022-49796 CVE-2022-49797 CVE-2022-49799 CVE-2022-49800 CVE-2022-49801
CVE-2022-49802 CVE-2022-49807 CVE-2022-49809 CVE-2022-49810 CVE-2022-49812
CVE-2022-49813 CVE-2022-49818 CVE-2022-49821 CVE-2022-49822 CVE-2022-49823
CVE-2022-49824 CVE-2022-49825 CVE-2022-49826 CVE-2022-49827 CVE-2022-49830
CVE-2022-49832 CVE-2022-49834 CVE-2022-49835 CVE-2022-49836 CVE-2022-49837
CVE-2022-49839 CVE-2022-49841 CVE-2022-49842 CVE-2022-49845 CVE-2022-49846
CVE-2022-49850 CVE-2022-49853 CVE-2022-49858 CVE-2022-49860 CVE-2022-49861
CVE-2022-49863 CVE-2022-49864 CVE-2022-49865 CVE-2022-49868 CVE-2022-49869
CVE-2022-49870 CVE-2022-49871 CVE-2022-49874 CVE-2022-49879 CVE-2022-49880
CVE-2022-49881 CVE-2022-49885 CVE-2022-49886 CVE-2022-49887 CVE-2022-49888
CVE-2022-49889 CVE-2022-49890 CVE-2022-49891 CVE-2022-49892 CVE-2022-49900
CVE-2022-49901 CVE-2022-49902 CVE-2022-49905 CVE-2022-49906 CVE-2022-49908
CVE-2022-49909 CVE-2022-49910 CVE-2022-49915 CVE-2022-49916 CVE-2022-49917
CVE-2022-49918 CVE-2022-49921 CVE-2022-49922 CVE-2022-49923 CVE-2022-49924
CVE-2022-49925 CVE-2022-49927 CVE-2022-49928 CVE-2022-49929 CVE-2022-49931
CVE-2023-1990 CVE-2023-28866 CVE-2023-53035 CVE-2023-53036 CVE-2023-53038
CVE-2023-53039 CVE-2023-53040 CVE-2023-53041 CVE-2023-53042 CVE-2023-53044
CVE-2023-53045 CVE-2023-53049 CVE-2023-53052 CVE-2023-53054 CVE-2023-53056
CVE-2023-53057 CVE-2023-53058 CVE-2023-53059 CVE-2023-53060 CVE-2023-53062
CVE-2023-53064 CVE-2023-53065 CVE-2023-53066 CVE-2023-53068 CVE-2023-53070
CVE-2023-53071 CVE-2023-53073 CVE-2023-53074 CVE-2023-53075 CVE-2023-53077
CVE-2023-53078 CVE-2023-53079 CVE-2023-53081 CVE-2023-53082 CVE-2023-53084
CVE-2023-53087 CVE-2023-53089 CVE-2023-53090 CVE-2023-53091 CVE-2023-53092
CVE-2023-53093 CVE-2023-53095 CVE-2023-53096 CVE-2023-53098 CVE-2023-53099
CVE-2023-53100 CVE-2023-53101 CVE-2023-53102 CVE-2023-53105 CVE-2023-53106
CVE-2023-53108 CVE-2023-53109 CVE-2023-53111 CVE-2023-53112 CVE-2023-53114
CVE-2023-53116 CVE-2023-53118 CVE-2023-53119 CVE-2023-53123 CVE-2023-53124
CVE-2023-53125 CVE-2023-53128 CVE-2023-53131 CVE-2023-53134 CVE-2023-53137
CVE-2023-53139 CVE-2023-53140 CVE-2023-53142 CVE-2023-53143 CVE-2023-53145
CVE-2024-26804 CVE-2024-53168 CVE-2024-56558 CVE-2025-21999 CVE-2025-22056
CVE-2025-23145 CVE-2025-37789
-----------------------------------------------------------------
The container suse/sle-micro/rt-5.5 was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1966-1
Released: Mon Jun 16 16:55:48 2025
Summary: Security update for the Linux Kernel
Type: security
Severity: important
References: 1184350,1193629,1204562,1204569,1204619,1204705,1205282,1206051,1206073,1206649,1206843,1206886,1206887,1207361,1208105,1208542,1209292,1209556,1209684,1209780,1209980,1210337,1210763,1210767,1211465,1213012,1213013,1213094,1213096,1213233,1213946,1214991,1218470,1222629,1223096,1225903,1232649,1234395,1234887,1235100,1235870,1240802,1241525,1242146,1242147,1242150,1242151,1242154,1242157,1242158,1242160,1242164,1242165,1242169,1242215,1242217,1242218,1242219,1242222,1242224,1242226,1242227,1242228,1242229,1242230,1242231,1242232,1242237,1242239,1242240,1242241,1242244,1242245,1242248,1242249,1242261,1242264,1242265,1242270,1242276,1242278,1242279,1242280,1242281,1242282,1242285,1242286,1242289,1242294,1242295,1242298,1242302,1242305,1242311,1242312,1242320,1242338,1242349,1242351,1242352,1242353,1242355,1242357,1242358,1242359,1242360,1242361,1242365,1242366,1242369,1242370,1242371,1242372,1242377,1242378,1242380,1242381,1242382,1242385,1242387,1242389,1242391,1242392,1
242393,1242394,1242398,1242399,1242400,1242402,1242403,1242405,1242406,1242409,1242410,1242411,1242415,1242416,1242421,1242422,1242425,1242426,1242428,1242440,1242443,1242448,1242449,1242452,1242453,1242454,1242455,1242456,1242458,1242464,1242465,1242467,1242469,1242473,1242474,1242478,1242481,1242484,1242489,1242497,1242527,1242542,1242544,1242545,1242547,1242548,1242549,1242550,1242551,1242558,1242570,1242580,1242586,1242589,1242596,1242597,1242685,1242686,1242688,1242689,1242695,1242716,1242733,1242734,1242735,1242736,1242739,1242740,1242743,1242744,1242745,1242746,1242747,1242748,1242749,1242751,1242752,1242753,1242756,1242759,1242762,1242765,1242767,1242778,1242779,1242790,1242791,1243047,1243133,1243737,1243919,CVE-2022-3564,CVE-2022-3619,CVE-2022-3640,CVE-2022-49762,CVE-2022-49763,CVE-2022-49769,CVE-2022-49770,CVE-2022-49771,CVE-2022-49772,CVE-2022-49773,CVE-2022-49775,CVE-2022-49776,CVE-2022-49777,CVE-2022-49779,CVE-2022-49781,CVE-2022-49783,CVE-2022-49784,CVE-2022-49786,CVE
-2022-49787,CVE-2022-49788,CVE-2022-49789,CVE-2022-49790,CVE-2022-49792,CVE-2022-49793,CVE-2022-49794,CVE-2022-49795,CVE-2022-49796,CVE-2022-49797,CVE-2022-49799,CVE-2022-49800,CVE-2022-49801,CVE-2022-49802,CVE-2022-49807,CVE-2022-49809,CVE-2022-49810,CVE-2022-49812,CVE-2022-49813,CVE-2022-49818,CVE-2022-49821,CVE-2022-49822,CVE-2022-49823,CVE-2022-49824,CVE-2022-49825,CVE-2022-49826,CVE-2022-49827,CVE-2022-49830,CVE-2022-49832,CVE-2022-49834,CVE-2022-49835,CVE-2022-49836,CVE-2022-49837,CVE-2022-49839,CVE-2022-49841,CVE-2022-49842,CVE-2022-49845,CVE-2022-49846,CVE-2022-49850,CVE-2022-49853,CVE-2022-49858,CVE-2022-49860,CVE-2022-49861,CVE-2022-49863,CVE-2022-49864,CVE-2022-49865,CVE-2022-49868,CVE-2022-49869,CVE-2022-49870,CVE-2022-49871,CVE-2022-49874,CVE-2022-49879,CVE-2022-49880,CVE-2022-49881,CVE-2022-49885,CVE-2022-49886,CVE-2022-49887,CVE-2022-49888,CVE-2022-49889,CVE-2022-49890,CVE-2022-49891,CVE-2022-49892,CVE-2022-49900,CVE-2022-49901,CVE-2022-49902,CVE-2022-49905,CVE-2022-4
9906,CVE-2022-49908,CVE-2022-49909,CVE-2022-49910,CVE-2022-49915,CVE-2022-49916,CVE-2022-49917,CVE-2022-49918,CVE-2022-49921,CVE-2022-49922,CVE-2022-49923,CVE-2022-49924,CVE-2022-49925,CVE-2022-49927,CVE-2022-49928,CVE-2022-49929,CVE-2022-49931,CVE-2023-1990,CVE-2023-28866,CVE-2023-53035,CVE-2023-53036,CVE-2023-53038,CVE-2023-53039,CVE-2023-53040,CVE-2023-53041,CVE-2023-53042,CVE-2023-53044,CVE-2023-53045,CVE-2023-53049,CVE-2023-53052,CVE-2023-53054,CVE-2023-53056,CVE-2023-53057,CVE-2023-53058,CVE-2023-53059,CVE-2023-53060,CVE-2023-53062,CVE-2023-53064,CVE-2023-53065,CVE-2023-53066,CVE-2023-53068,CVE-2023-53070,CVE-2023-53071,CVE-2023-53073,CVE-2023-53074,CVE-2023-53075,CVE-2023-53077,CVE-2023-53078,CVE-2023-53079,CVE-2023-53081,CVE-2023-53082,CVE-2023-53084,CVE-2023-53087,CVE-2023-53089,CVE-2023-53090,CVE-2023-53091,CVE-2023-53092,CVE-2023-53093,CVE-2023-53095,CVE-2023-53096,CVE-2023-53098,CVE-2023-53099,CVE-2023-53100,CVE-2023-53101,CVE-2023-53102,CVE-2023-53105,CVE-2023-53106,CVE
-2023-53108,CVE-2023-53109,CVE-2023-53111,CVE-2023-53112,CVE-2023-53114,CVE-2023-53116,CVE-2023-53118,CVE-2023-53119,CVE-2023-53123,CVE-2023-53124,CVE-2023-53125,CVE-2023-53128,CVE-2023-53131,CVE-2023-53134,CVE-2023-53137,CVE-2023-53139,CVE-2023-53140,CVE-2023-53142,CVE-2023-53143,CVE-2023-53145,CVE-2024-26804,CVE-2024-53168,CVE-2024-56558,CVE-2025-21999,CVE-2025-22056,CVE-2025-23145,CVE-2025-37789
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2022-49775: tcp: cdg: allow tcp_cdg_release() to be called multiple times (bsc#1242245).
- CVE-2024-53168: net: make sock_inuse_add() available (bsc#1234887).
- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1235100).
- CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1240802).
- CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion addition (bsc#1241525).
- CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242596).
- CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762).
The following non-security bugs were fixed:
- Drivers: hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges (bsc#1243737).
- Remove debug flavor (bsc#1243919).
- arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (bsc#1242778).
- arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (bsc#1242778).
- arm64: insn: Add support for encoding DSB (bsc#1242778).
- arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (bsc#1242778).
- arm64: proton-pack: Expose whether the branchy loop k value (bsc#1242778).
- arm64: proton-pack: Expose whether the platform is mitigated by firmware (bsc#1242778).
- hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (bsc#1243737).
- hv_netvsc: Remove rmsg_pgcnt (bsc#1243737).
- hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages (bsc#1243737).
- mtd: phram: Add the kernel lock down check (bsc#1232649).
- net :mana :Add remaining GDMA stats for MANA to ethtool (bsc#1234395).
- net :mana :Request a V2 response version for MANA_QUERY_GF_STAT (bsc#1234395).
- net: mana: Add gdma stats to ethtool output for mana (bsc#1234395).
- nvme-pci: acquire cq_poll_lock in nvme_poll_irqdisable (bsc#1223096).
- ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes).
- powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW (bsc#1218470 ltc#204531).
- scsi: core: Fix unremoved procfs host directory regression (git-fixes).
- tcp: Dump bound-only sockets in inet_diag (bsc#1204562).
- tpm, tpm_tis: Workaround failed command reception on Infineon devices (bsc#1235870).
- tpm: tis: Double the timeout B to 4s (bsc#1235870).
- x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778).
- x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778).
- x86/bpf: Call branch history clearing sequence on exit (bsc#1242778).
The following package changes have been done:
- kernel-rt-5.14.21-150500.13.97.1 updated
More information about the sle-container-updates
mailing list