SUSE-IU-2025:1324-1: Security update of suse-sles-15-sp5-chost-byos-v20250512-x86_64-gen2
sle-container-updates at lists.suse.com
sle-container-updates at lists.suse.com
Wed May 14 07:02:37 UTC 2025
SUSE Image Update Advisory: suse-sles-15-sp5-chost-byos-v20250512-x86_64-gen2
-----------------------------------------------------------------
Image Advisory ID : SUSE-IU-2025:1324-1
Image Tags : suse-sles-15-sp5-chost-byos-v20250512-x86_64-gen2:20250512
Image Release :
Severity : important
Type : security
References : 1065729 1180814 1183663 1183682 1189788 1190336 1190768 1190786
1193173 1193629 1194869 1194869 1194904 1195823 1196444 1197158
1197174 1197227 1197246 1197302 1197331 1197472 1197661 1197926
1198019 1198021 1198240 1198577 1198660 1199657 1200045 1200571
1200807 1200809 1200810 1200824 1200825 1200871 1200872 1201193
1201218 1201323 1201381 1201610 1202672 1202711 1202712 1202771
1202774 1202778 1202781 1203699 1203769 1204171 1205205 1205701
1206048 1206049 1206451 1207034 1207186 1207361 1207593 1207640
1207878 1208995 1209262 1209547 1209788 1209980 1210050 1210647
1211263 1211547 1213167 1213291 1214290 1214713 1216049 1216091
1216146 1216147 1216150 1216151 1216228 1216229 1216230 1216231
1216232 1216233 1216241 1216388 1216522 1216813 1216827 1216938
1217287 1218201 1218282 1218324 1218450 1218812 1218814 1219241
1219639 1220946 1221651 1222021 1222650 1222896 1223330 1223384
1225428 1225736 1225742 1225742 1226848 1226980 1227127 1228265
1228434 1228537 1228592 1229312 1229685 1229822 1230078 1230341
1230371 1230432 1230527 1230697 1231088 1231375 1231396 1231423
1231432 1231472 1231838 1231847 1231854 1232234 1232234 1232299
1232472 1232743 1232914 1232919 1233028 1233055 1233097 1233103
1233112 1233137 1233307 1233464 1233479 1233488 1233557 1233606
1233608 1233609 1233610 1233612 1233613 1233614 1233615 1233616
1233617 1233642 1233701 1233726 1233749 1233749 1233778 1234024
1234025 1234074 1234078 1234087 1234089 1234153 1234154 1234155
1234223 1234381 1234383 1234452 1234452 1234650 1234683 1234690
1234798 1234825 1234829 1234832 1234853 1234884 1234889 1234891
1234894 1234895 1234896 1234896 1234899 1234900 1234905 1234909
1234916 1234918 1234922 1234930 1234931 1234934 1234958 1234962
1234963 1234999 1235002 1235009 1235011 1235053 1235054 1235057
1235059 1235061 1235073 1235100 1235111 1235122 1235123 1235133
1235134 1235140 1235217 1235222 1235230 1235249 1235410 1235430
1235433 1235441 1235451 1235458 1235466 1235473 1235480 1235481
1235491 1235495 1235496 1235521 1235528 1235557 1235563 1235570
1235584 1235599 1235611 1235635 1235641 1235643 1235645 1235647
1235695 1235723 1235739 1235747 1235751 1235759 1235764 1235768
1235806 1235812 1235814 1235818 1235842 1235870 1235920 1235969
1236033 1236133 1236151 1236282 1236289 1236316 1236317 1236384
1236481 1236576 1236628 1236661 1236677 1236705 1236757 1236758
1236760 1236761 1236777 1236779 1236820 1236842 1236878 1236939
1236951 1236974 1236983 1237002 1237006 1237008 1237009 1237010
1237011 1237012 1237013 1237014 1237025 1237028 1237029 1237040
1237044 1237137 1237139 1237294 1237316 1237335 1237363 1237367
1237370 1237418 1237521 1237530 1237693 1237718 1237721 1237722
1237723 1237724 1237725 1237726 1237727 1237728 1237729 1237730
1237733 1237734 1237735 1237736 1237737 1237738 1237739 1237740
1237742 1237743 1237744 1237745 1237746 1237748 1237749 1237751
1237752 1237753 1237755 1237759 1237761 1237763 1237766 1237767
1237768 1237774 1237775 1237778 1237779 1237780 1237782 1237783
1237784 1237785 1237786 1237787 1237788 1237789 1237790 1237792
1237794 1237795 1237797 1237798 1237799 1237807 1237808 1237809
1237810 1237812 1237813 1237814 1237815 1237816 1237817 1237818
1237820 1237821 1237823 1237824 1237826 1237827 1237829 1237831
1237835 1237836 1237837 1237839 1237840 1237845 1237846 1237865
1237868 1237872 1237892 1237903 1237904 1237916 1237918 1237922
1237925 1237926 1237927 1237928 1237929 1237931 1237932 1237933
1237937 1237940 1237941 1237942 1237946 1237951 1237952 1237954
1237955 1237957 1237958 1237959 1237960 1237961 1237962 1237963
1237965 1237966 1237967 1237968 1237969 1237970 1237971 1237972
1237973 1237975 1237976 1237978 1237979 1237980 1237982 1237983
1237984 1237986 1237987 1237990 1237992 1237996 1237997 1237998
1237999 1238000 1238003 1238004 1238005 1238006 1238007 1238009
1238010 1238011 1238012 1238013 1238014 1238016 1238017 1238018
1238019 1238021 1238022 1238024 1238025 1238030 1238032 1238033
1238036 1238037 1238041 1238046 1238047 1238048 1238069 1238071
1238077 1238079 1238080 1238083 1238084 1238085 1238086 1238089
1238090 1238091 1238092 1238096 1238097 1238099 1238103 1238105
1238106 1238107 1238108 1238110 1238111 1238112 1238113 1238114
1238115 1238116 1238118 1238120 1238122 1238123 1238125 1238126
1238127 1238128 1238131 1238134 1238135 1238138 1238139 1238140
1238142 1238144 1238146 1238147 1238149 1238150 1238153 1238155
1238156 1238157 1238158 1238160 1238162 1238166 1238167 1238168
1238169 1238170 1238171 1238172 1238175 1238176 1238177 1238178
1238179 1238180 1238181 1238183 1238184 1238187 1238221 1238222
1238226 1238228 1238229 1238231 1238233 1238234 1238235 1238236
1238238 1238239 1238240 1238241 1238242 1238243 1238244 1238246
1238247 1238248 1238249 1238252 1238253 1238255 1238256 1238257
1238260 1238261 1238262 1238263 1238264 1238266 1238267 1238268
1238269 1238270 1238271 1238272 1238274 1238275 1238276 1238277
1238278 1238279 1238281 1238282 1238283 1238284 1238285 1238286
1238287 1238288 1238289 1238291 1238292 1238293 1238295 1238298
1238300 1238301 1238302 1238306 1238307 1238308 1238309 1238311
1238313 1238326 1238327 1238328 1238329 1238331 1238333 1238334
1238335 1238336 1238337 1238338 1238339 1238341 1238343 1238344
1238345 1238372 1238373 1238374 1238376 1238377 1238378 1238381
1238382 1238383 1238385 1238386 1238387 1238388 1238389 1238390
1238391 1238392 1238393 1238394 1238395 1238396 1238397 1238398
1238400 1238401 1238410 1238411 1238413 1238415 1238416 1238417
1238418 1238419 1238420 1238422 1238423 1238424 1238428 1238429
1238430 1238431 1238432 1238433 1238434 1238435 1238436 1238437
1238440 1238441 1238442 1238443 1238444 1238445 1238447 1238453
1238454 1238458 1238459 1238462 1238463 1238465 1238467 1238469
1238533 1238536 1238538 1238539 1238540 1238542 1238543 1238546
1238551 1238552 1238556 1238557 1238599 1238600 1238601 1238602
1238605 1238612 1238613 1238615 1238616 1238617 1238618 1238619
1238621 1238623 1238625 1238626 1238630 1238631 1238632 1238633
1238635 1238636 1238638 1238639 1238640 1238641 1238642 1238643
1238645 1238646 1238647 1238648 1238649 1238650 1238653 1238654
1238655 1238658 1238661 1238662 1238663 1238664 1238666 1238668
1238705 1238707 1238710 1238712 1238718 1238719 1238721 1238722
1238727 1238729 1238750 1238787 1238789 1238792 1238799 1238803
1238804 1238805 1238806 1238808 1238809 1238810 1238811 1238814
1238815 1238816 1238817 1238818 1238819 1238820 1238821 1238822
1238823 1238825 1238830 1238834 1238835 1238836 1238838 1238843
1238867 1238868 1238869 1238870 1238871 1238878 1238879 1238889
1238892 1238893 1238897 1238898 1238899 1238902 1238911 1238916
1238919 1238925 1238930 1238933 1238936 1238937 1238938 1238939
1238941 1238942 1238943 1238944 1238945 1238946 1238948 1238949
1238950 1238951 1238952 1238953 1238954 1238956 1238957 1239001
1239004 1239016 1239035 1239040 1239041 1239051 1239060 1239070
1239071 1239073 1239076 1239095 1239109 1239115 1239126 1239185
1239322 1239452 1239454 1239465 1239618 1239663 1239680 1239749
1239909 1239968 1239969 1240009 1240133 1240205 1240207 1240208
1240210 1240212 1240213 1240218 1240220 1240227 1240229 1240231
1240242 1240245 1240247 1240250 1240254 1240256 1240264 1240266
1240272 1240275 1240276 1240278 1240279 1240280 1240281 1240282
1240283 1240284 1240286 1240288 1240290 1240292 1240293 1240297
1240304 1240308 1240309 1240317 1240318 1240322 1240343 1240343
1241020 1241078 1241189 1241453 1241551 1241678 CVE-2017-5753
CVE-2021-4453 CVE-2021-4454 CVE-2021-47517 CVE-2021-47631 CVE-2021-47632
CVE-2021-47633 CVE-2021-47635 CVE-2021-47636 CVE-2021-47637 CVE-2021-47638
CVE-2021-47639 CVE-2021-47641 CVE-2021-47642 CVE-2021-47643 CVE-2021-47644
CVE-2021-47645 CVE-2021-47646 CVE-2021-47647 CVE-2021-47648 CVE-2021-47649
CVE-2021-47650 CVE-2021-47651 CVE-2021-47652 CVE-2021-47653 CVE-2021-47654
CVE-2021-47656 CVE-2021-47657 CVE-2021-47659 CVE-2022-0168 CVE-2022-0995
CVE-2022-1016 CVE-2022-1048 CVE-2022-1184 CVE-2022-2977 CVE-2022-29900
CVE-2022-29901 CVE-2022-3303 CVE-2022-3435 CVE-2022-49044 CVE-2022-49050
CVE-2022-49051 CVE-2022-49053 CVE-2022-49054 CVE-2022-49055 CVE-2022-49056
CVE-2022-49057 CVE-2022-49058 CVE-2022-49059 CVE-2022-49060 CVE-2022-49061
CVE-2022-49062 CVE-2022-49063 CVE-2022-49064 CVE-2022-49065 CVE-2022-49066
CVE-2022-49070 CVE-2022-49071 CVE-2022-49073 CVE-2022-49074 CVE-2022-49075
CVE-2022-49076 CVE-2022-49078 CVE-2022-49080 CVE-2022-49082 CVE-2022-49083
CVE-2022-49084 CVE-2022-49085 CVE-2022-49086 CVE-2022-49088 CVE-2022-49089
CVE-2022-49090 CVE-2022-49091 CVE-2022-49092 CVE-2022-49093 CVE-2022-49095
CVE-2022-49096 CVE-2022-49097 CVE-2022-49098 CVE-2022-49099 CVE-2022-49100
CVE-2022-49102 CVE-2022-49103 CVE-2022-49104 CVE-2022-49105 CVE-2022-49106
CVE-2022-49107 CVE-2022-49109 CVE-2022-49111 CVE-2022-49112 CVE-2022-49113
CVE-2022-49114 CVE-2022-49115 CVE-2022-49116 CVE-2022-49118 CVE-2022-49119
CVE-2022-49120 CVE-2022-49121 CVE-2022-49122 CVE-2022-49123 CVE-2022-49125
CVE-2022-49126 CVE-2022-49128 CVE-2022-49129 CVE-2022-49130 CVE-2022-49131
CVE-2022-49132 CVE-2022-49133 CVE-2022-49134 CVE-2022-49135 CVE-2022-49136
CVE-2022-49137 CVE-2022-49138 CVE-2022-49139 CVE-2022-49144 CVE-2022-49145
CVE-2022-49147 CVE-2022-49148 CVE-2022-49151 CVE-2022-49153 CVE-2022-49154
CVE-2022-49155 CVE-2022-49156 CVE-2022-49157 CVE-2022-49158 CVE-2022-49159
CVE-2022-49160 CVE-2022-49162 CVE-2022-49163 CVE-2022-49164 CVE-2022-49165
CVE-2022-49174 CVE-2022-49175 CVE-2022-49176 CVE-2022-49177 CVE-2022-49178
CVE-2022-49179 CVE-2022-49180 CVE-2022-49182 CVE-2022-49183 CVE-2022-49185
CVE-2022-49187 CVE-2022-49188 CVE-2022-49189 CVE-2022-49192 CVE-2022-49193
CVE-2022-49194 CVE-2022-49196 CVE-2022-49199 CVE-2022-49200 CVE-2022-49201
CVE-2022-49202 CVE-2022-49203 CVE-2022-49204 CVE-2022-49205 CVE-2022-49206
CVE-2022-49207 CVE-2022-49208 CVE-2022-49209 CVE-2022-49212 CVE-2022-49213
CVE-2022-49214 CVE-2022-49215 CVE-2022-49216 CVE-2022-49217 CVE-2022-49218
CVE-2022-49219 CVE-2022-49221 CVE-2022-49222 CVE-2022-49224 CVE-2022-49225
CVE-2022-49226 CVE-2022-49227 CVE-2022-49228 CVE-2022-49230 CVE-2022-49232
CVE-2022-49233 CVE-2022-49235 CVE-2022-49236 CVE-2022-49237 CVE-2022-49238
CVE-2022-49239 CVE-2022-49241 CVE-2022-49242 CVE-2022-49243 CVE-2022-49244
CVE-2022-49246 CVE-2022-49247 CVE-2022-49248 CVE-2022-49249 CVE-2022-49250
CVE-2022-49251 CVE-2022-49252 CVE-2022-49253 CVE-2022-49254 CVE-2022-49256
CVE-2022-49257 CVE-2022-49258 CVE-2022-49259 CVE-2022-49260 CVE-2022-49261
CVE-2022-49262 CVE-2022-49263 CVE-2022-49264 CVE-2022-49265 CVE-2022-49266
CVE-2022-49268 CVE-2022-49269 CVE-2022-49270 CVE-2022-49271 CVE-2022-49272
CVE-2022-49273 CVE-2022-49274 CVE-2022-49275 CVE-2022-49276 CVE-2022-49277
CVE-2022-49278 CVE-2022-49279 CVE-2022-49280 CVE-2022-49281 CVE-2022-49283
CVE-2022-49285 CVE-2022-49286 CVE-2022-49287 CVE-2022-49288 CVE-2022-49290
CVE-2022-49291 CVE-2022-49292 CVE-2022-49293 CVE-2022-49294 CVE-2022-49295
CVE-2022-49296 CVE-2022-49297 CVE-2022-49298 CVE-2022-49299 CVE-2022-49300
CVE-2022-49301 CVE-2022-49302 CVE-2022-49304 CVE-2022-49305 CVE-2022-49306
CVE-2022-49307 CVE-2022-49308 CVE-2022-49309 CVE-2022-49310 CVE-2022-49311
CVE-2022-49312 CVE-2022-49313 CVE-2022-49314 CVE-2022-49315 CVE-2022-49316
CVE-2022-49319 CVE-2022-49320 CVE-2022-49321 CVE-2022-49322 CVE-2022-49323
CVE-2022-49325 CVE-2022-49326 CVE-2022-49327 CVE-2022-49328 CVE-2022-49329
CVE-2022-49330 CVE-2022-49331 CVE-2022-49332 CVE-2022-49333 CVE-2022-49335
CVE-2022-49336 CVE-2022-49337 CVE-2022-49338 CVE-2022-49339 CVE-2022-49341
CVE-2022-49342 CVE-2022-49343 CVE-2022-49345 CVE-2022-49346 CVE-2022-49347
CVE-2022-49348 CVE-2022-49349 CVE-2022-49350 CVE-2022-49351 CVE-2022-49352
CVE-2022-49353 CVE-2022-49354 CVE-2022-49356 CVE-2022-49357 CVE-2022-49359
CVE-2022-49362 CVE-2022-49365 CVE-2022-49367 CVE-2022-49368 CVE-2022-49370
CVE-2022-49371 CVE-2022-49373 CVE-2022-49375 CVE-2022-49376 CVE-2022-49377
CVE-2022-49378 CVE-2022-49379 CVE-2022-49381 CVE-2022-49382 CVE-2022-49384
CVE-2022-49385 CVE-2022-49386 CVE-2022-49389 CVE-2022-49390 CVE-2022-49392
CVE-2022-49394 CVE-2022-49396 CVE-2022-49397 CVE-2022-49398 CVE-2022-49399
CVE-2022-49400 CVE-2022-49402 CVE-2022-49404 CVE-2022-49406 CVE-2022-49407
CVE-2022-49409 CVE-2022-49410 CVE-2022-49411 CVE-2022-49412 CVE-2022-49413
CVE-2022-49414 CVE-2022-49416 CVE-2022-49418 CVE-2022-49419 CVE-2022-49421
CVE-2022-49422 CVE-2022-49424 CVE-2022-49426 CVE-2022-49427 CVE-2022-49429
CVE-2022-49430 CVE-2022-49431 CVE-2022-49432 CVE-2022-49433 CVE-2022-49434
CVE-2022-49435 CVE-2022-49436 CVE-2022-49437 CVE-2022-49438 CVE-2022-49440
CVE-2022-49441 CVE-2022-49442 CVE-2022-49443 CVE-2022-49444 CVE-2022-49445
CVE-2022-49446 CVE-2022-49447 CVE-2022-49448 CVE-2022-49449 CVE-2022-49451
CVE-2022-49453 CVE-2022-49455 CVE-2022-49458 CVE-2022-49459 CVE-2022-49460
CVE-2022-49462 CVE-2022-49463 CVE-2022-49465 CVE-2022-49466 CVE-2022-49467
CVE-2022-49468 CVE-2022-49470 CVE-2022-49472 CVE-2022-49473 CVE-2022-49474
CVE-2022-49475 CVE-2022-49476 CVE-2022-49477 CVE-2022-49478 CVE-2022-49479
CVE-2022-49480 CVE-2022-49481 CVE-2022-49482 CVE-2022-49483 CVE-2022-49484
CVE-2022-49485 CVE-2022-49486 CVE-2022-49487 CVE-2022-49488 CVE-2022-49489
CVE-2022-49490 CVE-2022-49491 CVE-2022-49492 CVE-2022-49493 CVE-2022-49494
CVE-2022-49495 CVE-2022-49497 CVE-2022-49498 CVE-2022-49499 CVE-2022-49501
CVE-2022-49502 CVE-2022-49503 CVE-2022-49504 CVE-2022-49505 CVE-2022-49506
CVE-2022-49507 CVE-2022-49508 CVE-2022-49509 CVE-2022-49510 CVE-2022-49511
CVE-2022-49512 CVE-2022-49514 CVE-2022-49515 CVE-2022-49516 CVE-2022-49517
CVE-2022-49518 CVE-2022-49519 CVE-2022-49520 CVE-2022-49521 CVE-2022-49522
CVE-2022-49523 CVE-2022-49524 CVE-2022-49525 CVE-2022-49526 CVE-2022-49527
CVE-2022-49529 CVE-2022-49530 CVE-2022-49532 CVE-2022-49533 CVE-2022-49534
CVE-2022-49535 CVE-2022-49536 CVE-2022-49537 CVE-2022-49538 CVE-2022-49541
CVE-2022-49542 CVE-2022-49543 CVE-2022-49544 CVE-2022-49545 CVE-2022-49546
CVE-2022-49548 CVE-2022-49549 CVE-2022-49551 CVE-2022-49552 CVE-2022-49555
CVE-2022-49556 CVE-2022-49559 CVE-2022-49560 CVE-2022-49562 CVE-2022-49563
CVE-2022-49564 CVE-2022-49565 CVE-2022-49566 CVE-2022-49568 CVE-2022-49569
CVE-2022-49570 CVE-2022-49579 CVE-2022-49581 CVE-2022-49583 CVE-2022-49584
CVE-2022-49591 CVE-2022-49592 CVE-2022-49603 CVE-2022-49605 CVE-2022-49606
CVE-2022-49607 CVE-2022-49609 CVE-2022-49610 CVE-2022-49611 CVE-2022-49613
CVE-2022-49615 CVE-2022-49616 CVE-2022-49617 CVE-2022-49618 CVE-2022-49621
CVE-2022-49623 CVE-2022-49624 CVE-2022-49625 CVE-2022-49626 CVE-2022-49627
CVE-2022-49628 CVE-2022-49631 CVE-2022-49634 CVE-2022-49635 CVE-2022-49638
CVE-2022-49640 CVE-2022-49641 CVE-2022-49642 CVE-2022-49643 CVE-2022-49644
CVE-2022-49645 CVE-2022-49646 CVE-2022-49647 CVE-2022-49648 CVE-2022-49649
CVE-2022-49650 CVE-2022-49652 CVE-2022-49653 CVE-2022-49655 CVE-2022-49656
CVE-2022-49657 CVE-2022-49658 CVE-2022-49661 CVE-2022-49663 CVE-2022-49665
CVE-2022-49667 CVE-2022-49668 CVE-2022-49670 CVE-2022-49671 CVE-2022-49672
CVE-2022-49673 CVE-2022-49674 CVE-2022-49675 CVE-2022-49676 CVE-2022-49677
CVE-2022-49678 CVE-2022-49679 CVE-2022-49680 CVE-2022-49683 CVE-2022-49685
CVE-2022-49686 CVE-2022-49687 CVE-2022-49688 CVE-2022-49693 CVE-2022-49694
CVE-2022-49695 CVE-2022-49697 CVE-2022-49699 CVE-2022-49700 CVE-2022-49701
CVE-2022-49703 CVE-2022-49704 CVE-2022-49705 CVE-2022-49707 CVE-2022-49708
CVE-2022-49710 CVE-2022-49711 CVE-2022-49712 CVE-2022-49713 CVE-2022-49714
CVE-2022-49715 CVE-2022-49716 CVE-2022-49719 CVE-2022-49720 CVE-2022-49721
CVE-2022-49722 CVE-2022-49723 CVE-2022-49724 CVE-2022-49725 CVE-2022-49726
CVE-2022-49729 CVE-2022-49730 CVE-2022-49731 CVE-2022-49732 CVE-2022-49733
CVE-2022-49739 CVE-2022-49746 CVE-2022-49748 CVE-2022-49751 CVE-2022-49753
CVE-2022-49755 CVE-2022-49759 CVE-2023-0179 CVE-2023-1192 CVE-2023-1652
CVE-2023-2162 CVE-2023-28410 CVE-2023-3567 CVE-2023-4016 CVE-2023-52572
CVE-2023-52930 CVE-2023-52933 CVE-2023-52935 CVE-2023-52939 CVE-2023-52941
CVE-2023-52973 CVE-2023-52974 CVE-2023-52975 CVE-2023-52976 CVE-2023-52979
CVE-2023-52983 CVE-2023-52984 CVE-2023-52988 CVE-2023-52989 CVE-2023-52992
CVE-2023-52993 CVE-2023-53000 CVE-2023-53005 CVE-2023-53006 CVE-2023-53007
CVE-2023-53008 CVE-2023-53010 CVE-2023-53015 CVE-2023-53016 CVE-2023-53019
CVE-2023-53023 CVE-2023-53024 CVE-2023-53025 CVE-2023-53026 CVE-2023-53028
CVE-2023-53029 CVE-2023-53030 CVE-2023-53033 CVE-2024-10041 CVE-2024-10041
CVE-2024-11168 CVE-2024-12133 CVE-2024-12243 CVE-2024-23650 CVE-2024-26634
CVE-2024-26758 CVE-2024-26943 CVE-2024-29018 CVE-2024-29018 CVE-2024-36898
CVE-2024-38599 CVE-2024-40635 CVE-2024-41047 CVE-2024-41110 CVE-2024-43790
CVE-2024-43802 CVE-2024-45019 CVE-2024-45306 CVE-2024-45774 CVE-2024-45775
CVE-2024-45776 CVE-2024-45777 CVE-2024-45778 CVE-2024-45779 CVE-2024-45780
CVE-2024-45781 CVE-2024-45782 CVE-2024-45783 CVE-2024-46858 CVE-2024-47678
CVE-2024-50051 CVE-2024-50115 CVE-2024-50136 CVE-2024-50142 CVE-2024-50151
CVE-2024-50195 CVE-2024-50199 CVE-2024-50210 CVE-2024-50275 CVE-2024-50290
CVE-2024-50299 CVE-2024-53063 CVE-2024-53095 CVE-2024-53103 CVE-2024-53104
CVE-2024-53112 CVE-2024-53121 CVE-2024-53124 CVE-2024-53127 CVE-2024-53129
CVE-2024-53135 CVE-2024-53138 CVE-2024-53141 CVE-2024-53144 CVE-2024-53148
CVE-2024-53151 CVE-2024-53166 CVE-2024-53169 CVE-2024-53171 CVE-2024-53173
CVE-2024-53174 CVE-2024-53176 CVE-2024-53177 CVE-2024-53178 CVE-2024-53208
CVE-2024-53209 CVE-2024-53215 CVE-2024-53217 CVE-2024-53224 CVE-2024-53226
CVE-2024-53227 CVE-2024-53229 CVE-2024-53239 CVE-2024-53690 CVE-2024-54680
CVE-2024-55916 CVE-2024-56171 CVE-2024-56531 CVE-2024-56532 CVE-2024-56533
CVE-2024-56539 CVE-2024-56548 CVE-2024-56557 CVE-2024-56558 CVE-2024-56562
CVE-2024-56567 CVE-2024-56588 CVE-2024-56595 CVE-2024-56596 CVE-2024-56597
CVE-2024-56600 CVE-2024-56601 CVE-2024-56602 CVE-2024-56605 CVE-2024-56623
CVE-2024-56629 CVE-2024-56631 CVE-2024-56642 CVE-2024-56644 CVE-2024-56645
CVE-2024-56648 CVE-2024-56650 CVE-2024-56651 CVE-2024-56658 CVE-2024-56661
CVE-2024-56664 CVE-2024-56678 CVE-2024-56681 CVE-2024-56698 CVE-2024-56701
CVE-2024-56704 CVE-2024-56722 CVE-2024-56737 CVE-2024-56739 CVE-2024-56745
CVE-2024-56747 CVE-2024-56754 CVE-2024-56756 CVE-2024-56759 CVE-2024-56765
CVE-2024-56776 CVE-2024-56777 CVE-2024-56778 CVE-2024-57791 CVE-2024-57792
CVE-2024-57793 CVE-2024-57798 CVE-2024-57849 CVE-2024-57850 CVE-2024-57876
CVE-2024-57893 CVE-2024-57897 CVE-2024-57948 CVE-2024-57996 CVE-2024-58013
CVE-2024-58014 CVE-2024-8176 CVE-2024-8805 CVE-2025-0395 CVE-2025-0622
CVE-2025-0624 CVE-2025-0677 CVE-2025-0678 CVE-2025-0684 CVE-2025-0685
CVE-2025-0686 CVE-2025-0689 CVE-2025-0690 CVE-2025-0938 CVE-2025-1118
CVE-2025-1125 CVE-2025-1215 CVE-2025-21647 CVE-2025-21690 CVE-2025-21692
CVE-2025-21693 CVE-2025-21699 CVE-2025-21718 CVE-2025-21772 CVE-2025-21780
CVE-2025-22134 CVE-2025-22868 CVE-2025-22869 CVE-2025-2312 CVE-2025-24014
CVE-2025-24928 CVE-2025-2588 CVE-2025-26465 CVE-2025-27113 CVE-2025-27363
CVE-2025-27516 CVE-2025-29087 CVE-2025-29088 CVE-2025-32414 CVE-2025-32415
CVE-2025-3277
-----------------------------------------------------------------
The container suse-sles-15-sp5-chost-byos-v20250512-x86_64-gen2 was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:508-1
Released: Thu Feb 13 12:29:31 2025
Summary: Recommended update for findutils
Type: recommended
Severity: moderate
References: 1231472
This update for findutils fixes the following issue:
- fix crash when file system loop was encountered (bsc#1231472).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:548-1
Released: Fri Feb 14 11:19:24 2025
Summary: Security update for libtasn1
Type: security
Severity: important
References: 1236878,CVE-2024-12133
This update for libtasn1 fixes the following issues:
- CVE-2024-12133: the processing of input DER data containing a large number of SEQUENCE OF or SET OF elements takes
quadratic time to complete. (bsc#1236878)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:554-1
Released: Fri Feb 14 16:10:40 2025
Summary: Security update for python3
Type: security
Severity: moderate
References: 1236705,CVE-2025-0938
This update for python3 fixes the following issues:
- CVE-2025-0938: domain names containing square brackets are not identified as incorrect by urlparse. (bsc#1236705)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:562-1
Released: Mon Feb 17 12:43:41 2025
Summary: Security update for glibc
Type: security
Severity: low
References: 1236282,CVE-2025-0395
This update for glibc fixes the following issues:
- CVE-2025-0395: Fix underallocation of abort_msg_s struct (bsc#1236282)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:577-1
Released: Tue Feb 18 13:51:28 2025
Summary: Security update for the Linux Kernel
Type: security
Severity: important
References: 1194869,1216813,1223384,1225736,1226848,1226980,1228537,1228592,1230341,1230432,1230527,1230697,1231088,1231847,1232914,1233028,1233055,1233097,1233103,1233112,1233464,1233488,1233642,1233778,1234024,1234025,1234078,1234087,1234153,1234155,1234223,1234381,1234683,1234690,1234825,1234829,1234832,1234884,1234889,1234896,1234899,1234900,1234905,1234909,1234916,1234918,1234922,1234930,1234931,1234934,1234962,1234999,1235002,1235009,1235011,1235053,1235057,1235059,1235100,1235122,1235123,1235133,1235134,1235217,1235222,1235230,1235249,1235410,1235430,1235433,1235441,1235451,1235458,1235466,1235473,1235480,1235491,1235495,1235496,1235521,1235557,1235563,1235570,1235584,1235611,1235635,1235641,1235643,1235645,1235647,1235723,1235739,1235747,1235759,1235764,1235768,1235806,1235812,1235814,1235818,1235842,1235920,1235969,1236628,CVE-2024-26758,CVE-2024-26943,CVE-2024-36898,CVE-2024-38599,CVE-2024-41047,CVE-2024-45019,CVE-2024-46858,CVE-2024-50051,CVE-2024-50136,CVE-2024-50142,CVE
-2024-50151,CVE-2024-50195,CVE-2024-50199,CVE-2024-50210,CVE-2024-50275,CVE-2024-50299,CVE-2024-53095,CVE-2024-53103,CVE-2024-53104,CVE-2024-53112,CVE-2024-53121,CVE-2024-53127,CVE-2024-53129,CVE-2024-53138,CVE-2024-53141,CVE-2024-53144,CVE-2024-53148,CVE-2024-53151,CVE-2024-53166,CVE-2024-53169,CVE-2024-53171,CVE-2024-53174,CVE-2024-53177,CVE-2024-53208,CVE-2024-53209,CVE-2024-53215,CVE-2024-53217,CVE-2024-53224,CVE-2024-53227,CVE-2024-53229,CVE-2024-53690,CVE-2024-54680,CVE-2024-55916,CVE-2024-56531,CVE-2024-56532,CVE-2024-56533,CVE-2024-56557,CVE-2024-56558,CVE-2024-56562,CVE-2024-56567,CVE-2024-56588,CVE-2024-56595,CVE-2024-56596,CVE-2024-56597,CVE-2024-56600,CVE-2024-56601,CVE-2024-56602,CVE-2024-56623,CVE-2024-56629,CVE-2024-56631,CVE-2024-56642,CVE-2024-56644,CVE-2024-56645,CVE-2024-56648,CVE-2024-56650,CVE-2024-56658,CVE-2024-56661,CVE-2024-56664,CVE-2024-56678,CVE-2024-56681,CVE-2024-56698,CVE-2024-56701,CVE-2024-56704,CVE-2024-56722,CVE-2024-56739,CVE-2024-56745,CVE-2024-5
6747,CVE-2024-56754,CVE-2024-56756,CVE-2024-56759,CVE-2024-56765,CVE-2024-56776,CVE-2024-56777,CVE-2024-56778,CVE-2024-57791,CVE-2024-57792,CVE-2024-57793,CVE-2024-57798,CVE-2024-57849,CVE-2024-57850,CVE-2024-57876,CVE-2024-57893,CVE-2024-57897,CVE-2024-8805
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2024-36898: gpiolib: cdev: fix uninitialised kfifo (bsc#1225736).
- CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync (bsc#1231088).
- CVE-2024-50142: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (bsc#1233028).
- CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request (bsc#1233055).
- CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112).
- CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb() (bsc#1233488).
- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).
- CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234884).
- CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896).
- CVE-2024-53209: bnxt_en: Fix receive ring space parameters when XDP is active (bsc#1235002).
- CVE-2024-53227: scsi: bfa: Fix use-after-free in bfad_im_module_exit() (bsc#1235011).
- CVE-2024-56588: scsi: hisi_sas: Create all dump files during debugfs initialization (bsc#1235123).
- CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217).
- CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230).
- CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() (bsc#1235521).
- CVE-2024-56623: scsi: qla2xxx: Fix use after free on unload (bsc#1235466).
- CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release() (bsc#1235480).
- CVE-2024-56642: tipc: Fix use-after-free of kernel socket in cleanup_bearer() (bsc#1235433).
- CVE-2024-56645: can: j1939: j1939_session_new(): fix skb reference counting (bsc#1235134).
- CVE-2024-56648: net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235451).
- CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430).
- CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441).
- CVE-2024-56664: bpf, sockmap: Fix race between element replace and close() (bsc#1235249).
- CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).
- CVE-2024-56747: scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() (bsc#1234934).
- CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645).
- CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining clc data (bsc#1235759).
- CVE-2024-57792: power: supply: gpio-charger: Fix set charge current limits (bsc#1235764).
- CVE-2024-57793: virt: tdx-guest: Just leak decrypted memory on unrecoverable errors (bsc#1235768).
- CVE-2024-57798: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() (bsc#1235818).
- CVE-2024-57849: s390/cpum_sf: Handle CPU hotplug remove during sampling (bsc#1235814).
- CVE-2024-57876: drm/dp_mst: Fix resetting msg rx state after topology removal (bsc#1235806).
- CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages (bsc#1235920).
- CVE-2024-57897: drm/amdkfd: Correct the migration DMA map direction (bsc#1235969).
The following non-security bugs were fixed:
- NFS: Adjust the amount of readahead performed by NFS readdir (bsc#1231847).
- NFS: Do not flush the readdir cache in nfs_dentry_iput() (bsc#1231847).
- NFS: Improve heuristic for readdirplus (bsc#1231847).
- NFS: Trigger the 'ls -l' readdir heuristic sooner (bsc#1231847).
- VFS: use system_unbound_wq for delayed_mntput (bsc#1234683).
- ceph: improve error handling and short/overflow-read logic in __ceph_sync_read() (bsc#1228592).
- ibmvnic: Free any outstanding tx skbs during scrq reset (bsc#1226980).
- netfilter: nf_tables: validate family when identifying table via handle (bsc#1233778).
- powerpc/pseries/vas: Add close() callback in vas_vm_ops struct (bsc#1234825).
- tipc: fix NULL deref in cleanup_bearer() (bsc#1235433).
- x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0 (git-fixes).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:587-1
Released: Wed Feb 19 08:29:17 2025
Summary: Security update for grub2
Type: security
Severity: important
References: 1233606,1233608,1233609,1233610,1233612,1233613,1233614,1233615,1233616,1233617,1234958,1236316,1236317,1237002,1237006,1237008,1237009,1237010,1237011,1237012,1237013,1237014,CVE-2024-45774,CVE-2024-45775,CVE-2024-45776,CVE-2024-45777,CVE-2024-45778,CVE-2024-45779,CVE-2024-45780,CVE-2024-45781,CVE-2024-45782,CVE-2024-45783,CVE-2024-56737,CVE-2025-0622,CVE-2025-0624,CVE-2025-0677,CVE-2025-0678,CVE-2025-0684,CVE-2025-0685,CVE-2025-0686,CVE-2025-0689,CVE-2025-0690,CVE-2025-1118,CVE-2025-1125
This update for grub2 fixes the following issues:
- CVE-2024-45781: Fixed strcpy overflow in ufs. (bsc#1233617)
- CVE-2024-56737: Fixed a heap-based buffer overflow in hfs. (bsc#1234958)
- CVE-2024-45782: Fixed strcpy overflow in hfs. (bsc#1233615)
- CVE-2024-45780: Fixed an overflow in tar/cpio. (bsc#1233614)
- CVE-2024-45783: Fixed a refcount overflow in hfsplus. (bsc#1233616)
- CVE-2024-45774: Fixed a heap overflow in JPEG parser. (bsc#1233609)
- CVE-2024-45775: Fixed a missing NULL check in extcmd parser. (bsc#1233610)
- CVE-2024-45776: Fixed an overflow in .MO file handling. (bsc#1233612)
- CVE-2024-45777: Fixed an integer overflow in gettext. (bsc#1233613)
- CVE-2024-45778: Fixed bfs filesystem by removing it from lockdown capable modules. (bsc#1233606)
- CVE-2024-45779: Fixed a heap overflow in bfs. (bsc#1233608)
- CVE-2025-0624: Fixed an out-of-bounds write during the network boot process. (bsc#1236316)
- CVE-2025-0622: Fixed a use-after-free when handling hooks during module unload in command/gpg . (bsc#1236317)
- CVE-2025-0690: Fixed an integer overflow that may lead to an out-of-bounds write through the read command.
(bsc#1237012)
- CVE-2025-1118: Fixed an issue where the dump command was not being blocked when grub was in lockdown mode.
(bsc#1237013)
- CVE-2025-0677: Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in ufs.
(bsc#1237002)
- CVE-2025-0684: Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in reiserfs.
(bsc#1237008)
- CVE-2025-0685: Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in jfs.
(bsc#1237009)
- CVE-2025-0686: Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in romfs.
(bsc#1237010)
- CVE-2025-0689: Fixed a heap-based buffer overflow in udf that may lead to arbitrary code execution. (bsc#1237011)
- CVE-2025-1125: Fixed an integer overflow that may lead to an out-of-bounds write in hfs. (bsc#1237014)
- CVE-2025-0678: Fixed an integer overflow that may lead to an out-of-bounds write in squash4. (bsc#1237006)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:605-1
Released: Thu Feb 20 15:42:48 2025
Summary: Security update for openssh
Type: security
Severity: moderate
References: 1237040,CVE-2025-26465
This update for openssh fixes the following issues:
- CVE-2025-26465: Fixed MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client (bsc#1237040).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:677-1
Released: Mon Feb 24 11:59:00 2025
Summary: Recommended update for libzypp, zypper
Type: recommended
Severity: important
References: 1228434,1236384,1236820,1236939,1236983
This update for libzypp, zypper fixes the following issues:
- Don't issue deprecated warnings if -DNDEBUG is set (bsc#1236983)
- Drop zypp-CheckAccessDeleted in favor of 'zypper ps'
- Fix Repoverification plugin not being executed
- Refresh: Fetch the master index file before key and signature (bsc#1236820)
- Deprecate RepoReports we do not trigger
- Let zypper dup fail in case of (temporarily) unaccessible repos (bsc#1228434, bsc#1236939)
- New system-architecture command (bsc#1236384)
- Change versioncmp command to return exit code according to the comparison result
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:723-1
Released: Wed Feb 26 14:29:39 2025
Summary: Security update for vim
Type: security
Severity: moderate
References: 1229685,1229822,1230078,1235695,1236151,1237137,CVE-2024-43790,CVE-2024-43802,CVE-2024-45306,CVE-2025-1215,CVE-2025-22134,CVE-2025-24014
This update for vim fixes the following issues:
Update to version 9.1.1101:
- CVE-2024-43790: possible out-of-bounds read when performing a search command (bsc#1229685).
- CVE-2024-43802: heap buffer overflow due to incorrect flushing of the typeahead buffer (bsc#1229822).
- CVE-2024-45306: heap buffer overflow when cursor position is invalid (bsc#1230078).
- CVE-2025-22134: heap buffer overflow when switching to other buffers using the :all command with active visual mode
(bsc#1235695).
- CVE-2025-24014: NULL pointer dereference may lead to segmentation fault when in silent Ex mode (bsc#1236151).
- CVE-2025-1215: memory corruption when manipulating the --log argument (bsc#1237137).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:741-1
Released: Fri Feb 28 11:15:50 2025
Summary: Security update for procps
Type: security
Severity: important
References: 1214290,1236842,CVE-2023-4016
This update for procps fixes the following issues:
- Integer overflow due to incomplete fix for CVE-2023-4016 can lead to segmentation fault in ps command when pid
argument has a leading space (bsc#1236842, bsc#1214290).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:746-1
Released: Fri Feb 28 17:10:22 2025
Summary: Security update for libxml2
Type: security
Severity: important
References: 1237363,1237370,1237418,CVE-2024-56171,CVE-2025-24928,CVE-2025-27113
This update for libxml2 fixes the following issues:
- CVE-2024-56171: use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c
(bsc#1237363).
- CVE-2025-24928: stack-based buffer overflow in xmlSnprintfElements in valid.c (bsc#1237370).
- CVE-2025-27113: NULL pointer dereference in xmlPatMatch in pattern.c (bsc#1237418).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:765-1
Released: Mon Mar 3 09:44:13 2025
Summary: Security update for gnutls
Type: security
Severity: moderate
References: 1236974,CVE-2024-12243
This update for gnutls fixes the following issues:
- CVE-2024-12243: quadratic complexity of DER input decoding in libtasn1 can lead to a DoS (bsc#1236974).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:776-1
Released: Tue Mar 4 15:55:35 2025
Summary: Security update for docker
Type: security
Severity: moderate
References: 1234089,1237335,CVE-2024-29018
This update for docker fixes the following issues:
Update to Docker 27.5.1-ce (bsc#1237335):
- CVE-2024-29018: External DNS requests from 'internal' networks could lead to data exfiltration (bsc#1234089).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:829-1
Released: Tue Mar 11 08:36:43 2025
Summary: Recommended update for kdump
Type: recommended
Severity: moderate
References: 1233137
This update for kdump fixes the following issue:
- Fix filtering ReadOnly keys in kdump_bond_config (bsc#1233137).
kdump fails to bring network due to bad bond config
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:830-1
Released: Tue Mar 11 09:55:10 2025
Summary: Recommended update for timezone
Type: recommended
Severity: moderate
References:
This update for timezone fixes the following issues:
- Update to 2025a:
* Paraguay adopts permanent -03 starting spring 2024
* Improve pre-1991 data for the Philippines
* Etc/Unknown is now reserved
* Improve historical data for Mexico, Mongolia, and Portugal
* System V names are now obsolescent
* The main data form now uses %z
* The code now conforms to RFC 8536 for early timestamps
* Support POSIX.1-2024, which removes asctime_r and ctime_r
* Assume POSIX.2-1992 or later for shell scripts
* SUPPORT_C89 now defaults to 1
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:833-1
Released: Tue Mar 11 11:53:19 2025
Summary: Security update for the Linux Kernel
Type: security
Severity: important
References: 1208995,1220946,1225742,1232472,1232919,1233701,1233749,1234154,1234650,1234853,1234891,1234963,1235054,1235061,1235073,1235111,1236133,1236289,1236576,1236661,1236677,1236757,1236758,1236760,1236761,1236777,1236951,1237025,1237028,1237139,1237316,1237693,1238033,CVE-2022-49080,CVE-2023-1192,CVE-2023-52572,CVE-2024-50115,CVE-2024-53135,CVE-2024-53173,CVE-2024-53226,CVE-2024-53239,CVE-2024-56539,CVE-2024-56548,CVE-2024-56605,CVE-2024-57948,CVE-2025-21647,CVE-2025-21690,CVE-2025-21692,CVE-2025-21699
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238033).
- CVE-2024-53135: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN (bsc#1234154).
- CVE-2024-53226: RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (bsc#1236576)
- CVE-2024-57948: mac802154: check local interfaces before deleting sdata list (bsc#1236677).
- CVE-2025-21647: sched: sch_cake: add bounds checks to host bulk flow fairness counts (bsc#1236133).
- CVE-2025-21690: scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (bsc#1237025).
- CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028).
- CVE-2025-21699: gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (bsc#1237139).
The following non-security bugs were fixed:
- cpufreq/amd-pstate: Only print supported EPP values for performance governor (bsc#1236777).
- iavf: fix the waiting time for initial reset (bsc#1235111).
- ice: add ice_adapter for shared data across PFs on the same NIC (bsc#1235111).
- ice: avoid the PTP hardware semaphore in gettimex64 path (bsc#1235111).
- ice: fold ice_ptp_read_time into ice_ptp_gettimex64 (bsc#1235111).
- idpf: call set_real_num_queues in idpf_open (bsc#1236661 bsc#1237316).
- ipv4/tcp: do not use per netns ctl sockets (bsc#1237693).
- kabi: hide adding RCU head into struct netdev_name_node (bsc#1233749).
- net: Fix undefined behavior in netdev name allocation (bsc#1233749).
- net: avoid UAF on deleted altname (bsc#1233749).
- net: check for altname conflicts when changing netdev's netns (bsc#1233749).
- net: core: Use the bitmap API to allocate bitmaps (bsc#1233749).
- net: do not send a MOVE event when netdev changes netns (bsc#1233749).
- net: do not use input buffer of __dev_alloc_name() as a scratch space (bsc#1233749).
- net: fix ifname in netlink ntf during netns move (bsc#1233749).
- net: fix removing a namespace with conflicting altnames (bsc#1233749).
- net: free altname using an RCU callback (bsc#1233749).
- net: introduce a function to check if a netdev name is in use (bsc#1233749).
- net: make dev_alloc_name() call dev_prep_valid_name() (bsc#1233749).
- net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761).
- net: mana: Cleanup 'mana' debugfs dir after cleanup of all children (bsc#1236760).
- net: mana: Enable debugfs files for MANA device (bsc#1236758).
- net: minor __dev_alloc_name() optimization (bsc#1233749).
- net: move altnames together with the netdevice (bsc#1233749).
- net: netvsc: Update default VMBus channels (bsc#1236757).
- net: reduce indentation of __dev_alloc_name() (bsc#1233749).
- net: remove dev_valid_name() check from __dev_alloc_name() (bsc#1233749).
- net: remove else after return in dev_prep_valid_name() (bsc#1233749).
- net: trust the bitmap in __dev_alloc_name() (bsc#1233749).
- nfsd: use explicit lock/unlock for directory ops (bsc#1234650 bsc#1233701 bsc#1232472).
- rcu: Remove rcu_is_idle_cpu() (bsc#1236289).
- scsi: storvsc: Set correct data length for sending SCSI command without payload (git-fixes).
- x86/aperfmperf: Dont wake idle CPUs in arch_freq_get_on_cpu() (bsc#1236289).
- x86/aperfmperf: Integrate the fallback code from show_cpuinfo() (bsc#1236289).
- x86/aperfmperf: Make parts of the frequency invariance code unconditional (bsc#1236289).
- x86/aperfmperf: Put frequency invariance aperf/mperf data into a struct (bsc#1236289).
- x86/aperfmperf: Replace aperfmperf_get_khz() (bsc#1236289).
- x86/aperfmperf: Replace arch_freq_get_on_cpu() (bsc#1236289).
- x86/aperfmperf: Restructure arch_scale_freq_tick() (bsc#1236289).
- x86/aperfmperf: Separate AP/BP frequency invariance init (bsc#1236289).
- x86/aperfmperf: Store aperf/mperf data for cpu frequency reads (bsc#1236289).
- x86/aperfmperf: Untangle Intel and AMD frequency invariance init (bsc#1236289).
- x86/aperfperf: Make it correct on 32bit and UP kernels (bsc#1236289).
- x86/smp: Move APERF/MPERF code where it belongs (bsc#1236289).
- x86/smp: Remove unnecessary assignment to local var freq_scale (bsc#1236289).
- x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes).
- x86/xen: allow larger contiguous memory regions in PV guests (bsc#1236951).
- x86/xen: fix xen_hypercall_hvm() to not clobber %rbx (git-fixes).
- xen/swiotlb: relax alignment requirements (bsc#1236951).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:838-1
Released: Tue Mar 11 13:11:21 2025
Summary: Recommended update for libzypp, zypper
Type: recommended
Severity: important
References: 1189788,1216091,1236481,1237044
This update for libzypp, zypper fixes the following issues:
- Disable zypp.conf:download.use_deltarpm by default
Measurements show that you don't benefit from using deltarpms
unless your network connection is very slow. That's why most
distributions even stop offering deltarpms. The default remains
unchanged on SUSE-15.6 and older.
- Make sure repo variables are evaluated in the right context
(bsc#1237044)
- Introducing MediaCurl2 a alternative HTTP backend.
This patch adds MediaCurl2 as a testbed for experimenting with a
more simple way to download files. Set ZYPP_CURL2=1 in the
environment to use it.
- Filesystem usrmerge must not be done in singletrans mode
(bsc#1236481, bsc#1189788)
- Commit will amend the backend in case the transaction would
perform a filesystem usrmerge.
- Workaround bsc#1216091 on Code16.
- Annonunce --root in commands not launching a Target
(bsc#1237044)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:934-1
Released: Wed Mar 19 11:08:10 2025
Summary: Recommended update for grub2
Type: recommended
Severity: important
References: 1237865
This update for grub2 fixes the following issues:
- Fix zfs.mo not found message when booting on legacy BIOS (bsc#1237865)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:998-1
Released: Tue Mar 25 03:07:02 2025
Summary: Security update for freetype2
Type: security
Severity: important
References: 1239465,CVE-2025-27363
This update for freetype2 fixes the following issues:
- CVE-2025-27363: Fixed out-of-bounds write when attempting to parse font
subglyph structures related to TrueType GX and variable font files (bsc#1239465).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1004-1
Released: Tue Mar 25 09:42:38 2025
Summary: Security update for python-Jinja2
Type: security
Severity: moderate
References: 1238879,CVE-2025-27516
This update for python-Jinja2 fixes the following issues:
- CVE-2025-27516: Fixed sandbox breakout through attr filter selecting format method (bsc#1238879)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1034-1
Released: Thu Mar 27 07:50:58 2025
Summary: Recommended update for python-azure-agent
Type: recommended
Severity: moderate
References: 1235140
This update for python-azure-agent fixes the following issues:
- Update to version 2.12.04 (bsc#1235140)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1035-1
Released: Thu Mar 27 10:34:01 2025
Summary: Recommended update for suse-build-key
Type: recommended
Severity: moderate
References: 1236779,1237294
This update for suse-build-key fixes the following issues:
- Changed and extented the SUSE Linux Enterprise 15 and 16 signing keys to use
SHA256 GPG UIDs instead of SHA1. (bsc#1237294 bsc#1236779 jsc#PED-12321)
- gpg-pubkey-3fa1d6ce-67c856ee.asc to gpg-pubkey-09d9ea69-67c857f3.asc
- gpg-pubkey-09d9ea69-645b99ce.asc to gpg-pubkey-3fa1d6ce-63c9481c.asc
- suse_ptf_key_2023.asc, suse_ptf_key.asc: adjusted
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1056-1
Released: Fri Mar 28 18:06:22 2025
Summary: Security update for python3
Type: security
Severity: moderate
References: 1233307,CVE-2024-11168
This update for python3 fixes the following issues:
- CVE-2024-11168: Fixed improper validation of IPv6 and IPvFuture addresses (bsc#1233307).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1062-1
Released: Mon Mar 31 10:45:08 2025
Summary: Security update for docker, docker-stable
Type: security
Severity: important
References: 1237367,1239185,1239322,CVE-2024-23650,CVE-2024-29018,CVE-2024-41110,CVE-2025-22868,CVE-2025-22869
This update for docker, docker-stable fixes the following issues:
- CVE-2025-22868: Fixed unexpected memory consumption during token parsing in golang.org/x/oauth2 (bsc#1239185).
- CVE-2025-22869: Fixed Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (bsc#1239322).
Other fixes:
- Make container-selinux requirement conditional on selinux-policy (bsc#1237367)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1063-1
Released: Mon Mar 31 11:04:42 2025
Summary: Security update for apparmor
Type: security
Severity: moderate
References: 1234452
This update for apparmor fixes the following issues:
- Allow dovecot-auth to execute unix check password from /sbin, not only from /usr/bin (bsc#1234452).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1130-1
Released: Thu Apr 3 15:08:55 2025
Summary: Recommended update for ca-certificates-mozilla
Type: recommended
Severity: important
References: 1234798,1240009,1240343
This update for ca-certificates-mozilla fixes the following issues:
Update to 2.74 state of Mozilla SSL root CAs:
- Removed:
* SwissSign Silver CA - G2
- Added:
* D-TRUST BR Root CA 2 2023
* D-TRUST EV Root CA 2 2023
Updated to 2.72 state of Mozilla SSL root CAs (bsc#1234798):
- Removed:
* SecureSign RootCA11
* Security Communication RootCA3
- Added:
* TWCA CYBER Root CA
* TWCA Global Root CA G2
* SecureSign Root CA12
* SecureSign Root CA14
* SecureSign Root CA15
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1145-1
Released: Mon Apr 7 06:41:42 2025
Summary: Recommended update for hwinfo
Type: recommended
Severity: moderate
References: 1223330,1239663
This update for hwinfo fixes the following issues:
- Avoid reporting of spurious usb storage devices (bsc#1223330)
- Do not overdo usb device de-duplication (bsc#1239663)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1161-1
Released: Mon Apr 7 17:29:45 2025
Summary: Recommended update for vim
Type: recommended
Severity: moderate
References: 1235751
This update for vim fixes the following issues:
- Regression patch to fix (bsc#1235751).
- Version update 9.1.1176
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1191-1
Released: Thu Apr 10 06:57:45 2025
Summary: Recommended update for supportutils
Type: recommended
Severity: moderate
References: 1183663,1193173,1211547,1213291,1214713,1216049,1216146,1216147,1216150,1216151,1216228,1216229,1216230,1216231,1216232,1216233,1216241,1216388,1216522,1216827,1217287,1218201,1218282,1218324,1218812,1218814,1219241,1219639,1222021,1222650,1222896,1227127,1228265,1230371,1231396,1231423,1231838,1233726
This update for supportutils fixes the following issues:
- Version update 3.2.10, bugfixing.
+ Collect firewalld configuration
+ Ignore tasks/threads to prevent collecting duplicate data (bsc#1230371).
+ openldap2_5 support for SLES (bsc#1231838).
+ Added dbus_info for dbus.txt (bsc#1222650).
+ Map running PIDs to RPM package owner aiding BPF program detection (bsc#1222896, bsc#1213291, PED-8221).
+ Corrected display issues (bsc#1231396, bsc#1217287).
+ NFS takes too long, showmount times out (bsc#1231423).
+ Merged sle15 and master branches (bsc#1233726, PED-11669).
+ Extended scaling for performance (bsc#1214713).
+ Corrected SLE Micro version (bsc#1219241).
+ Check nvidida-persistenced state (bsc#1219639).
+ Corrected podman .ID error (bsc#1218812).
+ Remove duplicate non-root podman users (bsc#1218814).
+ Fixed smart disk error (bsc#1218282).
+ Fixed ipvsadm logic error (bsc#1218324).
+ Correctly detects Xen Dom0 (bsc#1218201).
+ Inhibit the conversion of port numbers to port names for network files.
+ powerpc: collect rtas_errd.log and lp_diag.log log files.
+ Get list of pam.d files.
+ Provides long listing for /etc/sssd/sssd.conf (bsc#1211547).
+ Optimize lsof usage (bsc#1183663).
+ Added mokutil commands for secureboot.
+ ipset - List entries for all sets.
+ Added nvme-stas configuration to nvme.txt (bsc#1216049).
+ Collects zypp history file (bsc#1216522).
+ Collect HA related rpm package versions in ha.txt
+ Change -x OPTION to really be exclude only
+ Fixed kernel and added user live patching (PED-4524).
+ Fixed plugins creating empty files (bsc#1216388).
+ Remove supportutils requires for util-linux-systemd and kmod (bsc#1193173).
+ Added supportutils to current (PED-4456).
+ Changed config directory to /etc/supportutuils for all conf and header.txt (bsc#1216232).
+ Fixed supportconfig using external test command (bsc#1216150) and kdump,
analyzevmcore errors (bsc#1216146).
+ Support has been removed for scplugin.rc, use supportconfig.rc (bsc#1216241).
+ Remove check_service function from supportconfig.rc (bsc#1216231).
+ Removed older versions of SLES_VER (bsc#1216147).
+ Added timed command to fs-files.txt (bsc#1216827).
+ Cron and At are replaced with systemd.timer (bsc#1216229).
+ Offers apparmor or selinux based on configuration (bsc#1216233).
+ Filted proc access errors (bsc#1216151).
+ Remove all SuSE-release references (bsc#1216228).
+ Remove references to /etc/init.d (bsc#1216230).
+ Add capability in supportconfig to insert configs in summary.xml from command line option (bsc#1222021).
+ file sanitizing improvement request for boot (bsc#1227127).
+ Add 'read_values -s' output to supportconfig on s390x (bsc#1228265).
+ Usability enhancement for supportconfig (PED-8211).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1201-1
Released: Fri Apr 11 12:15:58 2025
Summary: Security update for expat
Type: security
Severity: important
References: 1239618,CVE-2024-8176
This update for expat fixes the following issues:
- CVE-2024-8176: Fixed denial of service from chaining a large number of entities caused
by stack overflow by resolving use of recursion (bsc#1239618)
Other fixes:
- version update to 2.7.1 (jsc#PED-12500)
Bug fixes:
#980 #989 Restore event pointer behavior from Expat 2.6.4
(that the fix to CVE-2024-8176 changed in 2.7.0);
affected API functions are:
- XML_GetCurrentByteCount
- XML_GetCurrentByteIndex
- XML_GetCurrentColumnNumber
- XML_GetCurrentLineNumber
- XML_GetInputContext
Other changes:
#976 #977 Autotools: Integrate files 'fuzz/xml_lpm_fuzzer.{cpp,proto}'
with Automake that were missing from 2.7.0 release tarballs
#983 #984 Fix printf format specifiers for 32bit Emscripten
#992 docs: Promote OpenSSF Best Practices self-certification
#978 tests/benchmark: Resolve mistaken double close
#986 Address compiler warnings
#990 #993 Version info bumped from 11:1:10 (libexpat*.so.1.10.1)
to 11:2:10 (libexpat*.so.1.10.2); see https://verbump.de/
for what these numbers do
Infrastructure:
#982 CI: Start running Perl XML::Parser integration tests
#987 CI: Enforce Clang Static Analyzer clean code
#991 CI: Re-enable warning clang-analyzer-valist.Uninitialized
for clang-tidy
#981 CI: Cover compilation with musl
#983 #984 CI: Cover compilation with 32bit Emscripten
#976 #977 CI: Protect against fuzzer files missing from future
release archives
- version update to 2.7.0
#935 #937 Autotools: Make generated CMake files look for
libexpat. at SO_MAJOR@.dylib on macOS
#925 Autotools: Sync CMake templates with CMake 3.29
#945 #962 #966 CMake: Drop support for CMake <3.13
#942 CMake: Small fuzzing related improvements
#921 docs: Add missing documentation of error code
XML_ERROR_NOT_STARTED that was introduced with 2.6.4
#941 docs: Document need for C++11 compiler for use from C++
#959 tests/benchmark: Fix a (harmless) TOCTTOU
#944 Windows: Fix installer target location of file xmlwf.xml
for CMake
#953 Windows: Address warning -Wunknown-warning-option
about -Wno-pedantic-ms-format from LLVM MinGW
#971 Address Cppcheck warnings
#969 #970 Mass-migrate links from http:// to https://
#947 #958 ..
#974 #975 Document changes since the previous release
#974 #975 Version info bumped from 11:0:10 (libexpat*.so.1.10.0)
to 11:1:10 (libexpat*.so.1.10.1); see https://verbump.de/
for what these numbers do
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1217-1
Released: Sun Apr 13 12:16:40 2025
Summary: Recommended update for ca-certificates-mozilla
Type: recommended
Severity: important
References: 1240343
This update for ca-certificates-mozilla fixes the following issues:
- Reenable the distrusted certs for now. as these only
distrust 'new issued' certs starting after a certain date,
while old certs should still work. (bsc#1240343)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1241-1
Released: Mon Apr 14 12:37:06 2025
Summary: Security update for the Linux Kernel
Type: security
Severity: important
References: 1065729,1180814,1183682,1190336,1190768,1190786,1193629,1194869,1194904,1195823,1196444,1197158,1197174,1197227,1197246,1197302,1197331,1197472,1197661,1197926,1198019,1198021,1198240,1198577,1198660,1199657,1200045,1200571,1200807,1200809,1200810,1200824,1200825,1200871,1200872,1201193,1201218,1201323,1201381,1201610,1202672,1202711,1202712,1202771,1202774,1202778,1202781,1203699,1203769,1204171,1205205,1205701,1206048,1206049,1206451,1207034,1207186,1207361,1207593,1207640,1207878,1209262,1209547,1209788,1209980,1210050,1210647,1211263,1213167,1218450,1221651,1225428,1225742,1229312,1231375,1231432,1231854,1232299,1232743,1233479,1233557,1233749,1234074,1234894,1234895,1234896,1235528,1235599,1235870,1237029,1237521,1237530,1237718,1237721,1237722,1237723,1237724,1237725,1237726,1237727,1237728,1237729,1237730,1237733,1237734,1237735,1237736,1237737,1237738,1237739,1237740,1237742,1237743,1237744,1237745,1237746,1237748,1237749,1237751,1237752,1237753,1237755,1237759,1
237761,1237763,1237766,1237767,1237768,1237774,1237775,1237778,1237779,1237780,1237782,1237783,1237784,1237785,1237786,1237787,1237788,1237789,1237790,1237792,1237794,1237795,1237797,1237798,1237799,1237807,1237808,1237809,1237810,1237812,1237813,1237814,1237815,1237816,1237817,1237818,1237820,1237821,1237823,1237824,1237826,1237827,1237829,1237831,1237835,1237836,1237837,1237839,1237840,1237845,1237846,1237868,1237872,1237892,1237903,1237904,1237916,1237918,1237922,1237925,1237926,1237927,1237928,1237929,1237931,1237932,1237933,1237937,1237940,1237941,1237942,1237946,1237951,1237952,1237954,1237955,1237957,1237958,1237959,1237960,1237961,1237962,1237963,1237965,1237966,1237967,1237968,1237969,1237970,1237971,1237972,1237973,1237975,1237976,1237978,1237979,1237980,1237982,1237983,1237984,1237986,1237987,1237990,1237992,1237996,1237997,1237998,1237999,1238000,1238003,1238004,1238005,1238006,1238007,1238009,1238010,1238011,1238012,1238013,1238014,1238016,1238017,1238018,1238019,123802
1,1238022,1238024,1238025,1238030,1238032,1238036,1238037,1238041,1238046,1238047,1238048,1238069,1238071,1238077,1238079,1238080,1238083,1238084,1238085,1238086,1238089,1238090,1238091,1238092,1238096,1238097,1238099,1238103,1238105,1238106,1238107,1238108,1238110,1238111,1238112,1238113,1238114,1238115,1238116,1238118,1238120,1238122,1238123,1238125,1238126,1238127,1238128,1238131,1238134,1238135,1238138,1238139,1238140,1238142,1238144,1238146,1238147,1238149,1238150,1238153,1238155,1238156,1238157,1238158,1238160,1238162,1238166,1238167,1238168,1238169,1238170,1238171,1238172,1238175,1238176,1238177,1238178,1238179,1238180,1238181,1238183,1238184,1238187,1238221,1238222,1238226,1238228,1238229,1238231,1238233,1238234,1238235,1238236,1238238,1238239,1238240,1238241,1238242,1238243,1238244,1238246,1238247,1238248,1238249,1238252,1238253,1238255,1238256,1238257,1238260,1238261,1238262,1238263,1238264,1238266,1238267,1238268,1238269,1238270,1238271,1238272,1238274,1238275,1238276,123
8277,1238278,1238279,1238281,1238282,1238283,1238284,1238285,1238286,1238287,1238288,1238289,1238291,1238292,1238293,1238295,1238298,1238300,1238301,1238302,1238306,1238307,1238308,1238309,1238311,1238313,1238326,1238327,1238328,1238329,1238331,1238333,1238334,1238335,1238336,1238337,1238338,1238339,1238341,1238343,1238344,1238345,1238372,1238373,1238374,1238376,1238377,1238378,1238381,1238382,1238383,1238385,1238386,1238387,1238388,1238389,1238390,1238391,1238392,1238393,1238394,1238395,1238396,1238397,1238398,1238400,1238401,1238410,1238411,1238413,1238415,1238416,1238417,1238418,1238419,1238420,1238422,1238423,1238424,1238428,1238429,1238430,1238431,1238432,1238433,1238434,1238435,1238436,1238437,1238440,1238441,1238442,1238443,1238444,1238445,1238447,1238453,1238454,1238458,1238459,1238462,1238463,1238465,1238467,1238469,1238533,1238536,1238538,1238539,1238540,1238542,1238543,1238546,1238551,1238552,1238556,1238557,1238599,1238600,1238601,1238602,1238605,1238612,1238613,1238615,
1238616,1238617,1238618,1238619,1238621,1238623,1238625,1238626,1238630,1238631,1238632,1238633,1238635,1238636,1238638,1238639,1238640,1238641,1238642,1238643,1238645,1238646,1238647,1238648,1238649,1238650,1238653,1238654,1238655,1238658,1238661,1238662,1238663,1238664,1238666,1238668,1238705,1238707,1238710,1238712,1238718,1238719,1238721,1238722,1238727,1238729,1238750,1238787,1238789,1238792,1238799,1238803,1238804,1238805,1238806,1238808,1238809,1238810,1238811,1238814,1238815,1238816,1238817,1238818,1238819,1238820,1238821,1238822,1238823,1238825,1238830,1238834,1238835,1238836,1238838,1238843,1238867,1238868,1238869,1238870,1238871,1238878,1238889,1238892,1238893,1238897,1238898,1238899,1238902,1238911,1238916,1238919,1238925,1238930,1238933,1238936,1238937,1238938,1238939,1238941,1238942,1238943,1238944,1238945,1238946,1238948,1238949,1238950,1238951,1238952,1238953,1238954,1238956,1238957,1239001,1239004,1239016,1239035,1239040,1239041,1239051,1239060,1239070,1239071,12390
73,1239076,1239095,1239109,1239115,1239126,1239452,1239454,1239968,1239969,1240133,1240205,1240207,1240208,1240210,1240212,1240213,1240218,1240220,1240227,1240229,1240231,1240242,1240245,1240247,1240250,1240254,1240256,1240264,1240266,1240272,1240275,1240276,1240278,1240279,1240280,1240281,1240282,1240283,1240284,1240286,1240288,1240290,1240292,1240293,1240297,1240304,1240308,1240309,1240317,1240318,1240322,CVE-2017-5753,CVE-2021-4453,CVE-2021-4454,CVE-2021-47517,CVE-2021-47631,CVE-2021-47632,CVE-2021-47633,CVE-2021-47635,CVE-2021-47636,CVE-2021-47637,CVE-2021-47638,CVE-2021-47639,CVE-2021-47641,CVE-2021-47642,CVE-2021-47643,CVE-2021-47644,CVE-2021-47645,CVE-2021-47646,CVE-2021-47647,CVE-2021-47648,CVE-2021-47649,CVE-2021-47650,CVE-2021-47651,CVE-2021-47652,CVE-2021-47653,CVE-2021-47654,CVE-2021-47656,CVE-2021-47657,CVE-2021-47659,CVE-2022-0168,CVE-2022-0995,CVE-2022-1016,CVE-2022-1048,CVE-2022-1184,CVE-2022-2977,CVE-2022-29900,CVE-2022-29901,CVE-2022-3303,CVE-2022-3435,CVE-2022-490
44,CVE-2022-49050,CVE-2022-49051,CVE-2022-49053,CVE-2022-49054,CVE-2022-49055,CVE-2022-49056,CVE-2022-49057,CVE-2022-49058,CVE-2022-49059,CVE-2022-49060,CVE-2022-49061,CVE-2022-49062,CVE-2022-49063,CVE-2022-49064,CVE-2022-49065,CVE-2022-49066,CVE-2022-49070,CVE-2022-49071,CVE-2022-49073,CVE-2022-49074,CVE-2022-49075,CVE-2022-49076,CVE-2022-49078,CVE-2022-49082,CVE-2022-49083,CVE-2022-49084,CVE-2022-49085,CVE-2022-49086,CVE-2022-49088,CVE-2022-49089,CVE-2022-49090,CVE-2022-49091,CVE-2022-49092,CVE-2022-49093,CVE-2022-49095,CVE-2022-49096,CVE-2022-49097,CVE-2022-49098,CVE-2022-49099,CVE-2022-49100,CVE-2022-49102,CVE-2022-49103,CVE-2022-49104,CVE-2022-49105,CVE-2022-49106,CVE-2022-49107,CVE-2022-49109,CVE-2022-49111,CVE-2022-49112,CVE-2022-49113,CVE-2022-49114,CVE-2022-49115,CVE-2022-49116,CVE-2022-49118,CVE-2022-49119,CVE-2022-49120,CVE-2022-49121,CVE-2022-49122,CVE-2022-49123,CVE-2022-49125,CVE-2022-49126,CVE-2022-49128,CVE-2022-49129,CVE-2022-49130,CVE-2022-49131,CVE-2022-49132,CVE-
2022-49133,CVE-2022-49134,CVE-2022-49135,CVE-2022-49136,CVE-2022-49137,CVE-2022-49138,CVE-2022-49139,CVE-2022-49144,CVE-2022-49145,CVE-2022-49147,CVE-2022-49148,CVE-2022-49151,CVE-2022-49153,CVE-2022-49154,CVE-2022-49155,CVE-2022-49156,CVE-2022-49157,CVE-2022-49158,CVE-2022-49159,CVE-2022-49160,CVE-2022-49162,CVE-2022-49163,CVE-2022-49164,CVE-2022-49165,CVE-2022-49174,CVE-2022-49175,CVE-2022-49176,CVE-2022-49177,CVE-2022-49178,CVE-2022-49179,CVE-2022-49180,CVE-2022-49182,CVE-2022-49183,CVE-2022-49185,CVE-2022-49187,CVE-2022-49188,CVE-2022-49189,CVE-2022-49192,CVE-2022-49193,CVE-2022-49194,CVE-2022-49196,CVE-2022-49199,CVE-2022-49200,CVE-2022-49201,CVE-2022-49202,CVE-2022-49203,CVE-2022-49204,CVE-2022-49205,CVE-2022-49206,CVE-2022-49207,CVE-2022-49208,CVE-2022-49209,CVE-2022-49212,CVE-2022-49213,CVE-2022-49214,CVE-2022-49215,CVE-2022-49216,CVE-2022-49217,CVE-2022-49218,CVE-2022-49219,CVE-2022-49221,CVE-2022-49222,CVE-2022-49224,CVE-2022-49225,CVE-2022-49226,CVE-2022-49227,CVE-2022-49
228,CVE-2022-49230,CVE-2022-49232,CVE-2022-49233,CVE-2022-49235,CVE-2022-49236,CVE-2022-49237,CVE-2022-49238,CVE-2022-49239,CVE-2022-49241,CVE-2022-49242,CVE-2022-49243,CVE-2022-49244,CVE-2022-49246,CVE-2022-49247,CVE-2022-49248,CVE-2022-49249,CVE-2022-49250,CVE-2022-49251,CVE-2022-49252,CVE-2022-49253,CVE-2022-49254,CVE-2022-49256,CVE-2022-49257,CVE-2022-49258,CVE-2022-49259,CVE-2022-49260,CVE-2022-49261,CVE-2022-49262,CVE-2022-49263,CVE-2022-49264,CVE-2022-49265,CVE-2022-49266,CVE-2022-49268,CVE-2022-49269,CVE-2022-49270,CVE-2022-49271,CVE-2022-49272,CVE-2022-49273,CVE-2022-49274,CVE-2022-49275,CVE-2022-49276,CVE-2022-49277,CVE-2022-49278,CVE-2022-49279,CVE-2022-49280,CVE-2022-49281,CVE-2022-49283,CVE-2022-49285,CVE-2022-49286,CVE-2022-49287,CVE-2022-49288,CVE-2022-49290,CVE-2022-49291,CVE-2022-49292,CVE-2022-49293,CVE-2022-49294,CVE-2022-49295,CVE-2022-49296,CVE-2022-49297,CVE-2022-49298,CVE-2022-49299,CVE-2022-49300,CVE-2022-49301,CVE-2022-49302,CVE-2022-49304,CVE-2022-49305,CVE
-2022-49306,CVE-2022-49307,CVE-2022-49308,CVE-2022-49309,CVE-2022-49310,CVE-2022-49311,CVE-2022-49312,CVE-2022-49313,CVE-2022-49314,CVE-2022-49315,CVE-2022-49316,CVE-2022-49319,CVE-2022-49320,CVE-2022-49321,CVE-2022-49322,CVE-2022-49323,CVE-2022-49325,CVE-2022-49326,CVE-2022-49327,CVE-2022-49328,CVE-2022-49329,CVE-2022-49330,CVE-2022-49331,CVE-2022-49332,CVE-2022-49333,CVE-2022-49335,CVE-2022-49336,CVE-2022-49337,CVE-2022-49338,CVE-2022-49339,CVE-2022-49341,CVE-2022-49342,CVE-2022-49343,CVE-2022-49345,CVE-2022-49346,CVE-2022-49347,CVE-2022-49348,CVE-2022-49349,CVE-2022-49350,CVE-2022-49351,CVE-2022-49352,CVE-2022-49353,CVE-2022-49354,CVE-2022-49356,CVE-2022-49357,CVE-2022-49359,CVE-2022-49362,CVE-2022-49365,CVE-2022-49367,CVE-2022-49368,CVE-2022-49370,CVE-2022-49371,CVE-2022-49373,CVE-2022-49375,CVE-2022-49376,CVE-2022-49377,CVE-2022-49378,CVE-2022-49379,CVE-2022-49381,CVE-2022-49382,CVE-2022-49384,CVE-2022-49385,CVE-2022-49386,CVE-2022-49389,CVE-2022-49390,CVE-2022-49392,CVE-2022-4
9394,CVE-2022-49396,CVE-2022-49397,CVE-2022-49398,CVE-2022-49399,CVE-2022-49400,CVE-2022-49402,CVE-2022-49404,CVE-2022-49406,CVE-2022-49407,CVE-2022-49409,CVE-2022-49410,CVE-2022-49411,CVE-2022-49412,CVE-2022-49413,CVE-2022-49414,CVE-2022-49416,CVE-2022-49418,CVE-2022-49419,CVE-2022-49421,CVE-2022-49422,CVE-2022-49424,CVE-2022-49426,CVE-2022-49427,CVE-2022-49429,CVE-2022-49430,CVE-2022-49431,CVE-2022-49432,CVE-2022-49433,CVE-2022-49434,CVE-2022-49435,CVE-2022-49436,CVE-2022-49437,CVE-2022-49438,CVE-2022-49440,CVE-2022-49441,CVE-2022-49442,CVE-2022-49443,CVE-2022-49444,CVE-2022-49445,CVE-2022-49446,CVE-2022-49447,CVE-2022-49448,CVE-2022-49449,CVE-2022-49451,CVE-2022-49453,CVE-2022-49455,CVE-2022-49458,CVE-2022-49459,CVE-2022-49460,CVE-2022-49462,CVE-2022-49463,CVE-2022-49465,CVE-2022-49466,CVE-2022-49467,CVE-2022-49468,CVE-2022-49470,CVE-2022-49472,CVE-2022-49473,CVE-2022-49474,CVE-2022-49475,CVE-2022-49476,CVE-2022-49477,CVE-2022-49478,CVE-2022-49479,CVE-2022-49480,CVE-2022-49481,CV
E-2022-49482,CVE-2022-49483,CVE-2022-49484,CVE-2022-49485,CVE-2022-49486,CVE-2022-49487,CVE-2022-49488,CVE-2022-49489,CVE-2022-49490,CVE-2022-49491,CVE-2022-49492,CVE-2022-49493,CVE-2022-49494,CVE-2022-49495,CVE-2022-49497,CVE-2022-49498,CVE-2022-49499,CVE-2022-49501,CVE-2022-49502,CVE-2022-49503,CVE-2022-49504,CVE-2022-49505,CVE-2022-49506,CVE-2022-49507,CVE-2022-49508,CVE-2022-49509,CVE-2022-49510,CVE-2022-49511,CVE-2022-49512,CVE-2022-49514,CVE-2022-49515,CVE-2022-49516,CVE-2022-49517,CVE-2022-49518,CVE-2022-49519,CVE-2022-49520,CVE-2022-49521,CVE-2022-49522,CVE-2022-49523,CVE-2022-49524,CVE-2022-49525,CVE-2022-49526,CVE-2022-49527,CVE-2022-49529,CVE-2022-49530,CVE-2022-49532,CVE-2022-49533,CVE-2022-49534,CVE-2022-49535,CVE-2022-49536,CVE-2022-49537,CVE-2022-49538,CVE-2022-49541,CVE-2022-49542,CVE-2022-49543,CVE-2022-49544,CVE-2022-49545,CVE-2022-49546,CVE-2022-49548,CVE-2022-49549,CVE-2022-49551,CVE-2022-49552,CVE-2022-49555,CVE-2022-49556,CVE-2022-49559,CVE-2022-49560,CVE-2022-
49562,CVE-2022-49563,CVE-2022-49564,CVE-2022-49565,CVE-2022-49566,CVE-2022-49568,CVE-2022-49569,CVE-2022-49570,CVE-2022-49579,CVE-2022-49581,CVE-2022-49583,CVE-2022-49584,CVE-2022-49591,CVE-2022-49592,CVE-2022-49603,CVE-2022-49605,CVE-2022-49606,CVE-2022-49607,CVE-2022-49609,CVE-2022-49610,CVE-2022-49611,CVE-2022-49613,CVE-2022-49615,CVE-2022-49616,CVE-2022-49617,CVE-2022-49618,CVE-2022-49621,CVE-2022-49623,CVE-2022-49624,CVE-2022-49625,CVE-2022-49626,CVE-2022-49627,CVE-2022-49628,CVE-2022-49631,CVE-2022-49634,CVE-2022-49635,CVE-2022-49638,CVE-2022-49640,CVE-2022-49641,CVE-2022-49642,CVE-2022-49643,CVE-2022-49644,CVE-2022-49645,CVE-2022-49646,CVE-2022-49647,CVE-2022-49648,CVE-2022-49649,CVE-2022-49650,CVE-2022-49652,CVE-2022-49653,CVE-2022-49655,CVE-2022-49656,CVE-2022-49657,CVE-2022-49658,CVE-2022-49661,CVE-2022-49663,CVE-2022-49665,CVE-2022-49667,CVE-2022-49668,CVE-2022-49670,CVE-2022-49671,CVE-2022-49672,CVE-2022-49673,CVE-2022-49674,CVE-2022-49675,CVE-2022-49676,CVE-2022-49677,C
VE-2022-49678,CVE-2022-49679,CVE-2022-49680,CVE-2022-49683,CVE-2022-49685,CVE-2022-49686,CVE-2022-49687,CVE-2022-49688,CVE-2022-49693,CVE-2022-49694,CVE-2022-49695,CVE-2022-49697,CVE-2022-49699,CVE-2022-49700,CVE-2022-49701,CVE-2022-49703,CVE-2022-49704,CVE-2022-49705,CVE-2022-49707,CVE-2022-49708,CVE-2022-49710,CVE-2022-49711,CVE-2022-49712,CVE-2022-49713,CVE-2022-49714,CVE-2022-49715,CVE-2022-49716,CVE-2022-49719,CVE-2022-49720,CVE-2022-49721,CVE-2022-49722,CVE-2022-49723,CVE-2022-49724,CVE-2022-49725,CVE-2022-49726,CVE-2022-49729,CVE-2022-49730,CVE-2022-49731,CVE-2022-49732,CVE-2022-49733,CVE-2022-49739,CVE-2022-49746,CVE-2022-49748,CVE-2022-49751,CVE-2022-49753,CVE-2022-49755,CVE-2022-49759,CVE-2023-0179,CVE-2023-1652,CVE-2023-2162,CVE-2023-28410,CVE-2023-3567,CVE-2023-52930,CVE-2023-52933,CVE-2023-52935,CVE-2023-52939,CVE-2023-52941,CVE-2023-52973,CVE-2023-52974,CVE-2023-52975,CVE-2023-52976,CVE-2023-52979,CVE-2023-52983,CVE-2023-52984,CVE-2023-52988,CVE-2023-52989,CVE-2023-529
92,CVE-2023-52993,CVE-2023-53000,CVE-2023-53005,CVE-2023-53006,CVE-2023-53007,CVE-2023-53008,CVE-2023-53010,CVE-2023-53015,CVE-2023-53016,CVE-2023-53019,CVE-2023-53023,CVE-2023-53024,CVE-2023-53025,CVE-2023-53026,CVE-2023-53028,CVE-2023-53029,CVE-2023-53030,CVE-2023-53033,CVE-2024-26634,CVE-2024-47678,CVE-2024-50290,CVE-2024-53063,CVE-2024-53124,CVE-2024-53176,CVE-2024-53178,CVE-2024-56651,CVE-2024-57996,CVE-2024-58013,CVE-2024-58014,CVE-2025-21693,CVE-2025-21718,CVE-2025-21772,CVE-2025-21780
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918).
- CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled (bsc#1238919).
- CVE-2022-49739: gfs2: Always check inode size of inline inodes (bsc#1240207).
- CVE-2023-52935: mm/khugepaged: fix ->anon_vma race (bsc#1240276).
- CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc (bsc#1234074).
- CVE-2024-53176: smb: During unmount, ensure all cached dir instances drop their dentry (bsc#1234894).
- CVE-2024-53178: smb: Do not leak cfid when reconnect races with open_cached_dir (bsc#1234895).
- CVE-2024-56651: can: hi311x: hi3110_can_ist(): fix potential use-after-free (bsc#1235528).
- CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076).
- CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239095).
- CVE-2024-58014: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (bsc#1239109).
- CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029).
- CVE-2025-21718: net: rose: fix timer races against user threads (bsc#1239073).
- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238911).
- CVE-2025-21780: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (bsc#1239115).
The following non-security bugs were fixed:
- ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530).
- btrfs: defrag: do not use merged extent map for their generation check (bsc#1239968).
- btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1239968).
- btrfs: fix extent map merging not happening for adjacent extents (bsc#1239968).
- btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1239969).
- btrfs: send: fix invalid clone operation for file that got its size decreased (bsc#1239969).
- cifs: Add a laundromat thread for cached directories (git-fixes).
- cifs: fix potential null pointer use in destroy_workqueue in init_cifs error path (git-fixes).
- gfs2: Fix inode height consistency check (git-fixes).
- mm: zswap: move allocations during CPU init outside the lock (git-fixes).
- mm/mmu_notifier.c: fix race in mmu_interval_notifier_remove() (bsc#1239126).
- net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016).
- net: mana: Allow variable size indirection table (bsc#1239016).
- net: mana: Avoid open coded arithmetic (bsc#1239016).
- net: mana: Support holes in device list reply msg (bsc#1240133).
- RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016).
- RDMA/mana_ib: Use v2 version of cfg_rx_steer_req to enable RX coalescing (bsc#1239016).
- sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743).
- smb: client: destroy cfid_put_wq on module exit (git-fixes).
- smb: client: disable directory caching when dir_cache_timeout is zero (git-fixes).
- smb: client: do not start laundromat thread on nohandlecache (git-fixes).
- smb: client: make laundromat a delayed worker (git-fixes).
- smb: client: properly close cfids on umount (bsc#1231432, bsc#1232299, bsc#1235599, bsc#1234896).
- smb3: allow controlling length of time directory entries are cached with dir leases (git-fixes).
- smb3: do not start laundromat thread when dir leases disabled (git-fixes).
- smb3: retrying on failed server close (git-fixes).
- tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1242-1
Released: Mon Apr 14 12:43:18 2025
Summary: Recommended update for aaa_base
Type: recommended
Severity: moderate
References: 1235481,1236033
This update for aaa_base fixes the following issues:
- SP6 logrotate and rcsyslog binary (bsc#1236033)
- Update detection for systemd in rc.status
- Mountpoint for cgroup changed with cgroup2
- If a user switches the login shell respect the already set PATH
environment (bsc#1235481)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1292-1
Released: Wed Apr 16 09:49:17 2025
Summary: Recommended update for timezone
Type: recommended
Severity: moderate
References:
This update for timezone fixes the following issues:
- Version update 2025b
* New zone for Aysen Region in Chile (America/Coyhaique) which
moves from -04/-03 to -03
- Refresh patches for philippines historical data and china tzdata
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1334-1
Released: Thu Apr 17 09:03:05 2025
Summary: Security update for pam
Type: security
Severity: moderate
References: 1232234,CVE-2024-10041
This update for pam fixes the following issues:
- CVE-2024-10041: sensitive data exposure while performing authentications. (bsc#1232234)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1345-1
Released: Thu Apr 17 17:14:27 2025
Summary: Security update for containerd
Type: security
Severity: moderate
References: 1239749,CVE-2024-40635
This update for containerd fixes the following issues:
- CVE-2024-40635: Fixed integer overflow in User ID handling (bsc#1239749)
Other fixes:
- Update to containerd v1.7.27.
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1354-1
Released: Tue Apr 22 05:14:53 2025
Summary: Recommended update for iproute2
Type: recommended
Severity: moderate
References: 1234383
This update for iproute2 fixes the following issues:
- Avoid false cgroup warnings (bsc#1234383)
-----------------------------------------------------------------
Advisory ID: 38402
Released: Fri Apr 25 11:05:30 2025
Summary: Recommended update for freetype2
Type: recommended
Severity: important
References:
This update for freetype2 fixes the following issue:
- enable brotli support (jsc#PED-12258)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1371-1
Released: Fri Apr 25 12:02:27 2025
Summary: Recommended update for apparmor
Type: recommended
Severity: important
References: 1232234,1234452
This update for apparmor fixes the following issues:
- Allow pam_unix to execute unix_chkpwd with abi/3.0 (bsc#1234452, bsc#1232234)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1381-1
Released: Mon Apr 28 09:37:03 2025
Summary: Security update for cifs-utils
Type: security
Severity: moderate
References: 1239680,CVE-2025-2312
This update for cifs-utils fixes the following issues:
- CVE-2025-2312: Fixed cifs.upcall making an upcall to the wrong
namespace in containerized environments while trying to get Kerberos
credentials (bsc#1239680)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1413-1
Released: Wed Apr 30 08:59:04 2025
Summary: Security update for augeas
Type: security
Severity: low
References: 1239909,CVE-2025-2588
This update for augeas fixes the following issues:
- CVE-2025-2588: Check for NULL pointers when calling re_case_expand in function fa_expand_nocase. (bsc#1239909)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1438-1
Released: Fri May 2 15:44:07 2025
Summary: Security update for libxml2
Type: security
Severity: moderate
References: 1241453,1241551,CVE-2025-32414,CVE-2025-32415
This update for libxml2 fixes the following issues:
- CVE-2025-32414: Fixed an out-of-bounds read when parsing text via the Python API. (bsc#1241551)
- CVE-2025-32415: Fixed a crafted XML document may lead to a heap-based buffer under-read. (bsc#1241453)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1446-1
Released: Mon May 5 08:04:03 2025
Summary: Recommended update for lvm2
Type: recommended
Severity: important
References: 1216938
This update for lvm2 fixes the following issues:
- LVM filter behaves unexpectedly for MPIO devices in SLES15SP5 (bsc#1216938)
* set lvm.conf devices.multipath_wwids_file=''
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1456-1
Released: Wed May 7 17:13:32 2025
Summary: Security update for sqlite3
Type: security
Severity: moderate
References: 1241020,1241078,1241189,CVE-2025-29087,CVE-2025-29088,CVE-2025-3277
This update for sqlite3 fixes the following issues:
- CVE-2025-29087,CVE-2025-3277: Fixed integer overflow in sqlite concat function (bsc#1241020)
- CVE-2025-29088: Fixed integer overflow through the SQLITE_DBCONFIG_LOOKASIDE component (bsc#1241078)
Other fixes:
- Updated to version 3.49.1 from Factory (jsc#SLE-16032)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1512-1
Released: Wed May 7 21:36:27 2025
Summary: Security update for apparmor
Type: security
Severity: moderate
References: 1241678,CVE-2024-10041
This update for apparmor fixes the following issues:
- Add dac_read_search capability for unix_chkpwd to allow it to read the shadow
file even if it has 000 permissions. This is needed after the CVE-2024-10041
fix in PAM. (bsc#1241678)
The following package changes have been done:
- aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 updated
- apparmor-abstractions-3.0.4-150500.11.18.1 updated
- apparmor-parser-3.0.4-150500.11.18.1 updated
- ca-certificates-mozilla-2.74-150200.41.1 updated
- cifs-utils-6.15-150400.3.12.1 updated
- containerd-ctr-1.7.27-150000.123.1 updated
- containerd-1.7.27-150000.123.1 updated
- docker-27.5.1_ce-150000.218.1 updated
- findutils-4.8.0-150300.3.3.2 updated
- glibc-locale-base-2.31-150300.92.1 updated
- glibc-locale-2.31-150300.92.1 updated
- glibc-2.31-150300.92.1 updated
- grub2-i386-pc-2.06-150500.29.46.2 updated
- grub2-x86_64-efi-2.06-150500.29.46.2 updated
- grub2-2.06-150500.29.46.2 updated
- hwinfo-21.87-150500.3.6.1 updated
- iproute2-5.14-150400.3.3.1 updated
- kdump-1.0.2+git48.g64445e1-150500.3.9.2 updated
- kernel-default-5.14.21-150500.55.100.1 updated
- libapparmor1-3.0.4-150500.11.18.1 updated
- libaugeas0-1.12.0-150400.3.8.1 updated
- libdevmapper1_03-2.03.22_1.02.196-150500.7.15.1 updated
- libexpat1-2.7.1-150400.3.28.1 updated
- libfreetype6-2.10.4-150000.4.22.1 updated
- libgnutls30-3.7.3-150400.4.47.1 updated
- libprocps8-3.3.17-150000.7.42.1 updated
- libpython3_6m1_0-3.6.15-150300.10.84.1 updated
- libsqlite3-0-3.49.1-150000.3.27.1 updated
- libtasn1-6-4.13-150000.4.11.1 updated
- libtasn1-4.13-150000.4.11.1 updated
- libxml2-2-2.10.3-150500.5.26.1 updated
- libzypp-17.36.3-150500.6.42.1 updated
- openssh-clients-8.4p1-150300.3.42.1 updated
- openssh-common-8.4p1-150300.3.42.1 updated
- openssh-server-8.4p1-150300.3.42.1 updated
- openssh-8.4p1-150300.3.42.1 updated
- pam-1.3.0-150000.6.76.1 updated
- procps-3.3.17-150000.7.42.1 updated
- python-azure-agent-config-server-2.12.0.4-150100.3.47.1 updated
- python-azure-agent-2.12.0.4-150100.3.47.1 updated
- python3-Jinja2-2.10.1-150000.3.21.1 updated
- python3-base-3.6.15-150300.10.84.1 updated
- python3-3.6.15-150300.10.84.1 updated
- supportutils-3.2.10-150300.7.35.36.4 updated
- suse-build-key-12.0-150000.8.58.1 updated
- timezone-2025b-150000.75.34.2 updated
- vim-data-common-9.1.1176-150500.20.24.2 updated
- vim-9.1.1176-150500.20.24.2 updated
- zypper-1.14.85-150500.6.26.1 updated
- libxslt1-1.1.34-150400.3.3.1 removed
- python-instance-billing-flavor-check-0.1.2-150000.1.17.1 removed
- python3-cssselect-1.0.3-150400.3.7.4 removed
- python3-lxml-4.9.1-150500.3.4.3 removed
More information about the sle-container-updates
mailing list