SUSE-IU-2025:1324-1: Security update of suse-sles-15-sp5-chost-byos-v20250512-x86_64-gen2

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Wed May 14 07:02:37 UTC 2025


SUSE Image Update Advisory: suse-sles-15-sp5-chost-byos-v20250512-x86_64-gen2
-----------------------------------------------------------------
Image Advisory ID : SUSE-IU-2025:1324-1
Image Tags        : suse-sles-15-sp5-chost-byos-v20250512-x86_64-gen2:20250512
Image Release     : 
Severity          : important
Type              : security
References        : 1065729 1180814 1183663 1183682 1189788 1190336 1190768 1190786
                        1193173 1193629 1194869 1194869 1194904 1195823 1196444 1197158
                        1197174 1197227 1197246 1197302 1197331 1197472 1197661 1197926
                        1198019 1198021 1198240 1198577 1198660 1199657 1200045 1200571
                        1200807 1200809 1200810 1200824 1200825 1200871 1200872 1201193
                        1201218 1201323 1201381 1201610 1202672 1202711 1202712 1202771
                        1202774 1202778 1202781 1203699 1203769 1204171 1205205 1205701
                        1206048 1206049 1206451 1207034 1207186 1207361 1207593 1207640
                        1207878 1208995 1209262 1209547 1209788 1209980 1210050 1210647
                        1211263 1211547 1213167 1213291 1214290 1214713 1216049 1216091
                        1216146 1216147 1216150 1216151 1216228 1216229 1216230 1216231
                        1216232 1216233 1216241 1216388 1216522 1216813 1216827 1216938
                        1217287 1218201 1218282 1218324 1218450 1218812 1218814 1219241
                        1219639 1220946 1221651 1222021 1222650 1222896 1223330 1223384
                        1225428 1225736 1225742 1225742 1226848 1226980 1227127 1228265
                        1228434 1228537 1228592 1229312 1229685 1229822 1230078 1230341
                        1230371 1230432 1230527 1230697 1231088 1231375 1231396 1231423
                        1231432 1231472 1231838 1231847 1231854 1232234 1232234 1232299
                        1232472 1232743 1232914 1232919 1233028 1233055 1233097 1233103
                        1233112 1233137 1233307 1233464 1233479 1233488 1233557 1233606
                        1233608 1233609 1233610 1233612 1233613 1233614 1233615 1233616
                        1233617 1233642 1233701 1233726 1233749 1233749 1233778 1234024
                        1234025 1234074 1234078 1234087 1234089 1234153 1234154 1234155
                        1234223 1234381 1234383 1234452 1234452 1234650 1234683 1234690
                        1234798 1234825 1234829 1234832 1234853 1234884 1234889 1234891
                        1234894 1234895 1234896 1234896 1234899 1234900 1234905 1234909
                        1234916 1234918 1234922 1234930 1234931 1234934 1234958 1234962
                        1234963 1234999 1235002 1235009 1235011 1235053 1235054 1235057
                        1235059 1235061 1235073 1235100 1235111 1235122 1235123 1235133
                        1235134 1235140 1235217 1235222 1235230 1235249 1235410 1235430
                        1235433 1235441 1235451 1235458 1235466 1235473 1235480 1235481
                        1235491 1235495 1235496 1235521 1235528 1235557 1235563 1235570
                        1235584 1235599 1235611 1235635 1235641 1235643 1235645 1235647
                        1235695 1235723 1235739 1235747 1235751 1235759 1235764 1235768
                        1235806 1235812 1235814 1235818 1235842 1235870 1235920 1235969
                        1236033 1236133 1236151 1236282 1236289 1236316 1236317 1236384
                        1236481 1236576 1236628 1236661 1236677 1236705 1236757 1236758
                        1236760 1236761 1236777 1236779 1236820 1236842 1236878 1236939
                        1236951 1236974 1236983 1237002 1237006 1237008 1237009 1237010
                        1237011 1237012 1237013 1237014 1237025 1237028 1237029 1237040
                        1237044 1237137 1237139 1237294 1237316 1237335 1237363 1237367
                        1237370 1237418 1237521 1237530 1237693 1237718 1237721 1237722
                        1237723 1237724 1237725 1237726 1237727 1237728 1237729 1237730
                        1237733 1237734 1237735 1237736 1237737 1237738 1237739 1237740
                        1237742 1237743 1237744 1237745 1237746 1237748 1237749 1237751
                        1237752 1237753 1237755 1237759 1237761 1237763 1237766 1237767
                        1237768 1237774 1237775 1237778 1237779 1237780 1237782 1237783
                        1237784 1237785 1237786 1237787 1237788 1237789 1237790 1237792
                        1237794 1237795 1237797 1237798 1237799 1237807 1237808 1237809
                        1237810 1237812 1237813 1237814 1237815 1237816 1237817 1237818
                        1237820 1237821 1237823 1237824 1237826 1237827 1237829 1237831
                        1237835 1237836 1237837 1237839 1237840 1237845 1237846 1237865
                        1237868 1237872 1237892 1237903 1237904 1237916 1237918 1237922
                        1237925 1237926 1237927 1237928 1237929 1237931 1237932 1237933
                        1237937 1237940 1237941 1237942 1237946 1237951 1237952 1237954
                        1237955 1237957 1237958 1237959 1237960 1237961 1237962 1237963
                        1237965 1237966 1237967 1237968 1237969 1237970 1237971 1237972
                        1237973 1237975 1237976 1237978 1237979 1237980 1237982 1237983
                        1237984 1237986 1237987 1237990 1237992 1237996 1237997 1237998
                        1237999 1238000 1238003 1238004 1238005 1238006 1238007 1238009
                        1238010 1238011 1238012 1238013 1238014 1238016 1238017 1238018
                        1238019 1238021 1238022 1238024 1238025 1238030 1238032 1238033
                        1238036 1238037 1238041 1238046 1238047 1238048 1238069 1238071
                        1238077 1238079 1238080 1238083 1238084 1238085 1238086 1238089
                        1238090 1238091 1238092 1238096 1238097 1238099 1238103 1238105
                        1238106 1238107 1238108 1238110 1238111 1238112 1238113 1238114
                        1238115 1238116 1238118 1238120 1238122 1238123 1238125 1238126
                        1238127 1238128 1238131 1238134 1238135 1238138 1238139 1238140
                        1238142 1238144 1238146 1238147 1238149 1238150 1238153 1238155
                        1238156 1238157 1238158 1238160 1238162 1238166 1238167 1238168
                        1238169 1238170 1238171 1238172 1238175 1238176 1238177 1238178
                        1238179 1238180 1238181 1238183 1238184 1238187 1238221 1238222
                        1238226 1238228 1238229 1238231 1238233 1238234 1238235 1238236
                        1238238 1238239 1238240 1238241 1238242 1238243 1238244 1238246
                        1238247 1238248 1238249 1238252 1238253 1238255 1238256 1238257
                        1238260 1238261 1238262 1238263 1238264 1238266 1238267 1238268
                        1238269 1238270 1238271 1238272 1238274 1238275 1238276 1238277
                        1238278 1238279 1238281 1238282 1238283 1238284 1238285 1238286
                        1238287 1238288 1238289 1238291 1238292 1238293 1238295 1238298
                        1238300 1238301 1238302 1238306 1238307 1238308 1238309 1238311
                        1238313 1238326 1238327 1238328 1238329 1238331 1238333 1238334
                        1238335 1238336 1238337 1238338 1238339 1238341 1238343 1238344
                        1238345 1238372 1238373 1238374 1238376 1238377 1238378 1238381
                        1238382 1238383 1238385 1238386 1238387 1238388 1238389 1238390
                        1238391 1238392 1238393 1238394 1238395 1238396 1238397 1238398
                        1238400 1238401 1238410 1238411 1238413 1238415 1238416 1238417
                        1238418 1238419 1238420 1238422 1238423 1238424 1238428 1238429
                        1238430 1238431 1238432 1238433 1238434 1238435 1238436 1238437
                        1238440 1238441 1238442 1238443 1238444 1238445 1238447 1238453
                        1238454 1238458 1238459 1238462 1238463 1238465 1238467 1238469
                        1238533 1238536 1238538 1238539 1238540 1238542 1238543 1238546
                        1238551 1238552 1238556 1238557 1238599 1238600 1238601 1238602
                        1238605 1238612 1238613 1238615 1238616 1238617 1238618 1238619
                        1238621 1238623 1238625 1238626 1238630 1238631 1238632 1238633
                        1238635 1238636 1238638 1238639 1238640 1238641 1238642 1238643
                        1238645 1238646 1238647 1238648 1238649 1238650 1238653 1238654
                        1238655 1238658 1238661 1238662 1238663 1238664 1238666 1238668
                        1238705 1238707 1238710 1238712 1238718 1238719 1238721 1238722
                        1238727 1238729 1238750 1238787 1238789 1238792 1238799 1238803
                        1238804 1238805 1238806 1238808 1238809 1238810 1238811 1238814
                        1238815 1238816 1238817 1238818 1238819 1238820 1238821 1238822
                        1238823 1238825 1238830 1238834 1238835 1238836 1238838 1238843
                        1238867 1238868 1238869 1238870 1238871 1238878 1238879 1238889
                        1238892 1238893 1238897 1238898 1238899 1238902 1238911 1238916
                        1238919 1238925 1238930 1238933 1238936 1238937 1238938 1238939
                        1238941 1238942 1238943 1238944 1238945 1238946 1238948 1238949
                        1238950 1238951 1238952 1238953 1238954 1238956 1238957 1239001
                        1239004 1239016 1239035 1239040 1239041 1239051 1239060 1239070
                        1239071 1239073 1239076 1239095 1239109 1239115 1239126 1239185
                        1239322 1239452 1239454 1239465 1239618 1239663 1239680 1239749
                        1239909 1239968 1239969 1240009 1240133 1240205 1240207 1240208
                        1240210 1240212 1240213 1240218 1240220 1240227 1240229 1240231
                        1240242 1240245 1240247 1240250 1240254 1240256 1240264 1240266
                        1240272 1240275 1240276 1240278 1240279 1240280 1240281 1240282
                        1240283 1240284 1240286 1240288 1240290 1240292 1240293 1240297
                        1240304 1240308 1240309 1240317 1240318 1240322 1240343 1240343
                        1241020 1241078 1241189 1241453 1241551 1241678 CVE-2017-5753
                        CVE-2021-4453 CVE-2021-4454 CVE-2021-47517 CVE-2021-47631 CVE-2021-47632
                        CVE-2021-47633 CVE-2021-47635 CVE-2021-47636 CVE-2021-47637 CVE-2021-47638
                        CVE-2021-47639 CVE-2021-47641 CVE-2021-47642 CVE-2021-47643 CVE-2021-47644
                        CVE-2021-47645 CVE-2021-47646 CVE-2021-47647 CVE-2021-47648 CVE-2021-47649
                        CVE-2021-47650 CVE-2021-47651 CVE-2021-47652 CVE-2021-47653 CVE-2021-47654
                        CVE-2021-47656 CVE-2021-47657 CVE-2021-47659 CVE-2022-0168 CVE-2022-0995
                        CVE-2022-1016 CVE-2022-1048 CVE-2022-1184 CVE-2022-2977 CVE-2022-29900
                        CVE-2022-29901 CVE-2022-3303 CVE-2022-3435 CVE-2022-49044 CVE-2022-49050
                        CVE-2022-49051 CVE-2022-49053 CVE-2022-49054 CVE-2022-49055 CVE-2022-49056
                        CVE-2022-49057 CVE-2022-49058 CVE-2022-49059 CVE-2022-49060 CVE-2022-49061
                        CVE-2022-49062 CVE-2022-49063 CVE-2022-49064 CVE-2022-49065 CVE-2022-49066
                        CVE-2022-49070 CVE-2022-49071 CVE-2022-49073 CVE-2022-49074 CVE-2022-49075
                        CVE-2022-49076 CVE-2022-49078 CVE-2022-49080 CVE-2022-49082 CVE-2022-49083
                        CVE-2022-49084 CVE-2022-49085 CVE-2022-49086 CVE-2022-49088 CVE-2022-49089
                        CVE-2022-49090 CVE-2022-49091 CVE-2022-49092 CVE-2022-49093 CVE-2022-49095
                        CVE-2022-49096 CVE-2022-49097 CVE-2022-49098 CVE-2022-49099 CVE-2022-49100
                        CVE-2022-49102 CVE-2022-49103 CVE-2022-49104 CVE-2022-49105 CVE-2022-49106
                        CVE-2022-49107 CVE-2022-49109 CVE-2022-49111 CVE-2022-49112 CVE-2022-49113
                        CVE-2022-49114 CVE-2022-49115 CVE-2022-49116 CVE-2022-49118 CVE-2022-49119
                        CVE-2022-49120 CVE-2022-49121 CVE-2022-49122 CVE-2022-49123 CVE-2022-49125
                        CVE-2022-49126 CVE-2022-49128 CVE-2022-49129 CVE-2022-49130 CVE-2022-49131
                        CVE-2022-49132 CVE-2022-49133 CVE-2022-49134 CVE-2022-49135 CVE-2022-49136
                        CVE-2022-49137 CVE-2022-49138 CVE-2022-49139 CVE-2022-49144 CVE-2022-49145
                        CVE-2022-49147 CVE-2022-49148 CVE-2022-49151 CVE-2022-49153 CVE-2022-49154
                        CVE-2022-49155 CVE-2022-49156 CVE-2022-49157 CVE-2022-49158 CVE-2022-49159
                        CVE-2022-49160 CVE-2022-49162 CVE-2022-49163 CVE-2022-49164 CVE-2022-49165
                        CVE-2022-49174 CVE-2022-49175 CVE-2022-49176 CVE-2022-49177 CVE-2022-49178
                        CVE-2022-49179 CVE-2022-49180 CVE-2022-49182 CVE-2022-49183 CVE-2022-49185
                        CVE-2022-49187 CVE-2022-49188 CVE-2022-49189 CVE-2022-49192 CVE-2022-49193
                        CVE-2022-49194 CVE-2022-49196 CVE-2022-49199 CVE-2022-49200 CVE-2022-49201
                        CVE-2022-49202 CVE-2022-49203 CVE-2022-49204 CVE-2022-49205 CVE-2022-49206
                        CVE-2022-49207 CVE-2022-49208 CVE-2022-49209 CVE-2022-49212 CVE-2022-49213
                        CVE-2022-49214 CVE-2022-49215 CVE-2022-49216 CVE-2022-49217 CVE-2022-49218
                        CVE-2022-49219 CVE-2022-49221 CVE-2022-49222 CVE-2022-49224 CVE-2022-49225
                        CVE-2022-49226 CVE-2022-49227 CVE-2022-49228 CVE-2022-49230 CVE-2022-49232
                        CVE-2022-49233 CVE-2022-49235 CVE-2022-49236 CVE-2022-49237 CVE-2022-49238
                        CVE-2022-49239 CVE-2022-49241 CVE-2022-49242 CVE-2022-49243 CVE-2022-49244
                        CVE-2022-49246 CVE-2022-49247 CVE-2022-49248 CVE-2022-49249 CVE-2022-49250
                        CVE-2022-49251 CVE-2022-49252 CVE-2022-49253 CVE-2022-49254 CVE-2022-49256
                        CVE-2022-49257 CVE-2022-49258 CVE-2022-49259 CVE-2022-49260 CVE-2022-49261
                        CVE-2022-49262 CVE-2022-49263 CVE-2022-49264 CVE-2022-49265 CVE-2022-49266
                        CVE-2022-49268 CVE-2022-49269 CVE-2022-49270 CVE-2022-49271 CVE-2022-49272
                        CVE-2022-49273 CVE-2022-49274 CVE-2022-49275 CVE-2022-49276 CVE-2022-49277
                        CVE-2022-49278 CVE-2022-49279 CVE-2022-49280 CVE-2022-49281 CVE-2022-49283
                        CVE-2022-49285 CVE-2022-49286 CVE-2022-49287 CVE-2022-49288 CVE-2022-49290
                        CVE-2022-49291 CVE-2022-49292 CVE-2022-49293 CVE-2022-49294 CVE-2022-49295
                        CVE-2022-49296 CVE-2022-49297 CVE-2022-49298 CVE-2022-49299 CVE-2022-49300
                        CVE-2022-49301 CVE-2022-49302 CVE-2022-49304 CVE-2022-49305 CVE-2022-49306
                        CVE-2022-49307 CVE-2022-49308 CVE-2022-49309 CVE-2022-49310 CVE-2022-49311
                        CVE-2022-49312 CVE-2022-49313 CVE-2022-49314 CVE-2022-49315 CVE-2022-49316
                        CVE-2022-49319 CVE-2022-49320 CVE-2022-49321 CVE-2022-49322 CVE-2022-49323
                        CVE-2022-49325 CVE-2022-49326 CVE-2022-49327 CVE-2022-49328 CVE-2022-49329
                        CVE-2022-49330 CVE-2022-49331 CVE-2022-49332 CVE-2022-49333 CVE-2022-49335
                        CVE-2022-49336 CVE-2022-49337 CVE-2022-49338 CVE-2022-49339 CVE-2022-49341
                        CVE-2022-49342 CVE-2022-49343 CVE-2022-49345 CVE-2022-49346 CVE-2022-49347
                        CVE-2022-49348 CVE-2022-49349 CVE-2022-49350 CVE-2022-49351 CVE-2022-49352
                        CVE-2022-49353 CVE-2022-49354 CVE-2022-49356 CVE-2022-49357 CVE-2022-49359
                        CVE-2022-49362 CVE-2022-49365 CVE-2022-49367 CVE-2022-49368 CVE-2022-49370
                        CVE-2022-49371 CVE-2022-49373 CVE-2022-49375 CVE-2022-49376 CVE-2022-49377
                        CVE-2022-49378 CVE-2022-49379 CVE-2022-49381 CVE-2022-49382 CVE-2022-49384
                        CVE-2022-49385 CVE-2022-49386 CVE-2022-49389 CVE-2022-49390 CVE-2022-49392
                        CVE-2022-49394 CVE-2022-49396 CVE-2022-49397 CVE-2022-49398 CVE-2022-49399
                        CVE-2022-49400 CVE-2022-49402 CVE-2022-49404 CVE-2022-49406 CVE-2022-49407
                        CVE-2022-49409 CVE-2022-49410 CVE-2022-49411 CVE-2022-49412 CVE-2022-49413
                        CVE-2022-49414 CVE-2022-49416 CVE-2022-49418 CVE-2022-49419 CVE-2022-49421
                        CVE-2022-49422 CVE-2022-49424 CVE-2022-49426 CVE-2022-49427 CVE-2022-49429
                        CVE-2022-49430 CVE-2022-49431 CVE-2022-49432 CVE-2022-49433 CVE-2022-49434
                        CVE-2022-49435 CVE-2022-49436 CVE-2022-49437 CVE-2022-49438 CVE-2022-49440
                        CVE-2022-49441 CVE-2022-49442 CVE-2022-49443 CVE-2022-49444 CVE-2022-49445
                        CVE-2022-49446 CVE-2022-49447 CVE-2022-49448 CVE-2022-49449 CVE-2022-49451
                        CVE-2022-49453 CVE-2022-49455 CVE-2022-49458 CVE-2022-49459 CVE-2022-49460
                        CVE-2022-49462 CVE-2022-49463 CVE-2022-49465 CVE-2022-49466 CVE-2022-49467
                        CVE-2022-49468 CVE-2022-49470 CVE-2022-49472 CVE-2022-49473 CVE-2022-49474
                        CVE-2022-49475 CVE-2022-49476 CVE-2022-49477 CVE-2022-49478 CVE-2022-49479
                        CVE-2022-49480 CVE-2022-49481 CVE-2022-49482 CVE-2022-49483 CVE-2022-49484
                        CVE-2022-49485 CVE-2022-49486 CVE-2022-49487 CVE-2022-49488 CVE-2022-49489
                        CVE-2022-49490 CVE-2022-49491 CVE-2022-49492 CVE-2022-49493 CVE-2022-49494
                        CVE-2022-49495 CVE-2022-49497 CVE-2022-49498 CVE-2022-49499 CVE-2022-49501
                        CVE-2022-49502 CVE-2022-49503 CVE-2022-49504 CVE-2022-49505 CVE-2022-49506
                        CVE-2022-49507 CVE-2022-49508 CVE-2022-49509 CVE-2022-49510 CVE-2022-49511
                        CVE-2022-49512 CVE-2022-49514 CVE-2022-49515 CVE-2022-49516 CVE-2022-49517
                        CVE-2022-49518 CVE-2022-49519 CVE-2022-49520 CVE-2022-49521 CVE-2022-49522
                        CVE-2022-49523 CVE-2022-49524 CVE-2022-49525 CVE-2022-49526 CVE-2022-49527
                        CVE-2022-49529 CVE-2022-49530 CVE-2022-49532 CVE-2022-49533 CVE-2022-49534
                        CVE-2022-49535 CVE-2022-49536 CVE-2022-49537 CVE-2022-49538 CVE-2022-49541
                        CVE-2022-49542 CVE-2022-49543 CVE-2022-49544 CVE-2022-49545 CVE-2022-49546
                        CVE-2022-49548 CVE-2022-49549 CVE-2022-49551 CVE-2022-49552 CVE-2022-49555
                        CVE-2022-49556 CVE-2022-49559 CVE-2022-49560 CVE-2022-49562 CVE-2022-49563
                        CVE-2022-49564 CVE-2022-49565 CVE-2022-49566 CVE-2022-49568 CVE-2022-49569
                        CVE-2022-49570 CVE-2022-49579 CVE-2022-49581 CVE-2022-49583 CVE-2022-49584
                        CVE-2022-49591 CVE-2022-49592 CVE-2022-49603 CVE-2022-49605 CVE-2022-49606
                        CVE-2022-49607 CVE-2022-49609 CVE-2022-49610 CVE-2022-49611 CVE-2022-49613
                        CVE-2022-49615 CVE-2022-49616 CVE-2022-49617 CVE-2022-49618 CVE-2022-49621
                        CVE-2022-49623 CVE-2022-49624 CVE-2022-49625 CVE-2022-49626 CVE-2022-49627
                        CVE-2022-49628 CVE-2022-49631 CVE-2022-49634 CVE-2022-49635 CVE-2022-49638
                        CVE-2022-49640 CVE-2022-49641 CVE-2022-49642 CVE-2022-49643 CVE-2022-49644
                        CVE-2022-49645 CVE-2022-49646 CVE-2022-49647 CVE-2022-49648 CVE-2022-49649
                        CVE-2022-49650 CVE-2022-49652 CVE-2022-49653 CVE-2022-49655 CVE-2022-49656
                        CVE-2022-49657 CVE-2022-49658 CVE-2022-49661 CVE-2022-49663 CVE-2022-49665
                        CVE-2022-49667 CVE-2022-49668 CVE-2022-49670 CVE-2022-49671 CVE-2022-49672
                        CVE-2022-49673 CVE-2022-49674 CVE-2022-49675 CVE-2022-49676 CVE-2022-49677
                        CVE-2022-49678 CVE-2022-49679 CVE-2022-49680 CVE-2022-49683 CVE-2022-49685
                        CVE-2022-49686 CVE-2022-49687 CVE-2022-49688 CVE-2022-49693 CVE-2022-49694
                        CVE-2022-49695 CVE-2022-49697 CVE-2022-49699 CVE-2022-49700 CVE-2022-49701
                        CVE-2022-49703 CVE-2022-49704 CVE-2022-49705 CVE-2022-49707 CVE-2022-49708
                        CVE-2022-49710 CVE-2022-49711 CVE-2022-49712 CVE-2022-49713 CVE-2022-49714
                        CVE-2022-49715 CVE-2022-49716 CVE-2022-49719 CVE-2022-49720 CVE-2022-49721
                        CVE-2022-49722 CVE-2022-49723 CVE-2022-49724 CVE-2022-49725 CVE-2022-49726
                        CVE-2022-49729 CVE-2022-49730 CVE-2022-49731 CVE-2022-49732 CVE-2022-49733
                        CVE-2022-49739 CVE-2022-49746 CVE-2022-49748 CVE-2022-49751 CVE-2022-49753
                        CVE-2022-49755 CVE-2022-49759 CVE-2023-0179 CVE-2023-1192 CVE-2023-1652
                        CVE-2023-2162 CVE-2023-28410 CVE-2023-3567 CVE-2023-4016 CVE-2023-52572
                        CVE-2023-52930 CVE-2023-52933 CVE-2023-52935 CVE-2023-52939 CVE-2023-52941
                        CVE-2023-52973 CVE-2023-52974 CVE-2023-52975 CVE-2023-52976 CVE-2023-52979
                        CVE-2023-52983 CVE-2023-52984 CVE-2023-52988 CVE-2023-52989 CVE-2023-52992
                        CVE-2023-52993 CVE-2023-53000 CVE-2023-53005 CVE-2023-53006 CVE-2023-53007
                        CVE-2023-53008 CVE-2023-53010 CVE-2023-53015 CVE-2023-53016 CVE-2023-53019
                        CVE-2023-53023 CVE-2023-53024 CVE-2023-53025 CVE-2023-53026 CVE-2023-53028
                        CVE-2023-53029 CVE-2023-53030 CVE-2023-53033 CVE-2024-10041 CVE-2024-10041
                        CVE-2024-11168 CVE-2024-12133 CVE-2024-12243 CVE-2024-23650 CVE-2024-26634
                        CVE-2024-26758 CVE-2024-26943 CVE-2024-29018 CVE-2024-29018 CVE-2024-36898
                        CVE-2024-38599 CVE-2024-40635 CVE-2024-41047 CVE-2024-41110 CVE-2024-43790
                        CVE-2024-43802 CVE-2024-45019 CVE-2024-45306 CVE-2024-45774 CVE-2024-45775
                        CVE-2024-45776 CVE-2024-45777 CVE-2024-45778 CVE-2024-45779 CVE-2024-45780
                        CVE-2024-45781 CVE-2024-45782 CVE-2024-45783 CVE-2024-46858 CVE-2024-47678
                        CVE-2024-50051 CVE-2024-50115 CVE-2024-50136 CVE-2024-50142 CVE-2024-50151
                        CVE-2024-50195 CVE-2024-50199 CVE-2024-50210 CVE-2024-50275 CVE-2024-50290
                        CVE-2024-50299 CVE-2024-53063 CVE-2024-53095 CVE-2024-53103 CVE-2024-53104
                        CVE-2024-53112 CVE-2024-53121 CVE-2024-53124 CVE-2024-53127 CVE-2024-53129
                        CVE-2024-53135 CVE-2024-53138 CVE-2024-53141 CVE-2024-53144 CVE-2024-53148
                        CVE-2024-53151 CVE-2024-53166 CVE-2024-53169 CVE-2024-53171 CVE-2024-53173
                        CVE-2024-53174 CVE-2024-53176 CVE-2024-53177 CVE-2024-53178 CVE-2024-53208
                        CVE-2024-53209 CVE-2024-53215 CVE-2024-53217 CVE-2024-53224 CVE-2024-53226
                        CVE-2024-53227 CVE-2024-53229 CVE-2024-53239 CVE-2024-53690 CVE-2024-54680
                        CVE-2024-55916 CVE-2024-56171 CVE-2024-56531 CVE-2024-56532 CVE-2024-56533
                        CVE-2024-56539 CVE-2024-56548 CVE-2024-56557 CVE-2024-56558 CVE-2024-56562
                        CVE-2024-56567 CVE-2024-56588 CVE-2024-56595 CVE-2024-56596 CVE-2024-56597
                        CVE-2024-56600 CVE-2024-56601 CVE-2024-56602 CVE-2024-56605 CVE-2024-56623
                        CVE-2024-56629 CVE-2024-56631 CVE-2024-56642 CVE-2024-56644 CVE-2024-56645
                        CVE-2024-56648 CVE-2024-56650 CVE-2024-56651 CVE-2024-56658 CVE-2024-56661
                        CVE-2024-56664 CVE-2024-56678 CVE-2024-56681 CVE-2024-56698 CVE-2024-56701
                        CVE-2024-56704 CVE-2024-56722 CVE-2024-56737 CVE-2024-56739 CVE-2024-56745
                        CVE-2024-56747 CVE-2024-56754 CVE-2024-56756 CVE-2024-56759 CVE-2024-56765
                        CVE-2024-56776 CVE-2024-56777 CVE-2024-56778 CVE-2024-57791 CVE-2024-57792
                        CVE-2024-57793 CVE-2024-57798 CVE-2024-57849 CVE-2024-57850 CVE-2024-57876
                        CVE-2024-57893 CVE-2024-57897 CVE-2024-57948 CVE-2024-57996 CVE-2024-58013
                        CVE-2024-58014 CVE-2024-8176 CVE-2024-8805 CVE-2025-0395 CVE-2025-0622
                        CVE-2025-0624 CVE-2025-0677 CVE-2025-0678 CVE-2025-0684 CVE-2025-0685
                        CVE-2025-0686 CVE-2025-0689 CVE-2025-0690 CVE-2025-0938 CVE-2025-1118
                        CVE-2025-1125 CVE-2025-1215 CVE-2025-21647 CVE-2025-21690 CVE-2025-21692
                        CVE-2025-21693 CVE-2025-21699 CVE-2025-21718 CVE-2025-21772 CVE-2025-21780
                        CVE-2025-22134 CVE-2025-22868 CVE-2025-22869 CVE-2025-2312 CVE-2025-24014
                        CVE-2025-24928 CVE-2025-2588 CVE-2025-26465 CVE-2025-27113 CVE-2025-27363
                        CVE-2025-27516 CVE-2025-29087 CVE-2025-29088 CVE-2025-32414 CVE-2025-32415
                        CVE-2025-3277 
-----------------------------------------------------------------

The container suse-sles-15-sp5-chost-byos-v20250512-x86_64-gen2 was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:508-1
Released:    Thu Feb 13 12:29:31 2025
Summary:     Recommended update for findutils
Type:        recommended
Severity:    moderate
References:  1231472
This update for findutils fixes the following issue:

- fix crash when file system loop was encountered (bsc#1231472).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:548-1
Released:    Fri Feb 14 11:19:24 2025
Summary:     Security update for libtasn1
Type:        security
Severity:    important
References:  1236878,CVE-2024-12133
This update for libtasn1 fixes the following issues:

- CVE-2024-12133: the processing of input DER data containing a large number of SEQUENCE OF or SET OF elements takes
  quadratic time to complete. (bsc#1236878)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:554-1
Released:    Fri Feb 14 16:10:40 2025
Summary:     Security update for python3
Type:        security
Severity:    moderate
References:  1236705,CVE-2025-0938
This update for python3 fixes the following issues:

- CVE-2025-0938: domain names containing square brackets are not identified as incorrect by urlparse. (bsc#1236705)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:562-1
Released:    Mon Feb 17 12:43:41 2025
Summary:     Security update for glibc
Type:        security
Severity:    low
References:  1236282,CVE-2025-0395
This update for glibc fixes the following issues:

- CVE-2025-0395: Fix underallocation of abort_msg_s struct (bsc#1236282)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:577-1
Released:    Tue Feb 18 13:51:28 2025
Summary:     Security update for the Linux Kernel
Type:        security
Severity:    important
References:  1194869,1216813,1223384,1225736,1226848,1226980,1228537,1228592,1230341,1230432,1230527,1230697,1231088,1231847,1232914,1233028,1233055,1233097,1233103,1233112,1233464,1233488,1233642,1233778,1234024,1234025,1234078,1234087,1234153,1234155,1234223,1234381,1234683,1234690,1234825,1234829,1234832,1234884,1234889,1234896,1234899,1234900,1234905,1234909,1234916,1234918,1234922,1234930,1234931,1234934,1234962,1234999,1235002,1235009,1235011,1235053,1235057,1235059,1235100,1235122,1235123,1235133,1235134,1235217,1235222,1235230,1235249,1235410,1235430,1235433,1235441,1235451,1235458,1235466,1235473,1235480,1235491,1235495,1235496,1235521,1235557,1235563,1235570,1235584,1235611,1235635,1235641,1235643,1235645,1235647,1235723,1235739,1235747,1235759,1235764,1235768,1235806,1235812,1235814,1235818,1235842,1235920,1235969,1236628,CVE-2024-26758,CVE-2024-26943,CVE-2024-36898,CVE-2024-38599,CVE-2024-41047,CVE-2024-45019,CVE-2024-46858,CVE-2024-50051,CVE-2024-50136,CVE-2024-50142,CVE
 -2024-50151,CVE-2024-50195,CVE-2024-50199,CVE-2024-50210,CVE-2024-50275,CVE-2024-50299,CVE-2024-53095,CVE-2024-53103,CVE-2024-53104,CVE-2024-53112,CVE-2024-53121,CVE-2024-53127,CVE-2024-53129,CVE-2024-53138,CVE-2024-53141,CVE-2024-53144,CVE-2024-53148,CVE-2024-53151,CVE-2024-53166,CVE-2024-53169,CVE-2024-53171,CVE-2024-53174,CVE-2024-53177,CVE-2024-53208,CVE-2024-53209,CVE-2024-53215,CVE-2024-53217,CVE-2024-53224,CVE-2024-53227,CVE-2024-53229,CVE-2024-53690,CVE-2024-54680,CVE-2024-55916,CVE-2024-56531,CVE-2024-56532,CVE-2024-56533,CVE-2024-56557,CVE-2024-56558,CVE-2024-56562,CVE-2024-56567,CVE-2024-56588,CVE-2024-56595,CVE-2024-56596,CVE-2024-56597,CVE-2024-56600,CVE-2024-56601,CVE-2024-56602,CVE-2024-56623,CVE-2024-56629,CVE-2024-56631,CVE-2024-56642,CVE-2024-56644,CVE-2024-56645,CVE-2024-56648,CVE-2024-56650,CVE-2024-56658,CVE-2024-56661,CVE-2024-56664,CVE-2024-56678,CVE-2024-56681,CVE-2024-56698,CVE-2024-56701,CVE-2024-56704,CVE-2024-56722,CVE-2024-56739,CVE-2024-56745,CVE-2024-5
 6747,CVE-2024-56754,CVE-2024-56756,CVE-2024-56759,CVE-2024-56765,CVE-2024-56776,CVE-2024-56777,CVE-2024-56778,CVE-2024-57791,CVE-2024-57792,CVE-2024-57793,CVE-2024-57798,CVE-2024-57849,CVE-2024-57850,CVE-2024-57876,CVE-2024-57893,CVE-2024-57897,CVE-2024-8805

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-36898: gpiolib: cdev: fix uninitialised kfifo (bsc#1225736).
- CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync (bsc#1231088).
- CVE-2024-50142: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (bsc#1233028).
- CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request (bsc#1233055).
- CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112).
- CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb() (bsc#1233488).
- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).
- CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234884).
- CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896).
- CVE-2024-53209: bnxt_en: Fix receive ring space parameters when XDP is active (bsc#1235002).
- CVE-2024-53227: scsi: bfa: Fix use-after-free in bfad_im_module_exit() (bsc#1235011).
- CVE-2024-56588: scsi: hisi_sas: Create all dump files during debugfs initialization (bsc#1235123).
- CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217).
- CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230).
- CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() (bsc#1235521).
- CVE-2024-56623: scsi: qla2xxx: Fix use after free on unload (bsc#1235466).
- CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release() (bsc#1235480).
- CVE-2024-56642: tipc: Fix use-after-free of kernel socket in cleanup_bearer() (bsc#1235433).
- CVE-2024-56645: can: j1939: j1939_session_new(): fix skb reference counting (bsc#1235134).
- CVE-2024-56648: net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235451).
- CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430).
- CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441).
- CVE-2024-56664: bpf, sockmap: Fix race between element replace and close() (bsc#1235249).
- CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).
- CVE-2024-56747: scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() (bsc#1234934).
- CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645).
- CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining clc data (bsc#1235759).
- CVE-2024-57792: power: supply: gpio-charger: Fix set charge current limits (bsc#1235764).
- CVE-2024-57793: virt: tdx-guest: Just leak decrypted memory on unrecoverable errors (bsc#1235768).
- CVE-2024-57798: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() (bsc#1235818).
- CVE-2024-57849: s390/cpum_sf: Handle CPU hotplug remove during sampling (bsc#1235814).
- CVE-2024-57876: drm/dp_mst: Fix resetting msg rx state after topology removal (bsc#1235806).
- CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages (bsc#1235920).
- CVE-2024-57897: drm/amdkfd: Correct the migration DMA map direction (bsc#1235969).

The following non-security bugs were fixed:

- NFS: Adjust the amount of readahead performed by NFS readdir (bsc#1231847).
- NFS: Do not flush the readdir cache in nfs_dentry_iput() (bsc#1231847).
- NFS: Improve heuristic for readdirplus (bsc#1231847).
- NFS: Trigger the 'ls -l' readdir heuristic sooner (bsc#1231847).
- VFS: use system_unbound_wq for delayed_mntput (bsc#1234683).
- ceph: improve error handling and short/overflow-read logic in __ceph_sync_read() (bsc#1228592).
- ibmvnic: Free any outstanding tx skbs during scrq reset (bsc#1226980).
- netfilter: nf_tables: validate family when identifying table via handle (bsc#1233778).
- powerpc/pseries/vas: Add close() callback in vas_vm_ops struct (bsc#1234825).
- tipc: fix NULL deref in cleanup_bearer() (bsc#1235433).
- x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0 (git-fixes).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:587-1
Released:    Wed Feb 19 08:29:17 2025
Summary:     Security update for grub2
Type:        security
Severity:    important
References:  1233606,1233608,1233609,1233610,1233612,1233613,1233614,1233615,1233616,1233617,1234958,1236316,1236317,1237002,1237006,1237008,1237009,1237010,1237011,1237012,1237013,1237014,CVE-2024-45774,CVE-2024-45775,CVE-2024-45776,CVE-2024-45777,CVE-2024-45778,CVE-2024-45779,CVE-2024-45780,CVE-2024-45781,CVE-2024-45782,CVE-2024-45783,CVE-2024-56737,CVE-2025-0622,CVE-2025-0624,CVE-2025-0677,CVE-2025-0678,CVE-2025-0684,CVE-2025-0685,CVE-2025-0686,CVE-2025-0689,CVE-2025-0690,CVE-2025-1118,CVE-2025-1125
This update for grub2 fixes the following issues:

- CVE-2024-45781: Fixed strcpy overflow in ufs. (bsc#1233617)
- CVE-2024-56737: Fixed a heap-based buffer overflow in hfs. (bsc#1234958)
- CVE-2024-45782: Fixed strcpy overflow in hfs. (bsc#1233615)
- CVE-2024-45780: Fixed an overflow in tar/cpio. (bsc#1233614)
- CVE-2024-45783: Fixed a refcount overflow in hfsplus. (bsc#1233616)
- CVE-2024-45774: Fixed a heap overflow in JPEG parser. (bsc#1233609)
- CVE-2024-45775: Fixed a missing NULL check in extcmd parser. (bsc#1233610)
- CVE-2024-45776: Fixed an overflow in .MO file handling. (bsc#1233612)
- CVE-2024-45777: Fixed an integer overflow in gettext. (bsc#1233613)
- CVE-2024-45778: Fixed bfs filesystem by removing it from lockdown capable modules. (bsc#1233606)
- CVE-2024-45779: Fixed a heap overflow in bfs. (bsc#1233608)
- CVE-2025-0624: Fixed an out-of-bounds write during the network boot process. (bsc#1236316)
- CVE-2025-0622: Fixed a use-after-free when handling hooks during module unload in command/gpg . (bsc#1236317)
- CVE-2025-0690: Fixed an integer overflow that may lead to an out-of-bounds write through the read command.
  (bsc#1237012)
- CVE-2025-1118: Fixed an issue where the dump command was not being blocked when grub was in lockdown mode.
  (bsc#1237013)
- CVE-2025-0677: Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in ufs.
  (bsc#1237002)
- CVE-2025-0684: Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in reiserfs.
  (bsc#1237008)
- CVE-2025-0685: Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in jfs.
  (bsc#1237009)
- CVE-2025-0686: Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in romfs.
  (bsc#1237010)
- CVE-2025-0689: Fixed a heap-based buffer overflow in udf that may lead to arbitrary code execution. (bsc#1237011)
- CVE-2025-1125: Fixed an integer overflow that may lead to an out-of-bounds write in hfs. (bsc#1237014)
- CVE-2025-0678: Fixed an integer overflow that may lead to an out-of-bounds write in squash4. (bsc#1237006)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:605-1
Released:    Thu Feb 20 15:42:48 2025
Summary:     Security update for openssh
Type:        security
Severity:    moderate
References:  1237040,CVE-2025-26465
This update for openssh fixes the following issues:

- CVE-2025-26465: Fixed MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client (bsc#1237040).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:677-1
Released:    Mon Feb 24 11:59:00 2025
Summary:     Recommended update for libzypp, zypper
Type:        recommended
Severity:    important
References:  1228434,1236384,1236820,1236939,1236983
This update for libzypp, zypper fixes the following issues:

- Don't issue deprecated warnings if -DNDEBUG is set (bsc#1236983)
- Drop zypp-CheckAccessDeleted in favor of 'zypper ps'
- Fix Repoverification plugin not being executed
- Refresh: Fetch the master index file before key and signature (bsc#1236820)
- Deprecate RepoReports we do not trigger
- Let zypper dup fail in case of (temporarily) unaccessible repos (bsc#1228434, bsc#1236939)
- New system-architecture command (bsc#1236384)
- Change versioncmp command to return exit code according to the comparison result

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:723-1
Released:    Wed Feb 26 14:29:39 2025
Summary:     Security update for vim
Type:        security
Severity:    moderate
References:  1229685,1229822,1230078,1235695,1236151,1237137,CVE-2024-43790,CVE-2024-43802,CVE-2024-45306,CVE-2025-1215,CVE-2025-22134,CVE-2025-24014
This update for vim fixes the following issues:

Update to version 9.1.1101:

- CVE-2024-43790: possible out-of-bounds read when performing a search command (bsc#1229685).
- CVE-2024-43802: heap buffer overflow due to incorrect flushing of the typeahead buffer (bsc#1229822).
- CVE-2024-45306: heap buffer overflow when cursor position is invalid (bsc#1230078).
- CVE-2025-22134: heap buffer overflow when switching to other buffers using the :all command with active visual mode
  (bsc#1235695).
- CVE-2025-24014: NULL pointer dereference may lead to segmentation fault when in silent Ex mode (bsc#1236151).
- CVE-2025-1215: memory corruption when manipulating the --log argument (bsc#1237137).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:741-1
Released:    Fri Feb 28 11:15:50 2025
Summary:     Security update for procps
Type:        security
Severity:    important
References:  1214290,1236842,CVE-2023-4016
This update for procps fixes the following issues:

- Integer overflow due to incomplete fix for CVE-2023-4016 can lead to segmentation fault in ps command when pid
  argument has a leading space (bsc#1236842, bsc#1214290).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:746-1
Released:    Fri Feb 28 17:10:22 2025
Summary:     Security update for libxml2
Type:        security
Severity:    important
References:  1237363,1237370,1237418,CVE-2024-56171,CVE-2025-24928,CVE-2025-27113
This update for libxml2 fixes the following issues:

- CVE-2024-56171: use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c
  (bsc#1237363).
- CVE-2025-24928: stack-based buffer overflow in xmlSnprintfElements in valid.c (bsc#1237370).
- CVE-2025-27113: NULL pointer dereference in xmlPatMatch in pattern.c (bsc#1237418).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:765-1
Released:    Mon Mar  3 09:44:13 2025
Summary:     Security update for gnutls
Type:        security
Severity:    moderate
References:  1236974,CVE-2024-12243
This update for gnutls fixes the following issues:

- CVE-2024-12243: quadratic complexity of DER input decoding in libtasn1 can lead to a DoS (bsc#1236974).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:776-1
Released:    Tue Mar  4 15:55:35 2025
Summary:     Security update for docker
Type:        security
Severity:    moderate
References:  1234089,1237335,CVE-2024-29018
This update for docker fixes the following issues:

Update to Docker 27.5.1-ce (bsc#1237335):

- CVE-2024-29018: External DNS requests from 'internal' networks could lead to data exfiltration (bsc#1234089).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:829-1
Released:    Tue Mar 11 08:36:43 2025
Summary:     Recommended update for kdump
Type:        recommended
Severity:    moderate
References:  1233137
This update for kdump fixes the following issue:

- Fix filtering ReadOnly keys in kdump_bond_config (bsc#1233137).  
  kdump fails to bring network due to bad bond config

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:830-1
Released:    Tue Mar 11 09:55:10 2025
Summary:     Recommended update for timezone
Type:        recommended
Severity:    moderate
References:  
This update for timezone fixes the following issues:

- Update to 2025a:
    * Paraguay adopts permanent -03 starting spring 2024
    * Improve pre-1991 data for the Philippines
    * Etc/Unknown is now reserved
    * Improve historical data for Mexico, Mongolia, and Portugal
    * System V names are now obsolescent
    * The main data form now uses %z
    * The code now conforms to RFC 8536 for early timestamps
    * Support POSIX.1-2024, which removes asctime_r and ctime_r
    * Assume POSIX.2-1992 or later for shell scripts
    * SUPPORT_C89 now defaults to 1

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:833-1
Released:    Tue Mar 11 11:53:19 2025
Summary:     Security update for the Linux Kernel
Type:        security
Severity:    important
References:  1208995,1220946,1225742,1232472,1232919,1233701,1233749,1234154,1234650,1234853,1234891,1234963,1235054,1235061,1235073,1235111,1236133,1236289,1236576,1236661,1236677,1236757,1236758,1236760,1236761,1236777,1236951,1237025,1237028,1237139,1237316,1237693,1238033,CVE-2022-49080,CVE-2023-1192,CVE-2023-52572,CVE-2024-50115,CVE-2024-53135,CVE-2024-53173,CVE-2024-53226,CVE-2024-53239,CVE-2024-56539,CVE-2024-56548,CVE-2024-56605,CVE-2024-57948,CVE-2025-21647,CVE-2025-21690,CVE-2025-21692,CVE-2025-21699

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238033).
- CVE-2024-53135: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN (bsc#1234154).
- CVE-2024-53226: RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (bsc#1236576)
- CVE-2024-57948: mac802154: check local interfaces before deleting sdata list (bsc#1236677).
- CVE-2025-21647: sched: sch_cake: add bounds checks to host bulk flow fairness counts (bsc#1236133).
- CVE-2025-21690: scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (bsc#1237025).
- CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028).
- CVE-2025-21699: gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (bsc#1237139).

The following non-security bugs were fixed:

- cpufreq/amd-pstate: Only print supported EPP values for performance governor (bsc#1236777).
- iavf: fix the waiting time for initial reset (bsc#1235111).
- ice: add ice_adapter for shared data across PFs on the same NIC (bsc#1235111).
- ice: avoid the PTP hardware semaphore in gettimex64 path (bsc#1235111).
- ice: fold ice_ptp_read_time into ice_ptp_gettimex64 (bsc#1235111).
- idpf: call set_real_num_queues in idpf_open (bsc#1236661 bsc#1237316).
- ipv4/tcp: do not use per netns ctl sockets (bsc#1237693).
- kabi: hide adding RCU head into struct netdev_name_node (bsc#1233749).
- net: Fix undefined behavior in netdev name allocation (bsc#1233749).
- net: avoid UAF on deleted altname (bsc#1233749).
- net: check for altname conflicts when changing netdev's netns (bsc#1233749).
- net: core: Use the bitmap API to allocate bitmaps (bsc#1233749).
- net: do not send a MOVE event when netdev changes netns (bsc#1233749).
- net: do not use input buffer of __dev_alloc_name() as a scratch space (bsc#1233749).
- net: fix ifname in netlink ntf during netns move (bsc#1233749).
- net: fix removing a namespace with conflicting altnames (bsc#1233749).
- net: free altname using an RCU callback (bsc#1233749).
- net: introduce a function to check if a netdev name is in use (bsc#1233749).
- net: make dev_alloc_name() call dev_prep_valid_name() (bsc#1233749).
- net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761).
- net: mana: Cleanup 'mana' debugfs dir after cleanup of all children (bsc#1236760).
- net: mana: Enable debugfs files for MANA device (bsc#1236758).
- net: minor __dev_alloc_name() optimization (bsc#1233749).
- net: move altnames together with the netdevice (bsc#1233749).
- net: netvsc: Update default VMBus channels (bsc#1236757).
- net: reduce indentation of __dev_alloc_name() (bsc#1233749).
- net: remove dev_valid_name() check from __dev_alloc_name() (bsc#1233749).
- net: remove else after return in dev_prep_valid_name() (bsc#1233749).
- net: trust the bitmap in __dev_alloc_name() (bsc#1233749).
- nfsd: use explicit lock/unlock for directory ops (bsc#1234650 bsc#1233701 bsc#1232472).
- rcu: Remove rcu_is_idle_cpu() (bsc#1236289).
- scsi: storvsc: Set correct data length for sending SCSI command without payload (git-fixes).
- x86/aperfmperf: Dont wake idle CPUs in arch_freq_get_on_cpu() (bsc#1236289).
- x86/aperfmperf: Integrate the fallback code from show_cpuinfo() (bsc#1236289).
- x86/aperfmperf: Make parts of the frequency invariance code unconditional (bsc#1236289).
- x86/aperfmperf: Put frequency invariance aperf/mperf data into a struct (bsc#1236289).
- x86/aperfmperf: Replace aperfmperf_get_khz() (bsc#1236289).
- x86/aperfmperf: Replace arch_freq_get_on_cpu() (bsc#1236289).
- x86/aperfmperf: Restructure arch_scale_freq_tick() (bsc#1236289).
- x86/aperfmperf: Separate AP/BP frequency invariance init (bsc#1236289).
- x86/aperfmperf: Store aperf/mperf data for cpu frequency reads (bsc#1236289).
- x86/aperfmperf: Untangle Intel and AMD frequency invariance init (bsc#1236289).
- x86/aperfperf: Make it correct on 32bit and UP kernels (bsc#1236289).
- x86/smp: Move APERF/MPERF code where it belongs (bsc#1236289).
- x86/smp: Remove unnecessary assignment to local var freq_scale (bsc#1236289).
- x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes).
- x86/xen: allow larger contiguous memory regions in PV guests (bsc#1236951).
- x86/xen: fix xen_hypercall_hvm() to not clobber %rbx (git-fixes).
- xen/swiotlb: relax alignment requirements (bsc#1236951).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:838-1
Released:    Tue Mar 11 13:11:21 2025
Summary:     Recommended update for libzypp, zypper
Type:        recommended
Severity:    important
References:  1189788,1216091,1236481,1237044
This update for libzypp, zypper fixes the following issues:

- Disable zypp.conf:download.use_deltarpm by default 
  Measurements show that you don't benefit from using deltarpms
  unless your network connection is very slow. That's why most
  distributions even stop offering deltarpms. The default remains
  unchanged on SUSE-15.6 and older.
- Make sure repo variables are evaluated in the right context
  (bsc#1237044)
- Introducing MediaCurl2 a alternative HTTP backend.
  This patch adds MediaCurl2 as a testbed for experimenting with a
  more simple way to download files. Set ZYPP_CURL2=1 in the
  environment to use it.
- Filesystem usrmerge must not be done in singletrans mode
  (bsc#1236481, bsc#1189788)
- Commit will amend the backend in case the transaction would
  perform a filesystem usrmerge.
- Workaround bsc#1216091 on Code16.
- Annonunce --root in commands not launching a Target
  (bsc#1237044)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:934-1
Released:    Wed Mar 19 11:08:10 2025
Summary:     Recommended update for grub2
Type:        recommended
Severity:    important
References:  1237865
This update for grub2 fixes the following issues:

- Fix zfs.mo not found message when booting on legacy BIOS (bsc#1237865)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:998-1
Released:    Tue Mar 25 03:07:02 2025
Summary:     Security update for freetype2
Type:        security
Severity:    important
References:  1239465,CVE-2025-27363
This update for freetype2 fixes the following issues:

- CVE-2025-27363: Fixed out-of-bounds write when attempting to parse font 
  subglyph structures related to TrueType GX and variable font files (bsc#1239465).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1004-1
Released:    Tue Mar 25 09:42:38 2025
Summary:     Security update for python-Jinja2
Type:        security
Severity:    moderate
References:  1238879,CVE-2025-27516
This update for python-Jinja2 fixes the following issues:

- CVE-2025-27516: Fixed sandbox breakout through attr filter selecting format method (bsc#1238879)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1034-1
Released:    Thu Mar 27 07:50:58 2025
Summary:     Recommended update for python-azure-agent
Type:        recommended
Severity:    moderate
References:  1235140
This update for python-azure-agent fixes the following issues:

- Update to version 2.12.04 (bsc#1235140)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1035-1
Released:    Thu Mar 27 10:34:01 2025
Summary:     Recommended update for suse-build-key
Type:        recommended
Severity:    moderate
References:  1236779,1237294
This update for suse-build-key fixes the following issues:

- Changed and extented the SUSE Linux Enterprise 15 and 16 signing keys to use
  SHA256 GPG UIDs instead of SHA1. (bsc#1237294 bsc#1236779 jsc#PED-12321)
  - gpg-pubkey-3fa1d6ce-67c856ee.asc to gpg-pubkey-09d9ea69-67c857f3.asc
  - gpg-pubkey-09d9ea69-645b99ce.asc to gpg-pubkey-3fa1d6ce-63c9481c.asc
  - suse_ptf_key_2023.asc, suse_ptf_key.asc: adjusted

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1056-1
Released:    Fri Mar 28 18:06:22 2025
Summary:     Security update for python3
Type:        security
Severity:    moderate
References:  1233307,CVE-2024-11168
This update for python3 fixes the following issues:

- CVE-2024-11168: Fixed improper validation of IPv6 and IPvFuture addresses (bsc#1233307).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1062-1
Released:    Mon Mar 31 10:45:08 2025
Summary:     Security update for docker, docker-stable
Type:        security
Severity:    important
References:  1237367,1239185,1239322,CVE-2024-23650,CVE-2024-29018,CVE-2024-41110,CVE-2025-22868,CVE-2025-22869
This update for docker, docker-stable fixes the following issues:


- CVE-2025-22868: Fixed unexpected memory consumption during token parsing in golang.org/x/oauth2 (bsc#1239185).
- CVE-2025-22869: Fixed Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (bsc#1239322).

Other fixes:
- Make container-selinux requirement conditional on selinux-policy (bsc#1237367)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1063-1
Released:    Mon Mar 31 11:04:42 2025
Summary:     Security update for apparmor
Type:        security
Severity:    moderate
References:  1234452
This update for apparmor fixes the following issues:

- Allow dovecot-auth to execute unix check password from /sbin, not only from /usr/bin (bsc#1234452).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1130-1
Released:    Thu Apr  3 15:08:55 2025
Summary:     Recommended update for ca-certificates-mozilla
Type:        recommended
Severity:    important
References:  1234798,1240009,1240343
This update for ca-certificates-mozilla fixes the following issues:

Update to 2.74 state of Mozilla SSL root CAs:

- Removed:

  * SwissSign Silver CA - G2

- Added:

  * D-TRUST BR Root CA 2 2023
  * D-TRUST EV Root CA 2 2023

Updated to 2.72 state of Mozilla SSL root CAs (bsc#1234798):

- Removed:

  * SecureSign RootCA11
  * Security Communication RootCA3

- Added:

  * TWCA CYBER Root CA
  * TWCA Global Root CA G2
  * SecureSign Root CA12
  * SecureSign Root CA14
  * SecureSign Root CA15

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1145-1
Released:    Mon Apr  7 06:41:42 2025
Summary:     Recommended update for hwinfo
Type:        recommended
Severity:    moderate
References:  1223330,1239663
This update for hwinfo fixes the following issues:

- Avoid reporting of spurious usb storage devices (bsc#1223330)
- Do not overdo usb device de-duplication (bsc#1239663)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1161-1
Released:    Mon Apr  7 17:29:45 2025
Summary:     Recommended update for vim
Type:        recommended
Severity:    moderate
References:  1235751
This update for vim fixes the following issues:

- Regression patch to fix (bsc#1235751).
- Version update 9.1.1176

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1191-1
Released:    Thu Apr 10 06:57:45 2025
Summary:     Recommended update for supportutils
Type:        recommended
Severity:    moderate
References:  1183663,1193173,1211547,1213291,1214713,1216049,1216146,1216147,1216150,1216151,1216228,1216229,1216230,1216231,1216232,1216233,1216241,1216388,1216522,1216827,1217287,1218201,1218282,1218324,1218812,1218814,1219241,1219639,1222021,1222650,1222896,1227127,1228265,1230371,1231396,1231423,1231838,1233726
This update for supportutils fixes the following issues:

- Version update 3.2.10, bugfixing.
  + Collect firewalld configuration
  + Ignore tasks/threads to prevent collecting duplicate data (bsc#1230371).
  + openldap2_5 support for SLES (bsc#1231838).
  + Added dbus_info for dbus.txt (bsc#1222650).
  + Map running PIDs to RPM package owner aiding BPF program detection (bsc#1222896, bsc#1213291, PED-8221).
  + Corrected display issues (bsc#1231396, bsc#1217287).
  + NFS takes too long, showmount times out (bsc#1231423).
  + Merged sle15 and master branches (bsc#1233726, PED-11669).
  + Extended scaling for performance (bsc#1214713).
  + Corrected SLE Micro version (bsc#1219241).
  + Check nvidida-persistenced state (bsc#1219639).
  + Corrected podman .ID error (bsc#1218812).
  + Remove duplicate non-root podman users (bsc#1218814).
  + Fixed smart disk error (bsc#1218282).
  + Fixed ipvsadm logic error (bsc#1218324).
  + Correctly detects Xen Dom0 (bsc#1218201).
  + Inhibit the conversion of port numbers to port names for network files.
  + powerpc: collect rtas_errd.log and lp_diag.log log files.
  + Get list of pam.d files.
  + Provides long listing for /etc/sssd/sssd.conf (bsc#1211547).
  + Optimize lsof usage (bsc#1183663).
  + Added mokutil commands for secureboot.
  + ipset - List entries for all sets.
  + Added nvme-stas configuration to nvme.txt (bsc#1216049).
  + Collects zypp history file  (bsc#1216522).
  + Collect HA related rpm package versions in ha.txt
  + Change -x OPTION to really be exclude only
  + Fixed kernel and added user live patching (PED-4524).
  + Fixed plugins creating empty files (bsc#1216388).
  + Remove supportutils requires for util-linux-systemd and kmod (bsc#1193173).
  + Added supportutils to current (PED-4456).
  + Changed config directory to /etc/supportutuils for all conf and header.txt (bsc#1216232).
  + Fixed supportconfig using external test command (bsc#1216150) and kdump, 
    analyzevmcore errors (bsc#1216146).
  + Support has been removed for scplugin.rc, use supportconfig.rc (bsc#1216241).
  + Remove check_service function from supportconfig.rc (bsc#1216231).
  + Removed older versions of SLES_VER (bsc#1216147).
  + Added timed command to fs-files.txt (bsc#1216827).
  + Cron and At are replaced with systemd.timer (bsc#1216229).
  + Offers apparmor or selinux based on configuration (bsc#1216233).
  + Filted proc access errors (bsc#1216151).
  + Remove all SuSE-release references (bsc#1216228).
  + Remove references to /etc/init.d (bsc#1216230).
  + Add capability in supportconfig to insert configs in summary.xml from command line option (bsc#1222021).
  + file sanitizing improvement request for boot (bsc#1227127).
  + Add 'read_values -s' output to supportconfig on s390x (bsc#1228265).
  + Usability enhancement for supportconfig (PED-8211).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1201-1
Released:    Fri Apr 11 12:15:58 2025
Summary:     Security update for expat
Type:        security
Severity:    important
References:  1239618,CVE-2024-8176
This update for expat fixes the following issues:

- CVE-2024-8176: Fixed denial of service from chaining a large number of entities caused 
  by stack overflow by resolving use of recursion (bsc#1239618)

Other fixes:
- version update to 2.7.1 (jsc#PED-12500)
     Bug fixes:
       #980 #989  Restore event pointer behavior from Expat 2.6.4
                    (that the fix to CVE-2024-8176 changed in 2.7.0);
                    affected API functions are:
                    - XML_GetCurrentByteCount
                    - XML_GetCurrentByteIndex
                    - XML_GetCurrentColumnNumber
                    - XML_GetCurrentLineNumber
                    - XML_GetInputContext
     Other changes:
       #976 #977  Autotools: Integrate files 'fuzz/xml_lpm_fuzzer.{cpp,proto}'
                    with Automake that were missing from 2.7.0 release tarballs
       #983 #984  Fix printf format specifiers for 32bit Emscripten
            #992  docs: Promote OpenSSF Best Practices self-certification
            #978  tests/benchmark: Resolve mistaken double close
            #986  Address compiler warnings
       #990 #993  Version info bumped from 11:1:10 (libexpat*.so.1.10.1)
                    to 11:2:10 (libexpat*.so.1.10.2); see https://verbump.de/
                    for what these numbers do
        Infrastructure:
            #982  CI: Start running Perl XML::Parser integration tests
            #987  CI: Enforce Clang Static Analyzer clean code
            #991  CI: Re-enable warning clang-analyzer-valist.Uninitialized
                    for clang-tidy
            #981  CI: Cover compilation with musl
       #983 #984  CI: Cover compilation with 32bit Emscripten
       #976 #977  CI: Protect against fuzzer files missing from future
                    release archives

- version update to 2.7.0
       #935 #937  Autotools: Make generated CMake files look for
                    libexpat. at SO_MAJOR@.dylib on macOS
            #925  Autotools: Sync CMake templates with CMake 3.29
  #945 #962 #966  CMake: Drop support for CMake <3.13
            #942  CMake: Small fuzzing related improvements
            #921  docs: Add missing documentation of error code
                    XML_ERROR_NOT_STARTED that was introduced with 2.6.4
            #941  docs: Document need for C++11 compiler for use from C++
            #959  tests/benchmark: Fix a (harmless) TOCTTOU
            #944  Windows: Fix installer target location of file xmlwf.xml
                    for CMake
            #953  Windows: Address warning -Wunknown-warning-option
                    about -Wno-pedantic-ms-format from LLVM MinGW
            #971  Address Cppcheck warnings
       #969 #970  Mass-migrate links from http:// to https://
    #947 #958 ..
       #974 #975  Document changes since the previous release
       #974 #975  Version info bumped from 11:0:10 (libexpat*.so.1.10.0)
                    to 11:1:10 (libexpat*.so.1.10.1); see https://verbump.de/
                    for what these numbers do

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1217-1
Released:    Sun Apr 13 12:16:40 2025
Summary:     Recommended update for ca-certificates-mozilla
Type:        recommended
Severity:    important
References:  1240343
This update for ca-certificates-mozilla fixes the following issues:

- Reenable the distrusted certs for now. as these only
  distrust 'new issued' certs starting after a certain date,
  while old certs should still work. (bsc#1240343)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1241-1
Released:    Mon Apr 14 12:37:06 2025
Summary:     Security update for the Linux Kernel
Type:        security
Severity:    important
References:  1065729,1180814,1183682,1190336,1190768,1190786,1193629,1194869,1194904,1195823,1196444,1197158,1197174,1197227,1197246,1197302,1197331,1197472,1197661,1197926,1198019,1198021,1198240,1198577,1198660,1199657,1200045,1200571,1200807,1200809,1200810,1200824,1200825,1200871,1200872,1201193,1201218,1201323,1201381,1201610,1202672,1202711,1202712,1202771,1202774,1202778,1202781,1203699,1203769,1204171,1205205,1205701,1206048,1206049,1206451,1207034,1207186,1207361,1207593,1207640,1207878,1209262,1209547,1209788,1209980,1210050,1210647,1211263,1213167,1218450,1221651,1225428,1225742,1229312,1231375,1231432,1231854,1232299,1232743,1233479,1233557,1233749,1234074,1234894,1234895,1234896,1235528,1235599,1235870,1237029,1237521,1237530,1237718,1237721,1237722,1237723,1237724,1237725,1237726,1237727,1237728,1237729,1237730,1237733,1237734,1237735,1237736,1237737,1237738,1237739,1237740,1237742,1237743,1237744,1237745,1237746,1237748,1237749,1237751,1237752,1237753,1237755,1237759,1
 237761,1237763,1237766,1237767,1237768,1237774,1237775,1237778,1237779,1237780,1237782,1237783,1237784,1237785,1237786,1237787,1237788,1237789,1237790,1237792,1237794,1237795,1237797,1237798,1237799,1237807,1237808,1237809,1237810,1237812,1237813,1237814,1237815,1237816,1237817,1237818,1237820,1237821,1237823,1237824,1237826,1237827,1237829,1237831,1237835,1237836,1237837,1237839,1237840,1237845,1237846,1237868,1237872,1237892,1237903,1237904,1237916,1237918,1237922,1237925,1237926,1237927,1237928,1237929,1237931,1237932,1237933,1237937,1237940,1237941,1237942,1237946,1237951,1237952,1237954,1237955,1237957,1237958,1237959,1237960,1237961,1237962,1237963,1237965,1237966,1237967,1237968,1237969,1237970,1237971,1237972,1237973,1237975,1237976,1237978,1237979,1237980,1237982,1237983,1237984,1237986,1237987,1237990,1237992,1237996,1237997,1237998,1237999,1238000,1238003,1238004,1238005,1238006,1238007,1238009,1238010,1238011,1238012,1238013,1238014,1238016,1238017,1238018,1238019,123802
 1,1238022,1238024,1238025,1238030,1238032,1238036,1238037,1238041,1238046,1238047,1238048,1238069,1238071,1238077,1238079,1238080,1238083,1238084,1238085,1238086,1238089,1238090,1238091,1238092,1238096,1238097,1238099,1238103,1238105,1238106,1238107,1238108,1238110,1238111,1238112,1238113,1238114,1238115,1238116,1238118,1238120,1238122,1238123,1238125,1238126,1238127,1238128,1238131,1238134,1238135,1238138,1238139,1238140,1238142,1238144,1238146,1238147,1238149,1238150,1238153,1238155,1238156,1238157,1238158,1238160,1238162,1238166,1238167,1238168,1238169,1238170,1238171,1238172,1238175,1238176,1238177,1238178,1238179,1238180,1238181,1238183,1238184,1238187,1238221,1238222,1238226,1238228,1238229,1238231,1238233,1238234,1238235,1238236,1238238,1238239,1238240,1238241,1238242,1238243,1238244,1238246,1238247,1238248,1238249,1238252,1238253,1238255,1238256,1238257,1238260,1238261,1238262,1238263,1238264,1238266,1238267,1238268,1238269,1238270,1238271,1238272,1238274,1238275,1238276,123
 8277,1238278,1238279,1238281,1238282,1238283,1238284,1238285,1238286,1238287,1238288,1238289,1238291,1238292,1238293,1238295,1238298,1238300,1238301,1238302,1238306,1238307,1238308,1238309,1238311,1238313,1238326,1238327,1238328,1238329,1238331,1238333,1238334,1238335,1238336,1238337,1238338,1238339,1238341,1238343,1238344,1238345,1238372,1238373,1238374,1238376,1238377,1238378,1238381,1238382,1238383,1238385,1238386,1238387,1238388,1238389,1238390,1238391,1238392,1238393,1238394,1238395,1238396,1238397,1238398,1238400,1238401,1238410,1238411,1238413,1238415,1238416,1238417,1238418,1238419,1238420,1238422,1238423,1238424,1238428,1238429,1238430,1238431,1238432,1238433,1238434,1238435,1238436,1238437,1238440,1238441,1238442,1238443,1238444,1238445,1238447,1238453,1238454,1238458,1238459,1238462,1238463,1238465,1238467,1238469,1238533,1238536,1238538,1238539,1238540,1238542,1238543,1238546,1238551,1238552,1238556,1238557,1238599,1238600,1238601,1238602,1238605,1238612,1238613,1238615,
 1238616,1238617,1238618,1238619,1238621,1238623,1238625,1238626,1238630,1238631,1238632,1238633,1238635,1238636,1238638,1238639,1238640,1238641,1238642,1238643,1238645,1238646,1238647,1238648,1238649,1238650,1238653,1238654,1238655,1238658,1238661,1238662,1238663,1238664,1238666,1238668,1238705,1238707,1238710,1238712,1238718,1238719,1238721,1238722,1238727,1238729,1238750,1238787,1238789,1238792,1238799,1238803,1238804,1238805,1238806,1238808,1238809,1238810,1238811,1238814,1238815,1238816,1238817,1238818,1238819,1238820,1238821,1238822,1238823,1238825,1238830,1238834,1238835,1238836,1238838,1238843,1238867,1238868,1238869,1238870,1238871,1238878,1238889,1238892,1238893,1238897,1238898,1238899,1238902,1238911,1238916,1238919,1238925,1238930,1238933,1238936,1238937,1238938,1238939,1238941,1238942,1238943,1238944,1238945,1238946,1238948,1238949,1238950,1238951,1238952,1238953,1238954,1238956,1238957,1239001,1239004,1239016,1239035,1239040,1239041,1239051,1239060,1239070,1239071,12390
 73,1239076,1239095,1239109,1239115,1239126,1239452,1239454,1239968,1239969,1240133,1240205,1240207,1240208,1240210,1240212,1240213,1240218,1240220,1240227,1240229,1240231,1240242,1240245,1240247,1240250,1240254,1240256,1240264,1240266,1240272,1240275,1240276,1240278,1240279,1240280,1240281,1240282,1240283,1240284,1240286,1240288,1240290,1240292,1240293,1240297,1240304,1240308,1240309,1240317,1240318,1240322,CVE-2017-5753,CVE-2021-4453,CVE-2021-4454,CVE-2021-47517,CVE-2021-47631,CVE-2021-47632,CVE-2021-47633,CVE-2021-47635,CVE-2021-47636,CVE-2021-47637,CVE-2021-47638,CVE-2021-47639,CVE-2021-47641,CVE-2021-47642,CVE-2021-47643,CVE-2021-47644,CVE-2021-47645,CVE-2021-47646,CVE-2021-47647,CVE-2021-47648,CVE-2021-47649,CVE-2021-47650,CVE-2021-47651,CVE-2021-47652,CVE-2021-47653,CVE-2021-47654,CVE-2021-47656,CVE-2021-47657,CVE-2021-47659,CVE-2022-0168,CVE-2022-0995,CVE-2022-1016,CVE-2022-1048,CVE-2022-1184,CVE-2022-2977,CVE-2022-29900,CVE-2022-29901,CVE-2022-3303,CVE-2022-3435,CVE-2022-490
 44,CVE-2022-49050,CVE-2022-49051,CVE-2022-49053,CVE-2022-49054,CVE-2022-49055,CVE-2022-49056,CVE-2022-49057,CVE-2022-49058,CVE-2022-49059,CVE-2022-49060,CVE-2022-49061,CVE-2022-49062,CVE-2022-49063,CVE-2022-49064,CVE-2022-49065,CVE-2022-49066,CVE-2022-49070,CVE-2022-49071,CVE-2022-49073,CVE-2022-49074,CVE-2022-49075,CVE-2022-49076,CVE-2022-49078,CVE-2022-49082,CVE-2022-49083,CVE-2022-49084,CVE-2022-49085,CVE-2022-49086,CVE-2022-49088,CVE-2022-49089,CVE-2022-49090,CVE-2022-49091,CVE-2022-49092,CVE-2022-49093,CVE-2022-49095,CVE-2022-49096,CVE-2022-49097,CVE-2022-49098,CVE-2022-49099,CVE-2022-49100,CVE-2022-49102,CVE-2022-49103,CVE-2022-49104,CVE-2022-49105,CVE-2022-49106,CVE-2022-49107,CVE-2022-49109,CVE-2022-49111,CVE-2022-49112,CVE-2022-49113,CVE-2022-49114,CVE-2022-49115,CVE-2022-49116,CVE-2022-49118,CVE-2022-49119,CVE-2022-49120,CVE-2022-49121,CVE-2022-49122,CVE-2022-49123,CVE-2022-49125,CVE-2022-49126,CVE-2022-49128,CVE-2022-49129,CVE-2022-49130,CVE-2022-49131,CVE-2022-49132,CVE-
 2022-49133,CVE-2022-49134,CVE-2022-49135,CVE-2022-49136,CVE-2022-49137,CVE-2022-49138,CVE-2022-49139,CVE-2022-49144,CVE-2022-49145,CVE-2022-49147,CVE-2022-49148,CVE-2022-49151,CVE-2022-49153,CVE-2022-49154,CVE-2022-49155,CVE-2022-49156,CVE-2022-49157,CVE-2022-49158,CVE-2022-49159,CVE-2022-49160,CVE-2022-49162,CVE-2022-49163,CVE-2022-49164,CVE-2022-49165,CVE-2022-49174,CVE-2022-49175,CVE-2022-49176,CVE-2022-49177,CVE-2022-49178,CVE-2022-49179,CVE-2022-49180,CVE-2022-49182,CVE-2022-49183,CVE-2022-49185,CVE-2022-49187,CVE-2022-49188,CVE-2022-49189,CVE-2022-49192,CVE-2022-49193,CVE-2022-49194,CVE-2022-49196,CVE-2022-49199,CVE-2022-49200,CVE-2022-49201,CVE-2022-49202,CVE-2022-49203,CVE-2022-49204,CVE-2022-49205,CVE-2022-49206,CVE-2022-49207,CVE-2022-49208,CVE-2022-49209,CVE-2022-49212,CVE-2022-49213,CVE-2022-49214,CVE-2022-49215,CVE-2022-49216,CVE-2022-49217,CVE-2022-49218,CVE-2022-49219,CVE-2022-49221,CVE-2022-49222,CVE-2022-49224,CVE-2022-49225,CVE-2022-49226,CVE-2022-49227,CVE-2022-49
 228,CVE-2022-49230,CVE-2022-49232,CVE-2022-49233,CVE-2022-49235,CVE-2022-49236,CVE-2022-49237,CVE-2022-49238,CVE-2022-49239,CVE-2022-49241,CVE-2022-49242,CVE-2022-49243,CVE-2022-49244,CVE-2022-49246,CVE-2022-49247,CVE-2022-49248,CVE-2022-49249,CVE-2022-49250,CVE-2022-49251,CVE-2022-49252,CVE-2022-49253,CVE-2022-49254,CVE-2022-49256,CVE-2022-49257,CVE-2022-49258,CVE-2022-49259,CVE-2022-49260,CVE-2022-49261,CVE-2022-49262,CVE-2022-49263,CVE-2022-49264,CVE-2022-49265,CVE-2022-49266,CVE-2022-49268,CVE-2022-49269,CVE-2022-49270,CVE-2022-49271,CVE-2022-49272,CVE-2022-49273,CVE-2022-49274,CVE-2022-49275,CVE-2022-49276,CVE-2022-49277,CVE-2022-49278,CVE-2022-49279,CVE-2022-49280,CVE-2022-49281,CVE-2022-49283,CVE-2022-49285,CVE-2022-49286,CVE-2022-49287,CVE-2022-49288,CVE-2022-49290,CVE-2022-49291,CVE-2022-49292,CVE-2022-49293,CVE-2022-49294,CVE-2022-49295,CVE-2022-49296,CVE-2022-49297,CVE-2022-49298,CVE-2022-49299,CVE-2022-49300,CVE-2022-49301,CVE-2022-49302,CVE-2022-49304,CVE-2022-49305,CVE
 -2022-49306,CVE-2022-49307,CVE-2022-49308,CVE-2022-49309,CVE-2022-49310,CVE-2022-49311,CVE-2022-49312,CVE-2022-49313,CVE-2022-49314,CVE-2022-49315,CVE-2022-49316,CVE-2022-49319,CVE-2022-49320,CVE-2022-49321,CVE-2022-49322,CVE-2022-49323,CVE-2022-49325,CVE-2022-49326,CVE-2022-49327,CVE-2022-49328,CVE-2022-49329,CVE-2022-49330,CVE-2022-49331,CVE-2022-49332,CVE-2022-49333,CVE-2022-49335,CVE-2022-49336,CVE-2022-49337,CVE-2022-49338,CVE-2022-49339,CVE-2022-49341,CVE-2022-49342,CVE-2022-49343,CVE-2022-49345,CVE-2022-49346,CVE-2022-49347,CVE-2022-49348,CVE-2022-49349,CVE-2022-49350,CVE-2022-49351,CVE-2022-49352,CVE-2022-49353,CVE-2022-49354,CVE-2022-49356,CVE-2022-49357,CVE-2022-49359,CVE-2022-49362,CVE-2022-49365,CVE-2022-49367,CVE-2022-49368,CVE-2022-49370,CVE-2022-49371,CVE-2022-49373,CVE-2022-49375,CVE-2022-49376,CVE-2022-49377,CVE-2022-49378,CVE-2022-49379,CVE-2022-49381,CVE-2022-49382,CVE-2022-49384,CVE-2022-49385,CVE-2022-49386,CVE-2022-49389,CVE-2022-49390,CVE-2022-49392,CVE-2022-4
 9394,CVE-2022-49396,CVE-2022-49397,CVE-2022-49398,CVE-2022-49399,CVE-2022-49400,CVE-2022-49402,CVE-2022-49404,CVE-2022-49406,CVE-2022-49407,CVE-2022-49409,CVE-2022-49410,CVE-2022-49411,CVE-2022-49412,CVE-2022-49413,CVE-2022-49414,CVE-2022-49416,CVE-2022-49418,CVE-2022-49419,CVE-2022-49421,CVE-2022-49422,CVE-2022-49424,CVE-2022-49426,CVE-2022-49427,CVE-2022-49429,CVE-2022-49430,CVE-2022-49431,CVE-2022-49432,CVE-2022-49433,CVE-2022-49434,CVE-2022-49435,CVE-2022-49436,CVE-2022-49437,CVE-2022-49438,CVE-2022-49440,CVE-2022-49441,CVE-2022-49442,CVE-2022-49443,CVE-2022-49444,CVE-2022-49445,CVE-2022-49446,CVE-2022-49447,CVE-2022-49448,CVE-2022-49449,CVE-2022-49451,CVE-2022-49453,CVE-2022-49455,CVE-2022-49458,CVE-2022-49459,CVE-2022-49460,CVE-2022-49462,CVE-2022-49463,CVE-2022-49465,CVE-2022-49466,CVE-2022-49467,CVE-2022-49468,CVE-2022-49470,CVE-2022-49472,CVE-2022-49473,CVE-2022-49474,CVE-2022-49475,CVE-2022-49476,CVE-2022-49477,CVE-2022-49478,CVE-2022-49479,CVE-2022-49480,CVE-2022-49481,CV
 E-2022-49482,CVE-2022-49483,CVE-2022-49484,CVE-2022-49485,CVE-2022-49486,CVE-2022-49487,CVE-2022-49488,CVE-2022-49489,CVE-2022-49490,CVE-2022-49491,CVE-2022-49492,CVE-2022-49493,CVE-2022-49494,CVE-2022-49495,CVE-2022-49497,CVE-2022-49498,CVE-2022-49499,CVE-2022-49501,CVE-2022-49502,CVE-2022-49503,CVE-2022-49504,CVE-2022-49505,CVE-2022-49506,CVE-2022-49507,CVE-2022-49508,CVE-2022-49509,CVE-2022-49510,CVE-2022-49511,CVE-2022-49512,CVE-2022-49514,CVE-2022-49515,CVE-2022-49516,CVE-2022-49517,CVE-2022-49518,CVE-2022-49519,CVE-2022-49520,CVE-2022-49521,CVE-2022-49522,CVE-2022-49523,CVE-2022-49524,CVE-2022-49525,CVE-2022-49526,CVE-2022-49527,CVE-2022-49529,CVE-2022-49530,CVE-2022-49532,CVE-2022-49533,CVE-2022-49534,CVE-2022-49535,CVE-2022-49536,CVE-2022-49537,CVE-2022-49538,CVE-2022-49541,CVE-2022-49542,CVE-2022-49543,CVE-2022-49544,CVE-2022-49545,CVE-2022-49546,CVE-2022-49548,CVE-2022-49549,CVE-2022-49551,CVE-2022-49552,CVE-2022-49555,CVE-2022-49556,CVE-2022-49559,CVE-2022-49560,CVE-2022-
 49562,CVE-2022-49563,CVE-2022-49564,CVE-2022-49565,CVE-2022-49566,CVE-2022-49568,CVE-2022-49569,CVE-2022-49570,CVE-2022-49579,CVE-2022-49581,CVE-2022-49583,CVE-2022-49584,CVE-2022-49591,CVE-2022-49592,CVE-2022-49603,CVE-2022-49605,CVE-2022-49606,CVE-2022-49607,CVE-2022-49609,CVE-2022-49610,CVE-2022-49611,CVE-2022-49613,CVE-2022-49615,CVE-2022-49616,CVE-2022-49617,CVE-2022-49618,CVE-2022-49621,CVE-2022-49623,CVE-2022-49624,CVE-2022-49625,CVE-2022-49626,CVE-2022-49627,CVE-2022-49628,CVE-2022-49631,CVE-2022-49634,CVE-2022-49635,CVE-2022-49638,CVE-2022-49640,CVE-2022-49641,CVE-2022-49642,CVE-2022-49643,CVE-2022-49644,CVE-2022-49645,CVE-2022-49646,CVE-2022-49647,CVE-2022-49648,CVE-2022-49649,CVE-2022-49650,CVE-2022-49652,CVE-2022-49653,CVE-2022-49655,CVE-2022-49656,CVE-2022-49657,CVE-2022-49658,CVE-2022-49661,CVE-2022-49663,CVE-2022-49665,CVE-2022-49667,CVE-2022-49668,CVE-2022-49670,CVE-2022-49671,CVE-2022-49672,CVE-2022-49673,CVE-2022-49674,CVE-2022-49675,CVE-2022-49676,CVE-2022-49677,C
 VE-2022-49678,CVE-2022-49679,CVE-2022-49680,CVE-2022-49683,CVE-2022-49685,CVE-2022-49686,CVE-2022-49687,CVE-2022-49688,CVE-2022-49693,CVE-2022-49694,CVE-2022-49695,CVE-2022-49697,CVE-2022-49699,CVE-2022-49700,CVE-2022-49701,CVE-2022-49703,CVE-2022-49704,CVE-2022-49705,CVE-2022-49707,CVE-2022-49708,CVE-2022-49710,CVE-2022-49711,CVE-2022-49712,CVE-2022-49713,CVE-2022-49714,CVE-2022-49715,CVE-2022-49716,CVE-2022-49719,CVE-2022-49720,CVE-2022-49721,CVE-2022-49722,CVE-2022-49723,CVE-2022-49724,CVE-2022-49725,CVE-2022-49726,CVE-2022-49729,CVE-2022-49730,CVE-2022-49731,CVE-2022-49732,CVE-2022-49733,CVE-2022-49739,CVE-2022-49746,CVE-2022-49748,CVE-2022-49751,CVE-2022-49753,CVE-2022-49755,CVE-2022-49759,CVE-2023-0179,CVE-2023-1652,CVE-2023-2162,CVE-2023-28410,CVE-2023-3567,CVE-2023-52930,CVE-2023-52933,CVE-2023-52935,CVE-2023-52939,CVE-2023-52941,CVE-2023-52973,CVE-2023-52974,CVE-2023-52975,CVE-2023-52976,CVE-2023-52979,CVE-2023-52983,CVE-2023-52984,CVE-2023-52988,CVE-2023-52989,CVE-2023-529
 92,CVE-2023-52993,CVE-2023-53000,CVE-2023-53005,CVE-2023-53006,CVE-2023-53007,CVE-2023-53008,CVE-2023-53010,CVE-2023-53015,CVE-2023-53016,CVE-2023-53019,CVE-2023-53023,CVE-2023-53024,CVE-2023-53025,CVE-2023-53026,CVE-2023-53028,CVE-2023-53029,CVE-2023-53030,CVE-2023-53033,CVE-2024-26634,CVE-2024-47678,CVE-2024-50290,CVE-2024-53063,CVE-2024-53124,CVE-2024-53176,CVE-2024-53178,CVE-2024-56651,CVE-2024-57996,CVE-2024-58013,CVE-2024-58014,CVE-2025-21693,CVE-2025-21718,CVE-2025-21772,CVE-2025-21780

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918).
- CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled (bsc#1238919).
- CVE-2022-49739: gfs2: Always check inode size of inline inodes (bsc#1240207).
- CVE-2023-52935: mm/khugepaged: fix ->anon_vma race (bsc#1240276).
- CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc (bsc#1234074).
- CVE-2024-53176: smb: During unmount, ensure all cached dir instances drop their dentry (bsc#1234894).
- CVE-2024-53178: smb: Do not leak cfid when reconnect races with open_cached_dir (bsc#1234895).
- CVE-2024-56651: can: hi311x: hi3110_can_ist(): fix potential use-after-free (bsc#1235528).
- CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076).
- CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239095).
- CVE-2024-58014: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (bsc#1239109).
- CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029).
- CVE-2025-21718: net: rose: fix timer races against user threads (bsc#1239073).
- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238911).
- CVE-2025-21780: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (bsc#1239115).

The following non-security bugs were fixed:

- ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530).
- btrfs: defrag: do not use merged extent map for their generation check (bsc#1239968).
- btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1239968).
- btrfs: fix extent map merging not happening for adjacent extents (bsc#1239968).
- btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1239969).
- btrfs: send: fix invalid clone operation for file that got its size decreased (bsc#1239969).
- cifs: Add a laundromat thread for cached directories (git-fixes).
- cifs: fix potential null pointer use in destroy_workqueue in init_cifs error path (git-fixes).
- gfs2: Fix inode height consistency check (git-fixes).
- mm: zswap: move allocations during CPU init outside the lock (git-fixes).
- mm/mmu_notifier.c: fix race in mmu_interval_notifier_remove() (bsc#1239126).
- net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016).
- net: mana: Allow variable size indirection table (bsc#1239016).
- net: mana: Avoid open coded arithmetic (bsc#1239016).
- net: mana: Support holes in device list reply msg (bsc#1240133).
- RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016).
- RDMA/mana_ib: Use v2 version of cfg_rx_steer_req to enable RX coalescing (bsc#1239016).
- sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743).
- smb: client: destroy cfid_put_wq on module exit (git-fixes).
- smb: client: disable directory caching when dir_cache_timeout is zero (git-fixes).
- smb: client: do not start laundromat thread on nohandlecache (git-fixes).
- smb: client: make laundromat a delayed worker (git-fixes).
- smb: client: properly close cfids on umount (bsc#1231432, bsc#1232299, bsc#1235599, bsc#1234896).
- smb3: allow controlling length of time directory entries are cached with dir leases (git-fixes).
- smb3: do not start laundromat thread when dir leases disabled (git-fixes).
- smb3: retrying on failed server close (git-fixes).
- tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1242-1
Released:    Mon Apr 14 12:43:18 2025
Summary:     Recommended update for aaa_base
Type:        recommended
Severity:    moderate
References:  1235481,1236033
This update for aaa_base fixes the following issues:

- SP6 logrotate and rcsyslog binary (bsc#1236033)
- Update detection for systemd in rc.status
- Mountpoint for cgroup changed with cgroup2
- If a user switches the login shell respect the already set PATH
  environment (bsc#1235481)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1292-1
Released:    Wed Apr 16 09:49:17 2025
Summary:     Recommended update for timezone
Type:        recommended
Severity:    moderate
References:  
This update for timezone fixes the following issues:

- Version update 2025b
  * New zone for Aysen Region in Chile (America/Coyhaique) which
    moves from -04/-03 to -03
- Refresh patches for philippines historical data and china tzdata

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1334-1
Released:    Thu Apr 17 09:03:05 2025
Summary:     Security update for pam
Type:        security
Severity:    moderate
References:  1232234,CVE-2024-10041
This update for pam fixes the following issues:

- CVE-2024-10041: sensitive data exposure while performing authentications. (bsc#1232234)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1345-1
Released:    Thu Apr 17 17:14:27 2025
Summary:     Security update for containerd
Type:        security
Severity:    moderate
References:  1239749,CVE-2024-40635
This update for containerd fixes the following issues:

- CVE-2024-40635: Fixed integer overflow in User ID handling (bsc#1239749) 
  
Other fixes:
- Update to containerd v1.7.27.

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1354-1
Released:    Tue Apr 22 05:14:53 2025
Summary:     Recommended update for iproute2
Type:        recommended
Severity:    moderate
References:  1234383
This update for iproute2 fixes the following issues:

- Avoid false cgroup warnings (bsc#1234383)

-----------------------------------------------------------------
Advisory ID: 38402
Released:    Fri Apr 25 11:05:30 2025
Summary:     Recommended update for freetype2
Type:        recommended
Severity:    important
References:  
This update for freetype2 fixes the following issue:

- enable brotli support (jsc#PED-12258)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1371-1
Released:    Fri Apr 25 12:02:27 2025
Summary:     Recommended update for apparmor
Type:        recommended
Severity:    important
References:  1232234,1234452
This update for apparmor fixes the following issues:

- Allow pam_unix to execute unix_chkpwd with abi/3.0 (bsc#1234452, bsc#1232234)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1381-1
Released:    Mon Apr 28 09:37:03 2025
Summary:     Security update for cifs-utils
Type:        security
Severity:    moderate
References:  1239680,CVE-2025-2312
This update for cifs-utils fixes the following issues:

- CVE-2025-2312: Fixed cifs.upcall making an upcall to the wrong 
  namespace in containerized environments while trying to get Kerberos 
  credentials (bsc#1239680)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1413-1
Released:    Wed Apr 30 08:59:04 2025
Summary:     Security update for augeas
Type:        security
Severity:    low
References:  1239909,CVE-2025-2588
This update for augeas fixes the following issues:

- CVE-2025-2588: Check for NULL pointers when calling re_case_expand in function fa_expand_nocase. (bsc#1239909)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1438-1
Released:    Fri May  2 15:44:07 2025
Summary:     Security update for libxml2
Type:        security
Severity:    moderate
References:  1241453,1241551,CVE-2025-32414,CVE-2025-32415
This update for libxml2 fixes the following issues:

- CVE-2025-32414: Fixed an out-of-bounds read when parsing text via the Python API. (bsc#1241551)
- CVE-2025-32415: Fixed a crafted XML document may lead to a heap-based buffer under-read. (bsc#1241453)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1446-1
Released:    Mon May  5 08:04:03 2025
Summary:     Recommended update for lvm2
Type:        recommended
Severity:    important
References:  1216938
This update for lvm2 fixes the following issues:

- LVM filter behaves unexpectedly for MPIO devices in SLES15SP5 (bsc#1216938)
    * set lvm.conf devices.multipath_wwids_file=''

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1456-1
Released:    Wed May  7 17:13:32 2025
Summary:     Security update for sqlite3
Type:        security
Severity:    moderate
References:  1241020,1241078,1241189,CVE-2025-29087,CVE-2025-29088,CVE-2025-3277
This update for sqlite3 fixes the following issues:

- CVE-2025-29087,CVE-2025-3277: Fixed integer overflow in sqlite concat function (bsc#1241020)
- CVE-2025-29088: Fixed integer overflow through the SQLITE_DBCONFIG_LOOKASIDE component (bsc#1241078)

Other fixes:

- Updated to version 3.49.1 from Factory (jsc#SLE-16032)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1512-1
Released:    Wed May  7 21:36:27 2025
Summary:     Security update for apparmor
Type:        security
Severity:    moderate
References:  1241678,CVE-2024-10041
This update for apparmor fixes the following issues:

- Add dac_read_search capability for unix_chkpwd to allow it to read the shadow
  file even if it has 000 permissions. This is needed after the CVE-2024-10041
  fix in PAM. (bsc#1241678)


The following package changes have been done:

- aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 updated
- apparmor-abstractions-3.0.4-150500.11.18.1 updated
- apparmor-parser-3.0.4-150500.11.18.1 updated
- ca-certificates-mozilla-2.74-150200.41.1 updated
- cifs-utils-6.15-150400.3.12.1 updated
- containerd-ctr-1.7.27-150000.123.1 updated
- containerd-1.7.27-150000.123.1 updated
- docker-27.5.1_ce-150000.218.1 updated
- findutils-4.8.0-150300.3.3.2 updated
- glibc-locale-base-2.31-150300.92.1 updated
- glibc-locale-2.31-150300.92.1 updated
- glibc-2.31-150300.92.1 updated
- grub2-i386-pc-2.06-150500.29.46.2 updated
- grub2-x86_64-efi-2.06-150500.29.46.2 updated
- grub2-2.06-150500.29.46.2 updated
- hwinfo-21.87-150500.3.6.1 updated
- iproute2-5.14-150400.3.3.1 updated
- kdump-1.0.2+git48.g64445e1-150500.3.9.2 updated
- kernel-default-5.14.21-150500.55.100.1 updated
- libapparmor1-3.0.4-150500.11.18.1 updated
- libaugeas0-1.12.0-150400.3.8.1 updated
- libdevmapper1_03-2.03.22_1.02.196-150500.7.15.1 updated
- libexpat1-2.7.1-150400.3.28.1 updated
- libfreetype6-2.10.4-150000.4.22.1 updated
- libgnutls30-3.7.3-150400.4.47.1 updated
- libprocps8-3.3.17-150000.7.42.1 updated
- libpython3_6m1_0-3.6.15-150300.10.84.1 updated
- libsqlite3-0-3.49.1-150000.3.27.1 updated
- libtasn1-6-4.13-150000.4.11.1 updated
- libtasn1-4.13-150000.4.11.1 updated
- libxml2-2-2.10.3-150500.5.26.1 updated
- libzypp-17.36.3-150500.6.42.1 updated
- openssh-clients-8.4p1-150300.3.42.1 updated
- openssh-common-8.4p1-150300.3.42.1 updated
- openssh-server-8.4p1-150300.3.42.1 updated
- openssh-8.4p1-150300.3.42.1 updated
- pam-1.3.0-150000.6.76.1 updated
- procps-3.3.17-150000.7.42.1 updated
- python-azure-agent-config-server-2.12.0.4-150100.3.47.1 updated
- python-azure-agent-2.12.0.4-150100.3.47.1 updated
- python3-Jinja2-2.10.1-150000.3.21.1 updated
- python3-base-3.6.15-150300.10.84.1 updated
- python3-3.6.15-150300.10.84.1 updated
- supportutils-3.2.10-150300.7.35.36.4 updated
- suse-build-key-12.0-150000.8.58.1 updated
- timezone-2025b-150000.75.34.2 updated
- vim-data-common-9.1.1176-150500.20.24.2 updated
- vim-9.1.1176-150500.20.24.2 updated
- zypper-1.14.85-150500.6.26.1 updated
- libxslt1-1.1.34-150400.3.3.1 removed
- python-instance-billing-flavor-check-0.1.2-150000.1.17.1 removed
- python3-cssselect-1.0.3-150400.3.7.4 removed
- python3-lxml-4.9.1-150500.3.4.3 removed


More information about the sle-container-updates mailing list