SUSE-IU-2025:1325-1: Security update of suse-sles-15-sp5-chost-byos-v20250512-hvm-ssd-x86_64

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Wed May 14 07:02:51 UTC 2025


SUSE Image Update Advisory: suse-sles-15-sp5-chost-byos-v20250512-hvm-ssd-x86_64
-----------------------------------------------------------------
Image Advisory ID : SUSE-IU-2025:1325-1
Image Tags        : suse-sles-15-sp5-chost-byos-v20250512-hvm-ssd-x86_64:20250512
Image Release     : 
Severity          : important
Type              : security
References        : 1065729 1180814 1183663 1183682 1189788 1190336 1190768 1190786
                        1193173 1193629 1194869 1194869 1194904 1195823 1196444 1197158
                        1197174 1197227 1197246 1197302 1197331 1197472 1197661 1197926
                        1198019 1198021 1198240 1198577 1198660 1199657 1200045 1200571
                        1200807 1200809 1200810 1200824 1200825 1200871 1200872 1201193
                        1201218 1201323 1201381 1201610 1202672 1202711 1202712 1202771
                        1202774 1202778 1202781 1203699 1203769 1204171 1205205 1205701
                        1206048 1206049 1206451 1207034 1207186 1207361 1207593 1207640
                        1207878 1208995 1209262 1209547 1209788 1209980 1210050 1210647
                        1211263 1211547 1213167 1213291 1214290 1214713 1216049 1216091
                        1216146 1216147 1216150 1216151 1216228 1216229 1216230 1216231
                        1216232 1216233 1216241 1216388 1216522 1216813 1216827 1216938
                        1217287 1218201 1218282 1218324 1218450 1218812 1218814 1219241
                        1219639 1220946 1221651 1222021 1222650 1222896 1223330 1223384
                        1225428 1225736 1225742 1225742 1226848 1226980 1227127 1228265
                        1228434 1228537 1228592 1229312 1229685 1229822 1230078 1230341
                        1230371 1230432 1230527 1230697 1231088 1231375 1231396 1231423
                        1231432 1231472 1231838 1231847 1231854 1232234 1232234 1232299
                        1232472 1232743 1232914 1232919 1233028 1233055 1233097 1233103
                        1233112 1233137 1233307 1233464 1233479 1233488 1233557 1233606
                        1233608 1233609 1233610 1233612 1233613 1233614 1233615 1233616
                        1233617 1233642 1233701 1233726 1233749 1233749 1233778 1234024
                        1234025 1234074 1234078 1234087 1234089 1234153 1234154 1234155
                        1234223 1234381 1234383 1234452 1234452 1234650 1234683 1234690
                        1234798 1234825 1234829 1234832 1234853 1234884 1234889 1234891
                        1234894 1234895 1234896 1234896 1234899 1234900 1234905 1234909
                        1234916 1234918 1234922 1234930 1234931 1234934 1234958 1234962
                        1234963 1234999 1235002 1235009 1235011 1235053 1235054 1235057
                        1235059 1235061 1235073 1235100 1235111 1235122 1235123 1235133
                        1235134 1235217 1235222 1235230 1235249 1235410 1235430 1235433
                        1235441 1235451 1235458 1235466 1235473 1235480 1235481 1235491
                        1235495 1235496 1235521 1235528 1235557 1235563 1235570 1235584
                        1235599 1235611 1235635 1235641 1235643 1235645 1235647 1235695
                        1235723 1235739 1235747 1235751 1235759 1235764 1235768 1235806
                        1235812 1235814 1235818 1235842 1235870 1235920 1235969 1236033
                        1236133 1236151 1236282 1236289 1236316 1236317 1236384 1236481
                        1236576 1236628 1236661 1236677 1236705 1236757 1236758 1236760
                        1236761 1236777 1236779 1236820 1236842 1236878 1236939 1236951
                        1236974 1236983 1237002 1237006 1237008 1237009 1237010 1237011
                        1237012 1237013 1237014 1237025 1237028 1237029 1237040 1237044
                        1237137 1237139 1237294 1237316 1237335 1237363 1237367 1237370
                        1237418 1237521 1237530 1237693 1237718 1237721 1237722 1237723
                        1237724 1237725 1237726 1237727 1237728 1237729 1237730 1237733
                        1237734 1237735 1237736 1237737 1237738 1237739 1237740 1237742
                        1237743 1237744 1237745 1237746 1237748 1237749 1237751 1237752
                        1237753 1237755 1237759 1237761 1237763 1237766 1237767 1237768
                        1237774 1237775 1237778 1237779 1237780 1237782 1237783 1237784
                        1237785 1237786 1237787 1237788 1237789 1237790 1237792 1237794
                        1237795 1237797 1237798 1237799 1237807 1237808 1237809 1237810
                        1237812 1237813 1237814 1237815 1237816 1237817 1237818 1237820
                        1237821 1237823 1237824 1237826 1237827 1237829 1237831 1237835
                        1237836 1237837 1237839 1237840 1237845 1237846 1237865 1237868
                        1237872 1237892 1237903 1237904 1237916 1237918 1237922 1237925
                        1237926 1237927 1237928 1237929 1237931 1237932 1237933 1237937
                        1237940 1237941 1237942 1237946 1237951 1237952 1237954 1237955
                        1237957 1237958 1237959 1237960 1237961 1237962 1237963 1237965
                        1237966 1237967 1237968 1237969 1237970 1237971 1237972 1237973
                        1237975 1237976 1237978 1237979 1237980 1237982 1237983 1237984
                        1237986 1237987 1237990 1237992 1237996 1237997 1237998 1237999
                        1238000 1238003 1238004 1238005 1238006 1238007 1238009 1238010
                        1238011 1238012 1238013 1238014 1238016 1238017 1238018 1238019
                        1238021 1238022 1238024 1238025 1238030 1238032 1238033 1238036
                        1238037 1238041 1238046 1238047 1238048 1238069 1238071 1238077
                        1238079 1238080 1238083 1238084 1238085 1238086 1238089 1238090
                        1238091 1238092 1238096 1238097 1238099 1238103 1238105 1238106
                        1238107 1238108 1238110 1238111 1238112 1238113 1238114 1238115
                        1238116 1238118 1238120 1238122 1238123 1238125 1238126 1238127
                        1238128 1238131 1238134 1238135 1238138 1238139 1238140 1238142
                        1238144 1238146 1238147 1238149 1238150 1238153 1238155 1238156
                        1238157 1238158 1238160 1238162 1238166 1238167 1238168 1238169
                        1238170 1238171 1238172 1238175 1238176 1238177 1238178 1238179
                        1238180 1238181 1238183 1238184 1238187 1238221 1238222 1238226
                        1238228 1238229 1238231 1238233 1238234 1238235 1238236 1238238
                        1238239 1238240 1238241 1238242 1238243 1238244 1238246 1238247
                        1238248 1238249 1238252 1238253 1238255 1238256 1238257 1238260
                        1238261 1238262 1238263 1238264 1238266 1238267 1238268 1238269
                        1238270 1238271 1238272 1238274 1238275 1238276 1238277 1238278
                        1238279 1238281 1238282 1238283 1238284 1238285 1238286 1238287
                        1238288 1238289 1238291 1238292 1238293 1238295 1238298 1238300
                        1238301 1238302 1238306 1238307 1238308 1238309 1238311 1238313
                        1238326 1238327 1238328 1238329 1238331 1238333 1238334 1238335
                        1238336 1238337 1238338 1238339 1238341 1238343 1238344 1238345
                        1238372 1238373 1238374 1238376 1238377 1238378 1238381 1238382
                        1238383 1238385 1238386 1238387 1238388 1238389 1238390 1238391
                        1238392 1238393 1238394 1238395 1238396 1238397 1238398 1238400
                        1238401 1238410 1238411 1238413 1238415 1238416 1238417 1238418
                        1238419 1238420 1238422 1238423 1238424 1238428 1238429 1238430
                        1238431 1238432 1238433 1238434 1238435 1238436 1238437 1238440
                        1238441 1238442 1238443 1238444 1238445 1238447 1238453 1238454
                        1238458 1238459 1238462 1238463 1238465 1238467 1238469 1238533
                        1238536 1238538 1238539 1238540 1238542 1238543 1238546 1238551
                        1238552 1238556 1238557 1238599 1238600 1238601 1238602 1238605
                        1238612 1238613 1238615 1238616 1238617 1238618 1238619 1238621
                        1238623 1238625 1238626 1238630 1238631 1238632 1238633 1238635
                        1238636 1238638 1238639 1238640 1238641 1238642 1238643 1238645
                        1238646 1238647 1238648 1238649 1238650 1238653 1238654 1238655
                        1238658 1238661 1238662 1238663 1238664 1238666 1238668 1238705
                        1238707 1238710 1238712 1238718 1238719 1238721 1238722 1238727
                        1238729 1238750 1238787 1238789 1238792 1238799 1238803 1238804
                        1238805 1238806 1238808 1238809 1238810 1238811 1238814 1238815
                        1238816 1238817 1238818 1238819 1238820 1238821 1238822 1238823
                        1238825 1238830 1238834 1238835 1238836 1238838 1238843 1238867
                        1238868 1238869 1238870 1238871 1238878 1238879 1238889 1238892
                        1238893 1238897 1238898 1238899 1238902 1238911 1238916 1238919
                        1238925 1238930 1238933 1238936 1238937 1238938 1238939 1238941
                        1238942 1238943 1238944 1238945 1238946 1238948 1238949 1238950
                        1238951 1238952 1238953 1238954 1238956 1238957 1239001 1239004
                        1239016 1239035 1239040 1239041 1239051 1239060 1239070 1239071
                        1239073 1239076 1239095 1239109 1239115 1239126 1239185 1239322
                        1239452 1239454 1239465 1239618 1239663 1239680 1239749 1239909
                        1239968 1239969 1240009 1240133 1240205 1240207 1240208 1240210
                        1240212 1240213 1240218 1240220 1240227 1240229 1240231 1240242
                        1240245 1240247 1240250 1240254 1240256 1240264 1240266 1240272
                        1240275 1240276 1240278 1240279 1240280 1240281 1240282 1240283
                        1240284 1240286 1240288 1240290 1240292 1240293 1240297 1240304
                        1240308 1240309 1240317 1240318 1240322 1240343 1240343 1241020
                        1241078 1241189 1241453 1241551 1241678 CVE-2017-5753 CVE-2021-4453
                        CVE-2021-4454 CVE-2021-47517 CVE-2021-47631 CVE-2021-47632 CVE-2021-47633
                        CVE-2021-47635 CVE-2021-47636 CVE-2021-47637 CVE-2021-47638 CVE-2021-47639
                        CVE-2021-47641 CVE-2021-47642 CVE-2021-47643 CVE-2021-47644 CVE-2021-47645
                        CVE-2021-47646 CVE-2021-47647 CVE-2021-47648 CVE-2021-47649 CVE-2021-47650
                        CVE-2021-47651 CVE-2021-47652 CVE-2021-47653 CVE-2021-47654 CVE-2021-47656
                        CVE-2021-47657 CVE-2021-47659 CVE-2022-0168 CVE-2022-0995 CVE-2022-1016
                        CVE-2022-1048 CVE-2022-1184 CVE-2022-2977 CVE-2022-29900 CVE-2022-29901
                        CVE-2022-3303 CVE-2022-3435 CVE-2022-49044 CVE-2022-49050 CVE-2022-49051
                        CVE-2022-49053 CVE-2022-49054 CVE-2022-49055 CVE-2022-49056 CVE-2022-49057
                        CVE-2022-49058 CVE-2022-49059 CVE-2022-49060 CVE-2022-49061 CVE-2022-49062
                        CVE-2022-49063 CVE-2022-49064 CVE-2022-49065 CVE-2022-49066 CVE-2022-49070
                        CVE-2022-49071 CVE-2022-49073 CVE-2022-49074 CVE-2022-49075 CVE-2022-49076
                        CVE-2022-49078 CVE-2022-49080 CVE-2022-49082 CVE-2022-49083 CVE-2022-49084
                        CVE-2022-49085 CVE-2022-49086 CVE-2022-49088 CVE-2022-49089 CVE-2022-49090
                        CVE-2022-49091 CVE-2022-49092 CVE-2022-49093 CVE-2022-49095 CVE-2022-49096
                        CVE-2022-49097 CVE-2022-49098 CVE-2022-49099 CVE-2022-49100 CVE-2022-49102
                        CVE-2022-49103 CVE-2022-49104 CVE-2022-49105 CVE-2022-49106 CVE-2022-49107
                        CVE-2022-49109 CVE-2022-49111 CVE-2022-49112 CVE-2022-49113 CVE-2022-49114
                        CVE-2022-49115 CVE-2022-49116 CVE-2022-49118 CVE-2022-49119 CVE-2022-49120
                        CVE-2022-49121 CVE-2022-49122 CVE-2022-49123 CVE-2022-49125 CVE-2022-49126
                        CVE-2022-49128 CVE-2022-49129 CVE-2022-49130 CVE-2022-49131 CVE-2022-49132
                        CVE-2022-49133 CVE-2022-49134 CVE-2022-49135 CVE-2022-49136 CVE-2022-49137
                        CVE-2022-49138 CVE-2022-49139 CVE-2022-49144 CVE-2022-49145 CVE-2022-49147
                        CVE-2022-49148 CVE-2022-49151 CVE-2022-49153 CVE-2022-49154 CVE-2022-49155
                        CVE-2022-49156 CVE-2022-49157 CVE-2022-49158 CVE-2022-49159 CVE-2022-49160
                        CVE-2022-49162 CVE-2022-49163 CVE-2022-49164 CVE-2022-49165 CVE-2022-49174
                        CVE-2022-49175 CVE-2022-49176 CVE-2022-49177 CVE-2022-49178 CVE-2022-49179
                        CVE-2022-49180 CVE-2022-49182 CVE-2022-49183 CVE-2022-49185 CVE-2022-49187
                        CVE-2022-49188 CVE-2022-49189 CVE-2022-49192 CVE-2022-49193 CVE-2022-49194
                        CVE-2022-49196 CVE-2022-49199 CVE-2022-49200 CVE-2022-49201 CVE-2022-49202
                        CVE-2022-49203 CVE-2022-49204 CVE-2022-49205 CVE-2022-49206 CVE-2022-49207
                        CVE-2022-49208 CVE-2022-49209 CVE-2022-49212 CVE-2022-49213 CVE-2022-49214
                        CVE-2022-49215 CVE-2022-49216 CVE-2022-49217 CVE-2022-49218 CVE-2022-49219
                        CVE-2022-49221 CVE-2022-49222 CVE-2022-49224 CVE-2022-49225 CVE-2022-49226
                        CVE-2022-49227 CVE-2022-49228 CVE-2022-49230 CVE-2022-49232 CVE-2022-49233
                        CVE-2022-49235 CVE-2022-49236 CVE-2022-49237 CVE-2022-49238 CVE-2022-49239
                        CVE-2022-49241 CVE-2022-49242 CVE-2022-49243 CVE-2022-49244 CVE-2022-49246
                        CVE-2022-49247 CVE-2022-49248 CVE-2022-49249 CVE-2022-49250 CVE-2022-49251
                        CVE-2022-49252 CVE-2022-49253 CVE-2022-49254 CVE-2022-49256 CVE-2022-49257
                        CVE-2022-49258 CVE-2022-49259 CVE-2022-49260 CVE-2022-49261 CVE-2022-49262
                        CVE-2022-49263 CVE-2022-49264 CVE-2022-49265 CVE-2022-49266 CVE-2022-49268
                        CVE-2022-49269 CVE-2022-49270 CVE-2022-49271 CVE-2022-49272 CVE-2022-49273
                        CVE-2022-49274 CVE-2022-49275 CVE-2022-49276 CVE-2022-49277 CVE-2022-49278
                        CVE-2022-49279 CVE-2022-49280 CVE-2022-49281 CVE-2022-49283 CVE-2022-49285
                        CVE-2022-49286 CVE-2022-49287 CVE-2022-49288 CVE-2022-49290 CVE-2022-49291
                        CVE-2022-49292 CVE-2022-49293 CVE-2022-49294 CVE-2022-49295 CVE-2022-49296
                        CVE-2022-49297 CVE-2022-49298 CVE-2022-49299 CVE-2022-49300 CVE-2022-49301
                        CVE-2022-49302 CVE-2022-49304 CVE-2022-49305 CVE-2022-49306 CVE-2022-49307
                        CVE-2022-49308 CVE-2022-49309 CVE-2022-49310 CVE-2022-49311 CVE-2022-49312
                        CVE-2022-49313 CVE-2022-49314 CVE-2022-49315 CVE-2022-49316 CVE-2022-49319
                        CVE-2022-49320 CVE-2022-49321 CVE-2022-49322 CVE-2022-49323 CVE-2022-49325
                        CVE-2022-49326 CVE-2022-49327 CVE-2022-49328 CVE-2022-49329 CVE-2022-49330
                        CVE-2022-49331 CVE-2022-49332 CVE-2022-49333 CVE-2022-49335 CVE-2022-49336
                        CVE-2022-49337 CVE-2022-49338 CVE-2022-49339 CVE-2022-49341 CVE-2022-49342
                        CVE-2022-49343 CVE-2022-49345 CVE-2022-49346 CVE-2022-49347 CVE-2022-49348
                        CVE-2022-49349 CVE-2022-49350 CVE-2022-49351 CVE-2022-49352 CVE-2022-49353
                        CVE-2022-49354 CVE-2022-49356 CVE-2022-49357 CVE-2022-49359 CVE-2022-49362
                        CVE-2022-49365 CVE-2022-49367 CVE-2022-49368 CVE-2022-49370 CVE-2022-49371
                        CVE-2022-49373 CVE-2022-49375 CVE-2022-49376 CVE-2022-49377 CVE-2022-49378
                        CVE-2022-49379 CVE-2022-49381 CVE-2022-49382 CVE-2022-49384 CVE-2022-49385
                        CVE-2022-49386 CVE-2022-49389 CVE-2022-49390 CVE-2022-49392 CVE-2022-49394
                        CVE-2022-49396 CVE-2022-49397 CVE-2022-49398 CVE-2022-49399 CVE-2022-49400
                        CVE-2022-49402 CVE-2022-49404 CVE-2022-49406 CVE-2022-49407 CVE-2022-49409
                        CVE-2022-49410 CVE-2022-49411 CVE-2022-49412 CVE-2022-49413 CVE-2022-49414
                        CVE-2022-49416 CVE-2022-49418 CVE-2022-49419 CVE-2022-49421 CVE-2022-49422
                        CVE-2022-49424 CVE-2022-49426 CVE-2022-49427 CVE-2022-49429 CVE-2022-49430
                        CVE-2022-49431 CVE-2022-49432 CVE-2022-49433 CVE-2022-49434 CVE-2022-49435
                        CVE-2022-49436 CVE-2022-49437 CVE-2022-49438 CVE-2022-49440 CVE-2022-49441
                        CVE-2022-49442 CVE-2022-49443 CVE-2022-49444 CVE-2022-49445 CVE-2022-49446
                        CVE-2022-49447 CVE-2022-49448 CVE-2022-49449 CVE-2022-49451 CVE-2022-49453
                        CVE-2022-49455 CVE-2022-49458 CVE-2022-49459 CVE-2022-49460 CVE-2022-49462
                        CVE-2022-49463 CVE-2022-49465 CVE-2022-49466 CVE-2022-49467 CVE-2022-49468
                        CVE-2022-49470 CVE-2022-49472 CVE-2022-49473 CVE-2022-49474 CVE-2022-49475
                        CVE-2022-49476 CVE-2022-49477 CVE-2022-49478 CVE-2022-49479 CVE-2022-49480
                        CVE-2022-49481 CVE-2022-49482 CVE-2022-49483 CVE-2022-49484 CVE-2022-49485
                        CVE-2022-49486 CVE-2022-49487 CVE-2022-49488 CVE-2022-49489 CVE-2022-49490
                        CVE-2022-49491 CVE-2022-49492 CVE-2022-49493 CVE-2022-49494 CVE-2022-49495
                        CVE-2022-49497 CVE-2022-49498 CVE-2022-49499 CVE-2022-49501 CVE-2022-49502
                        CVE-2022-49503 CVE-2022-49504 CVE-2022-49505 CVE-2022-49506 CVE-2022-49507
                        CVE-2022-49508 CVE-2022-49509 CVE-2022-49510 CVE-2022-49511 CVE-2022-49512
                        CVE-2022-49514 CVE-2022-49515 CVE-2022-49516 CVE-2022-49517 CVE-2022-49518
                        CVE-2022-49519 CVE-2022-49520 CVE-2022-49521 CVE-2022-49522 CVE-2022-49523
                        CVE-2022-49524 CVE-2022-49525 CVE-2022-49526 CVE-2022-49527 CVE-2022-49529
                        CVE-2022-49530 CVE-2022-49532 CVE-2022-49533 CVE-2022-49534 CVE-2022-49535
                        CVE-2022-49536 CVE-2022-49537 CVE-2022-49538 CVE-2022-49541 CVE-2022-49542
                        CVE-2022-49543 CVE-2022-49544 CVE-2022-49545 CVE-2022-49546 CVE-2022-49548
                        CVE-2022-49549 CVE-2022-49551 CVE-2022-49552 CVE-2022-49555 CVE-2022-49556
                        CVE-2022-49559 CVE-2022-49560 CVE-2022-49562 CVE-2022-49563 CVE-2022-49564
                        CVE-2022-49565 CVE-2022-49566 CVE-2022-49568 CVE-2022-49569 CVE-2022-49570
                        CVE-2022-49579 CVE-2022-49581 CVE-2022-49583 CVE-2022-49584 CVE-2022-49591
                        CVE-2022-49592 CVE-2022-49603 CVE-2022-49605 CVE-2022-49606 CVE-2022-49607
                        CVE-2022-49609 CVE-2022-49610 CVE-2022-49611 CVE-2022-49613 CVE-2022-49615
                        CVE-2022-49616 CVE-2022-49617 CVE-2022-49618 CVE-2022-49621 CVE-2022-49623
                        CVE-2022-49624 CVE-2022-49625 CVE-2022-49626 CVE-2022-49627 CVE-2022-49628
                        CVE-2022-49631 CVE-2022-49634 CVE-2022-49635 CVE-2022-49638 CVE-2022-49640
                        CVE-2022-49641 CVE-2022-49642 CVE-2022-49643 CVE-2022-49644 CVE-2022-49645
                        CVE-2022-49646 CVE-2022-49647 CVE-2022-49648 CVE-2022-49649 CVE-2022-49650
                        CVE-2022-49652 CVE-2022-49653 CVE-2022-49655 CVE-2022-49656 CVE-2022-49657
                        CVE-2022-49658 CVE-2022-49661 CVE-2022-49663 CVE-2022-49665 CVE-2022-49667
                        CVE-2022-49668 CVE-2022-49670 CVE-2022-49671 CVE-2022-49672 CVE-2022-49673
                        CVE-2022-49674 CVE-2022-49675 CVE-2022-49676 CVE-2022-49677 CVE-2022-49678
                        CVE-2022-49679 CVE-2022-49680 CVE-2022-49683 CVE-2022-49685 CVE-2022-49686
                        CVE-2022-49687 CVE-2022-49688 CVE-2022-49693 CVE-2022-49694 CVE-2022-49695
                        CVE-2022-49697 CVE-2022-49699 CVE-2022-49700 CVE-2022-49701 CVE-2022-49703
                        CVE-2022-49704 CVE-2022-49705 CVE-2022-49707 CVE-2022-49708 CVE-2022-49710
                        CVE-2022-49711 CVE-2022-49712 CVE-2022-49713 CVE-2022-49714 CVE-2022-49715
                        CVE-2022-49716 CVE-2022-49719 CVE-2022-49720 CVE-2022-49721 CVE-2022-49722
                        CVE-2022-49723 CVE-2022-49724 CVE-2022-49725 CVE-2022-49726 CVE-2022-49729
                        CVE-2022-49730 CVE-2022-49731 CVE-2022-49732 CVE-2022-49733 CVE-2022-49739
                        CVE-2022-49746 CVE-2022-49748 CVE-2022-49751 CVE-2022-49753 CVE-2022-49755
                        CVE-2022-49759 CVE-2023-0179 CVE-2023-1192 CVE-2023-1652 CVE-2023-2162
                        CVE-2023-28410 CVE-2023-3567 CVE-2023-4016 CVE-2023-52572 CVE-2023-52930
                        CVE-2023-52933 CVE-2023-52935 CVE-2023-52939 CVE-2023-52941 CVE-2023-52973
                        CVE-2023-52974 CVE-2023-52975 CVE-2023-52976 CVE-2023-52979 CVE-2023-52983
                        CVE-2023-52984 CVE-2023-52988 CVE-2023-52989 CVE-2023-52992 CVE-2023-52993
                        CVE-2023-53000 CVE-2023-53005 CVE-2023-53006 CVE-2023-53007 CVE-2023-53008
                        CVE-2023-53010 CVE-2023-53015 CVE-2023-53016 CVE-2023-53019 CVE-2023-53023
                        CVE-2023-53024 CVE-2023-53025 CVE-2023-53026 CVE-2023-53028 CVE-2023-53029
                        CVE-2023-53030 CVE-2023-53033 CVE-2024-10041 CVE-2024-10041 CVE-2024-11168
                        CVE-2024-12133 CVE-2024-12243 CVE-2024-23650 CVE-2024-26634 CVE-2024-26758
                        CVE-2024-26943 CVE-2024-29018 CVE-2024-29018 CVE-2024-36898 CVE-2024-38599
                        CVE-2024-40635 CVE-2024-41047 CVE-2024-41110 CVE-2024-43790 CVE-2024-43802
                        CVE-2024-45019 CVE-2024-45306 CVE-2024-45774 CVE-2024-45775 CVE-2024-45776
                        CVE-2024-45777 CVE-2024-45778 CVE-2024-45779 CVE-2024-45780 CVE-2024-45781
                        CVE-2024-45782 CVE-2024-45783 CVE-2024-46858 CVE-2024-47678 CVE-2024-50051
                        CVE-2024-50115 CVE-2024-50136 CVE-2024-50142 CVE-2024-50151 CVE-2024-50195
                        CVE-2024-50199 CVE-2024-50210 CVE-2024-50275 CVE-2024-50290 CVE-2024-50299
                        CVE-2024-53063 CVE-2024-53095 CVE-2024-53103 CVE-2024-53104 CVE-2024-53112
                        CVE-2024-53121 CVE-2024-53124 CVE-2024-53127 CVE-2024-53129 CVE-2024-53135
                        CVE-2024-53138 CVE-2024-53141 CVE-2024-53144 CVE-2024-53148 CVE-2024-53151
                        CVE-2024-53166 CVE-2024-53169 CVE-2024-53171 CVE-2024-53173 CVE-2024-53174
                        CVE-2024-53176 CVE-2024-53177 CVE-2024-53178 CVE-2024-53208 CVE-2024-53209
                        CVE-2024-53215 CVE-2024-53217 CVE-2024-53224 CVE-2024-53226 CVE-2024-53227
                        CVE-2024-53229 CVE-2024-53239 CVE-2024-53690 CVE-2024-54680 CVE-2024-55916
                        CVE-2024-56171 CVE-2024-56531 CVE-2024-56532 CVE-2024-56533 CVE-2024-56539
                        CVE-2024-56548 CVE-2024-56557 CVE-2024-56558 CVE-2024-56562 CVE-2024-56567
                        CVE-2024-56588 CVE-2024-56595 CVE-2024-56596 CVE-2024-56597 CVE-2024-56600
                        CVE-2024-56601 CVE-2024-56602 CVE-2024-56605 CVE-2024-56623 CVE-2024-56629
                        CVE-2024-56631 CVE-2024-56642 CVE-2024-56644 CVE-2024-56645 CVE-2024-56648
                        CVE-2024-56650 CVE-2024-56651 CVE-2024-56658 CVE-2024-56661 CVE-2024-56664
                        CVE-2024-56678 CVE-2024-56681 CVE-2024-56698 CVE-2024-56701 CVE-2024-56704
                        CVE-2024-56722 CVE-2024-56737 CVE-2024-56739 CVE-2024-56745 CVE-2024-56747
                        CVE-2024-56754 CVE-2024-56756 CVE-2024-56759 CVE-2024-56765 CVE-2024-56776
                        CVE-2024-56777 CVE-2024-56778 CVE-2024-57791 CVE-2024-57792 CVE-2024-57793
                        CVE-2024-57798 CVE-2024-57849 CVE-2024-57850 CVE-2024-57876 CVE-2024-57893
                        CVE-2024-57897 CVE-2024-57948 CVE-2024-57996 CVE-2024-58013 CVE-2024-58014
                        CVE-2024-8176 CVE-2024-8805 CVE-2025-0395 CVE-2025-0622 CVE-2025-0624
                        CVE-2025-0677 CVE-2025-0678 CVE-2025-0684 CVE-2025-0685 CVE-2025-0686
                        CVE-2025-0689 CVE-2025-0690 CVE-2025-0938 CVE-2025-1118 CVE-2025-1125
                        CVE-2025-1215 CVE-2025-21647 CVE-2025-21690 CVE-2025-21692 CVE-2025-21693
                        CVE-2025-21699 CVE-2025-21718 CVE-2025-21772 CVE-2025-21780 CVE-2025-22134
                        CVE-2025-22868 CVE-2025-22869 CVE-2025-2312 CVE-2025-24014 CVE-2025-24928
                        CVE-2025-2588 CVE-2025-26465 CVE-2025-27113 CVE-2025-27363 CVE-2025-27516
                        CVE-2025-29087 CVE-2025-29088 CVE-2025-32414 CVE-2025-32415 CVE-2025-3277
-----------------------------------------------------------------

The container suse-sles-15-sp5-chost-byos-v20250512-hvm-ssd-x86_64 was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:508-1
Released:    Thu Feb 13 12:29:31 2025
Summary:     Recommended update for findutils
Type:        recommended
Severity:    moderate
References:  1231472
This update for findutils fixes the following issue:

- fix crash when file system loop was encountered (bsc#1231472).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:548-1
Released:    Fri Feb 14 11:19:24 2025
Summary:     Security update for libtasn1
Type:        security
Severity:    important
References:  1236878,CVE-2024-12133
This update for libtasn1 fixes the following issues:

- CVE-2024-12133: the processing of input DER data containing a large number of SEQUENCE OF or SET OF elements takes
  quadratic time to complete. (bsc#1236878)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:554-1
Released:    Fri Feb 14 16:10:40 2025
Summary:     Security update for python3
Type:        security
Severity:    moderate
References:  1236705,CVE-2025-0938
This update for python3 fixes the following issues:

- CVE-2025-0938: domain names containing square brackets are not identified as incorrect by urlparse. (bsc#1236705)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:562-1
Released:    Mon Feb 17 12:43:41 2025
Summary:     Security update for glibc
Type:        security
Severity:    low
References:  1236282,CVE-2025-0395
This update for glibc fixes the following issues:

- CVE-2025-0395: Fix underallocation of abort_msg_s struct (bsc#1236282)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:577-1
Released:    Tue Feb 18 13:51:28 2025
Summary:     Security update for the Linux Kernel
Type:        security
Severity:    important
References:  1194869,1216813,1223384,1225736,1226848,1226980,1228537,1228592,1230341,1230432,1230527,1230697,1231088,1231847,1232914,1233028,1233055,1233097,1233103,1233112,1233464,1233488,1233642,1233778,1234024,1234025,1234078,1234087,1234153,1234155,1234223,1234381,1234683,1234690,1234825,1234829,1234832,1234884,1234889,1234896,1234899,1234900,1234905,1234909,1234916,1234918,1234922,1234930,1234931,1234934,1234962,1234999,1235002,1235009,1235011,1235053,1235057,1235059,1235100,1235122,1235123,1235133,1235134,1235217,1235222,1235230,1235249,1235410,1235430,1235433,1235441,1235451,1235458,1235466,1235473,1235480,1235491,1235495,1235496,1235521,1235557,1235563,1235570,1235584,1235611,1235635,1235641,1235643,1235645,1235647,1235723,1235739,1235747,1235759,1235764,1235768,1235806,1235812,1235814,1235818,1235842,1235920,1235969,1236628,CVE-2024-26758,CVE-2024-26943,CVE-2024-36898,CVE-2024-38599,CVE-2024-41047,CVE-2024-45019,CVE-2024-46858,CVE-2024-50051,CVE-2024-50136,CVE-2024-50142,CVE
 -2024-50151,CVE-2024-50195,CVE-2024-50199,CVE-2024-50210,CVE-2024-50275,CVE-2024-50299,CVE-2024-53095,CVE-2024-53103,CVE-2024-53104,CVE-2024-53112,CVE-2024-53121,CVE-2024-53127,CVE-2024-53129,CVE-2024-53138,CVE-2024-53141,CVE-2024-53144,CVE-2024-53148,CVE-2024-53151,CVE-2024-53166,CVE-2024-53169,CVE-2024-53171,CVE-2024-53174,CVE-2024-53177,CVE-2024-53208,CVE-2024-53209,CVE-2024-53215,CVE-2024-53217,CVE-2024-53224,CVE-2024-53227,CVE-2024-53229,CVE-2024-53690,CVE-2024-54680,CVE-2024-55916,CVE-2024-56531,CVE-2024-56532,CVE-2024-56533,CVE-2024-56557,CVE-2024-56558,CVE-2024-56562,CVE-2024-56567,CVE-2024-56588,CVE-2024-56595,CVE-2024-56596,CVE-2024-56597,CVE-2024-56600,CVE-2024-56601,CVE-2024-56602,CVE-2024-56623,CVE-2024-56629,CVE-2024-56631,CVE-2024-56642,CVE-2024-56644,CVE-2024-56645,CVE-2024-56648,CVE-2024-56650,CVE-2024-56658,CVE-2024-56661,CVE-2024-56664,CVE-2024-56678,CVE-2024-56681,CVE-2024-56698,CVE-2024-56701,CVE-2024-56704,CVE-2024-56722,CVE-2024-56739,CVE-2024-56745,CVE-2024-5
 6747,CVE-2024-56754,CVE-2024-56756,CVE-2024-56759,CVE-2024-56765,CVE-2024-56776,CVE-2024-56777,CVE-2024-56778,CVE-2024-57791,CVE-2024-57792,CVE-2024-57793,CVE-2024-57798,CVE-2024-57849,CVE-2024-57850,CVE-2024-57876,CVE-2024-57893,CVE-2024-57897,CVE-2024-8805

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-36898: gpiolib: cdev: fix uninitialised kfifo (bsc#1225736).
- CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync (bsc#1231088).
- CVE-2024-50142: xfrm: validate new SA's prefixlen using SA family when sel.family is unset (bsc#1233028).
- CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request (bsc#1233055).
- CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112).
- CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb() (bsc#1233488).
- CVE-2024-53104: media: uvcvideo: Skip parsing frames of type UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).
- CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234884).
- CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896).
- CVE-2024-53209: bnxt_en: Fix receive ring space parameters when XDP is active (bsc#1235002).
- CVE-2024-53227: scsi: bfa: Fix use-after-free in bfad_im_module_exit() (bsc#1235011).
- CVE-2024-56588: scsi: hisi_sas: Create all dump files during debugfs initialization (bsc#1235123).
- CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in inet6_create() (bsc#1235217).
- CVE-2024-56601: net: inet: do not leave a dangling sk pointer in inet_create() (bsc#1235230).
- CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() (bsc#1235521).
- CVE-2024-56623: scsi: qla2xxx: Fix use after free on unload (bsc#1235466).
- CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release() (bsc#1235480).
- CVE-2024-56642: tipc: Fix use-after-free of kernel socket in cleanup_bearer() (bsc#1235433).
- CVE-2024-56645: can: j1939: j1939_session_new(): fix skb reference counting (bsc#1235134).
- CVE-2024-56648: net: hsr: avoid potential out-of-bound access in fill_frame_info() (bsc#1235451).
- CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check() (bsc#1235430).
- CVE-2024-56658: net: defer final 'struct net' free in netns dismantle (bsc#1235441).
- CVE-2024-56664: bpf, sockmap: Fix race between element replace and close() (bsc#1235249).
- CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).
- CVE-2024-56747: scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() (bsc#1234934).
- CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing is enabled (bsc#1235645).
- CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining clc data (bsc#1235759).
- CVE-2024-57792: power: supply: gpio-charger: Fix set charge current limits (bsc#1235764).
- CVE-2024-57793: virt: tdx-guest: Just leak decrypted memory on unrecoverable errors (bsc#1235768).
- CVE-2024-57798: drm/dp_mst: Ensure mst_primary pointer is valid in drm_dp_mst_handle_up_req() (bsc#1235818).
- CVE-2024-57849: s390/cpum_sf: Handle CPU hotplug remove during sampling (bsc#1235814).
- CVE-2024-57876: drm/dp_mst: Fix resetting msg rx state after topology removal (bsc#1235806).
- CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages (bsc#1235920).
- CVE-2024-57897: drm/amdkfd: Correct the migration DMA map direction (bsc#1235969).

The following non-security bugs were fixed:

- NFS: Adjust the amount of readahead performed by NFS readdir (bsc#1231847).
- NFS: Do not flush the readdir cache in nfs_dentry_iput() (bsc#1231847).
- NFS: Improve heuristic for readdirplus (bsc#1231847).
- NFS: Trigger the 'ls -l' readdir heuristic sooner (bsc#1231847).
- VFS: use system_unbound_wq for delayed_mntput (bsc#1234683).
- ceph: improve error handling and short/overflow-read logic in __ceph_sync_read() (bsc#1228592).
- ibmvnic: Free any outstanding tx skbs during scrq reset (bsc#1226980).
- netfilter: nf_tables: validate family when identifying table via handle (bsc#1233778).
- powerpc/pseries/vas: Add close() callback in vas_vm_ops struct (bsc#1234825).
- tipc: fix NULL deref in cleanup_bearer() (bsc#1235433).
- x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0 (git-fixes).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:587-1
Released:    Wed Feb 19 08:29:17 2025
Summary:     Security update for grub2
Type:        security
Severity:    important
References:  1233606,1233608,1233609,1233610,1233612,1233613,1233614,1233615,1233616,1233617,1234958,1236316,1236317,1237002,1237006,1237008,1237009,1237010,1237011,1237012,1237013,1237014,CVE-2024-45774,CVE-2024-45775,CVE-2024-45776,CVE-2024-45777,CVE-2024-45778,CVE-2024-45779,CVE-2024-45780,CVE-2024-45781,CVE-2024-45782,CVE-2024-45783,CVE-2024-56737,CVE-2025-0622,CVE-2025-0624,CVE-2025-0677,CVE-2025-0678,CVE-2025-0684,CVE-2025-0685,CVE-2025-0686,CVE-2025-0689,CVE-2025-0690,CVE-2025-1118,CVE-2025-1125
This update for grub2 fixes the following issues:

- CVE-2024-45781: Fixed strcpy overflow in ufs. (bsc#1233617)
- CVE-2024-56737: Fixed a heap-based buffer overflow in hfs. (bsc#1234958)
- CVE-2024-45782: Fixed strcpy overflow in hfs. (bsc#1233615)
- CVE-2024-45780: Fixed an overflow in tar/cpio. (bsc#1233614)
- CVE-2024-45783: Fixed a refcount overflow in hfsplus. (bsc#1233616)
- CVE-2024-45774: Fixed a heap overflow in JPEG parser. (bsc#1233609)
- CVE-2024-45775: Fixed a missing NULL check in extcmd parser. (bsc#1233610)
- CVE-2024-45776: Fixed an overflow in .MO file handling. (bsc#1233612)
- CVE-2024-45777: Fixed an integer overflow in gettext. (bsc#1233613)
- CVE-2024-45778: Fixed bfs filesystem by removing it from lockdown capable modules. (bsc#1233606)
- CVE-2024-45779: Fixed a heap overflow in bfs. (bsc#1233608)
- CVE-2025-0624: Fixed an out-of-bounds write during the network boot process. (bsc#1236316)
- CVE-2025-0622: Fixed a use-after-free when handling hooks during module unload in command/gpg . (bsc#1236317)
- CVE-2025-0690: Fixed an integer overflow that may lead to an out-of-bounds write through the read command.
  (bsc#1237012)
- CVE-2025-1118: Fixed an issue where the dump command was not being blocked when grub was in lockdown mode.
  (bsc#1237013)
- CVE-2025-0677: Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in ufs.
  (bsc#1237002)
- CVE-2025-0684: Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in reiserfs.
  (bsc#1237008)
- CVE-2025-0685: Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in jfs.
  (bsc#1237009)
- CVE-2025-0686: Fixed an integer overflow that may lead to an out-of-bounds write when handling symlinks in romfs.
  (bsc#1237010)
- CVE-2025-0689: Fixed a heap-based buffer overflow in udf that may lead to arbitrary code execution. (bsc#1237011)
- CVE-2025-1125: Fixed an integer overflow that may lead to an out-of-bounds write in hfs. (bsc#1237014)
- CVE-2025-0678: Fixed an integer overflow that may lead to an out-of-bounds write in squash4. (bsc#1237006)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:605-1
Released:    Thu Feb 20 15:42:48 2025
Summary:     Security update for openssh
Type:        security
Severity:    moderate
References:  1237040,CVE-2025-26465
This update for openssh fixes the following issues:

- CVE-2025-26465: Fixed MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client (bsc#1237040).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:677-1
Released:    Mon Feb 24 11:59:00 2025
Summary:     Recommended update for libzypp, zypper
Type:        recommended
Severity:    important
References:  1228434,1236384,1236820,1236939,1236983
This update for libzypp, zypper fixes the following issues:

- Don't issue deprecated warnings if -DNDEBUG is set (bsc#1236983)
- Drop zypp-CheckAccessDeleted in favor of 'zypper ps'
- Fix Repoverification plugin not being executed
- Refresh: Fetch the master index file before key and signature (bsc#1236820)
- Deprecate RepoReports we do not trigger
- Let zypper dup fail in case of (temporarily) unaccessible repos (bsc#1228434, bsc#1236939)
- New system-architecture command (bsc#1236384)
- Change versioncmp command to return exit code according to the comparison result

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:723-1
Released:    Wed Feb 26 14:29:39 2025
Summary:     Security update for vim
Type:        security
Severity:    moderate
References:  1229685,1229822,1230078,1235695,1236151,1237137,CVE-2024-43790,CVE-2024-43802,CVE-2024-45306,CVE-2025-1215,CVE-2025-22134,CVE-2025-24014
This update for vim fixes the following issues:

Update to version 9.1.1101:

- CVE-2024-43790: possible out-of-bounds read when performing a search command (bsc#1229685).
- CVE-2024-43802: heap buffer overflow due to incorrect flushing of the typeahead buffer (bsc#1229822).
- CVE-2024-45306: heap buffer overflow when cursor position is invalid (bsc#1230078).
- CVE-2025-22134: heap buffer overflow when switching to other buffers using the :all command with active visual mode
  (bsc#1235695).
- CVE-2025-24014: NULL pointer dereference may lead to segmentation fault when in silent Ex mode (bsc#1236151).
- CVE-2025-1215: memory corruption when manipulating the --log argument (bsc#1237137).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:741-1
Released:    Fri Feb 28 11:15:50 2025
Summary:     Security update for procps
Type:        security
Severity:    important
References:  1214290,1236842,CVE-2023-4016
This update for procps fixes the following issues:

- Integer overflow due to incomplete fix for CVE-2023-4016 can lead to segmentation fault in ps command when pid
  argument has a leading space (bsc#1236842, bsc#1214290).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:746-1
Released:    Fri Feb 28 17:10:22 2025
Summary:     Security update for libxml2
Type:        security
Severity:    important
References:  1237363,1237370,1237418,CVE-2024-56171,CVE-2025-24928,CVE-2025-27113
This update for libxml2 fixes the following issues:

- CVE-2024-56171: use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c
  (bsc#1237363).
- CVE-2025-24928: stack-based buffer overflow in xmlSnprintfElements in valid.c (bsc#1237370).
- CVE-2025-27113: NULL pointer dereference in xmlPatMatch in pattern.c (bsc#1237418).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:765-1
Released:    Mon Mar  3 09:44:13 2025
Summary:     Security update for gnutls
Type:        security
Severity:    moderate
References:  1236974,CVE-2024-12243
This update for gnutls fixes the following issues:

- CVE-2024-12243: quadratic complexity of DER input decoding in libtasn1 can lead to a DoS (bsc#1236974).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:776-1
Released:    Tue Mar  4 15:55:35 2025
Summary:     Security update for docker
Type:        security
Severity:    moderate
References:  1234089,1237335,CVE-2024-29018
This update for docker fixes the following issues:

Update to Docker 27.5.1-ce (bsc#1237335):

- CVE-2024-29018: External DNS requests from 'internal' networks could lead to data exfiltration (bsc#1234089).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:829-1
Released:    Tue Mar 11 08:36:43 2025
Summary:     Recommended update for kdump
Type:        recommended
Severity:    moderate
References:  1233137
This update for kdump fixes the following issue:

- Fix filtering ReadOnly keys in kdump_bond_config (bsc#1233137).  
  kdump fails to bring network due to bad bond config

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:830-1
Released:    Tue Mar 11 09:55:10 2025
Summary:     Recommended update for timezone
Type:        recommended
Severity:    moderate
References:  
This update for timezone fixes the following issues:

- Update to 2025a:
    * Paraguay adopts permanent -03 starting spring 2024
    * Improve pre-1991 data for the Philippines
    * Etc/Unknown is now reserved
    * Improve historical data for Mexico, Mongolia, and Portugal
    * System V names are now obsolescent
    * The main data form now uses %z
    * The code now conforms to RFC 8536 for early timestamps
    * Support POSIX.1-2024, which removes asctime_r and ctime_r
    * Assume POSIX.2-1992 or later for shell scripts
    * SUPPORT_C89 now defaults to 1

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:833-1
Released:    Tue Mar 11 11:53:19 2025
Summary:     Security update for the Linux Kernel
Type:        security
Severity:    important
References:  1208995,1220946,1225742,1232472,1232919,1233701,1233749,1234154,1234650,1234853,1234891,1234963,1235054,1235061,1235073,1235111,1236133,1236289,1236576,1236661,1236677,1236757,1236758,1236760,1236761,1236777,1236951,1237025,1237028,1237139,1237316,1237693,1238033,CVE-2022-49080,CVE-2023-1192,CVE-2023-52572,CVE-2024-50115,CVE-2024-53135,CVE-2024-53173,CVE-2024-53226,CVE-2024-53239,CVE-2024-56539,CVE-2024-56548,CVE-2024-56605,CVE-2024-57948,CVE-2025-21647,CVE-2025-21690,CVE-2025-21692,CVE-2025-21699

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace (bsc#1238033).
- CVE-2024-53135: KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN (bsc#1234154).
- CVE-2024-53226: RDMA/hns: Fix NULL pointer derefernce in hns_roce_map_mr_sg() (bsc#1236576)
- CVE-2024-57948: mac802154: check local interfaces before deleting sdata list (bsc#1236677).
- CVE-2025-21647: sched: sch_cake: add bounds checks to host bulk flow fairness counts (bsc#1236133).
- CVE-2025-21690: scsi: storvsc: Ratelimit warning logs to prevent VM denial of service (bsc#1237025).
- CVE-2025-21692: net: sched: fix ets qdisc OOB Indexing (bsc#1237028).
- CVE-2025-21699: gfs2: Truncate address space when flipping GFS2_DIF_JDATA flag (bsc#1237139).

The following non-security bugs were fixed:

- cpufreq/amd-pstate: Only print supported EPP values for performance governor (bsc#1236777).
- iavf: fix the waiting time for initial reset (bsc#1235111).
- ice: add ice_adapter for shared data across PFs on the same NIC (bsc#1235111).
- ice: avoid the PTP hardware semaphore in gettimex64 path (bsc#1235111).
- ice: fold ice_ptp_read_time into ice_ptp_gettimex64 (bsc#1235111).
- idpf: call set_real_num_queues in idpf_open (bsc#1236661 bsc#1237316).
- ipv4/tcp: do not use per netns ctl sockets (bsc#1237693).
- kabi: hide adding RCU head into struct netdev_name_node (bsc#1233749).
- net: Fix undefined behavior in netdev name allocation (bsc#1233749).
- net: avoid UAF on deleted altname (bsc#1233749).
- net: check for altname conflicts when changing netdev's netns (bsc#1233749).
- net: core: Use the bitmap API to allocate bitmaps (bsc#1233749).
- net: do not send a MOVE event when netdev changes netns (bsc#1233749).
- net: do not use input buffer of __dev_alloc_name() as a scratch space (bsc#1233749).
- net: fix ifname in netlink ntf during netns move (bsc#1233749).
- net: fix removing a namespace with conflicting altnames (bsc#1233749).
- net: free altname using an RCU callback (bsc#1233749).
- net: introduce a function to check if a netdev name is in use (bsc#1233749).
- net: make dev_alloc_name() call dev_prep_valid_name() (bsc#1233749).
- net: mana: Add get_link and get_link_ksettings in ethtool (bsc#1236761).
- net: mana: Cleanup 'mana' debugfs dir after cleanup of all children (bsc#1236760).
- net: mana: Enable debugfs files for MANA device (bsc#1236758).
- net: minor __dev_alloc_name() optimization (bsc#1233749).
- net: move altnames together with the netdevice (bsc#1233749).
- net: netvsc: Update default VMBus channels (bsc#1236757).
- net: reduce indentation of __dev_alloc_name() (bsc#1233749).
- net: remove dev_valid_name() check from __dev_alloc_name() (bsc#1233749).
- net: remove else after return in dev_prep_valid_name() (bsc#1233749).
- net: trust the bitmap in __dev_alloc_name() (bsc#1233749).
- nfsd: use explicit lock/unlock for directory ops (bsc#1234650 bsc#1233701 bsc#1232472).
- rcu: Remove rcu_is_idle_cpu() (bsc#1236289).
- scsi: storvsc: Set correct data length for sending SCSI command without payload (git-fixes).
- x86/aperfmperf: Dont wake idle CPUs in arch_freq_get_on_cpu() (bsc#1236289).
- x86/aperfmperf: Integrate the fallback code from show_cpuinfo() (bsc#1236289).
- x86/aperfmperf: Make parts of the frequency invariance code unconditional (bsc#1236289).
- x86/aperfmperf: Put frequency invariance aperf/mperf data into a struct (bsc#1236289).
- x86/aperfmperf: Replace aperfmperf_get_khz() (bsc#1236289).
- x86/aperfmperf: Replace arch_freq_get_on_cpu() (bsc#1236289).
- x86/aperfmperf: Restructure arch_scale_freq_tick() (bsc#1236289).
- x86/aperfmperf: Separate AP/BP frequency invariance init (bsc#1236289).
- x86/aperfmperf: Store aperf/mperf data for cpu frequency reads (bsc#1236289).
- x86/aperfmperf: Untangle Intel and AMD frequency invariance init (bsc#1236289).
- x86/aperfperf: Make it correct on 32bit and UP kernels (bsc#1236289).
- x86/smp: Move APERF/MPERF code where it belongs (bsc#1236289).
- x86/smp: Remove unnecessary assignment to local var freq_scale (bsc#1236289).
- x86/xen: add FRAME_END to xen_hypercall_hvm() (git-fixes).
- x86/xen: allow larger contiguous memory regions in PV guests (bsc#1236951).
- x86/xen: fix xen_hypercall_hvm() to not clobber %rbx (git-fixes).
- xen/swiotlb: relax alignment requirements (bsc#1236951).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:838-1
Released:    Tue Mar 11 13:11:21 2025
Summary:     Recommended update for libzypp, zypper
Type:        recommended
Severity:    important
References:  1189788,1216091,1236481,1237044
This update for libzypp, zypper fixes the following issues:

- Disable zypp.conf:download.use_deltarpm by default 
  Measurements show that you don't benefit from using deltarpms
  unless your network connection is very slow. That's why most
  distributions even stop offering deltarpms. The default remains
  unchanged on SUSE-15.6 and older.
- Make sure repo variables are evaluated in the right context
  (bsc#1237044)
- Introducing MediaCurl2 a alternative HTTP backend.
  This patch adds MediaCurl2 as a testbed for experimenting with a
  more simple way to download files. Set ZYPP_CURL2=1 in the
  environment to use it.
- Filesystem usrmerge must not be done in singletrans mode
  (bsc#1236481, bsc#1189788)
- Commit will amend the backend in case the transaction would
  perform a filesystem usrmerge.
- Workaround bsc#1216091 on Code16.
- Annonunce --root in commands not launching a Target
  (bsc#1237044)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:934-1
Released:    Wed Mar 19 11:08:10 2025
Summary:     Recommended update for grub2
Type:        recommended
Severity:    important
References:  1237865
This update for grub2 fixes the following issues:

- Fix zfs.mo not found message when booting on legacy BIOS (bsc#1237865)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:998-1
Released:    Tue Mar 25 03:07:02 2025
Summary:     Security update for freetype2
Type:        security
Severity:    important
References:  1239465,CVE-2025-27363
This update for freetype2 fixes the following issues:

- CVE-2025-27363: Fixed out-of-bounds write when attempting to parse font 
  subglyph structures related to TrueType GX and variable font files (bsc#1239465).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1004-1
Released:    Tue Mar 25 09:42:38 2025
Summary:     Security update for python-Jinja2
Type:        security
Severity:    moderate
References:  1238879,CVE-2025-27516
This update for python-Jinja2 fixes the following issues:

- CVE-2025-27516: Fixed sandbox breakout through attr filter selecting format method (bsc#1238879)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1035-1
Released:    Thu Mar 27 10:34:01 2025
Summary:     Recommended update for suse-build-key
Type:        recommended
Severity:    moderate
References:  1236779,1237294
This update for suse-build-key fixes the following issues:

- Changed and extented the SUSE Linux Enterprise 15 and 16 signing keys to use
  SHA256 GPG UIDs instead of SHA1. (bsc#1237294 bsc#1236779 jsc#PED-12321)
  - gpg-pubkey-3fa1d6ce-67c856ee.asc to gpg-pubkey-09d9ea69-67c857f3.asc
  - gpg-pubkey-09d9ea69-645b99ce.asc to gpg-pubkey-3fa1d6ce-63c9481c.asc
  - suse_ptf_key_2023.asc, suse_ptf_key.asc: adjusted

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1056-1
Released:    Fri Mar 28 18:06:22 2025
Summary:     Security update for python3
Type:        security
Severity:    moderate
References:  1233307,CVE-2024-11168
This update for python3 fixes the following issues:

- CVE-2024-11168: Fixed improper validation of IPv6 and IPvFuture addresses (bsc#1233307).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1062-1
Released:    Mon Mar 31 10:45:08 2025
Summary:     Security update for docker, docker-stable
Type:        security
Severity:    important
References:  1237367,1239185,1239322,CVE-2024-23650,CVE-2024-29018,CVE-2024-41110,CVE-2025-22868,CVE-2025-22869
This update for docker, docker-stable fixes the following issues:


- CVE-2025-22868: Fixed unexpected memory consumption during token parsing in golang.org/x/oauth2 (bsc#1239185).
- CVE-2025-22869: Fixed Denial of Service in the Key Exchange of golang.org/x/crypto/ssh (bsc#1239322).

Other fixes:
- Make container-selinux requirement conditional on selinux-policy (bsc#1237367)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1063-1
Released:    Mon Mar 31 11:04:42 2025
Summary:     Security update for apparmor
Type:        security
Severity:    moderate
References:  1234452
This update for apparmor fixes the following issues:

- Allow dovecot-auth to execute unix check password from /sbin, not only from /usr/bin (bsc#1234452).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1130-1
Released:    Thu Apr  3 15:08:55 2025
Summary:     Recommended update for ca-certificates-mozilla
Type:        recommended
Severity:    important
References:  1234798,1240009,1240343
This update for ca-certificates-mozilla fixes the following issues:

Update to 2.74 state of Mozilla SSL root CAs:

- Removed:

  * SwissSign Silver CA - G2

- Added:

  * D-TRUST BR Root CA 2 2023
  * D-TRUST EV Root CA 2 2023

Updated to 2.72 state of Mozilla SSL root CAs (bsc#1234798):

- Removed:

  * SecureSign RootCA11
  * Security Communication RootCA3

- Added:

  * TWCA CYBER Root CA
  * TWCA Global Root CA G2
  * SecureSign Root CA12
  * SecureSign Root CA14
  * SecureSign Root CA15

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1145-1
Released:    Mon Apr  7 06:41:42 2025
Summary:     Recommended update for hwinfo
Type:        recommended
Severity:    moderate
References:  1223330,1239663
This update for hwinfo fixes the following issues:

- Avoid reporting of spurious usb storage devices (bsc#1223330)
- Do not overdo usb device de-duplication (bsc#1239663)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1161-1
Released:    Mon Apr  7 17:29:45 2025
Summary:     Recommended update for vim
Type:        recommended
Severity:    moderate
References:  1235751
This update for vim fixes the following issues:

- Regression patch to fix (bsc#1235751).
- Version update 9.1.1176

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1191-1
Released:    Thu Apr 10 06:57:45 2025
Summary:     Recommended update for supportutils
Type:        recommended
Severity:    moderate
References:  1183663,1193173,1211547,1213291,1214713,1216049,1216146,1216147,1216150,1216151,1216228,1216229,1216230,1216231,1216232,1216233,1216241,1216388,1216522,1216827,1217287,1218201,1218282,1218324,1218812,1218814,1219241,1219639,1222021,1222650,1222896,1227127,1228265,1230371,1231396,1231423,1231838,1233726
This update for supportutils fixes the following issues:

- Version update 3.2.10, bugfixing.
  + Collect firewalld configuration
  + Ignore tasks/threads to prevent collecting duplicate data (bsc#1230371).
  + openldap2_5 support for SLES (bsc#1231838).
  + Added dbus_info for dbus.txt (bsc#1222650).
  + Map running PIDs to RPM package owner aiding BPF program detection (bsc#1222896, bsc#1213291, PED-8221).
  + Corrected display issues (bsc#1231396, bsc#1217287).
  + NFS takes too long, showmount times out (bsc#1231423).
  + Merged sle15 and master branches (bsc#1233726, PED-11669).
  + Extended scaling for performance (bsc#1214713).
  + Corrected SLE Micro version (bsc#1219241).
  + Check nvidida-persistenced state (bsc#1219639).
  + Corrected podman .ID error (bsc#1218812).
  + Remove duplicate non-root podman users (bsc#1218814).
  + Fixed smart disk error (bsc#1218282).
  + Fixed ipvsadm logic error (bsc#1218324).
  + Correctly detects Xen Dom0 (bsc#1218201).
  + Inhibit the conversion of port numbers to port names for network files.
  + powerpc: collect rtas_errd.log and lp_diag.log log files.
  + Get list of pam.d files.
  + Provides long listing for /etc/sssd/sssd.conf (bsc#1211547).
  + Optimize lsof usage (bsc#1183663).
  + Added mokutil commands for secureboot.
  + ipset - List entries for all sets.
  + Added nvme-stas configuration to nvme.txt (bsc#1216049).
  + Collects zypp history file  (bsc#1216522).
  + Collect HA related rpm package versions in ha.txt
  + Change -x OPTION to really be exclude only
  + Fixed kernel and added user live patching (PED-4524).
  + Fixed plugins creating empty files (bsc#1216388).
  + Remove supportutils requires for util-linux-systemd and kmod (bsc#1193173).
  + Added supportutils to current (PED-4456).
  + Changed config directory to /etc/supportutuils for all conf and header.txt (bsc#1216232).
  + Fixed supportconfig using external test command (bsc#1216150) and kdump, 
    analyzevmcore errors (bsc#1216146).
  + Support has been removed for scplugin.rc, use supportconfig.rc (bsc#1216241).
  + Remove check_service function from supportconfig.rc (bsc#1216231).
  + Removed older versions of SLES_VER (bsc#1216147).
  + Added timed command to fs-files.txt (bsc#1216827).
  + Cron and At are replaced with systemd.timer (bsc#1216229).
  + Offers apparmor or selinux based on configuration (bsc#1216233).
  + Filted proc access errors (bsc#1216151).
  + Remove all SuSE-release references (bsc#1216228).
  + Remove references to /etc/init.d (bsc#1216230).
  + Add capability in supportconfig to insert configs in summary.xml from command line option (bsc#1222021).
  + file sanitizing improvement request for boot (bsc#1227127).
  + Add 'read_values -s' output to supportconfig on s390x (bsc#1228265).
  + Usability enhancement for supportconfig (PED-8211).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1201-1
Released:    Fri Apr 11 12:15:58 2025
Summary:     Security update for expat
Type:        security
Severity:    important
References:  1239618,CVE-2024-8176
This update for expat fixes the following issues:

- CVE-2024-8176: Fixed denial of service from chaining a large number of entities caused 
  by stack overflow by resolving use of recursion (bsc#1239618)

Other fixes:
- version update to 2.7.1 (jsc#PED-12500)
     Bug fixes:
       #980 #989  Restore event pointer behavior from Expat 2.6.4
                    (that the fix to CVE-2024-8176 changed in 2.7.0);
                    affected API functions are:
                    - XML_GetCurrentByteCount
                    - XML_GetCurrentByteIndex
                    - XML_GetCurrentColumnNumber
                    - XML_GetCurrentLineNumber
                    - XML_GetInputContext
     Other changes:
       #976 #977  Autotools: Integrate files 'fuzz/xml_lpm_fuzzer.{cpp,proto}'
                    with Automake that were missing from 2.7.0 release tarballs
       #983 #984  Fix printf format specifiers for 32bit Emscripten
            #992  docs: Promote OpenSSF Best Practices self-certification
            #978  tests/benchmark: Resolve mistaken double close
            #986  Address compiler warnings
       #990 #993  Version info bumped from 11:1:10 (libexpat*.so.1.10.1)
                    to 11:2:10 (libexpat*.so.1.10.2); see https://verbump.de/
                    for what these numbers do
        Infrastructure:
            #982  CI: Start running Perl XML::Parser integration tests
            #987  CI: Enforce Clang Static Analyzer clean code
            #991  CI: Re-enable warning clang-analyzer-valist.Uninitialized
                    for clang-tidy
            #981  CI: Cover compilation with musl
       #983 #984  CI: Cover compilation with 32bit Emscripten
       #976 #977  CI: Protect against fuzzer files missing from future
                    release archives

- version update to 2.7.0
       #935 #937  Autotools: Make generated CMake files look for
                    libexpat. at SO_MAJOR@.dylib on macOS
            #925  Autotools: Sync CMake templates with CMake 3.29
  #945 #962 #966  CMake: Drop support for CMake <3.13
            #942  CMake: Small fuzzing related improvements
            #921  docs: Add missing documentation of error code
                    XML_ERROR_NOT_STARTED that was introduced with 2.6.4
            #941  docs: Document need for C++11 compiler for use from C++
            #959  tests/benchmark: Fix a (harmless) TOCTTOU
            #944  Windows: Fix installer target location of file xmlwf.xml
                    for CMake
            #953  Windows: Address warning -Wunknown-warning-option
                    about -Wno-pedantic-ms-format from LLVM MinGW
            #971  Address Cppcheck warnings
       #969 #970  Mass-migrate links from http:// to https://
    #947 #958 ..
       #974 #975  Document changes since the previous release
       #974 #975  Version info bumped from 11:0:10 (libexpat*.so.1.10.0)
                    to 11:1:10 (libexpat*.so.1.10.1); see https://verbump.de/
                    for what these numbers do

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1217-1
Released:    Sun Apr 13 12:16:40 2025
Summary:     Recommended update for ca-certificates-mozilla
Type:        recommended
Severity:    important
References:  1240343
This update for ca-certificates-mozilla fixes the following issues:

- Reenable the distrusted certs for now. as these only
  distrust 'new issued' certs starting after a certain date,
  while old certs should still work. (bsc#1240343)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1241-1
Released:    Mon Apr 14 12:37:06 2025
Summary:     Security update for the Linux Kernel
Type:        security
Severity:    important
References:  1065729,1180814,1183682,1190336,1190768,1190786,1193629,1194869,1194904,1195823,1196444,1197158,1197174,1197227,1197246,1197302,1197331,1197472,1197661,1197926,1198019,1198021,1198240,1198577,1198660,1199657,1200045,1200571,1200807,1200809,1200810,1200824,1200825,1200871,1200872,1201193,1201218,1201323,1201381,1201610,1202672,1202711,1202712,1202771,1202774,1202778,1202781,1203699,1203769,1204171,1205205,1205701,1206048,1206049,1206451,1207034,1207186,1207361,1207593,1207640,1207878,1209262,1209547,1209788,1209980,1210050,1210647,1211263,1213167,1218450,1221651,1225428,1225742,1229312,1231375,1231432,1231854,1232299,1232743,1233479,1233557,1233749,1234074,1234894,1234895,1234896,1235528,1235599,1235870,1237029,1237521,1237530,1237718,1237721,1237722,1237723,1237724,1237725,1237726,1237727,1237728,1237729,1237730,1237733,1237734,1237735,1237736,1237737,1237738,1237739,1237740,1237742,1237743,1237744,1237745,1237746,1237748,1237749,1237751,1237752,1237753,1237755,1237759,1
 237761,1237763,1237766,1237767,1237768,1237774,1237775,1237778,1237779,1237780,1237782,1237783,1237784,1237785,1237786,1237787,1237788,1237789,1237790,1237792,1237794,1237795,1237797,1237798,1237799,1237807,1237808,1237809,1237810,1237812,1237813,1237814,1237815,1237816,1237817,1237818,1237820,1237821,1237823,1237824,1237826,1237827,1237829,1237831,1237835,1237836,1237837,1237839,1237840,1237845,1237846,1237868,1237872,1237892,1237903,1237904,1237916,1237918,1237922,1237925,1237926,1237927,1237928,1237929,1237931,1237932,1237933,1237937,1237940,1237941,1237942,1237946,1237951,1237952,1237954,1237955,1237957,1237958,1237959,1237960,1237961,1237962,1237963,1237965,1237966,1237967,1237968,1237969,1237970,1237971,1237972,1237973,1237975,1237976,1237978,1237979,1237980,1237982,1237983,1237984,1237986,1237987,1237990,1237992,1237996,1237997,1237998,1237999,1238000,1238003,1238004,1238005,1238006,1238007,1238009,1238010,1238011,1238012,1238013,1238014,1238016,1238017,1238018,1238019,123802
 1,1238022,1238024,1238025,1238030,1238032,1238036,1238037,1238041,1238046,1238047,1238048,1238069,1238071,1238077,1238079,1238080,1238083,1238084,1238085,1238086,1238089,1238090,1238091,1238092,1238096,1238097,1238099,1238103,1238105,1238106,1238107,1238108,1238110,1238111,1238112,1238113,1238114,1238115,1238116,1238118,1238120,1238122,1238123,1238125,1238126,1238127,1238128,1238131,1238134,1238135,1238138,1238139,1238140,1238142,1238144,1238146,1238147,1238149,1238150,1238153,1238155,1238156,1238157,1238158,1238160,1238162,1238166,1238167,1238168,1238169,1238170,1238171,1238172,1238175,1238176,1238177,1238178,1238179,1238180,1238181,1238183,1238184,1238187,1238221,1238222,1238226,1238228,1238229,1238231,1238233,1238234,1238235,1238236,1238238,1238239,1238240,1238241,1238242,1238243,1238244,1238246,1238247,1238248,1238249,1238252,1238253,1238255,1238256,1238257,1238260,1238261,1238262,1238263,1238264,1238266,1238267,1238268,1238269,1238270,1238271,1238272,1238274,1238275,1238276,123
 8277,1238278,1238279,1238281,1238282,1238283,1238284,1238285,1238286,1238287,1238288,1238289,1238291,1238292,1238293,1238295,1238298,1238300,1238301,1238302,1238306,1238307,1238308,1238309,1238311,1238313,1238326,1238327,1238328,1238329,1238331,1238333,1238334,1238335,1238336,1238337,1238338,1238339,1238341,1238343,1238344,1238345,1238372,1238373,1238374,1238376,1238377,1238378,1238381,1238382,1238383,1238385,1238386,1238387,1238388,1238389,1238390,1238391,1238392,1238393,1238394,1238395,1238396,1238397,1238398,1238400,1238401,1238410,1238411,1238413,1238415,1238416,1238417,1238418,1238419,1238420,1238422,1238423,1238424,1238428,1238429,1238430,1238431,1238432,1238433,1238434,1238435,1238436,1238437,1238440,1238441,1238442,1238443,1238444,1238445,1238447,1238453,1238454,1238458,1238459,1238462,1238463,1238465,1238467,1238469,1238533,1238536,1238538,1238539,1238540,1238542,1238543,1238546,1238551,1238552,1238556,1238557,1238599,1238600,1238601,1238602,1238605,1238612,1238613,1238615,
 1238616,1238617,1238618,1238619,1238621,1238623,1238625,1238626,1238630,1238631,1238632,1238633,1238635,1238636,1238638,1238639,1238640,1238641,1238642,1238643,1238645,1238646,1238647,1238648,1238649,1238650,1238653,1238654,1238655,1238658,1238661,1238662,1238663,1238664,1238666,1238668,1238705,1238707,1238710,1238712,1238718,1238719,1238721,1238722,1238727,1238729,1238750,1238787,1238789,1238792,1238799,1238803,1238804,1238805,1238806,1238808,1238809,1238810,1238811,1238814,1238815,1238816,1238817,1238818,1238819,1238820,1238821,1238822,1238823,1238825,1238830,1238834,1238835,1238836,1238838,1238843,1238867,1238868,1238869,1238870,1238871,1238878,1238889,1238892,1238893,1238897,1238898,1238899,1238902,1238911,1238916,1238919,1238925,1238930,1238933,1238936,1238937,1238938,1238939,1238941,1238942,1238943,1238944,1238945,1238946,1238948,1238949,1238950,1238951,1238952,1238953,1238954,1238956,1238957,1239001,1239004,1239016,1239035,1239040,1239041,1239051,1239060,1239070,1239071,12390
 73,1239076,1239095,1239109,1239115,1239126,1239452,1239454,1239968,1239969,1240133,1240205,1240207,1240208,1240210,1240212,1240213,1240218,1240220,1240227,1240229,1240231,1240242,1240245,1240247,1240250,1240254,1240256,1240264,1240266,1240272,1240275,1240276,1240278,1240279,1240280,1240281,1240282,1240283,1240284,1240286,1240288,1240290,1240292,1240293,1240297,1240304,1240308,1240309,1240317,1240318,1240322,CVE-2017-5753,CVE-2021-4453,CVE-2021-4454,CVE-2021-47517,CVE-2021-47631,CVE-2021-47632,CVE-2021-47633,CVE-2021-47635,CVE-2021-47636,CVE-2021-47637,CVE-2021-47638,CVE-2021-47639,CVE-2021-47641,CVE-2021-47642,CVE-2021-47643,CVE-2021-47644,CVE-2021-47645,CVE-2021-47646,CVE-2021-47647,CVE-2021-47648,CVE-2021-47649,CVE-2021-47650,CVE-2021-47651,CVE-2021-47652,CVE-2021-47653,CVE-2021-47654,CVE-2021-47656,CVE-2021-47657,CVE-2021-47659,CVE-2022-0168,CVE-2022-0995,CVE-2022-1016,CVE-2022-1048,CVE-2022-1184,CVE-2022-2977,CVE-2022-29900,CVE-2022-29901,CVE-2022-3303,CVE-2022-3435,CVE-2022-490
 44,CVE-2022-49050,CVE-2022-49051,CVE-2022-49053,CVE-2022-49054,CVE-2022-49055,CVE-2022-49056,CVE-2022-49057,CVE-2022-49058,CVE-2022-49059,CVE-2022-49060,CVE-2022-49061,CVE-2022-49062,CVE-2022-49063,CVE-2022-49064,CVE-2022-49065,CVE-2022-49066,CVE-2022-49070,CVE-2022-49071,CVE-2022-49073,CVE-2022-49074,CVE-2022-49075,CVE-2022-49076,CVE-2022-49078,CVE-2022-49082,CVE-2022-49083,CVE-2022-49084,CVE-2022-49085,CVE-2022-49086,CVE-2022-49088,CVE-2022-49089,CVE-2022-49090,CVE-2022-49091,CVE-2022-49092,CVE-2022-49093,CVE-2022-49095,CVE-2022-49096,CVE-2022-49097,CVE-2022-49098,CVE-2022-49099,CVE-2022-49100,CVE-2022-49102,CVE-2022-49103,CVE-2022-49104,CVE-2022-49105,CVE-2022-49106,CVE-2022-49107,CVE-2022-49109,CVE-2022-49111,CVE-2022-49112,CVE-2022-49113,CVE-2022-49114,CVE-2022-49115,CVE-2022-49116,CVE-2022-49118,CVE-2022-49119,CVE-2022-49120,CVE-2022-49121,CVE-2022-49122,CVE-2022-49123,CVE-2022-49125,CVE-2022-49126,CVE-2022-49128,CVE-2022-49129,CVE-2022-49130,CVE-2022-49131,CVE-2022-49132,CVE-
 2022-49133,CVE-2022-49134,CVE-2022-49135,CVE-2022-49136,CVE-2022-49137,CVE-2022-49138,CVE-2022-49139,CVE-2022-49144,CVE-2022-49145,CVE-2022-49147,CVE-2022-49148,CVE-2022-49151,CVE-2022-49153,CVE-2022-49154,CVE-2022-49155,CVE-2022-49156,CVE-2022-49157,CVE-2022-49158,CVE-2022-49159,CVE-2022-49160,CVE-2022-49162,CVE-2022-49163,CVE-2022-49164,CVE-2022-49165,CVE-2022-49174,CVE-2022-49175,CVE-2022-49176,CVE-2022-49177,CVE-2022-49178,CVE-2022-49179,CVE-2022-49180,CVE-2022-49182,CVE-2022-49183,CVE-2022-49185,CVE-2022-49187,CVE-2022-49188,CVE-2022-49189,CVE-2022-49192,CVE-2022-49193,CVE-2022-49194,CVE-2022-49196,CVE-2022-49199,CVE-2022-49200,CVE-2022-49201,CVE-2022-49202,CVE-2022-49203,CVE-2022-49204,CVE-2022-49205,CVE-2022-49206,CVE-2022-49207,CVE-2022-49208,CVE-2022-49209,CVE-2022-49212,CVE-2022-49213,CVE-2022-49214,CVE-2022-49215,CVE-2022-49216,CVE-2022-49217,CVE-2022-49218,CVE-2022-49219,CVE-2022-49221,CVE-2022-49222,CVE-2022-49224,CVE-2022-49225,CVE-2022-49226,CVE-2022-49227,CVE-2022-49
 228,CVE-2022-49230,CVE-2022-49232,CVE-2022-49233,CVE-2022-49235,CVE-2022-49236,CVE-2022-49237,CVE-2022-49238,CVE-2022-49239,CVE-2022-49241,CVE-2022-49242,CVE-2022-49243,CVE-2022-49244,CVE-2022-49246,CVE-2022-49247,CVE-2022-49248,CVE-2022-49249,CVE-2022-49250,CVE-2022-49251,CVE-2022-49252,CVE-2022-49253,CVE-2022-49254,CVE-2022-49256,CVE-2022-49257,CVE-2022-49258,CVE-2022-49259,CVE-2022-49260,CVE-2022-49261,CVE-2022-49262,CVE-2022-49263,CVE-2022-49264,CVE-2022-49265,CVE-2022-49266,CVE-2022-49268,CVE-2022-49269,CVE-2022-49270,CVE-2022-49271,CVE-2022-49272,CVE-2022-49273,CVE-2022-49274,CVE-2022-49275,CVE-2022-49276,CVE-2022-49277,CVE-2022-49278,CVE-2022-49279,CVE-2022-49280,CVE-2022-49281,CVE-2022-49283,CVE-2022-49285,CVE-2022-49286,CVE-2022-49287,CVE-2022-49288,CVE-2022-49290,CVE-2022-49291,CVE-2022-49292,CVE-2022-49293,CVE-2022-49294,CVE-2022-49295,CVE-2022-49296,CVE-2022-49297,CVE-2022-49298,CVE-2022-49299,CVE-2022-49300,CVE-2022-49301,CVE-2022-49302,CVE-2022-49304,CVE-2022-49305,CVE
 -2022-49306,CVE-2022-49307,CVE-2022-49308,CVE-2022-49309,CVE-2022-49310,CVE-2022-49311,CVE-2022-49312,CVE-2022-49313,CVE-2022-49314,CVE-2022-49315,CVE-2022-49316,CVE-2022-49319,CVE-2022-49320,CVE-2022-49321,CVE-2022-49322,CVE-2022-49323,CVE-2022-49325,CVE-2022-49326,CVE-2022-49327,CVE-2022-49328,CVE-2022-49329,CVE-2022-49330,CVE-2022-49331,CVE-2022-49332,CVE-2022-49333,CVE-2022-49335,CVE-2022-49336,CVE-2022-49337,CVE-2022-49338,CVE-2022-49339,CVE-2022-49341,CVE-2022-49342,CVE-2022-49343,CVE-2022-49345,CVE-2022-49346,CVE-2022-49347,CVE-2022-49348,CVE-2022-49349,CVE-2022-49350,CVE-2022-49351,CVE-2022-49352,CVE-2022-49353,CVE-2022-49354,CVE-2022-49356,CVE-2022-49357,CVE-2022-49359,CVE-2022-49362,CVE-2022-49365,CVE-2022-49367,CVE-2022-49368,CVE-2022-49370,CVE-2022-49371,CVE-2022-49373,CVE-2022-49375,CVE-2022-49376,CVE-2022-49377,CVE-2022-49378,CVE-2022-49379,CVE-2022-49381,CVE-2022-49382,CVE-2022-49384,CVE-2022-49385,CVE-2022-49386,CVE-2022-49389,CVE-2022-49390,CVE-2022-49392,CVE-2022-4
 9394,CVE-2022-49396,CVE-2022-49397,CVE-2022-49398,CVE-2022-49399,CVE-2022-49400,CVE-2022-49402,CVE-2022-49404,CVE-2022-49406,CVE-2022-49407,CVE-2022-49409,CVE-2022-49410,CVE-2022-49411,CVE-2022-49412,CVE-2022-49413,CVE-2022-49414,CVE-2022-49416,CVE-2022-49418,CVE-2022-49419,CVE-2022-49421,CVE-2022-49422,CVE-2022-49424,CVE-2022-49426,CVE-2022-49427,CVE-2022-49429,CVE-2022-49430,CVE-2022-49431,CVE-2022-49432,CVE-2022-49433,CVE-2022-49434,CVE-2022-49435,CVE-2022-49436,CVE-2022-49437,CVE-2022-49438,CVE-2022-49440,CVE-2022-49441,CVE-2022-49442,CVE-2022-49443,CVE-2022-49444,CVE-2022-49445,CVE-2022-49446,CVE-2022-49447,CVE-2022-49448,CVE-2022-49449,CVE-2022-49451,CVE-2022-49453,CVE-2022-49455,CVE-2022-49458,CVE-2022-49459,CVE-2022-49460,CVE-2022-49462,CVE-2022-49463,CVE-2022-49465,CVE-2022-49466,CVE-2022-49467,CVE-2022-49468,CVE-2022-49470,CVE-2022-49472,CVE-2022-49473,CVE-2022-49474,CVE-2022-49475,CVE-2022-49476,CVE-2022-49477,CVE-2022-49478,CVE-2022-49479,CVE-2022-49480,CVE-2022-49481,CV
 E-2022-49482,CVE-2022-49483,CVE-2022-49484,CVE-2022-49485,CVE-2022-49486,CVE-2022-49487,CVE-2022-49488,CVE-2022-49489,CVE-2022-49490,CVE-2022-49491,CVE-2022-49492,CVE-2022-49493,CVE-2022-49494,CVE-2022-49495,CVE-2022-49497,CVE-2022-49498,CVE-2022-49499,CVE-2022-49501,CVE-2022-49502,CVE-2022-49503,CVE-2022-49504,CVE-2022-49505,CVE-2022-49506,CVE-2022-49507,CVE-2022-49508,CVE-2022-49509,CVE-2022-49510,CVE-2022-49511,CVE-2022-49512,CVE-2022-49514,CVE-2022-49515,CVE-2022-49516,CVE-2022-49517,CVE-2022-49518,CVE-2022-49519,CVE-2022-49520,CVE-2022-49521,CVE-2022-49522,CVE-2022-49523,CVE-2022-49524,CVE-2022-49525,CVE-2022-49526,CVE-2022-49527,CVE-2022-49529,CVE-2022-49530,CVE-2022-49532,CVE-2022-49533,CVE-2022-49534,CVE-2022-49535,CVE-2022-49536,CVE-2022-49537,CVE-2022-49538,CVE-2022-49541,CVE-2022-49542,CVE-2022-49543,CVE-2022-49544,CVE-2022-49545,CVE-2022-49546,CVE-2022-49548,CVE-2022-49549,CVE-2022-49551,CVE-2022-49552,CVE-2022-49555,CVE-2022-49556,CVE-2022-49559,CVE-2022-49560,CVE-2022-
 49562,CVE-2022-49563,CVE-2022-49564,CVE-2022-49565,CVE-2022-49566,CVE-2022-49568,CVE-2022-49569,CVE-2022-49570,CVE-2022-49579,CVE-2022-49581,CVE-2022-49583,CVE-2022-49584,CVE-2022-49591,CVE-2022-49592,CVE-2022-49603,CVE-2022-49605,CVE-2022-49606,CVE-2022-49607,CVE-2022-49609,CVE-2022-49610,CVE-2022-49611,CVE-2022-49613,CVE-2022-49615,CVE-2022-49616,CVE-2022-49617,CVE-2022-49618,CVE-2022-49621,CVE-2022-49623,CVE-2022-49624,CVE-2022-49625,CVE-2022-49626,CVE-2022-49627,CVE-2022-49628,CVE-2022-49631,CVE-2022-49634,CVE-2022-49635,CVE-2022-49638,CVE-2022-49640,CVE-2022-49641,CVE-2022-49642,CVE-2022-49643,CVE-2022-49644,CVE-2022-49645,CVE-2022-49646,CVE-2022-49647,CVE-2022-49648,CVE-2022-49649,CVE-2022-49650,CVE-2022-49652,CVE-2022-49653,CVE-2022-49655,CVE-2022-49656,CVE-2022-49657,CVE-2022-49658,CVE-2022-49661,CVE-2022-49663,CVE-2022-49665,CVE-2022-49667,CVE-2022-49668,CVE-2022-49670,CVE-2022-49671,CVE-2022-49672,CVE-2022-49673,CVE-2022-49674,CVE-2022-49675,CVE-2022-49676,CVE-2022-49677,C
 VE-2022-49678,CVE-2022-49679,CVE-2022-49680,CVE-2022-49683,CVE-2022-49685,CVE-2022-49686,CVE-2022-49687,CVE-2022-49688,CVE-2022-49693,CVE-2022-49694,CVE-2022-49695,CVE-2022-49697,CVE-2022-49699,CVE-2022-49700,CVE-2022-49701,CVE-2022-49703,CVE-2022-49704,CVE-2022-49705,CVE-2022-49707,CVE-2022-49708,CVE-2022-49710,CVE-2022-49711,CVE-2022-49712,CVE-2022-49713,CVE-2022-49714,CVE-2022-49715,CVE-2022-49716,CVE-2022-49719,CVE-2022-49720,CVE-2022-49721,CVE-2022-49722,CVE-2022-49723,CVE-2022-49724,CVE-2022-49725,CVE-2022-49726,CVE-2022-49729,CVE-2022-49730,CVE-2022-49731,CVE-2022-49732,CVE-2022-49733,CVE-2022-49739,CVE-2022-49746,CVE-2022-49748,CVE-2022-49751,CVE-2022-49753,CVE-2022-49755,CVE-2022-49759,CVE-2023-0179,CVE-2023-1652,CVE-2023-2162,CVE-2023-28410,CVE-2023-3567,CVE-2023-52930,CVE-2023-52933,CVE-2023-52935,CVE-2023-52939,CVE-2023-52941,CVE-2023-52973,CVE-2023-52974,CVE-2023-52975,CVE-2023-52976,CVE-2023-52979,CVE-2023-52983,CVE-2023-52984,CVE-2023-52988,CVE-2023-52989,CVE-2023-529
 92,CVE-2023-52993,CVE-2023-53000,CVE-2023-53005,CVE-2023-53006,CVE-2023-53007,CVE-2023-53008,CVE-2023-53010,CVE-2023-53015,CVE-2023-53016,CVE-2023-53019,CVE-2023-53023,CVE-2023-53024,CVE-2023-53025,CVE-2023-53026,CVE-2023-53028,CVE-2023-53029,CVE-2023-53030,CVE-2023-53033,CVE-2024-26634,CVE-2024-47678,CVE-2024-50290,CVE-2024-53063,CVE-2024-53124,CVE-2024-53176,CVE-2024-53178,CVE-2024-56651,CVE-2024-57996,CVE-2024-58013,CVE-2024-58014,CVE-2025-21693,CVE-2025-21718,CVE-2025-21772,CVE-2025-21780

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.

The following security bugs were fixed:

- CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918).
- CVE-2022-49465: blk-throttle: Set BIO_THROTTLED when bio has been throttled (bsc#1238919).
- CVE-2022-49739: gfs2: Always check inode size of inline inodes (bsc#1240207).
- CVE-2023-52935: mm/khugepaged: fix ->anon_vma race (bsc#1240276).
- CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc (bsc#1234074).
- CVE-2024-53176: smb: During unmount, ensure all cached dir instances drop their dentry (bsc#1234894).
- CVE-2024-53178: smb: Do not leak cfid when reconnect races with open_cached_dir (bsc#1234895).
- CVE-2024-56651: can: hi311x: hi3110_can_ist(): fix potential use-after-free (bsc#1235528).
- CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076).
- CVE-2024-58013: Bluetooth: MGMT: Fix slab-use-after-free Read in mgmt_remove_adv_monitor_sync (bsc#1239095).
- CVE-2024-58014: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (bsc#1239109).
- CVE-2025-21693: mm: zswap: properly synchronize freeing resources during CPU hotunplug (bsc#1237029).
- CVE-2025-21718: net: rose: fix timer races against user threads (bsc#1239073).
- CVE-2025-21772: partitions: mac: fix handling of bogus partition table (bsc#1238911).
- CVE-2025-21780: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table() (bsc#1239115).

The following non-security bugs were fixed:

- ACPI: processor: idle: Return an error if both P_LVL{2,3} idle states are invalid (bsc#1237530).
- btrfs: defrag: do not use merged extent map for their generation check (bsc#1239968).
- btrfs: fix defrag not merging contiguous extents due to merged extent maps (bsc#1239968).
- btrfs: fix extent map merging not happening for adjacent extents (bsc#1239968).
- btrfs: send: allow cloning non-aligned extent if it ends at i_size (bsc#1239969).
- btrfs: send: fix invalid clone operation for file that got its size decreased (bsc#1239969).
- cifs: Add a laundromat thread for cached directories (git-fixes).
- cifs: fix potential null pointer use in destroy_workqueue in init_cifs error path (git-fixes).
- gfs2: Fix inode height consistency check (git-fixes).
- mm: zswap: move allocations during CPU init outside the lock (git-fixes).
- mm/mmu_notifier.c: fix race in mmu_interval_notifier_remove() (bsc#1239126).
- net: mana: Add flex array to struct mana_cfg_rx_steer_req_v2 (bsc#1239016).
- net: mana: Allow variable size indirection table (bsc#1239016).
- net: mana: Avoid open coded arithmetic (bsc#1239016).
- net: mana: Support holes in device list reply msg (bsc#1240133).
- RDMA/mana_ib: Prefer struct_size over open coded arithmetic (bsc#1239016).
- RDMA/mana_ib: Use v2 version of cfg_rx_steer_req to enable RX coalescing (bsc#1239016).
- sched/membarrier: Fix redundant load of membarrier_state (bsc#1232743).
- smb: client: destroy cfid_put_wq on module exit (git-fixes).
- smb: client: disable directory caching when dir_cache_timeout is zero (git-fixes).
- smb: client: do not start laundromat thread on nohandlecache (git-fixes).
- smb: client: make laundromat a delayed worker (git-fixes).
- smb: client: properly close cfids on umount (bsc#1231432, bsc#1232299, bsc#1235599, bsc#1234896).
- smb3: allow controlling length of time directory entries are cached with dir leases (git-fixes).
- smb3: do not start laundromat thread when dir leases disabled (git-fixes).
- smb3: retrying on failed server close (git-fixes).
- tpm: send_data: Wait longer for the TPM to become ready (bsc#1235870).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1242-1
Released:    Mon Apr 14 12:43:18 2025
Summary:     Recommended update for aaa_base
Type:        recommended
Severity:    moderate
References:  1235481,1236033
This update for aaa_base fixes the following issues:

- SP6 logrotate and rcsyslog binary (bsc#1236033)
- Update detection for systemd in rc.status
- Mountpoint for cgroup changed with cgroup2
- If a user switches the login shell respect the already set PATH
  environment (bsc#1235481)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1292-1
Released:    Wed Apr 16 09:49:17 2025
Summary:     Recommended update for timezone
Type:        recommended
Severity:    moderate
References:  
This update for timezone fixes the following issues:

- Version update 2025b
  * New zone for Aysen Region in Chile (America/Coyhaique) which
    moves from -04/-03 to -03
- Refresh patches for philippines historical data and china tzdata

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1334-1
Released:    Thu Apr 17 09:03:05 2025
Summary:     Security update for pam
Type:        security
Severity:    moderate
References:  1232234,CVE-2024-10041
This update for pam fixes the following issues:

- CVE-2024-10041: sensitive data exposure while performing authentications. (bsc#1232234)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1345-1
Released:    Thu Apr 17 17:14:27 2025
Summary:     Security update for containerd
Type:        security
Severity:    moderate
References:  1239749,CVE-2024-40635
This update for containerd fixes the following issues:

- CVE-2024-40635: Fixed integer overflow in User ID handling (bsc#1239749) 
  
Other fixes:
- Update to containerd v1.7.27.

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1354-1
Released:    Tue Apr 22 05:14:53 2025
Summary:     Recommended update for iproute2
Type:        recommended
Severity:    moderate
References:  1234383
This update for iproute2 fixes the following issues:

- Avoid false cgroup warnings (bsc#1234383)

-----------------------------------------------------------------
Advisory ID: 38402
Released:    Fri Apr 25 11:05:30 2025
Summary:     Recommended update for freetype2
Type:        recommended
Severity:    important
References:  
This update for freetype2 fixes the following issue:

- enable brotli support (jsc#PED-12258)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1371-1
Released:    Fri Apr 25 12:02:27 2025
Summary:     Recommended update for apparmor
Type:        recommended
Severity:    important
References:  1232234,1234452
This update for apparmor fixes the following issues:

- Allow pam_unix to execute unix_chkpwd with abi/3.0 (bsc#1234452, bsc#1232234)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1381-1
Released:    Mon Apr 28 09:37:03 2025
Summary:     Security update for cifs-utils
Type:        security
Severity:    moderate
References:  1239680,CVE-2025-2312
This update for cifs-utils fixes the following issues:

- CVE-2025-2312: Fixed cifs.upcall making an upcall to the wrong 
  namespace in containerized environments while trying to get Kerberos 
  credentials (bsc#1239680)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1413-1
Released:    Wed Apr 30 08:59:04 2025
Summary:     Security update for augeas
Type:        security
Severity:    low
References:  1239909,CVE-2025-2588
This update for augeas fixes the following issues:

- CVE-2025-2588: Check for NULL pointers when calling re_case_expand in function fa_expand_nocase. (bsc#1239909)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1438-1
Released:    Fri May  2 15:44:07 2025
Summary:     Security update for libxml2
Type:        security
Severity:    moderate
References:  1241453,1241551,CVE-2025-32414,CVE-2025-32415
This update for libxml2 fixes the following issues:

- CVE-2025-32414: Fixed an out-of-bounds read when parsing text via the Python API. (bsc#1241551)
- CVE-2025-32415: Fixed a crafted XML document may lead to a heap-based buffer under-read. (bsc#1241453)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1446-1
Released:    Mon May  5 08:04:03 2025
Summary:     Recommended update for lvm2
Type:        recommended
Severity:    important
References:  1216938
This update for lvm2 fixes the following issues:

- LVM filter behaves unexpectedly for MPIO devices in SLES15SP5 (bsc#1216938)
    * set lvm.conf devices.multipath_wwids_file=''

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1456-1
Released:    Wed May  7 17:13:32 2025
Summary:     Security update for sqlite3
Type:        security
Severity:    moderate
References:  1241020,1241078,1241189,CVE-2025-29087,CVE-2025-29088,CVE-2025-3277
This update for sqlite3 fixes the following issues:

- CVE-2025-29087,CVE-2025-3277: Fixed integer overflow in sqlite concat function (bsc#1241020)
- CVE-2025-29088: Fixed integer overflow through the SQLITE_DBCONFIG_LOOKASIDE component (bsc#1241078)

Other fixes:

- Updated to version 3.49.1 from Factory (jsc#SLE-16032)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1512-1
Released:    Wed May  7 21:36:27 2025
Summary:     Security update for apparmor
Type:        security
Severity:    moderate
References:  1241678,CVE-2024-10041
This update for apparmor fixes the following issues:

- Add dac_read_search capability for unix_chkpwd to allow it to read the shadow
  file even if it has 000 permissions. This is needed after the CVE-2024-10041
  fix in PAM. (bsc#1241678)


The following package changes have been done:

- aaa_base-84.87+git20180409.04c9dae-150300.10.28.2 updated
- apparmor-abstractions-3.0.4-150500.11.18.1 updated
- apparmor-parser-3.0.4-150500.11.18.1 updated
- ca-certificates-mozilla-2.74-150200.41.1 updated
- cifs-utils-6.15-150400.3.12.1 updated
- containerd-ctr-1.7.27-150000.123.1 updated
- containerd-1.7.27-150000.123.1 updated
- docker-27.5.1_ce-150000.218.1 updated
- findutils-4.8.0-150300.3.3.2 updated
- glibc-locale-base-2.31-150300.92.1 updated
- glibc-locale-2.31-150300.92.1 updated
- glibc-2.31-150300.92.1 updated
- grub2-i386-pc-2.06-150500.29.46.2 updated
- grub2-x86_64-efi-2.06-150500.29.46.2 updated
- grub2-x86_64-xen-2.06-150500.29.46.2 updated
- grub2-2.06-150500.29.46.2 updated
- hwinfo-21.87-150500.3.6.1 updated
- iproute2-5.14-150400.3.3.1 updated
- kdump-1.0.2+git48.g64445e1-150500.3.9.2 updated
- kernel-default-5.14.21-150500.55.100.1 updated
- libapparmor1-3.0.4-150500.11.18.1 updated
- libaugeas0-1.12.0-150400.3.8.1 updated
- libdevmapper1_03-2.03.22_1.02.196-150500.7.15.1 updated
- libexpat1-2.7.1-150400.3.28.1 updated
- libfreetype6-2.10.4-150000.4.22.1 updated
- libgnutls30-3.7.3-150400.4.47.1 updated
- libprocps8-3.3.17-150000.7.42.1 updated
- libpython3_6m1_0-3.6.15-150300.10.84.1 updated
- libsqlite3-0-3.49.1-150000.3.27.1 updated
- libtasn1-6-4.13-150000.4.11.1 updated
- libtasn1-4.13-150000.4.11.1 updated
- libxml2-2-2.10.3-150500.5.26.1 updated
- libzypp-17.36.3-150500.6.42.1 updated
- openssh-clients-8.4p1-150300.3.42.1 updated
- openssh-common-8.4p1-150300.3.42.1 updated
- openssh-server-8.4p1-150300.3.42.1 updated
- openssh-8.4p1-150300.3.42.1 updated
- pam-1.3.0-150000.6.76.1 updated
- procps-3.3.17-150000.7.42.1 updated
- python3-Jinja2-2.10.1-150000.3.21.1 updated
- python3-base-3.6.15-150300.10.84.1 updated
- python3-3.6.15-150300.10.84.1 updated
- supportutils-3.2.10-150300.7.35.36.4 updated
- suse-build-key-12.0-150000.8.58.1 updated
- timezone-2025b-150000.75.34.2 updated
- vim-data-common-9.1.1176-150500.20.24.2 updated
- vim-9.1.1176-150500.20.24.2 updated
- zypper-1.14.85-150500.6.26.1 updated
- libxslt1-1.1.34-150400.3.3.1 removed
- python-instance-billing-flavor-check-0.1.2-150000.1.17.1 removed
- python3-cssselect-1.0.3-150400.3.7.4 removed
- python3-lxml-4.9.1-150500.3.4.3 removed


More information about the sle-container-updates mailing list