SUSE-CU-2025:8304-1: Security update of bci/bci-sle15-kernel-module-devel
sle-container-updates at lists.suse.com
sle-container-updates at lists.suse.com
Fri Nov 14 13:07:43 UTC 2025
SUSE Container Update Advisory: bci/bci-sle15-kernel-module-devel
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2025:8304-1
Container Tags : bci/bci-sle15-kernel-module-devel:15.7 , bci/bci-sle15-kernel-module-devel:15.7-52.3 , bci/bci-sle15-kernel-module-devel:latest
Container Release : 52.3
Severity : important
Type : security
References : 1012628 1194869 1213061 1213666 1214073 1214928 1214953 1214954
1215143 1215150 1215199 1215696 1216396 1216436 1216976 1220186
1220419 1229165 1237236 1237240 1237241 1237242 1239206 1243100
1243112 1244939 1245193 1245260 1246125 1247118 1247222 1247500
1247683 1248111 1248211 1248230 1248517 1248630 1248735 1248754
1248847 1248886 1249123 1249159 1249161 1249164 1249166 1249169
1249170 1249177 1249182 1249190 1249194 1249195 1249196 1249200
1249203 1249204 1249215 1249220 1249221 1249224 1249254 1249255
1249257 1249260 1249263 1249265 1249266 1249271 1249272 1249273
1249278 1249279 1249281 1249282 1249285 1249286 1249288 1249292
1249296 1249299 1249302 1249304 1249308 1249312 1249317 1249318
1249319 1249320 1249321 1249323 1249324 1249338 1249397 1249413
1249479 1249486 1249489 1249490 1249506 1249512 1249515 1249522
1249523 1249538 1249542 1249548 1249554 1249595 1249598 1249608
1249615 1249640 1249641 1249642 1249658 1249662 1249672 1249673
1249677 1249678 1249679 1249682 1249687 1249698 1249707 1249712
1249730 1249735 1249756 1249758 1249761 1249762 1249768 1249774
1249779 1249780 1249785 1249787 1249795 1249815 1249820 1249823
1249824 1249825 1249826 1249833 1249842 1249845 1249849 1249850
1249853 1249856 1249861 1249863 1249864 1249865 1249866 1249869
1249870 1249880 1249883 1249888 1249894 1249896 1249897 1249901
1249911 1249917 1249919 1249923 1249926 1249938 1249949 1249950
1249952 1249975 1249979 1249984 1249988 1249990 1249993 1249994
1249997 1250004 1250006 1250007 1250012 1250022 1250024 1250028
1250029 1250032 1250035 1250049 1250055 1250058 1250062 1250063
1250065 1250066 1250067 1250069 1250070 1250073 1250074 1250088
1250089 1250106 1250112 1250117 1250119 1250120 1250125 1250127
1250128 1250145 1250150 1250156 1250157 1250161 1250163 1250166
1250167 1250169 1250171 1250177 1250180 1250186 1250196 1250198
1250199 1250201 1250202 1250203 1250204 1250205 1250206 1250208
1250237 1250241 1250242 1250243 1250247 1250249 1250262 1250263
1250266 1250268 1250274 1250275 1250276 1250281 1250290 1250291
1250292 1250296 1250297 1250298 1250313 1250319 1250323 1250325
1250329 1250337 1250358 1250371 1250377 1250379 1250384 1250389
1250395 1250397 1250400 1250402 1250406 1250426 1250450 1250455
1250459 1250491 1250519 1250650 1250702 1250704 1250712 1250713
1250721 1250732 1250736 1250741 1250742 1250758 1250759 1250763
1250765 1250807 1250808 1250809 1250812 1250813 1250815 1250816
1250820 1250823 1250825 1250827 1250830 1250831 1250837 1250841
1250861 1250863 1250867 1250872 1250873 1250878 1250905 1250907
1250917 1250918 1250923 1250926 1250928 1250929 1250930 1250931
1250941 1250942 1250946 1250949 1250957 1250964 1251024 1251027
1251028 1251031 1251035 1251038 1251043 1251045 1251052 1251053
1251054 1251056 1251057 1251059 1251060 1251065 1251066 1251067
1251068 1251071 1251076 1251079 1251081 1251083 1251084 1251100
1251105 1251106 1251108 1251113 1251114 1251119 1251123 1251126
1251132 1251134 1251143 1251146 1251150 1251152 1251153 1251159
1251161 1251170 1251177 1251180 1251206 1251215 1251216 1251222
1251230 1251232 1251233 1251247 1251268 1251269 1251270 1251282
1251283 1251286 1251290 1251319 1251321 1251323 1251328 1251529
1251721 1251732 1251742 1251743 1251746 1251748 1251749 1251750
1251754 1251755 1251756 1251758 1251759 1251760 1251762 1251763
1251764 1251769 1251771 1251772 1251777 1251780 1251804 1251810
1251930 1251967 1252033 1252035 1252039 1252044 1252047 1252051
1252052 1252056 1252060 1252062 1252064 1252065 1252069 1252070
1252072 1252074 1252075 1252078 1252079 1252081 1252082 1252083
1252236 1252253 1252265 1252330 1252332 1252336 1252346 1252348
1252349 1252364 1252469 1252479 1252481 1252489 1252490 1252492
1252495 1252496 1252499 1252534 1252536 1252537 1252550 1252553
1252559 1252561 1252564 1252565 1252566 1252632 1252668 1252678
1252679 1252685 1252688 1252734 1252735 1252772 1252775 1252785
1252787 1252789 1252797 1252819 1252822 1252826 1252841 1252848
1252849 1252850 1252851 1252854 1252858 1252865 1252866 1252873
1252902 1252904 1252909 1252915 1252918 1252921 1252939 CVE-2023-31248
CVE-2023-3772 CVE-2023-39197 CVE-2023-42753 CVE-2023-53147 CVE-2023-53148
CVE-2023-53150 CVE-2023-53151 CVE-2023-53152 CVE-2023-53165 CVE-2023-53167
CVE-2023-53170 CVE-2023-53174 CVE-2023-53175 CVE-2023-53177 CVE-2023-53179
CVE-2023-53180 CVE-2023-53181 CVE-2023-53183 CVE-2023-53184 CVE-2023-53185
CVE-2023-53187 CVE-2023-53189 CVE-2023-53192 CVE-2023-53195 CVE-2023-53196
CVE-2023-53201 CVE-2023-53204 CVE-2023-53205 CVE-2023-53206 CVE-2023-53207
CVE-2023-53208 CVE-2023-53209 CVE-2023-53210 CVE-2023-53215 CVE-2023-53217
CVE-2023-53220 CVE-2023-53221 CVE-2023-53222 CVE-2023-53226 CVE-2023-53230
CVE-2023-53231 CVE-2023-53235 CVE-2023-53238 CVE-2023-53243 CVE-2023-53245
CVE-2023-53247 CVE-2023-53248 CVE-2023-53249 CVE-2023-53251 CVE-2023-53252
CVE-2023-53255 CVE-2023-53257 CVE-2023-53258 CVE-2023-53260 CVE-2023-53263
CVE-2023-53264 CVE-2023-53272 CVE-2023-53274 CVE-2023-53275 CVE-2023-53280
CVE-2023-53286 CVE-2023-53287 CVE-2023-53288 CVE-2023-53291 CVE-2023-53292
CVE-2023-53303 CVE-2023-53304 CVE-2023-53305 CVE-2023-53309 CVE-2023-53311
CVE-2023-53312 CVE-2023-53313 CVE-2023-53314 CVE-2023-53316 CVE-2023-53319
CVE-2023-53321 CVE-2023-53322 CVE-2023-53323 CVE-2023-53324 CVE-2023-53325
CVE-2023-53328 CVE-2023-53331 CVE-2023-53333 CVE-2023-53336 CVE-2023-53338
CVE-2023-53339 CVE-2023-53342 CVE-2023-53343 CVE-2023-53350 CVE-2023-53352
CVE-2023-53354 CVE-2023-53356 CVE-2023-53357 CVE-2023-53360 CVE-2023-53362
CVE-2023-53364 CVE-2023-53365 CVE-2023-53367 CVE-2023-53368 CVE-2023-53369
CVE-2023-53370 CVE-2023-53371 CVE-2023-53374 CVE-2023-53377 CVE-2023-53379
CVE-2023-53380 CVE-2023-53384 CVE-2023-53385 CVE-2023-53386 CVE-2023-53391
CVE-2023-53394 CVE-2023-53395 CVE-2023-53397 CVE-2023-53401 CVE-2023-53420
CVE-2023-53421 CVE-2023-53424 CVE-2023-53425 CVE-2023-53426 CVE-2023-53428
CVE-2023-53429 CVE-2023-53432 CVE-2023-53436 CVE-2023-53438 CVE-2023-53441
CVE-2023-53442 CVE-2023-53444 CVE-2023-53446 CVE-2023-53447 CVE-2023-53448
CVE-2023-53451 CVE-2023-53454 CVE-2023-53456 CVE-2023-53457 CVE-2023-53461
CVE-2023-53462 CVE-2023-53463 CVE-2023-53465 CVE-2023-53472 CVE-2023-53479
CVE-2023-53480 CVE-2023-53485 CVE-2023-53487 CVE-2023-53488 CVE-2023-53490
CVE-2023-53491 CVE-2023-53492 CVE-2023-53493 CVE-2023-53495 CVE-2023-53496
CVE-2023-53500 CVE-2023-53501 CVE-2023-53504 CVE-2023-53505 CVE-2023-53507
CVE-2023-53508 CVE-2023-53510 CVE-2023-53515 CVE-2023-53516 CVE-2023-53518
CVE-2023-53519 CVE-2023-53520 CVE-2023-53523 CVE-2023-53526 CVE-2023-53527
CVE-2023-53528 CVE-2023-53530 CVE-2023-53531 CVE-2023-53538 CVE-2023-53539
CVE-2023-53540 CVE-2023-53541 CVE-2023-53543 CVE-2023-53545 CVE-2023-53546
CVE-2023-53548 CVE-2023-53550 CVE-2023-53552 CVE-2023-53553 CVE-2023-53554
CVE-2023-53555 CVE-2023-53556 CVE-2023-53557 CVE-2023-53558 CVE-2023-53559
CVE-2023-53560 CVE-2023-53563 CVE-2023-53568 CVE-2023-53570 CVE-2023-53572
CVE-2023-53574 CVE-2023-53575 CVE-2023-53577 CVE-2023-53579 CVE-2023-53580
CVE-2023-53581 CVE-2023-53583 CVE-2023-53585 CVE-2023-53588 CVE-2023-53593
CVE-2023-53596 CVE-2023-53597 CVE-2023-53599 CVE-2023-53600 CVE-2023-53601
CVE-2023-53602 CVE-2023-53603 CVE-2023-53611 CVE-2023-53613 CVE-2023-53615
CVE-2023-53616 CVE-2023-53617 CVE-2023-53618 CVE-2023-53619 CVE-2023-53621
CVE-2023-53622 CVE-2023-53631 CVE-2023-53632 CVE-2023-53633 CVE-2023-53638
CVE-2023-53645 CVE-2023-53646 CVE-2023-53647 CVE-2023-53648 CVE-2023-53649
CVE-2023-53650 CVE-2023-53652 CVE-2023-53653 CVE-2023-53654 CVE-2023-53656
CVE-2023-53657 CVE-2023-53658 CVE-2023-53659 CVE-2023-53660 CVE-2023-53662
CVE-2023-53663 CVE-2023-53665 CVE-2023-53666 CVE-2023-53668 CVE-2023-53670
CVE-2023-53672 CVE-2023-53673 CVE-2023-53674 CVE-2023-53681 CVE-2023-53686
CVE-2023-53687 CVE-2023-53693 CVE-2023-53697 CVE-2023-53698 CVE-2023-53699
CVE-2023-53703 CVE-2023-53704 CVE-2023-53707 CVE-2023-53708 CVE-2023-53711
CVE-2023-53713 CVE-2023-53718 CVE-2023-53721 CVE-2023-53722 CVE-2023-53725
CVE-2023-53726 CVE-2023-53727 CVE-2023-53728 CVE-2023-53729 CVE-2023-53730
CVE-2023-53731 CVE-2023-53733 CVE-2024-26584 CVE-2024-58240 CVE-2025-38008
CVE-2025-38465 CVE-2025-38539 CVE-2025-38552 CVE-2025-38653 CVE-2025-38680
CVE-2025-38681 CVE-2025-38683 CVE-2025-38685 CVE-2025-38687 CVE-2025-38691
CVE-2025-38692 CVE-2025-38693 CVE-2025-38694 CVE-2025-38695 CVE-2025-38697
CVE-2025-38698 CVE-2025-38699 CVE-2025-38700 CVE-2025-38702 CVE-2025-38706
CVE-2025-38712 CVE-2025-38713 CVE-2025-38714 CVE-2025-38715 CVE-2025-38718
CVE-2025-38724 CVE-2025-38725 CVE-2025-38727 CVE-2025-38729 CVE-2025-38734
CVE-2025-38735 CVE-2025-38736 CVE-2025-39673 CVE-2025-39675 CVE-2025-39676
CVE-2025-39679 CVE-2025-39683 CVE-2025-39684 CVE-2025-39685 CVE-2025-39686
CVE-2025-39693 CVE-2025-39694 CVE-2025-39697 CVE-2025-39701 CVE-2025-39702
CVE-2025-39706 CVE-2025-39709 CVE-2025-39710 CVE-2025-39713 CVE-2025-39714
CVE-2025-39719 CVE-2025-39721 CVE-2025-39724 CVE-2025-39726 CVE-2025-39730
CVE-2025-39732 CVE-2025-39739 CVE-2025-39742 CVE-2025-39743 CVE-2025-39750
CVE-2025-39751 CVE-2025-39756 CVE-2025-39757 CVE-2025-39758 CVE-2025-39759
CVE-2025-39760 CVE-2025-39761 CVE-2025-39763 CVE-2025-39772 CVE-2025-39783
CVE-2025-39790 CVE-2025-39794 CVE-2025-39797 CVE-2025-39798 CVE-2025-39800
CVE-2025-39801 CVE-2025-39806 CVE-2025-39808 CVE-2025-39810 CVE-2025-39812
CVE-2025-39813 CVE-2025-39824 CVE-2025-39826 CVE-2025-39827 CVE-2025-39828
CVE-2025-39832 CVE-2025-39833 CVE-2025-39839 CVE-2025-39841 CVE-2025-39844
CVE-2025-39845 CVE-2025-39846 CVE-2025-39847 CVE-2025-39848 CVE-2025-39849
CVE-2025-39850 CVE-2025-39851 CVE-2025-39853 CVE-2025-39854 CVE-2025-39860
CVE-2025-39861 CVE-2025-39863 CVE-2025-39864 CVE-2025-39866 CVE-2025-39869
CVE-2025-39870 CVE-2025-39871 CVE-2025-39873 CVE-2025-39876 CVE-2025-39881
CVE-2025-39882 CVE-2025-39889 CVE-2025-39891 CVE-2025-39895 CVE-2025-39898
CVE-2025-39900 CVE-2025-39902 CVE-2025-39907 CVE-2025-39911 CVE-2025-39920
CVE-2025-39923 CVE-2025-39925 CVE-2025-39931 CVE-2025-39934 CVE-2025-39937
CVE-2025-39938 CVE-2025-39945 CVE-2025-39946 CVE-2025-39947 CVE-2025-39948
CVE-2025-39949 CVE-2025-39952 CVE-2025-39955 CVE-2025-39957 CVE-2025-39965
CVE-2025-39967 CVE-2025-39968 CVE-2025-39969 CVE-2025-39970 CVE-2025-39971
CVE-2025-39972 CVE-2025-39973 CVE-2025-39978 CVE-2025-39981 CVE-2025-39982
CVE-2025-39984 CVE-2025-39985 CVE-2025-39986 CVE-2025-39987 CVE-2025-39988
CVE-2025-39991 CVE-2025-39993 CVE-2025-39994 CVE-2025-39995 CVE-2025-39996
CVE-2025-39997 CVE-2025-40000 CVE-2025-40005 CVE-2025-40010 CVE-2025-40011
CVE-2025-40012 CVE-2025-40013 CVE-2025-40016 CVE-2025-40018 CVE-2025-40019
CVE-2025-40020 CVE-2025-40029 CVE-2025-40032 CVE-2025-40035 CVE-2025-40036
CVE-2025-40037 CVE-2025-40043 CVE-2025-40044 CVE-2025-40049 CVE-2025-40051
CVE-2025-40052 CVE-2025-40056 CVE-2025-40058 CVE-2025-40060 CVE-2025-40061
CVE-2025-40062 CVE-2025-40071 CVE-2025-40078 CVE-2025-40082 CVE-2025-40085
CVE-2025-40087 CVE-2025-40088 CVE-2025-40091 CVE-2025-40096 CVE-2025-40100
CVE-2025-40104
-----------------------------------------------------------------
The container bci/bci-sle15-kernel-module-devel was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:4057-1
Released: Tue Nov 11 19:35:57 2025
Summary: Security update for the Linux Kernel
Type: security
Severity: important
References: 1012628,1194869,1213061,1213666,1214073,1214928,1214953,1214954,1215143,1215150,1215199,1215696,1216396,1216436,1216976,1220186,1220419,1229165,1239206,1243100,1243112,1244939,1245193,1245260,1246125,1247118,1247222,1247500,1247683,1248111,1248211,1248230,1248517,1248630,1248735,1248754,1248847,1248886,1249123,1249159,1249161,1249164,1249166,1249169,1249170,1249177,1249182,1249190,1249194,1249195,1249196,1249200,1249203,1249204,1249215,1249220,1249221,1249224,1249254,1249255,1249257,1249260,1249263,1249265,1249266,1249271,1249272,1249273,1249278,1249279,1249281,1249282,1249285,1249286,1249288,1249292,1249296,1249299,1249302,1249304,1249308,1249312,1249317,1249318,1249319,1249320,1249321,1249323,1249324,1249338,1249397,1249413,1249479,1249486,1249489,1249490,1249506,1249512,1249515,1249522,1249523,1249538,1249542,1249548,1249554,1249595,1249598,1249608,1249615,1249640,1249641,1249642,1249658,1249662,1249672,1249673,1249677,1249678,1249679,1249682,1249687,1249698,1249707,1
249712,1249730,1249735,1249756,1249758,1249761,1249762,1249768,1249774,1249779,1249780,1249785,1249787,1249795,1249815,1249820,1249823,1249824,1249825,1249826,1249833,1249842,1249845,1249849,1249850,1249853,1249856,1249861,1249863,1249864,1249865,1249866,1249869,1249870,1249880,1249883,1249888,1249894,1249896,1249897,1249901,1249911,1249917,1249919,1249923,1249926,1249938,1249949,1249950,1249952,1249975,1249979,1249984,1249988,1249990,1249993,1249994,1249997,1250004,1250006,1250007,1250012,1250022,1250024,1250028,1250029,1250032,1250035,1250049,1250055,1250058,1250062,1250063,1250065,1250066,1250067,1250069,1250070,1250073,1250074,1250088,1250089,1250106,1250112,1250117,1250119,1250120,1250125,1250127,1250128,1250145,1250150,1250156,1250157,1250161,1250163,1250166,1250167,1250169,1250171,1250177,1250180,1250186,1250196,1250198,1250199,1250201,1250202,1250203,1250204,1250205,1250206,1250208,1250237,1250241,1250242,1250243,1250247,1250249,1250262,1250263,1250266,1250268,1250274,125027
5,1250276,1250281,1250290,1250291,1250292,1250296,1250297,1250298,1250313,1250319,1250323,1250325,1250329,1250337,1250358,1250371,1250377,1250379,1250384,1250389,1250395,1250397,1250400,1250402,1250406,1250426,1250450,1250455,1250459,1250491,1250519,1250650,1250702,1250704,1250712,1250713,1250721,1250732,1250736,1250741,1250742,1250758,1250759,1250763,1250765,1250807,1250808,1250809,1250812,1250813,1250815,1250816,1250820,1250823,1250825,1250827,1250830,1250831,1250837,1250841,1250861,1250863,1250867,1250872,1250873,1250878,1250905,1250907,1250917,1250918,1250923,1250926,1250928,1250929,1250930,1250931,1250941,1250942,1250946,1250949,1250957,1250964,1251024,1251027,1251028,1251031,1251035,1251038,1251043,1251045,1251052,1251053,1251054,1251056,1251057,1251059,1251060,1251065,1251066,1251067,1251068,1251071,1251076,1251079,1251081,1251083,1251084,1251100,1251105,1251106,1251108,1251113,1251114,1251119,1251123,1251126,1251132,1251134,1251143,1251146,1251150,1251152,1251153,1251159,125
1161,1251170,1251177,1251180,1251206,1251215,1251216,1251222,1251230,1251232,1251233,1251247,1251268,1251269,1251270,1251282,1251283,1251286,1251290,1251319,1251321,1251323,1251328,1251529,1251721,1251732,1251742,1251743,1251746,1251748,1251749,1251750,1251754,1251755,1251756,1251758,1251759,1251760,1251762,1251763,1251764,1251769,1251771,1251772,1251777,1251780,1251804,1251810,1251930,1251967,1252033,1252035,1252039,1252044,1252047,1252051,1252052,1252056,1252060,1252062,1252064,1252065,1252069,1252070,1252072,1252074,1252075,1252078,1252079,1252081,1252082,1252083,1252236,1252253,1252265,1252330,1252332,1252336,1252346,1252348,1252349,1252364,1252469,1252479,1252481,1252489,1252490,1252492,1252495,1252496,1252499,1252534,1252536,1252537,1252550,1252553,1252559,1252561,1252564,1252565,1252566,1252632,1252668,1252678,1252679,1252685,1252688,1252734,1252735,1252772,1252775,1252785,1252787,1252789,1252797,1252819,1252822,1252826,1252841,1252848,1252849,1252850,1252851,1252854,1252858,
1252865,1252866,1252873,1252902,1252904,1252909,1252915,1252918,1252921,1252939,CVE-2023-31248,CVE-2023-3772,CVE-2023-39197,CVE-2023-42753,CVE-2023-53147,CVE-2023-53148,CVE-2023-53150,CVE-2023-53151,CVE-2023-53152,CVE-2023-53165,CVE-2023-53167,CVE-2023-53170,CVE-2023-53174,CVE-2023-53175,CVE-2023-53177,CVE-2023-53179,CVE-2023-53180,CVE-2023-53181,CVE-2023-53183,CVE-2023-53184,CVE-2023-53185,CVE-2023-53187,CVE-2023-53189,CVE-2023-53192,CVE-2023-53195,CVE-2023-53196,CVE-2023-53201,CVE-2023-53204,CVE-2023-53205,CVE-2023-53206,CVE-2023-53207,CVE-2023-53208,CVE-2023-53209,CVE-2023-53210,CVE-2023-53215,CVE-2023-53217,CVE-2023-53220,CVE-2023-53221,CVE-2023-53222,CVE-2023-53226,CVE-2023-53230,CVE-2023-53231,CVE-2023-53235,CVE-2023-53238,CVE-2023-53243,CVE-2023-53245,CVE-2023-53247,CVE-2023-53248,CVE-2023-53249,CVE-2023-53251,CVE-2023-53252,CVE-2023-53255,CVE-2023-53257,CVE-2023-53258,CVE-2023-53260,CVE-2023-53263,CVE-2023-53264,CVE-2023-53272,CVE-2023-53274,CVE-2023-53275,CVE-2023-53280,CVE
-2023-53286,CVE-2023-53287,CVE-2023-53288,CVE-2023-53291,CVE-2023-53292,CVE-2023-53303,CVE-2023-53304,CVE-2023-53305,CVE-2023-53309,CVE-2023-53311,CVE-2023-53312,CVE-2023-53313,CVE-2023-53314,CVE-2023-53316,CVE-2023-53319,CVE-2023-53321,CVE-2023-53322,CVE-2023-53323,CVE-2023-53324,CVE-2023-53325,CVE-2023-53328,CVE-2023-53331,CVE-2023-53333,CVE-2023-53336,CVE-2023-53338,CVE-2023-53339,CVE-2023-53342,CVE-2023-53343,CVE-2023-53350,CVE-2023-53352,CVE-2023-53354,CVE-2023-53356,CVE-2023-53357,CVE-2023-53360,CVE-2023-53362,CVE-2023-53364,CVE-2023-53365,CVE-2023-53367,CVE-2023-53368,CVE-2023-53369,CVE-2023-53370,CVE-2023-53371,CVE-2023-53374,CVE-2023-53377,CVE-2023-53379,CVE-2023-53380,CVE-2023-53384,CVE-2023-53385,CVE-2023-53386,CVE-2023-53391,CVE-2023-53394,CVE-2023-53395,CVE-2023-53397,CVE-2023-53401,CVE-2023-53420,CVE-2023-53421,CVE-2023-53424,CVE-2023-53425,CVE-2023-53426,CVE-2023-53428,CVE-2023-53429,CVE-2023-53432,CVE-2023-53436,CVE-2023-53438,CVE-2023-53441,CVE-2023-53442,CVE-2023-5
3444,CVE-2023-53446,CVE-2023-53447,CVE-2023-53448,CVE-2023-53451,CVE-2023-53454,CVE-2023-53456,CVE-2023-53457,CVE-2023-53461,CVE-2023-53462,CVE-2023-53463,CVE-2023-53465,CVE-2023-53472,CVE-2023-53479,CVE-2023-53480,CVE-2023-53485,CVE-2023-53487,CVE-2023-53488,CVE-2023-53490,CVE-2023-53491,CVE-2023-53492,CVE-2023-53493,CVE-2023-53495,CVE-2023-53496,CVE-2023-53500,CVE-2023-53501,CVE-2023-53504,CVE-2023-53505,CVE-2023-53507,CVE-2023-53508,CVE-2023-53510,CVE-2023-53515,CVE-2023-53516,CVE-2023-53518,CVE-2023-53519,CVE-2023-53520,CVE-2023-53523,CVE-2023-53526,CVE-2023-53527,CVE-2023-53528,CVE-2023-53530,CVE-2023-53531,CVE-2023-53538,CVE-2023-53539,CVE-2023-53540,CVE-2023-53541,CVE-2023-53543,CVE-2023-53545,CVE-2023-53546,CVE-2023-53548,CVE-2023-53550,CVE-2023-53552,CVE-2023-53553,CVE-2023-53554,CVE-2023-53555,CVE-2023-53556,CVE-2023-53557,CVE-2023-53558,CVE-2023-53559,CVE-2023-53560,CVE-2023-53563,CVE-2023-53568,CVE-2023-53570,CVE-2023-53572,CVE-2023-53574,CVE-2023-53575,CVE-2023-53577,CV
E-2023-53579,CVE-2023-53580,CVE-2023-53581,CVE-2023-53583,CVE-2023-53585,CVE-2023-53588,CVE-2023-53593,CVE-2023-53596,CVE-2023-53597,CVE-2023-53599,CVE-2023-53600,CVE-2023-53601,CVE-2023-53602,CVE-2023-53603,CVE-2023-53611,CVE-2023-53613,CVE-2023-53615,CVE-2023-53616,CVE-2023-53617,CVE-2023-53618,CVE-2023-53619,CVE-2023-53621,CVE-2023-53622,CVE-2023-53631,CVE-2023-53632,CVE-2023-53633,CVE-2023-53638,CVE-2023-53645,CVE-2023-53646,CVE-2023-53647,CVE-2023-53648,CVE-2023-53649,CVE-2023-53650,CVE-2023-53652,CVE-2023-53653,CVE-2023-53654,CVE-2023-53656,CVE-2023-53657,CVE-2023-53658,CVE-2023-53659,CVE-2023-53660,CVE-2023-53662,CVE-2023-53663,CVE-2023-53665,CVE-2023-53666,CVE-2023-53668,CVE-2023-53670,CVE-2023-53672,CVE-2023-53673,CVE-2023-53674,CVE-2023-53681,CVE-2023-53686,CVE-2023-53687,CVE-2023-53693,CVE-2023-53697,CVE-2023-53698,CVE-2023-53699,CVE-2023-53703,CVE-2023-53704,CVE-2023-53707,CVE-2023-53708,CVE-2023-53711,CVE-2023-53713,CVE-2023-53718,CVE-2023-53721,CVE-2023-53722,CVE-2023-
53725,CVE-2023-53726,CVE-2023-53727,CVE-2023-53728,CVE-2023-53729,CVE-2023-53730,CVE-2023-53731,CVE-2023-53733,CVE-2024-26584,CVE-2024-58240,CVE-2025-38008,CVE-2025-38465,CVE-2025-38539,CVE-2025-38552,CVE-2025-38653,CVE-2025-38680,CVE-2025-38681,CVE-2025-38683,CVE-2025-38685,CVE-2025-38687,CVE-2025-38691,CVE-2025-38692,CVE-2025-38693,CVE-2025-38694,CVE-2025-38695,CVE-2025-38697,CVE-2025-38698,CVE-2025-38699,CVE-2025-38700,CVE-2025-38702,CVE-2025-38706,CVE-2025-38712,CVE-2025-38713,CVE-2025-38714,CVE-2025-38715,CVE-2025-38718,CVE-2025-38724,CVE-2025-38725,CVE-2025-38727,CVE-2025-38729,CVE-2025-38734,CVE-2025-38735,CVE-2025-38736,CVE-2025-39673,CVE-2025-39675,CVE-2025-39676,CVE-2025-39679,CVE-2025-39683,CVE-2025-39684,CVE-2025-39685,CVE-2025-39686,CVE-2025-39693,CVE-2025-39694,CVE-2025-39697,CVE-2025-39701,CVE-2025-39702,CVE-2025-39706,CVE-2025-39709,CVE-2025-39710,CVE-2025-39713,CVE-2025-39714,CVE-2025-39719,CVE-2025-39721,CVE-2025-39724,CVE-2025-39726,CVE-2025-39730,CVE-2025-39732,C
VE-2025-39739,CVE-2025-39742,CVE-2025-39743,CVE-2025-39750,CVE-2025-39751,CVE-2025-39756,CVE-2025-39757,CVE-2025-39758,CVE-2025-39759,CVE-2025-39760,CVE-2025-39761,CVE-2025-39763,CVE-2025-39772,CVE-2025-39783,CVE-2025-39790,CVE-2025-39794,CVE-2025-39797,CVE-2025-39798,CVE-2025-39800,CVE-2025-39801,CVE-2025-39806,CVE-2025-39808,CVE-2025-39810,CVE-2025-39812,CVE-2025-39813,CVE-2025-39824,CVE-2025-39826,CVE-2025-39827,CVE-2025-39828,CVE-2025-39832,CVE-2025-39833,CVE-2025-39839,CVE-2025-39841,CVE-2025-39844,CVE-2025-39845,CVE-2025-39846,CVE-2025-39847,CVE-2025-39848,CVE-2025-39849,CVE-2025-39850,CVE-2025-39851,CVE-2025-39853,CVE-2025-39854,CVE-2025-39860,CVE-2025-39861,CVE-2025-39863,CVE-2025-39864,CVE-2025-39866,CVE-2025-39869,CVE-2025-39870,CVE-2025-39871,CVE-2025-39873,CVE-2025-39876,CVE-2025-39881,CVE-2025-39882,CVE-2025-39889,CVE-2025-39891,CVE-2025-39895,CVE-2025-39898,CVE-2025-39900,CVE-2025-39902,CVE-2025-39907,CVE-2025-39911,CVE-2025-39920,CVE-2025-39923,CVE-2025-39925,CVE-2025
-39931,CVE-2025-39934,CVE-2025-39937,CVE-2025-39938,CVE-2025-39945,CVE-2025-39946,CVE-2025-39947,CVE-2025-39948,CVE-2025-39949,CVE-2025-39952,CVE-2025-39955,CVE-2025-39957,CVE-2025-39965,CVE-2025-39967,CVE-2025-39968,CVE-2025-39969,CVE-2025-39970,CVE-2025-39971,CVE-2025-39972,CVE-2025-39973,CVE-2025-39978,CVE-2025-39981,CVE-2025-39982,CVE-2025-39984,CVE-2025-39985,CVE-2025-39986,CVE-2025-39987,CVE-2025-39988,CVE-2025-39991,CVE-2025-39993,CVE-2025-39994,CVE-2025-39995,CVE-2025-39996,CVE-2025-39997,CVE-2025-40000,CVE-2025-40005,CVE-2025-40010,CVE-2025-40011,CVE-2025-40012,CVE-2025-40013,CVE-2025-40016,CVE-2025-40018,CVE-2025-40019,CVE-2025-40020,CVE-2025-40029,CVE-2025-40032,CVE-2025-40035,CVE-2025-40036,CVE-2025-40037,CVE-2025-40043,CVE-2025-40044,CVE-2025-40049,CVE-2025-40051,CVE-2025-40052,CVE-2025-40056,CVE-2025-40058,CVE-2025-40060,CVE-2025-40061,CVE-2025-40062,CVE-2025-40071,CVE-2025-40078,CVE-2025-40082,CVE-2025-40085,CVE-2025-40087,CVE-2025-40088,CVE-2025-40091,CVE-2025-40096,
CVE-2025-40100,CVE-2025-40104
The SUSE Linux Enterprise 15 SP7 kernel was updated to fix various security issues
The following security issues were fixed:
- CVE-2025-38008: mm/page_alloc: fix race condition in unaccepted memory handling (bsc#1244939).
- CVE-2025-38539: trace/fgraph: Fix the warning caused by missing unregister notifier (bsc#1248211).
- CVE-2025-38552: mptcp: plug races between subflow fail and subflow creation (bsc#1248230).
- CVE-2025-38653: proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al (bsc#1248630).
- CVE-2025-38699: scsi: bfa: Double-free fix (bsc#1249224).
- CVE-2025-38700: scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated (bsc#1249182).
- CVE-2025-38718: sctp: linearize cloned gso packets in sctp_rcv (bsc#1249161).
- CVE-2025-38734: net/smc: fix UAF on smcsk after smc_listen_out() (bsc#1249324).
- CVE-2025-38735: gve: prevent ethtool ops after shutdown (bsc#1249288).
- CVE-2025-39673: ppp: fix race conditions in ppp_fill_forward_path (bsc#1249320).
- CVE-2025-39676: scsi: qla4xxx: Prevent a potential error pointer dereference (bsc#1249302).
- CVE-2025-39683: tracing: Limit access to parser->buffer when trace_get_user failed (bsc#1249286).
- CVE-2025-39697: nfs: remove dead code for the old swap over NFS implementation (bsc#1249319).
- CVE-2025-39702: ipv6: sr: Fix MAC comparison to be constant-time (bsc#1249317).
- CVE-2025-39756: fs: Prevent file descriptor table allocations exceeding INT_MAX (bsc#1249512).
- CVE-2025-39794: ARM: tegra: Use I/O memcpy to write to IRAM (bsc#1249595).
- CVE-2025-39810: bnxt_en: Fix memory corruption when FW resources change during ifdown (bsc#1249975).
- CVE-2025-39812: sctp: initialize more fields in sctp_v6_from_sk() (bsc#1250202).
- CVE-2025-39813: ftrace: Fix potential warning in trace_printk_seq during ftrace_dump (bsc#1250032).
- CVE-2025-39828: atm: atmtcp: Prevent arbitrary write in atmtcp_recv_control() (bsc#1250205).
- CVE-2025-39832: net/mlx5: Add sync reset drop mode support (bsc#1249901).
- CVE-2025-39847: ppp: fix memory leak in pad_compress_skb (bsc#1250292).
- CVE-2025-39850: vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects (bsc#1250276).
- CVE-2025-39851: vxlan: Fix NPD when refreshing an FDB entry with a nexthop object (bsc#1250296).
- CVE-2025-39853: i40e: Fix potential invalid access when MAC list is empty (bsc#1250275).
- CVE-2025-39854: ice: fix NULL access of tx->in_use in ice_ll_ts_intr (bsc#1250297).
- CVE-2025-39866: fs: writeback: fix use-after-free in __mark_inode_dirty() (bsc#1250455).
- CVE-2025-39876: net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable() (bsc#1250400).
- CVE-2025-39881: kernfs: Fix UAF in polling when open file is released (bsc#1250379).
- CVE-2025-39895: sched: Fix sched_numa_find_nth_cpu() if mask offline (bsc#1250721).
- CVE-2025-39898: e1000e: fix heap overflow in e1000_set_eeprom (bsc#1250742).
- CVE-2025-39900: net_sched: gen_estimator: fix est_timer() vs CONFIG_PREEMPT_RT=y (bsc#1250758).
- CVE-2025-39902: mm/slub: avoid accessing metadata when pointer is invalid in object_err() (bsc#1250702).
- CVE-2025-39911: i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path (bsc#1250704).
- CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task (bsc#1251230).
- CVE-2025-39946: tls: make sure to abort the stream if headers are bogus (bsc#1251114).
- CVE-2025-39947: net/mlx5e: Harden uplink netdev access against device unbind (bsc#1251232).
- CVE-2025-39948: ice: fix Rx page leak on multi-buffer frames (bsc#1251233).
- CVE-2025-39949: qed: Don't collect too many protection override GRC elements (bsc#1251177).
- CVE-2025-39955: tcp: Clear tcp_sk(sk)->fastopen_rsk in tcp_disconnect() (bsc#1251804).
- CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047).
- CVE-2025-39969: i40e: fix validation of VF state in get resources (bsc#1252044).
- CVE-2025-39970: i40e: fix input validation logic for action_meta (bsc#1252051).
- CVE-2025-39971: i40e: fix idx validation in config queues msg (bsc#1252052).
- CVE-2025-39972: i40e: fix idx validation in i40e_validate_queue_map (bsc#1252039).
- CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).
- CVE-2025-39978: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() (bsc#1252069).
- CVE-2025-39984: net: tun: Update napi->skb after XDP process (bsc#1252081).
- CVE-2025-40000: wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait() (bsc#1252062).
- CVE-2025-40005: spi: cadence-quadspi: Implement refcount to handle unbind during busy (bsc#1252349).
- CVE-2025-40012: net/smc: fix warning in smc_rx_splice() when calling get_page() (bsc#1252330).
- CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252688).
- CVE-2025-40051: vhost: vringh: Modify the return value check (bsc#1252858).
- CVE-2025-40056: vhost: vringh: Fix copy_to_iter return value check (bsc#1252826).
- CVE-2025-40060: coresight: trbe: Return NULL pointer for allocation failures (bsc#1252848).
- CVE-2025-40078: bpf: Explicitly check accesses to bpf_sock_addr (bsc#1252789).
- CVE-2025-40100: btrfs: do not assert we found block group item when creating free space tree (bsc#1252918).
The following non security issues were fixed:
- ACPI/processor_idle: Add FFH state handling (jsc#PED-13815).
- ACPI/processor_idle: Export acpi_processor_ffh_play_dead() (jsc#PED-13815).
- ACPI: battery: Add synchronization between interface updates (git-fixes).
- ACPI: processor: Rescan 'dead' SMT siblings during initialization (jsc#PED-13815).
- KVM: PPC: Fix misleading interrupts comment in kvmppc_prepare_to_enter() (bsc#1215199).
- KVM: x86: Plumb in the vCPU to kvm_x86_ops.hwapic_isr_update() (git-fixes).
- KVM: x86: Process 'guest stopped request' once per guest time update (git-fixes).
- PM: hibernate: Add pm_hibernation_mode_is_suspend() (bsc#1243112).
- PM: hibernate: Add stub for pm_hibernate_is_recovering() (bsc#1243112).
- PM: hibernate: Fix pm_hibernation_mode_is_suspend() build breakage (bsc#1243112).
- PM: hibernate: add new api pm_hibernate_is_recovering() (bsc#1243112).
- bpf: Allow helper bpf_get_[ns_]current_pid_tgid() for all prog types (bsc#1252364).
- cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request() (stable-fixes git-fixes).
- cpuidle: Do not return from cpuidle_play_dead() on callback failures (jsc#PED-13815).
- dpll: Make ZL3073X invisible (bsc#1252253).
- dpll: zl3073x: Add firmware loading functionality (bsc#1252253).
- dpll: zl3073x: Add functions to access hardware registers (bsc#1252253).
- dpll: zl3073x: Add low-level flash functions (bsc#1252253).
- dpll: zl3073x: Add support to get fractional frequency offset (bsc#1252253).
- dpll: zl3073x: Add support to get phase offset on connected input pin (bsc#1252253).
- dpll: zl3073x: Add support to get/set esync on pins (bsc#1252253).
- dpll: zl3073x: Fix build failure (bsc#1252253).
- dpll: zl3073x: Fix double free in zl3073x_devlink_flash_update() (bsc#1252253).
- dpll: zl3073x: Handle missing or corrupted flash configuration (bsc#1252253).
- dpll: zl3073x: Implement devlink flash callback (bsc#1252253).
- dpll: zl3073x: Increase maximum size of flash utility (bsc#1252253).
- dpll: zl3073x: Refactor DPLL initialization (bsc#1252253).
- dpll: zl3073x: ZL3073X_I2C and ZL3073X_SPI should depend on NET (bsc#1252253).
- drm/amd : Update MES API header file for v11 & v12 (stable-fixes).
- drm/amd/amdgpu: Implement MES suspend/resume gang functionality for v12 (bsc#1243112).
- drm/amd/display: Add NULL check for stream before dereference in 'dm_vupdate_high_irq' (bsc#1243112).
- drm/amd/display: Enable Dynamic DTBCLK Switch (bsc#1243112).
- drm/amd/display: Fix vupdate_offload_work doc (bsc#1243112).
- drm/amd/display: fix dmub access race condition (bsc#1243112).
- drm/amd/display: more liberal vmin/vmax update for freesync (bsc#1243112).
- drm/amd/include : MES v11 and v12 API header update (stable-fixes).
- drm/amd/include : Update MES v12 API for fence update (stable-fixes).
- drm/amd/pm: fix smu table id bound check issue in smu_cmn_update_table() (git-fixes).
- drm/amd: Avoid evicting resources at S5 (bsc#1243112).
- drm/amd: Check whether secure display TA loaded successfully (bsc#1243112).
- drm/amd: Fix hybrid sleep (bsc#1243112).
- drm/amd: Only restore cached manual clock settings in restore if OD enabled (bsc#1243112).
- drm/amd: Restore cached manual clock settings during resume (bsc#1243112).
- drm/amdgpu/mes11: implement detect and reset callback (bsc#1243112).
- drm/amdgpu/mes12: implement detect and reset callback (bsc#1243112).
- drm/amdgpu/mes: add front end for detect and reset hung queue (bsc#1243112).
- drm/amdgpu/vpe: cancel delayed work in hw_fini (bsc#1243112).
- drm/amdgpu: Avoid rma causes GPU duplicate reset (bsc#1243112).
- drm/amdgpu: Fix for GPU reset being blocked by KIQ I/O (bsc#1243112).
- drm/amdgpu: Report individual reset error (bsc#1243112).
- drm/amdgpu: do not resume device in thaw for normal hibernation (bsc#1243112).
- drm/amdgpu: fix link error for !PM_SLEEP (bsc#1243112).
- drm/amdkfd: Fix mmap write lock not release (bsc#1243112).
- drm/xe/guc: Prepare GuC register list and update ADS size for error capture (stable-fixes).
- ext4: fix checks for orphan inodes (bsc#1250119).
- hfsplus: fix KMSAN uninit-value issue in hfsplus_delete_cat() (git-fixes).
- intel_idle: Provide the default enter_dead() handler (jsc#PED-13815).
- intel_idle: Rescan 'dead' SMT siblings during initialization (jsc#PED-13815).
- intel_idle: Use subsys_initcall_sync() for initialization (jsc#PED-13815).
- ixgbe: handle IXGBE_VF_FEATURES_NEGOTIATE mbox cmd (bsc#1247222).
- ixgbe: handle IXGBE_VF_GET_PF_LINK_STATE mailbox operation (bsc#1247222).
- ixgbevf: fix getting link speed data for E610 devices (bsc#1247222).
- ixgbevf: fix mailbox API compatibility by negotiating supported features (bsc#1247222).
- kdb: Replace deprecated strcpy() with memmove() in vkdb_printf() (bsc#1252939).
- net: mana: Use page pool fragments for RX buffers instead of full pages to improve memory efficiency (bsc#1248754).
- netfilter: nft_objref: validate objref and objrefmap expressions (bsc#1250237).
- nvme-auth: update bi_directional flag (git-fixes bsc#1249735).
- nvme-auth: update sc_c in host response (git-fixes bsc#1249397).
- nvme-fc: use lock accessing port_state and rport state (bsc#1245193 bsc#1247500).
- nvme-tcp: send only permitted commands for secure concat (git-fixes bsc#1247683).
- nvmet-fc: avoid scheduling association deletion twice (bsc#1245193 bsc#1247500).
- nvmet-fc: move lsop put work to nvmet_fc_ls_req_op (bsc#1245193 bsc#1247500).
- nvmet-fcloop: call done callback even when remote port is gone (bsc#1245193 bsc#1247500).
- perf/x86/intel: Allow to update user space GPRs from PEBS records (git-fixes).
- perf/x86/intel: Fix crash in icl_update_topdown_event() (git-fixes).
- phy: cadence: cdns-dphy: Update calibration wait time for startup state machine (git-fixes).
- platform/x86/amd/pmc: Add 1Ah family series to STB support list (bsc#1243112).
- platform/x86/amd/pmc: Add MECHREVO Yilong15Pro to spurious_8042 list (bsc#1243112).
- platform/x86/amd/pmc: Add Stellaris Slim Gen6 AMD to spurious 8042 quirks list (bsc#1243112).
- platform/x86/amd/pmc: Add VPE information for AMDI000A platform (bsc#1243112).
- platform/x86/amd/pmc: Add idlemask support for 1Ah family (bsc#1243112).
- platform/x86/amd/pmc: Extend support for PMC features on new AMD platform (bsc#1243112).
- platform/x86/amd/pmc: Fix SMU command submission path on new AMD platform (bsc#1243112).
- platform/x86/amd/pmc: Modify SMU message port for latest AMD platform (bsc#1243112).
- platform/x86/amd/pmc: Notify user when platform does not support s0ix transition (bsc#1243112).
- platform/x86/amd/pmc: Remove unnecessary line breaks (bsc#1243112).
- platform/x86/amd/pmc: Send OS_HINT command for AMDI000A platform (bsc#1243112).
- platform/x86/amd/pmc: Send OS_HINT command for new AMD platform (bsc#1243112).
- platform/x86/amd/pmc: Update IP information structure for newer SoCs (bsc#1243112).
- platform/x86/amd/pmc: Use ARRAY_SIZE() to fill num_ips information (bsc#1243112).
- platform/x86/amd/pmc: call amd_pmc_get_ip_info() during driver probe (bsc#1243112).
- platform/x86/amd: pmc: Add new ACPI ID AMDI000B (bsc#1243112).
- platform/x86/amd: pmc: Drop SMU F/W match for Cezanne (bsc#1243112).
- platform/x86/amd: pmc: Use guard(mutex) (bsc#1243112).
- powerpc/boot: Fix build with gcc 15 (bsc#1215199).
- powerpc/fadump: skip parameter area allocation when fadump is disabled (jsc#PED-9891 git-fixes).
- powerpc/kvm: Fix ifdef to remove build warning (bsc#1215199).
- powerpc/powernv/pci: Fix underflow and leak issue (bsc#1215199).
- powerpc/pseries/msi: Fix potential underflow and leak issue (bsc#1215199).
- powerpc: floppy: Add missing checks after DMA map (bsc#1215199).
- proc: fix missing pde_set_flags() for net proc files (bsc#1248630)
- proc: fix type confusion in pde_set_flags() (bsc#1248630)
- sched/idle: Conditionally handle tick broadcast in default_idle_call() (bsc#1248517).
- scsi: fc: Avoid -Wflex-array-member-not-at-end warnings (bsc#1250519).
- scsi: lpfc: Abort outstanding ELS WQEs regardless of if rmmod is in progress (bsc#1250519).
- scsi: lpfc: Check return status of lpfc_reset_flush_io_context during TGT_RESET (bsc#1250519).
- scsi: lpfc: Clean up allocated queues when queue setup mbox commands fail (bsc#1250519).
- scsi: lpfc: Copyright updates for 14.4.0.11 patches (bsc#1250519).
- scsi: lpfc: Decrement ndlp kref after FDISC retries exhausted (bsc#1250519).
- scsi: lpfc: Ensure PLOGI_ACC is sent prior to PRLI in Point to Point topology (bsc#1250519).
- scsi: lpfc: Fix buffer free/clear order in deferred receive path (bsc#1250519).
- scsi: lpfc: Fix wrong function reference in a comment (bsc#1250519).
- scsi: lpfc: Remove ndlp kref decrement clause for F_Port_Ctrl in lpfc_cleanup (bsc#1250519).
- scsi: lpfc: Remove redundant assignment to avoid memory leak (bsc#1250519).
- scsi: lpfc: Remove unused member variables in struct lpfc_hba and lpfc_vport (bsc#1250519).
- scsi: lpfc: Update lpfc version to 14.4.0.11 (bsc#1250519).
- scsi: lpfc: Use int type to store negative error codes (bsc#1250519).
- scsi: lpfc: use min() to improve code (bsc#1250519).
- serial: sc16is7xx: rename Kconfig CONFIG_SERIAL_SC16IS7XX_CORE (bsc#1252469) Re-enable CONFIG_SERIAL_SC16IS7X for aarch64 and x86_64 default configurations, but keep it disabled for kvmsmall configurations. For ppc64 and s390x drivers was not enabled, so keep it that way. Add sc16is7xx_spi and sc16is7xx_i2c drivers to supported list.
- skmsg: Return copied bytes in sk_msg_memcopy_from_iter (bsc#1250650).
- smb: client: fix crypto buffers in non-linear memory (bsc#1250491, bsc#1239206).
- smb: client: fix potential cfid UAF in smb2_query_info_compound (bsc#1248886).
- tcp_bpf: Fix copied value in tcp_bpf_sendmsg (bsc#1250650).
- tracing: Remove unneeded goto out logic (bsc#1249286).
- x86/idle: Sanitize X86_BUG_AMD_E400 handling (bsc#1248517).
- x86/resctrl: Fix miscount of bandwidth event when reactivating previously unavailable RMID (bsc#1252734).
- x86/resctrl: Refactor resctrl_arch_rmid_read() (bsc#1252734).
- x86/smp: Allow calling mwait_play_dead with an arbitrary hint (jsc#PED-13815).
- x86/smp: Fix mwait_play_dead() and acpi_processor_ffh_play_dead() noreturn behavior (jsc#PED-13815).
- x86/smp: PM/hibernate: Split arch_resume_nosmt() (jsc#PED-13815).
- x86/topology: Implement topology_is_core_online() to address SMT regression (jsc#PED-13815).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:4092-1
Released: Thu Nov 13 19:28:03 2025
Summary: Recommended update for elfutils
Type: recommended
Severity: moderate
References: 1237236,1237240,1237241,1237242
This update for elfutils fixes the following issues:
- Fixing build/testsuite for more recent glibc and kernels.
- Fixing denial of service and general buffer overflow errors
(bsc#1237236, bsc#1237240, bsc#1237241, bsc#1237242).
- Fixing testsuite race conditions in run-debuginfod-find.sh.
The following package changes have been done:
- kernel-macros-6.4.0-150700.53.22.1 updated
- kernel-devel-6.4.0-150700.53.22.1 updated
- libelf-devel-0.185-150400.5.8.3 updated
- kernel-default-devel-6.4.0-150700.53.22.1 updated
- kernel-syms-6.4.0-150700.53.22.1 updated
More information about the sle-container-updates
mailing list