SUSE-CU-2025:8379-1: Security update of suse/sle-micro-rancher/5.4
sle-container-updates at lists.suse.com
sle-container-updates at lists.suse.com
Sun Nov 16 08:16:10 UTC 2025
SUSE Container Update Advisory: suse/sle-micro-rancher/5.4
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2025:8379-1
Container Tags : suse/sle-micro-rancher/5.4:5.4.4.5.89 , suse/sle-micro-rancher/5.4:latest
Container Release : 4.5.89
Severity : important
Type : security
References : 1065729 1205128 1206893 1207612 1207619 1210763 1211162 1211692
1213098 1213114 1213747 1214954 1214992 1215148 1217366 1236104
1249479 1249608 1249857 1249859 1249988 1250742 1250816 1250946
1251027 1251032 1251034 1251035 1251040 1251043 1251045 1251047
1251052 1251057 1251059 1251061 1251063 1251064 1251065 1251066
1251068 1251072 1251080 1251082 1251086 1251087 1251088 1251091
1251092 1251093 1251097 1251099 1251101 1251104 1251110 1251113
1251115 1251123 1251128 1251129 1251133 1251136 1251147 1251149
1251154 1251159 1251164 1251166 1251169 1251170 1251173 1251178
1251180 1251182 1251197 1251200 1251201 1251202 1251208 1251210
1251215 1251218 1251222 1251223 1251230 1251247 1251268 1251281
1251282 1251283 1251285 1251286 1251292 1251294 1251295 1251296
1251298 1251299 1251300 1251302 1251303 1251306 1251310 1251312
1251322 1251324 1251325 1251326 1251327 1251329 1251330 1251331
1251519 1251521 1251522 1251527 1251529 1251550 1251723 1251725
1251728 1251730 1251736 1251737 1251741 1251743 1251750 1251753
1251759 1251761 1251762 1251763 1251764 1251767 1251769 1251772
1251775 1251777 1251785 1251823 1251930 1251967 1252033 1252035
1252047 1252069 1252265 1252474 1252475 1252476 1252480 1252484
1252486 1252489 1252490 1252492 1252495 1252497 1252499 1252501
1252508 1252509 1252513 1252515 1252516 1252519 1252521 1252522
1252523 1252526 1252528 1252529 1252532 1252535 1252536 1252537
1252538 1252539 1252542 1252545 1252549 1252554 1252560 1252564
1252565 1252568 1252634 1252688 1252785 1252893 1252904 1252919
CVE-2022-43945 CVE-2022-50327 CVE-2022-50334 CVE-2022-50470 CVE-2022-50471
CVE-2022-50472 CVE-2022-50475 CVE-2022-50478 CVE-2022-50480 CVE-2022-50482
CVE-2022-50484 CVE-2022-50485 CVE-2022-50487 CVE-2022-50488 CVE-2022-50489
CVE-2022-50490 CVE-2022-50492 CVE-2022-50493 CVE-2022-50494 CVE-2022-50496
CVE-2022-50497 CVE-2022-50498 CVE-2022-50499 CVE-2022-50501 CVE-2022-50503
CVE-2022-50504 CVE-2022-50505 CVE-2022-50509 CVE-2022-50511 CVE-2022-50512
CVE-2022-50513 CVE-2022-50514 CVE-2022-50516 CVE-2022-50519 CVE-2022-50520
CVE-2022-50521 CVE-2022-50523 CVE-2022-50525 CVE-2022-50528 CVE-2022-50529
CVE-2022-50530 CVE-2022-50532 CVE-2022-50534 CVE-2022-50535 CVE-2022-50537
CVE-2022-50541 CVE-2022-50542 CVE-2022-50544 CVE-2022-50545 CVE-2022-50546
CVE-2022-50549 CVE-2022-50551 CVE-2022-50553 CVE-2022-50556 CVE-2022-50559
CVE-2022-50560 CVE-2022-50561 CVE-2022-50562 CVE-2022-50563 CVE-2022-50564
CVE-2022-50566 CVE-2022-50567 CVE-2022-50568 CVE-2022-50570 CVE-2022-50572
CVE-2022-50574 CVE-2022-50575 CVE-2022-50576 CVE-2022-50578 CVE-2022-50579
CVE-2022-50580 CVE-2022-50581 CVE-2022-50582 CVE-2023-52923 CVE-2023-53365
CVE-2023-53500 CVE-2023-53533 CVE-2023-53534 CVE-2023-53541 CVE-2023-53542
CVE-2023-53548 CVE-2023-53551 CVE-2023-53552 CVE-2023-53553 CVE-2023-53554
CVE-2023-53556 CVE-2023-53559 CVE-2023-53560 CVE-2023-53564 CVE-2023-53566
CVE-2023-53567 CVE-2023-53568 CVE-2023-53571 CVE-2023-53572 CVE-2023-53574
CVE-2023-53576 CVE-2023-53579 CVE-2023-53582 CVE-2023-53587 CVE-2023-53589
CVE-2023-53592 CVE-2023-53594 CVE-2023-53597 CVE-2023-53603 CVE-2023-53604
CVE-2023-53605 CVE-2023-53607 CVE-2023-53608 CVE-2023-53611 CVE-2023-53612
CVE-2023-53615 CVE-2023-53616 CVE-2023-53617 CVE-2023-53619 CVE-2023-53622
CVE-2023-53625 CVE-2023-53626 CVE-2023-53631 CVE-2023-53637 CVE-2023-53639
CVE-2023-53640 CVE-2023-53641 CVE-2023-53644 CVE-2023-53648 CVE-2023-53650
CVE-2023-53651 CVE-2023-53658 CVE-2023-53659 CVE-2023-53662 CVE-2023-53667
CVE-2023-53668 CVE-2023-53670 CVE-2023-53673 CVE-2023-53674 CVE-2023-53675
CVE-2023-53679 CVE-2023-53680 CVE-2023-53681 CVE-2023-53683 CVE-2023-53687
CVE-2023-53692 CVE-2023-53693 CVE-2023-53695 CVE-2023-53696 CVE-2023-53700
CVE-2023-53704 CVE-2023-53705 CVE-2023-53708 CVE-2023-53709 CVE-2023-53711
CVE-2023-53715 CVE-2023-53717 CVE-2023-53718 CVE-2023-53719 CVE-2023-53722
CVE-2023-53723 CVE-2023-53724 CVE-2023-53725 CVE-2023-53726 CVE-2023-53730
CVE-2023-7324 CVE-2025-39742 CVE-2025-39797 CVE-2025-39945 CVE-2025-39965
CVE-2025-39967 CVE-2025-39968 CVE-2025-39973 CVE-2025-39978 CVE-2025-40018
CVE-2025-40044 CVE-2025-40088 CVE-2025-40102
-----------------------------------------------------------------
The container suse/sle-micro-rancher/5.4 was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:4111-1
Released: Sat Nov 15 19:38:39 2025
Summary: Security update for the Linux Kernel
Type: security
Severity: important
References: 1065729,1205128,1206893,1207612,1207619,1210763,1211162,1211692,1213098,1213114,1213747,1214954,1214992,1215148,1217366,1236104,1249479,1249608,1249857,1249859,1249988,1250742,1250816,1250946,1251027,1251032,1251034,1251035,1251040,1251043,1251045,1251047,1251052,1251057,1251059,1251061,1251063,1251064,1251065,1251066,1251068,1251072,1251080,1251082,1251086,1251087,1251088,1251091,1251092,1251093,1251097,1251099,1251101,1251104,1251110,1251113,1251115,1251123,1251128,1251129,1251133,1251136,1251147,1251149,1251154,1251159,1251164,1251166,1251169,1251170,1251173,1251178,1251180,1251182,1251197,1251200,1251201,1251202,1251208,1251210,1251215,1251218,1251222,1251223,1251230,1251247,1251268,1251281,1251282,1251283,1251285,1251286,1251292,1251294,1251295,1251296,1251298,1251299,1251300,1251302,1251303,1251306,1251310,1251312,1251322,1251324,1251325,1251326,1251327,1251329,1251330,1251331,1251519,1251521,1251522,1251527,1251529,1251550,1251723,1251725,1251728,1251730,1251736,1
251737,1251741,1251743,1251750,1251753,1251759,1251761,1251762,1251763,1251764,1251767,1251769,1251772,1251775,1251777,1251785,1251823,1251930,1251967,1252033,1252035,1252047,1252069,1252265,1252474,1252475,1252476,1252480,1252484,1252486,1252489,1252490,1252492,1252495,1252497,1252499,1252501,1252508,1252509,1252513,1252515,1252516,1252519,1252521,1252522,1252523,1252526,1252528,1252529,1252532,1252535,1252536,1252537,1252538,1252539,1252542,1252545,1252549,1252554,1252560,1252564,1252565,1252568,1252634,1252688,1252785,1252893,1252904,1252919,CVE-2022-43945,CVE-2022-50327,CVE-2022-50334,CVE-2022-50470,CVE-2022-50471,CVE-2022-50472,CVE-2022-50475,CVE-2022-50478,CVE-2022-50480,CVE-2022-50482,CVE-2022-50484,CVE-2022-50485,CVE-2022-50487,CVE-2022-50488,CVE-2022-50489,CVE-2022-50490,CVE-2022-50492,CVE-2022-50493,CVE-2022-50494,CVE-2022-50496,CVE-2022-50497,CVE-2022-50498,CVE-2022-50499,CVE-2022-50501,CVE-2022-50503,CVE-2022-50504,CVE-2022-50505,CVE-2022-50509,CVE-2022-50511,CVE-2022-50
512,CVE-2022-50513,CVE-2022-50514,CVE-2022-50516,CVE-2022-50519,CVE-2022-50520,CVE-2022-50521,CVE-2022-50523,CVE-2022-50525,CVE-2022-50528,CVE-2022-50529,CVE-2022-50530,CVE-2022-50532,CVE-2022-50534,CVE-2022-50535,CVE-2022-50537,CVE-2022-50541,CVE-2022-50542,CVE-2022-50544,CVE-2022-50545,CVE-2022-50546,CVE-2022-50549,CVE-2022-50551,CVE-2022-50553,CVE-2022-50556,CVE-2022-50559,CVE-2022-50560,CVE-2022-50561,CVE-2022-50562,CVE-2022-50563,CVE-2022-50564,CVE-2022-50566,CVE-2022-50567,CVE-2022-50568,CVE-2022-50570,CVE-2022-50572,CVE-2022-50574,CVE-2022-50575,CVE-2022-50576,CVE-2022-50578,CVE-2022-50579,CVE-2022-50580,CVE-2022-50581,CVE-2022-50582,CVE-2023-52923,CVE-2023-53365,CVE-2023-53500,CVE-2023-53533,CVE-2023-53534,CVE-2023-53541,CVE-2023-53542,CVE-2023-53548,CVE-2023-53551,CVE-2023-53552,CVE-2023-53553,CVE-2023-53554,CVE-2023-53556,CVE-2023-53559,CVE-2023-53560,CVE-2023-53564,CVE-2023-53566,CVE-2023-53567,CVE-2023-53568,CVE-2023-53571,CVE-2023-53572,CVE-2023-53574,CVE-2023-53576,CVE
-2023-53579,CVE-2023-53582,CVE-2023-53587,CVE-2023-53589,CVE-2023-53592,CVE-2023-53594,CVE-2023-53597,CVE-2023-53603,CVE-2023-53604,CVE-2023-53605,CVE-2023-53607,CVE-2023-53608,CVE-2023-53611,CVE-2023-53612,CVE-2023-53615,CVE-2023-53616,CVE-2023-53617,CVE-2023-53619,CVE-2023-53622,CVE-2023-53625,CVE-2023-53626,CVE-2023-53631,CVE-2023-53637,CVE-2023-53639,CVE-2023-53640,CVE-2023-53641,CVE-2023-53644,CVE-2023-53648,CVE-2023-53650,CVE-2023-53651,CVE-2023-53658,CVE-2023-53659,CVE-2023-53662,CVE-2023-53667,CVE-2023-53668,CVE-2023-53670,CVE-2023-53673,CVE-2023-53674,CVE-2023-53675,CVE-2023-53679,CVE-2023-53680,CVE-2023-53681,CVE-2023-53683,CVE-2023-53687,CVE-2023-53692,CVE-2023-53693,CVE-2023-53695,CVE-2023-53696,CVE-2023-53700,CVE-2023-53704,CVE-2023-53705,CVE-2023-53708,CVE-2023-53709,CVE-2023-53711,CVE-2023-53715,CVE-2023-53717,CVE-2023-53718,CVE-2023-53719,CVE-2023-53722,CVE-2023-53723,CVE-2023-53724,CVE-2023-53725,CVE-2023-53726,CVE-2023-53730,CVE-2023-7324,CVE-2025-39742,CVE-2025-39
797,CVE-2025-39945,CVE-2025-39965,CVE-2025-39967,CVE-2025-39968,CVE-2025-39973,CVE-2025-39978,CVE-2025-40018,CVE-2025-40044,CVE-2025-40088,CVE-2025-40102
The SUSE Linux Enterprise 15 SP4 kernel was updated to fix various security issues
The following security issues were fixed:
- CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1249859).
- CVE-2022-50334: hugetlbfs: fix null-ptr-deref in hugetlbfs_parse_param() (bsc#1249857).
- CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251164).
- CVE-2022-50516: fs: dlm: fix invalid derefence of sb_lvbptr (bsc#1251741).
- CVE-2023-53365: ip6mr: Fix skb_under_panic in ip6mr_cache_report() (bsc#1249988).
- CVE-2023-53500: xfrm: fix slab-use-after-free in decode_session6 (bsc#1250816).
- CVE-2023-53559: ip_vti: fix potential slab-use-after-free in decode_session6 (bsc#1251052).
- CVE-2023-53574: wifi: rtw88: delete timer and free skb queue when unloading (bsc#1251222).
- CVE-2023-53619: netfilter: conntrack: Avoid nf_ct_helper_hash uses after free (bsc#1251743).
- CVE-2023-53673: Bluetooth: hci_event: call disconnect callback before deleting conn (bsc#1251763).
- CVE-2023-53705: ipv6: Fix out-of-bounds access in ipv6_find_tlv() (bsc#1252554).
- CVE-2025-39742: RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask() (bsc#1249479).
- CVE-2025-39945: cnic: Fix use-after-free bugs in cnic_delete_task (bsc#1251230).
- CVE-2025-39967: fbcon: fix integer overflow in fbcon_do_set_font (bsc#1252033).
- CVE-2025-39968: i40e: add max boundary check for VF filters (bsc#1252047).
- CVE-2025-39973: i40e: add validation for ring_len param (bsc#1252035).
- CVE-2025-39978: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() (bsc#1252069).
- CVE-2025-40018: ipvs: Defer ip_vs_ftp unregister during netns cleanup (bsc#1252688).
- CVE-2025-40044: fs: udf: fix OOB read in lengthAllocDescs handling (bsc#1252785).
- CVE-2025-40088: hfsplus: fix slab-out-of-bounds read in hfsplus_strcasecmp() (bsc#1252904).
- CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919).
The following non security issues were fixed:
- fbcon: Fix OOB access in font allocation (bsc#1252033)
- mm: avoid unnecessary page fault retires on shared memory types (bsc#1251823).
- net: hv_netvsc: fix loss of early receive events from host during channel open (bsc#1252265).
The following package changes have been done:
- kernel-default-5.14.21-150400.24.184.1 updated
More information about the sle-container-updates
mailing list