SUSE-IU-2025:3244-1: Security update of suse/sle-micro/rt-5.5
sle-container-updates at lists.suse.com
sle-container-updates at lists.suse.com
Fri Oct 24 07:08:44 UTC 2025
SUSE Image Update Advisory: suse/sle-micro/rt-5.5
-----------------------------------------------------------------
Image Advisory ID : SUSE-IU-2025:3244-1
Image Tags : suse/sle-micro/rt-5.5:2.0.4 , suse/sle-micro/rt-5.5:2.0.4-4.5.508 , suse/sle-micro/rt-5.5:latest
Image Release : 4.5.508
Severity : important
Type : security
References : 1065729 1164051 1193629 1194869 1202700 1203063 1203332 1204228
1205128 1205205 1206451 1206456 1206468 1206843 1206883 1206884
1207158 1207361 1207621 1207624 1207625 1207628 1207629 1207631
1207645 1207651 1208607 1209287 1209291 1209980 1210584 1211960
1212603 1213015 1213016 1213040 1213041 1213061 1213099 1213104
1213533 1213666 1213747 1214073 1214953 1214967 1215150 1215696
1215911 1216976 1217790 1220185 1220186 1223959 1234639 1236104
1237449 1238160 1241353 1242846 1243539 1244337 1244732 1245666
1246879 1246968 1247028 1247172 1247239 1248108 1248111 1248255
1248399 1248628 1248639 1248847 1249126 1249158 1249159 1249186
1249195 1249200 1249220 1249266 1249315 1249324 1249346 1249353
1249374 1249516 1249538 1249548 1249604 1249638 1249639 1249641
1249642 1249648 1249650 1249651 1249658 1249661 1249664 1249667
1249669 1249673 1249677 1249681 1249683 1249685 1249687 1249691
1249695 1249696 1249699 1249700 1249701 1249704 1249705 1249706
1249707 1249708 1249709 1249712 1249713 1249715 1249716 1249718
1249722 1249727 1249730 1249733 1249734 1249739 1249740 1249741
1249742 1249743 1249745 1249746 1249747 1249749 1249750 1249751
1249753 1249756 1249757 1249758 1249762 1249767 1249777 1249780
1249781 1249782 1249784 1249791 1249799 1249800 1249802 1249808
1249810 1249816 1249820 1249824 1249825 1249827 1249836 1249840
1249844 1249846 1249853 1249858 1249860 1249861 1249864 1249865
1249866 1249867 1249868 1249869 1249872 1249874 1249877 1249880
1249882 1249883 1249884 1249885 1249890 1249892 1249894 1249908
1249910 1249911 1249913 1249914 1249917 1249918 1249920 1249923
1249924 1249925 1249927 1249928 1249930 1249933 1249934 1249936
1249938 1249939 1249940 1249944 1249947 1249949 1249950 1249951
1249954 1249958 1249979 1249981 1249991 1249994 1249997 1250002
1250006 1250007 1250009 1250010 1250011 1250014 1250015 1250017
1250023 1250024 1250026 1250037 1250039 1250040 1250041 1250042
1250044 1250047 1250049 1250052 1250055 1250058 1250060 1250062
1250065 1250066 1250068 1250070 1250071 1250072 1250075 1250077
1250080 1250081 1250083 1250089 1250103 1250104 1250105 1250106
1250107 1250108 1250112 1250114 1250117 1250118 1250121 1250127
1250128 1250130 1250131 1250132 1250134 1250137 1250138 1250140
1250144 1250145 1250151 1250153 1250156 1250157 1250159 1250161
1250165 1250168 1250178 1250180 1250181 1250182 1250183 1250184
1250187 1250189 1250191 1250197 1250198 1250200 1250201 1250208
1250209 1250211 1250215 1250245 1250247 1250250 1250257 1250264
1250269 1250277 1250278 1250285 1250287 1250293 1250301 1250303
1250306 1250309 1250311 1250313 1250315 1250316 1250322 1250323
1250324 1250325 1250327 1250328 1250331 1250358 1250362 1250363
1250370 1250374 1250391 1250392 1250393 1250394 1250395 1250397
1250406 1250412 1250418 1250425 1250428 1250453 1250454 1250457
1250459 1250522 1250759 1250761 1250762 1250763 1250765 1250767
1250768 1250771 1250774 1250781 1250784 1250786 1250787 1250790
1250791 1250792 1250793 1250797 1250799 1250807 1250810 1250811
1250814 1250818 1250819 1250822 1250823 1250824 1250825 1250829
1250830 1250831 1250832 1250839 1250841 1250842 1250843 1250846
1250847 1250848 1250849 1250850 1250851 1250853 1250856 1250861
1250862 1250863 1250864 1250866 1250867 1250868 1250872 1250873
1250874 1250875 1250877 1250879 1250881 1250883 1250887 1250888
1250889 1250890 1250891 1250905 1250913 1250915 1250917 1250923
1250927 1250928 1250931 1250932 1250948 1250949 1250953 1250963
1250964 1250965 CVE-2022-2602 CVE-2022-2978 CVE-2022-36280 CVE-2022-43945
CVE-2022-49138 CVE-2022-50233 CVE-2022-50234 CVE-2022-50235 CVE-2022-50239
CVE-2022-50241 CVE-2022-50242 CVE-2022-50246 CVE-2022-50247 CVE-2022-50248
CVE-2022-50249 CVE-2022-50250 CVE-2022-50251 CVE-2022-50252 CVE-2022-50255
CVE-2022-50257 CVE-2022-50258 CVE-2022-50260 CVE-2022-50261 CVE-2022-50264
CVE-2022-50266 CVE-2022-50267 CVE-2022-50268 CVE-2022-50269 CVE-2022-50271
CVE-2022-50272 CVE-2022-50275 CVE-2022-50276 CVE-2022-50277 CVE-2022-50278
CVE-2022-50279 CVE-2022-50282 CVE-2022-50286 CVE-2022-50287 CVE-2022-50288
CVE-2022-50289 CVE-2022-50292 CVE-2022-50294 CVE-2022-50297 CVE-2022-50298
CVE-2022-50299 CVE-2022-50301 CVE-2022-50303 CVE-2022-50308 CVE-2022-50309
CVE-2022-50312 CVE-2022-50317 CVE-2022-50318 CVE-2022-50320 CVE-2022-50321
CVE-2022-50323 CVE-2022-50324 CVE-2022-50325 CVE-2022-50328 CVE-2022-50329
CVE-2022-50330 CVE-2022-50331 CVE-2022-50333 CVE-2022-50339 CVE-2022-50340
CVE-2022-50342 CVE-2022-50344 CVE-2022-50346 CVE-2022-50347 CVE-2022-50348
CVE-2022-50349 CVE-2022-50351 CVE-2022-50353 CVE-2022-50354 CVE-2022-50355
CVE-2022-50356 CVE-2022-50357 CVE-2022-50358 CVE-2022-50359 CVE-2022-50360
CVE-2022-50362 CVE-2022-50364 CVE-2022-50367 CVE-2022-50368 CVE-2022-50369
CVE-2022-50370 CVE-2022-50372 CVE-2022-50373 CVE-2022-50374 CVE-2022-50375
CVE-2022-50376 CVE-2022-50378 CVE-2022-50379 CVE-2022-50381 CVE-2022-50385
CVE-2022-50386 CVE-2022-50388 CVE-2022-50389 CVE-2022-50390 CVE-2022-50391
CVE-2022-50392 CVE-2022-50393 CVE-2022-50394 CVE-2022-50395 CVE-2022-50396
CVE-2022-50398 CVE-2022-50399 CVE-2022-50401 CVE-2022-50402 CVE-2022-50404
CVE-2022-50406 CVE-2022-50408 CVE-2022-50409 CVE-2022-50410 CVE-2022-50411
CVE-2022-50412 CVE-2022-50414 CVE-2022-50417 CVE-2022-50418 CVE-2022-50419
CVE-2022-50422 CVE-2022-50423 CVE-2022-50425 CVE-2022-50427 CVE-2022-50428
CVE-2022-50429 CVE-2022-50430 CVE-2022-50431 CVE-2022-50432 CVE-2022-50433
CVE-2022-50434 CVE-2022-50435 CVE-2022-50436 CVE-2022-50437 CVE-2022-50439
CVE-2022-50440 CVE-2022-50441 CVE-2022-50443 CVE-2022-50444 CVE-2022-50447
CVE-2022-50449 CVE-2022-50452 CVE-2022-50453 CVE-2022-50454 CVE-2022-50456
CVE-2022-50458 CVE-2022-50459 CVE-2022-50460 CVE-2022-50464 CVE-2022-50465
CVE-2022-50466 CVE-2022-50467 CVE-2022-50468 CVE-2022-50469 CVE-2023-1380
CVE-2023-28328 CVE-2023-31248 CVE-2023-3772 CVE-2023-39197 CVE-2023-42753
CVE-2023-52923 CVE-2023-53147 CVE-2023-53149 CVE-2023-53150 CVE-2023-53151
CVE-2023-53152 CVE-2023-53153 CVE-2023-53165 CVE-2023-53167 CVE-2023-53168
CVE-2023-53171 CVE-2023-53174 CVE-2023-53176 CVE-2023-53178 CVE-2023-53179
CVE-2023-53181 CVE-2023-53182 CVE-2023-53185 CVE-2023-53189 CVE-2023-53193
CVE-2023-53196 CVE-2023-53197 CVE-2023-53199 CVE-2023-53201 CVE-2023-53205
CVE-2023-53210 CVE-2023-53213 CVE-2023-53215 CVE-2023-53216 CVE-2023-53219
CVE-2023-53222 CVE-2023-53223 CVE-2023-53226 CVE-2023-53229 CVE-2023-53230
CVE-2023-53232 CVE-2023-53234 CVE-2023-53237 CVE-2023-53238 CVE-2023-53239
CVE-2023-53241 CVE-2023-53242 CVE-2023-53244 CVE-2023-53245 CVE-2023-53246
CVE-2023-53249 CVE-2023-53250 CVE-2023-53251 CVE-2023-53252 CVE-2023-53255
CVE-2023-53257 CVE-2023-53258 CVE-2023-53259 CVE-2023-53263 CVE-2023-53265
CVE-2023-53268 CVE-2023-53270 CVE-2023-53272 CVE-2023-53273 CVE-2023-53275
CVE-2023-53276 CVE-2023-53277 CVE-2023-53280 CVE-2023-53281 CVE-2023-53282
CVE-2023-53284 CVE-2023-53286 CVE-2023-53287 CVE-2023-53288 CVE-2023-53295
CVE-2023-53297 CVE-2023-53298 CVE-2023-53299 CVE-2023-53302 CVE-2023-53304
CVE-2023-53305 CVE-2023-53309 CVE-2023-53311 CVE-2023-53313 CVE-2023-53314
CVE-2023-53315 CVE-2023-53316 CVE-2023-53317 CVE-2023-53320 CVE-2023-53321
CVE-2023-53322 CVE-2023-53324 CVE-2023-53326 CVE-2023-53330 CVE-2023-53331
CVE-2023-53332 CVE-2023-53333 CVE-2023-53334 CVE-2023-53335 CVE-2023-53337
CVE-2023-53340 CVE-2023-53344 CVE-2023-53347 CVE-2023-53349 CVE-2023-53352
CVE-2023-53356 CVE-2023-53357 CVE-2023-53359 CVE-2023-53368 CVE-2023-53370
CVE-2023-53371 CVE-2023-53373 CVE-2023-53375 CVE-2023-53377 CVE-2023-53378
CVE-2023-53379 CVE-2023-53380 CVE-2023-53381 CVE-2023-53383 CVE-2023-53384
CVE-2023-53386 CVE-2023-53388 CVE-2023-53390 CVE-2023-53391 CVE-2023-53393
CVE-2023-53395 CVE-2023-53396 CVE-2023-53398 CVE-2023-53400 CVE-2023-53404
CVE-2023-53405 CVE-2023-53406 CVE-2023-53409 CVE-2023-53413 CVE-2023-53414
CVE-2023-53415 CVE-2023-53416 CVE-2023-53422 CVE-2023-53427 CVE-2023-53431
CVE-2023-53435 CVE-2023-53436 CVE-2023-53437 CVE-2023-53438 CVE-2023-53440
CVE-2023-53442 CVE-2023-53443 CVE-2023-53444 CVE-2023-53446 CVE-2023-53448
CVE-2023-53449 CVE-2023-53451 CVE-2023-53452 CVE-2023-53453 CVE-2023-53454
CVE-2023-53456 CVE-2023-53457 CVE-2023-53458 CVE-2023-53463 CVE-2023-53464
CVE-2023-53465 CVE-2023-53466 CVE-2023-53468 CVE-2023-53471 CVE-2023-53472
CVE-2023-53473 CVE-2023-53474 CVE-2023-53475 CVE-2023-53476 CVE-2023-53480
CVE-2023-53482 CVE-2023-53485 CVE-2023-53487 CVE-2023-53488 CVE-2023-53489
CVE-2023-53492 CVE-2023-53494 CVE-2023-53496 CVE-2023-53498 CVE-2023-53499
CVE-2023-53505 CVE-2023-53506 CVE-2023-53509 CVE-2023-53511 CVE-2023-53512
CVE-2023-53515 CVE-2023-53518 CVE-2023-53519 CVE-2023-53521 CVE-2023-53524
CVE-2023-53525 CVE-2023-53526 CVE-2023-53530 CVE-2023-53531 CVE-2023-53532
CVE-2024-26583 CVE-2024-26584 CVE-2024-58240 CVE-2025-37738 CVE-2025-37958
CVE-2025-38014 CVE-2025-38111 CVE-2025-38380 CVE-2025-38488 CVE-2025-38553
CVE-2025-38572 CVE-2025-38659 CVE-2025-38664 CVE-2025-38678 CVE-2025-38683
CVE-2025-38685 CVE-2025-38706 CVE-2025-38713 CVE-2025-38734 CVE-2025-39691
CVE-2025-39703 CVE-2025-39726 CVE-2025-39746 CVE-2025-39751 CVE-2025-39790
CVE-2025-39823 CVE-2025-39824 CVE-2025-39860 CVE-2025-39869
-----------------------------------------------------------------
The container suse/sle-micro/rt-5.5 was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3761-1
Released: Thu Oct 23 17:04:35 2025
Summary: Security update for the Linux Kernel
Type: security
Severity: important
References: 1065729,1164051,1193629,1194869,1202700,1203063,1203332,1204228,1205128,1205205,1206451,1206456,1206468,1206843,1206883,1206884,1207158,1207361,1207621,1207624,1207625,1207628,1207629,1207631,1207645,1207651,1208607,1209287,1209291,1209980,1210584,1211960,1212603,1213015,1213016,1213040,1213041,1213061,1213099,1213104,1213533,1213666,1213747,1214073,1214953,1214967,1215150,1215696,1215911,1216976,1217790,1220185,1220186,1223959,1234639,1236104,1237449,1238160,1241353,1242846,1243539,1244337,1244732,1245666,1246879,1246968,1247028,1247172,1247239,1248108,1248111,1248255,1248399,1248628,1248639,1248847,1249126,1249158,1249159,1249186,1249195,1249200,1249220,1249266,1249315,1249324,1249346,1249353,1249374,1249516,1249538,1249548,1249604,1249638,1249639,1249641,1249642,1249648,1249650,1249651,1249658,1249661,1249664,1249667,1249669,1249673,1249677,1249681,1249683,1249685,1249687,1249691,1249695,1249696,1249699,1249700,1249701,1249704,1249705,1249706,1249707,1249708,1249709,1
249712,1249713,1249715,1249716,1249718,1249722,1249727,1249730,1249733,1249734,1249739,1249740,1249741,1249742,1249743,1249745,1249746,1249747,1249749,1249750,1249751,1249753,1249756,1249757,1249758,1249762,1249767,1249777,1249780,1249781,1249782,1249784,1249791,1249799,1249800,1249802,1249808,1249810,1249816,1249820,1249824,1249825,1249827,1249836,1249840,1249844,1249846,1249853,1249858,1249860,1249861,1249864,1249865,1249866,1249867,1249868,1249869,1249872,1249874,1249877,1249880,1249882,1249883,1249884,1249885,1249890,1249892,1249894,1249908,1249910,1249911,1249913,1249914,1249917,1249918,1249920,1249923,1249924,1249925,1249927,1249928,1249930,1249933,1249934,1249936,1249938,1249939,1249940,1249944,1249947,1249949,1249950,1249951,1249954,1249958,1249979,1249981,1249991,1249994,1249997,1250002,1250006,1250007,1250009,1250010,1250011,1250014,1250015,1250017,1250023,1250024,1250026,1250037,1250039,1250040,1250041,1250042,1250044,1250047,1250049,1250052,1250055,1250058,1250060,125006
2,1250065,1250066,1250068,1250070,1250071,1250072,1250075,1250077,1250080,1250081,1250083,1250089,1250103,1250104,1250105,1250106,1250107,1250108,1250112,1250114,1250117,1250118,1250121,1250127,1250128,1250130,1250131,1250132,1250134,1250137,1250138,1250140,1250144,1250145,1250151,1250153,1250156,1250157,1250159,1250161,1250165,1250168,1250178,1250180,1250181,1250182,1250183,1250184,1250187,1250189,1250191,1250197,1250198,1250200,1250201,1250208,1250209,1250211,1250215,1250245,1250247,1250250,1250257,1250264,1250269,1250277,1250278,1250285,1250287,1250293,1250301,1250303,1250306,1250309,1250311,1250313,1250315,1250316,1250322,1250323,1250324,1250325,1250327,1250328,1250331,1250358,1250362,1250363,1250370,1250374,1250391,1250392,1250393,1250394,1250395,1250397,1250406,1250412,1250418,1250425,1250428,1250453,1250454,1250457,1250459,1250522,1250759,1250761,1250762,1250763,1250765,1250767,1250768,1250771,1250774,1250781,1250784,1250786,1250787,1250790,1250791,1250792,1250793,1250797,125
0799,1250807,1250810,1250811,1250814,1250818,1250819,1250822,1250823,1250824,1250825,1250829,1250830,1250831,1250832,1250839,1250841,1250842,1250843,1250846,1250847,1250848,1250849,1250850,1250851,1250853,1250856,1250861,1250862,1250863,1250864,1250866,1250867,1250868,1250872,1250873,1250874,1250875,1250877,1250879,1250881,1250883,1250887,1250888,1250889,1250890,1250891,1250905,1250913,1250915,1250917,1250923,1250927,1250928,1250931,1250932,1250948,1250949,1250953,1250963,1250964,1250965,CVE-2022-2602,CVE-2022-2978,CVE-2022-36280,CVE-2022-43945,CVE-2022-49138,CVE-2022-50233,CVE-2022-50234,CVE-2022-50235,CVE-2022-50239,CVE-2022-50241,CVE-2022-50242,CVE-2022-50246,CVE-2022-50247,CVE-2022-50248,CVE-2022-50249,CVE-2022-50250,CVE-2022-50251,CVE-2022-50252,CVE-2022-50255,CVE-2022-50257,CVE-2022-50258,CVE-2022-50260,CVE-2022-50261,CVE-2022-50264,CVE-2022-50266,CVE-2022-50267,CVE-2022-50268,CVE-2022-50269,CVE-2022-50271,CVE-2022-50272,CVE-2022-50275,CVE-2022-50276,CVE-2022-50277,CVE-2022-50
278,CVE-2022-50279,CVE-2022-50282,CVE-2022-50286,CVE-2022-50287,CVE-2022-50288,CVE-2022-50289,CVE-2022-50292,CVE-2022-50294,CVE-2022-50297,CVE-2022-50298,CVE-2022-50299,CVE-2022-50301,CVE-2022-50303,CVE-2022-50308,CVE-2022-50309,CVE-2022-50312,CVE-2022-50317,CVE-2022-50318,CVE-2022-50320,CVE-2022-50321,CVE-2022-50323,CVE-2022-50324,CVE-2022-50325,CVE-2022-50328,CVE-2022-50329,CVE-2022-50330,CVE-2022-50331,CVE-2022-50333,CVE-2022-50339,CVE-2022-50340,CVE-2022-50342,CVE-2022-50344,CVE-2022-50346,CVE-2022-50347,CVE-2022-50348,CVE-2022-50349,CVE-2022-50351,CVE-2022-50353,CVE-2022-50354,CVE-2022-50355,CVE-2022-50356,CVE-2022-50357,CVE-2022-50358,CVE-2022-50359,CVE-2022-50360,CVE-2022-50362,CVE-2022-50364,CVE-2022-50367,CVE-2022-50368,CVE-2022-50369,CVE-2022-50370,CVE-2022-50372,CVE-2022-50373,CVE-2022-50374,CVE-2022-50375,CVE-2022-50376,CVE-2022-50378,CVE-2022-50379,CVE-2022-50381,CVE-2022-50385,CVE-2022-50386,CVE-2022-50388,CVE-2022-50389,CVE-2022-50390,CVE-2022-50391,CVE-2022-50392,CVE
-2022-50393,CVE-2022-50394,CVE-2022-50395,CVE-2022-50396,CVE-2022-50398,CVE-2022-50399,CVE-2022-50401,CVE-2022-50402,CVE-2022-50404,CVE-2022-50406,CVE-2022-50408,CVE-2022-50409,CVE-2022-50410,CVE-2022-50411,CVE-2022-50412,CVE-2022-50414,CVE-2022-50417,CVE-2022-50418,CVE-2022-50419,CVE-2022-50422,CVE-2022-50423,CVE-2022-50425,CVE-2022-50427,CVE-2022-50428,CVE-2022-50429,CVE-2022-50430,CVE-2022-50431,CVE-2022-50432,CVE-2022-50433,CVE-2022-50434,CVE-2022-50435,CVE-2022-50436,CVE-2022-50437,CVE-2022-50439,CVE-2022-50440,CVE-2022-50441,CVE-2022-50443,CVE-2022-50444,CVE-2022-50447,CVE-2022-50449,CVE-2022-50452,CVE-2022-50453,CVE-2022-50454,CVE-2022-50456,CVE-2022-50458,CVE-2022-50459,CVE-2022-50460,CVE-2022-50464,CVE-2022-50465,CVE-2022-50466,CVE-2022-50467,CVE-2022-50468,CVE-2022-50469,CVE-2023-1380,CVE-2023-28328,CVE-2023-31248,CVE-2023-3772,CVE-2023-39197,CVE-2023-42753,CVE-2023-52923,CVE-2023-53147,CVE-2023-53149,CVE-2023-53150,CVE-2023-53151,CVE-2023-53152,CVE-2023-53153,CVE-2023-531
65,CVE-2023-53167,CVE-2023-53168,CVE-2023-53171,CVE-2023-53174,CVE-2023-53176,CVE-2023-53178,CVE-2023-53179,CVE-2023-53181,CVE-2023-53182,CVE-2023-53185,CVE-2023-53189,CVE-2023-53193,CVE-2023-53196,CVE-2023-53197,CVE-2023-53199,CVE-2023-53201,CVE-2023-53205,CVE-2023-53210,CVE-2023-53213,CVE-2023-53215,CVE-2023-53216,CVE-2023-53219,CVE-2023-53222,CVE-2023-53223,CVE-2023-53226,CVE-2023-53229,CVE-2023-53230,CVE-2023-53232,CVE-2023-53234,CVE-2023-53237,CVE-2023-53238,CVE-2023-53239,CVE-2023-53241,CVE-2023-53242,CVE-2023-53244,CVE-2023-53245,CVE-2023-53246,CVE-2023-53249,CVE-2023-53250,CVE-2023-53251,CVE-2023-53252,CVE-2023-53255,CVE-2023-53257,CVE-2023-53258,CVE-2023-53259,CVE-2023-53263,CVE-2023-53265,CVE-2023-53268,CVE-2023-53270,CVE-2023-53272,CVE-2023-53273,CVE-2023-53275,CVE-2023-53276,CVE-2023-53277,CVE-2023-53280,CVE-2023-53281,CVE-2023-53282,CVE-2023-53284,CVE-2023-53286,CVE-2023-53287,CVE-2023-53288,CVE-2023-53295,CVE-2023-53297,CVE-2023-53298,CVE-2023-53299,CVE-2023-53302,CVE-
2023-53304,CVE-2023-53305,CVE-2023-53309,CVE-2023-53311,CVE-2023-53313,CVE-2023-53314,CVE-2023-53315,CVE-2023-53316,CVE-2023-53317,CVE-2023-53320,CVE-2023-53321,CVE-2023-53322,CVE-2023-53324,CVE-2023-53326,CVE-2023-53330,CVE-2023-53331,CVE-2023-53332,CVE-2023-53333,CVE-2023-53334,CVE-2023-53335,CVE-2023-53337,CVE-2023-53340,CVE-2023-53344,CVE-2023-53347,CVE-2023-53349,CVE-2023-53352,CVE-2023-53356,CVE-2023-53357,CVE-2023-53359,CVE-2023-53368,CVE-2023-53370,CVE-2023-53371,CVE-2023-53373,CVE-2023-53375,CVE-2023-53377,CVE-2023-53378,CVE-2023-53379,CVE-2023-53380,CVE-2023-53381,CVE-2023-53383,CVE-2023-53384,CVE-2023-53386,CVE-2023-53388,CVE-2023-53390,CVE-2023-53391,CVE-2023-53393,CVE-2023-53395,CVE-2023-53396,CVE-2023-53398,CVE-2023-53400,CVE-2023-53404,CVE-2023-53405,CVE-2023-53406,CVE-2023-53409,CVE-2023-53413,CVE-2023-53414,CVE-2023-53415,CVE-2023-53416,CVE-2023-53422,CVE-2023-53427,CVE-2023-53431,CVE-2023-53435,CVE-2023-53436,CVE-2023-53437,CVE-2023-53438,CVE-2023-53440,CVE-2023-53
442,CVE-2023-53443,CVE-2023-53444,CVE-2023-53446,CVE-2023-53448,CVE-2023-53449,CVE-2023-53451,CVE-2023-53452,CVE-2023-53453,CVE-2023-53454,CVE-2023-53456,CVE-2023-53457,CVE-2023-53458,CVE-2023-53463,CVE-2023-53464,CVE-2023-53465,CVE-2023-53466,CVE-2023-53468,CVE-2023-53471,CVE-2023-53472,CVE-2023-53473,CVE-2023-53474,CVE-2023-53475,CVE-2023-53476,CVE-2023-53480,CVE-2023-53482,CVE-2023-53485,CVE-2023-53487,CVE-2023-53488,CVE-2023-53489,CVE-2023-53492,CVE-2023-53494,CVE-2023-53496,CVE-2023-53498,CVE-2023-53499,CVE-2023-53505,CVE-2023-53506,CVE-2023-53509,CVE-2023-53511,CVE-2023-53512,CVE-2023-53515,CVE-2023-53518,CVE-2023-53519,CVE-2023-53521,CVE-2023-53524,CVE-2023-53525,CVE-2023-53526,CVE-2023-53530,CVE-2023-53531,CVE-2023-53532,CVE-2024-26583,CVE-2024-26584,CVE-2024-58240,CVE-2025-37738,CVE-2025-37958,CVE-2025-38014,CVE-2025-38111,CVE-2025-38380,CVE-2025-38488,CVE-2025-38553,CVE-2025-38572,CVE-2025-38659,CVE-2025-38664,CVE-2025-38678,CVE-2025-38683,CVE-2025-38685,CVE-2025-38706,CVE
-2025-38713,CVE-2025-38734,CVE-2025-39691,CVE-2025-39703,CVE-2025-39726,CVE-2025-39746,CVE-2025-39751,CVE-2025-39790,CVE-2025-39823,CVE-2025-39824,CVE-2025-39860,CVE-2025-39869
The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes.
The following security bugs were fixed:
- CVE-2022-49138: Bluetooth: hci_event: Fix checking conn for le_conn_complete_evt (bsc#1238160).
- CVE-2022-50233: Bluetooth: eir: Fix using strlen with hdev->{dev_name,short_name} (bsc#1246968).
- CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249846).
- CVE-2022-50409: net: If sock is dead do not access sock's sk_wq in sk_stream_wait_memory (bsc#1250392).
- CVE-2023-53178: mm: fix zswap writeback race condition (bsc#1249827).
- CVE-2023-53257: wifi: mac80211: check S1G action frame size (bsc#1249869).
- CVE-2023-53321: wifi: mac80211_hwsim: drop short frames (bsc#1250313).
- CVE-2023-53438: x86/MCE: Always save CS register on AMD Zen IF Poison errors (bsc#1250180).
- CVE-2025-37738: ext4: ignore xattrs past end (bsc#1242846).
- CVE-2025-37958: mm/huge_memory: fix dereferencing invalid pmd migration entry (bsc#1243539).
- CVE-2025-38014: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (bsc#1244732).
- CVE-2025-38111: net/mdiobus: Fix potential out-of-bounds read/write access (bsc#1245666).
- CVE-2025-38380: i2c/designware: Fix an initialization issue (bsc#1247028).
- CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239).
- CVE-2025-38553: net/sched: Restrict conditions for adding duplicating netems to qdisc tree (bsc#1248255).
- CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248399).
- CVE-2025-38659: gfs2: No more self recovery (bsc#1248639).
- CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248628).
- CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249126).
- CVE-2025-38685: fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (bsc#1249220).
- CVE-2025-38706: ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() (bsc#1249195).
- CVE-2025-38713: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (bsc#1249200).
- CVE-2025-38734: net/smc: fix UAF on smcsk after smc_listen_out() (bsc#1249324).
- CVE-2025-39691: fs/buffer: fix use-after-free when call bh_read() helper (bsc#1249374).
- CVE-2025-39703: net, hsr: reject HSR frame if skb can't hold tag (bsc#1249315).
- CVE-2025-39726: s390/ism: fix concurrency management in ism_cmd() (bsc#1249266).
- CVE-2025-39746: wifi: ath10k: shutdown driver when hardware is unreliable (bsc#1249516).
- CVE-2025-39751: ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (bsc#1249538).
- CVE-2025-39790: bus: mhi: host: Detect events pointing to unexpected TREs (bsc#1249548).
- CVE-2025-39823: KVM: x86: use array_index_nospec with indices that come from guest (bsc#1250002).
- CVE-2025-39824: HID: asus: fix UAF via HID_CLAIMED_INPUT validation (bsc#1250007).
- CVE-2025-39860: Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() (bsc#1250247).
- CVE-2025-39869: dmaengine: ti: edma: Fix memory allocation size for queue_priority_map (bsc#1250406).
The following non-security bugs were fixed:
- Kconfig.suse: Add KABI checkiness macro (config) (bsc#1249186).
- Limit patch filenames to 100 characters (bsc#1249604).
- Move pesign-obs-integration requirement from kernel-syms to kernel devel subpackage (bsc#1248108).
- Revert selinux patches that caused regressions (bsc#1249353).
- btrfs: avoid NULL pointer dereference if no valid extent tree (bsc#1249158).
- build_bug.h: Add KABI assert (bsc#1249186).
- hv_netvsc: Fix panic during namespace deletion with VF (bsc#1248111).
- kabi/severities: ignore kABI for atheros helper modules The symbols are used only internally by atheros drivers.
- kernel-binary: Another installation ordering fix (bsc#1241353).
- kernel-source: Do not list mkspec and its inputs as sources (bsc#1250522).
- kernel-subpackage-build: Decompress ghost file when compressed version exists (bsc#1249346)
- kernel-syms.spec: Drop old rpm release number hack (bsc#1247172).
- net/sched: ets: use old 'nbands' while purging unused classes (git-fixes).
- rpm/kernel-subpackage-spec: Skip brp-strip-debug to avoid file truncation (bsc#1246879).
- rpm/mkspec: Fix missing kernel-syms-rt creation (bsc#1244337).
- rpm: Configure KABI checkingness macro (bsc#1249186).
- rpm: Drop support for kabi/arch/ignore-flavor (bsc#1249186).
- rpm: Link arch-symbols script from scripts directory.
- rpm: Link guards script from scripts directory.
- supported.conf: mark hyperv_drm as external
- use uniform permission checks for all mount propagation changes (git-fixes).
- xfs: rework datasync tracking and execution (bsc#1237449).
The following package changes have been done:
- kernel-rt-5.14.21-150500.13.109.1 updated
More information about the sle-container-updates
mailing list