SUSE-IU-2025:3240-1: Security update of suse-sles-15-sp5-chost-byos-v20251022-x86_64-gen2

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Fri Oct 24 07:03:01 UTC 2025


SUSE Image Update Advisory: suse-sles-15-sp5-chost-byos-v20251022-x86_64-gen2
-----------------------------------------------------------------
Image Advisory ID : SUSE-IU-2025:3240-1
Image Tags        : suse-sles-15-sp5-chost-byos-v20251022-x86_64-gen2:20251022
Image Release     : 
Severity          : critical
Type              : security
References        : 1054914 1065729 1065729 1095485 1112822 1118783 1122013 1123008
                        1135257 1135263 1135592 1144282 1156395 1157117 1157190 1159460
                        1162705 1162707 1164051 1165294 1178486 1179031 1179032 1184350
                        1187939 1193629 1193629 1193629 1194869 1194869 1198410 1199356
                        1199487 1199853 1201160 1201956 1202094 1202095 1202564 1202700
                        1202716 1202823 1202860 1203063 1203197 1203332 1203361 1204228
                        1204549 1204562 1204569 1204619 1204705 1205128 1205205 1205220
                        1205282 1205514 1205701 1206051 1206051 1206073 1206451 1206451
                        1206456 1206468 1206649 1206664 1206843 1206843 1206843 1206878
                        1206880 1206883 1206884 1206886 1206887 1207158 1207361 1207361
                        1207361 1207621 1207624 1207625 1207628 1207629 1207631 1207638
                        1207645 1207651 1208105 1208542 1208607 1209287 1209291 1209292
                        1209556 1209684 1209780 1209980 1209980 1210337 1210409 1210584
                        1210763 1210767 1211226 1211465 1211960 1212051 1212476 1212603
                        1213012 1213013 1213015 1213016 1213040 1213041 1213061 1213090
                        1213094 1213096 1213099 1213104 1213233 1213533 1213666 1213747
                        1213946 1214073 1214715 1214953 1214967 1214991 1215150 1215696
                        1215911 1216976 1217790 1218069 1218184 1218234 1218459 1218470
                        1218470 1219007 1219454 1220185 1220186 1220718 1221107 1221202
                        1221757 1221829 1222044 1222296 1222629 1222634 1223096 1223675
                        1223959 1224095 1224400 1224597 1225468 1225820 1225903 1225903
                        1226514 1226552 1228634 1228659 1228776 1229334 1229361 1229621
                        1230092 1230262 1230267 1230267 1230649 1230764 1230827 1231103
                        1231293 1231910 1232234 1232504 1232526 1232533 1232649 1233012
                        1233012 1233012 1233012 1233012 1233012 1233421 1233551 1233640
                        1233880 1234128 1234156 1234282 1234381 1234395 1234454 1234480
                        1234639 1234863 1234887 1234896 1234959 1235100 1235464 1235598
                        1235637 1235870 1235873 1235958 1235971 1236104 1236104 1236333
                        1236333 1236777 1236821 1236822 1237143 1237159 1237164 1237172
                        1237230 1237312 1237313 1237442 1237449 1237587 1237595 1237949
                        1237981 1238032 1238043 1238160 1238160 1238303 1238315 1238471
                        1238491 1238512 1238526 1238570 1238747 1238865 1238876 1238896
                        1239012 1239061 1239543 1239566 1239602 1239644 1239651 1239684
                        1239809 1239938 1239968 1239986 1240132 1240209 1240211 1240214
                        1240228 1240230 1240246 1240248 1240269 1240271 1240274 1240285
                        1240295 1240306 1240314 1240315 1240321 1240385 1240529 1240648
                        1240747 1240785 1240788 1240799 1240802 1240835 1240869 1240897
                        1240950 1241012 1241038 1241045 1241219 1241249 1241280 1241353
                        1241371 1241421 1241433 1241463 1241525 1241541 1241549 1241625
                        1241640 1241648 1241900 1242006 1242146 1242147 1242150 1242151
                        1242154 1242157 1242158 1242160 1242164 1242165 1242169 1242215
                        1242217 1242218 1242219 1242221 1242222 1242224 1242226 1242227
                        1242228 1242229 1242230 1242231 1242232 1242237 1242239 1242240
                        1242241 1242244 1242245 1242248 1242249 1242261 1242264 1242265
                        1242270 1242276 1242278 1242279 1242280 1242281 1242282 1242284
                        1242285 1242286 1242289 1242294 1242295 1242298 1242300 1242302
                        1242305 1242311 1242312 1242320 1242338 1242349 1242351 1242352
                        1242353 1242355 1242357 1242358 1242359 1242360 1242361 1242365
                        1242366 1242369 1242370 1242371 1242372 1242377 1242378 1242380
                        1242381 1242382 1242385 1242387 1242389 1242391 1242392 1242393
                        1242394 1242398 1242399 1242400 1242402 1242403 1242405 1242406
                        1242409 1242410 1242411 1242414 1242414 1242415 1242416 1242417
                        1242421 1242422 1242425 1242426 1242428 1242440 1242443 1242448
                        1242449 1242452 1242453 1242454 1242455 1242456 1242458 1242464
                        1242465 1242467 1242469 1242473 1242474 1242478 1242481 1242484
                        1242489 1242493 1242497 1242504 1242527 1242542 1242544 1242545
                        1242547 1242548 1242549 1242550 1242551 1242558 1242570 1242580
                        1242586 1242589 1242596 1242596 1242597 1242685 1242686 1242688
                        1242689 1242695 1242716 1242733 1242734 1242735 1242736 1242739
                        1242740 1242743 1242744 1242745 1242746 1242747 1242748 1242749
                        1242751 1242752 1242753 1242756 1242759 1242762 1242765 1242767
                        1242778 1242778 1242778 1242779 1242780 1242782 1242790 1242791
                        1242842 1242844 1242846 1242924 1243047 1243117 1243133 1243226
                        1243226 1243273 1243279 1243313 1243317 1243330 1243450 1243457
                        1243486 1243488 1243539 1243543 1243581 1243627 1243649 1243660
                        1243737 1243767 1243772 1243832 1243887 1243901 1243919 1243935
                        1243991 1244032 1244039 1244042 1244050 1244056 1244059 1244060
                        1244061 1244079 1244105 1244114 1244116 1244154 1244179 1244180
                        1244234 1244241 1244277 1244309 1244309 1244337 1244337 1244401
                        1244509 1244523 1244553 1244554 1244555 1244557 1244590 1244644
                        1244700 1244705 1244710 1244732 1244732 1244764 1244765 1244767
                        1244770 1244771 1244772 1244773 1244774 1244776 1244779 1244780
                        1244781 1244782 1244783 1244784 1244786 1244787 1244788 1244790
                        1244791 1244793 1244794 1244796 1244797 1244798 1244800 1244802
                        1244804 1244805 1244806 1244807 1244808 1244811 1244813 1244814
                        1244815 1244816 1244819 1244820 1244823 1244824 1244824 1244825
                        1244826 1244827 1244830 1244831 1244832 1244834 1244836 1244838
                        1244839 1244840 1244841 1244842 1244843 1244845 1244846 1244848
                        1244849 1244851 1244853 1244854 1244856 1244858 1244860 1244861
                        1244866 1244867 1244868 1244869 1244870 1244871 1244872 1244873
                        1244875 1244876 1244878 1244879 1244881 1244883 1244884 1244886
                        1244887 1244888 1244890 1244892 1244893 1244895 1244898 1244899
                        1244900 1244901 1244902 1244903 1244904 1244905 1244908 1244911
                        1244912 1244914 1244915 1244925 1244928 1244933 1244936 1244940
                        1244941 1244942 1244943 1244944 1244945 1244948 1244949 1244950
                        1244953 1244955 1244956 1244957 1244958 1244959 1244960 1244961
                        1244965 1244966 1244967 1244968 1244969 1244970 1244973 1244974
                        1244976 1244977 1244978 1244979 1244983 1244984 1244985 1244986
                        1244987 1244991 1244992 1244993 1245006 1245007 1245009 1245011
                        1245012 1245015 1245018 1245019 1245023 1245024 1245028 1245031
                        1245032 1245033 1245038 1245039 1245040 1245041 1245047 1245048
                        1245051 1245052 1245057 1245058 1245060 1245062 1245063 1245064
                        1245069 1245070 1245072 1245073 1245088 1245089 1245092 1245093
                        1245094 1245098 1245103 1245110 1245116 1245117 1245118 1245119
                        1245121 1245122 1245125 1245129 1245131 1245133 1245134 1245135
                        1245136 1245138 1245139 1245140 1245142 1245146 1245147 1245149
                        1245152 1245154 1245155 1245180 1245183 1245189 1245191 1245195
                        1245197 1245217 1245220 1245220 1245223 1245265 1245274 1245309
                        1245310 1245311 1245314 1245340 1245348 1245431 1245431 1245452
                        1245455 1245496 1245506 1245573 1245666 1245672 1245711 1245936
                        1245950 1245956 1245970 1245985 1245986 1246000 1246029 1246037
                        1246038 1246045 1246073 1246081 1246112 1246149 1246186 1246197
                        1246197 1246211 1246221 1246231 1246232 1246233 1246267 1246287
                        1246296 1246299 1246431 1246466 1246473 1246555 1246570 1246597
                        1246602 1246604 1246608 1246776 1246781 1246835 1246879 1246911
                        1246912 1246968 1247028 1247054 1247143 1247172 1247239 1247249
                        1247314 1247347 1247348 1247349 1247374 1247437 1247518 1247690
                        1247819 1247938 1247939 1247976 1248108 1248111 1248223 1248255
                        1248297 1248306 1248312 1248338 1248399 1248410 1248511 1248614
                        1248621 1248628 1248639 1248687 1248748 1248847 1249126 1249158
                        1249159 1249186 1249191 1249191 1249195 1249200 1249220 1249266
                        1249315 1249324 1249346 1249348 1249348 1249353 1249367 1249367
                        1249374 1249516 1249538 1249548 1249584 1249604 1249638 1249639
                        1249641 1249642 1249648 1249650 1249651 1249658 1249661 1249664
                        1249667 1249669 1249673 1249677 1249681 1249683 1249685 1249687
                        1249695 1249696 1249699 1249700 1249701 1249704 1249705 1249706
                        1249707 1249708 1249709 1249712 1249713 1249715 1249716 1249718
                        1249722 1249727 1249730 1249733 1249734 1249739 1249740 1249741
                        1249742 1249743 1249745 1249746 1249747 1249749 1249750 1249751
                        1249753 1249756 1249757 1249758 1249762 1249767 1249777 1249780
                        1249781 1249782 1249784 1249791 1249799 1249800 1249802 1249808
                        1249810 1249816 1249820 1249824 1249825 1249827 1249836 1249840
                        1249844 1249846 1249853 1249858 1249860 1249861 1249864 1249865
                        1249866 1249867 1249868 1249869 1249872 1249874 1249877 1249880
                        1249882 1249883 1249884 1249885 1249890 1249892 1249894 1249908
                        1249910 1249911 1249913 1249914 1249917 1249918 1249920 1249923
                        1249924 1249925 1249927 1249928 1249930 1249933 1249934 1249936
                        1249938 1249939 1249940 1249944 1249947 1249949 1249950 1249951
                        1249954 1249958 1249979 1249981 1249991 1249994 1249997 1250002
                        1250006 1250007 1250009 1250010 1250011 1250014 1250015 1250017
                        1250023 1250024 1250026 1250037 1250039 1250040 1250041 1250042
                        1250044 1250047 1250049 1250052 1250055 1250058 1250060 1250062
                        1250065 1250066 1250068 1250070 1250071 1250072 1250075 1250077
                        1250080 1250081 1250083 1250089 1250103 1250104 1250105 1250106
                        1250107 1250108 1250112 1250114 1250117 1250118 1250121 1250127
                        1250128 1250130 1250131 1250132 1250134 1250137 1250138 1250140
                        1250144 1250145 1250151 1250153 1250156 1250157 1250159 1250161
                        1250165 1250168 1250178 1250180 1250181 1250182 1250183 1250184
                        1250187 1250189 1250191 1250197 1250198 1250200 1250201 1250208
                        1250209 1250211 1250215 1250232 1250245 1250247 1250250 1250257
                        1250264 1250269 1250277 1250278 1250285 1250287 1250293 1250301
                        1250303 1250306 1250309 1250311 1250313 1250315 1250316 1250322
                        1250323 1250324 1250325 1250327 1250328 1250331 1250343 1250358
                        1250362 1250363 1250370 1250374 1250391 1250392 1250393 1250394
                        1250395 1250397 1250406 1250412 1250418 1250425 1250428 1250453
                        1250454 1250457 1250459 1250522 1250759 1250761 1250762 1250763
                        1250765 1250767 1250768 1250771 1250774 1250781 1250784 1250786
                        1250787 1250790 1250791 1250792 1250793 1250797 1250799 1250807
                        1250810 1250811 1250814 1250818 1250819 1250822 1250823 1250824
                        1250825 1250829 1250830 1250831 1250832 1250839 1250841 1250842
                        1250843 1250846 1250847 1250848 1250849 1250850 1250851 1250853
                        1250856 1250861 1250862 1250863 1250864 1250866 1250867 1250868
                        1250872 1250873 1250874 1250875 1250877 1250879 1250881 1250883
                        1250887 1250888 1250889 1250890 1250891 1250905 1250913 1250915
                        1250917 1250923 1250927 1250928 1250931 1250932 1250948 1250949
                        1250953 1250963 1250964 1250965 1251279 1251280 142461 831629
                        CVE-2016-9840 CVE-2021-47557 CVE-2021-47595 CVE-2021-47671 CVE-2022-1679
                        CVE-2022-2585 CVE-2022-2586 CVE-2022-2602 CVE-2022-2905 CVE-2022-2978
                        CVE-2022-3564 CVE-2022-3619 CVE-2022-36280 CVE-2022-3640 CVE-2022-3903
                        CVE-2022-4095 CVE-2022-43945 CVE-2022-4662 CVE-2022-48933 CVE-2022-49110
                        CVE-2022-49138 CVE-2022-49138 CVE-2022-49139 CVE-2022-49741 CVE-2022-49745
                        CVE-2022-49762 CVE-2022-49763 CVE-2022-49767 CVE-2022-49769 CVE-2022-49770
                        CVE-2022-49770 CVE-2022-49771 CVE-2022-49772 CVE-2022-49773 CVE-2022-49775
                        CVE-2022-49776 CVE-2022-49777 CVE-2022-49779 CVE-2022-49781 CVE-2022-49783
                        CVE-2022-49784 CVE-2022-49786 CVE-2022-49787 CVE-2022-49788 CVE-2022-49789
                        CVE-2022-49790 CVE-2022-49792 CVE-2022-49793 CVE-2022-49794 CVE-2022-49795
                        CVE-2022-49796 CVE-2022-49797 CVE-2022-49799 CVE-2022-49800 CVE-2022-49801
                        CVE-2022-49802 CVE-2022-49807 CVE-2022-49809 CVE-2022-49810 CVE-2022-49812
                        CVE-2022-49813 CVE-2022-49818 CVE-2022-49821 CVE-2022-49822 CVE-2022-49823
                        CVE-2022-49824 CVE-2022-49825 CVE-2022-49826 CVE-2022-49827 CVE-2022-49830
                        CVE-2022-49832 CVE-2022-49834 CVE-2022-49835 CVE-2022-49836 CVE-2022-49837
                        CVE-2022-49839 CVE-2022-49841 CVE-2022-49842 CVE-2022-49845 CVE-2022-49846
                        CVE-2022-49850 CVE-2022-49853 CVE-2022-49858 CVE-2022-49860 CVE-2022-49861
                        CVE-2022-49863 CVE-2022-49864 CVE-2022-49865 CVE-2022-49868 CVE-2022-49869
                        CVE-2022-49870 CVE-2022-49871 CVE-2022-49874 CVE-2022-49879 CVE-2022-49880
                        CVE-2022-49881 CVE-2022-49885 CVE-2022-49886 CVE-2022-49887 CVE-2022-49888
                        CVE-2022-49889 CVE-2022-49890 CVE-2022-49891 CVE-2022-49892 CVE-2022-49900
                        CVE-2022-49901 CVE-2022-49902 CVE-2022-49905 CVE-2022-49906 CVE-2022-49908
                        CVE-2022-49909 CVE-2022-49910 CVE-2022-49915 CVE-2022-49916 CVE-2022-49917
                        CVE-2022-49918 CVE-2022-49921 CVE-2022-49922 CVE-2022-49923 CVE-2022-49924
                        CVE-2022-49925 CVE-2022-49927 CVE-2022-49928 CVE-2022-49929 CVE-2022-49931
                        CVE-2022-49934 CVE-2022-49935 CVE-2022-49936 CVE-2022-49937 CVE-2022-49938
                        CVE-2022-49940 CVE-2022-49942 CVE-2022-49943 CVE-2022-49944 CVE-2022-49945
                        CVE-2022-49946 CVE-2022-49948 CVE-2022-49949 CVE-2022-49950 CVE-2022-49951
                        CVE-2022-49952 CVE-2022-49954 CVE-2022-49956 CVE-2022-49957 CVE-2022-49958
                        CVE-2022-49960 CVE-2022-49962 CVE-2022-49963 CVE-2022-49964 CVE-2022-49965
                        CVE-2022-49966 CVE-2022-49968 CVE-2022-49969 CVE-2022-49971 CVE-2022-49972
                        CVE-2022-49977 CVE-2022-49978 CVE-2022-49980 CVE-2022-49980 CVE-2022-49981
                        CVE-2022-49982 CVE-2022-49983 CVE-2022-49984 CVE-2022-49985 CVE-2022-49986
                        CVE-2022-49987 CVE-2022-49989 CVE-2022-49990 CVE-2022-49993 CVE-2022-49995
                        CVE-2022-49999 CVE-2022-50002 CVE-2022-50003 CVE-2022-50005 CVE-2022-50006
                        CVE-2022-50008 CVE-2022-50010 CVE-2022-50011 CVE-2022-50012 CVE-2022-50015
                        CVE-2022-50016 CVE-2022-50019 CVE-2022-50020 CVE-2022-50021 CVE-2022-50022
                        CVE-2022-50023 CVE-2022-50024 CVE-2022-50026 CVE-2022-50027 CVE-2022-50028
                        CVE-2022-50029 CVE-2022-50030 CVE-2022-50031 CVE-2022-50032 CVE-2022-50033
                        CVE-2022-50034 CVE-2022-50035 CVE-2022-50036 CVE-2022-50037 CVE-2022-50038
                        CVE-2022-50039 CVE-2022-50040 CVE-2022-50041 CVE-2022-50044 CVE-2022-50045
                        CVE-2022-50046 CVE-2022-50047 CVE-2022-50049 CVE-2022-50050 CVE-2022-50051
                        CVE-2022-50052 CVE-2022-50053 CVE-2022-50054 CVE-2022-50055 CVE-2022-50059
                        CVE-2022-50060 CVE-2022-50061 CVE-2022-50062 CVE-2022-50065 CVE-2022-50066
                        CVE-2022-50067 CVE-2022-50068 CVE-2022-50072 CVE-2022-50073 CVE-2022-50074
                        CVE-2022-50076 CVE-2022-50077 CVE-2022-50079 CVE-2022-50083 CVE-2022-50084
                        CVE-2022-50085 CVE-2022-50086 CVE-2022-50087 CVE-2022-50092 CVE-2022-50093
                        CVE-2022-50094 CVE-2022-50095 CVE-2022-50097 CVE-2022-50098 CVE-2022-50099
                        CVE-2022-50100 CVE-2022-50101 CVE-2022-50102 CVE-2022-50103 CVE-2022-50104
                        CVE-2022-50108 CVE-2022-50109 CVE-2022-50110 CVE-2022-50111 CVE-2022-50112
                        CVE-2022-50115 CVE-2022-50116 CVE-2022-50116 CVE-2022-50117 CVE-2022-50118
                        CVE-2022-50120 CVE-2022-50121 CVE-2022-50124 CVE-2022-50125 CVE-2022-50126
                        CVE-2022-50127 CVE-2022-50129 CVE-2022-50131 CVE-2022-50132 CVE-2022-50133
                        CVE-2022-50134 CVE-2022-50135 CVE-2022-50136 CVE-2022-50137 CVE-2022-50138
                        CVE-2022-50139 CVE-2022-50140 CVE-2022-50141 CVE-2022-50142 CVE-2022-50143
                        CVE-2022-50144 CVE-2022-50145 CVE-2022-50146 CVE-2022-50149 CVE-2022-50151
                        CVE-2022-50152 CVE-2022-50153 CVE-2022-50154 CVE-2022-50155 CVE-2022-50156
                        CVE-2022-50157 CVE-2022-50158 CVE-2022-50160 CVE-2022-50161 CVE-2022-50162
                        CVE-2022-50164 CVE-2022-50165 CVE-2022-50166 CVE-2022-50169 CVE-2022-50171
                        CVE-2022-50172 CVE-2022-50173 CVE-2022-50175 CVE-2022-50176 CVE-2022-50178
                        CVE-2022-50179 CVE-2022-50181 CVE-2022-50183 CVE-2022-50184 CVE-2022-50185
                        CVE-2022-50186 CVE-2022-50187 CVE-2022-50188 CVE-2022-50190 CVE-2022-50191
                        CVE-2022-50192 CVE-2022-50194 CVE-2022-50196 CVE-2022-50197 CVE-2022-50198
                        CVE-2022-50199 CVE-2022-50200 CVE-2022-50201 CVE-2022-50202 CVE-2022-50203
                        CVE-2022-50204 CVE-2022-50206 CVE-2022-50207 CVE-2022-50208 CVE-2022-50209
                        CVE-2022-50211 CVE-2022-50212 CVE-2022-50213 CVE-2022-50215 CVE-2022-50218
                        CVE-2022-50220 CVE-2022-50221 CVE-2022-50222 CVE-2022-50226 CVE-2022-50228
                        CVE-2022-50229 CVE-2022-50231 CVE-2022-50233 CVE-2022-50234 CVE-2022-50235
                        CVE-2022-50239 CVE-2022-50241 CVE-2022-50242 CVE-2022-50246 CVE-2022-50247
                        CVE-2022-50248 CVE-2022-50249 CVE-2022-50250 CVE-2022-50251 CVE-2022-50252
                        CVE-2022-50255 CVE-2022-50257 CVE-2022-50258 CVE-2022-50260 CVE-2022-50261
                        CVE-2022-50264 CVE-2022-50266 CVE-2022-50267 CVE-2022-50268 CVE-2022-50269
                        CVE-2022-50271 CVE-2022-50272 CVE-2022-50275 CVE-2022-50276 CVE-2022-50277
                        CVE-2022-50278 CVE-2022-50279 CVE-2022-50282 CVE-2022-50286 CVE-2022-50287
                        CVE-2022-50288 CVE-2022-50289 CVE-2022-50292 CVE-2022-50294 CVE-2022-50297
                        CVE-2022-50298 CVE-2022-50299 CVE-2022-50301 CVE-2022-50303 CVE-2022-50308
                        CVE-2022-50309 CVE-2022-50312 CVE-2022-50317 CVE-2022-50318 CVE-2022-50320
                        CVE-2022-50321 CVE-2022-50323 CVE-2022-50324 CVE-2022-50325 CVE-2022-50328
                        CVE-2022-50329 CVE-2022-50330 CVE-2022-50331 CVE-2022-50333 CVE-2022-50339
                        CVE-2022-50340 CVE-2022-50342 CVE-2022-50344 CVE-2022-50346 CVE-2022-50347
                        CVE-2022-50348 CVE-2022-50349 CVE-2022-50351 CVE-2022-50353 CVE-2022-50354
                        CVE-2022-50355 CVE-2022-50356 CVE-2022-50357 CVE-2022-50358 CVE-2022-50359
                        CVE-2022-50360 CVE-2022-50362 CVE-2022-50364 CVE-2022-50367 CVE-2022-50368
                        CVE-2022-50369 CVE-2022-50370 CVE-2022-50372 CVE-2022-50373 CVE-2022-50374
                        CVE-2022-50375 CVE-2022-50376 CVE-2022-50378 CVE-2022-50379 CVE-2022-50381
                        CVE-2022-50385 CVE-2022-50386 CVE-2022-50388 CVE-2022-50389 CVE-2022-50390
                        CVE-2022-50391 CVE-2022-50392 CVE-2022-50393 CVE-2022-50394 CVE-2022-50395
                        CVE-2022-50396 CVE-2022-50398 CVE-2022-50399 CVE-2022-50401 CVE-2022-50402
                        CVE-2022-50404 CVE-2022-50406 CVE-2022-50408 CVE-2022-50409 CVE-2022-50410
                        CVE-2022-50411 CVE-2022-50412 CVE-2022-50414 CVE-2022-50417 CVE-2022-50418
                        CVE-2022-50419 CVE-2022-50422 CVE-2022-50423 CVE-2022-50425 CVE-2022-50427
                        CVE-2022-50428 CVE-2022-50429 CVE-2022-50430 CVE-2022-50431 CVE-2022-50432
                        CVE-2022-50433 CVE-2022-50434 CVE-2022-50435 CVE-2022-50436 CVE-2022-50437
                        CVE-2022-50439 CVE-2022-50440 CVE-2022-50441 CVE-2022-50443 CVE-2022-50444
                        CVE-2022-50447 CVE-2022-50449 CVE-2022-50452 CVE-2022-50453 CVE-2022-50454
                        CVE-2022-50456 CVE-2022-50458 CVE-2022-50459 CVE-2022-50460 CVE-2022-50464
                        CVE-2022-50465 CVE-2022-50466 CVE-2022-50467 CVE-2022-50468 CVE-2022-50469
                        CVE-2023-1380 CVE-2023-1990 CVE-2023-28328 CVE-2023-28866 CVE-2023-3111
                        CVE-2023-31248 CVE-2023-3772 CVE-2023-39197 CVE-2023-42753 CVE-2023-52923
                        CVE-2023-52923 CVE-2023-52924 CVE-2023-52925 CVE-2023-52927 CVE-2023-52928
                        CVE-2023-52931 CVE-2023-52936 CVE-2023-52937 CVE-2023-52938 CVE-2023-52981
                        CVE-2023-52982 CVE-2023-52986 CVE-2023-52994 CVE-2023-53001 CVE-2023-53002
                        CVE-2023-53009 CVE-2023-53014 CVE-2023-53018 CVE-2023-53031 CVE-2023-53035
                        CVE-2023-53036 CVE-2023-53038 CVE-2023-53039 CVE-2023-53040 CVE-2023-53041
                        CVE-2023-53042 CVE-2023-53044 CVE-2023-53045 CVE-2023-53046 CVE-2023-53048
                        CVE-2023-53049 CVE-2023-53051 CVE-2023-53052 CVE-2023-53054 CVE-2023-53056
                        CVE-2023-53057 CVE-2023-53058 CVE-2023-53059 CVE-2023-53060 CVE-2023-53062
                        CVE-2023-53064 CVE-2023-53065 CVE-2023-53066 CVE-2023-53068 CVE-2023-53070
                        CVE-2023-53071 CVE-2023-53073 CVE-2023-53074 CVE-2023-53075 CVE-2023-53076
                        CVE-2023-53077 CVE-2023-53078 CVE-2023-53079 CVE-2023-53081 CVE-2023-53082
                        CVE-2023-53084 CVE-2023-53087 CVE-2023-53089 CVE-2023-53090 CVE-2023-53091
                        CVE-2023-53092 CVE-2023-53093 CVE-2023-53095 CVE-2023-53096 CVE-2023-53097
                        CVE-2023-53098 CVE-2023-53099 CVE-2023-53100 CVE-2023-53101 CVE-2023-53102
                        CVE-2023-53105 CVE-2023-53106 CVE-2023-53108 CVE-2023-53109 CVE-2023-53111
                        CVE-2023-53112 CVE-2023-53114 CVE-2023-53116 CVE-2023-53117 CVE-2023-53118
                        CVE-2023-53119 CVE-2023-53123 CVE-2023-53124 CVE-2023-53125 CVE-2023-53128
                        CVE-2023-53131 CVE-2023-53134 CVE-2023-53137 CVE-2023-53139 CVE-2023-53140
                        CVE-2023-53142 CVE-2023-53143 CVE-2023-53145 CVE-2023-53147 CVE-2023-53149
                        CVE-2023-53150 CVE-2023-53151 CVE-2023-53152 CVE-2023-53153 CVE-2023-53165
                        CVE-2023-53167 CVE-2023-53168 CVE-2023-53171 CVE-2023-53174 CVE-2023-53176
                        CVE-2023-53178 CVE-2023-53179 CVE-2023-53181 CVE-2023-53182 CVE-2023-53185
                        CVE-2023-53189 CVE-2023-53193 CVE-2023-53196 CVE-2023-53197 CVE-2023-53199
                        CVE-2023-53201 CVE-2023-53205 CVE-2023-53210 CVE-2023-53213 CVE-2023-53215
                        CVE-2023-53216 CVE-2023-53219 CVE-2023-53222 CVE-2023-53223 CVE-2023-53226
                        CVE-2023-53229 CVE-2023-53230 CVE-2023-53232 CVE-2023-53234 CVE-2023-53237
                        CVE-2023-53238 CVE-2023-53239 CVE-2023-53241 CVE-2023-53242 CVE-2023-53244
                        CVE-2023-53245 CVE-2023-53246 CVE-2023-53249 CVE-2023-53250 CVE-2023-53251
                        CVE-2023-53252 CVE-2023-53255 CVE-2023-53257 CVE-2023-53258 CVE-2023-53259
                        CVE-2023-53263 CVE-2023-53265 CVE-2023-53268 CVE-2023-53270 CVE-2023-53272
                        CVE-2023-53273 CVE-2023-53275 CVE-2023-53276 CVE-2023-53277 CVE-2023-53280
                        CVE-2023-53281 CVE-2023-53282 CVE-2023-53284 CVE-2023-53286 CVE-2023-53287
                        CVE-2023-53288 CVE-2023-53295 CVE-2023-53297 CVE-2023-53298 CVE-2023-53299
                        CVE-2023-53302 CVE-2023-53304 CVE-2023-53305 CVE-2023-53309 CVE-2023-53311
                        CVE-2023-53313 CVE-2023-53314 CVE-2023-53315 CVE-2023-53316 CVE-2023-53317
                        CVE-2023-53320 CVE-2023-53321 CVE-2023-53322 CVE-2023-53324 CVE-2023-53326
                        CVE-2023-53330 CVE-2023-53331 CVE-2023-53332 CVE-2023-53333 CVE-2023-53334
                        CVE-2023-53335 CVE-2023-53337 CVE-2023-53340 CVE-2023-53344 CVE-2023-53347
                        CVE-2023-53349 CVE-2023-53352 CVE-2023-53356 CVE-2023-53357 CVE-2023-53359
                        CVE-2023-53368 CVE-2023-53370 CVE-2023-53371 CVE-2023-53373 CVE-2023-53375
                        CVE-2023-53377 CVE-2023-53378 CVE-2023-53379 CVE-2023-53380 CVE-2023-53381
                        CVE-2023-53383 CVE-2023-53384 CVE-2023-53386 CVE-2023-53388 CVE-2023-53390
                        CVE-2023-53391 CVE-2023-53393 CVE-2023-53395 CVE-2023-53396 CVE-2023-53398
                        CVE-2023-53400 CVE-2023-53404 CVE-2023-53405 CVE-2023-53406 CVE-2023-53409
                        CVE-2023-53413 CVE-2023-53414 CVE-2023-53415 CVE-2023-53416 CVE-2023-53422
                        CVE-2023-53427 CVE-2023-53431 CVE-2023-53435 CVE-2023-53436 CVE-2023-53437
                        CVE-2023-53438 CVE-2023-53440 CVE-2023-53442 CVE-2023-53443 CVE-2023-53444
                        CVE-2023-53446 CVE-2023-53448 CVE-2023-53449 CVE-2023-53451 CVE-2023-53452
                        CVE-2023-53453 CVE-2023-53454 CVE-2023-53456 CVE-2023-53457 CVE-2023-53458
                        CVE-2023-53463 CVE-2023-53464 CVE-2023-53465 CVE-2023-53466 CVE-2023-53468
                        CVE-2023-53471 CVE-2023-53472 CVE-2023-53473 CVE-2023-53474 CVE-2023-53475
                        CVE-2023-53476 CVE-2023-53480 CVE-2023-53482 CVE-2023-53485 CVE-2023-53487
                        CVE-2023-53488 CVE-2023-53489 CVE-2023-53492 CVE-2023-53494 CVE-2023-53496
                        CVE-2023-53498 CVE-2023-53499 CVE-2023-53505 CVE-2023-53506 CVE-2023-53509
                        CVE-2023-53511 CVE-2023-53512 CVE-2023-53515 CVE-2023-53518 CVE-2023-53519
                        CVE-2023-53521 CVE-2023-53524 CVE-2023-53525 CVE-2023-53526 CVE-2023-53530
                        CVE-2023-53531 CVE-2023-53532 CVE-2024-10041 CVE-2024-12718 CVE-2024-2236
                        CVE-2024-23337 CVE-2024-26583 CVE-2024-26584 CVE-2024-26643 CVE-2024-26804
                        CVE-2024-26808 CVE-2024-26924 CVE-2024-26935 CVE-2024-27397 CVE-2024-28956
                        CVE-2024-28956 CVE-2024-35840 CVE-2024-36350 CVE-2024-36357 CVE-2024-36978
                        CVE-2024-41965 CVE-2024-42265 CVE-2024-42307 CVE-2024-45310 CVE-2024-46763
                        CVE-2024-46800 CVE-2024-46865 CVE-2024-47081 CVE-2024-50038 CVE-2024-52615
                        CVE-2024-53057 CVE-2024-53093 CVE-2024-53125 CVE-2024-53141 CVE-2024-53164
                        CVE-2024-53168 CVE-2024-53177 CVE-2024-53197 CVE-2024-53241 CVE-2024-56558
                        CVE-2024-56738 CVE-2024-56770 CVE-2024-57947 CVE-2024-57947 CVE-2024-57999
                        CVE-2024-58239 CVE-2024-58240 CVE-2025-10148 CVE-2025-10148 CVE-2025-10230
                        CVE-2025-1713 CVE-2025-21700 CVE-2025-21701 CVE-2025-21702 CVE-2025-21703
                        CVE-2025-21726 CVE-2025-21756 CVE-2025-21785 CVE-2025-21791 CVE-2025-21812
                        CVE-2025-21839 CVE-2025-21971 CVE-2025-21999 CVE-2025-22004 CVE-2025-22020
                        CVE-2025-22045 CVE-2025-22055 CVE-2025-22056 CVE-2025-22097 CVE-2025-2312
                        CVE-2025-23138 CVE-2025-23141 CVE-2025-23145 CVE-2025-23145 CVE-2025-27465
                        CVE-2025-29768 CVE-2025-32462 CVE-2025-32728 CVE-2025-32988 CVE-2025-32989
                        CVE-2025-32990 CVE-2025-3360 CVE-2025-3576 CVE-2025-37738 CVE-2025-37752
                        CVE-2025-37785 CVE-2025-37789 CVE-2025-37797 CVE-2025-37798 CVE-2025-37798
                        CVE-2025-37823 CVE-2025-37890 CVE-2025-37932 CVE-2025-37948 CVE-2025-37953
                        CVE-2025-37958 CVE-2025-37963 CVE-2025-37997 CVE-2025-38000 CVE-2025-38001
                        CVE-2025-38014 CVE-2025-38014 CVE-2025-38060 CVE-2025-38079 CVE-2025-38083
                        CVE-2025-38088 CVE-2025-38111 CVE-2025-38120 CVE-2025-38177 CVE-2025-38180
                        CVE-2025-38181 CVE-2025-38184 CVE-2025-38200 CVE-2025-38206 CVE-2025-38212
                        CVE-2025-38213 CVE-2025-38257 CVE-2025-38289 CVE-2025-38323 CVE-2025-38350
                        CVE-2025-38352 CVE-2025-38380 CVE-2025-38460 CVE-2025-38468 CVE-2025-38477
                        CVE-2025-38488 CVE-2025-38494 CVE-2025-38495 CVE-2025-38497 CVE-2025-38498
                        CVE-2025-38499 CVE-2025-38546 CVE-2025-38553 CVE-2025-38555 CVE-2025-38560
                        CVE-2025-38563 CVE-2025-38572 CVE-2025-38608 CVE-2025-38617 CVE-2025-38618
                        CVE-2025-38644 CVE-2025-38659 CVE-2025-38664 CVE-2025-38678 CVE-2025-38683
                        CVE-2025-38685 CVE-2025-38706 CVE-2025-38713 CVE-2025-38734 CVE-2025-39691
                        CVE-2025-39703 CVE-2025-39726 CVE-2025-39735 CVE-2025-39746 CVE-2025-39751
                        CVE-2025-39790 CVE-2025-39823 CVE-2025-39824 CVE-2025-39860 CVE-2025-39869
                        CVE-2025-40909 CVE-2025-4138 CVE-2025-4330 CVE-2025-4373 CVE-2025-4435
                        CVE-2025-4516 CVE-2025-4517 CVE-2025-4598 CVE-2025-46836 CVE-2025-47268
                        CVE-2025-47273 CVE-2025-4802 CVE-2025-48060 CVE-2025-4877 CVE-2025-4878
                        CVE-2025-48964 CVE-2025-49794 CVE-2025-49795 CVE-2025-49796 CVE-2025-50181
                        CVE-2025-5278 CVE-2025-5318 CVE-2025-5372 CVE-2025-53905 CVE-2025-53906
                        CVE-2025-55157 CVE-2025-55158 CVE-2025-59375 CVE-2025-6018 CVE-2025-6018
                        CVE-2025-6020 CVE-2025-6021 CVE-2025-6069 CVE-2025-6170 CVE-2025-6297
                        CVE-2025-6395 CVE-2025-6965 CVE-2025-7425 CVE-2025-8194 CVE-2025-9086
                        CVE-2025-9086 CVE-2025-9230 CVE-2025-9640 
-----------------------------------------------------------------

The container suse-sles-15-sp5-chost-byos-v20251022-x86_64-gen2 was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2018:1335-1
Released:    Tue Jul 17 10:13:39 2018
Summary:     Recommended update for cloud-netconfig
Type:        recommended
Severity:    moderate
References:  1095485
This update for cloud-netconfig fixes the following issues:

- Make interface names in Azure persistent. (bsc#1095485)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2019:529-1
Released:    Fri Mar  1 13:46:51 2019
Summary:     Recommended update for cloud-netconfig
Type:        recommended
Severity:    moderate
References:  1112822,1118783,1122013,1123008
This update for cloud-netconfig provides the following fixes:

- Run cloud-netconfig periodically. (bsc#1118783, bsc#1122013)
- Do not treat eth0 special with regard to routing policies. (bsc#1123008)
- Reduce the timeout on metadata read. (bsc#1112822)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2019:1560-1
Released:    Wed Jun 19 08:57:17 2019
Summary:     Recommended update for cloud-netconfig
Type:        recommended
Severity:    moderate
References:  1135257,1135263
This update for cloud-netconfig fixes the following issues:

- cloud-netconfig will now pause and retry if API call throttling is detected
  in Azure (bsc#1135257, bsc#1135263)
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2020:31-1
Released:    Mon Feb 24 10:36:36 2020
Summary:     Recommended update for cloud-netconfig
Type:        recommended
Severity:    moderate
References:  1135592,1144282,1157117,1157190
This update for cloud-netconfig contains the following fixes:

- Removed obsolete Group tag from spec file.

- Update to version 1.3:
  + Fix IPv4 address handling on secondary NICs in Azure.

- Update to version 1.2:
  + support AWS IMDSv2 token.

- Update to version 1.1:
  + fix use of GATEWAY variable. (bsc#1157117, bsc#1157190)
  + remove secondary IPv4 address only when added by cloud-netconfig. (bsc#1144282)
  + simplify routing setup for single NIC systems (partly fixes bsc#1135592)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2020:637-1
Released:    Wed Mar 11 11:29:56 2020
Summary:     Recommended update for cloud-netconfig
Type:        recommended
Severity:    moderate
References:  1162705,1162707
This update for cloud-netconfig fixes the following issues:

- Copy routes from the default routing table. (bsc#1162705, bsc#1162707)
  On multi-NIC systems, cloud-netconfig creates separate routing tables with
  different default routes, so packets get routed via the network interfaces
  associated with the source IP address. Systems may have additional routing
  in place and in that case cloud-netconfig's NIC specific routing may
  bypass those routes.

- Make the key CLOUD_NETCONFIG_MANAGE enable by default.
  Any network interface that has been configured automatically via
  cloud-netconfig has a configuration file associated. If the value is set
  to 'NO' (or the pair is removed altogether), cloud-netconfig will not
  handle secondary IPv4 addresses and routing policies for the associated
  network interface.

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2020:3619-1
Released:    Tue Dec 15 13:41:16 2020
Summary:     Recommended update for cloud-netconfig, google-guest-agent
Type:        recommended
Severity:    moderate
References:  1159460,1178486,1179031,1179032
This update for cloud-netconfig, google-guest-agent fixes the following issues:

cloud-netconfig:

- Update to version 1.5:
  + Add support for GCE (bsc#1159460, bsc#1178486, jsc#ECO-2800)
  + Improve default gateway determination

google-guest-agent:

- Update to version 20201026.00
  * remove old unused workflow files
  * fallback to IP for metadata
  * getPasswd: Check full prefix of line for username

- dont_overwrite_ifcfg.patch: Do not overwrite existing ifcfg files
  to allow manual configuration and compatibility with
  cloud-netconfig. (bsc#1159460, bsc#1178486)

- Update to version 20200929.00
  * correct varname
  * don't call dhclient -x on network setup
  * add instance id dir override
  * update agent systemd service file
  * typo, change to noadjfile
  * add gaohannk to OWNERS
  * remove illfelder from OWNERS
  * Add all license files to packages

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2022:167-1
Released:    Mon Jan 24 18:16:24 2022
Summary:     Recommended update for cloud-netconfig
Type:        recommended
Severity:    moderate
References:  1187939
This update for cloud-netconfig fixes the following issues:

- Update to version 1.6:
  + Ignore proxy when accessing metadata (bsc#1187939)
  + Print warning in case metadata is not accessible
  + Documentation update

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:658-1
Released:    Wed Mar  8 10:51:10 2023
Summary:     Recommended update for cloud-netconfig
Type:        recommended
Severity:    moderate
References:  1199853,1204549
This update for cloud-netconfig fixes the following issues:

- Update to version 1.7:
  + Overhaul policy routing setup
  + Support alias IPv4 ranges 
  + Add support for NetworkManager (bsc#1204549)
  + Remove dependency on netconfig
  + Install into libexec directory
  + Clear stale ifcfg files for accelerated NICs (bsc#1199853)
  + More debug messages
  + Documentation update

- /etc/netconfig.d/ moved to /usr/libexec/netconfig/netconfig.d/ in
  Tumbleweed, update path 

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2023:3637-1
Released:    Mon Sep 18 13:02:23 2023
Summary:     Recommended update for cloud-netconfig
Type:        recommended
Severity:    important
References:  1214715
This update for cloud-netconfig fixes the following issues:

- Update to version 1.8:
  - Fix Automatic Addition of Secondary IP Addresses in Azure Using cloud-netconfig. (bsc#1214715)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2024:630-1
Released:    Tue Feb 27 09:14:49 2024
Summary:     Recommended update for cloud-netconfig
Type:        recommended
Severity:    moderate
References:  1218069,1219007
This update for cloud-netconfig fixes the following issues:

- Drop cloud-netconfig-nm sub package and include NM dispatcher script in main packages (bsc#1219007)
- Drop package dependency on sysconfig-netconfig
- Improve log level handling
- Support IPv6 IMDS endpoint in EC2 (bsc#1218069)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2024:781-1
Released:    Wed Mar  6 15:05:13 2024
Summary:     Recommended update for cloud-netconfig
Type:        recommended
Severity:    moderate
References:  1219454,1220718
This update for cloud-netconfig fixes the following issues:

- Add Provides/Obsoletes for dropped cloud-netconfig-nm
- Install dispatcher script into /etc/NetworkManager/dispatcher.d on older distributions
- Add BuildReqires: NetworkManager to avoid owning dispatcher.d parent directory

- Update to version 1.11:
  + Revert address metadata lookup in GCE to local lookup (bsc#1219454)
  + Fix hang on warning log messages
  + Check whether getting IPv4 addresses from metadata failed and abort if true
  + Only delete policy rules if they exist
  + Skip adding/removing IPv4 ranges if metdata lookup failed
  + Improve error handling and logging in Azure
  + Set SCRIPTDIR when installing netconfig wrapper

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2024:869-1
Released:    Wed Mar 13 10:48:51 2024
Summary:     Recommended update for cloud-netconfig
Type:        recommended
Severity:    important
References:  1221202
This update for cloud-netconfig fixes the following issues:

- Update to version 1.12 (bsc#1221202)
  * If token access succeeds using IPv4 do not use the IPv6 endpoint
    only use the IPv6 IMDS endpoint if IPv4 access fails.

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2024:1085-1
Released:    Tue Apr  2 11:24:09 2024
Summary:     Recommended update for cloud-netconfig
Type:        recommended
Severity:    moderate
References:  1221757
This update for cloud-netconfig fixes the following issues:

- Update to version 1.14
  + Use '-s' instead of '--no-progress-meter' for curl (bsc#1221757)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1576-1
Released:    Mon May 19 06:48:35 2025
Summary:     Security update for openssh
Type:        security
Severity:    moderate
References:  1228634,1232533,1241012,1241045,CVE-2025-32728
This update for openssh fixes the following issues:

- Security issues fixed:
    
  * CVE-2025-32728: Fixed a logic error in DisableForwarding option (bsc#1241012)
    
- Other bugs fixed:

  * Allow KEX hashes greater than 256 bits (bsc#1241045)
  * Fixed hostname being left out of the audit output (bsc#1228634)
  * Fixed failures with very large MOTDs (bsc#1232533)


-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1580-1
Released:    Mon May 19 15:11:59 2025
Summary:     Recommended update for librdkafka
Type:        recommended
Severity:    important
References:  1242842
This update for librdkafka fixes the following issues:

- Avoid endless loops under certain conditions (bsc#1242842)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1599-1
Released:    Tue May 20 12:52:43 2025
Summary:     Security update for glib2
Type:        security
Severity:    moderate
References:  1240897,CVE-2025-3360
This update for glib2 fixes the following issues:

- CVE-2025-3360: Fixed integer overflow and buffer underread when parsing a very long 
  and invalid ISO 8601 timestamp with g_date_time_new_from_iso8601() (bsc#1240897)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1620-1
Released:    Wed May 21 11:58:41 2025
Summary:     Security update for the Linux Kernel
Type:        security
Severity:    important
References:  1054914,1206843,1210409,1225903,1229361,1229621,1230764,1231103,1231910,1236777,1237981,1238032,1238471,1238512,1238747,1238865,1239061,1239684,1239968,1240209,1240211,1240214,1240228,1240230,1240246,1240248,1240269,1240271,1240274,1240285,1240295,1240306,1240314,1240315,1240321,1240747,1240835,1241280,1241371,1241421,1241433,1241541,1241625,1241648,1242284,1242493,1242778,CVE-2021-47671,CVE-2022-48933,CVE-2022-49110,CVE-2022-49139,CVE-2022-49741,CVE-2022-49745,CVE-2022-49767,CVE-2023-52928,CVE-2023-52931,CVE-2023-52936,CVE-2023-52937,CVE-2023-52938,CVE-2023-52981,CVE-2023-52982,CVE-2023-52986,CVE-2023-52994,CVE-2023-53001,CVE-2023-53002,CVE-2023-53009,CVE-2023-53014,CVE-2023-53018,CVE-2023-53031,CVE-2023-53051,CVE-2024-42307,CVE-2024-46763,CVE-2024-46865,CVE-2024-50038,CVE-2025-21726,CVE-2025-21785,CVE-2025-21791,CVE-2025-21812,CVE-2025-21839,CVE-2025-22004,CVE-2025-22020,CVE-2025-22045,CVE-2025-22055,CVE-2025-22097,CVE-2025-2312,CVE-2025-23138,CVE-2025-39735
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-48933: netfilter: nf_tables: fix memory leak during stateful obj update (bsc#1229621).
- CVE-2022-49110: netfilter: conntrack: revisit gc autotuning (bsc#1237981).
- CVE-2022-49139: Bluetooth: fix null ptr deref on hci_sync_conn_complete_evt (bsc#1238032).
- CVE-2022-49767: 9p/trans_fd: always use O_NONBLOCK read/write (bsc#1242493).
- CVE-2024-46763: fou: Fix null-ptr-deref in GRO (bsc#1230764).
- CVE-2024-50038: netfilter: xtables: avoid NFPROTO_UNSPEC where needed (bsc#1231910).
- CVE-2025-21726: padata: avoid UAF for reorder_work (bsc#1238865).
- CVE-2025-21785: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (bsc#1238747).
- CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512).
- CVE-2025-21812: ax25: rcu protect dev->ax25_ptr (bsc#1238471).
- CVE-2025-21839: KVM: x86: Load DR6 with guest value only before entering .vcpu_run() loop (bsc#1239061).
- CVE-2025-22004: net: atm: fix use after free in lec_send() (bsc#1240835).
- CVE-2025-22020: memstick: rtsx_usb_ms: Fix slab-use-after-free in rtsx_usb_ms_drv_remove (bsc#1241280).
- CVE-2025-22045: x86/mm: Fix flush_tlb_range() when used for zapping normal PMDs (bsc#1241433).
- CVE-2025-22055: net: fix geneve_opt length integer overflow (bsc#1241371).
- CVE-2025-22097: drm/vkms: Fix use after free and double free on init error (bsc#1241541).
- CVE-2025-2312: CIFS: New mount option for cifs.upcall namespace resolution (bsc#1239684).
- CVE-2025-23138: watch_queue: fix pipe accounting mismatch (bsc#1241648).
- CVE-2025-39735: jfs: fix slab-out-of-bounds read in ea_get() (bsc#1241625).

The following non-security bugs were fixed:

- cpufreq: ACPI: Mark boost policy as enabled when setting boost (bsc#1236777).
- cpufreq: Allow drivers to advertise boost enabled (bsc#1236777).
- cpufreq: Fix per-policy boost behavior on SoCs using cpufreq_boost_set_sw() (bsc#1236777).
- cpufreq: Support per-policy performance boost (bsc#1236777).
- x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778).
- x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778).
- x86/bpf: Call branch history clearing sequence on exit (bsc#1242778).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1626-1
Released:    Wed May 21 12:00:29 2025
Summary:     Recommended update for grub2
Type:        recommended
Severity:    moderate
References:  1235958,1235971,1239651

This update for grub2 rebuilds the existing package with the new 4k RSA secure boot key for IBM Power and Z.

Note: the signing key of x86 / x86_64 and aarch64 architectures are unchanged.

Also the following issue was fixed:

- Fix segmentation fault error in grub2-probe with target=hints_string (bsc#1235971) (bsc#1235958) (bsc#1239651)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1643-1
Released:    Wed May 21 16:32:37 2025
Summary:     Recommended update for libsolv, libzypp, zypper
Type:        recommended
Severity:    important
References:  1222044,1230267,1235598,1237172,1237587,1237949,1238315,1239809,1240529
This update for libsolv, libzypp, zypper fixes the following issues:

- Support the apk package and repository format (both v2 and v3)
- New dataiterator_final_{repo,solvable} functions
- Provide a symbol specific for the ruby-version so yast does not break across updates (bsc#1235598)
- XmlReader: Fix detection of bad input streams
- rpm: Fix detection of %triggerscript starts (bsc#1222044)
- RepoindexFileReader: add more <repo> related attributes a service may set
- Drop workaround for broken rpm-4.18 in Code16 (bsc#1237172)
- Drop usage of SHA1 hash algorithm because it will become unavailable in FIPS mode (bsc#1240529)
- Fix zypp.conf dupAllowVendorChange to reflect the correct default (false)
- zypp.conf: Add `lock_timeout` ($ZYPP_LOCK_TIMEOUT) (bsc#1239809)
- Fix computation of RepStatus if Repo URLs change
- Fix lost double slash when appending to an absolute FTP url (bsc#1238315)
- Add a transaction package preloader
- Strip a mediahandler tag from baseUrl querystrings
- Updated translations (bsc#1230267)
- Do not double encode URL strings passed on the commandline (bsc#1237587)
- info,search: add option to search and list Enhances (bsc#1237949)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1648-1
Released:    Wed May 21 22:43:46 2025
Summary:     Recommended update for kbd
Type:        recommended
Severity:    moderate
References:  1237230
This update for kbd fixes the following issues:

- Don't search for resources in the current directory. It can cause
  unwanted side effects or even infinite loop (bsc#1237230).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1689-1
Released:    Fri May 23 12:46:42 2025
Summary:     Recommended update for hwinfo
Type:        recommended
Severity:    moderate
References:  1240648
This update for hwinfo fixes the following issues:

- Version update v21.88
- Fix network card detection on aarch64 (bsc#1240648).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1714-1
Released:    Tue May 27 13:23:20 2025
Summary:     Recommended update for ncurses
Type:        recommended
Severity:    moderate
References:  
This update for ncurses fixes the following issues:

- Backport sclp terminfo description entry if for s390 sclp terminal lines 
- Add a further sclp entry for qemu s390 based systems
- Make use of dumb

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1721-1
Released:    Tue May 27 17:59:31 2025
Summary:     Recommended update for hwdata
Type:        recommended
Severity:    moderate
References:  
This update for hwdata fixes the following issue:

- Version update 0.394:
  * Update pci, usb and vendor ids
  * Fix usb.ids encoding and a couple of typos
  * Fix configure to honor --prefix

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1764-1
Released:    Fri May 30 08:45:46 2025
Summary:     Recommended update for kexec-tools
Type:        recommended
Severity:    important
References:  1241249
This update for kexec-tools fixes the following issues:

- add support for lockless ringbuffer (bsc#1241249)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1776-1
Released:    Fri May 30 15:02:52 2025
Summary:     Security update for iputils
Type:        security
Severity:    moderate
References:  1242300,CVE-2025-47268
This update for iputils fixes the following issues:

- CVE-2025-47268: Fixed integer overflow in RTT calculation can lead to undefined behavior (bsc#1242300)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1784-1
Released:    Fri May 30 18:09:16 2025
Summary:     Security update for glibc
Type:        security
Severity:    important
References:  1234128,1243317,CVE-2025-4802
This update for glibc fixes the following issues:

Security issues fixed:

- CVE-2025-4802: possible execution of attacker controlled code when statically linked setuid binaries using dlopen
  search for libraries to load in LD_LIBRARY_PATH (bsc#1243317).

Other issues fixed:

- Multi-threaded application hang due to deadlock when `pthread_cond_signal` fails to wake up `pthread_cond_wait`
  as a consequence of a bug related to stealing of signals (bsc#1234128).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1810-1
Released:    Wed Jun  4 11:28:57 2025
Summary:     Security update for python3-setuptools
Type:        security
Severity:    important
References:  1243313,CVE-2025-47273
This update for python3-setuptools fixes the following issues:

- CVE-2025-47273: path traversal in PackageIndex.download may lead to an arbitrary file write (bsc#1243313).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:1836-1
Released:    Mon Jun  9 16:11:28 2025
Summary:     Recommended update for cloud-netconfig
Type:        recommended
Severity:    important
References:  1240869
This update for cloud-netconfig fixes the following issues:

- Add support for creating IPv6 default route in GCE (bsc#1240869)
- Minor fix when looking up IPv6 default route

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1860-1
Released:    Tue Jun 10 10:11:56 2025
Summary:     Security update for xen
Type:        security
Severity:    moderate
References:  1234282,1238043,1243117,CVE-2024-28956,CVE-2024-53241,CVE-2025-1713
This update for xen fixes the following issues:

- CVE-2024-28956: Fixed Intel CPU: Indirect Target Selection (ITS) (XSA-469) (bsc#1243117)
- CVE-2024-53241: Fixed Xen hypercall page unsafe against speculative attacks (XSA-466) (bsc#1234282)
- CVE-2025-1713: Fixed deadlock potential with VT-d and legacy PCI device pass-through (XSA-467) (bsc#1238043)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:1998-1
Released:    Wed Jun 18 10:42:20 2025
Summary:     Security update for python-requests
Type:        security
Severity:    moderate
References:  1244039,CVE-2024-47081
This update for python-requests fixes the following issues:

- CVE-2024-47081: fixed netrc credential leak (bsc#1244039).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2008-1
Released:    Wed Jun 18 16:03:56 2025
Summary:     Recommended update for libzypp, zypper
Type:        recommended
Severity:    moderate
References:  1239012,1239543,1240132,1241463,1243887,1243901,1244105
This update for libzypp, zypper fixes the following issues:

- Fix credential handling in HEAD requests (bsc#1244105)
- RepoInfo: use pathNameSetTrailingSlash
- Fix wrong userdata parameter type when running zypp with debug
  verbosity (bsc#1239012)
- Do not warn about no mirrors if mirrorlist was switched on
  automatically. (bsc#1243901)
- Relax permission of cached packages to 0644 & ~umask
  (bsc#1243887)
- Add a note to service maintained .repo file entries
- Support using %{url} variable in a RIS service's repo section.
- Use a cookie file to validate mirrorlist cache.
  This patch extends the mirrorlist code to use a cookie file to
  validate the contents of the cache against the source URL, making
  sure that we do not accidentially use a old cache when the
  mirrorlist url was changed. For example when migrating a system
  from one release to the next where the same repo alias might just
  have a different URL.
- Let Service define and update gpgkey, mirrorlist and metalink.
- Preserve a mirrorlist file in the raw cache during refresh.
- Enable curl2 backend and parallel package download by
  default.
  Environment variables ZYPP_CURL2=<0|1> and ZYPP_PCK_PRELOAD=<0|1>
  can be used to turn the features on or off.
- Make gpgKeyUrl the default source for gpg keys.
  When refreshing zypp now primarily uses gpgKeyUrl information
  from the repo files and only falls back to a automatically
  generated key Url if a gpgKeyUrl was not specified.
- Introduce mirrors into the Media backends (bsc#1240132)
- Drop MediaMultiCurl backend.
- Throttle progress updates when preloading packages (bsc#1239543)
- Check if request is in valid state in CURL callbacks
- spec/CMake: add conditional build
  '--with[out] classic_rpmtrans_as_default'.
  classic_rpmtrans is the current builtin default for SUSE,
  otherwise it's single_rpmtrans.
  The `enable_preview_single_rpmtrans_as_default_for_zypper` switch
  was removed from the spec file.  Accordingly the CMake option
  ENABLE_PREVIEW_SINGLE_RPMTRANS_AS_DEFAULT_FOR_ZYPPER was removed.
- BuildRequires:  libzypp-devel >= 17.37.0.
- Use libzypp improvements for preload and mirror handling.
- xmlout.rnc: Update repo-element (bsc#1241463)
  Add the 'metalink' attribute and reflect that the 'url' elements
  list may in fact be empty, if no baseurls are defined in the
  .repo files.
- man: update --allow-unsigned-rpm description.
  Explain how to achieve the same for packages provided by
  repositories.

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2013-1
Released:    Wed Jun 18 20:05:07 2025
Summary:     Security update for pam
Type:        security
Severity:    important
References:  1243226,1244509,CVE-2025-6018,CVE-2025-6020
This update for pam fixes the following issues:

- CVE-2025-6018: pam_env: Change the default to not read the user .pam_environment file (bsc#1243226).
- CVE-2025-6020: pam_namespace: convert functions that may operate on a user-controlled path to operate on file descriptors instead of absolute path (bsc#1244509).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2027-1
Released:    Thu Jun 19 17:15:41 2025
Summary:     Security update for perl
Type:        security
Severity:    moderate
References:  1244079,CVE-2025-40909
This update for perl fixes the following issues:

- CVE-2025-40909: Do not change the current directory when cloning an open directory handle (bsc#1244079).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2082-1
Released:    Tue Jun 24 12:28:23 2025
Summary:     Security update for pam-config
Type:        security
Severity:    important
References:  1243226,CVE-2025-6018
This update for pam-config fixes the following issues:

- CVE-2025-6018: Stop adding pam_env in AUTH stack, and be sure to put this module at the really end of the SESSION stack (bsc#1243226).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2103-1
Released:    Wed Jun 25 10:26:23 2025
Summary:     Recommended update for cifs-utils
Type:        recommended
Severity:    important
References:  1243488
This update for cifs-utils fixes the following issues:

- Add patches:
    * Fix cifs.mount with krb5 auth (bsc#1243488)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2173-1
Released:    Mon Jun 30 15:01:26 2025
Summary:     Security update for the Linux Kernel
Type:        security
Severity:    important
References:  1184350,1193629,1204562,1204569,1204619,1204705,1205282,1206051,1206073,1206649,1206843,1206886,1206887,1207361,1208105,1208542,1209292,1209556,1209684,1209780,1209980,1210337,1210763,1210767,1211465,1213012,1213013,1213094,1213096,1213233,1213946,1214991,1218470,1222629,1223096,1225903,1228659,1231293,1232649,1234395,1234454,1234887,1235100,1235870,1238303,1238570,1239986,1240785,1240802,1241038,1241525,1241640,1242006,1242146,1242147,1242150,1242151,1242154,1242157,1242158,1242160,1242164,1242165,1242169,1242215,1242217,1242218,1242219,1242222,1242224,1242226,1242227,1242228,1242229,1242230,1242231,1242232,1242237,1242239,1242240,1242241,1242244,1242245,1242248,1242249,1242261,1242264,1242265,1242270,1242276,1242278,1242279,1242280,1242281,1242282,1242285,1242286,1242289,1242294,1242295,1242298,1242302,1242305,1242311,1242312,1242320,1242338,1242349,1242351,1242352,1242353,1242355,1242357,1242358,1242359,1242360,1242361,1242365,1242366,1242369,1242370,1242371,1242372,1
 242377,1242378,1242380,1242381,1242382,1242385,1242387,1242389,1242391,1242392,1242393,1242394,1242398,1242399,1242400,1242402,1242403,1242405,1242406,1242409,1242410,1242411,1242415,1242416,1242421,1242422,1242425,1242426,1242428,1242440,1242443,1242448,1242449,1242452,1242453,1242454,1242455,1242456,1242458,1242464,1242465,1242467,1242469,1242473,1242474,1242478,1242481,1242484,1242489,1242497,1242527,1242542,1242544,1242545,1242547,1242548,1242549,1242550,1242551,1242558,1242570,1242580,1242586,1242589,1242596,1242597,1242685,1242686,1242688,1242689,1242695,1242716,1242733,1242734,1242735,1242736,1242739,1242740,1242743,1242744,1242745,1242746,1242747,1242748,1242749,1242751,1242752,1242753,1242756,1242759,1242762,1242765,1242767,1242778,1242779,1242790,1242791,1243047,1243133,1243737,1243919,CVE-2022-3564,CVE-2022-3619,CVE-2022-3640,CVE-2022-49762,CVE-2022-49763,CVE-2022-49769,CVE-2022-49770,CVE-2022-49771,CVE-2022-49772,CVE-2022-49773,CVE-2022-49775,CVE-2022-49776,CVE-2022-4977
 7,CVE-2022-49779,CVE-2022-49781,CVE-2022-49783,CVE-2022-49784,CVE-2022-49786,CVE-2022-49787,CVE-2022-49788,CVE-2022-49789,CVE-2022-49790,CVE-2022-49792,CVE-2022-49793,CVE-2022-49794,CVE-2022-49795,CVE-2022-49796,CVE-2022-49797,CVE-2022-49799,CVE-2022-49800,CVE-2022-49801,CVE-2022-49802,CVE-2022-49807,CVE-2022-49809,CVE-2022-49810,CVE-2022-49812,CVE-2022-49813,CVE-2022-49818,CVE-2022-49821,CVE-2022-49822,CVE-2022-49823,CVE-2022-49824,CVE-2022-49825,CVE-2022-49826,CVE-2022-49827,CVE-2022-49830,CVE-2022-49832,CVE-2022-49834,CVE-2022-49835,CVE-2022-49836,CVE-2022-49837,CVE-2022-49839,CVE-2022-49841,CVE-2022-49842,CVE-2022-49845,CVE-2022-49846,CVE-2022-49850,CVE-2022-49853,CVE-2022-49858,CVE-2022-49860,CVE-2022-49861,CVE-2022-49863,CVE-2022-49864,CVE-2022-49865,CVE-2022-49868,CVE-2022-49869,CVE-2022-49870,CVE-2022-49871,CVE-2022-49874,CVE-2022-49879,CVE-2022-49880,CVE-2022-49881,CVE-2022-49885,CVE-2022-49886,CVE-2022-49887,CVE-2022-49888,CVE-2022-49889,CVE-2022-49890,CVE-2022-49891,CVE-2
 022-49892,CVE-2022-49900,CVE-2022-49901,CVE-2022-49902,CVE-2022-49905,CVE-2022-49906,CVE-2022-49908,CVE-2022-49909,CVE-2022-49910,CVE-2022-49915,CVE-2022-49916,CVE-2022-49917,CVE-2022-49918,CVE-2022-49921,CVE-2022-49922,CVE-2022-49923,CVE-2022-49924,CVE-2022-49925,CVE-2022-49927,CVE-2022-49928,CVE-2022-49929,CVE-2022-49931,CVE-2023-1990,CVE-2023-28866,CVE-2023-53035,CVE-2023-53036,CVE-2023-53038,CVE-2023-53039,CVE-2023-53040,CVE-2023-53041,CVE-2023-53042,CVE-2023-53044,CVE-2023-53045,CVE-2023-53049,CVE-2023-53052,CVE-2023-53054,CVE-2023-53056,CVE-2023-53057,CVE-2023-53058,CVE-2023-53059,CVE-2023-53060,CVE-2023-53062,CVE-2023-53064,CVE-2023-53065,CVE-2023-53066,CVE-2023-53068,CVE-2023-53070,CVE-2023-53071,CVE-2023-53073,CVE-2023-53074,CVE-2023-53075,CVE-2023-53077,CVE-2023-53078,CVE-2023-53079,CVE-2023-53081,CVE-2023-53082,CVE-2023-53084,CVE-2023-53087,CVE-2023-53089,CVE-2023-53090,CVE-2023-53091,CVE-2023-53092,CVE-2023-53093,CVE-2023-53095,CVE-2023-53096,CVE-2023-53098,CVE-2023-5309
 9,CVE-2023-53100,CVE-2023-53101,CVE-2023-53102,CVE-2023-53105,CVE-2023-53106,CVE-2023-53108,CVE-2023-53109,CVE-2023-53111,CVE-2023-53112,CVE-2023-53114,CVE-2023-53116,CVE-2023-53118,CVE-2023-53119,CVE-2023-53123,CVE-2023-53124,CVE-2023-53125,CVE-2023-53128,CVE-2023-53131,CVE-2023-53134,CVE-2023-53137,CVE-2023-53139,CVE-2023-53140,CVE-2023-53142,CVE-2023-53143,CVE-2023-53145,CVE-2024-26804,CVE-2024-28956,CVE-2024-53168,CVE-2024-56558,CVE-2025-21999,CVE-2025-22056,CVE-2025-23145,CVE-2025-37785,CVE-2025-37789

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-49775: tcp: cdg: allow tcp_cdg_release() to be called multiple times (bsc#1242245).
- CVE-2024-53168: net: make sock_inuse_add() available (bsc#1234887).
- CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1235100).
- CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1240802).
- CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion addition (bsc#1241525).
- CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242596).
- CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762).
- CVE-2024-28956: x86/its: Add support for ITS-safe indirect thunk (bsc#1242006).
- CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640).

The following non-security bugs were fixed:

- Drivers: hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges (bsc#1243737).
- Move upstreamed sched/membarrier patch into sorted section
- Remove debug flavor (bsc#1243919). This is only released in Leap, and we do not have Leap 15.4 anymore.
- Remove debug flavor (bsc#1243919). This is only released in Leap, and we do not have Leap 15.5 anymore.
- Use gcc-13 for build on SLE16 (jsc#PED-10028).
- arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (bsc#1242778).
- arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (bsc#1242778).
- arm64: insn: Add support for encoding DSB (bsc#1242778).
- arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (bsc#1242778).
- arm64: proton-pack: Expose whether the branchy loop k value (bsc#1242778).
- arm64: proton-pack: Expose whether the platform is mitigated by firmware (bsc#1242778).
- hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (bsc#1243737).
- hv_netvsc: Remove rmsg_pgcnt (bsc#1243737).
- hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages (bsc#1243737).
- mtd: phram: Add the kernel lock down check (bsc#1232649).
- net :mana :Add remaining GDMA stats for MANA to ethtool (bsc#1234395).
- net :mana :Request a V2 response version for MANA_QUERY_GF_STAT (bsc#1234395).
- net: mana: Add gdma stats to ethtool output for mana (bsc#1234395).
- nvme-pci: acquire cq_poll_lock in nvme_poll_irqdisable (bsc#1223096).
- ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes).
- powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW (bsc#1218470 ltc#204531).
- rpm/kernel-binary.spec.in: Also order against update-bootloader (boo#1228659, boo#1240785, boo#1241038).
- rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf (bsc#1239986)
- rpm/kernel-binary.spec.in: fix KMPs build on 6.13+ (bsc#1234454)
- rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303)
- rpm/release-projects: Update the ALP projects again (bsc#1231293).
- rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570)
- scsi: core: Fix unremoved procfs host directory regression (git-fixes).
- tcp: Dump bound-only sockets in inet_diag (bsc#1204562).
- tpm, tpm_tis: Workaround failed command reception on Infineon devices (bsc#1235870).
- tpm: tis: Double the timeout B to 4s (bsc#1235870).
- x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778).
- x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778).
- x86/bpf: Call branch history clearing sequence on exit (bsc#1242778).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2179-1
Released:    Mon Jun 30 19:54:01 2025
Summary:     Security update for sudo
Type:        security
Severity:    important
References:  1245274,CVE-2025-32462
This update for sudo fixes the following issues:

- CVE-2025-32462: Fixed a possible local privilege escalation via the --host option (bsc#1245274).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2198-1
Released:    Wed Jul  2 11:22:33 2025
Summary:     Security update for runc
Type:        security
Severity:    low
References:  1230092,CVE-2024-45310
This update for runc fixes the following issues:
  
- CVE-2024-45310: Fixed unintentional creation of empty files/directories on host (bsc#1230092)

Other fixes:

- Update to runc v1.2.6.

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2226-1
Released:    Fri Jul  4 15:31:04 2025
Summary:     Security update for vim
Type:        security
Severity:    moderate
References:  1228776,1239602,CVE-2024-41965,CVE-2025-29768
This update for vim fixes the following issues:

- CVE-2024-41965: Fixed improper neutralization of argument delimiters in zip.vim that could have led to data loss (bsc#1228776).
- CVE-2025-29768: Fixed double-free in dialog_changed() (bsc#1239602).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2235-1
Released:    Mon Jul  7 14:08:03 2025
Summary:     Recommended update for haveged
Type:        recommended
Severity:    moderate
References:  1165294,1222296
This update for haveged fixes the following issues:
    
- Add patch files introducing the '--once' flag (bsc#1222296, bsc#1165294)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2264-1
Released:    Thu Jul 10 10:25:37 2025
Summary:     Security update for the Linux Kernel
Type:        security
Severity:    important
References:  1065729,1156395,1193629,1194869,1198410,1199356,1199487,1201160,1201956,1202094,1202095,1202564,1202716,1202823,1202860,1203197,1203361,1205220,1205514,1205701,1206451,1206664,1206878,1206880,1207361,1207638,1211226,1212051,1213090,1218184,1218234,1218470,1222634,1223675,1224095,1224597,1225468,1225820,1226514,1226552,1230827,1232504,1234156,1234381,1235464,1235637,1236821,1236822,1237159,1237312,1237313,1238526,1238876,1241900,1242221,1242414,1242504,1242596,1242778,1242782,1242924,1243330,1243543,1243627,1243649,1243660,1243832,1244114,1244179,1244180,1244234,1244241,1244277,1244309,1244337,1244732,1244764,1244765,1244767,1244770,1244771,1244772,1244773,1244774,1244776,1244779,1244780,1244781,1244782,1244783,1244784,1244786,1244787,1244788,1244790,1244791,1244793,1244794,1244796,1244797,1244798,1244800,1244802,1244804,1244805,1244806,1244807,1244808,1244811,1244813,1244814,1244815,1244816,1244819,1244820,1244823,1244824,1244825,1244826,1244827,1244830,1244831,1244832,1
 244834,1244836,1244838,1244839,1244840,1244841,1244842,1244843,1244845,1244846,1244848,1244849,1244851,1244853,1244854,1244856,1244858,1244860,1244861,1244866,1244867,1244868,1244869,1244870,1244871,1244872,1244873,1244875,1244876,1244878,1244879,1244881,1244883,1244884,1244886,1244887,1244888,1244890,1244892,1244893,1244895,1244898,1244899,1244900,1244901,1244902,1244903,1244904,1244905,1244908,1244911,1244912,1244914,1244915,1244928,1244936,1244940,1244941,1244942,1244943,1244944,1244945,1244948,1244949,1244950,1244953,1244955,1244956,1244957,1244958,1244959,1244960,1244961,1244965,1244966,1244967,1244968,1244969,1244970,1244973,1244974,1244976,1244977,1244978,1244979,1244983,1244984,1244985,1244986,1244987,1244991,1244992,1244993,1245006,1245007,1245009,1245011,1245012,1245015,1245018,1245019,1245023,1245024,1245028,1245031,1245032,1245033,1245038,1245039,1245040,1245041,1245047,1245048,1245051,1245052,1245057,1245058,1245060,1245062,1245063,1245064,1245069,1245070,1245072,124507
 3,1245088,1245089,1245092,1245093,1245094,1245098,1245103,1245116,1245117,1245118,1245119,1245121,1245122,1245125,1245129,1245131,1245133,1245134,1245135,1245136,1245138,1245139,1245140,1245142,1245146,1245147,1245149,1245152,1245154,1245155,1245180,1245183,1245189,1245191,1245195,1245197,1245265,1245340,1245348,1245431,1245455,CVE-2021-47557,CVE-2021-47595,CVE-2022-1679,CVE-2022-2585,CVE-2022-2586,CVE-2022-2905,CVE-2022-3903,CVE-2022-4095,CVE-2022-4662,CVE-2022-49934,CVE-2022-49935,CVE-2022-49936,CVE-2022-49937,CVE-2022-49938,CVE-2022-49940,CVE-2022-49942,CVE-2022-49943,CVE-2022-49944,CVE-2022-49945,CVE-2022-49946,CVE-2022-49948,CVE-2022-49949,CVE-2022-49950,CVE-2022-49951,CVE-2022-49952,CVE-2022-49954,CVE-2022-49956,CVE-2022-49957,CVE-2022-49958,CVE-2022-49960,CVE-2022-49962,CVE-2022-49963,CVE-2022-49964,CVE-2022-49965,CVE-2022-49966,CVE-2022-49968,CVE-2022-49969,CVE-2022-49971,CVE-2022-49972,CVE-2022-49977,CVE-2022-49978,CVE-2022-49980,CVE-2022-49981,CVE-2022-49982,CVE-2022-49983
 ,CVE-2022-49984,CVE-2022-49985,CVE-2022-49986,CVE-2022-49987,CVE-2022-49989,CVE-2022-49990,CVE-2022-49993,CVE-2022-49995,CVE-2022-49999,CVE-2022-50002,CVE-2022-50003,CVE-2022-50005,CVE-2022-50006,CVE-2022-50008,CVE-2022-50010,CVE-2022-50011,CVE-2022-50012,CVE-2022-50015,CVE-2022-50016,CVE-2022-50019,CVE-2022-50020,CVE-2022-50021,CVE-2022-50022,CVE-2022-50023,CVE-2022-50024,CVE-2022-50026,CVE-2022-50027,CVE-2022-50028,CVE-2022-50029,CVE-2022-50030,CVE-2022-50031,CVE-2022-50032,CVE-2022-50033,CVE-2022-50034,CVE-2022-50035,CVE-2022-50036,CVE-2022-50037,CVE-2022-50038,CVE-2022-50039,CVE-2022-50040,CVE-2022-50041,CVE-2022-50044,CVE-2022-50045,CVE-2022-50046,CVE-2022-50047,CVE-2022-50049,CVE-2022-50050,CVE-2022-50051,CVE-2022-50052,CVE-2022-50053,CVE-2022-50054,CVE-2022-50055,CVE-2022-50059,CVE-2022-50060,CVE-2022-50061,CVE-2022-50062,CVE-2022-50065,CVE-2022-50066,CVE-2022-50067,CVE-2022-50068,CVE-2022-50072,CVE-2022-50073,CVE-2022-50074,CVE-2022-50076,CVE-2022-50077,CVE-2022-50079,CVE-20
 22-50083,CVE-2022-50084,CVE-2022-50085,CVE-2022-50086,CVE-2022-50087,CVE-2022-50092,CVE-2022-50093,CVE-2022-50094,CVE-2022-50095,CVE-2022-50097,CVE-2022-50098,CVE-2022-50099,CVE-2022-50100,CVE-2022-50101,CVE-2022-50102,CVE-2022-50103,CVE-2022-50104,CVE-2022-50108,CVE-2022-50109,CVE-2022-50110,CVE-2022-50111,CVE-2022-50112,CVE-2022-50115,CVE-2022-50116,CVE-2022-50117,CVE-2022-50118,CVE-2022-50120,CVE-2022-50121,CVE-2022-50124,CVE-2022-50125,CVE-2022-50126,CVE-2022-50127,CVE-2022-50129,CVE-2022-50131,CVE-2022-50132,CVE-2022-50133,CVE-2022-50134,CVE-2022-50135,CVE-2022-50136,CVE-2022-50137,CVE-2022-50138,CVE-2022-50139,CVE-2022-50140,CVE-2022-50141,CVE-2022-50142,CVE-2022-50143,CVE-2022-50144,CVE-2022-50145,CVE-2022-50146,CVE-2022-50149,CVE-2022-50151,CVE-2022-50152,CVE-2022-50153,CVE-2022-50154,CVE-2022-50155,CVE-2022-50156,CVE-2022-50157,CVE-2022-50158,CVE-2022-50160,CVE-2022-50161,CVE-2022-50162,CVE-2022-50164,CVE-2022-50165,CVE-2022-50166,CVE-2022-50169,CVE-2022-50171,CVE-2022-5017
 2,CVE-2022-50173,CVE-2022-50175,CVE-2022-50176,CVE-2022-50178,CVE-2022-50179,CVE-2022-50181,CVE-2022-50183,CVE-2022-50184,CVE-2022-50185,CVE-2022-50186,CVE-2022-50187,CVE-2022-50188,CVE-2022-50190,CVE-2022-50191,CVE-2022-50192,CVE-2022-50194,CVE-2022-50196,CVE-2022-50197,CVE-2022-50198,CVE-2022-50199,CVE-2022-50200,CVE-2022-50201,CVE-2022-50202,CVE-2022-50203,CVE-2022-50204,CVE-2022-50206,CVE-2022-50207,CVE-2022-50208,CVE-2022-50209,CVE-2022-50211,CVE-2022-50212,CVE-2022-50213,CVE-2022-50215,CVE-2022-50218,CVE-2022-50220,CVE-2022-50221,CVE-2022-50222,CVE-2022-50226,CVE-2022-50228,CVE-2022-50229,CVE-2022-50231,CVE-2023-3111,CVE-2023-52924,CVE-2023-52925,CVE-2023-53046,CVE-2023-53048,CVE-2023-53076,CVE-2023-53097,CVE-2024-26808,CVE-2024-26924,CVE-2024-26935,CVE-2024-27397,CVE-2024-35840,CVE-2024-36978,CVE-2024-46800,CVE-2024-53125,CVE-2024-53141,CVE-2024-53197,CVE-2024-56770,CVE-2024-57999,CVE-2025-21700,CVE-2025-21702,CVE-2025-21703,CVE-2025-21756,CVE-2025-23141,CVE-2025-23145,CVE-20
 25-37752,CVE-2025-37798,CVE-2025-37823,CVE-2025-37890,CVE-2025-37932,CVE-2025-37948,CVE-2025-37953,CVE-2025-37963,CVE-2025-37997,CVE-2025-38000,CVE-2025-38001,CVE-2025-38014,CVE-2025-38060,CVE-2025-38083

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2021-47557: net/sched: sch_ets: do not peek at classes beyond 'nbands' (bsc#1207361 bsc#1225468).
- CVE-2021-47595: net/sched: sch_ets: do not remove idle classes from the round-robin list (bsc#1207361 bsc#1226552).
- CVE-2023-52924: netfilter: nf_tables: do not skip expired elements during walk (bsc#1236821).
- CVE-2023-52925: netfilter: nf_tables: do not fail inserts if duplicate has expired (bsc#1236822).
- CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634).
- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).
- CVE-2024-27397: kabi: place tstamp needed for nftables set in a hole (bsc#1224095).
- CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514).
- CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827).
- CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156).
- CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381).
- CVE-2024-53197: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices (bsc#1235464).
- CVE-2024-56770: sch/netem: fix use after free in netem_dequeue (bsc#1235637).
- CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159).
- CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312).
- CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313).
- CVE-2025-21756: vsock: Orphan socket after transport release (bsc#1238876).
- CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (bsc#1242782).
- CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504).
- CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924).
- CVE-2025-37890: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (bsc#1243330).
- CVE-2025-37997: netfilter: ipset: fix region locking in hash types (bsc#1243832).
- CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1244277).
- CVE-2025-38001: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice (bsc#1244234).
- CVE-2025-38014: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (bsc#1244732).
- CVE-2025-38060: bpf: abort verification if env->cur_state->loop_entry != NULL (bsc#1245155).
- CVE-2025-38083: net_sched: prio: fix a race in prio_tune() (bsc#1245183).

The following non-security bugs were fixed:

- ALSA: usb-audio: Fix a DMA to stack memory bug (git-fixes).
- Fix reference in 'net_sched: sch_sfq: use a temporary work area for validating configuration' (bsc#1242504)
- MyBS: Correctly generate build flags for non-multibuild package limit (bsc# 1244241) Fixes: 0999112774fc ('MyBS: Use buildflags to set which package to build')
- MyBS: Do not build kernel-obs-qa with limit_packages Fixes: 58e3f8c34b2b ('bs-upload-kernel: Pass limit_packages also on multibuild')
- MyBS: Simplify qa_expr generation Start with a 0 which makes the expression valid even if there are no QA repositories (currently does not happen). Then separator is always needed.
- bs-upload-kernel: Pass limit_packages also on multibuild Fixes: 0999112774fc ('MyBS: Use buildflags to set which package to build') Fixes: 747f601d4156 ('bs-upload-kernel, MyBS, Buildresults: Support multibuild (JSC-SLE#5501, boo#1211226, bsc#1218184)')
- hugetlb: unshare some PMDs when splitting VMAs (bsc#1245431).
- kernel-source: Do not use multiple -r in sed parameters
- kernel-source: Remove log.sh from sources
- mkspec: Exclude rt flavor from kernel-syms dependencies (bsc#1244337).
- mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431).
- mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431).
- net_sched: sch_fifo: implement lockless __fifo_dump() (bsc#1237312)
- net_sched: sch_sfq: use a temporary work area for validating configuration (bsc#1232504)
- ovl: fix use inode directly in rcu-walk mode (bsc#1241900).
- powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (bsc#1244309 ltc#213790).
- powerpc/vas: Return -EINVAL if the offset is non-zero in mmap() (bsc#1244309 ltc#213790).
- scsi: storvsc: Do not report the host packet status as the hv status (git-fixes).
- scsi: storvsc: Increase the timeouts to storvsc_timeout (bsc#1245455).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2278-1
Released:    Thu Jul 10 18:02:28 2025
Summary:     Security update for libssh
Type:        security
Severity:    important
References:  1245309,1245310,1245311,1245314,CVE-2025-4877,CVE-2025-4878,CVE-2025-5318,CVE-2025-5372
This update for libssh fixes the following issues:

- CVE-2025-4877: Fixed write beyond bounds in binary to base64 conversion functions (bsc#1245309).
- CVE-2025-4878: Fixed use of uninitialized variable in privatekey_from_file() (bsc#1245310).
- CVE-2025-5318: Fixed likely read beyond bounds in sftp server handle management (bsc#1245311).
- CVE-2025-5372: Fixed ssh_kdf() returns a success code on certain failures (bsc#1245314).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2288-1
Released:    Fri Jul 11 11:27:10 2025
Summary:     Recommended update for python-azure-agent
Type:        recommended
Severity:    important
References:  1240385,1244933
This update for python-azure-agent fixes the following issues:

- Set AutoUpdate.UpdateToLatestVersion=n in /etc/waagent.conf (bsc#1244933)
- Fix %suse_version conditional in spec file so package is built
  using python2 in SLE 12 (bsc#1240385)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2314-1
Released:    Tue Jul 15 14:34:08 2025
Summary:     Security update for libxml2
Type:        security
Severity:    important
References:  1244554,1244555,1244557,1244590,1244700,CVE-2025-49794,CVE-2025-49795,CVE-2025-49796,CVE-2025-6021,CVE-2025-6170
This update for libxml2 fixes the following issues:

- CVE-2025-49794: Fixed a heap use after free which could lead to denial of service. (bsc#1244554)
- CVE-2025-49796: Fixed type confusion which could lead to denial of service. (bsc#1244557)
- CVE-2025-49795: Fixed a null pointer dereference which could lead to denial of service. (bsc#1244555)
- CVE-2025-6170: Fixed a stack buffer overflow which could lead to a crash. (bsc#1244700)
- CVE-2025-6021: Fixed an integer overflow in xmlBuildQName() which could lead to stack buffer overflow. (bsc#1244590)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2325-1
Released:    Wed Jul 16 08:37:39 2025
Summary:     Security update for xen
Type:        security
Severity:    important
References:  1238896,1244644,1246112,CVE-2024-36350,CVE-2024-36357,CVE-2025-27465
This update for xen fixes the following issues:

- CVE-2024-36350, CVE-2024-36357: More AMD transient execution attacks (bsc#1246112, XSA-471)
- CVE-2025-27465: Incorrect stubs exception handling for flags recovery (bsc#1244644, XSA-470)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2345-1
Released:    Thu Jul 17 13:10:49 2025
Summary:     Recommended update for samba
Type:        recommended
Severity:    moderate
References:  1233880,1246431
This update for samba fixes the following issues:

- Windows security hardening locks out schannel'ed netlogon dc
  calls like netr_DsRGetDCName (bsc#1246431).
- Update shipped /etc/samba/smb.conf to point to smb.conf
  man page (bsc#1233880).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2362-1
Released:    Fri Jul 18 11:07:24 2025
Summary:     Security update for coreutils
Type:        security
Severity:    moderate
References:  1243767,CVE-2025-5278
This update for coreutils fixes the following issues:

- CVE-2025-5278: Fixed heap buffer under-read may lead to a crash or leak sensitive data (bsc#1243767)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2375-1
Released:    Fri Jul 18 15:16:14 2025
Summary:     Security update for glib2
Type:        security
Severity:    moderate
References:  1242844,CVE-2025-4373
This update for glib2 fixes the following issues:

- CVE-2025-4373: integer overflow in the `g_string_insert_unichar()` function can lead to buffer underwrite and memory
  corruption (bsc#1242844).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2384-1
Released:    Fri Jul 18 18:45:53 2025
Summary:     Security update for jq
Type:        security
Severity:    moderate
References:  1243450,CVE-2024-23337
This update for jq fixes the following issues:

- CVE-2024-23337: Fixed signed integer overflow in jv.c:jvp_array_write (bsc#1243450).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2430-1
Released:    Mon Jul 21 13:23:17 2025
Summary:     Security update for iputils
Type:        security
Severity:    moderate
References:  1243772,CVE-2025-48964
This update for iputils fixes the following issues:

- CVE-2025-48964: Fixed integer overflow in ping statistics via zero timestamp (bsc#1243772).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2543-1
Released:    Tue Jul 29 11:09:01 2025
Summary:     Recommended update for python-PyYAML, python-bcrypt, python-gssapi, python-pyparsing, python-python-dateutil, python-pytz, python-requests, python-setuptools_scm, python-simplejson, python-urllib3
Type:        recommended
Severity:    moderate
References:  1233012
This update for python-PyYAML, python-bcrypt, python-gssapi, python-pyparsing, python-python-dateutil, python-pytz, python-requests, python-setuptools_scm, python-simplejson, python-urllib3 fixes the following issues:

- Add python36 provides/obsoletes to enable SLE-12 to SLE-15 migration (bsc#1233012)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2562-1
Released:    Wed Jul 30 22:26:54 2025
Summary:     Recommended update for libsolv
Type:        recommended
Severity:    moderate
References:  1243279,1243457,1243486,1244042,1244710,1245220,1245452,1245496,1245672
This update for libsolv fixes the following issues:

- Allow easy migration from SLE Micro 5.5 + SUMA to SL Micro 6.1 + MLM
  (bsc#1243457).
- zypper does not distinguish between install and upgrade in %postinstall
  (bsc#1243279).
- Most recent version released for nvidia-open-driver-G06-signed-kmp-default
  differs from nvidia-driver-G06-kmp-default (bsc#1244042).
- Set proxy settings for zypper (bsc#1244710).
- KVM guest installation show Unexpected Application Error (bsc#1245452).
- Ignore DeltaRpm download errors, in case of a failure the full rpm is
  downloaded (bsc#1245672).
- Improve fix for incorrect filesize handling and download data exceeded errors
  on HTTP responses (bsc#1245220).
- sh: Reset solver options after command (bsc#1245496).
- Implement color filtering when adding update targets.
- Support orderwithrequires dependencies in susedata.xml.
- BuildRequires: Now %{libsolv_devel_package} greater or equal to 0.7.34
  is required (bsc#1243486).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2572-1
Released:    Thu Jul 31 11:11:10 2025
Summary:     Recommended update for python-colorama, python-importlib-metadata, python-parameterized, python-pluggy, python-py, python-scp, python-wheel, python-zipp
Type:        recommended
Severity:    moderate
References:  1233012
This update for python-colorama, python-importlib-metadata, python-parameterized, python-pluggy, python-py, python-scp, python-wheel, python-zipp fixes the following issues:

- Add python36 provides/obsoletes to enable SLE-12 to SLE-15 migration (bsc#1233012)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2573-1
Released:    Thu Jul 31 11:15:06 2025
Summary:     Recommended update for python-Cython, python-attrs, python-boto3, python-botocore, python-cffi, python-decorator, python-packaging, python-s3transfer, python-six
Type:        recommended
Severity:    moderate
References:  1233012
This update for python-Cython, python-attrs, python-boto3, python-botocore, python-cffi, python-decorator, python-packaging, python-s3transfer, python-six fixes the following issues:

- Add python36 provides/obsoletes to enable SLE-12 to SLE-15 migration (bsc#1233012)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2574-1
Released:    Thu Jul 31 11:19:37 2025
Summary:     Recommended update for python3-PyNaCl, python3-atomicwrites, python3-cryptography, python3-cryptography-vectors, python3-more-itertools, python3-paramiko, python3-pip, python3-pyOpenSSL, python3-pytest, python3-setuptools
Type:        recommended
Severity:    moderate
References:  1233012
This update for python3-PyNaCl, python3-atomicwrites, python3-cryptography, python3-cryptography-vectors, python3-more-itertools, python3-paramiko, python3-pip, python3-pyOpenSSL, python3-pytest, python3-setuptools fixes the following issues:

- Add python36 provides/obsoletes to enable SLE-12 to SLE-15 migration (bsc#1233012)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2536-1
Released:    Thu Jul 31 16:44:39 2025
Summary:     Security update for boost
Type:        security
Severity:    important
References:  1245936,CVE-2016-9840
This update for boost fixes the following issues:

- CVE-2016-9840: Fixed out-of-bounds pointer arithmetic in zlib in beast (bsc#1245936)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2588-1
Released:    Fri Aug  1 14:35:14 2025
Summary:     Security update for the Linux Kernel
Type:        security
Severity:    important
References:  1206051,1221829,1233551,1234480,1234863,1236104,1236333,1238160,1239644,1242417,1244523,1245217,1245431,1246000,1246029,1246037,1246045,1246073,1246186,1246287,1246555,CVE-2022-49138,CVE-2022-49770,CVE-2023-52923,CVE-2023-52927,CVE-2024-26643,CVE-2024-53057,CVE-2024-53164,CVE-2024-57947,CVE-2025-37797,CVE-2025-38079,CVE-2025-38181,CVE-2025-38200,CVE-2025-38206,CVE-2025-38212,CVE-2025-38213,CVE-2025-38257,CVE-2025-38289

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-49138: Bluetooth: hci_event: Fix checking conn for le_conn_complete_evt (bsc#1238160).
- CVE-2023-52923: netfilter: nf_tables: split async and sync catchall in two functions (bsc#1236104).
- CVE-2023-52927: netfilter: allow exp not to be removed in nf_ct_find_expectation (bsc#1239644).
- CVE-2024-26643: Fixed mark set as dead when unbinding anonymous  set with timeout (bsc#1221829).
- CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551).
- CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1234863).
- CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333).
- CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417).
- CVE-2025-38079: crypto: algif_hash - fix double free in hash_accept (bsc#1245217).
- CVE-2025-38181: calipso: Fix null-ptr-deref in calipso_req_{set,del}attr() (bsc#1246000).
- CVE-2025-38200: i40e: fix MMIO write access to an invalid page in i40e_clear_hw (bsc#1246045).
- CVE-2025-38206: exfat: fix double free in delayed_free (bsc#1246073).
- CVE-2025-38212: ipc: fix to protect IPCS lookups using RCU (bsc#1246029).
- CVE-2025-38213: vgacon: Add check for vc_origin address range in vgacon_scroll() (bsc#1246037).
- CVE-2025-38257: s390/pkey: Prevent overflow in size calculation for memdup_user() (bsc#1246186).
- CVE-2025-38289: scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk (bsc#1246287).

The following non-security bugs were fixed:

- Revert 'hugetlb: unshare some PMDs when splitting VMAs (bsc#1245431).'
- Revert 'mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race'
- Revert 'mm/hugetlb: unshare page tables during VMA split, not before'
- bnxt_en: Fix GSO type for HW GRO packets on 5750X chips (bsc#1244523).
- net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480 bsc#1246555).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2589-1
Released:    Fri Aug  1 15:05:54 2025
Summary:     Security update for gnutls
Type:        security
Severity:    important
References:  1246232,1246233,1246267,1246299,CVE-2025-32988,CVE-2025-32989,CVE-2025-32990,CVE-2025-6395
This update for gnutls fixes the following issues:

- CVE-2025-6395: Fix NULL pointer dereference when 2nd Client Hello omits PSK (bsc#1246299)
- CVE-2025-32988: Fix double-free due to incorrect ownership handling in the export logic of SAN entries containing an otherName (bsc#1246232)
- CVE-2025-32989: Fix heap buffer overread when handling the CT SCT extension during X.509 certificate parsing (bsc#1246233)
- CVE-2025-32990: Fix 1-byte heap buffer overflow when parsing templates with certtool (bsc#1246267)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2672-1
Released:    Mon Aug  4 15:06:13 2025
Summary:     Security update for sqlite3
Type:        security
Severity:    important
References:  1246597,CVE-2025-6965
This update for sqlite3 fixes the following issues:

- Update to version 3.50.2
- CVE-2025-6965: Fixed an integer truncation to avoid assertion faults. (bsc#1246597)
    
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2675-1
Released:    Mon Aug  4 15:53:48 2025
Summary:     Security update for systemd
Type:        security
Severity:    moderate
References:  1243935,CVE-2025-4598
This update for systemd fixes the following issues:

- CVE-2025-4598: Fixed race condition that allows a local attacker to crash a SUID program and gain read access to the resulting core dump (bsc#1243935).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2706-1
Released:    Tue Aug  5 12:08:28 2025
Summary:     Security update for grub2
Type:        security
Severity:    moderate
References:  1234959,CVE-2024-56738
This update for grub2 fixes the following issues:

- CVE-2024-56738: Fixed side-channel attack due to not constant-time algorithm in grub_crypto_memcmp (bsc#1234959)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2713-1
Released:    Wed Aug  6 11:21:54 2025
Summary:     Recommended update for hwinfo
Type:        recommended
Severity:    moderate
References:  1245950
This update for hwinfo fixes the following issues:

- Fix usb network card detection (bsc#1245950)
  
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2723-1
Released:    Thu Aug  7 09:36:30 2025
Summary:     Recommended update for SSSD
Type:        recommended
Severity:    moderate
References:  
This update for fixes the following issues:

- Added additional SSSD packages and dependencies to SUSE Linux Enterprise 
  Micro 5.5 (no source changes) (jsc#PED-12639)
  - krb5-client
  - python3-sssd-config
  - sssd-dbus
  - sssd-tools
  - realmd
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2734-1
Released:    Fri Aug  8 10:05:10 2025
Summary:     Security update for dpkg
Type:        security
Severity:    moderate
References:  1245573,CVE-2025-6297
This update for dpkg fixes the following issues:

- CVE-2025-6297: Fixed an improper sanitization of directory permissions that could lead to DoS. (bsc#1245573)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2758-1
Released:    Tue Aug 12 12:05:22 2025
Summary:     Security update for libxml2
Type:        security
Severity:    important
References:  1246296,CVE-2025-7425
This update for libxml2 fixes the following issues:

- CVE-2025-7425: Fixed heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr (bsc#1246296)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2761-1
Released:    Tue Aug 12 14:17:29 2025
Summary:     Recommended update for python-appdirs, python-asn1crypto, python-certifi, python-chardet, python-docutils, python-idna, python-iso8601, python-jmespath, python-ply, python-pretend, python-pyasn1, python-pyasn1-modules, python-pycparser, python-rsa
Type:        recommended
Severity:    moderate
References:  1233012
This update for python-appdirs, python-asn1crypto, python-certifi, python-chardet, python-docutils, python-idna, python-iso8601, python-jmespath, python-ply, python-pretend, python-pyasn1, python-pyasn1-modules, python-pycparser, python-rsa fixes the following issues:

- Add python36 provides/obsoletes to enable SLE-12 to SLE-15 migration (bsc#1233012)

-----------------------------------------------------------------
Advisory ID: SUSE-OU-2025:2763-1
Released:    Tue Aug 12 14:45:40 2025
Summary:     Optional update for libyaml
Type:        optional
Severity:    moderate
References:  1246570

This update for libyaml ships the missing libyaml-0-2 library package to
SUSE MicroOS 5.1 and 5.2.


-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2773-1
Released:    Wed Aug 13 02:10:16 2025
Summary:     Security update for libgcrypt
Type:        security
Severity:    moderate
References:  1221107,CVE-2024-2236
This update for libgcrypt fixes the following issues:

- CVE-2024-2236: timing-based side-channel flaw in RSA implementation can lead to decryption of RSA ciphertexts (bsc#1221107).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2776-1
Released:    Wed Aug 13 08:10:36 2025
Summary:     Recommended update for systemd-rpm-macros
Type:        recommended
Severity:    moderate
References:  1237143
This update for systemd-rpm-macros fixes the following issues:

- Introduce %udev_trigger_with_reload() for packages that need to trigger events
  in theirs scriplets. The new macro automatically triggers a reload of the udev
  rule files as this step is often overlooked by packages (bsc#1237143).
  
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2778-1
Released:    Wed Aug 13 08:45:57 2025
Summary:     Security update for python3
Type:        security
Severity:    important
References:  1233012,1243273,1244032,1244056,1244059,1244060,1244061,1244401,1244705,1247249,831629,CVE-2024-12718,CVE-2025-4138,CVE-2025-4330,CVE-2025-4435,CVE-2025-4516,CVE-2025-4517,CVE-2025-6069,CVE-2025-8194
This update for python3 fixes the following issues:

- CVE-2025-4516: use-after-free in the unicode-escape decoder when using the error handler (bsc#1243273).
- CVE-2024-12718: Fixed extraction filter bypass that allowed file metadata modification outside extraction directory (bsc#1244056)
- CVE-2025-4138: Fixed issue that might allow symlink targets to point outside the destination directory, and the modification of some file metadata (bsc#1244059)
- CVE-2025-4330: Fixed extraction filter bypass that allowed linking outside extraction directory (bsc#1244060)
- CVE-2025-4435: Fixed Tarfile extracts filtered members when errorlevel=0 (bsc#1244061)
- CVE-2025-4517: Fixed arbitrary filesystem writes outside the extraction directory during extraction with filter='data' (bsc#1244032)
- CVE-2025-6069: Fixed worst case quadratic complexity when processing certain crafted malformed inputs with HTMLParser (bsc#1244705)
- CVE-2025-8194: Fixed denial of service caused by tar archives with negative offsets (bsc#1247249)
    
Other fixes:
- Limit buffer size for IPv6 address parsing (bsc#1244401).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2780-1
Released:    Wed Aug 13 10:28:27 2025
Summary:     Recommended update for gcc14
Type:        recommended
Severity:    moderate
References:  1230262,1232526,1237442,1238491,1239566,1239938,1240788,1241549,1243991,1244050
This update for gcc14 fixes the following issues:

Update to GCC 14.3 release, bb24b4c804f3d95b0ba95b7496, git11799

- Fixed libqt6webengine build.
- Fix build on s390x [bsc#1241549]
- Make sure link editing is done against our own shared library
  copy rather than the installed system runtime.  [bsc#1240788]
- Allow GCC executables to be built PIE.  [bsc#1239938]
- Backport -msplit-patch-nops required for user-space livepatching on powerpc.
- Also record -D_FORTIFY_SOURCE=2 in the DWARF debug info DW_AT_producer string.  [bsc#1239566]
- Disable profiling during build when %want_reproducible_builds is set [bsc#1238491]
- Fixes reported ICE in [bsc#1237442]
- Add larchintrin.h, lasxintrin.h and lsxintrin.h
  headers to gccXY main package in %files section
- libstdc++6 fix for parsing tzdata 2024b [gcc#116657]
- Fix ICE with LTO building openvino on aarch64 [bsc#1230262]
- Exclude shared objects present for link editing in the GCC specific
  subdirectory from provides processing via __provides_exclude_from.
  [bsc#1244050][bsc#1243991]
- Make cross-*-gcc14-bootstrap package conflict with the non-bootstrap
  variant conflict with the unversioned cross-*-gcc package.

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2805-1
Released:    Fri Aug 15 08:00:49 2025
Summary:     Recommended update for grub2
Type:        recommended
Severity:    moderate
References:  1246231
This update for grub2 fixes the following issues:

- Skip mount point in grub_find_device function (bsc#1246231)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2838-1
Released:    Mon Aug 18 10:56:16 2025
Summary:     Recommended update for suse-build-key
Type:        recommended
Severity:    moderate
References:  1245223
This update for suse-build-key fixes the following issue:

- adjust SLES16 signing key UID (name,email) with official names (bsc#1245223).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2915-1
Released:    Tue Aug 19 14:56:35 2025
Summary:     Security update for jq
Type:        security
Severity:    moderate
References:  1244116,CVE-2025-48060
This update for jq fixes the following issues:

- CVE-2025-48060: Fixed stack-buffer-overflow in jq_fuzz_execute (bsc#1244116)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2927-1
Released:    Wed Aug 20 11:47:47 2025
Summary:     Recommended update for permissions
Type:        recommended
Severity:    moderate
References:  1246776
This update for permissions fixes the following issues:

Update to version 20201225:

* nvidia-modprobe: SLE-15-SP4 backport of setuid root permissions (bsc#1246776)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2951-1
Released:    Thu Aug 21 14:55:35 2025
Summary:     Recommended update for libzypp, zypper
Type:        recommended
Severity:    important
References:  1218459,1245220,1245985,1246038,1246149,1246466,1247054,1247690
This update for libzypp, zypper fixes the following issues:

- Fix evaluation of libproxy results (bsc#1247690)
- Replace URL variables inside mirrorlist/metalink files
- Append RepoInfo::path() to the mirror URLs in Preloader (bsc#1247054)
- During installation indicate the backend being used (bsc#1246038)
  If some package actually needs to know, it should test for
  ZYPP_CLASSIC_RPMTRANS being set in the environment.
  Otherwise the transaction is driven by librpm.
- Workaround 'rpm -vv' leaving scriptlets /var/tmp (bsc#1218459)
- Verbose log libproxy results if PX_DEBUG=1 is set.
- BuildRequires:  cmake >= 3.17.
- Allow explicit request to probe an added repo's URL (bsc#1246466)
- Fix tests with -DISABLE_MEDIABACKEND_TESTS=1
- Add runtime check for a broken rpm-4.18.0 --runpostrans (bsc#1246149)
- Add regression test for (bsc#1245220) and some other filesize related tests.
- Fix addrepo to handle explicit --check and --no-check requests (bsc#1246466)
- Accept 'show' as alias for 'info' (bsc#1245985)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2970-1
Released:    Mon Aug 25 10:27:57 2025
Summary:     Security update for pam
Type:        security
Severity:    moderate
References:  1232234,1246221,CVE-2024-10041
This update for pam fixes the following issues:

- Improve previous CVE-2024-10041 fix which led to CPU performance issues (bsc#1232234)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2985-1
Released:    Mon Aug 25 15:55:03 2025
Summary:     Security update for python-urllib3
Type:        security
Severity:    moderate
References:  1244925,CVE-2025-50181
This update for python-urllib3 fixes the following issues:

- CVE-2025-50181: Pool managers now properly control redirects when retries is passed. (bsc#1244925)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3065-1
Released:    Thu Sep  4 08:36:30 2025
Summary:     Recommended update for systemd-presets-branding-SLE
Type:        recommended
Severity:    moderate
References:  1244553,1246835
This update for systemd-presets-branding-SLE fixes the following issues:

- enable sysstat_collect.timer and sysstat_summary.timer
  (bsc#1244553, bsc#1246835).
- modified default SLE presets
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3083-1
Released:    Fri Sep  5 11:02:28 2025
Summary:     Recommended update for suse-module-tools
Type:        recommended
Severity:    important
References:  1224400,1240950
This update for suse-module-tools fixes the following issues:

- Version update 15.5.7:
  - Add blacklist entry for reiserfs (jsc#PED-6167).
  - Add more modules to file system blacklist (jsc#PED-6167).
  - Add hfsplus to file system blacklist (bsc#1240950, jsc#PED-12632).
  - udevrules: activate CPUs on hotplug for s390 (bsc#1224400).
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3216-1
Released:    Mon Sep 15 08:37:40 2025
Summary:     Recommended update for 
Type:        recommended
Severity:    important
References:  1246081
This update for  fixes the following issues:

- Add lmdb binary into Basesystem 15-SP6 and 15-SP7 (bsc#1246081)
  
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3260-1
Released:    Thu Sep 18 02:09:31 2025
Summary:     Security update for net-tools
Type:        security
Severity:    moderate
References:  1243581,1246608,1248410,1248687,142461,CVE-2025-46836
This update for net-tools fixes the following issues:

Security issues fixed:

- CVE-2025-46836: missing bounds check in `get_name` may lead to a stack buffer overflow (bsc#1243581).
- Avoid unsafe use of `memcpy` in `ifconfig` (bsc#1248687).    
- Prevent overflow in `ax25` and `netrom` (bsc#1248687).   
- Fix stack buffer overflow in `parse_hex` (bsc#1248687).
- Fix stack buffer overflow in `proc_gen_fmt` (bsc#1248687).
    
Other issues fixed:

- Allow use of long interface names after CVE-2025-46836 fix, even if they are not accepted by the kernel (bsc#1248410).
- Fix netrom support.

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3267-1
Released:    Thu Sep 18 13:05:51 2025
Summary:     Security update for curl
Type:        security
Severity:    important
References:  1246197,1249191,1249348,1249367,CVE-2025-10148,CVE-2025-9086
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2025-9086: bug in patch comparison logic when processing cookies can lead to out-of-bounds read in heap buffer
  (bsc#1249191).
- CVE-2025-10148: predictable websocket mask can lead to proxy cache poisoning by malicious server (bsc#1249348).
    
Other issues fixed:
    
- Fix the --ftp-pasv option in curl v8.14.1 (bsc#1246197).
  * tool_getparam: fix --ftp-pasv [5f805ee]

- Update to version 8.14.1 (jsc#PED-13055, jsc#PED-13056).
  * TLS: add CURLOPT_SSL_SIGNATURE_ALGORITHMS and --sigalgs.
  * websocket: add option to disable auto-pong reply.
  * huge number of bugfixes.

  Please see https://curl.se/ch/ for full changelogs.

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3268-1
Released:    Thu Sep 18 13:08:10 2025
Summary:     Security update for curl
Type:        security
Severity:    important
References:  1246197,1249191,1249348,1249367,CVE-2025-10148,CVE-2025-9086
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2025-9086: bug in patch comparison logic when processing cookies can lead to out-of-bounds read in heap buffer
  (bsc#1249191).
- CVE-2025-10148: predictable websocket mask can lead to proxy cache poisoning by malicious server (bsc#1249348).
    
Other issues fixed:
    
- Fix the --ftp-pasv option in curl v8.14.1 (bsc#1246197).
  * tool_getparam: fix --ftp-pasv [5f805ee]

- Update to version 8.14.1 (jsc#PED-13055, jsc#PED-13056).
  * TLS: add CURLOPT_SSL_SIGNATURE_ALGORITHMS and --sigalgs.
  * websocket: add option to disable auto-pong reply.
  * huge number of bugfixes.

  Please see https://curl.se/ch/ for full changelogs.


-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3270-1
Released:    Thu Sep 18 13:18:05 2025
Summary:     Security update for krb5
Type:        security
Severity:    moderate
References:  1241219,CVE-2025-3576
This update for krb5 fixes the following issues:

- CVE-2025-3576: weakness in the MD5 checksum design allows for spoofing of GSSAPI-protected messages that are using
  RC4-HMAC-MD5 (bsc#1241219).

Krb5 as very old protocol supported quite a number of ciphers
that are not longer up to current cryptographic standards.

To avoid problems with those, SUSE has by default now disabled
those alorithms.

The following algorithms have been removed from valid krb5 enctypes:

- des3-cbc-sha1
- arcfour-hmac-md5

To reenable those algorithms, you can use allow options in krb5.conf:

[libdefaults]
allow_des3 = true
allow_rc4 = true

to reenable them.


-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3288-1
Released:    Mon Sep 22 12:13:27 2025
Summary:     Recommended update for permissions
Type:        recommended
Severity:    moderate
References:  1235873
This update for permissions fixes the following issues:

- permissions: remove unnecessary static dirs and devices (bsc#1235873)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3300-1
Released:    Tue Sep 23 11:03:41 2025
Summary:     Security update for vim
Type:        security
Severity:    moderate
References:  1246602,1246604,1247938,1247939,CVE-2025-53905,CVE-2025-53906,CVE-2025-55157,CVE-2025-55158
This update for vim fixes the following issues:

Updated to 9.1.1629:
- CVE-2025-53905: Fixed malicious tar archive may causing a path traversal in Vim’s tar.vim plugin (bsc#1246604)
- CVE-2025-53906: Fixed malicious zip archive may causing a path traversal in Vim’s zip (bsc#1246602)
- CVE-2025-55157: Fixed use-after-free in internal tuple reference management (bsc#1247938)
- CVE-2025-55158: Fixed double-free in internal typed value (typval_T) management (bsc#1247939)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3303-1
Released:    Tue Sep 23 11:10:02 2025
Summary:     Recommended update for dracut
Type:        recommended
Severity:    moderate
References:  1247819
This update for dracut fixes the following issues:

- fix (dracut-util): crash if CMDLINE ends with quotation mark (bsc#1247819)
- fix( rngd): adjust license to match the license of the whole project

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3331-1
Released:    Wed Sep 24 08:54:17 2025
Summary:     Security update for avahi
Type:        security
Severity:    moderate
References:  1233421,CVE-2024-52615
This update for avahi fixes the following issues:

- CVE-2024-52615: wide-area DNS uses constant source port for queries and can expose the Avahi-daemon to DNS spoofing
  attacks (bsc#1233421).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3334-1
Released:    Wed Sep 24 08:56:48 2025
Summary:     Recommended update for hyper-v
Type:        recommended
Severity:    moderate
References:  1212476,1244154
This update for hyper-v fixes the following issues:

- fcopy bugfix
  - Fix irregularities with size of ring buffer
  - Fix incorrect file path conversion
- Enable debug logs for hv_kvp_daemon (bsc#1244154).
- Update route parsing in kvp daemon
- Remove obsolete obsolete code for SLE11SP2
- remove dependency on /usr/bin/python3 using %python3_fix_shebang macro
  (bsc#1212476).
- Use %patch -P N instead of deprecated %patchN.
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3344-1
Released:    Wed Sep 24 15:34:13 2025
Summary:     Security update for the Linux Kernel
Type:        security
Severity:    important
References:  1229334,1233640,1234896,1236333,1237164,1240799,1242414,1242780,1244309,1244824,1245110,1245506,1245711,1245956,1245970,1245986,1246211,1246473,1246781,1246911,1247143,1247314,1247347,1247348,1247349,1247374,1247437,1247518,1247976,1248223,1248297,1248306,1248312,1248338,1248511,1248614,1248621,1248748,1249353,CVE-2022-49980,CVE-2022-50116,CVE-2023-53117,CVE-2024-42265,CVE-2024-53093,CVE-2024-53177,CVE-2024-57947,CVE-2024-58239,CVE-2025-21701,CVE-2025-21971,CVE-2025-37798,CVE-2025-38088,CVE-2025-38120,CVE-2025-38177,CVE-2025-38180,CVE-2025-38184,CVE-2025-38323,CVE-2025-38350,CVE-2025-38352,CVE-2025-38460,CVE-2025-38468,CVE-2025-38477,CVE-2025-38494,CVE-2025-38495,CVE-2025-38497,CVE-2025-38498,CVE-2025-38499,CVE-2025-38546,CVE-2025-38555,CVE-2025-38560,CVE-2025-38563,CVE-2025-38608,CVE-2025-38617,CVE-2025-38618,CVE-2025-38644
The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-49980: USB: gadget: fix use-after-free read in usb_udc_uevent() (bsc#1245110).
- CVE-2022-50116: kernel: tty: n_gsm: fix deadlock and link starvation in outgoing data path (bsc#1244824).
- CVE-2023-53117: fs: prevent out-of-bounds array speculation when closing a file descriptor (bsc#1242780).
- CVE-2024-42265: protect the fetch of ->fd[fd] in do_dup2() from mispredictions (bsc#1229334).
- CVE-2024-53093: nvme-multipath: defer partition scanning (bsc#1233640).
- CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896).
- CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1248614).
- CVE-2025-21701: net: avoid race between device unregistration and ethnl ops (bsc#1237164).
- CVE-2025-21971: net_sched: Prevent creation of classes with TC_H_ROOT (bsc#1240799).
- CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970).
- CVE-2025-38184: tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer (bsc#1245956).
- CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473).
- CVE-2025-38350: net/sched: Always pass notifications when child class becomes empty (bsc#1246781).
- CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1246911).
- CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd() (bsc#1247143).
- CVE-2025-38468: net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree (bsc#1247437).
- CVE-2025-38477: net/sched: sch_qfq: Fix race condition on qfq_aggregate (bsc#1247314).
- CVE-2025-38494: HID: core: do not bypass hid_hw_raw_request (bsc#1247349).
- CVE-2025-38495: HID: core: ensure the allocated report buffer can contain the reserved report ID (bsc#1247348).
- CVE-2025-38497: usb: gadget: configfs: Fix OOB read on empty string write (bsc#1247347).
- CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247374).
- CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976).
- CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223).
- CVE-2025-38555: usb: gadget : fix use-after-free in composite_dev_cleanup() (bsc#1248297).
- CVE-2025-38560: x86/sev: Evict cache lines during SNP memory validation (bsc#1248312).
- CVE-2025-38563: perf/core: Prevent VMA split of buffer mappings (bsc#1248306).
- CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248338).
- CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1248621).
- CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511).
- CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248748).

The following non-security bugs were fixed:

- Disable N_GSM (jsc#PED-8240).
- NFSv4.1: fix backchannel max_resp_sz verification check (bsc#1247518).
- NFSv4: fairly test all delegations on a SEQ4_ revocation (bsc#1246211).
- kabi fix for NFSv4: fairly test all delegations on a SEQ4_ revocation (bsc#1246211).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3371-1
Released:    Fri Sep 26 13:41:03 2025
Summary:     Recommended update for sysconfig
Type:        recommended
Severity:    important
References:  1237595
This update for sysconfig fixes the following issues:

- Update to version 0.85.10
- codespell run for all repository files and changes file
- spec: define permissions for ghost file attrs to avoid
  rpm --restore resets them to 0 (bsc#1237595).
- spec: fix name-repeated-in-summary rpmlint warning
  
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3432-1
Released:    Tue Sep 30 15:51:49 2025
Summary:     Recommended update for bind
Type:        recommended
Severity:    important
References:  1230649
This update for bind fixes the following issues:

- ensure file descriptors 0-2 are in use before using libuv (bsc#1230649) 

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3438-1
Released:    Tue Sep 30 16:37:32 2025
Summary:     Security update for openssl-1_1
Type:        security
Severity:    important
References:  1250232,CVE-2025-9230
This update for openssl-1_1 fixes the following issues:

- CVE-2025-9230: incorrect check of key size can lead to out-of-bounds read and write in RFC 3211 KEK unwrap
  (bsc#1250232).
  
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3593-1
Released:    Mon Oct 13 15:34:44 2025
Summary:     Recommended update for libzypp, zypper
Type:        recommended
Severity:    important
References:  1230267,1246912,1250343
This update for libzypp, zypper fixes the following issues:

- runposttrans: strip root prefix from tmppath (bsc#1250343)
- fixup! Make ld.so ignore the subarch packages during install (bsc#1246912)
- Make ld.so ignore the subarch packages during install (bsc#1246912)
- Fixed `bash-completion`: `zypper refresh` now ignores repository priority lines.
- Changes to support building against restructured libzypp in stack build (bsc#1230267)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3603-1
Released:    Wed Oct 15 15:37:24 2025
Summary:     Security update for samba
Type:        security
Severity:    critical
References:  1251279,1251280,CVE-2025-10230,CVE-2025-9640
This update for samba fixes the following issues:

- CVE-2025-9640: Fixed uninitialized memory disclosure via vfs_streams_xattr (bsc#1251279).
- CVE-2025-10230: Fixed command Injection in WINS server hook script (bsc#1251280).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3615-1
Released:    Thu Oct 16 07:49:00 2025
Summary:     Security update for the Linux Kernel
Type:        security
Severity:    important
References:  1065729,1164051,1193629,1194869,1202700,1203063,1203332,1204228,1205128,1205205,1206451,1206456,1206468,1206843,1206883,1206884,1207158,1207361,1207621,1207624,1207625,1207628,1207629,1207631,1207645,1207651,1208607,1209287,1209291,1209980,1210584,1211960,1212603,1213015,1213016,1213040,1213041,1213061,1213099,1213104,1213533,1213666,1213747,1214073,1214953,1214967,1215150,1215696,1215911,1216976,1217790,1220185,1220186,1223959,1234639,1236104,1237449,1238160,1241353,1242846,1243539,1244337,1244732,1245666,1246879,1246968,1247028,1247172,1247239,1248108,1248111,1248255,1248399,1248628,1248639,1248847,1249126,1249158,1249159,1249186,1249195,1249200,1249220,1249266,1249315,1249324,1249346,1249374,1249516,1249538,1249548,1249604,1249638,1249639,1249641,1249642,1249648,1249650,1249651,1249658,1249661,1249664,1249667,1249669,1249673,1249677,1249681,1249683,1249685,1249687,1249695,1249696,1249699,1249700,1249701,1249704,1249705,1249706,1249707,1249708,1249709,1249712,1249713,1
 249715,1249716,1249718,1249722,1249727,1249730,1249733,1249734,1249739,1249740,1249741,1249742,1249743,1249745,1249746,1249747,1249749,1249750,1249751,1249753,1249756,1249757,1249758,1249762,1249767,1249777,1249780,1249781,1249782,1249784,1249791,1249799,1249800,1249802,1249808,1249810,1249816,1249820,1249824,1249825,1249827,1249836,1249840,1249844,1249846,1249853,1249858,1249860,1249861,1249864,1249865,1249866,1249867,1249868,1249869,1249872,1249874,1249877,1249880,1249882,1249883,1249884,1249885,1249890,1249892,1249894,1249908,1249910,1249911,1249913,1249914,1249917,1249918,1249920,1249923,1249924,1249925,1249927,1249928,1249930,1249933,1249934,1249936,1249938,1249939,1249940,1249944,1249947,1249949,1249950,1249951,1249954,1249958,1249979,1249981,1249991,1249994,1249997,1250002,1250006,1250007,1250009,1250010,1250011,1250014,1250015,1250017,1250023,1250024,1250026,1250037,1250039,1250040,1250041,1250042,1250044,1250047,1250049,1250052,1250055,1250058,1250060,1250062,1250065,125006
 6,1250068,1250070,1250071,1250072,1250075,1250077,1250080,1250081,1250083,1250089,1250103,1250104,1250105,1250106,1250107,1250108,1250112,1250114,1250117,1250118,1250121,1250127,1250128,1250130,1250131,1250132,1250134,1250137,1250138,1250140,1250144,1250145,1250151,1250153,1250156,1250157,1250159,1250161,1250165,1250168,1250178,1250180,1250181,1250182,1250183,1250184,1250187,1250189,1250191,1250197,1250198,1250200,1250201,1250208,1250209,1250211,1250215,1250245,1250247,1250250,1250257,1250264,1250269,1250277,1250278,1250285,1250287,1250293,1250301,1250303,1250306,1250309,1250311,1250313,1250315,1250316,1250322,1250323,1250324,1250325,1250327,1250328,1250331,1250358,1250362,1250363,1250370,1250374,1250391,1250392,1250393,1250394,1250395,1250397,1250406,1250412,1250418,1250425,1250428,1250453,1250454,1250457,1250459,1250522,1250759,1250761,1250762,1250763,1250765,1250767,1250768,1250771,1250774,1250781,1250784,1250786,1250787,1250790,1250791,1250792,1250793,1250797,1250799,1250807,125
 0810,1250811,1250814,1250818,1250819,1250822,1250823,1250824,1250825,1250829,1250830,1250831,1250832,1250839,1250841,1250842,1250843,1250846,1250847,1250848,1250849,1250850,1250851,1250853,1250856,1250861,1250862,1250863,1250864,1250866,1250867,1250868,1250872,1250873,1250874,1250875,1250877,1250879,1250881,1250883,1250887,1250888,1250889,1250890,1250891,1250905,1250913,1250915,1250917,1250923,1250927,1250928,1250931,1250932,1250948,1250949,1250953,1250963,1250964,1250965,CVE-2022-2602,CVE-2022-2978,CVE-2022-36280,CVE-2022-43945,CVE-2022-49138,CVE-2022-50233,CVE-2022-50234,CVE-2022-50235,CVE-2022-50239,CVE-2022-50241,CVE-2022-50242,CVE-2022-50246,CVE-2022-50247,CVE-2022-50248,CVE-2022-50249,CVE-2022-50250,CVE-2022-50251,CVE-2022-50252,CVE-2022-50255,CVE-2022-50257,CVE-2022-50258,CVE-2022-50260,CVE-2022-50261,CVE-2022-50264,CVE-2022-50266,CVE-2022-50267,CVE-2022-50268,CVE-2022-50269,CVE-2022-50271,CVE-2022-50272,CVE-2022-50275,CVE-2022-50276,CVE-2022-50277,CVE-2022-50278,CVE-2022-502
 79,CVE-2022-50282,CVE-2022-50286,CVE-2022-50287,CVE-2022-50288,CVE-2022-50289,CVE-2022-50292,CVE-2022-50294,CVE-2022-50297,CVE-2022-50298,CVE-2022-50299,CVE-2022-50301,CVE-2022-50303,CVE-2022-50308,CVE-2022-50309,CVE-2022-50312,CVE-2022-50317,CVE-2022-50318,CVE-2022-50320,CVE-2022-50321,CVE-2022-50323,CVE-2022-50324,CVE-2022-50325,CVE-2022-50328,CVE-2022-50329,CVE-2022-50330,CVE-2022-50331,CVE-2022-50333,CVE-2022-50339,CVE-2022-50340,CVE-2022-50342,CVE-2022-50344,CVE-2022-50346,CVE-2022-50347,CVE-2022-50348,CVE-2022-50349,CVE-2022-50351,CVE-2022-50353,CVE-2022-50354,CVE-2022-50355,CVE-2022-50356,CVE-2022-50357,CVE-2022-50358,CVE-2022-50359,CVE-2022-50360,CVE-2022-50362,CVE-2022-50364,CVE-2022-50367,CVE-2022-50368,CVE-2022-50369,CVE-2022-50370,CVE-2022-50372,CVE-2022-50373,CVE-2022-50374,CVE-2022-50375,CVE-2022-50376,CVE-2022-50378,CVE-2022-50379,CVE-2022-50381,CVE-2022-50385,CVE-2022-50386,CVE-2022-50388,CVE-2022-50389,CVE-2022-50390,CVE-2022-50391,CVE-2022-50392,CVE-2022-50393,CVE-
 2022-50394,CVE-2022-50395,CVE-2022-50396,CVE-2022-50398,CVE-2022-50399,CVE-2022-50401,CVE-2022-50402,CVE-2022-50404,CVE-2022-50406,CVE-2022-50408,CVE-2022-50409,CVE-2022-50410,CVE-2022-50411,CVE-2022-50412,CVE-2022-50414,CVE-2022-50417,CVE-2022-50418,CVE-2022-50419,CVE-2022-50422,CVE-2022-50423,CVE-2022-50425,CVE-2022-50427,CVE-2022-50428,CVE-2022-50429,CVE-2022-50430,CVE-2022-50431,CVE-2022-50432,CVE-2022-50433,CVE-2022-50434,CVE-2022-50435,CVE-2022-50436,CVE-2022-50437,CVE-2022-50439,CVE-2022-50440,CVE-2022-50441,CVE-2022-50443,CVE-2022-50444,CVE-2022-50447,CVE-2022-50449,CVE-2022-50452,CVE-2022-50453,CVE-2022-50454,CVE-2022-50456,CVE-2022-50458,CVE-2022-50459,CVE-2022-50460,CVE-2022-50464,CVE-2022-50465,CVE-2022-50466,CVE-2022-50467,CVE-2022-50468,CVE-2022-50469,CVE-2023-1380,CVE-2023-28328,CVE-2023-31248,CVE-2023-3772,CVE-2023-39197,CVE-2023-42753,CVE-2023-52923,CVE-2023-53147,CVE-2023-53149,CVE-2023-53150,CVE-2023-53151,CVE-2023-53152,CVE-2023-53153,CVE-2023-53165,CVE-2023-5316
 7,CVE-2023-53168,CVE-2023-53171,CVE-2023-53174,CVE-2023-53176,CVE-2023-53178,CVE-2023-53179,CVE-2023-53181,CVE-2023-53182,CVE-2023-53185,CVE-2023-53189,CVE-2023-53193,CVE-2023-53196,CVE-2023-53197,CVE-2023-53199,CVE-2023-53201,CVE-2023-53205,CVE-2023-53210,CVE-2023-53213,CVE-2023-53215,CVE-2023-53216,CVE-2023-53219,CVE-2023-53222,CVE-2023-53223,CVE-2023-53226,CVE-2023-53229,CVE-2023-53230,CVE-2023-53232,CVE-2023-53234,CVE-2023-53237,CVE-2023-53238,CVE-2023-53239,CVE-2023-53241,CVE-2023-53242,CVE-2023-53244,CVE-2023-53245,CVE-2023-53246,CVE-2023-53249,CVE-2023-53250,CVE-2023-53251,CVE-2023-53252,CVE-2023-53255,CVE-2023-53257,CVE-2023-53258,CVE-2023-53259,CVE-2023-53263,CVE-2023-53265,CVE-2023-53268,CVE-2023-53270,CVE-2023-53272,CVE-2023-53273,CVE-2023-53275,CVE-2023-53276,CVE-2023-53277,CVE-2023-53280,CVE-2023-53281,CVE-2023-53282,CVE-2023-53284,CVE-2023-53286,CVE-2023-53287,CVE-2023-53288,CVE-2023-53295,CVE-2023-53297,CVE-2023-53298,CVE-2023-53299,CVE-2023-53302,CVE-2023-53304,CVE-2
 023-53305,CVE-2023-53309,CVE-2023-53311,CVE-2023-53313,CVE-2023-53314,CVE-2023-53315,CVE-2023-53316,CVE-2023-53317,CVE-2023-53320,CVE-2023-53321,CVE-2023-53322,CVE-2023-53324,CVE-2023-53326,CVE-2023-53330,CVE-2023-53331,CVE-2023-53332,CVE-2023-53333,CVE-2023-53334,CVE-2023-53335,CVE-2023-53337,CVE-2023-53340,CVE-2023-53344,CVE-2023-53347,CVE-2023-53349,CVE-2023-53352,CVE-2023-53356,CVE-2023-53357,CVE-2023-53359,CVE-2023-53368,CVE-2023-53370,CVE-2023-53371,CVE-2023-53373,CVE-2023-53375,CVE-2023-53377,CVE-2023-53378,CVE-2023-53379,CVE-2023-53380,CVE-2023-53381,CVE-2023-53383,CVE-2023-53384,CVE-2023-53386,CVE-2023-53388,CVE-2023-53390,CVE-2023-53391,CVE-2023-53393,CVE-2023-53395,CVE-2023-53396,CVE-2023-53398,CVE-2023-53400,CVE-2023-53404,CVE-2023-53405,CVE-2023-53406,CVE-2023-53409,CVE-2023-53413,CVE-2023-53414,CVE-2023-53415,CVE-2023-53416,CVE-2023-53422,CVE-2023-53427,CVE-2023-53431,CVE-2023-53435,CVE-2023-53436,CVE-2023-53437,CVE-2023-53438,CVE-2023-53440,CVE-2023-53442,CVE-2023-534
 43,CVE-2023-53444,CVE-2023-53446,CVE-2023-53448,CVE-2023-53449,CVE-2023-53451,CVE-2023-53452,CVE-2023-53453,CVE-2023-53454,CVE-2023-53456,CVE-2023-53457,CVE-2023-53458,CVE-2023-53463,CVE-2023-53464,CVE-2023-53465,CVE-2023-53466,CVE-2023-53468,CVE-2023-53471,CVE-2023-53472,CVE-2023-53473,CVE-2023-53474,CVE-2023-53475,CVE-2023-53476,CVE-2023-53480,CVE-2023-53482,CVE-2023-53485,CVE-2023-53487,CVE-2023-53488,CVE-2023-53489,CVE-2023-53492,CVE-2023-53494,CVE-2023-53496,CVE-2023-53498,CVE-2023-53499,CVE-2023-53505,CVE-2023-53506,CVE-2023-53509,CVE-2023-53511,CVE-2023-53512,CVE-2023-53515,CVE-2023-53518,CVE-2023-53519,CVE-2023-53521,CVE-2023-53524,CVE-2023-53525,CVE-2023-53526,CVE-2023-53530,CVE-2023-53531,CVE-2023-53532,CVE-2024-26583,CVE-2024-26584,CVE-2024-58240,CVE-2025-37738,CVE-2025-37958,CVE-2025-38014,CVE-2025-38111,CVE-2025-38380,CVE-2025-38488,CVE-2025-38553,CVE-2025-38572,CVE-2025-38659,CVE-2025-38664,CVE-2025-38678,CVE-2025-38683,CVE-2025-38685,CVE-2025-38706,CVE-2025-38713,CVE-
 2025-38734,CVE-2025-39691,CVE-2025-39703,CVE-2025-39726,CVE-2025-39746,CVE-2025-39751,CVE-2025-39790,CVE-2025-39823,CVE-2025-39824,CVE-2025-39860,CVE-2025-39869

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2022-49138: Bluetooth: hci_event: Fix checking conn for le_conn_complete_evt (bsc#1238160).
- CVE-2022-50233: Bluetooth: eir: Fix using strlen with hdev->{dev_name,short_name} (bsc#1246968).
- CVE-2022-50252: igb: Do not free q_vector unless new one was allocated (bsc#1249846).
- CVE-2022-50409: net: If sock is dead do not access sock's sk_wq in sk_stream_wait_memory (bsc#1250392).
- CVE-2023-53178: mm: fix zswap writeback race condition (bsc#1249827).
- CVE-2023-53257: wifi: mac80211: check S1G action frame size (bsc#1249869).
- CVE-2023-53321: wifi: mac80211_hwsim: drop short frames (bsc#1250313).
- CVE-2023-53438: x86/MCE: Always save CS register on AMD Zen IF Poison errors (bsc#1250180).
- CVE-2025-37738: ext4: ignore xattrs past end (bsc#1242846).
- CVE-2025-37958: mm/huge_memory: fix dereferencing invalid pmd migration entry (bsc#1243539).
- CVE-2025-38014: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (bsc#1244732).
- CVE-2025-38111: net/mdiobus: Fix potential out-of-bounds read/write access (bsc#1245666).
- CVE-2025-38380: i2c/designware: Fix an initialization issue (bsc#1247028).
- CVE-2025-38488: smb: client: fix use-after-free in crypt_message when using async crypto (bsc#1247239).
- CVE-2025-38553: net/sched: Restrict conditions for adding duplicating netems to qdisc tree (bsc#1248255).
- CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248399).
- CVE-2025-38659: gfs2: No more self recovery (bsc#1248639).
- CVE-2025-38664: ice: Fix a null pointer dereference in ice_copy_and_init_pkg() (bsc#1248628).
- CVE-2025-38678: netfilter: nf_tables: reject duplicate device on updates (bsc#1249126).
- CVE-2025-38685: fbdev: Fix vmalloc out-of-bounds write in fast_imageblit (bsc#1249220).
- CVE-2025-38706: ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime() (bsc#1249195).
- CVE-2025-38713: hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc() (bsc#1249200).
- CVE-2025-38734: net/smc: fix UAF on smcsk after smc_listen_out() (bsc#1249324).
- CVE-2025-39691: fs/buffer: fix use-after-free when call bh_read() helper (bsc#1249374).
- CVE-2025-39703: net, hsr: reject HSR frame if skb can't hold tag (bsc#1249315).
- CVE-2025-39726: s390/ism: fix concurrency management in ism_cmd() (bsc#1249266).
- CVE-2025-39746: wifi: ath10k: shutdown driver when hardware is unreliable (bsc#1249516).
- CVE-2025-39751: ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control (bsc#1249538).
- CVE-2025-39790: bus: mhi: host: Detect events pointing to unexpected TREs (bsc#1249548).
- CVE-2025-39823: KVM: x86: use array_index_nospec with indices that come from guest (bsc#1250002).
- CVE-2025-39824: HID: asus: fix UAF via HID_CLAIMED_INPUT validation (bsc#1250007).
- CVE-2025-39860: Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen() (bsc#1250247).
- CVE-2025-39869: dmaengine: ti: edma: Fix memory allocation size for queue_priority_map (bsc#1250406).

The following non-security bugs were fixed:

- !CONFIG & reference -> this is bug, immediate fail
- CONFIG & no reference -> OK temporarily, must be resolved eventually
- Do not self obsolete older kernel variants
- Kconfig.suse: Add KABI checkiness macro (config) (bsc#1249186).
- Limit patch filenames to 100 characters (bsc#1249604).
- Move pesign-obs-integration requirement from kernel-syms to kernel devel subpackage (bsc#1248108).
- Update config files. (bsc#1249186) Enable where we define KABI refs + rely on Kconfig deps.
- build_bug.h: Add KABI assert (bsc#1249186).
- hv_netvsc: Fix panic during namespace deletion with VF (bsc#1248111).
- kernel-binary: Another installation ordering fix (bsc#1241353).
- kernel-source: Do not list mkspec and its inputs as sources (bsc#1250522).
- kernel-subpackage-build: Decompress ghost file when compressed version exists (bsc#1249346)
- kernel-syms.spec: Drop old rpm release number hack (bsc#1247172).
- net/sched: ets: use old 'nbands' while purging unused classes (git-fixes).
- rpm/kernel-subpackage-spec: Skip brp-strip-debug to avoid file truncation (bsc#1246879).
- rpm/mkspec: Fix missing kernel-syms-rt creation (bsc#1244337)
- rpm: Configure KABI checkingness macro (bsc#1249186).
- rpm: Drop support for kabi/arch/ignore-flavor (bsc#1249186).
- rpm: Link arch-symbols script from scripts directory.
- rpm: Link guards script from scripts directory.
- supported.conf: mark hyperv_drm as external
- use uniform permission checks for all mount propagation changes (git-fixes).
- xfs: rework datasync tracking and execution (bsc#1237449).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3624-1
Released:    Thu Oct 16 21:59:19 2025
Summary:     Security update for expat
Type:        security
Severity:    important
References:  1249584,CVE-2025-59375
This update for expat fixes the following issues:

- CVE-2025-59375: memory amplification vulnerability allows attackers to trigger excessive dynamic memory allocations
  by submitting crafted XML input (bsc#1249584).


The following package changes have been done:

- bind-utils-9.16.50-150500.8.27.1 updated
- boost-license1_66_0-1.66.0-150200.12.7.1 updated
- cifs-utils-6.15-150400.3.15.1 updated
- cloud-netconfig-azure-1.15-150000.25.26.1 added
- coreutils-8.32-150400.9.9.1 updated
- curl-8.14.1-150400.5.69.1 updated
- dracut-055+suse.398.g8f75016e-150500.3.32.1 updated
- glibc-locale-base-2.31-150300.95.1 updated
- glibc-locale-2.31-150300.95.1 updated
- glibc-2.31-150300.95.1 updated
- grub2-i386-pc-2.06-150500.29.56.1 updated
- grub2-x86_64-efi-2.06-150500.29.56.1 updated
- grub2-2.06-150500.29.56.1 updated
- haveged-1.9.14-150400.3.8.1 updated
- hwdata-0.394-150000.3.77.2 updated
- hwinfo-21.89-150500.3.12.1 updated
- hyper-v-9-150200.14.12.2 updated
- iputils-20221126-150500.3.14.1 updated
- jq-1.6-150000.3.9.1 updated
- kbd-legacy-2.4.0-150400.5.9.1 updated
- kbd-2.4.0-150400.5.9.1 updated
- kernel-default-5.14.21-150500.55.124.1 updated
- kexec-tools-2.0.20-150500.20.3.1 updated
- krb5-1.20.1-150500.3.17.1 updated
- libavahi-client3-0.8-150400.7.23.1 updated
- libavahi-common3-0.8-150400.7.23.1 updated
- libboost_system1_66_0-1.66.0-150200.12.7.1 updated
- libboost_thread1_66_0-1.66.0-150200.12.7.1 updated
- libbrotlicommon1-1.0.7-150200.3.5.1 updated
- libbrotlidec1-1.0.7-150200.3.5.1 updated
- libcurl4-8.14.1-150400.5.69.1 updated
- libexpat1-2.7.1-150400.3.31.1 updated
- libgcc_s1-14.3.0+git11799-150000.1.11.1 updated
- libgcrypt20-1.9.4-150500.12.3.3 updated
- libglib-2_0-0-2.70.5-150400.3.23.1 updated
- libgnutls30-3.7.3-150400.4.50.1 updated
- libhavege2-1.9.14-150400.3.8.1 updated
- libjq1-1.6-150000.3.9.1 updated
- liblmdb-0_9_30-0.9.30-150500.3.2.1 updated
- libncurses6-6.1-150000.5.30.1 updated
- libopenssl1_1-1.1.1l-150500.17.43.1 updated
- libpython3_6m1_0-3.6.15-150300.10.97.1 updated
- librdkafka1-0.11.6-150000.1.11.1 updated
- libsolv-tools-base-0.7.34-150500.6.12.3 updated
- libsolv-tools-0.7.34-150500.6.12.3 updated
- libsqlite3-0-3.50.2-150000.3.33.1 updated
- libssh-config-0.9.8-150400.3.9.1 updated
- libssh4-0.9.8-150400.3.9.1 updated
- libstdc++6-14.3.0+git11799-150000.1.11.1 updated
- libsystemd0-249.17-150400.8.49.2 updated
- libudev1-249.17-150400.8.49.2 updated
- libwayland-client0-1.21.0-150500.1.1 added
- libxml2-2-2.10.3-150500.5.32.1 updated
- libyaml-0-2-0.1.7-150000.3.4.1 updated
- libzypp-17.37.18-150500.6.64.1 updated
- ncurses-utils-6.1-150000.5.30.1 updated
- net-tools-2.0+git20170221.479bb4a-150000.5.13.1 updated
- openssh-clients-8.4p1-150300.3.49.1 updated
- openssh-common-8.4p1-150300.3.49.1 updated
- openssh-server-8.4p1-150300.3.49.1 updated
- openssh-8.4p1-150300.3.49.1 updated
- openssl-1_1-1.1.1l-150500.17.43.1 updated
- pam-config-1.1-150200.3.14.1 updated
- pam-1.3.0-150000.6.86.1 updated
- perl-base-5.26.1-150300.17.20.1 updated
- perl-5.26.1-150300.17.20.1 updated
- permissions-20201225-150400.5.22.1 updated
- python-azure-agent-config-server-2.12.0.4-150100.3.50.1 updated
- python-azure-agent-2.12.0.4-150100.3.50.1 updated
- python3-PyYAML-5.4.1-150300.3.6.1 updated
- python3-appdirs-1.4.3-150000.3.3.1 updated
- python3-asn1crypto-0.24.0-150000.3.5.1 updated
- python3-attrs-19.3.0-150200.3.9.1 updated
- python3-base-3.6.15-150300.10.97.1 updated
- python3-bind-9.16.50-150500.8.27.1 updated
- python3-certifi-2018.1.18-150000.3.6.1 updated
- python3-cffi-1.13.2-150200.3.5.1 updated
- python3-chardet-3.0.4-150000.5.6.1 updated
- python3-cryptography-3.3.2-150400.26.1 updated
- python3-idna-2.6-150000.3.6.1 updated
- python3-importlib-metadata-1.5.0-150100.3.8.1 updated
- python3-iniconfig-1.1.1-150000.1.13.1 updated
- python3-more-itertools-8.10.0-150400.10.1 updated
- python3-packaging-21.3-150200.3.6.1 updated
- python3-ply-3.10-150000.3.8.1 updated
- python3-pyOpenSSL-21.0.0-150400.10.1 updated
- python3-pyasn1-0.4.2-150000.3.8.1 updated
- python3-pycparser-2.17-150000.3.5.1 updated
- python3-pyparsing-2.4.7-150300.3.3.1 updated
- python3-pytz-2022.1-150300.3.9.1 updated
- python3-py-1.10.0-150100.5.15.1 updated
- python3-requests-2.25.1-150300.3.18.1 updated
- python3-setuptools-44.1.1-150400.9.15.1 updated
- python3-six-1.14.0-150200.15.1 updated
- python3-urllib3-1.25.10-150300.4.18.1 updated
- python3-zipp-0.6.0-150100.3.8.1 updated
- python3-3.6.15-150300.10.97.2 updated
- runc-1.2.6-150000.73.2 updated
- samba-client-libs-4.17.12+git.510.0efaadf376b-150500.3.34.1 updated
- sudo-1.9.12p1-150500.7.13.1 updated
- suse-build-key-12.0-150000.8.61.2 updated
- suse-module-tools-15.5.7-150500.3.15.3 updated
- sysconfig-netconfig-0.85.10-150200.15.1 updated
- sysconfig-0.85.10-150200.15.1 updated
- systemd-presets-branding-SLE-15.1-150100.20.17.2 updated
- systemd-rpm-macros-16-150000.7.42.1 updated
- systemd-sysvinit-249.17-150400.8.49.2 updated
- systemd-249.17-150400.8.49.2 updated
- terminfo-base-6.1-150000.5.30.1 updated
- terminfo-6.1-150000.5.30.1 updated
- udev-249.17-150400.8.49.2 updated
- update-alternatives-1.19.0.4-150000.4.7.1 updated
- vim-data-common-9.1.1629-150500.20.33.1 updated
- vim-9.1.1629-150500.20.33.1 updated
- xen-libs-4.17.5_10-150500.3.50.1 updated
- zypper-1.14.94-150500.6.42.1 updated
- catatonit-0.2.0-150500.3.3.1 removed
- docker-27.5.1_ce-150000.218.1 removed


More information about the sle-container-updates mailing list