SUSE-IU-2026:562-1: Security update of suse/sle-micro/kvm-5.5
sle-container-updates at lists.suse.com
sle-container-updates at lists.suse.com
Thu Jan 29 08:06:52 UTC 2026
SUSE Image Update Advisory: suse/sle-micro/kvm-5.5
-----------------------------------------------------------------
Image Advisory ID : SUSE-IU-2026:562-1
Image Tags : suse/sle-micro/kvm-5.5:2.0.4 , suse/sle-micro/kvm-5.5:2.0.4-3.5.449 , suse/sle-micro/kvm-5.5:latest
Image Release : 3.5.449
Severity : important
Type : security
References : 1065729 1193629 1194869 1196823 1204957 1205567 1206451 1206843
1206889 1207051 1207088 1207315 1207611 1207620 1207622 1207636
1207644 1207646 1207652 1207653 1208570 1208758 1209799 1209980
1210644 1210817 1210943 1211690 1213025 1213032 1213093 1213105
1213110 1213111 1213653 1213747 1213867 1214635 1214940 1214962
1214986 1214990 1216062 1224573 1225832 1226797 1226846 1228015
1233640 1235038 1237563 1249871 1252046 1252678 1253409 1254392
1254520 1254559 1254562 1254572 1254578 1254580 1254592 1254601
1254608 1254609 1254614 1254615 1254617 1254623 1254625 1254626
1254631 1254632 1254634 1254644 1254645 1254649 1254651 1254653
1254656 1254658 1254660 1254664 1254671 1254674 1254676 1254677
1254681 1254684 1254685 1254686 1254690 1254692 1254694 1254696
1254698 1254699 1254704 1254706 1254709 1254710 1254711 1254712
1254713 1254714 1254716 1254723 1254725 1254728 1254729 1254743
1254745 1254751 1254753 1254754 1254756 1254759 1254763 1254775
1254780 1254781 1254782 1254783 1254785 1254786 1254788 1254789
1254792 1254813 1254843 1254847 1254851 1254894 1254902 1254910
1254911 1254915 1254916 1254917 1254920 1254922 1254958 1254959
1254974 1254979 1254986 1254994 1255002 1255005 1255007 1255049
1255060 1255107 1255163 1255165 1255245 1255467 1255469 1255521
1255528 1255532 1255546 1255549 1255554 1255555 1255558 1255560
1255561 1255562 1255565 1255574 1255576 1255578 1255582 1255596
1255600 1255605 1255607 1255608 1255609 1255618 1255619 1255620
1255623 1255624 1255626 1255627 1255628 1255635 1255636 1255688
1255690 1255697 1255702 1255704 1255745 1255747 1255749 1255750
1255757 1255758 1255760 1255761 1255762 1255763 1255769 1255771
1255773 1255780 1255786 1255787 1255789 1255790 1255791 1255792
1255796 1255797 1255800 1255801 1255802 1255803 1255804 1255806
1255808 1255819 1255839 1255841 1255843 1255844 1255872 1255875
1255876 1255877 1255878 1255880 1255881 1255888 1255889 1255890
1255899 1255901 1255902 1255905 1255906 1255909 1255910 1255912
1255916 1255919 1255920 1255922 1255924 1255925 1255939 1255946
1255950 1255953 1255954 1255955 1255962 1255964 1255968 1255969
1255970 1255971 1255974 1255978 1255979 1255983 1255985 1255990
1255993 1255994 1255996 1255998 1256034 1256040 1256042 1256045
1256046 1256048 1256049 1256050 1256053 1256056 1256057 1256062
1256063 1256064 1256065 1256071 1256074 1256081 1256084 1256086
1256088 1256091 1256093 1256099 1256101 1256103 1256106 1256111
1256112 1256114 1256115 1256118 1256119 1256121 1256122 1256124
1256125 1256126 1256127 1256128 1256130 1256131 1256132 1256133
1256136 1256137 1256140 1256141 1256142 1256143 1256144 1256145
1256149 1256150 1256152 1256154 1256155 1256157 1256158 1256162
1256164 1256165 1256166 1256167 1256172 1256173 1256174 1256177
1256178 1256179 1256182 1256184 1256185 1256186 1256188 1256189
1256191 1256192 1256193 1256194 1256196 1256198 1256199 1256200
1256202 1256203 1256204 1256205 1256206 1256207 1256208 1256211
1256214 1256215 1256216 1256218 1256219 1256220 1256221 1256223
1256228 1256230 1256231 1256235 1256239 1256241 1256242 1256245
1256248 1256250 1256254 1256260 1256265 1256269 1256271 1256274
1256282 1256285 1256291 1256294 1256295 1256300 1256302 1256306
1256309 1256317 1256320 1256323 1256326 1256328 1256333 1256334
1256335 1256337 1256338 1256344 1256346 1256349 1256352 1256353
1256355 1256358 1256359 1256363 1256364 1256368 1256370 1256375
1256381 1256382 1256383 1256384 1256386 1256388 1256391 1256394
1256395 1256396 1256397 1256398 1256423 1256426 1256432 CVE-2022-0854
CVE-2022-48853 CVE-2022-50614 CVE-2022-50615 CVE-2022-50617 CVE-2022-50618
CVE-2022-50619 CVE-2022-50621 CVE-2022-50622 CVE-2022-50623 CVE-2022-50625
CVE-2022-50626 CVE-2022-50629 CVE-2022-50630 CVE-2022-50633 CVE-2022-50635
CVE-2022-50636 CVE-2022-50638 CVE-2022-50640 CVE-2022-50641 CVE-2022-50643
CVE-2022-50644 CVE-2022-50646 CVE-2022-50649 CVE-2022-50652 CVE-2022-50653
CVE-2022-50656 CVE-2022-50658 CVE-2022-50660 CVE-2022-50661 CVE-2022-50662
CVE-2022-50664 CVE-2022-50665 CVE-2022-50666 CVE-2022-50667 CVE-2022-50668
CVE-2022-50669 CVE-2022-50670 CVE-2022-50671 CVE-2022-50672 CVE-2022-50673
CVE-2022-50675 CVE-2022-50677 CVE-2022-50678 CVE-2022-50679 CVE-2022-50698
CVE-2022-50699 CVE-2022-50700 CVE-2022-50701 CVE-2022-50702 CVE-2022-50703
CVE-2022-50704 CVE-2022-50705 CVE-2022-50709 CVE-2022-50710 CVE-2022-50712
CVE-2022-50714 CVE-2022-50715 CVE-2022-50716 CVE-2022-50717 CVE-2022-50718
CVE-2022-50719 CVE-2022-50722 CVE-2022-50723 CVE-2022-50724 CVE-2022-50726
CVE-2022-50727 CVE-2022-50728 CVE-2022-50730 CVE-2022-50731 CVE-2022-50732
CVE-2022-50733 CVE-2022-50735 CVE-2022-50736 CVE-2022-50738 CVE-2022-50740
CVE-2022-50742 CVE-2022-50744 CVE-2022-50745 CVE-2022-50747 CVE-2022-50749
CVE-2022-50750 CVE-2022-50751 CVE-2022-50752 CVE-2022-50754 CVE-2022-50755
CVE-2022-50756 CVE-2022-50757 CVE-2022-50758 CVE-2022-50760 CVE-2022-50761
CVE-2022-50763 CVE-2022-50767 CVE-2022-50768 CVE-2022-50769 CVE-2022-50770
CVE-2022-50773 CVE-2022-50774 CVE-2022-50776 CVE-2022-50777 CVE-2022-50779
CVE-2022-50781 CVE-2022-50782 CVE-2022-50809 CVE-2022-50814 CVE-2022-50818
CVE-2022-50819 CVE-2022-50821 CVE-2022-50822 CVE-2022-50823 CVE-2022-50824
CVE-2022-50826 CVE-2022-50827 CVE-2022-50828 CVE-2022-50829 CVE-2022-50830
CVE-2022-50832 CVE-2022-50833 CVE-2022-50834 CVE-2022-50835 CVE-2022-50836
CVE-2022-50838 CVE-2022-50839 CVE-2022-50840 CVE-2022-50842 CVE-2022-50843
CVE-2022-50844 CVE-2022-50845 CVE-2022-50846 CVE-2022-50847 CVE-2022-50848
CVE-2022-50849 CVE-2022-50850 CVE-2022-50851 CVE-2022-50853 CVE-2022-50856
CVE-2022-50858 CVE-2022-50859 CVE-2022-50860 CVE-2022-50861 CVE-2022-50862
CVE-2022-50864 CVE-2022-50866 CVE-2022-50867 CVE-2022-50868 CVE-2022-50870
CVE-2022-50872 CVE-2022-50873 CVE-2022-50876 CVE-2022-50878 CVE-2022-50880
CVE-2022-50881 CVE-2022-50882 CVE-2022-50883 CVE-2022-50884 CVE-2022-50885
CVE-2022-50886 CVE-2022-50887 CVE-2022-50888 CVE-2022-50889 CVE-2023-23559
CVE-2023-53254 CVE-2023-53743 CVE-2023-53744 CVE-2023-53746 CVE-2023-53747
CVE-2023-53751 CVE-2023-53753 CVE-2023-53754 CVE-2023-53755 CVE-2023-53761
CVE-2023-53766 CVE-2023-53769 CVE-2023-53780 CVE-2023-53781 CVE-2023-53783
CVE-2023-53786 CVE-2023-53788 CVE-2023-53792 CVE-2023-53794 CVE-2023-53801
CVE-2023-53802 CVE-2023-53803 CVE-2023-53804 CVE-2023-53806 CVE-2023-53808
CVE-2023-53811 CVE-2023-53814 CVE-2023-53816 CVE-2023-53818 CVE-2023-53819
CVE-2023-53820 CVE-2023-53827 CVE-2023-53828 CVE-2023-53830 CVE-2023-53832
CVE-2023-53833 CVE-2023-53834 CVE-2023-53837 CVE-2023-53840 CVE-2023-53842
CVE-2023-53844 CVE-2023-53845 CVE-2023-53847 CVE-2023-53848 CVE-2023-53849
CVE-2023-53850 CVE-2023-53852 CVE-2023-53858 CVE-2023-53860 CVE-2023-53862
CVE-2023-53864 CVE-2023-53866 CVE-2023-53989 CVE-2023-53990 CVE-2023-53991
CVE-2023-53996 CVE-2023-53998 CVE-2023-54001 CVE-2023-54003 CVE-2023-54007
CVE-2023-54009 CVE-2023-54010 CVE-2023-54014 CVE-2023-54015 CVE-2023-54017
CVE-2023-54018 CVE-2023-54019 CVE-2023-54020 CVE-2023-54021 CVE-2023-54024
CVE-2023-54025 CVE-2023-54026 CVE-2023-54028 CVE-2023-54036 CVE-2023-54039
CVE-2023-54040 CVE-2023-54041 CVE-2023-54042 CVE-2023-54044 CVE-2023-54045
CVE-2023-54046 CVE-2023-54047 CVE-2023-54048 CVE-2023-54049 CVE-2023-54050
CVE-2023-54051 CVE-2023-54053 CVE-2023-54055 CVE-2023-54057 CVE-2023-54058
CVE-2023-54064 CVE-2023-54070 CVE-2023-54072 CVE-2023-54074 CVE-2023-54076
CVE-2023-54078 CVE-2023-54079 CVE-2023-54083 CVE-2023-54084 CVE-2023-54090
CVE-2023-54091 CVE-2023-54092 CVE-2023-54095 CVE-2023-54096 CVE-2023-54097
CVE-2023-54098 CVE-2023-54100 CVE-2023-54102 CVE-2023-54104 CVE-2023-54106
CVE-2023-54107 CVE-2023-54108 CVE-2023-54110 CVE-2023-54111 CVE-2023-54114
CVE-2023-54115 CVE-2023-54116 CVE-2023-54118 CVE-2023-54119 CVE-2023-54120
CVE-2023-54122 CVE-2023-54123 CVE-2023-54126 CVE-2023-54127 CVE-2023-54128
CVE-2023-54130 CVE-2023-54131 CVE-2023-54132 CVE-2023-54134 CVE-2023-54136
CVE-2023-54138 CVE-2023-54140 CVE-2023-54144 CVE-2023-54146 CVE-2023-54148
CVE-2023-54150 CVE-2023-54153 CVE-2023-54156 CVE-2023-54159 CVE-2023-54164
CVE-2023-54166 CVE-2023-54168 CVE-2023-54169 CVE-2023-54170 CVE-2023-54171
CVE-2023-54173 CVE-2023-54175 CVE-2023-54177 CVE-2023-54179 CVE-2023-54183
CVE-2023-54186 CVE-2023-54189 CVE-2023-54190 CVE-2023-54194 CVE-2023-54197
CVE-2023-54198 CVE-2023-54199 CVE-2023-54201 CVE-2023-54202 CVE-2023-54205
CVE-2023-54208 CVE-2023-54210 CVE-2023-54211 CVE-2023-54213 CVE-2023-54214
CVE-2023-54219 CVE-2023-54226 CVE-2023-54229 CVE-2023-54230 CVE-2023-54234
CVE-2023-54236 CVE-2023-54238 CVE-2023-54242 CVE-2023-54244 CVE-2023-54245
CVE-2023-54251 CVE-2023-54252 CVE-2023-54254 CVE-2023-54260 CVE-2023-54262
CVE-2023-54264 CVE-2023-54266 CVE-2023-54267 CVE-2023-54269 CVE-2023-54270
CVE-2023-54271 CVE-2023-54274 CVE-2023-54275 CVE-2023-54277 CVE-2023-54280
CVE-2023-54284 CVE-2023-54286 CVE-2023-54287 CVE-2023-54289 CVE-2023-54292
CVE-2023-54293 CVE-2023-54294 CVE-2023-54295 CVE-2023-54298 CVE-2023-54299
CVE-2023-54300 CVE-2023-54301 CVE-2023-54302 CVE-2023-54304 CVE-2023-54305
CVE-2023-54309 CVE-2023-54311 CVE-2023-54315 CVE-2023-54317 CVE-2023-54319
CVE-2023-54320 CVE-2023-54321 CVE-2023-54322 CVE-2023-54325 CVE-2023-54326
CVE-2024-36933 CVE-2024-53093 CVE-2024-56590 CVE-2025-39977 CVE-2025-40019
CVE-2025-40139 CVE-2025-40215 CVE-2025-40220 CVE-2025-40233 CVE-2025-40256
CVE-2025-40258 CVE-2025-40277 CVE-2025-40280 CVE-2025-40331 CVE-2025-68218
CVE-2025-68732
-----------------------------------------------------------------
The container suse/sle-micro/kvm-5.5 was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2026:317-1
Released: Wed Jan 28 15:36:48 2026
Summary: Security update for the Linux Kernel
Type: security
Severity: important
References: 1065729,1193629,1194869,1196823,1204957,1205567,1206451,1206843,1206889,1207051,1207088,1207315,1207611,1207620,1207622,1207636,1207644,1207646,1207652,1207653,1208570,1208758,1209799,1209980,1210644,1210817,1210943,1211690,1213025,1213032,1213093,1213105,1213110,1213111,1213653,1213747,1213867,1214635,1214940,1214962,1214986,1214990,1216062,1224573,1225832,1226797,1226846,1228015,1233640,1235038,1237563,1249871,1252046,1252678,1253409,1254392,1254520,1254559,1254562,1254572,1254578,1254580,1254592,1254601,1254608,1254609,1254614,1254615,1254617,1254623,1254625,1254626,1254631,1254632,1254634,1254644,1254645,1254649,1254651,1254653,1254656,1254658,1254660,1254664,1254671,1254674,1254676,1254677,1254681,1254684,1254685,1254686,1254690,1254692,1254694,1254696,1254698,1254699,1254704,1254706,1254709,1254710,1254711,1254712,1254713,1254714,1254716,1254723,1254725,1254728,1254729,1254743,1254745,1254751,1254753,1254754,1254756,1254759,1254763,1254775,1254780,1254781,1254782,1
254783,1254785,1254786,1254788,1254789,1254792,1254813,1254843,1254847,1254851,1254894,1254902,1254910,1254911,1254915,1254916,1254917,1254920,1254922,1254958,1254959,1254974,1254979,1254986,1254994,1255002,1255005,1255007,1255049,1255060,1255107,1255163,1255165,1255245,1255467,1255469,1255521,1255528,1255532,1255546,1255549,1255554,1255555,1255558,1255560,1255561,1255562,1255565,1255574,1255576,1255578,1255582,1255596,1255600,1255605,1255607,1255608,1255609,1255618,1255619,1255620,1255623,1255624,1255626,1255627,1255628,1255635,1255636,1255688,1255690,1255697,1255702,1255704,1255745,1255747,1255749,1255750,1255757,1255758,1255760,1255761,1255762,1255763,1255769,1255771,1255773,1255780,1255786,1255787,1255789,1255790,1255791,1255792,1255796,1255797,1255800,1255801,1255802,1255803,1255804,1255806,1255808,1255819,1255839,1255841,1255843,1255844,1255872,1255875,1255876,1255877,1255878,1255880,1255881,1255888,1255889,1255890,1255899,1255901,1255902,1255905,1255906,1255909,1255910,125591
2,1255916,1255919,1255920,1255922,1255924,1255925,1255939,1255946,1255950,1255953,1255954,1255955,1255962,1255964,1255968,1255969,1255970,1255971,1255974,1255978,1255979,1255983,1255985,1255990,1255993,1255994,1255996,1255998,1256034,1256040,1256042,1256045,1256046,1256048,1256049,1256050,1256053,1256056,1256057,1256062,1256063,1256064,1256065,1256071,1256074,1256081,1256084,1256086,1256088,1256091,1256093,1256099,1256101,1256103,1256106,1256111,1256112,1256114,1256115,1256118,1256119,1256121,1256122,1256124,1256125,1256126,1256127,1256128,1256130,1256131,1256132,1256133,1256136,1256137,1256140,1256141,1256142,1256143,1256144,1256145,1256149,1256150,1256152,1256154,1256155,1256157,1256158,1256162,1256164,1256165,1256166,1256167,1256172,1256173,1256174,1256177,1256178,1256179,1256182,1256184,1256185,1256186,1256188,1256189,1256191,1256192,1256193,1256194,1256196,1256198,1256199,1256200,1256202,1256203,1256204,1256205,1256206,1256207,1256208,1256211,1256214,1256215,1256216,1256218,125
6219,1256220,1256221,1256223,1256228,1256230,1256231,1256235,1256239,1256241,1256242,1256245,1256248,1256250,1256254,1256260,1256265,1256269,1256271,1256274,1256282,1256285,1256291,1256294,1256295,1256300,1256302,1256306,1256309,1256317,1256320,1256323,1256326,1256328,1256333,1256334,1256335,1256337,1256338,1256344,1256346,1256349,1256352,1256353,1256355,1256358,1256359,1256363,1256364,1256368,1256370,1256375,1256381,1256382,1256383,1256384,1256386,1256388,1256391,1256394,1256395,1256396,1256397,1256398,1256423,1256426,1256432,CVE-2022-0854,CVE-2022-48853,CVE-2022-50614,CVE-2022-50615,CVE-2022-50617,CVE-2022-50618,CVE-2022-50619,CVE-2022-50621,CVE-2022-50622,CVE-2022-50623,CVE-2022-50625,CVE-2022-50626,CVE-2022-50629,CVE-2022-50630,CVE-2022-50633,CVE-2022-50635,CVE-2022-50636,CVE-2022-50638,CVE-2022-50640,CVE-2022-50641,CVE-2022-50643,CVE-2022-50644,CVE-2022-50646,CVE-2022-50649,CVE-2022-50652,CVE-2022-50653,CVE-2022-50656,CVE-2022-50658,CVE-2022-50660,CVE-2022-50661,CVE-2022-50662,
CVE-2022-50664,CVE-2022-50665,CVE-2022-50666,CVE-2022-50667,CVE-2022-50668,CVE-2022-50669,CVE-2022-50670,CVE-2022-50671,CVE-2022-50672,CVE-2022-50673,CVE-2022-50675,CVE-2022-50677,CVE-2022-50678,CVE-2022-50679,CVE-2022-50698,CVE-2022-50699,CVE-2022-50700,CVE-2022-50701,CVE-2022-50702,CVE-2022-50703,CVE-2022-50704,CVE-2022-50705,CVE-2022-50709,CVE-2022-50710,CVE-2022-50712,CVE-2022-50714,CVE-2022-50715,CVE-2022-50716,CVE-2022-50717,CVE-2022-50718,CVE-2022-50719,CVE-2022-50722,CVE-2022-50723,CVE-2022-50724,CVE-2022-50726,CVE-2022-50727,CVE-2022-50728,CVE-2022-50730,CVE-2022-50731,CVE-2022-50732,CVE-2022-50733,CVE-2022-50735,CVE-2022-50736,CVE-2022-50738,CVE-2022-50740,CVE-2022-50742,CVE-2022-50744,CVE-2022-50745,CVE-2022-50747,CVE-2022-50749,CVE-2022-50750,CVE-2022-50751,CVE-2022-50752,CVE-2022-50754,CVE-2022-50755,CVE-2022-50756,CVE-2022-50757,CVE-2022-50758,CVE-2022-50760,CVE-2022-50761,CVE-2022-50763,CVE-2022-50767,CVE-2022-50768,CVE-2022-50769,CVE-2022-50770,CVE-2022-50773,CVE-202
2-50774,CVE-2022-50776,CVE-2022-50777,CVE-2022-50779,CVE-2022-50781,CVE-2022-50782,CVE-2022-50809,CVE-2022-50814,CVE-2022-50818,CVE-2022-50819,CVE-2022-50821,CVE-2022-50822,CVE-2022-50823,CVE-2022-50824,CVE-2022-50826,CVE-2022-50827,CVE-2022-50828,CVE-2022-50829,CVE-2022-50830,CVE-2022-50832,CVE-2022-50833,CVE-2022-50834,CVE-2022-50835,CVE-2022-50836,CVE-2022-50838,CVE-2022-50839,CVE-2022-50840,CVE-2022-50842,CVE-2022-50843,CVE-2022-50844,CVE-2022-50845,CVE-2022-50846,CVE-2022-50847,CVE-2022-50848,CVE-2022-50849,CVE-2022-50850,CVE-2022-50851,CVE-2022-50853,CVE-2022-50856,CVE-2022-50858,CVE-2022-50859,CVE-2022-50860,CVE-2022-50861,CVE-2022-50862,CVE-2022-50864,CVE-2022-50866,CVE-2022-50867,CVE-2022-50868,CVE-2022-50870,CVE-2022-50872,CVE-2022-50873,CVE-2022-50876,CVE-2022-50878,CVE-2022-50880,CVE-2022-50881,CVE-2022-50882,CVE-2022-50883,CVE-2022-50884,CVE-2022-50885,CVE-2022-50886,CVE-2022-50887,CVE-2022-50888,CVE-2022-50889,CVE-2023-23559,CVE-2023-53254,CVE-2023-53743,CVE-2023-53744
,CVE-2023-53746,CVE-2023-53747,CVE-2023-53751,CVE-2023-53753,CVE-2023-53754,CVE-2023-53755,CVE-2023-53761,CVE-2023-53766,CVE-2023-53769,CVE-2023-53780,CVE-2023-53781,CVE-2023-53783,CVE-2023-53786,CVE-2023-53788,CVE-2023-53792,CVE-2023-53794,CVE-2023-53801,CVE-2023-53802,CVE-2023-53803,CVE-2023-53804,CVE-2023-53806,CVE-2023-53808,CVE-2023-53811,CVE-2023-53814,CVE-2023-53816,CVE-2023-53818,CVE-2023-53819,CVE-2023-53820,CVE-2023-53827,CVE-2023-53828,CVE-2023-53830,CVE-2023-53832,CVE-2023-53833,CVE-2023-53834,CVE-2023-53837,CVE-2023-53840,CVE-2023-53842,CVE-2023-53844,CVE-2023-53845,CVE-2023-53847,CVE-2023-53848,CVE-2023-53849,CVE-2023-53850,CVE-2023-53852,CVE-2023-53858,CVE-2023-53860,CVE-2023-53862,CVE-2023-53864,CVE-2023-53866,CVE-2023-53989,CVE-2023-53990,CVE-2023-53991,CVE-2023-53996,CVE-2023-53998,CVE-2023-54001,CVE-2023-54003,CVE-2023-54007,CVE-2023-54009,CVE-2023-54010,CVE-2023-54014,CVE-2023-54015,CVE-2023-54017,CVE-2023-54018,CVE-2023-54019,CVE-2023-54020,CVE-2023-54021,CVE-20
23-54024,CVE-2023-54025,CVE-2023-54026,CVE-2023-54028,CVE-2023-54036,CVE-2023-54039,CVE-2023-54040,CVE-2023-54041,CVE-2023-54042,CVE-2023-54044,CVE-2023-54045,CVE-2023-54046,CVE-2023-54047,CVE-2023-54048,CVE-2023-54049,CVE-2023-54050,CVE-2023-54051,CVE-2023-54053,CVE-2023-54055,CVE-2023-54057,CVE-2023-54058,CVE-2023-54064,CVE-2023-54070,CVE-2023-54072,CVE-2023-54074,CVE-2023-54076,CVE-2023-54078,CVE-2023-54079,CVE-2023-54083,CVE-2023-54084,CVE-2023-54090,CVE-2023-54091,CVE-2023-54092,CVE-2023-54095,CVE-2023-54096,CVE-2023-54097,CVE-2023-54098,CVE-2023-54100,CVE-2023-54102,CVE-2023-54104,CVE-2023-54106,CVE-2023-54107,CVE-2023-54108,CVE-2023-54110,CVE-2023-54111,CVE-2023-54114,CVE-2023-54115,CVE-2023-54116,CVE-2023-54118,CVE-2023-54119,CVE-2023-54120,CVE-2023-54122,CVE-2023-54123,CVE-2023-54126,CVE-2023-54127,CVE-2023-54128,CVE-2023-54130,CVE-2023-54131,CVE-2023-54132,CVE-2023-54134,CVE-2023-54136,CVE-2023-54138,CVE-2023-54140,CVE-2023-54144,CVE-2023-54146,CVE-2023-54148,CVE-2023-5415
0,CVE-2023-54153,CVE-2023-54156,CVE-2023-54159,CVE-2023-54164,CVE-2023-54166,CVE-2023-54168,CVE-2023-54169,CVE-2023-54170,CVE-2023-54171,CVE-2023-54173,CVE-2023-54175,CVE-2023-54177,CVE-2023-54179,CVE-2023-54183,CVE-2023-54186,CVE-2023-54189,CVE-2023-54190,CVE-2023-54194,CVE-2023-54197,CVE-2023-54198,CVE-2023-54199,CVE-2023-54201,CVE-2023-54202,CVE-2023-54205,CVE-2023-54208,CVE-2023-54210,CVE-2023-54211,CVE-2023-54213,CVE-2023-54214,CVE-2023-54219,CVE-2023-54226,CVE-2023-54229,CVE-2023-54230,CVE-2023-54234,CVE-2023-54236,CVE-2023-54238,CVE-2023-54242,CVE-2023-54244,CVE-2023-54245,CVE-2023-54251,CVE-2023-54252,CVE-2023-54254,CVE-2023-54260,CVE-2023-54262,CVE-2023-54264,CVE-2023-54266,CVE-2023-54267,CVE-2023-54269,CVE-2023-54270,CVE-2023-54271,CVE-2023-54274,CVE-2023-54275,CVE-2023-54277,CVE-2023-54280,CVE-2023-54284,CVE-2023-54286,CVE-2023-54287,CVE-2023-54289,CVE-2023-54292,CVE-2023-54293,CVE-2023-54294,CVE-2023-54295,CVE-2023-54298,CVE-2023-54299,CVE-2023-54300,CVE-2023-54301,CVE-2
023-54302,CVE-2023-54304,CVE-2023-54305,CVE-2023-54309,CVE-2023-54311,CVE-2023-54315,CVE-2023-54317,CVE-2023-54319,CVE-2023-54320,CVE-2023-54321,CVE-2023-54322,CVE-2023-54325,CVE-2023-54326,CVE-2024-36933,CVE-2024-53093,CVE-2024-56590,CVE-2025-39977,CVE-2025-40019,CVE-2025-40139,CVE-2025-40215,CVE-2025-40220,CVE-2025-40233,CVE-2025-40256,CVE-2025-40258,CVE-2025-40277,CVE-2025-40280,CVE-2025-40331,CVE-2025-68218,CVE-2025-68732
The SUSE Linux Enterprise 15 SP5 kernel was updated to fix various security issues
The following security issues were fixed:
- CVE-2022-50630: mm: hugetlb: fix UAF in hugetlb_handle_userfault (bsc#1254785).
- CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255576).
- CVE-2023-53254: cacheinfo: Fix shared_cpu_map to handle shared caches at different levels (bsc#1249871).
- CVE-2023-53781: smc: Fix use-after-free in tcp_write_timer_handler() (bsc#1254751).
- CVE-2024-56590: Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet (bsc#1235038).
- CVE-2025-39977: futex: Prevent use-after-free during requeue-PI (bsc#1252046).
- CVE-2025-40019: crypto: essiv - Check ssize for decryption and in-place encryption (bsc#1252678).
- CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409).
- CVE-2025-40215: kABI: xfrm: delete x->tunnel as we delete x (bsc#1254959).
- CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520).
- CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813).
- CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1254843).
- CVE-2025-40277: drm/vmwgfx: Validate command header size against (bsc#1254894).
- CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self() (bsc#1254847).
- CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615).
- CVE-2025-68732: gpu: host1x: Fix race in syncpt alloc/free (bsc#1255688).
The following non security issues were fixed:
- ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() (git-fixes).
- ACPI: PRM: Remove unnecessary strict handler address checks (git-fixes).
- ACPI: property: Do not pass NULL handles to acpi_attach_data() (git-fixes).
- ACPI: property: Fix buffer properties extraction for subnodes (git-fixes).
- KVM: SVM: Fix TSC_AUX virtualization setup (git-fixes).
- RDMA/cm: Rate limit destroy CM ID timeout error message (git-fixes).
- RDMA/counter: Check CAP_NET_RAW check in user namespace for RDMA counters (git-fixes).
- RDMA/hns: Fix the modification of max_send_sge (git-fixes).
- RDMA/mlx5: Check CAP_NET_RAW in user namespace for anchor create (git-fixes).
- RDMA/mlx5: Check CAP_NET_RAW in user namespace for devx create (git-fixes).
- RDMA/mlx5: Check CAP_NET_RAW in user namespace for flow create (git-fixes).
- RDMA/mlx5: Fix compilation warning when USER_ACCESS isn't set (git-fixes).
- RDMA/nldev: Check CAP_NET_RAW in user namespace for QP modify (git-fixes).
- RDMA/uverbs: Add empty rdma_uattrs_has_raw_cap() declaration (git-fixes).
- RDMA/uverbs: Check CAP_NET_RAW in user namespace for QP create (git-fixes).
- RDMA/uverbs: Check CAP_NET_RAW in user namespace for RAW QP create (git-fixes).
- RDMA/uverbs: Check CAP_NET_RAW in user namespace for flow create (git-fixes).
- arch/idle: Change arch_cpu_idle() behavior: always exit with IRQs disabled (git-fixes).
- cpuidle/poll: Ensure IRQs stay disabled after cpuidle_state::enter() calls (git-fixes).
- cpuidle: Move IRQ state validation (git-fixes).
- cpuidle: haltpoll: Do not enable interrupts when entering idle (git-fixes).
- dm: free table mempools if not used in __bind (git-fixes).
- padata: Honor the caller's alignment in case of chunk_size 0 (bsc#1237563).
- platform/x86/intel-uncore-freq: Fail module load when plat_info is NULL (git-fixes).
- x86/bugs: Fix RSB clearing in indirect_branch_prediction_barrier() (git-fixes).
- x86/bugs: Use SBPB in write_ibpb() if applicable (git-fixes).
- x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT (git-fixes).
- x86/tdx: Drop flags from __tdx_hypercall() (git-fixes).
- x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes).
- x86/tdx: Emit warning if IRQs are enabled during HLT #VE handling (git-fixes).
- x86/tdx: Extend TDX_MODULE_CALL to support more TDCALL/SEAMCALL leafs (git-fixes).
- x86/tdx: Fix __noreturn build warning around __tdx_hypercall_failed() (git-fixes).
- x86/tdx: Fix arch_safe_halt() execution for TDX VMs (git-fixes).
- x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes).
- x86/tdx: Make TDX_HYPERCALL asm similar to TDX_MODULE_CALL (git-fixes).
- x86/tdx: Make macros of TDCALLs consistent with the spec (git-fixes).
- x86/tdx: Pass TDCALL/SEAMCALL input/output registers via a structure (git-fixes).
- x86/tdx: Reimplement __tdx_hypercall() using TDX_MODULE_CALL asm (git-fixes).
- x86/tdx: Remove 'struct tdx_hypercall_args' (git-fixes).
- x86/tdx: Remove TDX_HCALL_ISSUE_STI (git-fixes).
- x86/tdx: Rename __tdx_module_call() to __tdcall() (git-fixes).
- x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes).
- x86/tdx: Retry partially-completed page conversion hypercalls (git-fixes).
- x86/tdx: Skip saving output regs when SEAMCALL fails with VMFailInvalid (git-fixes).
- x86/tdx: Zero out the missing RSI in TDX_HYPERCALL macro (git-fixes).
- x86/virt/tdx: Make TDX_MODULE_CALL handle SEAMCALL #UD and #GP (git-fixes).
- x86/virt/tdx: Wire up basic SEAMCALL functions (git-fixes).
- xfs: fix sparse inode limits on runt AG (bsc#1254392).
The following package changes have been done:
- kernel-default-base-5.14.21-150500.55.133.1.150500.6.65.1 updated
- container:suse-sle-micro-base-5.5-latest-2.0.4-5.8.234 updated
More information about the sle-container-updates
mailing list