From null at suse.de Fri Jan 2 16:30:02 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Jan 2026 16:30:02 -0000 Subject: SUSE-RU-2026:0003-1: moderate: Recommended update for pgvector Message-ID: <176737140215.13153.16915738624709903532@smelt2.prg2.suse.org> # Recommended update for pgvector Announcement ID: SUSE-RU-2026:0003-1 Release Date: 2026-01-02T10:31:17Z Rating: moderate References: Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that can now be installed. ## Description: This update for pgvector fixes the following issues: * enable postgresql 18 pgvector was updated to 0.8.1: * Added support for Postgres 18 rc1 * Improved performance of `binary_quantize` function * Update to 0.7.0 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-3=1 openSUSE-SLE-15.6-2026-3=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2026-3=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-3=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * pgvector-devel-0.8.1-150600.13.6.1 * postgresql17-pgvector-debuginfo-0.8.1-150600.13.6.1 * postgresql13-pgvector-debuginfo-0.8.1-150600.13.6.1 * postgresql13-pgvector-0.8.1-150600.13.6.1 * postgresql17-pgvector-0.8.1-150600.13.6.1 * postgresql15-pgvector-debuginfo-0.8.1-150600.13.6.1 * postgresql16-pgvector-debuginfo-0.8.1-150600.13.6.1 * postgresql16-pgvector-debugsource-0.8.1-150600.13.6.1 * postgresql17-pgvector-debugsource-0.8.1-150600.13.6.1 * postgresql14-pgvector-debugsource-0.8.1-150600.13.6.1 * postgresql14-pgvector-debuginfo-0.8.1-150600.13.6.1 * postgresql15-pgvector-0.8.1-150600.13.6.1 * postgresql18-pgvector-debuginfo-0.8.1-150600.13.6.1 * postgresql18-pgvector-0.8.1-150600.13.6.1 * postgresql15-pgvector-debugsource-0.8.1-150600.13.6.1 * postgresql16-pgvector-0.8.1-150600.13.6.1 * postgresql18-pgvector-debugsource-0.8.1-150600.13.6.1 * postgresql13-pgvector-debugsource-0.8.1-150600.13.6.1 * postgresql14-pgvector-0.8.1-150600.13.6.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * postgresql17-pgvector-debuginfo-0.8.1-150600.13.6.1 * postgresql17-pgvector-0.8.1-150600.13.6.1 * postgresql16-pgvector-debuginfo-0.8.1-150600.13.6.1 * postgresql17-pgvector-debugsource-0.8.1-150600.13.6.1 * postgresql16-pgvector-debugsource-0.8.1-150600.13.6.1 * postgresql18-pgvector-debuginfo-0.8.1-150600.13.6.1 * postgresql18-pgvector-debugsource-0.8.1-150600.13.6.1 * postgresql18-pgvector-0.8.1-150600.13.6.1 * postgresql16-pgvector-0.8.1-150600.13.6.1 * pgvector-devel-0.8.1-150600.13.6.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * postgresql17-pgvector-debuginfo-0.8.1-150600.13.6.1 * postgresql17-pgvector-0.8.1-150600.13.6.1 * postgresql16-pgvector-debuginfo-0.8.1-150600.13.6.1 * postgresql17-pgvector-debugsource-0.8.1-150600.13.6.1 * postgresql16-pgvector-debugsource-0.8.1-150600.13.6.1 * postgresql18-pgvector-debuginfo-0.8.1-150600.13.6.1 * postgresql18-pgvector-debugsource-0.8.1-150600.13.6.1 * postgresql18-pgvector-0.8.1-150600.13.6.1 * postgresql16-pgvector-0.8.1-150600.13.6.1 * pgvector-devel-0.8.1-150600.13.6.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 2 16:30:03 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Jan 2026 16:30:03 -0000 Subject: SUSE-RU-2026:0002-1: moderate: Recommended update for pgaudit Message-ID: <176737140361.13153.5361841473599773139@smelt2.prg2.suse.org> # Recommended update for pgaudit Announcement ID: SUSE-RU-2026:0002-1 Release Date: 2026-01-02T10:29:46Z Rating: moderate References: Affected Products: * Legacy Module 15-SP7 * openSUSE Leap 15.6 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that can now be installed. ## Description: This update for pgaudit fixes the following issues: Added support for pg 18 by adding the 18.0 version * bug fixes: * Error when required hooks are skipped. * Improvements: * SELECT FOR UPDATE object logging improvement. * Disable logging in parallel workers. * Use strpbrk() instead of strstr() where applicable. * Fix search_path for trigger functions. * Minor code optimizations. * Features: * PostgreSQL 18 support. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-2=1 openSUSE-SLE-15.6-2026-2=1 * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2026-2=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-2=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2026-2=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-2=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * postgresql14-pgaudit-debuginfo-1.6.3-150600.13.13.1 * postgresql14-pgaudit-1.6.3-150600.13.13.1 * postgresql15-pgaudit-debuginfo-1.7.1-150600.13.13.1 * postgresql17-pgaudit-debuginfo-17.1-150600.13.13.1 * postgresql14-pgaudit-debugsource-1.6.3-150600.13.13.1 * postgresql16-pgaudit-16.1-150600.13.13.1 * postgresql16-pgaudit-debugsource-16.1-150600.13.13.1 * postgresql13-pgaudit-debugsource-1.5.3-150600.13.13.1 * postgresql18-pgaudit-18.0-150600.13.13.1 * postgresql13-pgaudit-1.5.3-150600.13.13.1 * postgresql15-pgaudit-debugsource-1.7.1-150600.13.13.1 * postgresql18-pgaudit-debugsource-18.0-150600.13.13.1 * postgresql17-pgaudit-debugsource-17.1-150600.13.13.1 * postgresql15-pgaudit-1.7.1-150600.13.13.1 * postgresql18-pgaudit-debuginfo-18.0-150600.13.13.1 * postgresql17-pgaudit-17.1-150600.13.13.1 * postgresql13-pgaudit-debuginfo-1.5.3-150600.13.13.1 * postgresql16-pgaudit-debuginfo-16.1-150600.13.13.1 * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * postgresql14-pgaudit-1.6.3-150600.13.13.1 * postgresql14-pgaudit-debuginfo-1.6.3-150600.13.13.1 * postgresql15-pgaudit-debuginfo-1.7.1-150600.13.13.1 * postgresql14-pgaudit-debugsource-1.6.3-150600.13.13.1 * postgresql16-pgaudit-16.1-150600.13.13.1 * postgresql16-pgaudit-debugsource-16.1-150600.13.13.1 * postgresql15-pgaudit-debugsource-1.7.1-150600.13.13.1 * postgresql15-pgaudit-1.7.1-150600.13.13.1 * postgresql16-pgaudit-debuginfo-16.1-150600.13.13.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * postgresql14-pgaudit-debuginfo-1.6.3-150600.13.13.1 * postgresql14-pgaudit-1.6.3-150600.13.13.1 * postgresql15-pgaudit-debuginfo-1.7.1-150600.13.13.1 * postgresql14-pgaudit-debugsource-1.6.3-150600.13.13.1 * postgresql13-pgaudit-debugsource-1.5.3-150600.13.13.1 * postgresql13-pgaudit-1.5.3-150600.13.13.1 * postgresql15-pgaudit-debugsource-1.7.1-150600.13.13.1 * postgresql15-pgaudit-1.7.1-150600.13.13.1 * postgresql13-pgaudit-debuginfo-1.5.3-150600.13.13.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * postgresql17-pgaudit-debuginfo-17.1-150600.13.13.1 * postgresql18-pgaudit-18.0-150600.13.13.1 * postgresql18-pgaudit-debugsource-18.0-150600.13.13.1 * postgresql17-pgaudit-debugsource-17.1-150600.13.13.1 * postgresql18-pgaudit-debuginfo-18.0-150600.13.13.1 * postgresql17-pgaudit-17.1-150600.13.13.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * postgresql14-pgaudit-1.6.3-150600.13.13.1 * postgresql14-pgaudit-debuginfo-1.6.3-150600.13.13.1 * postgresql15-pgaudit-debuginfo-1.7.1-150600.13.13.1 * postgresql17-pgaudit-debuginfo-17.1-150600.13.13.1 * postgresql14-pgaudit-debugsource-1.6.3-150600.13.13.1 * postgresql16-pgaudit-16.1-150600.13.13.1 * postgresql16-pgaudit-debugsource-16.1-150600.13.13.1 * postgresql18-pgaudit-18.0-150600.13.13.1 * postgresql15-pgaudit-debugsource-1.7.1-150600.13.13.1 * postgresql18-pgaudit-debugsource-18.0-150600.13.13.1 * postgresql17-pgaudit-debugsource-17.1-150600.13.13.1 * postgresql15-pgaudit-1.7.1-150600.13.13.1 * postgresql18-pgaudit-debuginfo-18.0-150600.13.13.1 * postgresql17-pgaudit-17.1-150600.13.13.1 * postgresql16-pgaudit-debuginfo-16.1-150600.13.13.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 2 16:30:14 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Jan 2026 16:30:14 -0000 Subject: SUSE-RU-2026:0001-1: moderate: Recommended update for gdb Message-ID: <176737141476.13153.12986678716123477811@smelt2.prg2.suse.org> # Recommended update for gdb Announcement ID: SUSE-RU-2026:0001-1 Release Date: 2026-01-02T10:26:51Z Rating: moderate References: * bsc#1216488 * bsc#1221763 * bsc#1238724 * bsc#1240047 * bsc#1240838 * bsc#1250033 * bsc#1251213 * jsc#PED-13716 Affected Products: * Development Tools Module 15-SP7 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that contains one feature and has seven fixes can now be installed. ## Description: This update for gdb fixes the following issues: GDB 16.3 changes: * GDB now supports watchpoints for tagged data pointers (see https://en.wikipedia.org/wiki/Tagged_pointer) on amd64, such as the one used by the Linear Address Masking (LAM) feature provided by Intel. * Debugging support for Intel MPX has been removed. This includes the removal of: * MPX register support * the commands "show/set mpx bound" (deprecated since GDB 15) * i386 and amd64 implementation of the hooks report_signal_info and get_siginfo_type. * GDB now supports printing of asynchronous events from the Intel Processor Trace during 'record instruction-history', 'record function-call-history' and all stepping commands. This can be controlled with the new "set record btrace pt event-tracing" command. * GDB now supports printing of ptwrite payloads from the Intel Processor Trace during 'record instruction-history', 'record function-call-history' and all stepping commands. The payload is also accessible in Python as a RecordAuxiliary object. Printing is customizable via a ptwrite filter function in Python. By default, the raw ptwrite payload is printed for each ptwrite that is encountered. * For breakpoints that are created in the 'pending' state, any 'thread' or 'task' keywords are parsed at the time the breakpoint is created, rather than at the time the breakpoint becomes non-pending. * Thread-specific breakpoints are only inserted into the program space in which the thread of interest is running. In most cases program spaces are unique for each inferior, so this means that thread-specific breakpoints will usually only be inserted for the inferior containing the thread of interest. The breakpoint will be hit no less than before. * For ARM targets, the offset of the pc in the jmp_buf has been fixed to match glibc 2.20 and later. This should only matter when not using libc probes. This may cause breakage when using an incompatible libc, like uclibc or newlib, or an older glibc. * MTE (Memory Tagging Extension) debugging is now supported on AArch64 baremetal targets. * In a record session, when a forward emulation reaches the end of the reverse history, the warning message has been changed to indicate that the end of the history has been reached. It also specifies that the forward execution can continue, and the recording will also continue. * The Ada 'Object_Size attribute is now supported. * New bash script gstack uses GDB to print stack traces of running processes. * Python API: * Added gdb.record.clear. Clears the trace data of the current recording. This forces re-decoding of the trace for successive commands. * Added the new event source gdb.tui_enabled. * New module gdb.missing_objfile that facilitates dealing with missing objfiles when opening a core-file. * New function gdb.missing_objfile.register_handler that can register an instance of a sub-class of gdb.missing_debug.MissingObjfileHandler as a handler for missing objfiles. * New class gdb.missing_objfile.MissingObjfileHandler which can be sub-classed to create handlers for missing objfiles. * The 'signed' argument to gdb.Architecture.integer_type() will no longer accept non-bool types. * The gdb.MICommand.installed property can only be set to True or False. * The 'qualified' argument to gdb.Breakpoint constructor will no longer accept non-bool types. * Added the gdb.Symbol.is_artificial attribute. * Debugger Adapter Protocol changes: * The "scopes" request will now return a scope holding global variables from the stack frame's compilation unit. * The "scopes" request will return a "returnValue" scope holding the return value from the latest "stepOut" command, when appropriate. * The "launch" and "attach" requests were rewritten in accordance with some clarifications to the spec. Now they can be sent at any time after the "initialized" event, but will not take effect (or send a response) until after the "configurationDone" request has been sent. * The "variables" request will not return artificial symbols. * New commands: * show jit-reader-directory Show the name of the directory that "jit-reader-load" uses for relative file names. * set style line-number foreground COLOR set style line-number background COLOR set style line-number intensity VALUE Control the styling of line numbers printed by GDB. * set style command foreground COLOR set style command background COLOR set style command intensity VALUE Control the styling of GDB commands when displayed by GDB. * set style title foreground COLOR set style title background COLOR set style title intensity VALUE This style now applies to the header line of lists, for example the first line of the output of "info breakpoints". Previous uses of this style have been replaced with the new "command" style. * set warn-language-frame-mismatch [on|off] show warn-language-frame-mismatch Control the warning that is emitted when specifying a language that does not match the current frame's language. * maintenance info inline-frames [ADDRESS] New command which displays GDB's inline-frame information for the current address, or for ADDRESS if specified. The output identifies inlined frames which start at the specified address. * maintenance info blocks [ADDRESS] New command which displays information about all of the blocks at ADDRESS, or at the current address if ADDRESS is not given. Blocks are listed starting at the inner global block out to the most inner block. * info missing-objfile-handlers List all the registered missing-objfile handlers. * enable missing-objfile-handler LOCUS HANDLER disable missing-objfile-handler LOCUS HANDLER Enable or disable a missing-objfile handler with a name matching the regular expression HANDLER, in LOCUS. LOCUS can be 'global' to operate on global missing-objfile handler, 'progspace' to operate on handlers within the current program space, or can be a regular expression which is matched against the filename of the primary executable in each program space. * Changed commands: * remove-symbol-file This command now supports file-name completion. * remove-symbol-file -a ADDRESS The ADDRESS expression can now be a full expression consisting of multiple terms, e.g. 'function + 0x1000' (without quotes), previously only a single term could be given. * target core target exec target tfile target ctf compile file maint print c-tdesc save gdb-index These commands now require their filename argument to be quoted if it contains white space or quote characters. If the argument contains no such special characters then quoting is not required. * maintenance print remote-registers Add an "Expedited" column to the output of the command. It indicates which registers were included in the last stop reply packet received by GDB. * show configuration Now includes the version of GNU Readline library that GDB is using. * New remote packets: * vFile:stat Return information about files on the remote system. Like vFile:fstat but takes a filename rather than an open file descriptor. * x addr,length Given ADDR and LENGTH, fetch LENGTH units from the memory at address ADDR and send the fetched data in binary format. This packet is equivalent to 'm', except that the data in the response are in binary format. * binary-upload in qSupported reply If the stub sends back 'binary-upload+' in it's qSupported reply, then GDB will, where possible, make use of the 'x' packet. If the stub doesn't report this feature supported, then GDB will not use the 'x' packet. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-1=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-1=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-1=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-1=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-1=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-1=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-1=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-1=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-1=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-1=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-1=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-1=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-1=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * source-highlight-debugsource-3.1.9-150000.3.9.1 * libsource-highlight-devel-3.1.9-150000.3.9.1 * libsource-highlight4-debuginfo-3.1.9-150000.3.9.1 * source-highlight-cgi-debuginfo-3.1.9-150000.3.9.1 * source-highlight-cgi-3.1.9-150000.3.9.1 * gdb-debuginfo-16.3-150400.15.26.1 * gdb-16.3-150400.15.26.1 * gdbserver-16.3-150400.15.26.1 * source-highlight-3.1.9-150000.3.9.1 * libsource-highlight4-3.1.9-150000.3.9.1 * source-highlight-debuginfo-3.1.9-150000.3.9.1 * gdb-debugsource-16.3-150400.15.26.1 * gdbserver-debuginfo-16.3-150400.15.26.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc) * gdb-testresults-16.3-150400.15.26.1 * openSUSE Leap 15.6 (x86_64) * libsource-highlight4-32bit-debuginfo-3.1.9-150000.3.9.1 * libsource-highlight4-32bit-3.1.9-150000.3.9.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * source-highlight-debugsource-3.1.9-150000.3.9.1 * libsource-highlight-devel-3.1.9-150000.3.9.1 * libsource-highlight4-debuginfo-3.1.9-150000.3.9.1 * gdb-debuginfo-16.3-150400.15.26.1 * gdb-16.3-150400.15.26.1 * gdbserver-16.3-150400.15.26.1 * libsource-highlight4-3.1.9-150000.3.9.1 * source-highlight-debuginfo-3.1.9-150000.3.9.1 * gdb-debugsource-16.3-150400.15.26.1 * gdbserver-debuginfo-16.3-150400.15.26.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libsource-highlight-devel-3.1.9-150000.3.9.1 * libsource-highlight4-debuginfo-3.1.9-150000.3.9.1 * gdb-debuginfo-16.3-150400.15.26.1 * gdb-16.3-150400.15.26.1 * gdbserver-16.3-150400.15.26.1 * libsource-highlight4-3.1.9-150000.3.9.1 * gdb-debugsource-16.3-150400.15.26.1 * gdbserver-debuginfo-16.3-150400.15.26.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libsource-highlight-devel-3.1.9-150000.3.9.1 * libsource-highlight4-debuginfo-3.1.9-150000.3.9.1 * gdb-debuginfo-16.3-150400.15.26.1 * gdb-16.3-150400.15.26.1 * gdbserver-16.3-150400.15.26.1 * libsource-highlight4-3.1.9-150000.3.9.1 * gdb-debugsource-16.3-150400.15.26.1 * gdbserver-debuginfo-16.3-150400.15.26.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * source-highlight-debugsource-3.1.9-150000.3.9.1 * libsource-highlight-devel-3.1.9-150000.3.9.1 * libsource-highlight4-debuginfo-3.1.9-150000.3.9.1 * gdb-debuginfo-16.3-150400.15.26.1 * gdb-16.3-150400.15.26.1 * gdbserver-16.3-150400.15.26.1 * libsource-highlight4-3.1.9-150000.3.9.1 * source-highlight-debuginfo-3.1.9-150000.3.9.1 * gdb-debugsource-16.3-150400.15.26.1 * gdbserver-debuginfo-16.3-150400.15.26.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * source-highlight-debugsource-3.1.9-150000.3.9.1 * libsource-highlight-devel-3.1.9-150000.3.9.1 * libsource-highlight4-debuginfo-3.1.9-150000.3.9.1 * gdb-debuginfo-16.3-150400.15.26.1 * gdb-16.3-150400.15.26.1 * gdbserver-16.3-150400.15.26.1 * libsource-highlight4-3.1.9-150000.3.9.1 * source-highlight-debuginfo-3.1.9-150000.3.9.1 * gdb-debugsource-16.3-150400.15.26.1 * gdbserver-debuginfo-16.3-150400.15.26.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libsource-highlight-devel-3.1.9-150000.3.9.1 * libsource-highlight4-debuginfo-3.1.9-150000.3.9.1 * gdb-debuginfo-16.3-150400.15.26.1 * gdb-16.3-150400.15.26.1 * gdbserver-16.3-150400.15.26.1 * libsource-highlight4-3.1.9-150000.3.9.1 * gdb-debugsource-16.3-150400.15.26.1 * gdbserver-debuginfo-16.3-150400.15.26.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * source-highlight-debugsource-3.1.9-150000.3.9.1 * libsource-highlight-devel-3.1.9-150000.3.9.1 * libsource-highlight4-debuginfo-3.1.9-150000.3.9.1 * gdb-debuginfo-16.3-150400.15.26.1 * gdb-16.3-150400.15.26.1 * gdbserver-16.3-150400.15.26.1 * libsource-highlight4-3.1.9-150000.3.9.1 * source-highlight-debuginfo-3.1.9-150000.3.9.1 * gdb-debugsource-16.3-150400.15.26.1 * gdbserver-debuginfo-16.3-150400.15.26.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * source-highlight-debugsource-3.1.9-150000.3.9.1 * libsource-highlight-devel-3.1.9-150000.3.9.1 * libsource-highlight4-debuginfo-3.1.9-150000.3.9.1 * gdb-debuginfo-16.3-150400.15.26.1 * gdb-16.3-150400.15.26.1 * gdbserver-16.3-150400.15.26.1 * libsource-highlight4-3.1.9-150000.3.9.1 * source-highlight-debuginfo-3.1.9-150000.3.9.1 * gdb-debugsource-16.3-150400.15.26.1 * gdbserver-debuginfo-16.3-150400.15.26.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libsource-highlight-devel-3.1.9-150000.3.9.1 * libsource-highlight4-debuginfo-3.1.9-150000.3.9.1 * gdb-debuginfo-16.3-150400.15.26.1 * gdb-16.3-150400.15.26.1 * gdbserver-16.3-150400.15.26.1 * libsource-highlight4-3.1.9-150000.3.9.1 * gdb-debugsource-16.3-150400.15.26.1 * gdbserver-debuginfo-16.3-150400.15.26.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * source-highlight-debugsource-3.1.9-150000.3.9.1 * libsource-highlight-devel-3.1.9-150000.3.9.1 * libsource-highlight4-debuginfo-3.1.9-150000.3.9.1 * gdb-debuginfo-16.3-150400.15.26.1 * gdb-16.3-150400.15.26.1 * gdbserver-16.3-150400.15.26.1 * libsource-highlight4-3.1.9-150000.3.9.1 * source-highlight-debuginfo-3.1.9-150000.3.9.1 * gdb-debugsource-16.3-150400.15.26.1 * gdbserver-debuginfo-16.3-150400.15.26.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * source-highlight-debugsource-3.1.9-150000.3.9.1 * libsource-highlight-devel-3.1.9-150000.3.9.1 * libsource-highlight4-debuginfo-3.1.9-150000.3.9.1 * gdb-debuginfo-16.3-150400.15.26.1 * gdb-16.3-150400.15.26.1 * gdbserver-16.3-150400.15.26.1 * libsource-highlight4-3.1.9-150000.3.9.1 * source-highlight-debuginfo-3.1.9-150000.3.9.1 * gdb-debugsource-16.3-150400.15.26.1 * gdbserver-debuginfo-16.3-150400.15.26.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * gdb-debuginfo-16.3-150400.15.26.1 * gdb-16.3-150400.15.26.1 * gdbserver-16.3-150400.15.26.1 * gdb-debugsource-16.3-150400.15.26.1 * gdbserver-debuginfo-16.3-150400.15.26.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586 nosrc) * gdb-testresults-16.3-150400.15.26.1 * openSUSE Leap 15.4 (aarch64_ilp32) * gdbserver-64bit-16.3-150400.15.26.1 * gdb-64bit-16.3-150400.15.26.1 * gdbserver-64bit-debuginfo-16.3-150400.15.26.1 * gdb-64bit-debuginfo-16.3-150400.15.26.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1216488 * https://bugzilla.suse.com/show_bug.cgi?id=1221763 * https://bugzilla.suse.com/show_bug.cgi?id=1238724 * https://bugzilla.suse.com/show_bug.cgi?id=1240047 * https://bugzilla.suse.com/show_bug.cgi?id=1240838 * https://bugzilla.suse.com/show_bug.cgi?id=1250033 * https://bugzilla.suse.com/show_bug.cgi?id=1251213 * https://jira.suse.com/browse/PED-13716 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 2 20:30:03 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 02 Jan 2026 20:30:03 -0000 Subject: SUSE-SU-2026:0005-1: moderate: Security update for rsync Message-ID: <176738580329.2971.437717994535701773@smelt2.prg2.suse.org> # Security update for rsync Announcement ID: SUSE-SU-2026:0005-1 Release Date: 2026-01-02T12:30:51Z Rating: moderate References: * bsc#1254441 Cross-References: * CVE-2025-10158 CVSS scores: * CVE-2025-10158 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-10158 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for rsync fixes the following issues: * CVE-2025-10158: Fixed out of bounds array access via negative index (bsc#1254441) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-5=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * rsync-debugsource-3.1.3-3.34.1 * rsync-3.1.3-3.34.1 * rsync-debuginfo-3.1.3-3.34.1 ## References: * https://www.suse.com/security/cve/CVE-2025-10158.html * https://bugzilla.suse.com/show_bug.cgi?id=1254441 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 12:30:09 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 12:30:09 -0000 Subject: SUSE-RU-2026:0007-1: critical: suse-migration-sle15-activation, SLES12-SP4-SLES15-Migration, suse-migration-services Message-ID: <176761620954.22147.11684304897379992695@smelt2.prg2.suse.org> # suse-migration-sle15-activation, SLES12-SP4-SLES15-Migration, suse-migration- services Announcement ID: SUSE-RU-2026:0007-1 Release Date: 2026-01-05T07:20:20Z Rating: critical References: * bsc#1246513 * bsc#1248137 * bsc#1250003 * bsc#1250076 * bsc#1250078 * bsc#1253963 * jsc#PED-13640 Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that contains one feature and has six fixes can now be installed. ## Description: This update for suse-migration-sle15-activation, SLES12-SP4-SLES15-Migration, suse-migration-services fixes the following issues: Changes for suse-migration-sle15-activation: \- Refactor mount_system service \- Activation packages can no longer be noarch \- Setup ExclusiveArch for activation packages \- Make activation package require by provides tag \- Fix product related requirement settings \- Fix: set path according to current arch in grub.d/99_migration \- Support product specifier in ISO name \- Ensure migration to SLES16 uses selinux, not apparmor Changes for suse-migration-services: \- Fix mount_system unit \- Run ssh precheck only for SLE16 target \- Only generate wicked xml if service is the active network \- Fix unit link check and no use of path.join \- Fixed migration live image package requires \- Update setup_host_network service \- Fix backup processing \- Fix log handler setup \- Drop and backup /etc/sysconfig/network \- Skip migration if wicked is not the default network config service \- Add package_installed method \- Backup drop_path data \- Check if package exists prior drop \- Fixed use of suse version macros \- Drop README_QA.rst \- Update conditional requires per review \- Consolidate project documentation \- Fixed spec file regarding wicked2nm \- Fix update_version helper \- Fix mount_system \- Fix order of reboot service \- Improve dracut logging \- Drop wicked component after nm migration \- Move script package to the main migration provider \- Add DropComponents class \- Fixed spec file \- Create systemd.link files for biosdevname (bsc#1253963) \- Create lib file for common network-prereq tasks \- update PAM configurations to use pam_unix.so (jsc#PED-13640) \- Omit cio_ignore kernel commandline on zkvm (bsc#1250003) \- Refactor mount_system service \- Fix order of reboot service \- Add support for wicked2nm in container workflow \- Fix unit test for solver test case \- Fixes for btrfs_snapshot_pre_migration \- Set systemd offline for Zypper in chroot mode \- Fix apparmor install procedure \- Fixed azuremetadata device lookup \- Use of f-strings not allowed in the DMS (bsc#1248137) \- Simplify interface naming by disabling predictable names at boot \- Fixed test_check_lsm_migration unit test \- Fix setup_host_network_test by mocking os.makedirs \- wicked2nm: log network state on nm-online failure \- Fixed LSM pre checks to be more robust \- shellcheck heavily complained \- Do not evaluate wicked2nm output in precheck \- Fix unit test for lsm check \- prechecks/lsm.py: remove _apparmor_analyze_profiles() \- LSM migration check for AppArmor -> SELinux \- Improve pre-check message \- Fix MinSLEVersion value depending on target \- Reduce package set on migration image \- Fixed behavior of wicked2m pre check \- Implementation of sshd root login pre-check \- Fixed selinux to apparmor migration \- Fixed reading of migration config for target class \- Add recursion guard to MigrationConfig::_merge_config_dicts \- Shrink migration image \- container/sle16/config.sh \- sle16/config.sh - use dropin for s390 migration- config \- doc: fix indentation \- Check for migration target by matching ISO file name \- config: introduce dropin dir migration-config.d/ \- Apply SLE16 live image setup to container setup \- Bind mount only required subdirectories under /run into chroot \- Fix: Migration is done, but we get messages about core dumps (bsc#1250078) \- Add missing package requirement \- check migration target before testing for architecture version \- setup_host_network: simplify code - use os.makedirs() \- Create systemd.link files for virtual VMware/Hyper-V NICs (bsc#1250076) \- Preserve systemd.link files from /etc/systemd/network/ \- Add changes for newest wicked2nm \- Ensure wicked2nm is a dependency of pre-checks for SLE 16 migration \- Apply sysctl to migration system \- Implement x86_64 CPU architecture check as a pre-check \- Activation packages can no longer be noarch \- Fix update of image .changes files \- Architecture check before allowing migration to be activated \- Improve error logs when wicked2nm fails \- Include image changelog to version bump \- Ensure wicked2nm migration is always running, despite warnings \- Fix: add "\--no-recommends on patterns-base-selinux installation" \- Update suse-migration-services for container use \- Update README \- Update SLE16 migration container \- Update SAP live migration image \- Add missing pre snapshot setup to run_migration \- Follow up fix for the wicked to nm migration \- Add wicked2nm network migration \- Add glob support to preserve_files \- Setup ExclusiveArch for activation packages \- Build sles4sap migration for cloud on x86_64 only \- Do not build sles4sap migration on s390x \- Use systemctl kexec \- Fix: return the correct kernel path based on machine type \- Fixed glob pattern match for package name \- Remove mentioning of SLES 12-SP4 \- Make activation package require by provides tag \- Do not use list[str] type hint \- Fix error evaluation from offline_migrations API \- Fix logging from non unit files \- Fix product related requirement settings \- Repos for migration image must be in kiwi \- Added .ssh to migration user for SAP 15 live image \- Added SLES15-SAP_Migration Makefile target \- Fix typo in service name \- Drop obsolete check for resolv.conf \- Fix migration user home dir setup for SLE16 \- Update README_QA.rst \- test: split unit test for setup_name_resolver \- Install patterns-base-selinux for Apparmor migration \- Ensure the rebuild counter is not stripped from the rpm \- Exit silently if no migration iso is found \- Ensure rpmlintrc file is part of suse-migration- services SRPM \- Ignore fixup! entries when generating changelog \- Increase python test matrix \- Remove redundant requires on itself \- Fix ordering of pre-checks and actual migration \- Add SLES15-Migration target to Makefile \- Fix suse-migration-console-log service \- Fix typo in README_QA \- Fix: split name resolver setup into its own service \- Fix: Migration from 15SP7 to SLE 16: suse-migration-setup-host-network.service fails reporting "Could not find /system-root/etc/resolv.conf" (bsc#1246513) \- Fix: set path according to current arch in grub.d/99_migration \- Add support to enable single rpm transaction for upgrade \- Enable suse-migration-ha.service in the migration image \- Migration for high availability extension \- RPM wrapper fixes \- Cleanup specfile to follow python singlespec policy \- Support product specifier in ISO name \- Ensure sle16 images can build on all supported platforms \- Use name pattern compatible to suse-migration-rpm \- Fix SLE15 migration images \- SAP product should migrate to 15 SP4 \- Add SLES15-SAP-Migration \- Update bumpversion config \- Handle selinux boot option when using kexec \- Ensure migration to SLES16 uses selinux, not apparmor \- Improve os-release parsing \- Ensure SLES16 is also detected in SCC precheck \- Add high availability extension check \- Fix package names for python packages on SLE16 - Relax on the shim-install call \- Fixup package name for SLE16 and SLE16 container \- Fix changelog references for activation packages \- Fix and cleanup update_bootloader service \- Add product migration check Changes for SLES12-SP4-SLES15-SAP-Migration: \- Bump version: 2.1.29 \- SLES4SAP migration 15 in public cloud Changes for SLES12-SP4-SLES15-Migration: \- DMS update to v2.1.29 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2026-7=1 ## Package List: * Public Cloud Module 12 (noarch) * suse-migration-pre-checks-2.1.29-6.34.2 * python3-migration-2.1.29-6.34.2 * Public Cloud Module 12 (x86_64) * suse-migration-sle15-activation-2.1.29-6.54.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1246513 * https://bugzilla.suse.com/show_bug.cgi?id=1248137 * https://bugzilla.suse.com/show_bug.cgi?id=1250003 * https://bugzilla.suse.com/show_bug.cgi?id=1250076 * https://bugzilla.suse.com/show_bug.cgi?id=1250078 * https://bugzilla.suse.com/show_bug.cgi?id=1253963 * https://jira.suse.com/browse/PED-13640 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 12:30:11 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 12:30:11 -0000 Subject: SUSE-RU-2026:0006-1: moderate: Recommended update for php8 Message-ID: <176761621170.22147.14698466268163896858@smelt2.prg2.suse.org> # Recommended update for php8 Announcement ID: SUSE-RU-2026:0006-1 Release Date: 2026-01-05T07:19:45Z Rating: moderate References: * bsc#1255043 Affected Products: * openSUSE Leap 15.6 An update that has one fix can now be installed. ## Description: This update for php8 fixes the following issues: * main package require wwwrun:www user as it assumes it in filelist (bsc#1255043) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-6=1 SUSE-2026-6=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * php8-mbstring-8.2.29-150600.3.22.1 * php8-sysvsem-8.2.29-150600.3.22.1 * php8-debugsource-8.2.29-150600.3.22.1 * php8-fpm-debuginfo-8.2.29-150600.3.22.1 * php8-sysvshm-8.2.29-150600.3.22.1 * php8-gettext-8.2.29-150600.3.22.1 * php8-sockets-debuginfo-8.2.29-150600.3.22.1 * php8-soap-debuginfo-8.2.29-150600.3.22.1 * php8-xmlreader-debuginfo-8.2.29-150600.3.22.1 * php8-sodium-debuginfo-8.2.29-150600.3.22.1 * php8-zip-debuginfo-8.2.29-150600.3.22.1 * php8-ldap-8.2.29-150600.3.22.1 * php8-sqlite-8.2.29-150600.3.22.1 * php8-tidy-8.2.29-150600.3.22.1 * php8-soap-8.2.29-150600.3.22.1 * php8-odbc-8.2.29-150600.3.22.1 * php8-dba-8.2.29-150600.3.22.1 * php8-openssl-8.2.29-150600.3.22.1 * php8-bz2-8.2.29-150600.3.22.1 * php8-pdo-debuginfo-8.2.29-150600.3.22.1 * php8-mbstring-debuginfo-8.2.29-150600.3.22.1 * php8-embed-debuginfo-8.2.29-150600.3.22.1 * php8-sysvsem-debuginfo-8.2.29-150600.3.22.1 * php8-enchant-8.2.29-150600.3.22.1 * php8-debuginfo-8.2.29-150600.3.22.1 * php8-devel-8.2.29-150600.3.22.1 * php8-pgsql-8.2.29-150600.3.22.1 * php8-calendar-8.2.29-150600.3.22.1 * php8-iconv-8.2.29-150600.3.22.1 * php8-sysvmsg-debuginfo-8.2.29-150600.3.22.1 * php8-embed-8.2.29-150600.3.22.1 * php8-tidy-debuginfo-8.2.29-150600.3.22.1 * php8-readline-debuginfo-8.2.29-150600.3.22.1 * php8-snmp-8.2.29-150600.3.22.1 * php8-phar-debuginfo-8.2.29-150600.3.22.1 * php8-mysql-debuginfo-8.2.29-150600.3.22.1 * php8-fileinfo-debuginfo-8.2.29-150600.3.22.1 * php8-fpm-debugsource-8.2.29-150600.3.22.1 * php8-fpm-8.2.29-150600.3.22.1 * php8-tokenizer-8.2.29-150600.3.22.1 * php8-xmlwriter-debuginfo-8.2.29-150600.3.22.1 * php8-ftp-8.2.29-150600.3.22.1 * php8-ffi-8.2.29-150600.3.22.1 * apache2-mod_php8-8.2.29-150600.3.22.1 * php8-gettext-debuginfo-8.2.29-150600.3.22.1 * php8-enchant-debuginfo-8.2.29-150600.3.22.1 * php8-ffi-debuginfo-8.2.29-150600.3.22.1 * php8-intl-debuginfo-8.2.29-150600.3.22.1 * php8-gd-8.2.29-150600.3.22.1 * php8-zlib-debuginfo-8.2.29-150600.3.22.1 * php8-ctype-8.2.29-150600.3.22.1 * php8-fastcgi-debuginfo-8.2.29-150600.3.22.1 * php8-readline-8.2.29-150600.3.22.1 * php8-zlib-8.2.29-150600.3.22.1 * php8-intl-8.2.29-150600.3.22.1 * php8-xsl-debuginfo-8.2.29-150600.3.22.1 * php8-dom-debuginfo-8.2.29-150600.3.22.1 * php8-mysql-8.2.29-150600.3.22.1 * php8-cli-debuginfo-8.2.29-150600.3.22.1 * php8-pcntl-debuginfo-8.2.29-150600.3.22.1 * php8-8.2.29-150600.3.22.1 * php8-ftp-debuginfo-8.2.29-150600.3.22.1 * php8-shmop-debuginfo-8.2.29-150600.3.22.1 * apache2-mod_php8-debugsource-8.2.29-150600.3.22.1 * php8-ctype-debuginfo-8.2.29-150600.3.22.1 * php8-opcache-8.2.29-150600.3.22.1 * php8-exif-8.2.29-150600.3.22.1 * php8-dom-8.2.29-150600.3.22.1 * php8-bz2-debuginfo-8.2.29-150600.3.22.1 * php8-test-8.2.29-150600.3.22.1 * php8-openssl-debuginfo-8.2.29-150600.3.22.1 * php8-gmp-8.2.29-150600.3.22.1 * php8-tokenizer-debuginfo-8.2.29-150600.3.22.1 * php8-phar-8.2.29-150600.3.22.1 * php8-curl-debuginfo-8.2.29-150600.3.22.1 * php8-gd-debuginfo-8.2.29-150600.3.22.1 * php8-fastcgi-debugsource-8.2.29-150600.3.22.1 * php8-sqlite-debuginfo-8.2.29-150600.3.22.1 * apache2-mod_php8-debuginfo-8.2.29-150600.3.22.1 * php8-posix-debuginfo-8.2.29-150600.3.22.1 * php8-snmp-debuginfo-8.2.29-150600.3.22.1 * php8-pgsql-debuginfo-8.2.29-150600.3.22.1 * php8-embed-debugsource-8.2.29-150600.3.22.1 * php8-bcmath-8.2.29-150600.3.22.1 * php8-dba-debuginfo-8.2.29-150600.3.22.1 * php8-calendar-debuginfo-8.2.29-150600.3.22.1 * php8-fileinfo-8.2.29-150600.3.22.1 * php8-odbc-debuginfo-8.2.29-150600.3.22.1 * php8-xsl-8.2.29-150600.3.22.1 * php8-zip-8.2.29-150600.3.22.1 * php8-xmlwriter-8.2.29-150600.3.22.1 * php8-exif-debuginfo-8.2.29-150600.3.22.1 * php8-shmop-8.2.29-150600.3.22.1 * php8-sodium-8.2.29-150600.3.22.1 * php8-sysvmsg-8.2.29-150600.3.22.1 * php8-curl-8.2.29-150600.3.22.1 * php8-fastcgi-8.2.29-150600.3.22.1 * php8-bcmath-debuginfo-8.2.29-150600.3.22.1 * php8-iconv-debuginfo-8.2.29-150600.3.22.1 * php8-pdo-8.2.29-150600.3.22.1 * php8-gmp-debuginfo-8.2.29-150600.3.22.1 * php8-ldap-debuginfo-8.2.29-150600.3.22.1 * php8-opcache-debuginfo-8.2.29-150600.3.22.1 * php8-cli-8.2.29-150600.3.22.1 * php8-xmlreader-8.2.29-150600.3.22.1 * php8-sockets-8.2.29-150600.3.22.1 * php8-posix-8.2.29-150600.3.22.1 * php8-sysvshm-debuginfo-8.2.29-150600.3.22.1 * php8-pcntl-8.2.29-150600.3.22.1 * openSUSE Leap 15.6 (noarch) * php8-fpm-apache-8.2.29-150600.3.22.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1255043 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 16:30:07 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 16:30:07 -0000 Subject: SUSE-SU-2026:0022-1: important: Security update for qemu Message-ID: <176763060744.22147.5567911697803150244@smelt2.prg2.suse.org> # Security update for qemu Announcement ID: SUSE-SU-2026:0022-1 Release Date: 2026-01-05T11:19:59Z Rating: important References: * bsc#1250984 * bsc#1252768 * bsc#1253002 * bsc#1254286 Cross-References: * CVE-2025-11234 * CVE-2025-12464 CVSS scores: * CVE-2025-11234 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-11234 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11234 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-12464 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-12464 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-12464 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities and has two security fixes can now be installed. ## Description: This update for qemu fixes the following issues: Security issues fixed: * CVE-2025-12464: stack-based buffer overflow in the e1000 network device operations can be exploited by a malicious guest user to crash the QEMU process on the host (bsc#1253002). * CVE-2025-11234: use-after-free in WebSocket handshake operations can be exploited by a malicious client with network access to the VNC WebSocket port to cause a denial-of-service (bsc#1250984). Other updates and bugfixes: * [openSUSE][RPM]: really fix *-virtio-gpu-pci dependency on ARM (bsc#1254286). * block/curl: fix curl internal handles handling (bsc#1252768). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-22=1 openSUSE-SLE-15.6-2026-22=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-22=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-22=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * qemu-x86-8.2.10-150600.3.43.1 * qemu-vhost-user-gpu-debuginfo-8.2.10-150600.3.43.1 * qemu-audio-pa-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-s390x-virtio-gpu-ccw-8.2.10-150600.3.43.1 * qemu-block-iscsi-debuginfo-8.2.10-150600.3.43.1 * qemu-accel-qtest-8.2.10-150600.3.43.1 * qemu-audio-spice-8.2.10-150600.3.43.1 * qemu-hw-usb-smartcard-8.2.10-150600.3.43.1 * qemu-ui-spice-app-debuginfo-8.2.10-150600.3.43.1 * qemu-ui-dbus-debuginfo-8.2.10-150600.3.43.1 * qemu-audio-spice-debuginfo-8.2.10-150600.3.43.1 * qemu-tools-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-usb-redirect-8.2.10-150600.3.43.1 * qemu-linux-user-8.2.10-150600.3.43.1 * qemu-block-ssh-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-display-virtio-gpu-8.2.10-150600.3.43.1 * qemu-ui-gtk-8.2.10-150600.3.43.1 * qemu-audio-alsa-8.2.10-150600.3.43.1 * qemu-hw-usb-redirect-debuginfo-8.2.10-150600.3.43.1 * qemu-audio-pa-8.2.10-150600.3.43.1 * qemu-guest-agent-debuginfo-8.2.10-150600.3.43.1 * qemu-block-nfs-debuginfo-8.2.10-150600.3.43.1 * qemu-block-dmg-8.2.10-150600.3.43.1 * qemu-chardev-spice-8.2.10-150600.3.43.1 * qemu-spice-8.2.10-150600.3.43.1 * qemu-hw-usb-smartcard-debuginfo-8.2.10-150600.3.43.1 * qemu-ui-curses-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-display-qxl-8.2.10-150600.3.43.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-8.2.10-150600.3.43.1 * qemu-x86-debuginfo-8.2.10-150600.3.43.1 * qemu-chardev-spice-debuginfo-8.2.10-150600.3.43.1 * qemu-ui-opengl-8.2.10-150600.3.43.1 * qemu-ui-spice-core-8.2.10-150600.3.43.1 * qemu-block-dmg-debuginfo-8.2.10-150600.3.43.1 * qemu-ppc-8.2.10-150600.3.43.1 * qemu-ivshmem-tools-debuginfo-8.2.10-150600.3.43.1 * qemu-img-8.2.10-150600.3.43.1 * qemu-accel-tcg-x86-8.2.10-150600.3.43.1 * qemu-ui-dbus-8.2.10-150600.3.43.1 * qemu-audio-pipewire-8.2.10-150600.3.43.1 * qemu-audio-dbus-8.2.10-150600.3.43.1 * qemu-ksm-8.2.10-150600.3.43.1 * qemu-accel-qtest-debuginfo-8.2.10-150600.3.43.1 * qemu-audio-jack-8.2.10-150600.3.43.1 * qemu-tools-8.2.10-150600.3.43.1 * qemu-audio-dbus-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-s390x-virtio-gpu-ccw-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-display-qxl-debuginfo-8.2.10-150600.3.43.1 * qemu-ivshmem-tools-8.2.10-150600.3.43.1 * qemu-block-iscsi-8.2.10-150600.3.43.1 * qemu-pr-helper-8.2.10-150600.3.43.1 * qemu-arm-debuginfo-8.2.10-150600.3.43.1 * qemu-chardev-baum-8.2.10-150600.3.43.1 * qemu-hw-display-virtio-vga-debuginfo-8.2.10-150600.3.43.1 * qemu-pr-helper-debuginfo-8.2.10-150600.3.43.1 * qemu-extra-8.2.10-150600.3.43.1 * qemu-audio-alsa-debuginfo-8.2.10-150600.3.43.1 * qemu-debugsource-8.2.10-150600.3.43.1 * qemu-audio-pipewire-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-usb-host-8.2.10-150600.3.43.1 * qemu-arm-8.2.10-150600.3.43.1 * qemu-headless-8.2.10-150600.3.43.1 * qemu-block-gluster-8.2.10-150600.3.43.1 * qemu-block-nfs-8.2.10-150600.3.43.1 * qemu-audio-jack-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-display-virtio-gpu-debuginfo-8.2.10-150600.3.43.1 * qemu-block-curl-debuginfo-8.2.10-150600.3.43.1 * qemu-ui-opengl-debuginfo-8.2.10-150600.3.43.1 * qemu-extra-debuginfo-8.2.10-150600.3.43.1 * qemu-vhost-user-gpu-8.2.10-150600.3.43.1 * qemu-ui-spice-core-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-display-virtio-vga-8.2.10-150600.3.43.1 * qemu-s390x-8.2.10-150600.3.43.1 * qemu-8.2.10-150600.3.43.1 * qemu-ppc-debuginfo-8.2.10-150600.3.43.1 * qemu-linux-user-debugsource-8.2.10-150600.3.43.1 * qemu-chardev-baum-debuginfo-8.2.10-150600.3.43.1 * qemu-block-ssh-8.2.10-150600.3.43.1 * qemu-hw-display-virtio-gpu-pci-8.2.10-150600.3.43.1 * qemu-ui-spice-app-8.2.10-150600.3.43.1 * qemu-audio-oss-8.2.10-150600.3.43.1 * qemu-guest-agent-8.2.10-150600.3.43.1 * qemu-ui-gtk-debuginfo-8.2.10-150600.3.43.1 * qemu-block-gluster-debuginfo-8.2.10-150600.3.43.1 * qemu-linux-user-debuginfo-8.2.10-150600.3.43.1 * qemu-s390x-debuginfo-8.2.10-150600.3.43.1 * qemu-accel-tcg-x86-debuginfo-8.2.10-150600.3.43.1 * qemu-ui-curses-8.2.10-150600.3.43.1 * qemu-block-curl-8.2.10-150600.3.43.1 * qemu-debuginfo-8.2.10-150600.3.43.1 * qemu-img-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-usb-host-debuginfo-8.2.10-150600.3.43.1 * qemu-audio-oss-debuginfo-8.2.10-150600.3.43.1 * openSUSE Leap 15.6 (noarch) * qemu-skiboot-8.2.10-150600.3.43.1 * qemu-doc-8.2.10-150600.3.43.1 * qemu-ipxe-8.2.10-150600.3.43.1 * qemu-seabios-8.2.101.16.3_3_ga95067eb-150600.3.43.1 * qemu-lang-8.2.10-150600.3.43.1 * qemu-microvm-8.2.10-150600.3.43.1 * qemu-vgabios-8.2.101.16.3_3_ga95067eb-150600.3.43.1 * qemu-SLOF-8.2.10-150600.3.43.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * qemu-block-rbd-8.2.10-150600.3.43.1 * qemu-block-rbd-debuginfo-8.2.10-150600.3.43.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * qemu-8.2.10-150600.3.43.1 * qemu-chardev-baum-8.2.10-150600.3.43.1 * qemu-hw-display-virtio-vga-debuginfo-8.2.10-150600.3.43.1 * qemu-block-iscsi-debuginfo-8.2.10-150600.3.43.1 * qemu-pr-helper-8.2.10-150600.3.43.1 * qemu-spice-8.2.10-150600.3.43.1 * qemu-chardev-baum-debuginfo-8.2.10-150600.3.43.1 * qemu-pr-helper-debuginfo-8.2.10-150600.3.43.1 * qemu-audio-spice-8.2.10-150600.3.43.1 * qemu-block-rbd-8.2.10-150600.3.43.1 * qemu-debugsource-8.2.10-150600.3.43.1 * qemu-ui-dbus-debuginfo-8.2.10-150600.3.43.1 * qemu-audio-spice-debuginfo-8.2.10-150600.3.43.1 * qemu-audio-pipewire-debuginfo-8.2.10-150600.3.43.1 * qemu-tools-debuginfo-8.2.10-150600.3.43.1 * qemu-chardev-spice-debuginfo-8.2.10-150600.3.43.1 * qemu-ui-opengl-8.2.10-150600.3.43.1 * qemu-ui-spice-core-8.2.10-150600.3.43.1 * qemu-block-ssh-8.2.10-150600.3.43.1 * qemu-hw-usb-host-8.2.10-150600.3.43.1 * qemu-headless-8.2.10-150600.3.43.1 * qemu-guest-agent-8.2.10-150600.3.43.1 * qemu-block-nfs-8.2.10-150600.3.43.1 * qemu-hw-usb-redirect-8.2.10-150600.3.43.1 * qemu-img-8.2.10-150600.3.43.1 * qemu-block-ssh-debuginfo-8.2.10-150600.3.43.1 * qemu-ui-dbus-8.2.10-150600.3.43.1 * qemu-audio-pipewire-8.2.10-150600.3.43.1 * qemu-audio-dbus-8.2.10-150600.3.43.1 * qemu-block-curl-debuginfo-8.2.10-150600.3.43.1 * qemu-ksm-8.2.10-150600.3.43.1 * qemu-hw-usb-redirect-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-usb-host-debuginfo-8.2.10-150600.3.43.1 * qemu-ui-opengl-debuginfo-8.2.10-150600.3.43.1 * qemu-guest-agent-debuginfo-8.2.10-150600.3.43.1 * qemu-tools-8.2.10-150600.3.43.1 * qemu-ui-curses-8.2.10-150600.3.43.1 * qemu-block-rbd-debuginfo-8.2.10-150600.3.43.1 * qemu-ui-curses-debuginfo-8.2.10-150600.3.43.1 * qemu-block-nfs-debuginfo-8.2.10-150600.3.43.1 * qemu-audio-dbus-debuginfo-8.2.10-150600.3.43.1 * qemu-block-curl-8.2.10-150600.3.43.1 * qemu-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-display-virtio-vga-8.2.10-150600.3.43.1 * qemu-chardev-spice-8.2.10-150600.3.43.1 * qemu-img-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-display-qxl-debuginfo-8.2.10-150600.3.43.1 * qemu-block-iscsi-8.2.10-150600.3.43.1 * qemu-ui-spice-core-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-display-qxl-8.2.10-150600.3.43.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64) * qemu-arm-debuginfo-8.2.10-150600.3.43.1 * qemu-arm-8.2.10-150600.3.43.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * qemu-skiboot-8.2.10-150600.3.43.1 * qemu-ipxe-8.2.10-150600.3.43.1 * qemu-seabios-8.2.101.16.3_3_ga95067eb-150600.3.43.1 * qemu-lang-8.2.10-150600.3.43.1 * qemu-vgabios-8.2.101.16.3_3_ga95067eb-150600.3.43.1 * qemu-SLOF-8.2.10-150600.3.43.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le x86_64) * qemu-ui-spice-app-8.2.10-150600.3.43.1 * qemu-ui-spice-app-debuginfo-8.2.10-150600.3.43.1 * qemu-ui-gtk-8.2.10-150600.3.43.1 * qemu-ui-gtk-debuginfo-8.2.10-150600.3.43.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (ppc64le) * qemu-ppc-debuginfo-8.2.10-150600.3.43.1 * qemu-ppc-8.2.10-150600.3.43.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (s390x x86_64) * qemu-hw-display-virtio-gpu-8.2.10-150600.3.43.1 * qemu-hw-display-virtio-gpu-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-display-virtio-gpu-pci-8.2.10-150600.3.43.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (s390x) * qemu-hw-s390x-virtio-gpu-ccw-debuginfo-8.2.10-150600.3.43.1 * qemu-s390x-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-s390x-virtio-gpu-ccw-8.2.10-150600.3.43.1 * qemu-s390x-8.2.10-150600.3.43.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (x86_64) * qemu-x86-8.2.10-150600.3.43.1 * qemu-audio-pa-debuginfo-8.2.10-150600.3.43.1 * qemu-accel-tcg-x86-8.2.10-150600.3.43.1 * qemu-accel-tcg-x86-debuginfo-8.2.10-150600.3.43.1 * qemu-audio-alsa-8.2.10-150600.3.43.1 * qemu-audio-alsa-debuginfo-8.2.10-150600.3.43.1 * qemu-x86-debuginfo-8.2.10-150600.3.43.1 * qemu-audio-pa-8.2.10-150600.3.43.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * qemu-8.2.10-150600.3.43.1 * qemu-chardev-baum-8.2.10-150600.3.43.1 * qemu-hw-display-virtio-vga-debuginfo-8.2.10-150600.3.43.1 * qemu-block-iscsi-debuginfo-8.2.10-150600.3.43.1 * qemu-pr-helper-8.2.10-150600.3.43.1 * qemu-spice-8.2.10-150600.3.43.1 * qemu-chardev-baum-debuginfo-8.2.10-150600.3.43.1 * qemu-pr-helper-debuginfo-8.2.10-150600.3.43.1 * qemu-audio-spice-8.2.10-150600.3.43.1 * qemu-ui-spice-app-debuginfo-8.2.10-150600.3.43.1 * qemu-block-rbd-8.2.10-150600.3.43.1 * qemu-debugsource-8.2.10-150600.3.43.1 * qemu-ui-dbus-debuginfo-8.2.10-150600.3.43.1 * qemu-audio-spice-debuginfo-8.2.10-150600.3.43.1 * qemu-audio-pipewire-debuginfo-8.2.10-150600.3.43.1 * qemu-tools-debuginfo-8.2.10-150600.3.43.1 * qemu-chardev-spice-debuginfo-8.2.10-150600.3.43.1 * qemu-ui-opengl-8.2.10-150600.3.43.1 * qemu-ui-spice-core-8.2.10-150600.3.43.1 * qemu-block-ssh-8.2.10-150600.3.43.1 * qemu-hw-usb-host-8.2.10-150600.3.43.1 * qemu-ui-spice-app-8.2.10-150600.3.43.1 * qemu-headless-8.2.10-150600.3.43.1 * qemu-guest-agent-8.2.10-150600.3.43.1 * qemu-ui-gtk-debuginfo-8.2.10-150600.3.43.1 * qemu-block-nfs-8.2.10-150600.3.43.1 * qemu-hw-usb-redirect-8.2.10-150600.3.43.1 * qemu-img-8.2.10-150600.3.43.1 * qemu-block-ssh-debuginfo-8.2.10-150600.3.43.1 * qemu-ui-gtk-8.2.10-150600.3.43.1 * qemu-ui-dbus-8.2.10-150600.3.43.1 * qemu-audio-pipewire-8.2.10-150600.3.43.1 * qemu-audio-dbus-8.2.10-150600.3.43.1 * qemu-block-curl-debuginfo-8.2.10-150600.3.43.1 * qemu-ksm-8.2.10-150600.3.43.1 * qemu-hw-usb-redirect-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-usb-host-debuginfo-8.2.10-150600.3.43.1 * qemu-ui-opengl-debuginfo-8.2.10-150600.3.43.1 * qemu-guest-agent-debuginfo-8.2.10-150600.3.43.1 * qemu-tools-8.2.10-150600.3.43.1 * qemu-ui-curses-8.2.10-150600.3.43.1 * qemu-block-rbd-debuginfo-8.2.10-150600.3.43.1 * qemu-ui-curses-debuginfo-8.2.10-150600.3.43.1 * qemu-block-nfs-debuginfo-8.2.10-150600.3.43.1 * qemu-audio-dbus-debuginfo-8.2.10-150600.3.43.1 * qemu-block-curl-8.2.10-150600.3.43.1 * qemu-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-display-virtio-vga-8.2.10-150600.3.43.1 * qemu-chardev-spice-8.2.10-150600.3.43.1 * qemu-img-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-display-qxl-debuginfo-8.2.10-150600.3.43.1 * qemu-block-iscsi-8.2.10-150600.3.43.1 * qemu-ui-spice-core-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-display-qxl-8.2.10-150600.3.43.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * qemu-skiboot-8.2.10-150600.3.43.1 * qemu-ipxe-8.2.10-150600.3.43.1 * qemu-seabios-8.2.101.16.3_3_ga95067eb-150600.3.43.1 * qemu-lang-8.2.10-150600.3.43.1 * qemu-vgabios-8.2.101.16.3_3_ga95067eb-150600.3.43.1 * qemu-SLOF-8.2.10-150600.3.43.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le) * qemu-ppc-debuginfo-8.2.10-150600.3.43.1 * qemu-ppc-8.2.10-150600.3.43.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64) * qemu-x86-8.2.10-150600.3.43.1 * qemu-audio-pa-debuginfo-8.2.10-150600.3.43.1 * qemu-hw-display-virtio-gpu-8.2.10-150600.3.43.1 * qemu-hw-display-virtio-gpu-debuginfo-8.2.10-150600.3.43.1 * qemu-accel-tcg-x86-8.2.10-150600.3.43.1 * qemu-accel-tcg-x86-debuginfo-8.2.10-150600.3.43.1 * qemu-audio-alsa-8.2.10-150600.3.43.1 * qemu-hw-display-virtio-gpu-pci-8.2.10-150600.3.43.1 * qemu-audio-alsa-debuginfo-8.2.10-150600.3.43.1 * qemu-x86-debuginfo-8.2.10-150600.3.43.1 * qemu-audio-pa-8.2.10-150600.3.43.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-8.2.10-150600.3.43.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11234.html * https://www.suse.com/security/cve/CVE-2025-12464.html * https://bugzilla.suse.com/show_bug.cgi?id=1250984 * https://bugzilla.suse.com/show_bug.cgi?id=1252768 * https://bugzilla.suse.com/show_bug.cgi?id=1253002 * https://bugzilla.suse.com/show_bug.cgi?id=1254286 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 16:30:26 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 16:30:26 -0000 Subject: SUSE-SU-2026:0021-1: important: Security update for webkit2gtk3 Message-ID: <176763062693.22147.5120018920456972256@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2026:0021-1 Release Date: 2026-01-05T11:16:02Z Rating: important References: * bsc#1254164 * bsc#1254165 * bsc#1254166 * bsc#1254167 * bsc#1254168 * bsc#1254169 * bsc#1254170 * bsc#1254171 * bsc#1254172 * bsc#1254174 * bsc#1254175 * bsc#1254176 * bsc#1254177 * bsc#1254179 * bsc#1254208 * bsc#1254473 * bsc#1254498 * bsc#1254509 * bsc#1255183 * bsc#1255191 * bsc#1255194 * bsc#1255195 * bsc#1255198 * bsc#1255200 * bsc#1255497 Cross-References: * CVE-2023-43000 * CVE-2025-13502 * CVE-2025-13947 * CVE-2025-14174 * CVE-2025-43392 * CVE-2025-43419 * CVE-2025-43421 * CVE-2025-43425 * CVE-2025-43427 * CVE-2025-43429 * CVE-2025-43430 * CVE-2025-43431 * CVE-2025-43432 * CVE-2025-43434 * CVE-2025-43440 * CVE-2025-43443 * CVE-2025-43458 * CVE-2025-43480 * CVE-2025-43501 * CVE-2025-43529 * CVE-2025-43531 * CVE-2025-43535 * CVE-2025-43536 * CVE-2025-43541 * CVE-2025-66287 CVSS scores: * CVE-2023-43000 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-43000 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-43000 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-13502 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-13502 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-13502 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-13947 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N * CVE-2025-13947 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N * CVE-2025-14174 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14174 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14174 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-43392 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-43392 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-43392 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2025-43419 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-43419 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-43419 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-43421 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43421 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43421 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43425 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43425 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43425 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43427 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43427 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43427 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43429 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-43429 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43429 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43430 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-43430 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43430 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43431 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L * CVE-2025-43431 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-43432 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-43432 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43432 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43434 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-43434 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43434 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43440 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43440 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43440 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43443 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-43443 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43443 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43458 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-43458 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43458 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43480 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-43480 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-43480 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-43501 ( SUSE ): 6.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43501 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43501 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43529 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-43529 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-43529 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-43531 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43531 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43531 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43535 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43535 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43535 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43536 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43536 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43536 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43541 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43541 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43541 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-66287 ( SUSE ): 7.5 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-66287 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-66287 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * Desktop Applications Module 15-SP6 * Desktop Applications Module 15-SP7 * Development Tools Module 15-SP6 * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves 25 vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: Update to version 2.50.4. Security issues fixed: * CVE-2025-13502: processing of maliciously crafted payloads by the GLib remote inspector server may lead to a UIProcess crash due to an out-of- bounds read and an integer underflow (bsc#1254208). * CVE-2025-13947: use of the file drag-and-drop mechanism may lead to remote information disclosure due to a lack of verification of the origins of drag operations (bsc#1254473). * CVE-2025-14174: processing maliciously crafted web content may lead to memory corruption due to improper validation (bsc#1255497). * CVE-2025-43392: websites may exfiltrate image data cross-origin due to issues with cache handling (bsc#1254165). * CVE-2025-43421: processing maliciously crafted web content may lead to an unexpected process crash due to enabled array allocation sinking (bsc#1254167). * CVE-2025-43425: processing maliciously crafted web content may lead to an unexpected process crash due to improper memory handling (bsc#1254168). * CVE-2025-43427: processing maliciously crafted web content may lead to an unexpected process crash due to issues with state management (bsc#1254169). * CVE-2025-43429: processing maliciously crafted web content may lead to an unexpected process crash due to a buffer overflow issue (bsc#1254174). * CVE-2025-43430: processing maliciously crafted web content may lead to an unexpected process crash due to issues with state management (bsc#1254172). * CVE-2025-43431: processing maliciously crafted web content may lead to memory corruption due to improper memory handling (bsc#1254170). * CVE-2025-43432: processing maliciously crafted web content may lead to an unexpected process crash due to a use-after-free issue (bsc#1254171). * CVE-2025-43434: processing maliciously crafted web content may lead to an unexpected process crash due to a use-after-free issue (bsc#1254179). * CVE-2025-43440: processing maliciously crafted web content may lead to an unexpected process crash due to missing checks (bsc#1254177). * CVE-2025-43443: processing maliciously crafted web content may lead to an unexpected process crash due to missing checks (bsc#1254176). * CVE-2025-43458: processing maliciously crafted web content may lead to an unexpected process crash due to issues with state management (bsc#1254498). * CVE-2025-43501: processing maliciously crafted web content may lead to an unexpected process crash due to a buffer overflow issue (bsc#1255194). * CVE-2025-43529: processing maliciously crafted web content may lead to arbitrary code execution due to a use-after-free issue (bsc#1255198). * CVE-2025-43531: processing maliciously crafted web content may lead to an unexpected process crash due to a race condition (bsc#1255183). * CVE-2025-43535: processing maliciously crafted web content may lead to an unexpected process crash due to improper memory handling (bsc#1255195). * CVE-2025-43536: processing maliciously crafted web content may lead to an unexpected process crash due to a use-after-free issue (bsc#1255200). * CVE-2025-43541: processing maliciously crafted web content may lead to an unexpected process crash due to type confusion (bsc#1255191). * CVE-2025-66287: processing maliciously crafted web content may lead to an unexpected process crash due to improper memory handling (bsc#1254509). Other issues fixed and changes: * Version 2.50.4: * Correctly handle the program name passed to the sleep disabler. * Ensure GStreamer is initialized before using the Quirks. * Fix several crashes and rendering issues. * Version 2.50.3: * Fix seeking and looping of media elements that set the "loop" property. * Fix several crashes and rendering issues. * Version 2.50.2: * Prevent unsafe URI schemes from participating in media playback. * Make jsc_value_array_buffer_get_data() function introspectable. * Fix logging in to Google accounts that have a WebAuthn second factor configured. * Fix loading webkit://gpu when there are no threads configured for GPU rendering. * Fix rendering gradiants that use the CSS hue interpolation method. * Fix pasting image data from the clipboard. * Fix font-family selection when the font name contains spaces. * Fix the build with standard C libraries that lack execinfo.h, like Musl or uClibc. * Fix capturing canvas snapshots in the Web Inspector. * Fix several crashes and rendering issues. * Fix a11y regression where AT-SPI roles were mapped incorrectly. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-21=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-21=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-21=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-21=1 openSUSE-SLE-15.6-2026-21=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2026-21=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-21=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2026-21=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-21=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2026-21=1 ## Package List: * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * webkit2gtk4-debugsource-2.50.4-150600.12.54.1 * typelib-1_0-JavaScriptCore-6_0-2.50.4-150600.12.54.1 * typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-150600.12.54.1 * typelib-1_0-WebKit-6_0-2.50.4-150600.12.54.1 * webkit2gtk4-devel-2.50.4-150600.12.54.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * WebKitGTK-4.0-lang-2.50.4-150600.12.54.1 * WebKitGTK-6.0-lang-2.50.4-150600.12.54.1 * WebKitGTK-4.1-lang-2.50.4-150600.12.54.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * libwebkit2gtk-4_1-0-debuginfo-2.50.4-150600.12.54.1 * libwebkit2gtk-4_0-37-debuginfo-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.50.4-150600.12.54.1 * webkit2gtk-4_0-injected-bundles-2.50.4-150600.12.54.1 * webkit2gtk-4_1-injected-bundles-2.50.4-150600.12.54.1 * webkit2gtk3-soup2-debugsource-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_1-0-2.50.4-150600.12.54.1 * webkit2gtk4-debugsource-2.50.4-150600.12.54.1 * typelib-1_0-JavaScriptCore-6_0-2.50.4-150600.12.54.1 * libwebkit2gtk-4_0-37-2.50.4-150600.12.54.1 * webkit2gtk3-devel-2.50.4-150600.12.54.1 * typelib-1_0-JavaScriptCore-4_1-2.50.4-150600.12.54.1 * libwebkitgtk-6_0-4-2.50.4-150600.12.54.1 * libwebkit2gtk-4_1-0-2.50.4-150600.12.54.1 * typelib-1_0-WebKit2-4_0-2.50.4-150600.12.54.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.50.4-150600.12.54.1 * libwebkitgtk-6_0-4-debuginfo-2.50.4-150600.12.54.1 * webkit2gtk4-devel-2.50.4-150600.12.54.1 * typelib-1_0-JavaScriptCore-4_0-2.50.4-150600.12.54.1 * webkit2gtk3-debugsource-2.50.4-150600.12.54.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.50.4-150600.12.54.1 * webkit2gtk3-soup2-devel-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_0-18-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_1-0-debuginfo-2.50.4-150600.12.54.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.50.4-150600.12.54.1 * typelib-1_0-WebKit-6_0-2.50.4-150600.12.54.1 * typelib-1_0-WebKit2WebExtension-4_1-2.50.4-150600.12.54.1 * webkitgtk-6_0-injected-bundles-2.50.4-150600.12.54.1 * typelib-1_0-WebKit2WebExtension-4_0-2.50.4-150600.12.54.1 * webkitgtk-6_0-injected-bundles-debuginfo-2.50.4-150600.12.54.1 * libjavascriptcoregtk-6_0-1-2.50.4-150600.12.54.1 * typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-150600.12.54.1 * typelib-1_0-WebKit2-4_1-2.50.4-150600.12.54.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * WebKitGTK-4.0-lang-2.50.4-150600.12.54.1 * WebKitGTK-6.0-lang-2.50.4-150600.12.54.1 * WebKitGTK-4.1-lang-2.50.4-150600.12.54.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * libwebkit2gtk-4_1-0-debuginfo-2.50.4-150600.12.54.1 * libwebkit2gtk-4_0-37-debuginfo-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.50.4-150600.12.54.1 * webkit2gtk-4_0-injected-bundles-2.50.4-150600.12.54.1 * webkit2gtk-4_1-injected-bundles-2.50.4-150600.12.54.1 * webkit2gtk3-soup2-debugsource-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_1-0-2.50.4-150600.12.54.1 * webkit2gtk4-debugsource-2.50.4-150600.12.54.1 * typelib-1_0-JavaScriptCore-6_0-2.50.4-150600.12.54.1 * libwebkit2gtk-4_0-37-2.50.4-150600.12.54.1 * webkit2gtk3-devel-2.50.4-150600.12.54.1 * typelib-1_0-JavaScriptCore-4_1-2.50.4-150600.12.54.1 * libwebkitgtk-6_0-4-2.50.4-150600.12.54.1 * libwebkit2gtk-4_1-0-2.50.4-150600.12.54.1 * typelib-1_0-WebKit2-4_0-2.50.4-150600.12.54.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.50.4-150600.12.54.1 * libwebkitgtk-6_0-4-debuginfo-2.50.4-150600.12.54.1 * webkit2gtk4-devel-2.50.4-150600.12.54.1 * typelib-1_0-JavaScriptCore-4_0-2.50.4-150600.12.54.1 * webkit2gtk3-debugsource-2.50.4-150600.12.54.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.50.4-150600.12.54.1 * webkit2gtk3-soup2-devel-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_0-18-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_1-0-debuginfo-2.50.4-150600.12.54.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.50.4-150600.12.54.1 * typelib-1_0-WebKit-6_0-2.50.4-150600.12.54.1 * typelib-1_0-WebKit2WebExtension-4_1-2.50.4-150600.12.54.1 * webkitgtk-6_0-injected-bundles-2.50.4-150600.12.54.1 * typelib-1_0-WebKit2WebExtension-4_0-2.50.4-150600.12.54.1 * webkitgtk-6_0-injected-bundles-debuginfo-2.50.4-150600.12.54.1 * libjavascriptcoregtk-6_0-1-2.50.4-150600.12.54.1 * typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-150600.12.54.1 * typelib-1_0-WebKit2-4_1-2.50.4-150600.12.54.1 * openSUSE Leap 15.6 (noarch) * WebKitGTK-4.0-lang-2.50.4-150600.12.54.1 * WebKitGTK-6.0-lang-2.50.4-150600.12.54.1 * WebKitGTK-4.1-lang-2.50.4-150600.12.54.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libwebkit2gtk-4_1-0-debuginfo-2.50.4-150600.12.54.1 * libwebkit2gtk-4_0-37-debuginfo-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.50.4-150600.12.54.1 * webkit2gtk-4_1-injected-bundles-2.50.4-150600.12.54.1 * webkit2gtk-4_0-injected-bundles-2.50.4-150600.12.54.1 * webkit2gtk3-soup2-debugsource-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_1-0-2.50.4-150600.12.54.1 * webkit2gtk4-debugsource-2.50.4-150600.12.54.1 * typelib-1_0-JavaScriptCore-6_0-2.50.4-150600.12.54.1 * libwebkit2gtk-4_0-37-2.50.4-150600.12.54.1 * webkit2gtk3-devel-2.50.4-150600.12.54.1 * typelib-1_0-JavaScriptCore-4_1-2.50.4-150600.12.54.1 * webkit2gtk3-soup2-minibrowser-2.50.4-150600.12.54.1 * libwebkitgtk-6_0-4-2.50.4-150600.12.54.1 * libwebkit2gtk-4_1-0-2.50.4-150600.12.54.1 * webkit-jsc-6.0-2.50.4-150600.12.54.1 * webkit2gtk3-minibrowser-debuginfo-2.50.4-150600.12.54.1 * typelib-1_0-WebKit2-4_0-2.50.4-150600.12.54.1 * webkit2gtk4-minibrowser-2.50.4-150600.12.54.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.50.4-150600.12.54.1 * libwebkitgtk-6_0-4-debuginfo-2.50.4-150600.12.54.1 * webkit-jsc-4.1-debuginfo-2.50.4-150600.12.54.1 * webkit-jsc-4.1-2.50.4-150600.12.54.1 * webkit2gtk4-devel-2.50.4-150600.12.54.1 * webkit-jsc-4-debuginfo-2.50.4-150600.12.54.1 * typelib-1_0-JavaScriptCore-4_0-2.50.4-150600.12.54.1 * webkit2gtk3-debugsource-2.50.4-150600.12.54.1 * webkit-jsc-4-2.50.4-150600.12.54.1 * webkit-jsc-6.0-debuginfo-2.50.4-150600.12.54.1 * webkit2gtk3-soup2-minibrowser-debuginfo-2.50.4-150600.12.54.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.50.4-150600.12.54.1 * webkit2gtk3-soup2-devel-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_0-18-2.50.4-150600.12.54.1 * webkit2gtk4-minibrowser-debuginfo-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_1-0-debuginfo-2.50.4-150600.12.54.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.50.4-150600.12.54.1 * typelib-1_0-WebKit-6_0-2.50.4-150600.12.54.1 * webkit2gtk3-minibrowser-2.50.4-150600.12.54.1 * typelib-1_0-WebKit2WebExtension-4_1-2.50.4-150600.12.54.1 * webkitgtk-6_0-injected-bundles-2.50.4-150600.12.54.1 * typelib-1_0-WebKit2WebExtension-4_0-2.50.4-150600.12.54.1 * webkitgtk-6_0-injected-bundles-debuginfo-2.50.4-150600.12.54.1 * libjavascriptcoregtk-6_0-1-2.50.4-150600.12.54.1 * typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-150600.12.54.1 * typelib-1_0-WebKit2-4_1-2.50.4-150600.12.54.1 * openSUSE Leap 15.6 (x86_64) * libjavascriptcoregtk-4_0-18-32bit-2.50.4-150600.12.54.1 * libwebkit2gtk-4_0-37-32bit-debuginfo-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_1-0-32bit-2.50.4-150600.12.54.1 * libwebkit2gtk-4_0-37-32bit-2.50.4-150600.12.54.1 * libwebkit2gtk-4_1-0-32bit-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_0-18-32bit-debuginfo-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_1-0-32bit-debuginfo-2.50.4-150600.12.54.1 * libwebkit2gtk-4_1-0-32bit-debuginfo-2.50.4-150600.12.54.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libwebkit2gtk-4_1-0-64bit-debuginfo-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_1-0-64bit-2.50.4-150600.12.54.1 * libwebkit2gtk-4_0-37-64bit-2.50.4-150600.12.54.1 * libwebkit2gtk-4_1-0-64bit-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_0-18-64bit-debuginfo-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_0-18-64bit-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_1-0-64bit-debuginfo-2.50.4-150600.12.54.1 * libwebkit2gtk-4_0-37-64bit-debuginfo-2.50.4-150600.12.54.1 * Basesystem Module 15-SP6 (noarch) * WebKitGTK-4.0-lang-2.50.4-150600.12.54.1 * WebKitGTK-6.0-lang-2.50.4-150600.12.54.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libwebkit2gtk-4_0-37-2.50.4-150600.12.54.1 * libwebkit2gtk-4_0-37-debuginfo-2.50.4-150600.12.54.1 * typelib-1_0-JavaScriptCore-4_0-2.50.4-150600.12.54.1 * webkitgtk-6_0-injected-bundles-2.50.4-150600.12.54.1 * libwebkitgtk-6_0-4-2.50.4-150600.12.54.1 * typelib-1_0-WebKit2WebExtension-4_0-2.50.4-150600.12.54.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.50.4-150600.12.54.1 * libjavascriptcoregtk-6_0-1-2.50.4-150600.12.54.1 * webkit2gtk-4_0-injected-bundles-2.50.4-150600.12.54.1 * webkit2gtk3-soup2-debugsource-2.50.4-150600.12.54.1 * webkit2gtk3-soup2-devel-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_0-18-2.50.4-150600.12.54.1 * webkitgtk-6_0-injected-bundles-debuginfo-2.50.4-150600.12.54.1 * typelib-1_0-WebKit2-4_0-2.50.4-150600.12.54.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.50.4-150600.12.54.1 * webkit2gtk4-debugsource-2.50.4-150600.12.54.1 * libwebkitgtk-6_0-4-debuginfo-2.50.4-150600.12.54.1 * Basesystem Module 15-SP7 (noarch) * WebKitGTK-4.0-lang-2.50.4-150600.12.54.1 * WebKitGTK-6.0-lang-2.50.4-150600.12.54.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libwebkit2gtk-4_0-37-2.50.4-150600.12.54.1 * libwebkit2gtk-4_0-37-debuginfo-2.50.4-150600.12.54.1 * typelib-1_0-JavaScriptCore-4_0-2.50.4-150600.12.54.1 * webkitgtk-6_0-injected-bundles-2.50.4-150600.12.54.1 * libwebkitgtk-6_0-4-2.50.4-150600.12.54.1 * typelib-1_0-WebKit2WebExtension-4_0-2.50.4-150600.12.54.1 * webkit2gtk-4_0-injected-bundles-debuginfo-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_0-18-debuginfo-2.50.4-150600.12.54.1 * libjavascriptcoregtk-6_0-1-2.50.4-150600.12.54.1 * webkit2gtk-4_0-injected-bundles-2.50.4-150600.12.54.1 * webkit2gtk3-soup2-debugsource-2.50.4-150600.12.54.1 * webkit2gtk3-soup2-devel-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_0-18-2.50.4-150600.12.54.1 * webkitgtk-6_0-injected-bundles-debuginfo-2.50.4-150600.12.54.1 * typelib-1_0-WebKit2-4_0-2.50.4-150600.12.54.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.50.4-150600.12.54.1 * webkit2gtk4-debugsource-2.50.4-150600.12.54.1 * libwebkitgtk-6_0-4-debuginfo-2.50.4-150600.12.54.1 * Desktop Applications Module 15-SP6 (noarch) * WebKitGTK-4.1-lang-2.50.4-150600.12.54.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * typelib-1_0-WebKit2WebExtension-4_1-2.50.4-150600.12.54.1 * libwebkit2gtk-4_1-0-debuginfo-2.50.4-150600.12.54.1 * webkit2gtk3-debugsource-2.50.4-150600.12.54.1 * webkit2gtk3-devel-2.50.4-150600.12.54.1 * typelib-1_0-JavaScriptCore-4_1-2.50.4-150600.12.54.1 * webkit2gtk-4_1-injected-bundles-2.50.4-150600.12.54.1 * libwebkit2gtk-4_1-0-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_1-0-debuginfo-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_1-0-2.50.4-150600.12.54.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.50.4-150600.12.54.1 * typelib-1_0-WebKit2-4_1-2.50.4-150600.12.54.1 * Desktop Applications Module 15-SP7 (noarch) * WebKitGTK-4.1-lang-2.50.4-150600.12.54.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * typelib-1_0-WebKit2WebExtension-4_1-2.50.4-150600.12.54.1 * libwebkit2gtk-4_1-0-debuginfo-2.50.4-150600.12.54.1 * webkit2gtk3-debugsource-2.50.4-150600.12.54.1 * webkit2gtk3-devel-2.50.4-150600.12.54.1 * typelib-1_0-JavaScriptCore-4_1-2.50.4-150600.12.54.1 * webkit2gtk-4_1-injected-bundles-2.50.4-150600.12.54.1 * libwebkit2gtk-4_1-0-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_1-0-debuginfo-2.50.4-150600.12.54.1 * libjavascriptcoregtk-4_1-0-2.50.4-150600.12.54.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.50.4-150600.12.54.1 * typelib-1_0-WebKit2-4_1-2.50.4-150600.12.54.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * webkit2gtk4-debugsource-2.50.4-150600.12.54.1 * typelib-1_0-JavaScriptCore-6_0-2.50.4-150600.12.54.1 * typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-150600.12.54.1 * typelib-1_0-WebKit-6_0-2.50.4-150600.12.54.1 * webkit2gtk4-devel-2.50.4-150600.12.54.1 ## References: * https://www.suse.com/security/cve/CVE-2023-43000.html * https://www.suse.com/security/cve/CVE-2025-13502.html * https://www.suse.com/security/cve/CVE-2025-13947.html * https://www.suse.com/security/cve/CVE-2025-14174.html * https://www.suse.com/security/cve/CVE-2025-43392.html * https://www.suse.com/security/cve/CVE-2025-43419.html * https://www.suse.com/security/cve/CVE-2025-43421.html * https://www.suse.com/security/cve/CVE-2025-43425.html * https://www.suse.com/security/cve/CVE-2025-43427.html * https://www.suse.com/security/cve/CVE-2025-43429.html * https://www.suse.com/security/cve/CVE-2025-43430.html * https://www.suse.com/security/cve/CVE-2025-43431.html * https://www.suse.com/security/cve/CVE-2025-43432.html * https://www.suse.com/security/cve/CVE-2025-43434.html * https://www.suse.com/security/cve/CVE-2025-43440.html * https://www.suse.com/security/cve/CVE-2025-43443.html * https://www.suse.com/security/cve/CVE-2025-43458.html * https://www.suse.com/security/cve/CVE-2025-43480.html * https://www.suse.com/security/cve/CVE-2025-43501.html * https://www.suse.com/security/cve/CVE-2025-43529.html * https://www.suse.com/security/cve/CVE-2025-43531.html * https://www.suse.com/security/cve/CVE-2025-43535.html * https://www.suse.com/security/cve/CVE-2025-43536.html * https://www.suse.com/security/cve/CVE-2025-43541.html * https://www.suse.com/security/cve/CVE-2025-66287.html * https://bugzilla.suse.com/show_bug.cgi?id=1254164 * https://bugzilla.suse.com/show_bug.cgi?id=1254165 * https://bugzilla.suse.com/show_bug.cgi?id=1254166 * https://bugzilla.suse.com/show_bug.cgi?id=1254167 * https://bugzilla.suse.com/show_bug.cgi?id=1254168 * https://bugzilla.suse.com/show_bug.cgi?id=1254169 * https://bugzilla.suse.com/show_bug.cgi?id=1254170 * https://bugzilla.suse.com/show_bug.cgi?id=1254171 * https://bugzilla.suse.com/show_bug.cgi?id=1254172 * https://bugzilla.suse.com/show_bug.cgi?id=1254174 * https://bugzilla.suse.com/show_bug.cgi?id=1254175 * https://bugzilla.suse.com/show_bug.cgi?id=1254176 * https://bugzilla.suse.com/show_bug.cgi?id=1254177 * https://bugzilla.suse.com/show_bug.cgi?id=1254179 * https://bugzilla.suse.com/show_bug.cgi?id=1254208 * https://bugzilla.suse.com/show_bug.cgi?id=1254473 * https://bugzilla.suse.com/show_bug.cgi?id=1254498 * https://bugzilla.suse.com/show_bug.cgi?id=1254509 * https://bugzilla.suse.com/show_bug.cgi?id=1255183 * https://bugzilla.suse.com/show_bug.cgi?id=1255191 * https://bugzilla.suse.com/show_bug.cgi?id=1255194 * https://bugzilla.suse.com/show_bug.cgi?id=1255195 * https://bugzilla.suse.com/show_bug.cgi?id=1255198 * https://bugzilla.suse.com/show_bug.cgi?id=1255200 * https://bugzilla.suse.com/show_bug.cgi?id=1255497 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 16:30:32 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 16:30:32 -0000 Subject: SUSE-SU-2026:0020-1: important: Security update for apache2 Message-ID: <176763063218.22147.17969915200351634456@smelt2.prg2.suse.org> # Security update for apache2 Announcement ID: SUSE-SU-2026:0020-1 Release Date: 2026-01-05T11:10:13Z Rating: important References: * bsc#1254511 * bsc#1254512 * bsc#1254514 * bsc#1254515 Cross-References: * CVE-2025-55753 * CVE-2025-58098 * CVE-2025-65082 * CVE-2025-66200 CVSS scores: * CVE-2025-55753 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-55753 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-55753 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-58098 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-58098 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-58098 ( NVD ): 8.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L * CVE-2025-65082 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-65082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-65082 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-66200 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-66200 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-66200 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves four vulnerabilities can now be installed. ## Description: This update for apache2 fixes the following issues: * CVE-2025-55753: Fixed mod_md (ACME) unintended retry intervals (bsc#1254511) * CVE-2025-65082: Fixed CGI environment variable override (bsc#1254514) * CVE-2025-58098: Fixed Server Side Includes adding query string to #exec cmd=... (bsc#1254512) * CVE-2025-66200: Fixed mod_userdir+suexec bypass via AllowOverride FileInfo (bsc#1254515) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-20=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-20=1 openSUSE-SLE-15.6-2026-20=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-20=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * apache2-utils-debuginfo-2.4.58-150600.5.41.1 * apache2-debugsource-2.4.58-150600.5.41.1 * apache2-prefork-2.4.58-150600.5.41.1 * apache2-utils-2.4.58-150600.5.41.1 * apache2-prefork-debuginfo-2.4.58-150600.5.41.1 * apache2-prefork-debugsource-2.4.58-150600.5.41.1 * apache2-devel-2.4.58-150600.5.41.1 * apache2-worker-debuginfo-2.4.58-150600.5.41.1 * apache2-utils-debugsource-2.4.58-150600.5.41.1 * apache2-worker-debugsource-2.4.58-150600.5.41.1 * apache2-debuginfo-2.4.58-150600.5.41.1 * apache2-worker-2.4.58-150600.5.41.1 * apache2-2.4.58-150600.5.41.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * apache2-utils-debuginfo-2.4.58-150600.5.41.1 * apache2-event-2.4.58-150600.5.41.1 * apache2-debugsource-2.4.58-150600.5.41.1 * apache2-event-debugsource-2.4.58-150600.5.41.1 * apache2-prefork-2.4.58-150600.5.41.1 * apache2-utils-2.4.58-150600.5.41.1 * apache2-prefork-debuginfo-2.4.58-150600.5.41.1 * apache2-prefork-debugsource-2.4.58-150600.5.41.1 * apache2-devel-2.4.58-150600.5.41.1 * apache2-worker-debuginfo-2.4.58-150600.5.41.1 * apache2-utils-debugsource-2.4.58-150600.5.41.1 * apache2-worker-debugsource-2.4.58-150600.5.41.1 * apache2-event-debuginfo-2.4.58-150600.5.41.1 * apache2-debuginfo-2.4.58-150600.5.41.1 * apache2-worker-2.4.58-150600.5.41.1 * apache2-2.4.58-150600.5.41.1 * openSUSE Leap 15.6 (noarch) * apache2-manual-2.4.58-150600.5.41.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * apache2-utils-debuginfo-2.4.58-150600.5.41.1 * apache2-debugsource-2.4.58-150600.5.41.1 * apache2-prefork-2.4.58-150600.5.41.1 * apache2-utils-2.4.58-150600.5.41.1 * apache2-prefork-debuginfo-2.4.58-150600.5.41.1 * apache2-prefork-debugsource-2.4.58-150600.5.41.1 * apache2-devel-2.4.58-150600.5.41.1 * apache2-worker-debuginfo-2.4.58-150600.5.41.1 * apache2-utils-debugsource-2.4.58-150600.5.41.1 * apache2-worker-debugsource-2.4.58-150600.5.41.1 * apache2-debuginfo-2.4.58-150600.5.41.1 * apache2-worker-2.4.58-150600.5.41.1 * apache2-2.4.58-150600.5.41.1 ## References: * https://www.suse.com/security/cve/CVE-2025-55753.html * https://www.suse.com/security/cve/CVE-2025-58098.html * https://www.suse.com/security/cve/CVE-2025-65082.html * https://www.suse.com/security/cve/CVE-2025-66200.html * https://bugzilla.suse.com/show_bug.cgi?id=1254511 * https://bugzilla.suse.com/show_bug.cgi?id=1254512 * https://bugzilla.suse.com/show_bug.cgi?id=1254514 * https://bugzilla.suse.com/show_bug.cgi?id=1254515 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 16:30:36 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 16:30:36 -0000 Subject: SUSE-SU-2026:0019-1: important: Security update for apache2 Message-ID: <176763063659.22147.8649806596068675130@smelt2.prg2.suse.org> # Security update for apache2 Announcement ID: SUSE-SU-2026:0019-1 Release Date: 2026-01-05T11:08:06Z Rating: important References: * bsc#1254511 * bsc#1254512 * bsc#1254514 * bsc#1254515 Cross-References: * CVE-2025-55753 * CVE-2025-58098 * CVE-2025-65082 * CVE-2025-66200 CVSS scores: * CVE-2025-55753 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-55753 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-55753 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-58098 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-58098 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-58098 ( NVD ): 8.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L * CVE-2025-65082 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-65082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-65082 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-66200 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-66200 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-66200 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L Affected Products: * openSUSE Leap 15.4 * Server Applications Module 15-SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves four vulnerabilities can now be installed. ## Description: This update for apache2 fixes the following issues: * CVE-2025-55753: Fixed mod_md (ACME) unintended retry intervals (bsc#1254511) * CVE-2025-65082: Fixed CGI environment variable override (bsc#1254514) * CVE-2025-58098: Fixed Server Side Includes adding query string to #exec cmd=... (bsc#1254512) * CVE-2025-66200: Fixed mod_userdir+suexec bypass via AllowOverride FileInfo (bsc#1254515) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-19=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2026-19=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-19=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-19=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-19=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-19=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-19=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-19=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-19=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-19=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-19=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-19=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2026-19=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2026-19=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2026-19=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * apache2-worker-debuginfo-2.4.51-150400.6.52.1 * apache2-prefork-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-2.4.51-150400.6.52.1 * apache2-event-2.4.51-150400.6.52.1 * apache2-devel-2.4.51-150400.6.52.1 * apache2-2.4.51-150400.6.52.1 * apache2-prefork-2.4.51-150400.6.52.1 * apache2-worker-2.4.51-150400.6.52.1 * apache2-debuginfo-2.4.51-150400.6.52.1 * apache2-example-pages-2.4.51-150400.6.52.1 * apache2-event-debuginfo-2.4.51-150400.6.52.1 * apache2-debugsource-2.4.51-150400.6.52.1 * openSUSE Leap 15.4 (noarch) * apache2-doc-2.4.51-150400.6.52.1 * Server Applications Module 15-SP7 (noarch) * apache2-doc-2.4.51-150400.6.52.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * apache2-worker-debuginfo-2.4.51-150400.6.52.1 * apache2-prefork-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-2.4.51-150400.6.52.1 * apache2-devel-2.4.51-150400.6.52.1 * apache2-prefork-2.4.51-150400.6.52.1 * apache2-2.4.51-150400.6.52.1 * apache2-worker-2.4.51-150400.6.52.1 * apache2-debuginfo-2.4.51-150400.6.52.1 * apache2-debugsource-2.4.51-150400.6.52.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * apache2-doc-2.4.51-150400.6.52.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * apache2-worker-debuginfo-2.4.51-150400.6.52.1 * apache2-prefork-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-2.4.51-150400.6.52.1 * apache2-devel-2.4.51-150400.6.52.1 * apache2-prefork-2.4.51-150400.6.52.1 * apache2-2.4.51-150400.6.52.1 * apache2-worker-2.4.51-150400.6.52.1 * apache2-debuginfo-2.4.51-150400.6.52.1 * apache2-debugsource-2.4.51-150400.6.52.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * apache2-doc-2.4.51-150400.6.52.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * apache2-worker-debuginfo-2.4.51-150400.6.52.1 * apache2-prefork-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-2.4.51-150400.6.52.1 * apache2-devel-2.4.51-150400.6.52.1 * apache2-prefork-2.4.51-150400.6.52.1 * apache2-2.4.51-150400.6.52.1 * apache2-worker-2.4.51-150400.6.52.1 * apache2-debuginfo-2.4.51-150400.6.52.1 * apache2-debugsource-2.4.51-150400.6.52.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * apache2-doc-2.4.51-150400.6.52.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * apache2-worker-debuginfo-2.4.51-150400.6.52.1 * apache2-prefork-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-2.4.51-150400.6.52.1 * apache2-devel-2.4.51-150400.6.52.1 * apache2-prefork-2.4.51-150400.6.52.1 * apache2-2.4.51-150400.6.52.1 * apache2-worker-2.4.51-150400.6.52.1 * apache2-debuginfo-2.4.51-150400.6.52.1 * apache2-debugsource-2.4.51-150400.6.52.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * apache2-doc-2.4.51-150400.6.52.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * apache2-worker-debuginfo-2.4.51-150400.6.52.1 * apache2-prefork-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-2.4.51-150400.6.52.1 * apache2-devel-2.4.51-150400.6.52.1 * apache2-prefork-2.4.51-150400.6.52.1 * apache2-2.4.51-150400.6.52.1 * apache2-worker-2.4.51-150400.6.52.1 * apache2-debuginfo-2.4.51-150400.6.52.1 * apache2-debugsource-2.4.51-150400.6.52.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * apache2-doc-2.4.51-150400.6.52.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * apache2-worker-debuginfo-2.4.51-150400.6.52.1 * apache2-prefork-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-2.4.51-150400.6.52.1 * apache2-devel-2.4.51-150400.6.52.1 * apache2-prefork-2.4.51-150400.6.52.1 * apache2-2.4.51-150400.6.52.1 * apache2-worker-2.4.51-150400.6.52.1 * apache2-debuginfo-2.4.51-150400.6.52.1 * apache2-debugsource-2.4.51-150400.6.52.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * apache2-doc-2.4.51-150400.6.52.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * apache2-doc-2.4.51-150400.6.52.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * apache2-worker-debuginfo-2.4.51-150400.6.52.1 * apache2-prefork-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-2.4.51-150400.6.52.1 * apache2-devel-2.4.51-150400.6.52.1 * apache2-prefork-2.4.51-150400.6.52.1 * apache2-2.4.51-150400.6.52.1 * apache2-worker-2.4.51-150400.6.52.1 * apache2-debuginfo-2.4.51-150400.6.52.1 * apache2-debugsource-2.4.51-150400.6.52.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * apache2-doc-2.4.51-150400.6.52.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * apache2-worker-debuginfo-2.4.51-150400.6.52.1 * apache2-prefork-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-2.4.51-150400.6.52.1 * apache2-devel-2.4.51-150400.6.52.1 * apache2-prefork-2.4.51-150400.6.52.1 * apache2-2.4.51-150400.6.52.1 * apache2-worker-2.4.51-150400.6.52.1 * apache2-debuginfo-2.4.51-150400.6.52.1 * apache2-debugsource-2.4.51-150400.6.52.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * apache2-doc-2.4.51-150400.6.52.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * apache2-doc-2.4.51-150400.6.52.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * apache2-worker-debuginfo-2.4.51-150400.6.52.1 * apache2-prefork-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-2.4.51-150400.6.52.1 * apache2-devel-2.4.51-150400.6.52.1 * apache2-prefork-2.4.51-150400.6.52.1 * apache2-2.4.51-150400.6.52.1 * apache2-worker-2.4.51-150400.6.52.1 * apache2-debuginfo-2.4.51-150400.6.52.1 * apache2-debugsource-2.4.51-150400.6.52.1 * SUSE Manager Proxy 4.3 LTS (noarch) * apache2-doc-2.4.51-150400.6.52.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * apache2-worker-debuginfo-2.4.51-150400.6.52.1 * apache2-prefork-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-2.4.51-150400.6.52.1 * apache2-devel-2.4.51-150400.6.52.1 * apache2-prefork-2.4.51-150400.6.52.1 * apache2-2.4.51-150400.6.52.1 * apache2-worker-2.4.51-150400.6.52.1 * apache2-debuginfo-2.4.51-150400.6.52.1 * apache2-debugsource-2.4.51-150400.6.52.1 * SUSE Manager Retail Branch Server 4.3 LTS (noarch) * apache2-doc-2.4.51-150400.6.52.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * apache2-worker-debuginfo-2.4.51-150400.6.52.1 * apache2-prefork-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-debuginfo-2.4.51-150400.6.52.1 * apache2-utils-2.4.51-150400.6.52.1 * apache2-devel-2.4.51-150400.6.52.1 * apache2-prefork-2.4.51-150400.6.52.1 * apache2-2.4.51-150400.6.52.1 * apache2-worker-2.4.51-150400.6.52.1 * apache2-debuginfo-2.4.51-150400.6.52.1 * apache2-debugsource-2.4.51-150400.6.52.1 * SUSE Manager Server 4.3 LTS (noarch) * apache2-doc-2.4.51-150400.6.52.1 ## References: * https://www.suse.com/security/cve/CVE-2025-55753.html * https://www.suse.com/security/cve/CVE-2025-58098.html * https://www.suse.com/security/cve/CVE-2025-65082.html * https://www.suse.com/security/cve/CVE-2025-66200.html * https://bugzilla.suse.com/show_bug.cgi?id=1254511 * https://bugzilla.suse.com/show_bug.cgi?id=1254512 * https://bugzilla.suse.com/show_bug.cgi?id=1254514 * https://bugzilla.suse.com/show_bug.cgi?id=1254515 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 16:30:41 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 16:30:41 -0000 Subject: SUSE-SU-2026:0018-1: important: Security update for glib2 Message-ID: <176763064161.22147.1398129455483482652@smelt2.prg2.suse.org> # Security update for glib2 Announcement ID: SUSE-SU-2026:0018-1 Release Date: 2026-01-05T10:52:41Z Rating: important References: * bsc#1254297 * bsc#1254662 * bsc#1254878 Cross-References: * CVE-2025-13601 * CVE-2025-14087 * CVE-2025-14512 CVSS scores: * CVE-2025-13601 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-13601 ( NVD ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-14087 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14087 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-14087 ( NVD ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-14512 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-14512 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-14512 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for glib2 fixes the following issues: * CVE-2025-14512: integer overflow in the GIO `escape_byte_string()` function when processing malicious files or remote filesystem attribute values can lead to denial-of-service (bsc#1254878). * CVE-2025-14087: buffer underflow in the GVariant parser `bytestring_parse()` and `string_parse()` functions when processing attacker-influenced data may lead to crash or code execution (bsc#1254662). * CVE-2025-13601: heap-based buffer overflow in the `g_escape_uri_string()` function when processing strings with a large number of unacceptable characters may lead to crash or code execution (bsc#1254297). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-18=1 openSUSE-SLE-15.6-2026-18=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-18=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-18=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-18=1 ## Package List: * openSUSE Leap 15.6 (noarch) * gio-branding-upstream-2.78.6-150600.4.25.1 * glib2-lang-2.78.6-150600.4.25.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * glib2-tests-devel-2.78.6-150600.4.25.1 * glib2-doc-2.78.6-150600.4.25.1 * glib2-tools-2.78.6-150600.4.25.1 * libglib-2_0-0-2.78.6-150600.4.25.1 * glib2-debugsource-2.78.6-150600.4.25.1 * libgio-2_0-0-debuginfo-2.78.6-150600.4.25.1 * libgmodule-2_0-0-debuginfo-2.78.6-150600.4.25.1 * libgthread-2_0-0-2.78.6-150600.4.25.1 * glib2-devel-debuginfo-2.78.6-150600.4.25.1 * libgmodule-2_0-0-2.78.6-150600.4.25.1 * glib2-tools-debuginfo-2.78.6-150600.4.25.1 * libgobject-2_0-0-debuginfo-2.78.6-150600.4.25.1 * libgthread-2_0-0-debuginfo-2.78.6-150600.4.25.1 * glib2-devel-static-2.78.6-150600.4.25.1 * libgio-2_0-0-2.78.6-150600.4.25.1 * glib2-tests-devel-debuginfo-2.78.6-150600.4.25.1 * libglib-2_0-0-debuginfo-2.78.6-150600.4.25.1 * glib2-devel-2.78.6-150600.4.25.1 * libgobject-2_0-0-2.78.6-150600.4.25.1 * openSUSE Leap 15.6 (x86_64) * glib2-tools-32bit-2.78.6-150600.4.25.1 * libgobject-2_0-0-32bit-2.78.6-150600.4.25.1 * libgthread-2_0-0-32bit-2.78.6-150600.4.25.1 * glib2-devel-32bit-debuginfo-2.78.6-150600.4.25.1 * libglib-2_0-0-32bit-debuginfo-2.78.6-150600.4.25.1 * libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1 * glib2-tools-32bit-debuginfo-2.78.6-150600.4.25.1 * libglib-2_0-0-32bit-2.78.6-150600.4.25.1 * libgobject-2_0-0-32bit-debuginfo-2.78.6-150600.4.25.1 * libgio-2_0-0-32bit-2.78.6-150600.4.25.1 * glib2-devel-32bit-2.78.6-150600.4.25.1 * libgio-2_0-0-32bit-debuginfo-2.78.6-150600.4.25.1 * libgthread-2_0-0-32bit-debuginfo-2.78.6-150600.4.25.1 * libgmodule-2_0-0-32bit-debuginfo-2.78.6-150600.4.25.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libgio-2_0-0-64bit-2.78.6-150600.4.25.1 * libglib-2_0-0-64bit-debuginfo-2.78.6-150600.4.25.1 * libgmodule-2_0-0-64bit-2.78.6-150600.4.25.1 * libgobject-2_0-0-64bit-debuginfo-2.78.6-150600.4.25.1 * libglib-2_0-0-64bit-2.78.6-150600.4.25.1 * glib2-tools-64bit-debuginfo-2.78.6-150600.4.25.1 * glib2-tools-64bit-2.78.6-150600.4.25.1 * glib2-devel-64bit-2.78.6-150600.4.25.1 * glib2-devel-64bit-debuginfo-2.78.6-150600.4.25.1 * libgthread-2_0-0-64bit-debuginfo-2.78.6-150600.4.25.1 * libgmodule-2_0-0-64bit-debuginfo-2.78.6-150600.4.25.1 * libgobject-2_0-0-64bit-2.78.6-150600.4.25.1 * libgthread-2_0-0-64bit-2.78.6-150600.4.25.1 * libgio-2_0-0-64bit-debuginfo-2.78.6-150600.4.25.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * glib2-tools-2.78.6-150600.4.25.1 * libglib-2_0-0-2.78.6-150600.4.25.1 * glib2-debugsource-2.78.6-150600.4.25.1 * libgio-2_0-0-debuginfo-2.78.6-150600.4.25.1 * libgmodule-2_0-0-debuginfo-2.78.6-150600.4.25.1 * libgthread-2_0-0-2.78.6-150600.4.25.1 * glib2-devel-debuginfo-2.78.6-150600.4.25.1 * libgmodule-2_0-0-2.78.6-150600.4.25.1 * glib2-tools-debuginfo-2.78.6-150600.4.25.1 * libgobject-2_0-0-debuginfo-2.78.6-150600.4.25.1 * libgthread-2_0-0-debuginfo-2.78.6-150600.4.25.1 * libgio-2_0-0-2.78.6-150600.4.25.1 * libglib-2_0-0-debuginfo-2.78.6-150600.4.25.1 * glib2-devel-2.78.6-150600.4.25.1 * libgobject-2_0-0-2.78.6-150600.4.25.1 * Basesystem Module 15-SP7 (noarch) * glib2-lang-2.78.6-150600.4.25.1 * Basesystem Module 15-SP7 (x86_64) * libgobject-2_0-0-32bit-2.78.6-150600.4.25.1 * libglib-2_0-0-32bit-debuginfo-2.78.6-150600.4.25.1 * libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1 * libglib-2_0-0-32bit-2.78.6-150600.4.25.1 * libgobject-2_0-0-32bit-debuginfo-2.78.6-150600.4.25.1 * libgio-2_0-0-32bit-2.78.6-150600.4.25.1 * libgio-2_0-0-32bit-debuginfo-2.78.6-150600.4.25.1 * libgmodule-2_0-0-32bit-debuginfo-2.78.6-150600.4.25.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * glib2-tools-2.78.6-150600.4.25.1 * libglib-2_0-0-2.78.6-150600.4.25.1 * glib2-debugsource-2.78.6-150600.4.25.1 * libgio-2_0-0-debuginfo-2.78.6-150600.4.25.1 * libgmodule-2_0-0-debuginfo-2.78.6-150600.4.25.1 * libgthread-2_0-0-2.78.6-150600.4.25.1 * glib2-devel-debuginfo-2.78.6-150600.4.25.1 * libgmodule-2_0-0-2.78.6-150600.4.25.1 * glib2-tools-debuginfo-2.78.6-150600.4.25.1 * libgobject-2_0-0-debuginfo-2.78.6-150600.4.25.1 * libgthread-2_0-0-debuginfo-2.78.6-150600.4.25.1 * libgio-2_0-0-2.78.6-150600.4.25.1 * libglib-2_0-0-debuginfo-2.78.6-150600.4.25.1 * glib2-devel-2.78.6-150600.4.25.1 * libgobject-2_0-0-2.78.6-150600.4.25.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * glib2-lang-2.78.6-150600.4.25.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (x86_64) * libgobject-2_0-0-32bit-2.78.6-150600.4.25.1 * libglib-2_0-0-32bit-debuginfo-2.78.6-150600.4.25.1 * libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1 * libglib-2_0-0-32bit-2.78.6-150600.4.25.1 * libgobject-2_0-0-32bit-debuginfo-2.78.6-150600.4.25.1 * libgio-2_0-0-32bit-2.78.6-150600.4.25.1 * libgio-2_0-0-32bit-debuginfo-2.78.6-150600.4.25.1 * libgmodule-2_0-0-32bit-debuginfo-2.78.6-150600.4.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * glib2-tools-2.78.6-150600.4.25.1 * libglib-2_0-0-2.78.6-150600.4.25.1 * glib2-debugsource-2.78.6-150600.4.25.1 * libgio-2_0-0-debuginfo-2.78.6-150600.4.25.1 * libgmodule-2_0-0-debuginfo-2.78.6-150600.4.25.1 * libgthread-2_0-0-2.78.6-150600.4.25.1 * glib2-devel-debuginfo-2.78.6-150600.4.25.1 * libgmodule-2_0-0-2.78.6-150600.4.25.1 * glib2-tools-debuginfo-2.78.6-150600.4.25.1 * libgobject-2_0-0-debuginfo-2.78.6-150600.4.25.1 * libgthread-2_0-0-debuginfo-2.78.6-150600.4.25.1 * libgio-2_0-0-2.78.6-150600.4.25.1 * libglib-2_0-0-debuginfo-2.78.6-150600.4.25.1 * glib2-devel-2.78.6-150600.4.25.1 * libgobject-2_0-0-2.78.6-150600.4.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * glib2-lang-2.78.6-150600.4.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64) * libgobject-2_0-0-32bit-2.78.6-150600.4.25.1 * libglib-2_0-0-32bit-debuginfo-2.78.6-150600.4.25.1 * libgmodule-2_0-0-32bit-2.78.6-150600.4.25.1 * libglib-2_0-0-32bit-2.78.6-150600.4.25.1 * libgobject-2_0-0-32bit-debuginfo-2.78.6-150600.4.25.1 * libgio-2_0-0-32bit-2.78.6-150600.4.25.1 * libgio-2_0-0-32bit-debuginfo-2.78.6-150600.4.25.1 * libgmodule-2_0-0-32bit-debuginfo-2.78.6-150600.4.25.1 ## References: * https://www.suse.com/security/cve/CVE-2025-13601.html * https://www.suse.com/security/cve/CVE-2025-14087.html * https://www.suse.com/security/cve/CVE-2025-14512.html * https://bugzilla.suse.com/show_bug.cgi?id=1254297 * https://bugzilla.suse.com/show_bug.cgi?id=1254662 * https://bugzilla.suse.com/show_bug.cgi?id=1254878 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 16:30:44 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 16:30:44 -0000 Subject: SUSE-SU-2026:0017-1: important: Security update for libsoup Message-ID: <176763064428.22147.2792298374445185107@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2026:0017-1 Release Date: 2026-01-05T10:52:12Z Rating: important References: * bsc#1252555 Cross-References: * CVE-2025-12105 CVSS scores: * CVE-2025-12105 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-12105 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-12105 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2025-12105: Fixed heap use-after-free in message queue handling during HTTP/2 read completion (bsc#1252555) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-17=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-17=1 openSUSE-SLE-15.6-2026-17=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-17=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-17=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * libsoup-devel-3.4.4-150600.3.21.1 * typelib-1_0-Soup-3_0-3.4.4-150600.3.21.1 * libsoup-debugsource-3.4.4-150600.3.21.1 * libsoup-3_0-0-3.4.4-150600.3.21.1 * libsoup-3_0-0-debuginfo-3.4.4-150600.3.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * libsoup-lang-3.4.4-150600.3.21.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libsoup-devel-3.4.4-150600.3.21.1 * typelib-1_0-Soup-3_0-3.4.4-150600.3.21.1 * libsoup-debugsource-3.4.4-150600.3.21.1 * libsoup-3_0-0-3.4.4-150600.3.21.1 * libsoup-3_0-0-debuginfo-3.4.4-150600.3.21.1 * openSUSE Leap 15.6 (x86_64) * libsoup-3_0-0-32bit-3.4.4-150600.3.21.1 * libsoup-devel-32bit-3.4.4-150600.3.21.1 * libsoup-3_0-0-32bit-debuginfo-3.4.4-150600.3.21.1 * openSUSE Leap 15.6 (noarch) * libsoup-lang-3.4.4-150600.3.21.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libsoup-3_0-0-64bit-3.4.4-150600.3.21.1 * libsoup-3_0-0-64bit-debuginfo-3.4.4-150600.3.21.1 * libsoup-devel-64bit-3.4.4-150600.3.21.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libsoup-devel-3.4.4-150600.3.21.1 * typelib-1_0-Soup-3_0-3.4.4-150600.3.21.1 * libsoup-debugsource-3.4.4-150600.3.21.1 * libsoup-3_0-0-3.4.4-150600.3.21.1 * libsoup-3_0-0-debuginfo-3.4.4-150600.3.21.1 * Basesystem Module 15-SP7 (noarch) * libsoup-lang-3.4.4-150600.3.21.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * libsoup-devel-3.4.4-150600.3.21.1 * typelib-1_0-Soup-3_0-3.4.4-150600.3.21.1 * libsoup-debugsource-3.4.4-150600.3.21.1 * libsoup-3_0-0-3.4.4-150600.3.21.1 * libsoup-3_0-0-debuginfo-3.4.4-150600.3.21.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * libsoup-lang-3.4.4-150600.3.21.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12105.html * https://bugzilla.suse.com/show_bug.cgi?id=1252555 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 16:30:47 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 16:30:47 -0000 Subject: SUSE-SU-2026:0016-1: important: Security update for pgadmin4 Message-ID: <176763064759.22147.6919463367128129440@smelt2.prg2.suse.org> # Security update for pgadmin4 Announcement ID: SUSE-SU-2026:0016-1 Release Date: 2026-01-05T10:48:10Z Rating: important References: * bsc#1253477 * bsc#1253478 Cross-References: * CVE-2025-12764 * CVE-2025-12765 CVSS scores: * CVE-2025-12764 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-12764 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-12764 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-12765 ( SUSE ): 9.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-12765 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-12765 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-12765 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * openSUSE Leap 15.3 * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves two vulnerabilities can now be installed. ## Description: This update for pgadmin4 fixes the following issues: * CVE-2025-12765: insufficient checks in the LDAP authentication flow allow a for bypass of TLS certificate validation that can lead to the stealing of bind credentials and the altering of directory responses (bsc#1253478). * CVE-2025-12764: improper validation of characters in a username allows for LDAP injections that force the processing of unusual amounts of data and leads to a DoS (bsc#1253477). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2026-16=1 * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-16=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-16=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-16=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-16=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-16=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-16=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-16=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-16=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-16=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-16=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-16=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2026-16=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2026-16=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2026-16=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * pgadmin4-4.30-150300.3.21.1 * pgadmin4-debuginfo-4.30-150300.3.21.1 * openSUSE Leap 15.3 (noarch) * pgadmin4-web-4.30-150300.3.21.1 * pgadmin4-doc-4.30-150300.3.21.1 * pgadmin4-web-uwsgi-4.30-150300.3.21.1 * Python 3 Module 15-SP7 (noarch) * pgadmin4-web-4.30-150300.3.21.1 * pgadmin4-doc-4.30-150300.3.21.1 * Python 3 Module 15-SP7 (s390x) * pgadmin4-4.30-150300.3.21.1 * pgadmin4-debuginfo-4.30-150300.3.21.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * pgadmin4-4.30-150300.3.21.1 * pgadmin4-debuginfo-4.30-150300.3.21.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * pgadmin4-web-4.30-150300.3.21.1 * pgadmin4-doc-4.30-150300.3.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * pgadmin4-4.30-150300.3.21.1 * pgadmin4-debuginfo-4.30-150300.3.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * pgadmin4-web-4.30-150300.3.21.1 * pgadmin4-doc-4.30-150300.3.21.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * pgadmin4-4.30-150300.3.21.1 * pgadmin4-debuginfo-4.30-150300.3.21.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * pgadmin4-web-4.30-150300.3.21.1 * pgadmin4-doc-4.30-150300.3.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * pgadmin4-4.30-150300.3.21.1 * pgadmin4-debuginfo-4.30-150300.3.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * pgadmin4-web-4.30-150300.3.21.1 * pgadmin4-doc-4.30-150300.3.21.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * pgadmin4-4.30-150300.3.21.1 * pgadmin4-debuginfo-4.30-150300.3.21.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * pgadmin4-web-4.30-150300.3.21.1 * pgadmin4-doc-4.30-150300.3.21.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * pgadmin4-4.30-150300.3.21.1 * pgadmin4-debuginfo-4.30-150300.3.21.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * pgadmin4-web-4.30-150300.3.21.1 * pgadmin4-doc-4.30-150300.3.21.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * pgadmin4-web-4.30-150300.3.21.1 * pgadmin4-doc-4.30-150300.3.21.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (s390x) * pgadmin4-4.30-150300.3.21.1 * pgadmin4-debuginfo-4.30-150300.3.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * pgadmin4-4.30-150300.3.21.1 * pgadmin4-debuginfo-4.30-150300.3.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * pgadmin4-web-4.30-150300.3.21.1 * pgadmin4-doc-4.30-150300.3.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * pgadmin4-4.30-150300.3.21.1 * pgadmin4-debuginfo-4.30-150300.3.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * pgadmin4-web-4.30-150300.3.21.1 * pgadmin4-doc-4.30-150300.3.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * pgadmin4-web-4.30-150300.3.21.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * pgadmin4-4.30-150300.3.21.1 * pgadmin4-debuginfo-4.30-150300.3.21.1 * SUSE Manager Proxy 4.3 LTS (noarch) * pgadmin4-web-4.30-150300.3.21.1 * pgadmin4-doc-4.30-150300.3.21.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * pgadmin4-4.30-150300.3.21.1 * pgadmin4-debuginfo-4.30-150300.3.21.1 * SUSE Manager Retail Branch Server 4.3 LTS (noarch) * pgadmin4-web-4.30-150300.3.21.1 * pgadmin4-doc-4.30-150300.3.21.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * pgadmin4-4.30-150300.3.21.1 * pgadmin4-debuginfo-4.30-150300.3.21.1 * SUSE Manager Server 4.3 LTS (noarch) * pgadmin4-web-4.30-150300.3.21.1 * pgadmin4-doc-4.30-150300.3.21.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12764.html * https://www.suse.com/security/cve/CVE-2025-12765.html * https://bugzilla.suse.com/show_bug.cgi?id=1253477 * https://bugzilla.suse.com/show_bug.cgi?id=1253478 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 16:30:50 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 16:30:50 -0000 Subject: SUSE-SU-2026:0015-1: important: Security update for pgadmin4 Message-ID: <176763065089.22147.3949764771748955551@smelt2.prg2.suse.org> # Security update for pgadmin4 Announcement ID: SUSE-SU-2026:0015-1 Release Date: 2026-01-05T10:41:14Z Rating: important References: * bsc#1253477 * bsc#1253478 Cross-References: * CVE-2025-12764 * CVE-2025-12765 CVSS scores: * CVE-2025-12764 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-12764 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-12764 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-12765 ( SUSE ): 9.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-12765 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-12765 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-12765 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * openSUSE Leap 15.6 * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for pgadmin4 fixes the following issues: * CVE-2025-12765: insufficient checks in the LDAP authentication flow allow a for bypass of TLS certificate validation that can lead to the stealing of bind credentials and the altering of directory responses (bsc#1253478). * CVE-2025-12764: improper validation of characters in a username allows for LDAP injections that force the processing of unusual amounts of data and leads to a DoS (bsc#1253477). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-15=1 openSUSE-SLE-15.6-2026-15=1 * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-15=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-15=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-15=1 ## Package List: * openSUSE Leap 15.6 (noarch) * pgadmin4-8.5-150600.3.18.1 * pgadmin4-web-uwsgi-8.5-150600.3.18.1 * pgadmin4-desktop-8.5-150600.3.18.1 * pgadmin4-cloud-8.5-150600.3.18.1 * pgadmin4-doc-8.5-150600.3.18.1 * system-user-pgadmin-8.5-150600.3.18.1 * Python 3 Module 15-SP7 (noarch) * system-user-pgadmin-8.5-150600.3.18.1 * pgadmin4-8.5-150600.3.18.1 * pgadmin4-doc-8.5-150600.3.18.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * system-user-pgadmin-8.5-150600.3.18.1 * pgadmin4-8.5-150600.3.18.1 * pgadmin4-doc-8.5-150600.3.18.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * system-user-pgadmin-8.5-150600.3.18.1 * pgadmin4-8.5-150600.3.18.1 * pgadmin4-doc-8.5-150600.3.18.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12764.html * https://www.suse.com/security/cve/CVE-2025-12765.html * https://bugzilla.suse.com/show_bug.cgi?id=1253477 * https://bugzilla.suse.com/show_bug.cgi?id=1253478 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 16:30:54 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 16:30:54 -0000 Subject: SUSE-SU-2026:0014-1: important: Security update for buildah Message-ID: <176763065406.22147.2143663589020702334@smelt2.prg2.suse.org> # Security update for buildah Announcement ID: SUSE-SU-2026:0014-1 Release Date: 2026-01-05T10:39:45Z Rating: important References: * bsc#1253598 * bsc#1254054 Cross-References: * CVE-2025-47913 * CVE-2025-47914 CVSS scores: * CVE-2025-47913 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-47913 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47913 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47914 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-47914 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-47914 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Containers Module 15-SP7 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for buildah fixes the following issues: * CVE-2025-47914: golang.org/x/crypto/ssh/agent: Fixed out of bounds read caused by non validated message size (bsc#1254054) * CVE-2025-47913: golang.org/x/crypto/ssh/agent: Fixed client process termination when receiving an unexpected message type in response to a key listing or signing request (bsc#1253598) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-14=1 * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2026-14=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-14=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-14=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-14=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-14=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-14=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-14=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-14=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * buildah-1.35.5-150500.3.53.1 * Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64) * buildah-1.35.5-150500.3.53.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * buildah-1.35.5-150500.3.53.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * buildah-1.35.5-150500.3.53.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * buildah-1.35.5-150500.3.53.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * buildah-1.35.5-150500.3.53.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * buildah-1.35.5-150500.3.53.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * buildah-1.35.5-150500.3.53.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * buildah-1.35.5-150500.3.53.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47913.html * https://www.suse.com/security/cve/CVE-2025-47914.html * https://bugzilla.suse.com/show_bug.cgi?id=1253598 * https://bugzilla.suse.com/show_bug.cgi?id=1254054 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 16:30:58 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 16:30:58 -0000 Subject: SUSE-SU-2026:0013-1: important: Security update for ImageMagick Message-ID: <176763065814.22147.12817045506182572064@smelt2.prg2.suse.org> # Security update for ImageMagick Announcement ID: SUSE-SU-2026:0013-1 Release Date: 2026-01-05T10:36:12Z Rating: important References: * bsc#1254435 * bsc#1254820 * bsc#1255391 Cross-References: * CVE-2025-65955 * CVE-2025-66628 * CVE-2025-68469 CVSS scores: * CVE-2025-65955 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-65955 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-65955 ( NVD ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-65955 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-66628 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-66628 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-66628 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-68469 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-68469 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68469 ( NVD ): 2.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-68469 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L Affected Products: * Desktop Applications Module 15-SP7 * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for ImageMagick fixes the following issues: * CVE-2025-65955: possible use-after-free/double-free in `Options::fontFamily` when clearing a family can lead to crashes or memory corruption (bsc#1254435). * CVE-2025-66628: possible integer overflow in the TIM image parser's `ReadTIMImage` function can lead to arbitrary memory disclosure on 32-bit systems (bsc#1254820). * CVE-2025-68469: crash due to heap buffer overflow when processing a specially crafted TIFF file (bsc#1255391). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-13=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-13=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-13=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-13=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-13=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-13=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-13=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-13=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-13=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-13=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-13=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-13=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * ImageMagick-config-7-upstream-7.1.0.9-150400.6.58.1 * perl-PerlMagick-debuginfo-7.1.0.9-150400.6.58.1 * libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.58.1 * ImageMagick-extra-debuginfo-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-config-7-SUSE-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.0.9-150400.6.58.1 * libMagick++-devel-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.58.1 * perl-PerlMagick-7.1.0.9-150400.6.58.1 * ImageMagick-debugsource-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.58.1 * ImageMagick-devel-7.1.0.9-150400.6.58.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-extra-7.1.0.9-150400.6.58.1 * ImageMagick-7.1.0.9-150400.6.58.1 * openSUSE Leap 15.4 (x86_64) * libMagick++-devel-32bit-7.1.0.9-150400.6.58.1 * ImageMagick-devel-32bit-7.1.0.9-150400.6.58.1 * libMagickWand-7_Q16HDRI10-32bit-debuginfo-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-32bit-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-32bit-debuginfo-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-32bit-debuginfo-7.1.0.9-150400.6.58.1 * libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-150400.6.58.1 * openSUSE Leap 15.4 (noarch) * ImageMagick-doc-7.1.0.9-150400.6.58.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libMagickWand-7_Q16HDRI10-64bit-debuginfo-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-64bit-debuginfo-7.1.0.9-150400.6.58.1 * libMagickWand-7_Q16HDRI10-64bit-7.1.0.9-150400.6.58.1 * libMagick++-devel-64bit-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-64bit-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-64bit-7.1.0.9-150400.6.58.1 * ImageMagick-devel-64bit-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-64bit-debuginfo-7.1.0.9-150400.6.58.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * ImageMagick-debugsource-7.1.0.9-150400.6.58.1 * ImageMagick-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-config-7-upstream-7.1.0.9-150400.6.58.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * ImageMagick-config-7-upstream-7.1.0.9-150400.6.58.1 * perl-PerlMagick-debuginfo-7.1.0.9-150400.6.58.1 * libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-config-7-SUSE-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.0.9-150400.6.58.1 * libMagick++-devel-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.58.1 * perl-PerlMagick-7.1.0.9-150400.6.58.1 * ImageMagick-debugsource-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.58.1 * ImageMagick-devel-7.1.0.9-150400.6.58.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-7.1.0.9-150400.6.58.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * ImageMagick-config-7-upstream-7.1.0.9-150400.6.58.1 * perl-PerlMagick-debuginfo-7.1.0.9-150400.6.58.1 * libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-config-7-SUSE-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.0.9-150400.6.58.1 * libMagick++-devel-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.58.1 * perl-PerlMagick-7.1.0.9-150400.6.58.1 * ImageMagick-debugsource-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.58.1 * ImageMagick-devel-7.1.0.9-150400.6.58.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-7.1.0.9-150400.6.58.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * ImageMagick-config-7-upstream-7.1.0.9-150400.6.58.1 * perl-PerlMagick-debuginfo-7.1.0.9-150400.6.58.1 * libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-config-7-SUSE-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.0.9-150400.6.58.1 * libMagick++-devel-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.58.1 * perl-PerlMagick-7.1.0.9-150400.6.58.1 * ImageMagick-debugsource-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.58.1 * ImageMagick-devel-7.1.0.9-150400.6.58.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-7.1.0.9-150400.6.58.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * ImageMagick-config-7-upstream-7.1.0.9-150400.6.58.1 * perl-PerlMagick-debuginfo-7.1.0.9-150400.6.58.1 * libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-config-7-SUSE-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.0.9-150400.6.58.1 * libMagick++-devel-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.58.1 * perl-PerlMagick-7.1.0.9-150400.6.58.1 * ImageMagick-debugsource-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.58.1 * ImageMagick-devel-7.1.0.9-150400.6.58.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-7.1.0.9-150400.6.58.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * ImageMagick-config-7-upstream-7.1.0.9-150400.6.58.1 * perl-PerlMagick-debuginfo-7.1.0.9-150400.6.58.1 * libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-config-7-SUSE-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.0.9-150400.6.58.1 * libMagick++-devel-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.58.1 * perl-PerlMagick-7.1.0.9-150400.6.58.1 * ImageMagick-debugsource-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.58.1 * ImageMagick-devel-7.1.0.9-150400.6.58.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-7.1.0.9-150400.6.58.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * ImageMagick-config-7-upstream-7.1.0.9-150400.6.58.1 * perl-PerlMagick-debuginfo-7.1.0.9-150400.6.58.1 * libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-config-7-SUSE-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.0.9-150400.6.58.1 * libMagick++-devel-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.58.1 * perl-PerlMagick-7.1.0.9-150400.6.58.1 * ImageMagick-debugsource-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.58.1 * ImageMagick-devel-7.1.0.9-150400.6.58.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-7.1.0.9-150400.6.58.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * ImageMagick-debugsource-7.1.0.9-150400.6.58.1 * ImageMagick-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-config-7-upstream-7.1.0.9-150400.6.58.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * ImageMagick-config-7-upstream-7.1.0.9-150400.6.58.1 * perl-PerlMagick-debuginfo-7.1.0.9-150400.6.58.1 * libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-config-7-SUSE-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.0.9-150400.6.58.1 * libMagick++-devel-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.58.1 * perl-PerlMagick-7.1.0.9-150400.6.58.1 * ImageMagick-debugsource-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.58.1 * ImageMagick-devel-7.1.0.9-150400.6.58.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-7.1.0.9-150400.6.58.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * ImageMagick-config-7-upstream-7.1.0.9-150400.6.58.1 * perl-PerlMagick-debuginfo-7.1.0.9-150400.6.58.1 * libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-config-7-SUSE-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.0.9-150400.6.58.1 * libMagick++-devel-7.1.0.9-150400.6.58.1 * libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.58.1 * perl-PerlMagick-7.1.0.9-150400.6.58.1 * ImageMagick-debugsource-7.1.0.9-150400.6.58.1 * libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.58.1 * ImageMagick-devel-7.1.0.9-150400.6.58.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-7.1.0.9-150400.6.58.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * ImageMagick-debugsource-7.1.0.9-150400.6.58.1 * ImageMagick-debuginfo-7.1.0.9-150400.6.58.1 * ImageMagick-config-7-upstream-7.1.0.9-150400.6.58.1 ## References: * https://www.suse.com/security/cve/CVE-2025-65955.html * https://www.suse.com/security/cve/CVE-2025-66628.html * https://www.suse.com/security/cve/CVE-2025-68469.html * https://bugzilla.suse.com/show_bug.cgi?id=1254435 * https://bugzilla.suse.com/show_bug.cgi?id=1254820 * https://bugzilla.suse.com/show_bug.cgi?id=1255391 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 16:31:05 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 16:31:05 -0000 Subject: SUSE-SU-2026:0012-1: important: Security update for xen Message-ID: <176763066572.22147.13057108669920683876@smelt2.prg2.suse.org> # Security update for xen Announcement ID: SUSE-SU-2026:0012-1 Release Date: 2026-01-05T10:31:33Z Rating: important References: * bsc#1027519 * bsc#1248807 * bsc#1251271 * bsc#1252692 * bsc#1254180 Cross-References: * CVE-2025-27466 * CVE-2025-58142 * CVE-2025-58143 * CVE-2025-58147 * CVE-2025-58148 * CVE-2025-58149 CVSS scores: * CVE-2025-27466 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2025-27466 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-58142 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H * CVE-2025-58142 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-58143 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-58143 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-58147 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H * CVE-2025-58147 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-58148 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H * CVE-2025-58148 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-58149 ( SUSE ): 4.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-58149 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N * CVE-2025-58149 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP6 * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves six vulnerabilities can now be installed. ## Description: This update for xen fixes the following issues: Security issues fixed: * CVE-2025-27466: NULL pointer dereference in the Viridian interface when updating the reference TSC area (bsc#1248807). * CVE-2025-58142: NULL pointer dereference in the Viridian interface due to assumption that the SIM page is mapped when a synthetic timer message has to be delivered (bsc#1248807). * CVE-2025-58143: information leak and reference counter underflow in the Viridian interface due to race in the mapping of the reference TSC page (bsc#1248807). * CVE-2025-58147: incorrect input sanitisation in Viridian hypercalls using the HV_VP_SET Sparse format can lead to out-of-bounds write through `vpmask_set()` (bsc#1251271). * CVE-2025-58148: incorrect input sanitisation in Viridian hypercalls using any input format can lead to out-of-bounds read through `send_ipi()` (bsc#1251271). * CVE-2025-58149: incorrect removal of permissions on PCI device unplug allows PV guests to access memory of devices no longer assigned to them (bsc#1252692). Other issues fixed: * Several upstream bug fixes (bsc#1027519). * Failure to restart xenstored (bsc#1254180). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-12=1 openSUSE-SLE-15.6-2026-12=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2026-12=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2026-12=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-12=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-12=1 ## Package List: * openSUSE Leap 15.6 (aarch64 x86_64 i586) * xen-devel-4.18.5_08-150600.3.34.2 * xen-libs-debuginfo-4.18.5_08-150600.3.34.2 * xen-tools-domU-debuginfo-4.18.5_08-150600.3.34.2 * xen-tools-domU-4.18.5_08-150600.3.34.2 * xen-debugsource-4.18.5_08-150600.3.34.2 * xen-libs-4.18.5_08-150600.3.34.2 * openSUSE Leap 15.6 (x86_64) * xen-libs-32bit-debuginfo-4.18.5_08-150600.3.34.2 * xen-libs-32bit-4.18.5_08-150600.3.34.2 * openSUSE Leap 15.6 (aarch64 x86_64) * xen-4.18.5_08-150600.3.34.2 * xen-doc-html-4.18.5_08-150600.3.34.2 * xen-tools-debuginfo-4.18.5_08-150600.3.34.2 * xen-tools-4.18.5_08-150600.3.34.2 * openSUSE Leap 15.6 (noarch) * xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2 * openSUSE Leap 15.6 (aarch64_ilp32) * xen-libs-64bit-4.18.5_08-150600.3.34.2 * xen-libs-64bit-debuginfo-4.18.5_08-150600.3.34.2 * Basesystem Module 15-SP6 (x86_64) * xen-libs-debuginfo-4.18.5_08-150600.3.34.2 * xen-tools-domU-debuginfo-4.18.5_08-150600.3.34.2 * xen-tools-domU-4.18.5_08-150600.3.34.2 * xen-debugsource-4.18.5_08-150600.3.34.2 * xen-libs-4.18.5_08-150600.3.34.2 * Server Applications Module 15-SP6 (x86_64) * xen-4.18.5_08-150600.3.34.2 * xen-devel-4.18.5_08-150600.3.34.2 * xen-debugsource-4.18.5_08-150600.3.34.2 * xen-tools-debuginfo-4.18.5_08-150600.3.34.2 * xen-tools-4.18.5_08-150600.3.34.2 * Server Applications Module 15-SP6 (noarch) * xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2 * SUSE Linux Enterprise Server 15 SP6 LTSS (x86_64) * xen-4.18.5_08-150600.3.34.2 * xen-devel-4.18.5_08-150600.3.34.2 * xen-libs-debuginfo-4.18.5_08-150600.3.34.2 * xen-tools-domU-debuginfo-4.18.5_08-150600.3.34.2 * xen-tools-domU-4.18.5_08-150600.3.34.2 * xen-debugsource-4.18.5_08-150600.3.34.2 * xen-libs-4.18.5_08-150600.3.34.2 * xen-tools-debuginfo-4.18.5_08-150600.3.34.2 * xen-tools-4.18.5_08-150600.3.34.2 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64) * xen-4.18.5_08-150600.3.34.2 * xen-devel-4.18.5_08-150600.3.34.2 * xen-libs-debuginfo-4.18.5_08-150600.3.34.2 * xen-tools-domU-debuginfo-4.18.5_08-150600.3.34.2 * xen-tools-domU-4.18.5_08-150600.3.34.2 * xen-debugsource-4.18.5_08-150600.3.34.2 * xen-libs-4.18.5_08-150600.3.34.2 * xen-tools-debuginfo-4.18.5_08-150600.3.34.2 * xen-tools-4.18.5_08-150600.3.34.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * xen-tools-xendomains-wait-disk-4.18.5_08-150600.3.34.2 ## References: * https://www.suse.com/security/cve/CVE-2025-27466.html * https://www.suse.com/security/cve/CVE-2025-58142.html * https://www.suse.com/security/cve/CVE-2025-58143.html * https://www.suse.com/security/cve/CVE-2025-58147.html * https://www.suse.com/security/cve/CVE-2025-58148.html * https://www.suse.com/security/cve/CVE-2025-58149.html * https://bugzilla.suse.com/show_bug.cgi?id=1027519 * https://bugzilla.suse.com/show_bug.cgi?id=1248807 * https://bugzilla.suse.com/show_bug.cgi?id=1251271 * https://bugzilla.suse.com/show_bug.cgi?id=1252692 * https://bugzilla.suse.com/show_bug.cgi?id=1254180 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 16:31:09 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 16:31:09 -0000 Subject: SUSE-SU-2026:0011-1: important: Security update for ImageMagick Message-ID: <176763066906.22147.14752609272171454150@smelt2.prg2.suse.org> # Security update for ImageMagick Announcement ID: SUSE-SU-2026:0011-1 Release Date: 2026-01-05T10:29:01Z Rating: important References: * bsc#1254435 * bsc#1254820 Cross-References: * CVE-2025-65955 * CVE-2025-66628 CVSS scores: * CVE-2025-65955 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-65955 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-65955 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-65955 ( NVD ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-66628 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-66628 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-66628 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for ImageMagick fixes the following issues: * CVE-2025-65955: possible use-after-free/double-free in `Options::fontFamily` when clearing a family can lead to crashes or memory corruption (bsc#1254435). * CVE-2025-66628: possible integer overflow in the TIM image parser's `ReadTIMImage` function can lead to arbitrary memory disclosure on 32-bit systems (bsc#1254820). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-11=1 openSUSE-SLE-15.6-2026-11=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-11=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-11=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * ImageMagick-config-7-upstream-secure-7.1.1.21-150600.3.32.1 * ImageMagick-extra-debuginfo-7.1.1.21-150600.3.32.1 * ImageMagick-debuginfo-7.1.1.21-150600.3.32.1 * libMagick++-devel-7.1.1.21-150600.3.32.1 * libMagickCore-7_Q16HDRI10-7.1.1.21-150600.3.32.1 * ImageMagick-config-7-upstream-open-7.1.1.21-150600.3.32.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.1.21-150600.3.32.1 * libMagickWand-7_Q16HDRI10-7.1.1.21-150600.3.32.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.32.1 * ImageMagick-config-7-upstream-websafe-7.1.1.21-150600.3.32.1 * ImageMagick-config-7-upstream-limited-7.1.1.21-150600.3.32.1 * ImageMagick-config-7-SUSE-7.1.1.21-150600.3.32.1 * ImageMagick-devel-7.1.1.21-150600.3.32.1 * ImageMagick-extra-7.1.1.21-150600.3.32.1 * libMagick++-7_Q16HDRI5-7.1.1.21-150600.3.32.1 * ImageMagick-debugsource-7.1.1.21-150600.3.32.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.32.1 * perl-PerlMagick-debuginfo-7.1.1.21-150600.3.32.1 * perl-PerlMagick-7.1.1.21-150600.3.32.1 * ImageMagick-7.1.1.21-150600.3.32.1 * openSUSE Leap 15.6 (x86_64) * libMagick++-devel-32bit-7.1.1.21-150600.3.32.1 * libMagickCore-7_Q16HDRI10-32bit-debuginfo-7.1.1.21-150600.3.32.1 * libMagick++-7_Q16HDRI5-32bit-debuginfo-7.1.1.21-150600.3.32.1 * ImageMagick-devel-32bit-7.1.1.21-150600.3.32.1 * libMagickWand-7_Q16HDRI10-32bit-debuginfo-7.1.1.21-150600.3.32.1 * libMagickCore-7_Q16HDRI10-32bit-7.1.1.21-150600.3.32.1 * libMagickWand-7_Q16HDRI10-32bit-7.1.1.21-150600.3.32.1 * libMagick++-7_Q16HDRI5-32bit-7.1.1.21-150600.3.32.1 * openSUSE Leap 15.6 (noarch) * ImageMagick-doc-7.1.1.21-150600.3.32.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libMagick++-7_Q16HDRI5-64bit-debuginfo-7.1.1.21-150600.3.32.1 * libMagickCore-7_Q16HDRI10-64bit-7.1.1.21-150600.3.32.1 * libMagick++-7_Q16HDRI5-64bit-7.1.1.21-150600.3.32.1 * libMagick++-devel-64bit-7.1.1.21-150600.3.32.1 * libMagickCore-7_Q16HDRI10-64bit-debuginfo-7.1.1.21-150600.3.32.1 * ImageMagick-devel-64bit-7.1.1.21-150600.3.32.1 * libMagickWand-7_Q16HDRI10-64bit-7.1.1.21-150600.3.32.1 * libMagickWand-7_Q16HDRI10-64bit-debuginfo-7.1.1.21-150600.3.32.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * ImageMagick-config-7-upstream-secure-7.1.1.21-150600.3.32.1 * ImageMagick-debuginfo-7.1.1.21-150600.3.32.1 * libMagick++-devel-7.1.1.21-150600.3.32.1 * libMagickCore-7_Q16HDRI10-7.1.1.21-150600.3.32.1 * ImageMagick-config-7-upstream-open-7.1.1.21-150600.3.32.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.1.21-150600.3.32.1 * libMagickWand-7_Q16HDRI10-7.1.1.21-150600.3.32.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.32.1 * ImageMagick-config-7-upstream-websafe-7.1.1.21-150600.3.32.1 * ImageMagick-config-7-upstream-limited-7.1.1.21-150600.3.32.1 * ImageMagick-config-7-SUSE-7.1.1.21-150600.3.32.1 * ImageMagick-devel-7.1.1.21-150600.3.32.1 * libMagick++-7_Q16HDRI5-7.1.1.21-150600.3.32.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.32.1 * ImageMagick-debugsource-7.1.1.21-150600.3.32.1 * perl-PerlMagick-debuginfo-7.1.1.21-150600.3.32.1 * perl-PerlMagick-7.1.1.21-150600.3.32.1 * ImageMagick-7.1.1.21-150600.3.32.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * ImageMagick-config-7-upstream-secure-7.1.1.21-150600.3.32.1 * ImageMagick-debuginfo-7.1.1.21-150600.3.32.1 * libMagick++-devel-7.1.1.21-150600.3.32.1 * libMagickCore-7_Q16HDRI10-7.1.1.21-150600.3.32.1 * ImageMagick-config-7-upstream-open-7.1.1.21-150600.3.32.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.1.21-150600.3.32.1 * libMagickWand-7_Q16HDRI10-7.1.1.21-150600.3.32.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.32.1 * ImageMagick-config-7-upstream-websafe-7.1.1.21-150600.3.32.1 * ImageMagick-config-7-upstream-limited-7.1.1.21-150600.3.32.1 * ImageMagick-config-7-SUSE-7.1.1.21-150600.3.32.1 * ImageMagick-devel-7.1.1.21-150600.3.32.1 * libMagick++-7_Q16HDRI5-7.1.1.21-150600.3.32.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.32.1 * ImageMagick-debugsource-7.1.1.21-150600.3.32.1 * perl-PerlMagick-debuginfo-7.1.1.21-150600.3.32.1 * perl-PerlMagick-7.1.1.21-150600.3.32.1 * ImageMagick-7.1.1.21-150600.3.32.1 ## References: * https://www.suse.com/security/cve/CVE-2025-65955.html * https://www.suse.com/security/cve/CVE-2025-66628.html * https://bugzilla.suse.com/show_bug.cgi?id=1254435 * https://bugzilla.suse.com/show_bug.cgi?id=1254820 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 16:31:13 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 16:31:13 -0000 Subject: SUSE-SU-2026:0010-1: important: Security update for python-tornado6 Message-ID: <176763067320.22147.5420555716019437804@smelt2.prg2.suse.org> # Security update for python-tornado6 Announcement ID: SUSE-SU-2026:0010-1 Release Date: 2026-01-05T10:27:06Z Rating: important References: * bsc#1254903 * bsc#1254904 * bsc#1254905 Cross-References: * CVE-2025-67724 * CVE-2025-67725 * CVE-2025-67726 CVSS scores: * CVE-2025-67724 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-67724 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-67724 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-67724 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-67725 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-67725 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67725 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67726 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-67726 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67726 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for python-tornado6 fixes the following issues: * CVE-2025-67724: unescaped `reason` argument used in HTTP headers and in HTML default error pages can be used by attackers to launch header injection or XSS attacks (bsc#1254903). * CVE-2025-67725: quadratic complexity of string concatenation operations used by the `HTTPHeaders.add` method can lead to DoS when processing a maliciously crafted HTTP request (bsc#1254905). * CVE-2025-67726: quadratic complexity algorithm used in the `_parseparam` function of `httputil.py` can lead to DoS when processing maliciously crafted parameters in a `Content-Disposition` header (bsc#1254904). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-10=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-10=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-10=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-10=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-10=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-10=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-10=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-10=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-10=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-10=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-10=1 * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-10=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-10=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * python311-tornado6-6.3.2-150400.9.12.1 * python-tornado6-debugsource-6.3.2-150400.9.12.1 * python311-tornado6-debuginfo-6.3.2-150400.9.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * python311-tornado6-6.3.2-150400.9.12.1 * python-tornado6-debugsource-6.3.2-150400.9.12.1 * python311-tornado6-debuginfo-6.3.2-150400.9.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * python311-tornado6-6.3.2-150400.9.12.1 * python-tornado6-debugsource-6.3.2-150400.9.12.1 * python311-tornado6-debuginfo-6.3.2-150400.9.12.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * python311-tornado6-6.3.2-150400.9.12.1 * python-tornado6-debugsource-6.3.2-150400.9.12.1 * python311-tornado6-debuginfo-6.3.2-150400.9.12.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * python311-tornado6-6.3.2-150400.9.12.1 * python-tornado6-debugsource-6.3.2-150400.9.12.1 * python311-tornado6-debuginfo-6.3.2-150400.9.12.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * python311-tornado6-6.3.2-150400.9.12.1 * python-tornado6-debugsource-6.3.2-150400.9.12.1 * python311-tornado6-debuginfo-6.3.2-150400.9.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * python311-tornado6-6.3.2-150400.9.12.1 * python-tornado6-debugsource-6.3.2-150400.9.12.1 * python311-tornado6-debuginfo-6.3.2-150400.9.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * python311-tornado6-6.3.2-150400.9.12.1 * python-tornado6-debugsource-6.3.2-150400.9.12.1 * python311-tornado6-debuginfo-6.3.2-150400.9.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * python311-tornado6-6.3.2-150400.9.12.1 * python-tornado6-debugsource-6.3.2-150400.9.12.1 * python311-tornado6-debuginfo-6.3.2-150400.9.12.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python311-tornado6-6.3.2-150400.9.12.1 * python-tornado6-debugsource-6.3.2-150400.9.12.1 * python311-tornado6-debuginfo-6.3.2-150400.9.12.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python311-tornado6-6.3.2-150400.9.12.1 * python-tornado6-debugsource-6.3.2-150400.9.12.1 * python311-tornado6-debuginfo-6.3.2-150400.9.12.1 * Python 3 Module 15-SP7 (aarch64 ppc64le s390x x86_64) * python311-tornado6-6.3.2-150400.9.12.1 * python-tornado6-debugsource-6.3.2-150400.9.12.1 * python311-tornado6-debuginfo-6.3.2-150400.9.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * python311-tornado6-6.3.2-150400.9.12.1 * python-tornado6-debugsource-6.3.2-150400.9.12.1 * python311-tornado6-debuginfo-6.3.2-150400.9.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-67724.html * https://www.suse.com/security/cve/CVE-2025-67725.html * https://www.suse.com/security/cve/CVE-2025-67726.html * https://bugzilla.suse.com/show_bug.cgi?id=1254903 * https://bugzilla.suse.com/show_bug.cgi?id=1254904 * https://bugzilla.suse.com/show_bug.cgi?id=1254905 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 16:31:14 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 16:31:14 -0000 Subject: SUSE-RU-2026:0008-1: moderate: Recommended update for RT packages Message-ID: <176763067496.22147.15647372493739854846@smelt2.prg2.suse.org> # Recommended update for RT packages Announcement ID: SUSE-RU-2026:0008-1 Release Date: 2026-01-05T09:19:11Z Rating: moderate References: * jsc#MSC-1095 Affected Products: * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Real Time Module 15-SP7 An update that contains one feature can now be installed. ## Description: This update rereleases some RT documentation and meta packages to sync them with quarterly updates. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Real Time Module 15-SP7 zypper in -t patch SUSE-SLE-Module-RT-15-SP7-2026-8=1 * SUSE Linux Enterprise Real Time 15 SP7 zypper in -t patch SUSE-SLE-Product-RT-15-SP7-2026-8=1 ## Package List: * SUSE Real Time Module 15-SP7 (noarch) * sle-rt-virtguide_en-15.7-150700.3.2.1 * sle-rt-quick_en-15.7-150700.3.2.1 * release-notes-sle_rt-15.7.20250217-150700.3.2.1 * sle-rt-hw_en-15.7-150700.3.2.1 * sle-rt-shielding_en-15.7-150700.3.2.1 * SUSE Real Time Module 15-SP7 (x86_64) * sle-module-rt-release-15.7-150700.12.1 * SUSE Linux Enterprise Real Time 15 SP7 (x86_64) * SLE_RT-release-15.7-150700.12.1 * SUSE Linux Enterprise Real Time 15 SP7 (noarch) * release-notes-sle_rt-15.7.20250217-150700.3.2.1 ## References: * https://jira.suse.com/browse/MSC-1095 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 20:30:10 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 20:30:10 -0000 Subject: SUSE-SU-2026:0029-1: important: Security update for the Linux Kernel Message-ID: <176764501061.22173.1327324014907859431@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:0029-1 Release Date: 2026-01-05T12:59:55Z Rating: important References: * bsc#1249806 * bsc#1251786 * bsc#1252033 * bsc#1252267 * bsc#1252780 * bsc#1252862 * bsc#1253367 * bsc#1253431 * bsc#1253436 Cross-References: * CVE-2022-50280 * CVE-2023-53676 * CVE-2025-39967 * CVE-2025-40040 * CVE-2025-40048 * CVE-2025-40121 * CVE-2025-40154 * CVE-2025-40204 CVSS scores: * CVE-2022-50280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50280 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39967 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39967 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40040 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40121 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40121 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40154 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40154 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Availability Extension 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves eight vulnerabilities and has one security fix can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-50280: pnode: terminate at peers of source (bsc#1249806). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786). * CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780). * CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862). * CVE-2025-40121: ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping (bsc#1253367). * CVE-2025-40154: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (bsc#1253431). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436). * CVE-2025-39967: fbcon: fix integer overflow in fbcon_do_set_font (bsc#1252033) The following non-security bugs were fixed: * scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2026-29=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-29=1 Please note that this is the initial kernel livepatch without fixes itself, this package is later updated by separate standalone kernel livepatch updates. * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-29=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-29=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-29=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-29=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-29=1 * SUSE Linux Enterprise High Availability Extension 15 SP4 zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2026-29=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-29=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-29=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-29=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-29=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2026-29=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2026-29=1 ## Package List: * SUSE Manager Server 4.3 LTS (nosrc ppc64le s390x x86_64) * kernel-default-5.14.21-150400.24.187.3 * SUSE Manager Server 4.3 LTS (ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.187.3.150400.24.96.3 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * kernel-syms-5.14.21-150400.24.187.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.187.3 * kernel-default-debuginfo-5.14.21-150400.24.187.3 * kernel-default-devel-5.14.21-150400.24.187.3 * kernel-default-debugsource-5.14.21-150400.24.187.3 * SUSE Manager Server 4.3 LTS (noarch) * kernel-macros-5.14.21-150400.24.187.3 * kernel-source-5.14.21-150400.24.187.3 * kernel-devel-5.14.21-150400.24.187.3 * SUSE Manager Server 4.3 LTS (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.187.3 * SUSE Manager Server 4.3 LTS (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.187.3 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.187.3 * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) * kernel-default-5.14.21-150400.24.187.3 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-default-debuginfo-5.14.21-150400.24.187.3 * kernel-livepatch-SLE15-SP4_Update_47-debugsource-1-150400.9.3.3 * kernel-default-livepatch-5.14.21-150400.24.187.3 * kernel-livepatch-5_14_21-150400_24_187-default-debuginfo-1-150400.9.3.3 * kernel-livepatch-5_14_21-150400_24_187-default-1-150400.9.3.3 * kernel-default-debugsource-5.14.21-150400.24.187.3 * kernel-default-livepatch-devel-5.14.21-150400.24.187.3 * openSUSE Leap 15.4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.187.1 * openSUSE Leap 15.4 (noarch) * kernel-devel-5.14.21-150400.24.187.3 * kernel-source-5.14.21-150400.24.187.3 * kernel-docs-html-5.14.21-150400.24.187.1 * kernel-source-vanilla-5.14.21-150400.24.187.3 * kernel-macros-5.14.21-150400.24.187.3 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * kernel-kvmsmall-debugsource-5.14.21-150400.24.187.3 * kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.187.3 * kernel-default-base-5.14.21-150400.24.187.3.150400.24.96.3 * kernel-default-base-rebuild-5.14.21-150400.24.187.3.150400.24.96.3 * kernel-kvmsmall-debuginfo-5.14.21-150400.24.187.3 * kernel-kvmsmall-devel-5.14.21-150400.24.187.3 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * kselftests-kmp-default-debuginfo-5.14.21-150400.24.187.3 * ocfs2-kmp-default-5.14.21-150400.24.187.3 * kernel-default-extra-5.14.21-150400.24.187.3 * kernel-default-devel-5.14.21-150400.24.187.3 * dlm-kmp-default-debuginfo-5.14.21-150400.24.187.3 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.187.3 * reiserfs-kmp-default-5.14.21-150400.24.187.3 * kernel-default-optional-5.14.21-150400.24.187.3 * dlm-kmp-default-5.14.21-150400.24.187.3 * kernel-obs-build-debugsource-5.14.21-150400.24.187.3 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.187.3 * kernel-default-extra-debuginfo-5.14.21-150400.24.187.3 * kernel-obs-qa-5.14.21-150400.24.187.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.187.3 * kernel-default-debuginfo-5.14.21-150400.24.187.3 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.187.3 * gfs2-kmp-default-5.14.21-150400.24.187.3 * kselftests-kmp-default-5.14.21-150400.24.187.3 * kernel-default-optional-debuginfo-5.14.21-150400.24.187.3 * cluster-md-kmp-default-5.14.21-150400.24.187.3 * kernel-syms-5.14.21-150400.24.187.1 * kernel-default-livepatch-5.14.21-150400.24.187.3 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.187.3 * kernel-obs-build-5.14.21-150400.24.187.3 * kernel-default-debugsource-5.14.21-150400.24.187.3 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.187.3 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_47-debugsource-1-150400.9.3.3 * kernel-default-livepatch-devel-5.14.21-150400.24.187.3 * kernel-livepatch-5_14_21-150400_24_187-default-debuginfo-1-150400.9.3.3 * kernel-livepatch-5_14_21-150400_24_187-default-1-150400.9.3.3 * openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-5.14.21-150400.24.187.3 * openSUSE Leap 15.4 (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.187.3 * openSUSE Leap 15.4 (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.187.3 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.187.3 * openSUSE Leap 15.4 (nosrc) * dtb-aarch64-5.14.21-150400.24.187.1 * openSUSE Leap 15.4 (aarch64) * dlm-kmp-64kb-5.14.21-150400.24.187.3 * cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.187.3 * dtb-cavium-5.14.21-150400.24.187.1 * reiserfs-kmp-64kb-5.14.21-150400.24.187.3 * dtb-renesas-5.14.21-150400.24.187.1 * dtb-socionext-5.14.21-150400.24.187.1 * dtb-amlogic-5.14.21-150400.24.187.1 * reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.187.3 * dtb-hisilicon-5.14.21-150400.24.187.1 * gfs2-kmp-64kb-5.14.21-150400.24.187.3 * kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.187.3 * dtb-xilinx-5.14.21-150400.24.187.1 * kernel-64kb-optional-5.14.21-150400.24.187.3 * dtb-altera-5.14.21-150400.24.187.1 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.187.3 * dtb-sprd-5.14.21-150400.24.187.1 * kernel-64kb-devel-5.14.21-150400.24.187.3 * kernel-64kb-extra-5.14.21-150400.24.187.3 * dtb-arm-5.14.21-150400.24.187.1 * kernel-64kb-extra-debuginfo-5.14.21-150400.24.187.3 * dtb-broadcom-5.14.21-150400.24.187.1 * dtb-marvell-5.14.21-150400.24.187.1 * dlm-kmp-64kb-debuginfo-5.14.21-150400.24.187.3 * kselftests-kmp-64kb-5.14.21-150400.24.187.3 * ocfs2-kmp-64kb-5.14.21-150400.24.187.3 * dtb-amazon-5.14.21-150400.24.187.1 * dtb-amd-5.14.21-150400.24.187.1 * dtb-apm-5.14.21-150400.24.187.1 * dtb-allwinner-5.14.21-150400.24.187.1 * dtb-freescale-5.14.21-150400.24.187.1 * gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.187.3 * dtb-apple-5.14.21-150400.24.187.1 * kernel-64kb-optional-debuginfo-5.14.21-150400.24.187.3 * kernel-64kb-debuginfo-5.14.21-150400.24.187.3 * dtb-lg-5.14.21-150400.24.187.1 * dtb-exynos-5.14.21-150400.24.187.1 * dtb-mediatek-5.14.21-150400.24.187.1 * dtb-nvidia-5.14.21-150400.24.187.1 * kernel-64kb-debugsource-5.14.21-150400.24.187.3 * dtb-qcom-5.14.21-150400.24.187.1 * ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.187.3 * cluster-md-kmp-64kb-5.14.21-150400.24.187.3 * dtb-rockchip-5.14.21-150400.24.187.1 * openSUSE Leap 15.4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.187.3 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.187.3 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.187.3.150400.24.96.3 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.187.3 * kernel-default-debuginfo-5.14.21-150400.24.187.3 * SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.187.3 * SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.187.3.150400.24.96.3 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.187.3 * kernel-default-debuginfo-5.14.21-150400.24.187.3 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.187.3 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.187.3.150400.24.96.3 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.187.3 * kernel-default-debuginfo-5.14.21-150400.24.187.3 * SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64) * kernel-default-5.14.21-150400.24.187.3 * SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64) * kernel-default-base-5.14.21-150400.24.187.3.150400.24.96.3 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * kernel-default-debugsource-5.14.21-150400.24.187.3 * kernel-default-debuginfo-5.14.21-150400.24.187.3 * SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le s390x x86_64) * dlm-kmp-default-debuginfo-5.14.21-150400.24.187.3 * cluster-md-kmp-default-debuginfo-5.14.21-150400.24.187.3 * ocfs2-kmp-default-debuginfo-5.14.21-150400.24.187.3 * cluster-md-kmp-default-5.14.21-150400.24.187.3 * kernel-default-debuginfo-5.14.21-150400.24.187.3 * ocfs2-kmp-default-5.14.21-150400.24.187.3 * dlm-kmp-default-5.14.21-150400.24.187.3 * gfs2-kmp-default-5.14.21-150400.24.187.3 * gfs2-kmp-default-debuginfo-5.14.21-150400.24.187.3 * kernel-default-debugsource-5.14.21-150400.24.187.3 * SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc) * kernel-default-5.14.21-150400.24.187.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.187.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * kernel-64kb-debugsource-5.14.21-150400.24.187.3 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.187.3 * kernel-64kb-devel-5.14.21-150400.24.187.3 * kernel-64kb-debuginfo-5.14.21-150400.24.187.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.187.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-5.14.21-150400.24.187.3 * kernel-syms-5.14.21-150400.24.187.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.187.3 * kernel-default-base-5.14.21-150400.24.187.3.150400.24.96.3 * kernel-default-debuginfo-5.14.21-150400.24.187.3 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.187.3 * kernel-obs-build-5.14.21-150400.24.187.3 * kernel-default-devel-5.14.21-150400.24.187.3 * kernel-default-debugsource-5.14.21-150400.24.187.3 * kernel-obs-build-debugsource-5.14.21-150400.24.187.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * kernel-macros-5.14.21-150400.24.187.3 * kernel-source-5.14.21-150400.24.187.3 * kernel-devel-5.14.21-150400.24.187.3 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.187.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.187.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * kernel-64kb-debugsource-5.14.21-150400.24.187.3 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.187.3 * kernel-64kb-devel-5.14.21-150400.24.187.3 * kernel-64kb-debuginfo-5.14.21-150400.24.187.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc x86_64) * kernel-default-5.14.21-150400.24.187.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * reiserfs-kmp-default-5.14.21-150400.24.187.3 * kernel-syms-5.14.21-150400.24.187.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.187.3 * kernel-default-base-5.14.21-150400.24.187.3.150400.24.96.3 * kernel-default-debuginfo-5.14.21-150400.24.187.3 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.187.3 * kernel-obs-build-5.14.21-150400.24.187.3 * kernel-default-devel-5.14.21-150400.24.187.3 * kernel-default-debugsource-5.14.21-150400.24.187.3 * kernel-obs-build-debugsource-5.14.21-150400.24.187.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * kernel-macros-5.14.21-150400.24.187.3 * kernel-source-5.14.21-150400.24.187.3 * kernel-devel-5.14.21-150400.24.187.3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.187.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 nosrc) * kernel-64kb-5.14.21-150400.24.187.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64) * kernel-64kb-debugsource-5.14.21-150400.24.187.3 * kernel-64kb-devel-debuginfo-5.14.21-150400.24.187.3 * kernel-64kb-devel-5.14.21-150400.24.187.3 * kernel-64kb-debuginfo-5.14.21-150400.24.187.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-5.14.21-150400.24.187.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64) * kernel-default-base-5.14.21-150400.24.187.3.150400.24.96.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * reiserfs-kmp-default-5.14.21-150400.24.187.3 * kernel-syms-5.14.21-150400.24.187.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.187.3 * kernel-default-debuginfo-5.14.21-150400.24.187.3 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.187.3 * kernel-obs-build-5.14.21-150400.24.187.3 * kernel-default-devel-5.14.21-150400.24.187.3 * kernel-default-debugsource-5.14.21-150400.24.187.3 * kernel-obs-build-debugsource-5.14.21-150400.24.187.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * kernel-macros-5.14.21-150400.24.187.3 * kernel-source-5.14.21-150400.24.187.3 * kernel-devel-5.14.21-150400.24.187.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch nosrc) * kernel-docs-5.14.21-150400.24.187.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc s390x) * kernel-zfcpdump-5.14.21-150400.24.187.3 * SUSE Linux Enterprise Server 15 SP4 LTSS (s390x) * kernel-zfcpdump-debugsource-5.14.21-150400.24.187.3 * kernel-zfcpdump-debuginfo-5.14.21-150400.24.187.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le x86_64) * kernel-default-5.14.21-150400.24.187.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * reiserfs-kmp-default-5.14.21-150400.24.187.3 * kernel-syms-5.14.21-150400.24.187.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.187.3 * kernel-default-base-5.14.21-150400.24.187.3.150400.24.96.3 * kernel-default-debuginfo-5.14.21-150400.24.187.3 * reiserfs-kmp-default-debuginfo-5.14.21-150400.24.187.3 * kernel-obs-build-5.14.21-150400.24.187.3 * kernel-default-devel-5.14.21-150400.24.187.3 * kernel-default-debugsource-5.14.21-150400.24.187.3 * kernel-obs-build-debugsource-5.14.21-150400.24.187.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * kernel-macros-5.14.21-150400.24.187.3 * kernel-source-5.14.21-150400.24.187.3 * kernel-devel-5.14.21-150400.24.187.3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc) * kernel-docs-5.14.21-150400.24.187.1 * SUSE Manager Proxy 4.3 LTS (nosrc x86_64) * kernel-default-5.14.21-150400.24.187.3 * SUSE Manager Proxy 4.3 LTS (x86_64) * kernel-syms-5.14.21-150400.24.187.1 * kernel-default-devel-debuginfo-5.14.21-150400.24.187.3 * kernel-default-base-5.14.21-150400.24.187.3.150400.24.96.3 * kernel-default-debuginfo-5.14.21-150400.24.187.3 * kernel-default-devel-5.14.21-150400.24.187.3 * kernel-default-debugsource-5.14.21-150400.24.187.3 * SUSE Manager Proxy 4.3 LTS (noarch) * kernel-macros-5.14.21-150400.24.187.3 * kernel-source-5.14.21-150400.24.187.3 * kernel-devel-5.14.21-150400.24.187.3 * SUSE Manager Retail Branch Server 4.3 LTS (nosrc x86_64) * kernel-default-5.14.21-150400.24.187.3 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * kernel-default-devel-debuginfo-5.14.21-150400.24.187.3 * kernel-default-base-5.14.21-150400.24.187.3.150400.24.96.3 * kernel-default-debuginfo-5.14.21-150400.24.187.3 * kernel-default-devel-5.14.21-150400.24.187.3 * kernel-default-debugsource-5.14.21-150400.24.187.3 * SUSE Manager Retail Branch Server 4.3 LTS (noarch) * kernel-macros-5.14.21-150400.24.187.3 * kernel-devel-5.14.21-150400.24.187.3 ## References: * https://www.suse.com/security/cve/CVE-2022-50280.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-39967.html * https://www.suse.com/security/cve/CVE-2025-40040.html * https://www.suse.com/security/cve/CVE-2025-40048.html * https://www.suse.com/security/cve/CVE-2025-40121.html * https://www.suse.com/security/cve/CVE-2025-40154.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1249806 * https://bugzilla.suse.com/show_bug.cgi?id=1251786 * https://bugzilla.suse.com/show_bug.cgi?id=1252033 * https://bugzilla.suse.com/show_bug.cgi?id=1252267 * https://bugzilla.suse.com/show_bug.cgi?id=1252780 * https://bugzilla.suse.com/show_bug.cgi?id=1252862 * https://bugzilla.suse.com/show_bug.cgi?id=1253367 * https://bugzilla.suse.com/show_bug.cgi?id=1253431 * https://bugzilla.suse.com/show_bug.cgi?id=1253436 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 20:30:15 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 20:30:15 -0000 Subject: SUSE-SU-2026:0028-1: important: Security update for alloy Message-ID: <176764501525.22173.13461229332410329068@smelt2.prg2.suse.org> # Security update for alloy Announcement ID: SUSE-SU-2026:0028-1 Release Date: 2026-01-05T12:53:12Z Rating: important References: * bsc#1251509 * bsc#1251716 * bsc#1253609 Cross-References: * CVE-2025-47911 * CVE-2025-47913 * CVE-2025-58190 CVSS scores: * CVE-2025-47911 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-47911 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-47913 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-47913 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47913 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-58190 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-58190 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for alloy fixes the following issues: Upgrade to version 1.12.1. Security issues fixed: * CVE-2025-47911: golang.org/x/net/html: quadratic complexity algorithms used when parsing untrusted HTML documents (bsc#1251509). * CVE-2025-47913: golang.org/x/crypto: early client process termination when receiving an unexpected message type in response to a key listing or signing request (bsc#1253609). * CVE-2025-58190: golang.org/x/net/html: excessive memory consumption by `html.ParseFragment` when processing specially crafted input (bsc#1251716). Other updates and bugfixes: * Version 1.12.1: * Bugfixes * update to Beyla 2.7.10. * Version 1.12.0: * Breaking changes * `prometheus.exporter.blackbox`, `prometheus.exporter.snmp` and `prometheus.exporter.statsd` now use the component ID instead of the hostname as their instance label in their exported metrics. * Features * (Experimental) Add an `otelcol.receiver.cloudflare` component to receive logs pushed by Cloudflare's LogPush jobs. * (Experimental) Additions to experimental `database_observability.mysql` component: * `explain_plans` * collector now changes schema before returning the connection to the pool. * collector now passes queries more permissively. * enable `explain_plans` collector by default * (Experimental) Additions to experimental `database_observability.postgres` component: * `explain_plans` * added the explain plan collector. * collector now passes queries more permissively. * `query_samples` * add user field to wait events within `query_samples` collector. * rework the query samples collector to buffer per-query execution state across scrapes and emit finalized entries. * process turned idle rows to calculate finalization times precisely and emit first seen idle rows. * `query_details` * escape queries coming from `pg_stat_statements` with quotes. * enable `explain_plans` collector by default. * safely generate `server_id` when UDP socket used for database connection. * add table registry and include "validated" in parsed table name logs. * Add `otelcol.exporter.googlecloudpubsub` community component to export metrics, traces, and logs to Google Cloud Pub/Sub topic. * Add `structured_metadata_drop` stage for `loki.process` to filter structured metadata. * Send remote config status to the remote server for the `remotecfg` service. * Send effective config to the remote server for the `remotecfg` service. * Add a `stat_statements` configuration block to the `prometheus.exporter.postgres` component to enable selecting both the query ID and the full SQL statement. The new block includes one option to enable statement selection, and another to configure the maximum length of the statement text. * Add truncate stage for `loki.process` to truncate log entries, label values, and `structured_metadata` values. * Add `u_probe_links` & `load_probe` configuration fields to alloy `pyroscope.ebpf` to extend configuration of the `opentelemetry-ebpf-profiler` to allow uprobe profiling and dynamic probing. * Add `verbose_mode` configuration fields to `alloy pyroscope.ebpf` to be enable `ebpf-profiler` verbose mode. * Add `file_match` block to `loki.source.file` for built-in file discovery using glob patterns. * Add a regex argument to the `structured_metadata` stage in `loki.process` to extract labels matching a regular expression. * OpenTelemetry Collector dependencies upgraded from v0.134.0 to v0.139.0. * See the upstream core and contrib changelogs for more details. * A new `mimir.alerts.kubernetes` component which discovers AlertmanagerConfig Kubernetes resources and loads them into a Mimir instance. * Mark `stage.windowsevent` block in the `loki.process` component as GA. * Enhancements * Add per-application rate limiting with the strategy attribute in the `faro.receiver` component, to prevent one application from consuming the rate limit quota of others. * Add support of tls in components `loki.source.(awsfirehose|gcplog|heroku|api)` and `prometheus.receive_http` and `pyroscope.receive_http`. * Remove `SendSIGKILL=no` from unit files and recommendations. * Reduce memory overhead of `prometheus.remote_write`'s WAL by lowering the size of the allocated series storage. * Reduce lock wait/contention on the `labelstore.LabelStore` by removing unecessary usage from `prometheus.relabel`. * `prometheus.exporter.postgres` dependency has been updated to v0.18.1. * Update Beyla component to 2.7.8. * Support delimiters in `stage.luhn`. * `pyroscope.java`: update `async-profiler` to 4.2. * `prometheus.exporter.unix`: Add an arp config block to configure the ARP collector. * `prometheus.exporter.snowflake` dependency has been updated to 20251016132346-6d442402afb2. * `loki.source.podlogs` now supports `preserve_discovered_labels` parameter to preserve discovered pod metadata labels for use by downstream components. * Rework underlying framework of Alloy UI to use Vite instead of Create React App. * Use POST requests for remote config requests to avoid hitting http2 header limits. * `loki.source.api` during component shutdown will now reject all the inflight requests with status code 503 after `graceful_shutdown_timeout` has expired. * `kubernetes.discovery`: Add support for attaching namespace metadata. * Add `meta_cache_address` to `beyla.ebpf` component. * Bugfixes * Stop `loki.source.kubernetes` discarding log lines with duplicate timestamps. * Fix direction of arrows for pyroscope components in UI graph. * Only log EOF errors for syslog port investigations in `loki.source.syslog` as Debug, not Warn. * Fix `prometheus.exporter.process` ignoring the `remove_empty_groups` argument. * Fix issues with "unknown series ref when trying to add exemplar" from `prometheus.remote_write` by allowing series ref links to be updated if they change. * Fix `loki.source.podlogs` component to register the Kubernetes field index for `spec.nodeName` when node filtering is enabled, preventing "Index with name `field:spec.nodeName` does not exist" errors. * Fix issue in `loki.source.file` where scheduling files could take too long. * Fix `loki.write` no longer includes internal labels __. * Fix missing native histograms custom buckets (NHCB) samples from `prometheus.remote_write`. * `otelcol.receiver.prometheus` now supports mixed histograms if `prometheus.scrape` has `honor_metadata` set to true. * `loki.source.file` has better support for non-UTF-8 encoded files. * Fix the `loki.write` endpoint block's `enable_http2` attribute to actually affect the client. * Optionally remove trailing newlines before appending entries in `stage.multiline`. * `loki.source.api` no longer drops request when relabel rules drops a specific stream. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-28=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * alloy-debuginfo-1.12.1-150700.15.12.1 * alloy-1.12.1-150700.15.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47911.html * https://www.suse.com/security/cve/CVE-2025-47913.html * https://www.suse.com/security/cve/CVE-2025-58190.html * https://bugzilla.suse.com/show_bug.cgi?id=1251509 * https://bugzilla.suse.com/show_bug.cgi?id=1251716 * https://bugzilla.suse.com/show_bug.cgi?id=1253609 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 20:30:18 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 20:30:18 -0000 Subject: SUSE-SU-2026:0027-1: moderate: Security update for python3 Message-ID: <176764501897.22173.546244747866350208@smelt2.prg2.suse.org> # Security update for python3 Announcement ID: SUSE-SU-2026:0027-1 Release Date: 2026-01-05T12:50:14Z Rating: moderate References: * bsc#1254400 * bsc#1254401 * bsc#1254997 Cross-References: * CVE-2025-12084 * CVE-2025-13836 * CVE-2025-13837 CVSS scores: * CVE-2025-12084 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-12084 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-12084 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-12084 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-13836 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13836 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-13836 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13836 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2025-13837 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13837 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-13837 ( NVD ): 2.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * Basesystem Module 15-SP7 * Development Tools Module 15-SP7 * openSUSE Leap 15.3 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for python3 fixes the following issues: * CVE-2025-12084: cpython: Fixed quadratic algorithm in xml.dom.minidom leading to denial of service (bsc#1254997) * CVE-2025-13836: Fixed default Content-Lenght read amount from HTTP response (bsc#1254400) * CVE-2025-13837: Fixed plistlib module denial of service (bsc#1254401) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2026-27=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-27=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-27=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-27=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-27=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-27=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-27=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-27=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-27=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-27=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-27=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * python3-dbm-3.6.15-150300.10.103.1 * python3-doc-3.6.15-150300.10.103.1 * python3-debugsource-3.6.15-150300.10.103.1 * python3-devel-debuginfo-3.6.15-150300.10.103.1 * python3-core-debugsource-3.6.15-150300.10.103.1 * python3-base-debuginfo-3.6.15-150300.10.103.1 * python3-dbm-debuginfo-3.6.15-150300.10.103.1 * python3-testsuite-3.6.15-150300.10.103.1 * python3-tools-3.6.15-150300.10.103.1 * python3-testsuite-debuginfo-3.6.15-150300.10.103.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.103.1 * python3-devel-3.6.15-150300.10.103.1 * python3-idle-3.6.15-150300.10.103.1 * python3-3.6.15-150300.10.103.1 * python3-base-3.6.15-150300.10.103.1 * python3-debuginfo-3.6.15-150300.10.103.1 * python3-tk-debuginfo-3.6.15-150300.10.103.1 * python3-doc-devhelp-3.6.15-150300.10.103.1 * python3-curses-3.6.15-150300.10.103.1 * python3-tk-3.6.15-150300.10.103.1 * python3-curses-debuginfo-3.6.15-150300.10.103.1 * libpython3_6m1_0-3.6.15-150300.10.103.1 * openSUSE Leap 15.3 (x86_64) * libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.103.1 * libpython3_6m1_0-32bit-3.6.15-150300.10.103.1 * openSUSE Leap 15.3 (aarch64_ilp32) * libpython3_6m1_0-64bit-3.6.15-150300.10.103.1 * libpython3_6m1_0-64bit-debuginfo-3.6.15-150300.10.103.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python3-dbm-3.6.15-150300.10.103.1 * python3-doc-3.6.15-150300.10.103.1 * python3-debugsource-3.6.15-150300.10.103.1 * python3-devel-debuginfo-3.6.15-150300.10.103.1 * python3-core-debugsource-3.6.15-150300.10.103.1 * python3-base-debuginfo-3.6.15-150300.10.103.1 * python3-dbm-debuginfo-3.6.15-150300.10.103.1 * python3-testsuite-3.6.15-150300.10.103.1 * python3-tools-3.6.15-150300.10.103.1 * python3-testsuite-debuginfo-3.6.15-150300.10.103.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.103.1 * python3-devel-3.6.15-150300.10.103.1 * python3-idle-3.6.15-150300.10.103.1 * python3-3.6.15-150300.10.103.1 * python3-base-3.6.15-150300.10.103.1 * python3-debuginfo-3.6.15-150300.10.103.1 * python3-tk-debuginfo-3.6.15-150300.10.103.1 * python3-doc-devhelp-3.6.15-150300.10.103.1 * python3-curses-3.6.15-150300.10.103.1 * python3-tk-3.6.15-150300.10.103.1 * python3-curses-debuginfo-3.6.15-150300.10.103.1 * libpython3_6m1_0-3.6.15-150300.10.103.1 * openSUSE Leap 15.6 (x86_64) * libpython3_6m1_0-32bit-debuginfo-3.6.15-150300.10.103.1 * libpython3_6m1_0-32bit-3.6.15-150300.10.103.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * python3-3.6.15-150300.10.103.1 * python3-base-debuginfo-3.6.15-150300.10.103.1 * python3-base-3.6.15-150300.10.103.1 * python3-debuginfo-3.6.15-150300.10.103.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.103.1 * python3-debugsource-3.6.15-150300.10.103.1 * python3-core-debugsource-3.6.15-150300.10.103.1 * libpython3_6m1_0-3.6.15-150300.10.103.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * python3-3.6.15-150300.10.103.1 * python3-base-debuginfo-3.6.15-150300.10.103.1 * python3-base-3.6.15-150300.10.103.1 * python3-debuginfo-3.6.15-150300.10.103.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.103.1 * python3-debugsource-3.6.15-150300.10.103.1 * python3-core-debugsource-3.6.15-150300.10.103.1 * libpython3_6m1_0-3.6.15-150300.10.103.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * python3-3.6.15-150300.10.103.1 * python3-base-debuginfo-3.6.15-150300.10.103.1 * python3-base-3.6.15-150300.10.103.1 * python3-debuginfo-3.6.15-150300.10.103.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.103.1 * python3-debugsource-3.6.15-150300.10.103.1 * python3-core-debugsource-3.6.15-150300.10.103.1 * libpython3_6m1_0-3.6.15-150300.10.103.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * python3-3.6.15-150300.10.103.1 * python3-base-debuginfo-3.6.15-150300.10.103.1 * python3-base-3.6.15-150300.10.103.1 * python3-debuginfo-3.6.15-150300.10.103.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.103.1 * python3-debugsource-3.6.15-150300.10.103.1 * python3-core-debugsource-3.6.15-150300.10.103.1 * libpython3_6m1_0-3.6.15-150300.10.103.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * python3-3.6.15-150300.10.103.1 * python3-base-debuginfo-3.6.15-150300.10.103.1 * python3-base-3.6.15-150300.10.103.1 * python3-debuginfo-3.6.15-150300.10.103.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.103.1 * python3-debugsource-3.6.15-150300.10.103.1 * python3-core-debugsource-3.6.15-150300.10.103.1 * libpython3_6m1_0-3.6.15-150300.10.103.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * python3-3.6.15-150300.10.103.1 * python3-dbm-3.6.15-150300.10.103.1 * python3-base-debuginfo-3.6.15-150300.10.103.1 * python3-base-3.6.15-150300.10.103.1 * python3-dbm-debuginfo-3.6.15-150300.10.103.1 * python3-debuginfo-3.6.15-150300.10.103.1 * python3-curses-debuginfo-3.6.15-150300.10.103.1 * python3-tk-debuginfo-3.6.15-150300.10.103.1 * python3-curses-3.6.15-150300.10.103.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.103.1 * python3-tk-3.6.15-150300.10.103.1 * python3-idle-3.6.15-150300.10.103.1 * python3-debugsource-3.6.15-150300.10.103.1 * python3-devel-debuginfo-3.6.15-150300.10.103.1 * python3-devel-3.6.15-150300.10.103.1 * python3-core-debugsource-3.6.15-150300.10.103.1 * libpython3_6m1_0-3.6.15-150300.10.103.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * python3-tools-3.6.15-150300.10.103.1 * python3-core-debugsource-3.6.15-150300.10.103.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * python3-3.6.15-150300.10.103.1 * python3-base-debuginfo-3.6.15-150300.10.103.1 * python3-base-3.6.15-150300.10.103.1 * python3-debuginfo-3.6.15-150300.10.103.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.103.1 * python3-debugsource-3.6.15-150300.10.103.1 * python3-core-debugsource-3.6.15-150300.10.103.1 * libpython3_6m1_0-3.6.15-150300.10.103.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * python3-3.6.15-150300.10.103.1 * python3-base-debuginfo-3.6.15-150300.10.103.1 * python3-base-3.6.15-150300.10.103.1 * python3-debuginfo-3.6.15-150300.10.103.1 * libpython3_6m1_0-debuginfo-3.6.15-150300.10.103.1 * python3-debugsource-3.6.15-150300.10.103.1 * python3-core-debugsource-3.6.15-150300.10.103.1 * libpython3_6m1_0-3.6.15-150300.10.103.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12084.html * https://www.suse.com/security/cve/CVE-2025-13836.html * https://www.suse.com/security/cve/CVE-2025-13837.html * https://bugzilla.suse.com/show_bug.cgi?id=1254400 * https://bugzilla.suse.com/show_bug.cgi?id=1254401 * https://bugzilla.suse.com/show_bug.cgi?id=1254997 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 20:30:22 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 20:30:22 -0000 Subject: SUSE-SU-2026:0025-1: moderate: Security update for python312 Message-ID: <176764502287.22173.15753287408478293472@smelt2.prg2.suse.org> # Security update for python312 Announcement ID: SUSE-SU-2026:0025-1 Release Date: 2026-01-05T12:11:33Z Rating: moderate References: * bsc#1254400 * bsc#1254401 * bsc#1254997 Cross-References: * CVE-2025-12084 * CVE-2025-13836 * CVE-2025-13837 CVSS scores: * CVE-2025-12084 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-12084 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-12084 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-12084 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-13836 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13836 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-13836 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13836 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2025-13837 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13837 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-13837 ( NVD ): 2.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.6 An update that solves three vulnerabilities can now be installed. ## Description: This update for python312 fixes the following issues: * CVE-2025-12084: quadratic complexity when building nested elements using `xml.dom.minidom` methods that depend on `_clear_id_cache()` can lead to availability issues when building excessively nested documents (bsc#1254997). * CVE-2025-13836: use of `Content-Length` by default when reading an HTTP response with no read amount specified can lead to OOM issues and DoS when a client deals with a malicious server (bsc#1254400). * CVE-2025-13837: data read by the plistlib module according to the size specified by the file itself can lead to OOM issues and DoS (bsc#1254401). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-25=1 openSUSE-SLE-15.6-2026-25=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * python312-core-debugsource-3.12.12-150600.3.40.1 * python312-devel-3.12.12-150600.3.40.1 * python312-dbm-debuginfo-3.12.12-150600.3.40.1 * libpython3_12-1_0-debuginfo-3.12.12-150600.3.40.1 * python312-tk-3.12.12-150600.3.40.1 * python312-doc-devhelp-3.12.12-150600.3.40.1 * python312-debuginfo-3.12.12-150600.3.40.1 * python312-base-debuginfo-3.12.12-150600.3.40.1 * python312-debugsource-3.12.12-150600.3.40.1 * python312-testsuite-3.12.12-150600.3.40.1 * python312-testsuite-debuginfo-3.12.12-150600.3.40.1 * python312-tk-debuginfo-3.12.12-150600.3.40.1 * python312-dbm-3.12.12-150600.3.40.1 * python312-doc-3.12.12-150600.3.40.1 * python312-curses-3.12.12-150600.3.40.1 * libpython3_12-1_0-3.12.12-150600.3.40.1 * python312-idle-3.12.12-150600.3.40.1 * python312-base-3.12.12-150600.3.40.1 * python312-3.12.12-150600.3.40.1 * python312-tools-3.12.12-150600.3.40.1 * python312-curses-debuginfo-3.12.12-150600.3.40.1 * openSUSE Leap 15.6 (x86_64) * python312-base-32bit-3.12.12-150600.3.40.1 * python312-base-32bit-debuginfo-3.12.12-150600.3.40.1 * libpython3_12-1_0-32bit-3.12.12-150600.3.40.1 * libpython3_12-1_0-32bit-debuginfo-3.12.12-150600.3.40.1 * python312-32bit-debuginfo-3.12.12-150600.3.40.1 * python312-32bit-3.12.12-150600.3.40.1 * openSUSE Leap 15.6 (aarch64_ilp32) * python312-base-64bit-3.12.12-150600.3.40.1 * libpython3_12-1_0-64bit-debuginfo-3.12.12-150600.3.40.1 * python312-64bit-3.12.12-150600.3.40.1 * python312-64bit-debuginfo-3.12.12-150600.3.40.1 * libpython3_12-1_0-64bit-3.12.12-150600.3.40.1 * python312-base-64bit-debuginfo-3.12.12-150600.3.40.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12084.html * https://www.suse.com/security/cve/CVE-2025-13836.html * https://www.suse.com/security/cve/CVE-2025-13837.html * https://bugzilla.suse.com/show_bug.cgi?id=1254400 * https://bugzilla.suse.com/show_bug.cgi?id=1254401 * https://bugzilla.suse.com/show_bug.cgi?id=1254997 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 20:30:26 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 20:30:26 -0000 Subject: SUSE-SU-2026:0024-1: moderate: Security update for python313 Message-ID: <176764502665.22173.10834446835764502984@smelt2.prg2.suse.org> # Security update for python313 Announcement ID: SUSE-SU-2026:0024-1 Release Date: 2026-01-05T12:10:26Z Rating: moderate References: * bsc#1254400 * bsc#1254401 * bsc#1254997 Cross-References: * CVE-2025-12084 * CVE-2025-13836 * CVE-2025-13837 CVSS scores: * CVE-2025-12084 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-12084 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-12084 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-12084 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-13836 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13836 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-13836 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13836 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2025-13837 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13837 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-13837 ( NVD ): 2.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for python313 fixes the following issues: Update to version 3.13.11. Security issues fixed: * CVE-2025-12084: quadratic complexity when building nested elements using `xml.dom.minidom` methods that depend on `_clear_id_cache()` can lead to availability issues when building excessively nested documents (bsc#1254997). * CVE-2025-13836: use of `Content-Length` by default when reading an HTTP response with no read amount specified can lead to OOM issues and DoS when a client deals with a malicious server (bsc#1254400). * CVE-2025-13837: data read by the plistlib module according to the size specified by the file itself can lead to OOM issues and DoS (bsc#1254401). Other updates and bugfixes: * Version 3.13.11: * Library * gh-140797: Revert changes to the undocumented re.Scanner class. Capturing groups are still allowed for backward compatibility, although using them can lead to incorrect result. They will be forbidden in future Python versions. * gh-142206: The resource tracker in the multiprocessing module now uses the original communication protocol, as in Python 3.14.0 and below, by default. This avoids issues with upgrading Python while it is running. (Note that such ?in-place? upgrades are not tested.) The tracker remains compatible with subprocesses that use new protocol (that is, subprocesses using Python 3.13.10, 3.14.1 and 3.15). * Core and Builtins * gh-142218: Fix crash when inserting into a split table dictionary with a non str key that matches an existing key. * Version to 3.13.10: * Security * gh-137836: Add support of the ?plaintext? element, RAWTEXT elements ?xmp?, ?iframe?, ?noembed? and ?noframes?, and optionally RAWTEXT element ?noscript? in html.parser.HTMLParser. * gh-136063: email.message: ensure linear complexity for legacy HTTP parameters parsing. Patch by B?n?dikt Tran. * Library * gh-74389: When the stdin being used by a subprocess.Popen instance is closed, this is now ignored in subprocess.Popen.communicate() instead of leaving the class in an inconsistent state. * gh-87512: Fix subprocess.Popen.communicate() timeout handling on Windows when writing large input. Previously, the timeout was ignored during stdin writing, causing the method to block indefinitely if the child process did not consume input quickly. The stdin write is now performed in a background thread, allowing the timeout to be properly enforced. * gh-141473: When subprocess.Popen.communicate() was called with input and a timeout and is called for a second time after a TimeoutExpired exception before the process has died, it should no longer hang. * gh-59000: Fix pdb breakpoint resolution for class methods when the module defining the class is not imported. * gh-141570: Support file-like object raising OSError from fileno() in color detection (_colorize.can_colorize()). This can occur when sys.stdout is redirected. * gh-141659: Fix bad file descriptor errors from _posixsubprocess on AIX. * gh-141497: ipaddress: ensure that the methods IPv4Network.hosts() and IPv6Network.hosts() always return an iterator. * gh-140938: The statistics.stdev() and statistics.pstdev() functions now raise a ValueError when the input contains an infinity or a NaN. * gh-124111: Updated Tcl threading configuration in _tkinter to assume that threads are always available in Tcl 9 and later. * gh-137109: The os.fork and related forking APIs will no longer warn in the common case where Linux or macOS platform APIs return the number of threads in a process and find the answer to be 1 even when a os.register_at_fork() after_in_parent= callback (re)starts a thread. * gh-141314: Fix assertion failure in io.TextIOWrapper.tell() when reading files with standalone carriage return (\r) line endings. * gh-141311: Fix assertion failure in io.BytesIO.readinto() and undefined behavior arising when read position is above capcity in io.BytesIO. * gh-141141: Fix a thread safety issue with base64.b85decode(). Contributed by Benel Tayar. * gh-140911: collections: Ensure that the methods UserString.rindex() and UserString.index() accept collections.UserString instances as the sub argument. * gh-140797: The undocumented re.Scanner class now forbids regular expressions containing capturing groups in its lexicon patterns. Patterns using capturing groups could previously lead to crashes with segmentation fault. Use non-capturing groups (?:?) instead. * gh-140815: faulthandler now detects if a frame or a code object is invalid or freed. Patch by Victor Stinner. * gh-100218: Correctly set errno when socket.if_nametoindex() or socket.if_indextoname() raise an OSError. Patch by B?n?dikt Tran. * gh-140875: Fix handling of unclosed character references (named and numerical) followed by the end of file in html.parser.HTMLParser with convert_charrefs=False. * gh-140734: multiprocessing: fix off-by-one error when checking the length of a temporary socket file path. Patch by B?n?dikt Tran. * gh-140874: Bump the version of pip bundled in ensurepip to version 25.3 * gh-140691: In urllib.request, when opening a FTP URL fails because a data connection cannot be made, the control connection?s socket is now closed to avoid a ResourceWarning. * gh-103847: Fix hang when cancelling process created by asyncio.create_subprocess_exec() or asyncio.create_subprocess_shell(). Patch by Kumar Aditya. * gh-140590: Fix arguments checking for the functools.partial. **setstate** () that may lead to internal state corruption and crash. Patch by Sergey Miryanov. * gh-140634: Fix a reference counting bug in os.sched_param. **reduce** (). * gh-140633: Ignore AttributeError when setting a module?s **file** attribute when loading an extension module packaged as Apple Framework. * gh-140593: xml.parsers.expat: Fix a memory leak that could affect users with ElementDeclHandler() set to a custom element declaration handler. Patch by Sebastian Pipping. * gh-140607: Inside io.RawIOBase.read(), validate that the count of bytes returned by io.RawIOBase.readinto() is valid (inside the provided buffer). * gh-138162: Fix logging.LoggerAdapter with merge_extra=True and without the extra argument. * gh-140474: Fix memory leak in array.array when creating arrays from an empty str and the u type code. * gh-140272: Fix memory leak in the clear() method of the dbm.gnu database. * gh-140041: Fix import of ctypes on Android and Cygwin when ABI flags are present. * gh-139905: Add suggestion to error message for typing.Generic subclasses when cls. **parameters** is missing due to a parent class failing to call super(). **init_subclass** () in its **init_subclass**. * gh-139845: Fix to not print KeyboardInterrupt twice in default asyncio REPL. * gh-139783: Fix inspect.getsourcelines() for the case when a decorator is followed by a comment or an empty line. * gh-70765: http.server: fix default handling of HTTP/0.9 requests in BaseHTTPRequestHandler. Previously, BaseHTTPRequestHandler.parse_request() incorrectly waited for headers in the request although those are not supported in HTTP/0.9. Patch by B?n?dikt Tran. * gh-139391: Fix an issue when, on non-Windows platforms, it was not possible to gracefully exit a python -m asyncio process suspended by Ctrl+Z and later resumed by fg other than with kill. * gh-101828: Fix 'shift_jisx0213', 'shift_jis_2004', 'euc_jisx0213' and 'euc_jis_2004' codecs truncating null chars as they were treated as part of multi-character sequences. * gh-139246: fix: paste zero-width in default repl width is wrong. * gh-90949: Add SetAllocTrackerActivationThreshold() and SetAllocTrackerMaximumAmplification() to xmlparser objects to prevent use of disproportional amounts of dynamic memory from within an Expat parser. Patch by B?n?dikt Tran. * gh-139065: Fix trailing space before a wrapped long word if the line length is exactly width in textwrap. * gh-138993: Dedent credits text. * gh-138859: Fix generic type parameterization raising a TypeError when omitting a ParamSpec that has a default which is not a list of types. * gh-138775: Use of python -m with base64 has been fixed to detect input from a terminal so that it properly notices EOF. * gh-98896: Fix a failure in multiprocessing resource_tracker when SharedMemory names contain colons. Patch by Rani Pinchuk. * gh-75989: tarfile.TarFile.extractall() and tarfile.TarFile.extract() now overwrite symlinks when extracting hardlinks. (Contributed by Alexander Enrique Urieles Nieto in gh-75989.) * gh-83424: Allows creating a ctypes.CDLL without name when passing a handle as an argument. * gh-136234: Fix asyncio.WriteTransport.writelines() to be robust to connection failure, by using the same behavior as write(). * gh-136057: Fixed the bug in pdb and bdb where next and step can?t go over the line if a loop exists in the line. * gh-135307: email: Fix exception in set_content() when encoding text and max_line_length is set to 0 or None (unlimited). * gh-134453: Fixed subprocess.Popen.communicate() input= handling of memoryview instances that were non-byte shaped on POSIX platforms. Those are now properly cast to a byte shaped view instead of truncating the input. Windows platforms did not have this bug. * gh-102431: Clarify constraints for ?logical? arguments in methods of decimal.Context. * IDLE * gh-96491: Deduplicate version number in IDLE shell title bar after saving to a file. * Core and Builtins * gh-142048: Fix quadratically increasing garbage collection delays in free-threaded build. * gh-141930: When importing a module, use Python?s regular file object to ensure that writes to .pyc files are complete or an appropriate error is raised. * gh-120158: Fix inconsistent state when enabling or disabling monitoring events too many times. * gh-141579: Fix sys.activate_stack_trampoline() to properly support the perf_jit backend. Patch by Pablo Galindo. * gh-141312: Fix the assertion failure in the **setstate** method of the range iterator when a non-integer argument is passed. Patch by Sergey Miryanov. * gh-140939: Fix memory leak when bytearray or bytes is formated with the %*b format with a large width that results in %a MemoryError. * gh-140530: Fix a reference leak when raise exc from cause fails. Patch by B?n?dikt Tran. * gh-140576: Fixed crash in tokenize.generate_tokens() in case of specific incorrect input. Patch by Mikhail Efimov. * gh-140551: Fixed crash in dict if dict.clear() is called at the lookup stage. Patch by Mikhail Efimov and Inada Naoki. * gh-140471: Fix potential buffer overflow in ast.AST node initialization when encountering malformed _fields containing non-str. * gh-140406: Fix memory leak when an object?s **hash** () method returns an object that isn?t an int. * gh-140306: Fix memory leaks in cross-interpreter channel operations and shared namespace handling. * gh-140301: Fix memory leak of PyConfig in subinterpreters. * gh-140000: Fix potential memory leak when a reference cycle exists between an instance of typing.TypeAliasType, typing.TypeVar, typing.ParamSpec, or typing.TypeVarTuple and its **name** attribute. Patch by Mikhail Efimov. * gh-139748: Fix reference leaks in error branches of functions accepting path strings or bytes such as compile() and os.system(). Patch by B?n?dikt Tran. * gh-139516: Fix lambda colon erroneously start format spec in f-string in tokenizer. * gh-139640: Fix swallowing some syntax warnings in different modules if they accidentally have the same message and are emitted from the same line. Fix duplicated warnings in the finally block. * gh-137400: Fix a crash in the free threading build when disabling profiling or tracing across all threads with PyEval_SetProfileAllThreads() or PyEval_SetTraceAllThreads() or their Python equivalents threading.settrace_all_threads() and threading.setprofile_all_threads(). * gh-133400: Fixed Ctrl+D (^D) behavior in _pyrepl module to match old pre-3.13 REPL behavior. * C API * gh-140042: Removed the sqlite3_shutdown call that could cause closing connections for sqlite when used with multiple sub interpreters. * gh-140487: Fix Py_RETURN_NOTIMPLEMENTED in limited C API 3.11 and older: don?t treat Py_NotImplemented as immortal. Patch by Victor Stinner. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-24=1 ## Package List: * Python 3 Module 15-SP7 (aarch64 ppc64le s390x x86_64) * python313-debugsource-3.13.11-150700.4.36.1 * python313-base-debuginfo-3.13.11-150700.4.36.1 * python313-3.13.11-150700.4.36.1 * python313-curses-3.13.11-150700.4.36.1 * python313-base-3.13.11-150700.4.36.1 * libpython3_13-1_0-debuginfo-3.13.11-150700.4.36.1 * python313-tk-3.13.11-150700.4.36.1 * python313-tools-3.13.11-150700.4.36.1 * python313-curses-debuginfo-3.13.11-150700.4.36.1 * python313-idle-3.13.11-150700.4.36.1 * python313-core-debugsource-3.13.11-150700.4.36.1 * libpython3_13-1_0-3.13.11-150700.4.36.1 * python313-debuginfo-3.13.11-150700.4.36.1 * python313-devel-3.13.11-150700.4.36.1 * python313-dbm-debuginfo-3.13.11-150700.4.36.1 * python313-tk-debuginfo-3.13.11-150700.4.36.1 * python313-dbm-3.13.11-150700.4.36.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12084.html * https://www.suse.com/security/cve/CVE-2025-13836.html * https://www.suse.com/security/cve/CVE-2025-13837.html * https://bugzilla.suse.com/show_bug.cgi?id=1254400 * https://bugzilla.suse.com/show_bug.cgi?id=1254401 * https://bugzilla.suse.com/show_bug.cgi?id=1254997 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 5 20:30:31 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 05 Jan 2026 20:30:31 -0000 Subject: SUSE-SU-2026:0023-1: moderate: Security update for erlang26 Message-ID: <176764503112.22173.4710337882583873311@smelt2.prg2.suse.org> # Security update for erlang26 Announcement ID: SUSE-SU-2026:0023-1 Release Date: 2026-01-05T12:06:33Z Rating: moderate References: * bsc#1249469 * bsc#1249470 * bsc#1249472 Cross-References: * CVE-2025-48038 * CVE-2025-48039 * CVE-2025-48040 CVSS scores: * CVE-2025-48038 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-48038 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-48038 ( NVD ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-48039 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-48039 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-48039 ( NVD ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-48040 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-48040 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-48040 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.3 * openSUSE Leap 15.6 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for erlang26 fixes the following issues: * CVE-2025-48040: Excessive resource consumption (bsc#1249472) * CVE-2025-48039: Excessive use of system resources (bsc#1249469) * CVE-2025-48038: Excessive use of system resources (bsc#1249470) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-23=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2026-23=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2026-23=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * erlang26-epmd-debuginfo-26.2.1-150300.7.22.1 * erlang26-wx-26.2.1-150300.7.22.1 * erlang26-dialyzer-26.2.1-150300.7.22.1 * erlang26-reltool-26.2.1-150300.7.22.1 * erlang26-observer-src-26.2.1-150300.7.22.1 * erlang26-jinterface-src-26.2.1-150300.7.22.1 * erlang26-debugger-src-26.2.1-150300.7.22.1 * erlang26-epmd-26.2.1-150300.7.22.1 * erlang26-debugger-26.2.1-150300.7.22.1 * erlang26-debugsource-26.2.1-150300.7.22.1 * erlang26-dialyzer-src-26.2.1-150300.7.22.1 * erlang26-observer-26.2.1-150300.7.22.1 * erlang26-dialyzer-debuginfo-26.2.1-150300.7.22.1 * erlang26-debuginfo-26.2.1-150300.7.22.1 * erlang26-reltool-src-26.2.1-150300.7.22.1 * erlang26-wx-debuginfo-26.2.1-150300.7.22.1 * erlang26-et-26.2.1-150300.7.22.1 * erlang26-wx-src-26.2.1-150300.7.22.1 * erlang26-diameter-src-26.2.1-150300.7.22.1 * erlang26-et-src-26.2.1-150300.7.22.1 * erlang26-26.2.1-150300.7.22.1 * erlang26-diameter-26.2.1-150300.7.22.1 * erlang26-jinterface-26.2.1-150300.7.22.1 * erlang26-doc-26.2.1-150300.7.22.1 * erlang26-src-26.2.1-150300.7.22.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * erlang26-epmd-debuginfo-26.2.1-150300.7.22.1 * erlang26-26.2.1-150300.7.22.1 * erlang26-debuginfo-26.2.1-150300.7.22.1 * erlang26-epmd-26.2.1-150300.7.22.1 * erlang26-debugsource-26.2.1-150300.7.22.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * erlang26-epmd-debuginfo-26.2.1-150300.7.22.1 * erlang26-wx-26.2.1-150300.7.22.1 * erlang26-dialyzer-26.2.1-150300.7.22.1 * erlang26-reltool-26.2.1-150300.7.22.1 * erlang26-observer-src-26.2.1-150300.7.22.1 * erlang26-jinterface-src-26.2.1-150300.7.22.1 * erlang26-debugger-src-26.2.1-150300.7.22.1 * erlang26-epmd-26.2.1-150300.7.22.1 * erlang26-debugger-26.2.1-150300.7.22.1 * erlang26-debugsource-26.2.1-150300.7.22.1 * erlang26-dialyzer-src-26.2.1-150300.7.22.1 * erlang26-observer-26.2.1-150300.7.22.1 * erlang26-dialyzer-debuginfo-26.2.1-150300.7.22.1 * erlang26-debuginfo-26.2.1-150300.7.22.1 * erlang26-reltool-src-26.2.1-150300.7.22.1 * erlang26-wx-debuginfo-26.2.1-150300.7.22.1 * erlang26-et-26.2.1-150300.7.22.1 * erlang26-wx-src-26.2.1-150300.7.22.1 * erlang26-diameter-src-26.2.1-150300.7.22.1 * erlang26-et-src-26.2.1-150300.7.22.1 * erlang26-26.2.1-150300.7.22.1 * erlang26-diameter-26.2.1-150300.7.22.1 * erlang26-jinterface-26.2.1-150300.7.22.1 * erlang26-doc-26.2.1-150300.7.22.1 * erlang26-src-26.2.1-150300.7.22.1 ## References: * https://www.suse.com/security/cve/CVE-2025-48038.html * https://www.suse.com/security/cve/CVE-2025-48039.html * https://www.suse.com/security/cve/CVE-2025-48040.html * https://bugzilla.suse.com/show_bug.cgi?id=1249469 * https://bugzilla.suse.com/show_bug.cgi?id=1249470 * https://bugzilla.suse.com/show_bug.cgi?id=1249472 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 6 08:30:10 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 06 Jan 2026 08:30:10 -0000 Subject: SUSE-SU-2026:0034-1: important: Security update for the Linux Kernel Message-ID: <176768821009.22154.4127606753409741979@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:0034-1 Release Date: 2026-01-05T19:29:30Z Rating: important References: * bsc#1233640 * bsc#1249806 * bsc#1251786 * bsc#1252267 * bsc#1252780 * bsc#1252862 * bsc#1253367 * bsc#1253431 * bsc#1253436 Cross-References: * CVE-2022-50280 * CVE-2023-53676 * CVE-2024-53093 * CVE-2025-40040 * CVE-2025-40048 * CVE-2025-40121 * CVE-2025-40154 * CVE-2025-40204 CVSS scores: * CVE-2022-50280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50280 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40040 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40121 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40121 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40154 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40154 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Micro 5.5 An update that solves eight vulnerabilities and has one security fix can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-50280: pnode: terminate at peers of source (bsc#1249806). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786). * CVE-2024-53093: nvme-multipath: defer partition scanning (bsc#1233640). * CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780). * CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862). * CVE-2025-40121: ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping (bsc#1253367). * CVE-2025-40154: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (bsc#1253431). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436). The following non-security bugs were fixed: * Fix type signess in fbcon_set_font() (bsc#1252033). * scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-34=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-34=1 ## Package List: * openSUSE Leap 15.5 (noarch) * kernel-devel-rt-5.14.21-150500.13.115.1 * kernel-source-rt-5.14.21-150500.13.115.1 * openSUSE Leap 15.5 (x86_64) * kernel-rt-devel-debuginfo-5.14.21-150500.13.115.2 * kernel-rt_debug-debuginfo-5.14.21-150500.13.115.2 * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.115.2 * kernel-rt-vdso-debuginfo-5.14.21-150500.13.115.2 * reiserfs-kmp-rt-5.14.21-150500.13.115.2 * kernel-rt_debug-vdso-5.14.21-150500.13.115.2 * kernel-syms-rt-5.14.21-150500.13.115.1 * kselftests-kmp-rt-debuginfo-5.14.21-150500.13.115.2 * kernel-rt-extra-5.14.21-150500.13.115.2 * kernel-rt-optional-5.14.21-150500.13.115.2 * kernel-rt-livepatch-devel-5.14.21-150500.13.115.2 * ocfs2-kmp-rt-5.14.21-150500.13.115.2 * kernel-rt-livepatch-5.14.21-150500.13.115.2 * dlm-kmp-rt-5.14.21-150500.13.115.2 * kernel-rt-debugsource-5.14.21-150500.13.115.2 * kernel-rt-vdso-5.14.21-150500.13.115.2 * cluster-md-kmp-rt-5.14.21-150500.13.115.2 * kernel-rt_debug-debugsource-5.14.21-150500.13.115.2 * kernel-rt-devel-5.14.21-150500.13.115.2 * reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.115.2 * dlm-kmp-rt-debuginfo-5.14.21-150500.13.115.2 * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.115.2 * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.115.2 * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.115.2 * kernel-rt-extra-debuginfo-5.14.21-150500.13.115.2 * gfs2-kmp-rt-5.14.21-150500.13.115.2 * kernel-rt_debug-devel-5.14.21-150500.13.115.2 * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.115.2 * kselftests-kmp-rt-5.14.21-150500.13.115.2 * kernel-rt-debuginfo-5.14.21-150500.13.115.2 * kernel-rt-optional-debuginfo-5.14.21-150500.13.115.2 * openSUSE Leap 15.5 (nosrc x86_64) * kernel-rt-5.14.21-150500.13.115.2 * kernel-rt_debug-5.14.21-150500.13.115.2 * SUSE Linux Enterprise Micro 5.5 (noarch) * kernel-devel-rt-5.14.21-150500.13.115.1 * kernel-source-rt-5.14.21-150500.13.115.1 * SUSE Linux Enterprise Micro 5.5 (nosrc x86_64) * kernel-rt-5.14.21-150500.13.115.2 * SUSE Linux Enterprise Micro 5.5 (x86_64) * kernel-rt-debugsource-5.14.21-150500.13.115.2 * kernel-rt-debuginfo-5.14.21-150500.13.115.2 ## References: * https://www.suse.com/security/cve/CVE-2022-50280.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2024-53093.html * https://www.suse.com/security/cve/CVE-2025-40040.html * https://www.suse.com/security/cve/CVE-2025-40048.html * https://www.suse.com/security/cve/CVE-2025-40121.html * https://www.suse.com/security/cve/CVE-2025-40154.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1233640 * https://bugzilla.suse.com/show_bug.cgi?id=1249806 * https://bugzilla.suse.com/show_bug.cgi?id=1251786 * https://bugzilla.suse.com/show_bug.cgi?id=1252267 * https://bugzilla.suse.com/show_bug.cgi?id=1252780 * https://bugzilla.suse.com/show_bug.cgi?id=1252862 * https://bugzilla.suse.com/show_bug.cgi?id=1253367 * https://bugzilla.suse.com/show_bug.cgi?id=1253431 * https://bugzilla.suse.com/show_bug.cgi?id=1253436 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 6 08:30:18 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 06 Jan 2026 08:30:18 -0000 Subject: SUSE-SU-2026:0033-1: important: Security update for the Linux Kernel Message-ID: <176768821844.22154.8532586604828253147@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:0033-1 Release Date: 2026-01-05T19:26:53Z Rating: important References: * bsc#1249806 * bsc#1251786 * bsc#1252033 * bsc#1252267 * bsc#1252780 * bsc#1252862 * bsc#1253367 * bsc#1253431 * bsc#1253436 Cross-References: * CVE-2022-50280 * CVE-2023-53676 * CVE-2025-39967 * CVE-2025-40040 * CVE-2025-40048 * CVE-2025-40121 * CVE-2025-40154 * CVE-2025-40204 CVSS scores: * CVE-2022-50280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50280 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39967 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39967 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40040 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40121 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40121 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40154 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40154 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that solves eight vulnerabilities and has one security fix can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-50280: pnode: terminate at peers of source (bsc#1249806). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786). * CVE-2025-39967: fbcon: fix integer overflow in fbcon_do_set_font (bsc#1252033). * CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780). * CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862). * CVE-2025-40121: ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping (bsc#1253367). * CVE-2025-40154: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (bsc#1253431). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436). The following non-security bugs were fixed: * scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-33=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-33=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-33=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-33=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.139.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.139.2 * kernel-rt-debuginfo-5.14.21-150400.15.139.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * kernel-source-rt-5.14.21-150400.15.139.1 * SUSE Linux Enterprise Micro 5.3 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.139.2 * SUSE Linux Enterprise Micro 5.3 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.139.2 * kernel-rt-debuginfo-5.14.21-150400.15.139.2 * SUSE Linux Enterprise Micro 5.3 (noarch) * kernel-source-rt-5.14.21-150400.15.139.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.139.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.139.2 * kernel-rt-debuginfo-5.14.21-150400.15.139.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * kernel-source-rt-5.14.21-150400.15.139.1 * SUSE Linux Enterprise Micro 5.4 (nosrc x86_64) * kernel-rt-5.14.21-150400.15.139.2 * SUSE Linux Enterprise Micro 5.4 (x86_64) * kernel-rt-debugsource-5.14.21-150400.15.139.2 * kernel-rt-debuginfo-5.14.21-150400.15.139.2 * SUSE Linux Enterprise Micro 5.4 (noarch) * kernel-source-rt-5.14.21-150400.15.139.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50280.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-39967.html * https://www.suse.com/security/cve/CVE-2025-40040.html * https://www.suse.com/security/cve/CVE-2025-40048.html * https://www.suse.com/security/cve/CVE-2025-40121.html * https://www.suse.com/security/cve/CVE-2025-40154.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1249806 * https://bugzilla.suse.com/show_bug.cgi?id=1251786 * https://bugzilla.suse.com/show_bug.cgi?id=1252033 * https://bugzilla.suse.com/show_bug.cgi?id=1252267 * https://bugzilla.suse.com/show_bug.cgi?id=1252780 * https://bugzilla.suse.com/show_bug.cgi?id=1252862 * https://bugzilla.suse.com/show_bug.cgi?id=1253367 * https://bugzilla.suse.com/show_bug.cgi?id=1253431 * https://bugzilla.suse.com/show_bug.cgi?id=1253436 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 6 08:30:26 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 06 Jan 2026 08:30:26 -0000 Subject: SUSE-SU-2026:0032-1: important: Security update for the Linux Kernel Message-ID: <176768822642.22154.8078885121677739294@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:0032-1 Release Date: 2026-01-05T19:24:53Z Rating: important References: * bsc#1228688 * bsc#1249806 * bsc#1251247 * bsc#1251786 * bsc#1252560 * bsc#1252780 * bsc#1253367 * bsc#1253431 * bsc#1253436 Cross-References: * CVE-2022-50280 * CVE-2023-53659 * CVE-2023-53676 * CVE-2023-53717 * CVE-2025-40040 * CVE-2025-40121 * CVE-2025-40154 * CVE-2025-40204 CVSS scores: * CVE-2022-50280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50280 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53659 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53659 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53717 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53717 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40040 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40121 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40121 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40154 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40154 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves eight vulnerabilities and has one security fix can now be installed. ## Description: The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-50280: pnode: terminate at peers of source (bsc#1249806). * CVE-2023-53659: iavf: Fix out-of-bounds when setting channels on remove (bsc#1251247). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786). * CVE-2023-53717: wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback() (bsc#1252560). * CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780). * CVE-2025-40121: ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping (bsc#1253367). * CVE-2025-40154: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping (bsc#1253431). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436). The following non-security bugs were fixed: * cifs: Check the lease context if we actually got a lease (bsc#1228688). * cifs: return a single-use cfid if we did not get a lease (bsc#1228688). * smb3: fix Open files on server counter going negative (git-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-32=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-32=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.229.2 * SUSE Linux Enterprise Micro 5.2 (x86_64) * kernel-rt-debuginfo-5.3.18-150300.229.2 * kernel-rt-debugsource-5.3.18-150300.229.2 * SUSE Linux Enterprise Micro 5.2 (noarch) * kernel-source-rt-5.3.18-150300.229.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (nosrc x86_64) * kernel-rt-5.3.18-150300.229.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64) * kernel-rt-debuginfo-5.3.18-150300.229.2 * kernel-rt-debugsource-5.3.18-150300.229.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * kernel-source-rt-5.3.18-150300.229.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50280.html * https://www.suse.com/security/cve/CVE-2023-53659.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2023-53717.html * https://www.suse.com/security/cve/CVE-2025-40040.html * https://www.suse.com/security/cve/CVE-2025-40121.html * https://www.suse.com/security/cve/CVE-2025-40154.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1228688 * https://bugzilla.suse.com/show_bug.cgi?id=1249806 * https://bugzilla.suse.com/show_bug.cgi?id=1251247 * https://bugzilla.suse.com/show_bug.cgi?id=1251786 * https://bugzilla.suse.com/show_bug.cgi?id=1252560 * https://bugzilla.suse.com/show_bug.cgi?id=1252780 * https://bugzilla.suse.com/show_bug.cgi?id=1253367 * https://bugzilla.suse.com/show_bug.cgi?id=1253431 * https://bugzilla.suse.com/show_bug.cgi?id=1253436 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 6 16:30:03 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 06 Jan 2026 16:30:03 -0000 Subject: SUSE-SU-2026:0042-1: moderate: Security update for usbmuxd Message-ID: <176771700398.22147.7487126177522644730@smelt2.prg2.suse.org> # Security update for usbmuxd Announcement ID: SUSE-SU-2026:0042-1 Release Date: 2026-01-06T10:35:00Z Rating: moderate References: * bsc#1254302 Cross-References: * CVE-2025-66004 CVSS scores: * CVE-2025-66004 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L * CVE-2025-66004 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L * CVE-2025-66004 ( NVD ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-66004 ( NVD ): 5.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for usbmuxd fixes the following issues: * CVE-2025-66004: Fixed LPE from nobody to usbmux (bsc#1254302) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-42=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-42=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-42=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-42=1 ## Package List: * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x) * usbmuxd-1.1.1-150400.3.3.1 * usbmuxd-debugsource-1.1.1-150400.3.3.1 * usbmuxd-debuginfo-1.1.1-150400.3.3.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * usbmuxd-1.1.1-150400.3.3.1 * usbmuxd-debugsource-1.1.1-150400.3.3.1 * usbmuxd-debuginfo-1.1.1-150400.3.3.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * usbmuxd-1.1.1-150400.3.3.1 * usbmuxd-debugsource-1.1.1-150400.3.3.1 * usbmuxd-debuginfo-1.1.1-150400.3.3.1 * openSUSE Leap 15.4 (x86_64) * usbmuxd-32bit-debuginfo-1.1.1-150400.3.3.1 * openSUSE Leap 15.4 (aarch64_ilp32) * usbmuxd-64bit-debuginfo-1.1.1-150400.3.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * usbmuxd-1.1.1-150400.3.3.1 * usbmuxd-debugsource-1.1.1-150400.3.3.1 * usbmuxd-debuginfo-1.1.1-150400.3.3.1 * openSUSE Leap 15.6 (x86_64) * usbmuxd-32bit-debuginfo-1.1.1-150400.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-66004.html * https://bugzilla.suse.com/show_bug.cgi?id=1254302 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 6 16:30:07 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 06 Jan 2026 16:30:07 -0000 Subject: SUSE-SU-2026:0041-1: moderate: Security update for rsync Message-ID: <176771700783.22147.17837359981678276865@smelt2.prg2.suse.org> # Security update for rsync Announcement ID: SUSE-SU-2026:0041-1 Release Date: 2026-01-06T10:33:35Z Rating: moderate References: * bsc#1254441 Cross-References: * CVE-2025-10158 CVSS scores: * CVE-2025-10158 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-10158 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that solves one vulnerability can now be installed. ## Description: This update for rsync fixes the following issues: * CVE-2025-10158: Fixed out of bounds array access via negative index (bsc#1254441) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-41=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-41=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-41=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-41=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-41=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-41=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * rsync-debuginfo-3.2.3-150400.3.26.1 * rsync-debugsource-3.2.3-150400.3.26.1 * rsync-3.2.3-150400.3.26.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * rsync-debuginfo-3.2.3-150400.3.26.1 * rsync-debugsource-3.2.3-150400.3.26.1 * rsync-3.2.3-150400.3.26.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * rsync-debuginfo-3.2.3-150400.3.26.1 * rsync-debugsource-3.2.3-150400.3.26.1 * rsync-3.2.3-150400.3.26.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * rsync-debuginfo-3.2.3-150400.3.26.1 * rsync-debugsource-3.2.3-150400.3.26.1 * rsync-3.2.3-150400.3.26.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * rsync-debuginfo-3.2.3-150400.3.26.1 * rsync-debugsource-3.2.3-150400.3.26.1 * rsync-3.2.3-150400.3.26.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * rsync-debuginfo-3.2.3-150400.3.26.1 * rsync-debugsource-3.2.3-150400.3.26.1 * rsync-3.2.3-150400.3.26.1 ## References: * https://www.suse.com/security/cve/CVE-2025-10158.html * https://bugzilla.suse.com/show_bug.cgi?id=1254441 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 6 16:30:13 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 06 Jan 2026 16:30:13 -0000 Subject: SUSE-SU-2026:0039-1: important: Security update for qemu Message-ID: <176771701371.22147.10161915417358303566@smelt2.prg2.suse.org> # Security update for qemu Announcement ID: SUSE-SU-2026:0039-1 Release Date: 2026-01-06T10:31:24Z Rating: important References: * bsc#1227397 * bsc#1250984 * bsc#1252768 * bsc#1253002 * bsc#1254286 Cross-References: * CVE-2024-6505 * CVE-2025-11234 * CVE-2025-12464 CVSS scores: * CVE-2024-6505 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-6505 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-6505 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2025-11234 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-11234 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11234 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-12464 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-12464 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-12464 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.5 * Server Applications Module 15-SP7 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities and has two security fixes can now be installed. ## Description: This update for qemu fixes the following issues: * CVE-2024-6505: qemu-kvm: virtio-net: Fixed queue index out-of-bounds access in software RSS (bsc#1227397) * CVE-2025-12464: net: pad packets to minimum length in qemu_receive_packet() (bsc#1253002) * CVE-2025-11234: qemu-kvm: Fixed use-after-free in websocket handshake code leading to denial of service (bsc#1250984) Other fixes: \- Fixed *-virtio-gpu-pci dependency on ARM (bsc#1254286) \- block/curl: Fixed curl internal handles handling (bsc#1252768) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-39=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-39=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2026-39=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-39=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-39=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-39=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-39=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * qemu-block-ssh-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-usb-host-7.1.0-150500.49.36.2 * qemu-tools-7.1.0-150500.49.36.2 * qemu-accel-qtest-7.1.0-150500.49.36.2 * qemu-chardev-baum-debuginfo-7.1.0-150500.49.36.2 * qemu-s390x-7.1.0-150500.49.36.2 * qemu-audio-alsa-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-gpu-pci-debuginfo-7.1.0-150500.49.36.2 * qemu-ksm-7.1.0-150500.49.36.2 * qemu-ui-spice-core-7.1.0-150500.49.36.2 * qemu-ui-opengl-7.1.0-150500.49.36.2 * qemu-accel-qtest-debuginfo-7.1.0-150500.49.36.2 * qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.36.2 * qemu-block-curl-7.1.0-150500.49.36.2 * qemu-guest-agent-7.1.0-150500.49.36.2 * qemu-audio-alsa-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-dbus-debuginfo-7.1.0-150500.49.36.2 * qemu-ppc-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-spice-7.1.0-150500.49.36.2 * qemu-extra-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-usb-redirect-7.1.0-150500.49.36.2 * qemu-linux-user-debugsource-7.1.0-150500.49.36.2 * qemu-7.1.0-150500.49.36.2 * qemu-x86-debuginfo-7.1.0-150500.49.36.2 * qemu-chardev-spice-7.1.0-150500.49.36.2 * qemu-ui-gtk-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-gpu-7.1.0-150500.49.36.2 * qemu-block-nfs-7.1.0-150500.49.36.2 * qemu-block-gluster-7.1.0-150500.49.36.2 * qemu-ui-dbus-7.1.0-150500.49.36.2 * qemu-block-ssh-7.1.0-150500.49.36.2 * qemu-ui-spice-core-debuginfo-7.1.0-150500.49.36.2 * qemu-block-iscsi-7.1.0-150500.49.36.2 * qemu-hw-display-qxl-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-vga-7.1.0-150500.49.36.2 * qemu-audio-dbus-7.1.0-150500.49.36.2 * qemu-chardev-spice-debuginfo-7.1.0-150500.49.36.2 * qemu-block-gluster-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-oss-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.36.2 * qemu-audio-pa-debuginfo-7.1.0-150500.49.36.2 * qemu-x86-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.36.2 * qemu-tools-debuginfo-7.1.0-150500.49.36.2 * qemu-linux-user-7.1.0-150500.49.36.2 * qemu-hw-usb-host-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-usb-smartcard-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-spice-debuginfo-7.1.0-150500.49.36.2 * qemu-arm-7.1.0-150500.49.36.2 * qemu-accel-tcg-x86-7.1.0-150500.49.36.2 * qemu-block-dmg-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.36.2 * qemu-audio-jack-7.1.0-150500.49.36.2 * qemu-linux-user-debuginfo-7.1.0-150500.49.36.2 * qemu-debuginfo-7.1.0-150500.49.36.2 * qemu-block-iscsi-debuginfo-7.1.0-150500.49.36.2 * qemu-ppc-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-dbus-debuginfo-7.1.0-150500.49.36.2 * qemu-block-nfs-debuginfo-7.1.0-150500.49.36.2 * qemu-block-curl-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-oss-debuginfo-7.1.0-150500.49.36.2 * qemu-vhost-user-gpu-7.1.0-150500.49.36.2 * qemu-ivshmem-tools-7.1.0-150500.49.36.2 * qemu-chardev-baum-7.1.0-150500.49.36.2 * qemu-debugsource-7.1.0-150500.49.36.2 * qemu-audio-jack-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-spice-app-7.1.0-150500.49.36.2 * qemu-hw-s390x-virtio-gpu-ccw-debuginfo-7.1.0-150500.49.36.2 * qemu-extra-7.1.0-150500.49.36.2 * qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-spice-app-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-curses-debuginfo-7.1.0-150500.49.36.2 * qemu-arm-debuginfo-7.1.0-150500.49.36.2 * qemu-headless-7.1.0-150500.49.36.2 * qemu-s390x-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-gtk-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-pa-7.1.0-150500.49.36.2 * qemu-ui-opengl-debuginfo-7.1.0-150500.49.36.2 * qemu-block-dmg-7.1.0-150500.49.36.2 * qemu-guest-agent-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.36.2 * qemu-ivshmem-tools-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-usb-smartcard-7.1.0-150500.49.36.2 * qemu-ui-curses-7.1.0-150500.49.36.2 * qemu-vhost-user-gpu-debuginfo-7.1.0-150500.49.36.2 * openSUSE Leap 15.5 (s390x x86_64 i586) * qemu-kvm-7.1.0-150500.49.36.2 * openSUSE Leap 15.5 (noarch) * qemu-SLOF-7.1.0-150500.49.36.2 * qemu-vgabios-1.16.0_0_gd239552-150500.49.36.2 * qemu-sgabios-8-150500.49.36.2 * qemu-skiboot-7.1.0-150500.49.36.2 * qemu-microvm-7.1.0-150500.49.36.2 * qemu-lang-7.1.0-150500.49.36.2 * qemu-ipxe-1.0.0+-150500.49.36.2 * qemu-seabios-1.16.0_0_gd239552-150500.49.36.2 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * qemu-block-rbd-debuginfo-7.1.0-150500.49.36.2 * qemu-block-rbd-7.1.0-150500.49.36.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-usb-redirect-7.1.0-150500.49.36.2 * qemu-tools-debuginfo-7.1.0-150500.49.36.2 * qemu-tools-7.1.0-150500.49.36.2 * qemu-7.1.0-150500.49.36.2 * qemu-chardev-spice-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-gpu-pci-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-gpu-7.1.0-150500.49.36.2 * qemu-audio-spice-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-spice-core-7.1.0-150500.49.36.2 * qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-opengl-7.1.0-150500.49.36.2 * qemu-ui-spice-core-debuginfo-7.1.0-150500.49.36.2 * qemu-block-curl-7.1.0-150500.49.36.2 * qemu-debuginfo-7.1.0-150500.49.36.2 * qemu-guest-agent-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-display-qxl-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-vga-7.1.0-150500.49.36.2 * qemu-ui-opengl-debuginfo-7.1.0-150500.49.36.2 * qemu-chardev-spice-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-spice-7.1.0-150500.49.36.2 * qemu-block-curl-debuginfo-7.1.0-150500.49.36.2 * qemu-guest-agent-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.36.2 * qemu-debugsource-7.1.0-150500.49.36.2 * SUSE Linux Enterprise Micro 5.5 (aarch64) * qemu-arm-debuginfo-7.1.0-150500.49.36.2 * qemu-arm-7.1.0-150500.49.36.2 * SUSE Linux Enterprise Micro 5.5 (noarch) * qemu-SLOF-7.1.0-150500.49.36.2 * qemu-vgabios-1.16.0_0_gd239552-150500.49.36.2 * qemu-sgabios-8-150500.49.36.2 * qemu-ipxe-1.0.0+-150500.49.36.2 * qemu-seabios-1.16.0_0_gd239552-150500.49.36.2 * SUSE Linux Enterprise Micro 5.5 (ppc64le) * qemu-ppc-debuginfo-7.1.0-150500.49.36.2 * qemu-ppc-7.1.0-150500.49.36.2 * SUSE Linux Enterprise Micro 5.5 (s390x) * qemu-s390x-debuginfo-7.1.0-150500.49.36.2 * qemu-s390x-7.1.0-150500.49.36.2 * SUSE Linux Enterprise Micro 5.5 (x86_64) * qemu-accel-tcg-x86-7.1.0-150500.49.36.2 * qemu-x86-debuginfo-7.1.0-150500.49.36.2 * qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.36.2 * qemu-x86-7.1.0-150500.49.36.2 * Server Applications Module 15-SP7 (noarch) * qemu-sgabios-8-150500.49.36.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * qemu-block-ssh-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-usb-redirect-7.1.0-150500.49.36.2 * qemu-tools-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-usb-host-7.1.0-150500.49.36.2 * qemu-tools-7.1.0-150500.49.36.2 * qemu-7.1.0-150500.49.36.2 * qemu-chardev-baum-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-usb-host-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-spice-app-7.1.0-150500.49.36.2 * qemu-chardev-spice-7.1.0-150500.49.36.2 * qemu-block-rbd-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-gtk-7.1.0-150500.49.36.2 * qemu-ksm-7.1.0-150500.49.36.2 * qemu-audio-spice-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-spice-core-7.1.0-150500.49.36.2 * qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-opengl-7.1.0-150500.49.36.2 * qemu-ui-dbus-7.1.0-150500.49.36.2 * qemu-block-ssh-7.1.0-150500.49.36.2 * qemu-ui-spice-core-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-spice-app-debuginfo-7.1.0-150500.49.36.2 * qemu-block-curl-7.1.0-150500.49.36.2 * qemu-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-curses-debuginfo-7.1.0-150500.49.36.2 * qemu-block-iscsi-debuginfo-7.1.0-150500.49.36.2 * qemu-guest-agent-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.36.2 * qemu-block-iscsi-7.1.0-150500.49.36.2 * qemu-hw-display-qxl-7.1.0-150500.49.36.2 * qemu-ui-dbus-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-vga-7.1.0-150500.49.36.2 * qemu-audio-dbus-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-dbus-7.1.0-150500.49.36.2 * qemu-block-rbd-7.1.0-150500.49.36.2 * qemu-ui-gtk-debuginfo-7.1.0-150500.49.36.2 * qemu-chardev-spice-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-opengl-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-spice-7.1.0-150500.49.36.2 * qemu-block-curl-debuginfo-7.1.0-150500.49.36.2 * qemu-guest-agent-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.36.2 * qemu-chardev-baum-7.1.0-150500.49.36.2 * qemu-ui-curses-7.1.0-150500.49.36.2 * qemu-debugsource-7.1.0-150500.49.36.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64) * qemu-arm-debuginfo-7.1.0-150500.49.36.2 * qemu-arm-7.1.0-150500.49.36.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * qemu-vgabios-1.16.0_0_gd239552-150500.49.36.2 * qemu-sgabios-8-150500.49.36.2 * qemu-ipxe-1.0.0+-150500.49.36.2 * qemu-lang-7.1.0-150500.49.36.2 * qemu-seabios-1.16.0_0_gd239552-150500.49.36.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.36.2 * qemu-accel-tcg-x86-7.1.0-150500.49.36.2 * qemu-x86-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-alsa-debuginfo-7.1.0-150500.49.36.2 * qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.36.2 * qemu-kvm-7.1.0-150500.49.36.2 * qemu-audio-pa-7.1.0-150500.49.36.2 * qemu-audio-alsa-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-gpu-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-gpu-pci-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-pa-debuginfo-7.1.0-150500.49.36.2 * qemu-x86-7.1.0-150500.49.36.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * qemu-block-ssh-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-usb-redirect-7.1.0-150500.49.36.2 * qemu-tools-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-usb-host-7.1.0-150500.49.36.2 * qemu-tools-7.1.0-150500.49.36.2 * qemu-7.1.0-150500.49.36.2 * qemu-chardev-baum-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-usb-host-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-spice-app-7.1.0-150500.49.36.2 * qemu-chardev-spice-7.1.0-150500.49.36.2 * qemu-block-rbd-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-gtk-7.1.0-150500.49.36.2 * qemu-ksm-7.1.0-150500.49.36.2 * qemu-audio-spice-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-spice-core-7.1.0-150500.49.36.2 * qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-opengl-7.1.0-150500.49.36.2 * qemu-ui-dbus-7.1.0-150500.49.36.2 * qemu-block-ssh-7.1.0-150500.49.36.2 * qemu-ui-spice-core-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-spice-app-debuginfo-7.1.0-150500.49.36.2 * qemu-block-curl-7.1.0-150500.49.36.2 * qemu-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-curses-debuginfo-7.1.0-150500.49.36.2 * qemu-block-iscsi-debuginfo-7.1.0-150500.49.36.2 * qemu-guest-agent-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.36.2 * qemu-block-iscsi-7.1.0-150500.49.36.2 * qemu-hw-display-qxl-7.1.0-150500.49.36.2 * qemu-ui-dbus-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-vga-7.1.0-150500.49.36.2 * qemu-audio-dbus-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-dbus-7.1.0-150500.49.36.2 * qemu-block-rbd-7.1.0-150500.49.36.2 * qemu-ui-gtk-debuginfo-7.1.0-150500.49.36.2 * qemu-chardev-spice-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-opengl-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-spice-7.1.0-150500.49.36.2 * qemu-block-curl-debuginfo-7.1.0-150500.49.36.2 * qemu-guest-agent-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.36.2 * qemu-chardev-baum-7.1.0-150500.49.36.2 * qemu-ui-curses-7.1.0-150500.49.36.2 * qemu-debugsource-7.1.0-150500.49.36.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64) * qemu-arm-debuginfo-7.1.0-150500.49.36.2 * qemu-arm-7.1.0-150500.49.36.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * qemu-vgabios-1.16.0_0_gd239552-150500.49.36.2 * qemu-sgabios-8-150500.49.36.2 * qemu-ipxe-1.0.0+-150500.49.36.2 * qemu-lang-7.1.0-150500.49.36.2 * qemu-seabios-1.16.0_0_gd239552-150500.49.36.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.36.2 * qemu-accel-tcg-x86-7.1.0-150500.49.36.2 * qemu-x86-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-alsa-debuginfo-7.1.0-150500.49.36.2 * qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.36.2 * qemu-kvm-7.1.0-150500.49.36.2 * qemu-audio-pa-7.1.0-150500.49.36.2 * qemu-audio-alsa-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-gpu-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-gpu-pci-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-pa-debuginfo-7.1.0-150500.49.36.2 * qemu-x86-7.1.0-150500.49.36.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * qemu-block-ssh-debuginfo-7.1.0-150500.49.36.2 * qemu-tools-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-usb-host-7.1.0-150500.49.36.2 * qemu-tools-7.1.0-150500.49.36.2 * qemu-7.1.0-150500.49.36.2 * qemu-chardev-baum-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-usb-host-debuginfo-7.1.0-150500.49.36.2 * qemu-block-rbd-debuginfo-7.1.0-150500.49.36.2 * qemu-ksm-7.1.0-150500.49.36.2 * qemu-ui-dbus-7.1.0-150500.49.36.2 * qemu-block-ssh-7.1.0-150500.49.36.2 * qemu-block-curl-7.1.0-150500.49.36.2 * qemu-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-curses-debuginfo-7.1.0-150500.49.36.2 * qemu-block-iscsi-debuginfo-7.1.0-150500.49.36.2 * qemu-guest-agent-7.1.0-150500.49.36.2 * qemu-block-iscsi-7.1.0-150500.49.36.2 * qemu-ui-dbus-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-dbus-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-dbus-7.1.0-150500.49.36.2 * qemu-block-rbd-7.1.0-150500.49.36.2 * qemu-block-curl-debuginfo-7.1.0-150500.49.36.2 * qemu-guest-agent-debuginfo-7.1.0-150500.49.36.2 * qemu-chardev-baum-7.1.0-150500.49.36.2 * qemu-ui-curses-7.1.0-150500.49.36.2 * qemu-debugsource-7.1.0-150500.49.36.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64) * qemu-arm-debuginfo-7.1.0-150500.49.36.2 * qemu-arm-7.1.0-150500.49.36.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le x86_64) * qemu-hw-usb-redirect-7.1.0-150500.49.36.2 * qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-opengl-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-display-qxl-7.1.0-150500.49.36.2 * qemu-ui-spice-core-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-vga-7.1.0-150500.49.36.2 * qemu-ui-spice-app-7.1.0-150500.49.36.2 * qemu-chardev-spice-7.1.0-150500.49.36.2 * qemu-ui-gtk-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-gtk-7.1.0-150500.49.36.2 * qemu-chardev-spice-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-opengl-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-spice-app-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-spice-7.1.0-150500.49.36.2 * qemu-audio-spice-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-spice-core-7.1.0-150500.49.36.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * qemu-SLOF-7.1.0-150500.49.36.2 * qemu-vgabios-1.16.0_0_gd239552-150500.49.36.2 * qemu-sgabios-8-150500.49.36.2 * qemu-skiboot-7.1.0-150500.49.36.2 * qemu-ipxe-1.0.0+-150500.49.36.2 * qemu-lang-7.1.0-150500.49.36.2 * qemu-seabios-1.16.0_0_gd239552-150500.49.36.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (ppc64le) * qemu-ppc-debuginfo-7.1.0-150500.49.36.2 * qemu-ppc-7.1.0-150500.49.36.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (s390x x86_64) * qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.36.2 * qemu-kvm-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-gpu-pci-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-gpu-7.1.0-150500.49.36.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (s390x) * qemu-s390x-7.1.0-150500.49.36.2 * qemu-hw-s390x-virtio-gpu-ccw-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-s390x-virtio-gpu-ccw-7.1.0-150500.49.36.2 * qemu-s390x-debuginfo-7.1.0-150500.49.36.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * qemu-accel-tcg-x86-7.1.0-150500.49.36.2 * qemu-x86-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-alsa-debuginfo-7.1.0-150500.49.36.2 * qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-pa-7.1.0-150500.49.36.2 * qemu-audio-alsa-7.1.0-150500.49.36.2 * qemu-audio-pa-debuginfo-7.1.0-150500.49.36.2 * qemu-x86-7.1.0-150500.49.36.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * qemu-block-ssh-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-usb-redirect-7.1.0-150500.49.36.2 * qemu-tools-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-usb-host-7.1.0-150500.49.36.2 * qemu-tools-7.1.0-150500.49.36.2 * qemu-7.1.0-150500.49.36.2 * qemu-chardev-baum-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-usb-host-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-spice-app-7.1.0-150500.49.36.2 * qemu-chardev-spice-7.1.0-150500.49.36.2 * qemu-block-rbd-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-gtk-7.1.0-150500.49.36.2 * qemu-ksm-7.1.0-150500.49.36.2 * qemu-audio-spice-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-spice-core-7.1.0-150500.49.36.2 * qemu-hw-usb-redirect-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-opengl-7.1.0-150500.49.36.2 * qemu-ui-dbus-7.1.0-150500.49.36.2 * qemu-block-ssh-7.1.0-150500.49.36.2 * qemu-ui-spice-core-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-spice-app-debuginfo-7.1.0-150500.49.36.2 * qemu-block-curl-7.1.0-150500.49.36.2 * qemu-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-curses-debuginfo-7.1.0-150500.49.36.2 * qemu-block-iscsi-debuginfo-7.1.0-150500.49.36.2 * qemu-guest-agent-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-vga-debuginfo-7.1.0-150500.49.36.2 * qemu-block-iscsi-7.1.0-150500.49.36.2 * qemu-hw-display-qxl-7.1.0-150500.49.36.2 * qemu-ui-dbus-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-vga-7.1.0-150500.49.36.2 * qemu-audio-dbus-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-dbus-7.1.0-150500.49.36.2 * qemu-block-rbd-7.1.0-150500.49.36.2 * qemu-ui-gtk-debuginfo-7.1.0-150500.49.36.2 * qemu-chardev-spice-debuginfo-7.1.0-150500.49.36.2 * qemu-ui-opengl-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-spice-7.1.0-150500.49.36.2 * qemu-block-curl-debuginfo-7.1.0-150500.49.36.2 * qemu-guest-agent-debuginfo-7.1.0-150500.49.36.2 * qemu-hw-display-qxl-debuginfo-7.1.0-150500.49.36.2 * qemu-chardev-baum-7.1.0-150500.49.36.2 * qemu-ui-curses-7.1.0-150500.49.36.2 * qemu-debugsource-7.1.0-150500.49.36.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * qemu-SLOF-7.1.0-150500.49.36.2 * qemu-vgabios-1.16.0_0_gd239552-150500.49.36.2 * qemu-sgabios-8-150500.49.36.2 * qemu-skiboot-7.1.0-150500.49.36.2 * qemu-ipxe-1.0.0+-150500.49.36.2 * qemu-lang-7.1.0-150500.49.36.2 * qemu-seabios-1.16.0_0_gd239552-150500.49.36.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le) * qemu-ppc-debuginfo-7.1.0-150500.49.36.2 * qemu-ppc-7.1.0-150500.49.36.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * qemu-hw-display-virtio-gpu-debuginfo-7.1.0-150500.49.36.2 * qemu-accel-tcg-x86-7.1.0-150500.49.36.2 * qemu-x86-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-alsa-debuginfo-7.1.0-150500.49.36.2 * qemu-accel-tcg-x86-debuginfo-7.1.0-150500.49.36.2 * qemu-kvm-7.1.0-150500.49.36.2 * qemu-audio-pa-7.1.0-150500.49.36.2 * qemu-audio-alsa-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-gpu-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-gpu-pci-7.1.0-150500.49.36.2 * qemu-hw-display-virtio-gpu-pci-debuginfo-7.1.0-150500.49.36.2 * qemu-audio-pa-debuginfo-7.1.0-150500.49.36.2 * qemu-x86-7.1.0-150500.49.36.2 ## References: * https://www.suse.com/security/cve/CVE-2024-6505.html * https://www.suse.com/security/cve/CVE-2025-11234.html * https://www.suse.com/security/cve/CVE-2025-12464.html * https://bugzilla.suse.com/show_bug.cgi?id=1227397 * https://bugzilla.suse.com/show_bug.cgi?id=1250984 * https://bugzilla.suse.com/show_bug.cgi?id=1252768 * https://bugzilla.suse.com/show_bug.cgi?id=1253002 * https://bugzilla.suse.com/show_bug.cgi?id=1254286 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 6 16:30:16 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 06 Jan 2026 16:30:16 -0000 Subject: SUSE-SU-2026:0037-1: moderate: Security update for govulncheck-vulndb Message-ID: <176771701610.22147.13922197273723003090@smelt2.prg2.suse.org> # Security update for govulncheck-vulndb Announcement ID: SUSE-SU-2026:0037-1 Release Date: 2026-01-06T10:24:38Z Rating: moderate References: * jsc#PED-11136 Affected Products: * openSUSE Leap 15.6 An update that contains one feature can now be installed. ## Description: This update for govulncheck-vulndb fixes the following issues: * Update to version 0.0.20251230T014957 2025-12-30T01:49:57Z (jsc#PED-11136). Go CVE Numbering Authority IDs added or updated with aliases: * GO-2025-4249 CVE-2025-68120 CVE-2025-68120 * GO-2025-4254 CVE-2025-62190 GHSA-gmx5-frv9-9m9f * GO-2025-4255 CVE-2025-12689 GHSA-j5vq-62gr-8v3r * GO-2025-4256 CVE-2025-13324 GHSA-x3r8-2hmh-89f5 * GO-2025-4257 CVE-2025-68476 GHSA-c4p6-qg4m-9jmr * GO-2025-4258 CVE-2025-68938 GHSA-cm54-pfmc-xrwx * GO-2025-4261 CVE-2025-68939 GHSA-263q-5cv3-xq9g * GO-2025-4262 CVE-2025-68945 GHSA-7xq4-mwcp-q8fx * GO-2025-4263 CVE-2025-68942 GHSA-898p-hh3p-hf9r * GO-2025-4264 CVE-2025-68944 GHSA-f85h-c7m6-cfpm * GO-2025-4265 CVE-2025-68946 GHSA-hq57-c72x-4774 * GO-2025-4266 CVE-2025-68943 GHSA-jhx5-4vr4-f327 * GO-2025-4267 CVE-2025-68940 GHSA-rrcw-5rjv-vj26 * GO-2025-4268 CVE-2025-68941 GHSA-xfq3-qj7j-4565 * Update to version 0.0.20251222T181535 2025-12-22T18:15:35Z (jsc#PED-11136). Go CVE Numbering Authority IDs added or updated with aliases: * GO-2025-4241 CVE-2025-11393 GHSA-cc8c-28gj-px38 * GO-2025-4242 CVE-2025-13888 GHSA- pcqx-8qww-7f4v * GO-2025-4243 GHSA-wh6m-h6f4-rjf4 * GO-2025-4244 CVE-2025-68274 GHSA-c623-f998-8hhv * GO-2025-4245 CVE-2025-68156 GHSA-cfpf-hrx2-8rv6 * GO-2025-4247 CVE-2025-13352 GHSA-jf5h-xfw4-p8gp * GO-2025-4250 CVE-2025-14764 GHSA-3g75-q268-r9r6 * Update to version 0.0.20251216T193914 2025-12-16T19:39:14Z (jsc#PED-11136). Go CVE Numbering Authority IDs added or updated with aliases: * GO-2025-4239 CVE-2025-68113 GHSA-6gvq-jcmp-8959 * GO-2025-4240 CVE-2025-13281 GHSA-r6j8-c6r2-37rr * Update to version 0.0.20251216T162327 2025-12-16T16:23:27Z (jsc#PED-11136). Go CVE Numbering Authority IDs added or updated with aliases: * GO-2024-3036 CVE-2024-41265 GHSA-vw7g-3cc7-7rmh * GO-2024-3057 CVE-2024-41260 GHSA-9v35-4xcr-w9ph * GO-2025-3437 GHSA-274v-mgcv-cm8j * GO-2025-3465 CVE-2025-0426 GHSA-jgfp-53c3-624w * GO-2025-3764 CVE-2024-44905 GHSA-6xp3-p59p-q4fj * GO-2025-3829 CVE-2025-54410 GHSA-4vq8-7jfc-9cvp * GO-2025-4116 CVE-2025-47913 * GO-2025-4122 CVE-2025-11777 GHSA-mqcj-8c2g-h97q * GO-2025-4178 CVE-2025-13870 GHSA-58w6-w55x-6wq8 * Update to version 0.0.20251215T203741 2025-12-15T20:37:41Z (jsc#PED-11136). Go CVE Numbering Authority IDs added or updated with aliases: * GO-2025-4136 CVE-2025-64708 GHSA-ch7q-53v8-73pc * GO-2025-4137 CVE-2025-64521 GHSA- xr73-jq5p-ch8r * GO-2025-4148 CVE-2017-18874 GHSA-8qg8-c7mw-6fj7 * GO-2025-4154 CVE-2025-62155 GHSA-9f46-w24h-69w4 * GO-2025-4161 CVE-2025-65942 GHSA-66jq-2c23-2xh5 * GO-2025-4162 CVE-2025-60633 GHSA-3j9f-7w24-pcqg * GO-2025-4167 CVE-2025-64715 GHSA-38pp-6gcp-rqvm * GO-2025-4168 CVE-2025-12419 GHSA-3x39-62h4-f8j6 * GO-2025-4169 CVE-2025-12559 GHSA-4g87-9x45-cx2h * GO-2025-4170 CVE-2025-12421 GHSA-mp6x-97xj-9x62 * GO-2025-4173 CVE-2025-10543 GHSA-32fw-gq77-f2f2 * GO-2025-4188 CVE-2025-65637 GHSA-4f99-4q7p-p3gh * GO-2025-4191 CVE-2017-18878 GHSA-h564-6gc2-fcc6 * GO-2025-4199 CVE-2017-18887 GHSA-35c4-5qfp-wxj6 * GO-2025-4200 CVE-2017-18885 GHSA-g78f-6xq7-rrhq * GO-2025-4201 CVE-2017-18889 GHSA-jp57-4x34-5v94 * GO-2025-4202 CVE-2017-18890 GHSA-m497-hq5x-6jcv * GO-2025-4203 CVE-2017-18888 GHSA-v2vm-hq26-5jv6 * GO-2025-4204 CVE-2017-18886 GHSA-wvjg-33p9-938h * GO-2025-4205 CVE-2025-66491 GHSA-7vww-mvcr-x6vj * GO-2025-4206 CVE-2025-66490 GHSA-gm3x-23wp-hc2c * GO-2025-4207 CVE-2025-66508 GHSA-7cqv-qcq2-r765 * GO-2025-4208 CVE-2025-66565 GHSA-m98w-cqp3-qcqr * GO-2025-4209 CVE-2025-66507 GHSA-qmg5-v42x-qqhq * GO-2025-4210 CVE-2025-67494 GHSA-7wfc-4796-gmg5 * GO-2025-4211 GHSA-m6wq-66p2-c8pc * GO-2025-4212 GHSA-pfrf-9r5f-73f5 * GO-2025-4213 CVE-2025-67495 GHSA-v959-qxv6-6f8p * GO-2025-4214 GHSA-4rmq-mc2c-r495 * GO-2025-4215 CVE-2025-65796 GHSA-8jcj-g9f4-qx42 * GO-2025-4216 CVE-2025-65798 GHSA-8p44-g572-557h * GO-2025-4217 CVE-2025-65795 GHSA-mg56-wc4q-rw4w * GO-2025-4218 CVE-2025-65799 GHSA-qgjp-5g5x-vhq2 * GO-2025-4219 GHSA-4r66-7rcv-x46x * GO-2025-4220 CVE-2025-65797 GHSA-99m2-qwx6-2w6f * GO-2025-4221 CVE-2025-67488 GHSA-gqfv-g4v7-m366 * GO-2025-4222 CVE-2025-67499 GHSA-jv3w-x3r3-g6rm * GO-2025-4223 CVE-2025-66626 GHSA-xrqc-7xgx-c9vh * GO-2025-4224 GHSA-mjcp-gpgx-ggcg * GO-2025-4225 CVE-2025-8110 GHSA-mq8m-42gh- wq7r * GO-2025-4226 CVE-2025-67713 GHSA-wqv2-4wpg-8hc9 * GO-2025-4227 CVE-2025-67717 GHSA-f4cf-9rvr-2rcx * GO-2025-4228 CVE-2025-65754 GHSA-8jqm-8qm3-qgqm * GO-2025-4229 CVE-2025-34410 GHSA-rpr2-4hqj-hc4q * GO-2025-4230 CVE-2025-34430 GHSA-5xpq-2vmc-5cqp * GO-2025-4231 CVE-2025-34429 GHSA-wrvc-x3wf-j5f5 * GO-2025-4232 CVE-2025-67508 GHSA-fw33-qpx7-rhx2 * GO-2025-4233 CVE-2025-64702 GHSA-g754-hx8w-x2g6 * GO-2025-4235 CVE-2025-66001 GHSA-4jj9-cgqc-x9h5 * GO-2025-4236 GHSA-4jmp-x7mh-rgmr * GO-2025-4237 CVE-2025-67818 GHSA-7v39-2hx7-7c43 * GO-2025-4238 CVE-2025-67819 GHSA- hmmh-292h-3364 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-37=1 ## Package List: * openSUSE Leap 15.6 (noarch) * govulncheck-vulndb-0.0.20251230T014957-150000.1.134.1 ## References: * https://jira.suse.com/browse/PED-11136 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 6 16:30:18 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 06 Jan 2026 16:30:18 -0000 Subject: SUSE-SU-2026:0036-1: low: Security update for libpcap Message-ID: <176771701845.22147.12288735985759506262@smelt2.prg2.suse.org> # Security update for libpcap Announcement ID: SUSE-SU-2026:0036-1 Release Date: 2026-01-06T10:22:41Z Rating: low References: * bsc#1255765 Cross-References: * CVE-2025-11961 CVSS scores: * CVE-2025-11961 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-11961 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-11961 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.6 An update that solves one vulnerability can now be installed. ## Description: This update for libpcap fixes the following issues: * CVE-2025-11961: missing validation of provided MAC-48 address string in `pcap_ether_aton()` can lead to out-of-bounds read and write (bsc#1255765). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-36=1 openSUSE-SLE-15.6-2026-36=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libpcap1-debuginfo-1.10.4-150600.3.9.1 * libpcap1-1.10.4-150600.3.9.1 * libpcap-debugsource-1.10.4-150600.3.9.1 * libpcap-devel-static-1.10.4-150600.3.9.1 * libpcap-devel-1.10.4-150600.3.9.1 * openSUSE Leap 15.6 (x86_64) * libpcap1-32bit-debuginfo-1.10.4-150600.3.9.1 * libpcap1-32bit-1.10.4-150600.3.9.1 * libpcap-devel-32bit-1.10.4-150600.3.9.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libpcap1-64bit-debuginfo-1.10.4-150600.3.9.1 * libpcap-devel-64bit-1.10.4-150600.3.9.1 * libpcap1-64bit-1.10.4-150600.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11961.html * https://bugzilla.suse.com/show_bug.cgi?id=1255765 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 6 16:30:21 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 06 Jan 2026 16:30:21 -0000 Subject: SUSE-RU-2026:0035-1: moderate: Recommended update for php8 Message-ID: <176771702111.22147.5434925783775691377@smelt2.prg2.suse.org> # Recommended update for php8 Announcement ID: SUSE-RU-2026:0035-1 Release Date: 2026-01-06T08:42:26Z Rating: moderate References: * bsc#1255043 Affected Products: * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * Web and Scripting Module 15-SP7 An update that has one fix can now be installed. ## Description: This update for php8 fixes the following issues: * main package require wwwrun:www user as it assumes it in filelist (bsc#1255043) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Web and Scripting Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP7-2026-35=1 ## Package List: * Web and Scripting Module 15-SP7 (aarch64 ppc64le s390x x86_64) * php8-opcache-8.3.23-150700.3.6.1 * php8-soap-8.3.23-150700.3.6.1 * php8-pcntl-8.3.23-150700.3.6.1 * php8-embed-debuginfo-8.3.23-150700.3.6.1 * php8-pcntl-debuginfo-8.3.23-150700.3.6.1 * php8-tokenizer-debuginfo-8.3.23-150700.3.6.1 * apache2-mod_php8-debugsource-8.3.23-150700.3.6.1 * php8-cli-debuginfo-8.3.23-150700.3.6.1 * php8-mbstring-8.3.23-150700.3.6.1 * php8-sysvmsg-8.3.23-150700.3.6.1 * php8-soap-debuginfo-8.3.23-150700.3.6.1 * php8-bcmath-8.3.23-150700.3.6.1 * php8-intl-debuginfo-8.3.23-150700.3.6.1 * php8-calendar-8.3.23-150700.3.6.1 * php8-opcache-debuginfo-8.3.23-150700.3.6.1 * php8-tidy-debuginfo-8.3.23-150700.3.6.1 * php8-gmp-debuginfo-8.3.23-150700.3.6.1 * php8-gmp-8.3.23-150700.3.6.1 * php8-snmp-debuginfo-8.3.23-150700.3.6.1 * php8-dba-8.3.23-150700.3.6.1 * php8-sysvshm-debuginfo-8.3.23-150700.3.6.1 * php8-sysvsem-8.3.23-150700.3.6.1 * php8-ctype-debuginfo-8.3.23-150700.3.6.1 * php8-mbstring-debuginfo-8.3.23-150700.3.6.1 * php8-pdo-debuginfo-8.3.23-150700.3.6.1 * php8-8.3.23-150700.3.6.1 * php8-curl-8.3.23-150700.3.6.1 * php8-devel-8.3.23-150700.3.6.1 * php8-gd-8.3.23-150700.3.6.1 * php8-test-8.3.23-150700.3.6.1 * apache2-mod_php8-debuginfo-8.3.23-150700.3.6.1 * php8-mysql-8.3.23-150700.3.6.1 * php8-posix-debuginfo-8.3.23-150700.3.6.1 * php8-zip-8.3.23-150700.3.6.1 * php8-gettext-debuginfo-8.3.23-150700.3.6.1 * php8-bz2-8.3.23-150700.3.6.1 * php8-ldap-8.3.23-150700.3.6.1 * php8-calendar-debuginfo-8.3.23-150700.3.6.1 * php8-xmlwriter-debuginfo-8.3.23-150700.3.6.1 * php8-sqlite-debuginfo-8.3.23-150700.3.6.1 * php8-mysql-debuginfo-8.3.23-150700.3.6.1 * php8-sockets-debuginfo-8.3.23-150700.3.6.1 * php8-cli-8.3.23-150700.3.6.1 * php8-sysvmsg-debuginfo-8.3.23-150700.3.6.1 * php8-xsl-debuginfo-8.3.23-150700.3.6.1 * php8-xsl-8.3.23-150700.3.6.1 * php8-fileinfo-8.3.23-150700.3.6.1 * php8-pgsql-8.3.23-150700.3.6.1 * php8-posix-8.3.23-150700.3.6.1 * php8-openssl-debuginfo-8.3.23-150700.3.6.1 * php8-fpm-8.3.23-150700.3.6.1 * php8-sysvshm-8.3.23-150700.3.6.1 * php8-tokenizer-8.3.23-150700.3.6.1 * php8-sockets-8.3.23-150700.3.6.1 * php8-fpm-debugsource-8.3.23-150700.3.6.1 * php8-odbc-8.3.23-150700.3.6.1 * php8-ftp-debuginfo-8.3.23-150700.3.6.1 * php8-iconv-8.3.23-150700.3.6.1 * php8-ftp-8.3.23-150700.3.6.1 * php8-readline-8.3.23-150700.3.6.1 * php8-intl-8.3.23-150700.3.6.1 * php8-exif-debuginfo-8.3.23-150700.3.6.1 * php8-phar-debuginfo-8.3.23-150700.3.6.1 * php8-sysvsem-debuginfo-8.3.23-150700.3.6.1 * php8-dom-8.3.23-150700.3.6.1 * php8-readline-debuginfo-8.3.23-150700.3.6.1 * php8-pdo-8.3.23-150700.3.6.1 * php8-zip-debuginfo-8.3.23-150700.3.6.1 * php8-exif-8.3.23-150700.3.6.1 * php8-embed-8.3.23-150700.3.6.1 * php8-fastcgi-debuginfo-8.3.23-150700.3.6.1 * php8-shmop-8.3.23-150700.3.6.1 * php8-enchant-8.3.23-150700.3.6.1 * php8-fileinfo-debuginfo-8.3.23-150700.3.6.1 * php8-gd-debuginfo-8.3.23-150700.3.6.1 * php8-bcmath-debuginfo-8.3.23-150700.3.6.1 * php8-embed-debugsource-8.3.23-150700.3.6.1 * php8-dba-debuginfo-8.3.23-150700.3.6.1 * php8-shmop-debuginfo-8.3.23-150700.3.6.1 * php8-zlib-debuginfo-8.3.23-150700.3.6.1 * php8-iconv-debuginfo-8.3.23-150700.3.6.1 * php8-xmlwriter-8.3.23-150700.3.6.1 * apache2-mod_php8-8.3.23-150700.3.6.1 * php8-sodium-debuginfo-8.3.23-150700.3.6.1 * php8-dom-debuginfo-8.3.23-150700.3.6.1 * php8-sqlite-8.3.23-150700.3.6.1 * php8-bz2-debuginfo-8.3.23-150700.3.6.1 * php8-xmlreader-debuginfo-8.3.23-150700.3.6.1 * php8-ldap-debuginfo-8.3.23-150700.3.6.1 * php8-fpm-debuginfo-8.3.23-150700.3.6.1 * php8-tidy-8.3.23-150700.3.6.1 * php8-openssl-8.3.23-150700.3.6.1 * php8-ctype-8.3.23-150700.3.6.1 * php8-fastcgi-8.3.23-150700.3.6.1 * php8-gettext-8.3.23-150700.3.6.1 * php8-snmp-8.3.23-150700.3.6.1 * php8-curl-debuginfo-8.3.23-150700.3.6.1 * php8-pgsql-debuginfo-8.3.23-150700.3.6.1 * php8-debuginfo-8.3.23-150700.3.6.1 * php8-phar-8.3.23-150700.3.6.1 * php8-xmlreader-8.3.23-150700.3.6.1 * php8-fastcgi-debugsource-8.3.23-150700.3.6.1 * php8-debugsource-8.3.23-150700.3.6.1 * php8-sodium-8.3.23-150700.3.6.1 * php8-zlib-8.3.23-150700.3.6.1 * php8-enchant-debuginfo-8.3.23-150700.3.6.1 * php8-odbc-debuginfo-8.3.23-150700.3.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1255043 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 7 08:30:08 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Jan 2026 08:30:08 -0000 Subject: SUSE-SU-2026:0044-1: moderate: Security update for mozjs60 Message-ID: <176777460834.22173.13180410578970144640@smelt2.prg2.suse.org> # Security update for mozjs60 Announcement ID: SUSE-SU-2026:0044-1 Release Date: 2026-01-06T16:10:26Z Rating: moderate References: * bsc#1230036 * bsc#1230037 * bsc#1230038 * bsc#1232602 Cross-References: * CVE-2024-45490 * CVE-2024-45491 * CVE-2024-45492 * CVE-2024-50602 CVSS scores: * CVE-2024-45490 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45490 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45490 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45490 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45491 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45491 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45491 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45491 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-45492 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-45492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-45492 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2024-45492 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-50602 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-50602 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-50602 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves four vulnerabilities can now be installed. ## Description: This update for mozjs60 fixes the following issues: * CVE-2024-50602: embedded expat: make XML_StopParser refuse to stop/suspend an unstarted parser and be explicit about XML_PARSING in XML_StopParser (bsc#1232602) * CVE-2024-45492: embedded expat: detect integer overflow in function nextScaffoldPart (bsc#1230038) * CVE-2024-45491: embedded expat: detect integer overflow in dtdCopy (bsc#1230037) * CVE-2024-45490: embedded expat: reject negative len for XML_ParseBuffer (bsc#1230036) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-44=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-44=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-44=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-44=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-44=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-44=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-44=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-44=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-44=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libmozjs-60-debuginfo-60.9.0-150200.6.8.1 * mozjs60-devel-60.9.0-150200.6.8.1 * mozjs60-debuginfo-60.9.0-150200.6.8.1 * mozjs60-60.9.0-150200.6.8.1 * libmozjs-60-60.9.0-150200.6.8.1 * mozjs60-debugsource-60.9.0-150200.6.8.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * mozjs60-debugsource-60.9.0-150200.6.8.1 * libmozjs-60-debuginfo-60.9.0-150200.6.8.1 * libmozjs-60-60.9.0-150200.6.8.1 * mozjs60-debuginfo-60.9.0-150200.6.8.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * mozjs60-debugsource-60.9.0-150200.6.8.1 * libmozjs-60-debuginfo-60.9.0-150200.6.8.1 * libmozjs-60-60.9.0-150200.6.8.1 * mozjs60-debuginfo-60.9.0-150200.6.8.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * mozjs60-debugsource-60.9.0-150200.6.8.1 * libmozjs-60-debuginfo-60.9.0-150200.6.8.1 * libmozjs-60-60.9.0-150200.6.8.1 * mozjs60-debuginfo-60.9.0-150200.6.8.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * mozjs60-debugsource-60.9.0-150200.6.8.1 * libmozjs-60-debuginfo-60.9.0-150200.6.8.1 * libmozjs-60-60.9.0-150200.6.8.1 * mozjs60-debuginfo-60.9.0-150200.6.8.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * mozjs60-debugsource-60.9.0-150200.6.8.1 * libmozjs-60-debuginfo-60.9.0-150200.6.8.1 * libmozjs-60-60.9.0-150200.6.8.1 * mozjs60-debuginfo-60.9.0-150200.6.8.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * mozjs60-debugsource-60.9.0-150200.6.8.1 * mozjs60-devel-60.9.0-150200.6.8.1 * mozjs60-debuginfo-60.9.0-150200.6.8.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * mozjs60-debugsource-60.9.0-150200.6.8.1 * libmozjs-60-debuginfo-60.9.0-150200.6.8.1 * libmozjs-60-60.9.0-150200.6.8.1 * mozjs60-debuginfo-60.9.0-150200.6.8.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * mozjs60-debugsource-60.9.0-150200.6.8.1 * libmozjs-60-debuginfo-60.9.0-150200.6.8.1 * libmozjs-60-60.9.0-150200.6.8.1 * mozjs60-debuginfo-60.9.0-150200.6.8.1 ## References: * https://www.suse.com/security/cve/CVE-2024-45490.html * https://www.suse.com/security/cve/CVE-2024-45491.html * https://www.suse.com/security/cve/CVE-2024-45492.html * https://www.suse.com/security/cve/CVE-2024-50602.html * https://bugzilla.suse.com/show_bug.cgi?id=1230036 * https://bugzilla.suse.com/show_bug.cgi?id=1230037 * https://bugzilla.suse.com/show_bug.cgi?id=1230038 * https://bugzilla.suse.com/show_bug.cgi?id=1232602 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 7 08:30:14 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Jan 2026 08:30:14 -0000 Subject: SUSE-SU-2026:0043-1: important: Security update for qemu Message-ID: <176777461479.22173.9935195110650759247@smelt2.prg2.suse.org> # Security update for qemu Announcement ID: SUSE-SU-2026:0043-1 Release Date: 2026-01-06T16:03:08Z Rating: important References: * bsc#1209554 * bsc#1227397 * bsc#1252768 * bsc#1253002 * bsc#1254286 Cross-References: * CVE-2023-1544 * CVE-2024-6505 * CVE-2025-12464 CVSS scores: * CVE-2023-1544 ( SUSE ): 7.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:H * CVE-2023-1544 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H * CVE-2023-1544 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-6505 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-6505 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-6505 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2025-12464 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-12464 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-12464 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that solves three vulnerabilities and has two security fixes can now be installed. ## Description: This update for qemu fixes the following issues: Security issues fixed: * CVE-2023-1544: out-of-bounds read in VMWare's paravirtual RDMA device operations can be exploited through a malicious guest driver to crash the QEMU process on the host (bsc#1209554). * CVE-2024-6505: heap-based buffer overflow in the virtio-net device operations can be exploited by a malicious privileged user to crash the QEMU process on the host (bsc#1227397). * CVE-2025-12464: stack-based buffer overflow in the e1000 network device operations can be exploited by a malicious guest user to crash the QEMU process on the host (bsc#1253002). Other updates and bugfixes: * [openSUSE][RPM] spec: require qemu-hw-display-virtio-gpu-pci for x86 too. * [openSUSE][RPM} spec: delete old specfile constructs. * block/curl: fix curl internal handles handling (bsc#1252768). * [openSUSE][RPM]: really fix *-virtio-gpu-pci dependency on ARM (bsc#1254286). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-43=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2026-43=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2026-43=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2026-43=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-43=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-43=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-43=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-43=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-43=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-43=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-43=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-43=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * qemu-block-curl-6.2.0-150400.37.46.1 * qemu-hw-usb-host-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-opengl-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-usb-host-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.46.1 * qemu-block-iscsi-debuginfo-6.2.0-150400.37.46.1 * qemu-guest-agent-debuginfo-6.2.0-150400.37.46.1 * qemu-6.2.0-150400.37.46.1 * qemu-ui-curses-6.2.0-150400.37.46.1 * qemu-lang-6.2.0-150400.37.46.1 * qemu-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-6.2.0-150400.37.46.1 * qemu-debugsource-6.2.0-150400.37.46.1 * qemu-block-rbd-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-6.2.0-150400.37.46.1 * qemu-tools-6.2.0-150400.37.46.1 * qemu-block-ssh-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-gtk-6.2.0-150400.37.46.1 * qemu-chardev-baum-6.2.0-150400.37.46.1 * qemu-block-iscsi-6.2.0-150400.37.46.1 * qemu-chardev-spice-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.46.1 * qemu-tools-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-opengl-6.2.0-150400.37.46.1 * qemu-block-rbd-debuginfo-6.2.0-150400.37.46.1 * qemu-guest-agent-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.46.1 * qemu-ksm-6.2.0-150400.37.46.1 * qemu-ui-spice-app-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-curses-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-6.2.0-150400.37.46.1 * qemu-ui-spice-app-6.2.0-150400.37.46.1 * qemu-block-curl-debuginfo-6.2.0-150400.37.46.1 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-gtk-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-spice-core-6.2.0-150400.37.46.1 * qemu-block-ssh-6.2.0-150400.37.46.1 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.46.1 * qemu-chardev-baum-debuginfo-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-skiboot-6.2.0-150400.37.46.1 * qemu-ipxe-1.0.0+-150400.37.46.1 * qemu-SLOF-6.2.0-150400.37.46.1 * qemu-sgabios-8-150400.37.46.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le) * qemu-ppc-debuginfo-6.2.0-150400.37.46.1 * qemu-ppc-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-accel-tcg-x86-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-pa-debuginfo-6.2.0-150400.37.46.1 * qemu-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.46.1 * qemu-audio-alsa-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-pa-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.46.1 * qemu-kvm-6.2.0-150400.37.46.1 * qemu-x86-6.2.0-150400.37.46.1 * qemu-audio-alsa-6.2.0-150400.37.46.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * qemu-block-curl-6.2.0-150400.37.46.1 * qemu-hw-usb-host-debuginfo-6.2.0-150400.37.46.1 * qemu-accel-tcg-x86-6.2.0-150400.37.46.1 * qemu-ui-opengl-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-usb-host-6.2.0-150400.37.46.1 * qemu-x86-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.46.1 * qemu-block-iscsi-debuginfo-6.2.0-150400.37.46.1 * qemu-guest-agent-debuginfo-6.2.0-150400.37.46.1 * qemu-6.2.0-150400.37.46.1 * qemu-ui-curses-6.2.0-150400.37.46.1 * qemu-lang-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.46.1 * qemu-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-6.2.0-150400.37.46.1 * qemu-debugsource-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.46.1 * qemu-block-rbd-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-6.2.0-150400.37.46.1 * qemu-tools-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.46.1 * qemu-kvm-6.2.0-150400.37.46.1 * qemu-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-block-ssh-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-alsa-6.2.0-150400.37.46.1 * qemu-ui-gtk-6.2.0-150400.37.46.1 * qemu-chardev-baum-6.2.0-150400.37.46.1 * qemu-block-iscsi-6.2.0-150400.37.46.1 * qemu-chardev-spice-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.46.1 * qemu-tools-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.46.1 * qemu-ui-opengl-6.2.0-150400.37.46.1 * qemu-audio-pa-6.2.0-150400.37.46.1 * qemu-block-rbd-debuginfo-6.2.0-150400.37.46.1 * qemu-guest-agent-6.2.0-150400.37.46.1 * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.46.1 * qemu-ksm-6.2.0-150400.37.46.1 * qemu-ui-spice-app-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-curses-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-pa-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-6.2.0-150400.37.46.1 * qemu-block-curl-debuginfo-6.2.0-150400.37.46.1 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-spice-app-6.2.0-150400.37.46.1 * qemu-ui-gtk-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-spice-core-6.2.0-150400.37.46.1 * qemu-audio-alsa-debuginfo-6.2.0-150400.37.46.1 * qemu-block-ssh-6.2.0-150400.37.46.1 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.46.1 * qemu-chardev-baum-debuginfo-6.2.0-150400.37.46.1 * SUSE Manager Proxy 4.3 LTS (noarch) * qemu-sgabios-8-150400.37.46.1 * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-ipxe-1.0.0+-150400.37.46.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * qemu-block-curl-6.2.0-150400.37.46.1 * qemu-hw-usb-host-debuginfo-6.2.0-150400.37.46.1 * qemu-accel-tcg-x86-6.2.0-150400.37.46.1 * qemu-ui-opengl-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-usb-host-6.2.0-150400.37.46.1 * qemu-x86-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.46.1 * qemu-block-iscsi-debuginfo-6.2.0-150400.37.46.1 * qemu-guest-agent-debuginfo-6.2.0-150400.37.46.1 * qemu-6.2.0-150400.37.46.1 * qemu-ui-curses-6.2.0-150400.37.46.1 * qemu-lang-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.46.1 * qemu-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-6.2.0-150400.37.46.1 * qemu-debugsource-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.46.1 * qemu-block-rbd-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-6.2.0-150400.37.46.1 * qemu-tools-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.46.1 * qemu-kvm-6.2.0-150400.37.46.1 * qemu-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-block-ssh-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-alsa-6.2.0-150400.37.46.1 * qemu-ui-gtk-6.2.0-150400.37.46.1 * qemu-chardev-baum-6.2.0-150400.37.46.1 * qemu-block-iscsi-6.2.0-150400.37.46.1 * qemu-chardev-spice-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.46.1 * qemu-tools-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.46.1 * qemu-ui-opengl-6.2.0-150400.37.46.1 * qemu-audio-pa-6.2.0-150400.37.46.1 * qemu-block-rbd-debuginfo-6.2.0-150400.37.46.1 * qemu-guest-agent-6.2.0-150400.37.46.1 * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.46.1 * qemu-ksm-6.2.0-150400.37.46.1 * qemu-ui-spice-app-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-curses-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-pa-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-6.2.0-150400.37.46.1 * qemu-block-curl-debuginfo-6.2.0-150400.37.46.1 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-spice-app-6.2.0-150400.37.46.1 * qemu-ui-gtk-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-spice-core-6.2.0-150400.37.46.1 * qemu-audio-alsa-debuginfo-6.2.0-150400.37.46.1 * qemu-block-ssh-6.2.0-150400.37.46.1 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.46.1 * qemu-chardev-baum-debuginfo-6.2.0-150400.37.46.1 * SUSE Manager Retail Branch Server 4.3 LTS (noarch) * qemu-sgabios-8-150400.37.46.1 * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-ipxe-1.0.0+-150400.37.46.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * qemu-block-curl-6.2.0-150400.37.46.1 * qemu-hw-usb-host-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-usb-host-6.2.0-150400.37.46.1 * qemu-ui-curses-6.2.0-150400.37.46.1 * qemu-block-iscsi-debuginfo-6.2.0-150400.37.46.1 * qemu-guest-agent-debuginfo-6.2.0-150400.37.46.1 * qemu-6.2.0-150400.37.46.1 * qemu-lang-6.2.0-150400.37.46.1 * qemu-debuginfo-6.2.0-150400.37.46.1 * qemu-debugsource-6.2.0-150400.37.46.1 * qemu-block-rbd-6.2.0-150400.37.46.1 * qemu-tools-6.2.0-150400.37.46.1 * qemu-block-ssh-debuginfo-6.2.0-150400.37.46.1 * qemu-chardev-baum-6.2.0-150400.37.46.1 * qemu-block-iscsi-6.2.0-150400.37.46.1 * qemu-tools-debuginfo-6.2.0-150400.37.46.1 * qemu-block-rbd-debuginfo-6.2.0-150400.37.46.1 * qemu-guest-agent-6.2.0-150400.37.46.1 * qemu-ksm-6.2.0-150400.37.46.1 * qemu-ui-curses-debuginfo-6.2.0-150400.37.46.1 * qemu-block-curl-debuginfo-6.2.0-150400.37.46.1 * qemu-block-ssh-6.2.0-150400.37.46.1 * qemu-chardev-baum-debuginfo-6.2.0-150400.37.46.1 * SUSE Manager Server 4.3 LTS (noarch) * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-skiboot-6.2.0-150400.37.46.1 * qemu-ipxe-1.0.0+-150400.37.46.1 * qemu-SLOF-6.2.0-150400.37.46.1 * qemu-sgabios-8-150400.37.46.1 * SUSE Manager Server 4.3 LTS (ppc64le x86_64) * qemu-hw-usb-redirect-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-gtk-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-spice-app-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-6.2.0-150400.37.46.1 * qemu-audio-spice-6.2.0-150400.37.46.1 * qemu-ui-spice-app-6.2.0-150400.37.46.1 * qemu-chardev-spice-6.2.0-150400.37.46.1 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-gtk-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-6.2.0-150400.37.46.1 * qemu-ui-opengl-6.2.0-150400.37.46.1 * qemu-ui-opengl-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-spice-core-6.2.0-150400.37.46.1 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.46.1 * SUSE Manager Server 4.3 LTS (ppc64le) * qemu-ppc-debuginfo-6.2.0-150400.37.46.1 * qemu-ppc-6.2.0-150400.37.46.1 * SUSE Manager Server 4.3 LTS (s390x x86_64) * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.46.1 * qemu-kvm-6.2.0-150400.37.46.1 * SUSE Manager Server 4.3 LTS (s390x) * qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.46.1 * qemu-s390x-6.2.0-150400.37.46.1 * qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.46.1 * qemu-s390x-debuginfo-6.2.0-150400.37.46.1 * SUSE Manager Server 4.3 LTS (x86_64) * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-accel-tcg-x86-6.2.0-150400.37.46.1 * qemu-audio-pa-debuginfo-6.2.0-150400.37.46.1 * qemu-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-alsa-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-pa-6.2.0-150400.37.46.1 * qemu-x86-6.2.0-150400.37.46.1 * qemu-audio-alsa-6.2.0-150400.37.46.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * qemu-block-curl-6.2.0-150400.37.46.1 * qemu-hw-usb-host-debuginfo-6.2.0-150400.37.46.1 * qemu-block-gluster-6.2.0-150400.37.46.1 * qemu-extra-6.2.0-150400.37.46.1 * qemu-accel-tcg-x86-6.2.0-150400.37.46.1 * qemu-arm-debuginfo-6.2.0-150400.37.46.1 * qemu-ppc-debuginfo-6.2.0-150400.37.46.1 * qemu-block-nfs-6.2.0-150400.37.46.1 * qemu-ui-opengl-debuginfo-6.2.0-150400.37.46.1 * qemu-ivshmem-tools-6.2.0-150400.37.46.1 * qemu-vhost-user-gpu-6.2.0-150400.37.46.1 * qemu-hw-usb-host-6.2.0-150400.37.46.1 * qemu-vhost-user-gpu-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-oss-debuginfo-6.2.0-150400.37.46.1 * qemu-block-nfs-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.46.1 * qemu-block-iscsi-debuginfo-6.2.0-150400.37.46.1 * qemu-guest-agent-debuginfo-6.2.0-150400.37.46.1 * qemu-6.2.0-150400.37.46.1 * qemu-ui-curses-6.2.0-150400.37.46.1 * qemu-x86-6.2.0-150400.37.46.1 * qemu-lang-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.46.1 * qemu-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-6.2.0-150400.37.46.1 * qemu-debugsource-6.2.0-150400.37.46.1 * qemu-hw-usb-smartcard-debuginfo-6.2.0-150400.37.46.1 * qemu-linux-user-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-6.2.0-150400.37.46.1 * qemu-ivshmem-tools-debuginfo-6.2.0-150400.37.46.1 * qemu-ppc-6.2.0-150400.37.46.1 * qemu-tools-6.2.0-150400.37.46.1 * qemu-arm-6.2.0-150400.37.46.1 * qemu-block-gluster-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.46.1 * qemu-linux-user-debuginfo-6.2.0-150400.37.46.1 * qemu-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-alsa-6.2.0-150400.37.46.1 * qemu-block-ssh-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-gtk-6.2.0-150400.37.46.1 * qemu-block-dmg-6.2.0-150400.37.46.1 * qemu-chardev-baum-6.2.0-150400.37.46.1 * qemu-block-iscsi-6.2.0-150400.37.46.1 * qemu-chardev-spice-6.2.0-150400.37.46.1 * qemu-extra-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.46.1 * qemu-accel-qtest-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.46.1 * qemu-tools-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-opengl-6.2.0-150400.37.46.1 * qemu-audio-pa-6.2.0-150400.37.46.1 * qemu-audio-jack-6.2.0-150400.37.46.1 * qemu-guest-agent-6.2.0-150400.37.46.1 * qemu-linux-user-debugsource-6.2.0-150400.37.46.1 * qemu-accel-qtest-6.2.0-150400.37.46.1 * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.46.1 * qemu-ksm-6.2.0-150400.37.46.1 * qemu-s390x-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-spice-app-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-curses-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-pa-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-6.2.0-150400.37.46.1 * qemu-block-curl-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-oss-6.2.0-150400.37.46.1 * qemu-block-dmg-debuginfo-6.2.0-150400.37.46.1 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-jack-debuginfo-6.2.0-150400.37.46.1 * qemu-s390x-6.2.0-150400.37.46.1 * qemu-ui-gtk-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-spice-app-6.2.0-150400.37.46.1 * qemu-ui-spice-core-6.2.0-150400.37.46.1 * qemu-audio-alsa-debuginfo-6.2.0-150400.37.46.1 * qemu-block-ssh-6.2.0-150400.37.46.1 * qemu-hw-usb-smartcard-6.2.0-150400.37.46.1 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.46.1 * qemu-chardev-baum-debuginfo-6.2.0-150400.37.46.1 * openSUSE Leap 15.4 (s390x x86_64 i586) * qemu-kvm-6.2.0-150400.37.46.1 * openSUSE Leap 15.4 (noarch) * qemu-microvm-6.2.0-150400.37.46.1 * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-skiboot-6.2.0-150400.37.46.1 * qemu-ipxe-1.0.0+-150400.37.46.1 * qemu-SLOF-6.2.0-150400.37.46.1 * qemu-sgabios-8-150400.37.46.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64) * qemu-block-rbd-debuginfo-6.2.0-150400.37.46.1 * qemu-block-rbd-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * qemu-ui-opengl-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.46.1 * qemu-guest-agent-debuginfo-6.2.0-150400.37.46.1 * qemu-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.46.1 * qemu-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-6.2.0-150400.37.46.1 * qemu-debugsource-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-6.2.0-150400.37.46.1 * qemu-tools-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.46.1 * qemu-chardev-spice-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.46.1 * qemu-tools-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.46.1 * qemu-ui-opengl-6.2.0-150400.37.46.1 * qemu-guest-agent-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-6.2.0-150400.37.46.1 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-spice-core-6.2.0-150400.37.46.1 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64) * qemu-arm-debuginfo-6.2.0-150400.37.46.1 * qemu-arm-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * qemu-sgabios-8-150400.37.46.1 * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-ipxe-1.0.0+-150400.37.46.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (s390x) * qemu-s390x-6.2.0-150400.37.46.1 * qemu-s390x-debuginfo-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64) * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-accel-tcg-x86-6.2.0-150400.37.46.1 * qemu-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-x86-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * qemu-ui-opengl-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.46.1 * qemu-guest-agent-debuginfo-6.2.0-150400.37.46.1 * qemu-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.46.1 * qemu-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-6.2.0-150400.37.46.1 * qemu-debugsource-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-6.2.0-150400.37.46.1 * qemu-tools-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.46.1 * qemu-chardev-spice-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.46.1 * qemu-tools-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.46.1 * qemu-ui-opengl-6.2.0-150400.37.46.1 * qemu-guest-agent-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-6.2.0-150400.37.46.1 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-spice-core-6.2.0-150400.37.46.1 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Micro 5.3 (aarch64) * qemu-arm-debuginfo-6.2.0-150400.37.46.1 * qemu-arm-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * qemu-sgabios-8-150400.37.46.1 * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-ipxe-1.0.0+-150400.37.46.1 * SUSE Linux Enterprise Micro 5.3 (s390x) * qemu-s390x-6.2.0-150400.37.46.1 * qemu-s390x-debuginfo-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Micro 5.3 (x86_64) * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-accel-tcg-x86-6.2.0-150400.37.46.1 * qemu-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-x86-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * qemu-ui-opengl-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.46.1 * qemu-guest-agent-debuginfo-6.2.0-150400.37.46.1 * qemu-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.46.1 * qemu-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-6.2.0-150400.37.46.1 * qemu-debugsource-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-6.2.0-150400.37.46.1 * qemu-tools-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.46.1 * qemu-chardev-spice-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.46.1 * qemu-tools-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.46.1 * qemu-ui-opengl-6.2.0-150400.37.46.1 * qemu-guest-agent-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-6.2.0-150400.37.46.1 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-spice-core-6.2.0-150400.37.46.1 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64) * qemu-arm-debuginfo-6.2.0-150400.37.46.1 * qemu-arm-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * qemu-sgabios-8-150400.37.46.1 * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-ipxe-1.0.0+-150400.37.46.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (s390x) * qemu-s390x-6.2.0-150400.37.46.1 * qemu-s390x-debuginfo-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64) * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-accel-tcg-x86-6.2.0-150400.37.46.1 * qemu-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-x86-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * qemu-ui-opengl-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.46.1 * qemu-guest-agent-debuginfo-6.2.0-150400.37.46.1 * qemu-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.46.1 * qemu-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-6.2.0-150400.37.46.1 * qemu-debugsource-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-6.2.0-150400.37.46.1 * qemu-tools-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.46.1 * qemu-chardev-spice-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.46.1 * qemu-tools-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.46.1 * qemu-ui-opengl-6.2.0-150400.37.46.1 * qemu-guest-agent-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-6.2.0-150400.37.46.1 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-spice-core-6.2.0-150400.37.46.1 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Micro 5.4 (aarch64) * qemu-arm-debuginfo-6.2.0-150400.37.46.1 * qemu-arm-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * qemu-sgabios-8-150400.37.46.1 * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-ipxe-1.0.0+-150400.37.46.1 * SUSE Linux Enterprise Micro 5.4 (s390x) * qemu-s390x-6.2.0-150400.37.46.1 * qemu-s390x-debuginfo-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Micro 5.4 (x86_64) * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-accel-tcg-x86-6.2.0-150400.37.46.1 * qemu-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-x86-6.2.0-150400.37.46.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * qemu-block-curl-6.2.0-150400.37.46.1 * qemu-hw-usb-host-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-opengl-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-usb-host-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.46.1 * qemu-block-iscsi-debuginfo-6.2.0-150400.37.46.1 * qemu-guest-agent-debuginfo-6.2.0-150400.37.46.1 * qemu-6.2.0-150400.37.46.1 * qemu-ui-curses-6.2.0-150400.37.46.1 * qemu-lang-6.2.0-150400.37.46.1 * qemu-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-6.2.0-150400.37.46.1 * qemu-debugsource-6.2.0-150400.37.46.1 * qemu-block-rbd-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-6.2.0-150400.37.46.1 * qemu-tools-6.2.0-150400.37.46.1 * qemu-block-ssh-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-gtk-6.2.0-150400.37.46.1 * qemu-chardev-baum-6.2.0-150400.37.46.1 * qemu-block-iscsi-6.2.0-150400.37.46.1 * qemu-chardev-spice-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.46.1 * qemu-tools-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-opengl-6.2.0-150400.37.46.1 * qemu-block-rbd-debuginfo-6.2.0-150400.37.46.1 * qemu-guest-agent-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.46.1 * qemu-ksm-6.2.0-150400.37.46.1 * qemu-ui-spice-app-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-curses-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-6.2.0-150400.37.46.1 * qemu-ui-spice-app-6.2.0-150400.37.46.1 * qemu-block-curl-debuginfo-6.2.0-150400.37.46.1 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-gtk-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-spice-core-6.2.0-150400.37.46.1 * qemu-block-ssh-6.2.0-150400.37.46.1 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.46.1 * qemu-chardev-baum-debuginfo-6.2.0-150400.37.46.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64) * qemu-arm-debuginfo-6.2.0-150400.37.46.1 * qemu-arm-6.2.0-150400.37.46.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * qemu-sgabios-8-150400.37.46.1 * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-ipxe-1.0.0+-150400.37.46.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-accel-tcg-x86-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-pa-debuginfo-6.2.0-150400.37.46.1 * qemu-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.46.1 * qemu-audio-alsa-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-pa-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.46.1 * qemu-kvm-6.2.0-150400.37.46.1 * qemu-x86-6.2.0-150400.37.46.1 * qemu-audio-alsa-6.2.0-150400.37.46.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * qemu-block-curl-6.2.0-150400.37.46.1 * qemu-hw-usb-host-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-opengl-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-usb-host-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.46.1 * qemu-block-iscsi-debuginfo-6.2.0-150400.37.46.1 * qemu-guest-agent-debuginfo-6.2.0-150400.37.46.1 * qemu-6.2.0-150400.37.46.1 * qemu-ui-curses-6.2.0-150400.37.46.1 * qemu-lang-6.2.0-150400.37.46.1 * qemu-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-6.2.0-150400.37.46.1 * qemu-debugsource-6.2.0-150400.37.46.1 * qemu-block-rbd-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-6.2.0-150400.37.46.1 * qemu-tools-6.2.0-150400.37.46.1 * qemu-block-ssh-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-gtk-6.2.0-150400.37.46.1 * qemu-chardev-baum-6.2.0-150400.37.46.1 * qemu-block-iscsi-6.2.0-150400.37.46.1 * qemu-chardev-spice-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.46.1 * qemu-tools-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-opengl-6.2.0-150400.37.46.1 * qemu-block-rbd-debuginfo-6.2.0-150400.37.46.1 * qemu-guest-agent-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.46.1 * qemu-ksm-6.2.0-150400.37.46.1 * qemu-ui-spice-app-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-curses-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-6.2.0-150400.37.46.1 * qemu-ui-spice-app-6.2.0-150400.37.46.1 * qemu-block-curl-debuginfo-6.2.0-150400.37.46.1 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-gtk-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-spice-core-6.2.0-150400.37.46.1 * qemu-block-ssh-6.2.0-150400.37.46.1 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.46.1 * qemu-chardev-baum-debuginfo-6.2.0-150400.37.46.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64) * qemu-arm-debuginfo-6.2.0-150400.37.46.1 * qemu-arm-6.2.0-150400.37.46.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * qemu-sgabios-8-150400.37.46.1 * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-ipxe-1.0.0+-150400.37.46.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-accel-tcg-x86-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-pa-debuginfo-6.2.0-150400.37.46.1 * qemu-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.46.1 * qemu-audio-alsa-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-pa-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.46.1 * qemu-kvm-6.2.0-150400.37.46.1 * qemu-x86-6.2.0-150400.37.46.1 * qemu-audio-alsa-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * qemu-block-curl-6.2.0-150400.37.46.1 * qemu-hw-usb-host-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-usb-host-6.2.0-150400.37.46.1 * qemu-ui-curses-6.2.0-150400.37.46.1 * qemu-block-iscsi-debuginfo-6.2.0-150400.37.46.1 * qemu-guest-agent-debuginfo-6.2.0-150400.37.46.1 * qemu-6.2.0-150400.37.46.1 * qemu-lang-6.2.0-150400.37.46.1 * qemu-debuginfo-6.2.0-150400.37.46.1 * qemu-debugsource-6.2.0-150400.37.46.1 * qemu-block-rbd-6.2.0-150400.37.46.1 * qemu-tools-6.2.0-150400.37.46.1 * qemu-block-ssh-debuginfo-6.2.0-150400.37.46.1 * qemu-chardev-baum-6.2.0-150400.37.46.1 * qemu-block-iscsi-6.2.0-150400.37.46.1 * qemu-tools-debuginfo-6.2.0-150400.37.46.1 * qemu-block-rbd-debuginfo-6.2.0-150400.37.46.1 * qemu-guest-agent-6.2.0-150400.37.46.1 * qemu-ksm-6.2.0-150400.37.46.1 * qemu-ui-curses-debuginfo-6.2.0-150400.37.46.1 * qemu-block-curl-debuginfo-6.2.0-150400.37.46.1 * qemu-block-ssh-6.2.0-150400.37.46.1 * qemu-chardev-baum-debuginfo-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64) * qemu-arm-debuginfo-6.2.0-150400.37.46.1 * qemu-arm-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64) * qemu-hw-usb-redirect-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-gtk-6.2.0-150400.37.46.1 * qemu-hw-usb-redirect-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-spice-app-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-6.2.0-150400.37.46.1 * qemu-audio-spice-6.2.0-150400.37.46.1 * qemu-ui-spice-app-6.2.0-150400.37.46.1 * qemu-chardev-spice-6.2.0-150400.37.46.1 * qemu-chardev-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-qxl-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-spice-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-gtk-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-vga-6.2.0-150400.37.46.1 * qemu-ui-opengl-6.2.0-150400.37.46.1 * qemu-ui-opengl-debuginfo-6.2.0-150400.37.46.1 * qemu-ui-spice-core-6.2.0-150400.37.46.1 * qemu-ui-spice-core-debuginfo-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * qemu-vgabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-seabios-1.15.0_0_g2dd4b9b-150400.37.46.1 * qemu-skiboot-6.2.0-150400.37.46.1 * qemu-ipxe-1.0.0+-150400.37.46.1 * qemu-SLOF-6.2.0-150400.37.46.1 * qemu-sgabios-8-150400.37.46.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (ppc64le) * qemu-ppc-debuginfo-6.2.0-150400.37.46.1 * qemu-ppc-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (s390x x86_64) * qemu-hw-display-virtio-gpu-debuginfo-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-6.2.0-150400.37.46.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-6.2.0-150400.37.46.1 * qemu-kvm-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (s390x) * qemu-hw-s390x-virtio-gpu-ccw-debuginfo-6.2.0-150400.37.46.1 * qemu-s390x-6.2.0-150400.37.46.1 * qemu-hw-s390x-virtio-gpu-ccw-6.2.0-150400.37.46.1 * qemu-s390x-debuginfo-6.2.0-150400.37.46.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * qemu-accel-tcg-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-accel-tcg-x86-6.2.0-150400.37.46.1 * qemu-audio-pa-debuginfo-6.2.0-150400.37.46.1 * qemu-x86-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-alsa-debuginfo-6.2.0-150400.37.46.1 * qemu-audio-pa-6.2.0-150400.37.46.1 * qemu-x86-6.2.0-150400.37.46.1 * qemu-audio-alsa-6.2.0-150400.37.46.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1544.html * https://www.suse.com/security/cve/CVE-2024-6505.html * https://www.suse.com/security/cve/CVE-2025-12464.html * https://bugzilla.suse.com/show_bug.cgi?id=1209554 * https://bugzilla.suse.com/show_bug.cgi?id=1227397 * https://bugzilla.suse.com/show_bug.cgi?id=1252768 * https://bugzilla.suse.com/show_bug.cgi?id=1253002 * https://bugzilla.suse.com/show_bug.cgi?id=1254286 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 7 12:30:02 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Jan 2026 12:30:02 -0000 Subject: SUSE-RU-2026:0046-1: moderate: Recommended update for scap-security-guide Message-ID: <176778900216.22147.11446098168234015312@smelt2.prg2.suse.org> # Recommended update for scap-security-guide Announcement ID: SUSE-RU-2026:0046-1 Release Date: 2026-01-07T07:21:25Z Rating: moderate References: * jsc#ECO-3319 Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.0 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Client Tools for SLE Micro 5 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS * SUSE Multi-Linux Manager Client Tools for SLE Micro 5 An update that contains one feature can now be installed. ## Description: This update for scap-security-guide fixes the following issues: * updated to 0.1.79 (jsc#ECO-3319): * Add rhcos4 Profile for BSI Grundschutz * Create SLE15 general profile * Fix crypto policy settings in RHEL CIS profiles * Remove deprecated CIS OpenShift 1.4.0 and 1.5.0 profiles * Remove OCP STIG V1R1 * Remove OCP STIG V2R1 * Various updates for SLE 12/15 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Multi-Linux Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-MultiLinuxManagerTools-SLE-Micro-5-2026-46=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-46=1 * SUSE Manager Client Tools for SLE Micro 5 zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2026-46=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-46=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-46=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-46=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-46=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-46=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-46=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-46=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-46=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-46=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-46=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-46=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-46=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-46=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-46=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-46=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-46=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2026-46=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2026-46=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2026-46=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-46=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-46=1 ## Package List: * SUSE Multi-Linux Manager Client Tools for SLE Micro 5 (noarch) * scap-security-guide-0.1.79-150000.1.103.1 * openSUSE Leap 15.6 (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 * SUSE Manager Client Tools for SLE Micro 5 (noarch) * scap-security-guide-0.1.79-150000.1.103.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 * Basesystem Module 15-SP7 (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 * SUSE Manager Proxy 4.3 LTS (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 * SUSE Manager Retail Branch Server 4.3 LTS (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 * SUSE Manager Server 4.3 LTS (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * scap-security-guide-debian-0.1.79-150000.1.103.1 * scap-security-guide-ubuntu-0.1.79-150000.1.103.1 * scap-security-guide-redhat-0.1.79-150000.1.103.1 * scap-security-guide-0.1.79-150000.1.103.1 ## References: * https://jira.suse.com/browse/ECO-3319 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 7 12:30:05 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Jan 2026 12:30:05 -0000 Subject: SUSE-RU-2026:0045-1: moderate: Recommended update for lifecycle-data-sle-live-patching Message-ID: <176778900534.22147.2257510795592723618@smelt2.prg2.suse.org> # Recommended update for lifecycle-data-sle-live-patching Announcement ID: SUSE-RU-2026:0045-1 Release Date: 2026-01-07T07:16:05Z Rating: moderate References: * bsc#1020320 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for lifecycle-data-sle-live-patching fixes the following issues: * Added data for 4_12_14-122_261, 4_12_14-122_266, 4_12_14-122_269, 4_12_14-122_272, 4_12_14-122_275. (bsc#1020320) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2026-45=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (noarch) * lifecycle-data-sle-live-patching-1-10.170.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1020320 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 7 16:30:03 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Jan 2026 16:30:03 -0000 Subject: SUSE-SU-2026:0053-1: low: Security update for libpcap Message-ID: <176780340366.22147.11097040867751694201@smelt2.prg2.suse.org> # Security update for libpcap Announcement ID: SUSE-SU-2026:0053-1 Release Date: 2026-01-07T11:03:53Z Rating: low References: * bsc#1255765 Cross-References: * CVE-2025-11961 CVSS scores: * CVE-2025-11961 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-11961 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-11961 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves one vulnerability can now be installed. ## Description: This update for libpcap fixes the following issues: * CVE-2025-11961: missing validation of provided MAC-48 address string in `pcap_ether_aton()` can lead to out-of-bounds read and write (bsc#1255765). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2026-53=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-53=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-53=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * libpcap-devel-static-1.9.1-150300.3.6.1 * libpcap1-1.9.1-150300.3.6.1 * libpcap-devel-1.9.1-150300.3.6.1 * libpcap-debugsource-1.9.1-150300.3.6.1 * libpcap1-debuginfo-1.9.1-150300.3.6.1 * openSUSE Leap 15.3 (x86_64) * libpcap1-32bit-1.9.1-150300.3.6.1 * libpcap-devel-32bit-1.9.1-150300.3.6.1 * libpcap1-32bit-debuginfo-1.9.1-150300.3.6.1 * openSUSE Leap 15.3 (aarch64_ilp32) * libpcap-devel-64bit-1.9.1-150300.3.6.1 * libpcap1-64bit-debuginfo-1.9.1-150300.3.6.1 * libpcap1-64bit-1.9.1-150300.3.6.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libpcap1-debuginfo-1.9.1-150300.3.6.1 * libpcap-debugsource-1.9.1-150300.3.6.1 * libpcap1-1.9.1-150300.3.6.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libpcap1-debuginfo-1.9.1-150300.3.6.1 * libpcap-debugsource-1.9.1-150300.3.6.1 * libpcap1-1.9.1-150300.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11961.html * https://bugzilla.suse.com/show_bug.cgi?id=1255765 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 7 16:30:09 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Jan 2026 16:30:09 -0000 Subject: SUSE-SU-2026:0052-1: moderate: Security update for curl Message-ID: <176780340971.22147.15482726627841902694@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2026:0052-1 Release Date: 2026-01-07T09:28:40Z Rating: moderate References: * bsc#1255731 * bsc#1255732 * bsc#1255733 * bsc#1255734 Cross-References: * CVE-2025-14524 * CVE-2025-14819 * CVE-2025-15079 * CVE-2025-15224 CVSS scores: * CVE-2025-14524 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-14524 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-14819 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-14819 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-15079 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-15079 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-15224 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-15224 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves four vulnerabilities can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731). * CVE-2025-14819: libssh global knownhost override (bsc#1255732). * CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733). * CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-52=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libcurl4-debuginfo-8.14.1-150700.7.8.1 * curl-8.14.1-150700.7.8.1 * libcurl4-8.14.1-150700.7.8.1 * libcurl-devel-8.14.1-150700.7.8.1 * curl-debugsource-8.14.1-150700.7.8.1 * curl-debuginfo-8.14.1-150700.7.8.1 * Basesystem Module 15-SP7 (x86_64) * libcurl4-32bit-debuginfo-8.14.1-150700.7.8.1 * libcurl4-32bit-8.14.1-150700.7.8.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14524.html * https://www.suse.com/security/cve/CVE-2025-14819.html * https://www.suse.com/security/cve/CVE-2025-15079.html * https://www.suse.com/security/cve/CVE-2025-15224.html * https://bugzilla.suse.com/show_bug.cgi?id=1255731 * https://bugzilla.suse.com/show_bug.cgi?id=1255732 * https://bugzilla.suse.com/show_bug.cgi?id=1255733 * https://bugzilla.suse.com/show_bug.cgi?id=1255734 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 7 16:30:14 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Jan 2026 16:30:14 -0000 Subject: SUSE-SU-2026:0051-1: moderate: Security update for curl Message-ID: <176780341417.22147.107028928203732312@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2026:0051-1 Release Date: 2026-01-07T09:28:27Z Rating: moderate References: * bsc#1255731 * bsc#1255732 * bsc#1255733 * bsc#1255734 Cross-References: * CVE-2025-14524 * CVE-2025-14819 * CVE-2025-15079 * CVE-2025-15224 CVSS scores: * CVE-2025-14524 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-14524 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-14819 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-14819 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-15079 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-15079 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-15224 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-15224 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves four vulnerabilities can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731). * CVE-2025-14819: libssh global knownhost override (bsc#1255732). * CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733). * CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-51=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-51=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libcurl4-debuginfo-8.14.1-150200.4.97.1 * curl-8.14.1-150200.4.97.1 * curl-debugsource-8.14.1-150200.4.97.1 * curl-debuginfo-8.14.1-150200.4.97.1 * libcurl4-8.14.1-150200.4.97.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libcurl4-debuginfo-8.14.1-150200.4.97.1 * curl-8.14.1-150200.4.97.1 * curl-debugsource-8.14.1-150200.4.97.1 * curl-debuginfo-8.14.1-150200.4.97.1 * libcurl4-8.14.1-150200.4.97.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14524.html * https://www.suse.com/security/cve/CVE-2025-14819.html * https://www.suse.com/security/cve/CVE-2025-15079.html * https://www.suse.com/security/cve/CVE-2025-15224.html * https://bugzilla.suse.com/show_bug.cgi?id=1255731 * https://bugzilla.suse.com/show_bug.cgi?id=1255732 * https://bugzilla.suse.com/show_bug.cgi?id=1255733 * https://bugzilla.suse.com/show_bug.cgi?id=1255734 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 7 16:30:19 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Jan 2026 16:30:19 -0000 Subject: SUSE-SU-2026:0050-1: moderate: Security update for curl Message-ID: <176780341928.22147.1387013183987095085@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2026:0050-1 Release Date: 2026-01-07T09:28:15Z Rating: moderate References: * bsc#1255731 * bsc#1255732 * bsc#1255733 * bsc#1255734 Cross-References: * CVE-2025-14524 * CVE-2025-14819 * CVE-2025-15079 * CVE-2025-15224 CVSS scores: * CVE-2025-14524 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-14524 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-14819 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-14819 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-15079 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-15079 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-15224 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-15224 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N Affected Products: * openSUSE Leap 15.6 An update that solves four vulnerabilities can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731). * CVE-2025-14819: libssh global knownhost override (bsc#1255732). * CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733). * CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-50=1 openSUSE-SLE-15.6-2026-50=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * curl-8.14.1-150600.4.34.1 * libcurl4-debuginfo-8.14.1-150600.4.34.1 * curl-debuginfo-8.14.1-150600.4.34.1 * libcurl-mini4-8.14.1-150600.4.34.1 * libcurl-devel-8.14.1-150600.4.34.1 * curl-debugsource-8.14.1-150600.4.34.1 * curl-mini-debugsource-8.14.1-150600.4.34.1 * libcurl4-8.14.1-150600.4.34.1 * libcurl-mini4-debuginfo-8.14.1-150600.4.34.1 * openSUSE Leap 15.6 (noarch) * curl-fish-completion-8.14.1-150600.4.34.1 * curl-zsh-completion-8.14.1-150600.4.34.1 * libcurl-devel-doc-8.14.1-150600.4.34.1 * openSUSE Leap 15.6 (x86_64) * libcurl4-32bit-8.14.1-150600.4.34.1 * libcurl4-32bit-debuginfo-8.14.1-150600.4.34.1 * libcurl-devel-32bit-8.14.1-150600.4.34.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libcurl4-64bit-debuginfo-8.14.1-150600.4.34.1 * libcurl4-64bit-8.14.1-150600.4.34.1 * libcurl-devel-64bit-8.14.1-150600.4.34.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14524.html * https://www.suse.com/security/cve/CVE-2025-14819.html * https://www.suse.com/security/cve/CVE-2025-15079.html * https://www.suse.com/security/cve/CVE-2025-15224.html * https://bugzilla.suse.com/show_bug.cgi?id=1255731 * https://bugzilla.suse.com/show_bug.cgi?id=1255732 * https://bugzilla.suse.com/show_bug.cgi?id=1255733 * https://bugzilla.suse.com/show_bug.cgi?id=1255734 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 7 16:30:22 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Jan 2026 16:30:22 -0000 Subject: SUSE-RU-2026:0048-1: moderate: Recommended update for pciutils Message-ID: <176780342219.22147.10387438285890550033@smelt2.prg2.suse.org> # Recommended update for pciutils Announcement ID: SUSE-RU-2026:0048-1 Release Date: 2026-01-07T08:09:04Z Rating: moderate References: * bsc#1252338 Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.3 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Proxy 4.3 LTS * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Retail Branch Server 4.3 LTS * SUSE Manager Server 4.3 * SUSE Manager Server 4.3 LTS An update that has one fix can now be installed. ## Description: This update for pciutils fixes the following issues: * Add a strict dependency to libpci to prevent possible segfault (bsc#1252338) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2026-48=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-48=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-48=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-48=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-48=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-48=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-48=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-48=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-48=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-48=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-48=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-48=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-48=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-48=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-48=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-48=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-48=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-48=1 * SUSE Manager Proxy 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2026-48=1 * SUSE Manager Retail Branch Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-LTS-2026-48=1 * SUSE Manager Server 4.3 LTS zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2026-48=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-48=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-48=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * pciutils-devel-3.13.0-150300.13.12.1 * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * openSUSE Leap 15.3 (x86_64) * libpci3-32bit-3.13.0-150300.13.12.1 * pciutils-devel-32bit-3.13.0-150300.13.12.1 * libpci3-32bit-debuginfo-3.13.0-150300.13.12.1 * openSUSE Leap 15.3 (aarch64_ilp32) * libpci3-64bit-3.13.0-150300.13.12.1 * libpci3-64bit-debuginfo-3.13.0-150300.13.12.1 * pciutils-devel-64bit-3.13.0-150300.13.12.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * pciutils-devel-3.13.0-150300.13.12.1 * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * openSUSE Leap 15.6 (x86_64) * libpci3-32bit-3.13.0-150300.13.12.1 * pciutils-devel-32bit-3.13.0-150300.13.12.1 * libpci3-32bit-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * pciutils-devel-3.13.0-150300.13.12.1 * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * Basesystem Module 15-SP7 (x86_64) * libpci3-32bit-3.13.0-150300.13.12.1 * libpci3-32bit-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * pciutils-devel-3.13.0-150300.13.12.1 * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * libpci3-32bit-3.13.0-150300.13.12.1 * libpci3-32bit-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * pciutils-devel-3.13.0-150300.13.12.1 * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * libpci3-32bit-3.13.0-150300.13.12.1 * libpci3-32bit-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * pciutils-devel-3.13.0-150300.13.12.1 * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * libpci3-32bit-3.13.0-150300.13.12.1 * libpci3-32bit-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * pciutils-devel-3.13.0-150300.13.12.1 * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * libpci3-32bit-3.13.0-150300.13.12.1 * libpci3-32bit-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * pciutils-devel-3.13.0-150300.13.12.1 * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * libpci3-32bit-3.13.0-150300.13.12.1 * libpci3-32bit-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * pciutils-devel-3.13.0-150300.13.12.1 * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * libpci3-32bit-3.13.0-150300.13.12.1 * libpci3-32bit-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * pciutils-devel-3.13.0-150300.13.12.1 * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (x86_64) * libpci3-32bit-3.13.0-150300.13.12.1 * libpci3-32bit-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * pciutils-devel-3.13.0-150300.13.12.1 * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * libpci3-32bit-3.13.0-150300.13.12.1 * libpci3-32bit-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * pciutils-devel-3.13.0-150300.13.12.1 * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * libpci3-32bit-3.13.0-150300.13.12.1 * libpci3-32bit-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * pciutils-devel-3.13.0-150300.13.12.1 * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64) * libpci3-32bit-3.13.0-150300.13.12.1 * libpci3-32bit-debuginfo-3.13.0-150300.13.12.1 * SUSE Manager Proxy 4.3 LTS (x86_64) * libpci3-32bit-3.13.0-150300.13.12.1 * pciutils-devel-3.13.0-150300.13.12.1 * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * libpci3-32bit-debuginfo-3.13.0-150300.13.12.1 * SUSE Manager Retail Branch Server 4.3 LTS (x86_64) * libpci3-32bit-3.13.0-150300.13.12.1 * pciutils-devel-3.13.0-150300.13.12.1 * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * libpci3-32bit-debuginfo-3.13.0-150300.13.12.1 * SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64) * pciutils-devel-3.13.0-150300.13.12.1 * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * SUSE Manager Server 4.3 LTS (x86_64) * libpci3-32bit-3.13.0-150300.13.12.1 * libpci3-32bit-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * pciutils-debuginfo-3.13.0-150300.13.12.1 * pciutils-debugsource-3.13.0-150300.13.12.1 * pciutils-3.13.0-150300.13.12.1 * libpci3-3.13.0-150300.13.12.1 * libpci3-debuginfo-3.13.0-150300.13.12.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1252338 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 7 16:30:24 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Jan 2026 16:30:24 -0000 Subject: SUSE-RU-2026:0047-1: important: Recommended update for libdlm Message-ID: <176780342460.22147.13480613891138165094@smelt2.prg2.suse.org> # Recommended update for libdlm Announcement ID: SUSE-RU-2026:0047-1 Release Date: 2026-01-07T08:07:25Z Rating: important References: * bsc#1255025 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise High Availability Extension 15 SP6 * SUSE Linux Enterprise High Availability Extension 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for libdlm fixes the following issues: * Fix the issue when the process waiting for posix lock can't be interrupted (bsc#1255025) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-47=1 openSUSE-SLE-15.6-2026-47=1 * SUSE Linux Enterprise High Availability Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2026-47=1 * SUSE Linux Enterprise High Availability Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-HA-15-SP7-2026-47=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libdlm-debugsource-4.2.0-150600.3.3.1 * libdlm3-4.2.0-150600.3.3.1 * libdlm-debuginfo-4.2.0-150600.3.3.1 * libdlm-4.2.0-150600.3.3.1 * libdlm3-debuginfo-4.2.0-150600.3.3.1 * libdlm-devel-4.2.0-150600.3.3.1 * SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le s390x x86_64) * libdlm-debugsource-4.2.0-150600.3.3.1 * libdlm-debuginfo-4.2.0-150600.3.3.1 * libdlm-4.2.0-150600.3.3.1 * libdlm3-debuginfo-4.2.0-150600.3.3.1 * libdlm3-4.2.0-150600.3.3.1 * SUSE Linux Enterprise High Availability Extension 15 SP7 (aarch64 ppc64le s390x x86_64) * libdlm-debugsource-4.2.0-150600.3.3.1 * libdlm-debuginfo-4.2.0-150600.3.3.1 * libdlm-4.2.0-150600.3.3.1 * libdlm3-debuginfo-4.2.0-150600.3.3.1 * libdlm3-4.2.0-150600.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1255025 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 7 20:30:04 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Jan 2026 20:30:04 -0000 Subject: SUSE-RU-2026:0057-1: moderate: Recommended update for lifecycle-data-sle-module-live-patching Message-ID: <176781780463.6796.1402616624849307782@smelt2.prg2.suse.org> # Recommended update for lifecycle-data-sle-module-live-patching Announcement ID: SUSE-RU-2026:0057-1 Release Date: 2026-01-07T15:12:02Z Rating: moderate References: * bsc#1020320 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP3 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for lifecycle-data-sle-module-live-patching fixes the following issues: * Added data for 5_14_21-150400_24_167, 5_14_21-150400_24_170, 5_14_21-150400_24_173, 5_14_21-150400_24_176, 5_14_21-150400_24_179, 5_14_21-150500_55_110, 5_14_21-150500_55_113, 5_14_21-150500_55_116, 5_14_21-150500_55_121, 5_14_21-150500_55_124, 5_14_21-150500_55_130, 5_3_18-150300_59_207, 5_3_18-150300_59_211, 5_3_18-150300_59_215, 5_3_18-150300_59_218, 5_3_18-150300_59_221, 6_4_0-150600_23_53, 6_4_0-150600_23_60, 6_4_0-150600_23_65, 6_4_0-150600_23_70, 6_4_0-150600_23_73, 6_4_0-150700_51, 6_4_0-150700_53_11, 6_4_0-150700_53_16, 6_4_0-150700_53_19, 6_4_0-150700_53_22, 6_4_0-150700_53_3, 6_4_0-150700_53_6, +kernel-livepatch-6_4_0-150600_10_39-rt, _,+kernel- livepatch-6_4_0-150600_10_44-rt,_ , +kernel-livepatch-6_4_0-150600_10_49-rt, _,+kernel-livepatch-6_4_0-150600_10_55-rt,_ , +kernel- livepatch-6_4_0-150600_10_58-rt, _,+kernel-livepatch-6_4_0-150700_5-rt,_ , +kernel-livepatch-6_4_0-150700_7_13-rt, _,+kernel- livepatch-6_4_0-150700_7_16-rt,_ , +kernel-livepatch-6_4_0-150700_7_19-rt, _,+kernel-livepatch-6_4_0-150700_7_22-rt,_ , +kernel- livepatch-6_4_0-150700_7_25-rt, _,+kernel-livepatch-6_4_0-150700_7_3-rt,_ , +kernel-livepatch-6_4_0-150700_7_8-rt,*. (bsc#1020320) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-57=1 * SUSE Linux Enterprise Live Patching 15-SP3 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2026-57=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-57=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-57=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-57=1 * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2026-57=1 ## Package List: * openSUSE Leap 15.6 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.135.1 * SUSE Linux Enterprise Live Patching 15-SP3 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.135.1 * SUSE Linux Enterprise Live Patching 15-SP4 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.135.1 * SUSE Linux Enterprise Live Patching 15-SP5 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.135.1 * SUSE Linux Enterprise Live Patching 15-SP6 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.135.1 * SUSE Linux Enterprise Live Patching 15-SP7 (noarch) * lifecycle-data-sle-module-live-patching-15-150000.4.135.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1020320 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 7 20:30:07 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Jan 2026 20:30:07 -0000 Subject: SUSE-RU-2026:0056-1: moderate: Recommended update for sssd Message-ID: <176781780723.6796.3338948555506552334@smelt2.prg2.suse.org> # Recommended update for sssd Announcement ID: SUSE-RU-2026:0056-1 Release Date: 2026-01-07T15:11:20Z Rating: moderate References: * bsc#1230348 Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for sssd fixes the following issues: * Fix sssctl config-check exit code when the conf.d snippets directory does not exist (bsc#1230348) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-56=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * sssd-ldap-2.9.3-150700.9.12.1 * sssd-krb5-2.9.3-150700.9.12.1 * libipa_hbac0-debuginfo-2.9.3-150700.9.12.1 * libsss_idmap0-debuginfo-2.9.3-150700.9.12.1 * libsss_nss_idmap-devel-2.9.3-150700.9.12.1 * sssd-proxy-debuginfo-2.9.3-150700.9.12.1 * sssd-dbus-debuginfo-2.9.3-150700.9.12.1 * sssd-krb5-common-2.9.3-150700.9.12.1 * libsss_idmap0-2.9.3-150700.9.12.1 * libsss_certmap0-2.9.3-150700.9.12.1 * sssd-ad-debuginfo-2.9.3-150700.9.12.1 * libipa_hbac-devel-2.9.3-150700.9.12.1 * sssd-ldap-debuginfo-2.9.3-150700.9.12.1 * libipa_hbac0-2.9.3-150700.9.12.1 * sssd-tools-2.9.3-150700.9.12.1 * sssd-ad-2.9.3-150700.9.12.1 * libsss_simpleifp0-2.9.3-150700.9.12.1 * libsss_idmap-devel-2.9.3-150700.9.12.1 * sssd-krb5-debuginfo-2.9.3-150700.9.12.1 * sssd-ipa-debuginfo-2.9.3-150700.9.12.1 * sssd-proxy-2.9.3-150700.9.12.1 * python3-sssd-config-2.9.3-150700.9.12.1 * sssd-krb5-common-debuginfo-2.9.3-150700.9.12.1 * sssd-winbind-idmap-debuginfo-2.9.3-150700.9.12.1 * libsss_simpleifp0-debuginfo-2.9.3-150700.9.12.1 * libsss_certmap0-debuginfo-2.9.3-150700.9.12.1 * sssd-tools-debuginfo-2.9.3-150700.9.12.1 * sssd-ipa-2.9.3-150700.9.12.1 * sssd-kcm-2.9.3-150700.9.12.1 * sssd-debugsource-2.9.3-150700.9.12.1 * sssd-winbind-idmap-2.9.3-150700.9.12.1 * libsss_nss_idmap0-2.9.3-150700.9.12.1 * libsss_certmap-devel-2.9.3-150700.9.12.1 * libsss_nss_idmap0-debuginfo-2.9.3-150700.9.12.1 * python3-sssd-config-debuginfo-2.9.3-150700.9.12.1 * sssd-debuginfo-2.9.3-150700.9.12.1 * sssd-kcm-debuginfo-2.9.3-150700.9.12.1 * sssd-2.9.3-150700.9.12.1 * sssd-dbus-2.9.3-150700.9.12.1 * libsss_simpleifp-devel-2.9.3-150700.9.12.1 * Basesystem Module 15-SP7 (x86_64) * sssd-32bit-debuginfo-2.9.3-150700.9.12.1 * sssd-32bit-2.9.3-150700.9.12.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230348 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 7 20:30:09 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Jan 2026 20:30:09 -0000 Subject: SUSE-RU-2026:0055-1: moderate: Recommended update for sssd Message-ID: <176781780944.6796.10685423651400148560@smelt2.prg2.suse.org> # Recommended update for sssd Announcement ID: SUSE-RU-2026:0055-1 Release Date: 2026-01-07T15:11:07Z Rating: moderate References: * bsc#1230348 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has one fix can now be installed. ## Description: This update for sssd fixes the following issues: * Fix sssctl config-check exit code when the conf.d snippets directory does not exist (bsc#1230348) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-55=1 openSUSE-SLE-15.6-2026-55=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-55=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-55=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * python3-sssd-config-debuginfo-2.9.3-150600.3.31.1 * libsss_idmap-devel-2.9.3-150600.3.31.1 * sssd-krb5-debuginfo-2.9.3-150600.3.31.1 * sssd-ldap-debuginfo-2.9.3-150600.3.31.1 * libsss_simpleifp-devel-2.9.3-150600.3.31.1 * python3-ipa_hbac-debuginfo-2.9.3-150600.3.31.1 * sssd-kcm-2.9.3-150600.3.31.1 * sssd-dbus-2.9.3-150600.3.31.1 * sssd-tools-2.9.3-150600.3.31.1 * sssd-ad-debuginfo-2.9.3-150600.3.31.1 * libsss_certmap0-2.9.3-150600.3.31.1 * python3-sss-murmur-2.9.3-150600.3.31.1 * libsss_simpleifp0-2.9.3-150600.3.31.1 * libipa_hbac0-2.9.3-150600.3.31.1 * sssd-krb5-common-2.9.3-150600.3.31.1 * libsss_certmap-devel-2.9.3-150600.3.31.1 * python3-ipa_hbac-2.9.3-150600.3.31.1 * sssd-ad-2.9.3-150600.3.31.1 * sssd-proxy-debuginfo-2.9.3-150600.3.31.1 * sssd-debuginfo-2.9.3-150600.3.31.1 * sssd-debugsource-2.9.3-150600.3.31.1 * sssd-winbind-idmap-debuginfo-2.9.3-150600.3.31.1 * python3-sss_nss_idmap-debuginfo-2.9.3-150600.3.31.1 * sssd-proxy-2.9.3-150600.3.31.1 * sssd-tools-debuginfo-2.9.3-150600.3.31.1 * libsss_nss_idmap0-debuginfo-2.9.3-150600.3.31.1 * libnfsidmap-sss-2.9.3-150600.3.31.1 * sssd-winbind-idmap-2.9.3-150600.3.31.1 * sssd-2.9.3-150600.3.31.1 * sssd-ipa-2.9.3-150600.3.31.1 * sssd-dbus-debuginfo-2.9.3-150600.3.31.1 * sssd-krb5-common-debuginfo-2.9.3-150600.3.31.1 * sssd-kcm-debuginfo-2.9.3-150600.3.31.1 * sssd-ipa-debuginfo-2.9.3-150600.3.31.1 * python3-sss_nss_idmap-2.9.3-150600.3.31.1 * sssd-ldap-2.9.3-150600.3.31.1 * sssd-krb5-2.9.3-150600.3.31.1 * python3-sss-murmur-debuginfo-2.9.3-150600.3.31.1 * libsss_nss_idmap0-2.9.3-150600.3.31.1 * libsss_idmap0-2.9.3-150600.3.31.1 * python3-sssd-config-2.9.3-150600.3.31.1 * libnfsidmap-sss-debuginfo-2.9.3-150600.3.31.1 * libsss_nss_idmap-devel-2.9.3-150600.3.31.1 * libsss_certmap0-debuginfo-2.9.3-150600.3.31.1 * libipa_hbac-devel-2.9.3-150600.3.31.1 * libsss_idmap0-debuginfo-2.9.3-150600.3.31.1 * libsss_simpleifp0-debuginfo-2.9.3-150600.3.31.1 * libipa_hbac0-debuginfo-2.9.3-150600.3.31.1 * openSUSE Leap 15.6 (x86_64) * sssd-32bit-debuginfo-2.9.3-150600.3.31.1 * sssd-32bit-2.9.3-150600.3.31.1 * openSUSE Leap 15.6 (aarch64_ilp32) * sssd-64bit-2.9.3-150600.3.31.1 * sssd-64bit-debuginfo-2.9.3-150600.3.31.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * python3-sssd-config-debuginfo-2.9.3-150600.3.31.1 * libsss_idmap-devel-2.9.3-150600.3.31.1 * sssd-krb5-debuginfo-2.9.3-150600.3.31.1 * sssd-ldap-debuginfo-2.9.3-150600.3.31.1 * libsss_simpleifp-devel-2.9.3-150600.3.31.1 * sssd-kcm-2.9.3-150600.3.31.1 * sssd-dbus-2.9.3-150600.3.31.1 * sssd-tools-2.9.3-150600.3.31.1 * sssd-ad-debuginfo-2.9.3-150600.3.31.1 * libsss_certmap0-2.9.3-150600.3.31.1 * libsss_simpleifp0-2.9.3-150600.3.31.1 * libipa_hbac0-2.9.3-150600.3.31.1 * sssd-krb5-common-2.9.3-150600.3.31.1 * libsss_certmap-devel-2.9.3-150600.3.31.1 * sssd-ad-2.9.3-150600.3.31.1 * sssd-proxy-debuginfo-2.9.3-150600.3.31.1 * sssd-debuginfo-2.9.3-150600.3.31.1 * sssd-debugsource-2.9.3-150600.3.31.1 * sssd-winbind-idmap-debuginfo-2.9.3-150600.3.31.1 * sssd-proxy-2.9.3-150600.3.31.1 * sssd-tools-debuginfo-2.9.3-150600.3.31.1 * libsss_nss_idmap0-debuginfo-2.9.3-150600.3.31.1 * sssd-winbind-idmap-2.9.3-150600.3.31.1 * sssd-2.9.3-150600.3.31.1 * sssd-ipa-2.9.3-150600.3.31.1 * sssd-dbus-debuginfo-2.9.3-150600.3.31.1 * sssd-krb5-common-debuginfo-2.9.3-150600.3.31.1 * sssd-kcm-debuginfo-2.9.3-150600.3.31.1 * sssd-ipa-debuginfo-2.9.3-150600.3.31.1 * sssd-ldap-2.9.3-150600.3.31.1 * sssd-krb5-2.9.3-150600.3.31.1 * libsss_nss_idmap0-2.9.3-150600.3.31.1 * libsss_idmap0-2.9.3-150600.3.31.1 * python3-sssd-config-2.9.3-150600.3.31.1 * libsss_nss_idmap-devel-2.9.3-150600.3.31.1 * libsss_certmap0-debuginfo-2.9.3-150600.3.31.1 * libipa_hbac-devel-2.9.3-150600.3.31.1 * libsss_idmap0-debuginfo-2.9.3-150600.3.31.1 * libsss_simpleifp0-debuginfo-2.9.3-150600.3.31.1 * libipa_hbac0-debuginfo-2.9.3-150600.3.31.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (x86_64) * sssd-32bit-debuginfo-2.9.3-150600.3.31.1 * sssd-32bit-2.9.3-150600.3.31.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * python3-sssd-config-debuginfo-2.9.3-150600.3.31.1 * libsss_idmap-devel-2.9.3-150600.3.31.1 * sssd-krb5-debuginfo-2.9.3-150600.3.31.1 * sssd-ldap-debuginfo-2.9.3-150600.3.31.1 * libsss_simpleifp-devel-2.9.3-150600.3.31.1 * sssd-kcm-2.9.3-150600.3.31.1 * sssd-dbus-2.9.3-150600.3.31.1 * sssd-tools-2.9.3-150600.3.31.1 * sssd-ad-debuginfo-2.9.3-150600.3.31.1 * libsss_certmap0-2.9.3-150600.3.31.1 * libsss_simpleifp0-2.9.3-150600.3.31.1 * libipa_hbac0-2.9.3-150600.3.31.1 * sssd-krb5-common-2.9.3-150600.3.31.1 * libsss_certmap-devel-2.9.3-150600.3.31.1 * sssd-ad-2.9.3-150600.3.31.1 * sssd-proxy-debuginfo-2.9.3-150600.3.31.1 * sssd-debuginfo-2.9.3-150600.3.31.1 * sssd-debugsource-2.9.3-150600.3.31.1 * sssd-winbind-idmap-debuginfo-2.9.3-150600.3.31.1 * sssd-proxy-2.9.3-150600.3.31.1 * sssd-tools-debuginfo-2.9.3-150600.3.31.1 * libsss_nss_idmap0-debuginfo-2.9.3-150600.3.31.1 * sssd-winbind-idmap-2.9.3-150600.3.31.1 * sssd-2.9.3-150600.3.31.1 * sssd-ipa-2.9.3-150600.3.31.1 * sssd-dbus-debuginfo-2.9.3-150600.3.31.1 * sssd-krb5-common-debuginfo-2.9.3-150600.3.31.1 * sssd-kcm-debuginfo-2.9.3-150600.3.31.1 * sssd-ipa-debuginfo-2.9.3-150600.3.31.1 * sssd-ldap-2.9.3-150600.3.31.1 * sssd-krb5-2.9.3-150600.3.31.1 * libsss_nss_idmap0-2.9.3-150600.3.31.1 * libsss_idmap0-2.9.3-150600.3.31.1 * python3-sssd-config-2.9.3-150600.3.31.1 * libsss_nss_idmap-devel-2.9.3-150600.3.31.1 * libsss_certmap0-debuginfo-2.9.3-150600.3.31.1 * libipa_hbac-devel-2.9.3-150600.3.31.1 * libsss_idmap0-debuginfo-2.9.3-150600.3.31.1 * libsss_simpleifp0-debuginfo-2.9.3-150600.3.31.1 * libipa_hbac0-debuginfo-2.9.3-150600.3.31.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64) * sssd-32bit-debuginfo-2.9.3-150600.3.31.1 * sssd-32bit-2.9.3-150600.3.31.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1230348 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 7 20:30:11 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 07 Jan 2026 20:30:11 -0000 Subject: SUSE-RU-2026:0054-1: moderate: Recommended update for pciutils Message-ID: <176781781186.6796.5514768555716188840@smelt2.prg2.suse.org> # Recommended update for pciutils Announcement ID: SUSE-RU-2026:0054-1 Release Date: 2026-01-07T13:34:17Z Rating: moderate References: * bsc#1252338 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for pciutils fixes the following issues: * Add a strict dependency to libpci to prevent possible segfault (bsc#1252338) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-54=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-54=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * pciutils-debuginfo-3.5.6-11.12.1 * pciutils-3.5.6-11.12.1 * pciutils-debugsource-3.5.6-11.12.1 * pciutils-devel-3.5.6-11.12.1 * libpci3-debuginfo-3.5.6-11.12.1 * libpci3-3.5.6-11.12.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libpci3-32bit-3.5.6-11.12.1 * libpci3-debuginfo-32bit-3.5.6-11.12.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libpci3-32bit-3.5.6-11.12.1 * pciutils-debuginfo-3.5.6-11.12.1 * pciutils-3.5.6-11.12.1 * pciutils-debugsource-3.5.6-11.12.1 * libpci3-debuginfo-32bit-3.5.6-11.12.1 * pciutils-devel-3.5.6-11.12.1 * libpci3-debuginfo-3.5.6-11.12.1 * libpci3-3.5.6-11.12.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1252338 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 8 08:30:05 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Jan 2026 08:30:05 -0000 Subject: SUSE-SU-2026:0061-1: moderate: Security update for ImageMagick Message-ID: <176786100500.22154.1673803796855960083@smelt2.prg2.suse.org> # Security update for ImageMagick Announcement ID: SUSE-SU-2026:0061-1 Release Date: 2026-01-07T18:33:22Z Rating: moderate References: * bsc#1255821 * bsc#1255822 * bsc#1255823 Cross-References: * CVE-2025-68618 * CVE-2025-68950 * CVE-2025-69204 CVSS scores: * CVE-2025-68618 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-68618 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68618 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68618 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68950 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-68950 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68950 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68950 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-69204 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-69204 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-69204 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-69204 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 An update that solves three vulnerabilities can now be installed. ## Description: This update for ImageMagick fixes the following issues: * CVE-2025-68618: read a malicious SVG file may result in a DoS attack (bsc#1255821). * CVE-2025-68950: check for circular references in mvg files may lead to stack overflow (bsc#1255822). * CVE-2025-69204: an integer overflow can lead to a DoS attack (bsc#1255823). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-61=1 openSUSE-SLE-15.6-2026-61=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * ImageMagick-debugsource-7.1.1.21-150600.3.35.1 * ImageMagick-config-7-upstream-websafe-7.1.1.21-150600.3.35.1 * ImageMagick-config-7-SUSE-7.1.1.21-150600.3.35.1 * libMagickCore-7_Q16HDRI10-7.1.1.21-150600.3.35.1 * libMagick++-7_Q16HDRI5-7.1.1.21-150600.3.35.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.35.1 * libMagickWand-7_Q16HDRI10-7.1.1.21-150600.3.35.1 * perl-PerlMagick-7.1.1.21-150600.3.35.1 * ImageMagick-config-7-upstream-limited-7.1.1.21-150600.3.35.1 * ImageMagick-config-7-upstream-secure-7.1.1.21-150600.3.35.1 * ImageMagick-debuginfo-7.1.1.21-150600.3.35.1 * ImageMagick-extra-7.1.1.21-150600.3.35.1 * libMagick++-devel-7.1.1.21-150600.3.35.1 * ImageMagick-devel-7.1.1.21-150600.3.35.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.35.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.1.21-150600.3.35.1 * ImageMagick-extra-debuginfo-7.1.1.21-150600.3.35.1 * perl-PerlMagick-debuginfo-7.1.1.21-150600.3.35.1 * ImageMagick-config-7-upstream-open-7.1.1.21-150600.3.35.1 * ImageMagick-7.1.1.21-150600.3.35.1 * openSUSE Leap 15.6 (x86_64) * libMagick++-devel-32bit-7.1.1.21-150600.3.35.1 * libMagickCore-7_Q16HDRI10-32bit-debuginfo-7.1.1.21-150600.3.35.1 * libMagickWand-7_Q16HDRI10-32bit-debuginfo-7.1.1.21-150600.3.35.1 * libMagickWand-7_Q16HDRI10-32bit-7.1.1.21-150600.3.35.1 * libMagick++-7_Q16HDRI5-32bit-debuginfo-7.1.1.21-150600.3.35.1 * libMagickCore-7_Q16HDRI10-32bit-7.1.1.21-150600.3.35.1 * ImageMagick-devel-32bit-7.1.1.21-150600.3.35.1 * libMagick++-7_Q16HDRI5-32bit-7.1.1.21-150600.3.35.1 * openSUSE Leap 15.6 (noarch) * ImageMagick-doc-7.1.1.21-150600.3.35.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libMagick++-7_Q16HDRI5-64bit-7.1.1.21-150600.3.35.1 * libMagick++-7_Q16HDRI5-64bit-debuginfo-7.1.1.21-150600.3.35.1 * libMagickWand-7_Q16HDRI10-64bit-7.1.1.21-150600.3.35.1 * libMagickWand-7_Q16HDRI10-64bit-debuginfo-7.1.1.21-150600.3.35.1 * libMagickCore-7_Q16HDRI10-64bit-debuginfo-7.1.1.21-150600.3.35.1 * libMagick++-devel-64bit-7.1.1.21-150600.3.35.1 * libMagickCore-7_Q16HDRI10-64bit-7.1.1.21-150600.3.35.1 * ImageMagick-devel-64bit-7.1.1.21-150600.3.35.1 ## References: * https://www.suse.com/security/cve/CVE-2025-68618.html * https://www.suse.com/security/cve/CVE-2025-68950.html * https://www.suse.com/security/cve/CVE-2025-69204.html * https://bugzilla.suse.com/show_bug.cgi?id=1255821 * https://bugzilla.suse.com/show_bug.cgi?id=1255822 * https://bugzilla.suse.com/show_bug.cgi?id=1255823 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 8 08:30:09 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Jan 2026 08:30:09 -0000 Subject: SUSE-SU-2026:0060-1: moderate: Security update for capstone Message-ID: <176786100915.22154.17162742853195721645@smelt2.prg2.suse.org> # Security update for capstone Announcement ID: SUSE-SU-2026:0060-1 Release Date: 2026-01-07T16:02:54Z Rating: moderate References: * bsc#1255309 * bsc#1255310 Cross-References: * CVE-2025-67873 * CVE-2025-68114 CVSS scores: * CVE-2025-67873 ( SUSE ): 2.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-67873 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-67873 ( NVD ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-67873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-68114 ( SUSE ): 2.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-68114 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-68114 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68114 ( NVD ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for capstone fixes the following issues: Security issues fixed: * CVE-2025-67873: missing bounds check on user-provided skipdata callback can lead to a heap buffer overflow (bsc#1255309). * CVE-2025-68114: unchecked `vsnprintf` return value can lead to a stack buffer overflow (bsc#1255310). Other updates and bugfixes: * Enable static library, and add `libcapstone-devel-static` subpackage. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-60=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-60=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-60=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2026-60=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libcapstone4-debuginfo-4.0.2-150500.3.3.1 * capstone-4.0.2-150500.3.3.1 * capstone-debuginfo-4.0.2-150500.3.3.1 * capstone-debugsource-4.0.2-150500.3.3.1 * libcapstone4-4.0.2-150500.3.3.1 * libcapstone-devel-4.0.2-150500.3.3.1 * libcapstone-devel-static-4.0.2-150500.3.3.1 * openSUSE Leap 15.5 (noarch) * capstone-doc-4.0.2-150500.3.3.1 * python3-capstone-4.0.2-150500.3.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libcapstone4-debuginfo-4.0.2-150500.3.3.1 * capstone-4.0.2-150500.3.3.1 * capstone-debuginfo-4.0.2-150500.3.3.1 * capstone-debugsource-4.0.2-150500.3.3.1 * libcapstone4-4.0.2-150500.3.3.1 * libcapstone-devel-4.0.2-150500.3.3.1 * openSUSE Leap 15.6 (noarch) * capstone-doc-4.0.2-150500.3.3.1 * python3-capstone-4.0.2-150500.3.3.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libcapstone4-debuginfo-4.0.2-150500.3.3.1 * capstone-debuginfo-4.0.2-150500.3.3.1 * capstone-debugsource-4.0.2-150500.3.3.1 * libcapstone4-4.0.2-150500.3.3.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libcapstone4-debuginfo-4.0.2-150500.3.3.1 * capstone-debuginfo-4.0.2-150500.3.3.1 * capstone-debugsource-4.0.2-150500.3.3.1 * libcapstone4-4.0.2-150500.3.3.1 * libcapstone-devel-4.0.2-150500.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-67873.html * https://www.suse.com/security/cve/CVE-2025-68114.html * https://bugzilla.suse.com/show_bug.cgi?id=1255309 * https://bugzilla.suse.com/show_bug.cgi?id=1255310 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 8 08:30:11 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Jan 2026 08:30:11 -0000 Subject: SUSE-SU-2026:0059-1: moderate: Security update for ImageMagick Message-ID: <176786101183.22154.12204699728816030142@smelt2.prg2.suse.org> # Security update for ImageMagick Announcement ID: SUSE-SU-2026:0059-1 Release Date: 2026-01-07T16:01:56Z Rating: moderate References: * bsc#1255391 Cross-References: * CVE-2025-68469 CVSS scores: * CVE-2025-68469 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-68469 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68469 ( NVD ): 2.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-68469 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for ImageMagick fixes the following issues: * CVE-2025-68469: crash due to heap buffer overflow when processing a specially crafted TIFF file (bsc#1255391). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-59=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libMagick++-devel-6.8.8.1-71.221.1 * ImageMagick-config-6-SUSE-6.8.8.1-71.221.1 * libMagickWand-6_Q16-1-6.8.8.1-71.221.1 * libMagickCore-6_Q16-1-6.8.8.1-71.221.1 * libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.221.1 * ImageMagick-debuginfo-6.8.8.1-71.221.1 * libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.221.1 * ImageMagick-config-6-upstream-6.8.8.1-71.221.1 * ImageMagick-devel-6.8.8.1-71.221.1 * ImageMagick-debugsource-6.8.8.1-71.221.1 ## References: * https://www.suse.com/security/cve/CVE-2025-68469.html * https://bugzilla.suse.com/show_bug.cgi?id=1255391 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 8 16:30:03 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Jan 2026 16:30:03 -0000 Subject: SUSE-RU-2026:0064-1: moderate: Recommended update for libmicrohttpd Message-ID: <176788980320.22173.15769251122251814490@smelt2.prg2.suse.org> # Recommended update for libmicrohttpd Announcement ID: SUSE-RU-2026:0064-1 Release Date: 2026-01-08T09:53:49Z Rating: moderate References: * bsc#1254301 Affected Products: * Basesystem Module 15-SP7 * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for libmicrohttpd fixes the following issues: * Fix: libmicrohttpd 0.9.77: test_tricky_url fails during %check (bsc#1254301). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-64=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-64=1 openSUSE-SLE-15.6-2026-64=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-64=1 ## Package List: * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libmicrohttpd-debugsource-0.9.77-150600.3.6.1 * libmicrohttpd-devel-0.9.77-150600.3.6.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libmicrohttpd-debugsource-0.9.77-150600.3.6.1 * libmicrohttpd-devel-0.9.77-150600.3.6.1 * libmicrohttpd12-debuginfo-0.9.77-150600.3.6.1 * libmicrohttpd12-0.9.77-150600.3.6.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libmicrohttpd-debugsource-0.9.77-150600.3.6.1 * libmicrohttpd12-0.9.77-150600.3.6.1 * libmicrohttpd12-debuginfo-0.9.77-150600.3.6.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1254301 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 8 16:30:05 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Jan 2026 16:30:05 -0000 Subject: SUSE-SU-2026:0063-1: low: Security update for libpcap Message-ID: <176788980584.22173.5162989883415849629@smelt2.prg2.suse.org> # Security update for libpcap Announcement ID: SUSE-SU-2026:0063-1 Release Date: 2026-01-08T09:36:26Z Rating: low References: * bsc#1255765 Cross-References: * CVE-2025-11961 CVSS scores: * CVE-2025-11961 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-11961 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-11961 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for libpcap fixes the following issues: * CVE-2025-11961: missing validation of provided MAC-48 address string in `pcap_ether_aton()` can lead to out-of-bounds read and write (bsc#1255765). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-63=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-63=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libpcap-debugsource-1.10.5-150700.3.7.1 * libpcap1-debuginfo-1.10.5-150700.3.7.1 * libpcap-devel-1.10.5-150700.3.7.1 * libpcap1-1.10.5-150700.3.7.1 * SUSE Package Hub 15 15-SP7 (x86_64) * libpcap1-32bit-debuginfo-1.10.5-150700.3.7.1 * libpcap1-32bit-1.10.5-150700.3.7.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11961.html * https://bugzilla.suse.com/show_bug.cgi?id=1255765 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 8 16:30:08 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Jan 2026 16:30:08 -0000 Subject: SUSE-SU-2026:0062-1: low: Security update for libpcap Message-ID: <176788980821.22173.174061591129742903@smelt2.prg2.suse.org> # Security update for libpcap Announcement ID: SUSE-SU-2026:0062-1 Release Date: 2026-01-08T09:36:12Z Rating: low References: * bsc#1255765 Cross-References: * CVE-2025-11961 CVSS scores: * CVE-2025-11961 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-11961 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-11961 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libpcap fixes the following issues: * CVE-2025-11961: missing validation of provided MAC-48 address string in `pcap_ether_aton()` can lead to out-of-bounds read and write (bsc#1255765). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-62=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libpcap1-debuginfo-1.8.1-10.9.1 * libpcap1-1.8.1-10.9.1 * libpcap-devel-1.8.1-10.9.1 * libpcap-debugsource-1.8.1-10.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11961.html * https://bugzilla.suse.com/show_bug.cgi?id=1255765 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 8 20:30:05 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Jan 2026 20:30:05 -0000 Subject: SUSE-SU-2026:0073-1: moderate: Security update for ImageMagick Message-ID: <176790420548.22173.5078782441010126377@smelt2.prg2.suse.org> # Security update for ImageMagick Announcement ID: SUSE-SU-2026:0073-1 Release Date: 2026-01-08T13:22:44Z Rating: moderate References: * bsc#1255821 * bsc#1255822 * bsc#1255823 Cross-References: * CVE-2025-68618 * CVE-2025-68950 * CVE-2025-69204 CVSS scores: * CVE-2025-68618 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-68618 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68618 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68618 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68950 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-68950 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68950 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68950 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-69204 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-69204 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-69204 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-69204 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Desktop Applications Module 15-SP7 * Development Tools Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for ImageMagick fixes the following issues: * CVE-2025-68618: read a malicious SVG file may result in a DoS attack (bsc#1255821). * CVE-2025-68950: check for circular references in mvg files may lead to stack overflow (bsc#1255822). * CVE-2025-69204: an integer overflow can lead to a DoS attack (bsc#1255823). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-73=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-73=1 ## Package List: * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * perl-PerlMagick-7.1.1.43-150700.3.30.1 * ImageMagick-debuginfo-7.1.1.43-150700.3.30.1 * perl-PerlMagick-debuginfo-7.1.1.43-150700.3.30.1 * ImageMagick-debugsource-7.1.1.43-150700.3.30.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * ImageMagick-devel-7.1.1.43-150700.3.30.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.1.43-150700.3.30.1 * ImageMagick-config-7-upstream-limited-7.1.1.43-150700.3.30.1 * libMagick++-devel-7.1.1.43-150700.3.30.1 * ImageMagick-debuginfo-7.1.1.43-150700.3.30.1 * libMagickWand-7_Q16HDRI10-7.1.1.43-150700.3.30.1 * ImageMagick-config-7-SUSE-7.1.1.43-150700.3.30.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.1.43-150700.3.30.1 * libMagickCore-7_Q16HDRI10-7.1.1.43-150700.3.30.1 * ImageMagick-config-7-upstream-websafe-7.1.1.43-150700.3.30.1 * ImageMagick-debugsource-7.1.1.43-150700.3.30.1 * ImageMagick-7.1.1.43-150700.3.30.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.1.43-150700.3.30.1 * ImageMagick-config-7-upstream-open-7.1.1.43-150700.3.30.1 * libMagick++-7_Q16HDRI5-7.1.1.43-150700.3.30.1 * ImageMagick-config-7-upstream-secure-7.1.1.43-150700.3.30.1 ## References: * https://www.suse.com/security/cve/CVE-2025-68618.html * https://www.suse.com/security/cve/CVE-2025-68950.html * https://www.suse.com/security/cve/CVE-2025-69204.html * https://bugzilla.suse.com/show_bug.cgi?id=1255821 * https://bugzilla.suse.com/show_bug.cgi?id=1255822 * https://bugzilla.suse.com/show_bug.cgi?id=1255823 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 8 20:30:10 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Jan 2026 20:30:10 -0000 Subject: SUSE-SU-2026:0072-1: moderate: Security update for ImageMagick Message-ID: <176790421009.22173.14118441780634138274@smelt2.prg2.suse.org> # Security update for ImageMagick Announcement ID: SUSE-SU-2026:0072-1 Release Date: 2026-01-08T13:22:28Z Rating: moderate References: * bsc#1255821 * bsc#1255822 Cross-References: * CVE-2025-68618 * CVE-2025-68950 CVSS scores: * CVE-2025-68618 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-68618 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68618 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68618 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68950 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-68950 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68950 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68950 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Desktop Applications Module 15-SP7 * openSUSE Leap 15.4 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for ImageMagick fixes the following issues: * CVE-2025-68618: read a malicious SVG file may result in a DoS attack (bsc#1255821). * CVE-2025-68950: check for circular references in mvg files may lead to stack overflow (bsc#1255822). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-72=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-72=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libMagickCore-7_Q16HDRI10-7.1.0.9-150400.6.61.1 * ImageMagick-extra-debuginfo-7.1.0.9-150400.6.61.1 * ImageMagick-config-7-upstream-7.1.0.9-150400.6.61.1 * ImageMagick-devel-7.1.0.9-150400.6.61.1 * libMagick++-devel-7.1.0.9-150400.6.61.1 * libMagick++-7_Q16HDRI5-7.1.0.9-150400.6.61.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.61.1 * perl-PerlMagick-debuginfo-7.1.0.9-150400.6.61.1 * ImageMagick-7.1.0.9-150400.6.61.1 * ImageMagick-debugsource-7.1.0.9-150400.6.61.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.0.9-150400.6.61.1 * libMagickWand-7_Q16HDRI10-7.1.0.9-150400.6.61.1 * ImageMagick-extra-7.1.0.9-150400.6.61.1 * perl-PerlMagick-7.1.0.9-150400.6.61.1 * ImageMagick-config-7-SUSE-7.1.0.9-150400.6.61.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.0.9-150400.6.61.1 * ImageMagick-debuginfo-7.1.0.9-150400.6.61.1 * openSUSE Leap 15.4 (x86_64) * libMagickCore-7_Q16HDRI10-32bit-7.1.0.9-150400.6.61.1 * libMagick++-devel-32bit-7.1.0.9-150400.6.61.1 * ImageMagick-devel-32bit-7.1.0.9-150400.6.61.1 * libMagickWand-7_Q16HDRI10-32bit-7.1.0.9-150400.6.61.1 * libMagick++-7_Q16HDRI5-32bit-debuginfo-7.1.0.9-150400.6.61.1 * libMagickWand-7_Q16HDRI10-32bit-debuginfo-7.1.0.9-150400.6.61.1 * libMagickCore-7_Q16HDRI10-32bit-debuginfo-7.1.0.9-150400.6.61.1 * libMagick++-7_Q16HDRI5-32bit-7.1.0.9-150400.6.61.1 * openSUSE Leap 15.4 (noarch) * ImageMagick-doc-7.1.0.9-150400.6.61.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libMagick++-devel-64bit-7.1.0.9-150400.6.61.1 * libMagick++-7_Q16HDRI5-64bit-debuginfo-7.1.0.9-150400.6.61.1 * libMagickWand-7_Q16HDRI10-64bit-debuginfo-7.1.0.9-150400.6.61.1 * libMagickCore-7_Q16HDRI10-64bit-7.1.0.9-150400.6.61.1 * libMagick++-7_Q16HDRI5-64bit-7.1.0.9-150400.6.61.1 * libMagickWand-7_Q16HDRI10-64bit-7.1.0.9-150400.6.61.1 * libMagickCore-7_Q16HDRI10-64bit-debuginfo-7.1.0.9-150400.6.61.1 * ImageMagick-devel-64bit-7.1.0.9-150400.6.61.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * ImageMagick-config-7-upstream-7.1.0.9-150400.6.61.1 * ImageMagick-debugsource-7.1.0.9-150400.6.61.1 * ImageMagick-debuginfo-7.1.0.9-150400.6.61.1 ## References: * https://www.suse.com/security/cve/CVE-2025-68618.html * https://www.suse.com/security/cve/CVE-2025-68950.html * https://bugzilla.suse.com/show_bug.cgi?id=1255821 * https://bugzilla.suse.com/show_bug.cgi?id=1255822 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 8 20:30:13 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Jan 2026 20:30:13 -0000 Subject: SUSE-SU-2026:0071-1: moderate: Security update for php8 Message-ID: <176790421398.22173.17987112386056062471@smelt2.prg2.suse.org> # Security update for php8 Announcement ID: SUSE-SU-2026:0071-1 Release Date: 2026-01-08T13:22:08Z Rating: moderate References: * bsc#1255710 * bsc#1255711 * bsc#1255712 Cross-References: * CVE-2025-14177 * CVE-2025-14178 * CVE-2025-14180 CVSS scores: * CVE-2025-14177 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N * CVE-2025-14177 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-14177 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-14178 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-14178 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2025-14178 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2025-14180 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-14180 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-14180 ( NVD ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.6 An update that solves three vulnerabilities can now be installed. ## Description: This update for php8 fixes the following issues: Security fixes: * CVE-2025-14177: getimagesize() function may leak uninitialized heap memory into the APPn segments when reading images in multi-chunk mode (bsc#1255710). * CVE-2025-14178: heap buffer overflow occurs in array_merge() when the total element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE (bsc#1255711). * CVE-2025-14180: null pointer dereference in pdo_parse_params() function when using the PDO PostgreSQL driver with PDO::ATTR_EMULATE_PREPARES enabled (bsc#1255712). Other fixes: * Update to 8.2.30: Curl: Fix curl build and test failures with version 8.16. Opcache: Reset global pointers to prevent use-after-free in zend_jit_status(). PDO: Fixed GHSA-8xr5-qppj-gvwj (PDO quoting result null deref). (CVE-2025-14180) Standard: Fixed GHSA-www2-q4fc-65wf (Null byte termination in dns_get_record()). Fixed GHSA-h96m-rvf9-jgm2 (Heap buffer overflow in array_merge()). (CVE-2025-14178) Fixed GHSA-3237-qqm7-mfv7 (Information Leak of Memory in getimagesize). (CVE-2025-14177) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-71=1 openSUSE-SLE-15.6-2026-71=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * php8-pgsql-debuginfo-8.2.30-150600.3.25.1 * php8-posix-debuginfo-8.2.30-150600.3.25.1 * php8-odbc-8.2.30-150600.3.25.1 * php8-sodium-debuginfo-8.2.30-150600.3.25.1 * php8-bz2-debuginfo-8.2.30-150600.3.25.1 * php8-debuginfo-8.2.30-150600.3.25.1 * php8-sysvmsg-debuginfo-8.2.30-150600.3.25.1 * php8-openssl-debuginfo-8.2.30-150600.3.25.1 * php8-snmp-8.2.30-150600.3.25.1 * php8-mbstring-8.2.30-150600.3.25.1 * php8-mbstring-debuginfo-8.2.30-150600.3.25.1 * php8-fpm-debugsource-8.2.30-150600.3.25.1 * php8-sockets-debuginfo-8.2.30-150600.3.25.1 * php8-devel-8.2.30-150600.3.25.1 * php8-cli-debuginfo-8.2.30-150600.3.25.1 * php8-opcache-8.2.30-150600.3.25.1 * php8-dba-debuginfo-8.2.30-150600.3.25.1 * php8-tokenizer-8.2.30-150600.3.25.1 * php8-xmlreader-8.2.30-150600.3.25.1 * php8-posix-8.2.30-150600.3.25.1 * php8-embed-8.2.30-150600.3.25.1 * php8-embed-debugsource-8.2.30-150600.3.25.1 * php8-gmp-8.2.30-150600.3.25.1 * php8-sysvshm-debuginfo-8.2.30-150600.3.25.1 * php8-odbc-debuginfo-8.2.30-150600.3.25.1 * php8-xsl-8.2.30-150600.3.25.1 * php8-tidy-8.2.30-150600.3.25.1 * php8-fileinfo-8.2.30-150600.3.25.1 * php8-bz2-8.2.30-150600.3.25.1 * php8-ctype-8.2.30-150600.3.25.1 * php8-ffi-8.2.30-150600.3.25.1 * php8-snmp-debuginfo-8.2.30-150600.3.25.1 * php8-mysql-debuginfo-8.2.30-150600.3.25.1 * php8-gd-debuginfo-8.2.30-150600.3.25.1 * php8-ldap-8.2.30-150600.3.25.1 * php8-fpm-8.2.30-150600.3.25.1 * php8-calendar-8.2.30-150600.3.25.1 * php8-xsl-debuginfo-8.2.30-150600.3.25.1 * php8-pcntl-debuginfo-8.2.30-150600.3.25.1 * php8-curl-debuginfo-8.2.30-150600.3.25.1 * php8-sodium-8.2.30-150600.3.25.1 * php8-bcmath-debuginfo-8.2.30-150600.3.25.1 * php8-readline-8.2.30-150600.3.25.1 * php8-fastcgi-8.2.30-150600.3.25.1 * php8-zip-8.2.30-150600.3.25.1 * php8-xmlreader-debuginfo-8.2.30-150600.3.25.1 * php8-intl-8.2.30-150600.3.25.1 * php8-dom-debuginfo-8.2.30-150600.3.25.1 * php8-sqlite-debuginfo-8.2.30-150600.3.25.1 * php8-sysvmsg-8.2.30-150600.3.25.1 * php8-zlib-debuginfo-8.2.30-150600.3.25.1 * php8-tokenizer-debuginfo-8.2.30-150600.3.25.1 * php8-xmlwriter-8.2.30-150600.3.25.1 * php8-phar-8.2.30-150600.3.25.1 * php8-enchant-8.2.30-150600.3.25.1 * php8-intl-debuginfo-8.2.30-150600.3.25.1 * php8-soap-8.2.30-150600.3.25.1 * php8-curl-8.2.30-150600.3.25.1 * php8-tidy-debuginfo-8.2.30-150600.3.25.1 * php8-exif-8.2.30-150600.3.25.1 * php8-opcache-debuginfo-8.2.30-150600.3.25.1 * php8-fastcgi-debugsource-8.2.30-150600.3.25.1 * php8-ftp-8.2.30-150600.3.25.1 * php8-fpm-debuginfo-8.2.30-150600.3.25.1 * php8-enchant-debuginfo-8.2.30-150600.3.25.1 * php8-openssl-8.2.30-150600.3.25.1 * php8-cli-8.2.30-150600.3.25.1 * apache2-mod_php8-debugsource-8.2.30-150600.3.25.1 * php8-8.2.30-150600.3.25.1 * php8-sysvsem-debuginfo-8.2.30-150600.3.25.1 * php8-gmp-debuginfo-8.2.30-150600.3.25.1 * php8-ffi-debuginfo-8.2.30-150600.3.25.1 * php8-pdo-debuginfo-8.2.30-150600.3.25.1 * php8-dom-8.2.30-150600.3.25.1 * php8-shmop-8.2.30-150600.3.25.1 * php8-bcmath-8.2.30-150600.3.25.1 * php8-gd-8.2.30-150600.3.25.1 * apache2-mod_php8-8.2.30-150600.3.25.1 * php8-pcntl-8.2.30-150600.3.25.1 * php8-zlib-8.2.30-150600.3.25.1 * php8-phar-debuginfo-8.2.30-150600.3.25.1 * php8-debugsource-8.2.30-150600.3.25.1 * php8-sqlite-8.2.30-150600.3.25.1 * php8-embed-debuginfo-8.2.30-150600.3.25.1 * php8-sockets-8.2.30-150600.3.25.1 * php8-zip-debuginfo-8.2.30-150600.3.25.1 * php8-gettext-8.2.30-150600.3.25.1 * php8-test-8.2.30-150600.3.25.1 * php8-ctype-debuginfo-8.2.30-150600.3.25.1 * php8-calendar-debuginfo-8.2.30-150600.3.25.1 * php8-ldap-debuginfo-8.2.30-150600.3.25.1 * php8-exif-debuginfo-8.2.30-150600.3.25.1 * php8-gettext-debuginfo-8.2.30-150600.3.25.1 * php8-pdo-8.2.30-150600.3.25.1 * apache2-mod_php8-debuginfo-8.2.30-150600.3.25.1 * php8-shmop-debuginfo-8.2.30-150600.3.25.1 * php8-iconv-debuginfo-8.2.30-150600.3.25.1 * php8-iconv-8.2.30-150600.3.25.1 * php8-fastcgi-debuginfo-8.2.30-150600.3.25.1 * php8-soap-debuginfo-8.2.30-150600.3.25.1 * php8-mysql-8.2.30-150600.3.25.1 * php8-dba-8.2.30-150600.3.25.1 * php8-sysvshm-8.2.30-150600.3.25.1 * php8-fileinfo-debuginfo-8.2.30-150600.3.25.1 * php8-pgsql-8.2.30-150600.3.25.1 * php8-xmlwriter-debuginfo-8.2.30-150600.3.25.1 * php8-readline-debuginfo-8.2.30-150600.3.25.1 * php8-ftp-debuginfo-8.2.30-150600.3.25.1 * php8-sysvsem-8.2.30-150600.3.25.1 * openSUSE Leap 15.6 (noarch) * php8-fpm-apache-8.2.30-150600.3.25.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14177.html * https://www.suse.com/security/cve/CVE-2025-14178.html * https://www.suse.com/security/cve/CVE-2025-14180.html * https://bugzilla.suse.com/show_bug.cgi?id=1255710 * https://bugzilla.suse.com/show_bug.cgi?id=1255711 * https://bugzilla.suse.com/show_bug.cgi?id=1255712 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 8 20:30:19 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Jan 2026 20:30:19 -0000 Subject: SUSE-SU-2026:0069-1: moderate: Security update for rsync Message-ID: <176790421993.22173.6693211259605347416@smelt2.prg2.suse.org> # Security update for rsync Announcement ID: SUSE-SU-2026:0069-1 Release Date: 2026-01-08T13:21:48Z Rating: moderate References: * bsc#1254441 Cross-References: * CVE-2025-10158 CVSS scores: * CVE-2025-10158 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-10158 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves one vulnerability can now be installed. ## Description: This update for rsync fixes the following issues: * CVE-2025-10158: Fixed out of bounds array access via negative index (bsc#1254441) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-69=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-69=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * rsync-debugsource-3.2.3-150000.4.39.1 * rsync-debuginfo-3.2.3-150000.4.39.1 * rsync-3.2.3-150000.4.39.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * rsync-debugsource-3.2.3-150000.4.39.1 * rsync-debuginfo-3.2.3-150000.4.39.1 * rsync-3.2.3-150000.4.39.1 ## References: * https://www.suse.com/security/cve/CVE-2025-10158.html * https://bugzilla.suse.com/show_bug.cgi?id=1254441 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 8 20:30:17 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Jan 2026 20:30:17 -0000 Subject: SUSE-SU-2026:0070-1: important: Security update for qemu Message-ID: <176790421731.22173.12635928731341460142@smelt2.prg2.suse.org> # Security update for qemu Announcement ID: SUSE-SU-2026:0070-1 Release Date: 2026-01-08T13:22:00Z Rating: important References: * bsc#1209554 * bsc#1227397 Cross-References: * CVE-2023-1544 * CVE-2024-6505 CVSS scores: * CVE-2023-1544 ( SUSE ): 7.9 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:H * CVE-2023-1544 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H * CVE-2023-1544 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-6505 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-6505 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2024-6505 ( NVD ): 6.8 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves two vulnerabilities can now be installed. ## Description: This update for qemu fixes the following issues: * CVE-2024-6505: Fixed queue index out-of-bounds access in software RSS (bsc#1227397) * CVE-2023-1544: Fixed out-of-bounds read in pvrdma_ring_next_elem_read() (bsc#1209554) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2026-70=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-70=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-70=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * qemu-s390x-5.2.0-150300.138.1 * qemu-hw-display-virtio-gpu-pci-5.2.0-150300.138.1 * qemu-tools-5.2.0-150300.138.1 * qemu-block-dmg-5.2.0-150300.138.1 * qemu-extra-5.2.0-150300.138.1 * qemu-ui-gtk-debuginfo-5.2.0-150300.138.1 * qemu-ui-opengl-debuginfo-5.2.0-150300.138.1 * qemu-testsuite-5.2.0-150300.138.2 * qemu-block-dmg-debuginfo-5.2.0-150300.138.1 * qemu-hw-usb-redirect-debuginfo-5.2.0-150300.138.1 * qemu-hw-usb-smartcard-debuginfo-5.2.0-150300.138.1 * qemu-ui-opengl-5.2.0-150300.138.1 * qemu-ui-spice-app-5.2.0-150300.138.1 * qemu-audio-spice-debuginfo-5.2.0-150300.138.1 * qemu-ui-gtk-5.2.0-150300.138.1 * qemu-linux-user-debuginfo-5.2.0-150300.138.1 * qemu-guest-agent-debuginfo-5.2.0-150300.138.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-5.2.0-150300.138.1 * qemu-5.2.0-150300.138.1 * qemu-arm-5.2.0-150300.138.1 * qemu-chardev-spice-debuginfo-5.2.0-150300.138.1 * qemu-hw-display-qxl-debuginfo-5.2.0-150300.138.1 * qemu-audio-pa-debuginfo-5.2.0-150300.138.1 * qemu-chardev-baum-debuginfo-5.2.0-150300.138.1 * qemu-block-iscsi-5.2.0-150300.138.1 * qemu-guest-agent-5.2.0-150300.138.1 * qemu-ivshmem-tools-debuginfo-5.2.0-150300.138.1 * qemu-block-gluster-5.2.0-150300.138.1 * qemu-s390x-debuginfo-5.2.0-150300.138.1 * qemu-ui-curses-debuginfo-5.2.0-150300.138.1 * qemu-ui-spice-core-5.2.0-150300.138.1 * qemu-audio-alsa-5.2.0-150300.138.1 * qemu-vhost-user-gpu-debuginfo-5.2.0-150300.138.1 * qemu-lang-5.2.0-150300.138.1 * qemu-block-nfs-5.2.0-150300.138.1 * qemu-block-ssh-debuginfo-5.2.0-150300.138.1 * qemu-hw-s390x-virtio-gpu-ccw-5.2.0-150300.138.1 * qemu-ksm-5.2.0-150300.138.1 * qemu-arm-debuginfo-5.2.0-150300.138.1 * qemu-block-curl-debuginfo-5.2.0-150300.138.1 * qemu-x86-5.2.0-150300.138.1 * qemu-ui-spice-app-debuginfo-5.2.0-150300.138.1 * qemu-hw-display-virtio-gpu-debuginfo-5.2.0-150300.138.1 * qemu-chardev-spice-5.2.0-150300.138.1 * qemu-audio-pa-5.2.0-150300.138.1 * qemu-hw-display-qxl-5.2.0-150300.138.1 * qemu-linux-user-debugsource-5.2.0-150300.138.1 * qemu-audio-alsa-debuginfo-5.2.0-150300.138.1 * qemu-debugsource-5.2.0-150300.138.1 * qemu-debuginfo-5.2.0-150300.138.1 * qemu-extra-debuginfo-5.2.0-150300.138.1 * qemu-x86-debuginfo-5.2.0-150300.138.1 * qemu-block-nfs-debuginfo-5.2.0-150300.138.1 * qemu-ppc-debuginfo-5.2.0-150300.138.1 * qemu-hw-display-virtio-gpu-5.2.0-150300.138.1 * qemu-ivshmem-tools-5.2.0-150300.138.1 * qemu-ui-spice-core-debuginfo-5.2.0-150300.138.1 * qemu-block-ssh-5.2.0-150300.138.1 * qemu-hw-display-virtio-vga-debuginfo-5.2.0-150300.138.1 * qemu-ppc-5.2.0-150300.138.1 * qemu-hw-s390x-virtio-gpu-ccw-debuginfo-5.2.0-150300.138.1 * qemu-hw-display-virtio-vga-5.2.0-150300.138.1 * qemu-tools-debuginfo-5.2.0-150300.138.1 * qemu-block-gluster-debuginfo-5.2.0-150300.138.1 * qemu-block-iscsi-debuginfo-5.2.0-150300.138.1 * qemu-audio-spice-5.2.0-150300.138.1 * qemu-hw-usb-redirect-5.2.0-150300.138.1 * qemu-block-curl-5.2.0-150300.138.1 * qemu-vhost-user-gpu-5.2.0-150300.138.1 * qemu-hw-usb-smartcard-5.2.0-150300.138.1 * qemu-linux-user-5.2.0-150300.138.1 * qemu-chardev-baum-5.2.0-150300.138.1 * qemu-ui-curses-5.2.0-150300.138.1 * openSUSE Leap 15.3 (s390x x86_64 i586) * qemu-kvm-5.2.0-150300.138.1 * openSUSE Leap 15.3 (noarch) * qemu-microvm-5.2.0-150300.138.1 * qemu-SLOF-5.2.0-150300.138.1 * qemu-seabios-1.14.0_0_g155821a-150300.138.1 * qemu-skiboot-5.2.0-150300.138.1 * qemu-sgabios-8-150300.138.1 * qemu-vgabios-1.14.0_0_g155821a-150300.138.1 * qemu-ipxe-1.0.0+-150300.138.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64) * qemu-block-rbd-debuginfo-5.2.0-150300.138.1 * qemu-block-rbd-5.2.0-150300.138.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * qemu-tools-5.2.0-150300.138.1 * qemu-hw-usb-redirect-debuginfo-5.2.0-150300.138.1 * qemu-ui-opengl-5.2.0-150300.138.1 * qemu-audio-spice-debuginfo-5.2.0-150300.138.1 * qemu-guest-agent-debuginfo-5.2.0-150300.138.1 * qemu-hw-display-qxl-debuginfo-5.2.0-150300.138.1 * qemu-5.2.0-150300.138.1 * qemu-ui-opengl-debuginfo-5.2.0-150300.138.1 * qemu-chardev-spice-debuginfo-5.2.0-150300.138.1 * qemu-guest-agent-5.2.0-150300.138.1 * qemu-ui-spice-core-5.2.0-150300.138.1 * qemu-hw-display-virtio-gpu-debuginfo-5.2.0-150300.138.1 * qemu-chardev-spice-5.2.0-150300.138.1 * qemu-hw-display-qxl-5.2.0-150300.138.1 * qemu-debugsource-5.2.0-150300.138.1 * qemu-debuginfo-5.2.0-150300.138.1 * qemu-hw-display-virtio-gpu-5.2.0-150300.138.1 * qemu-ui-spice-core-debuginfo-5.2.0-150300.138.1 * qemu-hw-display-virtio-vga-debuginfo-5.2.0-150300.138.1 * qemu-hw-display-virtio-vga-5.2.0-150300.138.1 * qemu-tools-debuginfo-5.2.0-150300.138.1 * qemu-audio-spice-5.2.0-150300.138.1 * qemu-hw-usb-redirect-5.2.0-150300.138.1 * SUSE Linux Enterprise Micro 5.2 (aarch64) * qemu-arm-debuginfo-5.2.0-150300.138.1 * qemu-arm-5.2.0-150300.138.1 * SUSE Linux Enterprise Micro 5.2 (noarch) * qemu-seabios-1.14.0_0_g155821a-150300.138.1 * qemu-sgabios-8-150300.138.1 * qemu-vgabios-1.14.0_0_g155821a-150300.138.1 * qemu-ipxe-1.0.0+-150300.138.1 * SUSE Linux Enterprise Micro 5.2 (s390x) * qemu-s390x-5.2.0-150300.138.1 * qemu-s390x-debuginfo-5.2.0-150300.138.1 * SUSE Linux Enterprise Micro 5.2 (x86_64) * qemu-x86-5.2.0-150300.138.1 * qemu-x86-debuginfo-5.2.0-150300.138.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * qemu-tools-5.2.0-150300.138.1 * qemu-hw-usb-redirect-debuginfo-5.2.0-150300.138.1 * qemu-ui-opengl-5.2.0-150300.138.1 * qemu-audio-spice-debuginfo-5.2.0-150300.138.1 * qemu-guest-agent-debuginfo-5.2.0-150300.138.1 * qemu-hw-display-qxl-debuginfo-5.2.0-150300.138.1 * qemu-5.2.0-150300.138.1 * qemu-ui-opengl-debuginfo-5.2.0-150300.138.1 * qemu-chardev-spice-debuginfo-5.2.0-150300.138.1 * qemu-guest-agent-5.2.0-150300.138.1 * qemu-ui-spice-core-5.2.0-150300.138.1 * qemu-hw-display-virtio-gpu-debuginfo-5.2.0-150300.138.1 * qemu-chardev-spice-5.2.0-150300.138.1 * qemu-hw-display-qxl-5.2.0-150300.138.1 * qemu-debugsource-5.2.0-150300.138.1 * qemu-debuginfo-5.2.0-150300.138.1 * qemu-hw-display-virtio-gpu-5.2.0-150300.138.1 * qemu-ui-spice-core-debuginfo-5.2.0-150300.138.1 * qemu-hw-display-virtio-vga-debuginfo-5.2.0-150300.138.1 * qemu-hw-display-virtio-vga-5.2.0-150300.138.1 * qemu-tools-debuginfo-5.2.0-150300.138.1 * qemu-audio-spice-5.2.0-150300.138.1 * qemu-hw-usb-redirect-5.2.0-150300.138.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64) * qemu-arm-debuginfo-5.2.0-150300.138.1 * qemu-arm-5.2.0-150300.138.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (noarch) * qemu-seabios-1.14.0_0_g155821a-150300.138.1 * qemu-sgabios-8-150300.138.1 * qemu-vgabios-1.14.0_0_g155821a-150300.138.1 * qemu-ipxe-1.0.0+-150300.138.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (s390x) * qemu-s390x-5.2.0-150300.138.1 * qemu-s390x-debuginfo-5.2.0-150300.138.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64) * qemu-x86-5.2.0-150300.138.1 * qemu-x86-debuginfo-5.2.0-150300.138.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1544.html * https://www.suse.com/security/cve/CVE-2024-6505.html * https://bugzilla.suse.com/show_bug.cgi?id=1209554 * https://bugzilla.suse.com/show_bug.cgi?id=1227397 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 8 20:30:30 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Jan 2026 20:30:30 -0000 Subject: SUSE-SU-2026:0066-1: moderate: Security update for curl Message-ID: <176790423006.22173.17328215140424551373@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2026:0066-1 Release Date: 2026-01-08T12:21:35Z Rating: moderate References: * bsc#1255731 * bsc#1255732 * bsc#1255733 Cross-References: * CVE-2025-14524 * CVE-2025-14819 * CVE-2025-15079 CVSS scores: * CVE-2025-14524 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-14524 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-14819 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-14819 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-14819 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-15079 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-15079 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-15079 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2025-14524: Fixed bearer token leak on cross-protocol redirect (bsc#1255731) * CVE-2025-15079: Fixed unknown host connection acceptance when set in the global knownhostsfile (bsc#1255733) * CVE-2025-14819: Fixed issue where alteration of CURLSSLOPT_NO_PARTIALCHAIN could accidentally lead to CA cache reuse for which partial chain was reversed (bsc#1255732) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-66=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * curl-debugsource-8.0.1-11.111.1 * libcurl4-debuginfo-8.0.1-11.111.1 * curl-8.0.1-11.111.1 * curl-debuginfo-8.0.1-11.111.1 * libcurl-devel-8.0.1-11.111.1 * libcurl4-debuginfo-32bit-8.0.1-11.111.1 * libcurl4-32bit-8.0.1-11.111.1 * libcurl4-8.0.1-11.111.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14524.html * https://www.suse.com/security/cve/CVE-2025-14819.html * https://www.suse.com/security/cve/CVE-2025-15079.html * https://bugzilla.suse.com/show_bug.cgi?id=1255731 * https://bugzilla.suse.com/show_bug.cgi?id=1255732 * https://bugzilla.suse.com/show_bug.cgi?id=1255733 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 8 20:30:23 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Jan 2026 20:30:23 -0000 Subject: SUSE-SU-2026:0068-1: moderate: Security update for libvirt Message-ID: <176790422335.22173.4164192168811836031@smelt2.prg2.suse.org> # Security update for libvirt Announcement ID: SUSE-SU-2026:0068-1 Release Date: 2026-01-08T12:22:41Z Rating: moderate References: * bsc#1253278 * bsc#1253703 Cross-References: * CVE-2025-12748 * CVE-2025-13193 CVSS scores: * CVE-2025-12748 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-12748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-12748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-13193 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-13193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-13193 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.6 An update that solves two vulnerabilities can now be installed. ## Description: This update for libvirt fixes the following issues: * CVE-2025-13193: Fixed umask for 'qemu-img' when creating external inactive snapshots (bsc#1253703) * CVE-2025-12748: Fixed Check ACLs before parsing the whole domain XML (bsc#1253278) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-68=1 openSUSE-SLE-15.6-2026-68=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libvirt-daemon-log-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-driver-storage-iscsi-direct-10.0.0-150600.8.12.1 * libvirt-client-10.0.0-150600.8.12.1 * libvirt-daemon-driver-storage-scsi-10.0.0-150600.8.12.1 * libvirt-libs-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-driver-nwfilter-10.0.0-150600.8.12.1 * libvirt-daemon-plugin-sanlock-10.0.0-150600.8.12.1 * libvirt-daemon-driver-lxc-10.0.0-150600.8.12.1 * libvirt-client-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-driver-nodedev-10.0.0-150600.8.12.1 * wireshark-plugin-libvirt-10.0.0-150600.8.12.1 * libvirt-daemon-lock-10.0.0-150600.8.12.1 * libvirt-daemon-config-network-10.0.0-150600.8.12.1 * libvirt-daemon-driver-storage-gluster-10.0.0-150600.8.12.1 * libvirt-daemon-driver-interface-10.0.0-150600.8.12.1 * libvirt-10.0.0-150600.8.12.1 * libvirt-daemon-driver-secret-10.0.0-150600.8.12.1 * libvirt-daemon-driver-interface-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-driver-qemu-10.0.0-150600.8.12.1 * libvirt-libs-10.0.0-150600.8.12.1 * libvirt-daemon-driver-network-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-driver-nodedev-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-10.0.0-150600.8.12.1 * libvirt-daemon-driver-qemu-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-lxc-10.0.0-150600.8.12.1 * libvirt-daemon-plugin-sanlock-debuginfo-10.0.0-150600.8.12.1 * libvirt-client-qemu-10.0.0-150600.8.12.1 * libvirt-daemon-qemu-10.0.0-150600.8.12.1 * libvirt-daemon-driver-storage-scsi-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-common-10.0.0-150600.8.12.1 * libvirt-nss-debuginfo-10.0.0-150600.8.12.1 * wireshark-plugin-libvirt-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-config-nwfilter-10.0.0-150600.8.12.1 * libvirt-daemon-plugin-lockd-10.0.0-150600.8.12.1 * libvirt-debugsource-10.0.0-150600.8.12.1 * libvirt-daemon-log-10.0.0-150600.8.12.1 * libvirt-daemon-plugin-lockd-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-driver-storage-10.0.0-150600.8.12.1 * libvirt-daemon-driver-storage-iscsi-10.0.0-150600.8.12.1 * libvirt-nss-10.0.0-150600.8.12.1 * libvirt-daemon-lock-debuginfo-10.0.0-150600.8.12.1 * libvirt-devel-10.0.0-150600.8.12.1 * libvirt-daemon-driver-storage-iscsi-direct-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-driver-nwfilter-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-driver-storage-logical-10.0.0-150600.8.12.1 * libvirt-daemon-driver-storage-iscsi-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-driver-lxc-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-driver-storage-core-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-driver-storage-disk-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-driver-secret-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-driver-storage-mpath-10.0.0-150600.8.12.1 * libvirt-daemon-hooks-10.0.0-150600.8.12.1 * libvirt-daemon-proxy-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-driver-storage-logical-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-driver-storage-disk-10.0.0-150600.8.12.1 * libvirt-daemon-driver-storage-core-10.0.0-150600.8.12.1 * libvirt-daemon-driver-storage-mpath-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-driver-network-10.0.0-150600.8.12.1 * libvirt-daemon-proxy-10.0.0-150600.8.12.1 * libvirt-daemon-common-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-driver-storage-gluster-debuginfo-10.0.0-150600.8.12.1 * openSUSE Leap 15.6 (x86_64) * libvirt-daemon-driver-libxl-10.0.0-150600.8.12.1 * libvirt-daemon-driver-libxl-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-xen-10.0.0-150600.8.12.1 * libvirt-client-32bit-debuginfo-10.0.0-150600.8.12.1 * libvirt-devel-32bit-10.0.0-150600.8.12.1 * openSUSE Leap 15.6 (noarch) * libvirt-doc-10.0.0-150600.8.12.1 * openSUSE Leap 15.6 (aarch64 x86_64) * libvirt-daemon-driver-storage-rbd-debuginfo-10.0.0-150600.8.12.1 * libvirt-daemon-driver-storage-rbd-10.0.0-150600.8.12.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libvirt-client-64bit-debuginfo-10.0.0-150600.8.12.1 * libvirt-devel-64bit-10.0.0-150600.8.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12748.html * https://www.suse.com/security/cve/CVE-2025-13193.html * https://bugzilla.suse.com/show_bug.cgi?id=1253278 * https://bugzilla.suse.com/show_bug.cgi?id=1253703 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 8 20:30:25 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 08 Jan 2026 20:30:25 -0000 Subject: SUSE-SU-2026:0067-1: moderate: Security update for podman Message-ID: <176790422587.22173.5932837033518930988@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2026:0067-1 Release Date: 2026-01-08T12:22:22Z Rating: moderate References: * bsc#1253993 Cross-References: * CVE-2025-47914 CVSS scores: * CVE-2025-47914 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-47914 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-47914 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Containers Module 15-SP7 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2025-47914: Fixed ssh-agent that could cause a panic due to an out-of- bounds read with non validated message size (bsc#1253993) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-67=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-67=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-67=1 * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2026-67=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * podman-debuginfo-4.9.5-150500.3.62.2 * podman-4.9.5-150500.3.62.2 * podmansh-4.9.5-150500.3.62.2 * podman-remote-4.9.5-150500.3.62.2 * podman-remote-debuginfo-4.9.5-150500.3.62.2 * openSUSE Leap 15.5 (noarch) * podman-docker-4.9.5-150500.3.62.2 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * podman-debuginfo-4.9.5-150500.3.62.2 * podman-4.9.5-150500.3.62.2 * podmansh-4.9.5-150500.3.62.2 * podman-remote-4.9.5-150500.3.62.2 * podman-remote-debuginfo-4.9.5-150500.3.62.2 * openSUSE Leap 15.6 (noarch) * podman-docker-4.9.5-150500.3.62.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * podman-debuginfo-4.9.5-150500.3.62.2 * podman-4.9.5-150500.3.62.2 * podmansh-4.9.5-150500.3.62.2 * podman-remote-4.9.5-150500.3.62.2 * podman-remote-debuginfo-4.9.5-150500.3.62.2 * SUSE Linux Enterprise Micro 5.5 (noarch) * podman-docker-4.9.5-150500.3.62.2 * Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64) * podman-debuginfo-4.9.5-150500.3.62.2 * podman-4.9.5-150500.3.62.2 * podmansh-4.9.5-150500.3.62.2 * podman-remote-4.9.5-150500.3.62.2 * podman-remote-debuginfo-4.9.5-150500.3.62.2 * Containers Module 15-SP7 (noarch) * podman-docker-4.9.5-150500.3.62.2 ## References: * https://www.suse.com/security/cve/CVE-2025-47914.html * https://bugzilla.suse.com/show_bug.cgi?id=1253993 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 08:30:03 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 08:30:03 -0000 Subject: SUSE-SU-2026:0077-1: moderate: Security update for curl Message-ID: <176794740389.22147.810190083858622828@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2026:0077-1 Release Date: 2026-01-08T19:04:01Z Rating: moderate References: * bsc#1256105 Cross-References: * CVE-2025-14017 CVSS scores: * CVE-2025-14017 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-14017 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N Affected Products: * openSUSE Leap 15.6 An update that solves one vulnerability can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2025-14017: Fixed broken TLS options for threaded LDAPS (bsc#1256105). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-77=1 openSUSE-SLE-15.6-2026-77=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libcurl4-8.14.1-150600.4.37.1 * curl-8.14.1-150600.4.37.1 * curl-debuginfo-8.14.1-150600.4.37.1 * libcurl4-debuginfo-8.14.1-150600.4.37.1 * curl-mini-debugsource-8.14.1-150600.4.37.1 * libcurl-mini4-8.14.1-150600.4.37.1 * libcurl-mini4-debuginfo-8.14.1-150600.4.37.1 * curl-debugsource-8.14.1-150600.4.37.1 * libcurl-devel-8.14.1-150600.4.37.1 * openSUSE Leap 15.6 (noarch) * curl-fish-completion-8.14.1-150600.4.37.1 * curl-zsh-completion-8.14.1-150600.4.37.1 * libcurl-devel-doc-8.14.1-150600.4.37.1 * openSUSE Leap 15.6 (x86_64) * libcurl4-32bit-8.14.1-150600.4.37.1 * libcurl-devel-32bit-8.14.1-150600.4.37.1 * libcurl4-32bit-debuginfo-8.14.1-150600.4.37.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libcurl-devel-64bit-8.14.1-150600.4.37.1 * libcurl4-64bit-8.14.1-150600.4.37.1 * libcurl4-64bit-debuginfo-8.14.1-150600.4.37.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14017.html * https://bugzilla.suse.com/show_bug.cgi?id=1256105 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 08:30:06 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 08:30:06 -0000 Subject: SUSE-RU-2026:0076-1: important: Recommended update for hdparm Message-ID: <176794740648.22147.8614331452300359993@smelt2.prg2.suse.org> # Recommended update for hdparm Announcement ID: SUSE-RU-2026:0076-1 Release Date: 2026-01-08T16:02:00Z Rating: important References: * bsc#1252151 Affected Products: * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that has one fix can now be installed. ## Description: This update for hdparm fixes the following issues: * Fix the %licence tag for hdparm (bsc#1252151) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-76=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-76=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * hdparm-debuginfo-9.52-150000.3.5.1 * hdparm-9.52-150000.3.5.1 * hdparm-debugsource-9.52-150000.3.5.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * hdparm-debuginfo-9.52-150000.3.5.1 * hdparm-9.52-150000.3.5.1 * hdparm-debugsource-9.52-150000.3.5.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1252151 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 08:30:08 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 08:30:08 -0000 Subject: SUSE-RU-2026:0075-1: moderate: Recommended update for kubernetes-old Message-ID: <176794740841.22147.12507485512832027844@smelt2.prg2.suse.org> # Recommended update for kubernetes-old Announcement ID: SUSE-RU-2026:0075-1 Release Date: 2026-01-08T16:01:31Z Rating: moderate References: * bsc#1251168 Affected Products: * Containers Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for kubernetes-old fixes the following issues: * bump `diffutils` as `Requires` in the Kubernetes*-client package (bsc#1251168) * Adding as `Recommends` did not work - recommends do not actually get respected in container builds, as container builds are configured to install with packages marked as required. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-75=1 openSUSE-SLE-15.6-2026-75=1 * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2026-75=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * kubernetes1.33-client-common-1.33.7-150600.13.21.1 * kubernetes1.33-client-1.33.7-150600.13.21.1 * openSUSE Leap 15.6 (noarch) * kubernetes1.33-client-bash-completion-1.33.7-150600.13.21.1 * kubernetes1.33-client-fish-completion-1.33.7-150600.13.21.1 * Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64) * kubernetes1.33-client-common-1.33.7-150600.13.21.1 * kubernetes1.33-client-1.33.7-150600.13.21.1 * Containers Module 15-SP7 (noarch) * kubernetes1.33-client-bash-completion-1.33.7-150600.13.21.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1251168 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 08:30:10 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 08:30:10 -0000 Subject: SUSE-RU-2026:0074-1: moderate: Recommended update for kubernetes Message-ID: <176794741050.22147.16200282794721296483@smelt2.prg2.suse.org> # Recommended update for kubernetes Announcement ID: SUSE-RU-2026:0074-1 Release Date: 2026-01-08T16:01:15Z Rating: moderate References: * bsc#1251168 Affected Products: * Containers Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for kubernetes fixes the following issues: * bump `diffutils` as `Requires` in the Kubernetes*-client package (bsc#1251168) * Adding as `Recommends` didn't work - recommends do not actually get respected in container builds, as container builds are configured to install with packages marked as required. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-74=1 openSUSE-SLE-15.6-2026-74=1 * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2026-74=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * kubernetes1.35-client-1.35.0-150600.13.21.1 * kubernetes1.35-client-common-1.35.0-150600.13.21.1 * openSUSE Leap 15.6 (noarch) * kubernetes1.35-client-fish-completion-1.35.0-150600.13.21.1 * kubernetes1.35-client-bash-completion-1.35.0-150600.13.21.1 * Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64) * kubernetes1.35-client-1.35.0-150600.13.21.1 * kubernetes1.35-client-common-1.35.0-150600.13.21.1 * Containers Module 15-SP7 (noarch) * kubernetes1.35-client-bash-completion-1.35.0-150600.13.21.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1251168 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 12:30:03 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 12:30:03 -0000 Subject: SUSE-SU-2026:0078-1: moderate: Security update for curl Message-ID: <176796180333.22173.12765775064726025057@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2026:0078-1 Release Date: 2026-01-09T07:07:10Z Rating: moderate References: * bsc#1256105 Cross-References: * CVE-2025-14017 CVSS scores: * CVE-2025-14017 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-14017 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves one vulnerability can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2025-14017: Fixed broken TLS options for threaded LDAPS (bsc#1256105). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-78=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-78=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * curl-8.14.1-150200.4.100.1 * libcurl4-debuginfo-8.14.1-150200.4.100.1 * libcurl4-8.14.1-150200.4.100.1 * curl-debugsource-8.14.1-150200.4.100.1 * curl-debuginfo-8.14.1-150200.4.100.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * curl-8.14.1-150200.4.100.1 * libcurl4-debuginfo-8.14.1-150200.4.100.1 * libcurl4-8.14.1-150200.4.100.1 * curl-debugsource-8.14.1-150200.4.100.1 * curl-debuginfo-8.14.1-150200.4.100.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14017.html * https://bugzilla.suse.com/show_bug.cgi?id=1256105 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 16:30:06 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 16:30:06 -0000 Subject: SUSE-SU-2026:20014-1: important: Security update for sssd Message-ID: <176797620695.22173.3394706438308247157@smelt2.prg2.suse.org> # Security update for sssd Announcement ID: SUSE-SU-2026:20014-1 Release Date: 2026-01-02T16:58:31Z Rating: important References: * bsc#1244325 * bsc#1251827 Cross-References: * CVE-2025-11561 CVSS scores: * CVE-2025-11561 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-11561 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-11561 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.2 An update that solves one vulnerability and has one fix can now be installed. ## Description: This update for sssd fixes the following issues: * CVE-2025-11561: Fixed default Kerberos configuration allowing privilege escalation on AD-joined Linux systems (bsc#1244325) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-119=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * sssd-ad-2.9.5-160000.3.1 * libsss_certmap0-2.9.5-160000.3.1 * sssd-krb5-common-2.9.5-160000.3.1 * sssd-ldap-2.9.5-160000.3.1 * sssd-tools-debuginfo-2.9.5-160000.3.1 * python3-sssd-config-2.9.5-160000.3.1 * libsss_certmap0-debuginfo-2.9.5-160000.3.1 * sssd-krb5-2.9.5-160000.3.1 * sssd-krb5-common-debuginfo-2.9.5-160000.3.1 * sssd-debugsource-2.9.5-160000.3.1 * sssd-ad-debuginfo-2.9.5-160000.3.1 * libsss_idmap0-2.9.5-160000.3.1 * sssd-ldap-debuginfo-2.9.5-160000.3.1 * sssd-debuginfo-2.9.5-160000.3.1 * libsss_idmap0-debuginfo-2.9.5-160000.3.1 * sssd-2.9.5-160000.3.1 * sssd-dbus-2.9.5-160000.3.1 * sssd-krb5-debuginfo-2.9.5-160000.3.1 * sssd-dbus-debuginfo-2.9.5-160000.3.1 * sssd-tools-2.9.5-160000.3.1 * python3-sssd-config-debuginfo-2.9.5-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11561.html * https://bugzilla.suse.com/show_bug.cgi?id=1244325 * https://bugzilla.suse.com/show_bug.cgi?id=1251827 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 16:30:09 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 16:30:09 -0000 Subject: SUSE-RU-2026:20013-1: important: Recommended update for the initial kernel livepatch Message-ID: <176797620922.22173.8888695561099192070@smelt2.prg2.suse.org> # Recommended update for the initial kernel livepatch Announcement ID: SUSE-RU-2026:20013-1 Release Date: 2025-12-19T15:33:16Z Rating: important References: Affected Products: * SUSE Linux Micro 6.2 An update that can now be installed. ## Description: This update contains initial livepatches for the SUSE Linux Enterprise Server 16.0 and SUSE Linux Micro 6.2 kernel update. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-114=1 ## Package List: * SUSE Linux Micro 6.2 (ppc64le s390x x86_64) * kernel-livepatch-SLE16_Update_3-debugsource-1-160000.1.1 * kernel-livepatch-6_12_0-160000_8-default-1-160000.1.1 * kernel-livepatch-6_12_0-160000_8-default-debuginfo-1-160000.1.1 * SUSE Linux Micro 6.2 (x86_64) * kernel-livepatch-SLE16-RT_Update_3-debugsource-1-160000.1.1 * kernel-livepatch-6_12_0-160000_8-rt-1-160000.1.1 * kernel-livepatch-6_12_0-160000_8-rt-debuginfo-1-160000.1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 16:31:47 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 16:31:47 -0000 Subject: SUSE-SU-2026:20012-1: important: Security update for the Linux Kernel Message-ID: <176797630787.22173.5198280099682123651@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:20012-1 Release Date: 2025-12-19T15:33:12Z Rating: important References: * bsc#1235463 * bsc#1243474 * bsc#1245193 * bsc#1245431 * bsc#1245498 * bsc#1245499 * bsc#1246328 * bsc#1246843 * bsc#1247500 * bsc#1248792 * bsc#1249256 * bsc#1249397 * bsc#1249912 * bsc#1249977 * bsc#1249982 * bsc#1250034 * bsc#1250176 * bsc#1250237 * bsc#1250252 * bsc#1250705 * bsc#1250723 * bsc#1250746 * bsc#1251120 * bsc#1251817 * bsc#1252054 * bsc#1252063 * bsc#1252301 * bsc#1252303 * bsc#1252342 * bsc#1252352 * bsc#1252357 * bsc#1252681 * bsc#1252686 * bsc#1252763 * bsc#1252776 * bsc#1252779 * bsc#1252790 * bsc#1252794 * bsc#1252795 * bsc#1252808 * bsc#1252809 * bsc#1252817 * bsc#1252821 * bsc#1252824 * bsc#1252836 * bsc#1252845 * bsc#1252901 * bsc#1252912 * bsc#1252917 * bsc#1252919 * bsc#1252923 * bsc#1252928 * bsc#1253018 * bsc#1253155 * bsc#1253176 * bsc#1253238 * bsc#1253275 * bsc#1253318 * bsc#1253324 * bsc#1253328 * bsc#1253330 * bsc#1253342 * bsc#1253348 * bsc#1253349 * bsc#1253352 * bsc#1253355 * bsc#1253360 * bsc#1253362 * bsc#1253363 * bsc#1253367 * bsc#1253369 * bsc#1253386 * bsc#1253394 * bsc#1253395 * bsc#1253402 * bsc#1253403 * bsc#1253405 * bsc#1253407 * bsc#1253408 * bsc#1253409 * bsc#1253410 * bsc#1253412 * bsc#1253416 * bsc#1253421 * bsc#1253422 * bsc#1253423 * bsc#1253424 * bsc#1253425 * bsc#1253426 * bsc#1253427 * bsc#1253428 * bsc#1253431 * bsc#1253433 * bsc#1253436 * bsc#1253438 * bsc#1253440 * bsc#1253441 * bsc#1253443 * bsc#1253445 * bsc#1253448 * bsc#1253449 * bsc#1253450 * bsc#1253451 * bsc#1253453 * bsc#1253455 * bsc#1253456 * bsc#1253457 * bsc#1253463 * bsc#1253472 * bsc#1253622 * bsc#1253624 * bsc#1253635 * bsc#1253643 * bsc#1253647 * bsc#1254119 * bsc#1254181 * bsc#1254221 * bsc#1254308 * bsc#1254315 * jsc#PED-13611 * jsc#PED-13949 * jsc#PED-14062 * jsc#PED-14115 * jsc#PED-14353 Cross-References: * CVE-2022-50253 * CVE-2025-37916 * CVE-2025-38084 * CVE-2025-38085 * CVE-2025-38321 * CVE-2025-38728 * CVE-2025-39805 * CVE-2025-39819 * CVE-2025-39822 * CVE-2025-39831 * CVE-2025-39859 * CVE-2025-39897 * CVE-2025-39917 * CVE-2025-39944 * CVE-2025-39961 * CVE-2025-39980 * CVE-2025-39990 * CVE-2025-40001 * CVE-2025-40003 * CVE-2025-40006 * CVE-2025-40021 * CVE-2025-40024 * CVE-2025-40027 * CVE-2025-40031 * CVE-2025-40033 * CVE-2025-40038 * CVE-2025-40047 * CVE-2025-40053 * CVE-2025-40055 * CVE-2025-40059 * CVE-2025-40064 * CVE-2025-40070 * CVE-2025-40074 * CVE-2025-40075 * CVE-2025-40081 * CVE-2025-40083 * CVE-2025-40086 * CVE-2025-40098 * CVE-2025-40101 * CVE-2025-40102 * CVE-2025-40105 * CVE-2025-40107 * CVE-2025-40109 * CVE-2025-40110 * CVE-2025-40111 * CVE-2025-40115 * CVE-2025-40116 * CVE-2025-40118 * CVE-2025-40120 * CVE-2025-40121 * CVE-2025-40127 * CVE-2025-40129 * CVE-2025-40132 * CVE-2025-40133 * CVE-2025-40134 * CVE-2025-40135 * CVE-2025-40139 * CVE-2025-40140 * CVE-2025-40141 * CVE-2025-40142 * CVE-2025-40149 * CVE-2025-40153 * CVE-2025-40154 * CVE-2025-40156 * CVE-2025-40157 * CVE-2025-40158 * CVE-2025-40159 * CVE-2025-40161 * CVE-2025-40162 * CVE-2025-40164 * CVE-2025-40165 * CVE-2025-40166 * CVE-2025-40168 * CVE-2025-40169 * CVE-2025-40171 * CVE-2025-40172 * CVE-2025-40173 * CVE-2025-40175 * CVE-2025-40176 * CVE-2025-40177 * CVE-2025-40178 * CVE-2025-40180 * CVE-2025-40183 * CVE-2025-40185 * CVE-2025-40186 * CVE-2025-40187 * CVE-2025-40188 * CVE-2025-40192 * CVE-2025-40194 * CVE-2025-40196 * CVE-2025-40197 * CVE-2025-40198 * CVE-2025-40200 * CVE-2025-40201 * CVE-2025-40202 * CVE-2025-40203 * CVE-2025-40204 * CVE-2025-40205 * CVE-2025-40206 * CVE-2025-40207 CVSS scores: * CVE-2022-50253 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50253 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37916 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-37916 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37916 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38084 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38084 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38085 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38085 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38085 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38321 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38321 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38321 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38728 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38728 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39819 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39831 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39897 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39897 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39917 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-39917 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2025-39917 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39961 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39961 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39980 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39980 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39990 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40001 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40001 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40003 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40003 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40006 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40021 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-40021 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2025-40024 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40027 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40027 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40031 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40033 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40038 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40047 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40047 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40053 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40055 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40059 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40083 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40086 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40086 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40098 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40101 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40101 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40102 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40102 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-40105 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40105 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40107 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40109 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40110 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40110 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40111 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40115 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40115 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40118 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40118 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40120 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40121 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40121 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40127 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40129 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40129 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40132 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40133 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40133 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-40134 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40134 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40135 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40135 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40139 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40139 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40140 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40140 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40141 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40141 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40142 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40142 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40149 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40149 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40153 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40153 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40154 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40154 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40157 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40157 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40158 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40158 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40159 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40159 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40161 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40161 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40162 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40164 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40165 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40165 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40166 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40168 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40168 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40169 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40169 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40171 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40171 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40172 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40173 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40173 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40175 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40175 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40176 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40176 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40177 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40177 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40178 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40180 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40180 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40183 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40183 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40186 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40186 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40187 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40192 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40194 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40194 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40196 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40196 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40197 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40198 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40200 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40202 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40203 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-40205 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40206 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40206 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40207 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.2 * SUSE Linux Micro Extras 6.2 An update that solves 100 vulnerabilities, contains five features and has 19 fixes can now be installed. ## Description: The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues The following security issues were fixed: * CVE-2022-50253: bpf: make sure skb->len != 0 when redirecting to a tunneling device (bsc#1249912). * CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474). * CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431 bsc#1245498). * CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499). * CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328). * CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256). * CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982). * CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176). * CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034). * CVE-2025-39831: fbnic: Move phylink resume out of service_task and into open/close (bsc#1249977). * CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252). * CVE-2025-39897: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval (bsc#1250746). * CVE-2025-39917: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt (bsc#1250723). * CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120). * CVE-2025-39961: iommu/amd/pgtbl: Fix possible race while increase page table level (bsc#1251817). * CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063). * CVE-2025-39990: bpf: Check the helper function is valid in get_helper_proto (bsc#1252054). * CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303). * CVE-2025-40003: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work (bsc#1252301). * CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342). * CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681). * CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686). * CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763). * CVE-2025-40031: tee: fix register_shm_helper() (bsc#1252779). * CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824). * CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid (bsc#1252817). * CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790). * CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808). * CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821). * CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809). * CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845). * CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836). * CVE-2025-40074: tcp: convert to dev_net_rcu() (bsc#1252794). * CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795). * CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776). * CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912). * CVE-2025-40086: drm/xe: Don't allow evicting of BOs in same VM in array of VM binds (bsc#1252923). * CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917). * CVE-2025-40101: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST (bsc#1252901). * CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919). * CVE-2025-40105: vfs: Don't leak disconnected dentries on umount (bsc#1252928). * CVE-2025-40133: mptcp: Call dst_release() in mptcp_active_enable() (bsc#1253328). * CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386). * CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342). * CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409). * CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355). * CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408). * CVE-2025-40157: EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller (bsc#1253423). * CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402). * CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403). * CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427). * CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416). * CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421). * CVE-2025-40175: idpf: cleanup remaining SKBs in PTP flows (bsc#1253426). * CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425). * CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463). * CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394). * CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in sys_prlimit64() paths (bsc#1253455). * CVE-2025-40203: listmount: don't call path_put() under namespace semaphore (bsc#1253457). The following non security issues were fixed: * ACPI: scan: Update honor list for RPMI System MSI (stable-fixes). * ACPICA: Update dsmethod.c to get rid of unused variable warning (stable- fixes). * Disable CONFIG_CPU5_WDT The cpu5wdt driver doesn't implement a proper watchdog interface and has many code issues. It only handles obscure and obsolete hardware. Stop building and supporting this driver (jsc#PED-14062). * Fix "drm/xe: Don't allow evicting of BOs in same VM in array of VM binds" (bsc#1252923) * KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git- fixes). * KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes). * KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git- fixes). * KVM: s390: improve interrupt cpu for wakeup (bsc#1235463). * KVM: s390: kABI backport for 'last_sleep_cpu' (bsc#1252352). * KVM: x86/mmu: Return -EAGAIN if userspace deletes/moves memslot during prefault (git-fixes). * PCI/ERR: Update device error_state already after reset (stable-fixes). * PM: EM: Slightly reduce em_check_capacity_update() overhead (stable-fixes). * Revert "net/mlx5e: Update and set Xon/Xoff upon MTU set" (git-fixes). * Revert "net/mlx5e: Update and set Xon/Xoff upon port speed set" (git-fixes). * Update config files: enable zstd module decompression (jsc#PED-14115). * bpf/selftests: Fix test_tcpnotify_user (bsc#1253635). * btrfs: do not clear read-only when adding sprout device (bsc#1253238). * btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes). * dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386) * drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes). * drm/amd/display: update color on atomic commit time (stable-fixes). * drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes). * drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable- fixes). * hwmon: (lenovo-ec-sensors) Update P8 supprt (stable-fixes). * media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes). * mount: handle NULL values in mnt_ns_release() (bsc#1254308) * net/smc: Remove validation of reserved bits in CLC Decline (bsc#1252357). * net: phy: move realtek PHY driver to its own subdirectory (jsc#PED-14353). * net: phy: realtek: add defines for shadowed c45 standard registers (jsc#PED-14353). * net: phy: realtek: add helper RTL822X_VND2_C22_REG (jsc#PED-14353). * net: phy: realtek: change order of calls in C22 read_status() (jsc#PED-14353). * net: phy: realtek: clear 1000Base-T link partner advertisement (jsc#PED-14353). * net: phy: realtek: improve mmd register access for internal PHY's (jsc#PED-14353). * net: phy: realtek: read duplex and gbit master from PHYSR register (jsc#PED-14353). * net: phy: realtek: switch from paged to MMD ops in rtl822x functions (jsc#PED-14353). * net: phy: realtek: use string choices helpers (jsc#PED-14353). * net: xilinx: axienet: Fix IRQ coalescing packet count overflow (bsc#1250746) * net: xilinx: axienet: Fix RX skb ring management in DMAengine mode (bsc#1250746) * net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in dmaengine xmit (bsc#1250746) * nvmet-auth: update sc_c in host response (git-fixes bsc#1249397). * nvmet-auth: update sc_c in target host hash calculation (git-fixes). * perf list: Add IBM z17 event descriptions (jsc#PED-13611). * platform/x86:intel/pmc: Update Arrow Lake telemetry GUID (git-fixes). * powercap: intel_rapl: Add support for Panther Lake platform (jsc#PED-13949). * pwm: pca9685: Use bulk write to atomicially update registers (stable-fixes). * r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353). * r8169: add support for Intel Killer E5000 (jsc#PED-14353). * r8169: add support for RTL8125BP rev.b (jsc#PED-14353). * r8169: add support for RTL8125D rev.b (jsc#PED-14353). * r8169: adjust version numbering for RTL8126 (jsc#PED-14353). * r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353). * r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353). * r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353). * r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers (jsc#PED-14353). * r8169: avoid duplicated messages if loading firmware fails and switch to warn level (jsc#PED-14353). * r8169: don't take RTNL lock in rtl_task() (jsc#PED-14353). * r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353). * r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353). * r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats (jsc#PED-14353). * r8169: implement additional ethtool stats ops (jsc#PED-14353). * r8169: improve __rtl8169_set_wol (jsc#PED-14353). * r8169: improve initialization of RSS registers on RTL8125/RTL8126 (jsc#PED-14353). * r8169: improve rtl_set_d3_pll_down (jsc#PED-14353). * r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353). * r8169: remove leftover locks after reverted change (jsc#PED-14353). * r8169: remove original workaround for RTL8125 broken rx issue (jsc#PED-14353). * r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353). * r8169: remove support for chip version 11 (jsc#PED-14353). * r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353). * r8169: replace custom flag with disable_work() et al (jsc#PED-14353). * r8169: switch away from deprecated pcim_iomap_table (jsc#PED-14353). * r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config (jsc#PED-14353). * ring-buffer: Update pages_touched to reflect persistent buffer content (git- fixes). * s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253643). * sched/fair: Get rid of sched_domains_curr_level hack for tl->cpumask() (bsc#1246843). * sched/fair: Have SD_SERIALIZE affect newidle balancing (bsc#1248792). * sched/fair: Proportional newidle balance (bsc#1248792). * sched/fair: Proportional newidle balance -KABI (bsc#1248792). * sched/fair: Revert max_newidle_lb_cost bump (bsc#1248792). * sched/fair: Skip sched_balance_running cmpxchg when balance is not due (bsc#1248792). * sched/fair: Small cleanup to sched_balance_newidle() (bsc#1248792). * sched/fair: Small cleanup to update_newidle_cost() (bsc#1248792). * scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119). * scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119). * scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119). * scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119). * scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119). * scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119). * scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119). * scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119). * scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119). * scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119). * selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221). * smpboot: introduce SDTL_INIT() helper to tidy sched topology setup (bsc#1246843). * soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes). * spi: tegra210-quad: Check hardware status on timeout (bsc#1253155) * spi: tegra210-quad: Fix timeout handling (bsc#1253155) * spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155) * spi: tegra210-quad: Update dummy sequence configuration (git-fixes) * tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork (bsc#1250705). * wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181). * wifi: mt76: do not add wcid entries to sta poll list during MCU reset (bsc#1254315). * wifi: mt76: introduce mt792x_config_mac_addr_list routine (bsc#1254315). * wifi: mt76: mt7925: Fix logical vs bitwise typo (bsc#1254315). * wifi: mt76: mt7925: Remove unnecessary if-check (bsc#1254315). * wifi: mt76: mt7925: Simplify HIF suspend handling to avoid suspend fail (bsc#1254315). * wifi: mt76: mt7925: add EHT control support based on the CLC data (bsc#1254315). * wifi: mt76: mt7925: add handler to hif suspend/resume event (bsc#1254315). * wifi: mt76: mt7925: add pci restore for hibernate (bsc#1254315). * wifi: mt76: mt7925: config the dwell time by firmware (bsc#1254315). * wifi: mt76: mt7925: extend MCU support for testmode (bsc#1254315). * wifi: mt76: mt7925: fix CLC command timeout when suspend/resume (bsc#1254315). * wifi: mt76: mt7925: fix missing hdr_trans_tlv command for broadcast wtbl (bsc#1254315). * wifi: mt76: mt7925: fix the unfinished command of regd_notifier before suspend (bsc#1254315). * wifi: mt76: mt7925: refine the txpower initialization flow (bsc#1254315). * wifi: mt76: mt7925: replace zero-length array with flexible-array member (bsc#1254315). * wifi: mt76: mt7925: update the channel usage when the regd domain changed (bsc#1254315). * wifi: mt76: mt7925e: fix too long of wifi resume time (bsc#1254315). * x86/smpboot: avoid SMT domain attach/destroy if SMT is not enabled (bsc#1246843). * x86/smpboot: moves x86_topology to static initialize and truncate (bsc#1246843). * x86/smpboot: remove redundant CONFIG_SCHED_SMT (bsc#1246843). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-113=1 * SUSE Linux Micro Extras 6.2 zypper in -t patch SUSE-SL-Micro-6.2-113=1 ## Package List: * SUSE Linux Micro 6.2 (noarch) * kernel-devel-6.12.0-160000.8.1 * kernel-source-6.12.0-160000.8.1 * kernel-macros-6.12.0-160000.8.1 * SUSE Linux Micro 6.2 (aarch64 ppc64le x86_64) * kernel-default-base-6.12.0-160000.8.1.160000.2.5 * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.12.0-160000.8.1 * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-6.12.0-160000.8.1 * kernel-default-devel-6.12.0-160000.8.1 * kernel-default-debuginfo-6.12.0-160000.8.1 * kernel-default-extra-6.12.0-160000.8.1 * kernel-default-extra-debuginfo-6.12.0-160000.8.1 * SUSE Linux Micro 6.2 (x86_64) * kernel-rt-livepatch-6.12.0-160000.8.1 * kernel-rt-devel-debuginfo-6.12.0-160000.8.1 * kernel-default-devel-debuginfo-6.12.0-160000.8.1 * SUSE Linux Micro 6.2 (ppc64le s390x x86_64) * kernel-default-livepatch-6.12.0-160000.8.1 * SUSE Linux Micro 6.2 (aarch64 nosrc x86_64) * kernel-rt-6.12.0-160000.8.1 * SUSE Linux Micro 6.2 (aarch64 x86_64) * kernel-rt-debugsource-6.12.0-160000.8.1 * kernel-rt-debuginfo-6.12.0-160000.8.1 * kernel-rt-devel-6.12.0-160000.8.1 * SUSE Linux Micro 6.2 (aarch64 nosrc) * kernel-64kb-6.12.0-160000.8.1 * SUSE Linux Micro 6.2 (aarch64) * kernel-64kb-debugsource-6.12.0-160000.8.1 * kernel-64kb-debuginfo-6.12.0-160000.8.1 * kernel-64kb-devel-6.12.0-160000.8.1 * SUSE Linux Micro Extras 6.2 (aarch64 ppc64le s390x x86_64) * kernel-obs-build-6.12.0-160000.8.1 * kernel-obs-build-debugsource-6.12.0-160000.8.1 * kernel-syms-6.12.0-160000.8.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50253.html * https://www.suse.com/security/cve/CVE-2025-37916.html * https://www.suse.com/security/cve/CVE-2025-38084.html * https://www.suse.com/security/cve/CVE-2025-38085.html * https://www.suse.com/security/cve/CVE-2025-38321.html * https://www.suse.com/security/cve/CVE-2025-38728.html * https://www.suse.com/security/cve/CVE-2025-39805.html * https://www.suse.com/security/cve/CVE-2025-39819.html * https://www.suse.com/security/cve/CVE-2025-39822.html * https://www.suse.com/security/cve/CVE-2025-39831.html * https://www.suse.com/security/cve/CVE-2025-39859.html * https://www.suse.com/security/cve/CVE-2025-39897.html * https://www.suse.com/security/cve/CVE-2025-39917.html * https://www.suse.com/security/cve/CVE-2025-39944.html * https://www.suse.com/security/cve/CVE-2025-39961.html * https://www.suse.com/security/cve/CVE-2025-39980.html * https://www.suse.com/security/cve/CVE-2025-39990.html * https://www.suse.com/security/cve/CVE-2025-40001.html * https://www.suse.com/security/cve/CVE-2025-40003.html * https://www.suse.com/security/cve/CVE-2025-40006.html * https://www.suse.com/security/cve/CVE-2025-40021.html * https://www.suse.com/security/cve/CVE-2025-40024.html * https://www.suse.com/security/cve/CVE-2025-40027.html * https://www.suse.com/security/cve/CVE-2025-40031.html * https://www.suse.com/security/cve/CVE-2025-40033.html * https://www.suse.com/security/cve/CVE-2025-40038.html * https://www.suse.com/security/cve/CVE-2025-40047.html * https://www.suse.com/security/cve/CVE-2025-40053.html * https://www.suse.com/security/cve/CVE-2025-40055.html * https://www.suse.com/security/cve/CVE-2025-40059.html * https://www.suse.com/security/cve/CVE-2025-40064.html * https://www.suse.com/security/cve/CVE-2025-40070.html * https://www.suse.com/security/cve/CVE-2025-40074.html * https://www.suse.com/security/cve/CVE-2025-40075.html * https://www.suse.com/security/cve/CVE-2025-40081.html * https://www.suse.com/security/cve/CVE-2025-40083.html * https://www.suse.com/security/cve/CVE-2025-40086.html * https://www.suse.com/security/cve/CVE-2025-40098.html * https://www.suse.com/security/cve/CVE-2025-40101.html * https://www.suse.com/security/cve/CVE-2025-40102.html * https://www.suse.com/security/cve/CVE-2025-40105.html * https://www.suse.com/security/cve/CVE-2025-40107.html * https://www.suse.com/security/cve/CVE-2025-40109.html * https://www.suse.com/security/cve/CVE-2025-40110.html * https://www.suse.com/security/cve/CVE-2025-40111.html * https://www.suse.com/security/cve/CVE-2025-40115.html * https://www.suse.com/security/cve/CVE-2025-40116.html * https://www.suse.com/security/cve/CVE-2025-40118.html * https://www.suse.com/security/cve/CVE-2025-40120.html * https://www.suse.com/security/cve/CVE-2025-40121.html * https://www.suse.com/security/cve/CVE-2025-40127.html * https://www.suse.com/security/cve/CVE-2025-40129.html * https://www.suse.com/security/cve/CVE-2025-40132.html * https://www.suse.com/security/cve/CVE-2025-40133.html * https://www.suse.com/security/cve/CVE-2025-40134.html * https://www.suse.com/security/cve/CVE-2025-40135.html * https://www.suse.com/security/cve/CVE-2025-40139.html * https://www.suse.com/security/cve/CVE-2025-40140.html * https://www.suse.com/security/cve/CVE-2025-40141.html * https://www.suse.com/security/cve/CVE-2025-40142.html * https://www.suse.com/security/cve/CVE-2025-40149.html * https://www.suse.com/security/cve/CVE-2025-40153.html * https://www.suse.com/security/cve/CVE-2025-40154.html * https://www.suse.com/security/cve/CVE-2025-40156.html * https://www.suse.com/security/cve/CVE-2025-40157.html * https://www.suse.com/security/cve/CVE-2025-40158.html * https://www.suse.com/security/cve/CVE-2025-40159.html * https://www.suse.com/security/cve/CVE-2025-40161.html * https://www.suse.com/security/cve/CVE-2025-40162.html * https://www.suse.com/security/cve/CVE-2025-40164.html * https://www.suse.com/security/cve/CVE-2025-40165.html * https://www.suse.com/security/cve/CVE-2025-40166.html * https://www.suse.com/security/cve/CVE-2025-40168.html * https://www.suse.com/security/cve/CVE-2025-40169.html * https://www.suse.com/security/cve/CVE-2025-40171.html * https://www.suse.com/security/cve/CVE-2025-40172.html * https://www.suse.com/security/cve/CVE-2025-40173.html * https://www.suse.com/security/cve/CVE-2025-40175.html * https://www.suse.com/security/cve/CVE-2025-40176.html * https://www.suse.com/security/cve/CVE-2025-40177.html * https://www.suse.com/security/cve/CVE-2025-40178.html * https://www.suse.com/security/cve/CVE-2025-40180.html * https://www.suse.com/security/cve/CVE-2025-40183.html * https://www.suse.com/security/cve/CVE-2025-40185.html * https://www.suse.com/security/cve/CVE-2025-40186.html * https://www.suse.com/security/cve/CVE-2025-40187.html * https://www.suse.com/security/cve/CVE-2025-40188.html * https://www.suse.com/security/cve/CVE-2025-40192.html * https://www.suse.com/security/cve/CVE-2025-40194.html * https://www.suse.com/security/cve/CVE-2025-40196.html * https://www.suse.com/security/cve/CVE-2025-40197.html * https://www.suse.com/security/cve/CVE-2025-40198.html * https://www.suse.com/security/cve/CVE-2025-40200.html * https://www.suse.com/security/cve/CVE-2025-40201.html * https://www.suse.com/security/cve/CVE-2025-40202.html * https://www.suse.com/security/cve/CVE-2025-40203.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://www.suse.com/security/cve/CVE-2025-40205.html * https://www.suse.com/security/cve/CVE-2025-40206.html * https://www.suse.com/security/cve/CVE-2025-40207.html * https://bugzilla.suse.com/show_bug.cgi?id=1235463 * https://bugzilla.suse.com/show_bug.cgi?id=1243474 * https://bugzilla.suse.com/show_bug.cgi?id=1245193 * https://bugzilla.suse.com/show_bug.cgi?id=1245431 * https://bugzilla.suse.com/show_bug.cgi?id=1245498 * https://bugzilla.suse.com/show_bug.cgi?id=1245499 * https://bugzilla.suse.com/show_bug.cgi?id=1246328 * https://bugzilla.suse.com/show_bug.cgi?id=1246843 * https://bugzilla.suse.com/show_bug.cgi?id=1247500 * https://bugzilla.suse.com/show_bug.cgi?id=1248792 * https://bugzilla.suse.com/show_bug.cgi?id=1249256 * https://bugzilla.suse.com/show_bug.cgi?id=1249397 * https://bugzilla.suse.com/show_bug.cgi?id=1249912 * https://bugzilla.suse.com/show_bug.cgi?id=1249977 * https://bugzilla.suse.com/show_bug.cgi?id=1249982 * https://bugzilla.suse.com/show_bug.cgi?id=1250034 * https://bugzilla.suse.com/show_bug.cgi?id=1250176 * https://bugzilla.suse.com/show_bug.cgi?id=1250237 * https://bugzilla.suse.com/show_bug.cgi?id=1250252 * https://bugzilla.suse.com/show_bug.cgi?id=1250705 * https://bugzilla.suse.com/show_bug.cgi?id=1250723 * https://bugzilla.suse.com/show_bug.cgi?id=1250746 * https://bugzilla.suse.com/show_bug.cgi?id=1251120 * https://bugzilla.suse.com/show_bug.cgi?id=1251817 * https://bugzilla.suse.com/show_bug.cgi?id=1252054 * https://bugzilla.suse.com/show_bug.cgi?id=1252063 * https://bugzilla.suse.com/show_bug.cgi?id=1252301 * https://bugzilla.suse.com/show_bug.cgi?id=1252303 * https://bugzilla.suse.com/show_bug.cgi?id=1252342 * https://bugzilla.suse.com/show_bug.cgi?id=1252352 * https://bugzilla.suse.com/show_bug.cgi?id=1252357 * https://bugzilla.suse.com/show_bug.cgi?id=1252681 * https://bugzilla.suse.com/show_bug.cgi?id=1252686 * https://bugzilla.suse.com/show_bug.cgi?id=1252763 * https://bugzilla.suse.com/show_bug.cgi?id=1252776 * https://bugzilla.suse.com/show_bug.cgi?id=1252779 * https://bugzilla.suse.com/show_bug.cgi?id=1252790 * https://bugzilla.suse.com/show_bug.cgi?id=1252794 * https://bugzilla.suse.com/show_bug.cgi?id=1252795 * https://bugzilla.suse.com/show_bug.cgi?id=1252808 * https://bugzilla.suse.com/show_bug.cgi?id=1252809 * https://bugzilla.suse.com/show_bug.cgi?id=1252817 * https://bugzilla.suse.com/show_bug.cgi?id=1252821 * https://bugzilla.suse.com/show_bug.cgi?id=1252824 * https://bugzilla.suse.com/show_bug.cgi?id=1252836 * https://bugzilla.suse.com/show_bug.cgi?id=1252845 * https://bugzilla.suse.com/show_bug.cgi?id=1252901 * https://bugzilla.suse.com/show_bug.cgi?id=1252912 * https://bugzilla.suse.com/show_bug.cgi?id=1252917 * https://bugzilla.suse.com/show_bug.cgi?id=1252919 * https://bugzilla.suse.com/show_bug.cgi?id=1252923 * https://bugzilla.suse.com/show_bug.cgi?id=1252928 * https://bugzilla.suse.com/show_bug.cgi?id=1253018 * https://bugzilla.suse.com/show_bug.cgi?id=1253155 * https://bugzilla.suse.com/show_bug.cgi?id=1253176 * https://bugzilla.suse.com/show_bug.cgi?id=1253238 * https://bugzilla.suse.com/show_bug.cgi?id=1253275 * https://bugzilla.suse.com/show_bug.cgi?id=1253318 * https://bugzilla.suse.com/show_bug.cgi?id=1253324 * https://bugzilla.suse.com/show_bug.cgi?id=1253328 * https://bugzilla.suse.com/show_bug.cgi?id=1253330 * https://bugzilla.suse.com/show_bug.cgi?id=1253342 * https://bugzilla.suse.com/show_bug.cgi?id=1253348 * https://bugzilla.suse.com/show_bug.cgi?id=1253349 * https://bugzilla.suse.com/show_bug.cgi?id=1253352 * https://bugzilla.suse.com/show_bug.cgi?id=1253355 * https://bugzilla.suse.com/show_bug.cgi?id=1253360 * https://bugzilla.suse.com/show_bug.cgi?id=1253362 * https://bugzilla.suse.com/show_bug.cgi?id=1253363 * https://bugzilla.suse.com/show_bug.cgi?id=1253367 * https://bugzilla.suse.com/show_bug.cgi?id=1253369 * https://bugzilla.suse.com/show_bug.cgi?id=1253386 * https://bugzilla.suse.com/show_bug.cgi?id=1253394 * https://bugzilla.suse.com/show_bug.cgi?id=1253395 * https://bugzilla.suse.com/show_bug.cgi?id=1253402 * https://bugzilla.suse.com/show_bug.cgi?id=1253403 * https://bugzilla.suse.com/show_bug.cgi?id=1253405 * https://bugzilla.suse.com/show_bug.cgi?id=1253407 * https://bugzilla.suse.com/show_bug.cgi?id=1253408 * https://bugzilla.suse.com/show_bug.cgi?id=1253409 * https://bugzilla.suse.com/show_bug.cgi?id=1253410 * https://bugzilla.suse.com/show_bug.cgi?id=1253412 * https://bugzilla.suse.com/show_bug.cgi?id=1253416 * https://bugzilla.suse.com/show_bug.cgi?id=1253421 * https://bugzilla.suse.com/show_bug.cgi?id=1253422 * https://bugzilla.suse.com/show_bug.cgi?id=1253423 * https://bugzilla.suse.com/show_bug.cgi?id=1253424 * https://bugzilla.suse.com/show_bug.cgi?id=1253425 * https://bugzilla.suse.com/show_bug.cgi?id=1253426 * https://bugzilla.suse.com/show_bug.cgi?id=1253427 * https://bugzilla.suse.com/show_bug.cgi?id=1253428 * https://bugzilla.suse.com/show_bug.cgi?id=1253431 * https://bugzilla.suse.com/show_bug.cgi?id=1253433 * https://bugzilla.suse.com/show_bug.cgi?id=1253436 * https://bugzilla.suse.com/show_bug.cgi?id=1253438 * https://bugzilla.suse.com/show_bug.cgi?id=1253440 * https://bugzilla.suse.com/show_bug.cgi?id=1253441 * https://bugzilla.suse.com/show_bug.cgi?id=1253443 * https://bugzilla.suse.com/show_bug.cgi?id=1253445 * https://bugzilla.suse.com/show_bug.cgi?id=1253448 * https://bugzilla.suse.com/show_bug.cgi?id=1253449 * https://bugzilla.suse.com/show_bug.cgi?id=1253450 * https://bugzilla.suse.com/show_bug.cgi?id=1253451 * https://bugzilla.suse.com/show_bug.cgi?id=1253453 * https://bugzilla.suse.com/show_bug.cgi?id=1253455 * https://bugzilla.suse.com/show_bug.cgi?id=1253456 * https://bugzilla.suse.com/show_bug.cgi?id=1253457 * https://bugzilla.suse.com/show_bug.cgi?id=1253463 * https://bugzilla.suse.com/show_bug.cgi?id=1253472 * https://bugzilla.suse.com/show_bug.cgi?id=1253622 * https://bugzilla.suse.com/show_bug.cgi?id=1253624 * https://bugzilla.suse.com/show_bug.cgi?id=1253635 * https://bugzilla.suse.com/show_bug.cgi?id=1253643 * https://bugzilla.suse.com/show_bug.cgi?id=1253647 * https://bugzilla.suse.com/show_bug.cgi?id=1254119 * https://bugzilla.suse.com/show_bug.cgi?id=1254181 * https://bugzilla.suse.com/show_bug.cgi?id=1254221 * https://bugzilla.suse.com/show_bug.cgi?id=1254308 * https://bugzilla.suse.com/show_bug.cgi?id=1254315 * https://jira.suse.com/browse/PED-13611 * https://jira.suse.com/browse/PED-13949 * https://jira.suse.com/browse/PED-14062 * https://jira.suse.com/browse/PED-14115 * https://jira.suse.com/browse/PED-14353 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 16:31:51 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 16:31:51 -0000 Subject: SUSE-RU-2026:20011-1: moderate: Recommended update for selinux-policy Message-ID: <176797631109.22173.16654430329383270754@smelt2.prg2.suse.org> # Recommended update for selinux-policy Announcement ID: SUSE-RU-2026:20011-1 Release Date: 2025-12-30T16:04:26Z Rating: moderate References: * bsc#1254889 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for selinux-policy fixes the following issues: * Fix: SELinux is preventing systemd-tmpfile from using the mac_admin capability (bsc#1254889) * Add a new type for systemd-ssh-issue PID files * Label /usr/lib/systemd/systemd-ssh-issue with systemd_ssh_issue_exec_t ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-359=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * selinux-policy-devel-20241031+git15.e32e86fd5-slfo.1.1_1.1 * selinux-policy-20241031+git15.e32e86fd5-slfo.1.1_1.1 * selinux-policy-targeted-20241031+git15.e32e86fd5-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1254889 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 16:32:04 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 16:32:04 -0000 Subject: SUSE-RU-2026:20010-1: important: Recommended update for supportutils Message-ID: <176797632464.22173.6598712614393983027@smelt2.prg2.suse.org> # Recommended update for supportutils Announcement ID: SUSE-RU-2026:20010-1 Release Date: 2025-12-30T15:58:02Z Rating: important References: * bsc#1196933 * bsc#1206608 * bsc#1207543 * bsc#1208928 * bsc#1232351 * bsc#1241284 * bsc#1244003 * bsc#1244011 * bsc#1244937 * bsc#1245667 * bsc#1246011 * bsc#1246025 * bsc#1249657 * bsc#1250224 * bsc#1252318 * bsc#1254425 Affected Products: * SUSE Linux Micro 6.1 An update that has 16 fixes can now be installed. ## Description: This update for supportutils fixes the following issues: * Changes to version 3.2.12: * Optimized lsof usage and honors OPTION_OFILES (bsc#1232351) * Run in containers without errors (bsc#1245667) * Removed pmap PID from memory.txt (bsc#1246011) * Added missing /proc/pagetypeinfo to memory.txt (bsc#1246025) * Improved database perforce with kGraft patching (bsc#1249657) * Using last boot for journalctl for optimization (bsc#1250224) * Fixed extraction failures (bsc#1252318) * Update supportconfig.conf path in docs (bsc#1254425) * drm_sub_info: Catch error when dir doesn't exist * Replace remaining `egrep` with `grep -E` * Add process affinity to slert logs * Reintroduce cgroup statistics (and v2) * Minor changes to basic-health-check: improve information level * Collect important machine health counters * powerpc: collect hot-pluggable PCI and PHB slots * podman: collect podman disk usage * Exclude binary files in crondir * kexec/kdump: collect everything under /sys/kernel/kexec dir * Use short-iso for journalctl * Changes to version 3.2.11: * Collect rsyslog frule files (bsc#1244003) * Remove proxy passwords (bsc#1244011) * Missing NetworkManager information (bsc#1241284) * Include agama logs bsc#1244937) * Additional NFS conf files * New fadump sysfs files * Fixed change log dates ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-360=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * supportutils-3.2.12.2-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1196933 * https://bugzilla.suse.com/show_bug.cgi?id=1206608 * https://bugzilla.suse.com/show_bug.cgi?id=1207543 * https://bugzilla.suse.com/show_bug.cgi?id=1208928 * https://bugzilla.suse.com/show_bug.cgi?id=1232351 * https://bugzilla.suse.com/show_bug.cgi?id=1241284 * https://bugzilla.suse.com/show_bug.cgi?id=1244003 * https://bugzilla.suse.com/show_bug.cgi?id=1244011 * https://bugzilla.suse.com/show_bug.cgi?id=1244937 * https://bugzilla.suse.com/show_bug.cgi?id=1245667 * https://bugzilla.suse.com/show_bug.cgi?id=1246011 * https://bugzilla.suse.com/show_bug.cgi?id=1246025 * https://bugzilla.suse.com/show_bug.cgi?id=1249657 * https://bugzilla.suse.com/show_bug.cgi?id=1250224 * https://bugzilla.suse.com/show_bug.cgi?id=1252318 * https://bugzilla.suse.com/show_bug.cgi?id=1254425 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 16:32:07 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 16:32:07 -0000 Subject: SUSE-RU-2026:20009-1: moderate: Recommended update for cloud-netconfig Message-ID: <176797632703.22173.13970363633149641527@smelt2.prg2.suse.org> # Recommended update for cloud-netconfig Announcement ID: SUSE-RU-2026:20009-1 Release Date: 2025-12-30T15:58:02Z Rating: moderate References: * bsc#1253223 Affected Products: * SUSE Linux Micro 6.1 An update that has one fix can now be installed. ## Description: This update for cloud-netconfig fixes the following issues: Update to version 1.16: * Fix query of default CLOUD_NETCONFIG_MANAGE (bsc#1253223 * Fix variable names in the README ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-358=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * cloud-netconfig-gce-1.16-slfo.1.1_1.1 * cloud-netconfig-ec2-1.16-slfo.1.1_1.1 * cloud-netconfig-azure-1.16-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1253223 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 16:32:11 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 16:32:11 -0000 Subject: SUSE-SU-2026:20008-1: important: Security update for qemu Message-ID: <176797633189.22173.6580488534497281770@smelt2.prg2.suse.org> # Security update for qemu Announcement ID: SUSE-SU-2026:20008-1 Release Date: 2025-12-22T15:48:07Z Rating: important References: * bsc#1250984 * bsc#1252768 * bsc#1253002 * bsc#1254286 Cross-References: * CVE-2025-11234 * CVE-2025-12464 CVSS scores: * CVE-2025-11234 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-11234 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11234 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-12464 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-12464 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-12464 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities and has two fixes can now be installed. ## Description: This update for qemu fixes the following issues: Security issues fixed: * CVE-2025-12464: stack-based buffer overflow in the e1000 network device operations can be exploited by a malicious guest user to crash the QEMU process on the host (bsc#1253002). * CVE-2025-11234: use-after-free in WebSocket handshake operations can be exploited by a malicious client with network access to the VNC WebSocket port to cause a denial-of-service (bsc#1250984). Other updates and bugfixes: * [openSUSE][RPM]: really fix *-virtio-gpu-pci dependency on ARM (bsc#1254286). * block/curl: fix curl internal handles handling (bsc#1252768). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-357=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * qemu-tools-8.2.10-slfo.1.1_3.1 * qemu-hw-usb-redirect-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-block-ssh-8.2.10-slfo.1.1_3.1 * qemu-ksm-8.2.10-slfo.1.1_3.1 * qemu-block-ssh-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-chardev-spice-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-img-8.2.10-slfo.1.1_3.1 * qemu-hw-display-virtio-gpu-8.2.10-slfo.1.1_3.1 * qemu-hw-usb-host-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-block-rbd-8.2.10-slfo.1.1_3.1 * qemu-hw-display-qxl-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-block-iscsi-8.2.10-slfo.1.1_3.1 * qemu-block-nfs-8.2.10-slfo.1.1_3.1 * qemu-block-curl-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-ui-opengl-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-hw-display-virtio-gpu-pci-8.2.10-slfo.1.1_3.1 * qemu-ui-opengl-8.2.10-slfo.1.1_3.1 * qemu-audio-spice-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-guest-agent-8.2.10-slfo.1.1_3.1 * qemu-hw-display-virtio-vga-8.2.10-slfo.1.1_3.1 * qemu-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-chardev-spice-8.2.10-slfo.1.1_3.1 * qemu-block-nfs-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-guest-agent-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-hw-display-virtio-gpu-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-hw-display-virtio-vga-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-ui-spice-core-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-block-curl-8.2.10-slfo.1.1_3.1 * qemu-debugsource-8.2.10-slfo.1.1_3.1 * qemu-spice-8.2.10-slfo.1.1_3.1 * qemu-block-iscsi-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-audio-spice-8.2.10-slfo.1.1_3.1 * qemu-hw-display-qxl-8.2.10-slfo.1.1_3.1 * qemu-hw-usb-host-8.2.10-slfo.1.1_3.1 * qemu-pr-helper-8.2.10-slfo.1.1_3.1 * qemu-block-rbd-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-tools-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-hw-usb-redirect-8.2.10-slfo.1.1_3.1 * qemu-ui-spice-core-8.2.10-slfo.1.1_3.1 * qemu-headless-8.2.10-slfo.1.1_3.1 * qemu-pr-helper-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-8.2.10-slfo.1.1_3.1 * qemu-img-debuginfo-8.2.10-slfo.1.1_3.1 * SUSE Linux Micro 6.1 (aarch64) * qemu-arm-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-arm-8.2.10-slfo.1.1_3.1 * SUSE Linux Micro 6.1 (noarch) * qemu-vgabios-8.2.101.16.3_3_ga95067eb-slfo.1.1_3.1 * qemu-ipxe-8.2.10-slfo.1.1_3.1 * qemu-seabios-8.2.101.16.3_3_ga95067eb-slfo.1.1_3.1 * qemu-SLOF-8.2.10-slfo.1.1_3.1 * qemu-lang-8.2.10-slfo.1.1_3.1 * SUSE Linux Micro 6.1 (ppc64le) * qemu-ppc-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-ppc-8.2.10-slfo.1.1_3.1 * SUSE Linux Micro 6.1 (s390x) * qemu-s390x-8.2.10-slfo.1.1_3.1 * qemu-s390x-debuginfo-8.2.10-slfo.1.1_3.1 * SUSE Linux Micro 6.1 (x86_64) * qemu-accel-tcg-x86-8.2.10-slfo.1.1_3.1 * qemu-x86-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-accel-tcg-x86-debuginfo-8.2.10-slfo.1.1_3.1 * qemu-x86-8.2.10-slfo.1.1_3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11234.html * https://www.suse.com/security/cve/CVE-2025-12464.html * https://bugzilla.suse.com/show_bug.cgi?id=1250984 * https://bugzilla.suse.com/show_bug.cgi?id=1252768 * https://bugzilla.suse.com/show_bug.cgi?id=1253002 * https://bugzilla.suse.com/show_bug.cgi?id=1254286 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 16:32:15 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 16:32:15 -0000 Subject: SUSE-SU-2026:20007-1: important: Security update for python-tornado6 Message-ID: <176797633596.22173.2228865274752687772@smelt2.prg2.suse.org> # Security update for python-tornado6 Announcement ID: SUSE-SU-2026:20007-1 Release Date: 2025-12-22T13:30:40Z Rating: important References: * bsc#1254903 * bsc#1254904 * bsc#1254905 Cross-References: * CVE-2025-67724 * CVE-2025-67725 * CVE-2025-67726 CVSS scores: * CVE-2025-67724 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-67724 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-67724 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-67724 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-67725 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-67725 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67725 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67726 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-67726 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67726 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for python-tornado6 fixes the following issues: * CVE-2025-67724: unescaped `reason` argument used in HTTP headers and in HTML default error pages can be used by attackers to launch header injection or XSS attacks (bsc#1254903). * CVE-2025-67725: quadratic complexity of string concatenation operations used by the `HTTPHeaders.add` method can lead to DoS when processing a maliciously crafted HTTP request (bsc#1254905). * CVE-2025-67726: quadratic complexity algorithm used in the `_parseparam` function of `httputil.py` can lead to DoS when processing maliciously crafted parameters in a `Content-Disposition` header (bsc#1254904). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-356=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * python-tornado6-debugsource-6.4-slfo.1.1_3.1 * python311-tornado6-6.4-slfo.1.1_3.1 * python311-tornado6-debuginfo-6.4-slfo.1.1_3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-67724.html * https://www.suse.com/security/cve/CVE-2025-67725.html * https://www.suse.com/security/cve/CVE-2025-67726.html * https://bugzilla.suse.com/show_bug.cgi?id=1254903 * https://bugzilla.suse.com/show_bug.cgi?id=1254904 * https://bugzilla.suse.com/show_bug.cgi?id=1254905 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 16:32:21 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 16:32:21 -0000 Subject: SUSE-RU-2026:20006-1: important: Recommended update for systemd Message-ID: <176797634163.22173.13984860107194838913@smelt2.prg2.suse.org> # Recommended update for systemd Announcement ID: SUSE-RU-2026:20006-1 Release Date: 2025-12-19T14:37:03Z Rating: important References: * bsc#1224386 * bsc#1244449 * bsc#1245551 * bsc#1248356 * bsc#1248501 * bsc#1254563 * jsc#PED-12669 Affected Products: * SUSE Linux Micro 6.1 * SUSE Linux Micro Extras 6.1 An update that contains one feature and has six fixes can now be installed. ## Description: This update for systemd fixes the following issues: * timer: rebase last_trigger timestamp if needed * timer: rebase the next elapse timestamp only if timer didn't already run * timer: don't run service immediately after restart of a timer (bsc#1254563) * test: check the next elapse timer timestamp after deserialization * test: restarting elapsed timer shouldn't trigger the corresponding service * units: don't force the loading of the loop and dm_mod modules in systemd- repart.service (bsc#1248356) * units: add dep on systemd-logind.service by user at .service * detect-virt: add bare-metal support for GCE (bsc#1244449) * Sync systemd-update-helper with the version shipped in Base:System * systemd-update-helper: do not stop or disable services when they are migrated to other packages. This can occur during package renaming or splitting. * systemd-update-helper: Fix invalid use of "break" in case statement * systemd-update-helper: fix regression introduced when support for package renaming/splitting was added (bsc#1245551) * systemd-update-helper: * Since user at .service has `Type=notify-reload` and reloading implies reexecuting with `ReloadSignal=RTMIN+25`, reexecuting user managers synchronously can be achieved with `systemctl reload user@*.service" now. * systemd.spec: use %sysusers_generate_pre so that some systemd users are already available in %pre (bsc#1248501) * Split systemd-network into two new sub-packages: systemd-networkd and systemd-resolved (bsc#1224386 jsc#PED-12669) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-355=1 * SUSE Linux Micro Extras 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-355=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * udev-debuginfo-254.27-slfo.1.1_2.1 * systemd-experimental-debuginfo-254.27-slfo.1.1_2.1 * libsystemd0-254.27-slfo.1.1_2.1 * libudev1-254.27-slfo.1.1_2.1 * libudev1-debuginfo-254.27-slfo.1.1_2.1 * systemd-portable-254.27-slfo.1.1_2.1 * systemd-experimental-254.27-slfo.1.1_2.1 * systemd-container-254.27-slfo.1.1_2.1 * systemd-coredump-254.27-slfo.1.1_2.1 * systemd-debuginfo-254.27-slfo.1.1_2.1 * systemd-journal-remote-debuginfo-254.27-slfo.1.1_2.1 * systemd-portable-debuginfo-254.27-slfo.1.1_2.1 * systemd-debugsource-254.27-slfo.1.1_2.1 * udev-254.27-slfo.1.1_2.1 * systemd-254.27-slfo.1.1_2.1 * systemd-coredump-debuginfo-254.27-slfo.1.1_2.1 * libsystemd0-debuginfo-254.27-slfo.1.1_2.1 * systemd-container-debuginfo-254.27-slfo.1.1_2.1 * systemd-journal-remote-254.27-slfo.1.1_2.1 * SUSE Linux Micro 6.1 (ppc64le) * systemd-sysvcompat-debuginfo-254.27-slfo.1.1_2.1 * systemd-sysvcompat-254.27-slfo.1.1_2.1 * SUSE Linux Micro Extras 6.1 (aarch64 ppc64le s390x x86_64) * systemd-debugsource-254.27-slfo.1.1_2.1 * systemd-devel-254.27-slfo.1.1_2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224386 * https://bugzilla.suse.com/show_bug.cgi?id=1244449 * https://bugzilla.suse.com/show_bug.cgi?id=1245551 * https://bugzilla.suse.com/show_bug.cgi?id=1248356 * https://bugzilla.suse.com/show_bug.cgi?id=1248501 * https://bugzilla.suse.com/show_bug.cgi?id=1254563 * https://jira.suse.com/browse/PED-12669 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 16:32:23 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 16:32:23 -0000 Subject: SUSE-RU-2026:20005-1: moderate: Recommended update for selinux-policy Message-ID: <176797634373.22173.13774144842289906317@smelt2.prg2.suse.org> # Recommended update for selinux-policy Announcement ID: SUSE-RU-2026:20005-1 Release Date: 2025-12-30T16:25:14Z Rating: moderate References: * bsc#1255027 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for selinux-policy fixes the following issues: * Fix systemd generator.early and generator.late file contexts (bsc#1255027) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-539=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * selinux-policy-20230523+git32.d521aa73b-2.1 * selinux-policy-devel-20230523+git32.d521aa73b-2.1 * selinux-policy-targeted-20230523+git32.d521aa73b-2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1255027 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 16:32:28 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 16:32:28 -0000 Subject: SUSE-RU-2026:20004-1: important: Recommended update for shim Message-ID: <176797634863.22173.12036048084981520793@smelt2.prg2.suse.org> # Recommended update for shim Announcement ID: SUSE-RU-2026:20004-1 Release Date: 2025-12-30T16:21:01Z Rating: important References: * bsc#1205588 * bsc#1247432 * bsc#1254336 * bsc#1254679 Affected Products: * SUSE Linux Micro 6.0 An update that has four fixes can now be installed. ## Description: This update for shim fixes the following issues: This update for shim fixes the following issues: shim is updated to version 16.1: * shim_start_image(): fix guid/handle pairing when uninstalling protocols * Fix uncompressed ipv6 netboot * fix test segfaults caused by uninitialized memory * SbatLevel_Variable.txt: minor typo fix. * Realloc() needs to allocate one more byte for sprintf() * IPv6: Add more check to avoid multiple double colon and illegal char * Loader proto v2 * loader-protocol: add workaround for EDK2 2025.02 page fault on FreePages * Generate Authenticode for the entire PE file * README: mention new loader protocol and interaction with UKIs * shim: change automatically enable MOK_POLICY_REQUIRE_NX * Save var info * add SbatLevel entry 2025051000 for PSA-2025-00012-1 * Coverity fixes 20250804 * fix http boot * Fix double free and leak in the loader protocol shim is updated to version 16.0: * Validate that a supplied vendor cert is not in PEM format * sbat: Add grub.peimage,2 to latest (CVE-2024-2312) * sbat: Also bump latest for grub,4 (and to todays date) * undo change that limits certificate files to a single file * shim: don't set second_stage to the empty string * Fix SBAT.md for today's consensus about numbers * Update Code of Conduct contact address * make-certs: Handle missing OpenSSL installation * Update MokVars.txt * export DEFINES for sub makefile * Drop unused EFI_IMAGE_SECURITY_DATABASE_GUID definition * Null-terminate 'arguments' in fallback * Fix "Verifiying" typo in error message * Update Fedora CI targets * Force gcc to produce DWARF4 so that gdb can use it * Minor housekeeping 2024121700 * Discard load-options that start with WINDOWS * Fix the issue that the gBS->LoadImage pointer was empty. * shim: Allow data after the end of device path node in load options * Handle network file not found like disks * Update gnu-efi submodule for EFI_HTTP_ERROR * Increase EFI file alignment * avoid EFIv2 runtime services on Apple x86 machines * Improve shortcut performance when comparing two boolean expressions * Provide better error message when MokManager is not found * tpm: Boot with a warning if the event log is full * MokManager: remove redundant logical constraints * Test import_mok_state() when MokListRT would be bigger than available size * test-mok-mirror: minor bug fix * Fix file system browser hang when enrolling MOK from disk * Ignore a minor clang-tidy nit * Allow fallback to default loader when encountering errors on network boot * test.mk: don't use a temporary random.bin * pe: Enhance debug report for update_mem_attrs * Multiple certificate handling improvements * Generate SbatLevel Metadata from SbatLevel_Variable.txt * Apply EKU check with compile option * Add configuration option to boot an alternative 2nd stage * Loader protocol (with Device Path resolution support) * netboot cleanup for additional files * Document how revocations can be delivered * post-process-pe: add tests to validate NX compliance * regression: CopyMem() in ad8692e copies out of bounds * Save the debug and error logs in mok-variables * Add features for the Host Security ID program * Mirror some more efi variables to mok-variables * This adds DXE Services measurements to HSI and uses them for NX * Add shim's current NX_COMPAT status to HSIStatus * README.tpm: reflect that vendor_db is in fact logged as "vendor_db" * Reject HTTP message with duplicate Content-Length header fields * Disable log saving * fallback: don't add new boot order entries backwards * README.tpm: Update MokList entry to MokListRT * SBAT Level update for February 2025 GRUB CVEs ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-541=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * shim-16.1-1.1 * shim-debuginfo-16.1-1.1 * shim-debugsource-16.1-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1205588 * https://bugzilla.suse.com/show_bug.cgi?id=1247432 * https://bugzilla.suse.com/show_bug.cgi?id=1254336 * https://bugzilla.suse.com/show_bug.cgi?id=1254679 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 16:32:40 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 16:32:40 -0000 Subject: SUSE-RU-2026:20003-1: important: Recommended update for supportutils Message-ID: <176797636098.22173.16443319166015394927@smelt2.prg2.suse.org> # Recommended update for supportutils Announcement ID: SUSE-RU-2026:20003-1 Release Date: 2025-12-30T16:21:01Z Rating: important References: * bsc#1196933 * bsc#1206608 * bsc#1207543 * bsc#1208928 * bsc#1232351 * bsc#1241284 * bsc#1244003 * bsc#1244011 * bsc#1244937 * bsc#1245667 * bsc#1246011 * bsc#1246025 * bsc#1249657 * bsc#1250224 * bsc#1252318 * bsc#1254425 Affected Products: * SUSE Linux Micro 6.0 An update that has 16 fixes can now be installed. ## Description: This update for supportutils fixes the following issues: * Changes to version 3.2.12: * Optimized lsof usage and honors OPTION_OFILES (bsc#1232351) * Run in containers without errors (bsc#1245667) * Removed pmap PID from memory.txt (bsc#1246011) * Added missing /proc/pagetypeinfo to memory.txt (bsc#1246025) * Improved database perforce with kGraft patching (bsc#1249657) * Using last boot for journalctl for optimization (bsc#1250224) * Fixed extraction failures (bsc#1252318) * Update supportconfig.conf path in docs (bsc#1254425) * drm_sub_info: Catch error when dir doesn't exist * Replace remaining `egrep` with `grep -E` * Add process affinity to slert logs * Reintroduce cgroup statistics (and v2) * Minor changes to basic-health-check: improve information level * Collect important machine health counters * powerpc: collect hot-pluggable PCI and PHB slots * podman: collect podman disk usage * Exclude binary files in crondir * kexec/kdump: collect everything under /sys/kernel/kexec dir * Use short-iso for journalctl * Changes to version 3.2.11: * Collect rsyslog frule files (bsc#1244003) * Remove proxy passwords (bsc#1244011) * Missing NetworkManager information (bsc#1241284) * Include agama logs bsc#1244937) * Additional NFS conf files * New fadump sysfs files * Fixed change log dates ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-540=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * supportutils-3.2.12.2-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1196933 * https://bugzilla.suse.com/show_bug.cgi?id=1206608 * https://bugzilla.suse.com/show_bug.cgi?id=1207543 * https://bugzilla.suse.com/show_bug.cgi?id=1208928 * https://bugzilla.suse.com/show_bug.cgi?id=1232351 * https://bugzilla.suse.com/show_bug.cgi?id=1241284 * https://bugzilla.suse.com/show_bug.cgi?id=1244003 * https://bugzilla.suse.com/show_bug.cgi?id=1244011 * https://bugzilla.suse.com/show_bug.cgi?id=1244937 * https://bugzilla.suse.com/show_bug.cgi?id=1245667 * https://bugzilla.suse.com/show_bug.cgi?id=1246011 * https://bugzilla.suse.com/show_bug.cgi?id=1246025 * https://bugzilla.suse.com/show_bug.cgi?id=1249657 * https://bugzilla.suse.com/show_bug.cgi?id=1250224 * https://bugzilla.suse.com/show_bug.cgi?id=1252318 * https://bugzilla.suse.com/show_bug.cgi?id=1254425 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 16:32:42 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 16:32:42 -0000 Subject: SUSE-RU-2026:20002-1: moderate: Recommended update for cloud-netconfig Message-ID: <176797636296.22173.10301661016382002190@smelt2.prg2.suse.org> # Recommended update for cloud-netconfig Announcement ID: SUSE-RU-2026:20002-1 Release Date: 2025-12-30T16:21:01Z Rating: moderate References: * bsc#1253223 Affected Products: * SUSE Linux Micro 6.0 An update that has one fix can now be installed. ## Description: This update for cloud-netconfig fixes the following issues: Update to version 1.16: * Fix query of default CLOUD_NETCONFIG_MANAGE (bsc#1253223 * Fix variable names in the README ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-538=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * cloud-netconfig-ec2-1.16-1.1 * cloud-netconfig-gce-1.16-1.1 * cloud-netconfig-azure-1.16-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1253223 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 16:32:48 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 16:32:48 -0000 Subject: SUSE-RU-2026:20001-1: important: Recommended update for systemd Message-ID: <176797636887.22173.7193742428025898836@smelt2.prg2.suse.org> # Recommended update for systemd Announcement ID: SUSE-RU-2026:20001-1 Release Date: 2025-12-16T15:38:03Z Rating: important References: * bsc#1224386 * bsc#1244449 * bsc#1245551 * bsc#1248356 * bsc#1248501 * bsc#1254563 * jsc#PED-12669 Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that contains one feature and has six fixes can now be installed. ## Description: This update for systemd fixes the following issues: * timer: rebase last_trigger timestamp if needed * timer: rebase the next elapse timestamp only if timer didn't already run * timer: don't run service immediately after restart of a timer (bsc#1254563) * test: check the next elapse timer timestamp after deserialization * test: restarting elapsed timer shouldn't trigger the corresponding service * units: don't force the loading of the loop and dm_mod modules in systemd- repart.service (bsc#1248356) * units: add dep on systemd-logind.service by user at .service * detect-virt: add bare-metal support for GCE (bsc#1244449) * Sync systemd-update-helper with the version shipped in Base:System * systemd-update-helper: do not stop or disable services when they are migrated to other packages. This can occur during package renaming or splitting. * systemd-update-helper: Fix invalid use of "break" in case statement * systemd-update-helper: fix regression introduced when support for package renaming/splitting was added (bsc#1245551) * systemd-update-helper: * Since user at .service has `Type=notify-reload` and reloading implies reexecuting with `ReloadSignal=RTMIN+25`, reexecuting user managers synchronously can be achieved with `systemctl reload user@*.service" now. * systemd.spec: use %sysusers_generate_pre so that some systemd users are already available in %pre (bsc#1248501) * Split systemd-network into two new sub-packages: systemd-networkd and systemd-resolved (bsc#1224386 jsc#PED-12669) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-537=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-537=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * systemd-container-254.27-2.1 * systemd-coredump-254.27-2.1 * systemd-experimental-254.27-2.1 * systemd-journal-remote-254.27-2.1 * systemd-journal-remote-debuginfo-254.27-2.1 * systemd-254.27-2.1 * udev-254.27-2.1 * systemd-debugsource-254.27-2.1 * systemd-portable-254.27-2.1 * libudev1-debuginfo-254.27-2.1 * libsystemd0-debuginfo-254.27-2.1 * libsystemd0-254.27-2.1 * systemd-coredump-debuginfo-254.27-2.1 * systemd-experimental-debuginfo-254.27-2.1 * systemd-portable-debuginfo-254.27-2.1 * udev-debuginfo-254.27-2.1 * libudev1-254.27-2.1 * systemd-container-debuginfo-254.27-2.1 * systemd-debuginfo-254.27-2.1 * SUSE Linux Micro Extras 6.0 (aarch64 s390x x86_64) * systemd-debugsource-254.27-2.1 * systemd-devel-254.27-2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1224386 * https://bugzilla.suse.com/show_bug.cgi?id=1244449 * https://bugzilla.suse.com/show_bug.cgi?id=1245551 * https://bugzilla.suse.com/show_bug.cgi?id=1248356 * https://bugzilla.suse.com/show_bug.cgi?id=1248501 * https://bugzilla.suse.com/show_bug.cgi?id=1254563 * https://jira.suse.com/browse/PED-12669 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 16:32:51 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 16:32:51 -0000 Subject: SUSE-SU-2026:0083-1: important: Security update for gimp Message-ID: <176797637108.22173.10474829478861677098@smelt2.prg2.suse.org> # Security update for gimp Announcement ID: SUSE-SU-2026:0083-1 Release Date: 2026-01-09T09:13:06Z Rating: important References: * bsc#1255766 Cross-References: * CVE-2025-15059 CVSS scores: * CVE-2025-15059 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-15059 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for gimp fixes the following issues: * CVE-2025-15059: Fixed Heap-based Buffer Overflow Remote Code Execution Vulnerability in GIMP PSP File Parsing (bsc#1255766). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-83=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-83=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-83=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-83=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * gimp-devel-debuginfo-2.10.30-150400.3.35.1 * libgimp-2_0-0-debuginfo-2.10.30-150400.3.35.1 * gimp-plugin-aa-2.10.30-150400.3.35.1 * gimp-devel-2.10.30-150400.3.35.1 * gimp-2.10.30-150400.3.35.1 * gimp-plugin-aa-debuginfo-2.10.30-150400.3.35.1 * gimp-debuginfo-2.10.30-150400.3.35.1 * libgimp-2_0-0-2.10.30-150400.3.35.1 * gimp-debugsource-2.10.30-150400.3.35.1 * libgimpui-2_0-0-debuginfo-2.10.30-150400.3.35.1 * libgimpui-2_0-0-2.10.30-150400.3.35.1 * openSUSE Leap 15.4 (noarch) * gimp-lang-2.10.30-150400.3.35.1 * openSUSE Leap 15.4 (x86_64) * libgimp-2_0-0-32bit-2.10.30-150400.3.35.1 * libgimp-2_0-0-32bit-debuginfo-2.10.30-150400.3.35.1 * libgimpui-2_0-0-32bit-2.10.30-150400.3.35.1 * libgimpui-2_0-0-32bit-debuginfo-2.10.30-150400.3.35.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libgimpui-2_0-0-64bit-2.10.30-150400.3.35.1 * libgimpui-2_0-0-64bit-debuginfo-2.10.30-150400.3.35.1 * libgimp-2_0-0-64bit-2.10.30-150400.3.35.1 * libgimp-2_0-0-64bit-debuginfo-2.10.30-150400.3.35.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * gimp-devel-debuginfo-2.10.30-150400.3.35.1 * libgimp-2_0-0-debuginfo-2.10.30-150400.3.35.1 * gimp-plugin-aa-2.10.30-150400.3.35.1 * gimp-devel-2.10.30-150400.3.35.1 * gimp-2.10.30-150400.3.35.1 * gimp-plugin-aa-debuginfo-2.10.30-150400.3.35.1 * gimp-debuginfo-2.10.30-150400.3.35.1 * libgimp-2_0-0-2.10.30-150400.3.35.1 * gimp-debugsource-2.10.30-150400.3.35.1 * libgimpui-2_0-0-debuginfo-2.10.30-150400.3.35.1 * libgimpui-2_0-0-2.10.30-150400.3.35.1 * openSUSE Leap 15.6 (noarch) * gimp-lang-2.10.30-150400.3.35.1 * openSUSE Leap 15.6 (x86_64) * libgimp-2_0-0-32bit-2.10.30-150400.3.35.1 * libgimp-2_0-0-32bit-debuginfo-2.10.30-150400.3.35.1 * libgimpui-2_0-0-32bit-2.10.30-150400.3.35.1 * libgimpui-2_0-0-32bit-debuginfo-2.10.30-150400.3.35.1 * SUSE Package Hub 15 15-SP7 (aarch64) * gimp-devel-debuginfo-2.10.30-150400.3.35.1 * gimp-plugin-aa-2.10.30-150400.3.35.1 * gimp-devel-2.10.30-150400.3.35.1 * gimp-2.10.30-150400.3.35.1 * gimp-plugin-aa-debuginfo-2.10.30-150400.3.35.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x) * libgimp-2_0-0-debuginfo-2.10.30-150400.3.35.1 * gimp-debuginfo-2.10.30-150400.3.35.1 * libgimp-2_0-0-2.10.30-150400.3.35.1 * gimp-debugsource-2.10.30-150400.3.35.1 * libgimpui-2_0-0-debuginfo-2.10.30-150400.3.35.1 * libgimpui-2_0-0-2.10.30-150400.3.35.1 * SUSE Package Hub 15 15-SP7 (noarch) * gimp-lang-2.10.30-150400.3.35.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * gimp-devel-debuginfo-2.10.30-150400.3.35.1 * libgimp-2_0-0-debuginfo-2.10.30-150400.3.35.1 * gimp-devel-2.10.30-150400.3.35.1 * gimp-2.10.30-150400.3.35.1 * gimp-debuginfo-2.10.30-150400.3.35.1 * libgimp-2_0-0-2.10.30-150400.3.35.1 * gimp-debugsource-2.10.30-150400.3.35.1 * libgimpui-2_0-0-debuginfo-2.10.30-150400.3.35.1 * libgimpui-2_0-0-2.10.30-150400.3.35.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (noarch) * gimp-lang-2.10.30-150400.3.35.1 ## References: * https://www.suse.com/security/cve/CVE-2025-15059.html * https://bugzilla.suse.com/show_bug.cgi?id=1255766 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 16:32:54 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 16:32:54 -0000 Subject: SUSE-SU-2026:0082-1: moderate: Security update for python-filelock Message-ID: <176797637445.22173.3975994731638192387@smelt2.prg2.suse.org> # Security update for python-filelock Announcement ID: SUSE-SU-2026:0082-1 Release Date: 2026-01-09T09:12:48Z Rating: moderate References: * bsc#1255244 Cross-References: * CVE-2025-68146 CVSS scores: * CVE-2025-68146 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-68146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-68146 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H Affected Products: * Development Tools Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for python-filelock fixes the following issues: * CVE-2025-68146: TOCTOU race condition may allow local attackers to corrupt or truncate arbitrary user files (bsc#1255244). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-82=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-82=1 ## Package List: * Development Tools Module 15-SP7 (noarch) * python3-filelock-3.0.12-150100.3.6.1 * SUSE Package Hub 15 15-SP7 (noarch) * python3-filelock-3.0.12-150100.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-68146.html * https://bugzilla.suse.com/show_bug.cgi?id=1255244 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 16:32:56 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 16:32:56 -0000 Subject: SUSE-SU-2026:0081-1: low: Security update for poppler Message-ID: <176797637657.22173.12499632787116725481@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2026:0081-1 Release Date: 2026-01-09T08:02:03Z Rating: low References: * bsc#1252337 Cross-References: * CVE-2025-11896 CVSS scores: * CVE-2025-11896 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-11896 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-11896 ( NVD ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2025-11896: Fixed infinite recursion leading to stack overflow due to object loop in PDF CMap (bsc#1252337) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-81=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libpoppler-glib8-0.43.0-16.70.1 * libpoppler-qt4-4-debuginfo-0.43.0-16.70.1 * libpoppler-glib-devel-0.43.0-16.70.1 * poppler-tools-debuginfo-0.43.0-16.70.1 * poppler-tools-0.43.0-16.70.1 * poppler-debugsource-0.43.0-16.70.1 * libpoppler60-debuginfo-0.43.0-16.70.1 * libpoppler60-0.43.0-16.70.1 * libpoppler-glib8-debuginfo-0.43.0-16.70.1 * libpoppler-devel-0.43.0-16.70.1 * libpoppler-qt4-4-0.43.0-16.70.1 * libpoppler-qt4-devel-0.43.0-16.70.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11896.html * https://bugzilla.suse.com/show_bug.cgi?id=1252337 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 16:33:00 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 16:33:00 -0000 Subject: SUSE-SU-2026:0080-1: moderate: Security update for libvirt Message-ID: <176797638063.22173.12092901393606758405@smelt2.prg2.suse.org> # Security update for libvirt Announcement ID: SUSE-SU-2026:0080-1 Release Date: 2026-01-09T08:01:49Z Rating: moderate References: * bsc#1251822 * bsc#1253278 * bsc#1253703 Cross-References: * CVE-2025-12748 * CVE-2025-13193 CVSS scores: * CVE-2025-12748 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-12748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-12748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-13193 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-13193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-13193 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Micro 5.5 An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for libvirt fixes the following issues: Security fixes: * CVE-2025-13193: Fixed umask for 'qemu-img' when creating external inactive snapshots (bsc#1253703) * CVE-2025-12748: Fixed check ACLs before parsing the whole domain XML (bsc#1253278) Other fixes: * libvirt-supportconfig: Add support for supportconfig.rc (bsc#1251822) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-80=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-80=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libvirt-daemon-driver-storage-iscsi-direct-9.0.0-150500.6.26.1 * libvirt-libs-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-core-debuginfo-9.0.0-150500.6.26.1 * libvirt-libs-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-9.0.0-150500.6.26.1 * libvirt-daemon-config-nwfilter-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-scsi-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-iscsi-direct-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-nodedev-9.0.0-150500.6.26.1 * libvirt-nss-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-gluster-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-network-9.0.0-150500.6.26.1 * libvirt-daemon-driver-nwfilter-9.0.0-150500.6.26.1 * libvirt-daemon-driver-qemu-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-disk-9.0.0-150500.6.26.1 * libvirt-daemon-driver-lxc-debuginfo-9.0.0-150500.6.26.1 * libvirt-lock-sanlock-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-core-9.0.0-150500.6.26.1 * wireshark-plugin-libvirt-9.0.0-150500.6.26.1 * libvirt-daemon-lxc-9.0.0-150500.6.26.1 * libvirt-daemon-driver-qemu-9.0.0-150500.6.26.1 * libvirt-daemon-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-interface-9.0.0-150500.6.26.1 * libvirt-daemon-driver-secret-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-config-network-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-disk-debuginfo-9.0.0-150500.6.26.1 * libvirt-debugsource-9.0.0-150500.6.26.1 * libvirt-9.0.0-150500.6.26.1 * wireshark-plugin-libvirt-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-network-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-iscsi-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-logical-debuginfo-9.0.0-150500.6.26.1 * libvirt-devel-9.0.0-150500.6.26.1 * libvirt-daemon-9.0.0-150500.6.26.1 * libvirt-daemon-driver-nodedev-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-gluster-9.0.0-150500.6.26.1 * libvirt-daemon-driver-interface-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-scsi-9.0.0-150500.6.26.1 * libvirt-lock-sanlock-debuginfo-9.0.0-150500.6.26.1 * libvirt-nss-debuginfo-9.0.0-150500.6.26.1 * libvirt-client-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-qemu-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-iscsi-debuginfo-9.0.0-150500.6.26.1 * libvirt-client-qemu-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-logical-9.0.0-150500.6.26.1 * libvirt-daemon-driver-secret-9.0.0-150500.6.26.1 * libvirt-daemon-driver-lxc-9.0.0-150500.6.26.1 * libvirt-daemon-hooks-9.0.0-150500.6.26.1 * libvirt-daemon-driver-nwfilter-debuginfo-9.0.0-150500.6.26.1 * libvirt-client-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-mpath-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-mpath-9.0.0-150500.6.26.1 * openSUSE Leap 15.5 (x86_64) * libvirt-devel-32bit-9.0.0-150500.6.26.1 * libvirt-daemon-driver-libxl-9.0.0-150500.6.26.1 * libvirt-daemon-xen-9.0.0-150500.6.26.1 * libvirt-client-32bit-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-libxl-debuginfo-9.0.0-150500.6.26.1 * openSUSE Leap 15.5 (noarch) * libvirt-doc-9.0.0-150500.6.26.1 * openSUSE Leap 15.5 (aarch64 x86_64) * libvirt-daemon-driver-storage-rbd-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-rbd-debuginfo-9.0.0-150500.6.26.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libvirt-devel-64bit-9.0.0-150500.6.26.1 * libvirt-client-64bit-debuginfo-9.0.0-150500.6.26.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libvirt-daemon-driver-storage-iscsi-direct-9.0.0-150500.6.26.1 * libvirt-libs-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-core-debuginfo-9.0.0-150500.6.26.1 * libvirt-libs-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-scsi-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-iscsi-direct-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-nodedev-9.0.0-150500.6.26.1 * libvirt-daemon-driver-network-9.0.0-150500.6.26.1 * libvirt-daemon-driver-nwfilter-9.0.0-150500.6.26.1 * libvirt-daemon-driver-qemu-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-disk-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-core-9.0.0-150500.6.26.1 * libvirt-daemon-driver-qemu-9.0.0-150500.6.26.1 * libvirt-daemon-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-interface-9.0.0-150500.6.26.1 * libvirt-daemon-driver-secret-debuginfo-9.0.0-150500.6.26.1 * libvirt-debugsource-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-disk-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-network-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-iscsi-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-logical-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-9.0.0-150500.6.26.1 * libvirt-daemon-driver-nodedev-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-interface-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-scsi-9.0.0-150500.6.26.1 * libvirt-client-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-qemu-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-iscsi-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-logical-9.0.0-150500.6.26.1 * libvirt-daemon-driver-secret-9.0.0-150500.6.26.1 * libvirt-daemon-driver-nwfilter-debuginfo-9.0.0-150500.6.26.1 * libvirt-client-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-mpath-debuginfo-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-mpath-9.0.0-150500.6.26.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64) * libvirt-daemon-driver-storage-rbd-9.0.0-150500.6.26.1 * libvirt-daemon-driver-storage-rbd-debuginfo-9.0.0-150500.6.26.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12748.html * https://www.suse.com/security/cve/CVE-2025-13193.html * https://bugzilla.suse.com/show_bug.cgi?id=1251822 * https://bugzilla.suse.com/show_bug.cgi?id=1253278 * https://bugzilla.suse.com/show_bug.cgi?id=1253703 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 16:33:04 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 16:33:04 -0000 Subject: SUSE-SU-2026:0079-1: moderate: Security update for libvirt Message-ID: <176797638483.22173.7238694853328949748@smelt2.prg2.suse.org> # Security update for libvirt Announcement ID: SUSE-SU-2026:0079-1 Release Date: 2026-01-09T08:01:29Z Rating: moderate References: * bsc#1251822 * bsc#1253278 * bsc#1253703 Cross-References: * CVE-2025-12748 * CVE-2025-13193 CVSS scores: * CVE-2025-12748 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-12748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-12748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-13193 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-13193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-13193 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for libvirt fixes the following issues: Security fixes: * CVE-2025-13193: Fixed umask for 'qemu-img' when creating external inactive snapshots (bsc#1253703) * CVE-2025-12748: Fixed check ACLs before parsing the whole domain XML (bsc#1253278) Other fixes: * libvirt-supportconfig: Add support for supportconfig.rc (bsc#1251822) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2026-79=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-79=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-79=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * libvirt-daemon-driver-network-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-hooks-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-iscsi-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-mpath-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-gluster-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-config-nwfilter-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-7.1.0-150300.6.44.1 * wireshark-plugin-libvirt-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-scsi-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-disk-7.1.0-150300.6.44.1 * libvirt-admin-debuginfo-7.1.0-150300.6.44.1 * libvirt-client-7.1.0-150300.6.44.1 * libvirt-7.1.0-150300.6.44.1 * libvirt-nss-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-nwfilter-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-iscsi-debuginfo-7.1.0-150300.6.44.1 * libvirt-libs-debuginfo-7.1.0-150300.6.44.1 * libvirt-debugsource-7.1.0-150300.6.44.1 * libvirt-daemon-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-core-7.1.0-150300.6.44.1 * libvirt-lock-sanlock-7.1.0-150300.6.44.1 * libvirt-libs-7.1.0-150300.6.44.1 * libvirt-daemon-config-network-7.1.0-150300.6.44.1 * libvirt-daemon-driver-interface-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-scsi-7.1.0-150300.6.44.1 * libvirt-daemon-driver-network-7.1.0-150300.6.44.1 * libvirt-nss-7.1.0-150300.6.44.1 * libvirt-client-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-secret-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-mpath-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-iscsi-direct-7.1.0-150300.6.44.1 * libvirt-lock-sanlock-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-qemu-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-gluster-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-logical-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-iscsi-direct-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-interface-7.1.0-150300.6.44.1 * libvirt-daemon-driver-nodedev-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-lxc-debuginfo-7.1.0-150300.6.44.1 * libvirt-admin-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-disk-debuginfo-7.1.0-150300.6.44.1 * libvirt-devel-7.1.0-150300.6.44.1 * libvirt-daemon-driver-nodedev-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-core-debuginfo-7.1.0-150300.6.44.1 * wireshark-plugin-libvirt-7.1.0-150300.6.44.1 * libvirt-daemon-lxc-7.1.0-150300.6.44.1 * libvirt-daemon-driver-qemu-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-nwfilter-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-logical-7.1.0-150300.6.44.1 * libvirt-daemon-driver-lxc-7.1.0-150300.6.44.1 * libvirt-daemon-driver-secret-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-qemu-7.1.0-150300.6.44.1 * openSUSE Leap 15.3 (noarch) * libvirt-doc-7.1.0-150300.6.44.1 * libvirt-bash-completion-7.1.0-150300.6.44.1 * openSUSE Leap 15.3 (x86_64) * libvirt-daemon-xen-7.1.0-150300.6.44.1 * libvirt-devel-32bit-7.1.0-150300.6.44.1 * libvirt-daemon-driver-libxl-7.1.0-150300.6.44.1 * libvirt-daemon-driver-libxl-debuginfo-7.1.0-150300.6.44.1 * libvirt-client-32bit-debuginfo-7.1.0-150300.6.44.1 * openSUSE Leap 15.3 (aarch64 x86_64) * libvirt-daemon-driver-storage-rbd-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-rbd-7.1.0-150300.6.44.1 * openSUSE Leap 15.3 (aarch64_ilp32) * libvirt-client-64bit-debuginfo-7.1.0-150300.6.44.1 * libvirt-devel-64bit-7.1.0-150300.6.44.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libvirt-daemon-driver-network-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-iscsi-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-mpath-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-scsi-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-disk-7.1.0-150300.6.44.1 * libvirt-client-7.1.0-150300.6.44.1 * libvirt-daemon-driver-nwfilter-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-iscsi-debuginfo-7.1.0-150300.6.44.1 * libvirt-libs-debuginfo-7.1.0-150300.6.44.1 * libvirt-debugsource-7.1.0-150300.6.44.1 * libvirt-daemon-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-core-7.1.0-150300.6.44.1 * libvirt-libs-7.1.0-150300.6.44.1 * libvirt-daemon-driver-interface-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-scsi-7.1.0-150300.6.44.1 * libvirt-daemon-driver-network-7.1.0-150300.6.44.1 * libvirt-client-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-secret-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-mpath-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-iscsi-direct-7.1.0-150300.6.44.1 * libvirt-daemon-qemu-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-logical-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-iscsi-direct-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-interface-7.1.0-150300.6.44.1 * libvirt-daemon-driver-nodedev-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-disk-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-nodedev-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-core-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-qemu-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-nwfilter-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-logical-7.1.0-150300.6.44.1 * libvirt-daemon-driver-secret-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-qemu-7.1.0-150300.6.44.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 x86_64) * libvirt-daemon-driver-storage-rbd-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-rbd-7.1.0-150300.6.44.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libvirt-daemon-driver-network-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-iscsi-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-mpath-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-scsi-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-disk-7.1.0-150300.6.44.1 * libvirt-client-7.1.0-150300.6.44.1 * libvirt-daemon-driver-nwfilter-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-iscsi-debuginfo-7.1.0-150300.6.44.1 * libvirt-libs-debuginfo-7.1.0-150300.6.44.1 * libvirt-debugsource-7.1.0-150300.6.44.1 * libvirt-daemon-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-core-7.1.0-150300.6.44.1 * libvirt-libs-7.1.0-150300.6.44.1 * libvirt-daemon-driver-interface-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-scsi-7.1.0-150300.6.44.1 * libvirt-daemon-driver-network-7.1.0-150300.6.44.1 * libvirt-client-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-secret-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-mpath-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-iscsi-direct-7.1.0-150300.6.44.1 * libvirt-daemon-qemu-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-logical-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-iscsi-direct-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-interface-7.1.0-150300.6.44.1 * libvirt-daemon-driver-nodedev-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-disk-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-nodedev-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-core-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-qemu-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-nwfilter-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-logical-7.1.0-150300.6.44.1 * libvirt-daemon-driver-secret-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-qemu-7.1.0-150300.6.44.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 x86_64) * libvirt-daemon-driver-storage-rbd-debuginfo-7.1.0-150300.6.44.1 * libvirt-daemon-driver-storage-rbd-7.1.0-150300.6.44.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12748.html * https://www.suse.com/security/cve/CVE-2025-13193.html * https://bugzilla.suse.com/show_bug.cgi?id=1251822 * https://bugzilla.suse.com/show_bug.cgi?id=1253278 * https://bugzilla.suse.com/show_bug.cgi?id=1253703 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 20:31:31 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 20:31:31 -0000 Subject: SUSE-SU-2026:20021-1: important: Security update for the Linux Kernel Message-ID: <176799069134.22169.11040004445242718817@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:20021-1 Release Date: 2025-12-19T16:19:41Z Rating: important References: * bsc#1235463 * bsc#1243474 * bsc#1245193 * bsc#1245431 * bsc#1245498 * bsc#1245499 * bsc#1246328 * bsc#1246843 * bsc#1247500 * bsc#1248792 * bsc#1249256 * bsc#1249397 * bsc#1249912 * bsc#1249977 * bsc#1249982 * bsc#1250034 * bsc#1250176 * bsc#1250237 * bsc#1250252 * bsc#1250705 * bsc#1250723 * bsc#1250746 * bsc#1251120 * bsc#1251817 * bsc#1252054 * bsc#1252063 * bsc#1252301 * bsc#1252303 * bsc#1252342 * bsc#1252352 * bsc#1252357 * bsc#1252681 * bsc#1252686 * bsc#1252763 * bsc#1252776 * bsc#1252779 * bsc#1252790 * bsc#1252794 * bsc#1252795 * bsc#1252808 * bsc#1252809 * bsc#1252817 * bsc#1252821 * bsc#1252824 * bsc#1252836 * bsc#1252845 * bsc#1252901 * bsc#1252912 * bsc#1252917 * bsc#1252919 * bsc#1252923 * bsc#1252928 * bsc#1253018 * bsc#1253155 * bsc#1253176 * bsc#1253238 * bsc#1253275 * bsc#1253318 * bsc#1253324 * bsc#1253328 * bsc#1253330 * bsc#1253342 * bsc#1253348 * bsc#1253349 * bsc#1253352 * bsc#1253355 * bsc#1253360 * bsc#1253362 * bsc#1253363 * bsc#1253367 * bsc#1253369 * bsc#1253386 * bsc#1253394 * bsc#1253395 * bsc#1253402 * bsc#1253403 * bsc#1253405 * bsc#1253407 * bsc#1253408 * bsc#1253409 * bsc#1253410 * bsc#1253412 * bsc#1253416 * bsc#1253421 * bsc#1253422 * bsc#1253423 * bsc#1253424 * bsc#1253425 * bsc#1253426 * bsc#1253427 * bsc#1253428 * bsc#1253431 * bsc#1253433 * bsc#1253436 * bsc#1253438 * bsc#1253440 * bsc#1253441 * bsc#1253443 * bsc#1253445 * bsc#1253448 * bsc#1253449 * bsc#1253450 * bsc#1253451 * bsc#1253453 * bsc#1253455 * bsc#1253456 * bsc#1253457 * bsc#1253463 * bsc#1253472 * bsc#1253622 * bsc#1253624 * bsc#1253635 * bsc#1253643 * bsc#1253647 * bsc#1254119 * bsc#1254181 * bsc#1254221 * bsc#1254308 * bsc#1254315 * jsc#PED-13611 * jsc#PED-13949 * jsc#PED-14062 * jsc#PED-14115 * jsc#PED-14353 Cross-References: * CVE-2022-50253 * CVE-2025-37916 * CVE-2025-38084 * CVE-2025-38085 * CVE-2025-38321 * CVE-2025-38728 * CVE-2025-39805 * CVE-2025-39819 * CVE-2025-39822 * CVE-2025-39831 * CVE-2025-39859 * CVE-2025-39897 * CVE-2025-39917 * CVE-2025-39944 * CVE-2025-39961 * CVE-2025-39980 * CVE-2025-39990 * CVE-2025-40001 * CVE-2025-40003 * CVE-2025-40006 * CVE-2025-40021 * CVE-2025-40024 * CVE-2025-40027 * CVE-2025-40031 * CVE-2025-40033 * CVE-2025-40038 * CVE-2025-40047 * CVE-2025-40053 * CVE-2025-40055 * CVE-2025-40059 * CVE-2025-40064 * CVE-2025-40070 * CVE-2025-40074 * CVE-2025-40075 * CVE-2025-40081 * CVE-2025-40083 * CVE-2025-40086 * CVE-2025-40098 * CVE-2025-40101 * CVE-2025-40102 * CVE-2025-40105 * CVE-2025-40107 * CVE-2025-40109 * CVE-2025-40110 * CVE-2025-40111 * CVE-2025-40115 * CVE-2025-40116 * CVE-2025-40118 * CVE-2025-40120 * CVE-2025-40121 * CVE-2025-40127 * CVE-2025-40129 * CVE-2025-40132 * CVE-2025-40133 * CVE-2025-40134 * CVE-2025-40135 * CVE-2025-40139 * CVE-2025-40140 * CVE-2025-40141 * CVE-2025-40142 * CVE-2025-40149 * CVE-2025-40153 * CVE-2025-40154 * CVE-2025-40156 * CVE-2025-40157 * CVE-2025-40158 * CVE-2025-40159 * CVE-2025-40161 * CVE-2025-40162 * CVE-2025-40164 * CVE-2025-40165 * CVE-2025-40166 * CVE-2025-40168 * CVE-2025-40169 * CVE-2025-40171 * CVE-2025-40172 * CVE-2025-40173 * CVE-2025-40175 * CVE-2025-40176 * CVE-2025-40177 * CVE-2025-40178 * CVE-2025-40180 * CVE-2025-40183 * CVE-2025-40185 * CVE-2025-40186 * CVE-2025-40187 * CVE-2025-40188 * CVE-2025-40192 * CVE-2025-40194 * CVE-2025-40196 * CVE-2025-40197 * CVE-2025-40198 * CVE-2025-40200 * CVE-2025-40201 * CVE-2025-40202 * CVE-2025-40203 * CVE-2025-40204 * CVE-2025-40205 * CVE-2025-40206 * CVE-2025-40207 CVSS scores: * CVE-2022-50253 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50253 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37916 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-37916 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37916 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38084 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38084 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38085 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38085 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38085 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38321 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38321 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38321 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38728 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38728 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39819 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39831 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39897 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39897 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39917 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-39917 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2025-39917 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39961 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39961 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39980 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39980 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39990 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40001 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40001 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40003 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40003 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40006 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40021 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-40021 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2025-40024 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40027 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40027 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40031 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40033 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40038 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40047 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40047 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40053 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40055 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40059 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40083 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40086 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40086 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40098 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40101 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40101 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40102 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40102 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-40105 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40105 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40107 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40109 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40110 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40110 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40111 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40115 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40115 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40118 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40118 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40120 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40121 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40121 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40127 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40129 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40129 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40132 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40133 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40133 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-40134 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40134 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40135 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40135 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40139 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40139 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40140 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40140 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40141 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40141 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40142 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40142 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40149 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40149 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40153 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40153 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40154 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40154 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40157 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40157 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40158 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40158 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40159 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40159 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40161 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40161 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40162 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40164 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40165 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40165 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40166 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40168 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40168 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40169 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40169 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40171 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40171 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40172 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40173 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40173 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40175 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40175 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40176 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40176 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40177 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40177 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40178 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40180 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40180 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40183 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40183 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40186 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40186 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40187 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40192 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40194 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40194 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40196 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40196 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40197 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40198 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40200 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40202 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40203 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-40205 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40206 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40206 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40207 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server High Availability Extension 16.0 An update that solves 100 vulnerabilities, contains five features and has 19 fixes can now be installed. ## Description: The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues The following security issues were fixed: * CVE-2022-50253: bpf: make sure skb->len != 0 when redirecting to a tunneling device (bsc#1249912). * CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474). * CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431 bsc#1245498). * CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499). * CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328). * CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256). * CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982). * CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176). * CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034). * CVE-2025-39831: fbnic: Move phylink resume out of service_task and into open/close (bsc#1249977). * CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252). * CVE-2025-39897: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval (bsc#1250746). * CVE-2025-39917: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt (bsc#1250723). * CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120). * CVE-2025-39961: iommu/amd/pgtbl: Fix possible race while increase page table level (bsc#1251817). * CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063). * CVE-2025-39990: bpf: Check the helper function is valid in get_helper_proto (bsc#1252054). * CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303). * CVE-2025-40003: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work (bsc#1252301). * CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342). * CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681). * CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686). * CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763). * CVE-2025-40031: tee: fix register_shm_helper() (bsc#1252779). * CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824). * CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid (bsc#1252817). * CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790). * CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808). * CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821). * CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809). * CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845). * CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836). * CVE-2025-40074: tcp: convert to dev_net_rcu() (bsc#1252794). * CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795). * CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776). * CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912). * CVE-2025-40086: drm/xe: Don't allow evicting of BOs in same VM in array of VM binds (bsc#1252923). * CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917). * CVE-2025-40101: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST (bsc#1252901). * CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919). * CVE-2025-40105: vfs: Don't leak disconnected dentries on umount (bsc#1252928). * CVE-2025-40133: mptcp: Call dst_release() in mptcp_active_enable() (bsc#1253328). * CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386). * CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342). * CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409). * CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355). * CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408). * CVE-2025-40157: EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller (bsc#1253423). * CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402). * CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403). * CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427). * CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416). * CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421). * CVE-2025-40175: idpf: cleanup remaining SKBs in PTP flows (bsc#1253426). * CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425). * CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463). * CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394). * CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in sys_prlimit64() paths (bsc#1253455). * CVE-2025-40203: listmount: don't call path_put() under namespace semaphore (bsc#1253457). The following non security issues were fixed: * ACPI: scan: Update honor list for RPMI System MSI (stable-fixes). * ACPICA: Update dsmethod.c to get rid of unused variable warning (stable- fixes). * Disable CONFIG_CPU5_WDT The cpu5wdt driver doesn't implement a proper watchdog interface and has many code issues. It only handles obscure and obsolete hardware. Stop building and supporting this driver (jsc#PED-14062). * Fix "drm/xe: Don't allow evicting of BOs in same VM in array of VM binds" (bsc#1252923) * KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git- fixes). * KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes). * KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git- fixes). * KVM: s390: improve interrupt cpu for wakeup (bsc#1235463). * KVM: s390: kABI backport for 'last_sleep_cpu' (bsc#1252352). * KVM: x86/mmu: Return -EAGAIN if userspace deletes/moves memslot during prefault (git-fixes). * PCI/ERR: Update device error_state already after reset (stable-fixes). * PM: EM: Slightly reduce em_check_capacity_update() overhead (stable-fixes). * Revert "net/mlx5e: Update and set Xon/Xoff upon MTU set" (git-fixes). * Revert "net/mlx5e: Update and set Xon/Xoff upon port speed set" (git-fixes). * Update config files: enable zstd module decompression (jsc#PED-14115). * bpf/selftests: Fix test_tcpnotify_user (bsc#1253635). * btrfs: do not clear read-only when adding sprout device (bsc#1253238). * btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes). * dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386) * drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes). * drm/amd/display: update color on atomic commit time (stable-fixes). * drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes). * drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable- fixes). * hwmon: (lenovo-ec-sensors) Update P8 supprt (stable-fixes). * media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes). * mount: handle NULL values in mnt_ns_release() (bsc#1254308) * net/smc: Remove validation of reserved bits in CLC Decline (bsc#1252357). * net: phy: move realtek PHY driver to its own subdirectory (jsc#PED-14353). * net: phy: realtek: add defines for shadowed c45 standard registers (jsc#PED-14353). * net: phy: realtek: add helper RTL822X_VND2_C22_REG (jsc#PED-14353). * net: phy: realtek: change order of calls in C22 read_status() (jsc#PED-14353). * net: phy: realtek: clear 1000Base-T link partner advertisement (jsc#PED-14353). * net: phy: realtek: improve mmd register access for internal PHY's (jsc#PED-14353). * net: phy: realtek: read duplex and gbit master from PHYSR register (jsc#PED-14353). * net: phy: realtek: switch from paged to MMD ops in rtl822x functions (jsc#PED-14353). * net: phy: realtek: use string choices helpers (jsc#PED-14353). * net: xilinx: axienet: Fix IRQ coalescing packet count overflow (bsc#1250746) * net: xilinx: axienet: Fix RX skb ring management in DMAengine mode (bsc#1250746) * net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in dmaengine xmit (bsc#1250746) * nvmet-auth: update sc_c in host response (git-fixes bsc#1249397). * nvmet-auth: update sc_c in target host hash calculation (git-fixes). * perf list: Add IBM z17 event descriptions (jsc#PED-13611). * platform/x86:intel/pmc: Update Arrow Lake telemetry GUID (git-fixes). * powercap: intel_rapl: Add support for Panther Lake platform (jsc#PED-13949). * pwm: pca9685: Use bulk write to atomicially update registers (stable-fixes). * r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353). * r8169: add support for Intel Killer E5000 (jsc#PED-14353). * r8169: add support for RTL8125BP rev.b (jsc#PED-14353). * r8169: add support for RTL8125D rev.b (jsc#PED-14353). * r8169: adjust version numbering for RTL8126 (jsc#PED-14353). * r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353). * r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353). * r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353). * r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers (jsc#PED-14353). * r8169: avoid duplicated messages if loading firmware fails and switch to warn level (jsc#PED-14353). * r8169: don't take RTNL lock in rtl_task() (jsc#PED-14353). * r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353). * r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353). * r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats (jsc#PED-14353). * r8169: implement additional ethtool stats ops (jsc#PED-14353). * r8169: improve __rtl8169_set_wol (jsc#PED-14353). * r8169: improve initialization of RSS registers on RTL8125/RTL8126 (jsc#PED-14353). * r8169: improve rtl_set_d3_pll_down (jsc#PED-14353). * r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353). * r8169: remove leftover locks after reverted change (jsc#PED-14353). * r8169: remove original workaround for RTL8125 broken rx issue (jsc#PED-14353). * r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353). * r8169: remove support for chip version 11 (jsc#PED-14353). * r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353). * r8169: replace custom flag with disable_work() et al (jsc#PED-14353). * r8169: switch away from deprecated pcim_iomap_table (jsc#PED-14353). * r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config (jsc#PED-14353). * ring-buffer: Update pages_touched to reflect persistent buffer content (git- fixes). * s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253643). * sched/fair: Get rid of sched_domains_curr_level hack for tl->cpumask() (bsc#1246843). * sched/fair: Have SD_SERIALIZE affect newidle balancing (bsc#1248792). * sched/fair: Proportional newidle balance (bsc#1248792). * sched/fair: Proportional newidle balance -KABI (bsc#1248792). * sched/fair: Revert max_newidle_lb_cost bump (bsc#1248792). * sched/fair: Skip sched_balance_running cmpxchg when balance is not due (bsc#1248792). * sched/fair: Small cleanup to sched_balance_newidle() (bsc#1248792). * sched/fair: Small cleanup to update_newidle_cost() (bsc#1248792). * scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119). * scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119). * scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119). * scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119). * scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119). * scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119). * scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119). * scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119). * scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119). * scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119). * selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221). * smpboot: introduce SDTL_INIT() helper to tidy sched topology setup (bsc#1246843). * soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes). * spi: tegra210-quad: Check hardware status on timeout (bsc#1253155) * spi: tegra210-quad: Fix timeout handling (bsc#1253155) * spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155) * spi: tegra210-quad: Update dummy sequence configuration (git-fixes) * tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork (bsc#1250705). * wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181). * wifi: mt76: do not add wcid entries to sta poll list during MCU reset (bsc#1254315). * wifi: mt76: introduce mt792x_config_mac_addr_list routine (bsc#1254315). * wifi: mt76: mt7925: Fix logical vs bitwise typo (bsc#1254315). * wifi: mt76: mt7925: Remove unnecessary if-check (bsc#1254315). * wifi: mt76: mt7925: Simplify HIF suspend handling to avoid suspend fail (bsc#1254315). * wifi: mt76: mt7925: add EHT control support based on the CLC data (bsc#1254315). * wifi: mt76: mt7925: add handler to hif suspend/resume event (bsc#1254315). * wifi: mt76: mt7925: add pci restore for hibernate (bsc#1254315). * wifi: mt76: mt7925: config the dwell time by firmware (bsc#1254315). * wifi: mt76: mt7925: extend MCU support for testmode (bsc#1254315). * wifi: mt76: mt7925: fix CLC command timeout when suspend/resume (bsc#1254315). * wifi: mt76: mt7925: fix missing hdr_trans_tlv command for broadcast wtbl (bsc#1254315). * wifi: mt76: mt7925: fix the unfinished command of regd_notifier before suspend (bsc#1254315). * wifi: mt76: mt7925: refine the txpower initialization flow (bsc#1254315). * wifi: mt76: mt7925: replace zero-length array with flexible-array member (bsc#1254315). * wifi: mt76: mt7925: update the channel usage when the regd domain changed (bsc#1254315). * wifi: mt76: mt7925e: fix too long of wifi resume time (bsc#1254315). * x86/smpboot: avoid SMT domain attach/destroy if SMT is not enabled (bsc#1246843). * x86/smpboot: moves x86_topology to static initialize and truncate (bsc#1246843). * x86/smpboot: remove redundant CONFIG_SCHED_SMT (bsc#1246843). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server High Availability Extension 16.0 zypper in -t patch SUSE-SLES-HA-16.0-113=1 ## Package List: * SUSE Linux Enterprise Server High Availability Extension 16.0 (ppc64le s390x x86_64) * dlm-kmp-default-6.12.0-160000.8.1 * kernel-default-debugsource-6.12.0-160000.8.1 * cluster-md-kmp-default-debuginfo-6.12.0-160000.8.1 * dlm-kmp-default-debuginfo-6.12.0-160000.8.1 * gfs2-kmp-default-debuginfo-6.12.0-160000.8.1 * gfs2-kmp-default-6.12.0-160000.8.1 * kernel-default-debuginfo-6.12.0-160000.8.1 * cluster-md-kmp-default-6.12.0-160000.8.1 * SUSE Linux Enterprise Server High Availability Extension 16.0 (nosrc) * kernel-default-6.12.0-160000.8.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50253.html * https://www.suse.com/security/cve/CVE-2025-37916.html * https://www.suse.com/security/cve/CVE-2025-38084.html * https://www.suse.com/security/cve/CVE-2025-38085.html * https://www.suse.com/security/cve/CVE-2025-38321.html * https://www.suse.com/security/cve/CVE-2025-38728.html * https://www.suse.com/security/cve/CVE-2025-39805.html * https://www.suse.com/security/cve/CVE-2025-39819.html * https://www.suse.com/security/cve/CVE-2025-39822.html * https://www.suse.com/security/cve/CVE-2025-39831.html * https://www.suse.com/security/cve/CVE-2025-39859.html * https://www.suse.com/security/cve/CVE-2025-39897.html * https://www.suse.com/security/cve/CVE-2025-39917.html * https://www.suse.com/security/cve/CVE-2025-39944.html * https://www.suse.com/security/cve/CVE-2025-39961.html * https://www.suse.com/security/cve/CVE-2025-39980.html * https://www.suse.com/security/cve/CVE-2025-39990.html * https://www.suse.com/security/cve/CVE-2025-40001.html * https://www.suse.com/security/cve/CVE-2025-40003.html * https://www.suse.com/security/cve/CVE-2025-40006.html * https://www.suse.com/security/cve/CVE-2025-40021.html * https://www.suse.com/security/cve/CVE-2025-40024.html * https://www.suse.com/security/cve/CVE-2025-40027.html * https://www.suse.com/security/cve/CVE-2025-40031.html * https://www.suse.com/security/cve/CVE-2025-40033.html * https://www.suse.com/security/cve/CVE-2025-40038.html * https://www.suse.com/security/cve/CVE-2025-40047.html * https://www.suse.com/security/cve/CVE-2025-40053.html * https://www.suse.com/security/cve/CVE-2025-40055.html * https://www.suse.com/security/cve/CVE-2025-40059.html * https://www.suse.com/security/cve/CVE-2025-40064.html * https://www.suse.com/security/cve/CVE-2025-40070.html * https://www.suse.com/security/cve/CVE-2025-40074.html * https://www.suse.com/security/cve/CVE-2025-40075.html * https://www.suse.com/security/cve/CVE-2025-40081.html * https://www.suse.com/security/cve/CVE-2025-40083.html * https://www.suse.com/security/cve/CVE-2025-40086.html * https://www.suse.com/security/cve/CVE-2025-40098.html * https://www.suse.com/security/cve/CVE-2025-40101.html * https://www.suse.com/security/cve/CVE-2025-40102.html * https://www.suse.com/security/cve/CVE-2025-40105.html * https://www.suse.com/security/cve/CVE-2025-40107.html * https://www.suse.com/security/cve/CVE-2025-40109.html * https://www.suse.com/security/cve/CVE-2025-40110.html * https://www.suse.com/security/cve/CVE-2025-40111.html * https://www.suse.com/security/cve/CVE-2025-40115.html * https://www.suse.com/security/cve/CVE-2025-40116.html * https://www.suse.com/security/cve/CVE-2025-40118.html * https://www.suse.com/security/cve/CVE-2025-40120.html * https://www.suse.com/security/cve/CVE-2025-40121.html * https://www.suse.com/security/cve/CVE-2025-40127.html * https://www.suse.com/security/cve/CVE-2025-40129.html * https://www.suse.com/security/cve/CVE-2025-40132.html * https://www.suse.com/security/cve/CVE-2025-40133.html * https://www.suse.com/security/cve/CVE-2025-40134.html * https://www.suse.com/security/cve/CVE-2025-40135.html * https://www.suse.com/security/cve/CVE-2025-40139.html * https://www.suse.com/security/cve/CVE-2025-40140.html * https://www.suse.com/security/cve/CVE-2025-40141.html * https://www.suse.com/security/cve/CVE-2025-40142.html * https://www.suse.com/security/cve/CVE-2025-40149.html * https://www.suse.com/security/cve/CVE-2025-40153.html * https://www.suse.com/security/cve/CVE-2025-40154.html * https://www.suse.com/security/cve/CVE-2025-40156.html * https://www.suse.com/security/cve/CVE-2025-40157.html * https://www.suse.com/security/cve/CVE-2025-40158.html * https://www.suse.com/security/cve/CVE-2025-40159.html * https://www.suse.com/security/cve/CVE-2025-40161.html * https://www.suse.com/security/cve/CVE-2025-40162.html * https://www.suse.com/security/cve/CVE-2025-40164.html * https://www.suse.com/security/cve/CVE-2025-40165.html * https://www.suse.com/security/cve/CVE-2025-40166.html * https://www.suse.com/security/cve/CVE-2025-40168.html * https://www.suse.com/security/cve/CVE-2025-40169.html * https://www.suse.com/security/cve/CVE-2025-40171.html * https://www.suse.com/security/cve/CVE-2025-40172.html * https://www.suse.com/security/cve/CVE-2025-40173.html * https://www.suse.com/security/cve/CVE-2025-40175.html * https://www.suse.com/security/cve/CVE-2025-40176.html * https://www.suse.com/security/cve/CVE-2025-40177.html * https://www.suse.com/security/cve/CVE-2025-40178.html * https://www.suse.com/security/cve/CVE-2025-40180.html * https://www.suse.com/security/cve/CVE-2025-40183.html * https://www.suse.com/security/cve/CVE-2025-40185.html * https://www.suse.com/security/cve/CVE-2025-40186.html * https://www.suse.com/security/cve/CVE-2025-40187.html * https://www.suse.com/security/cve/CVE-2025-40188.html * https://www.suse.com/security/cve/CVE-2025-40192.html * https://www.suse.com/security/cve/CVE-2025-40194.html * https://www.suse.com/security/cve/CVE-2025-40196.html * https://www.suse.com/security/cve/CVE-2025-40197.html * https://www.suse.com/security/cve/CVE-2025-40198.html * https://www.suse.com/security/cve/CVE-2025-40200.html * https://www.suse.com/security/cve/CVE-2025-40201.html * https://www.suse.com/security/cve/CVE-2025-40202.html * https://www.suse.com/security/cve/CVE-2025-40203.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://www.suse.com/security/cve/CVE-2025-40205.html * https://www.suse.com/security/cve/CVE-2025-40206.html * https://www.suse.com/security/cve/CVE-2025-40207.html * https://bugzilla.suse.com/show_bug.cgi?id=1235463 * https://bugzilla.suse.com/show_bug.cgi?id=1243474 * https://bugzilla.suse.com/show_bug.cgi?id=1245193 * https://bugzilla.suse.com/show_bug.cgi?id=1245431 * https://bugzilla.suse.com/show_bug.cgi?id=1245498 * https://bugzilla.suse.com/show_bug.cgi?id=1245499 * https://bugzilla.suse.com/show_bug.cgi?id=1246328 * https://bugzilla.suse.com/show_bug.cgi?id=1246843 * https://bugzilla.suse.com/show_bug.cgi?id=1247500 * https://bugzilla.suse.com/show_bug.cgi?id=1248792 * https://bugzilla.suse.com/show_bug.cgi?id=1249256 * https://bugzilla.suse.com/show_bug.cgi?id=1249397 * https://bugzilla.suse.com/show_bug.cgi?id=1249912 * https://bugzilla.suse.com/show_bug.cgi?id=1249977 * https://bugzilla.suse.com/show_bug.cgi?id=1249982 * https://bugzilla.suse.com/show_bug.cgi?id=1250034 * https://bugzilla.suse.com/show_bug.cgi?id=1250176 * https://bugzilla.suse.com/show_bug.cgi?id=1250237 * https://bugzilla.suse.com/show_bug.cgi?id=1250252 * https://bugzilla.suse.com/show_bug.cgi?id=1250705 * https://bugzilla.suse.com/show_bug.cgi?id=1250723 * https://bugzilla.suse.com/show_bug.cgi?id=1250746 * https://bugzilla.suse.com/show_bug.cgi?id=1251120 * https://bugzilla.suse.com/show_bug.cgi?id=1251817 * https://bugzilla.suse.com/show_bug.cgi?id=1252054 * https://bugzilla.suse.com/show_bug.cgi?id=1252063 * https://bugzilla.suse.com/show_bug.cgi?id=1252301 * https://bugzilla.suse.com/show_bug.cgi?id=1252303 * https://bugzilla.suse.com/show_bug.cgi?id=1252342 * https://bugzilla.suse.com/show_bug.cgi?id=1252352 * https://bugzilla.suse.com/show_bug.cgi?id=1252357 * https://bugzilla.suse.com/show_bug.cgi?id=1252681 * https://bugzilla.suse.com/show_bug.cgi?id=1252686 * https://bugzilla.suse.com/show_bug.cgi?id=1252763 * https://bugzilla.suse.com/show_bug.cgi?id=1252776 * https://bugzilla.suse.com/show_bug.cgi?id=1252779 * https://bugzilla.suse.com/show_bug.cgi?id=1252790 * https://bugzilla.suse.com/show_bug.cgi?id=1252794 * https://bugzilla.suse.com/show_bug.cgi?id=1252795 * https://bugzilla.suse.com/show_bug.cgi?id=1252808 * https://bugzilla.suse.com/show_bug.cgi?id=1252809 * https://bugzilla.suse.com/show_bug.cgi?id=1252817 * https://bugzilla.suse.com/show_bug.cgi?id=1252821 * https://bugzilla.suse.com/show_bug.cgi?id=1252824 * https://bugzilla.suse.com/show_bug.cgi?id=1252836 * https://bugzilla.suse.com/show_bug.cgi?id=1252845 * https://bugzilla.suse.com/show_bug.cgi?id=1252901 * https://bugzilla.suse.com/show_bug.cgi?id=1252912 * https://bugzilla.suse.com/show_bug.cgi?id=1252917 * https://bugzilla.suse.com/show_bug.cgi?id=1252919 * https://bugzilla.suse.com/show_bug.cgi?id=1252923 * https://bugzilla.suse.com/show_bug.cgi?id=1252928 * https://bugzilla.suse.com/show_bug.cgi?id=1253018 * https://bugzilla.suse.com/show_bug.cgi?id=1253155 * https://bugzilla.suse.com/show_bug.cgi?id=1253176 * https://bugzilla.suse.com/show_bug.cgi?id=1253238 * https://bugzilla.suse.com/show_bug.cgi?id=1253275 * https://bugzilla.suse.com/show_bug.cgi?id=1253318 * https://bugzilla.suse.com/show_bug.cgi?id=1253324 * https://bugzilla.suse.com/show_bug.cgi?id=1253328 * https://bugzilla.suse.com/show_bug.cgi?id=1253330 * https://bugzilla.suse.com/show_bug.cgi?id=1253342 * https://bugzilla.suse.com/show_bug.cgi?id=1253348 * https://bugzilla.suse.com/show_bug.cgi?id=1253349 * https://bugzilla.suse.com/show_bug.cgi?id=1253352 * https://bugzilla.suse.com/show_bug.cgi?id=1253355 * https://bugzilla.suse.com/show_bug.cgi?id=1253360 * https://bugzilla.suse.com/show_bug.cgi?id=1253362 * https://bugzilla.suse.com/show_bug.cgi?id=1253363 * https://bugzilla.suse.com/show_bug.cgi?id=1253367 * https://bugzilla.suse.com/show_bug.cgi?id=1253369 * https://bugzilla.suse.com/show_bug.cgi?id=1253386 * https://bugzilla.suse.com/show_bug.cgi?id=1253394 * https://bugzilla.suse.com/show_bug.cgi?id=1253395 * https://bugzilla.suse.com/show_bug.cgi?id=1253402 * https://bugzilla.suse.com/show_bug.cgi?id=1253403 * https://bugzilla.suse.com/show_bug.cgi?id=1253405 * https://bugzilla.suse.com/show_bug.cgi?id=1253407 * https://bugzilla.suse.com/show_bug.cgi?id=1253408 * https://bugzilla.suse.com/show_bug.cgi?id=1253409 * https://bugzilla.suse.com/show_bug.cgi?id=1253410 * https://bugzilla.suse.com/show_bug.cgi?id=1253412 * https://bugzilla.suse.com/show_bug.cgi?id=1253416 * https://bugzilla.suse.com/show_bug.cgi?id=1253421 * https://bugzilla.suse.com/show_bug.cgi?id=1253422 * https://bugzilla.suse.com/show_bug.cgi?id=1253423 * https://bugzilla.suse.com/show_bug.cgi?id=1253424 * https://bugzilla.suse.com/show_bug.cgi?id=1253425 * https://bugzilla.suse.com/show_bug.cgi?id=1253426 * https://bugzilla.suse.com/show_bug.cgi?id=1253427 * https://bugzilla.suse.com/show_bug.cgi?id=1253428 * https://bugzilla.suse.com/show_bug.cgi?id=1253431 * https://bugzilla.suse.com/show_bug.cgi?id=1253433 * https://bugzilla.suse.com/show_bug.cgi?id=1253436 * https://bugzilla.suse.com/show_bug.cgi?id=1253438 * https://bugzilla.suse.com/show_bug.cgi?id=1253440 * https://bugzilla.suse.com/show_bug.cgi?id=1253441 * https://bugzilla.suse.com/show_bug.cgi?id=1253443 * https://bugzilla.suse.com/show_bug.cgi?id=1253445 * https://bugzilla.suse.com/show_bug.cgi?id=1253448 * https://bugzilla.suse.com/show_bug.cgi?id=1253449 * https://bugzilla.suse.com/show_bug.cgi?id=1253450 * https://bugzilla.suse.com/show_bug.cgi?id=1253451 * https://bugzilla.suse.com/show_bug.cgi?id=1253453 * https://bugzilla.suse.com/show_bug.cgi?id=1253455 * https://bugzilla.suse.com/show_bug.cgi?id=1253456 * https://bugzilla.suse.com/show_bug.cgi?id=1253457 * https://bugzilla.suse.com/show_bug.cgi?id=1253463 * https://bugzilla.suse.com/show_bug.cgi?id=1253472 * https://bugzilla.suse.com/show_bug.cgi?id=1253622 * https://bugzilla.suse.com/show_bug.cgi?id=1253624 * https://bugzilla.suse.com/show_bug.cgi?id=1253635 * https://bugzilla.suse.com/show_bug.cgi?id=1253643 * https://bugzilla.suse.com/show_bug.cgi?id=1253647 * https://bugzilla.suse.com/show_bug.cgi?id=1254119 * https://bugzilla.suse.com/show_bug.cgi?id=1254181 * https://bugzilla.suse.com/show_bug.cgi?id=1254221 * https://bugzilla.suse.com/show_bug.cgi?id=1254308 * https://bugzilla.suse.com/show_bug.cgi?id=1254315 * https://jira.suse.com/browse/PED-13611 * https://jira.suse.com/browse/PED-13949 * https://jira.suse.com/browse/PED-14062 * https://jira.suse.com/browse/PED-14115 * https://jira.suse.com/browse/PED-14353 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 20:31:33 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 20:31:33 -0000 Subject: SUSE-RU-2026:20020-1: important: Recommended update for the initial kernel livepatch Message-ID: <176799069367.22169.6012817818436495178@smelt2.prg2.suse.org> # Recommended update for the initial kernel livepatch Announcement ID: SUSE-RU-2026:20020-1 Release Date: 2025-12-19T15:33:16Z Rating: important References: Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that can now be installed. ## Description: This update contains initial livepatches for the SUSE Linux Enterprise Server 16.0 and SUSE Linux Micro 6.2 kernel update. ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-114=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-114=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (ppc64le s390x x86_64) * kernel-livepatch-SLE16_Update_3-debugsource-1-160000.1.1 * kernel-livepatch-6_12_0-160000_8-default-1-160000.1.1 * kernel-livepatch-6_12_0-160000_8-default-debuginfo-1-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * kernel-livepatch-SLE16_Update_3-debugsource-1-160000.1.1 * kernel-livepatch-6_12_0-160000_8-default-1-160000.1.1 * kernel-livepatch-6_12_0-160000_8-default-debuginfo-1-160000.1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 20:31:37 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 20:31:37 -0000 Subject: SUSE-SU-2026:20019-1: important: Security update for sssd Message-ID: <176799069745.22169.9249392321053054226@smelt2.prg2.suse.org> # Security update for sssd Announcement ID: SUSE-SU-2026:20019-1 Release Date: 2026-01-02T16:58:16Z Rating: important References: * bsc#1244325 * bsc#1251827 Cross-References: * CVE-2025-11561 CVSS scores: * CVE-2025-11561 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-11561 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-11561 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability and has one fix can now be installed. ## Description: This update for sssd fixes the following issues: * CVE-2025-11561: Fixed default Kerberos configuration allowing privilege escalation on AD-joined Linux systems (bsc#1244325) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-119=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-119=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * libipa_hbac-devel-2.9.5-160000.3.1 * libsss_idmap-devel-2.9.5-160000.3.1 * libipa_hbac0-debuginfo-2.9.5-160000.3.1 * sssd-ipa-debuginfo-2.9.5-160000.3.1 * sssd-ad-2.9.5-160000.3.1 * libsss_certmap0-2.9.5-160000.3.1 * libipa_hbac0-2.9.5-160000.3.1 * sssd-krb5-common-2.9.5-160000.3.1 * sssd-ldap-2.9.5-160000.3.1 * sssd-tools-debuginfo-2.9.5-160000.3.1 * libsss_nss_idmap0-debuginfo-2.9.5-160000.3.1 * libsss_certmap0-debuginfo-2.9.5-160000.3.1 * python3-sssd-config-2.9.5-160000.3.1 * sssd-krb5-2.9.5-160000.3.1 * sssd-proxy-2.9.5-160000.3.1 * sssd-ipa-2.9.5-160000.3.1 * sssd-kcm-debuginfo-2.9.5-160000.3.1 * sssd-krb5-common-debuginfo-2.9.5-160000.3.1 * python3-ipa_hbac-debuginfo-2.9.5-160000.3.1 * sssd-debugsource-2.9.5-160000.3.1 * python3-sss_nss_idmap-debuginfo-2.9.5-160000.3.1 * sssd-winbind-idmap-2.9.5-160000.3.1 * libnfsidmap-sss-debuginfo-2.9.5-160000.3.1 * sssd-ad-debuginfo-2.9.5-160000.3.1 * libsss_idmap0-2.9.5-160000.3.1 * libsss_nss_idmap0-2.9.5-160000.3.1 * sssd-ldap-debuginfo-2.9.5-160000.3.1 * sssd-debuginfo-2.9.5-160000.3.1 * python3-sss-murmur-2.9.5-160000.3.1 * sssd-winbind-idmap-debuginfo-2.9.5-160000.3.1 * libnfsidmap-sss-2.9.5-160000.3.1 * libsss_nss_idmap-devel-2.9.5-160000.3.1 * libsss_idmap0-debuginfo-2.9.5-160000.3.1 * python3-sss_nss_idmap-2.9.5-160000.3.1 * libsss_certmap-devel-2.9.5-160000.3.1 * sssd-2.9.5-160000.3.1 * python3-sss-murmur-debuginfo-2.9.5-160000.3.1 * sssd-dbus-2.9.5-160000.3.1 * sssd-proxy-debuginfo-2.9.5-160000.3.1 * sssd-krb5-debuginfo-2.9.5-160000.3.1 * sssd-kcm-2.9.5-160000.3.1 * sssd-dbus-debuginfo-2.9.5-160000.3.1 * python3-ipa_hbac-2.9.5-160000.3.1 * sssd-tools-2.9.5-160000.3.1 * python3-sssd-config-debuginfo-2.9.5-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * libipa_hbac-devel-2.9.5-160000.3.1 * libsss_idmap-devel-2.9.5-160000.3.1 * libipa_hbac0-debuginfo-2.9.5-160000.3.1 * sssd-ipa-debuginfo-2.9.5-160000.3.1 * sssd-ad-2.9.5-160000.3.1 * libsss_certmap0-2.9.5-160000.3.1 * libipa_hbac0-2.9.5-160000.3.1 * sssd-krb5-common-2.9.5-160000.3.1 * sssd-ldap-2.9.5-160000.3.1 * sssd-tools-debuginfo-2.9.5-160000.3.1 * libsss_nss_idmap0-debuginfo-2.9.5-160000.3.1 * libsss_certmap0-debuginfo-2.9.5-160000.3.1 * python3-sssd-config-2.9.5-160000.3.1 * sssd-krb5-2.9.5-160000.3.1 * sssd-proxy-2.9.5-160000.3.1 * sssd-ipa-2.9.5-160000.3.1 * sssd-kcm-debuginfo-2.9.5-160000.3.1 * sssd-krb5-common-debuginfo-2.9.5-160000.3.1 * python3-ipa_hbac-debuginfo-2.9.5-160000.3.1 * sssd-debugsource-2.9.5-160000.3.1 * python3-sss_nss_idmap-debuginfo-2.9.5-160000.3.1 * sssd-winbind-idmap-2.9.5-160000.3.1 * libnfsidmap-sss-debuginfo-2.9.5-160000.3.1 * sssd-ad-debuginfo-2.9.5-160000.3.1 * libsss_idmap0-2.9.5-160000.3.1 * libsss_nss_idmap0-2.9.5-160000.3.1 * sssd-ldap-debuginfo-2.9.5-160000.3.1 * sssd-debuginfo-2.9.5-160000.3.1 * python3-sss-murmur-2.9.5-160000.3.1 * sssd-winbind-idmap-debuginfo-2.9.5-160000.3.1 * libnfsidmap-sss-2.9.5-160000.3.1 * libsss_nss_idmap-devel-2.9.5-160000.3.1 * libsss_idmap0-debuginfo-2.9.5-160000.3.1 * python3-sss_nss_idmap-2.9.5-160000.3.1 * libsss_certmap-devel-2.9.5-160000.3.1 * sssd-2.9.5-160000.3.1 * python3-sss-murmur-debuginfo-2.9.5-160000.3.1 * sssd-dbus-2.9.5-160000.3.1 * sssd-proxy-debuginfo-2.9.5-160000.3.1 * sssd-krb5-debuginfo-2.9.5-160000.3.1 * sssd-kcm-2.9.5-160000.3.1 * sssd-dbus-debuginfo-2.9.5-160000.3.1 * python3-ipa_hbac-2.9.5-160000.3.1 * sssd-tools-2.9.5-160000.3.1 * python3-sssd-config-debuginfo-2.9.5-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11561.html * https://bugzilla.suse.com/show_bug.cgi?id=1244325 * https://bugzilla.suse.com/show_bug.cgi?id=1251827 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 20:31:41 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 20:31:41 -0000 Subject: SUSE-SU-2026:20018-1: important: Security update for mariadb Message-ID: <176799070160.22169.13464340668432617360@smelt2.prg2.suse.org> # Security update for mariadb Announcement ID: SUSE-SU-2026:20018-1 Release Date: 2025-12-22T11:44:04Z Rating: important References: * bsc#1243040 * bsc#1252162 * bsc#1254313 * bsc#1254476 Cross-References: * CVE-2025-13699 CVSS scores: * CVE-2025-13699 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-13699 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-13699 ( NVD ): 7.0 CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability and has three fixes can now be installed. ## Description: This update for mariadb fixes the following issues: * Update to 11.8.5: * CVE-2025-13699: Fixed Directory Traversal Remote Code Execution Vulnerability (bsc#1254313) Other fixes: * Add %license tags to license files (bsc#1252162) * Add INSTALL_DOCREADMEDIR cmake flag to install readme and license files * Remove client plugin parsec.so, it is shipped by libmariadb_plugins (bsc#1243040, bsc#1254476) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-116=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-116=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * mariadb-debuginfo-11.8.5-160000.1.1 * mariadb-debugsource-11.8.5-160000.1.1 * libmariadbd19-11.8.5-160000.1.1 * libmariadbd-devel-11.8.5-160000.1.1 * mariadb-bench-debuginfo-11.8.5-160000.1.1 * mariadb-client-11.8.5-160000.1.1 * mariadb-client-debuginfo-11.8.5-160000.1.1 * mariadb-bench-11.8.5-160000.1.1 * mariadb-11.8.5-160000.1.1 * mariadb-tools-11.8.5-160000.1.1 * libmariadbd19-debuginfo-11.8.5-160000.1.1 * mariadb-tools-debuginfo-11.8.5-160000.1.1 * SUSE Linux Enterprise Server 16.0 (noarch) * mariadb-errormessages-11.8.5-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * mariadb-debuginfo-11.8.5-160000.1.1 * mariadb-debugsource-11.8.5-160000.1.1 * libmariadbd19-11.8.5-160000.1.1 * libmariadbd-devel-11.8.5-160000.1.1 * mariadb-bench-debuginfo-11.8.5-160000.1.1 * mariadb-client-11.8.5-160000.1.1 * mariadb-client-debuginfo-11.8.5-160000.1.1 * mariadb-bench-11.8.5-160000.1.1 * mariadb-11.8.5-160000.1.1 * mariadb-tools-11.8.5-160000.1.1 * libmariadbd19-debuginfo-11.8.5-160000.1.1 * mariadb-tools-debuginfo-11.8.5-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * mariadb-errormessages-11.8.5-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-13699.html * https://bugzilla.suse.com/show_bug.cgi?id=1243040 * https://bugzilla.suse.com/show_bug.cgi?id=1252162 * https://bugzilla.suse.com/show_bug.cgi?id=1254313 * https://bugzilla.suse.com/show_bug.cgi?id=1254476 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 20:31:42 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 20:31:42 -0000 Subject: SUSE-RU-2026:20017-1: moderate: Recommended update for wicked2nm Message-ID: <176799070291.22169.3784957398079297337@smelt2.prg2.suse.org> # Recommended update for wicked2nm Announcement ID: SUSE-RU-2026:20017-1 Release Date: 2025-12-22T10:29:06Z Rating: moderate References: Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that can now be installed. ## Description: This update for wicked2nm fixes the following issues: * Update to v1.4.0 * Activate only connections if present in the current system * Improve error output, exit codes and add flag to disable user hints * Add support for autoip-fallback ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-117=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-117=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * wicked2nm-debugsource-1.4.0-160000.1.1 * wicked2nm-debuginfo-1.4.0-160000.1.1 * wicked2nm-1.4.0-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * wicked2nm-debugsource-1.4.0-160000.1.1 * wicked2nm-debuginfo-1.4.0-160000.1.1 * wicked2nm-1.4.0-160000.1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 20:31:44 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 20:31:44 -0000 Subject: SUSE-SU-2026:20016-1: low: Security update for fontforge Message-ID: <176799070482.22169.11121431628130591442@smelt2.prg2.suse.org> # Security update for fontforge Announcement ID: SUSE-SU-2026:20016-1 Release Date: 2025-12-22T10:04:31Z Rating: low References: * bsc#1252652 Cross-References: * CVE-2025-50949 CVSS scores: * CVE-2025-50949 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-50949 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-50949 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability can now be installed. ## Description: This update for fontforge fixes the following issues: * CVE-2025-50949: Fixed memory leak in function DlgCreate8 (bsc#1252652). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-115=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-115=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * fontforge-debugsource-20230101-160000.3.1 * fontforge-devel-20230101-160000.3.1 * fontforge-debuginfo-20230101-160000.3.1 * fontforge-20230101-160000.3.1 * SUSE Linux Enterprise Server 16.0 (noarch) * fontforge-doc-20230101-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * fontforge-debugsource-20230101-160000.3.1 * fontforge-devel-20230101-160000.3.1 * fontforge-debuginfo-20230101-160000.3.1 * fontforge-20230101-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * fontforge-doc-20230101-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-50949.html * https://bugzilla.suse.com/show_bug.cgi?id=1252652 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 20:33:13 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 20:33:13 -0000 Subject: SUSE-SU-2026:20015-1: important: Security update for the Linux Kernel Message-ID: <176799079316.22169.8507369200505877151@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:20015-1 Release Date: 2025-12-19T17:38:16Z Rating: important References: * bsc#1235463 * bsc#1243474 * bsc#1245193 * bsc#1245431 * bsc#1245498 * bsc#1245499 * bsc#1246328 * bsc#1246843 * bsc#1247500 * bsc#1248792 * bsc#1249256 * bsc#1249397 * bsc#1249912 * bsc#1249977 * bsc#1249982 * bsc#1250034 * bsc#1250176 * bsc#1250237 * bsc#1250252 * bsc#1250705 * bsc#1250723 * bsc#1250746 * bsc#1251120 * bsc#1251817 * bsc#1252054 * bsc#1252063 * bsc#1252301 * bsc#1252303 * bsc#1252342 * bsc#1252352 * bsc#1252357 * bsc#1252681 * bsc#1252686 * bsc#1252763 * bsc#1252776 * bsc#1252779 * bsc#1252790 * bsc#1252794 * bsc#1252795 * bsc#1252808 * bsc#1252809 * bsc#1252817 * bsc#1252821 * bsc#1252824 * bsc#1252836 * bsc#1252845 * bsc#1252901 * bsc#1252912 * bsc#1252917 * bsc#1252919 * bsc#1252923 * bsc#1252928 * bsc#1253018 * bsc#1253155 * bsc#1253176 * bsc#1253238 * bsc#1253275 * bsc#1253318 * bsc#1253324 * bsc#1253328 * bsc#1253330 * bsc#1253342 * bsc#1253348 * bsc#1253349 * bsc#1253352 * bsc#1253355 * bsc#1253360 * bsc#1253362 * bsc#1253363 * bsc#1253367 * bsc#1253369 * bsc#1253386 * bsc#1253394 * bsc#1253395 * bsc#1253402 * bsc#1253403 * bsc#1253405 * bsc#1253407 * bsc#1253408 * bsc#1253409 * bsc#1253410 * bsc#1253412 * bsc#1253416 * bsc#1253421 * bsc#1253422 * bsc#1253423 * bsc#1253424 * bsc#1253425 * bsc#1253426 * bsc#1253427 * bsc#1253428 * bsc#1253431 * bsc#1253433 * bsc#1253436 * bsc#1253438 * bsc#1253440 * bsc#1253441 * bsc#1253443 * bsc#1253445 * bsc#1253448 * bsc#1253449 * bsc#1253450 * bsc#1253451 * bsc#1253453 * bsc#1253455 * bsc#1253456 * bsc#1253457 * bsc#1253463 * bsc#1253472 * bsc#1253622 * bsc#1253624 * bsc#1253635 * bsc#1253643 * bsc#1253647 * bsc#1254119 * bsc#1254181 * bsc#1254221 * bsc#1254308 * bsc#1254315 * jsc#PED-13611 * jsc#PED-13949 * jsc#PED-14062 * jsc#PED-14115 * jsc#PED-14353 Cross-References: * CVE-2022-50253 * CVE-2025-37916 * CVE-2025-38084 * CVE-2025-38085 * CVE-2025-38321 * CVE-2025-38728 * CVE-2025-39805 * CVE-2025-39819 * CVE-2025-39822 * CVE-2025-39831 * CVE-2025-39859 * CVE-2025-39897 * CVE-2025-39917 * CVE-2025-39944 * CVE-2025-39961 * CVE-2025-39980 * CVE-2025-39990 * CVE-2025-40001 * CVE-2025-40003 * CVE-2025-40006 * CVE-2025-40021 * CVE-2025-40024 * CVE-2025-40027 * CVE-2025-40031 * CVE-2025-40033 * CVE-2025-40038 * CVE-2025-40047 * CVE-2025-40053 * CVE-2025-40055 * CVE-2025-40059 * CVE-2025-40064 * CVE-2025-40070 * CVE-2025-40074 * CVE-2025-40075 * CVE-2025-40081 * CVE-2025-40083 * CVE-2025-40086 * CVE-2025-40098 * CVE-2025-40101 * CVE-2025-40102 * CVE-2025-40105 * CVE-2025-40107 * CVE-2025-40109 * CVE-2025-40110 * CVE-2025-40111 * CVE-2025-40115 * CVE-2025-40116 * CVE-2025-40118 * CVE-2025-40120 * CVE-2025-40121 * CVE-2025-40127 * CVE-2025-40129 * CVE-2025-40132 * CVE-2025-40133 * CVE-2025-40134 * CVE-2025-40135 * CVE-2025-40139 * CVE-2025-40140 * CVE-2025-40141 * CVE-2025-40142 * CVE-2025-40149 * CVE-2025-40153 * CVE-2025-40154 * CVE-2025-40156 * CVE-2025-40157 * CVE-2025-40158 * CVE-2025-40159 * CVE-2025-40161 * CVE-2025-40162 * CVE-2025-40164 * CVE-2025-40165 * CVE-2025-40166 * CVE-2025-40168 * CVE-2025-40169 * CVE-2025-40171 * CVE-2025-40172 * CVE-2025-40173 * CVE-2025-40175 * CVE-2025-40176 * CVE-2025-40177 * CVE-2025-40178 * CVE-2025-40180 * CVE-2025-40183 * CVE-2025-40185 * CVE-2025-40186 * CVE-2025-40187 * CVE-2025-40188 * CVE-2025-40192 * CVE-2025-40194 * CVE-2025-40196 * CVE-2025-40197 * CVE-2025-40198 * CVE-2025-40200 * CVE-2025-40201 * CVE-2025-40202 * CVE-2025-40203 * CVE-2025-40204 * CVE-2025-40205 * CVE-2025-40206 * CVE-2025-40207 CVSS scores: * CVE-2022-50253 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50253 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37916 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-37916 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37916 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38084 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38084 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38084 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38085 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-38085 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-38085 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38321 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38321 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38321 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38728 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38728 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39819 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39831 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39897 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39897 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39897 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39917 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-39917 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2025-39917 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39961 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-39961 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-39980 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39980 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39990 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40001 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40001 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40003 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40003 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40006 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40021 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-40021 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2025-40024 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40027 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40027 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40031 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40033 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40038 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40047 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40047 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40053 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40055 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40059 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40083 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40086 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40086 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40098 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40101 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40101 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40102 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40102 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-40105 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40105 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40107 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40109 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40110 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40110 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40111 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40115 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40115 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40118 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40118 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40120 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40121 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40121 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40127 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40129 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40129 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40132 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40133 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40133 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2025-40134 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40134 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40135 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40135 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40139 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40139 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40140 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40140 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40141 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40141 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40142 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40142 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40149 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40149 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40153 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40153 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40154 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40154 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40157 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40157 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40158 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40158 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40159 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40159 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40161 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40161 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40162 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40164 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40165 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40165 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40166 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40166 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40168 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40168 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40169 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40169 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40171 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40171 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40172 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40173 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40173 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40175 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40175 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40176 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40176 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40177 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40177 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-40178 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40180 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40180 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40183 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40183 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40186 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40186 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40187 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40192 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40194 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40194 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40196 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40196 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40197 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40198 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40200 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40202 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40203 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-40205 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40206 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40206 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40207 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves 100 vulnerabilities, contains five features and has 19 fixes can now be installed. ## Description: The SUSE Linux Enterprise 16.0 kernel was updated to fix various security issues The following security issues were fixed: * CVE-2022-50253: bpf: make sure skb->len != 0 when redirecting to a tunneling device (bsc#1249912). * CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474). * CVE-2025-38084: mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431 bsc#1245498). * CVE-2025-38085: mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431 bsc#1245499). * CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328). * CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256). * CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982). * CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176). * CVE-2025-39822: io_uring/kbuf: fix signedness in this_len calculation (bsc#1250034). * CVE-2025-39831: fbnic: Move phylink resume out of service_task and into open/close (bsc#1249977). * CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252). * CVE-2025-39897: net: xilinx: axienet: Add error handling for RX metadata pointer retrieval (bsc#1250746). * CVE-2025-39917: bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt (bsc#1250723). * CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120). * CVE-2025-39961: iommu/amd/pgtbl: Fix possible race while increase page table level (bsc#1251817). * CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063). * CVE-2025-39990: bpf: Check the helper function is valid in get_helper_proto (bsc#1252054). * CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303). * CVE-2025-40003: net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work (bsc#1252301). * CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342). * CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681). * CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686). * CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763). * CVE-2025-40031: tee: fix register_shm_helper() (bsc#1252779). * CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824). * CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid (bsc#1252817). * CVE-2025-40047: io_uring/waitid: always prune wait queue entry in io_waitid_wait() (bsc#1252790). * CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808). * CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821). * CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809). * CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845). * CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836). * CVE-2025-40074: tcp: convert to dev_net_rcu() (bsc#1252794). * CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795). * CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776). * CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912). * CVE-2025-40086: drm/xe: Don't allow evicting of BOs in same VM in array of VM binds (bsc#1252923). * CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917). * CVE-2025-40101: btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST (bsc#1252901). * CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919). * CVE-2025-40105: vfs: Don't leak disconnected dentries on umount (bsc#1252928). * CVE-2025-40133: mptcp: Call dst_release() in mptcp_active_enable() (bsc#1253328). * CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386). * CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342). * CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409). * CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355). * CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408). * CVE-2025-40157: EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller (bsc#1253423). * CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402). * CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403). * CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427). * CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416). * CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421). * CVE-2025-40175: idpf: cleanup remaining SKBs in PTP flows (bsc#1253426). * CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425). * CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463). * CVE-2025-40185: ice: ice_adapter: release xa entry on adapter allocation failure (bsc#1253394). * CVE-2025-40201: kernel/sys.c: fix the racy usage of task_lock(tsk->group_leader) in sys_prlimit64() paths (bsc#1253455). * CVE-2025-40203: listmount: don't call path_put() under namespace semaphore (bsc#1253457). The following non security issues were fixed: * ACPI: scan: Update honor list for RPMI System MSI (stable-fixes). * ACPICA: Update dsmethod.c to get rid of unused variable warning (stable- fixes). * Disable CONFIG_CPU5_WDT The cpu5wdt driver doesn't implement a proper watchdog interface and has many code issues. It only handles obscure and obsolete hardware. Stop building and supporting this driver (jsc#PED-14062). * Fix "drm/xe: Don't allow evicting of BOs in same VM in array of VM binds" (bsc#1252923) * KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git- fixes). * KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes). * KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git- fixes). * KVM: s390: improve interrupt cpu for wakeup (bsc#1235463). * KVM: s390: kABI backport for 'last_sleep_cpu' (bsc#1252352). * KVM: x86/mmu: Return -EAGAIN if userspace deletes/moves memslot during prefault (git-fixes). * PCI/ERR: Update device error_state already after reset (stable-fixes). * PM: EM: Slightly reduce em_check_capacity_update() overhead (stable-fixes). * Revert "net/mlx5e: Update and set Xon/Xoff upon MTU set" (git-fixes). * Revert "net/mlx5e: Update and set Xon/Xoff upon port speed set" (git-fixes). * Update config files: enable zstd module decompression (jsc#PED-14115). * bpf/selftests: Fix test_tcpnotify_user (bsc#1253635). * btrfs: do not clear read-only when adding sprout device (bsc#1253238). * btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes). * dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386) * drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes). * drm/amd/display: update color on atomic commit time (stable-fixes). * drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes). * drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable- fixes). * hwmon: (lenovo-ec-sensors) Update P8 supprt (stable-fixes). * media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes). * mount: handle NULL values in mnt_ns_release() (bsc#1254308) * net/smc: Remove validation of reserved bits in CLC Decline (bsc#1252357). * net: phy: move realtek PHY driver to its own subdirectory (jsc#PED-14353). * net: phy: realtek: add defines for shadowed c45 standard registers (jsc#PED-14353). * net: phy: realtek: add helper RTL822X_VND2_C22_REG (jsc#PED-14353). * net: phy: realtek: change order of calls in C22 read_status() (jsc#PED-14353). * net: phy: realtek: clear 1000Base-T link partner advertisement (jsc#PED-14353). * net: phy: realtek: improve mmd register access for internal PHY's (jsc#PED-14353). * net: phy: realtek: read duplex and gbit master from PHYSR register (jsc#PED-14353). * net: phy: realtek: switch from paged to MMD ops in rtl822x functions (jsc#PED-14353). * net: phy: realtek: use string choices helpers (jsc#PED-14353). * net: xilinx: axienet: Fix IRQ coalescing packet count overflow (bsc#1250746) * net: xilinx: axienet: Fix RX skb ring management in DMAengine mode (bsc#1250746) * net: xilinx: axienet: Fix Tx skb circular buffer occupancy check in dmaengine xmit (bsc#1250746) * nvmet-auth: update sc_c in host response (git-fixes bsc#1249397). * nvmet-auth: update sc_c in target host hash calculation (git-fixes). * perf list: Add IBM z17 event descriptions (jsc#PED-13611). * platform/x86:intel/pmc: Update Arrow Lake telemetry GUID (git-fixes). * powercap: intel_rapl: Add support for Panther Lake platform (jsc#PED-13949). * pwm: pca9685: Use bulk write to atomicially update registers (stable-fixes). * r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353). * r8169: add support for Intel Killer E5000 (jsc#PED-14353). * r8169: add support for RTL8125BP rev.b (jsc#PED-14353). * r8169: add support for RTL8125D rev.b (jsc#PED-14353). * r8169: adjust version numbering for RTL8126 (jsc#PED-14353). * r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353). * r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353). * r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353). * r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers (jsc#PED-14353). * r8169: avoid duplicated messages if loading firmware fails and switch to warn level (jsc#PED-14353). * r8169: don't take RTNL lock in rtl_task() (jsc#PED-14353). * r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353). * r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353). * r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats (jsc#PED-14353). * r8169: implement additional ethtool stats ops (jsc#PED-14353). * r8169: improve __rtl8169_set_wol (jsc#PED-14353). * r8169: improve initialization of RSS registers on RTL8125/RTL8126 (jsc#PED-14353). * r8169: improve rtl_set_d3_pll_down (jsc#PED-14353). * r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353). * r8169: remove leftover locks after reverted change (jsc#PED-14353). * r8169: remove original workaround for RTL8125 broken rx issue (jsc#PED-14353). * r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353). * r8169: remove support for chip version 11 (jsc#PED-14353). * r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353). * r8169: replace custom flag with disable_work() et al (jsc#PED-14353). * r8169: switch away from deprecated pcim_iomap_table (jsc#PED-14353). * r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config (jsc#PED-14353). * ring-buffer: Update pages_touched to reflect persistent buffer content (git- fixes). * s390/mm: Fix __ptep_rdp() inline assembly (bsc#1253643). * sched/fair: Get rid of sched_domains_curr_level hack for tl->cpumask() (bsc#1246843). * sched/fair: Have SD_SERIALIZE affect newidle balancing (bsc#1248792). * sched/fair: Proportional newidle balance (bsc#1248792). * sched/fair: Proportional newidle balance -KABI (bsc#1248792). * sched/fair: Revert max_newidle_lb_cost bump (bsc#1248792). * sched/fair: Skip sched_balance_running cmpxchg when balance is not due (bsc#1248792). * sched/fair: Small cleanup to sched_balance_newidle() (bsc#1248792). * sched/fair: Small cleanup to update_newidle_cost() (bsc#1248792). * scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119). * scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119). * scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119). * scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119). * scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119). * scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119). * scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119). * scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119). * scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119). * scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119). * selftests/run_kselftest.sh: Add `--skip` argument option (bsc#1254221). * smpboot: introduce SDTL_INIT() helper to tidy sched topology setup (bsc#1246843). * soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes). * spi: tegra210-quad: Check hardware status on timeout (bsc#1253155) * spi: tegra210-quad: Fix timeout handling (bsc#1253155) * spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155) * spi: tegra210-quad: Update dummy sequence configuration (git-fixes) * tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork (bsc#1250705). * wifi: ath11k: Add quirk entries for Thinkpad T14s Gen3 AMD (bsc#1254181). * wifi: mt76: do not add wcid entries to sta poll list during MCU reset (bsc#1254315). * wifi: mt76: introduce mt792x_config_mac_addr_list routine (bsc#1254315). * wifi: mt76: mt7925: Fix logical vs bitwise typo (bsc#1254315). * wifi: mt76: mt7925: Remove unnecessary if-check (bsc#1254315). * wifi: mt76: mt7925: Simplify HIF suspend handling to avoid suspend fail (bsc#1254315). * wifi: mt76: mt7925: add EHT control support based on the CLC data (bsc#1254315). * wifi: mt76: mt7925: add handler to hif suspend/resume event (bsc#1254315). * wifi: mt76: mt7925: add pci restore for hibernate (bsc#1254315). * wifi: mt76: mt7925: config the dwell time by firmware (bsc#1254315). * wifi: mt76: mt7925: extend MCU support for testmode (bsc#1254315). * wifi: mt76: mt7925: fix CLC command timeout when suspend/resume (bsc#1254315). * wifi: mt76: mt7925: fix missing hdr_trans_tlv command for broadcast wtbl (bsc#1254315). * wifi: mt76: mt7925: fix the unfinished command of regd_notifier before suspend (bsc#1254315). * wifi: mt76: mt7925: refine the txpower initialization flow (bsc#1254315). * wifi: mt76: mt7925: replace zero-length array with flexible-array member (bsc#1254315). * wifi: mt76: mt7925: update the channel usage when the regd domain changed (bsc#1254315). * wifi: mt76: mt7925e: fix too long of wifi resume time (bsc#1254315). * x86/smpboot: avoid SMT domain attach/destroy if SMT is not enabled (bsc#1246843). * x86/smpboot: moves x86_topology to static initialize and truncate (bsc#1246843). * x86/smpboot: remove redundant CONFIG_SCHED_SMT (bsc#1246843). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-113=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-113=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * kernel-devel-6.12.0-160000.8.1 * kernel-source-vanilla-6.12.0-160000.8.1 * kernel-source-6.12.0-160000.8.1 * kernel-macros-6.12.0-160000.8.1 * kernel-docs-html-6.12.0-160000.8.1 * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le x86_64) * kernel-default-base-6.12.0-160000.8.1.160000.2.5 * kernel-kvmsmall-debugsource-6.12.0-160000.8.1 * kernel-kvmsmall-debuginfo-6.12.0-160000.8.1 * kernel-kvmsmall-devel-6.12.0-160000.8.1 * SUSE Linux Enterprise Server 16.0 (aarch64 nosrc) * kernel-64kb-6.12.0-160000.8.1 * SUSE Linux Enterprise Server 16.0 (aarch64) * kernel-64kb-debugsource-6.12.0-160000.8.1 * kernel-64kb-devel-6.12.0-160000.8.1 * kernel-64kb-extra-6.12.0-160000.8.1 * kernel-64kb-debuginfo-6.12.0-160000.8.1 * kernel-64kb-extra-debuginfo-6.12.0-160000.8.1 * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64 nosrc) * kernel-default-6.12.0-160000.8.1 * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * kernel-default-debugsource-6.12.0-160000.8.1 * kernel-default-devel-6.12.0-160000.8.1 * kernel-syms-6.12.0-160000.8.1 * kernel-obs-qa-6.12.0-160000.8.1 * kernel-default-debuginfo-6.12.0-160000.8.1 * kernel-default-extra-6.12.0-160000.8.1 * kernel-default-extra-debuginfo-6.12.0-160000.8.1 * SUSE Linux Enterprise Server 16.0 (noarch nosrc) * kernel-docs-6.12.0-160000.8.1 * SUSE Linux Enterprise Server 16.0 (aarch64 nosrc ppc64le x86_64) * kernel-kvmsmall-6.12.0-160000.8.1 * SUSE Linux Enterprise Server 16.0 (x86_64) * kernel-default-vdso-6.12.0-160000.8.1 * kernel-kvmsmall-vdso-debuginfo-6.12.0-160000.8.1 * kernel-default-vdso-debuginfo-6.12.0-160000.8.1 * kernel-kvmsmall-vdso-6.12.0-160000.8.1 * kernel-default-devel-debuginfo-6.12.0-160000.8.1 * kernel-kvmsmall-devel-debuginfo-6.12.0-160000.8.1 * SUSE Linux Enterprise Server 16.0 (ppc64le s390x x86_64) * kernel-default-livepatch-6.12.0-160000.8.1 * SUSE Linux Enterprise Server 16.0 (nosrc s390x) * kernel-zfcpdump-6.12.0-160000.8.1 * SUSE Linux Enterprise Server 16.0 (s390x) * kernel-zfcpdump-debuginfo-6.12.0-160000.8.1 * kernel-zfcpdump-debugsource-6.12.0-160000.8.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * kernel-devel-6.12.0-160000.8.1 * kernel-source-vanilla-6.12.0-160000.8.1 * kernel-source-6.12.0-160000.8.1 * kernel-macros-6.12.0-160000.8.1 * kernel-docs-html-6.12.0-160000.8.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * dlm-kmp-default-6.12.0-160000.8.1 * kernel-default-debugsource-6.12.0-160000.8.1 * kernel-default-base-6.12.0-160000.8.1.160000.2.5 * cluster-md-kmp-default-debuginfo-6.12.0-160000.8.1 * dlm-kmp-default-debuginfo-6.12.0-160000.8.1 * gfs2-kmp-default-debuginfo-6.12.0-160000.8.1 * kernel-default-devel-6.12.0-160000.8.1 * kernel-default-livepatch-6.12.0-160000.8.1 * kernel-syms-6.12.0-160000.8.1 * gfs2-kmp-default-6.12.0-160000.8.1 * kernel-obs-qa-6.12.0-160000.8.1 * kernel-kvmsmall-devel-6.12.0-160000.8.1 * kernel-default-debuginfo-6.12.0-160000.8.1 * kernel-kvmsmall-debuginfo-6.12.0-160000.8.1 * kernel-default-extra-6.12.0-160000.8.1 * kernel-default-extra-debuginfo-6.12.0-160000.8.1 * kernel-kvmsmall-debugsource-6.12.0-160000.8.1 * cluster-md-kmp-default-6.12.0-160000.8.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (nosrc ppc64le x86_64) * kernel-kvmsmall-6.12.0-160000.8.1 * kernel-default-6.12.0-160000.8.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * kernel-default-vdso-6.12.0-160000.8.1 * kernel-kvmsmall-vdso-debuginfo-6.12.0-160000.8.1 * kernel-default-vdso-debuginfo-6.12.0-160000.8.1 * kernel-kvmsmall-vdso-6.12.0-160000.8.1 * kernel-default-devel-debuginfo-6.12.0-160000.8.1 * kernel-kvmsmall-devel-debuginfo-6.12.0-160000.8.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch nosrc) * kernel-docs-6.12.0-160000.8.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50253.html * https://www.suse.com/security/cve/CVE-2025-37916.html * https://www.suse.com/security/cve/CVE-2025-38084.html * https://www.suse.com/security/cve/CVE-2025-38085.html * https://www.suse.com/security/cve/CVE-2025-38321.html * https://www.suse.com/security/cve/CVE-2025-38728.html * https://www.suse.com/security/cve/CVE-2025-39805.html * https://www.suse.com/security/cve/CVE-2025-39819.html * https://www.suse.com/security/cve/CVE-2025-39822.html * https://www.suse.com/security/cve/CVE-2025-39831.html * https://www.suse.com/security/cve/CVE-2025-39859.html * https://www.suse.com/security/cve/CVE-2025-39897.html * https://www.suse.com/security/cve/CVE-2025-39917.html * https://www.suse.com/security/cve/CVE-2025-39944.html * https://www.suse.com/security/cve/CVE-2025-39961.html * https://www.suse.com/security/cve/CVE-2025-39980.html * https://www.suse.com/security/cve/CVE-2025-39990.html * https://www.suse.com/security/cve/CVE-2025-40001.html * https://www.suse.com/security/cve/CVE-2025-40003.html * https://www.suse.com/security/cve/CVE-2025-40006.html * https://www.suse.com/security/cve/CVE-2025-40021.html * https://www.suse.com/security/cve/CVE-2025-40024.html * https://www.suse.com/security/cve/CVE-2025-40027.html * https://www.suse.com/security/cve/CVE-2025-40031.html * https://www.suse.com/security/cve/CVE-2025-40033.html * https://www.suse.com/security/cve/CVE-2025-40038.html * https://www.suse.com/security/cve/CVE-2025-40047.html * https://www.suse.com/security/cve/CVE-2025-40053.html * https://www.suse.com/security/cve/CVE-2025-40055.html * https://www.suse.com/security/cve/CVE-2025-40059.html * https://www.suse.com/security/cve/CVE-2025-40064.html * https://www.suse.com/security/cve/CVE-2025-40070.html * https://www.suse.com/security/cve/CVE-2025-40074.html * https://www.suse.com/security/cve/CVE-2025-40075.html * https://www.suse.com/security/cve/CVE-2025-40081.html * https://www.suse.com/security/cve/CVE-2025-40083.html * https://www.suse.com/security/cve/CVE-2025-40086.html * https://www.suse.com/security/cve/CVE-2025-40098.html * https://www.suse.com/security/cve/CVE-2025-40101.html * https://www.suse.com/security/cve/CVE-2025-40102.html * https://www.suse.com/security/cve/CVE-2025-40105.html * https://www.suse.com/security/cve/CVE-2025-40107.html * https://www.suse.com/security/cve/CVE-2025-40109.html * https://www.suse.com/security/cve/CVE-2025-40110.html * https://www.suse.com/security/cve/CVE-2025-40111.html * https://www.suse.com/security/cve/CVE-2025-40115.html * https://www.suse.com/security/cve/CVE-2025-40116.html * https://www.suse.com/security/cve/CVE-2025-40118.html * https://www.suse.com/security/cve/CVE-2025-40120.html * https://www.suse.com/security/cve/CVE-2025-40121.html * https://www.suse.com/security/cve/CVE-2025-40127.html * https://www.suse.com/security/cve/CVE-2025-40129.html * https://www.suse.com/security/cve/CVE-2025-40132.html * https://www.suse.com/security/cve/CVE-2025-40133.html * https://www.suse.com/security/cve/CVE-2025-40134.html * https://www.suse.com/security/cve/CVE-2025-40135.html * https://www.suse.com/security/cve/CVE-2025-40139.html * https://www.suse.com/security/cve/CVE-2025-40140.html * https://www.suse.com/security/cve/CVE-2025-40141.html * https://www.suse.com/security/cve/CVE-2025-40142.html * https://www.suse.com/security/cve/CVE-2025-40149.html * https://www.suse.com/security/cve/CVE-2025-40153.html * https://www.suse.com/security/cve/CVE-2025-40154.html * https://www.suse.com/security/cve/CVE-2025-40156.html * https://www.suse.com/security/cve/CVE-2025-40157.html * https://www.suse.com/security/cve/CVE-2025-40158.html * https://www.suse.com/security/cve/CVE-2025-40159.html * https://www.suse.com/security/cve/CVE-2025-40161.html * https://www.suse.com/security/cve/CVE-2025-40162.html * https://www.suse.com/security/cve/CVE-2025-40164.html * https://www.suse.com/security/cve/CVE-2025-40165.html * https://www.suse.com/security/cve/CVE-2025-40166.html * https://www.suse.com/security/cve/CVE-2025-40168.html * https://www.suse.com/security/cve/CVE-2025-40169.html * https://www.suse.com/security/cve/CVE-2025-40171.html * https://www.suse.com/security/cve/CVE-2025-40172.html * https://www.suse.com/security/cve/CVE-2025-40173.html * https://www.suse.com/security/cve/CVE-2025-40175.html * https://www.suse.com/security/cve/CVE-2025-40176.html * https://www.suse.com/security/cve/CVE-2025-40177.html * https://www.suse.com/security/cve/CVE-2025-40178.html * https://www.suse.com/security/cve/CVE-2025-40180.html * https://www.suse.com/security/cve/CVE-2025-40183.html * https://www.suse.com/security/cve/CVE-2025-40185.html * https://www.suse.com/security/cve/CVE-2025-40186.html * https://www.suse.com/security/cve/CVE-2025-40187.html * https://www.suse.com/security/cve/CVE-2025-40188.html * https://www.suse.com/security/cve/CVE-2025-40192.html * https://www.suse.com/security/cve/CVE-2025-40194.html * https://www.suse.com/security/cve/CVE-2025-40196.html * https://www.suse.com/security/cve/CVE-2025-40197.html * https://www.suse.com/security/cve/CVE-2025-40198.html * https://www.suse.com/security/cve/CVE-2025-40200.html * https://www.suse.com/security/cve/CVE-2025-40201.html * https://www.suse.com/security/cve/CVE-2025-40202.html * https://www.suse.com/security/cve/CVE-2025-40203.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://www.suse.com/security/cve/CVE-2025-40205.html * https://www.suse.com/security/cve/CVE-2025-40206.html * https://www.suse.com/security/cve/CVE-2025-40207.html * https://bugzilla.suse.com/show_bug.cgi?id=1235463 * https://bugzilla.suse.com/show_bug.cgi?id=1243474 * https://bugzilla.suse.com/show_bug.cgi?id=1245193 * https://bugzilla.suse.com/show_bug.cgi?id=1245431 * https://bugzilla.suse.com/show_bug.cgi?id=1245498 * https://bugzilla.suse.com/show_bug.cgi?id=1245499 * https://bugzilla.suse.com/show_bug.cgi?id=1246328 * https://bugzilla.suse.com/show_bug.cgi?id=1246843 * https://bugzilla.suse.com/show_bug.cgi?id=1247500 * https://bugzilla.suse.com/show_bug.cgi?id=1248792 * https://bugzilla.suse.com/show_bug.cgi?id=1249256 * https://bugzilla.suse.com/show_bug.cgi?id=1249397 * https://bugzilla.suse.com/show_bug.cgi?id=1249912 * https://bugzilla.suse.com/show_bug.cgi?id=1249977 * https://bugzilla.suse.com/show_bug.cgi?id=1249982 * https://bugzilla.suse.com/show_bug.cgi?id=1250034 * https://bugzilla.suse.com/show_bug.cgi?id=1250176 * https://bugzilla.suse.com/show_bug.cgi?id=1250237 * https://bugzilla.suse.com/show_bug.cgi?id=1250252 * https://bugzilla.suse.com/show_bug.cgi?id=1250705 * https://bugzilla.suse.com/show_bug.cgi?id=1250723 * https://bugzilla.suse.com/show_bug.cgi?id=1250746 * https://bugzilla.suse.com/show_bug.cgi?id=1251120 * https://bugzilla.suse.com/show_bug.cgi?id=1251817 * https://bugzilla.suse.com/show_bug.cgi?id=1252054 * https://bugzilla.suse.com/show_bug.cgi?id=1252063 * https://bugzilla.suse.com/show_bug.cgi?id=1252301 * https://bugzilla.suse.com/show_bug.cgi?id=1252303 * https://bugzilla.suse.com/show_bug.cgi?id=1252342 * https://bugzilla.suse.com/show_bug.cgi?id=1252352 * https://bugzilla.suse.com/show_bug.cgi?id=1252357 * https://bugzilla.suse.com/show_bug.cgi?id=1252681 * https://bugzilla.suse.com/show_bug.cgi?id=1252686 * https://bugzilla.suse.com/show_bug.cgi?id=1252763 * https://bugzilla.suse.com/show_bug.cgi?id=1252776 * https://bugzilla.suse.com/show_bug.cgi?id=1252779 * https://bugzilla.suse.com/show_bug.cgi?id=1252790 * https://bugzilla.suse.com/show_bug.cgi?id=1252794 * https://bugzilla.suse.com/show_bug.cgi?id=1252795 * https://bugzilla.suse.com/show_bug.cgi?id=1252808 * https://bugzilla.suse.com/show_bug.cgi?id=1252809 * https://bugzilla.suse.com/show_bug.cgi?id=1252817 * https://bugzilla.suse.com/show_bug.cgi?id=1252821 * https://bugzilla.suse.com/show_bug.cgi?id=1252824 * https://bugzilla.suse.com/show_bug.cgi?id=1252836 * https://bugzilla.suse.com/show_bug.cgi?id=1252845 * https://bugzilla.suse.com/show_bug.cgi?id=1252901 * https://bugzilla.suse.com/show_bug.cgi?id=1252912 * https://bugzilla.suse.com/show_bug.cgi?id=1252917 * https://bugzilla.suse.com/show_bug.cgi?id=1252919 * https://bugzilla.suse.com/show_bug.cgi?id=1252923 * https://bugzilla.suse.com/show_bug.cgi?id=1252928 * https://bugzilla.suse.com/show_bug.cgi?id=1253018 * https://bugzilla.suse.com/show_bug.cgi?id=1253155 * https://bugzilla.suse.com/show_bug.cgi?id=1253176 * https://bugzilla.suse.com/show_bug.cgi?id=1253238 * https://bugzilla.suse.com/show_bug.cgi?id=1253275 * https://bugzilla.suse.com/show_bug.cgi?id=1253318 * https://bugzilla.suse.com/show_bug.cgi?id=1253324 * https://bugzilla.suse.com/show_bug.cgi?id=1253328 * https://bugzilla.suse.com/show_bug.cgi?id=1253330 * https://bugzilla.suse.com/show_bug.cgi?id=1253342 * https://bugzilla.suse.com/show_bug.cgi?id=1253348 * https://bugzilla.suse.com/show_bug.cgi?id=1253349 * https://bugzilla.suse.com/show_bug.cgi?id=1253352 * https://bugzilla.suse.com/show_bug.cgi?id=1253355 * https://bugzilla.suse.com/show_bug.cgi?id=1253360 * https://bugzilla.suse.com/show_bug.cgi?id=1253362 * https://bugzilla.suse.com/show_bug.cgi?id=1253363 * https://bugzilla.suse.com/show_bug.cgi?id=1253367 * https://bugzilla.suse.com/show_bug.cgi?id=1253369 * https://bugzilla.suse.com/show_bug.cgi?id=1253386 * https://bugzilla.suse.com/show_bug.cgi?id=1253394 * https://bugzilla.suse.com/show_bug.cgi?id=1253395 * https://bugzilla.suse.com/show_bug.cgi?id=1253402 * https://bugzilla.suse.com/show_bug.cgi?id=1253403 * https://bugzilla.suse.com/show_bug.cgi?id=1253405 * https://bugzilla.suse.com/show_bug.cgi?id=1253407 * https://bugzilla.suse.com/show_bug.cgi?id=1253408 * https://bugzilla.suse.com/show_bug.cgi?id=1253409 * https://bugzilla.suse.com/show_bug.cgi?id=1253410 * https://bugzilla.suse.com/show_bug.cgi?id=1253412 * https://bugzilla.suse.com/show_bug.cgi?id=1253416 * https://bugzilla.suse.com/show_bug.cgi?id=1253421 * https://bugzilla.suse.com/show_bug.cgi?id=1253422 * https://bugzilla.suse.com/show_bug.cgi?id=1253423 * https://bugzilla.suse.com/show_bug.cgi?id=1253424 * https://bugzilla.suse.com/show_bug.cgi?id=1253425 * https://bugzilla.suse.com/show_bug.cgi?id=1253426 * https://bugzilla.suse.com/show_bug.cgi?id=1253427 * https://bugzilla.suse.com/show_bug.cgi?id=1253428 * https://bugzilla.suse.com/show_bug.cgi?id=1253431 * https://bugzilla.suse.com/show_bug.cgi?id=1253433 * https://bugzilla.suse.com/show_bug.cgi?id=1253436 * https://bugzilla.suse.com/show_bug.cgi?id=1253438 * https://bugzilla.suse.com/show_bug.cgi?id=1253440 * https://bugzilla.suse.com/show_bug.cgi?id=1253441 * https://bugzilla.suse.com/show_bug.cgi?id=1253443 * https://bugzilla.suse.com/show_bug.cgi?id=1253445 * https://bugzilla.suse.com/show_bug.cgi?id=1253448 * https://bugzilla.suse.com/show_bug.cgi?id=1253449 * https://bugzilla.suse.com/show_bug.cgi?id=1253450 * https://bugzilla.suse.com/show_bug.cgi?id=1253451 * https://bugzilla.suse.com/show_bug.cgi?id=1253453 * https://bugzilla.suse.com/show_bug.cgi?id=1253455 * https://bugzilla.suse.com/show_bug.cgi?id=1253456 * https://bugzilla.suse.com/show_bug.cgi?id=1253457 * https://bugzilla.suse.com/show_bug.cgi?id=1253463 * https://bugzilla.suse.com/show_bug.cgi?id=1253472 * https://bugzilla.suse.com/show_bug.cgi?id=1253622 * https://bugzilla.suse.com/show_bug.cgi?id=1253624 * https://bugzilla.suse.com/show_bug.cgi?id=1253635 * https://bugzilla.suse.com/show_bug.cgi?id=1253643 * https://bugzilla.suse.com/show_bug.cgi?id=1253647 * https://bugzilla.suse.com/show_bug.cgi?id=1254119 * https://bugzilla.suse.com/show_bug.cgi?id=1254181 * https://bugzilla.suse.com/show_bug.cgi?id=1254221 * https://bugzilla.suse.com/show_bug.cgi?id=1254308 * https://bugzilla.suse.com/show_bug.cgi?id=1254315 * https://jira.suse.com/browse/PED-13611 * https://jira.suse.com/browse/PED-13949 * https://jira.suse.com/browse/PED-14062 * https://jira.suse.com/browse/PED-14115 * https://jira.suse.com/browse/PED-14353 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 20:33:16 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 20:33:16 -0000 Subject: SUSE-SU-2026:0087-1: moderate: Security update for libheif Message-ID: <176799079642.22169.3034459532158213475@smelt2.prg2.suse.org> # Security update for libheif Announcement ID: SUSE-SU-2026:0087-1 Release Date: 2026-01-09T15:19:45Z Rating: moderate References: * bsc#1255735 Cross-References: * CVE-2025-68431 CVSS scores: * CVE-2025-68431 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68431 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-68431 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Desktop Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for libheif fixes the following issues: * CVE-2025-68431: Fixed heap buffer over-read in `HeifPixelImage::overlay()` via crafted HEIF that exercises the overlay image item (bsc#1255735) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-87=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-87=1 ## Package List: * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * libheif-devel-1.19.5-150700.3.3.1 * gdk-pixbuf-loader-libheif-1.19.5-150700.3.3.1 * libheif-debugsource-1.19.5-150700.3.3.1 * gdk-pixbuf-loader-libheif-debuginfo-1.19.5-150700.3.3.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libheif-debugsource-1.19.5-150700.3.3.1 * libheif1-1.19.5-150700.3.3.1 * libheif1-debuginfo-1.19.5-150700.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-68431.html * https://bugzilla.suse.com/show_bug.cgi?id=1255735 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 20:33:20 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 20:33:20 -0000 Subject: SUSE-SU-2026:0086-1: moderate: Security update for php8 Message-ID: <176799080039.22169.7328660765249072641@smelt2.prg2.suse.org> # Security update for php8 Announcement ID: SUSE-SU-2026:0086-1 Release Date: 2026-01-09T15:01:56Z Rating: moderate References: * bsc#1255710 * bsc#1255711 * bsc#1255712 Cross-References: * CVE-2025-14177 * CVE-2025-14178 * CVE-2025-14180 CVSS scores: * CVE-2025-14177 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N * CVE-2025-14177 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-14177 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-14177 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-14178 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-14178 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2025-14178 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2025-14180 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-14180 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-14180 ( NVD ): 8.2 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * Web and Scripting Module 15-SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for php8 fixes the following issues: Security fixes: * CVE-2025-14177: getimagesize() function may leak uninitialized heap memory into the APPn segments when reading images in multi-chunk mode (bsc#1255710). * CVE-2025-14178: heap buffer overflow occurs in array_merge() when the total element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE (bsc#1255711). * CVE-2025-14180: null pointer dereference in pdo_parse_params() function when using the PDO PostgreSQL driver with PDO::ATTR_EMULATE_PREPARES enabled (bsc#1255712). Other fixes: Version 8.3.29 Core: Sync all boost.context files with release 1.86.0. Fixed bug GH-20435 (SensitiveParameter doesn't work for named argument passing to variadic parameter). Fixed bug GH-20286 (use-after-destroy during userland stream_close()). Bz2: Fix assertion failures resulting in crashes with stream filter object parameters. Date: Fix crashes when trying to instantiate uninstantiable classes via date static constructors. DOM: Fix missing NUL byte check on C14NFile(). Fibers: Fixed bug GH-20483 (ASAN stack overflow with fiber.stack_size INI small value). FTP: Fixed bug GH-20601 (ftp_connect overflow on timeout). GD: Fixed bug GH-20511 (imagegammacorrect out of range input/output values). Fixed bug GH-20602 (imagescale overflow with large height values). Intl: Fixed bug GH-20426 (Spoofchecker::setRestrictionLevel() error message suggests missing constants). LibXML: Fix some deprecations on newer libxml versions regarding input buffer/parser handling. MbString: Fixed bug GH-20491 (SLES15 compile error with mbstring oniguruma). Fixed bug GH-20492 (mbstring compile warning due to non-strings). MySQLnd: Fixed bug GH-20528 (Regression breaks mysql connexion using an IPv6 address enclosed in square brackets). Opcache: Fixed bug GH-20329 (opcache.file_cache broken with full interned string buffer). PDO: Fixed GHSA-8xr5-qppj-gvwj (PDO quoting result null deref). (CVE-2025-14180) Phar: Fixed bug GH-20442 (Phar does not respect case- insensitiveness of __halt_compiler() when reading stub). Fix broken return value of fflush() for phar file entries. Fix assertion failure when fseeking a phar file out of bounds. PHPDBG: Fixed ZPP type violation in phpdbg_get_executable() and phpdbg_end_oplog(). SPL: Fixed bug GH-20614 (SplFixedArray incorrectly handles references in deserialization). Standard: Fix memory leak in array_diff() with custom type checks. Fixed bug GH-20583 (Stack overflow in http_build_query via deep structures). Fixed GHSA-www2-q4fc-65wf (Null byte termination in dns_get_record()). Fixed GHSA-h96m-rvf9-jgm2 (Heap buffer overflow in array_merge()). (CVE-2025-14178) Fixed GHSA-3237-qqm7-mfv7 (Information Leak of Memory in getimagesize). (CVE-2025-14177) Tidy: Fixed bug GH-20374 (PHP with tidy and custom-tags). XML: Fixed bug GH-20439 (xml_set_default_handler() does not properly handle special characters in attributes when passing data to callback). Zip: Fix crash in property existence test. Don't truncate return value of zip_fread() with user sizes. Zlib: Fix assertion failures resulting in crashes with stream filter object parameters. Version 8.3.28 Core: Fixed bug GH-19934 (CGI with auto_globals_jit=0 causes uouv). Fixed bug GH-20073 (Assertion failure in WeakMap offset operations on reference). Fixed bug GH-19844 (Don't bail when closing resources on shutdown). Fixed bug GH-20177 (Accessing overridden private property in get_object_vars() triggers assertion error). Fixed bug GH-20183 (Stale EG(opline_before_exception) pointer through eval). DOM: Partially fixed bug GH-16317 (DOM classes do not allow __debugInfo() overrides to work). Exif: Fix possible memory leak when tag is empty. FPM: Fixed bug GH-19974 (fpm_status_export_to_zval segfault for parallel execution). FTP: Fixed bug GH-20240 (FTP with SSL: ftp_fput(): Connection timed out on successful writes). GD: Fixed bug GH-20070 (Return type violation in imagefilter when an invalid filter is provided). Intl: Fix memory leak on error in locale_filter_matches(). LibXML: Fix not thread safe schema/relaxng calls. MySQLnd: Fixed bug GH-8978 (SSL certificate verification fails (port doubled)). Fixed bug GH-20122 (getColumnMeta() for JSON-column in MySQL). Opcache: Fixed bug GH-20081 (access to uninitialized vars in preload_load()). Fixed bug GH-20121 (JIT broken in ZTS builds on MacOS 15). PgSql: Fix memory leak when first string conversion fails. Fix segfaults when attempting to fetch row into a non-instantiable class name. Phar: Fix memory leak of argument in webPhar. Fix memory leak when setAlias() fails. Fix a bunch of memory leaks in phar_parse_zipfile() error handling. Fix file descriptor/memory leak when opening central fp fails. Fix memleak+UAF when opening temp stream in buildFromDirectory() fails. Fix potential buffer length truncation due to usage of type int instead of type size_t. Fix memory leak when openssl polyfill returns garbage. Fix file descriptor leak in phar_zip_flush() on failure. Fix memory leak when opening temp file fails while trying to open gzip-compressed archive. Fixed bug GH-20302 (Freeing a phar alias may invalidate PharFileInfo objects). Random: Fix Randomizer::__serialize() w.r.t. INDIRECTs. SimpleXML: Partially fixed bug GH-16317 (SimpleXML does not allow __debugInfo() overrides to work). Standard: Fix shm corruption with coercion in options of unserialize(). Streams: Fixed bug GH-19798: XP_SOCKET XP_SSL (Socket stream modules): Incorrect condition for Win32/Win64. Tidy: Fixed GH-19021 (improved tidyOptGetCategory detection). Fix UAF in tidy when tidySetErrorBuffer() fails. XMLReader: Fix arginfo/zpp violations when LIBXML_SCHEMAS_ENABLED is not available. Windows: Fix GH-19722 ( _get_osfhandle asserts in debug mode when given a socket). Zip: Fix memory leak when passing enc_method/enc_password is passed as option for ZipArchive::addGlob()/addPattern() and with consecutive calls. Version 8.3.27 Core: Fixed bug GH-19765 (object_properties_load() bypasses readonly property checks). Fixed hard_timeout with --enable-zend-max- execution-timers. Fixed bug GH-19792 (SCCP causes UAF for return value if both warning and exception are triggered). Fixed bug GH-19653 (Closure named argument unpacking between temporary closures can cause a crash). Fixed bug GH-19839 (Incorrect HASH_FLAG_HAS_EMPTY_IND flag on userland array). Fixed bug GH-19480 (error_log php.ini cannot be unset when open_basedir is configured). Fixed bug GH-20002 (Broken build on *BSD with MSAN). CLI: Fix useless "Failed to poll event" error logs due to EAGAIN in CLI server with PHP_CLI_SERVER_WORKERS. Curl: Fix cloning of CURLOPT_POSTFIELDS when using the clone operator instead of the curl_copy_handle() function to clone a CurlHandle. Fix curl build and test failures with version 8.16. Date: Fixed GH-17159: "P" format for ::createFromFormat swallows string literals. DBA: Fixed GH-19885 (dba_fetch() overflow on skip argument). GD: Fixed GH-19955 (imagefttext() memory leak). MySQLnd: Fixed bug #67563 (mysqli compiled with mysqlnd does not take ipv6 adress as parameter). Phar: Fix memory leak and invalid continuation after tar header writing fails. Fix memory leaks when creating temp file fails when applying zip signature. SimpleXML: Fixed bug GH-19988 (zend_string_init with NULL pointer in simplexml (UB)). Soap: Fixed bug GH-19784 (SoapServer memory leak). Fixed bug GH-20011 (Array of SoapVar of unknown type causes crash). Standard: Fixed bug GH-12265 (Cloning an object breaks serialization recursion). Fixed bug GH-19701 (Serialize/deserialize loses some data). Fixed bug GH-19801 (leaks in var_dump() and debug_zval_dump()). Fixed bug GH-20043 (array_unique assertion failure with RC1 array causing an exception on sort). Fixed bug GH-19926 (reset internal pointer earlier while splicing array while COW violation flag is still set). Fixed bug GH-19570 (unable to fseek in /dev/zero and /dev/null). Streams: Fixed bug GH-19248 (Use strerror_r instead of strerror in main). Fixed bug GH-17345 (Bug #35916 was not completely fixed). Fixed bug GH-19705 (segmentation when attempting to flush on non seekable stream. XMLReader: Fixed bug GH-20009 (XMLReader leak on RelaxNG schema failure). Zip: Fixed bug GH-19688 (Remove pattern overflow in zip addGlob()). Fixed bug GH-19932 (Memory leak in zip setEncryptionName()/setEncryptionIndex()). Zlib: Fixed bug GH-19922 (Double free on gzopen). Version 8.3.26 Core: Fixed bug GH-18850 (Repeated inclusion of file with __halt_compiler() triggers "Constant already defined" warning). Partially fixed bug GH-19542 (Scanning of string literals >=2GB will fail due to signed int overflow). Fixed bug GH-19544 (GC treats ZEND_WEAKREF_TAG_MAP references as WeakMap references). Fixed bug GH-19613 (Stale array iterator pointer). Fixed bug GH-19679 (zend_ssa_range_widening may fail to converge). Fixed bug GH-19681 (PHP_EXPAND_PATH broken with bash 5.3.0). Fixed bug GH-19720 (Assertion failure when error handler throws when accessing a deprecated constant). CLI: Fixed bug GH-19461 (Improve error message on listening error with IPv6 address). Date: Fixed date_sunrise() and date_sunset() with partial-hour UTC offset. DOM: Fixed bug GH-19612 (Mitigate libxml2 tree dictionary bug). FPM: Fixed failed debug assertion when php_admin_value setting fails. GD: Fixed bug GH-19579 (imagefilledellipse underflow on width argument). Intl: Fixed bug GH-11952 (Fix locale strings canonicalization for IntlDateFormatter and NumberFormatter). OpenSSL: Fixed bug GH-19245 (Success error message on TLS stream accept failure). PGSQL: Fixed bug GH-19485 (potential use after free when using persistent pgsql connections). Phar: Fixed memory leaks when verifying OpenSSL signature. Fix memory leak in phar tar temporary file error handling code. Fix metadata leak when phar convert logic fails. Fix memory leak on failure in phar_convert_to_other(). Fixed bug GH-19752 (Phar decompression with invalid extension can cause UAF). Standard: Fixed bug GH-16649 (UAF during array_splice). Fixed bug GH-19577 (Avoid integer overflow when using a small offset and PHP_INT_MAX with LimitIterator). Streams: Remove incorrect call to zval_ptr_dtor() in user_wrapper_metadata(). Fix OSS-Fuzz #385993744. Tidy: Fixed GH-19021 build issue with libtidy in regard of tidyOptIsReadonly deprecation and TidyInternalCategory being available later than tidyOptGetCategory. Zip: Fix memory leak in zip when encountering empty glob result. Version 8.3.25 Core: Fixed GH-19169 build issue with C++17 and ZEND_STATIC_ASSERT macro. Fixed bug GH-18581 (Coerce numeric string keys from iterators when argument unpacking). Fixed OSS-Fuzz #434346548 (Failed assertion with throwing __toString in binary const expr). Fixed bug GH-19305 (Operands may be being released during comparison). Fixed bug GH-19303 (Unpacking empty packed array into uninitialized array causes assertion failure). Fixed bug GH-19306 (Generator can be resumed while fetching next value from delegated Generator). Fixed bug GH-19326 (Calling Generator::throw() on a running generator with a non-Generator delegate crashes). Fixed bug GH-18736 (Circumvented type check with return by ref + finally). Fixed zend call stack size for macOs/arm64. Fixed bug GH-19065 (Long match statement can segfault compiler during recursive SSA renaming). Calendar: Fixed bug GH-19371 (integer overflow in calendar.c). FTP: Fix theoretical issues with hrtime() not being available. GD: Fix incorrect comparison with result of php_stream_can_cast(). Hash: Fix crash on clone failure. Intl: Fixed GH-19261: msgfmt_parse_message leaks on message creation failure. Fix return value on failure for resourcebundle count handler. LDAP: Fixed bug GH-18529 (additional inheriting of TLS int options). LibXML: Fixed bug GH-19098 (libxml<2.13 segmentation fault caused by php_libxml_node_free). MbString: Fixed bug GH-19397 (mb_list_encodings() can cause crashes on shutdown). Opcache: Reset global pointers to prevent use-after-free in zend_jit_status(). OpenSSL: Fixed bug GH-18986 (OpenSSL backend: incorrect RAND__file() return value check). Fix error return check of EVP_CIPHER_CTX_ctrl(). Fixed bug GH-19428 (openssl_pkey_derive segfaults for DH derive with low key_length param). PDO Pgsql: Fixed dangling pointer access on _pdo_pgsql_trim_message helper. Readline: Fixed bug GH-19250 and bug #51360 (Invalid conftest for rl_pending_input). SOAP: Fixed bug GH-18640 (heap-use-after-free ext/soap/php_encoding.c:299:32 in soap_check_zval_ref). Sockets: Fix some potential crashes on incorrect argument value. Standard: Fixed OSS Fuzz #433303828 (Leak in failed unserialize() with opcache). Fix theoretical issues with hrtime() not being available. Fixed bug GH-19300 (Nested array_multisort invocation with error breaks). Windows: Free opened_path when opened_path_len >= MAXPATHLEN. Version 8.3.24 Calendar: Fixed jewishtojd overflow on year argument. Core: Fixed bug GH-18833 (Use after free with weakmaps dependent on destruction order). Fix OSS-Fuzz #427814456. Fix OSS-Fuzz #428983568 and #428760800. Fixed bug GH-17204 -Wuseless-escape warnings emitted by re2c. Curl: Fix memory leaks when returning refcounted value from curl callback. Remove incorrect string release. LDAP: Fixed GH-18902 ldap_exop/ldap_exop_sync assert triggered on empty request OID. MbString: Fixed bug GH-18901 (integer overflow mb_split). OCI8: Fixed bug GH-18873 (OCI_RETURN_LOBS flag causes oci8 to leak memory). Opcache: Fixed bug GH-18639 (Internal class aliases can break preloading + JIT). Fixed bug GH-14082 (Segmentation fault on unknown address 0x600000000018 in ext/opcache/jit/zend_jit.c). OpenSSL: Fixed bug #80770 (It is not possible to get client peer certificate with stream_socket_server). PCNTL: Fixed bug GH-18958 (Fatal error during shutdown after pcntl_rfork() or pcntl_forkx() with zend-max-execution-timers). Phar: Fix stream double free in phar. Fix phar crash and file corruption with SplFileObject. SOAP: Fixed bug GH-18990, bug #81029, bug #47314 (SOAP HTTP socket not closing on object destruction). Fix memory leak when URL parsing fails in redirect. SPL: Fixed bug GH-19094 (Attaching class with no Iterator implementation to MultipleIterator causes crash). Standard: Fix misleading errors in printf(). Fix RCN violations in array functions. Fixed GH-18976 pack() overflow with h/H format and INT_MAX repeater value. Streams: Fixed GH-13264 (fgets() and stream_get_line() do not return false on filter fatal error). Zip: Fix leak when path is too long in ZipArchive::extractTo(). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Web and Scripting Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP7-2026-86=1 ## Package List: * Web and Scripting Module 15-SP7 (aarch64 ppc64le s390x x86_64) * php8-phar-8.3.29-150700.3.9.1 * php8-ftp-8.3.29-150700.3.9.1 * php8-calendar-debuginfo-8.3.29-150700.3.9.1 * php8-opcache-8.3.29-150700.3.9.1 * php8-sockets-debuginfo-8.3.29-150700.3.9.1 * php8-xmlreader-debuginfo-8.3.29-150700.3.9.1 * php8-embed-debugsource-8.3.29-150700.3.9.1 * php8-ftp-debuginfo-8.3.29-150700.3.9.1 * php8-intl-debuginfo-8.3.29-150700.3.9.1 * php8-dom-debuginfo-8.3.29-150700.3.9.1 * php8-posix-debuginfo-8.3.29-150700.3.9.1 * php8-sockets-8.3.29-150700.3.9.1 * php8-calendar-8.3.29-150700.3.9.1 * apache2-mod_php8-debuginfo-8.3.29-150700.3.9.1 * php8-pcntl-8.3.29-150700.3.9.1 * php8-tokenizer-8.3.29-150700.3.9.1 * php8-shmop-8.3.29-150700.3.9.1 * php8-xmlwriter-debuginfo-8.3.29-150700.3.9.1 * php8-embed-8.3.29-150700.3.9.1 * php8-test-8.3.29-150700.3.9.1 * php8-exif-8.3.29-150700.3.9.1 * php8-sodium-8.3.29-150700.3.9.1 * php8-curl-8.3.29-150700.3.9.1 * php8-intl-8.3.29-150700.3.9.1 * php8-xmlwriter-8.3.29-150700.3.9.1 * php8-posix-8.3.29-150700.3.9.1 * php8-tidy-8.3.29-150700.3.9.1 * php8-exif-debuginfo-8.3.29-150700.3.9.1 * php8-openssl-debuginfo-8.3.29-150700.3.9.1 * php8-pgsql-8.3.29-150700.3.9.1 * php8-sysvsem-8.3.29-150700.3.9.1 * php8-sqlite-8.3.29-150700.3.9.1 * php8-sqlite-debuginfo-8.3.29-150700.3.9.1 * php8-fpm-debugsource-8.3.29-150700.3.9.1 * php8-sysvshm-debuginfo-8.3.29-150700.3.9.1 * php8-fastcgi-debugsource-8.3.29-150700.3.9.1 * php8-sysvmsg-8.3.29-150700.3.9.1 * php8-pdo-debuginfo-8.3.29-150700.3.9.1 * php8-debuginfo-8.3.29-150700.3.9.1 * php8-sysvmsg-debuginfo-8.3.29-150700.3.9.1 * php8-gettext-8.3.29-150700.3.9.1 * php8-ctype-8.3.29-150700.3.9.1 * php8-cli-8.3.29-150700.3.9.1 * php8-gd-8.3.29-150700.3.9.1 * php8-mbstring-debuginfo-8.3.29-150700.3.9.1 * php8-fastcgi-debuginfo-8.3.29-150700.3.9.1 * php8-gmp-debuginfo-8.3.29-150700.3.9.1 * php8-bz2-debuginfo-8.3.29-150700.3.9.1 * php8-readline-8.3.29-150700.3.9.1 * php8-ctype-debuginfo-8.3.29-150700.3.9.1 * php8-8.3.29-150700.3.9.1 * php8-embed-debuginfo-8.3.29-150700.3.9.1 * php8-pgsql-debuginfo-8.3.29-150700.3.9.1 * php8-phar-debuginfo-8.3.29-150700.3.9.1 * php8-bcmath-debuginfo-8.3.29-150700.3.9.1 * php8-snmp-debuginfo-8.3.29-150700.3.9.1 * php8-fileinfo-debuginfo-8.3.29-150700.3.9.1 * php8-bz2-8.3.29-150700.3.9.1 * php8-dom-8.3.29-150700.3.9.1 * php8-xsl-debuginfo-8.3.29-150700.3.9.1 * php8-xmlreader-8.3.29-150700.3.9.1 * php8-enchant-8.3.29-150700.3.9.1 * php8-curl-debuginfo-8.3.29-150700.3.9.1 * php8-fpm-debuginfo-8.3.29-150700.3.9.1 * php8-gd-debuginfo-8.3.29-150700.3.9.1 * php8-debugsource-8.3.29-150700.3.9.1 * php8-fileinfo-8.3.29-150700.3.9.1 * php8-odbc-debuginfo-8.3.29-150700.3.9.1 * php8-ldap-8.3.29-150700.3.9.1 * php8-devel-8.3.29-150700.3.9.1 * php8-zip-debuginfo-8.3.29-150700.3.9.1 * php8-fpm-8.3.29-150700.3.9.1 * php8-tokenizer-debuginfo-8.3.29-150700.3.9.1 * php8-soap-debuginfo-8.3.29-150700.3.9.1 * php8-zip-8.3.29-150700.3.9.1 * php8-gmp-8.3.29-150700.3.9.1 * php8-openssl-8.3.29-150700.3.9.1 * php8-sysvsem-debuginfo-8.3.29-150700.3.9.1 * php8-readline-debuginfo-8.3.29-150700.3.9.1 * php8-sysvshm-8.3.29-150700.3.9.1 * php8-cli-debuginfo-8.3.29-150700.3.9.1 * php8-gettext-debuginfo-8.3.29-150700.3.9.1 * php8-enchant-debuginfo-8.3.29-150700.3.9.1 * php8-iconv-8.3.29-150700.3.9.1 * php8-dba-8.3.29-150700.3.9.1 * php8-opcache-debuginfo-8.3.29-150700.3.9.1 * php8-odbc-8.3.29-150700.3.9.1 * php8-mysql-8.3.29-150700.3.9.1 * php8-pcntl-debuginfo-8.3.29-150700.3.9.1 * php8-snmp-8.3.29-150700.3.9.1 * php8-dba-debuginfo-8.3.29-150700.3.9.1 * apache2-mod_php8-debugsource-8.3.29-150700.3.9.1 * php8-sodium-debuginfo-8.3.29-150700.3.9.1 * php8-zlib-debuginfo-8.3.29-150700.3.9.1 * php8-mysql-debuginfo-8.3.29-150700.3.9.1 * php8-ldap-debuginfo-8.3.29-150700.3.9.1 * php8-zlib-8.3.29-150700.3.9.1 * php8-mbstring-8.3.29-150700.3.9.1 * php8-bcmath-8.3.29-150700.3.9.1 * apache2-mod_php8-8.3.29-150700.3.9.1 * php8-fastcgi-8.3.29-150700.3.9.1 * php8-shmop-debuginfo-8.3.29-150700.3.9.1 * php8-soap-8.3.29-150700.3.9.1 * php8-tidy-debuginfo-8.3.29-150700.3.9.1 * php8-xsl-8.3.29-150700.3.9.1 * php8-pdo-8.3.29-150700.3.9.1 * php8-iconv-debuginfo-8.3.29-150700.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14177.html * https://www.suse.com/security/cve/CVE-2025-14178.html * https://www.suse.com/security/cve/CVE-2025-14180.html * https://bugzilla.suse.com/show_bug.cgi?id=1255710 * https://bugzilla.suse.com/show_bug.cgi?id=1255711 * https://bugzilla.suse.com/show_bug.cgi?id=1255712 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 9 20:33:23 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 09 Jan 2026 20:33:23 -0000 Subject: SUSE-SU-2026:0085-1: important: Security update for libpng16 Message-ID: <176799080379.22169.18014686118336015966@smelt2.prg2.suse.org> # Security update for libpng16 Announcement ID: SUSE-SU-2026:0085-1 Release Date: 2026-01-09T15:01:42Z Rating: important References: * bsc#1254480 Cross-References: * CVE-2025-66293 CVSS scores: * CVE-2025-66293 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-66293 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H * CVE-2025-66293 ( NVD ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libpng16 fixes the following issues: * CVE-2025-66293: out-of-bounds read of the `png_sRGB_base` array when processing palette PNG images with partial transparency and gamma correction (bsc#1254480). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-85=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-85=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libpng16-16-debuginfo-1.6.8-15.12.1 * libpng16-16-1.6.8-15.12.1 * libpng16-debugsource-1.6.8-15.12.1 * libpng16-devel-1.6.8-15.12.1 * libpng16-compat-devel-1.6.8-15.12.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libpng16-16-debuginfo-32bit-1.6.8-15.12.1 * libpng16-16-32bit-1.6.8-15.12.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libpng16-16-debuginfo-1.6.8-15.12.1 * libpng16-16-1.6.8-15.12.1 * libpng16-debugsource-1.6.8-15.12.1 * libpng16-16-32bit-1.6.8-15.12.1 * libpng16-16-debuginfo-32bit-1.6.8-15.12.1 * libpng16-devel-1.6.8-15.12.1 * libpng16-compat-devel-1.6.8-15.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-66293.html * https://bugzilla.suse.com/show_bug.cgi?id=1254480 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 12 16:30:07 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 12 Jan 2026 16:30:07 -0000 Subject: SUSE-SU-2026:0107-1: important: Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5) Message-ID: <176823540781.22169.15233197447982091523@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5) Announcement ID: SUSE-SU-2026:0107-1 Release Date: 2026-01-12T11:39:58Z Rating: important References: * bsc#1251984 Cross-References: * CVE-2023-53574 CVSS scores: * CVE-2023-53574 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53574 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.124 fixes one security issue The following security issue was fixed: * CVE-2023-53574: wifi: rtw88: delete timer and free skb queue when unloading (bsc#1251984). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-112=1 SUSE-2026-113=1 SUSE-2026-107=1 SUSE-2026-108=1 SUSE-2026-100=1 SUSE-2026-109=1 SUSE-2026-101=1 SUSE-2026-110=1 SUSE-2026-102=1 SUSE-2026-103=1 SUSE-2026-104=1 SUSE-2026-105=1 SUSE-2026-111=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-112=1 SUSE-SLE- Module-Live-Patching-15-SP4-2026-113=1 SUSE-SLE-Module-Live- Patching-15-SP4-2026-107=1 SUSE-SLE-Module-Live-Patching-15-SP4-2026-108=1 SUSE- SLE-Module-Live-Patching-15-SP4-2026-100=1 SUSE-SLE-Module-Live- Patching-15-SP4-2026-109=1 SUSE-SLE-Module-Live-Patching-15-SP4-2026-101=1 SUSE- SLE-Module-Live-Patching-15-SP4-2026-110=1 SUSE-SLE-Module-Live- Patching-15-SP4-2026-102=1 SUSE-SLE-Module-Live-Patching-15-SP4-2026-103=1 SUSE- SLE-Module-Live-Patching-15-SP4-2026-104=1 SUSE-SLE-Module-Live- Patching-15-SP4-2026-105=1 SUSE-SLE-Module-Live-Patching-15-SP4-2026-111=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-98=1 SUSE-2026-97=1 SUSE-2026-114=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-98=1 SUSE-SLE- Module-Live-Patching-15-SP5-2026-97=1 SUSE-SLE-Module-Live- Patching-15-SP5-2026-114=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_144-default-debuginfo-18-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_45-debugsource-3-150400.2.1 * kernel-livepatch-5_14_21-150400_24_158-default-debuginfo-11-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_42-debugsource-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_167-default-debuginfo-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_147-default-debuginfo-17-150400.2.1 * kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-11-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_40-debugsource-11-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_38-debugsource-11-150400.2.1 * kernel-livepatch-5_14_21-150400_24_179-default-3-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_35-debugsource-17-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_37-debugsource-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_164-default-11-150400.2.1 * kernel-livepatch-5_14_21-150400_24_161-default-11-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_44-debugsource-5-150400.2.1 * kernel-livepatch-5_14_21-150400_24_153-default-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_170-default-9-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_43-debugsource-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_176-default-5-150400.2.1 * kernel-livepatch-5_14_21-150400_24_141-default-19-150400.2.1 * kernel-livepatch-5_14_21-150400_24_141-default-debuginfo-19-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_34-debugsource-18-150400.2.1 * kernel-livepatch-5_14_21-150400_24_144-default-18-150400.2.1 * kernel-livepatch-5_14_21-150400_24_153-default-debuginfo-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_150-default-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_158-default-11-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_39-debugsource-11-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_36-debugsource-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_170-default-debuginfo-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_164-default-debuginfo-11-150400.2.1 * kernel-livepatch-5_14_21-150400_24_176-default-debuginfo-5-150400.2.1 * kernel-livepatch-5_14_21-150400_24_147-default-17-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_41-debugsource-10-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_33-debugsource-19-150400.2.1 * kernel-livepatch-5_14_21-150400_24_173-default-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_179-default-debuginfo-3-150400.2.1 * kernel-livepatch-5_14_21-150400_24_167-default-10-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_144-default-debuginfo-18-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_45-debugsource-3-150400.2.1 * kernel-livepatch-5_14_21-150400_24_158-default-debuginfo-11-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_42-debugsource-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_167-default-debuginfo-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_147-default-debuginfo-17-150400.2.1 * kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-11-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_40-debugsource-11-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_38-debugsource-11-150400.2.1 * kernel-livepatch-5_14_21-150400_24_179-default-3-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_35-debugsource-17-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_37-debugsource-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_164-default-11-150400.2.1 * kernel-livepatch-5_14_21-150400_24_161-default-11-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_44-debugsource-5-150400.2.1 * kernel-livepatch-5_14_21-150400_24_153-default-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_170-default-9-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_43-debugsource-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_176-default-5-150400.2.1 * kernel-livepatch-5_14_21-150400_24_141-default-19-150400.2.1 * kernel-livepatch-5_14_21-150400_24_141-default-debuginfo-19-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_34-debugsource-18-150400.2.1 * kernel-livepatch-5_14_21-150400_24_144-default-18-150400.2.1 * kernel-livepatch-5_14_21-150400_24_153-default-debuginfo-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_150-default-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_158-default-11-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_39-debugsource-11-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_36-debugsource-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_170-default-debuginfo-9-150400.2.1 * kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_164-default-debuginfo-11-150400.2.1 * kernel-livepatch-5_14_21-150400_24_176-default-debuginfo-5-150400.2.1 * kernel-livepatch-5_14_21-150400_24_147-default-17-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_41-debugsource-10-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_33-debugsource-19-150400.2.1 * kernel-livepatch-5_14_21-150400_24_173-default-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_179-default-debuginfo-3-150400.2.1 * kernel-livepatch-5_14_21-150400_24_167-default-10-150400.2.1 * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_31-debugsource-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_121-default-debuginfo-4-150500.2.1 * kernel-livepatch-5_14_21-150500_55_116-default-7-150500.2.1 * kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_121-default-4-150500.2.1 * kernel-livepatch-5_14_21-150500_55_124-default-2-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_30-debugsource-4-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_29-debugsource-7-150500.2.1 * kernel-livepatch-5_14_21-150500_55_116-default-debuginfo-7-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_31-debugsource-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_121-default-debuginfo-4-150500.2.1 * kernel-livepatch-5_14_21-150500_55_116-default-7-150500.2.1 * kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-2-150500.2.1 * kernel-livepatch-5_14_21-150500_55_121-default-4-150500.2.1 * kernel-livepatch-5_14_21-150500_55_124-default-2-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_30-debugsource-4-150500.2.1 * kernel-livepatch-5_14_21-150500_55_116-default-debuginfo-7-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x) * kernel-livepatch-SLE15-SP5_Update_29-debugsource-7-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53574.html * https://bugzilla.suse.com/show_bug.cgi?id=1251984 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 12 16:30:12 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 12 Jan 2026 16:30:12 -0000 Subject: SUSE-SU-2026:0090-1: important: Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) Message-ID: <176823541269.22169.15000452325969231447@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) Announcement ID: SUSE-SU-2026:0090-1 Release Date: 2026-01-12T11:05:02Z Rating: important References: * bsc#1246189 * bsc#1251984 Cross-References: * CVE-2023-53574 * CVE-2025-38257 CVSS scores: * CVE-2023-53574 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53574 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38257 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38257 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.113 fixes various security issues The following security issues were fixed: * CVE-2023-53574: wifi: rtw88: delete timer and free skb queue when unloading (bsc#1251984). * CVE-2025-38257: s390/pkey: prevent overflow in size calculation for memdup_user() (bsc#1246189). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-93=1 SUSE-2026-94=1 SUSE-2026-106=1 SUSE-2026-95=1 SUSE-2026-96=1 SUSE-2026-90=1 SUSE-2026-91=1 SUSE-2026-92=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-93=1 SUSE-SLE- Module-Live-Patching-15-SP5-2026-94=1 SUSE-SLE-Module-Live- Patching-15-SP5-2026-106=1 SUSE-SLE-Module-Live-Patching-15-SP5-2026-95=1 SUSE- SLE-Module-Live-Patching-15-SP5-2026-96=1 SUSE-SLE-Module-Live- Patching-15-SP5-2026-90=1 SUSE-SLE-Module-Live-Patching-15-SP5-2026-91=1 SUSE- SLE-Module-Live-Patching-15-SP5-2026-92=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_24-debugsource-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_94-default-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_22-debugsource-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_88-default-debuginfo-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_91-default-debuginfo-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_91-default-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_110-default-debuginfo-10-150500.2.1 * kernel-livepatch-5_14_21-150500_55_97-default-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_27-debugsource-10-150500.2.1 * kernel-livepatch-5_14_21-150500_55_103-default-debuginfo-11-150500.2.1 * kernel-livepatch-5_14_21-150500_55_97-default-debuginfo-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_28-debugsource-9-150500.2.1 * kernel-livepatch-5_14_21-150500_55_94-default-debuginfo-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_88-default-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_110-default-10-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_26-debugsource-11-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_23-debugsource-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_25-debugsource-11-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_21-debugsource-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_103-default-11-150500.2.1 * kernel-livepatch-5_14_21-150500_55_113-default-9-150500.2.1 * kernel-livepatch-5_14_21-150500_55_113-default-debuginfo-9-150500.2.1 * kernel-livepatch-5_14_21-150500_55_100-default-debuginfo-11-150500.2.1 * kernel-livepatch-5_14_21-150500_55_100-default-11-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_24-debugsource-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_94-default-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_22-debugsource-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_88-default-debuginfo-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_91-default-debuginfo-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_91-default-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_110-default-debuginfo-10-150500.2.1 * kernel-livepatch-5_14_21-150500_55_97-default-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_27-debugsource-10-150500.2.1 * kernel-livepatch-5_14_21-150500_55_103-default-debuginfo-11-150500.2.1 * kernel-livepatch-5_14_21-150500_55_97-default-debuginfo-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_28-debugsource-9-150500.2.1 * kernel-livepatch-5_14_21-150500_55_94-default-debuginfo-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_88-default-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_110-default-10-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_26-debugsource-11-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_23-debugsource-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_25-debugsource-11-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_21-debugsource-16-150500.2.1 * kernel-livepatch-5_14_21-150500_55_103-default-11-150500.2.1 * kernel-livepatch-5_14_21-150500_55_113-default-9-150500.2.1 * kernel-livepatch-5_14_21-150500_55_113-default-debuginfo-9-150500.2.1 * kernel-livepatch-5_14_21-150500_55_100-default-debuginfo-11-150500.2.1 * kernel-livepatch-5_14_21-150500_55_100-default-11-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53574.html * https://www.suse.com/security/cve/CVE-2025-38257.html * https://bugzilla.suse.com/show_bug.cgi?id=1246189 * https://bugzilla.suse.com/show_bug.cgi?id=1251984 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 12 16:30:16 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 12 Jan 2026 16:30:16 -0000 Subject: SUSE-RU-2026:0088-1: moderate: Recommended update for SLES12-SP4-SLES15-Migration,SLES12-SP4-SLES15-SAP-Migration Message-ID: <176823541684.22169.6278910588994678685@smelt2.prg2.suse.org> # Recommended update for SLES12-SP4-SLES15-Migration,SLES12-SP4-SLES15-SAP- Migration Announcement ID: SUSE-RU-2026:0088-1 Release Date: 2026-01-12T09:37:37Z Rating: moderate References: Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that can now be installed. ## Description: This update for SLES12-SP4-SLES15-Migration,SLES12-SP4-SLES15-SAP-Migration fixes the following issues: * Added SLES15-Migration and SLES15-SAP_Migration packages ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2026-88=1 ## Package List: * Public Cloud Module 12 (noarch) * suse-migration-scripts-2.1.29-6.36.1 * suse-migration-pre-checks-2.1.29-6.36.1 * python3-migration-2.1.29-6.36.1 * Public Cloud Module 12 (x86_64) * SLES15-SAP_Migration-2.1.29-6.7.1 * SLES15-Migration-2.1.29-6.67.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 12 16:30:15 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 12 Jan 2026 16:30:15 -0000 Subject: SUSE-SU-2026:0099-1: moderate: Security update for ImageMagick Message-ID: <176823541544.22169.5936835413300469729@smelt2.prg2.suse.org> # Security update for ImageMagick Announcement ID: SUSE-SU-2026:0099-1 Release Date: 2026-01-12T10:37:48Z Rating: moderate References: * bsc#1255821 Cross-References: * CVE-2025-68618 CVSS scores: * CVE-2025-68618 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-68618 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68618 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68618 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for ImageMagick fixes the following issues: * CVE-2025-68618: read a malicious SVG file may result in a DoS attack (bsc#1255821). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-99=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libMagickCore-6_Q16-1-debuginfo-6.8.8.1-71.224.1 * libMagick++-devel-6.8.8.1-71.224.1 * ImageMagick-debuginfo-6.8.8.1-71.224.1 * ImageMagick-devel-6.8.8.1-71.224.1 * ImageMagick-config-6-upstream-6.8.8.1-71.224.1 * libMagickWand-6_Q16-1-debuginfo-6.8.8.1-71.224.1 * libMagickCore-6_Q16-1-6.8.8.1-71.224.1 * ImageMagick-debugsource-6.8.8.1-71.224.1 * libMagickWand-6_Q16-1-6.8.8.1-71.224.1 * ImageMagick-config-6-SUSE-6.8.8.1-71.224.1 ## References: * https://www.suse.com/security/cve/CVE-2025-68618.html * https://bugzilla.suse.com/show_bug.cgi?id=1255821 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 12 20:30:05 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 12 Jan 2026 20:30:05 -0000 Subject: SUSE-SU-2026:0115-1: moderate: Security update for util-linux Message-ID: <176824980506.22147.6075905877015379723@smelt2.prg2.suse.org> # Security update for util-linux Announcement ID: SUSE-SU-2026:0115-1 Release Date: 2026-01-12T15:03:44Z Rating: moderate References: * bsc#1254666 * jsc#PED-13682 Cross-References: * CVE-2025-14104 CVSS scores: * CVE-2025-14104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-14104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-14104 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H Affected Products: * openSUSE Leap 15.6 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for util-linux fixes the following issues: * CVE-2025-14104: Fixed heap buffer overread in setpwnam() when processing 256-byte usernames (bsc#1254666). * lscpu: Add support for NVIDIA Olympus arm64 core (jsc#PED-13682). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-115=1 openSUSE-SLE-15.6-2026-115=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libmount1-2.39.3-150600.4.15.1 * libblkid-devel-2.39.3-150600.4.15.1 * libfdisk-devel-static-2.39.3-150600.4.15.1 * libuuid-devel-static-2.39.3-150600.4.15.1 * python3-libmount-debuginfo-2.39.3-150600.4.15.1 * libmount1-debuginfo-2.39.3-150600.4.15.1 * libsmartcols-devel-static-2.39.3-150600.4.15.1 * uuidd-2.39.3-150600.4.15.1 * libsmartcols1-2.39.3-150600.4.15.1 * util-linux-systemd-debugsource-2.39.3-150600.4.15.1 * libfdisk1-debuginfo-2.39.3-150600.4.15.1 * libfdisk1-2.39.3-150600.4.15.1 * libsmartcols-devel-2.39.3-150600.4.15.1 * libblkid1-debuginfo-2.39.3-150600.4.15.1 * util-linux-tty-tools-2.39.3-150600.4.15.1 * libblkid-devel-static-2.39.3-150600.4.15.1 * libfdisk-devel-2.39.3-150600.4.15.1 * uuidd-debuginfo-2.39.3-150600.4.15.1 * libuuid-devel-2.39.3-150600.4.15.1 * util-linux-2.39.3-150600.4.15.1 * util-linux-tty-tools-debuginfo-2.39.3-150600.4.15.1 * libmount-devel-static-2.39.3-150600.4.15.1 * libblkid1-2.39.3-150600.4.15.1 * libmount-devel-2.39.3-150600.4.15.1 * util-linux-debuginfo-2.39.3-150600.4.15.1 * util-linux-debugsource-2.39.3-150600.4.15.1 * libuuid1-2.39.3-150600.4.15.1 * util-linux-systemd-2.39.3-150600.4.15.1 * util-linux-systemd-debuginfo-2.39.3-150600.4.15.1 * libsmartcols1-debuginfo-2.39.3-150600.4.15.1 * python3-libmount-2.39.3-150600.4.15.1 * libuuid1-debuginfo-2.39.3-150600.4.15.1 * python-libmount-debugsource-2.39.3-150600.4.15.1 * openSUSE Leap 15.6 (x86_64) * libblkid1-32bit-debuginfo-2.39.3-150600.4.15.1 * libfdisk1-32bit-debuginfo-2.39.3-150600.4.15.1 * libmount1-32bit-debuginfo-2.39.3-150600.4.15.1 * libsmartcols-devel-32bit-2.39.3-150600.4.15.1 * libuuid-devel-32bit-2.39.3-150600.4.15.1 * libblkid-devel-32bit-2.39.3-150600.4.15.1 * libfdisk-devel-32bit-2.39.3-150600.4.15.1 * libuuid1-32bit-2.39.3-150600.4.15.1 * libsmartcols1-32bit-debuginfo-2.39.3-150600.4.15.1 * libmount1-32bit-2.39.3-150600.4.15.1 * libsmartcols1-32bit-2.39.3-150600.4.15.1 * libuuid1-32bit-debuginfo-2.39.3-150600.4.15.1 * libblkid1-32bit-2.39.3-150600.4.15.1 * libfdisk1-32bit-2.39.3-150600.4.15.1 * libmount-devel-32bit-2.39.3-150600.4.15.1 * openSUSE Leap 15.6 (noarch) * util-linux-lang-2.39.3-150600.4.15.1 * openSUSE Leap 15.6 (s390x) * util-linux-extra-debuginfo-2.39.3-150600.4.15.1 * util-linux-extra-2.39.3-150600.4.15.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libblkid-devel-64bit-2.39.3-150600.4.15.1 * libblkid1-64bit-2.39.3-150600.4.15.1 * libfdisk1-64bit-debuginfo-2.39.3-150600.4.15.1 * libsmartcols1-64bit-2.39.3-150600.4.15.1 * libfdisk-devel-64bit-2.39.3-150600.4.15.1 * libsmartcols1-64bit-debuginfo-2.39.3-150600.4.15.1 * libuuid-devel-64bit-2.39.3-150600.4.15.1 * libuuid1-64bit-2.39.3-150600.4.15.1 * libmount1-64bit-debuginfo-2.39.3-150600.4.15.1 * libfdisk1-64bit-2.39.3-150600.4.15.1 * libmount-devel-64bit-2.39.3-150600.4.15.1 * libmount1-64bit-2.39.3-150600.4.15.1 * libblkid1-64bit-debuginfo-2.39.3-150600.4.15.1 * libsmartcols-devel-64bit-2.39.3-150600.4.15.1 * libuuid1-64bit-debuginfo-2.39.3-150600.4.15.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14104.html * https://bugzilla.suse.com/show_bug.cgi?id=1254666 * https://jira.suse.com/browse/PED-13682 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 13 12:30:04 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 13 Jan 2026 12:30:04 -0000 Subject: SUSE-SU-2026:0118-1: moderate: Security update for libtasn1 Message-ID: <176830740492.22169.3226467217408089548@smelt2.prg2.suse.org> # Security update for libtasn1 Announcement ID: SUSE-SU-2026:0118-1 Release Date: 2026-01-13T06:46:55Z Rating: moderate References: * bsc#1256341 Cross-References: * CVE-2025-13151 CVSS scores: * CVE-2025-13151 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-13151 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H * CVE-2025-13151 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libtasn1 fixes the following issues: * CVE-2025-13151: stack-based buffer overflow in `asn1_expend_octet_string` (bsc#1256341). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-118=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libtasn1-6-debuginfo-32bit-4.9-3.19.1 * libtasn1-debugsource-4.9-3.19.1 * libtasn1-6-32bit-4.9-3.19.1 * libtasn1-debuginfo-4.9-3.19.1 * libtasn1-6-4.9-3.19.1 * libtasn1-devel-4.9-3.19.1 * libtasn1-4.9-3.19.1 * libtasn1-6-debuginfo-4.9-3.19.1 ## References: * https://www.suse.com/security/cve/CVE-2025-13151.html * https://bugzilla.suse.com/show_bug.cgi?id=1256341 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 13 12:30:08 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 13 Jan 2026 12:30:08 -0000 Subject: SUSE-SU-2026:0117-1: moderate: Security update for util-linux Message-ID: <176830740831.22169.2091586993358153564@smelt2.prg2.suse.org> # Security update for util-linux Announcement ID: SUSE-SU-2026:0117-1 Release Date: 2026-01-13T04:33:44Z Rating: moderate References: * bsc#1254666 * jsc#PED-13682 Cross-References: * CVE-2025-14104 CVSS scores: * CVE-2025-14104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-14104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-14104 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise Micro 5.5 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for util-linux fixes the following issues: * CVE-2025-14104: Fixed heap buffer overread in setpwnam() when processing 256-byte usernames (bsc#1254666). * lscpu: Add support for NVIDIA Olympus arm64 core (jsc#PED-13682). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-117=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-117=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-117=1 ## Package List: * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * util-linux-2.37.4-150500.9.20.1 * libblkid1-2.37.4-150500.9.20.1 * libsmartcols1-debuginfo-2.37.4-150500.9.20.1 * libuuid1-2.37.4-150500.9.20.1 * libmount1-2.37.4-150500.9.20.1 * libmount1-debuginfo-2.37.4-150500.9.20.1 * libsmartcols1-2.37.4-150500.9.20.1 * util-linux-systemd-2.37.4-150500.9.20.1 * util-linux-systemd-debugsource-2.37.4-150500.9.20.1 * util-linux-debugsource-2.37.4-150500.9.20.1 * util-linux-debuginfo-2.37.4-150500.9.20.1 * libfdisk1-2.37.4-150500.9.20.1 * libblkid1-debuginfo-2.37.4-150500.9.20.1 * libuuid1-debuginfo-2.37.4-150500.9.20.1 * util-linux-systemd-debuginfo-2.37.4-150500.9.20.1 * libfdisk1-debuginfo-2.37.4-150500.9.20.1 * SUSE Linux Enterprise Micro 5.5 (s390x) * util-linux-extra-2.37.4-150500.9.20.1 * util-linux-extra-debuginfo-2.37.4-150500.9.20.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * libblkid-devel-2.37.4-150500.9.20.1 * util-linux-2.37.4-150500.9.20.1 * libfdisk-devel-static-2.37.4-150500.9.20.1 * libuuid1-2.37.4-150500.9.20.1 * python3-libmount-debuginfo-2.37.4-150500.9.20.1 * python3-libmount-2.37.4-150500.9.20.1 * libmount-devel-static-2.37.4-150500.9.20.1 * uuidd-2.37.4-150500.9.20.1 * libblkid1-2.37.4-150500.9.20.1 * libuuid-devel-2.37.4-150500.9.20.1 * libsmartcols-devel-2.37.4-150500.9.20.1 * libsmartcols1-2.37.4-150500.9.20.1 * util-linux-systemd-2.37.4-150500.9.20.1 * util-linux-debugsource-2.37.4-150500.9.20.1 * util-linux-debuginfo-2.37.4-150500.9.20.1 * libmount-devel-2.37.4-150500.9.20.1 * libuuid1-debuginfo-2.37.4-150500.9.20.1 * util-linux-systemd-debugsource-2.37.4-150500.9.20.1 * uuidd-debuginfo-2.37.4-150500.9.20.1 * libfdisk1-debuginfo-2.37.4-150500.9.20.1 * libblkid-devel-static-2.37.4-150500.9.20.1 * python3-libmount-debugsource-2.37.4-150500.9.20.1 * libsmartcols1-debuginfo-2.37.4-150500.9.20.1 * libmount1-2.37.4-150500.9.20.1 * libmount1-debuginfo-2.37.4-150500.9.20.1 * libuuid-devel-static-2.37.4-150500.9.20.1 * libfdisk1-2.37.4-150500.9.20.1 * libblkid1-debuginfo-2.37.4-150500.9.20.1 * libfdisk-devel-2.37.4-150500.9.20.1 * libsmartcols-devel-static-2.37.4-150500.9.20.1 * util-linux-systemd-debuginfo-2.37.4-150500.9.20.1 * openSUSE Leap 15.5 (x86_64) * libuuid1-32bit-debuginfo-2.37.4-150500.9.20.1 * libsmartcols-devel-32bit-2.37.4-150500.9.20.1 * libmount1-32bit-2.37.4-150500.9.20.1 * libblkid-devel-32bit-2.37.4-150500.9.20.1 * libblkid1-32bit-2.37.4-150500.9.20.1 * libfdisk1-32bit-debuginfo-2.37.4-150500.9.20.1 * libfdisk-devel-32bit-2.37.4-150500.9.20.1 * libmount-devel-32bit-2.37.4-150500.9.20.1 * libmount1-32bit-debuginfo-2.37.4-150500.9.20.1 * libsmartcols1-32bit-debuginfo-2.37.4-150500.9.20.1 * libuuid1-32bit-2.37.4-150500.9.20.1 * libsmartcols1-32bit-2.37.4-150500.9.20.1 * libfdisk1-32bit-2.37.4-150500.9.20.1 * libblkid1-32bit-debuginfo-2.37.4-150500.9.20.1 * libuuid-devel-32bit-2.37.4-150500.9.20.1 * openSUSE Leap 15.5 (noarch) * util-linux-lang-2.37.4-150500.9.20.1 * openSUSE Leap 15.5 (s390x) * util-linux-extra-2.37.4-150500.9.20.1 * util-linux-extra-debuginfo-2.37.4-150500.9.20.1 * openSUSE Leap 15.5 (aarch64_ilp32) * libsmartcols-devel-64bit-2.37.4-150500.9.20.1 * libblkid1-64bit-2.37.4-150500.9.20.1 * libfdisk-devel-64bit-2.37.4-150500.9.20.1 * libblkid1-64bit-debuginfo-2.37.4-150500.9.20.1 * libuuid1-64bit-2.37.4-150500.9.20.1 * libsmartcols1-64bit-debuginfo-2.37.4-150500.9.20.1 * libmount1-64bit-2.37.4-150500.9.20.1 * libsmartcols1-64bit-2.37.4-150500.9.20.1 * libmount-devel-64bit-2.37.4-150500.9.20.1 * libuuid-devel-64bit-2.37.4-150500.9.20.1 * libfdisk1-64bit-debuginfo-2.37.4-150500.9.20.1 * libblkid-devel-64bit-2.37.4-150500.9.20.1 * libmount1-64bit-debuginfo-2.37.4-150500.9.20.1 * libfdisk1-64bit-2.37.4-150500.9.20.1 * libuuid1-64bit-debuginfo-2.37.4-150500.9.20.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python3-libmount-debugsource-2.37.4-150500.9.20.1 * openSUSE Leap 15.6 (s390x) * util-linux-extra-2.37.4-150500.9.20.1 * util-linux-extra-debuginfo-2.37.4-150500.9.20.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14104.html * https://bugzilla.suse.com/show_bug.cgi?id=1254666 * https://jira.suse.com/browse/PED-13682 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 13 12:30:11 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 13 Jan 2026 12:30:11 -0000 Subject: SUSE-SU-2026:0116-1: moderate: Security update for util-linux Message-ID: <176830741173.22169.11052093604647997075@smelt2.prg2.suse.org> # Security update for util-linux Announcement ID: SUSE-SU-2026:0116-1 Release Date: 2026-01-13T02:33:45Z Rating: moderate References: * bsc#1254666 * jsc#PED-13682 Cross-References: * CVE-2025-14104 CVSS scores: * CVE-2025-14104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-14104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-14104 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for util-linux fixes the following issues: * CVE-2025-14104: Fixed heap buffer overread in setpwnam() when processing 256-byte usernames (bsc#1254666). * lscpu: Add support for NVIDIA Olympus arm64 core (jsc#PED-13682). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2026-116=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-116=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-116=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * libblkid1-debuginfo-2.36.2-150300.4.50.1 * libblkid1-2.36.2-150300.4.50.1 * python3-libmount-2.36.2-150300.4.50.1 * libuuid1-2.36.2-150300.4.50.1 * libsmartcols1-2.36.2-150300.4.50.1 * libblkid-devel-static-2.36.2-150300.4.50.1 * uuidd-2.36.2-150300.4.50.1 * python3-libmount-debuginfo-2.36.2-150300.4.50.1 * libsmartcols-devel-2.36.2-150300.4.50.1 * util-linux-debuginfo-2.36.2-150300.4.50.1 * libfdisk-devel-2.36.2-150300.4.50.1 * uuidd-debuginfo-2.36.2-150300.4.50.1 * util-linux-2.36.2-150300.4.50.1 * libsmartcols-devel-static-2.36.2-150300.4.50.1 * libmount-devel-static-2.36.2-150300.4.50.1 * libfdisk-devel-static-2.36.2-150300.4.50.1 * util-linux-systemd-2.36.2-150300.4.50.1 * libblkid-devel-2.36.2-150300.4.50.1 * libfdisk1-debuginfo-2.36.2-150300.4.50.1 * util-linux-systemd-debuginfo-2.36.2-150300.4.50.1 * libuuid1-debuginfo-2.36.2-150300.4.50.1 * libmount-devel-2.36.2-150300.4.50.1 * util-linux-debugsource-2.36.2-150300.4.50.1 * libmount1-2.36.2-150300.4.50.1 * libuuid-devel-static-2.36.2-150300.4.50.1 * libsmartcols1-debuginfo-2.36.2-150300.4.50.1 * util-linux-systemd-debugsource-2.36.2-150300.4.50.1 * libfdisk1-2.36.2-150300.4.50.1 * libmount1-debuginfo-2.36.2-150300.4.50.1 * libuuid-devel-2.36.2-150300.4.50.1 * python3-libmount-debugsource-2.36.2-150300.4.50.1 * openSUSE Leap 15.3 (x86_64) * libfdisk1-32bit-debuginfo-2.36.2-150300.4.50.1 * libblkid1-32bit-debuginfo-2.36.2-150300.4.50.1 * libuuid1-32bit-2.36.2-150300.4.50.1 * libblkid-devel-32bit-2.36.2-150300.4.50.1 * libmount-devel-32bit-2.36.2-150300.4.50.1 * libuuid-devel-32bit-2.36.2-150300.4.50.1 * libfdisk-devel-32bit-2.36.2-150300.4.50.1 * libuuid1-32bit-debuginfo-2.36.2-150300.4.50.1 * libsmartcols1-32bit-2.36.2-150300.4.50.1 * libmount1-32bit-debuginfo-2.36.2-150300.4.50.1 * libblkid1-32bit-2.36.2-150300.4.50.1 * libfdisk1-32bit-2.36.2-150300.4.50.1 * libmount1-32bit-2.36.2-150300.4.50.1 * libsmartcols1-32bit-debuginfo-2.36.2-150300.4.50.1 * libsmartcols-devel-32bit-2.36.2-150300.4.50.1 * openSUSE Leap 15.3 (noarch) * util-linux-lang-2.36.2-150300.4.50.1 * openSUSE Leap 15.3 (aarch64_ilp32) * libblkid1-64bit-debuginfo-2.36.2-150300.4.50.1 * libsmartcols-devel-64bit-2.36.2-150300.4.50.1 * libfdisk-devel-64bit-2.36.2-150300.4.50.1 * libmount1-64bit-debuginfo-2.36.2-150300.4.50.1 * libsmartcols1-64bit-2.36.2-150300.4.50.1 * libmount1-64bit-2.36.2-150300.4.50.1 * libuuid-devel-64bit-2.36.2-150300.4.50.1 * libmount-devel-64bit-2.36.2-150300.4.50.1 * libfdisk1-64bit-2.36.2-150300.4.50.1 * libuuid1-64bit-debuginfo-2.36.2-150300.4.50.1 * libsmartcols1-64bit-debuginfo-2.36.2-150300.4.50.1 * libblkid-devel-64bit-2.36.2-150300.4.50.1 * libfdisk1-64bit-debuginfo-2.36.2-150300.4.50.1 * libuuid1-64bit-2.36.2-150300.4.50.1 * libblkid1-64bit-2.36.2-150300.4.50.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libblkid1-debuginfo-2.36.2-150300.4.50.1 * libfdisk1-debuginfo-2.36.2-150300.4.50.1 * util-linux-debuginfo-2.36.2-150300.4.50.1 * libsmartcols1-debuginfo-2.36.2-150300.4.50.1 * libblkid1-2.36.2-150300.4.50.1 * util-linux-2.36.2-150300.4.50.1 * libfdisk1-2.36.2-150300.4.50.1 * libmount1-debuginfo-2.36.2-150300.4.50.1 * util-linux-systemd-debuginfo-2.36.2-150300.4.50.1 * libuuid1-debuginfo-2.36.2-150300.4.50.1 * util-linux-systemd-debugsource-2.36.2-150300.4.50.1 * util-linux-debugsource-2.36.2-150300.4.50.1 * libuuid1-2.36.2-150300.4.50.1 * libmount1-2.36.2-150300.4.50.1 * libsmartcols1-2.36.2-150300.4.50.1 * util-linux-systemd-2.36.2-150300.4.50.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libblkid1-debuginfo-2.36.2-150300.4.50.1 * libfdisk1-debuginfo-2.36.2-150300.4.50.1 * util-linux-debuginfo-2.36.2-150300.4.50.1 * libsmartcols1-debuginfo-2.36.2-150300.4.50.1 * libblkid1-2.36.2-150300.4.50.1 * util-linux-2.36.2-150300.4.50.1 * libfdisk1-2.36.2-150300.4.50.1 * libmount1-debuginfo-2.36.2-150300.4.50.1 * util-linux-systemd-debuginfo-2.36.2-150300.4.50.1 * libuuid1-debuginfo-2.36.2-150300.4.50.1 * util-linux-systemd-debugsource-2.36.2-150300.4.50.1 * util-linux-debugsource-2.36.2-150300.4.50.1 * libuuid1-2.36.2-150300.4.50.1 * libmount1-2.36.2-150300.4.50.1 * libsmartcols1-2.36.2-150300.4.50.1 * util-linux-systemd-2.36.2-150300.4.50.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14104.html * https://bugzilla.suse.com/show_bug.cgi?id=1254666 * https://jira.suse.com/browse/PED-13682 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 13 16:30:04 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 13 Jan 2026 16:30:04 -0000 Subject: SUSE-SU-2026:0119-1: moderate: Security update for curl Message-ID: <176832180485.22154.16341022951710828379@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2026:0119-1 Release Date: 2026-01-13T08:10:35Z Rating: moderate References: * bsc#1256105 Cross-References: * CVE-2025-14017 CVSS scores: * CVE-2025-14017 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-14017 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2025-14017: Fixed broken TLS options for threaded LDAPS (bsc#1256105) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-119=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * curl-debugsource-8.0.1-11.114.1 * curl-8.0.1-11.114.1 * libcurl4-32bit-8.0.1-11.114.1 * libcurl4-debuginfo-8.0.1-11.114.1 * libcurl-devel-8.0.1-11.114.1 * libcurl4-8.0.1-11.114.1 * curl-debuginfo-8.0.1-11.114.1 * libcurl4-debuginfo-32bit-8.0.1-11.114.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14017.html * https://bugzilla.suse.com/show_bug.cgi?id=1256105 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 14 12:30:08 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 14 Jan 2026 12:30:08 -0000 Subject: SUSE-SU-2026:0121-1: important: Security update for ovmf Message-ID: <176839380846.28692.6712074445827376662@smelt2.prg2.suse.org> # Security update for ovmf Announcement ID: SUSE-SU-2026:0121-1 Release Date: 2026-01-14T06:47:27Z Rating: important References: * bsc#1218680 Cross-References: * CVE-2022-36765 CVSS scores: * CVE-2022-36765 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H * CVE-2022-36765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-36765 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for ovmf fixes the following issues: * CVE-2022-36765: Fixed integer overflow to buffer overflow via local network vulnerability (bsc#1218680). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-121=1 * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-121=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * ovmf-2017+git1510945757.b2662641d5-3.49.1 * ovmf-tools-2017+git1510945757.b2662641d5-3.49.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.49.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 x86_64) * ovmf-2017+git1510945757.b2662641d5-3.49.1 * ovmf-tools-2017+git1510945757.b2662641d5-3.49.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * qemu-uefi-aarch64-2017+git1510945757.b2662641d5-3.49.1 * qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.49.1 ## References: * https://www.suse.com/security/cve/CVE-2022-36765.html * https://bugzilla.suse.com/show_bug.cgi?id=1218680 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 14 12:30:11 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 14 Jan 2026 12:30:11 -0000 Subject: SUSE-SU-2026:0120-1: important: Security update for ovmf Message-ID: <176839381104.28692.4956568677897749516@smelt2.prg2.suse.org> # Security update for ovmf Announcement ID: SUSE-SU-2026:0120-1 Release Date: 2026-01-14T06:46:46Z Rating: important References: * bsc#1218680 Cross-References: * CVE-2022-36765 CVSS scores: * CVE-2022-36765 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H * CVE-2022-36765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-36765 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for ovmf fixes the following issues: * CVE-2022-36765: Fixed integer overflow to buffer overflow via local network vulnerability (bsc#1218680). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-120=1 openSUSE-SLE-15.6-2026-120=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-120=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-120=1 ## Package List: * openSUSE Leap 15.6 (aarch64 x86_64) * ovmf-202308-150600.5.25.1 * ovmf-tools-202308-150600.5.25.1 * openSUSE Leap 15.6 (noarch) * qemu-uefi-aarch32-202308-150600.5.25.1 * qemu-ovmf-ia32-202308-150600.5.25.1 * qemu-uefi-aarch64-202308-150600.5.25.1 * qemu-ovmf-x86_64-202308-150600.5.25.1 * openSUSE Leap 15.6 (x86_64) * qemu-ovmf-x86_64-debug-202308-150600.5.25.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 x86_64) * ovmf-202308-150600.5.25.1 * ovmf-tools-202308-150600.5.25.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * qemu-uefi-aarch64-202308-150600.5.25.1 * qemu-ovmf-x86_64-202308-150600.5.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (x86_64) * ovmf-202308-150600.5.25.1 * ovmf-tools-202308-150600.5.25.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * qemu-ovmf-x86_64-202308-150600.5.25.1 ## References: * https://www.suse.com/security/cve/CVE-2022-36765.html * https://bugzilla.suse.com/show_bug.cgi?id=1218680 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 14 16:30:04 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 14 Jan 2026 16:30:04 -0000 Subject: SUSE-SU-2026:0122-1: important: Security update for MozillaFirefox Message-ID: <176840820496.28753.13355272414096003890@smelt2.prg2.suse.org> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2026:0122-1 Release Date: 2026-01-14T08:49:27Z Rating: important References: * bsc#1256340 Cross-References: * CVE-2025-14327 * CVE-2026-0877 * CVE-2026-0878 * CVE-2026-0879 * CVE-2026-0880 * CVE-2026-0882 * CVE-2026-0883 * CVE-2026-0884 * CVE-2026-0885 * CVE-2026-0886 * CVE-2026-0887 * CVE-2026-0890 * CVE-2026-0891 CVSS scores: * CVE-2025-14327 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-14327 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-14327 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-14327 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2026-0877 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2026-0878 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N * CVE-2026-0879 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-0880 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-0882 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-0883 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-0884 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-0885 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2026-0886 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-0887 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-0890 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2026-0891 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves 13 vulnerabilities can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: Update to Firefox Extended Support Release 140.7.0 ESR (bsc#1256340). * MFSA 2026-03 * CVE-2026-0877: Mitigation bypass in the DOM: Security component * CVE-2026-0878: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component * CVE-2026-0879: Sandbox escape due to incorrect boundary conditions in the Graphics component * CVE-2026-0880: Sandbox escape due to integer overflow in the Graphics component * CVE-2026-0882: Use-after-free in the IPC component * CVE-2025-14327: Spoofing issue in the Downloads Panel component * CVE-2026-0883: Information disclosure in the Networking component * CVE-2026-0884: Use-after-free in the JavaScript Engine component * CVE-2026-0885: Use-after-free in the JavaScript: GC component * CVE-2026-0886: Incorrect boundary conditions in the Graphics component * CVE-2026-0887: Clickjacking issue, information disclosure in the PDF Viewer component * CVE-2026-0890: Spoofing issue in the DOM: Copy-Paste and Drag-Drop component * CVE-2026-0891: Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-122=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-122=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-140.7.0-112.295.1 * MozillaFirefox-debuginfo-140.7.0-112.295.1 * MozillaFirefox-translations-common-140.7.0-112.295.1 * MozillaFirefox-debugsource-140.7.0-112.295.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * MozillaFirefox-devel-140.7.0-112.295.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * MozillaFirefox-140.7.0-112.295.1 * MozillaFirefox-debuginfo-140.7.0-112.295.1 * MozillaFirefox-translations-common-140.7.0-112.295.1 * MozillaFirefox-debugsource-140.7.0-112.295.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * MozillaFirefox-devel-140.7.0-112.295.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14327.html * https://www.suse.com/security/cve/CVE-2026-0877.html * https://www.suse.com/security/cve/CVE-2026-0878.html * https://www.suse.com/security/cve/CVE-2026-0879.html * https://www.suse.com/security/cve/CVE-2026-0880.html * https://www.suse.com/security/cve/CVE-2026-0882.html * https://www.suse.com/security/cve/CVE-2026-0883.html * https://www.suse.com/security/cve/CVE-2026-0884.html * https://www.suse.com/security/cve/CVE-2026-0885.html * https://www.suse.com/security/cve/CVE-2026-0886.html * https://www.suse.com/security/cve/CVE-2026-0887.html * https://www.suse.com/security/cve/CVE-2026-0890.html * https://www.suse.com/security/cve/CVE-2026-0891.html * https://bugzilla.suse.com/show_bug.cgi?id=1256340 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 14 20:30:06 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 14 Jan 2026 20:30:06 -0000 Subject: SUSE-RU-2026:0124-1: moderate: Recommended update for release-notes-sle_hpc Message-ID: <176842260662.28753.15963702262676627349@smelt2.prg2.suse.org> # Recommended update for release-notes-sle_hpc Announcement ID: SUSE-RU-2026:0124-1 Release Date: 2026-01-14T13:59:12Z Rating: moderate References: * bsc#1235749 * bsc#1235766 * bsc#933411 Affected Products: * HPC Module 15-SP7 * SUSE Linux Enterprise Server 15 SP7 An update that has three fixes can now be installed. ## Description: This update for release-notes-sle_hpc fixes the following issues: * Upgrade version to 15.7.20251031 (bsc#933411) * Added apptainer info (bsc#1235749) * Added note about warewulf 4.5.8 update info (bsc#1235766) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * HPC Module 15-SP7 zypper in -t patch SUSE-SLE-Module-HPC-15-SP7-2026-124=1 ## Package List: * HPC Module 15-SP7 (noarch) * release-notes-sle_hpc-15.700000000.20251031-150700.3.6.32 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235749 * https://bugzilla.suse.com/show_bug.cgi?id=1235766 * https://bugzilla.suse.com/show_bug.cgi?id=933411 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 14 20:30:08 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 14 Jan 2026 20:30:08 -0000 Subject: SUSE-SU-2026:0123-1: important: Security update for libsoup Message-ID: <176842260875.28753.17100884757572825608@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2026:0123-1 Release Date: 2026-01-14T13:47:32Z Rating: important References: * bsc#1254876 Cross-References: * CVE-2025-14523 CVSS scores: * CVE-2025-14523 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-14523 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2025-14523 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2025-14523: Reject duplicated Host in headers (bsc#1254876). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-123=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-123=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * typelib-1_0-Soup-2_4-2.62.2-5.23.1 * libsoup-debugsource-2.62.2-5.23.1 * libsoup-devel-2.62.2-5.23.1 * libsoup-2_4-1-2.62.2-5.23.1 * libsoup-2_4-1-debuginfo-2.62.2-5.23.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * libsoup-lang-2.62.2-5.23.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libsoup-2_4-1-32bit-2.62.2-5.23.1 * libsoup-2_4-1-debuginfo-32bit-2.62.2-5.23.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * typelib-1_0-Soup-2_4-2.62.2-5.23.1 * libsoup-debugsource-2.62.2-5.23.1 * libsoup-devel-2.62.2-5.23.1 * libsoup-2_4-1-2.62.2-5.23.1 * libsoup-2_4-1-32bit-2.62.2-5.23.1 * libsoup-2_4-1-debuginfo-32bit-2.62.2-5.23.1 * libsoup-2_4-1-debuginfo-2.62.2-5.23.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * libsoup-lang-2.62.2-5.23.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14523.html * https://bugzilla.suse.com/show_bug.cgi?id=1254876 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:30:09 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:30:09 -0000 Subject: SUSE-RU-2026:20075-1: important: Recommended update for virt-manager Message-ID: <176846580906.28753.1341553647832211300@smelt2.prg2.suse.org> # Recommended update for virt-manager Announcement ID: SUSE-RU-2026:20075-1 Release Date: 2026-01-12T15:28:16Z Rating: important References: * bsc#1252105 * jsc#PED-9265 Affected Products: * SUSE Linux Micro 6.2 An update that contains one feature and has one fix can now be installed. ## Description: This update for virt-manager fixes the following issues: * Unable to create an SEV-SNP enabled guest with virt-manager This simplifies the code from what used to be required for sev while adding initial tdx support (bsc#1252105). * Add support for creating TDX guests in virt-install (jsc#PED-9265) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-133=1 ## Package List: * SUSE Linux Micro 6.2 (noarch) * virt-install-5.0.0-160000.4.1 * virt-manager-common-5.0.0-160000.4.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1252105 * https://jira.suse.com/browse/PED-9265 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:30:16 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:30:16 -0000 Subject: SUSE-SU-2026:20074-1: important: Security update for glib2 Message-ID: <176846581657.28753.15143762368202255268@smelt2.prg2.suse.org> # Security update for glib2 Announcement ID: SUSE-SU-2026:20074-1 Release Date: 2026-01-12T11:59:25Z Rating: important References: * bsc#1249055 * bsc#1254297 * bsc#1254662 * bsc#1254878 Cross-References: * CVE-2025-13601 * CVE-2025-14087 * CVE-2025-14512 * CVE-2025-7039 CVSS scores: * CVE-2025-13601 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-13601 ( NVD ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-14087 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14087 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-14087 ( NVD ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-14512 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-14512 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-14512 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-7039 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-7039 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-7039 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.2 An update that solves four vulnerabilities can now be installed. ## Description: This update for glib2 fixes the following issues: Update to version 2.84.4. Security issues fixed: * CVE-2025-14512: integer overflow in the GIO `escape_byte_string()` function when processing malicious files or remote filesystem attribute values can lead to denial-of-service (bsc#1254878). * CVE-2025-14087: buffer underflow in the GVariant parser `bytestring_parse()` and `string_parse()` functions when processing attacker-influenced data may lead to crash or code execution (bsc#1254662). * CVE-2025-13601: heap-based buffer overflow in the `g_escape_uri_string()` function when processing strings with a large number of unacceptable characters may lead to crash or code execution (bsc#1254297). * CVE-2025-7039: integer overflow when creating temporary files may lead to an out-of-bounds memory access that can be used for path traversal or exposure of sensitive content in a temporary file (bsc#1249055). Other issues fixed and changes: * Fix GFile leak in `g_local_file_set_display_name` during error handling. * Fix incorrect output parameter handling in closure helper of `g_settings_bind_with_mapping_closures`. * `gfileutils`: fix computation of temporary file name. * Fix GFile leak in `g_local_file_set_display_name()`. * `gthreadpool`: catch `pool_spawner` creation failure. * `gio/filenamecompleter`: fix leaks. * `gfilenamecompleter`: fix `g_object_unref()` of undefined value. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-132=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * libgobject-2_0-0-debuginfo-2.84.4-160000.1.1 * libglib-2_0-0-2.84.4-160000.1.1 * libglib-2_0-0-debuginfo-2.84.4-160000.1.1 * libgmodule-2_0-0-2.84.4-160000.1.1 * glib2-tools-debuginfo-2.84.4-160000.1.1 * glib2-tools-2.84.4-160000.1.1 * glib2-debugsource-2.84.4-160000.1.1 * typelib-1_0-GLib-2_0-2.84.4-160000.1.1 * libgirepository-2_0-0-2.84.4-160000.1.1 * libgirepository-2_0-0-debuginfo-2.84.4-160000.1.1 * typelib-1_0-Gio-2_0-2.84.4-160000.1.1 * libgobject-2_0-0-2.84.4-160000.1.1 * libgmodule-2_0-0-debuginfo-2.84.4-160000.1.1 * typelib-1_0-GModule-2_0-2.84.4-160000.1.1 * libgio-2_0-0-debuginfo-2.84.4-160000.1.1 * libgio-2_0-0-2.84.4-160000.1.1 * typelib-1_0-GObject-2_0-2.84.4-160000.1.1 * SUSE Linux Micro 6.2 (noarch) * gio-branding-SLE-16-160000.2.2 ## References: * https://www.suse.com/security/cve/CVE-2025-13601.html * https://www.suse.com/security/cve/CVE-2025-14087.html * https://www.suse.com/security/cve/CVE-2025-14512.html * https://www.suse.com/security/cve/CVE-2025-7039.html * https://bugzilla.suse.com/show_bug.cgi?id=1249055 * https://bugzilla.suse.com/show_bug.cgi?id=1254297 * https://bugzilla.suse.com/show_bug.cgi?id=1254662 * https://bugzilla.suse.com/show_bug.cgi?id=1254878 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:30:21 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:30:21 -0000 Subject: SUSE-SU-2026:20073-1: important: Security update for libpng16 Message-ID: <176846582187.28753.1529855587245007082@smelt2.prg2.suse.org> # Security update for libpng16 Announcement ID: SUSE-SU-2026:20073-1 Release Date: 2026-01-12T11:15:37Z Rating: important References: * bsc#1254157 * bsc#1254158 * bsc#1254159 * bsc#1254160 * bsc#1254480 Cross-References: * CVE-2025-64505 * CVE-2025-64506 * CVE-2025-64720 * CVE-2025-65018 * CVE-2025-66293 CVSS scores: * CVE-2025-64505 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-64505 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2025-64505 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H * CVE-2025-64506 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-64506 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2025-64506 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H * CVE-2025-64720 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-64720 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2025-64720 ( NVD ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H * CVE-2025-65018 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-65018 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2025-65018 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H * CVE-2025-66293 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-66293 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H * CVE-2025-66293 ( NVD ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H Affected Products: * SUSE Linux Micro 6.2 An update that solves five vulnerabilities can now be installed. ## Description: This update for libpng16 fixes the following issues: * CVE-2025-64505: heap buffer over-read in `png_do_quantize` when processing PNG files malformed palette indices (bsc#1254157). * CVE-2025-64506: heap buffer over-read in `png_write_image_8bit` when processing 8-bit input with `convert_to_8bit` enabled (bsc#1254158). * CVE-2025-64720: out-of-bounds read in `png_image_read_composite` when processing palette images with `PNG_FLAG_OPTIMIZE_ALPHA` enabled (bsc#1254159). * CVE-2025-65018: heap buffer overflow in `png_image_finish_read` when processing specially crafted 16-bit interlaced PNGs with 8-bit output format (bsc#1254160). * CVE-2025-66293: out-of-bounds read of the `png_sRGB_base` array when processing palette PNG images with partial transparency and gamma correction (bsc#1254480). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-131=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * libpng16-16-1.6.44-160000.3.1 * libpng16-16-debuginfo-1.6.44-160000.3.1 * libpng16-debugsource-1.6.44-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-64505.html * https://www.suse.com/security/cve/CVE-2025-64506.html * https://www.suse.com/security/cve/CVE-2025-64720.html * https://www.suse.com/security/cve/CVE-2025-65018.html * https://www.suse.com/security/cve/CVE-2025-66293.html * https://bugzilla.suse.com/show_bug.cgi?id=1254157 * https://bugzilla.suse.com/show_bug.cgi?id=1254158 * https://bugzilla.suse.com/show_bug.cgi?id=1254159 * https://bugzilla.suse.com/show_bug.cgi?id=1254160 * https://bugzilla.suse.com/show_bug.cgi?id=1254480 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:30:24 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:30:24 -0000 Subject: SUSE-SU-2026:20072-1: important: Security update for libmicrohttpd Message-ID: <176846582498.28753.7644016086332148846@smelt2.prg2.suse.org> # Security update for libmicrohttpd Announcement ID: SUSE-SU-2026:20072-1 Release Date: 2026-01-12T11:15:37Z Rating: important References: * bsc#1253177 * bsc#1253178 Cross-References: * CVE-2025-59777 * CVE-2025-62689 CVSS scores: * CVE-2025-59777 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-59777 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-59777 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-59777 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-62689 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-62689 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-62689 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-62689 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.2 An update that solves two vulnerabilities can now be installed. ## Description: This update for libmicrohttpd fixes the following issues: * CVE-2025-62689: Fixed heap-based buffer overflow through a specially crafted packet (bsc#1253178) * CVE-2025-59777: Fixed NULL pointer dereference through a specially crafted packet (bsc#1253177) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-130=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * libmicrohttpd12-1.0.1-160000.3.1 * libmicrohttpd12-debuginfo-1.0.1-160000.3.1 * libmicrohttpd-debugsource-1.0.1-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-59777.html * https://www.suse.com/security/cve/CVE-2025-62689.html * https://bugzilla.suse.com/show_bug.cgi?id=1253177 * https://bugzilla.suse.com/show_bug.cgi?id=1253178 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:30:29 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:30:29 -0000 Subject: SUSE-SU-2026:20071-1: important: Security update for python-tornado6 Message-ID: <176846582904.28753.1193991111890554950@smelt2.prg2.suse.org> # Security update for python-tornado6 Announcement ID: SUSE-SU-2026:20071-1 Release Date: 2026-01-12T10:29:33Z Rating: important References: * bsc#1254903 * bsc#1254904 * bsc#1254905 Cross-References: * CVE-2025-67724 * CVE-2025-67725 * CVE-2025-67726 CVSS scores: * CVE-2025-67724 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-67724 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-67724 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-67724 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-67725 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-67725 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67725 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67726 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-67726 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67726 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.2 An update that solves three vulnerabilities can now be installed. ## Description: This update for python-tornado6 fixes the following issues: * CVE-2025-67724: unescaped `reason` argument used in HTTP headers and in HTML default error pages can be used by attackers to launch header injection or XSS attacks (bsc#1254903). * CVE-2025-67725: quadratic complexity of string concatenation operations used by the `HTTPHeaders.add` method can lead o DoS when processing a maliciously crafted HTTP request (bsc#1254905). * CVE-2025-67726: quadratic complexity algorithm used in the `_parseparam` function of `httputil.py` can lead to DoS when processing maliciously crafted parameters in a `Content-Disposition` header (bsc#1254904). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-129=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * python-tornado6-debugsource-6.5-160000.3.1 * python313-tornado6-6.5-160000.3.1 * python313-tornado6-debuginfo-6.5-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-67724.html * https://www.suse.com/security/cve/CVE-2025-67725.html * https://www.suse.com/security/cve/CVE-2025-67726.html * https://bugzilla.suse.com/show_bug.cgi?id=1254903 * https://bugzilla.suse.com/show_bug.cgi?id=1254904 * https://bugzilla.suse.com/show_bug.cgi?id=1254905 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:30:32 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:30:32 -0000 Subject: SUSE-SU-2026:20070-1: moderate: Security update for avahi Message-ID: <176846583207.28753.5900883096978425656@smelt2.prg2.suse.org> # Security update for avahi Announcement ID: SUSE-SU-2026:20070-1 Release Date: 2026-01-11T16:54:42Z Rating: moderate References: * bsc#1233421 Cross-References: * CVE-2024-52615 CVSS scores: * CVE-2024-52615 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-52615 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-52615 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.2 An update that solves one vulnerability can now be installed. ## Description: This update for avahi fixes the following issues: * CVE-2024-52615: Fixed DNS spoofing (bsc#1233421) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-127=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * libavahi-common3-debuginfo-0.8-160000.3.1 * avahi-debuginfo-0.8-160000.3.1 * libavahi-client3-debuginfo-0.8-160000.3.1 * libavahi-client3-0.8-160000.3.1 * avahi-debugsource-0.8-160000.3.1 * libavahi-common3-0.8-160000.3.1 * avahi-0.8-160000.3.1 * libavahi-core7-debuginfo-0.8-160000.3.1 * libavahi-core7-0.8-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52615.html * https://bugzilla.suse.com/show_bug.cgi?id=1233421 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:30:33 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:30:33 -0000 Subject: SUSE-RU-2026:20069-1: moderate: Recommended update for lz4 Message-ID: <176846583322.28753.15364969787098369078@smelt2.prg2.suse.org> # Recommended update for lz4 Announcement ID: SUSE-RU-2026:20069-1 Release Date: 2026-01-11T16:27:51Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.2 An update that can now be installed. ## Description: This update for lz4 fixes the following issues: * align rpm changelog with sle15 and do not ignore test suite result ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-126=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * liblz4-1-1.10.0-160000.3.1 * liblz4-1-debuginfo-1.10.0-160000.3.1 * lz4-debuginfo-1.10.0-160000.3.1 * lz4-debugsource-1.10.0-160000.3.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:30:38 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:30:38 -0000 Subject: SUSE-RU-2026:20068-1: critical: Recommended update for libzypp Message-ID: <176846583807.28753.5471427920596507250@smelt2.prg2.suse.org> # Recommended update for libzypp Announcement ID: SUSE-RU-2026:20068-1 Release Date: 2026-01-08T11:27:02Z Rating: critical References: * bsc#1246912 * bsc#1250343 Affected Products: * SUSE Linux Micro 6.2 An update that has two fixes can now be installed. ## Description: This update for libzypp fixes the following issues: Changes in libzypp: * runposttrans: strip root prefix from tmppath (bsc#1250343) * fixup! Make ld.so ignore the subarch packages during install (bsc#1246912) * version 17.37.18 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-124=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * libzypp-17.37.18-160000.1.1 * libzypp-debuginfo-17.37.18-160000.1.1 * libzypp-debugsource-17.37.18-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1246912 * https://bugzilla.suse.com/show_bug.cgi?id=1250343 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:30:42 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:30:42 -0000 Subject: SUSE-RU-2026:20066-1: moderate: Recommended update for kernel-livepatch-MICRO-6-0-RT_Update_15 Message-ID: <176846584225.28753.13958648037461174260@smelt2.prg2.suse.org> # Recommended update for kernel-livepatch-MICRO-6-0-RT_Update_15 Announcement ID: SUSE-RU-2026:20066-1 Release Date: 2026-01-07T10:46:19Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.1 An update that can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_15 fixes the following issues: * New livepatch SLE Micro 6.0/6.1 RT kernel update 15. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-231=1 ## Package List: * SUSE Linux Micro 6.1 (x86_64) * kernel-livepatch-6_4_0-39-rt-debuginfo-1-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_15-debugsource-1-1.1 * kernel-livepatch-6_4_0-39-rt-1-1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:30:41 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:30:41 -0000 Subject: SUSE-RU-2026:20067-1: moderate: Recommended update for elemental-register, elemental-toolkit, elemental-system-agent, elemental Message-ID: <176846584122.28753.10940005584012135976@smelt2.prg2.suse.org> # Recommended update for elemental-register, elemental-toolkit, elemental- system-agent, elemental Announcement ID: SUSE-RU-2026:20067-1 Release Date: 2026-01-08T09:26:56Z Rating: moderate References: * bsc#1239623 * bsc#1240623 Affected Products: * SUSE Linux Micro 6.2 An update that has two fixes can now be installed. ## Description: This update for elemental-register, elemental-toolkit, elemental-system-agent, elemental fixes the following issues: Changes in elemental-register: * Upgrade to v1.8.0: Add policycoreutils-python-utils (bsc#1240623) Include an empty /etc/machine-id file (bsc#1239623) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-123=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 x86_64) * elemental-support-1.8.0-160000.1.1 * elemental-system-agent-0.3.13-160000.1.1 * elemental-register-1.8.0-160000.1.1 * elemental-toolkit-2.3.1-160000.1.1 * SUSE Linux Micro 6.2 (noarch) * elemental-updater-2.3.0-160000.1.1 * elemental-2.3.0-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1239623 * https://bugzilla.suse.com/show_bug.cgi?id=1240623 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:30:45 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:30:45 -0000 Subject: SUSE-RU-2026:20065-1: moderate: Recommended update for selinux-policy Message-ID: <176846584516.28753.1644237936178014551@smelt2.prg2.suse.org> # Recommended update for selinux-policy Announcement ID: SUSE-RU-2026:20065-1 Release Date: 2026-01-12T10:51:34Z Rating: moderate References: * bsc#1231494 * bsc#1255372 Affected Products: * SUSE Linux Micro 6.1 An update that has two fixes can now be installed. ## Description: This update for selinux-policy fixes the following issues: Update to version 20241031+git17.66062d7a5: * rsync: add rsync_exec_commands boolean and enable it by default (bsc#1231494, bsc#1255372) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-371=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * selinux-policy-devel-20241031+git17.66062d7a5-slfo.1.1_1.1 * selinux-policy-targeted-20241031+git17.66062d7a5-slfo.1.1_1.1 * selinux-policy-20241031+git17.66062d7a5-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1231494 * https://bugzilla.suse.com/show_bug.cgi?id=1255372 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:30:48 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:30:48 -0000 Subject: SUSE-SU-2026:20064-1: moderate: Security update for libpcap Message-ID: <176846584898.28753.16445909891779808173@smelt2.prg2.suse.org> # Security update for libpcap Announcement ID: SUSE-SU-2026:20064-1 Release Date: 2026-01-08T16:17:50Z Rating: moderate References: * bsc#1230020 * bsc#1230034 * bsc#1255765 Cross-References: * CVE-2023-7256 * CVE-2024-8006 * CVE-2025-11961 CVSS scores: * CVE-2023-7256 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-7256 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-7256 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8006 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H * CVE-2024-8006 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2024-8006 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11961 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-11961 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-11961 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves three vulnerabilities can now be installed. ## Description: This update for libpcap fixes the following issues: * CVE-2025-11961: missing validation of provided MAC-48 address string in `pcap_ether_aton()` can lead to out-of-bounds read and write (bsc#1255765). * CVE-2024-8006: missing return value check in `pcap_findalldevs_ex()` can lead to NULL pointer dereference (bsc#1230034). * CVE-2023-7256: unclear value returned by `sock_initaddress()` can lead to a double-free (bsc#1230020). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-370=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libpcap1-debuginfo-1.10.4-slfo.1.1_2.1 * libpcap1-1.10.4-slfo.1.1_2.1 * libpcap-debugsource-1.10.4-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-7256.html * https://www.suse.com/security/cve/CVE-2024-8006.html * https://www.suse.com/security/cve/CVE-2025-11961.html * https://bugzilla.suse.com/show_bug.cgi?id=1230020 * https://bugzilla.suse.com/show_bug.cgi?id=1230034 * https://bugzilla.suse.com/show_bug.cgi?id=1255765 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:30:50 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:30:50 -0000 Subject: SUSE-RU-2026:20063-1: moderate: Recommended update for docker-compose Message-ID: <176846585097.28753.2950693055591490599@smelt2.prg2.suse.org> # Recommended update for docker-compose Announcement ID: SUSE-RU-2026:20063-1 Release Date: 2026-01-08T16:13:05Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.1 An update that can now be installed. ## Description: This update for docker-compose fixes the following issues: Update to version 2.33.1: * Improvements * Add support for gw_priority, enable_ipv4 (requires docker v28.0) by @thaJeztah in #12570 * Fixes * Run watch standalone if menu fails to start by @ndeloof in #12536 * Report error using non-file secret|config with read-only service by @ndeloof in #12531 * Don't display bake suggestion when using --progress with quiet or json option by @glours in #12561 * Fix pull --parallel and --no-parallel deprecation warnings missing by @maxproske in #12555 * Fix error message when detach is implied by wait by @ndeloof in #12566 * Dependencies * build(deps): bump github.com/spf13/cobra from 1.8.1 to 1.9.1 by @dependabot in #12556 * build(deps): bump google.golang.org/grpc from 1.68.1 to 1.70.0 by @dependabot in #12494 * go.mod: update to docker v28.0.0 by @thaJeztah in #12545 * remove docker-compose-switch dependency Update to version 2.33.0: * Important * This release introduce support for Bake to manage builds as an alternative to the internal buildkit client. This new feature can be enabled by setting COMPOSE_BAKE=1 variable. Bake will become the default builder in a future release. * Improvements * let user know bake is now supported by @ndeloof in #12524 * support additional_context reference to another service by @ndeloof in #12485 * add support for BUILDKIT_PROGRESS by @ndeloof in #12458 * add --with-env flag to publish command by @glours in #12482 * Update ls --quiet help description by @maxproske in #12541 * Publish warn display env vars by @glours in #12486 * Fixes * Fix bake support by @ndeloof in #12507 * Update link in stats --help output by @maxproske in #12523 * Properly handle "builtin" seccomp profile by @r-bk in #12478 * manage watch applied to mulitple services by @ndeloof in #12469 * Internal * use main branch for docs upstream validation workflow by @crazy-max in #12487 * fix provenance for binaries and generate sbom by @crazy-max in #12479 * add codeowners file by @glours in #12480 * remove exit code per error type used by legacy metrics system by @ndeloof in #12502 * Dockerfile: update golangci-lint to v1.63.4 by @thaJeztah in #12546 * Full test coverage for compatibility cmd by @maxproske in #12528 * don't send raw os.Args to opentelemetry but a pseudo command line by @ndeloof in #12530 * add docker engine v28.x to the test-matrix by @thaJeztah in #12539 * enable copyloopvar linter by @thaJeztah in #12542 * go.mod: remove toolchain directive by @thaJeztah in #12551 * Dependencies * bump buildx v0.20.1 by @ndeloof in #12488 * bump docker to v27.5.1 by @ndeloof in #12491 * bump compose-go v2.4.8 by @ndeloof in #12543 * bump golang.org/x/sys from 0.28.0 to 0.30.0 by @dependabot in #12529 * bump github.com/moby/term v0.5.2 by @thaJeztah in #12540 * bump github.com/otiai10/copy from 1.14.0 to 1.14.1 by @dependabot in #12493 * bump github.com/jonboulle/clockwork from 0.4.0 to 0.5.0 by @dependabot in #12430 * bump github.com/spf13/pflag from 1.0.5 to 1.0.6 by @dependabot in #12548 * bump golang.org/x/sync from 0.10.0 to 0.11.0 by @dependabot in #12547 * bump gotest.tools/v3 from 3.5.1 to 3.5.2 by @dependabot in #12549 * Update to version 2.32.4: * add missing tag for build during merge workflow * ci: re-use local source to build binary images * ci: use local source for binary builds * Update to version 2.32.3: * ci: update bake-action to v6 * simplification * image can be set to a local ID, that isn't a valid docker ref * can't render progress concurrently with buildkit * exclude one-off container running convergence * Only override service mac if set on the main network. * Update to version 2.32.2: * remove engine v25 from e2e test matrix The 1st version available for Ubuntu 24.x is Docker Engine v26 * fix relative path in compose file * bump compose-go to v2.4.7 * replace tibdex/github-app-token by official GitHub create-github-app-token * bump golang.org/x/net to v0.33.0 to fix potential security issue https://github.com/golang/go/issues/70906 * checkExpectedVolumes must ignore anonymous volumes * When retrying to resolveOrCreateNetwork, retry with a valid network name * only check bind mount conflict if sync action is involved * use the 3 latest major versions of the engine to run e2e step * bump Golang version to v1.22.10 and update CI actions * add --pull to run command * CI to validate fmt * `make fmt` so any contributor can enforce formatting * format code with gofumpt * Update to version 2.32.1: * e2e test to prevent future regression * only check volume mounts for updated config * Update to version 2.32.0: * e2e test for recreate volume * build(deps): bump google.golang.org/grpc from 1.68.0 to 1.68.1 * build(deps): bump golang.org/x/crypto from 0.27.0 to 0.31.0 * build(deps): bump golang.org/x/sys from 0.27.0 to 0.28.0 * prompt user to confirm volume recreation * Recreate container on volume configuration change * introduce watch restart action * bump otel dependencies to v1.28.0 and v0.53.0 to align with buildx, buildkit and engine versions * bump docker/buildx to latest release * fix support for service.mac_address * update xx to v1.6.1 for compatibility with alpine 3.21 and file 5.46+ * build(deps): bump golang.org/x/sync from 0.9.0 to 0.10.0 * Update pkg/e2e/watch_test.go * first watch action for a file event wins * fix * revisit TestDebounceBatching * introduce sync+exec watch action * log configuration error as a watch log event * do not require a build section but for `rebuild` action * pull --quiet should not drop status message, only progress * use latest engine tags * Bump buildx to 0.19.1 * be sure everything has been cleanup at the end of each tests * add local config.json to test configuration dir if exists * disable failing TestBuildSSH test * fix build with bake * Update to version 2.31.0: * bump containerd to v1.7,24 * bump google.golang.org/grpc to v1.68.0 * build(deps): bump github.com/moby/buildkit from 0.17.1 to 0.17.2 * build(deps): bump github.com/compose-spec/compose-go/v2 * only stop dependent containers ... if there's some * disable TestNetworkConfigChanged which is unstable on CI * only check attached networks on running containers * fix: commit tests * feat: add commit command * run build tests against bake * delegate build to buildx bake * build(deps): bump github.com/stretchr/testify from 1.9.0 to 1.10.0 * use service.stop to stop dependent containers * Update wait-timeout flag usage to include the unit * go.mod: github.com/docker/cli v27.4.0-rc.2 * go.mod: github.com/docker/docker v27.4.0-rc.2 * go.mod: github.com/docker/cli 8d1bacae3e49 (v27.4.0-rc.2-dev) * go.mod: github.com/docker/cli v27.4.0-rc.1 * go.mod: github.com/docker/docker v27.4.0-rc.1 * Update pkg/compose/convergence.go * detect network config changes and recreate if needed * go.mod: github.com/docker/buildx v0.18.0 * go.mod: github.com/moby/buildkit v0.17.1 * gha: test against docker engine v27.4.0 * push empty descriptor layer when using OCI version 1.1 for Compose artifact it fixes a repository creation issue when pushing the 1st time a Compose OCI artifact on the Hub * remove ddev e2e tests * implement remove-orphans on run * ci: enable testifylint linter * Emit events for building images * Fix compose images that reutn a different image with the same ID * remove obsolete containers first on scale down * pass stal bot inactivity limit from 6 to 3 months * fix(config): Print service names with --no-interpolate * build(deps): bump golang.org/x/sys from 0.26.0 to 0.27.0 * build(deps): bump golang.org/x/sync from 0.8.0 to 0.9.0 * Update to version 2.30.3: * bump compose-go v2.4.4 * Avoid starting all services on rebuild * Update to version 2.30.2: * remove ArtifactType from Config in OCI v1.1 definition of the artifact * build(deps): bump github.com/compose-spec/compose-go/v2 * Service being declared in a profile must not trigger re-creation * Add profile e2e test case to document in compose * Update `MAINTAINERS` file * Update to version 2.30.1: * bump compose-go to version v2.4.2 * Update to version 2.30.0: * Improvements * Introduce service hooks by @ndeloof (12166) * Introduce generate command as alpha command by @glours (12209) * Add export command by @jarqvi (12120) * Add support for CDI device request using devices by @ndeloof (12184) * Add support for bind recursive by @ndeloof (12210) * Allow usage of -f flag with OCI Compose artifacts by @glours (12220) * Fixes * Append unix-style relative path when computing container target path by @ndeloof (12145) * Wait for dependent service up to delay set by --wait-timeout by @ndeloof (12156) * Check secret source exists, as bind mount would create target by @ndeloof (12151) * After container restart register printer consumer by @jhrotko (12158) * Fix(down): Fix down command if specified services are not running by @idsulik (12164) * Show watch error message and open DD only when w is pressed by @jhrotko (12165) * Fix(push): Fix unexpected EOF on alpha publish by @idsulik (12169) * Fix(convergence): Serialize access to observed state by @anantadwi13 (12150) * Remove feature flag integration with Docker Desktop for ComposeUI and ComposeNav by @jhrotko (12192) * Support Dockerfile-specific ignore-file with watch by @ndeloof (12193) * Add support for raw env_file format by @ndeloof (12179) * Convert GPUs to DeviceRequests with implicit "gpu" capability by @ndeloof (12197) * Improve error message to include expected network label by @divinity76 (12213) * Don't use progress to render restart, which hides logs by @ndeloof (12226) * One-off containers are not indexed, and must be ignored by exec --index command by @ndeloof (12224) * Don't warn about uid/gid not being supported while ... they are by @ndeloof (12232) * Connect to external networks by name by @ndeloof (12234) * Fix push error message typo by @chris-crone (12237) * Fix(dockerignore): Add wildcard support to dockerignore.go by @idsulik (12239) * Internal * Remove bind options when creating a volume type by @jhrotko (12177) * pass device.options to engine by @ndeloof (12183) * Add security policy by @thaJeztah (12194) * Gha: set default permissions to "contents: read" by @thaJeztah (12195) * Desktop: allow this client to be identified via user-agent by @djs55 (12212) * Compose-go clean volume target to avoid ambiguous comparisons by @ndeloof (12208) * Dependencies * Bump docker v27.3.1 by @ndeloof (12178) * Build(deps): bump golang.org/x/sys from 0.25.0 to 0.26.0 by @dependabot (12189) * Bump compose-go to v2.3.0 by @glours (12198) * Bump compose-go to v2.4.0 by @glours (12231) * Bump compose-go to v2.4.1 by @glours (12243) * Build(deps): bump github.com/containerd/containerd from 1.7.22 to 1.7.23 by @dependabot (12211) * Bump golang minimal version to 1.22 in go.mod by @glours (12246) * Bump go.uber.org/mock to v0.5.0 and google.golang.org/grpc to v1.67.1 by @glours (12245) * Update to version 2.29.7: * revert commits link to mount API over bind changes * Update to version 2.29.6: * don't set propagation if target engine isn't linux * build(deps): bump github.com/docker/docker v27.3.0-rc.2 * build(deps): bump github.com/docker/cli v27.3.0-rc.2 * Update to version 2.29.5: * set propagation default * Remove custom codeql workflow * Update to version 2.29.4: * fix import * chore(watch): Add debug log when skipping service without build context * stop dependent containers before recreating diverged service * Fixed possible `nil` pointer dereference * bump github.com/docker/buildx v0.17.1 * build(deps): bump docker, docker/cli to v27.3.0-rc.1 * gha: test against docker engine v27.3.0 * Update to version 2.29.3: * show sync files only in debug level * chore(watch): Add changed files path/count to log * build(deps): bump golang.org/x/sync from 0.7.0 to 0.8.0 * bump compose-go to version v2.2.0 * Restore compose v1 behavior to recreate containers when ran with -V * fix linting issues with golangci-lint 1.60.2 * bump golang to version 1.22.7 * bump dependencies versions, engine and cli v27.2.1 containerd v1.7.22 buildx v0.17.0 buildkit v0.16.0 * build(deps): bump golang.org/x/sys from 0.22.0 to 0.25.0 * Fix typos * Use logrus instead of direct output to stderr. * attach: close streams when done * Fix typo in pull.go * Allow combination of bind mounts and 'rebuild' watches * service hash must exlude depends_on * prefer mount API over bind * docs: duplicate documentation for root cmd * docs(wait): Fix wait command description * allow to add empty line in the logs when nav menu activated * upgrade docker versions * Build with go 1.22 to avoid issues when processing go.mod per https://github.com/golang/go/issues/62278#issuecomment-1698829945 * Update to version 2.29.2: * initial sync files that modified after image creation * initial sync for root directory * Removes redundant condition from toAPIBuildOptions in build.go * docs: Update docker compose kill usage * Fix stop on file chane for sync-restart action * bump engine and cli to v27.1.1, buildx to v0.16.1 * remove all dependabot update PRs for OTel dependencies * gp.mod: github.com/gofrs/flock v0.12.1 * go.mod: golang.org/x/sys v0.22.0 * update to go1.21.12 * Update to version 2.29.1: * Enhance JSON progress events with more fields. * bump compose-go v2.1.5 * bump github.com/docker/cli v27.1.0 * bump github.com/docker/docker v27.1.0 * bump github.com/containerd/containerd v1.7.20 * gha: add docker 27.1.0 * fix(containers): fix sorting logic by adding secondary sorting for one-off containers * Update to version 2.29.0: * fix: typos * update docs generation to avoid man pages generation * bump compose-go to v2.1.4, buildx to v0.16.0, containerd to v1.7.19 and buildx to v0.15.0 * restore setEnvWithDotEnv * empty env variable with no value must be unset in container * exclude unnecessary resources after services have been selected * change time for stale bot * Remove debug mode and run twice a week * Add stale workflow * update docs * feat(watch): Add --prune option to docker-compose watch command * Remove COMPOSE_MENU env from e2e tests * Use rawjson for the build backend. * Set logging format to JSON. * Format errors as JSON when in JSON progress mode. * Pass 'plain' instead of 'json' to build backend * Add JSON stream progress writer * go.mod: docker/cli, docker/docker v27.0.3 * gha: test against docker v27.0.3 * go.mod: docker/cli, docker/docker v27.0.2 * Update to version 2.28.1: * Remove `console.Terminal` check and use `IsTerminal` from `streams.Out` * Update to version 2.28.0: * go.mod: github.com/compose-spec/compose-go v2.1.3 * go.mod: docker/docker and docker/cli v27.0.1-rc.1 * Update to version 2.27.3: * build(deps): bump github.com/spf13/cobra from 1.8.0 to 1.8.1 * build(deps): bump github.com/docker/buildx from 0.15.0 to 0.15.1 * Update to version 2.27.2: * using as flag of the up command, watch was blocking process shutdown This happened when sunsetting the application from docker compose down command * Add open watch docs in up menu * bump buildkit to v0.14.0 and buildx to v0.15.0 * stop watch process when associated up process is stopped * build(deps): bump github.com/docker/docker * build(deps): bump github.com/containerd/containerd from 1.7.17 to 1.7.18 * build(deps): bump golang.org/x/sys from 0.20.0 to 0.21.0 * build(deps): bump github.com/hashicorp/go-version from 1.6.0 to 1.7.0 * build: replace uses of archive.CanonicalTarNameForPath * update gh actions versions, update engine matrix, bump golang to 1.21.11 * enforce keyboard.Close is always executed to restore terminal * config --environment * Readd event * remove unreachable code * Fix dot env file to define COMPOSE_* variables * return an error when --detach and --watch are used together in up command * Correct 'cancellation' typo in comment * Fix: change append to use slice index in ps.go * COMPOSE_PROFILES can be set by .env file * prevent concurrent map write relying on project immutability * Update to version 2.27.1: * build(deps): bump github.com/containerd/containerd from 1.7.16 to 1.7.17 * build(deps): bump github.com/docker/buildx from 0.14.0 to 0.14.1 * drop COMPOSE_EXPERIMENTAL_OTEL as docker/cli has opentelemetry in * add gui/composeview as part of available commands * fix opentelemetry * bump compose-go to version v2.1.1 * Set endpoint-specific DriverOpts * Bump compose-go version to latest main * Backport OpenBSD patches * add new navigation menu to open Compose app configuration in Docker Desktop * build(deps): bump github.com/fsnotify/fsevents from 0.1.1 to 0.2.0 * build(deps): bump golang.org/x/sys from 0.19.0 to 0.20.0 * fix --resolve-image-digests * allow a local .env file to override compose.yaml sibling .env * Bump docker engine and cli to version 26.1.3 * Bump docker to v26.1.2 * Add documentation for --menu up option and COMPOSE_MENU environemnt variable * chore(deps): bump docker to v26.1.1 (#11794) * Update to version 2.27.0: * fix: overlapping logs and menu navigation (#11765) * build(deps): bump github.com/moby/buildkit * chore(e2e): fix flaky cascade failure test * use v2.26.1 tag for moby and Docker cli * chore(deps): update to Moby v26.1 & buildx v0.14 * bump compose-go version to v2.1.0 * fix support for --context=foo * Fix #11710: Avoid to try to close channel twice after hitting Ctrl-C on compose up (#11719) * fix(desktop): remove overly-aggressive feature flag check (#11748) * chore: fix typo in comment * bump dependencies * fix: do not try to create file shares for non-directories * check container_name is not in use by another service we will create * don't clear line when navigation is disabled * fix: return correct exit code with `--exit-code-from` (#11715) * progress for resource can be restarted after more Working event comes * Revert "Stop the resource timer after last expected event" * Revert change to allow trying to kill again if a kill fails * Handle errors and allow to send multiple kills if one failed * Ignore errors when killing on second Ctrl-C * docker compose up always kills the containers on second Ctrl-C * read COMPOSE_REMOVE_ORPHANS from .env * Set Required false to depends_on containers for compose -p stop/down * Ignore missing containers when compose stop -p * Ignore missing containers when compose down -p * Introduce support for build.entitlements * Remove dead url reference. * e2e test for --all-resources * introduce --all-resources to _not_ exclude resources not used by services * Introduce --abort-on-container-failure * bump golang version to 1.21.9 * don't use ansi espace sequence when disabled * Update to version 2.26.1: * Does not start keyboard manager if there is no tty * Change menu information text to dim * Handle --no-build and --watch args * build(deps): bump github.com/opencontainers/image-spec * Unwrap error message. * Include error message in pull warning/errors * Update to version 2.26.0: * chore(desktop): revised feature detection for file shares * Add Navigation Menu to compose up * Add support for volume Subpath option * Bump docker v26.0.0 * introduce config --variables to list compose model variables * Fix docs on default build image name * Bump compose-go to v2.0.2 * add support for annotations * Revert "Bump compose-go to v2.0.1" * Bump compose-go to v2.0.1 * feat(desktop): synchronized file share integration (#11614) * feat(experiments): add experimental feature state (#11633) * reduce timeout of the Otel tracing command * fix `compose config --format json` * Update to version 2.25.0: * Bump compose-go v2.0.0 * services shell completion bugfix * fix TestBuildPlatformsWithCorrectBuildxConfig * only use ToModel when --no-interpolate is set * feat(desktop): add Docker Desktop detection and client skeleton (#11593) * Update to version 2.24.7: * chore(deps): upgrade go to 1.21.8 (#11578) * ci(deps): bump moby/moby & docker/cli to v25.0.4 (#11566) * Add test summary for test jobs in ci * make code simpler * avoid duplicated "xx exited with code 0" message * introduce --watch * move code into small functions for better readability * restore support for `config --no-interpolate` * remove docker cli step in ci.yml * get log to manage `attach` * bump compose-go to version v2.0.0-rc.8 * use an dedicated compose file --quiet-pull e2e test * Add a fallback check of Watch pid on Windows False positives were detected when checking the previous watch process state * add support of QuietOption to create command * pass QuietOption when starting dependencies from run command * when ran with ANSI disabled, force progress=plain * Issue-11374: Modified compose up command to respect COMPOSE_REMOVE_ORPHANS environment variable * ci: bump engine version to `25.0.3` * sort containers to optimize scale down * discard stdout for laaarge log test * Update to version 2.24.6: * use listeners to collect include metrics * docs: update cli reference link * docs: unify no trailing dots in docstrings and help (#11301) * Use listener for file metadata * fix deadlock collecting large logs * chore(watch): remove old `docker cp` implementation * ci(deps): bump docker/cli to v25.0.3 (#11481) * pass All option to backend api.Service when length statuses is not equal to zero * Add OTEL specs: build, depends_on, capabilities (gpu/tpu) * build(deps): bump github.com/opencontainers/image-spec * feat(tracing): add project hash attr * chore(load): ensure context passed to load * Include all networks in ContainerCreate call if API >= 1.44 * bump compose-go to v2.0.0-rc.4 * CI: docker engine version matrix * build(deps): bump github.com/docker/cli * Fix load .env from project directory when project file is set by COMPOSE_FILE ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-369=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * docker-compose-2.33.1-slfo.1.1_1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:30:55 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:30:55 -0000 Subject: SUSE-SU-2026:20062-1: moderate: Security update for curl Message-ID: <176846585562.28753.6619197455014457145@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2026:20062-1 Release Date: 2026-01-08T14:51:43Z Rating: moderate References: * bsc#1255731 * bsc#1255732 * bsc#1255733 * bsc#1255734 Cross-References: * CVE-2025-14524 * CVE-2025-14819 * CVE-2025-15079 * CVE-2025-15224 CVSS scores: * CVE-2025-14524 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-14524 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-14524 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-14819 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-14819 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-14819 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-15079 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-15079 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-15079 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-15224 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-15224 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2025-15224 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731). * CVE-2025-14819: libssh global knownhost override (bsc#1255732). * CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733). * CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-368=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * curl-debugsource-8.14.1-slfo.1.1_4.1 * libcurl4-8.14.1-slfo.1.1_4.1 * curl-debuginfo-8.14.1-slfo.1.1_4.1 * curl-8.14.1-slfo.1.1_4.1 * libcurl4-debuginfo-8.14.1-slfo.1.1_4.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14524.html * https://www.suse.com/security/cve/CVE-2025-14819.html * https://www.suse.com/security/cve/CVE-2025-15079.html * https://www.suse.com/security/cve/CVE-2025-15224.html * https://bugzilla.suse.com/show_bug.cgi?id=1255731 * https://bugzilla.suse.com/show_bug.cgi?id=1255732 * https://bugzilla.suse.com/show_bug.cgi?id=1255733 * https://bugzilla.suse.com/show_bug.cgi?id=1255734 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:31:00 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:31:00 -0000 Subject: SUSE-SU-2026:20061-1: important: Security update for openvswitch Message-ID: <176846586044.28753.13500644516391797009@smelt2.prg2.suse.org> # Security update for openvswitch Announcement ID: SUSE-SU-2026:20061-1 Release Date: 2026-01-08T14:44:35Z Rating: important References: * bsc#1216002 * bsc#1219465 * bsc#1236353 * bsc#1255435 Cross-References: * CVE-2023-3966 * CVE-2023-5366 * CVE-2024-2182 * CVE-2025-0650 CVSS scores: * CVE-2023-3966 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3966 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3966 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-5366 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-5366 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-2182 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-2182 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-0650 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-0650 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0650 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves four vulnerabilities can now be installed. ## Description: This update for openvswitch fixes the following issues: Update OpenvSwitch to v3.1.7 and OVN to v23.03.3: Security issues fixed: * CVE-2023-3966: ovs: invalid memory access and potential denial of service via specially crafted Geneve packets (bsc#1219465). * CVE-2023-5366: ovs: OpenFlow rules may be bypassed via specially crafted ICMPv6 Neighbor Advertisement packets sent between virtual machines t(bsc#1216002). * CVE-2024-2182: ovn: denial of service via injection of specially crafted BFD packets from inside unprivileged workloads (bsc#1255435). * CVE-2025-0650: ovn: egress ACLs may be bypassed via specially crafted UDP packet (bsc#1236353). Other updates and bugfixes: * OpenvSwitch upstream bugfix updates: * https://www.openvswitch.org/releases/NEWS-3.1.7.txt * v3.1.7 * Bug fixes * OVS validated with DPDK 22.11.7. * v3.1.6 * Bug fixes * OVS validated with DPDK 22.11.6. * v3.1.5 * Bug fixes * OVS validated with DPDK 22.11.5. * v3.1.4 * Bug fixes * OVS validated with DPDK 22.11.4. * OVN upstream bugfix updates: * https://github.com/ovn-org/ovn/blob/branch-23.03/NEWS * v23.03.3 * Bug fixes * Add "garp-max-timeout-sec" config option to vswitchd external-ids to cap the time between when ovn-controller sends gARP packets. * v23.03.1 * Bug fixes * CT entries are not flushed by default anymore whenever a load balancer backend is removed. A new, per-LB, option 'ct_flush' can be used to restore the previous behavior. Disabled by default. * Always allow IPv6 Router Discovery, Neighbor Discovery, and Multicast Listener Discovery protocols, regardless of ACLs defined. * Send ICMP Fragmentation Needed packets back to offending ports when communicating with multichassis ports using frames that don't fit through a tunnel. This is done only for logical switches that are attached to a physical network via a localnet port, in which case multichassis ports may have an effective MTU different from regular ports and hence may need this mechanism to maintain connectivity with other peers in the network. * ECMP routes use L4_SYM dp-hash by default if the datapath supports it. Existing sessions might get re-hashed to a different ECMP path when OVN detects the algorithm support in the datapath during an upgrade or restart of ovn-controller. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-367=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libopenvswitch-3_1-0-debuginfo-3.1.7-slfo.1.1_2.1 * openvswitch-debuginfo-3.1.7-slfo.1.1_2.1 * libopenvswitch-3_1-0-3.1.7-slfo.1.1_2.1 * openvswitch-debugsource-3.1.7-slfo.1.1_2.1 * openvswitch-3.1.7-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-3966.html * https://www.suse.com/security/cve/CVE-2023-5366.html * https://www.suse.com/security/cve/CVE-2024-2182.html * https://www.suse.com/security/cve/CVE-2025-0650.html * https://bugzilla.suse.com/show_bug.cgi?id=1216002 * https://bugzilla.suse.com/show_bug.cgi?id=1219465 * https://bugzilla.suse.com/show_bug.cgi?id=1236353 * https://bugzilla.suse.com/show_bug.cgi?id=1255435 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:31:01 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:31:01 -0000 Subject: SUSE-RU-2026:20060-1: moderate: Recommended update for scap-security-guide Message-ID: <176846586191.28753.12387556903750445198@smelt2.prg2.suse.org> # Recommended update for scap-security-guide Announcement ID: SUSE-RU-2026:20060-1 Release Date: 2026-01-08T08:20:34Z Rating: moderate References: * jsc#ECO-3319 Affected Products: * SUSE Linux Micro 6.1 An update that contains one feature can now be installed. ## Description: This update for scap-security-guide fixes the following issues: * updated to 0.1.79 (jsc#ECO-3319) * Add rhcos4 Profile for BSI Grundschutz * Create SLE15 general profile * Fix crypto policy settings in RHEL CIS profiles * Remove deprecated CIS OpenShift 1.4.0 and 1.5.0 profiles * Remove OCP STIG V1R1 * Remove OCP STIG V2R1 * Various updates for SLE 12/15 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-366=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * scap-security-guide-0.1.79-slfo.1.1_1.1 ## References: * https://jira.suse.com/browse/ECO-3319 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:32:03 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:32:03 -0000 Subject: SUSE-SU-2026:20059-1: important: Security update for the Linux Kernel Message-ID: <176846592306.28753.11536941297252896627@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:20059-1 Release Date: 2026-01-07T12:33:45Z Rating: important References: * bsc#1232223 * bsc#1237888 * bsc#1243474 * bsc#1245193 * bsc#1247076 * bsc#1247079 * bsc#1247500 * bsc#1247509 * bsc#1249547 * bsc#1249912 * bsc#1249982 * bsc#1250176 * bsc#1250237 * bsc#1250252 * bsc#1250705 * bsc#1251120 * bsc#1251786 * bsc#1252063 * bsc#1252267 * bsc#1252303 * bsc#1252353 * bsc#1252681 * bsc#1252763 * bsc#1252773 * bsc#1252780 * bsc#1252794 * bsc#1252795 * bsc#1252809 * bsc#1252817 * bsc#1252821 * bsc#1252836 * bsc#1252845 * bsc#1252862 * bsc#1252912 * bsc#1252917 * bsc#1252928 * bsc#1253018 * bsc#1253176 * bsc#1253275 * bsc#1253318 * bsc#1253324 * bsc#1253349 * bsc#1253352 * bsc#1253355 * bsc#1253360 * bsc#1253362 * bsc#1253363 * bsc#1253367 * bsc#1253369 * bsc#1253393 * bsc#1253395 * bsc#1253403 * bsc#1253407 * bsc#1253409 * bsc#1253412 * bsc#1253416 * bsc#1253421 * bsc#1253423 * bsc#1253424 * bsc#1253425 * bsc#1253427 * bsc#1253428 * bsc#1253431 * bsc#1253436 * bsc#1253438 * bsc#1253440 * bsc#1253441 * bsc#1253445 * bsc#1253448 * bsc#1253449 * bsc#1253453 * bsc#1253456 * bsc#1253472 * bsc#1253779 Cross-References: * CVE-2022-50253 * CVE-2023-53676 * CVE-2025-21710 * CVE-2025-37916 * CVE-2025-38359 * CVE-2025-38361 * CVE-2025-39788 * CVE-2025-39805 * CVE-2025-39819 * CVE-2025-39859 * CVE-2025-39944 * CVE-2025-39980 * CVE-2025-40001 * CVE-2025-40021 * CVE-2025-40027 * CVE-2025-40030 * CVE-2025-40038 * CVE-2025-40040 * CVE-2025-40048 * CVE-2025-40055 * CVE-2025-40059 * CVE-2025-40064 * CVE-2025-40070 * CVE-2025-40074 * CVE-2025-40075 * CVE-2025-40083 * CVE-2025-40098 * CVE-2025-40105 * CVE-2025-40107 * CVE-2025-40109 * CVE-2025-40110 * CVE-2025-40111 * CVE-2025-40115 * CVE-2025-40116 * CVE-2025-40118 * CVE-2025-40120 * CVE-2025-40121 * CVE-2025-40127 * CVE-2025-40129 * CVE-2025-40139 * CVE-2025-40140 * CVE-2025-40141 * CVE-2025-40149 * CVE-2025-40154 * CVE-2025-40156 * CVE-2025-40157 * CVE-2025-40159 * CVE-2025-40164 * CVE-2025-40168 * CVE-2025-40169 * CVE-2025-40171 * CVE-2025-40172 * CVE-2025-40173 * CVE-2025-40176 * CVE-2025-40180 * CVE-2025-40183 * CVE-2025-40186 * CVE-2025-40188 * CVE-2025-40194 * CVE-2025-40198 * CVE-2025-40200 * CVE-2025-40204 * CVE-2025-40205 * CVE-2025-40206 * CVE-2025-40207 CVSS scores: * CVE-2022-50253 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50253 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37916 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-37916 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37916 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38359 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38359 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38361 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38361 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38361 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39788 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39819 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39980 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39980 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40001 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40001 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40021 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-40021 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2025-40027 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40027 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40030 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40038 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40040 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40055 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40059 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40083 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40098 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40105 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40105 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40107 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40109 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40110 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40110 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40111 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40115 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40115 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40118 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40118 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40120 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40121 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40121 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40127 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40129 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40129 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40139 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40139 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40140 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40140 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40141 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40141 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40149 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40149 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40154 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40154 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40157 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40157 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40159 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40159 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40164 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40168 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40168 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40169 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40169 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40171 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40171 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40172 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40173 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40173 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40176 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40176 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40180 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40180 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40183 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40183 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40186 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40186 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40194 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40194 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40198 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40200 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-40205 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40206 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40206 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40207 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves 65 vulnerabilities and has nine fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-50253: bpf: make sure skb->len != 0 when redirecting to a tunneling device (bsc#1249912). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786). * CVE-2025-21710: tcp: correct handling of extreme memory squeeze (bsc#1237888). * CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474). * CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076). * CVE-2025-38361: drm/amd/display: Check dce_hwseq before dereferencing it (bsc#1247079). * CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (bsc#1249547). * CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982). * CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176). * CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252). * CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120). * CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063). * CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303). * CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681). * CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763). * CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773). * CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid (bsc#1252817). * CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780). * CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862). * CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821). * CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809). * CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845). * CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836). * CVE-2025-40074: net: dst_cache: annotate data-races around dst_cache->reset_ts (bsc#1252794). * CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795). * CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912). * CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917). * CVE-2025-40105: vfs: Don't leak disconnected dentries on umount (bsc#1252928). * CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409). * CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355). * CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403). * CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427). * CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416). * CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421). * CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436). * CVE-2025-40206: Add missing bugzilla reference to net fix (bsc#1250237 bsc#1253393). The following non-security bugs were fixed: * ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes). * ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes). * ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes). * ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable- fixes). * ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes). * ACPI: property: Return present device nodes only on fwnode interface (stable-fixes). * ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes). * ACPICA: Update dsmethod.c to get rid of unused variable warning (stable- fixes). * ACPICA: dispatcher: Use acpi_ds_clear_operands() in acpi_ds_call_control_method() (stable-fixes). * ALSA: hda: Fix missing pointer check in hda_component_manager_init function (git-fixes). * ALSA: serial-generic: remove shared static buffer (stable-fixes). * ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes). * ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (git-fixes). * ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable- fixes). * ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes). * ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes). * ALSA: usb-audio: do not log messages meant for 1810c when initializing 1824c (git-fixes). * ALSA: usb-audio: fix uac2 clock source at terminal parser (git-fixes). * ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes). * ASoC: cs4271: Fix regulator leak on probe failure (git-fixes). * ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable- fixes). * ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes). * ASoC: qcom: sc8280xp: explicitly set S16LE format in sc8280xp_be_hw_params_fixup() (stable-fixes). * ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes). * ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable- fixes). * Bluetooth: 6lowpan: Do not hold spin lock over sleeping functions (git- fixes). * Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes). * Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion (git-fixes). * Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes). * Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes). * Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes). * Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes). * Bluetooth: bcsp: receive data only if registered (stable-fixes). * Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes). * Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames (stable-fixes). * Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git- fixes). * Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes). * Documentation: ACPI: i2c-muxes: fix I2C device references (git-fixes). * Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes). * HID: amd_sfh: Stop sensor before starting (git-fixes). * HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes). * HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes). * HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes). * HID: uclogic: Fix potential memory leak in error path (git-fixes). * Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes). * Input: imx_sc_key - fix memory corruption on unload (git-fixes). * Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes). * KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes). * KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git- fixes). * KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes). * KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes). * KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git- fixes). * KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest (git-fixes). * KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes). * KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git- fixes). * KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git- fixes). * KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes). * KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes). * KVM: VMX: Preserve host's DEBUGCTLMSR_FREEZE_IN_SMM while running the guest (git-fixes). * KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git- fixes). * KVM: nVMX: Check vmcs12->guest_ia32_debugctl on nested VM-Enter (git-fixes). * KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes). * KVM: x86: Add helper to retrieve current value of user return MSR (git- fixes). * KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap (git-fixes). * KVM: x86: Do not treat ENTER and LEAVE as branches, because they are not (git-fixes). * KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git- fixes). * NFS4: Fix state renewals missing after boot (git-fixes). * NFS: check if suid/sgid was cleared after a write as needed (git-fixes). * NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes). * NFSD: Skip close replay processing if XDR encoding fails (git-fixes). * NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes). * NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes). * NFSv4: handle ERR_GRACE on delegation recalls (git-fixes). * PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes). * PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes). * PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes). * PCI: cadence: Check for the existence of cdns_pcie::ops before using it (stable-fixes). * PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable- fixes). * PCI: j721e: Fix incorrect error message in probe() (git-fixes). * PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git- fixes). * PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes). * RDMA/bnxt_re: Do not fail destroy QP and cleanup debugfs earlier (git-fixes) * RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes) * RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes) * RDMA/hns: Fix the modification of max_send_sge (git-fixes) * RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes) * RDMA/irdma: Fix SD index calculation (git-fixes) * RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes) * Revert "drm/tegra: dsi: Clear enable register if powered by bootloader" (git-fixes). * Revert "wifi: ath10k: avoid unnecessary wait for service ready message" (git-fixes). * accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes). * accel/habanalabs/gaudi2: read preboot status after recovering from dirty state (stable-fixes). * accel/habanalabs: return ENOMEM if less than requested pages were pinned (stable-fixes). * accel/habanalabs: support mapping cb with vmalloc-backed coherent memory (stable-fixes). * acpi,srat: Fix incorrect device handle check for Generic Initiator (git- fixes). * amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes). * block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (git-fixes). * block: fix kobject double initialization in add_disk (git-fixes). * btrfs: abort transaction on failure to add link to inode (git-fixes). * btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git- fix). * btrfs: avoid using fixed char array size for tree names (git-fix). * btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes). * btrfs: fix COW handling in run_delalloc_nocow() (git-fix). * btrfs: fix inode leak on failure to add link to inode (git-fixes). * btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix). * btrfs: mark dirty extent range for out of bound prealloc extents (git- fixes). * btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix). * btrfs: rename err to ret in btrfs_link() (git-fixes). * btrfs: run btrfs_error_commit_super() early (git-fix). * btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git- fix). * btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git- fixes). * btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes). * btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name (git-fixes). * btrfs: simplify error handling logic for btrfs_link() (git-fixes). * btrfs: tree-checker: add dev extent item checks (git-fix). * btrfs: tree-checker: add type and sequence check for inline backrefs (git- fix). * btrfs: tree-checker: fix the wrong output of data backref objectid (git- fix). * btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix). * btrfs: tree-checker: validate dref root and objectid (git-fix). * btrfs: use smp_mb__after_atomic() when forcing COW in create_pending_snapshot() (git-fixes). * char: misc: Does not request module for miscdevice with dynamic minor (stable-fixes). * char: misc: Make misc_register() reentry for miscdevice who wants dynamic minor (stable-fixes). * char: misc: restrict the dynamic range to exclude reserved minors (stable- fixes). * cramfs: Verify inode mode when loading from disk (git-fixes). * crypto: aspeed - fix double free caused by devm (git-fixes). * crypto: aspeed-acry - Convert to platform remove callback returning void (stable-fixes). * crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git- fixes). * crypto: iaa - Do not clobber req->base.data (git-fixes). * crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes). * dmaengine: dw-edma: Set status for callback_result (stable-fixes). * dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes). * drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes). * drm/amd/display: Disable VRR on DCE 6 (stable-fixes). * drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes). * drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes). * drm/amd/display: Fix black screen with HDMI outputs (git-fixes). * drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable- fixes). * drm/amd/display: add more cyan skillfish devices (stable-fixes). * drm/amd/display: ensure committing streams is seamless (stable-fixes). * drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes). * drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable- fixes). * drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes). * drm/amd/pm: Use cached metrics data on arcturus (stable-fixes). * drm/amd: Avoid evicting resources at S5 (stable-fixes). * drm/amd: Fix suspend failure with secure display TA (git-fixes). * drm/amd: add more cyan skillfish PCI ids (stable-fixes). * drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes). * drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes). * drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices (stable-fixes). * drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable- fixes). * drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes). * drm/amdgpu: do not enable SMU on cyan skillfish (stable-fixes). * drm/amdgpu: reject gang submissions under SRIOV (stable-fixes). * drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes). * drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes). * drm/amdkfd: fix vram allocation failure for a special case (stable-fixes). * drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes). * drm/bridge: cdns-dsi: Do not fail on MIPI_DSI_MODE_VIDEO_BURST (stable- fixes). * drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes). * drm/bridge: display-connector: do not set OP_DETECT for DisplayPorts (stable-fixes). * drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git- fixes). * drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes). * drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable- fixes). * drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes). * drm/msm: make sure to not queue up recovery more than once (stable-fixes). * drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf() (stable-fixes). * drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes). * drm/tegra: Add call to put_pid() (git-fixes). * drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes). * drm/tidss: Set crtc modesetting parameters with adjusted mode (stable- fixes). * drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes). * drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git- fixes). * exfat: limit log print for IO error (git-fixes). * extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes). * extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes). * fbcon: Set fb_display[i]->mode to NULL when the mode is released (stable- fixes). * fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (stable-fixes). * fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes). * fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable- fixes). * hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable- fixes). * hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes). * hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes). * hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models (stable-fixes). * hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable- fixes). * hwmon: sy7636a: add alias (stable-fixes). * iio: adc: imx93_adc: load calibrated values even calibration failed (stable- fixes). * iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before setting register (stable-fixes). * ima: do not clear IMA_DIGSIG flag when setting or removing non-IMA xattr (stable-fixes). * iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git- fixes). * isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes). * jfs: Verify inode mode when loading from disk (git-fixes). * jfs: fix uninitialized waitqueue in transaction manager (git-fixes). * kABI fix for KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes) (git-fixes). * lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC (git-fixes). * md/raid1: fix data lost for writemostly rdev (git-fixes). * md: fix mssing blktrace bio split events (git-fixes). * media: adv7180: Add missing lock in suspend callback (stable-fixes). * media: adv7180: Do not write format to device in set_fmt (stable-fixes). * media: adv7180: Only validate format in querystd (stable-fixes). * media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes). * media: fix uninitialized symbol warnings (stable-fixes). * media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR (stable-fixes). * media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer (stable-fixes). * media: imon: make send_packet() more robust (stable-fixes). * media: ov08x40: Fix the horizontal flip control (stable-fixes). * media: redrat3: use int type to store negative error codes (stable-fixes). * media: uvcvideo: Use heuristic to find stream entity (git-fixes). * memstick: Add timeout to prevent indefinite waiting (stable-fixes). * mfd: da9063: Split chip variant reading in two bus transactions (stable- fixes). * mfd: madera: Work around false-positive -Wininitialized warning (stable- fixes). * mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes). * mfd: stmpe: Remove IRQ domain upon removal (stable-fixes). * minixfs: Verify inode mode when loading from disk (git-fixes). * mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git- fixes). * mm/secretmem: fix use-after-free race in fault handler (git-fixes). * mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes). * mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes). * mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes). * mtd: onenand: Pass correct pointer to IRQ handler (git-fixes). * mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes). * mtdchar: fix integer overflow in read/write ioctls (git-fixes). * net/mana: fix warning in the writer of client oob (git-fixes). * net/smc: Remove validation of reserved bits in CLC Decline message (bsc#1253779). * net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes). * net: phy: clear link parameters on admin link down (stable-fixes). * net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable- fixes). * net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes). * net: tcp: send zero-window ACK when no memory (bsc#1253779). * net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git- fixes). * nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode dereferencing (git-fixes). * nfsd: do not defer requests during idmap lookup in v4 compound decode (bsc#1232223). * nfsd: fix return error codes for nfsd_map_name_to_id (bsc#1232223). * nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes). * perf script: add --addr2line option (bsc#1247509). * phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes). * phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet (stable-fixes). * phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0 (stable-fixes). * pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes). * pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git- fixes). * pinctrl: single: fix bias pull up/down handling in pin_config_set (stable- fixes). * platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos (git-fixes). * power: supply: qcom_battmgr: add OOI chemistry (stable-fixes). * power: supply: qcom_battmgr: handle charging state change notifications (stable-fixes). * power: supply: sbs-charger: Support multiple devices (stable-fixes). * regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes). * rtc: rx8025: fix incorrect register reference (git-fixes). * s390/mm,fault: simplify kfence fault handling (bsc#1247076). * scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git- fixes). * scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes). * scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes). * scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git- fixes). * scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes). * scsi: mpi3mr: Correctly handle ATA device errors (git-fixes). * scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes). * scsi: mpt3sas: Correctly handle ATA device errors (git-fixes). * scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git- fixes). * scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes). * scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267). * selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes). * selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes). * selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes). * selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes). * selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes). * selftests/bpf: Fix string read in strncmp benchmark (git-fixes). * selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes). * selftests/bpf: fix signedness bug in redir_partial() (git-fixes). * serial: 8250_exar: add support for Advantech 2 port card with Device ID 0x0018 (git-fixes). * serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes). * soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes). * soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes). * soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes). * spi: Try to get ACPI GPIO IRQ earlier (git-fixes). * spi: loopback-test: Do not use %pK through printk (stable-fixes). * spi: rpc-if: Add resume support for RZ/G3E (stable-fixes). * strparser: Fix signed/unsigned mismatch bug (git-fixes). * tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork (bsc#1250705). * thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes). * tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable- fixes). * tools/cpupower: fix error return value in cpupower_write_sysfs() (stable- fixes). * tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes). * tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable- fixes). * tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes). * tools: lib: thermal: do not preserve owner in install (stable-fixes). * tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes). * uio_hv_generic: Query the ringbuffer size for device (git-fixes). * usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes). * usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget (stable-fixes). * usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable- fixes). * usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes). * usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes). * usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable- fixes). * usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable- fixes). * video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable- fixes). * watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable- fixes). * wifi: ath10k: Fix connection after GTK rekeying (stable-fixes). * wifi: ath11k: zero init info->status in wmi_process_mgmt_tx_comp() (git- fixes). * wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes). * wifi: mac80211: Fix HE capabilities element check (stable-fixes). * wifi: mac80211: reject address change while connecting (git-fixes). * wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes). * wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git- fixes). * wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device (stable-fixes). * wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes). * wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git- fixes). * wifi: rtw88: sdio: use indirect IO for device registers before power-on (stable-fixes). * wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git- fixes). * x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes). * x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes). * x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes). * x86/CPU/AMD: Do the common init on future Zens too (git-fixes). * x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes). * x86/bugs: Fix reporting of LFENCE retpoline (git-fixes). * x86/bugs: Report correct retbleed mitigation status (git-fixes). * x86/vmscape: Add old Intel CPUs to affected list (git-fixes). * xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes). * xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive (git-fixes). * xhci: dbc: Improve performance by removing delay in transfer event polling (stable-fixes). * xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event (git-fixes). * xhci: dbc: poll at different rate depending on data transfer activity (stable-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-kernel-230=1 ## Package List: * SUSE Linux Micro 6.1 (noarch) * kernel-devel-rt-6.4.0-39.1 * kernel-source-rt-6.4.0-39.1 * SUSE Linux Micro 6.1 (aarch64 nosrc x86_64) * kernel-rt-6.4.0-39.1 * SUSE Linux Micro 6.1 (aarch64 x86_64) * kernel-rt-devel-6.4.0-39.1 * kernel-rt-debugsource-6.4.0-39.1 * kernel-rt-debuginfo-6.4.0-39.1 * SUSE Linux Micro 6.1 (x86_64) * kernel-rt-livepatch-6.4.0-39.1 * kernel-rt-devel-debuginfo-6.4.0-39.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50253.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-21710.html * https://www.suse.com/security/cve/CVE-2025-37916.html * https://www.suse.com/security/cve/CVE-2025-38359.html * https://www.suse.com/security/cve/CVE-2025-38361.html * https://www.suse.com/security/cve/CVE-2025-39788.html * https://www.suse.com/security/cve/CVE-2025-39805.html * https://www.suse.com/security/cve/CVE-2025-39819.html * https://www.suse.com/security/cve/CVE-2025-39859.html * https://www.suse.com/security/cve/CVE-2025-39944.html * https://www.suse.com/security/cve/CVE-2025-39980.html * https://www.suse.com/security/cve/CVE-2025-40001.html * https://www.suse.com/security/cve/CVE-2025-40021.html * https://www.suse.com/security/cve/CVE-2025-40027.html * https://www.suse.com/security/cve/CVE-2025-40030.html * https://www.suse.com/security/cve/CVE-2025-40038.html * https://www.suse.com/security/cve/CVE-2025-40040.html * https://www.suse.com/security/cve/CVE-2025-40048.html * https://www.suse.com/security/cve/CVE-2025-40055.html * https://www.suse.com/security/cve/CVE-2025-40059.html * https://www.suse.com/security/cve/CVE-2025-40064.html * https://www.suse.com/security/cve/CVE-2025-40070.html * https://www.suse.com/security/cve/CVE-2025-40074.html * https://www.suse.com/security/cve/CVE-2025-40075.html * https://www.suse.com/security/cve/CVE-2025-40083.html * https://www.suse.com/security/cve/CVE-2025-40098.html * https://www.suse.com/security/cve/CVE-2025-40105.html * https://www.suse.com/security/cve/CVE-2025-40107.html * https://www.suse.com/security/cve/CVE-2025-40109.html * https://www.suse.com/security/cve/CVE-2025-40110.html * https://www.suse.com/security/cve/CVE-2025-40111.html * https://www.suse.com/security/cve/CVE-2025-40115.html * https://www.suse.com/security/cve/CVE-2025-40116.html * https://www.suse.com/security/cve/CVE-2025-40118.html * https://www.suse.com/security/cve/CVE-2025-40120.html * https://www.suse.com/security/cve/CVE-2025-40121.html * https://www.suse.com/security/cve/CVE-2025-40127.html * https://www.suse.com/security/cve/CVE-2025-40129.html * https://www.suse.com/security/cve/CVE-2025-40139.html * https://www.suse.com/security/cve/CVE-2025-40140.html * https://www.suse.com/security/cve/CVE-2025-40141.html * https://www.suse.com/security/cve/CVE-2025-40149.html * https://www.suse.com/security/cve/CVE-2025-40154.html * https://www.suse.com/security/cve/CVE-2025-40156.html * https://www.suse.com/security/cve/CVE-2025-40157.html * https://www.suse.com/security/cve/CVE-2025-40159.html * https://www.suse.com/security/cve/CVE-2025-40164.html * https://www.suse.com/security/cve/CVE-2025-40168.html * https://www.suse.com/security/cve/CVE-2025-40169.html * https://www.suse.com/security/cve/CVE-2025-40171.html * https://www.suse.com/security/cve/CVE-2025-40172.html * https://www.suse.com/security/cve/CVE-2025-40173.html * https://www.suse.com/security/cve/CVE-2025-40176.html * https://www.suse.com/security/cve/CVE-2025-40180.html * https://www.suse.com/security/cve/CVE-2025-40183.html * https://www.suse.com/security/cve/CVE-2025-40186.html * https://www.suse.com/security/cve/CVE-2025-40188.html * https://www.suse.com/security/cve/CVE-2025-40194.html * https://www.suse.com/security/cve/CVE-2025-40198.html * https://www.suse.com/security/cve/CVE-2025-40200.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://www.suse.com/security/cve/CVE-2025-40205.html * https://www.suse.com/security/cve/CVE-2025-40206.html * https://www.suse.com/security/cve/CVE-2025-40207.html * https://bugzilla.suse.com/show_bug.cgi?id=1232223 * https://bugzilla.suse.com/show_bug.cgi?id=1237888 * https://bugzilla.suse.com/show_bug.cgi?id=1243474 * https://bugzilla.suse.com/show_bug.cgi?id=1245193 * https://bugzilla.suse.com/show_bug.cgi?id=1247076 * https://bugzilla.suse.com/show_bug.cgi?id=1247079 * https://bugzilla.suse.com/show_bug.cgi?id=1247500 * https://bugzilla.suse.com/show_bug.cgi?id=1247509 * https://bugzilla.suse.com/show_bug.cgi?id=1249547 * https://bugzilla.suse.com/show_bug.cgi?id=1249912 * https://bugzilla.suse.com/show_bug.cgi?id=1249982 * https://bugzilla.suse.com/show_bug.cgi?id=1250176 * https://bugzilla.suse.com/show_bug.cgi?id=1250237 * https://bugzilla.suse.com/show_bug.cgi?id=1250252 * https://bugzilla.suse.com/show_bug.cgi?id=1250705 * https://bugzilla.suse.com/show_bug.cgi?id=1251120 * https://bugzilla.suse.com/show_bug.cgi?id=1251786 * https://bugzilla.suse.com/show_bug.cgi?id=1252063 * https://bugzilla.suse.com/show_bug.cgi?id=1252267 * https://bugzilla.suse.com/show_bug.cgi?id=1252303 * https://bugzilla.suse.com/show_bug.cgi?id=1252353 * https://bugzilla.suse.com/show_bug.cgi?id=1252681 * https://bugzilla.suse.com/show_bug.cgi?id=1252763 * https://bugzilla.suse.com/show_bug.cgi?id=1252773 * https://bugzilla.suse.com/show_bug.cgi?id=1252780 * https://bugzilla.suse.com/show_bug.cgi?id=1252794 * https://bugzilla.suse.com/show_bug.cgi?id=1252795 * https://bugzilla.suse.com/show_bug.cgi?id=1252809 * https://bugzilla.suse.com/show_bug.cgi?id=1252817 * https://bugzilla.suse.com/show_bug.cgi?id=1252821 * https://bugzilla.suse.com/show_bug.cgi?id=1252836 * https://bugzilla.suse.com/show_bug.cgi?id=1252845 * https://bugzilla.suse.com/show_bug.cgi?id=1252862 * https://bugzilla.suse.com/show_bug.cgi?id=1252912 * https://bugzilla.suse.com/show_bug.cgi?id=1252917 * https://bugzilla.suse.com/show_bug.cgi?id=1252928 * https://bugzilla.suse.com/show_bug.cgi?id=1253018 * https://bugzilla.suse.com/show_bug.cgi?id=1253176 * https://bugzilla.suse.com/show_bug.cgi?id=1253275 * https://bugzilla.suse.com/show_bug.cgi?id=1253318 * https://bugzilla.suse.com/show_bug.cgi?id=1253324 * https://bugzilla.suse.com/show_bug.cgi?id=1253349 * https://bugzilla.suse.com/show_bug.cgi?id=1253352 * https://bugzilla.suse.com/show_bug.cgi?id=1253355 * https://bugzilla.suse.com/show_bug.cgi?id=1253360 * https://bugzilla.suse.com/show_bug.cgi?id=1253362 * https://bugzilla.suse.com/show_bug.cgi?id=1253363 * https://bugzilla.suse.com/show_bug.cgi?id=1253367 * https://bugzilla.suse.com/show_bug.cgi?id=1253369 * https://bugzilla.suse.com/show_bug.cgi?id=1253393 * https://bugzilla.suse.com/show_bug.cgi?id=1253395 * https://bugzilla.suse.com/show_bug.cgi?id=1253403 * https://bugzilla.suse.com/show_bug.cgi?id=1253407 * https://bugzilla.suse.com/show_bug.cgi?id=1253409 * https://bugzilla.suse.com/show_bug.cgi?id=1253412 * https://bugzilla.suse.com/show_bug.cgi?id=1253416 * https://bugzilla.suse.com/show_bug.cgi?id=1253421 * https://bugzilla.suse.com/show_bug.cgi?id=1253423 * https://bugzilla.suse.com/show_bug.cgi?id=1253424 * https://bugzilla.suse.com/show_bug.cgi?id=1253425 * https://bugzilla.suse.com/show_bug.cgi?id=1253427 * https://bugzilla.suse.com/show_bug.cgi?id=1253428 * https://bugzilla.suse.com/show_bug.cgi?id=1253431 * https://bugzilla.suse.com/show_bug.cgi?id=1253436 * https://bugzilla.suse.com/show_bug.cgi?id=1253438 * https://bugzilla.suse.com/show_bug.cgi?id=1253440 * https://bugzilla.suse.com/show_bug.cgi?id=1253441 * https://bugzilla.suse.com/show_bug.cgi?id=1253445 * https://bugzilla.suse.com/show_bug.cgi?id=1253448 * https://bugzilla.suse.com/show_bug.cgi?id=1253449 * https://bugzilla.suse.com/show_bug.cgi?id=1253453 * https://bugzilla.suse.com/show_bug.cgi?id=1253456 * https://bugzilla.suse.com/show_bug.cgi?id=1253472 * https://bugzilla.suse.com/show_bug.cgi?id=1253779 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:32:05 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:32:05 -0000 Subject: SUSE-SU-2026:20058-1: moderate: Security update for rsync Message-ID: <176846592592.28753.3190445507016349566@smelt2.prg2.suse.org> # Security update for rsync Announcement ID: SUSE-SU-2026:20058-1 Release Date: 2026-01-02T11:13:06Z Rating: moderate References: * bsc#1254441 Cross-References: * CVE-2025-10158 CVSS scores: * CVE-2025-10158 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-10158 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.1 An update that solves one vulnerability can now be installed. ## Description: This update for rsync fixes the following issues: * CVE-2025-10158: Fixed out of bounds array access via negative index (bsc#1254441) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-365=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * rsync-debugsource-3.3.0-slfo.1.1_4.1 * rsync-3.3.0-slfo.1.1_4.1 * rsync-debuginfo-3.3.0-slfo.1.1_4.1 ## References: * https://www.suse.com/security/cve/CVE-2025-10158.html * https://bugzilla.suse.com/show_bug.cgi?id=1254441 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:32:08 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:32:08 -0000 Subject: SUSE-SU-2026:20057-1: important: Security update for libmicrohttpd Message-ID: <176846592897.28753.6770115558811381385@smelt2.prg2.suse.org> # Security update for libmicrohttpd Announcement ID: SUSE-SU-2026:20057-1 Release Date: 2026-01-02T11:07:14Z Rating: important References: * bsc#1253177 * bsc#1253178 Cross-References: * CVE-2025-59777 * CVE-2025-62689 CVSS scores: * CVE-2025-59777 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-59777 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-59777 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-59777 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-62689 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-62689 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-62689 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-62689 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for libmicrohttpd fixes the following issues: * CVE-2025-59777: Fixed NULL pointer dereference (bsc#1253177). * CVE-2025-62689: Fixed heap-based buffer overflow(bsc#1253178). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-364=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * libmicrohttpd12-0.9.77-slfo.1.1_2.1 * libmicrohttpd12-debuginfo-0.9.77-slfo.1.1_2.1 * libmicrohttpd-debugsource-0.9.77-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-59777.html * https://www.suse.com/security/cve/CVE-2025-62689.html * https://bugzilla.suse.com/show_bug.cgi?id=1253177 * https://bugzilla.suse.com/show_bug.cgi?id=1253178 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:32:13 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:32:13 -0000 Subject: SUSE-RU-2026:20056-1: important: Recommended update for shim Message-ID: <176846593394.28753.10599685344045813565@smelt2.prg2.suse.org> # Recommended update for shim Announcement ID: SUSE-RU-2026:20056-1 Release Date: 2026-01-01T13:54:36Z Rating: important References: * bsc#1205588 * bsc#1247432 * bsc#1254336 * bsc#1254679 Affected Products: * SUSE Linux Micro 6.1 An update that has four fixes can now be installed. ## Description: This update for shim fixes the following issues: This update for shim fixes the following issues: shim is updated to version 16.1: * shim_start_image(): fix guid/handle pairing when uninstalling protocols * Fix uncompressed ipv6 netboot * fix test segfaults caused by uninitialized memory * SbatLevel_Variable.txt: minor typo fix. * Realloc() needs to allocate one more byte for sprintf() * IPv6: Add more check to avoid multiple double colon and illegal char * Loader proto v2 * loader-protocol: add workaround for EDK2 2025.02 page fault on FreePages * Generate Authenticode for the entire PE file * README: mention new loader protocol and interaction with UKIs * shim: change automatically enable MOK_POLICY_REQUIRE_NX * Save var info * add SbatLevel entry 2025051000 for PSA-2025-00012-1 * Coverity fixes 20250804 * fix http boot * Fix double free and leak in the loader protocol shim is updated to version 16.0: * Validate that a supplied vendor cert is not in PEM format * sbat: Add grub.peimage,2 to latest (CVE-2024-2312) * sbat: Also bump latest for grub,4 (and to todays date) * undo change that limits certificate files to a single file * shim: don't set second_stage to the empty string * Fix SBAT.md for today's consensus about numbers * Update Code of Conduct contact address * make-certs: Handle missing OpenSSL installation * Update MokVars.txt * export DEFINES for sub makefile * Drop unused EFI_IMAGE_SECURITY_DATABASE_GUID definition * Null-terminate 'arguments' in fallback * Fix "Verifiying" typo in error message * Update Fedora CI targets * Force gcc to produce DWARF4 so that gdb can use it * Minor housekeeping 2024121700 * Discard load-options that start with WINDOWS * Fix the issue that the gBS->LoadImage pointer was empty. * shim: Allow data after the end of device path node in load options * Handle network file not found like disks * Update gnu-efi submodule for EFI_HTTP_ERROR * Increase EFI file alignment * avoid EFIv2 runtime services on Apple x86 machines * Improve shortcut performance when comparing two boolean expressions * Provide better error message when MokManager is not found * tpm: Boot with a warning if the event log is full * MokManager: remove redundant logical constraints * Test import_mok_state() when MokListRT would be bigger than available size * test-mok-mirror: minor bug fix * Fix file system browser hang when enrolling MOK from disk * Ignore a minor clang-tidy nit * Allow fallback to default loader when encountering errors on network boot * test.mk: don't use a temporary random.bin * pe: Enhance debug report for update_mem_attrs * Multiple certificate handling improvements * Generate SbatLevel Metadata from SbatLevel_Variable.txt * Apply EKU check with compile option * Add configuration option to boot an alternative 2nd stage * Loader protocol (with Device Path resolution support) * netboot cleanup for additional files * Document how revocations can be delivered * post-process-pe: add tests to validate NX compliance * regression: CopyMem() in ad8692e copies out of bounds * Save the debug and error logs in mok-variables * Add features for the Host Security ID program * Mirror some more efi variables to mok-variables * This adds DXE Services measurements to HSI and uses them for NX * Add shim's current NX_COMPAT status to HSIStatus * README.tpm: reflect that vendor_db is in fact logged as "vendor_db" * Reject HTTP message with duplicate Content-Length header fields * Disable log saving * fallback: don't add new boot order entries backwards * README.tpm: Update MokList entry to MokListRT * SBAT Level update for February 2025 GRUB CVEs ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-363=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 x86_64) * shim-debugsource-16.1-slfo.1.1_1.1 * shim-debuginfo-16.1-slfo.1.1_1.1 * shim-16.1-slfo.1.1_1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1205588 * https://bugzilla.suse.com/show_bug.cgi?id=1247432 * https://bugzilla.suse.com/show_bug.cgi?id=1254336 * https://bugzilla.suse.com/show_bug.cgi?id=1254679 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:32:18 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:32:18 -0000 Subject: SUSE-SU-2026:20055-1: moderate: Security update for dpdk Message-ID: <176846593865.28753.12054637683297837333@smelt2.prg2.suse.org> # Security update for dpdk Announcement ID: SUSE-SU-2026:20055-1 Release Date: 2025-12-30T20:27:59Z Rating: moderate References: * bsc#1214724 * bsc#1234718 * bsc#1254161 Cross-References: * CVE-2024-11614 * CVE-2025-23259 CVSS scores: * CVE-2024-11614 ( SUSE ): 7.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2024-11614 ( NVD ): 7.4 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2025-23259 ( SUSE ): 7.0 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23259 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-23259 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities and has one fix can now be installed. ## Description: This update for dpdk fixes the following issues: Update to version 22.11.10. Security issues fixed: * CVE-2025-23259: issue in the Poll Mode Driver (PMD) allows an attacker on a VM in the system to leak information and cause a denial of service on the network interface (bsc#1254161). Other updates and bugfixes: * Fix SUSE provided DPDK modules tainting the kernel as unsupported (bsc#1214724). Upstream release notes: \- Version 22.11.9 https://doc.dpdk.org/guides-22.11/rel_notes/release_22_11.html#id24 \- Version 22.11.8 https://doc.dpdk.org/guides-22.11/rel_notes/release_22_11.html#id21 \- Version 22.11.7 https://doc.dpdk.org/guides-22.11/rel_notes/release_22_11.html#id18 \- Version 22.11.6 https://doc.dpdk.org/guides-22.11/rel_notes/release_22_11.html#id15 \- Version 22.11.5 https://doc.dpdk.org/guides-22.11/rel_notes/release_22_11.html#id12 \- Version 22.11.4 https://doc.dpdk.org/guides-22.11/rel_notes/release_22_11.html#id8 \- Version 22.11.3 https://doc.dpdk.org/guides-22.11/rel_notes/release_22_11.html#id4 \- Version 22.11.2 https://doc.dpdk.org/guides-22.11/rel_notes/release_22_11.html#id2 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-361=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le x86_64) * dpdk-22.11.10-slfo.1.1_1.1 * libdpdk-23-debuginfo-22.11.10-slfo.1.1_1.1 * dpdk-debuginfo-22.11.10-slfo.1.1_1.1 * libdpdk-23-22.11.10-slfo.1.1_1.1 * dpdk-tools-22.11.10-slfo.1.1_1.1 * dpdk-debugsource-22.11.10-slfo.1.1_1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11614.html * https://www.suse.com/security/cve/CVE-2025-23259.html * https://bugzilla.suse.com/show_bug.cgi?id=1214724 * https://bugzilla.suse.com/show_bug.cgi?id=1234718 * https://bugzilla.suse.com/show_bug.cgi?id=1254161 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:32:21 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:32:21 -0000 Subject: SUSE-SU-2026:20054-1: moderate: Security update for capstone Message-ID: <176846594174.28753.15699458144527564784@smelt2.prg2.suse.org> # Security update for capstone Announcement ID: SUSE-SU-2026:20054-1 Release Date: 2025-12-30T20:02:15Z Rating: moderate References: * bsc#1255309 * bsc#1255310 Cross-References: * CVE-2025-67873 * CVE-2025-68114 CVSS scores: * CVE-2025-67873 ( SUSE ): 2.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-67873 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-67873 ( NVD ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-67873 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-68114 ( SUSE ): 2.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-68114 ( SUSE ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L * CVE-2025-68114 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68114 ( NVD ): 4.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L Affected Products: * SUSE Linux Micro 6.1 An update that solves two vulnerabilities can now be installed. ## Description: This update for capstone fixes the following issues: * CVE-2025-67873: missing bounds check on user-provided skipdata callback can lead to a heap buffer overflow (bsc#1255309). * CVE-2025-68114: unchecked `vsnprintf` return value can lead to a stack buffer overflow (bsc#1255310). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.1 zypper in -t patch SUSE-SLE-Micro-6.1-362=1 ## Package List: * SUSE Linux Micro 6.1 (aarch64 ppc64le s390x x86_64) * capstone-debugsource-4.0.2-slfo.1.1_2.1 * libcapstone4-debuginfo-4.0.2-slfo.1.1_2.1 * libcapstone4-4.0.2-slfo.1.1_2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-67873.html * https://www.suse.com/security/cve/CVE-2025-68114.html * https://bugzilla.suse.com/show_bug.cgi?id=1255309 * https://bugzilla.suse.com/show_bug.cgi?id=1255310 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:32:23 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:32:23 -0000 Subject: SUSE-SU-2026:20053-1: important: Security update for libsoup Message-ID: <176846594369.28753.13295796034490769569@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2026:20053-1 Release Date: 2026-01-12T12:10:35Z Rating: important References: * bsc#1254876 Cross-References: * CVE-2025-14523 CVSS scores: * CVE-2025-14523 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-14523 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2025-14523 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2025-14523: flaw in HTTP header handling can lead to host header parsing discrepancy between servers and proxies and allow for request smuggling, cache poisoning and bypass of access controls (bsc#1254876). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-557=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libsoup-3_0-0-3.4.2-10.1 * libsoup-3_0-0-debuginfo-3.4.2-10.1 * libsoup-debugsource-3.4.2-10.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14523.html * https://bugzilla.suse.com/show_bug.cgi?id=1254876 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:32:26 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:32:26 -0000 Subject: SUSE-RU-2026:20052-1: moderate: Recommended update for selinux-policy Message-ID: <176846594663.28753.15408556886180583956@smelt2.prg2.suse.org> # Recommended update for selinux-policy Announcement ID: SUSE-RU-2026:20052-1 Release Date: 2026-01-12T12:10:35Z Rating: moderate References: * bsc#1231494 * bsc#1255372 Affected Products: * SUSE Linux Micro 6.0 An update that has two fixes can now be installed. ## Description: This update for selinux-policy fixes the following issues: Update to version 20230523+git34.7b0eea050: * rsync: add rsync_exec_commands boolean and enable it by default (bsc#1231494, bsc#1255372) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-556=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * selinux-policy-targeted-20230523+git34.7b0eea050-1.1 * selinux-policy-devel-20230523+git34.7b0eea050-1.1 * selinux-policy-20230523+git34.7b0eea050-1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1231494 * https://bugzilla.suse.com/show_bug.cgi?id=1255372 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:32:28 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:32:28 -0000 Subject: SUSE-SU-2026:20051-1: moderate: Security update for libtasn1 Message-ID: <176846594875.28753.5413657025865501285@smelt2.prg2.suse.org> # Security update for libtasn1 Announcement ID: SUSE-SU-2026:20051-1 Release Date: 2026-01-12T12:00:25Z Rating: moderate References: * bsc#1256341 Cross-References: * CVE-2025-13151 CVSS scores: * CVE-2025-13151 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-13151 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H * CVE-2025-13151 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for libtasn1 fixes the following issues: * CVE-2025-13151: lack of validation of input data size leads to stack-based buffer overflow in `asn1_expend_octet_string` (bsc#1256341). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-558=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libtasn1-6-4.19.0-5.1 * libtasn1-6-debuginfo-4.19.0-5.1 * libtasn1-debugsource-4.19.0-5.1 ## References: * https://www.suse.com/security/cve/CVE-2025-13151.html * https://bugzilla.suse.com/show_bug.cgi?id=1256341 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:32:32 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:32:32 -0000 Subject: SUSE-SU-2026:20050-1: moderate: Security update for libvirt Message-ID: <176846595272.28753.14254932741729304522@smelt2.prg2.suse.org> # Security update for libvirt Announcement ID: SUSE-SU-2026:20050-1 Release Date: 2026-01-09T11:03:16Z Rating: moderate References: * bsc#1235079 * bsc#1253278 * bsc#1253703 Cross-References: * CVE-2025-12748 * CVE-2025-13193 CVSS scores: * CVE-2025-12748 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-12748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-12748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-13193 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-13193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-13193 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities and has one fix can now be installed. ## Description: This update for libvirt fixes the following issues: Security issues fixed: * CVE-2025-13193: external inactive snapshots for shut-down VMs that are incorrectly created as world-readable allow unprivileged users to inspect guest OS contents (bsc#1253703). * CVE-2025-12748: parsing of user-provided XML files before ACL checks can lead to excessive memory consumption and a crash when processing a specially crafted XML file (bsc#1253278). Other updates and bugfixes: * apparmor: Fix probing of apparmor availability on the VM host when using modular daemons (bsc#1235079). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-555=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libvirt-client-qemu-10.0.0-4.1 * libvirt-daemon-driver-storage-core-10.0.0-4.1 * libvirt-daemon-driver-nodedev-debuginfo-10.0.0-4.1 * libvirt-daemon-driver-storage-iscsi-direct-debuginfo-10.0.0-4.1 * libvirt-libs-debuginfo-10.0.0-4.1 * libvirt-daemon-driver-secret-debuginfo-10.0.0-4.1 * libvirt-daemon-driver-qemu-10.0.0-4.1 * libvirt-daemon-proxy-debuginfo-10.0.0-4.1 * libvirt-daemon-driver-nwfilter-debuginfo-10.0.0-4.1 * libvirt-daemon-driver-storage-logical-debuginfo-10.0.0-4.1 * libvirt-daemon-plugin-lockd-debuginfo-10.0.0-4.1 * libvirt-nss-10.0.0-4.1 * libvirt-daemon-proxy-10.0.0-4.1 * libvirt-daemon-driver-storage-iscsi-direct-10.0.0-4.1 * libvirt-daemon-driver-storage-disk-10.0.0-4.1 * libvirt-nss-debuginfo-10.0.0-4.1 * libvirt-daemon-driver-nwfilter-10.0.0-4.1 * libvirt-daemon-driver-secret-10.0.0-4.1 * libvirt-daemon-driver-storage-logical-10.0.0-4.1 * libvirt-daemon-plugin-lockd-10.0.0-4.1 * libvirt-daemon-driver-storage-disk-debuginfo-10.0.0-4.1 * libvirt-daemon-driver-storage-iscsi-10.0.0-4.1 * libvirt-daemon-log-debuginfo-10.0.0-4.1 * libvirt-daemon-lock-10.0.0-4.1 * libvirt-daemon-driver-storage-core-debuginfo-10.0.0-4.1 * libvirt-daemon-log-10.0.0-4.1 * libvirt-debugsource-10.0.0-4.1 * libvirt-daemon-10.0.0-4.1 * libvirt-daemon-common-10.0.0-4.1 * libvirt-daemon-debuginfo-10.0.0-4.1 * libvirt-daemon-common-debuginfo-10.0.0-4.1 * libvirt-daemon-qemu-10.0.0-4.1 * libvirt-daemon-driver-storage-iscsi-debuginfo-10.0.0-4.1 * libvirt-daemon-driver-network-10.0.0-4.1 * libvirt-daemon-driver-storage-mpath-10.0.0-4.1 * libvirt-client-10.0.0-4.1 * libvirt-daemon-lock-debuginfo-10.0.0-4.1 * libvirt-daemon-hooks-10.0.0-4.1 * libvirt-daemon-driver-storage-scsi-10.0.0-4.1 * libvirt-client-debuginfo-10.0.0-4.1 * libvirt-daemon-driver-network-debuginfo-10.0.0-4.1 * libvirt-daemon-driver-qemu-debuginfo-10.0.0-4.1 * libvirt-daemon-driver-nodedev-10.0.0-4.1 * libvirt-daemon-driver-storage-scsi-debuginfo-10.0.0-4.1 * libvirt-daemon-driver-storage-mpath-debuginfo-10.0.0-4.1 * libvirt-libs-10.0.0-4.1 * libvirt-daemon-config-network-10.0.0-4.1 * libvirt-daemon-driver-storage-10.0.0-4.1 * SUSE Linux Micro 6.0 (aarch64 x86_64) * libvirt-daemon-driver-storage-rbd-debuginfo-10.0.0-4.1 * libvirt-daemon-driver-storage-rbd-10.0.0-4.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12748.html * https://www.suse.com/security/cve/CVE-2025-13193.html * https://bugzilla.suse.com/show_bug.cgi?id=1235079 * https://bugzilla.suse.com/show_bug.cgi?id=1253278 * https://bugzilla.suse.com/show_bug.cgi?id=1253703 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:32:37 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:32:37 -0000 Subject: SUSE-SU-2026:20049-1: important: Security update for openvswitch Message-ID: <176846595752.28753.13335304929273491639@smelt2.prg2.suse.org> # Security update for openvswitch Announcement ID: SUSE-SU-2026:20049-1 Release Date: 2026-01-09T10:57:45Z Rating: important References: * bsc#1216002 * bsc#1219465 * bsc#1236353 * bsc#1255435 Cross-References: * CVE-2023-3966 * CVE-2023-5366 * CVE-2024-2182 * CVE-2025-0650 CVSS scores: * CVE-2023-3966 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3966 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3966 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-5366 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-5366 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-2182 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-2182 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-0650 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-0650 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0650 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for openvswitch fixes the following issues: Update OpenvSwitch to v3.1.7 and OVN to v23.03.3. Security issues fixed: * CVE-2023-3966: ovs: invalid memory access and potential denial of service via specially crafted Geneve packets (bsc#1219465). * CVE-2023-5366: ovs: OpenFlow rules may be bypassed via specially crafted ICMPv6 Neighbor Advertisement packets sent between virtual machines t(bsc#1216002). * CVE-2024-2182: ovn: denial of service via injection of specially crafted BFD packets from inside unprivileged workloads (bsc#1255435). * CVE-2025-0650: ovn: egress ACLs may be bypassed via specially crafted UDP packet (bsc#1236353). Other updates and bugfixes: * OpenvSwitch: * https://www.openvswitch.org/releases/NEWS-3.1.7.txt * v3.1.7 * Bug fixes * OVS validated with DPDK 22.11.7. * v3.1.6 * Bug fixes * OVS validated with DPDK 22.11.6. * v3.1.5 * Bug fixes * OVS validated with DPDK 22.11.5. * v3.1.4 * Bug fixes * OVS validated with DPDK 22.11.4. * OVN: * https://github.com/ovn-org/ovn/blob/branch-23.03/NEWS * v23.03.3 * Bug fixes * Add "garp-max-timeout-sec" config option to vswitchd external-ids to cap the time between when ovn-controller sends gARP packets. * v23.03.1 * Bug fixes * CT entries are not flushed by default anymore whenever a load balancer backend is removed. A new, per-LB, option 'ct_flush' can be used to restore the previous behavior. Disabled by default. * Always allow IPv6 Router Discovery, Neighbor Discovery, and Multicast Listener Discovery protocols, regardless of ACLs defined. * Send ICMP Fragmentation Needed packets back to offending ports when communicating with multichassis ports using frames that don't fit through a tunnel. This is done only for logical switches that are attached to a physical network via a localnet port, in which case multichassis ports may have an effective MTU different from regular ports and hence may need this mechanism to maintain connectivity with other peers in the network. * ECMP routes use L4_SYM dp-hash by default if the datapath supports it. Existing sessions might get re-hashed to a different ECMP path when OVN detects the algorithm support in the datapath during an upgrade or restart of ovn-controller. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-554=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * openvswitch-3.1.7-4.1 * openvswitch-debuginfo-3.1.7-4.1 * libopenvswitch-3_1-0-debuginfo-3.1.7-4.1 * libopenvswitch-3_1-0-3.1.7-4.1 * openvswitch-debugsource-3.1.7-4.1 ## References: * https://www.suse.com/security/cve/CVE-2023-3966.html * https://www.suse.com/security/cve/CVE-2023-5366.html * https://www.suse.com/security/cve/CVE-2024-2182.html * https://www.suse.com/security/cve/CVE-2025-0650.html * https://bugzilla.suse.com/show_bug.cgi?id=1216002 * https://bugzilla.suse.com/show_bug.cgi?id=1219465 * https://bugzilla.suse.com/show_bug.cgi?id=1236353 * https://bugzilla.suse.com/show_bug.cgi?id=1255435 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:32:40 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:32:40 -0000 Subject: SUSE-SU-2026:20048-1: low: Security update for libpcap Message-ID: <176846596093.28753.18418487822879947262@smelt2.prg2.suse.org> # Security update for libpcap Announcement ID: SUSE-SU-2026:20048-1 Release Date: 2026-01-08T16:29:55Z Rating: low References: * bsc#1255765 Cross-References: * CVE-2025-11961 CVSS scores: * CVE-2025-11961 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-11961 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-11961 ( NVD ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for libpcap fixes the following issues: * CVE-2025-11961: missing validation of provided MAC-48 address string in `pcap_ether_aton()` can lead to out-of-bounds read and write (bsc#1255765). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-553=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libpcap1-debuginfo-1.10.4-4.1 * libpcap-debugsource-1.10.4-4.1 * libpcap1-1.10.4-4.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11961.html * https://bugzilla.suse.com/show_bug.cgi?id=1255765 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:32:44 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:32:44 -0000 Subject: SUSE-SU-2026:20047-1: moderate: Security update for python311 Message-ID: <176846596478.28753.3277198648946157529@smelt2.prg2.suse.org> # Security update for python311 Announcement ID: SUSE-SU-2026:20047-1 Release Date: 2026-01-08T16:29:55Z Rating: moderate References: * bsc#1254400 * bsc#1254401 * bsc#1254997 Cross-References: * CVE-2025-12084 * CVE-2025-13836 * CVE-2025-13837 CVSS scores: * CVE-2025-12084 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-12084 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-12084 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-12084 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-13836 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13836 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-13836 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13836 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2025-13837 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13837 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-13837 ( NVD ): 2.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for python311 fixes the following issues: * CVE-2025-12084: cpython: Fixed quadratic algorithm in xml.dom.minidom leading to denial of service (bsc#1254997) * CVE-2025-13836: Fixed default Content-Lenght read amount from HTTP response (bsc#1254400) * CVE-2025-13837: Fixed plistlib module denial of service (bsc#1254401) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-552=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * python311-3.11.14-2.1 * python311-base-debuginfo-3.11.14-2.1 * python311-base-3.11.14-2.1 * libpython3_11-1_0-debuginfo-3.11.14-2.1 * python311-core-debugsource-3.11.14-2.1 * python311-curses-debuginfo-3.11.14-2.1 * python311-debuginfo-3.11.14-2.1 * python311-curses-3.11.14-2.1 * python311-debugsource-3.11.14-2.1 * libpython3_11-1_0-3.11.14-2.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12084.html * https://www.suse.com/security/cve/CVE-2025-13836.html * https://www.suse.com/security/cve/CVE-2025-13837.html * https://bugzilla.suse.com/show_bug.cgi?id=1254400 * https://bugzilla.suse.com/show_bug.cgi?id=1254401 * https://bugzilla.suse.com/show_bug.cgi?id=1254997 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:32:46 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:32:46 -0000 Subject: SUSE-RU-2026:20046-1: moderate: Recommended update for scap-security-guide Message-ID: <176846596614.28753.3984432698239234569@smelt2.prg2.suse.org> # Recommended update for scap-security-guide Announcement ID: SUSE-RU-2026:20046-1 Release Date: 2026-01-08T16:18:24Z Rating: moderate References: * jsc#ECO-3319 Affected Products: * SUSE Linux Micro 6.0 An update that contains one feature can now be installed. ## Description: This update for scap-security-guide fixes the following issues: * updated to 0.1.79 (jsc#ECO-3319) * Add rhcos4 Profile for BSI Grundschutz * Create SLE15 general profile * Fix crypto policy settings in RHEL CIS profiles * Remove deprecated CIS OpenShift 1.4.0 and 1.5.0 profiles * Remove OCP STIG V1R1 * Remove OCP STIG V2R1 * Various updates for SLE 12/15 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-548=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * scap-security-guide-0.1.79-1.1 ## References: * https://jira.suse.com/browse/ECO-3319 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:32:51 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:32:51 -0000 Subject: SUSE-SU-2026:20044-1: moderate: Security update for rsync Message-ID: <176846597186.28753.11536759352134907521@smelt2.prg2.suse.org> # Security update for rsync Announcement ID: SUSE-SU-2026:20044-1 Release Date: 2026-01-08T15:50:07Z Rating: moderate References: * bsc#1254441 Cross-References: * CVE-2025-10158 CVSS scores: * CVE-2025-10158 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-10158 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for rsync fixes the following issues: * CVE-2025-10158: Fixed out of bounds array access via negative index (bsc#1254441) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-551=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * rsync-3.2.7-5.1 * rsync-debugsource-3.2.7-5.1 * rsync-debuginfo-3.2.7-5.1 ## References: * https://www.suse.com/security/cve/CVE-2025-10158.html * https://bugzilla.suse.com/show_bug.cgi?id=1254441 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:32:49 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:32:49 -0000 Subject: SUSE-SU-2026:20045-1: important: Security update for glib2 Message-ID: <176846596972.28753.7955233386454113033@smelt2.prg2.suse.org> # Security update for glib2 Announcement ID: SUSE-SU-2026:20045-1 Release Date: 2026-01-08T15:55:37Z Rating: important References: * bsc#1254297 * bsc#1254662 * bsc#1254878 Cross-References: * CVE-2025-13601 * CVE-2025-14087 * CVE-2025-14512 CVSS scores: * CVE-2025-13601 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-13601 ( NVD ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-14087 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14087 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-14087 ( NVD ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-14512 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-14512 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-14512 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for glib2 fixes the following issues: * CVE-2025-13601: Fixed Integer overflow in in g_escape_uri_string() (bsc#1254297) * CVE-2025-14087: Fixed buffer underflow in GVariant parser leads to heap corruption (bsc#1254662) * CVE-2025-14512: Fixed Integer Overflow in GLib GIO Attribute Escaping Causes Heap Buffer Overflow (bsc#1254878) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-550=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libglib-2_0-0-2.76.2-11.1 * libgmodule-2_0-0-2.76.2-11.1 * libgmodule-2_0-0-debuginfo-2.76.2-11.1 * libgobject-2_0-0-debuginfo-2.76.2-11.1 * glib2-tools-debuginfo-2.76.2-11.1 * glib2-debugsource-2.76.2-11.1 * libgio-2_0-0-2.76.2-11.1 * glib2-tools-2.76.2-11.1 * libgio-2_0-0-debuginfo-2.76.2-11.1 * libglib-2_0-0-debuginfo-2.76.2-11.1 * libgobject-2_0-0-2.76.2-11.1 ## References: * https://www.suse.com/security/cve/CVE-2025-13601.html * https://www.suse.com/security/cve/CVE-2025-14087.html * https://www.suse.com/security/cve/CVE-2025-14512.html * https://bugzilla.suse.com/show_bug.cgi?id=1254297 * https://bugzilla.suse.com/show_bug.cgi?id=1254662 * https://bugzilla.suse.com/show_bug.cgi?id=1254878 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:32:55 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:32:55 -0000 Subject: SUSE-SU-2026:20043-1: important: Security update for python-tornado6 Message-ID: <176846597565.28753.2325107069781227965@smelt2.prg2.suse.org> # Security update for python-tornado6 Announcement ID: SUSE-SU-2026:20043-1 Release Date: 2026-01-08T15:48:35Z Rating: important References: * bsc#1254903 * bsc#1254904 * bsc#1254905 Cross-References: * CVE-2025-67724 * CVE-2025-67725 * CVE-2025-67726 CVSS scores: * CVE-2025-67724 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-67724 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-67724 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-67724 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-67725 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-67725 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67725 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67726 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-67726 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67726 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for python-tornado6 fixes the following issues: * CVE-2025-67724: Fixed missing validation of the supplied reason phrase (bsc#1254903) * CVE-2025-67725: Fixed inefficient algorithm when parsing parameters for HTTP header values (bsc#1254905) * CVE-2025-67726: Fixed Denial of Service (DoS) via maliciously crafted HTTP request caused by the HTTPHeaders.add method (bsc#1254904) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-549=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * python311-tornado6-6.4-4.1 * python311-tornado6-debuginfo-6.4-4.1 * python-tornado6-debugsource-6.4-4.1 ## References: * https://www.suse.com/security/cve/CVE-2025-67724.html * https://www.suse.com/security/cve/CVE-2025-67725.html * https://www.suse.com/security/cve/CVE-2025-67726.html * https://bugzilla.suse.com/show_bug.cgi?id=1254903 * https://bugzilla.suse.com/show_bug.cgi?id=1254904 * https://bugzilla.suse.com/show_bug.cgi?id=1254905 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:33:02 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:33:02 -0000 Subject: SUSE-SU-2026:20041-1: moderate: Security update for bluez Message-ID: <176846598234.28753.1827647651510594347@smelt2.prg2.suse.org> # Security update for bluez Announcement ID: SUSE-SU-2026:20041-1 Release Date: 2026-01-08T15:04:11Z Rating: moderate References: * bsc#1217877 Cross-References: * CVE-2023-45866 CVSS scores: * CVE-2023-45866 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2023-45866 ( NVD ): 6.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves one vulnerability can now be installed. ## Description: This update for bluez fixes the following issues: * CVE-2023-45866: keystroke injection and arbitrary command execution via HID device connections (bsc#1217877). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-547=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libbluetooth3-debuginfo-5.70-2.1 * libbluetooth3-5.70-2.1 * bluez-debugsource-5.70-2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45866.html * https://bugzilla.suse.com/show_bug.cgi?id=1217877 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:33:00 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:33:00 -0000 Subject: SUSE-SU-2026:20042-1: moderate: Security update for curl Message-ID: <176846598004.28753.765697807433798980@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2026:20042-1 Release Date: 2026-01-08T15:12:45Z Rating: moderate References: * bsc#1255731 * bsc#1255732 * bsc#1255733 * bsc#1255734 Cross-References: * CVE-2025-14524 * CVE-2025-14819 * CVE-2025-15079 * CVE-2025-15224 CVSS scores: * CVE-2025-14524 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-14524 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-14524 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-14819 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-14819 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-14819 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-15079 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-15079 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-15079 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-15224 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-15224 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2025-15224 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731). * CVE-2025-14819: libssh global knownhost override (bsc#1255732). * CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733). * CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-546=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * libcurl4-debuginfo-8.14.1-3.1 * curl-debugsource-8.14.1-3.1 * libcurl4-8.14.1-3.1 * curl-debuginfo-8.14.1-3.1 * curl-8.14.1-3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14524.html * https://www.suse.com/security/cve/CVE-2025-14819.html * https://www.suse.com/security/cve/CVE-2025-15079.html * https://www.suse.com/security/cve/CVE-2025-15224.html * https://bugzilla.suse.com/show_bug.cgi?id=1255731 * https://bugzilla.suse.com/show_bug.cgi?id=1255732 * https://bugzilla.suse.com/show_bug.cgi?id=1255733 * https://bugzilla.suse.com/show_bug.cgi?id=1255734 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:33:03 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:33:03 -0000 Subject: SUSE-RU-2026:20040-1: moderate: Recommended update for kernel-livepatch-MICRO-6-0-RT_Update_15 Message-ID: <176846598360.28753.3584690518706531028@smelt2.prg2.suse.org> # Recommended update for kernel-livepatch-MICRO-6-0-RT_Update_15 Announcement ID: SUSE-RU-2026:20040-1 Release Date: 2026-01-07T10:46:19Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.0 An update that can now be installed. ## Description: This update for kernel-livepatch-MICRO-6-0-RT_Update_15 fixes the following issues: * New livepatch SLE Micro 6.0/6.1 RT kernel update 15. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-231=1 ## Package List: * SUSE Linux Micro 6.0 (x86_64) * kernel-livepatch-6_4_0-39-rt-debuginfo-1-1.1 * kernel-livepatch-MICRO-6-0-RT_Update_15-debugsource-1-1.1 * kernel-livepatch-6_4_0-39-rt-1-1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:34:02 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:34:02 -0000 Subject: SUSE-SU-2026:20039-1: important: Security update for the Linux Kernel Message-ID: <176846604246.28753.8133435659330222722@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:20039-1 Release Date: 2026-01-07T10:43:19Z Rating: important References: * bsc#1232223 * bsc#1237888 * bsc#1243474 * bsc#1245193 * bsc#1247076 * bsc#1247079 * bsc#1247500 * bsc#1247509 * bsc#1249547 * bsc#1249912 * bsc#1249982 * bsc#1250176 * bsc#1250237 * bsc#1250252 * bsc#1250705 * bsc#1251120 * bsc#1251786 * bsc#1252063 * bsc#1252267 * bsc#1252303 * bsc#1252353 * bsc#1252681 * bsc#1252763 * bsc#1252773 * bsc#1252780 * bsc#1252794 * bsc#1252795 * bsc#1252809 * bsc#1252817 * bsc#1252821 * bsc#1252836 * bsc#1252845 * bsc#1252862 * bsc#1252912 * bsc#1252917 * bsc#1252928 * bsc#1253018 * bsc#1253176 * bsc#1253275 * bsc#1253318 * bsc#1253324 * bsc#1253349 * bsc#1253352 * bsc#1253355 * bsc#1253360 * bsc#1253362 * bsc#1253363 * bsc#1253367 * bsc#1253369 * bsc#1253393 * bsc#1253395 * bsc#1253403 * bsc#1253407 * bsc#1253409 * bsc#1253412 * bsc#1253416 * bsc#1253421 * bsc#1253423 * bsc#1253424 * bsc#1253425 * bsc#1253427 * bsc#1253428 * bsc#1253431 * bsc#1253436 * bsc#1253438 * bsc#1253440 * bsc#1253441 * bsc#1253445 * bsc#1253448 * bsc#1253449 * bsc#1253453 * bsc#1253456 * bsc#1253472 * bsc#1253779 Cross-References: * CVE-2022-50253 * CVE-2023-53676 * CVE-2025-21710 * CVE-2025-37916 * CVE-2025-38359 * CVE-2025-38361 * CVE-2025-39788 * CVE-2025-39805 * CVE-2025-39819 * CVE-2025-39859 * CVE-2025-39944 * CVE-2025-39980 * CVE-2025-40001 * CVE-2025-40021 * CVE-2025-40027 * CVE-2025-40030 * CVE-2025-40038 * CVE-2025-40040 * CVE-2025-40048 * CVE-2025-40055 * CVE-2025-40059 * CVE-2025-40064 * CVE-2025-40070 * CVE-2025-40074 * CVE-2025-40075 * CVE-2025-40083 * CVE-2025-40098 * CVE-2025-40105 * CVE-2025-40107 * CVE-2025-40109 * CVE-2025-40110 * CVE-2025-40111 * CVE-2025-40115 * CVE-2025-40116 * CVE-2025-40118 * CVE-2025-40120 * CVE-2025-40121 * CVE-2025-40127 * CVE-2025-40129 * CVE-2025-40139 * CVE-2025-40140 * CVE-2025-40141 * CVE-2025-40149 * CVE-2025-40154 * CVE-2025-40156 * CVE-2025-40157 * CVE-2025-40159 * CVE-2025-40164 * CVE-2025-40168 * CVE-2025-40169 * CVE-2025-40171 * CVE-2025-40172 * CVE-2025-40173 * CVE-2025-40176 * CVE-2025-40180 * CVE-2025-40183 * CVE-2025-40186 * CVE-2025-40188 * CVE-2025-40194 * CVE-2025-40198 * CVE-2025-40200 * CVE-2025-40204 * CVE-2025-40205 * CVE-2025-40206 * CVE-2025-40207 CVSS scores: * CVE-2022-50253 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50253 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37916 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-37916 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37916 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38359 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38359 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38361 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38361 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38361 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39788 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-39788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2025-39805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39819 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39980 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-39980 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40001 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40001 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40021 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-40021 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2025-40027 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40027 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40030 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40038 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40040 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40055 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40059 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40083 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40098 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40105 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40105 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40107 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40109 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40110 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40110 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40111 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40115 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40115 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40116 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40118 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40118 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40120 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40121 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40121 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40127 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40129 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40129 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40139 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40139 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40140 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40140 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40141 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40141 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40149 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40149 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40154 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40154 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40157 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40157 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40159 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40159 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40164 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40164 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40168 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40168 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40169 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40169 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40171 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40171 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40172 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40173 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40173 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40176 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40176 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40180 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40180 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40183 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40183 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40186 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40186 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40188 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40194 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40194 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40198 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40200 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-40205 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40206 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40206 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40207 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 * SUSE Linux Micro Extras 6.0 An update that solves 65 vulnerabilities and has nine fixes can now be installed. ## Description: The SUSE Linux Enterprise Micro 6.0 and 6.1 RT kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-50253: bpf: make sure skb->len != 0 when redirecting to a tunneling device (bsc#1249912). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251786). * CVE-2025-21710: tcp: correct handling of extreme memory squeeze (bsc#1237888). * CVE-2025-37916: pds_core: remove write-after-free of client_id (bsc#1243474). * CVE-2025-38359: s390/mm: Fix in_atomic() handling in do_secure_storage_access() (bsc#1247076). * CVE-2025-38361: drm/amd/display: Check dce_hwseq before dereferencing it (bsc#1247079). * CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE (bsc#1249547). * CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove() (bsc#1249982). * CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176). * CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog (bsc#1250252). * CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp() (bsc#1251120). * CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a group (bsc#1252063). * CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue (bsc#1252303). * CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent (bsc#1252681). * CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763). * CVE-2025-40030: pinctrl: check the return value of pinmux_ops::get_function_name() (bsc#1252773). * CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid (bsc#1252817). * CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise (bsc#1252780). * CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask (bsc#1252862). * CVE-2025-40055: ocfs2: fix double free in user_cluster_connect() (bsc#1252821). * CVE-2025-40059: coresight: Fix incorrect handling for return value of devm_kzalloc (bsc#1252809). * CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev() (bsc#1252845). * CVE-2025-40070: pps: fix warning in pps_register_cdev when register device fail (bsc#1252836). * CVE-2025-40074: net: dst_cache: annotate data-races around dst_cache->reset_ts (bsc#1252794). * CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795). * CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue (bsc#1252912). * CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state() (bsc#1252917). * CVE-2025-40105: vfs: Don't leak disconnected dentries on umount (bsc#1252928). * CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set() (bsc#1253409). * CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock() (bsc#1253355). * CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation (bsc#1253403). * CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match() (bsc#1253427). * CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416). * CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth (bsc#1253421). * CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold fails (bsc#1253425). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436). * CVE-2025-40206: Add missing bugzilla reference to net fix (bsc#1250237 bsc#1253393). The following non-security bugs were fixed: * ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes). * ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes). * ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes). * ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable- fixes). * ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes). * ACPI: property: Return present device nodes only on fwnode interface (stable-fixes). * ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes). * ACPICA: Update dsmethod.c to get rid of unused variable warning (stable- fixes). * ACPICA: dispatcher: Use acpi_ds_clear_operands() in acpi_ds_call_control_method() (stable-fixes). * ALSA: hda: Fix missing pointer check in hda_component_manager_init function (git-fixes). * ALSA: serial-generic: remove shared static buffer (stable-fixes). * ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes). * ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd (git-fixes). * ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable- fixes). * ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes). * ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes). * ALSA: usb-audio: do not log messages meant for 1810c when initializing 1824c (git-fixes). * ALSA: usb-audio: fix uac2 clock source at terminal parser (git-fixes). * ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes). * ASoC: cs4271: Fix regulator leak on probe failure (git-fixes). * ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable- fixes). * ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes). * ASoC: qcom: sc8280xp: explicitly set S16LE format in sc8280xp_be_hw_params_fixup() (stable-fixes). * ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes). * ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable- fixes). * Bluetooth: 6lowpan: Do not hold spin lock over sleeping functions (git- fixes). * Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes). * Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion (git-fixes). * Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes). * Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes). * Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes). * Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes). * Bluetooth: bcsp: receive data only if registered (stable-fixes). * Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes). * Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames (stable-fixes). * Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git- fixes). * Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes). * Documentation: ACPI: i2c-muxes: fix I2C device references (git-fixes). * Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes). * HID: amd_sfh: Stop sensor before starting (git-fixes). * HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes). * HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes). * HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes). * HID: uclogic: Fix potential memory leak in error path (git-fixes). * Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes). * Input: imx_sc_key - fix memory corruption on unload (git-fixes). * Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes). * KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes). * KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git- fixes). * KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing (git-fixes). * KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes). * KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git- fixes). * KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest (git-fixes). * KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes). * KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git- fixes). * KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git- fixes). * KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes). * KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes). * KVM: VMX: Preserve host's DEBUGCTLMSR_FREEZE_IN_SMM while running the guest (git-fixes). * KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git- fixes). * KVM: nVMX: Check vmcs12->guest_ia32_debugctl on nested VM-Enter (git-fixes). * KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE (git-fixes). * KVM: x86: Add helper to retrieve current value of user return MSR (git- fixes). * KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap (git-fixes). * KVM: x86: Do not treat ENTER and LEAVE as branches, because they are not (git-fixes). * KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git- fixes). * NFS4: Fix state renewals missing after boot (git-fixes). * NFS: check if suid/sgid was cleared after a write as needed (git-fixes). * NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes). * NFSD: Skip close replay processing if XDR encoding fails (git-fixes). * NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes). * NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes). * NFSv4: handle ERR_GRACE on delegation recalls (git-fixes). * PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes). * PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes). * PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes). * PCI: cadence: Check for the existence of cdns_pcie::ops before using it (stable-fixes). * PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable- fixes). * PCI: j721e: Fix incorrect error message in probe() (git-fixes). * PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git- fixes). * PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes). * RDMA/bnxt_re: Do not fail destroy QP and cleanup debugfs earlier (git-fixes) * RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes) * RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes) * RDMA/hns: Fix the modification of max_send_sge (git-fixes) * RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes) * RDMA/irdma: Fix SD index calculation (git-fixes) * RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes) * Revert "drm/tegra: dsi: Clear enable register if powered by bootloader" (git-fixes). * Revert "wifi: ath10k: avoid unnecessary wait for service ready message" (git-fixes). * accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes). * accel/habanalabs/gaudi2: read preboot status after recovering from dirty state (stable-fixes). * accel/habanalabs: return ENOMEM if less than requested pages were pinned (stable-fixes). * accel/habanalabs: support mapping cb with vmalloc-backed coherent memory (stable-fixes). * acpi,srat: Fix incorrect device handle check for Generic Initiator (git- fixes). * amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes). * block: avoid possible overflow for chunk_sectors check in blk_stack_limits() (git-fixes). * block: fix kobject double initialization in add_disk (git-fixes). * btrfs: abort transaction on failure to add link to inode (git-fixes). * btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git- fix). * btrfs: avoid using fixed char array size for tree names (git-fix). * btrfs: do not update last_log_commit when logging inode due to a new name (git-fixes). * btrfs: fix COW handling in run_delalloc_nocow() (git-fix). * btrfs: fix inode leak on failure to add link to inode (git-fixes). * btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix). * btrfs: mark dirty extent range for out of bound prealloc extents (git- fixes). * btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix). * btrfs: rename err to ret in btrfs_link() (git-fixes). * btrfs: run btrfs_error_commit_super() early (git-fix). * btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git- fix). * btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git- fixes). * btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes). * btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name (git-fixes). * btrfs: simplify error handling logic for btrfs_link() (git-fixes). * btrfs: tree-checker: add dev extent item checks (git-fix). * btrfs: tree-checker: add type and sequence check for inline backrefs (git- fix). * btrfs: tree-checker: fix the wrong output of data backref objectid (git- fix). * btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix). * btrfs: tree-checker: validate dref root and objectid (git-fix). * btrfs: use smp_mb__after_atomic() when forcing COW in create_pending_snapshot() (git-fixes). * char: misc: Does not request module for miscdevice with dynamic minor (stable-fixes). * char: misc: Make misc_register() reentry for miscdevice who wants dynamic minor (stable-fixes). * char: misc: restrict the dynamic range to exclude reserved minors (stable- fixes). * cramfs: Verify inode mode when loading from disk (git-fixes). * crypto: aspeed - fix double free caused by devm (git-fixes). * crypto: aspeed-acry - Convert to platform remove callback returning void (stable-fixes). * crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git- fixes). * crypto: iaa - Do not clobber req->base.data (git-fixes). * crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes). * dmaengine: dw-edma: Set status for callback_result (stable-fixes). * dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes). * drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream (stable-fixes). * drm/amd/display: Disable VRR on DCE 6 (stable-fixes). * drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes). * drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes). * drm/amd/display: Fix black screen with HDMI outputs (git-fixes). * drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable- fixes). * drm/amd/display: add more cyan skillfish devices (stable-fixes). * drm/amd/display: ensure committing streams is seamless (stable-fixes). * drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes). * drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable- fixes). * drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes). * drm/amd/pm: Use cached metrics data on arcturus (stable-fixes). * drm/amd: Avoid evicting resources at S5 (stable-fixes). * drm/amd: Fix suspend failure with secure display TA (git-fixes). * drm/amd: add more cyan skillfish PCI ids (stable-fixes). * drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes). * drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes). * drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices (stable-fixes). * drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable- fixes). * drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes). * drm/amdgpu: do not enable SMU on cyan skillfish (stable-fixes). * drm/amdgpu: reject gang submissions under SRIOV (stable-fixes). * drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes). * drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes). * drm/amdkfd: fix vram allocation failure for a special case (stable-fixes). * drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes). * drm/bridge: cdns-dsi: Do not fail on MIPI_DSI_MODE_VIDEO_BURST (stable- fixes). * drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes). * drm/bridge: display-connector: do not set OP_DETECT for DisplayPorts (stable-fixes). * drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git- fixes). * drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes). * drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable- fixes). * drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes). * drm/msm: make sure to not queue up recovery more than once (stable-fixes). * drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf() (stable-fixes). * drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes). * drm/tegra: Add call to put_pid() (git-fixes). * drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes). * drm/tidss: Set crtc modesetting parameters with adjusted mode (stable- fixes). * drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes). * drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git- fixes). * exfat: limit log print for IO error (git-fixes). * extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes). * extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes). * fbcon: Set fb_display[i]->mode to NULL when the mode is released (stable- fixes). * fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds (stable-fixes). * fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes). * fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable- fixes). * hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable- fixes). * hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes). * hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes). * hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models (stable-fixes). * hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable- fixes). * hwmon: sy7636a: add alias (stable-fixes). * iio: adc: imx93_adc: load calibrated values even calibration failed (stable- fixes). * iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before setting register (stable-fixes). * ima: do not clear IMA_DIGSIG flag when setting or removing non-IMA xattr (stable-fixes). * iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git- fixes). * isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes). * jfs: Verify inode mode when loading from disk (git-fixes). * jfs: fix uninitialized waitqueue in transaction manager (git-fixes). * kABI fix for KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest (git-fixes) (git-fixes). * lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC (git-fixes). * md/raid1: fix data lost for writemostly rdev (git-fixes). * md: fix mssing blktrace bio split events (git-fixes). * media: adv7180: Add missing lock in suspend callback (stable-fixes). * media: adv7180: Do not write format to device in set_fmt (stable-fixes). * media: adv7180: Only validate format in querystd (stable-fixes). * media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes). * media: fix uninitialized symbol warnings (stable-fixes). * media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR (stable-fixes). * media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer (stable-fixes). * media: imon: make send_packet() more robust (stable-fixes). * media: ov08x40: Fix the horizontal flip control (stable-fixes). * media: redrat3: use int type to store negative error codes (stable-fixes). * media: uvcvideo: Use heuristic to find stream entity (git-fixes). * memstick: Add timeout to prevent indefinite waiting (stable-fixes). * mfd: da9063: Split chip variant reading in two bus transactions (stable- fixes). * mfd: madera: Work around false-positive -Wininitialized warning (stable- fixes). * mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes). * mfd: stmpe: Remove IRQ domain upon removal (stable-fixes). * minixfs: Verify inode mode when loading from disk (git-fixes). * mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git- fixes). * mm/secretmem: fix use-after-free race in fault handler (git-fixes). * mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes). * mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes). * mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes). * mtd: onenand: Pass correct pointer to IRQ handler (git-fixes). * mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes). * mtdchar: fix integer overflow in read/write ioctls (git-fixes). * net/mana: fix warning in the writer of client oob (git-fixes). * net/smc: Remove validation of reserved bits in CLC Decline message (bsc#1253779). * net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes). * net: phy: clear link parameters on admin link down (stable-fixes). * net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable- fixes). * net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes). * net: tcp: send zero-window ACK when no memory (bsc#1253779). * net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git- fixes). * nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode dereferencing (git-fixes). * nfsd: do not defer requests during idmap lookup in v4 compound decode (bsc#1232223). * nfsd: fix return error codes for nfsd_map_name_to_id (bsc#1232223). * nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes). * perf script: add --addr2line option (bsc#1247509). * phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes). * phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet (stable-fixes). * phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0 (stable-fixes). * pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes). * pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git- fixes). * pinctrl: single: fix bias pull up/down handling in pin_config_set (stable- fixes). * platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos (git-fixes). * power: supply: qcom_battmgr: add OOI chemistry (stable-fixes). * power: supply: qcom_battmgr: handle charging state change notifications (stable-fixes). * power: supply: sbs-charger: Support multiple devices (stable-fixes). * regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes). * rtc: rx8025: fix incorrect register reference (git-fixes). * s390/mm,fault: simplify kfence fault handling (bsc#1247076). * scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git- fixes). * scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes). * scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes). * scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git- fixes). * scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes). * scsi: mpi3mr: Correctly handle ATA device errors (git-fixes). * scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes). * scsi: mpt3sas: Correctly handle ATA device errors (git-fixes). * scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git- fixes). * scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes). * scsi: storvsc: Prefer returning channel with the same CPU as on the I/O issuing CPU (bsc#1252267). * selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes). * selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes). * selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes). * selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes). * selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes). * selftests/bpf: Fix string read in strncmp benchmark (git-fixes). * selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes). * selftests/bpf: fix signedness bug in redir_partial() (git-fixes). * serial: 8250_exar: add support for Advantech 2 port card with Device ID 0x0018 (git-fixes). * serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes). * soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes). * soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes). * soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes). * spi: Try to get ACPI GPIO IRQ earlier (git-fixes). * spi: loopback-test: Do not use %pK through printk (stable-fixes). * spi: rpc-if: Add resume support for RZ/G3E (stable-fixes). * strparser: Fix signed/unsigned mismatch bug (git-fixes). * tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork (bsc#1250705). * thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes). * tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable- fixes). * tools/cpupower: fix error return value in cpupower_write_sysfs() (stable- fixes). * tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes). * tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable- fixes). * tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes). * tools: lib: thermal: do not preserve owner in install (stable-fixes). * tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes). * uio_hv_generic: Query the ringbuffer size for device (git-fixes). * usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes). * usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget (stable-fixes). * usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable- fixes). * usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes). * usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes). * usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable- fixes). * usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable- fixes). * video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable- fixes). * watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable- fixes). * wifi: ath10k: Fix connection after GTK rekeying (stable-fixes). * wifi: ath11k: zero init info->status in wmi_process_mgmt_tx_comp() (git- fixes). * wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes). * wifi: mac80211: Fix HE capabilities element check (stable-fixes). * wifi: mac80211: reject address change while connecting (git-fixes). * wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes). * wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git- fixes). * wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device (stable-fixes). * wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes). * wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git- fixes). * wifi: rtw88: sdio: use indirect IO for device registers before power-on (stable-fixes). * wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git- fixes). * x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes). * x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes). * x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes). * x86/CPU/AMD: Do the common init on future Zens too (git-fixes). * x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes). * x86/bugs: Fix reporting of LFENCE retpoline (git-fixes). * x86/bugs: Report correct retbleed mitigation status (git-fixes). * x86/vmscape: Add old Intel CPUs to affected list (git-fixes). * xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes). * xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive (git-fixes). * xhci: dbc: Improve performance by removing delay in transfer event polling (stable-fixes). * xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event (git-fixes). * xhci: dbc: poll at different rate depending on data transfer activity (stable-fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-230=1 * SUSE Linux Micro Extras 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-kernel-230=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * kernel-devel-rt-6.4.0-39.1 * kernel-source-rt-6.4.0-39.1 * SUSE Linux Micro 6.0 (nosrc x86_64) * kernel-rt-6.4.0-39.1 * SUSE Linux Micro 6.0 (x86_64) * kernel-rt-livepatch-6.4.0-39.1 * kernel-rt-debugsource-6.4.0-39.1 * kernel-rt-debuginfo-6.4.0-39.1 * SUSE Linux Micro Extras 6.0 (nosrc) * kernel-rt-6.4.0-39.1 * SUSE Linux Micro Extras 6.0 (x86_64) * kernel-rt-debugsource-6.4.0-39.1 * kernel-rt-devel-6.4.0-39.1 * kernel-rt-devel-debuginfo-6.4.0-39.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50253.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-21710.html * https://www.suse.com/security/cve/CVE-2025-37916.html * https://www.suse.com/security/cve/CVE-2025-38359.html * https://www.suse.com/security/cve/CVE-2025-38361.html * https://www.suse.com/security/cve/CVE-2025-39788.html * https://www.suse.com/security/cve/CVE-2025-39805.html * https://www.suse.com/security/cve/CVE-2025-39819.html * https://www.suse.com/security/cve/CVE-2025-39859.html * https://www.suse.com/security/cve/CVE-2025-39944.html * https://www.suse.com/security/cve/CVE-2025-39980.html * https://www.suse.com/security/cve/CVE-2025-40001.html * https://www.suse.com/security/cve/CVE-2025-40021.html * https://www.suse.com/security/cve/CVE-2025-40027.html * https://www.suse.com/security/cve/CVE-2025-40030.html * https://www.suse.com/security/cve/CVE-2025-40038.html * https://www.suse.com/security/cve/CVE-2025-40040.html * https://www.suse.com/security/cve/CVE-2025-40048.html * https://www.suse.com/security/cve/CVE-2025-40055.html * https://www.suse.com/security/cve/CVE-2025-40059.html * https://www.suse.com/security/cve/CVE-2025-40064.html * https://www.suse.com/security/cve/CVE-2025-40070.html * https://www.suse.com/security/cve/CVE-2025-40074.html * https://www.suse.com/security/cve/CVE-2025-40075.html * https://www.suse.com/security/cve/CVE-2025-40083.html * https://www.suse.com/security/cve/CVE-2025-40098.html * https://www.suse.com/security/cve/CVE-2025-40105.html * https://www.suse.com/security/cve/CVE-2025-40107.html * https://www.suse.com/security/cve/CVE-2025-40109.html * https://www.suse.com/security/cve/CVE-2025-40110.html * https://www.suse.com/security/cve/CVE-2025-40111.html * https://www.suse.com/security/cve/CVE-2025-40115.html * https://www.suse.com/security/cve/CVE-2025-40116.html * https://www.suse.com/security/cve/CVE-2025-40118.html * https://www.suse.com/security/cve/CVE-2025-40120.html * https://www.suse.com/security/cve/CVE-2025-40121.html * https://www.suse.com/security/cve/CVE-2025-40127.html * https://www.suse.com/security/cve/CVE-2025-40129.html * https://www.suse.com/security/cve/CVE-2025-40139.html * https://www.suse.com/security/cve/CVE-2025-40140.html * https://www.suse.com/security/cve/CVE-2025-40141.html * https://www.suse.com/security/cve/CVE-2025-40149.html * https://www.suse.com/security/cve/CVE-2025-40154.html * https://www.suse.com/security/cve/CVE-2025-40156.html * https://www.suse.com/security/cve/CVE-2025-40157.html * https://www.suse.com/security/cve/CVE-2025-40159.html * https://www.suse.com/security/cve/CVE-2025-40164.html * https://www.suse.com/security/cve/CVE-2025-40168.html * https://www.suse.com/security/cve/CVE-2025-40169.html * https://www.suse.com/security/cve/CVE-2025-40171.html * https://www.suse.com/security/cve/CVE-2025-40172.html * https://www.suse.com/security/cve/CVE-2025-40173.html * https://www.suse.com/security/cve/CVE-2025-40176.html * https://www.suse.com/security/cve/CVE-2025-40180.html * https://www.suse.com/security/cve/CVE-2025-40183.html * https://www.suse.com/security/cve/CVE-2025-40186.html * https://www.suse.com/security/cve/CVE-2025-40188.html * https://www.suse.com/security/cve/CVE-2025-40194.html * https://www.suse.com/security/cve/CVE-2025-40198.html * https://www.suse.com/security/cve/CVE-2025-40200.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://www.suse.com/security/cve/CVE-2025-40205.html * https://www.suse.com/security/cve/CVE-2025-40206.html * https://www.suse.com/security/cve/CVE-2025-40207.html * https://bugzilla.suse.com/show_bug.cgi?id=1232223 * https://bugzilla.suse.com/show_bug.cgi?id=1237888 * https://bugzilla.suse.com/show_bug.cgi?id=1243474 * https://bugzilla.suse.com/show_bug.cgi?id=1245193 * https://bugzilla.suse.com/show_bug.cgi?id=1247076 * https://bugzilla.suse.com/show_bug.cgi?id=1247079 * https://bugzilla.suse.com/show_bug.cgi?id=1247500 * https://bugzilla.suse.com/show_bug.cgi?id=1247509 * https://bugzilla.suse.com/show_bug.cgi?id=1249547 * https://bugzilla.suse.com/show_bug.cgi?id=1249912 * https://bugzilla.suse.com/show_bug.cgi?id=1249982 * https://bugzilla.suse.com/show_bug.cgi?id=1250176 * https://bugzilla.suse.com/show_bug.cgi?id=1250237 * https://bugzilla.suse.com/show_bug.cgi?id=1250252 * https://bugzilla.suse.com/show_bug.cgi?id=1250705 * https://bugzilla.suse.com/show_bug.cgi?id=1251120 * https://bugzilla.suse.com/show_bug.cgi?id=1251786 * https://bugzilla.suse.com/show_bug.cgi?id=1252063 * https://bugzilla.suse.com/show_bug.cgi?id=1252267 * https://bugzilla.suse.com/show_bug.cgi?id=1252303 * https://bugzilla.suse.com/show_bug.cgi?id=1252353 * https://bugzilla.suse.com/show_bug.cgi?id=1252681 * https://bugzilla.suse.com/show_bug.cgi?id=1252763 * https://bugzilla.suse.com/show_bug.cgi?id=1252773 * https://bugzilla.suse.com/show_bug.cgi?id=1252780 * https://bugzilla.suse.com/show_bug.cgi?id=1252794 * https://bugzilla.suse.com/show_bug.cgi?id=1252795 * https://bugzilla.suse.com/show_bug.cgi?id=1252809 * https://bugzilla.suse.com/show_bug.cgi?id=1252817 * https://bugzilla.suse.com/show_bug.cgi?id=1252821 * https://bugzilla.suse.com/show_bug.cgi?id=1252836 * https://bugzilla.suse.com/show_bug.cgi?id=1252845 * https://bugzilla.suse.com/show_bug.cgi?id=1252862 * https://bugzilla.suse.com/show_bug.cgi?id=1252912 * https://bugzilla.suse.com/show_bug.cgi?id=1252917 * https://bugzilla.suse.com/show_bug.cgi?id=1252928 * https://bugzilla.suse.com/show_bug.cgi?id=1253018 * https://bugzilla.suse.com/show_bug.cgi?id=1253176 * https://bugzilla.suse.com/show_bug.cgi?id=1253275 * https://bugzilla.suse.com/show_bug.cgi?id=1253318 * https://bugzilla.suse.com/show_bug.cgi?id=1253324 * https://bugzilla.suse.com/show_bug.cgi?id=1253349 * https://bugzilla.suse.com/show_bug.cgi?id=1253352 * https://bugzilla.suse.com/show_bug.cgi?id=1253355 * https://bugzilla.suse.com/show_bug.cgi?id=1253360 * https://bugzilla.suse.com/show_bug.cgi?id=1253362 * https://bugzilla.suse.com/show_bug.cgi?id=1253363 * https://bugzilla.suse.com/show_bug.cgi?id=1253367 * https://bugzilla.suse.com/show_bug.cgi?id=1253369 * https://bugzilla.suse.com/show_bug.cgi?id=1253393 * https://bugzilla.suse.com/show_bug.cgi?id=1253395 * https://bugzilla.suse.com/show_bug.cgi?id=1253403 * https://bugzilla.suse.com/show_bug.cgi?id=1253407 * https://bugzilla.suse.com/show_bug.cgi?id=1253409 * https://bugzilla.suse.com/show_bug.cgi?id=1253412 * https://bugzilla.suse.com/show_bug.cgi?id=1253416 * https://bugzilla.suse.com/show_bug.cgi?id=1253421 * https://bugzilla.suse.com/show_bug.cgi?id=1253423 * https://bugzilla.suse.com/show_bug.cgi?id=1253424 * https://bugzilla.suse.com/show_bug.cgi?id=1253425 * https://bugzilla.suse.com/show_bug.cgi?id=1253427 * https://bugzilla.suse.com/show_bug.cgi?id=1253428 * https://bugzilla.suse.com/show_bug.cgi?id=1253431 * https://bugzilla.suse.com/show_bug.cgi?id=1253436 * https://bugzilla.suse.com/show_bug.cgi?id=1253438 * https://bugzilla.suse.com/show_bug.cgi?id=1253440 * https://bugzilla.suse.com/show_bug.cgi?id=1253441 * https://bugzilla.suse.com/show_bug.cgi?id=1253445 * https://bugzilla.suse.com/show_bug.cgi?id=1253448 * https://bugzilla.suse.com/show_bug.cgi?id=1253449 * https://bugzilla.suse.com/show_bug.cgi?id=1253453 * https://bugzilla.suse.com/show_bug.cgi?id=1253456 * https://bugzilla.suse.com/show_bug.cgi?id=1253472 * https://bugzilla.suse.com/show_bug.cgi?id=1253779 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:34:10 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:34:10 -0000 Subject: SUSE-SU-2026:20038-1: important: Security update for qemu Message-ID: <176846605067.28753.39875204919792601@smelt2.prg2.suse.org> # Security update for qemu Announcement ID: SUSE-SU-2026:20038-1 Release Date: 2026-01-06T12:03:03Z Rating: important References: * bsc#1230042 * bsc#1240157 * bsc#1243013 * bsc#1246566 * bsc#1250984 * bsc#1252768 * bsc#1253002 * bsc#1254286 Cross-References: * CVE-2025-11234 * CVE-2025-12464 CVSS scores: * CVE-2025-11234 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-11234 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-11234 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-12464 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-12464 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-12464 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities and has six fixes can now be installed. ## Description: This update for qemu fixes the following issues: Update to version 8.2.10. Security issues fixed: * CVE-2025-12464: stack-based buffer overflow in the e1000 network device operations can be exploited by a malicious guest user to crash the QEMU process on the host (bsc#1253002). * CVE-2025-11234: use-after-free in WebSocket handshake operations can be exploited by a malicious client with network access to the VNC WebSocket port to cause a denial-of-service (bsc#1250984). Other updates and bugfixes: * [openSUSE][RPM] spec: require qemu-hw-display-virtio-gpu-pci for x86 too. * [openSUSE][RPM]: really fix *-virtio-gpu-pci dependency on ARM (bsc#1254286). * block/curl: fix curl internal handles handling (bsc#1252768). * [openSUSE][RPM]: spec: qemu-vgabios is required on ppc (bsc#1230042). * [roms] seabios: include "pciinit: don't misalign large BARs" (bsc#1246566). * [openSUSE][RPM] spec: Require ipxe and virtio-gpu packages for more arch-es (bsc#1240157). * [openSUSE][RPM]: disable LTO for userspace emulation on 15.6 (bsc#1243013). * Version 8.2.10 changes: * Full changelog: https://lore.kernel.org/qemu- devel/7dd1fbc7-a58f-4b2c-82b9-735840246ab2 at tls.msk.ru/ * Some backports: * hw/misc/aspeed_hace: Fix buffer overflow in has_padding function * target/ppc: Fix e200 duplicate SPRs * linux-user/riscv: Fix handling of cpu mask in riscv_hwprobe syscall * docs/about/emulation: Fix broken link * vdpa: Allow vDPA to work on big-endian machine * vdpa: Fix endian bugs in shadow virtqueue * target/loongarch: Fix vldi inst * target/arm: Simplify pstate_sm check in sve_access_check * target/arm: Make DisasContext.{fp, sve}_access_checked tristate * util/cacheflush: Make first DSB unconditional on aarch64 * ui/cocoa: Temporarily ignore annoying deprecated declaration warnings * docs: Rename default-configs to configs * block: Zero block driver state before reopening * hw/xen/hvm: Fix Aarch64 typo * hw/net/smc91c111: Don't allow data register access to overrun buffer * hw/net/smc91c111: Sanitize packet length on tx * hw/net/smc91c111: Sanitize packet numbers * hw/net/smc91c111: Ignore attempt to pop from empty RX fifo * ppc/pnv/occ: Fix common area sensor offsets * net: move backend cleanup to NIC cleanup * net: parameterize the removing client from nc list * util/qemu-timer.c: Don't warp timer from timerlist_rearm() * target/arm: Correct STRD atomicity * target/arm: Correct LDRD atomicity and fault behaviour ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-545=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * qemu-chardev-spice-debuginfo-8.2.10-1.1 * qemu-guest-agent-8.2.10-1.1 * qemu-hw-display-virtio-gpu-pci-8.2.10-1.1 * qemu-hw-usb-host-debuginfo-8.2.10-1.1 * qemu-pr-helper-8.2.10-1.1 * qemu-hw-display-qxl-debuginfo-8.2.10-1.1 * qemu-debugsource-8.2.10-1.1 * qemu-block-iscsi-debuginfo-8.2.10-1.1 * qemu-chardev-spice-8.2.10-1.1 * qemu-hw-display-virtio-vga-8.2.10-1.1 * qemu-hw-display-virtio-gpu-debuginfo-8.2.10-1.1 * qemu-hw-usb-redirect-8.2.10-1.1 * qemu-ui-spice-core-8.2.10-1.1 * qemu-ui-spice-core-debuginfo-8.2.10-1.1 * qemu-block-curl-8.2.10-1.1 * qemu-hw-usb-redirect-debuginfo-8.2.10-1.1 * qemu-block-ssh-8.2.10-1.1 * qemu-ui-opengl-debuginfo-8.2.10-1.1 * qemu-img-8.2.10-1.1 * qemu-ksm-8.2.10-1.1 * qemu-tools-debuginfo-8.2.10-1.1 * qemu-hw-display-virtio-gpu-pci-debuginfo-8.2.10-1.1 * qemu-block-ssh-debuginfo-8.2.10-1.1 * qemu-tools-8.2.10-1.1 * qemu-block-rbd-8.2.10-1.1 * qemu-ui-opengl-8.2.10-1.1 * qemu-audio-spice-8.2.10-1.1 * qemu-block-iscsi-8.2.10-1.1 * qemu-8.2.10-1.1 * qemu-block-rbd-debuginfo-8.2.10-1.1 * qemu-hw-display-qxl-8.2.10-1.1 * qemu-audio-spice-debuginfo-8.2.10-1.1 * qemu-pr-helper-debuginfo-8.2.10-1.1 * qemu-hw-display-virtio-vga-debuginfo-8.2.10-1.1 * qemu-hw-display-virtio-gpu-8.2.10-1.1 * qemu-img-debuginfo-8.2.10-1.1 * qemu-block-curl-debuginfo-8.2.10-1.1 * qemu-debuginfo-8.2.10-1.1 * qemu-guest-agent-debuginfo-8.2.10-1.1 * qemu-hw-usb-host-8.2.10-1.1 * SUSE Linux Micro 6.0 (x86_64) * qemu-accel-tcg-x86-debuginfo-8.2.10-1.1 * qemu-x86-8.2.10-1.1 * qemu-accel-tcg-x86-8.2.10-1.1 * qemu-x86-debuginfo-8.2.10-1.1 * SUSE Linux Micro 6.0 (noarch) * qemu-seabios-8.2.101.16.3_3_ga95067eb-1.1 * qemu-ipxe-8.2.10-1.1 * qemu-vgabios-8.2.101.16.3_3_ga95067eb-1.1 * qemu-lang-8.2.10-1.1 * SUSE Linux Micro 6.0 (s390x) * qemu-s390x-debuginfo-8.2.10-1.1 * qemu-s390x-8.2.10-1.1 * SUSE Linux Micro 6.0 (aarch64) * qemu-arm-debuginfo-8.2.10-1.1 * qemu-arm-8.2.10-1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11234.html * https://www.suse.com/security/cve/CVE-2025-12464.html * https://bugzilla.suse.com/show_bug.cgi?id=1230042 * https://bugzilla.suse.com/show_bug.cgi?id=1240157 * https://bugzilla.suse.com/show_bug.cgi?id=1243013 * https://bugzilla.suse.com/show_bug.cgi?id=1246566 * https://bugzilla.suse.com/show_bug.cgi?id=1250984 * https://bugzilla.suse.com/show_bug.cgi?id=1252768 * https://bugzilla.suse.com/show_bug.cgi?id=1253002 * https://bugzilla.suse.com/show_bug.cgi?id=1254286 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:34:14 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:34:14 -0000 Subject: SUSE-SU-2026:20037-1: important: Security update for ovmf Message-ID: <176846605409.28753.185215129537024488@smelt2.prg2.suse.org> # Security update for ovmf Announcement ID: SUSE-SU-2026:20037-1 Release Date: 2025-12-30T20:26:33Z Rating: important References: * bsc#1218879 * bsc#1218880 Cross-References: * CVE-2023-45229 * CVE-2023-45230 CVSS scores: * CVE-2023-45229 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-45229 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-45229 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-45230 ( SUSE ): 8.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H * CVE-2023-45230 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-45230 ( NVD ): 8.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for ovmf fixes the following issues: * CVE-2023-45229: integer underflow and out-of-bounds read when processing IA_NA/IA_TA options in a DHCPv6 Advertise message (bsc#1218879). * CVE-2023-45230: out-of-bounds write in the DHCPv6 client through a long Server ID option (bsc#1218880). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-544=1 ## Package List: * SUSE Linux Micro 6.0 (noarch) * qemu-uefi-aarch64-202305-2.1 * qemu-ovmf-x86_64-202305-2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45229.html * https://www.suse.com/security/cve/CVE-2023-45230.html * https://bugzilla.suse.com/show_bug.cgi?id=1218879 * https://bugzilla.suse.com/show_bug.cgi?id=1218880 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:34:19 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:34:19 -0000 Subject: SUSE-SU-2026:20036-1: moderate: Security update for dpdk Message-ID: <176846605907.28753.7859448292268454798@smelt2.prg2.suse.org> # Security update for dpdk Announcement ID: SUSE-SU-2026:20036-1 Release Date: 2025-12-30T20:23:52Z Rating: moderate References: * bsc#1214724 * bsc#1234718 * bsc#1254161 Cross-References: * CVE-2024-11614 * CVE-2025-23259 CVSS scores: * CVE-2024-11614 ( SUSE ): 7.4 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2024-11614 ( NVD ): 7.4 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H * CVE-2025-23259 ( SUSE ): 7.0 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23259 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-23259 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities and has one fix can now be installed. ## Description: This update for dpdk fixes the following issues: Update to version 22.11.10. Security issues fixed: * CVE-2025-23259: issue in the Poll Mode Driver (PMD) allows an attacker on a VM in the system to leak information and cause a denial of service on the network interface (bsc#1254161). Other updates and bugfixes: * Fix SUSE provided DPDK modules tainting the kernel as unsupported (bsc#1214724). Upstream release notes: \- Version 22.11.9 https://doc.dpdk.org/guides-22.11/rel_notes/release_22_11.html#id24 \- Version 22.11.8 https://doc.dpdk.org/guides-22.11/rel_notes/release_22_11.html#id21 \- Version 22.11.7 https://doc.dpdk.org/guides-22.11/rel_notes/release_22_11.html#id18 \- Version 22.11.6 https://doc.dpdk.org/guides-22.11/rel_notes/release_22_11.html#id15 \- Version 22.11.5 https://doc.dpdk.org/guides-22.11/rel_notes/release_22_11.html#id12 \- Version 22.11.4 https://doc.dpdk.org/guides-22.11/rel_notes/release_22_11.html#id8 \- Version 22.11.3 https://doc.dpdk.org/guides-22.11/rel_notes/release_22_11.html#id4 \- Version 22.11.2 https://doc.dpdk.org/guides-22.11/rel_notes/release_22_11.html#id2 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-542=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 x86_64) * dpdk-debuginfo-22.11.10-1.1 * dpdk-22.11.10-1.1 * dpdk-tools-22.11.10-1.1 * libdpdk-23-debuginfo-22.11.10-1.1 * dpdk-debugsource-22.11.10-1.1 * libdpdk-23-22.11.10-1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-11614.html * https://www.suse.com/security/cve/CVE-2025-23259.html * https://bugzilla.suse.com/show_bug.cgi?id=1214724 * https://bugzilla.suse.com/show_bug.cgi?id=1234718 * https://bugzilla.suse.com/show_bug.cgi?id=1254161 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:34:22 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:34:22 -0000 Subject: SUSE-SU-2026:20035-1: important: Security update for podman Message-ID: <176846606264.28753.8682641853436096986@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2026:20035-1 Release Date: 2025-12-30T20:15:49Z Rating: important References: * bsc#1253542 * bsc#1253993 Cross-References: * CVE-2025-47913 * CVE-2025-47914 CVSS scores: * CVE-2025-47913 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-47913 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47913 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47914 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-47914 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-47914 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Micro 6.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2025-47914: lack of message size validation when SSH Agent server is processing new identity requests can lead to out-of-bounds read and an application panic (bsc#1253993). * CVE-2025-47913: receiving an `SSH_AGENT_SUCCESS` reply when the SSH client is expecting a typed response can lead to the early termination of the client process (bsc#1253542). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.0 zypper in -t patch SUSE-SLE-Micro-6.0-543=1 ## Package List: * SUSE Linux Micro 6.0 (aarch64 s390x x86_64) * podman-remote-debuginfo-4.9.5-10.1 * podman-remote-4.9.5-10.1 * podman-debuginfo-4.9.5-10.1 * podman-4.9.5-10.1 * podmansh-4.9.5-10.1 * SUSE Linux Micro 6.0 (noarch) * podman-docker-4.9.5-10.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47913.html * https://www.suse.com/security/cve/CVE-2025-47914.html * https://bugzilla.suse.com/show_bug.cgi?id=1253542 * https://bugzilla.suse.com/show_bug.cgi?id=1253993 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:34:27 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:34:27 -0000 Subject: SUSE-RU-2026:20033-1: important: Recommended update for virt-manager Message-ID: <176846606745.28753.17889646391316800981@smelt2.prg2.suse.org> # Recommended update for virt-manager Announcement ID: SUSE-RU-2026:20033-1 Release Date: 2026-01-12T15:30:01Z Rating: important References: * bsc#1252105 * jsc#PED-9265 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that contains one feature and has one fix can now be installed. ## Description: This update for virt-manager fixes the following issues: * Unable to create an SEV-SNP enabled guest with virt-manager This simplifies the code from what used to be required for sev while adding initial tdx support (bsc#1252105). * Add support for creating TDX guests in virt-install (jsc#PED-9265) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-133=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-133=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * virt-manager-5.0.0-160000.4.1 * virt-install-5.0.0-160000.4.1 * virt-manager-common-5.0.0-160000.4.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * virt-manager-5.0.0-160000.4.1 * virt-install-5.0.0-160000.4.1 * virt-manager-common-5.0.0-160000.4.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1252105 * https://jira.suse.com/browse/PED-9265 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:34:25 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:34:25 -0000 Subject: SUSE-RU-2026:20034-1: critical: Recommended update for patterns-sap Message-ID: <176846606546.28753.10545810582969098184@smelt2.prg2.suse.org> # Recommended update for patterns-sap Announcement ID: SUSE-RU-2026:20034-1 Release Date: 2026-01-07T09:13:17Z Rating: critical References: * bsc#1250279 * bsc#1254650 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that has two fixes can now be installed. ## Description: This update for patterns-sap fixes the following issues: * remove package 'golang-github-prometheus-prometheus' from pattern 'trento_server' and 'monitoring' (bsc#1254650) * fix pattern name used in Provides/Obsoletes of SLE15 pattern 'sap_server' (bsc#1250279) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-120=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-120=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (ppc64le x86_64) * patterns-sap-minimal_sap-16.0-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * patterns-sap-monitoring-16.0-160000.3.1 * patterns-sap-security-16.0-160000.3.1 * patterns-sap-gui-16.0-160000.3.1 * patterns-sap-automation-16.0-160000.3.1 * patterns-sap-DB-16.0-160000.3.1 * patterns-sap-addons-16.0-160000.3.1 * patterns-sap-base_sap_server-16.0-160000.3.1 * patterns-sap-debug-16.0-160000.3.1 * patterns-sap-trento_agent-16.0-160000.3.1 * patterns-sap-HAAPP-16.0-160000.3.1 * patterns-sap-APP-16.0-160000.3.1 * patterns-sap-minimal_sap-16.0-160000.3.1 * patterns-sap-trento_server-16.0-160000.3.1 * patterns-sap-HADB-16.0-160000.3.1 * patterns-sap-sap_all-16.0-160000.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1250279 * https://bugzilla.suse.com/show_bug.cgi?id=1254650 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:34:46 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:34:46 -0000 Subject: SUSE-SU-2026:20031-1: important: Security update for MozillaFirefox Message-ID: <176846608623.28753.3757325245774018522@smelt2.prg2.suse.org> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2026:20031-1 Release Date: 2026-01-12T11:35:13Z Rating: important References: * bsc#1254551 Cross-References: * CVE-2025-14321 * CVE-2025-14322 * CVE-2025-14323 * CVE-2025-14324 * CVE-2025-14325 * CVE-2025-14328 * CVE-2025-14329 * CVE-2025-14330 * CVE-2025-14331 * CVE-2025-14333 CVSS scores: * CVE-2025-14321 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14321 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14321 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-14321 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-14322 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14322 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14322 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N * CVE-2025-14323 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14323 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14323 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14324 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14324 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14324 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-14324 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-14325 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14325 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14325 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-14328 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-14328 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-14328 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14329 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-14329 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L * CVE-2025-14329 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14330 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-14330 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-14330 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-14330 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-14331 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-14331 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-14331 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-14331 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-14333 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14333 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14333 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-14333 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves 10 vulnerabilities can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: Changes in MozillaFirefox: Firefox Extended Support Release 140.6.0 ESR was released: * Fixed: Various security fixes. MFSA 2025-94 (bsc#1254551): * CVE-2025-14321: Use-after-free in the WebRTC: Signaling component * CVE-2025-14322: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component * CVE-2025-14323: Privilege escalation in the DOM: Notifications component * CVE-2025-14324: JIT miscompilation in the JavaScript Engine: JIT component * CVE-2025-14325: JIT miscompilation in the JavaScript Engine: JIT component * CVE-2025-14328: Privilege escalation in the Netmonitor component * CVE-2025-14329: Privilege escalation in the Netmonitor component * CVE-2025-14330: JIT miscompilation in the JavaScript Engine: JIT component * CVE-2025-14331: Same-origin policy bypass in the Request Handling component * CVE-2025-14333: Memory safety bugs fixed in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-128=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-128=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-debuginfo-140.6.0-160000.1.1 * MozillaFirefox-translations-other-140.6.0-160000.1.1 * MozillaFirefox-debugsource-140.6.0-160000.1.1 * MozillaFirefox-140.6.0-160000.1.1 * MozillaFirefox-translations-common-140.6.0-160000.1.1 * SUSE Linux Enterprise Server 16.0 (noarch) * MozillaFirefox-devel-140.6.0-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * MozillaFirefox-debuginfo-140.6.0-160000.1.1 * MozillaFirefox-translations-other-140.6.0-160000.1.1 * MozillaFirefox-debugsource-140.6.0-160000.1.1 * MozillaFirefox-140.6.0-160000.1.1 * MozillaFirefox-translations-common-140.6.0-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * MozillaFirefox-devel-140.6.0-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14321.html * https://www.suse.com/security/cve/CVE-2025-14322.html * https://www.suse.com/security/cve/CVE-2025-14323.html * https://www.suse.com/security/cve/CVE-2025-14324.html * https://www.suse.com/security/cve/CVE-2025-14325.html * https://www.suse.com/security/cve/CVE-2025-14328.html * https://www.suse.com/security/cve/CVE-2025-14329.html * https://www.suse.com/security/cve/CVE-2025-14330.html * https://www.suse.com/security/cve/CVE-2025-14331.html * https://www.suse.com/security/cve/CVE-2025-14333.html * https://bugzilla.suse.com/show_bug.cgi?id=1254551 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:34:43 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:34:43 -0000 Subject: SUSE-SU-2026:20032-1: important: Security update for glib2 Message-ID: <176846608383.28753.4060502032829629807@smelt2.prg2.suse.org> # Security update for glib2 Announcement ID: SUSE-SU-2026:20032-1 Release Date: 2026-01-12T11:52:23Z Rating: important References: * bsc#1249055 * bsc#1254297 * bsc#1254662 * bsc#1254878 Cross-References: * CVE-2025-13601 * CVE-2025-14087 * CVE-2025-14512 * CVE-2025-7039 CVSS scores: * CVE-2025-13601 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-13601 ( NVD ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H * CVE-2025-14087 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14087 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-14087 ( NVD ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-14512 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-14512 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-14512 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-7039 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-7039 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-7039 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for glib2 fixes the following issues: Update to version 2.84.4. Security issues fixed: * CVE-2025-14512: integer overflow in the GIO `escape_byte_string()` function when processing malicious files or remote filesystem attribute values can lead to denial-of-service (bsc#1254878). * CVE-2025-14087: buffer underflow in the GVariant parser `bytestring_parse()` and `string_parse()` functions when processing attacker-influenced data may lead to crash or code execution (bsc#1254662). * CVE-2025-13601: heap-based buffer overflow in the `g_escape_uri_string()` function when processing strings with a large number of unacceptable characters may lead to crash or code execution (bsc#1254297). * CVE-2025-7039: integer overflow when creating temporary files may lead to an out-of-bounds memory access that can be used for path traversal or exposure of sensitive content in a temporary file (bsc#1249055). Other issues fixed and changes: * Fix GFile leak in `g_local_file_set_display_name` during error handling. * Fix incorrect output parameter handling in closure helper of `g_settings_bind_with_mapping_closures`. * `gfileutils`: fix computation of temporary file name. * Fix GFile leak in `g_local_file_set_display_name()`. * `gthreadpool`: catch `pool_spawner` creation failure. * `gio/filenamecompleter`: fix leaks. * `gfilenamecompleter`: fix `g_object_unref()` of undefined value. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-132=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-132=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * libglib-2_0-0-debuginfo-2.84.4-160000.1.1 * typelib-1_0-GLib-2_0-2.84.4-160000.1.1 * glib2-tools-debuginfo-2.84.4-160000.1.1 * typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1 * libgio-2_0-0-debuginfo-2.84.4-160000.1.1 * glib2-devel-debuginfo-2.84.4-160000.1.1 * typelib-1_0-GObject-2_0-2.84.4-160000.1.1 * libglib-2_0-0-2.84.4-160000.1.1 * typelib-1_0-Gio-2_0-2.84.4-160000.1.1 * glib2-doc-2.84.4-160000.1.1 * libgirepository-2_0-0-debuginfo-2.84.4-160000.1.1 * glib2-devel-2.84.4-160000.1.1 * glib2-devel-static-2.84.4-160000.1.1 * typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1 * libgthread-2_0-0-debuginfo-2.84.4-160000.1.1 * libgthread-2_0-0-2.84.4-160000.1.1 * glib2-tools-2.84.4-160000.1.1 * typelib-1_0-GModule-2_0-2.84.4-160000.1.1 * libgio-2_0-0-2.84.4-160000.1.1 * libgobject-2_0-0-debuginfo-2.84.4-160000.1.1 * glib2-debugsource-2.84.4-160000.1.1 * libgirepository-2_0-0-2.84.4-160000.1.1 * libgobject-2_0-0-2.84.4-160000.1.1 * libgmodule-2_0-0-debuginfo-2.84.4-160000.1.1 * libgmodule-2_0-0-2.84.4-160000.1.1 * SUSE Linux Enterprise Server 16.0 (noarch) * gio-branding-SLE-16-160000.2.2 * glib2-lang-2.84.4-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * libglib-2_0-0-debuginfo-2.84.4-160000.1.1 * typelib-1_0-GLib-2_0-2.84.4-160000.1.1 * glib2-tools-debuginfo-2.84.4-160000.1.1 * typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1 * libgio-2_0-0-debuginfo-2.84.4-160000.1.1 * glib2-devel-debuginfo-2.84.4-160000.1.1 * typelib-1_0-GObject-2_0-2.84.4-160000.1.1 * libglib-2_0-0-2.84.4-160000.1.1 * typelib-1_0-Gio-2_0-2.84.4-160000.1.1 * glib2-doc-2.84.4-160000.1.1 * libgirepository-2_0-0-debuginfo-2.84.4-160000.1.1 * glib2-devel-2.84.4-160000.1.1 * glib2-devel-static-2.84.4-160000.1.1 * typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1 * libgthread-2_0-0-debuginfo-2.84.4-160000.1.1 * libgthread-2_0-0-2.84.4-160000.1.1 * glib2-tools-2.84.4-160000.1.1 * typelib-1_0-GModule-2_0-2.84.4-160000.1.1 * libgio-2_0-0-2.84.4-160000.1.1 * libgobject-2_0-0-debuginfo-2.84.4-160000.1.1 * glib2-debugsource-2.84.4-160000.1.1 * libgirepository-2_0-0-2.84.4-160000.1.1 * libgobject-2_0-0-2.84.4-160000.1.1 * libgmodule-2_0-0-debuginfo-2.84.4-160000.1.1 * libgmodule-2_0-0-2.84.4-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * gio-branding-SLE-16-160000.2.2 * glib2-lang-2.84.4-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-13601.html * https://www.suse.com/security/cve/CVE-2025-14087.html * https://www.suse.com/security/cve/CVE-2025-14512.html * https://www.suse.com/security/cve/CVE-2025-7039.html * https://bugzilla.suse.com/show_bug.cgi?id=1249055 * https://bugzilla.suse.com/show_bug.cgi?id=1254297 * https://bugzilla.suse.com/show_bug.cgi?id=1254662 * https://bugzilla.suse.com/show_bug.cgi?id=1254878 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:34:52 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:34:52 -0000 Subject: SUSE-SU-2026:20030-1: important: Security update for libpng16 Message-ID: <176846609299.28753.2119009069910315278@smelt2.prg2.suse.org> # Security update for libpng16 Announcement ID: SUSE-SU-2026:20030-1 Release Date: 2026-01-12T11:14:46Z Rating: important References: * bsc#1254157 * bsc#1254158 * bsc#1254159 * bsc#1254160 * bsc#1254480 Cross-References: * CVE-2025-64505 * CVE-2025-64506 * CVE-2025-64720 * CVE-2025-65018 * CVE-2025-66293 CVSS scores: * CVE-2025-64505 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-64505 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2025-64505 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H * CVE-2025-64506 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-64506 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2025-64506 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H * CVE-2025-64720 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-64720 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2025-64720 ( NVD ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H * CVE-2025-65018 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-65018 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2025-65018 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H * CVE-2025-66293 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-66293 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H * CVE-2025-66293 ( NVD ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves five vulnerabilities can now be installed. ## Description: This update for libpng16 fixes the following issues: * CVE-2025-64505: heap buffer over-read in `png_do_quantize` when processing PNG files malformed palette indices (bsc#1254157). * CVE-2025-64506: heap buffer over-read in `png_write_image_8bit` when processing 8-bit input with `convert_to_8bit` enabled (bsc#1254158). * CVE-2025-64720: out-of-bounds read in `png_image_read_composite` when processing palette images with `PNG_FLAG_OPTIMIZE_ALPHA` enabled (bsc#1254159). * CVE-2025-65018: heap buffer overflow in `png_image_finish_read` when processing specially crafted 16-bit interlaced PNGs with 8-bit output format (bsc#1254160). * CVE-2025-66293: out-of-bounds read of the `png_sRGB_base` array when processing palette PNG images with partial transparency and gamma correction (bsc#1254480). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-131=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-131=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * libpng16-tools-1.6.44-160000.3.1 * libpng16-compat-devel-1.6.44-160000.3.1 * libpng16-tools-debuginfo-1.6.44-160000.3.1 * libpng16-16-1.6.44-160000.3.1 * libpng16-16-debuginfo-1.6.44-160000.3.1 * libpng16-devel-1.6.44-160000.3.1 * libpng16-debugsource-1.6.44-160000.3.1 * SUSE Linux Enterprise Server 16.0 (x86_64) * libpng16-16-x86-64-v3-1.6.44-160000.3.1 * libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1 * libpng16-devel-x86-64-v3-1.6.44-160000.3.1 * libpng16-16-x86-64-v3-debuginfo-1.6.44-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * libpng16-tools-1.6.44-160000.3.1 * libpng16-compat-devel-1.6.44-160000.3.1 * libpng16-tools-debuginfo-1.6.44-160000.3.1 * libpng16-16-1.6.44-160000.3.1 * libpng16-16-debuginfo-1.6.44-160000.3.1 * libpng16-devel-1.6.44-160000.3.1 * libpng16-debugsource-1.6.44-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * libpng16-16-x86-64-v3-1.6.44-160000.3.1 * libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1 * libpng16-devel-x86-64-v3-1.6.44-160000.3.1 * libpng16-16-x86-64-v3-debuginfo-1.6.44-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-64505.html * https://www.suse.com/security/cve/CVE-2025-64506.html * https://www.suse.com/security/cve/CVE-2025-64720.html * https://www.suse.com/security/cve/CVE-2025-65018.html * https://www.suse.com/security/cve/CVE-2025-66293.html * https://bugzilla.suse.com/show_bug.cgi?id=1254157 * https://bugzilla.suse.com/show_bug.cgi?id=1254158 * https://bugzilla.suse.com/show_bug.cgi?id=1254159 * https://bugzilla.suse.com/show_bug.cgi?id=1254160 * https://bugzilla.suse.com/show_bug.cgi?id=1254480 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:34:59 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:34:59 -0000 Subject: SUSE-SU-2026:20028-1: important: Security update for python-tornado6 Message-ID: <176846609964.28753.5617241907404772387@smelt2.prg2.suse.org> # Security update for python-tornado6 Announcement ID: SUSE-SU-2026:20028-1 Release Date: 2026-01-12T10:29:37Z Rating: important References: * bsc#1254903 * bsc#1254904 * bsc#1254905 Cross-References: * CVE-2025-67724 * CVE-2025-67725 * CVE-2025-67726 CVSS scores: * CVE-2025-67724 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-67724 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-67724 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-67724 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-67725 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-67725 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67725 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67726 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-67726 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67726 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for python-tornado6 fixes the following issues: * CVE-2025-67724: unescaped `reason` argument used in HTTP headers and in HTML default error pages can be used by attackers to launch header injection or XSS attacks (bsc#1254903). * CVE-2025-67725: quadratic complexity of string concatenation operations used by the `HTTPHeaders.add` method can lead o DoS when processing a maliciously crafted HTTP request (bsc#1254905). * CVE-2025-67726: quadratic complexity algorithm used in the `_parseparam` function of `httputil.py` can lead to DoS when processing maliciously crafted parameters in a `Content-Disposition` header (bsc#1254904). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-129=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-129=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * python-tornado6-debugsource-6.5-160000.3.1 * python313-tornado6-6.5-160000.3.1 * python313-tornado6-debuginfo-6.5-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * python-tornado6-debugsource-6.5-160000.3.1 * python313-tornado6-6.5-160000.3.1 * python313-tornado6-debuginfo-6.5-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-67724.html * https://www.suse.com/security/cve/CVE-2025-67725.html * https://www.suse.com/security/cve/CVE-2025-67726.html * https://bugzilla.suse.com/show_bug.cgi?id=1254903 * https://bugzilla.suse.com/show_bug.cgi?id=1254904 * https://bugzilla.suse.com/show_bug.cgi?id=1254905 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:34:55 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:34:55 -0000 Subject: SUSE-SU-2026:20029-1: important: Security update for libmicrohttpd Message-ID: <176846609598.28753.5234257745836441122@smelt2.prg2.suse.org> # Security update for libmicrohttpd Announcement ID: SUSE-SU-2026:20029-1 Release Date: 2026-01-12T11:14:46Z Rating: important References: * bsc#1253177 * bsc#1253178 Cross-References: * CVE-2025-59777 * CVE-2025-62689 CVSS scores: * CVE-2025-59777 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-59777 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-59777 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-59777 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-62689 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-62689 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-62689 ( NVD ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-62689 ( NVD ): 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for libmicrohttpd fixes the following issues: * CVE-2025-62689: Fixed heap-based buffer overflow through a specially crafted packet (bsc#1253178) * CVE-2025-59777: Fixed NULL pointer dereference through a specially crafted packet (bsc#1253177) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-130=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-130=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * libmicrohttpd-devel-1.0.1-160000.3.1 * libmicrohttpd12-1.0.1-160000.3.1 * libmicrohttpd12-debuginfo-1.0.1-160000.3.1 * libmicrohttpd-debugsource-1.0.1-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * libmicrohttpd-devel-1.0.1-160000.3.1 * libmicrohttpd12-1.0.1-160000.3.1 * libmicrohttpd12-debuginfo-1.0.1-160000.3.1 * libmicrohttpd-debugsource-1.0.1-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-59777.html * https://www.suse.com/security/cve/CVE-2025-62689.html * https://bugzilla.suse.com/show_bug.cgi?id=1253177 * https://bugzilla.suse.com/show_bug.cgi?id=1253178 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:35:05 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:35:05 -0000 Subject: SUSE-RU-2026:20025-1: moderate: Recommended update for valgrind Message-ID: <176846610542.28753.16636514831118489148@smelt2.prg2.suse.org> # Recommended update for valgrind Announcement ID: SUSE-RU-2026:20025-1 Release Date: 2026-01-11T16:18:32Z Rating: moderate References: * jsc#PED-13403 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that contains one feature can now be installed. ## Description: This update for valgrind fixes the following issues: * update to 3.25.1: * Incorrect NAN-boxing for float registers in RISC-V * close_range syscalls started failing with 3.25.0 * mount syscall param filesystemtype may be NULL * FILE DESCRIPTORS banner shows when closing some inherited fds * FreeBSD: missing syscall wrappers for fchroot and setcred * Double close causes SEGV * The valgrind gdbserver now supports the GDB remote protocol packet 'x addr,len' (available in GDB release greater than or equal to 16). * Valgrind now supports zstd compressed debug sections. * The Linux Test Project (ltp) is integrated in the testsuite try 'make ltpchecks' * Added RISCV64 support for Linux. Specifically for the RV64GC instruction set. * Numerous bug fixes for Illumos, in particular fixed a Valgrind crash whenever a signal handler was called. * The --track-fds=yes and --track-fds=all options now treat all inherited file descriptors the same as 0, 1, 2 * A new option --modify-fds=high can be used together with --track-fds=yes to create new file descriptors with the highest possible number (and then decreasing) instead of always using the lowest possible number * There is a change to warnings about calls to pthread_cond_signal and pthread_cond_broadcast when the associated mutex is unlocked. * Add support for IBM z17 (jsc#PED-13403) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-125=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-125=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * valgrind-3.25.1-160000.1.1 * valgrind-devel-3.25.1-160000.1.1 * valgrind-debugsource-3.25.1-160000.1.1 * valgrind-debuginfo-3.25.1-160000.1.1 * SUSE Linux Enterprise Server 16.0 (noarch) * valgrind-client-headers-3.25.1-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * valgrind-3.25.1-160000.1.1 * valgrind-devel-3.25.1-160000.1.1 * valgrind-debugsource-3.25.1-160000.1.1 * valgrind-debuginfo-3.25.1-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * valgrind-client-headers-3.25.1-160000.1.1 ## References: * https://jira.suse.com/browse/PED-13403 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:35:08 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:35:08 -0000 Subject: SUSE-RU-2026:20024-1: critical: Recommended update for libzypp Message-ID: <176846610829.28753.1247630547142881759@smelt2.prg2.suse.org> # Recommended update for libzypp Announcement ID: SUSE-RU-2026:20024-1 Release Date: 2026-01-08T11:57:28Z Rating: critical References: * bsc#1246912 * bsc#1250343 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that has two fixes can now be installed. ## Description: This update for libzypp fixes the following issues: Changes in libzypp: * runposttrans: strip root prefix from tmppath (bsc#1250343) * fixup! Make ld.so ignore the subarch packages during install (bsc#1246912) * version 17.37.18 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-124=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-124=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * libzypp-devel-17.37.18-160000.1.1 * libzypp-17.37.18-160000.1.1 * libzypp-debugsource-17.37.18-160000.1.1 * libzypp-devel-doc-17.37.18-160000.1.1 * libzypp-debuginfo-17.37.18-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * libzypp-devel-17.37.18-160000.1.1 * libzypp-17.37.18-160000.1.1 * libzypp-debugsource-17.37.18-160000.1.1 * libzypp-devel-doc-17.37.18-160000.1.1 * libzypp-debuginfo-17.37.18-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1246912 * https://bugzilla.suse.com/show_bug.cgi?id=1250343 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:35:02 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:35:02 -0000 Subject: SUSE-SU-2026:20027-1: moderate: Security update for avahi Message-ID: <176846610265.28753.15517002942998708672@smelt2.prg2.suse.org> # Security update for avahi Announcement ID: SUSE-SU-2026:20027-1 Release Date: 2026-01-11T16:54:00Z Rating: moderate References: * bsc#1233421 Cross-References: * CVE-2024-52615 CVSS scores: * CVE-2024-52615 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-52615 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-52615 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability can now be installed. ## Description: This update for avahi fixes the following issues: * CVE-2024-52615: Fixed DNS spoofing (bsc#1233421) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-127=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-127=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * avahi-autoipd-0.8-160000.3.1 * libavahi-gobject0-debuginfo-0.8-160000.3.1 * python313-avahi-0.8-160000.3.1 * avahi-autoipd-debuginfo-0.8-160000.3.1 * avahi-0.8-160000.3.1 * libavahi-core7-debuginfo-0.8-160000.3.1 * libavahi-glib1-debuginfo-0.8-160000.3.1 * libavahi-core7-0.8-160000.3.1 * avahi-utils-debuginfo-0.8-160000.3.1 * avahi-debuginfo-0.8-160000.3.1 * avahi-utils-0.8-160000.3.1 * libavahi-ui-gtk3-0-0.8-160000.3.1 * libavahi-devel-0.8-160000.3.1 * libavahi-client3-debuginfo-0.8-160000.3.1 * libavahi-common3-0.8-160000.3.1 * typelib-1_0-Avahi-0_6-0.8-160000.3.1 * libavahi-common3-debuginfo-0.8-160000.3.1 * libhowl0-debuginfo-0.8-160000.3.1 * libdns_sd-debuginfo-0.8-160000.3.1 * avahi-glib2-debugsource-0.8-160000.3.1 * avahi-utils-gtk-debuginfo-0.8-160000.3.1 * libavahi-glib1-0.8-160000.3.1 * libavahi-client3-0.8-160000.3.1 * avahi-compat-mDNSResponder-devel-0.8-160000.3.1 * libhowl0-0.8-160000.3.1 * python3-avahi-gtk-0.8-160000.3.1 * libavahi-libevent1-0.8-160000.3.1 * avahi-utils-gtk-0.8-160000.3.1 * libavahi-libevent1-debuginfo-0.8-160000.3.1 * libdns_sd-0.8-160000.3.1 * libavahi-gobject-devel-0.8-160000.3.1 * avahi-debugsource-0.8-160000.3.1 * libavahi-gobject0-0.8-160000.3.1 * libavahi-ui-gtk3-0-debuginfo-0.8-160000.3.1 * libavahi-glib-devel-0.8-160000.3.1 * SUSE Linux Enterprise Server 16.0 (noarch) * avahi-lang-0.8-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * avahi-autoipd-0.8-160000.3.1 * libavahi-gobject0-debuginfo-0.8-160000.3.1 * python313-avahi-0.8-160000.3.1 * avahi-autoipd-debuginfo-0.8-160000.3.1 * avahi-0.8-160000.3.1 * libavahi-core7-debuginfo-0.8-160000.3.1 * libavahi-glib1-debuginfo-0.8-160000.3.1 * libavahi-core7-0.8-160000.3.1 * avahi-utils-debuginfo-0.8-160000.3.1 * avahi-debuginfo-0.8-160000.3.1 * avahi-utils-0.8-160000.3.1 * libavahi-ui-gtk3-0-0.8-160000.3.1 * libavahi-devel-0.8-160000.3.1 * libavahi-client3-debuginfo-0.8-160000.3.1 * libavahi-common3-0.8-160000.3.1 * typelib-1_0-Avahi-0_6-0.8-160000.3.1 * libavahi-common3-debuginfo-0.8-160000.3.1 * libhowl0-debuginfo-0.8-160000.3.1 * libdns_sd-debuginfo-0.8-160000.3.1 * avahi-glib2-debugsource-0.8-160000.3.1 * avahi-utils-gtk-debuginfo-0.8-160000.3.1 * libavahi-glib1-0.8-160000.3.1 * libavahi-client3-0.8-160000.3.1 * avahi-compat-mDNSResponder-devel-0.8-160000.3.1 * libhowl0-0.8-160000.3.1 * python3-avahi-gtk-0.8-160000.3.1 * libavahi-libevent1-0.8-160000.3.1 * avahi-utils-gtk-0.8-160000.3.1 * libavahi-libevent1-debuginfo-0.8-160000.3.1 * libdns_sd-0.8-160000.3.1 * libavahi-gobject-devel-0.8-160000.3.1 * avahi-debugsource-0.8-160000.3.1 * libavahi-gobject0-0.8-160000.3.1 * libavahi-ui-gtk3-0-debuginfo-0.8-160000.3.1 * libavahi-glib-devel-0.8-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * avahi-lang-0.8-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-52615.html * https://bugzilla.suse.com/show_bug.cgi?id=1233421 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:35:04 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:35:04 -0000 Subject: SUSE-RU-2026:20026-1: moderate: Recommended update for lz4 Message-ID: <176846610409.28753.15615059455829935816@smelt2.prg2.suse.org> # Recommended update for lz4 Announcement ID: SUSE-RU-2026:20026-1 Release Date: 2026-01-11T16:27:45Z Rating: moderate References: Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that can now be installed. ## Description: This update for lz4 fixes the following issues: * align rpm changelog with sle15 and do not ignore test suite result ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-126=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-126=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * liblz4-1-1.10.0-160000.3.1 * liblz4-1-debuginfo-1.10.0-160000.3.1 * liblz4-devel-1.10.0-160000.3.1 * lz4-debugsource-1.10.0-160000.3.1 * lz4-debuginfo-1.10.0-160000.3.1 * lz4-1.10.0-160000.3.1 * SUSE Linux Enterprise Server 16.0 (x86_64) * liblz4-1-x86-64-v3-1.10.0-160000.3.1 * liblz4-1-x86-64-v3-debuginfo-1.10.0-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * liblz4-1-1.10.0-160000.3.1 * liblz4-1-debuginfo-1.10.0-160000.3.1 * liblz4-devel-1.10.0-160000.3.1 * lz4-debugsource-1.10.0-160000.3.1 * lz4-debuginfo-1.10.0-160000.3.1 * lz4-1.10.0-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * liblz4-1-x86-64-v3-1.10.0-160000.3.1 * liblz4-1-x86-64-v3-debuginfo-1.10.0-160000.3.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:35:11 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:35:11 -0000 Subject: SUSE-RU-2026:20023-1: moderate: Recommended update for maven-parent, maven-invoker, maven-filtering, maven-file-management, maven-doxia-sitetools, maven-doxia, maven-dependency-tree, maven-dependency-analyzer, maven-artifact-transfer, maven-archiver, xom, maven-plugin-tools, objectweb-asm, plexus-xml, plexus-velocity, plexus-sec-dispatcher, velocity-engine, plexus-languages, plexus-io, plexus-interpolation, plexus-interactivity, plexus-i18n, plexus-compiler, plexus-classworlds, plexus-cipher, plexus-build-api, maven, maven-resolver, xmvn Message-ID: <176846611142.28753.868980123896250880@smelt2.prg2.suse.org> # Recommended update for maven-parent, maven-invoker, maven-filtering, maven- file-management, maven-doxia-sitetools, maven-doxia, maven-dependency-tree, maven-dependency-analyzer, maven-artifact-transfer, maven-archiver, xom, maven- plugin-tools, objectweb-asm, plexus-xml, plexus-velocity, plexus-sec-dispatcher, velocity-engine, plexus-languages, plexus-io, plexus-interpolation, plexus- interactivity, plexus-i18n, plexus-compiler, plexus-classworlds, plexus-cipher, plexus-build-api, maven, maven-resolver, xmvn Announcement ID: SUSE-RU-2026:20023-1 Release Date: 2026-01-07T11:23:24Z Rating: moderate References: Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that can now be installed. ## Description: This update for maven-parent, maven-invoker, maven-filtering, maven-file- management, maven-doxia-sitetools, maven-doxia, maven-dependency-tree, maven- dependency-analyzer, maven-artifact-transfer, maven-archiver, xom, maven-plugin- tools, plexus-xml, plexus-velocity, plexus-sec-dispatcher, velocity-engine, plexus-languages, plexus-io, plexus-interpolation, plexus-interactivity, plexus-i18n, plexus-compiler, plexus-classworlds, plexus-cipher, plexus-build- api, maven, maven-resolver, xmvn fixes the following issues: Changes in maven-parent: * Upgrade to Apache Maven parent POM version 45 * New features and improvements * Use a standard tag template for releases * Bug Fixes * Use spotless / palantirJavaFormat - 2.56.0 for all JDKs * Build * Allow manually executing release-drafter * Upgrade to Apache Maven parent POM version 44 * Breaking changes * Move snapshot repositories in a profile * Check test code by checkstyle * New features and improvements * Move snapshot repositories in a profile * Introduce property maven.site.path.suffix to allow override site path * Use v@{project.version} as tag template for releases * import KEYS history from svn * Add licenseText to modello * Update site descriptor to 2.0 * Check test code by checkstyle * Add issues templates * Accept all line endings with spotless * Enable automatic formatter when not on CI * Bug Fixes * Fix asf.yaml syntax * Skip render empty taglist report Changes in maven-invoker: * Add dependency on objectweb-asm to build with sisu 0.9.0.M4 Changes in maven-filtering: * Bogus dependency on plexus-xml (https://github.com/apache/maven- filtering/issues/286) * Upgrade to version 3.4.0 * Changes * Bump apache/maven-gh-actions-shared from 3 to 4 * Bump org.apache.maven.shared:maven-shared-components from 41 * MSHARED-1412: Allow to customize Interpolator used by filter * Add dependency on objectweb-asm to build with sisu 0.9.0.M4 Changes in maven-file-management: * Update to upstream version 3.2.0 * New features and improvements * Enable GitHub Issues * Add Release Drafter * MSHARED-1203: no longer need to shell out to create a symbolic link * Java 7 can detect symbolic links * Maintenance * Update site descriptor * Skip generating of xml reader and writer for FileSet * Use version of modello-maven-plugin from parent * Add PR Automation and Stale actions * MSHARED-1448: Refresh download page * remove duplicate tests and unneeded code * fix JUnit dependencies * MSHARED-1265: use JUnit assumptions * MSHARED-1203: use JUnit @TempDir * MSHARED-1264: Convert to JUnit5 * Add GitHub Actions setup and Dependabot * Dependency updates * Bump commons-io:commons-io from 2.18.0 to 2.19.0 * Bump org.apache.maven.shared:maven-shared-components from 43 to 44 * MSHARED-1380: Bump commons-io:commons-io from 2.17.0 to 2.18.0 * MSHARED-1381: Bump org.apache.maven.shared:maven-shared-components from 42 to 43 * MSHARED-1380: Bump commons-io:commons-io from 2.16.1 to 2.17.0 * MSHARED-1380: Bump commons-io:commons-io from 2.13.0 to 2.16.1 * MSHARED-1381: Upgrade parent pom to 42 * Bump apache/maven-gh-actions-shared from 3 to 4 * Bump org.junit:junit-bom from 5.10.1 to 5.10.2 * Bump org.junit:junit-bom from 5.10.0 to 5.10.1 * Bump org.junit:junit-bom from 5.9.3 to 5.10.0 * MSHARED-1266: upgrade commons-io 2.11.0 --> 2.13.0 * update to parent pom 39 Changes in maven-doxia-sitetools: * Add dependency on objectweb-asm to build with sisu 0.9.0.M4 Changes in maven-doxia: * Add dependency on objectweb-asm to build with sisu 0.9.0.M4 Changes in maven-dependency-tree: * Add dependency on objectweb-asm to build with sisu 0.9.0.M4 Changes in maven-dependency-analyzer: * Upgrade to upstream version 1.16.0 * New features and improvements * Enable GitHub Issues * Bug Fixes * MSHARED-47: Don't flag xml-apis:xml-apis as undeclared * Maintenance * Remove unneeded suppression * Dependency updates * Bump org.apache.maven.shared:maven-shared-components from 43 to 44 * Bump org.ow2.asm:asm from 9.7.1 to 9.8 * Bump org.assertj:assertj-bom from 3.27.2 to 3.27.3 * Bump org.assertj:assertj-bom from 3.26.3 to 3.27.2 Changes in maven-artifact-transfer: + allow building against maven 4.x and maven-resolver 2.x Changes in maven-archiver: * Upgrade to maven-archiver 3.6.5 * New features and improvements * add Java-Version entry to default MANIFEST.MF * Bug Fixes * avoid negative entry time: upgrade plexus-archiver * don't limit outputTimestamp to zip (MS DOS) range * Documentation updates * remove extra newline in code blocks * reformat descriptor description to match usual Modello-generated ones * document Java-Version entry added in #298 * Maintenance * Update site descriptor to 2.0.0 * Dependency updates * Bump org.assertj:assertj-core from 3.27.3 to 3.27.6 * Bump org.codehaus.plexus:plexus-archiver from 4.10.0 to 4.10.1 * Upgrade to maven-archiver 3.6.4 * New features and improvements * improve Reproducible Builds javadoc * Fall back on SOURCE_DATE_EPOCH if it exists * Bug Fixes * Treat empty Automatic-Module-Name as no Automatic-Module-Name at all * Maintenance * Enable GitHub Issues * Dependency updates * Bump org.apache.maven.shared:maven-shared-components from 43 to 45 * Bump org.codehaus.plexus:plexus-interpolation from 1.27 to 1.28 * Bump org.assertj:assertj-core from 3.26.0 to 3.27.3 Changes in xom: * Make build recipe compatible with POSIX sh. Use %autosetup. Changes in maven-plugin-tools: * Upgrade to upstream version 3.15.2 * Documentation updates * Fix run-on sentence * Update document to use Guice constructor injection * MNGSITE-529: Rename "Goals" to "Plugin Documentation" * Maintenance * Update site descriptors to 2.0 * Add support for Maven 4 PluginDescriptor.getRequiredJavaVersion() method * Cleanups dependencies * Use injection instead of Component annotation * Begin converting this plugin to Guice constructor injection * refactor: Replace Plexus AbstractLogEnabled with SLF4J * Use properties for versions in components.xml * JDK 25 build fix * MPLUGIN-543: Update to Parent 44 * Add release drafter * Add PR Automation action * Dependency updates * Bump org.jsoup:jsoup from 1.18.1 to 1.19.1 * Bump org.codehaus.plexus:plexus-testing from 1.4.0 to 1.6.1 * Bump org.codehaus.plexus:plexus-velocity from 2.2.0 to 2.3.0 * Bump net.bytebuddy:byte-buddy from 1.15.5 to 1.17.8 * Bump org.codehaus.plexus:plexus-archiver from 4.10.0 to 4.10.3 * Bump org.codehaus.plexus:plexus-java from 1.3.0 to 1.5.0 * Bump org.apache.commons:commons-lang3 from 3.17.0 to 3.19.0 * Bump org.codehaus.plexus:plexus-classworlds from 2.8.0 to 2.9.0 * Bump org.assertj:assertj-core from 3.26.3 to 3.27.6 * Bump org.codehaus.plexus:plexus-utils from 4.0.1 to 4.0.2 * Bump asmVersion from 9.7.1 to 9.9 * Bump org.apache.velocity:velocity-engine-core from 2.4 to 2.4.1 * Bump org.codehaus.plexus:plexus-i18n from 1.0-beta-10 to 1.0.0 * Bump maven3Version from 3.9.9 to 3.9.11 * Bump org.codehaus.plexus:plexus-xml from 3.0.1 to 3.0.2 * Bump org.apache.maven:maven-parent from 44 to 45 * Bump antVersion from 1.10.14 to 1.10.15 Changes in maven-plugin-tools: * Upgrade to upstream version 3.15.2 * Documentation updates * Fix run-on sentence * Update document to use Guice constructor injection * MNGSITE-529: Rename "Goals" to "Plugin Documentation" * Maintenance * Update site descriptors to 2.0 * Add support for Maven 4 PluginDescriptor.getRequiredJavaVersion() method * Cleanups dependencies * Use injection instead of Component annotation * Begin converting this plugin to Guice constructor injection * refactor: Replace Plexus AbstractLogEnabled with SLF4J * Use properties for versions in components.xml * JDK 25 build fix * MPLUGIN-543: Update to Parent 44 * Add release drafter * Add PR Automation action * Dependency updates * Bump org.jsoup:jsoup from 1.18.1 to 1.19.1 * Bump org.codehaus.plexus:plexus-testing from 1.4.0 to 1.6.1 * Bump org.codehaus.plexus:plexus-velocity from 2.2.0 to 2.3.0 * Bump net.bytebuddy:byte-buddy from 1.15.5 to 1.17.8 * Bump org.codehaus.plexus:plexus-archiver from 4.10.0 to 4.10.3 * Bump org.codehaus.plexus:plexus-java from 1.3.0 to 1.5.0 * Bump org.apache.commons:commons-lang3 from 3.17.0 to 3.19.0 * Bump org.codehaus.plexus:plexus-classworlds from 2.8.0 to 2.9.0 * Bump org.assertj:assertj-core from 3.26.3 to 3.27.6 * Bump org.codehaus.plexus:plexus-utils from 4.0.1 to 4.0.2 * Bump asmVersion from 9.7.1 to 9.9 * Bump org.apache.velocity:velocity-engine-core from 2.4 to 2.4.1 * Bump org.codehaus.plexus:plexus-i18n from 1.0-beta-10 to 1.0.0 * Bump maven3Version from 3.9.9 to 3.9.11 * Bump org.codehaus.plexus:plexus-xml from 3.0.1 to 3.0.2 * Bump org.apache.maven:maven-parent from 44 to 45 * Bump antVersion from 1.10.14 to 1.10.15 Changes in maven-plugin-tools: * Add the maven-plugin-report-plugin to the _multibuild file * Initial packaging of the maven-plugin-report-plugin 3.15.2 Changes in maven-plugin-tools: * Upgrade to upstream version 3.15.2 * Documentation updates * Fix run-on sentence * Update document to use Guice constructor injection * MNGSITE-529: Rename "Goals" to "Plugin Documentation" * Maintenance * Update site descriptors to 2.0 * Add support for Maven 4 PluginDescriptor.getRequiredJavaVersion() method * Cleanups dependencies * Use injection instead of Component annotation * Begin converting this plugin to Guice constructor injection * refactor: Replace Plexus AbstractLogEnabled with SLF4J * Use properties for versions in components.xml * JDK 25 build fix * MPLUGIN-543: Update to Parent 44 * Add release drafter * Add PR Automation action * Dependency updates * Bump org.jsoup:jsoup from 1.18.1 to 1.19.1 * Bump org.codehaus.plexus:plexus-testing from 1.4.0 to 1.6.1 * Bump org.codehaus.plexus:plexus-velocity from 2.2.0 to 2.3.0 * Bump net.bytebuddy:byte-buddy from 1.15.5 to 1.17.8 * Bump org.codehaus.plexus:plexus-archiver from 4.10.0 to 4.10.3 * Bump org.codehaus.plexus:plexus-java from 1.3.0 to 1.5.0 * Bump org.apache.commons:commons-lang3 from 3.17.0 to 3.19.0 * Bump org.codehaus.plexus:plexus-classworlds from 2.8.0 to 2.9.0 * Bump org.assertj:assertj-core from 3.26.3 to 3.27.6 * Bump org.codehaus.plexus:plexus-utils from 4.0.1 to 4.0.2 * Bump asmVersion from 9.7.1 to 9.9 * Bump org.apache.velocity:velocity-engine-core from 2.4 to 2.4.1 * Bump org.codehaus.plexus:plexus-i18n from 1.0-beta-10 to 1.0.0 * Bump maven3Version from 3.9.9 to 3.9.11 * Bump org.codehaus.plexus:plexus-xml from 3.0.1 to 3.0.2 * Bump org.apache.maven:maven-parent from 44 to 45 * Bump antVersion from 1.10.14 to 1.10.15 Changes in plexus-xml: * Update to upstream version 3.0.2 * Dependency updates * Bump org.codehaus.plexus:plexus from 19 to 20 * Bump org.codehaus.plexus:plexus from 18 to 19 * Bump org.codehaus.plexus:plexus-utils from 4.0.1 to 4.0.2 * Maintenance * Cleanup tests and drop dependency to plexus-utils Changes in plexus-velocity: * Update to version 2.3.0 * New features and improvements * Use internal Nullable annotation, allow drop sisu-inject from runtime dependencies * Maintenance * Add LICENSE file to project, fix build badge * Enhance site information * Use plexus-testing instead of direct sisu InjectedTest * Dependency updates * Override version of commons-lang3 to avoid reporting of security issues * Bump org.codehaus.plexus:plexus from 20 to 24 * Bump org.eclipse.sisu:org.eclipse.sisu.inject from 0.9.0.M3 to 0.9.0.M4 * Update to version 2.2.1 * Dependency updates * Bump org.apache.velocity:velocity-engine-core from 2.4 to 2.4.1 * Bump org.apache.velocity:velocity-engine-core from 2.3 to 2.4 * Bump org.eclipse.sisu:org.eclipse.sisu.inject from 0.9.0.M2 to 0.9.0.M3 * Bump org.codehaus.plexus:plexus from 19 to 20 * Bump org.codehaus.plexus:plexus from 18 to 19 * Bump org.codehaus.plexus:plexus from 17 to 18 * Bump org.codehaus.plexus:plexus from 16 to 17 * Bump release-drafter/release-drafter from 5 to 6 * Add dependency on objectweb-asm to build with sisu 0.9.0.M4 Changes in plexus-sec-dispatcher: * Add dependency on objectweb-asm to build with sisu 0.9.0.M4 Changes in velocity-engine: * Version 2.4.1: * Fixes * Finding the topmost method when introspecting a class should stop at the first static or accessible method found (Fixes VELOCITY-983) * Direct evaluation of VTL code via RuntimeInstance.evaluate() should update the current rendering template information for local velocimacros to be visible in string literals interpolation (Fixes VELOCITY-944) Changes in plexus-languages: * Upgrade to upstream version 1.5.0 * New features and improvements * Read only first 8 bytes of class in JavaClassfileVersion * Bump org.ow2.asm:asm from 9.6 to 9.7 - JDK 23 support * Bump org.ow2.asm:asm from 9.7 to 9.7.1 - JDK 24 support * Bump org.ow2.asm:asm from 9.7.1 to 9.8 * Maintenance * Project cleanups * Rename resources of test data * Bump release-drafter/release-drafter from 5 to 6 * Reuse plexus-pom action for CI * Disable deploy job on GitHub * Added CI for JDK 24-ea Changes in plexus-io: * Upgrade to version 3.5.1 * New features and improvements * Fix performance problem by caching unix group and user names * Dependency updates * Bump org.codehaus.plexus:plexus-testing from 1.3.0 to 1.4.0 * Bump org.codehaus.plexus:plexus from 16 to 18 * Bump org.eclipse.sisu:org.eclipse.sisu.inject from 0.9.0.M2 to 0.9.0.M3 * Bump org.codehaus.plexus:plexus-xml from 3.0.0 to 3.0.1 * Bump org.codehaus.plexus:plexus-utils from 4.0.0 to 4.0.1 * Bump commons-io:commons-io from 2.15.1 to 2.16.1 * Add dependency on objectweb-asm to build with sisu 0.9.0.M4 Changes in plexus-interpolation: * Upgrade to version 1.28 * New features and improvements * Fix #16: StringSearchInterpolator does not cache answers. * Add FeedbackingValueSource * Pass delimiter information to ValueSource * Apply spotless re-formatting Changes in plexus-interactivity: * Upgrade to version 1.4 * Changes * Bump org.jline:jline-reader from 3.25.1 to 3.29.0 * Bump org.eclipse.sisu:org.eclipse.sisu.inject from 0.9.0.M2 to 0.9.0.M3 * Apply spotless re-formatting * Bump org.codehaus.plexus:plexus from 16 to 20 * Bump release-drafter/release-drafter from 5 to 6 * Add dependency on objectweb-asm to build with sisu 0.9.0.M4 Changes in plexus-i18n: * Upgrade to 1.0.0 * no changelog provided by upstream Changes in plexus-compiler: * Upgrade to upstream release 2.15.0 * New features and improvements * Allow to override useUnsharedTable compiler argument * Lazy providers and better error reporting * Only use "-release" parameter with javac 9+ * Correctly determine the version of the underlying javac tool * Use a TreeSet instead of HashSet to get consistent ordering of results * Bug Fixes * Cleanup dependencies * Path.relativize() may throw exception if source and build directories are on different Windows drives * Fix ECJ not using annotation processor when defined via processorpath * Report "Error occurred during initialization of VM" as error * Maintenance * Bump project version to 2.15.0-SNAPSHOT * Use LocalRepositoryManager for resolving artifacts paths in tests * Add dependency on objectweb-asm to build with sisu 0.9.0.M4 Changes in plexus-classworlds: * Upgrade to version 2.9.9 * New features and improvements * refine ConfigurationParser * Dependency updates * Bump org.codehaus.plexus:plexus from 19 to 20 * Bump org.codehaus.plexus:plexus from 18 to 19 * Bump org.codehaus.plexus:plexus from 17 to 18 * Bump org.apache.maven.plugins:maven-dependency-plugin from 3.7.1 to 3.8.1 * Bump org.apache.maven.plugins:maven-dependency-plugin from 3.7.0 to 3.7.1 * Bump org.apache.maven.plugins:maven-dependency-plugin from 3.6.1 to 3.7.0 * Maintenance * Apply spotless re-formatting * Align site.xml with used schema (2.0.0) * Bump jakarta.xml.bind:jakarta.xml.bind-api from 4.0.0 to 4.0.2 * Bump org.apache.logging.log4j:log4j-api from 2.20.0 to 2.23.1 * Bump org.apache.ant:ant from 1.10.13 to 1.10.14 * Bump org.codehaus.plexus:plexus from 16 to 17 Changes in plexus-cipher: * Add dependency on objectweb-asm to build with sisu 0.9.0.M4 Changes in plexus-build-api: * Add dependency on objectweb-asm to build with sisu 0.9.0.M4 Changes in maven: + Set Guice class loading to CHILD: avoid using terminally deprecated methods. Default Guice class loading uses a terminally deprecated JDK memory-access classes. * Upgrade to upstream version 3.9.11 * New features and improvements * Augment version range resolution used repositories * Bug Fixes * Deduplicate filtered dependency graph * Move ensure in boundaries of project lock * Maintenance * [MNGSITE-393] - remove references to Maven 2 * Update CONTRIBUTING after GitHub issues enabled * Enable Github Issues * [MNG-8763] - Remove name from site bannerLeft * Build * Pin GitHub action versions by hash * Build the project by JDK 21 as default * Use Maven 3.9.10 for build on GitHub * Upgrade to upstream version 3.9.10 * Bug * MNG-8096: Inconsistent dependency resolution behaviour for concurrent multi-module build can cause failures * MNG-8169: MINGW support requires \--add-opens java.base/java.lang=ALL-UNNAMED * MNG-8170: Maven 3.9.8 contains weird native library for Jansi on Windows/arm64 * MNG-8211: Maven should fail builds that use CI Friendly versions but have no values set * MNG-8248: WARNING: A restricted method in java.lang.System has been called * MNG-8256: ProjectDependencyGraph bug: in case of filtering, non-direct module links are lost * MNG-8315: Failure of mvn.cmd if a .mvn directory is located at drive root * MNG-8396: Maven takes forever to resume * MNG-8711: "Duplicate artifact" in LifecycleDependencyResolver * Improvement * MNG-8370: Introduce maven.repo.local.head * MNG-8399: JDK 24+ issues warning about usage of sun.misc.Unsafe * MNG-8707: Add methods to remove compile and test source roots * MNG-8712: improve dependency version explanation: it's a requirement, not always effective version * MNG-8717: Remove maven-plugin-plugin:addPluginArtifactMetadata from default binding * MNG-8722: Use a single standalone version of asm * MNG-8731: Use https for xsi:schemaLocation in generated descriptors * MNG-8734: Simplify scripting like "get project version" cases * Task * MNG-8728: Bump Eclipse Sisu from 0.9.0.M3 to 0.9.0.M4 and use Java 24 on CI * Link also the objectweb-asm/asm to the lib directory * MNG-8177: Warning Changes in maven-resolver: * Update to upstream version 1.9.24 * New features and improvements * Metadata type out of coordinates * RFC9457 implementation * Intern context strings * Maintenance * Align plexus-util version with Maven * Align guice version with Maven * Enable Github Issues (1.9.x branch) * Build also maven-resolver-supplier package in separate spec file * Add dependency on objectweb-asm to build with sisu 0.9.0.M4 * Update to upstream version 1.9.23 * Bug * MRESOLVER-659: NPE in trusted checksum post processor if * Improvement * MRESOLVER-680: Disable checksum by default for .sigstore.json as well * MRESOLVER-703: HTTP transport should expose config for max redirects * Upgrade to upstream version 1.9.22 * Bug * MRESOLVER-572: Resolver-Supplier unusable in OSGi runtimes * MRESOLVER-574: Invalid Cookie set under proxy conditions * MRESOLVER-586: In typical setups, DefaultArtifact copies the same maps over and over again * MRESOLVER-587: Memory consumption improvements * New Feature * MRESOLVER-571: Import o.e.aether packages with the exact same version in OSGi metadata * Improvement * MRESOLVER-570: Remove excessive strictness of OSGi dependency metadata * Task * MRESOLVER-576: Allow co-release of Resolver 1.x and 2.x * Upgrade to upstream version 1.9.20 * Bug * MRESOLVER-483: PreorderNodeListGenerator bug: may print trailing ":" * MRESOLVER-522: File locking threads not entering critical region were "oversleeping" * MRESOLVER-547: BF collector always copies artifacts, even when it should not * Improvement * MRESOLVER-536: Skip setting last modified time when FS does not support it * Add dependency on plexus-xml where relevant * this will be needed for smooth upgrade to plexus-utils 4.0.0 * Upgrade to upstream version 1.9.18 * Bug * MRESOLVER-372: Sporadic AccessDeniedEx on Windows * MRESOLVER-441: Undo FileUtils changes that altered non-Windows execution path * Improvement * MRESOLVER-396: Native transport should retry on HTTP 429 (Retry-After) * Task * MRESOLVER-397: Deprecate Guice modules * MRESOLVER-405: Get rid of component name string literals, make them constants and reusable * MRESOLVER-433: Expose configuration for inhibiting Expect-Continue handshake in 1.x * MRESOLVER-435: Refresh download page * MRESOLVER-437: Resolver should not override given HTTP transport default use of expect-continue handshake * Upgrade to upstream version 1.9.15 * Bug * MRESOLVER-373: Remove lock upgrading code * MRESOLVER-375: Several key aspects are broken in provided and trusted checksum feature * MRESOLVER-376: StackOverflowError at BfDependencyCollector.processDependency * MRESOLVER-380: Lock diagnostic: attempted lock step is recorded, but on failed attempt is not removed * MRESOLVER-393: Transport HTTP does not retain last modified as sent by remote end * Improvement * MRESOLVER-220: Modify signaling for unsupported operations * MRESOLVER-382: Define local outgoing (bind) address * MRESOLVER-385: Reduce default value for aether.connector.http.connectionMaxTtl * Task * MRESOLVER-378: Update parent POM to 40 * MRESOLVER-381: Undo MRESOLVER-373 as it was fixed by other means * MRESOLVER-386: Make all injected ctors public, deprecate all def ctors * MRESOLVER-388: Transport HTTP old codec proper override * Upgrade to upstream version 1.9.12 * Bug * [MRESOLVER-371] Unjustified WARNING log added by MRESOLVER-364 * [MRESOLVER-361] Unreliable TCP and retries on upload * [MRESOLVER-357] ConflictResolver STANDARD verbosity misbehaves * [MRESOLVER-352] Duplicate METADATA_DOWNLOADING event is being sent * Improvement * [MRESOLVER-360] disable checksum by default for .sigstore in addition to .asc * New Feature * [MRESOLVER-370] Lock factory should dump lock states on failure * [MRESOLVER-353] Make aether.checksums.algorithms settable per remote repository * Task * [MRESOLVER-366] Upgrade build plugins * [MRESOLVER-364] Revert MRESOLVER-132 * [MRESOLVER-359] Make build be explicit about build time requirements * [MRESOLVER-356] Remove Guava (is unused) * [MRESOLVER-354] Document expected checksums * Upgrade to upstream version 1.9.8 * Bug * [MRESOLVER-345] Conflict resolution in verbose mode is sensitive to version ordering * [MRESOLVER-348] SslConfig httpSecurityMode change is not detected * [MRESOLVER-339] Preemptive Auth broken when default ports used * [MRESOLVER-325] [REGRESSION] Suddenly seeing I/O errors under windows aborting the build * [MRESOLVER-330] Static name mapper is unusable with file-lock factory * [MRESOLVER-314] Getting "IllegalArgumentException: Comparison method violates its general contract!" * [MRESOLVER-316] DF collector enters endless loop when collecting org.webjars.npm:musquette:1.1.1 * [MRESOLVER-298] javax.inject should be provided or optional * [MRESOLVER-305] Evaluate blocked repositories also when retrieving metadata * [MRESOLVER-309] PrefixesRemoteRepositoryFilterSource aborts the build while it should not * [MRESOLVER-313] Artifact file permissions are 0600 and not implicitly set by umask * [MRESOLVER-296] FileProcessor.write( File, InputStream ) is defunct * [MRESOLVER-292] Documented and used param names mismatch * [MRESOLVER-294] Fix JapiCmp configuration and document it * [MRESOLVER-285] File locking on Windows knows to misbehave * [MRESOLVER-246] m-deploy-p will create hashes for hashes * [MRESOLVER-265] Discrepancy between produced and recognized checksums * [MRESOLVER-241] Resolver checksum calculation should be driven by layout * [MRESOLVER-242] When no remote checksums provided by layout, transfer inevitably fails/warns * [MRESOLVER-250] Usage of descriptors map in DataPool prevents gargabe collection * New Feature * [MRESOLVER-32] Support parallel artifact/metadata uploads * [MRESOLVER-319] Support parallel deploy * [MRESOLVER-297] Chained LRM * [MRESOLVER-167] Support forcing specific repositories for artifacts * [MRESOLVER-268] Apply artifact checksum verification for any resolved artifact * [MRESOLVER-274] Introduce Remote Repository Filter feature * [MRESOLVER-275] Introduce trusted checksums source * [MRESOLVER-276] Resolver post-processor * [MRESOLVER-278] BREAKING: Introduce RepositorySystem shutdown hooks * [MRESOLVER-236] Make it possible to resolve .asc on a 'fail' respository. * Improvement * [MRESOLVER-346] Too eager locking * [MRESOLVER-347] Better connection pool configuration (reuse, max TTL, maxPerRoute) * [MRESOLVER-349] Adapter when locking should "give up and retry" * [MRESOLVER-350] Get rid of commons-lang dependency * [MRESOLVER-327] Make tranport-http obey system properties regarding proxy settings * [MRESOLVER-340] Make WebDAV "dance" disabled by default * [MRESOLVER-341] Add option for preemptive PUT Auth * [MRESOLVER-315] Implement preemptive authentication feature for transport-http * [MRESOLVER-328] The transport-http should be able to ignore cert errors * [MRESOLVER-337] Real cause when artifact not found with repository filtering * [MRESOLVER-287] Get rid of deprecated finalize methods * [MRESOLVER-317] Improvements for BF collector * [MRESOLVER-318] Cleanup redundant code and centralize executor handling * [MRESOLVER-303] Make checksum detection reusable * [MRESOLVER-290] Improve file handling resolver wide * [MRESOLVER-7] Download dependency POMs in parallel in BF collector * [MRESOLVER-266] Simplify adapter creation and align configuration for it * [MRESOLVER-269] Allow more compact storage of provided checksums * [MRESOLVER-273] Create more compact File locking layout/mapper * [MRESOLVER-284] BREAKING: Some Sisu parameters needs to be bound * [MRESOLVER-286] Improve basic connector closed state handling * [MRESOLVER-240] Using breadth-first approach to resolve Maven dependencies * [MRESOLVER-247] Avoid unnecessary dependency resolution by a Skip solution based on BFS * [MRESOLVER-248] Make DF and BF collector implementations coexist * Task * [MRESOLVER-326] Resolver transport-http should retry on failures * [MRESOLVER-331] Make DefaultTrackingFileManager write directly to tracking files * [MRESOLVER-333] Distinguish better resolver errors for artifact availability * [MRESOLVER-320] Investigate slower resolving speeds as reported by users * [MRESOLVER-291] Undo MRESOLVER-284 * [MRESOLVER-279] Simplify and improve trusted checksum sources * [MRESOLVER-281] Update configurations page with new elements * [MRESOLVER-282] Drop PartialFile * [MRESOLVER-230] Make supported checksum algorithms extensible * [MRESOLVER-231] Extend ?smart checksum? feature * [MRESOLVER-234] Introduce ?provided? checksums feature * [MRESOLVER-237] Make all checksum mismatches handled same * [MRESOLVER-239] Update and sanitize dependencies * [MRESOLVER-244] Deprecate FileTransformer API * [MRESOLVER-245] Isolate Hazelcast tests * Dependency upgrade * [MRESOLVER-311] Upgrade Parent to 39 * [MRESOLVER-293] Update dependencies, align with Maven * [MRESOLVER-272] Update parent POM to 37, remove plugin version overrides, update bnd * [MRESOLVER-280] Upgrade invoker, install, deploy, require maven 3.8.4+ * [MRESOLVER-251] Upgrade Redisson to 3.17.5 * [MRESOLVER-249] Update Hazelcast to 5.1.1 in named-locks-hazelcast module * Add an alias for the wagon connector * Build against the standalone JavaEE modules unconditionally * Remove the javax.annotation:javax.annotation-api dependency on distribution versions that do not incorporate the JavaEE modules * Add the glassfish-annotation-api jar to the build classpath * Upgrade to upstream version 1.7.3 * Bug * [MRESOLVER-96] - Dependency Injection fails after upgrading to Maven 3.6.2 * [MRESOLVER-153] - resolver-status.properties file is corrupted due to concurrent writes * [MRESOLVER-171] - Resolver fails when compiled on Java 9+ an run on Java 8 due to JDK API breakage * [MRESOLVER-189] - Using semaphore-redisson followed by rwlock-redisson on many parallel build of the same project triggers redisson error * New Feature * [MRESOLVER-90] - HTML content in POM: Maven should validate content before storing in local repo * [MRESOLVER-145] - Introduce more SyncContext implementations * Improvement * [MRESOLVER-103] - Replace deprecated HttpClient classes * [MRESOLVER-104] - maven-resolver-demo-maven-plugin uses reserved artifactId * [MRESOLVER-147] - Upgrade to Java 8 * [MRESOLVER-148] - Use vanilla Guice 4 instead of forked Guice 3 * [MRESOLVER-156] - Active dependency management for Google Guice/Guava * [MRESOLVER-168] - add DEBUG message when downloading an artifact from repositories * [MRESOLVER-193] - Properly type lock key names in Redis * [MRESOLVER-197] - Minors improvements (umbrella) * [MRESOLVER-204] - Add a SessionData#computeIfAbsent method * [MRESOLVER-214] - Remove clirr configuration * Task * [MRESOLVER-141] - Review index-based access to collections * [MRESOLVER-151] - Enforce a checksum policy to be provided explicitly * [MRESOLVER-152] - Perform null checks when interface contracts require it * [MRESOLVER-154] - Move SyncContextFactory interface to SPI module * [MRESOLVER-155] - Make TrackingFileManager member of DefaultUpdateCheckManager * [MRESOLVER-158] - Simplify SimpleDigest class * [MRESOLVER-159] - Mark singleton components as Sisu Singletons * [MRESOLVER-160] - Deprecate ServiceLocator * [MRESOLVER-162] - Restore binary compatibility broken by MRESOLVER-154 * [MRESOLVER-170] - Deprecate org.eclipse.aether.spi.log * [MRESOLVER-172] - Make TrackingFileManager shared singleton component * [MRESOLVER-173] - Drop deprecated AetherModule * [MRESOLVER-174] - Use all bindings in UTs and tests * [MRESOLVER-175] - Drop SyncContextFactory delegates in favor of a selector approach * [MRESOLVER-177] - Move pre-/post-processing of metadata from ResolveTask to DefaultMetadataResolver * [MRESOLVER-183] - Don't require optional dependencies for Redisson * [MRESOLVER-184] - Destroy Redisson semaphores if not used anymore * [MRESOLVER-186] - Update Maven version in Resolver Demo Snippets * [MRESOLVER-188] - Improve documentation on using the named locks with redis/hazelcast (umbrella) * [MRESOLVER-190] - [Regression] Revert MRESOLVER-184 * [MRESOLVER-191] - Document how to analyze lock issues * [MRESOLVER-196] - Document named locks configuration options * [MRESOLVER-219] - Implement NamedLock with advisory file locking * [MRESOLVER-227] - Refactor NamedLockFactorySelector to a managed component * [MRESOLVER-232] - Make SimpleNamedLockFactorySelector logic reusable * Sub-task * [MRESOLVER-198] - Replace assert by simpler but equivalent calls * [MRESOLVER-199] - Java 8 improvements * [MRESOLVER-200] - Simplify conditions with the same result and avoid extra validations * [MRESOLVER-201] - Make variables final whenever possible * [MRESOLVER-202] - Use isEmpty() instead length() <= 0 * Dependency upgrade * [MRESOLVER-185] - Upgrade Redisson to 3.15.6 * Change of API and incompatible with maven-resolver < 1.7 * Upgrade to upstream version 1.6.3 * Bug * [MRESOLVER-153] - resolver-status.properties file is corrupted due to concurrent writes * [MRESOLVER-171] - Resolver fails when compiled on Java 9+ and run on Java 8 due to JDK API breakage * Improvement * [MRESOLVER-168] - add DEBUG message when downloading an artifact from repositories * Task * [MRESOLVER-177] - Move pre-/post-processing of metadata from ResolveTask to DefaultMetadataResolver * Needed for maven 3.8.4 * Do not build/run the tests against the legacy guava20 package * Upgrade to upstream version 1.6.2 * Sub-task * [MRESOLVER-139] - Make SimpleDigest use SHA-1 or MD5 only * [MRESOLVER-140] - Default to SHA-1 and MD5 hashing algorithms * Bug * [MRESOLVER-25] - Resume support is broken under high concurrency * [MRESOLVER-114] - ArtifactNotFoundExceptions when building in parallel * [MRESOLVER-129] - Exclusion has no setters * [MRESOLVER-137] - Make OSGi bundles reproducible * [MRESOLVER-138] - MRESOLVER-56 introduces severe performance regression * New Feature * [MRESOLVER-109] - AndDependencySelector should override toString * [MRESOLVER-115] - Make checksum algorithms configurable * [MRESOLVER-123] - Provide a global locking sync context by default * [MRESOLVER-131] - Introduce a Redisson-based SyncContextFactory * [MRESOLVER-165] - Add support for mirror selector on external:http:* * [MRESOLVER-166] - Add support for blocked repositories/mirrors * Improvement * [MRESOLVER-56] - Support SHA-256 and SHA-512 as checksums * [MRESOLVER-116] - Add page with all supported configuration options * [MRESOLVER-125] - Use type conversions returning primitives * [MRESOLVER-127] - Don't use boolean for property 'aether.updateCheckManager.sessionState' * [MRESOLVER-136] - Migrate from maven-bundle-plugin to bnd-maven-plugin * Task * [MRESOLVER-119] - Turn log messages to SLF4J placeholders * [MRESOLVER-130] - Move GlobalSyncContextFactory to a separate module * [MRESOLVER-132] - Remove synchronization in TrackingFileManager * Dependency upgrade * [MRESOLVER-105] - Update Plexus Components * [MRESOLVER-106] - Update HttpComponents * [MRESOLVER-107] - Update Wagon Provider API to 3.4.0 * [MRESOLVER-108] - Update mockito-core to 2.28.2 * [MRESOLVER-117] - Upgrade SLF4J to 1.7.30 * [MRESOLVER-118] - Upgrade Sisu Components to 0.3.4 * Needed for maven 3.8.x * Set buildshell to bash for "<<<". * Upgrade to upstream version 1.4.2 * Bug: * MRESOLVER-38 ? SOE/OOME in DefaultDependencyNode.accept * Improvements: * MRESOLVER-93 ? PathRecordingDependencyVisitor to handle 3 cycles * MRESOLVER-102 ? make build Reproducible * Upgrade to upstream version 1.4.1 * Task * [MRESOLVER-92] - Revert MRESOLVER-7 * Bug * [MRESOLVER-86] - ResolveArtifactMojo from resolver example uses plugin repositories to resolve dependencies * New Feature * [MRESOLVER-10] - New 'TransitiveDependencyManager' supporting transitive dependency management * [MRESOLVER-33] - New 'DefaultDependencyManager' managing dependencies on all levels supporting transitive dependency management * Improvement * [MRESOLVER-7] - Download dependency POMs in parallel * [MRESOLVER-84] - Add support for "release" qualifier * [MRESOLVER-87] - Refresh examples to use maven-resolver artifacts for demo * [MRESOLVER-88] - Code style cleanup to use Java 7 features * Initial packaging of maven-resolver 1.3.1 * Generate and customize the ant build files Changes in maven-resolver: * Update to upstream version 1.9.24 * New features and improvements * Metadata type out of coordinates * RFC9457 implementation * Intern context strings * Maintenance * Align plexus-util version with Maven * Align guice version with Maven * Enable Github Issues (1.9.x branch) * Build also maven-resolver-supplier package in separate spec file * Add dependency on objectweb-asm to build with sisu 0.9.0.M4 * Update to upstream version 1.9.23 * Bug * MRESOLVER-659: NPE in trusted checksum post processor if * Improvement * MRESOLVER-680: Disable checksum by default for .sigstore.json as well * MRESOLVER-703: HTTP transport should expose config for max redirects Changes in xmvn: * Add dependency on objectweb-asm to build with sisu 0.9.0.M4 Changes in objectweb-asm: * Upgrade to version 9.9 * new Opcodes.V26 constant for Java 26 * new mapInvokeDynamicMethodName method in Remapper. Old method deprecated. New Remapper constructor, with an api parameter. * bug fixes * 318028: Textifier misinterprets ACC_SUPER of inner classes as ACC_SYNCHRONIZED * 318032: FIPS 140-3 and SerialVersionUIDAdder's SHA-1 Use * 318034: Many ASM contents lack API detection. * Upgrade to version 9.8 * new Opcodes.V25 constant for Java 25 * bug fixes * Fix one more copy operation on DUP2 * 318015: Valid bytecode for jvm, but failed to pass the CheckClassAdapter. * `ASMifier` should print calls to `valueOf` instead of deprecated constructors of primitive wrappers Changes in plexus-archiver: * Upgrade to upstream version 4.10.2 * New features and improvements * Utilize VT if possible * Bug Fixes * check minimum timestamp: avoid negative Zip 5455 Extended Timestamp * Maintenance * Cleanups of using deprecated methods * symLinks:Enhance the compatibility of regen.sh * Apply spotless re-formatting * Add dependency on objectweb-asm to build with sisu 0.9.0.M4 Changes in maven-surefire: * Upgrade to 3.5.4 * New features and improvements * Name the shutdown hook * Implement fail-fast behavior for JUnit Platform provider * Create a single LauncherSession for invocations of JUnitPlatformProvider * Bug Fixes * SUREFIRE-2298: fix xml output with junit 5 nested classes (fix integration with Cucumber and Archunit) * Maintenance * feat: enable prevent branch protection rules * Get rid of plexus-annotations * Remove maven-changes-plugin * Enable GitHub Issues * Add dependency on objectweb-asm to build with sisu 0.9.0.M4 * Upgrade to 3.5.3 * Bug * SUREFIRE-1643: JUnit 5 in parallel execution mode confuses Surefire reports * SUREFIRE-1737: Disabling the JUnit5Xml30StatelessReporter has no effect * SUREFIRE-1751: Surefire report shows flaky tests as failures * SUREFIRE-2289: FailsafeSummary.toRunResult throws a raw exception Changes in maven-compiler-plugin: * Upgrade to upstream release 3.14.1 * New features and improvements * Improve DeltaList behavior for large projects * Allow to not use --module-version for the Java compiler * Bug Fixes * Add generatedSourcesPath back to the maven project * MCOMPILER-538: Do not add target/generated-sources/annotations to the source roots * Dependency updates * Enforce asm version used here, to not depend on brittle transitive * Bump mavenVersion from 3.9.9 to 3.9.11 * Bump org.apache.maven.plugins:maven-plugins from 43 to 45 * Bump org.codehaus.plexus:plexus-java from 1.4.0 to 1.5.0 Changes in maven-javadoc-plugin: * Upgrade to upstream version 3.12.0 * Breaking changes * remove fix mojo * detectOfflineLinks is now false per default for all jar mojo issue #1258 * Bug Fixes * Fix legacyMode * Fix package {...} does not exist in legacyMode * Ensure UTF-8 charset is used to avoid IllegalArgumentException: Null charset name * Remove Javadoc 1.4+ / -1.1 switch related warning * Maintenance * protect 3.8.x branch * feat: enable prevent branch protection rules * Upgrade to upstream version 3.11.3 * Removed * Remove workaround for long patched CVE in javadoc * New features and improvements * Issue #369 Support --no-fonts option per default for jdk 23+ * Bug Fixes * Make the legacyMode consistent (Filter out all of the module-info.java files in legacy mode, do not use \--source-path in legacy mode) * MJAVADOC-826: Don't try to modify project source roots * Documentation updates * Correct javadoc-no-fork description on index-page * MNGSITE-529: Rename "Goals" to "Plugin Documentation" * (doc) Close links tag in links parameter javadoc example * Maintenance * Be consistent about data encoding when copying files * Clean up JavadocUtilTest * Use Java 7 relativization instead of hand-rolled code * Rephrase source code fix interactive messages for clarity * Reduce non-debug logging * Delete duplicate @throws clause * Use Java 7 relativization instead of our hand-rolled code * Clean up comments and argument names * Issue #378 Cleanup of code related to old non supported Java version * Cure deprecation warning * MJAVADOC-773: deprecate toRelative * Issue #373 Fix JDK 23 build * Fix aggregate Javadoc typo * Enable GH issues * MJAVADOC-825: Prefer NullPointerExceptions for null arguments * Add dependency on objectweb-asm to build with sisu 0.9.0.M4 Changes in maven-assembly-plugin: Update to version 3.7.1 * Bug * MASSEMBLY-1020: Cannot invoke "java.io.File.isFile()" because "this.inputFile" is null * MASSEMBLY-1021: Nullpointer in assembly:single when upgrading to 3.7.0 * MASSEMBLY-1022: Unresolved artifacts should be not processed * Changes of 3.7.0 * Bug * MASSEMBLY-967: maven-assembly-plugin doesn't add target/class artifacts in generated jarfat but META-INF/MANIFEST.MF seems to be correct * MASSEMBLY-994: Items from unpacked dependency are not refreshed * MASSEMBLY-998: Transitive dependencies are not properly excluded as of 3.1.1 * MASSEMBLY-1008: Assembly plugin handles scopes wrongly * MASSEMBLY-1018: Fix examples about useStrictFiltering * New Feature * MASSEMBLY-992: Facility to define assembly descriptor in body of POM * Improvement * MASSEMBLY-1007: Upgrade maven-plugin parent to 41 * MASSEMBLY-1016: clarify and fix plugin system requirements history * MASSEMBLY-1017: Don't use deprecated methods in code * Task * MASSEMBLY-991: XSDs for 2.2.0 missing from Maven Project Web Site * MASSEMBLY-1000: ITs - cleanups, refresh plugins versions * MASSEMBLY-1003: Remove unused remoteRepositories * MASSEMBLY-1004: Remove ignored and deprecated parameter - useJvmChmod * MASSEMBLY-1010: Use IOUtils from commons-io instead of plexus * MASSEMBLY-1013: Code cleanups Changes in maven-bundle-plugin: * remove patch that is fixed in maven-archiver Changes in maven-dependency-plugin: * Upgrade to version 3.9.0 * New features and improvements * Use Resolver API in go-offline for dependencies resolving * Use Resolver API in go-offline for plugins resolving * Fixes #1522, add render-dependencies mojo * Use Resolver API in resolve-plugin * MDEP-964: unconditionally ignore dependencies known to be loaded by reflection * Update maven-dependency-analyzer to support Java24 * MDEP-972: copy-dependencies: copy signatures alongside artifacts * MDEP-776: Warn when multiple dependencies have the same file name * MDEP-966: Migrate AnalyzeDepMgt to Sisu * MDEP-957: By default, don't report slf4j-simple as unused * Bug Fixes * ProjectBuildingRequest should not be modified * Fix: markersDirectory is not working when unpack goal is executed from command line * Fix broken link for analyze-exclusions-mojo on usage-page * MDEP-839: Avoid extra blank lines in file * Update collect URL * MDEP-689: Fixes ignored dependency filtering in go-offline goal * MDEP-960: Repair silent logging * Documentation updates * MDEP-933: Document dependency tree output formats * Add additional comment to clarify the minimal supported version of outputing dependency tree in JSON fromat. * MNGSITE-529: Rename "Goals" to "Plugin Documentation" * Unix file separators * Maintenance * Simplify usage of RepositoryManager and DependencyResolver * Use Resolver API in copy and unpack * Update site descriptor to 2.0.0 * Enable prevent branch protection rules * Fix [MDEP-931: Replace PrintWriter with Writer in AbstractSerializing Visitor and subclasses * Cleanups dependencies * Copy edit parameter descriptions * Small Javadoc clarifications * MDEP-967: Change info to debug logging in AbstractFromConfigurationMojo * fix: remove duplicate maven-resolver-api and maven-resolver-util dependencies in pom.xml * Enable GH issues * Remove redundant/unneeded code * Add PR Automation and Stale actions * Keep files in temporary directory to be deleted after test * Drop unnecessary call * Avoid deprecated ArtifactFactory * MDEP-966: Convert remaining Mojos to Guice injection * MDEP-966: Convert Analyze Mojos to Guice constructor injection * MDEP-966: Prefer Guice injection * MDEP-966: Migrate TreeMojo/CopyMojo/AnalyzeExclusionsMojo/ /UnpackMojo/CopyDependenciesMojo from Plexus to Sisu Guice * MDEP-966: @component --> @Inject for DisplayAncestorsMojo * Fixing flaky test in TestCopyDependenciesMojo * MNG-2961: Remove workaround for fixed bug * Build * Build by Maven 4 * Dependency updates * Bump Maven in dependencies to 3.9.11 * Bump commons-io:commons-io from 2.16.1 to 2.20.0 * Bump jettyVersion from 9.4.56.v20240826 to 9.4.58.v20250814 * Bump org.apache.commons:commons-lang3 from 3.17.0 to 3.19.0 * Bump org.apache.maven.plugins:maven-plugins from 43 to 45 * Bump org.codehaus.mojo:mrm-maven-plugin from 1.6.0 to 1.7.0 * Bump org.codehaus.plexus:plexus-archiver from 4.10.0 to 4.10.1 * Bump org.codehaus.plexus:plexus-i18n from 1.0-beta-10 to 1.0.0 * Bump org.jsoup:jsoup from 1.18.1 to 1.21.2 * MDEP-963: Bump org.apache.maven.shared:maven-dependency-analyzer from 1.15.0 to 1.15.1 Changes in maven-invoker-plugin: * Upgrade to upstream version 3.9.1 * Documentation updates * Add note about cloneProjectsTo being required for filtering * Maintenance * Use constant 3.6.3 in prerequisites/maven as minimal Maven version * Enable GH Issues * MNGSITE-529: Rename "Goals" to "Plugin Documentation" * Switch to Guice constructor injection * Specify UTF-8 when reading build log * Make utility class static * Build * Enable build by Maven 4 on GitHub * Dependency updates * Bump commons-beanutils:commons-beanutils from 1.9.4 to 1.11.0 * Bump commons-codec:commons-codec from 1.17.1 to 1.18.0 * Bump commons-io:commons-io from 2.18.0 to 2.19.0 * Bump mavenVersion from 3.6.3 to 3.9.10 * Bump org.apache.groovy:groovy-bom from 4.0.24 to 4.0.27 * Bump org.apache.maven.plugins:maven-plugins from 43 to 45 * Bump org.assertj:assertj-core from 3.26.3 to 3.27.3 * Bump org.codehaus.plexus:plexus-interpolation from 1.27 to 1.28 Changes in plexus-archiver: * Upgrade to upstream version 4.10.2 * New features and improvements * Utilize VT if possible * Bug Fixes * check minimum timestamp: avoid negative Zip 5455 Extended Timestamp * Maintenance * Cleanups of using deprecated methods * symLinks:Enhance the compatibility of regen.sh * Apply spotless re-formatting ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-122=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-122=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * maven-bundle-plugin-5.1.9-160000.3.1 * maven-javadoc-3.9.11-160000.1.1 * maven-artifact-transfer-0.13.1-160000.3.1 * maven-resolver-transport-wagon-1.9.24-160000.1.1 * plexus-interpolation-javadoc-1.28-160000.1.1 * maven-invoker-javadoc-3.3.0-160000.3.1 * maven-plugin-tools-ant-3.15.2-160000.1.1 * maven-resolver-test-util-1.9.24-160000.1.1 * maven-surefire-provider-junit5-3.5.4-160000.1.1 * maven-compiler-plugin-3.14.1-160000.1.1 * maven-doxia-module-xhtml5-2.0.0-160000.3.1 * plexus-sec-dispatcher-2.0-160000.3.1 * velocity-engine-core-2.4.1-160000.1.1 * plexus-velocity-javadoc-2.3.0-160000.1.1 * maven-resolver-javadoc-1.9.24-160000.1.1 * maven-doxia-test-docs-2.0.0-160000.3.1 * maven-filtering-3.4.0-160000.1.1 * plexus-i18n-javadoc-1.0.0-160000.1.1 * maven-doxia-module-apt-2.0.0-160000.3.1 * xmvn-subst-4.3.0-160000.3.1 * maven-surefire-plugin-3.5.4-160000.1.1 * maven-plugin-plugin-3.15.2-160000.1.1 * maven-file-management-3.2.0-160000.1.1 * velocity-engine-core-javadoc-2.4.1-160000.1.1 * maven-javadoc-plugin-javadoc-3.12.0-160000.1.1 * plexus-cipher-2.1.0-160000.3.1 * maven-surefire-provider-junit-3.5.4-160000.1.1 * maven-jar-plugin-javadoc-3.5.0-160000.1.1 * xmvn-install-4.3.0-160000.3.1 * maven-surefire-plugins-javadoc-3.5.4-160000.1.1 * maven-plugin-tools-beanshell-3.15.2-160000.1.1 * maven-dependency-analyzer-javadoc-1.16.0-160000.1.1 * xmvn-connector-javadoc-4.3.0-160000.3.1 * maven-artifact-transfer-javadoc-0.13.1-160000.3.1 * maven-resolver-spi-1.9.24-160000.1.1 * maven-doxia-sink-api-2.0.0-160000.3.1 * plexus-interactivity-javadoc-1.4-160000.1.1 * plexus-xml-javadoc-3.0.2-160000.1.1 * maven-plugin-tools-javadoc-3.15.2-160000.1.1 * maven-resolver-impl-1.9.24-160000.1.1 * velocity-engine-parent-2.4.1-160000.1.1 * maven-doxia-module-xdoc-2.0.0-160000.3.1 * xmvn-tools-javadoc-4.3.0-160000.3.1 * plexus-sec-dispatcher-javadoc-2.0-160000.3.1 * plexus-languages-1.5.0-160000.1.1 * plexus-build-api-1.2.0-160000.3.1 * plexus-classworlds-2.9.0-160000.1.1 * maven-compiler-plugin-javadoc-3.14.1-160000.1.1 * maven-doxia-core-2.0.0-160000.3.1 * maven-doxia-javadoc-2.0.0-160000.3.1 * velocity-engine-javadoc-2.4.1-160000.1.1 * maven-doxia-sitetools-javadoc-2.0.0-160000.3.1 * maven-plugin-annotations-3.15.2-160000.1.1 * plexus-cipher-javadoc-2.1.0-160000.3.1 * maven-invoker-plugin-3.9.1-160000.1.1 * xom-1.3.9-160000.3.1 * maven-script-ant-3.15.2-160000.1.1 * xmvn-core-4.3.0-160000.3.1 * maven-surefire-javadoc-3.5.4-160000.1.1 * maven-invoker-3.3.0-160000.3.1 * maven-resolver-transport-classpath-1.9.24-160000.1.1 * maven-doxia-sitetools-2.0.0-160000.3.1 * plexus-languages-javadoc-1.5.0-160000.1.1 * plexus-interpolation-1.28-160000.1.1 * plexus-compiler-extras-2.15.0-160000.1.1 * plexus-archiver-4.10.2-160000.1.1 * maven-script-beanshell-3.15.2-160000.1.1 * maven-plugin-tools-generators-3.15.2-160000.1.1 * plexus-compiler-2.15.0-160000.1.1 * maven-resolver-util-1.9.24-160000.1.1 * maven-surefire-provider-junit5-javadoc-3.5.4-160000.1.1 * maven-jar-plugin-3.5.0-160000.1.1 * maven-dependency-tree-3.2.1-160000.3.1 * maven-plugin-tools-model-3.15.2-160000.1.1 * plexus-build-api-javadoc-1.2.0-160000.3.1 * xmvn-resolve-4.3.0-160000.3.1 * maven-assembly-plugin-javadoc-3.7.1-160000.1.1 * plexus-velocity-2.3.0-160000.1.1 * xmvn-mojo-4.3.0-160000.3.1 * xmvn-mojo-javadoc-4.3.0-160000.3.1 * maven-surefire-report-plugin-3.5.4-160000.1.1 * maven-surefire-provider-testng-3.5.4-160000.1.1 * xom-javadoc-1.3.9-160000.3.1 * maven-surefire-report-parser-3.5.4-160000.1.1 * velocity-engine-scripting-2.4.1-160000.1.1 * plexus-archiver-javadoc-4.10.2-160000.1.1 * plexus-i18n-1.0.0-160000.1.1 * maven-bundle-plugin-javadoc-5.1.9-160000.3.1 * maven-plugin-tools-annotations-3.15.2-160000.1.1 * maven-assembly-plugin-3.7.1-160000.1.1 * plexus-io-3.5.1-160000.1.1 * objectweb-asm-javadoc-9.9-160000.1.1 * maven-javadoc-plugin-3.12.0-160000.1.1 * maven-surefire-3.5.4-160000.1.1 * maven-file-management-javadoc-3.2.0-160000.1.1 * maven-archiver-javadoc-3.6.5-160000.1.1 * plexus-classworlds-javadoc-2.9.0-160000.1.1 * velocity-engine-examples-2.4.1-160000.1.1 * maven-resolver-transport-http-1.9.24-160000.1.1 * maven-resolver-1.9.24-160000.1.1 * xmvn-parent-4.3.0-160000.3.1 * plexus-xml-3.0.2-160000.1.1 * xmvn-api-4.3.0-160000.3.1 * maven-filtering-javadoc-3.4.0-160000.1.1 * maven-doxia-module-fml-2.0.0-160000.3.1 * maven-resolver-transport-file-1.9.24-160000.1.1 * maven-failsafe-plugin-3.5.4-160000.1.1 * plexus-interactivity-api-1.4-160000.1.1 * velocity-custom-parser-example-2.4.1-160000.1.1 * maven-resolver-named-locks-1.9.24-160000.1.1 * maven-invoker-plugin-javadoc-3.9.1-160000.1.1 * xmvn-connector-4.3.0-160000.3.1 * maven-plugin-plugin-javadoc-3.15.2-160000.1.1 * plexus-io-javadoc-3.5.1-160000.1.1 * maven-dependency-analyzer-1.16.0-160000.1.1 * maven-plugin-tools-api-3.15.2-160000.1.1 * plexus-compiler-javadoc-2.15.0-160000.1.1 * maven-parent-45-160000.1.1 * maven-dependency-tree-javadoc-3.2.1-160000.3.1 * maven-resolver-api-1.9.24-160000.1.1 * maven-archiver-3.6.5-160000.1.1 * xom-demo-1.3.9-160000.3.1 * maven-plugin-tools-java-3.15.2-160000.1.1 * maven-resolver-connector-basic-1.9.24-160000.1.1 * objectweb-asm-9.9-160000.1.1 * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * xmvn-4.3.0-160000.3.1 * xmvn-minimal-4.3.0-160000.3.1 * maven-lib-3.9.11-160000.1.1 * maven-3.9.11-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * maven-bundle-plugin-5.1.9-160000.3.1 * maven-javadoc-3.9.11-160000.1.1 * maven-artifact-transfer-0.13.1-160000.3.1 * maven-resolver-transport-wagon-1.9.24-160000.1.1 * plexus-interpolation-javadoc-1.28-160000.1.1 * maven-invoker-javadoc-3.3.0-160000.3.1 * maven-plugin-tools-ant-3.15.2-160000.1.1 * maven-resolver-test-util-1.9.24-160000.1.1 * maven-surefire-provider-junit5-3.5.4-160000.1.1 * maven-compiler-plugin-3.14.1-160000.1.1 * maven-doxia-module-xhtml5-2.0.0-160000.3.1 * plexus-sec-dispatcher-2.0-160000.3.1 * velocity-engine-core-2.4.1-160000.1.1 * plexus-velocity-javadoc-2.3.0-160000.1.1 * maven-resolver-javadoc-1.9.24-160000.1.1 * maven-doxia-test-docs-2.0.0-160000.3.1 * maven-filtering-3.4.0-160000.1.1 * plexus-i18n-javadoc-1.0.0-160000.1.1 * maven-doxia-module-apt-2.0.0-160000.3.1 * xmvn-subst-4.3.0-160000.3.1 * maven-surefire-plugin-3.5.4-160000.1.1 * maven-plugin-plugin-3.15.2-160000.1.1 * maven-file-management-3.2.0-160000.1.1 * velocity-engine-core-javadoc-2.4.1-160000.1.1 * maven-javadoc-plugin-javadoc-3.12.0-160000.1.1 * plexus-cipher-2.1.0-160000.3.1 * maven-surefire-provider-junit-3.5.4-160000.1.1 * maven-jar-plugin-javadoc-3.5.0-160000.1.1 * xmvn-install-4.3.0-160000.3.1 * maven-surefire-plugins-javadoc-3.5.4-160000.1.1 * maven-plugin-tools-beanshell-3.15.2-160000.1.1 * maven-dependency-analyzer-javadoc-1.16.0-160000.1.1 * xmvn-connector-javadoc-4.3.0-160000.3.1 * maven-artifact-transfer-javadoc-0.13.1-160000.3.1 * maven-resolver-spi-1.9.24-160000.1.1 * maven-doxia-sink-api-2.0.0-160000.3.1 * plexus-interactivity-javadoc-1.4-160000.1.1 * plexus-xml-javadoc-3.0.2-160000.1.1 * maven-plugin-tools-javadoc-3.15.2-160000.1.1 * maven-resolver-impl-1.9.24-160000.1.1 * velocity-engine-parent-2.4.1-160000.1.1 * maven-doxia-module-xdoc-2.0.0-160000.3.1 * xmvn-tools-javadoc-4.3.0-160000.3.1 * plexus-sec-dispatcher-javadoc-2.0-160000.3.1 * plexus-languages-1.5.0-160000.1.1 * plexus-build-api-1.2.0-160000.3.1 * plexus-classworlds-2.9.0-160000.1.1 * maven-compiler-plugin-javadoc-3.14.1-160000.1.1 * maven-doxia-core-2.0.0-160000.3.1 * maven-doxia-javadoc-2.0.0-160000.3.1 * velocity-engine-javadoc-2.4.1-160000.1.1 * maven-doxia-sitetools-javadoc-2.0.0-160000.3.1 * maven-plugin-annotations-3.15.2-160000.1.1 * plexus-cipher-javadoc-2.1.0-160000.3.1 * maven-invoker-plugin-3.9.1-160000.1.1 * xom-1.3.9-160000.3.1 * maven-script-ant-3.15.2-160000.1.1 * xmvn-core-4.3.0-160000.3.1 * maven-surefire-javadoc-3.5.4-160000.1.1 * maven-invoker-3.3.0-160000.3.1 * maven-resolver-transport-classpath-1.9.24-160000.1.1 * maven-doxia-sitetools-2.0.0-160000.3.1 * plexus-languages-javadoc-1.5.0-160000.1.1 * plexus-interpolation-1.28-160000.1.1 * plexus-compiler-extras-2.15.0-160000.1.1 * plexus-archiver-4.10.2-160000.1.1 * maven-script-beanshell-3.15.2-160000.1.1 * maven-plugin-tools-generators-3.15.2-160000.1.1 * plexus-compiler-2.15.0-160000.1.1 * maven-resolver-util-1.9.24-160000.1.1 * maven-surefire-provider-junit5-javadoc-3.5.4-160000.1.1 * maven-jar-plugin-3.5.0-160000.1.1 * maven-dependency-tree-3.2.1-160000.3.1 * maven-plugin-tools-model-3.15.2-160000.1.1 * plexus-build-api-javadoc-1.2.0-160000.3.1 * xmvn-resolve-4.3.0-160000.3.1 * maven-assembly-plugin-javadoc-3.7.1-160000.1.1 * plexus-velocity-2.3.0-160000.1.1 * xmvn-mojo-4.3.0-160000.3.1 * xmvn-mojo-javadoc-4.3.0-160000.3.1 * maven-surefire-report-plugin-3.5.4-160000.1.1 * maven-surefire-provider-testng-3.5.4-160000.1.1 * xom-javadoc-1.3.9-160000.3.1 * maven-surefire-report-parser-3.5.4-160000.1.1 * velocity-engine-scripting-2.4.1-160000.1.1 * plexus-archiver-javadoc-4.10.2-160000.1.1 * plexus-i18n-1.0.0-160000.1.1 * maven-bundle-plugin-javadoc-5.1.9-160000.3.1 * maven-plugin-tools-annotations-3.15.2-160000.1.1 * maven-assembly-plugin-3.7.1-160000.1.1 * plexus-io-3.5.1-160000.1.1 * objectweb-asm-javadoc-9.9-160000.1.1 * maven-javadoc-plugin-3.12.0-160000.1.1 * maven-surefire-3.5.4-160000.1.1 * maven-file-management-javadoc-3.2.0-160000.1.1 * maven-archiver-javadoc-3.6.5-160000.1.1 * plexus-classworlds-javadoc-2.9.0-160000.1.1 * velocity-engine-examples-2.4.1-160000.1.1 * maven-resolver-transport-http-1.9.24-160000.1.1 * maven-resolver-1.9.24-160000.1.1 * xmvn-parent-4.3.0-160000.3.1 * plexus-xml-3.0.2-160000.1.1 * xmvn-api-4.3.0-160000.3.1 * maven-filtering-javadoc-3.4.0-160000.1.1 * maven-doxia-module-fml-2.0.0-160000.3.1 * maven-resolver-transport-file-1.9.24-160000.1.1 * maven-failsafe-plugin-3.5.4-160000.1.1 * plexus-interactivity-api-1.4-160000.1.1 * velocity-custom-parser-example-2.4.1-160000.1.1 * maven-resolver-named-locks-1.9.24-160000.1.1 * maven-invoker-plugin-javadoc-3.9.1-160000.1.1 * xmvn-connector-4.3.0-160000.3.1 * maven-plugin-plugin-javadoc-3.15.2-160000.1.1 * plexus-io-javadoc-3.5.1-160000.1.1 * maven-dependency-analyzer-1.16.0-160000.1.1 * maven-plugin-tools-api-3.15.2-160000.1.1 * plexus-compiler-javadoc-2.15.0-160000.1.1 * maven-parent-45-160000.1.1 * maven-dependency-tree-javadoc-3.2.1-160000.3.1 * maven-resolver-api-1.9.24-160000.1.1 * maven-archiver-3.6.5-160000.1.1 * xom-demo-1.3.9-160000.3.1 * maven-plugin-tools-java-3.15.2-160000.1.1 * maven-resolver-connector-basic-1.9.24-160000.1.1 * objectweb-asm-9.9-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * xmvn-4.3.0-160000.3.1 * xmvn-minimal-4.3.0-160000.3.1 * maven-lib-3.9.11-160000.1.1 * maven-3.9.11-160000.1.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:35:13 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:35:13 -0000 Subject: SUSE-SU-2026:20022-1: critical: Security update of valkey Message-ID: <176846611356.28753.16395715851387306593@smelt2.prg2.suse.org> # Security update of valkey Announcement ID: SUSE-SU-2026:20022-1 Release Date: 2026-01-07T09:43:28Z Rating: critical References: * bsc#1250995 Cross-References: * CVE-2025-46817 * CVE-2025-46818 * CVE-2025-46819 * CVE-2025-49844 CVSS scores: * CVE-2025-46817 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-46817 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46817 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46817 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-46818 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-46818 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2025-46818 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H * CVE-2025-46818 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2025-46819 ( SUSE ): 7.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-46819 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-46819 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-46819 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-49844 ( SUSE ): 9.4 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-49844 ( SUSE ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-49844 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-49844 ( NVD ): 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for valkey fixes the following issues: Update to 8.0.6: * Security fixes: * CVE-2025-49844: Fixed that a Lua script may lead to remote code execution (bsc#1250995) * CVE-2025-46817: Fixed that a Lua script may lead to integer overflow and potential RCE (bsc#1250995) * CVE-2025-46818: Fixed that a Lua script can be executed in the context of another user (bsc#1250995) * CVE-2025-46819: Fixed LUA out-of-bound read (bsc#1250995) * Bug fixes: * Fix accounting for dual channel RDB bytes in replication stats (#2614) * Fix EVAL to report unknown error when empty error table is provided (#2229) * Fix use-after-free when active expiration triggers hashtable to shrink (#2257) * Fix MEMORY USAGE to account for embedded keys (#2290) * Fix memory leak when shrinking a hashtable without entries (#2288) * Prevent potential assertion in active defrag handling large allocations (#2353) * Prevent bad memory access when NOTOUCH client gets unblocked (#2347) * Converge divergent shard-id persisted in nodes.conf to primary's shard id (#2174) * Fix client tracking memory overhead calculation (#2360) * Fix RDB load per slot memory pre-allocation when loading from RDB snapshot (#2466) * Don't use AVX2 instructions if the CPU doesn't support it (#2571) * Fix bug where active defrag may be unable to defrag sparsely filled pages (#2656) Changes from 8.0.5: https://github.com/valkey-io/valkey/releases/tag/8.0.5 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-121=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-121=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * valkey-debuginfo-8.0.6-160000.1.1 * valkey-8.0.6-160000.1.1 * valkey-devel-8.0.6-160000.1.1 * valkey-debugsource-8.0.6-160000.1.1 * SUSE Linux Enterprise Server 16.0 (noarch) * valkey-compat-redis-8.0.6-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * valkey-debuginfo-8.0.6-160000.1.1 * valkey-8.0.6-160000.1.1 * valkey-devel-8.0.6-160000.1.1 * valkey-debugsource-8.0.6-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * valkey-compat-redis-8.0.6-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-46817.html * https://www.suse.com/security/cve/CVE-2025-46818.html * https://www.suse.com/security/cve/CVE-2025-46819.html * https://www.suse.com/security/cve/CVE-2025-49844.html * https://bugzilla.suse.com/show_bug.cgi?id=1250995 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:35:19 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:35:19 -0000 Subject: SUSE-SU-2026:0125-1: moderate: Security update for podman Message-ID: <176846611950.28753.4679719790419188909@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2026:0125-1 Release Date: 2026-01-14T16:57:38Z Rating: moderate References: * bsc#1253993 Cross-References: * CVE-2025-47914 CVSS scores: * CVE-2025-47914 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-47914 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-47914 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 An update that solves one vulnerability can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2025-47914: Fixed ssh-agent that could cause a panic due to an out-of- bounds read with non validated message size (bsc#1253993) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-125=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-125=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-125=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-125=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-125=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * podman-4.9.5-150400.4.65.2 * podman-remote-4.9.5-150400.4.65.2 * podman-debuginfo-4.9.5-150400.4.65.2 * podman-remote-debuginfo-4.9.5-150400.4.65.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * podman-4.9.5-150400.4.65.2 * podman-remote-4.9.5-150400.4.65.2 * podman-debuginfo-4.9.5-150400.4.65.2 * podman-remote-debuginfo-4.9.5-150400.4.65.2 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * podman-remote-debuginfo-4.9.5-150400.4.65.2 * podman-debuginfo-4.9.5-150400.4.65.2 * podman-remote-4.9.5-150400.4.65.2 * podman-4.9.5-150400.4.65.2 * podmansh-4.9.5-150400.4.65.2 * openSUSE Leap 15.4 (noarch) * podman-docker-4.9.5-150400.4.65.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * podman-4.9.5-150400.4.65.2 * podman-remote-4.9.5-150400.4.65.2 * podman-debuginfo-4.9.5-150400.4.65.2 * podman-remote-debuginfo-4.9.5-150400.4.65.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * podman-4.9.5-150400.4.65.2 * podman-remote-4.9.5-150400.4.65.2 * podman-debuginfo-4.9.5-150400.4.65.2 * podman-remote-debuginfo-4.9.5-150400.4.65.2 ## References: * https://www.suse.com/security/cve/CVE-2025-47914.html * https://bugzilla.suse.com/show_bug.cgi?id=1253993 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 08:35:15 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 08:35:15 -0000 Subject: SUSE-SU-2026:0126-1: low: Security update for poppler Message-ID: <176846611587.28753.9478805182899314027@smelt2.prg2.suse.org> # Security update for poppler Announcement ID: SUSE-SU-2026:0126-1 Release Date: 2026-01-14T16:57:49Z Rating: low References: * bsc#1252337 Cross-References: * CVE-2025-11896 CVSS scores: * CVE-2025-11896 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-11896 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-11896 ( NVD ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.4 An update that solves one vulnerability can now be installed. ## Description: This update for poppler fixes the following issues: * CVE-2025-11896: Fixed infinite recursion leading to stack overflow due to object loop in PDF CMap (bsc#1252337) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-126=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * poppler-qt5-debugsource-22.01.0-150400.3.44.1 * libpoppler-cpp0-22.01.0-150400.3.44.1 * libpoppler117-debuginfo-22.01.0-150400.3.44.1 * libpoppler-qt5-devel-22.01.0-150400.3.44.1 * libpoppler-qt6-3-22.01.0-150400.3.44.1 * libpoppler-qt6-3-debuginfo-22.01.0-150400.3.44.1 * libpoppler-qt5-1-22.01.0-150400.3.44.1 * libpoppler-qt6-devel-22.01.0-150400.3.44.1 * poppler-debugsource-22.01.0-150400.3.44.1 * libpoppler-qt5-1-debuginfo-22.01.0-150400.3.44.1 * libpoppler-glib8-22.01.0-150400.3.44.1 * poppler-tools-debuginfo-22.01.0-150400.3.44.1 * typelib-1_0-Poppler-0_18-22.01.0-150400.3.44.1 * poppler-qt6-debugsource-22.01.0-150400.3.44.1 * poppler-tools-22.01.0-150400.3.44.1 * libpoppler-cpp0-debuginfo-22.01.0-150400.3.44.1 * libpoppler-glib8-debuginfo-22.01.0-150400.3.44.1 * libpoppler-devel-22.01.0-150400.3.44.1 * libpoppler117-22.01.0-150400.3.44.1 * libpoppler-glib-devel-22.01.0-150400.3.44.1 * openSUSE Leap 15.4 (x86_64) * libpoppler-glib8-32bit-22.01.0-150400.3.44.1 * libpoppler-qt5-1-32bit-debuginfo-22.01.0-150400.3.44.1 * libpoppler-cpp0-32bit-22.01.0-150400.3.44.1 * libpoppler-qt5-1-32bit-22.01.0-150400.3.44.1 * libpoppler117-32bit-debuginfo-22.01.0-150400.3.44.1 * libpoppler117-32bit-22.01.0-150400.3.44.1 * libpoppler-glib8-32bit-debuginfo-22.01.0-150400.3.44.1 * libpoppler-cpp0-32bit-debuginfo-22.01.0-150400.3.44.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libpoppler-cpp0-64bit-debuginfo-22.01.0-150400.3.44.1 * libpoppler-glib8-64bit-debuginfo-22.01.0-150400.3.44.1 * libpoppler-glib8-64bit-22.01.0-150400.3.44.1 * libpoppler-qt5-1-64bit-22.01.0-150400.3.44.1 * libpoppler-qt5-1-64bit-debuginfo-22.01.0-150400.3.44.1 * libpoppler-cpp0-64bit-22.01.0-150400.3.44.1 * libpoppler117-64bit-22.01.0-150400.3.44.1 * libpoppler117-64bit-debuginfo-22.01.0-150400.3.44.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11896.html * https://bugzilla.suse.com/show_bug.cgi?id=1252337 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 16:30:01 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 16:30:01 -0000 Subject: SUSE-RU-2026:20076-1: important: Recommended update 5.1.1.1 of SUSE Multi-Linux Manager Message-ID: <176849460138.28979.8313599250159449602@smelt2.prg2.suse.org> # Recommended update 5.1.1.1 of SUSE Multi-Linux Manager Announcement ID: SUSE-RU-2026:20076-1 Release Date: 2026-01-08T10:48:25Z Rating: important References: * jsc#MSQA-1038 Affected Products: * SUSE Linux Micro 6.1 * SUSE Multi-Linux Manager Proxy 5.1 * SUSE Multi-Linux Manager Retail Branch Server 5.1 * SUSE Multi-Linux Manager Server 5.1 An update that contains one feature can now be installed. ## Description: This update for SUSE Multi-Linux Manager fixes the following issues: proxy-httpd-image: * Version 5.1.12 * Image rebuilt to the newest version with updated dependencies proxy-salt-broker-image: * Version 5.1.11 * Image rebuilt to the newest version with updated dependencies proxy-squid-image: * Version 5.1.10 * Image rebuilt to the newest version with updated dependencies proxy-ssh-image: * Version 5.1.10 * Image rebuilt to the newest version with updated dependencies proxy-tftpd-image: * Version 5.1.10 * Image rebuilt to the newest version with updated dependencies server-attestation-image: * Version 5.1.11 * Image rebuilt to the newest version with updated dependencies server-hub-xmlrpc-api-image: * Version 5.1.10 * Image rebuilt to the newest version with updated dependencies server-image: * Version 5.1.11 * Image rebuilt to the newest version with updated dependencies server-migration-14-16-image: * Version 5.1.10 * Image rebuilt to the newest version with updated dependencies server-postgresql-image: * Version 5.1.8 * Image rebuilt to the newest version with updated dependencies server-saline-image: * Version 5.1.10 * Image rebuilt to the newest version with updated dependencies uyuni-tools: * version 5.1.23-0 * Updated the default tag to 5.1.1.1 How to apply this update: SUSE Multi-Linux Manager Server: 1. Log in as root user to the SUSE Multi-Linux Manager Server. 2. Upgrade mgradm and mgrctl. 3. If you are in a disconnected environment, upgrade the image packages. 4. Reboot the system. 5. Run `mgradm upgrade podman` which will use the default image tags. SUSE Multi-Linux Manager Proxy / Retail Branch Server: 1. Log in as root user to the SUSE Multi-Linux Manager Proxy / Retail Branch Server. 2. Upgrade mgrpxy. 3. If you are in a disconnected environment, upgrade the image packages. 4. Reboot the system. 5. Run `mgrpxy upgrade podman` which will use the default image tags. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Multi-Linux Manager Proxy 5.1 zypper in -t patch SUSE-Multi-Linux-Manager-5.1-3=1 * SUSE Multi-Linux Manager Retail Branch Server 5.1 zypper in -t patch SUSE-Multi-Linux-Manager-5.1-3=1 * SUSE Multi-Linux Manager Server 5.1 zypper in -t patch SUSE-Multi-Linux-Manager-5.1-3=1 ## Package List: * SUSE Multi-Linux Manager Proxy 5.1 (aarch64 ppc64le s390x x86_64) * mgrpxy-debuginfo-5.1.23-slfo.1.1.1 * mgrpxy-5.1.23-slfo.1.1.1 * SUSE Multi-Linux Manager Proxy 5.1 (noarch) * mgrpxy-zsh-completion-5.1.23-slfo.1.1.1 * mgrpxy-lang-5.1.23-slfo.1.1.1 * mgrpxy-bash-completion-5.1.23-slfo.1.1.1 * SUSE Multi-Linux Manager Proxy 5.1 (aarch64) * suse-multi-linux-manager-5.1-aarch64-proxy-httpd-image-5.1.1.1-8.10.8 * suse-multi-linux-manager-5.1-aarch64-proxy-ssh-image-5.1.1.1-8.8.3 * suse-multi-linux-manager-5.1-aarch64-proxy-squid-image-5.1.1.1-8.8.3 * suse-multi-linux-manager-5.1-aarch64-proxy-salt-broker-image-5.1.1.1-9.8.11 * suse-multi-linux-manager-5.1-aarch64-proxy-tftpd-image-5.1.1.1-8.8.3 * SUSE Multi-Linux Manager Proxy 5.1 (ppc64le) * suse-multi-linux-manager-5.1-ppc64le-proxy-ssh-image-5.1.1.1-8.8.3 * suse-multi-linux-manager-5.1-ppc64le-proxy-httpd-image-5.1.1.1-8.10.8 * suse-multi-linux-manager-5.1-ppc64le-proxy-tftpd-image-5.1.1.1-8.8.3 * suse-multi-linux-manager-5.1-ppc64le-proxy-squid-image-5.1.1.1-8.8.3 * suse-multi-linux-manager-5.1-ppc64le-proxy-salt-broker-image-5.1.1.1-9.8.11 * SUSE Multi-Linux Manager Proxy 5.1 (s390x) * suse-multi-linux-manager-5.1-s390x-proxy-ssh-image-5.1.1.1-8.8.3 * suse-multi-linux-manager-5.1-s390x-proxy-salt-broker-image-5.1.1.1-9.8.11 * suse-multi-linux-manager-5.1-s390x-proxy-tftpd-image-5.1.1.1-8.8.3 * suse-multi-linux-manager-5.1-s390x-proxy-httpd-image-5.1.1.1-8.10.8 * suse-multi-linux-manager-5.1-s390x-proxy-squid-image-5.1.1.1-8.8.3 * SUSE Multi-Linux Manager Proxy 5.1 (x86_64) * suse-multi-linux-manager-5.1-x86_64-proxy-squid-image-5.1.1.1-8.8.3 * suse-multi-linux-manager-5.1-x86_64-proxy-ssh-image-5.1.1.1-8.8.3 * suse-multi-linux-manager-5.1-x86_64-proxy-tftpd-image-5.1.1.1-8.8.3 * suse-multi-linux-manager-5.1-x86_64-proxy-httpd-image-5.1.1.1-8.10.8 * suse-multi-linux-manager-5.1-x86_64-proxy-salt-broker-image-5.1.1.1-9.8.11 * SUSE Multi-Linux Manager Retail Branch Server 5.1 (aarch64 ppc64le s390x x86_64) * mgrpxy-debuginfo-5.1.23-slfo.1.1.1 * mgrpxy-5.1.23-slfo.1.1.1 * SUSE Multi-Linux Manager Retail Branch Server 5.1 (noarch) * mgrpxy-zsh-completion-5.1.23-slfo.1.1.1 * mgrpxy-lang-5.1.23-slfo.1.1.1 * mgrpxy-bash-completion-5.1.23-slfo.1.1.1 * SUSE Multi-Linux Manager Retail Branch Server 5.1 (aarch64) * suse-multi-linux-manager-5.1-aarch64-proxy-httpd-image-5.1.1.1-8.10.8 * suse-multi-linux-manager-5.1-aarch64-proxy-ssh-image-5.1.1.1-8.8.3 * suse-multi-linux-manager-5.1-aarch64-proxy-squid-image-5.1.1.1-8.8.3 * suse-multi-linux-manager-5.1-aarch64-proxy-salt-broker-image-5.1.1.1-9.8.11 * suse-multi-linux-manager-5.1-aarch64-proxy-tftpd-image-5.1.1.1-8.8.3 * SUSE Multi-Linux Manager Retail Branch Server 5.1 (ppc64le) * suse-multi-linux-manager-5.1-ppc64le-proxy-ssh-image-5.1.1.1-8.8.3 * suse-multi-linux-manager-5.1-ppc64le-proxy-httpd-image-5.1.1.1-8.10.8 * suse-multi-linux-manager-5.1-ppc64le-proxy-tftpd-image-5.1.1.1-8.8.3 * suse-multi-linux-manager-5.1-ppc64le-proxy-squid-image-5.1.1.1-8.8.3 * suse-multi-linux-manager-5.1-ppc64le-proxy-salt-broker-image-5.1.1.1-9.8.11 * SUSE Multi-Linux Manager Retail Branch Server 5.1 (s390x) * suse-multi-linux-manager-5.1-s390x-proxy-ssh-image-5.1.1.1-8.8.3 * suse-multi-linux-manager-5.1-s390x-proxy-salt-broker-image-5.1.1.1-9.8.11 * suse-multi-linux-manager-5.1-s390x-proxy-tftpd-image-5.1.1.1-8.8.3 * suse-multi-linux-manager-5.1-s390x-proxy-httpd-image-5.1.1.1-8.10.8 * suse-multi-linux-manager-5.1-s390x-proxy-squid-image-5.1.1.1-8.8.3 * SUSE Multi-Linux Manager Retail Branch Server 5.1 (x86_64) * suse-multi-linux-manager-5.1-x86_64-proxy-squid-image-5.1.1.1-8.8.3 * suse-multi-linux-manager-5.1-x86_64-proxy-ssh-image-5.1.1.1-8.8.3 * suse-multi-linux-manager-5.1-x86_64-proxy-tftpd-image-5.1.1.1-8.8.3 * suse-multi-linux-manager-5.1-x86_64-proxy-httpd-image-5.1.1.1-8.10.8 * suse-multi-linux-manager-5.1-x86_64-proxy-salt-broker-image-5.1.1.1-9.8.11 * SUSE Multi-Linux Manager Server 5.1 (aarch64 ppc64le s390x x86_64) * mgradm-debuginfo-5.1.23-slfo.1.1.1 * mgrctl-5.1.23-slfo.1.1.1 * mgradm-5.1.23-slfo.1.1.1 * mgrctl-debuginfo-5.1.23-slfo.1.1.1 * SUSE Multi-Linux Manager Server 5.1 (noarch) * mgrctl-bash-completion-5.1.23-slfo.1.1.1 * mgradm-lang-5.1.23-slfo.1.1.1 * mgradm-bash-completion-5.1.23-slfo.1.1.1 * mgrctl-lang-5.1.23-slfo.1.1.1 * mgradm-zsh-completion-5.1.23-slfo.1.1.1 * mgrctl-zsh-completion-5.1.23-slfo.1.1.1 * SUSE Multi-Linux Manager Server 5.1 (aarch64) * suse-multi-linux-manager-5.1-aarch64-server-hub-xmlrpc-api-image-5.1.1.1-8.8.6 * suse-multi-linux-manager-5.1-aarch64-server-image-5.1.1.1-8.8.11 * suse-multi-linux-manager-5.1-aarch64-server-migration-14-16-image-5.1.1.1-8.8.2 * suse-multi-linux-manager-5.1-aarch64-server-attestation-image-5.1.1.1-8.10.3 * suse-multi-linux-manager-5.1-aarch64-server-saline-image-5.1.1.1-9.8.11 * suse-multi-linux-manager-5.1-aarch64-server-postgresql-image-5.1.1.1-6.8.1 * SUSE Multi-Linux Manager Server 5.1 (ppc64le) * suse-multi-linux-manager-5.1-ppc64le-server-saline-image-5.1.1.1-9.8.11 * suse-multi-linux-manager-5.1-ppc64le-server-attestation-image-5.1.1.1-8.10.3 * suse-multi-linux-manager-5.1-ppc64le-server-image-5.1.1.1-8.8.11 * suse-multi-linux-manager-5.1-ppc64le-server-postgresql-image-5.1.1.1-6.8.1 * suse-multi-linux-manager-5.1-ppc64le-server-migration-14-16-image-5.1.1.1-8.8.2 * suse-multi-linux-manager-5.1-ppc64le-server-hub-xmlrpc-api-image-5.1.1.1-8.8.6 * SUSE Multi-Linux Manager Server 5.1 (s390x) * suse-multi-linux-manager-5.1-s390x-server-image-5.1.1.1-8.8.11 * suse-multi-linux-manager-5.1-s390x-server-saline-image-5.1.1.1-9.8.11 * suse-multi-linux-manager-5.1-s390x-server-postgresql-image-5.1.1.1-6.8.1 * suse-multi-linux-manager-5.1-s390x-server-hub-xmlrpc-api-image-5.1.1.1-8.8.6 * suse-multi-linux-manager-5.1-s390x-server-migration-14-16-image-5.1.1.1-8.8.2 * suse-multi-linux-manager-5.1-s390x-server-attestation-image-5.1.1.1-8.10.3 * SUSE Multi-Linux Manager Server 5.1 (x86_64) * suse-multi-linux-manager-5.1-x86_64-server-image-5.1.1.1-8.8.11 * suse-multi-linux-manager-5.1-x86_64-server-postgresql-image-5.1.1.1-6.8.1 * suse-multi-linux-manager-5.1-x86_64-server-hub-xmlrpc-api-image-5.1.1.1-8.8.6 * suse-multi-linux-manager-5.1-x86_64-server-saline-image-5.1.1.1-9.8.11 * suse-multi-linux-manager-5.1-x86_64-server-attestation-image-5.1.1.1-8.10.3 * suse-multi-linux-manager-5.1-x86_64-server-migration-14-16-image-5.1.1.1-8.8.2 ## References: * https://jira.suse.com/browse/MSQA-1038 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 16:30:05 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 16:30:05 -0000 Subject: SUSE-RU-2026:0127-1: important: Recommended update for evolution Message-ID: <176849460511.28979.8088722437934843251@smelt2.prg2.suse.org> # Recommended update for evolution Announcement ID: SUSE-RU-2026:0127-1 Release Date: 2026-01-15T09:53:59Z Rating: important References: * bsc#1252722 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 * SUSE Package Hub 15 15-SP7 An update that has one fix can now be installed. ## Description: This update for evolution fixes the following issues: * check that g_file_info contains display-name before accesing it (bsc#1252722). * Fix JavaScript dictionary objects creation. Needed for WebKitGTK >= 2.50 (bsc#1252722 glgo#GNOME/evolution#3124). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-127=1 openSUSE-SLE-15.6-2026-127=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-127=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-127=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * evolution-3.50.3-150600.3.5.2 * evolution-devel-3.50.3-150600.3.5.2 * evolution-debugsource-3.50.3-150600.3.5.2 * evolution-plugin-pst-import-3.50.3-150600.3.5.2 * evolution-debuginfo-3.50.3-150600.3.5.2 * evolution-plugin-pst-import-debuginfo-3.50.3-150600.3.5.2 * evolution-plugin-spamassassin-3.50.3-150600.3.5.2 * evolution-plugin-text-highlight-3.50.3-150600.3.5.2 * evolution-plugin-bogofilter-3.50.3-150600.3.5.2 * glade-catalog-evolution-debuginfo-3.50.3-150600.3.5.2 * evolution-plugin-spamassassin-debuginfo-3.50.3-150600.3.5.2 * evolution-plugin-bogofilter-debuginfo-3.50.3-150600.3.5.2 * glade-catalog-evolution-3.50.3-150600.3.5.2 * evolution-plugin-text-highlight-debuginfo-3.50.3-150600.3.5.2 * openSUSE Leap 15.6 (noarch) * evolution-lang-3.50.3-150600.3.5.2 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x) * evolution-3.50.3-150600.3.5.2 * evolution-devel-3.50.3-150600.3.5.2 * evolution-debugsource-3.50.3-150600.3.5.2 * evolution-plugin-pst-import-3.50.3-150600.3.5.2 * evolution-debuginfo-3.50.3-150600.3.5.2 * evolution-plugin-pst-import-debuginfo-3.50.3-150600.3.5.2 * evolution-plugin-spamassassin-3.50.3-150600.3.5.2 * evolution-plugin-text-highlight-3.50.3-150600.3.5.2 * evolution-plugin-bogofilter-3.50.3-150600.3.5.2 * glade-catalog-evolution-debuginfo-3.50.3-150600.3.5.2 * evolution-plugin-spamassassin-debuginfo-3.50.3-150600.3.5.2 * evolution-plugin-bogofilter-debuginfo-3.50.3-150600.3.5.2 * glade-catalog-evolution-3.50.3-150600.3.5.2 * evolution-plugin-text-highlight-debuginfo-3.50.3-150600.3.5.2 * SUSE Package Hub 15 15-SP7 (noarch) * evolution-lang-3.50.3-150600.3.5.2 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * evolution-3.50.3-150600.3.5.2 * evolution-devel-3.50.3-150600.3.5.2 * evolution-debugsource-3.50.3-150600.3.5.2 * evolution-plugin-pst-import-3.50.3-150600.3.5.2 * evolution-debuginfo-3.50.3-150600.3.5.2 * evolution-plugin-pst-import-debuginfo-3.50.3-150600.3.5.2 * evolution-plugin-spamassassin-3.50.3-150600.3.5.2 * evolution-plugin-text-highlight-3.50.3-150600.3.5.2 * evolution-plugin-bogofilter-3.50.3-150600.3.5.2 * evolution-plugin-spamassassin-debuginfo-3.50.3-150600.3.5.2 * evolution-plugin-bogofilter-debuginfo-3.50.3-150600.3.5.2 * evolution-plugin-text-highlight-debuginfo-3.50.3-150600.3.5.2 * SUSE Linux Enterprise Workstation Extension 15 SP7 (noarch) * evolution-lang-3.50.3-150600.3.5.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1252722 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 20:30:07 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 20:30:07 -0000 Subject: SUSE-SU-2026:0130-1: moderate: Security update for python310 Message-ID: <176850900713.8644.17809794731961018048@smelt2.prg2.suse.org> # Security update for python310 Announcement ID: SUSE-SU-2026:0130-1 Release Date: 2026-01-15T13:11:13Z Rating: moderate References: * bsc#1254400 * bsc#1254401 * bsc#1254997 Cross-References: * CVE-2025-12084 * CVE-2025-13836 * CVE-2025-13837 CVSS scores: * CVE-2025-12084 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-12084 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-12084 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-12084 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-13836 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13836 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-13836 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13836 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2025-13837 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13837 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-13837 ( NVD ): 2.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 An update that solves three vulnerabilities can now be installed. ## Description: This update for python310 fixes the following issues: * CVE-2025-12084: quadratic complexity when building nested elements using `xml.dom.minidom` methods that depend on `_clear_id_cache()` can lead to availability issues when building excessively nested documents (bsc#1254997). * CVE-2025-13836: use of `Content-Length` by default when reading an HTTP response with no read amount specified can lead to OOM issues and DoS when a client deals with a malicious server (bsc#1254400). * CVE-2025-13837: data read by the plistlib module according to the size specified by the file itself can lead to OOM issues and DoS (bsc#1254401). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-130=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-130=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python310-base-debuginfo-3.10.19-150400.4.94.1 * python310-curses-3.10.19-150400.4.94.1 * python310-debugsource-3.10.19-150400.4.94.1 * python310-base-3.10.19-150400.4.94.1 * python310-testsuite-3.10.19-150400.4.94.1 * python310-tk-debuginfo-3.10.19-150400.4.94.1 * python310-doc-devhelp-3.10.19-150400.4.94.1 * python310-curses-debuginfo-3.10.19-150400.4.94.1 * python310-testsuite-debuginfo-3.10.19-150400.4.94.1 * python310-3.10.19-150400.4.94.1 * python310-doc-3.10.19-150400.4.94.1 * libpython3_10-1_0-debuginfo-3.10.19-150400.4.94.1 * python310-dbm-debuginfo-3.10.19-150400.4.94.1 * python310-tk-3.10.19-150400.4.94.1 * python310-idle-3.10.19-150400.4.94.1 * python310-devel-3.10.19-150400.4.94.1 * python310-core-debugsource-3.10.19-150400.4.94.1 * python310-dbm-3.10.19-150400.4.94.1 * python310-tools-3.10.19-150400.4.94.1 * libpython3_10-1_0-3.10.19-150400.4.94.1 * python310-debuginfo-3.10.19-150400.4.94.1 * openSUSE Leap 15.4 (x86_64) * python310-32bit-3.10.19-150400.4.94.1 * python310-base-32bit-debuginfo-3.10.19-150400.4.94.1 * python310-base-32bit-3.10.19-150400.4.94.1 * libpython3_10-1_0-32bit-3.10.19-150400.4.94.1 * python310-32bit-debuginfo-3.10.19-150400.4.94.1 * libpython3_10-1_0-32bit-debuginfo-3.10.19-150400.4.94.1 * openSUSE Leap 15.4 (aarch64_ilp32) * python310-64bit-3.10.19-150400.4.94.1 * python310-64bit-debuginfo-3.10.19-150400.4.94.1 * python310-base-64bit-3.10.19-150400.4.94.1 * libpython3_10-1_0-64bit-debuginfo-3.10.19-150400.4.94.1 * python310-base-64bit-debuginfo-3.10.19-150400.4.94.1 * libpython3_10-1_0-64bit-3.10.19-150400.4.94.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python310-base-debuginfo-3.10.19-150400.4.94.1 * python310-curses-3.10.19-150400.4.94.1 * python310-debugsource-3.10.19-150400.4.94.1 * python310-base-3.10.19-150400.4.94.1 * python310-testsuite-3.10.19-150400.4.94.1 * python310-tk-debuginfo-3.10.19-150400.4.94.1 * python310-doc-devhelp-3.10.19-150400.4.94.1 * python310-curses-debuginfo-3.10.19-150400.4.94.1 * python310-testsuite-debuginfo-3.10.19-150400.4.94.1 * python310-3.10.19-150400.4.94.1 * python310-doc-3.10.19-150400.4.94.1 * libpython3_10-1_0-debuginfo-3.10.19-150400.4.94.1 * python310-dbm-debuginfo-3.10.19-150400.4.94.1 * python310-tk-3.10.19-150400.4.94.1 * python310-idle-3.10.19-150400.4.94.1 * python310-devel-3.10.19-150400.4.94.1 * python310-core-debugsource-3.10.19-150400.4.94.1 * python310-dbm-3.10.19-150400.4.94.1 * python310-tools-3.10.19-150400.4.94.1 * libpython3_10-1_0-3.10.19-150400.4.94.1 * python310-debuginfo-3.10.19-150400.4.94.1 * openSUSE Leap 15.6 (x86_64) * python310-32bit-3.10.19-150400.4.94.1 * python310-base-32bit-debuginfo-3.10.19-150400.4.94.1 * python310-base-32bit-3.10.19-150400.4.94.1 * libpython3_10-1_0-32bit-3.10.19-150400.4.94.1 * python310-32bit-debuginfo-3.10.19-150400.4.94.1 * libpython3_10-1_0-32bit-debuginfo-3.10.19-150400.4.94.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12084.html * https://www.suse.com/security/cve/CVE-2025-13836.html * https://www.suse.com/security/cve/CVE-2025-13837.html * https://bugzilla.suse.com/show_bug.cgi?id=1254400 * https://bugzilla.suse.com/show_bug.cgi?id=1254401 * https://bugzilla.suse.com/show_bug.cgi?id=1254997 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 20:30:10 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 20:30:10 -0000 Subject: SUSE-RU-2026:0129-1: moderate: Recommended update for release-notes-sle_hpc Message-ID: <176850901022.8644.6913211132361517879@smelt2.prg2.suse.org> # Recommended update for release-notes-sle_hpc Announcement ID: SUSE-RU-2026:0129-1 Release Date: 2026-01-15T12:44:49Z Rating: moderate References: * bsc#933411 * jsc#PED-2802 * jsc#PED-2803 * jsc#PED-6787 * jsc#PED-7684 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 An update that contains four features and has one fix can now be installed. ## Description: This update for release-notes-sle_hpc fixes the following issues: * Upgrade version to 15.4.20251031 (bsc#933411) * Added Slurm deprecation notice (jsc#PED-6787) * Added note about dropping HPC product (jsc#PED-7684) * Added note about Slurm 23.02 (jsc#PED-2802) * Added note abou Spack (jsc#PED-2803) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-129=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-129=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-129=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * release-notes-sle_hpc-15.400000000.20251031-150400.3.14.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * release-notes-sle_hpc-15.400000000.20251031-150400.3.14.1 * openSUSE Leap 15.4 (noarch) * release-notes-sle_hpc-15.400000000.20251031-150400.3.14.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=933411 * https://jira.suse.com/browse/PED-2802 * https://jira.suse.com/browse/PED-2803 * https://jira.suse.com/browse/PED-6787 * https://jira.suse.com/browse/PED-7684 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 15 20:30:17 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 15 Jan 2026 20:30:17 -0000 Subject: SUSE-RU-2026:0128-1: moderate: Recommended update for release-notes-sle_hpc Message-ID: <176850901739.8644.490306106889508824@smelt2.prg2.suse.org> # Recommended update for release-notes-sle_hpc Announcement ID: SUSE-RU-2026:0128-1 Release Date: 2026-01-15T12:44:31Z Rating: moderate References: * bsc#933411 * jsc#PED-2802 * jsc#PED-2803 * jsc#PED-6787 * jsc#PED-7684 * jsc#SLE-18782 * jsc#SLE-21334 Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 An update that contains six features and has one fix can now be installed. ## Description: This update for release-notes-sle_hpc fixes the following issues: * Upgrade version to 15.3.20251031 (bsc#933411) * Added Slurm deprecation notice (jsc#PED-6787) * Added note about dropping HPC product (jsc#PED-7684) * Added note about Slurm 23.02 (jsc#PED-2802) * Added note abou Spack (jsc#PED-2803) * Added note about Slurm 22.05 (jsc#SLE-21334) * Added note about gnu11-compiler-hpc (jsc#SLE-18782) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2026-128=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2026-128=1 ## Package List: * openSUSE Leap 15.3 (noarch) * release-notes-sle_hpc-15.300000000.20251031-150300.3.11.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch) * release-notes-sle_hpc-15.300000000.20251031-150300.3.11.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=933411 * https://jira.suse.com/browse/PED-2802 * https://jira.suse.com/browse/PED-2803 * https://jira.suse.com/browse/PED-6787 * https://jira.suse.com/browse/PED-7684 * https://jira.suse.com/browse/SLE-18782 * https://jira.suse.com/browse/SLE-21334 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 16 16:30:06 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 16 Jan 2026 16:30:06 -0000 Subject: SUSE-SU-2026:0133-1: moderate: Security update for python Message-ID: <176858100623.28915.5814594508469965165@smelt2.prg2.suse.org> # Security update for python Announcement ID: SUSE-SU-2026:0133-1 Release Date: 2026-01-16T09:19:41Z Rating: moderate References: * bsc#1251305 * bsc#1254400 * bsc#1254997 Cross-References: * CVE-2025-12084 * CVE-2025-13836 * CVE-2025-8291 CVSS scores: * CVE-2025-12084 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-12084 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-12084 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-12084 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-13836 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13836 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-13836 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13836 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2025-8291 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-8291 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2025-8291 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for python fixes the following issues: * CVE-2025-8291: check validity of the ZIP64 End of Central Directory (EOCD) in the 'zipfile' module (bsc#1251305). * CVE-2025-12084: prevent quadratic behavior in node ID cache clearing (bsc#1254997). * CVE-2025-13836: prevent reading an HTTP response from a server, if no read amount is specified, with using Content-Length per default as the length (bsc#1254400). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-133=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libpython2_7-1_0-debuginfo-32bit-2.7.18-33.56.1 * python-curses-2.7.18-33.56.1 * python-gdbm-debuginfo-2.7.18-33.56.1 * python-idle-2.7.18-33.56.1 * python-2.7.18-33.56.1 * python-devel-2.7.18-33.56.1 * python-32bit-2.7.18-33.56.1 * python-debuginfo-32bit-2.7.18-33.56.1 * python-base-32bit-2.7.18-33.56.1 * python-base-debugsource-2.7.18-33.56.1 * python-base-debuginfo-32bit-2.7.18-33.56.1 * libpython2_7-1_0-debuginfo-2.7.18-33.56.1 * python-curses-debuginfo-2.7.18-33.56.1 * python-base-2.7.18-33.56.1 * libpython2_7-1_0-32bit-2.7.18-33.56.1 * python-gdbm-2.7.18-33.56.1 * python-tk-debuginfo-2.7.18-33.56.1 * python-xml-2.7.18-33.56.1 * python-debuginfo-2.7.18-33.56.1 * libpython2_7-1_0-2.7.18-33.56.1 * python-base-debuginfo-2.7.18-33.56.1 * python-xml-debuginfo-2.7.18-33.56.1 * python-demo-2.7.18-33.56.1 * python-debugsource-2.7.18-33.56.1 * python-tk-2.7.18-33.56.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * python-doc-2.7.18-33.56.1 * python-doc-pdf-2.7.18-33.56.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12084.html * https://www.suse.com/security/cve/CVE-2025-13836.html * https://www.suse.com/security/cve/CVE-2025-8291.html * https://bugzilla.suse.com/show_bug.cgi?id=1251305 * https://bugzilla.suse.com/show_bug.cgi?id=1254400 * https://bugzilla.suse.com/show_bug.cgi?id=1254997 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 16 20:32:16 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 16 Jan 2026 20:32:16 -0000 Subject: SUSE-SU-2026:0140-1: important: Security update for the Linux Kernel Message-ID: <176859553615.13274.8065746239737515121@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:0140-1 Release Date: 2026-01-16T15:46:10Z Rating: important References: * bsc#1184350 * bsc#1193629 * bsc#1204569 * bsc#1204619 * bsc#1204705 * bsc#1205282 * bsc#1206051 * bsc#1206073 * bsc#1206649 * bsc#1206886 * bsc#1206887 * bsc#1208542 * bsc#1209292 * bsc#1209556 * bsc#1209684 * bsc#1210337 * bsc#1210763 * bsc#1210767 * bsc#1211465 * bsc#1213012 * bsc#1213013 * bsc#1213094 * bsc#1213096 * bsc#1213946 * bsc#1214991 * bsc#1218470 * bsc#1232649 * bsc#1234887 * bsc#1235100 * bsc#1237981 * bsc#1238032 * bsc#1240177 * bsc#1240802 * bsc#1241525 * bsc#1241526 * bsc#1241640 * bsc#1241648 * bsc#1242147 * bsc#1242150 * bsc#1242151 * bsc#1242154 * bsc#1242157 * bsc#1242158 * bsc#1242164 * bsc#1242165 * bsc#1242169 * bsc#1242215 * bsc#1242218 * bsc#1242219 * bsc#1242222 * bsc#1242226 * bsc#1242227 * bsc#1242228 * bsc#1242229 * bsc#1242230 * bsc#1242231 * bsc#1242232 * bsc#1242237 * bsc#1242239 * bsc#1242241 * bsc#1242244 * bsc#1242245 * bsc#1242248 * bsc#1242261 * bsc#1242264 * bsc#1242265 * bsc#1242270 * bsc#1242276 * bsc#1242279 * bsc#1242280 * bsc#1242281 * bsc#1242282 * bsc#1242284 * bsc#1242285 * bsc#1242289 * bsc#1242294 * bsc#1242305 * bsc#1242312 * bsc#1242320 * bsc#1242338 * bsc#1242352 * bsc#1242353 * bsc#1242355 * bsc#1242357 * bsc#1242358 * bsc#1242361 * bsc#1242365 * bsc#1242366 * bsc#1242369 * bsc#1242370 * bsc#1242371 * bsc#1242372 * bsc#1242377 * bsc#1242378 * bsc#1242380 * bsc#1242382 * bsc#1242385 * bsc#1242387 * bsc#1242389 * bsc#1242391 * bsc#1242392 * bsc#1242394 * bsc#1242398 * bsc#1242399 * bsc#1242402 * bsc#1242403 * bsc#1242409 * bsc#1242411 * bsc#1242415 * bsc#1242416 * bsc#1242421 * bsc#1242422 * bsc#1242426 * bsc#1242428 * bsc#1242440 * bsc#1242443 * bsc#1242449 * bsc#1242452 * bsc#1242453 * bsc#1242454 * bsc#1242455 * bsc#1242456 * bsc#1242458 * bsc#1242464 * bsc#1242467 * bsc#1242469 * bsc#1242473 * bsc#1242478 * bsc#1242481 * bsc#1242484 * bsc#1242489 * bsc#1242493 * bsc#1242497 * bsc#1242527 * bsc#1242542 * bsc#1242544 * bsc#1242545 * bsc#1242547 * bsc#1242548 * bsc#1242549 * bsc#1242550 * bsc#1242551 * bsc#1242558 * bsc#1242570 * bsc#1242580 * bsc#1242586 * bsc#1242589 * bsc#1242596 * bsc#1242597 * bsc#1242685 * bsc#1242686 * bsc#1242688 * bsc#1242689 * bsc#1242695 * bsc#1242716 * bsc#1242733 * bsc#1242734 * bsc#1242735 * bsc#1242736 * bsc#1242739 * bsc#1242743 * bsc#1242744 * bsc#1242745 * bsc#1242746 * bsc#1242747 * bsc#1242749 * bsc#1242752 * bsc#1242753 * bsc#1242756 * bsc#1242759 * bsc#1242762 * bsc#1242765 * bsc#1242767 * bsc#1242778 * bsc#1242779 * bsc#1242790 * bsc#1242791 * bsc#1243047 * bsc#1243133 * bsc#1243649 * bsc#1243660 * bsc#1243737 * bsc#1243919 * jsc#SLE-24682 Cross-References: * CVE-2022-3564 * CVE-2022-3619 * CVE-2022-3640 * CVE-2022-49110 * CVE-2022-49139 * CVE-2022-49767 * CVE-2022-49769 * CVE-2022-49770 * CVE-2022-49771 * CVE-2022-49772 * CVE-2022-49775 * CVE-2022-49776 * CVE-2022-49777 * CVE-2022-49779 * CVE-2022-49783 * CVE-2022-49787 * CVE-2022-49788 * CVE-2022-49789 * CVE-2022-49790 * CVE-2022-49792 * CVE-2022-49793 * CVE-2022-49794 * CVE-2022-49796 * CVE-2022-49797 * CVE-2022-49799 * CVE-2022-49800 * CVE-2022-49801 * CVE-2022-49802 * CVE-2022-49807 * CVE-2022-49809 * CVE-2022-49810 * CVE-2022-49812 * CVE-2022-49813 * CVE-2022-49818 * CVE-2022-49821 * CVE-2022-49822 * CVE-2022-49823 * CVE-2022-49824 * CVE-2022-49825 * CVE-2022-49826 * CVE-2022-49827 * CVE-2022-49830 * CVE-2022-49832 * CVE-2022-49834 * CVE-2022-49835 * CVE-2022-49836 * CVE-2022-49839 * CVE-2022-49841 * CVE-2022-49842 * CVE-2022-49845 * CVE-2022-49846 * CVE-2022-49850 * CVE-2022-49853 * CVE-2022-49858 * CVE-2022-49860 * CVE-2022-49861 * CVE-2022-49863 * CVE-2022-49864 * CVE-2022-49865 * CVE-2022-49868 * CVE-2022-49869 * CVE-2022-49870 * CVE-2022-49871 * CVE-2022-49874 * CVE-2022-49879 * CVE-2022-49880 * CVE-2022-49881 * CVE-2022-49885 * CVE-2022-49887 * CVE-2022-49888 * CVE-2022-49889 * CVE-2022-49890 * CVE-2022-49891 * CVE-2022-49892 * CVE-2022-49900 * CVE-2022-49905 * CVE-2022-49906 * CVE-2022-49908 * CVE-2022-49909 * CVE-2022-49910 * CVE-2022-49915 * CVE-2022-49916 * CVE-2022-49922 * CVE-2022-49923 * CVE-2022-49924 * CVE-2022-49925 * CVE-2022-49927 * CVE-2022-49928 * CVE-2022-49931 * CVE-2023-1990 * CVE-2023-53035 * CVE-2023-53038 * CVE-2023-53039 * CVE-2023-53040 * CVE-2023-53041 * CVE-2023-53044 * CVE-2023-53045 * CVE-2023-53049 * CVE-2023-53051 * CVE-2023-53052 * CVE-2023-53054 * CVE-2023-53056 * CVE-2023-53058 * CVE-2023-53059 * CVE-2023-53060 * CVE-2023-53062 * CVE-2023-53064 * CVE-2023-53065 * CVE-2023-53066 * CVE-2023-53068 * CVE-2023-53075 * CVE-2023-53077 * CVE-2023-53078 * CVE-2023-53079 * CVE-2023-53081 * CVE-2023-53084 * CVE-2023-53087 * CVE-2023-53089 * CVE-2023-53090 * CVE-2023-53091 * CVE-2023-53092 * CVE-2023-53093 * CVE-2023-53096 * CVE-2023-53098 * CVE-2023-53099 * CVE-2023-53100 * CVE-2023-53101 * CVE-2023-53106 * CVE-2023-53108 * CVE-2023-53111 * CVE-2023-53114 * CVE-2023-53116 * CVE-2023-53118 * CVE-2023-53119 * CVE-2023-53123 * CVE-2023-53124 * CVE-2023-53125 * CVE-2023-53131 * CVE-2023-53134 * CVE-2023-53137 * CVE-2023-53139 * CVE-2023-53140 * CVE-2023-53142 * CVE-2023-53143 * CVE-2023-53145 * CVE-2024-53168 * CVE-2024-56558 * CVE-2025-21888 * CVE-2025-21999 * CVE-2025-22056 * CVE-2025-22060 * CVE-2025-23138 * CVE-2025-23145 * CVE-2025-37785 * CVE-2025-37789 * CVE-2025-37948 * CVE-2025-37963 CVSS scores: * CVE-2022-3564 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-3564 ( NVD ): 5.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-3619 ( SUSE ): 5.3 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3619 ( NVD ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2022-3640 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2022-3640 ( NVD ): 5.5 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49110 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49139 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49767 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49767 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49769 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49770 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49770 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49771 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49771 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49772 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49772 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49772 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49775 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49775 ( SUSE ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49775 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49776 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49776 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49777 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49779 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49779 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49779 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49783 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49783 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49783 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49787 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49787 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49787 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49788 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49788 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49788 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49789 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49789 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49789 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49790 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49790 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49790 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49792 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2022-49792 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2022-49792 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49793 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49793 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49793 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49794 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49794 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49794 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49796 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49796 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49796 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49797 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49797 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49799 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49800 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49801 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49801 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49802 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49802 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49807 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49807 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49809 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49809 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49810 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49810 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49810 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49812 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49812 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49812 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49813 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49813 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49818 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49818 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2022-49818 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49821 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49821 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49821 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49822 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49822 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49822 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49823 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49823 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49823 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49824 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49824 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49824 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49825 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49825 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49825 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49826 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49826 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49827 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49827 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49830 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49830 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49830 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49832 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49832 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49832 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49834 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-49834 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49834 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49835 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49835 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49836 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49836 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49839 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49839 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49839 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49841 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49841 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49841 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49842 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49842 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49842 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49845 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49845 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49845 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49846 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49846 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49846 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49850 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49850 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49850 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49853 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49858 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49860 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49861 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49863 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49863 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49864 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49864 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49868 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49868 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49869 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49869 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49869 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49869 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49870 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49870 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49871 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49871 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49874 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49874 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49874 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49879 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49879 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49879 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49880 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49880 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49880 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49880 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49881 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49885 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49885 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49887 ( SUSE ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49887 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49887 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49887 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49888 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49889 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49890 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49890 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49891 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49891 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49892 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49892 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49900 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49900 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49905 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49906 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49906 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49908 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49908 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49908 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49909 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49909 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49910 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49910 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49915 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49915 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49916 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49922 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49922 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49923 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49923 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49924 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49924 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49924 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49925 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49927 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49927 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49928 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49928 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49928 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49931 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49931 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1990 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-1990 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-1990 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53035 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53038 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53038 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-53038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53039 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53039 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53039 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53040 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53040 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53041 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53041 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53041 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53044 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53049 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53051 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53052 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53052 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53052 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53054 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53054 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53056 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53058 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53064 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53065 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53066 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53068 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53068 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53075 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53077 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2023-53077 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-53077 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53078 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53078 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53079 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53081 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53084 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53087 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53087 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53089 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53089 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53089 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53090 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-53091 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53091 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53091 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53092 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53096 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53096 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53098 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53099 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53100 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53100 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53101 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2023-53101 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2023-53101 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53106 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53114 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53116 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53118 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53119 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53123 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53124 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53124 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53125 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53131 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53142 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53143 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53145 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53145 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53145 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53168 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53168 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56558 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-56558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56558 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21888 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21999 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-21999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21999 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22056 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22056 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22056 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22056 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-22060 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-22060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-22060 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37785 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37785 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37785 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-37789 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37789 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37948 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-37948 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37963 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-37963 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-37963 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves 157 vulnerabilities, contains one feature and has 26 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-49110: netfilter: conntrack: revisit gc autotuning (bsc#1237981). * CVE-2022-49139: Bluetooth: fix null ptr deref on hci_sync_conn_complete_evt (bsc#1238032). * CVE-2022-49767: 9p/trans_fd: always use O_NONBLOCK read/write (bsc#1242493). * CVE-2022-49775: tcp: cdg: allow tcp_cdg_release() to be called multiple times (bsc#1242245). * CVE-2022-49858: octeontx2-pf: Fix SQE threshold checking (bsc#1242589). * CVE-2023-53058: net/mlx5: E-Switch, Fix an Oops in error handling code (bsc#1242237). * CVE-2023-53060: igb: revert rtnl_lock() that causes deadlock (bsc#1242241). * CVE-2023-53064: iavf: Fix hang on reboot with ice (bsc#1242222). * CVE-2023-53066: qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info (bsc#1242227). * CVE-2023-53079: net/mlx5: Fix steering rules cleanup (bsc#1242765). * CVE-2023-53114: i40e: Fix kernel crash during reboot when adapter is in recovery mode (bsc#1242398). * CVE-2023-53134: bnxt_en: Avoid order-5 memory allocation for TPA data (bsc#1242380) * CVE-2024-53168: net: make sock_inuse_add() available (bsc#1234887). * CVE-2024-56558: nfsd: make sure exp active before svc_export_show (bsc#1235100). * CVE-2025-21888: RDMA/mlx5: Fix a WARN during dereg_mr for DM type (bsc#1240177). * CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1240802). * CVE-2025-22056: netfilter: nft_tunnel: fix geneve_opt type confusion addition (bsc#1241525). * CVE-2025-22060: net: mvpp2: Prevent parser TCAM memory corruption (bsc#1241526). * CVE-2025-23138: watch_queue: fix pipe accounting mismatch (bsc#1241648). * CVE-2025-23145: mptcp: fix NULL pointer in can_accept_new_subflow (bsc#1242596). * CVE-2025-37785: ext4: fix OOB read when checking dotdot dir (bsc#1241640). * CVE-2025-37789: net: openvswitch: fix nested key length validation in the set() action (bsc#1242762). The following non-security bugs were fixed: * Refresh fixes for cBPF issue (bsc#1242778) * Remove debug flavor (bsc#1243919). * Update metadata and put them into the sorted part of the series * arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs (bsc#1242778). * arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users (bsc#1242778). * arm64: insn: Add support for encoding DSB (bsc#1242778). * arm64: proton-pack: Add new CPUs 'k' values for branch mitigation (bsc#1242778). * arm64: proton-pack: Expose whether the branchy loop k value (bsc#1242778). * arm64: proton-pack: Expose whether the platform is mitigated by firmware (bsc#1242778). * hv: Allow vmbus_sendpacket_mpb_desc() to create multiple ranges (bsc#1243737). * hv_netvsc: Preserve contiguous PFN grouping in the page buffer array (bsc#1243737). * hv_netvsc: Remove rmsg_pgcnt (bsc#1243737). * hv_netvsc: Use vmbus_sendpacket_mpb_desc() to send VMBus messages (bsc#1243737). * mtd: phram: Add the kernel lock down check (bsc#1232649). * ocfs2: fix the issue with discontiguous allocation in the global_bitmap (git-fixes). * powerpc/pseries/iommu: IOMMU incorrectly marks MMIO range in DDW (bsc#1218470 ltc#204531). * scsi: core: Fix unremoved procfs host directory regression (git-fixes). * scsi: storvsc: Set correct data length for sending SCSI command without payload (git-fixes). * x86/bhi: Do not set BHI_DIS_S in 32-bit mode (bsc#1242778). * x86/bpf: Add IBHF call at end of classic BPF (bsc#1242778). * x86/bpf: Call branch history clearing sequence on exit (bsc#1242778). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-140=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) * kernel-default-5.14.21-150400.24.167.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_41-debugsource-1-150400.9.3.1 * kernel-default-debuginfo-5.14.21-150400.24.167.1 * kernel-livepatch-5_14_21-150400_24_167-default-1-150400.9.3.1 * kernel-default-livepatch-5.14.21-150400.24.167.1 * kernel-livepatch-5_14_21-150400_24_167-default-debuginfo-1-150400.9.3.1 * kernel-default-debugsource-5.14.21-150400.24.167.1 * kernel-default-livepatch-devel-5.14.21-150400.24.167.1 ## References: * https://www.suse.com/security/cve/CVE-2022-3564.html * https://www.suse.com/security/cve/CVE-2022-3619.html * https://www.suse.com/security/cve/CVE-2022-3640.html * https://www.suse.com/security/cve/CVE-2022-49110.html * https://www.suse.com/security/cve/CVE-2022-49139.html * https://www.suse.com/security/cve/CVE-2022-49767.html * https://www.suse.com/security/cve/CVE-2022-49769.html * https://www.suse.com/security/cve/CVE-2022-49770.html * https://www.suse.com/security/cve/CVE-2022-49771.html * https://www.suse.com/security/cve/CVE-2022-49772.html * https://www.suse.com/security/cve/CVE-2022-49775.html * https://www.suse.com/security/cve/CVE-2022-49776.html * https://www.suse.com/security/cve/CVE-2022-49777.html * https://www.suse.com/security/cve/CVE-2022-49779.html * https://www.suse.com/security/cve/CVE-2022-49783.html * https://www.suse.com/security/cve/CVE-2022-49787.html * https://www.suse.com/security/cve/CVE-2022-49788.html * https://www.suse.com/security/cve/CVE-2022-49789.html * https://www.suse.com/security/cve/CVE-2022-49790.html * https://www.suse.com/security/cve/CVE-2022-49792.html * https://www.suse.com/security/cve/CVE-2022-49793.html * https://www.suse.com/security/cve/CVE-2022-49794.html * https://www.suse.com/security/cve/CVE-2022-49796.html * https://www.suse.com/security/cve/CVE-2022-49797.html * https://www.suse.com/security/cve/CVE-2022-49799.html * https://www.suse.com/security/cve/CVE-2022-49800.html * https://www.suse.com/security/cve/CVE-2022-49801.html * https://www.suse.com/security/cve/CVE-2022-49802.html * https://www.suse.com/security/cve/CVE-2022-49807.html * https://www.suse.com/security/cve/CVE-2022-49809.html * https://www.suse.com/security/cve/CVE-2022-49810.html * https://www.suse.com/security/cve/CVE-2022-49812.html * https://www.suse.com/security/cve/CVE-2022-49813.html * https://www.suse.com/security/cve/CVE-2022-49818.html * https://www.suse.com/security/cve/CVE-2022-49821.html * https://www.suse.com/security/cve/CVE-2022-49822.html * https://www.suse.com/security/cve/CVE-2022-49823.html * https://www.suse.com/security/cve/CVE-2022-49824.html * https://www.suse.com/security/cve/CVE-2022-49825.html * https://www.suse.com/security/cve/CVE-2022-49826.html * https://www.suse.com/security/cve/CVE-2022-49827.html * https://www.suse.com/security/cve/CVE-2022-49830.html * https://www.suse.com/security/cve/CVE-2022-49832.html * https://www.suse.com/security/cve/CVE-2022-49834.html * https://www.suse.com/security/cve/CVE-2022-49835.html * https://www.suse.com/security/cve/CVE-2022-49836.html * https://www.suse.com/security/cve/CVE-2022-49839.html * https://www.suse.com/security/cve/CVE-2022-49841.html * https://www.suse.com/security/cve/CVE-2022-49842.html * https://www.suse.com/security/cve/CVE-2022-49845.html * https://www.suse.com/security/cve/CVE-2022-49846.html * https://www.suse.com/security/cve/CVE-2022-49850.html * https://www.suse.com/security/cve/CVE-2022-49853.html * https://www.suse.com/security/cve/CVE-2022-49858.html * https://www.suse.com/security/cve/CVE-2022-49860.html * https://www.suse.com/security/cve/CVE-2022-49861.html * https://www.suse.com/security/cve/CVE-2022-49863.html * https://www.suse.com/security/cve/CVE-2022-49864.html * https://www.suse.com/security/cve/CVE-2022-49865.html * https://www.suse.com/security/cve/CVE-2022-49868.html * https://www.suse.com/security/cve/CVE-2022-49869.html * https://www.suse.com/security/cve/CVE-2022-49870.html * https://www.suse.com/security/cve/CVE-2022-49871.html * https://www.suse.com/security/cve/CVE-2022-49874.html * https://www.suse.com/security/cve/CVE-2022-49879.html * https://www.suse.com/security/cve/CVE-2022-49880.html * https://www.suse.com/security/cve/CVE-2022-49881.html * https://www.suse.com/security/cve/CVE-2022-49885.html * https://www.suse.com/security/cve/CVE-2022-49887.html * https://www.suse.com/security/cve/CVE-2022-49888.html * https://www.suse.com/security/cve/CVE-2022-49889.html * https://www.suse.com/security/cve/CVE-2022-49890.html * https://www.suse.com/security/cve/CVE-2022-49891.html * https://www.suse.com/security/cve/CVE-2022-49892.html * https://www.suse.com/security/cve/CVE-2022-49900.html * https://www.suse.com/security/cve/CVE-2022-49905.html * https://www.suse.com/security/cve/CVE-2022-49906.html * https://www.suse.com/security/cve/CVE-2022-49908.html * https://www.suse.com/security/cve/CVE-2022-49909.html * https://www.suse.com/security/cve/CVE-2022-49910.html * https://www.suse.com/security/cve/CVE-2022-49915.html * https://www.suse.com/security/cve/CVE-2022-49916.html * https://www.suse.com/security/cve/CVE-2022-49922.html * https://www.suse.com/security/cve/CVE-2022-49923.html * https://www.suse.com/security/cve/CVE-2022-49924.html * https://www.suse.com/security/cve/CVE-2022-49925.html * https://www.suse.com/security/cve/CVE-2022-49927.html * https://www.suse.com/security/cve/CVE-2022-49928.html * https://www.suse.com/security/cve/CVE-2022-49931.html * https://www.suse.com/security/cve/CVE-2023-1990.html * https://www.suse.com/security/cve/CVE-2023-53035.html * https://www.suse.com/security/cve/CVE-2023-53038.html * https://www.suse.com/security/cve/CVE-2023-53039.html * https://www.suse.com/security/cve/CVE-2023-53040.html * https://www.suse.com/security/cve/CVE-2023-53041.html * https://www.suse.com/security/cve/CVE-2023-53044.html * https://www.suse.com/security/cve/CVE-2023-53045.html * https://www.suse.com/security/cve/CVE-2023-53049.html * https://www.suse.com/security/cve/CVE-2023-53051.html * https://www.suse.com/security/cve/CVE-2023-53052.html * https://www.suse.com/security/cve/CVE-2023-53054.html * https://www.suse.com/security/cve/CVE-2023-53056.html * https://www.suse.com/security/cve/CVE-2023-53058.html * https://www.suse.com/security/cve/CVE-2023-53059.html * https://www.suse.com/security/cve/CVE-2023-53060.html * https://www.suse.com/security/cve/CVE-2023-53062.html * https://www.suse.com/security/cve/CVE-2023-53064.html * https://www.suse.com/security/cve/CVE-2023-53065.html * https://www.suse.com/security/cve/CVE-2023-53066.html * https://www.suse.com/security/cve/CVE-2023-53068.html * https://www.suse.com/security/cve/CVE-2023-53075.html * https://www.suse.com/security/cve/CVE-2023-53077.html * https://www.suse.com/security/cve/CVE-2023-53078.html * https://www.suse.com/security/cve/CVE-2023-53079.html * https://www.suse.com/security/cve/CVE-2023-53081.html * https://www.suse.com/security/cve/CVE-2023-53084.html * https://www.suse.com/security/cve/CVE-2023-53087.html * https://www.suse.com/security/cve/CVE-2023-53089.html * https://www.suse.com/security/cve/CVE-2023-53090.html * https://www.suse.com/security/cve/CVE-2023-53091.html * https://www.suse.com/security/cve/CVE-2023-53092.html * https://www.suse.com/security/cve/CVE-2023-53093.html * https://www.suse.com/security/cve/CVE-2023-53096.html * https://www.suse.com/security/cve/CVE-2023-53098.html * https://www.suse.com/security/cve/CVE-2023-53099.html * https://www.suse.com/security/cve/CVE-2023-53100.html * https://www.suse.com/security/cve/CVE-2023-53101.html * https://www.suse.com/security/cve/CVE-2023-53106.html * https://www.suse.com/security/cve/CVE-2023-53108.html * https://www.suse.com/security/cve/CVE-2023-53111.html * https://www.suse.com/security/cve/CVE-2023-53114.html * https://www.suse.com/security/cve/CVE-2023-53116.html * https://www.suse.com/security/cve/CVE-2023-53118.html * https://www.suse.com/security/cve/CVE-2023-53119.html * https://www.suse.com/security/cve/CVE-2023-53123.html * https://www.suse.com/security/cve/CVE-2023-53124.html * https://www.suse.com/security/cve/CVE-2023-53125.html * https://www.suse.com/security/cve/CVE-2023-53131.html * https://www.suse.com/security/cve/CVE-2023-53134.html * https://www.suse.com/security/cve/CVE-2023-53137.html * https://www.suse.com/security/cve/CVE-2023-53139.html * https://www.suse.com/security/cve/CVE-2023-53140.html * https://www.suse.com/security/cve/CVE-2023-53142.html * https://www.suse.com/security/cve/CVE-2023-53143.html * https://www.suse.com/security/cve/CVE-2023-53145.html * https://www.suse.com/security/cve/CVE-2024-53168.html * https://www.suse.com/security/cve/CVE-2024-56558.html * https://www.suse.com/security/cve/CVE-2025-21888.html * https://www.suse.com/security/cve/CVE-2025-21999.html * https://www.suse.com/security/cve/CVE-2025-22056.html * https://www.suse.com/security/cve/CVE-2025-22060.html * https://www.suse.com/security/cve/CVE-2025-23138.html * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-37785.html * https://www.suse.com/security/cve/CVE-2025-37789.html * https://www.suse.com/security/cve/CVE-2025-37948.html * https://www.suse.com/security/cve/CVE-2025-37963.html * https://bugzilla.suse.com/show_bug.cgi?id=1184350 * https://bugzilla.suse.com/show_bug.cgi?id=1193629 * https://bugzilla.suse.com/show_bug.cgi?id=1204569 * https://bugzilla.suse.com/show_bug.cgi?id=1204619 * https://bugzilla.suse.com/show_bug.cgi?id=1204705 * https://bugzilla.suse.com/show_bug.cgi?id=1205282 * https://bugzilla.suse.com/show_bug.cgi?id=1206051 * https://bugzilla.suse.com/show_bug.cgi?id=1206073 * https://bugzilla.suse.com/show_bug.cgi?id=1206649 * https://bugzilla.suse.com/show_bug.cgi?id=1206886 * https://bugzilla.suse.com/show_bug.cgi?id=1206887 * https://bugzilla.suse.com/show_bug.cgi?id=1208542 * https://bugzilla.suse.com/show_bug.cgi?id=1209292 * https://bugzilla.suse.com/show_bug.cgi?id=1209556 * https://bugzilla.suse.com/show_bug.cgi?id=1209684 * https://bugzilla.suse.com/show_bug.cgi?id=1210337 * https://bugzilla.suse.com/show_bug.cgi?id=1210763 * https://bugzilla.suse.com/show_bug.cgi?id=1210767 * https://bugzilla.suse.com/show_bug.cgi?id=1211465 * https://bugzilla.suse.com/show_bug.cgi?id=1213012 * https://bugzilla.suse.com/show_bug.cgi?id=1213013 * https://bugzilla.suse.com/show_bug.cgi?id=1213094 * https://bugzilla.suse.com/show_bug.cgi?id=1213096 * https://bugzilla.suse.com/show_bug.cgi?id=1213946 * https://bugzilla.suse.com/show_bug.cgi?id=1214991 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1232649 * https://bugzilla.suse.com/show_bug.cgi?id=1234887 * https://bugzilla.suse.com/show_bug.cgi?id=1235100 * https://bugzilla.suse.com/show_bug.cgi?id=1237981 * https://bugzilla.suse.com/show_bug.cgi?id=1238032 * https://bugzilla.suse.com/show_bug.cgi?id=1240177 * https://bugzilla.suse.com/show_bug.cgi?id=1240802 * https://bugzilla.suse.com/show_bug.cgi?id=1241525 * https://bugzilla.suse.com/show_bug.cgi?id=1241526 * https://bugzilla.suse.com/show_bug.cgi?id=1241640 * https://bugzilla.suse.com/show_bug.cgi?id=1241648 * https://bugzilla.suse.com/show_bug.cgi?id=1242147 * https://bugzilla.suse.com/show_bug.cgi?id=1242150 * https://bugzilla.suse.com/show_bug.cgi?id=1242151 * https://bugzilla.suse.com/show_bug.cgi?id=1242154 * https://bugzilla.suse.com/show_bug.cgi?id=1242157 * https://bugzilla.suse.com/show_bug.cgi?id=1242158 * https://bugzilla.suse.com/show_bug.cgi?id=1242164 * https://bugzilla.suse.com/show_bug.cgi?id=1242165 * https://bugzilla.suse.com/show_bug.cgi?id=1242169 * https://bugzilla.suse.com/show_bug.cgi?id=1242215 * https://bugzilla.suse.com/show_bug.cgi?id=1242218 * https://bugzilla.suse.com/show_bug.cgi?id=1242219 * https://bugzilla.suse.com/show_bug.cgi?id=1242222 * https://bugzilla.suse.com/show_bug.cgi?id=1242226 * https://bugzilla.suse.com/show_bug.cgi?id=1242227 * https://bugzilla.suse.com/show_bug.cgi?id=1242228 * https://bugzilla.suse.com/show_bug.cgi?id=1242229 * https://bugzilla.suse.com/show_bug.cgi?id=1242230 * https://bugzilla.suse.com/show_bug.cgi?id=1242231 * https://bugzilla.suse.com/show_bug.cgi?id=1242232 * https://bugzilla.suse.com/show_bug.cgi?id=1242237 * https://bugzilla.suse.com/show_bug.cgi?id=1242239 * https://bugzilla.suse.com/show_bug.cgi?id=1242241 * https://bugzilla.suse.com/show_bug.cgi?id=1242244 * https://bugzilla.suse.com/show_bug.cgi?id=1242245 * https://bugzilla.suse.com/show_bug.cgi?id=1242248 * https://bugzilla.suse.com/show_bug.cgi?id=1242261 * https://bugzilla.suse.com/show_bug.cgi?id=1242264 * https://bugzilla.suse.com/show_bug.cgi?id=1242265 * https://bugzilla.suse.com/show_bug.cgi?id=1242270 * https://bugzilla.suse.com/show_bug.cgi?id=1242276 * https://bugzilla.suse.com/show_bug.cgi?id=1242279 * https://bugzilla.suse.com/show_bug.cgi?id=1242280 * https://bugzilla.suse.com/show_bug.cgi?id=1242281 * https://bugzilla.suse.com/show_bug.cgi?id=1242282 * https://bugzilla.suse.com/show_bug.cgi?id=1242284 * https://bugzilla.suse.com/show_bug.cgi?id=1242285 * https://bugzilla.suse.com/show_bug.cgi?id=1242289 * https://bugzilla.suse.com/show_bug.cgi?id=1242294 * https://bugzilla.suse.com/show_bug.cgi?id=1242305 * https://bugzilla.suse.com/show_bug.cgi?id=1242312 * https://bugzilla.suse.com/show_bug.cgi?id=1242320 * https://bugzilla.suse.com/show_bug.cgi?id=1242338 * https://bugzilla.suse.com/show_bug.cgi?id=1242352 * https://bugzilla.suse.com/show_bug.cgi?id=1242353 * https://bugzilla.suse.com/show_bug.cgi?id=1242355 * https://bugzilla.suse.com/show_bug.cgi?id=1242357 * https://bugzilla.suse.com/show_bug.cgi?id=1242358 * https://bugzilla.suse.com/show_bug.cgi?id=1242361 * https://bugzilla.suse.com/show_bug.cgi?id=1242365 * https://bugzilla.suse.com/show_bug.cgi?id=1242366 * https://bugzilla.suse.com/show_bug.cgi?id=1242369 * https://bugzilla.suse.com/show_bug.cgi?id=1242370 * https://bugzilla.suse.com/show_bug.cgi?id=1242371 * https://bugzilla.suse.com/show_bug.cgi?id=1242372 * https://bugzilla.suse.com/show_bug.cgi?id=1242377 * https://bugzilla.suse.com/show_bug.cgi?id=1242378 * https://bugzilla.suse.com/show_bug.cgi?id=1242380 * https://bugzilla.suse.com/show_bug.cgi?id=1242382 * https://bugzilla.suse.com/show_bug.cgi?id=1242385 * https://bugzilla.suse.com/show_bug.cgi?id=1242387 * https://bugzilla.suse.com/show_bug.cgi?id=1242389 * https://bugzilla.suse.com/show_bug.cgi?id=1242391 * https://bugzilla.suse.com/show_bug.cgi?id=1242392 * https://bugzilla.suse.com/show_bug.cgi?id=1242394 * https://bugzilla.suse.com/show_bug.cgi?id=1242398 * https://bugzilla.suse.com/show_bug.cgi?id=1242399 * https://bugzilla.suse.com/show_bug.cgi?id=1242402 * https://bugzilla.suse.com/show_bug.cgi?id=1242403 * https://bugzilla.suse.com/show_bug.cgi?id=1242409 * https://bugzilla.suse.com/show_bug.cgi?id=1242411 * https://bugzilla.suse.com/show_bug.cgi?id=1242415 * https://bugzilla.suse.com/show_bug.cgi?id=1242416 * https://bugzilla.suse.com/show_bug.cgi?id=1242421 * https://bugzilla.suse.com/show_bug.cgi?id=1242422 * https://bugzilla.suse.com/show_bug.cgi?id=1242426 * https://bugzilla.suse.com/show_bug.cgi?id=1242428 * https://bugzilla.suse.com/show_bug.cgi?id=1242440 * https://bugzilla.suse.com/show_bug.cgi?id=1242443 * https://bugzilla.suse.com/show_bug.cgi?id=1242449 * https://bugzilla.suse.com/show_bug.cgi?id=1242452 * https://bugzilla.suse.com/show_bug.cgi?id=1242453 * https://bugzilla.suse.com/show_bug.cgi?id=1242454 * https://bugzilla.suse.com/show_bug.cgi?id=1242455 * https://bugzilla.suse.com/show_bug.cgi?id=1242456 * https://bugzilla.suse.com/show_bug.cgi?id=1242458 * https://bugzilla.suse.com/show_bug.cgi?id=1242464 * https://bugzilla.suse.com/show_bug.cgi?id=1242467 * https://bugzilla.suse.com/show_bug.cgi?id=1242469 * https://bugzilla.suse.com/show_bug.cgi?id=1242473 * https://bugzilla.suse.com/show_bug.cgi?id=1242478 * https://bugzilla.suse.com/show_bug.cgi?id=1242481 * https://bugzilla.suse.com/show_bug.cgi?id=1242484 * https://bugzilla.suse.com/show_bug.cgi?id=1242489 * https://bugzilla.suse.com/show_bug.cgi?id=1242493 * https://bugzilla.suse.com/show_bug.cgi?id=1242497 * https://bugzilla.suse.com/show_bug.cgi?id=1242527 * https://bugzilla.suse.com/show_bug.cgi?id=1242542 * https://bugzilla.suse.com/show_bug.cgi?id=1242544 * https://bugzilla.suse.com/show_bug.cgi?id=1242545 * https://bugzilla.suse.com/show_bug.cgi?id=1242547 * https://bugzilla.suse.com/show_bug.cgi?id=1242548 * https://bugzilla.suse.com/show_bug.cgi?id=1242549 * https://bugzilla.suse.com/show_bug.cgi?id=1242550 * https://bugzilla.suse.com/show_bug.cgi?id=1242551 * https://bugzilla.suse.com/show_bug.cgi?id=1242558 * https://bugzilla.suse.com/show_bug.cgi?id=1242570 * https://bugzilla.suse.com/show_bug.cgi?id=1242580 * https://bugzilla.suse.com/show_bug.cgi?id=1242586 * https://bugzilla.suse.com/show_bug.cgi?id=1242589 * https://bugzilla.suse.com/show_bug.cgi?id=1242596 * https://bugzilla.suse.com/show_bug.cgi?id=1242597 * https://bugzilla.suse.com/show_bug.cgi?id=1242685 * https://bugzilla.suse.com/show_bug.cgi?id=1242686 * https://bugzilla.suse.com/show_bug.cgi?id=1242688 * https://bugzilla.suse.com/show_bug.cgi?id=1242689 * https://bugzilla.suse.com/show_bug.cgi?id=1242695 * https://bugzilla.suse.com/show_bug.cgi?id=1242716 * https://bugzilla.suse.com/show_bug.cgi?id=1242733 * https://bugzilla.suse.com/show_bug.cgi?id=1242734 * https://bugzilla.suse.com/show_bug.cgi?id=1242735 * https://bugzilla.suse.com/show_bug.cgi?id=1242736 * https://bugzilla.suse.com/show_bug.cgi?id=1242739 * https://bugzilla.suse.com/show_bug.cgi?id=1242743 * https://bugzilla.suse.com/show_bug.cgi?id=1242744 * https://bugzilla.suse.com/show_bug.cgi?id=1242745 * https://bugzilla.suse.com/show_bug.cgi?id=1242746 * https://bugzilla.suse.com/show_bug.cgi?id=1242747 * https://bugzilla.suse.com/show_bug.cgi?id=1242749 * https://bugzilla.suse.com/show_bug.cgi?id=1242752 * https://bugzilla.suse.com/show_bug.cgi?id=1242753 * https://bugzilla.suse.com/show_bug.cgi?id=1242756 * https://bugzilla.suse.com/show_bug.cgi?id=1242759 * https://bugzilla.suse.com/show_bug.cgi?id=1242762 * https://bugzilla.suse.com/show_bug.cgi?id=1242765 * https://bugzilla.suse.com/show_bug.cgi?id=1242767 * https://bugzilla.suse.com/show_bug.cgi?id=1242778 * https://bugzilla.suse.com/show_bug.cgi?id=1242779 * https://bugzilla.suse.com/show_bug.cgi?id=1242790 * https://bugzilla.suse.com/show_bug.cgi?id=1242791 * https://bugzilla.suse.com/show_bug.cgi?id=1243047 * https://bugzilla.suse.com/show_bug.cgi?id=1243133 * https://bugzilla.suse.com/show_bug.cgi?id=1243649 * https://bugzilla.suse.com/show_bug.cgi?id=1243660 * https://bugzilla.suse.com/show_bug.cgi?id=1243737 * https://bugzilla.suse.com/show_bug.cgi?id=1243919 * https://jira.suse.com/browse/SLE-24682 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 16 20:32:18 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 16 Jan 2026 20:32:18 -0000 Subject: SUSE-RU-2026:0136-1: moderate: Recommended update for SUSE Multi-Linux Manager 5.2.0 Alpha 1 Message-ID: <176859553849.13274.4555157390015756906@smelt2.prg2.suse.org> # Recommended update for SUSE Multi-Linux Manager 5.2.0 Alpha 1 Announcement ID: SUSE-RU-2026:0136-1 Release Date: 2026-01-16T12:17:56Z Rating: moderate References: * jsc#MSQA-1035 Affected Products: * SUSE Multi-Linux Manager Beta Client Tools for Ubuntu 24.04 2404 An update that contains one feature can now be installed. ## Description: This update for SUSE Multi-Linux Manager 5.2.0 Alpha 1 fixes the following issues: * Update Ubuntu 24.04 Client Tools and Salt Bundle ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Multi-Linux Manager Beta Client Tools for Ubuntu 24.04 2404 zypper in -t patch SUSE-MultiLinuxManagerTools-Beta-Ubuntu-24.04-2026-136=1 ## Package List: * SUSE Multi-Linux Manager Beta Client Tools for Ubuntu 24.04 2404 (all) * mgrctl-fish-completion-5.2.3-2.3.2 * spacecmd-5.2.4-2.3.2 * mgrctl-zsh-completion-5.2.3-2.3.2 * mgrctl-bash-completion-5.2.3-2.3.2 * SUSE Multi-Linux Manager Beta Client Tools for Ubuntu 24.04 2404 (amd64) * mgrctl-5.2.3-2.3.2 * venv-salt-minion-3006.0-2.3.2 ## References: * https://jira.suse.com/browse/MSQA-1035 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 16 20:32:19 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 16 Jan 2026 20:32:19 -0000 Subject: SUSE-RU-2026:0135-1: moderate: Recommended update for SUSE Multi-Linux Manager 5.2.0 Alpha 1 Message-ID: <176859553983.13274.6031299314931843939@smelt2.prg2.suse.org> # Recommended update for SUSE Multi-Linux Manager 5.2.0 Alpha 1 Announcement ID: SUSE-RU-2026:0135-1 Release Date: 2026-01-16T12:15:22Z Rating: moderate References: * jsc#MSQA-1035 Affected Products: * SUSE Multi-Linux Manager Beta Client Tools for Ubuntu 22.04 2204 An update that contains one feature can now be installed. ## Description: This update for SUSE Multi-Linux Manager 5.2.0 Alpha 1 fixes the following issues: * Update Ubuntu 22.04 Client Tools and Salt Bundle ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Multi-Linux Manager Beta Client Tools for Ubuntu 22.04 2204 zypper in -t patch SUSE-MultiLinuxManagerTools-Beta-Ubuntu-22.04-2026-135=1 ## Package List: * SUSE Multi-Linux Manager Beta Client Tools for Ubuntu 22.04 2204 (all) * mgrctl-bash-completion-5.2.3-2.3.3 * spacecmd-5.2.4-2.3.2 * mgrctl-fish-completion-5.2.3-2.3.3 * mgrctl-zsh-completion-5.2.3-2.3.3 * SUSE Multi-Linux Manager Beta Client Tools for Ubuntu 22.04 2204 (amd64) * mgrctl-5.2.3-2.3.3 * venv-salt-minion-3006.0-2.3.2 ## References: * https://jira.suse.com/browse/MSQA-1035 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 16 20:32:21 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 16 Jan 2026 20:32:21 -0000 Subject: SUSE-RU-2026:0134-1: moderate: Recommended update for SUSE Multi-Linux Manager 5.2.0 Alpha 1 Message-ID: <176859554128.13274.5935568539210675473@smelt2.prg2.suse.org> # Recommended update for SUSE Multi-Linux Manager 5.2.0 Alpha 1 Announcement ID: SUSE-RU-2026:0134-1 Release Date: 2026-01-16T12:12:51Z Rating: moderate References: * jsc#MSQA-1035 Affected Products: * SUSE Multi-Linux Manager Beta Client Tools for Debian 12 An update that contains one feature can now be installed. ## Description: This update for SUSE Multi-Linux Manager 5.2.0 Alpha 1 fixes the following issues: * Update Debian 12 Client Tools and Salt Bundle ## Special Instructions and Notes: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Multi-Linux Manager Beta Client Tools for Debian 12 zypper in -t patch SUSE-MultiLinuxManagerTools-Beta-Debian-12-2026-134=1 ## Package List: * SUSE Multi-Linux Manager Beta Client Tools for Debian 12 (all) * mgrctl-zsh-completion-5.2.3-2.3.1 * mgrctl-fish-completion-5.2.3-2.3.1 * spacecmd-5.2.4-2.3.1 * mgrctl-bash-completion-5.2.3-2.3.1 * SUSE Multi-Linux Manager Beta Client Tools for Debian 12 (amd64 arm64) * mgrctl-5.2.3-2.3.1 * venv-salt-minion-3006.0-2.3.1 ## References: * https://jira.suse.com/browse/MSQA-1035 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 19 08:30:10 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Jan 2026 08:30:10 -0000 Subject: SUSE-SU-2026:0148-1: important: Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 15 SP7) Message-ID: <176881141093.28915.5996133703330884937@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 0 for SUSE Linux Enterprise 15 SP7) Announcement ID: SUSE-SU-2026:0148-1 Release Date: 2026-01-17T12:04:20Z Rating: important References: * bsc#1248400 * bsc#1248670 * bsc#1249241 * bsc#1250192 * bsc#1251203 * bsc#1251787 * bsc#1253437 Cross-References: * CVE-2023-53676 * CVE-2025-38476 * CVE-2025-38572 * CVE-2025-38588 * CVE-2025-38608 * CVE-2025-39682 * CVE-2025-40204 CVSS scores: * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38588 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38588 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves seven vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6.4.0-150700.5 fixes various security issues The following security issues were fixed: * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size() (bsc#1249241). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670). * CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1250192). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2026-148=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (x86_64) * kernel-livepatch-6_4_0-150700_5-rt-9-150700.3.1 * kernel-livepatch-6_4_0-150700_5-rt-debuginfo-9-150700.3.1 * kernel-livepatch-SLE15-SP7-RT_Update_0-debugsource-9-150700.3.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38588.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1248670 * https://bugzilla.suse.com/show_bug.cgi?id=1249241 * https://bugzilla.suse.com/show_bug.cgi?id=1250192 * https://bugzilla.suse.com/show_bug.cgi?id=1251203 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 19 08:30:14 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Jan 2026 08:30:14 -0000 Subject: SUSE-SU-2026:0147-1: important: Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise 15 SP7) Message-ID: <176881141428.28915.15572096296427505010@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 6 for SUSE Linux Enterprise 15 SP7) Announcement ID: SUSE-SU-2026:0147-1 Release Date: 2026-01-17T11:33:38Z Rating: important References: * bsc#1251787 * bsc#1253437 Cross-References: * CVE-2023-53676 * CVE-2025-40204 CVSS scores: * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6_4_0-150700.7.22 fixes various security issues The following security issues were fixed: * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2026-147=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (x86_64) * kernel-livepatch-SLE15-SP7-RT_Update_6-debugsource-2-150700.2.1 * kernel-livepatch-6_4_0-150700_7_22-rt-2-150700.2.1 * kernel-livepatch-6_4_0-150700_7_22-rt-debuginfo-2-150700.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 19 08:30:18 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Jan 2026 08:30:18 -0000 Subject: SUSE-SU-2026:0146-1: important: Security update for the Linux Kernel RT (Live Patch 3 for SUSE Linux Enterprise 15 SP7) Message-ID: <176881141873.28915.5818457331732555369@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 3 for SUSE Linux Enterprise 15 SP7) Announcement ID: SUSE-SU-2026:0146-1 Release Date: 2026-01-17T11:33:35Z Rating: important References: * bsc#1248670 * bsc#1250192 * bsc#1251787 * bsc#1253437 Cross-References: * CVE-2023-53676 * CVE-2025-38608 * CVE-2025-39682 * CVE-2025-40204 CVSS scores: * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves four vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6.4.0-150700.7.13 fixes various security issues The following security issues were fixed: * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670). * CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1250192). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2026-146=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (x86_64) * kernel-livepatch-SLE15-SP7-RT_Update_3-debugsource-5-150700.2.1 * kernel-livepatch-6_4_0-150700_7_13-rt-5-150700.2.1 * kernel-livepatch-6_4_0-150700_7_13-rt-debuginfo-5-150700.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1248670 * https://bugzilla.suse.com/show_bug.cgi?id=1250192 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 19 08:30:22 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Jan 2026 08:30:22 -0000 Subject: SUSE-SU-2026:0145-1: important: Security update for the Linux Kernel RT (Live Patch 4 for SUSE Linux Enterprise 15 SP7) Message-ID: <176881142266.28915.17060808023769889840@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 4 for SUSE Linux Enterprise 15 SP7) Announcement ID: SUSE-SU-2026:0145-1 Release Date: 2026-01-17T11:04:25Z Rating: important References: * bsc#1250192 * bsc#1251787 * bsc#1253437 Cross-References: * CVE-2023-53676 * CVE-2025-39682 * CVE-2025-40204 CVSS scores: * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6.4.0-150700.7.16 fixes various security issues The following security issues were fixed: * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1250192). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2026-145=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (x86_64) * kernel-livepatch-6_4_0-150700_7_16-rt-5-150700.2.1 * kernel-livepatch-6_4_0-150700_7_16-rt-debuginfo-5-150700.2.1 * kernel-livepatch-SLE15-SP7-RT_Update_4-debugsource-5-150700.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1250192 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 19 08:30:29 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Jan 2026 08:30:29 -0000 Subject: SUSE-SU-2026:0144-1: important: Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 15 SP7) Message-ID: <176881142991.28915.1417982466360179918@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 2 for SUSE Linux Enterprise 15 SP7) Announcement ID: SUSE-SU-2026:0144-1 Release Date: 2026-01-17T11:04:22Z Rating: important References: * bsc#1248400 * bsc#1248670 * bsc#1249241 * bsc#1250192 * bsc#1251203 * bsc#1251787 * bsc#1253437 Cross-References: * CVE-2023-53676 * CVE-2025-38476 * CVE-2025-38572 * CVE-2025-38588 * CVE-2025-38608 * CVE-2025-39682 * CVE-2025-40204 CVSS scores: * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38588 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38588 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves seven vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6.4.0-150700.7.8 fixes various security issues The following security issues were fixed: * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size() (bsc#1249241). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670). * CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1250192). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2026-144=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (x86_64) * kernel-livepatch-6_4_0-150700_7_8-rt-debuginfo-9-150700.2.1 * kernel-livepatch-6_4_0-150700_7_8-rt-9-150700.2.1 * kernel-livepatch-SLE15-SP7-RT_Update_2-debugsource-9-150700.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38588.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1248670 * https://bugzilla.suse.com/show_bug.cgi?id=1249241 * https://bugzilla.suse.com/show_bug.cgi?id=1250192 * https://bugzilla.suse.com/show_bug.cgi?id=1251203 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 19 08:30:33 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Jan 2026 08:30:33 -0000 Subject: SUSE-SU-2026:0143-1: moderate: Security update for avahi Message-ID: <176881143388.28915.10338430082928794812@smelt2.prg2.suse.org> # Security update for avahi Announcement ID: SUSE-SU-2026:0143-1 Release Date: 2026-01-17T11:04:18Z Rating: moderate References: * bsc#1256498 * bsc#1256499 * bsc#1256500 Cross-References: * CVE-2025-68276 * CVE-2025-68468 * CVE-2025-68471 CVSS scores: * CVE-2025-68276 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68276 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68468 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68468 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-68468 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-68471 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68471 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-68471 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves three vulnerabilities can now be installed. ## Description: This update for avahi fixes the following issues: * CVE-2025-68276: avahi: reachable assertion in `avahi_wide_area_scan_cache` can lead to crash of avahi-daemon (bsc#1256498). * CVE-2025-68468: avahi: reachable assertion in `lookup_multicast_callback` can lead to crash of avahi-daemon (bsc#1256499). * CVE-2025-68471: avahi: reachable assertion in `lookup_start` can lead to crash of avahi-daemon (bsc#1256500). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-143=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-143=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libavahi-core7-debuginfo-0.7-150100.3.46.1 * libavahi-core7-0.7-150100.3.46.1 * libavahi-common3-debuginfo-0.7-150100.3.46.1 * avahi-debuginfo-0.7-150100.3.46.1 * libavahi-client3-0.7-150100.3.46.1 * avahi-0.7-150100.3.46.1 * libavahi-client3-debuginfo-0.7-150100.3.46.1 * avahi-debugsource-0.7-150100.3.46.1 * libavahi-common3-0.7-150100.3.46.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libavahi-core7-debuginfo-0.7-150100.3.46.1 * libavahi-core7-0.7-150100.3.46.1 * libavahi-common3-debuginfo-0.7-150100.3.46.1 * avahi-debuginfo-0.7-150100.3.46.1 * libavahi-client3-0.7-150100.3.46.1 * avahi-0.7-150100.3.46.1 * libavahi-client3-debuginfo-0.7-150100.3.46.1 * avahi-debugsource-0.7-150100.3.46.1 * libavahi-common3-0.7-150100.3.46.1 ## References: * https://www.suse.com/security/cve/CVE-2025-68276.html * https://www.suse.com/security/cve/CVE-2025-68468.html * https://www.suse.com/security/cve/CVE-2025-68471.html * https://bugzilla.suse.com/show_bug.cgi?id=1256498 * https://bugzilla.suse.com/show_bug.cgi?id=1256499 * https://bugzilla.suse.com/show_bug.cgi?id=1256500 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 19 08:30:39 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Jan 2026 08:30:39 -0000 Subject: SUSE-SU-2026:0142-1: moderate: Security update for govulncheck-vulndb Message-ID: <176881143947.28915.15258420277036583463@smelt2.prg2.suse.org> # Security update for govulncheck-vulndb Announcement ID: SUSE-SU-2026:0142-1 Release Date: 2026-01-17T07:33:52Z Rating: moderate References: * jsc#PED-11136 Affected Products: * openSUSE Leap 15.6 An update that contains one feature can now be installed. ## Description: This update for govulncheck-vulndb fixes the following issues: * Update to version 0.0.20260114T191543 2026-01-14T19:15:43Z (jsc#PED-11136). Go CVE Numbering Authority IDs added or updated with aliases: * GO-2025-4248 CVE-2025-62690 GHSA-q66g-q98c-q454 * GO-2025-4251 CVE-2025-63389 GHSA-f6mr-38g8-39rg * GO-2026-4273 CVE-2025-14987 GHSA-hmhp-gh8m-c8xp * Update to version 0.0.20260113T164240 2026-01-13T16:42:40Z (jsc#PED-11136). Go CVE Numbering Authority IDs added or updated with aliases: * GO-2025-4269 CVE-2025-15107 GHSA-43h9-hc38-qph5 * GO-2025-4272 CVE-2025-14986 GHSA-p2gr-hm8g-q772 * GO-2026-4274 CVE-2025-69413 GHSA-pc73-rj2c-wvf9 * GO-2026-4275 CVE-2025-14273 GHSA-qvmc-92vg-6r35 * GO-2026-4277 CVE-2026-21483 GHSA-jmr4-p576-v565 * GO-2026-4278 CVE-2024-6717 GHSA-5mqx-rpxv-mvxj * GO-2026-4279 GHSA-4c5f-9mj4-m247 * GO-2026-4280 GHSA-hjr9-wj7v-7hv8 * GO-2026-4281 CVE-2025-62877 GHSA-6g8q-hp2j-gvwv * GO-2026-4283 CVE-2025-68954 GHSA-8c39-xppg-479c * GO-2026-4284 CVE-2026-21859 GHSA-8v65-47jx-7mfr * GO-2026-4285 GHSA-gg4x-fgg2-h9w9 * GO-2026-4286 CVE-2026-0650 GHSA-rwp9-5g7q-73q3 * GO-2026-4287 CVE-2026-21885 GHSA-xwh2-742g-w3wp * GO-2026-4289 CVE-2025-68151 GHSA-527x-5wrf-22m2 * GO-2026-4290 CVE-2026-22253 GHSA-6jm8-x3g6-r33j * GO-2026-4292 CVE-2026-22688 GHSA-78h3-63c4-5fqc * GO-2026-4293 CVE-2026-22687 GHSA-pcwc-3fw3-8cqv * GO-2026-4295 CVE-2017-18895 GHSA-h742-xx59-r9pq * GO-2026-4296 CVE-2017-18893 GHSA-887v-xh2x-47cm * GO-2026-4297 CVE-2017-18894 GHSA-gg42-mwr6-p82c * GO-2026-4298 CVE-2017-18891 GHSA-vrh2-rprg-rgc6 * GO-2026-4299 CVE-2017-18896 GHSA-63wg-qmrv-7q66 * GO-2026-4300 CVE-2017-18898 GHSA-9589-mq83-f749 * GO-2026-4301 CVE-2017-18897 GHSA-f7c3-7vp3-44p6 * GO-2026-4302 CVE-2017-18904 GHSA-8pff-p3gx-w4jf * GO-2026-4303 CVE-2017-18900 GHSA-8q4v-35v6-g8wr * GO-2026-4304 CVE-2017-18901 GHSA-c253-8hr4-r8v9 * GO-2026-4306 CVE-2017-18905 GHSA-g24c-fx4v-xg9w * GO-2026-4308 CVE-2025-60538 GHSA-mw8h-g64c-rxv4 * GO-2026-4309 CVE-2026-22703 GHSA-whqx-f9j3-ch6m ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-142=1 ## Package List: * openSUSE Leap 15.6 (noarch) * govulncheck-vulndb-0.0.20260114T191543-150000.1.137.1 ## References: * https://jira.suse.com/browse/PED-11136 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 19 16:30:04 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Jan 2026 16:30:04 -0000 Subject: SUSE-SU-2026:0153-1: critical: Security update for MozillaThunderbird Message-ID: <176884020423.24197.2344309906759271166@smelt2.prg2.suse.org> # Security update for MozillaThunderbird Announcement ID: SUSE-SU-2026:0153-1 Release Date: 2026-01-19T11:14:05Z Rating: critical References: * bsc#1256340 Cross-References: * CVE-2025-14327 * CVE-2026-0877 * CVE-2026-0878 * CVE-2026-0879 * CVE-2026-0880 * CVE-2026-0882 * CVE-2026-0883 * CVE-2026-0884 * CVE-2026-0885 * CVE-2026-0886 * CVE-2026-0887 * CVE-2026-0890 * CVE-2026-0891 CVSS scores: * CVE-2025-14327 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-14327 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-14327 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-14327 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2026-0877 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2026-0878 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N * CVE-2026-0879 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-0880 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-0882 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-0883 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-0884 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-0885 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2026-0886 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-0887 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2026-0890 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L * CVE-2026-0891 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves 13 vulnerabilities can now be installed. ## Description: This update for MozillaThunderbird fixes the following issues: MFSA 2026-05 (bsc#1256340): * CVE-2026-0877: Mitigation bypass in the DOM in Security component * CVE-2026-0878: Sandbox escape due to incorrect boundary conditions in the Graphics in CanvasWebGL component * CVE-2026-0879: Sandbox escape due to incorrect boundary conditions in the Graphics component * CVE-2026-0880: Sandbox escape due to integer overflow in the Graphics component * CVE-2026-0882: Use-after-free in the IPC component * CVE-2025-14327: Spoofing issue in the Downloads Panel component * CVE-2026-0883: Information disclosure in the Networking component * CVE-2026-0884: Use-after-free in the JavaScript Engine component * CVE-2026-0885: Use-after-free in the JavaScript: GC component * CVE-2026-0886: Incorrect boundary conditions in the Graphics component * CVE-2026-0887: Clickjacking issue, information disclosure in the PDF Viewer component * CVE-2026-0890: Spoofing issue in the DOM in Copy & Paste and Drag & Drop component * CVE-2026-0891: Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-153=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-153=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-153=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-translations-common-140.7.0-150200.8.251.1 * MozillaThunderbird-debuginfo-140.7.0-150200.8.251.1 * MozillaThunderbird-translations-other-140.7.0-150200.8.251.1 * MozillaThunderbird-140.7.0-150200.8.251.1 * MozillaThunderbird-debugsource-140.7.0-150200.8.251.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x) * MozillaThunderbird-translations-common-140.7.0-150200.8.251.1 * MozillaThunderbird-debuginfo-140.7.0-150200.8.251.1 * MozillaThunderbird-translations-other-140.7.0-150200.8.251.1 * MozillaThunderbird-140.7.0-150200.8.251.1 * MozillaThunderbird-debugsource-140.7.0-150200.8.251.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * MozillaThunderbird-translations-common-140.7.0-150200.8.251.1 * MozillaThunderbird-debuginfo-140.7.0-150200.8.251.1 * MozillaThunderbird-translations-other-140.7.0-150200.8.251.1 * MozillaThunderbird-140.7.0-150200.8.251.1 * MozillaThunderbird-debugsource-140.7.0-150200.8.251.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14327.html * https://www.suse.com/security/cve/CVE-2026-0877.html * https://www.suse.com/security/cve/CVE-2026-0878.html * https://www.suse.com/security/cve/CVE-2026-0879.html * https://www.suse.com/security/cve/CVE-2026-0880.html * https://www.suse.com/security/cve/CVE-2026-0882.html * https://www.suse.com/security/cve/CVE-2026-0883.html * https://www.suse.com/security/cve/CVE-2026-0884.html * https://www.suse.com/security/cve/CVE-2026-0885.html * https://www.suse.com/security/cve/CVE-2026-0886.html * https://www.suse.com/security/cve/CVE-2026-0887.html * https://www.suse.com/security/cve/CVE-2026-0890.html * https://www.suse.com/security/cve/CVE-2026-0891.html * https://bugzilla.suse.com/show_bug.cgi?id=1256340 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 19 16:30:10 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Jan 2026 16:30:10 -0000 Subject: SUSE-RU-2026:0152-1: moderate: Recommended update for qemu Message-ID: <176884021073.24197.6261550084293470274@smelt2.prg2.suse.org> # Recommended update for qemu Announcement ID: SUSE-RU-2026:0152-1 Release Date: 2026-01-19T09:59:05Z Rating: moderate References: * bsc#1228079 * bsc#1231166 Affected Products: * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has two fixes can now be installed. ## Description: This update for qemu fixes the following issues: * target/i386: Expose IBPB-BRTYPE and SBPB CPUID bits to the guest (bsc#1228079) * Fixed qemu translation not being installed (bsc#1231166) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2026-152=1 ## Package List: * Server Applications Module 15-SP6 (noarch) * qemu-sgabios-8-150500.49.27.4 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1228079 * https://bugzilla.suse.com/show_bug.cgi?id=1231166 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 19 16:30:13 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Jan 2026 16:30:13 -0000 Subject: SUSE-SU-2026:0151-1: important: Security update for libsoup Message-ID: <176884021362.24197.1492274144593408316@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2026:0151-1 Release Date: 2026-01-19T09:56:34Z Rating: important References: * bsc#1254876 * bsc#1256399 Cross-References: * CVE-2025-14523 * CVE-2026-0719 CVSS scores: * CVE-2025-14523 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-14523 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2025-14523 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2026-0719 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-0719 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-0719 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Affected Products: * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves two vulnerabilities can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2025-14523: Reject duplicated Host in headers and followed upsteram update (bsc#1254876). * CVE-2026-0719: Fixed overflow for password md4sum (bsc#1256399) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-151=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-151=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libsoup-2_4-1-debuginfo-2.68.4-150200.4.19.1 * libsoup-debugsource-2.68.4-150200.4.19.1 * libsoup-2_4-1-2.68.4-150200.4.19.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libsoup-2_4-1-debuginfo-2.68.4-150200.4.19.1 * libsoup-debugsource-2.68.4-150200.4.19.1 * libsoup-2_4-1-2.68.4-150200.4.19.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14523.html * https://www.suse.com/security/cve/CVE-2026-0719.html * https://bugzilla.suse.com/show_bug.cgi?id=1254876 * https://bugzilla.suse.com/show_bug.cgi?id=1256399 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 19 16:30:15 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Jan 2026 16:30:15 -0000 Subject: SUSE-RU-2026:0150-1: moderate: Recommended update for python-netaddr Message-ID: <176884021511.24197.1154858583804812437@smelt2.prg2.suse.org> # Recommended update for python-netaddr Announcement ID: SUSE-RU-2026:0150-1 Release Date: 2026-01-19T09:17:26Z Rating: moderate References: * jsc#PED-6218 Affected Products: * Python 3 Module 15-SP6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that contains one feature can now be installed. ## Description: This update for python-netaddr fixes the following issue: New python packages: \- python311-netaddr ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2026-150=1 ## Package List: * Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python311-pycairo-1.23.0-150400.3.5.1 * python311-gobject-cairo-3.44.1-150400.3.9.2 * python-gobject-debugsource-3.44.1-150400.3.9.2 * python311-gobject-devel-3.44.1-150400.3.9.2 * python-pycairo-debugsource-1.23.0-150400.3.5.1 * python311-pycairo-debuginfo-1.23.0-150400.3.5.1 * python311-gobject-debuginfo-3.44.1-150400.3.9.2 * python-gobject-debuginfo-3.44.1-150400.3.9.2 * python311-gobject-cairo-debuginfo-3.44.1-150400.3.9.2 * python311-gobject-Gdk-3.44.1-150400.3.9.2 * python311-gobject-3.44.1-150400.3.9.2 * python311-pycairo-devel-1.23.0-150400.3.5.1 * Python 3 Module 15-SP6 (noarch) * python311-six-1.16.0-150400.18.9.1 * python311-netaddr-1.2.1-150400.11.3.2 ## References: * https://jira.suse.com/browse/PED-6218 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 19 16:33:38 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Jan 2026 16:33:38 -0000 Subject: SUSE-SU-2026:0149-1: important: Security update for the Linux Kernel Message-ID: <176884041802.24197.750385526912686912@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:0149-1 Release Date: 2026-01-19T09:13:50Z Rating: important References: * bsc#1065729 * bsc#1156395 * bsc#1193629 * bsc#1194869 * bsc#1198410 * bsc#1199356 * bsc#1199487 * bsc#1201160 * bsc#1201956 * bsc#1202094 * bsc#1202095 * bsc#1202564 * bsc#1202716 * bsc#1202823 * bsc#1202860 * bsc#1203197 * bsc#1203361 * bsc#1205220 * bsc#1205514 * bsc#1206664 * bsc#1206878 * bsc#1206880 * bsc#1207361 * bsc#1207638 * bsc#1211226 * bsc#1212051 * bsc#1213090 * bsc#1218184 * bsc#1218234 * bsc#1218470 * bsc#1222634 * bsc#1223675 * bsc#1224095 * bsc#1224597 * bsc#1225468 * bsc#1225820 * bsc#1226514 * bsc#1226552 * bsc#1228659 * bsc#1230827 * bsc#1231293 * bsc#1232504 * bsc#1233551 * bsc#1234156 * bsc#1234381 * bsc#1234454 * bsc#1235637 * bsc#1236333 * bsc#1236821 * bsc#1236822 * bsc#1237159 * bsc#1237312 * bsc#1237313 * bsc#1238303 * bsc#1238526 * bsc#1238570 * bsc#1238876 * bsc#1239986 * bsc#1240785 * bsc#1241038 * bsc#1242221 * bsc#1242414 * bsc#1242417 * bsc#1242504 * bsc#1242596 * bsc#1242782 * bsc#1242924 * bsc#1243001 * bsc#1243330 * bsc#1243543 * bsc#1243627 * bsc#1243832 * bsc#1244114 * bsc#1244179 * bsc#1244234 * bsc#1244241 * bsc#1244277 * bsc#1244309 * bsc#1244337 * bsc#1244732 * bsc#1244764 * bsc#1244765 * bsc#1244767 * bsc#1244770 * bsc#1244771 * bsc#1244773 * bsc#1244774 * bsc#1244776 * bsc#1244779 * bsc#1244780 * bsc#1244781 * bsc#1244782 * bsc#1244783 * bsc#1244784 * bsc#1244786 * bsc#1244787 * bsc#1244788 * bsc#1244790 * bsc#1244793 * bsc#1244794 * bsc#1244796 * bsc#1244797 * bsc#1244798 * bsc#1244800 * bsc#1244802 * bsc#1244804 * bsc#1244807 * bsc#1244808 * bsc#1244811 * bsc#1244813 * bsc#1244814 * bsc#1244815 * bsc#1244816 * bsc#1244819 * bsc#1244820 * bsc#1244823 * bsc#1244824 * bsc#1244825 * bsc#1244830 * bsc#1244831 * bsc#1244832 * bsc#1244834 * bsc#1244836 * bsc#1244838 * bsc#1244839 * bsc#1244840 * bsc#1244841 * bsc#1244842 * bsc#1244843 * bsc#1244845 * bsc#1244846 * bsc#1244848 * bsc#1244849 * bsc#1244851 * bsc#1244853 * bsc#1244854 * bsc#1244856 * bsc#1244860 * bsc#1244861 * bsc#1244866 * bsc#1244867 * bsc#1244868 * bsc#1244869 * bsc#1244870 * bsc#1244871 * bsc#1244872 * bsc#1244873 * bsc#1244875 * bsc#1244876 * bsc#1244878 * bsc#1244879 * bsc#1244881 * bsc#1244883 * bsc#1244884 * bsc#1244886 * bsc#1244887 * bsc#1244890 * bsc#1244895 * bsc#1244899 * bsc#1244900 * bsc#1244901 * bsc#1244902 * bsc#1244903 * bsc#1244908 * bsc#1244911 * bsc#1244915 * bsc#1244936 * bsc#1244941 * bsc#1244942 * bsc#1244943 * bsc#1244944 * bsc#1244945 * bsc#1244948 * bsc#1244949 * bsc#1244950 * bsc#1244956 * bsc#1244958 * bsc#1244959 * bsc#1244965 * bsc#1244966 * bsc#1244967 * bsc#1244968 * bsc#1244969 * bsc#1244970 * bsc#1244974 * bsc#1244976 * bsc#1244977 * bsc#1244978 * bsc#1244979 * bsc#1244983 * bsc#1244984 * bsc#1244985 * bsc#1244986 * bsc#1244991 * bsc#1244992 * bsc#1244993 * bsc#1245006 * bsc#1245007 * bsc#1245009 * bsc#1245011 * bsc#1245012 * bsc#1245018 * bsc#1245019 * bsc#1245024 * bsc#1245028 * bsc#1245031 * bsc#1245032 * bsc#1245033 * bsc#1245038 * bsc#1245039 * bsc#1245041 * bsc#1245047 * bsc#1245051 * bsc#1245057 * bsc#1245058 * bsc#1245060 * bsc#1245062 * bsc#1245064 * bsc#1245069 * bsc#1245072 * bsc#1245073 * bsc#1245088 * bsc#1245089 * bsc#1245092 * bsc#1245093 * bsc#1245098 * bsc#1245103 * bsc#1245117 * bsc#1245118 * bsc#1245119 * bsc#1245121 * bsc#1245122 * bsc#1245125 * bsc#1245129 * bsc#1245131 * bsc#1245133 * bsc#1245134 * bsc#1245135 * bsc#1245136 * bsc#1245138 * bsc#1245139 * bsc#1245140 * bsc#1245142 * bsc#1245146 * bsc#1245147 * bsc#1245149 * bsc#1245152 * bsc#1245154 * bsc#1245180 * bsc#1245183 * bsc#1245189 * bsc#1245191 * bsc#1245195 * bsc#1245197 * bsc#1245265 * bsc#1245348 * bsc#1245431 * bsc#1245455 * jsc#PED-10028 * jsc#PED-12251 Cross-References: * CVE-2021-47557 * CVE-2021-47595 * CVE-2022-1679 * CVE-2022-2585 * CVE-2022-2586 * CVE-2022-2905 * CVE-2022-3903 * CVE-2022-4095 * CVE-2022-4662 * CVE-2022-49934 * CVE-2022-49936 * CVE-2022-49937 * CVE-2022-49938 * CVE-2022-49940 * CVE-2022-49942 * CVE-2022-49945 * CVE-2022-49946 * CVE-2022-49948 * CVE-2022-49950 * CVE-2022-49952 * CVE-2022-49954 * CVE-2022-49956 * CVE-2022-49957 * CVE-2022-49958 * CVE-2022-49960 * CVE-2022-49964 * CVE-2022-49966 * CVE-2022-49968 * CVE-2022-49969 * CVE-2022-49977 * CVE-2022-49978 * CVE-2022-49981 * CVE-2022-49982 * CVE-2022-49983 * CVE-2022-49984 * CVE-2022-49985 * CVE-2022-49986 * CVE-2022-49987 * CVE-2022-49989 * CVE-2022-49990 * CVE-2022-49993 * CVE-2022-49995 * CVE-2022-49999 * CVE-2022-50005 * CVE-2022-50006 * CVE-2022-50008 * CVE-2022-50010 * CVE-2022-50011 * CVE-2022-50012 * CVE-2022-50019 * CVE-2022-50020 * CVE-2022-50021 * CVE-2022-50022 * CVE-2022-50023 * CVE-2022-50024 * CVE-2022-50026 * CVE-2022-50027 * CVE-2022-50028 * CVE-2022-50029 * CVE-2022-50030 * CVE-2022-50031 * CVE-2022-50032 * CVE-2022-50033 * CVE-2022-50034 * CVE-2022-50036 * CVE-2022-50038 * CVE-2022-50039 * CVE-2022-50040 * CVE-2022-50045 * CVE-2022-50046 * CVE-2022-50047 * CVE-2022-50051 * CVE-2022-50053 * CVE-2022-50055 * CVE-2022-50059 * CVE-2022-50060 * CVE-2022-50061 * CVE-2022-50062 * CVE-2022-50065 * CVE-2022-50066 * CVE-2022-50067 * CVE-2022-50068 * CVE-2022-50072 * CVE-2022-50073 * CVE-2022-50074 * CVE-2022-50076 * CVE-2022-50077 * CVE-2022-50079 * CVE-2022-50083 * CVE-2022-50084 * CVE-2022-50085 * CVE-2022-50087 * CVE-2022-50092 * CVE-2022-50093 * CVE-2022-50094 * CVE-2022-50095 * CVE-2022-50097 * CVE-2022-50098 * CVE-2022-50099 * CVE-2022-50100 * CVE-2022-50101 * CVE-2022-50102 * CVE-2022-50103 * CVE-2022-50104 * CVE-2022-50108 * CVE-2022-50109 * CVE-2022-50110 * CVE-2022-50111 * CVE-2022-50112 * CVE-2022-50116 * CVE-2022-50118 * CVE-2022-50120 * CVE-2022-50121 * CVE-2022-50124 * CVE-2022-50125 * CVE-2022-50126 * CVE-2022-50127 * CVE-2022-50129 * CVE-2022-50131 * CVE-2022-50132 * CVE-2022-50134 * CVE-2022-50136 * CVE-2022-50137 * CVE-2022-50138 * CVE-2022-50139 * CVE-2022-50140 * CVE-2022-50141 * CVE-2022-50142 * CVE-2022-50143 * CVE-2022-50145 * CVE-2022-50146 * CVE-2022-50149 * CVE-2022-50151 * CVE-2022-50152 * CVE-2022-50153 * CVE-2022-50154 * CVE-2022-50155 * CVE-2022-50156 * CVE-2022-50157 * CVE-2022-50158 * CVE-2022-50160 * CVE-2022-50161 * CVE-2022-50162 * CVE-2022-50164 * CVE-2022-50165 * CVE-2022-50169 * CVE-2022-50171 * CVE-2022-50172 * CVE-2022-50173 * CVE-2022-50175 * CVE-2022-50176 * CVE-2022-50178 * CVE-2022-50179 * CVE-2022-50181 * CVE-2022-50185 * CVE-2022-50187 * CVE-2022-50190 * CVE-2022-50191 * CVE-2022-50192 * CVE-2022-50194 * CVE-2022-50196 * CVE-2022-50197 * CVE-2022-50198 * CVE-2022-50199 * CVE-2022-50200 * CVE-2022-50201 * CVE-2022-50202 * CVE-2022-50203 * CVE-2022-50204 * CVE-2022-50206 * CVE-2022-50207 * CVE-2022-50208 * CVE-2022-50209 * CVE-2022-50211 * CVE-2022-50212 * CVE-2022-50213 * CVE-2022-50215 * CVE-2022-50218 * CVE-2022-50220 * CVE-2022-50222 * CVE-2022-50226 * CVE-2022-50228 * CVE-2022-50229 * CVE-2022-50231 * CVE-2023-3111 * CVE-2023-52924 * CVE-2023-52925 * CVE-2023-53048 * CVE-2023-53076 * CVE-2023-53097 * CVE-2024-26808 * CVE-2024-26924 * CVE-2024-26935 * CVE-2024-27397 * CVE-2024-35840 * CVE-2024-36978 * CVE-2024-46800 * CVE-2024-53057 * CVE-2024-53125 * CVE-2024-53141 * CVE-2024-56770 * CVE-2024-57947 * CVE-2024-57999 * CVE-2025-21700 * CVE-2025-21702 * CVE-2025-21703 * CVE-2025-21756 * CVE-2025-23141 * CVE-2025-23145 * CVE-2025-37752 * CVE-2025-37797 * CVE-2025-37798 * CVE-2025-37823 * CVE-2025-37890 * CVE-2025-37932 * CVE-2025-37953 * CVE-2025-37997 * CVE-2025-38000 * CVE-2025-38001 * CVE-2025-38014 * CVE-2025-38083 CVSS scores: * CVE-2021-47557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47557 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47595 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2021-47595 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-1679 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-1679 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2585 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2585 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2586 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2586 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-2586 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-2905 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2022-2905 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-3903 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3903 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-3903 ( NVD ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2022-4095 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-4095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-4095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-4662 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-4662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-4662 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49934 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49934 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49934 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49936 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49936 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49937 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49937 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49937 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49938 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49938 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49938 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49940 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49940 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49940 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49942 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49942 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49942 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49945 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-49945 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-49945 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49946 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49948 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49948 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49948 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49950 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49950 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49952 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49952 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49954 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49954 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49956 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49956 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49957 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49957 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49958 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49958 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49960 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49960 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49960 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49964 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-49964 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-49964 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49966 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2022-49966 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2022-49966 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49968 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49968 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49969 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-49969 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-49969 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49977 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49977 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49977 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49978 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49978 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49978 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49981 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49981 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49981 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49982 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49982 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49982 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49983 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49983 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49984 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49985 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49985 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-49986 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49986 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49987 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49987 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49989 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49990 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49993 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-49993 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49993 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49995 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49995 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-49999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-49999 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50005 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50006 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50008 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50010 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50010 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50011 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50011 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50011 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50012 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50012 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50012 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50019 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50020 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50020 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H * CVE-2022-50020 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50021 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50021 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50021 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50022 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50022 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-50022 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50023 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50023 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50024 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50024 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50026 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-50027 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50027 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50028 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50028 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50028 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50029 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50029 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50029 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50030 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50030 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50030 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50031 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50032 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50032 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50033 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50033 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50034 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50034 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50036 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50038 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50039 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50040 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50045 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50046 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50046 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50047 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50047 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50053 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50055 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50059 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50060 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50061 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50061 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50062 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50062 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50065 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50065 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50066 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50067 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50068 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50068 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50068 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50072 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50072 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50073 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50073 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50076 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50077 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50077 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50079 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50079 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-50083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50084 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50084 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50084 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-50085 ( SUSE ): 7.0 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50085 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50085 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50087 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50087 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50087 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50092 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50093 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-50094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50094 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-50095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50097 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50098 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50099 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50100 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50100 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50101 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50101 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50102 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50102 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50103 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-50104 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50108 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50109 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50110 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50111 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50111 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50118 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50118 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50120 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50124 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50124 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50125 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50125 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50126 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50126 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50127 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50129 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50131 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50131 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50132 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50134 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50134 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50136 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50137 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50137 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50139 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50139 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50140 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50140 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50142 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50142 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50143 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50143 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50145 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50146 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50146 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50149 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50149 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50151 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50152 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50152 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50153 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50154 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50154 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50155 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50156 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50157 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50157 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50158 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50158 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50160 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50160 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50161 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50161 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50162 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50162 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50164 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50165 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50165 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50169 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50171 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50172 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50173 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50173 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50175 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50175 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50176 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-50178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50178 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50179 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50179 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50181 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50185 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50187 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50187 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50190 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50190 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50191 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50191 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50192 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50194 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50197 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50198 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50199 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50200 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50200 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50200 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-50201 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50201 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50201 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50202 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50202 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50202 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50203 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50203 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50203 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50204 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50204 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50206 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50206 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50206 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50207 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50208 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50208 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50209 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50211 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50211 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50211 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2022-50212 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50212 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50213 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50213 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50215 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50215 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50215 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50218 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50220 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50220 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2022-50220 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50222 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2022-50222 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N * CVE-2022-50222 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50226 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50226 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50228 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50228 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50229 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50231 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-3111 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3111 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52924 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-52924 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52924 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52925 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-52925 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-52925 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-52925 ( NVD ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53048 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53076 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53097 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53097 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53097 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26808 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26808 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26924 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26924 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26935 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2024-26935 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-27397 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-27397 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-35840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-35840 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36978 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-36978 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-46800 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-46800 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-46800 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53057 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53057 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53125 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53125 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53141 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53141 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-56770 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2024-56770 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56770 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57947 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57947 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57947 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-57999 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-21700 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-21700 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21700 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21702 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21702 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21703 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21703 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21756 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-21756 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-23141 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23141 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23145 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-23145 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37752 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37752 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37797 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37797 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37823 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-37823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37823 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37890 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37890 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37932 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-37932 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-37932 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37953 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37953 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-37997 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-37997 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-37997 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38000 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38000 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38000 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38001 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38001 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38001 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38014 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38014 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38014 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38083 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38083 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves 221 vulnerabilities, contains two features and has 37 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2021-47557: net/sched: sch_ets: do not peek at classes beyond 'nbands' (bsc#1207361 bsc#1225468). * CVE-2021-47595: net/sched: sch_ets: do not remove idle classes from the round-robin list (bsc#1207361 bsc#1226552). * CVE-2023-52924: netfilter: nf_tables: do not skip expired elements during walk (bsc#1236821). * CVE-2023-52925: netfilter: nf_tables: do not fail inserts if duplicate has expired (bsc#1236822). * CVE-2024-26808: netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (bsc#1222634). * CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820). * CVE-2024-27397: kabi: place tstamp needed for nftables set in a hole (bsc#1224095). * CVE-2024-36978: net: sched: sch_multiq: fix possible OOB write in multiq_tune() (bsc#1226514). * CVE-2024-46800: sch/netem: fix use after free in netem_dequeue (bsc#1230827). * CVE-2024-53057: net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT (bsc#1233551). * CVE-2024-53125: bpf: sync_linked_regs() must preserve subreg_def (bsc#1234156). * CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt (bsc#1234381). * CVE-2024-56770: sch/netem: fix use after free in netem_dequeue (bsc#1235637). * CVE-2024-57947: netfilter: nf_set_pipapo: fix initial map fill (bsc#1236333). * CVE-2025-21700: net: sched: Disallow replacing of child qdisc from one parent to another (bsc#1237159). * CVE-2025-21702: pfifo_tail_enqueue: Drop new packet when sch->limit == 0 (bsc#1237312). * CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313). * CVE-2025-21756: vsock: Orphan socket after transport release (bsc#1238876). * CVE-2025-23141: KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses (bsc#1242782). * CVE-2025-37752: net_sched: sch_sfq: move the limit validation (bsc#1242504). * CVE-2025-37797: net_sched: hfsc: Fix a UAF vulnerability in class handling (bsc#1242417). * CVE-2025-37823: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too (bsc#1242924). * CVE-2025-37890: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc (bsc#1243330). * CVE-2025-37997: netfilter: ipset: fix region locking in hash types (bsc#1243832). * CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue() (bsc#1244277). * CVE-2025-38001: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice (bsc#1244234). * CVE-2025-38014: dmaengine: idxd: Refactor remove call with idxd_cleanup() helper (bsc#1244732). * CVE-2025-38083: net_sched: prio: fix a race in prio_tune() (bsc#1245183). The following non-security bugs were fixed: * Fix conditional for selecting gcc-13 Fixes: 51dacec21eb1 ("Use gcc-13 for build on SLE16 (jsc#PED-10028).") * Fix reference in "net_sched: sch_sfq: use a temporary work area for validating configuration" (bsc#1242504) * MyBS: Correctly generate build flags for non-multibuild package limit (bsc# 1244241) Fixes: 0999112774fc ("MyBS: Use buildflags to set which package to build") * MyBS: Do not build kernel-obs-qa with limit_packages Fixes: 58e3f8c34b2b ("bs-upload-kernel: Pass limit_packages also on multibuild") * MyBS: Simplify qa_expr generation Start with a 0 which makes the expression valid even if there are no QA repositories (currently does not happen). Then separator is always needed. * Require zstd in kernel-default-devel when module compression is zstd To use ksym-provides tool modules need to be uncompressed. Without zstd at least kernel-default-base does not have provides. Link: https://github.com/openSUSE/rpm-config-SUSE/pull/82 * Use gcc-13 for build on SLE16 (jsc#PED-10028). * add nf_tables for iptables non-legacy network handling This is needed for example by docker on the Alpine Linux distribution, but can also be used on openSUSE. * bs-upload-kernel: Pass limit_packages also on multibuild Fixes: 0999112774fc ("MyBS: Use buildflags to set which package to build") Fixes: 747f601d4156 ("bs-upload-kernel, MyBS, Buildresults: Support multibuild (JSC-SLE#5501, boo#1211226, bsc#1218184)") * check-for-config-changes: Fix flag name typo * doc/README.SUSE: Point to the updated version of LKMPG * hugetlb: unshare some PMDs when splitting VMAs (bsc#1245431). * kernel-binary: Support livepatch_rt with merged RT branch * kernel-obs-qa: Use srchash for dependency as well * kernel-source: Also replace bin/env * kernel-source: Also update the search to match bin/env Fixes: dc2037cd8f94 ("kernel-source: Also replace bin/env" * kernel-source: Remove log.sh from sources * mkspec: Exclude rt flavor from kernel-syms dependencies (bsc#1244337). * mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race (bsc#1245431). * mm/hugetlb: unshare page tables during VMA split, not before (bsc#1245431). * net_sched: sch_fifo: implement lockless __fifo_dump() (bsc#1237312) * net_sched: sch_sfq: use a temporary work area for validating configuration (bsc#1232504) * packaging: Patch Makefile to pre-select gcc version (jsc#PED-12251). * packaging: Turn gcc version into config.sh variable Fixes: 51dacec21eb1 ("Use gcc-13 for build on SLE16 (jsc#PED-10028).") * powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap (bsc#1244309 ltc#213790). * powerpc/vas: Return -EINVAL if the offset is non-zero in mmap() (bsc#1244309 ltc#213790). * rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN * rpm/check-for-config-changes: Add GCC_ASM_FLAG_OUTPUT_BROKEN Both spellings are actually used * rpm/check-for-config-changes: add LD_CAN_ to IGNORED_CONFIGS_RE * rpm/check-for-config-changes: add more to IGNORED_CONFIGS_RE Useful when someone tries (needs) to build the kernel with clang. * rpm/check-for-config-changes: ignore DRM_MSM_VALIDATE_XML This option is dynamically enabled to build-test different configurations. This makes run_oldconfig.sh complain sporadically for arm64. * rpm/kernel-binary.spec.in: Also order against update-bootloader (boo#1228659, boo#1240785, boo#1241038). * rpm/kernel-binary.spec.in: Fix missing 20-kernel-default-extra.conf (bsc#1239986) sle_version was obsoleted for SLE16. It has to be combined with suse_version check. * rpm/kernel-binary.spec.in: Use OrderWithRequires (boo#1228659 boo#1241038). * rpm/kernel-binary.spec.in: fix KMPs build on 6.13+ (bsc#1234454) * rpm/kernel-docs.spec.in: Workaround for reproducible builds (bsc#1238303) * rpm/package-descriptions: Add rt and rt_debug descriptions * rpm/release-projects: Update the ALP projects again (bsc#1231293). * rpm/split-modules: Fix optional splitting with usrmerge (bsc#1238570) * rpm: Stop using is_kotd_qa macro * scsi: storvsc: Do not report the host packet status as the hv status (git- fixes). * scsi: storvsc: Increase the timeouts to storvsc_timeout (bsc#1245455). * wifi: cfg80211: Add my certificate (bsc#1243001). * wifi: cfg80211: fix certs build to not depend on file order (bsc#1243001). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-149=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) * kernel-default-5.14.21-150400.24.170.2 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_170-default-1-150400.9.3.2 * kernel-default-debuginfo-5.14.21-150400.24.170.2 * kernel-default-debugsource-5.14.21-150400.24.170.2 * kernel-default-livepatch-5.14.21-150400.24.170.2 * kernel-livepatch-5_14_21-150400_24_170-default-debuginfo-1-150400.9.3.2 * kernel-livepatch-SLE15-SP4_Update_42-debugsource-1-150400.9.3.2 * kernel-default-livepatch-devel-5.14.21-150400.24.170.2 ## References: * https://www.suse.com/security/cve/CVE-2021-47557.html * https://www.suse.com/security/cve/CVE-2021-47595.html * https://www.suse.com/security/cve/CVE-2022-1679.html * https://www.suse.com/security/cve/CVE-2022-2585.html * https://www.suse.com/security/cve/CVE-2022-2586.html * https://www.suse.com/security/cve/CVE-2022-2905.html * https://www.suse.com/security/cve/CVE-2022-3903.html * https://www.suse.com/security/cve/CVE-2022-4095.html * https://www.suse.com/security/cve/CVE-2022-4662.html * https://www.suse.com/security/cve/CVE-2022-49934.html * https://www.suse.com/security/cve/CVE-2022-49936.html * https://www.suse.com/security/cve/CVE-2022-49937.html * https://www.suse.com/security/cve/CVE-2022-49938.html * https://www.suse.com/security/cve/CVE-2022-49940.html * https://www.suse.com/security/cve/CVE-2022-49942.html * https://www.suse.com/security/cve/CVE-2022-49945.html * https://www.suse.com/security/cve/CVE-2022-49946.html * https://www.suse.com/security/cve/CVE-2022-49948.html * https://www.suse.com/security/cve/CVE-2022-49950.html * https://www.suse.com/security/cve/CVE-2022-49952.html * https://www.suse.com/security/cve/CVE-2022-49954.html * https://www.suse.com/security/cve/CVE-2022-49956.html * https://www.suse.com/security/cve/CVE-2022-49957.html * https://www.suse.com/security/cve/CVE-2022-49958.html * https://www.suse.com/security/cve/CVE-2022-49960.html * https://www.suse.com/security/cve/CVE-2022-49964.html * https://www.suse.com/security/cve/CVE-2022-49966.html * https://www.suse.com/security/cve/CVE-2022-49968.html * https://www.suse.com/security/cve/CVE-2022-49969.html * https://www.suse.com/security/cve/CVE-2022-49977.html * https://www.suse.com/security/cve/CVE-2022-49978.html * https://www.suse.com/security/cve/CVE-2022-49981.html * https://www.suse.com/security/cve/CVE-2022-49982.html * https://www.suse.com/security/cve/CVE-2022-49983.html * https://www.suse.com/security/cve/CVE-2022-49984.html * https://www.suse.com/security/cve/CVE-2022-49985.html * https://www.suse.com/security/cve/CVE-2022-49986.html * https://www.suse.com/security/cve/CVE-2022-49987.html * https://www.suse.com/security/cve/CVE-2022-49989.html * https://www.suse.com/security/cve/CVE-2022-49990.html * https://www.suse.com/security/cve/CVE-2022-49993.html * https://www.suse.com/security/cve/CVE-2022-49995.html * https://www.suse.com/security/cve/CVE-2022-49999.html * https://www.suse.com/security/cve/CVE-2022-50005.html * https://www.suse.com/security/cve/CVE-2022-50006.html * https://www.suse.com/security/cve/CVE-2022-50008.html * https://www.suse.com/security/cve/CVE-2022-50010.html * https://www.suse.com/security/cve/CVE-2022-50011.html * https://www.suse.com/security/cve/CVE-2022-50012.html * https://www.suse.com/security/cve/CVE-2022-50019.html * https://www.suse.com/security/cve/CVE-2022-50020.html * https://www.suse.com/security/cve/CVE-2022-50021.html * https://www.suse.com/security/cve/CVE-2022-50022.html * https://www.suse.com/security/cve/CVE-2022-50023.html * https://www.suse.com/security/cve/CVE-2022-50024.html * https://www.suse.com/security/cve/CVE-2022-50026.html * https://www.suse.com/security/cve/CVE-2022-50027.html * https://www.suse.com/security/cve/CVE-2022-50028.html * https://www.suse.com/security/cve/CVE-2022-50029.html * https://www.suse.com/security/cve/CVE-2022-50030.html * https://www.suse.com/security/cve/CVE-2022-50031.html * https://www.suse.com/security/cve/CVE-2022-50032.html * https://www.suse.com/security/cve/CVE-2022-50033.html * https://www.suse.com/security/cve/CVE-2022-50034.html * https://www.suse.com/security/cve/CVE-2022-50036.html * https://www.suse.com/security/cve/CVE-2022-50038.html * https://www.suse.com/security/cve/CVE-2022-50039.html * https://www.suse.com/security/cve/CVE-2022-50040.html * https://www.suse.com/security/cve/CVE-2022-50045.html * https://www.suse.com/security/cve/CVE-2022-50046.html * https://www.suse.com/security/cve/CVE-2022-50047.html * https://www.suse.com/security/cve/CVE-2022-50051.html * https://www.suse.com/security/cve/CVE-2022-50053.html * https://www.suse.com/security/cve/CVE-2022-50055.html * https://www.suse.com/security/cve/CVE-2022-50059.html * https://www.suse.com/security/cve/CVE-2022-50060.html * https://www.suse.com/security/cve/CVE-2022-50061.html * https://www.suse.com/security/cve/CVE-2022-50062.html * https://www.suse.com/security/cve/CVE-2022-50065.html * https://www.suse.com/security/cve/CVE-2022-50066.html * https://www.suse.com/security/cve/CVE-2022-50067.html * https://www.suse.com/security/cve/CVE-2022-50068.html * https://www.suse.com/security/cve/CVE-2022-50072.html * https://www.suse.com/security/cve/CVE-2022-50073.html * https://www.suse.com/security/cve/CVE-2022-50074.html * https://www.suse.com/security/cve/CVE-2022-50076.html * https://www.suse.com/security/cve/CVE-2022-50077.html * https://www.suse.com/security/cve/CVE-2022-50079.html * https://www.suse.com/security/cve/CVE-2022-50083.html * https://www.suse.com/security/cve/CVE-2022-50084.html * https://www.suse.com/security/cve/CVE-2022-50085.html * https://www.suse.com/security/cve/CVE-2022-50087.html * https://www.suse.com/security/cve/CVE-2022-50092.html * https://www.suse.com/security/cve/CVE-2022-50093.html * https://www.suse.com/security/cve/CVE-2022-50094.html * https://www.suse.com/security/cve/CVE-2022-50095.html * https://www.suse.com/security/cve/CVE-2022-50097.html * https://www.suse.com/security/cve/CVE-2022-50098.html * https://www.suse.com/security/cve/CVE-2022-50099.html * https://www.suse.com/security/cve/CVE-2022-50100.html * https://www.suse.com/security/cve/CVE-2022-50101.html * https://www.suse.com/security/cve/CVE-2022-50102.html * https://www.suse.com/security/cve/CVE-2022-50103.html * https://www.suse.com/security/cve/CVE-2022-50104.html * https://www.suse.com/security/cve/CVE-2022-50108.html * https://www.suse.com/security/cve/CVE-2022-50109.html * https://www.suse.com/security/cve/CVE-2022-50110.html * https://www.suse.com/security/cve/CVE-2022-50111.html * https://www.suse.com/security/cve/CVE-2022-50112.html * https://www.suse.com/security/cve/CVE-2022-50116.html * https://www.suse.com/security/cve/CVE-2022-50118.html * https://www.suse.com/security/cve/CVE-2022-50120.html * https://www.suse.com/security/cve/CVE-2022-50121.html * https://www.suse.com/security/cve/CVE-2022-50124.html * https://www.suse.com/security/cve/CVE-2022-50125.html * https://www.suse.com/security/cve/CVE-2022-50126.html * https://www.suse.com/security/cve/CVE-2022-50127.html * https://www.suse.com/security/cve/CVE-2022-50129.html * https://www.suse.com/security/cve/CVE-2022-50131.html * https://www.suse.com/security/cve/CVE-2022-50132.html * https://www.suse.com/security/cve/CVE-2022-50134.html * https://www.suse.com/security/cve/CVE-2022-50136.html * https://www.suse.com/security/cve/CVE-2022-50137.html * https://www.suse.com/security/cve/CVE-2022-50138.html * https://www.suse.com/security/cve/CVE-2022-50139.html * https://www.suse.com/security/cve/CVE-2022-50140.html * https://www.suse.com/security/cve/CVE-2022-50141.html * https://www.suse.com/security/cve/CVE-2022-50142.html * https://www.suse.com/security/cve/CVE-2022-50143.html * https://www.suse.com/security/cve/CVE-2022-50145.html * https://www.suse.com/security/cve/CVE-2022-50146.html * https://www.suse.com/security/cve/CVE-2022-50149.html * https://www.suse.com/security/cve/CVE-2022-50151.html * https://www.suse.com/security/cve/CVE-2022-50152.html * https://www.suse.com/security/cve/CVE-2022-50153.html * https://www.suse.com/security/cve/CVE-2022-50154.html * https://www.suse.com/security/cve/CVE-2022-50155.html * https://www.suse.com/security/cve/CVE-2022-50156.html * https://www.suse.com/security/cve/CVE-2022-50157.html * https://www.suse.com/security/cve/CVE-2022-50158.html * https://www.suse.com/security/cve/CVE-2022-50160.html * https://www.suse.com/security/cve/CVE-2022-50161.html * https://www.suse.com/security/cve/CVE-2022-50162.html * https://www.suse.com/security/cve/CVE-2022-50164.html * https://www.suse.com/security/cve/CVE-2022-50165.html * https://www.suse.com/security/cve/CVE-2022-50169.html * https://www.suse.com/security/cve/CVE-2022-50171.html * https://www.suse.com/security/cve/CVE-2022-50172.html * https://www.suse.com/security/cve/CVE-2022-50173.html * https://www.suse.com/security/cve/CVE-2022-50175.html * https://www.suse.com/security/cve/CVE-2022-50176.html * https://www.suse.com/security/cve/CVE-2022-50178.html * https://www.suse.com/security/cve/CVE-2022-50179.html * https://www.suse.com/security/cve/CVE-2022-50181.html * https://www.suse.com/security/cve/CVE-2022-50185.html * https://www.suse.com/security/cve/CVE-2022-50187.html * https://www.suse.com/security/cve/CVE-2022-50190.html * https://www.suse.com/security/cve/CVE-2022-50191.html * https://www.suse.com/security/cve/CVE-2022-50192.html * https://www.suse.com/security/cve/CVE-2022-50194.html * https://www.suse.com/security/cve/CVE-2022-50196.html * https://www.suse.com/security/cve/CVE-2022-50197.html * https://www.suse.com/security/cve/CVE-2022-50198.html * https://www.suse.com/security/cve/CVE-2022-50199.html * https://www.suse.com/security/cve/CVE-2022-50200.html * https://www.suse.com/security/cve/CVE-2022-50201.html * https://www.suse.com/security/cve/CVE-2022-50202.html * https://www.suse.com/security/cve/CVE-2022-50203.html * https://www.suse.com/security/cve/CVE-2022-50204.html * https://www.suse.com/security/cve/CVE-2022-50206.html * https://www.suse.com/security/cve/CVE-2022-50207.html * https://www.suse.com/security/cve/CVE-2022-50208.html * https://www.suse.com/security/cve/CVE-2022-50209.html * https://www.suse.com/security/cve/CVE-2022-50211.html * https://www.suse.com/security/cve/CVE-2022-50212.html * https://www.suse.com/security/cve/CVE-2022-50213.html * https://www.suse.com/security/cve/CVE-2022-50215.html * https://www.suse.com/security/cve/CVE-2022-50218.html * https://www.suse.com/security/cve/CVE-2022-50220.html * https://www.suse.com/security/cve/CVE-2022-50222.html * https://www.suse.com/security/cve/CVE-2022-50226.html * https://www.suse.com/security/cve/CVE-2022-50228.html * https://www.suse.com/security/cve/CVE-2022-50229.html * https://www.suse.com/security/cve/CVE-2022-50231.html * https://www.suse.com/security/cve/CVE-2023-3111.html * https://www.suse.com/security/cve/CVE-2023-52924.html * https://www.suse.com/security/cve/CVE-2023-52925.html * https://www.suse.com/security/cve/CVE-2023-53048.html * https://www.suse.com/security/cve/CVE-2023-53076.html * https://www.suse.com/security/cve/CVE-2023-53097.html * https://www.suse.com/security/cve/CVE-2024-26808.html * https://www.suse.com/security/cve/CVE-2024-26924.html * https://www.suse.com/security/cve/CVE-2024-26935.html * https://www.suse.com/security/cve/CVE-2024-27397.html * https://www.suse.com/security/cve/CVE-2024-35840.html * https://www.suse.com/security/cve/CVE-2024-36978.html * https://www.suse.com/security/cve/CVE-2024-46800.html * https://www.suse.com/security/cve/CVE-2024-53057.html * https://www.suse.com/security/cve/CVE-2024-53125.html * https://www.suse.com/security/cve/CVE-2024-53141.html * https://www.suse.com/security/cve/CVE-2024-56770.html * https://www.suse.com/security/cve/CVE-2024-57947.html * https://www.suse.com/security/cve/CVE-2024-57999.html * https://www.suse.com/security/cve/CVE-2025-21700.html * https://www.suse.com/security/cve/CVE-2025-21702.html * https://www.suse.com/security/cve/CVE-2025-21703.html * https://www.suse.com/security/cve/CVE-2025-21756.html * https://www.suse.com/security/cve/CVE-2025-23141.html * https://www.suse.com/security/cve/CVE-2025-23145.html * https://www.suse.com/security/cve/CVE-2025-37752.html * https://www.suse.com/security/cve/CVE-2025-37797.html * https://www.suse.com/security/cve/CVE-2025-37798.html * https://www.suse.com/security/cve/CVE-2025-37823.html * https://www.suse.com/security/cve/CVE-2025-37890.html * https://www.suse.com/security/cve/CVE-2025-37932.html * https://www.suse.com/security/cve/CVE-2025-37953.html * https://www.suse.com/security/cve/CVE-2025-37997.html * https://www.suse.com/security/cve/CVE-2025-38000.html * https://www.suse.com/security/cve/CVE-2025-38001.html * https://www.suse.com/security/cve/CVE-2025-38014.html * https://www.suse.com/security/cve/CVE-2025-38083.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1156395 * https://bugzilla.suse.com/show_bug.cgi?id=1193629 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1198410 * https://bugzilla.suse.com/show_bug.cgi?id=1199356 * https://bugzilla.suse.com/show_bug.cgi?id=1199487 * https://bugzilla.suse.com/show_bug.cgi?id=1201160 * https://bugzilla.suse.com/show_bug.cgi?id=1201956 * https://bugzilla.suse.com/show_bug.cgi?id=1202094 * https://bugzilla.suse.com/show_bug.cgi?id=1202095 * https://bugzilla.suse.com/show_bug.cgi?id=1202564 * https://bugzilla.suse.com/show_bug.cgi?id=1202716 * https://bugzilla.suse.com/show_bug.cgi?id=1202823 * https://bugzilla.suse.com/show_bug.cgi?id=1202860 * https://bugzilla.suse.com/show_bug.cgi?id=1203197 * https://bugzilla.suse.com/show_bug.cgi?id=1203361 * https://bugzilla.suse.com/show_bug.cgi?id=1205220 * https://bugzilla.suse.com/show_bug.cgi?id=1205514 * https://bugzilla.suse.com/show_bug.cgi?id=1206664 * https://bugzilla.suse.com/show_bug.cgi?id=1206878 * https://bugzilla.suse.com/show_bug.cgi?id=1206880 * https://bugzilla.suse.com/show_bug.cgi?id=1207361 * https://bugzilla.suse.com/show_bug.cgi?id=1207638 * https://bugzilla.suse.com/show_bug.cgi?id=1211226 * https://bugzilla.suse.com/show_bug.cgi?id=1212051 * https://bugzilla.suse.com/show_bug.cgi?id=1213090 * https://bugzilla.suse.com/show_bug.cgi?id=1218184 * https://bugzilla.suse.com/show_bug.cgi?id=1218234 * https://bugzilla.suse.com/show_bug.cgi?id=1218470 * https://bugzilla.suse.com/show_bug.cgi?id=1222634 * https://bugzilla.suse.com/show_bug.cgi?id=1223675 * https://bugzilla.suse.com/show_bug.cgi?id=1224095 * https://bugzilla.suse.com/show_bug.cgi?id=1224597 * https://bugzilla.suse.com/show_bug.cgi?id=1225468 * https://bugzilla.suse.com/show_bug.cgi?id=1225820 * https://bugzilla.suse.com/show_bug.cgi?id=1226514 * https://bugzilla.suse.com/show_bug.cgi?id=1226552 * https://bugzilla.suse.com/show_bug.cgi?id=1228659 * https://bugzilla.suse.com/show_bug.cgi?id=1230827 * https://bugzilla.suse.com/show_bug.cgi?id=1231293 * https://bugzilla.suse.com/show_bug.cgi?id=1232504 * https://bugzilla.suse.com/show_bug.cgi?id=1233551 * https://bugzilla.suse.com/show_bug.cgi?id=1234156 * https://bugzilla.suse.com/show_bug.cgi?id=1234381 * https://bugzilla.suse.com/show_bug.cgi?id=1234454 * https://bugzilla.suse.com/show_bug.cgi?id=1235637 * https://bugzilla.suse.com/show_bug.cgi?id=1236333 * https://bugzilla.suse.com/show_bug.cgi?id=1236821 * https://bugzilla.suse.com/show_bug.cgi?id=1236822 * https://bugzilla.suse.com/show_bug.cgi?id=1237159 * https://bugzilla.suse.com/show_bug.cgi?id=1237312 * https://bugzilla.suse.com/show_bug.cgi?id=1237313 * https://bugzilla.suse.com/show_bug.cgi?id=1238303 * https://bugzilla.suse.com/show_bug.cgi?id=1238526 * https://bugzilla.suse.com/show_bug.cgi?id=1238570 * https://bugzilla.suse.com/show_bug.cgi?id=1238876 * https://bugzilla.suse.com/show_bug.cgi?id=1239986 * https://bugzilla.suse.com/show_bug.cgi?id=1240785 * https://bugzilla.suse.com/show_bug.cgi?id=1241038 * https://bugzilla.suse.com/show_bug.cgi?id=1242221 * https://bugzilla.suse.com/show_bug.cgi?id=1242414 * https://bugzilla.suse.com/show_bug.cgi?id=1242417 * https://bugzilla.suse.com/show_bug.cgi?id=1242504 * https://bugzilla.suse.com/show_bug.cgi?id=1242596 * https://bugzilla.suse.com/show_bug.cgi?id=1242782 * https://bugzilla.suse.com/show_bug.cgi?id=1242924 * https://bugzilla.suse.com/show_bug.cgi?id=1243001 * https://bugzilla.suse.com/show_bug.cgi?id=1243330 * https://bugzilla.suse.com/show_bug.cgi?id=1243543 * https://bugzilla.suse.com/show_bug.cgi?id=1243627 * https://bugzilla.suse.com/show_bug.cgi?id=1243832 * https://bugzilla.suse.com/show_bug.cgi?id=1244114 * https://bugzilla.suse.com/show_bug.cgi?id=1244179 * https://bugzilla.suse.com/show_bug.cgi?id=1244234 * https://bugzilla.suse.com/show_bug.cgi?id=1244241 * https://bugzilla.suse.com/show_bug.cgi?id=1244277 * https://bugzilla.suse.com/show_bug.cgi?id=1244309 * https://bugzilla.suse.com/show_bug.cgi?id=1244337 * https://bugzilla.suse.com/show_bug.cgi?id=1244732 * https://bugzilla.suse.com/show_bug.cgi?id=1244764 * https://bugzilla.suse.com/show_bug.cgi?id=1244765 * https://bugzilla.suse.com/show_bug.cgi?id=1244767 * https://bugzilla.suse.com/show_bug.cgi?id=1244770 * https://bugzilla.suse.com/show_bug.cgi?id=1244771 * https://bugzilla.suse.com/show_bug.cgi?id=1244773 * https://bugzilla.suse.com/show_bug.cgi?id=1244774 * https://bugzilla.suse.com/show_bug.cgi?id=1244776 * https://bugzilla.suse.com/show_bug.cgi?id=1244779 * https://bugzilla.suse.com/show_bug.cgi?id=1244780 * https://bugzilla.suse.com/show_bug.cgi?id=1244781 * https://bugzilla.suse.com/show_bug.cgi?id=1244782 * https://bugzilla.suse.com/show_bug.cgi?id=1244783 * https://bugzilla.suse.com/show_bug.cgi?id=1244784 * https://bugzilla.suse.com/show_bug.cgi?id=1244786 * https://bugzilla.suse.com/show_bug.cgi?id=1244787 * https://bugzilla.suse.com/show_bug.cgi?id=1244788 * https://bugzilla.suse.com/show_bug.cgi?id=1244790 * https://bugzilla.suse.com/show_bug.cgi?id=1244793 * https://bugzilla.suse.com/show_bug.cgi?id=1244794 * https://bugzilla.suse.com/show_bug.cgi?id=1244796 * https://bugzilla.suse.com/show_bug.cgi?id=1244797 * https://bugzilla.suse.com/show_bug.cgi?id=1244798 * https://bugzilla.suse.com/show_bug.cgi?id=1244800 * https://bugzilla.suse.com/show_bug.cgi?id=1244802 * https://bugzilla.suse.com/show_bug.cgi?id=1244804 * https://bugzilla.suse.com/show_bug.cgi?id=1244807 * https://bugzilla.suse.com/show_bug.cgi?id=1244808 * https://bugzilla.suse.com/show_bug.cgi?id=1244811 * https://bugzilla.suse.com/show_bug.cgi?id=1244813 * https://bugzilla.suse.com/show_bug.cgi?id=1244814 * https://bugzilla.suse.com/show_bug.cgi?id=1244815 * https://bugzilla.suse.com/show_bug.cgi?id=1244816 * https://bugzilla.suse.com/show_bug.cgi?id=1244819 * https://bugzilla.suse.com/show_bug.cgi?id=1244820 * https://bugzilla.suse.com/show_bug.cgi?id=1244823 * https://bugzilla.suse.com/show_bug.cgi?id=1244824 * https://bugzilla.suse.com/show_bug.cgi?id=1244825 * https://bugzilla.suse.com/show_bug.cgi?id=1244830 * https://bugzilla.suse.com/show_bug.cgi?id=1244831 * https://bugzilla.suse.com/show_bug.cgi?id=1244832 * https://bugzilla.suse.com/show_bug.cgi?id=1244834 * https://bugzilla.suse.com/show_bug.cgi?id=1244836 * https://bugzilla.suse.com/show_bug.cgi?id=1244838 * https://bugzilla.suse.com/show_bug.cgi?id=1244839 * https://bugzilla.suse.com/show_bug.cgi?id=1244840 * https://bugzilla.suse.com/show_bug.cgi?id=1244841 * https://bugzilla.suse.com/show_bug.cgi?id=1244842 * https://bugzilla.suse.com/show_bug.cgi?id=1244843 * https://bugzilla.suse.com/show_bug.cgi?id=1244845 * https://bugzilla.suse.com/show_bug.cgi?id=1244846 * https://bugzilla.suse.com/show_bug.cgi?id=1244848 * https://bugzilla.suse.com/show_bug.cgi?id=1244849 * https://bugzilla.suse.com/show_bug.cgi?id=1244851 * https://bugzilla.suse.com/show_bug.cgi?id=1244853 * https://bugzilla.suse.com/show_bug.cgi?id=1244854 * https://bugzilla.suse.com/show_bug.cgi?id=1244856 * https://bugzilla.suse.com/show_bug.cgi?id=1244860 * https://bugzilla.suse.com/show_bug.cgi?id=1244861 * https://bugzilla.suse.com/show_bug.cgi?id=1244866 * https://bugzilla.suse.com/show_bug.cgi?id=1244867 * https://bugzilla.suse.com/show_bug.cgi?id=1244868 * https://bugzilla.suse.com/show_bug.cgi?id=1244869 * https://bugzilla.suse.com/show_bug.cgi?id=1244870 * https://bugzilla.suse.com/show_bug.cgi?id=1244871 * https://bugzilla.suse.com/show_bug.cgi?id=1244872 * https://bugzilla.suse.com/show_bug.cgi?id=1244873 * https://bugzilla.suse.com/show_bug.cgi?id=1244875 * https://bugzilla.suse.com/show_bug.cgi?id=1244876 * https://bugzilla.suse.com/show_bug.cgi?id=1244878 * https://bugzilla.suse.com/show_bug.cgi?id=1244879 * https://bugzilla.suse.com/show_bug.cgi?id=1244881 * https://bugzilla.suse.com/show_bug.cgi?id=1244883 * https://bugzilla.suse.com/show_bug.cgi?id=1244884 * https://bugzilla.suse.com/show_bug.cgi?id=1244886 * https://bugzilla.suse.com/show_bug.cgi?id=1244887 * https://bugzilla.suse.com/show_bug.cgi?id=1244890 * https://bugzilla.suse.com/show_bug.cgi?id=1244895 * https://bugzilla.suse.com/show_bug.cgi?id=1244899 * https://bugzilla.suse.com/show_bug.cgi?id=1244900 * https://bugzilla.suse.com/show_bug.cgi?id=1244901 * https://bugzilla.suse.com/show_bug.cgi?id=1244902 * https://bugzilla.suse.com/show_bug.cgi?id=1244903 * https://bugzilla.suse.com/show_bug.cgi?id=1244908 * https://bugzilla.suse.com/show_bug.cgi?id=1244911 * https://bugzilla.suse.com/show_bug.cgi?id=1244915 * https://bugzilla.suse.com/show_bug.cgi?id=1244936 * https://bugzilla.suse.com/show_bug.cgi?id=1244941 * https://bugzilla.suse.com/show_bug.cgi?id=1244942 * https://bugzilla.suse.com/show_bug.cgi?id=1244943 * https://bugzilla.suse.com/show_bug.cgi?id=1244944 * https://bugzilla.suse.com/show_bug.cgi?id=1244945 * https://bugzilla.suse.com/show_bug.cgi?id=1244948 * https://bugzilla.suse.com/show_bug.cgi?id=1244949 * https://bugzilla.suse.com/show_bug.cgi?id=1244950 * https://bugzilla.suse.com/show_bug.cgi?id=1244956 * https://bugzilla.suse.com/show_bug.cgi?id=1244958 * https://bugzilla.suse.com/show_bug.cgi?id=1244959 * https://bugzilla.suse.com/show_bug.cgi?id=1244965 * https://bugzilla.suse.com/show_bug.cgi?id=1244966 * https://bugzilla.suse.com/show_bug.cgi?id=1244967 * https://bugzilla.suse.com/show_bug.cgi?id=1244968 * https://bugzilla.suse.com/show_bug.cgi?id=1244969 * https://bugzilla.suse.com/show_bug.cgi?id=1244970 * https://bugzilla.suse.com/show_bug.cgi?id=1244974 * https://bugzilla.suse.com/show_bug.cgi?id=1244976 * https://bugzilla.suse.com/show_bug.cgi?id=1244977 * https://bugzilla.suse.com/show_bug.cgi?id=1244978 * https://bugzilla.suse.com/show_bug.cgi?id=1244979 * https://bugzilla.suse.com/show_bug.cgi?id=1244983 * https://bugzilla.suse.com/show_bug.cgi?id=1244984 * https://bugzilla.suse.com/show_bug.cgi?id=1244985 * https://bugzilla.suse.com/show_bug.cgi?id=1244986 * https://bugzilla.suse.com/show_bug.cgi?id=1244991 * https://bugzilla.suse.com/show_bug.cgi?id=1244992 * https://bugzilla.suse.com/show_bug.cgi?id=1244993 * https://bugzilla.suse.com/show_bug.cgi?id=1245006 * https://bugzilla.suse.com/show_bug.cgi?id=1245007 * https://bugzilla.suse.com/show_bug.cgi?id=1245009 * https://bugzilla.suse.com/show_bug.cgi?id=1245011 * https://bugzilla.suse.com/show_bug.cgi?id=1245012 * https://bugzilla.suse.com/show_bug.cgi?id=1245018 * https://bugzilla.suse.com/show_bug.cgi?id=1245019 * https://bugzilla.suse.com/show_bug.cgi?id=1245024 * https://bugzilla.suse.com/show_bug.cgi?id=1245028 * https://bugzilla.suse.com/show_bug.cgi?id=1245031 * https://bugzilla.suse.com/show_bug.cgi?id=1245032 * https://bugzilla.suse.com/show_bug.cgi?id=1245033 * https://bugzilla.suse.com/show_bug.cgi?id=1245038 * https://bugzilla.suse.com/show_bug.cgi?id=1245039 * https://bugzilla.suse.com/show_bug.cgi?id=1245041 * https://bugzilla.suse.com/show_bug.cgi?id=1245047 * https://bugzilla.suse.com/show_bug.cgi?id=1245051 * https://bugzilla.suse.com/show_bug.cgi?id=1245057 * https://bugzilla.suse.com/show_bug.cgi?id=1245058 * https://bugzilla.suse.com/show_bug.cgi?id=1245060 * https://bugzilla.suse.com/show_bug.cgi?id=1245062 * https://bugzilla.suse.com/show_bug.cgi?id=1245064 * https://bugzilla.suse.com/show_bug.cgi?id=1245069 * https://bugzilla.suse.com/show_bug.cgi?id=1245072 * https://bugzilla.suse.com/show_bug.cgi?id=1245073 * https://bugzilla.suse.com/show_bug.cgi?id=1245088 * https://bugzilla.suse.com/show_bug.cgi?id=1245089 * https://bugzilla.suse.com/show_bug.cgi?id=1245092 * https://bugzilla.suse.com/show_bug.cgi?id=1245093 * https://bugzilla.suse.com/show_bug.cgi?id=1245098 * https://bugzilla.suse.com/show_bug.cgi?id=1245103 * https://bugzilla.suse.com/show_bug.cgi?id=1245117 * https://bugzilla.suse.com/show_bug.cgi?id=1245118 * https://bugzilla.suse.com/show_bug.cgi?id=1245119 * https://bugzilla.suse.com/show_bug.cgi?id=1245121 * https://bugzilla.suse.com/show_bug.cgi?id=1245122 * https://bugzilla.suse.com/show_bug.cgi?id=1245125 * https://bugzilla.suse.com/show_bug.cgi?id=1245129 * https://bugzilla.suse.com/show_bug.cgi?id=1245131 * https://bugzilla.suse.com/show_bug.cgi?id=1245133 * https://bugzilla.suse.com/show_bug.cgi?id=1245134 * https://bugzilla.suse.com/show_bug.cgi?id=1245135 * https://bugzilla.suse.com/show_bug.cgi?id=1245136 * https://bugzilla.suse.com/show_bug.cgi?id=1245138 * https://bugzilla.suse.com/show_bug.cgi?id=1245139 * https://bugzilla.suse.com/show_bug.cgi?id=1245140 * https://bugzilla.suse.com/show_bug.cgi?id=1245142 * https://bugzilla.suse.com/show_bug.cgi?id=1245146 * https://bugzilla.suse.com/show_bug.cgi?id=1245147 * https://bugzilla.suse.com/show_bug.cgi?id=1245149 * https://bugzilla.suse.com/show_bug.cgi?id=1245152 * https://bugzilla.suse.com/show_bug.cgi?id=1245154 * https://bugzilla.suse.com/show_bug.cgi?id=1245180 * https://bugzilla.suse.com/show_bug.cgi?id=1245183 * https://bugzilla.suse.com/show_bug.cgi?id=1245189 * https://bugzilla.suse.com/show_bug.cgi?id=1245191 * https://bugzilla.suse.com/show_bug.cgi?id=1245195 * https://bugzilla.suse.com/show_bug.cgi?id=1245197 * https://bugzilla.suse.com/show_bug.cgi?id=1245265 * https://bugzilla.suse.com/show_bug.cgi?id=1245348 * https://bugzilla.suse.com/show_bug.cgi?id=1245431 * https://bugzilla.suse.com/show_bug.cgi?id=1245455 * https://jira.suse.com/browse/PED-10028 * https://jira.suse.com/browse/PED-12251 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 19 20:30:12 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Jan 2026 20:30:12 -0000 Subject: SUSE-SU-2026:0166-1: important: Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP4) Message-ID: <176885461212.28208.4338716960318833369@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 35 for SUSE Linux Enterprise 15 SP4) Announcement ID: SUSE-SU-2026:0166-1 Release Date: 2026-01-19T15:05:22Z Rating: important References: * bsc#1235815 * bsc#1248400 * bsc#1248615 * bsc#1248670 * bsc#1249242 * bsc#1250665 * bsc#1251165 * bsc#1251203 * bsc#1251787 * bsc#1253437 * bsc#1254451 Cross-References: * CVE-2022-50233 * CVE-2022-50327 * CVE-2022-50409 * CVE-2022-50490 * CVE-2023-53676 * CVE-2024-57849 * CVE-2024-58239 * CVE-2025-38476 * CVE-2025-38572 * CVE-2025-38608 * CVE-2025-40204 CVSS scores: * CVE-2022-50233 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50233 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50327 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50409 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57849 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves 11 vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.147 fixes various security issues The following security issues were fixed: * CVE-2022-50233: bluetooth: device name can cause reading kernel memory by not supplying terminal \0 (bsc#1249242). * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1254451). * CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory (bsc#1250665). * CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251165). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2024-57849: s390/cpum_sf: handle CPU hotplug remove during sampling (bsc#1235815). * CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1248615). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-166=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-166=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_147-default-debuginfo-18-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_35-debugsource-18-150400.2.1 * kernel-livepatch-5_14_21-150400_24_147-default-18-150400.2.1 * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_147-default-debuginfo-18-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_35-debugsource-18-150400.2.1 * kernel-livepatch-5_14_21-150400_24_147-default-18-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50233.html * https://www.suse.com/security/cve/CVE-2022-50327.html * https://www.suse.com/security/cve/CVE-2022-50409.html * https://www.suse.com/security/cve/CVE-2022-50490.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2024-57849.html * https://www.suse.com/security/cve/CVE-2024-58239.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1235815 * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1248615 * https://bugzilla.suse.com/show_bug.cgi?id=1248670 * https://bugzilla.suse.com/show_bug.cgi?id=1249242 * https://bugzilla.suse.com/show_bug.cgi?id=1250665 * https://bugzilla.suse.com/show_bug.cgi?id=1251165 * https://bugzilla.suse.com/show_bug.cgi?id=1251203 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1254451 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 19 20:30:21 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Jan 2026 20:30:21 -0000 Subject: SUSE-SU-2026:0163-1: important: Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise 15 SP4) Message-ID: <176885462114.28208.1596961359807239759@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise 15 SP4) Announcement ID: SUSE-SU-2026:0163-1 Release Date: 2026-01-19T15:35:01Z Rating: important References: * bsc#1248400 * bsc#1248615 * bsc#1248670 * bsc#1249242 * bsc#1250665 * bsc#1251165 * bsc#1251203 * bsc#1251787 * bsc#1253437 * bsc#1254451 Cross-References: * CVE-2022-50233 * CVE-2022-50327 * CVE-2022-50409 * CVE-2022-50490 * CVE-2023-53676 * CVE-2024-58239 * CVE-2025-38476 * CVE-2025-38572 * CVE-2025-38608 * CVE-2025-40204 CVSS scores: * CVE-2022-50233 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50233 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50327 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50409 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves 10 vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.170 fixes various security issues The following security issues were fixed: * CVE-2022-50233: bluetooth: device name can cause reading kernel memory by not supplying terminal \0 (bsc#1249242). * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1254451). * CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory (bsc#1250665). * CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251165). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1248615). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-163=1 SUSE-2026-167=1 SUSE-2026-164=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-163=1 SUSE-SLE- Module-Live-Patching-15-SP4-2026-167=1 SUSE-SLE-Module-Live- Patching-15-SP4-2026-164=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-13-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_41-debugsource-11-150400.2.1 * kernel-livepatch-5_14_21-150400_24_170-default-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_170-default-debuginfo-10-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_42-debugsource-10-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_36-debugsource-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_167-default-11-150400.2.1 * kernel-livepatch-5_14_21-150400_24_167-default-debuginfo-11-150400.2.1 * kernel-livepatch-5_14_21-150400_24_150-default-13-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-13-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_41-debugsource-11-150400.2.1 * kernel-livepatch-5_14_21-150400_24_170-default-10-150400.2.1 * kernel-livepatch-5_14_21-150400_24_170-default-debuginfo-10-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_42-debugsource-10-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_36-debugsource-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_167-default-11-150400.2.1 * kernel-livepatch-5_14_21-150400_24_167-default-debuginfo-11-150400.2.1 * kernel-livepatch-5_14_21-150400_24_150-default-13-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50233.html * https://www.suse.com/security/cve/CVE-2022-50327.html * https://www.suse.com/security/cve/CVE-2022-50409.html * https://www.suse.com/security/cve/CVE-2022-50490.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2024-58239.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1248615 * https://bugzilla.suse.com/show_bug.cgi?id=1248670 * https://bugzilla.suse.com/show_bug.cgi?id=1249242 * https://bugzilla.suse.com/show_bug.cgi?id=1250665 * https://bugzilla.suse.com/show_bug.cgi?id=1251165 * https://bugzilla.suse.com/show_bug.cgi?id=1251203 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1254451 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 19 20:30:28 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Jan 2026 20:30:28 -0000 Subject: SUSE-SU-2026:0155-1: important: Security update for the Linux Kernel (Live Patch 72 for SUSE Linux Enterprise 12 SP5) Message-ID: <176885462870.28208.17197375744558941108@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 72 for SUSE Linux Enterprise 12 SP5) Announcement ID: SUSE-SU-2026:0155-1 Release Date: 2026-01-19T15:05:14Z Rating: important References: * bsc#1248400 * bsc#1249242 * bsc#1250280 * bsc#1250665 * bsc#1251787 * bsc#1252563 * bsc#1253437 * bsc#1254451 Cross-References: * CVE-2022-50233 * CVE-2022-50327 * CVE-2022-50367 * CVE-2022-50409 * CVE-2023-53676 * CVE-2023-53717 * CVE-2025-38572 * CVE-2025-40204 CVSS scores: * CVE-2022-50233 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50233 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50327 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50367 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50367 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50367 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50367 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53717 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53717 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves eight vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 4.12.14-122.272 fixes various security issues The following security issues were fixed: * CVE-2022-50233: bluetooth: device name can cause reading kernel memory by not supplying terminal \0 (bsc#1249242). * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1254451). * CVE-2022-50367: fs: fix UAF/GPF bug in nilfs_mdt_destroy (bsc#1250280). * CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory (bsc#1250665). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2023-53717: wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback() (bsc#1252563). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2026-161=1 SUSE-SLE-Live- Patching-12-SP5-2026-155=1 SUSE-SLE-Live-Patching-12-SP5-2026-156=1 SUSE-SLE- Live-Patching-12-SP5-2026-157=1 SUSE-SLE-Live-Patching-12-SP5-2026-158=1 SUSE- SLE-Live-Patching-12-SP5-2026-159=1 SUSE-SLE-Live-Patching-12-SP5-2026-165=1 SUSE-SLE-Live-Patching-12-SP5-2026-162=1 SUSE-SLE-Live- Patching-12-SP5-2026-160=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_261-default-8-2.1 * kgraft-patch-4_12_14-122_266-default-8-2.1 * kgraft-patch-4_12_14-122_250-default-12-2.1 * kgraft-patch-4_12_14-122_247-default-12-2.1 * kgraft-patch-4_12_14-122_269-default-5-2.1 * kgraft-patch-4_12_14-122_258-default-9-2.1 * kgraft-patch-4_12_14-122_255-default-11-2.1 * kgraft-patch-4_12_14-122_272-default-4-2.1 * kgraft-patch-4_12_14-122_244-default-14-2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50233.html * https://www.suse.com/security/cve/CVE-2022-50327.html * https://www.suse.com/security/cve/CVE-2022-50367.html * https://www.suse.com/security/cve/CVE-2022-50409.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2023-53717.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1249242 * https://bugzilla.suse.com/show_bug.cgi?id=1250280 * https://bugzilla.suse.com/show_bug.cgi?id=1250665 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1252563 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1254451 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Mon Jan 19 20:30:36 2026 From: null at suse.de (SLE-UPDATES) Date: Mon, 19 Jan 2026 20:30:36 -0000 Subject: SUSE-SU-2026:0154-1: important: Security update for the Linux Kernel (Live Patch 63 for SUSE Linux Enterprise 12 SP5) Message-ID: <176885463674.28208.9639646574582239964@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 63 for SUSE Linux Enterprise 12 SP5) Announcement ID: SUSE-SU-2026:0154-1 Release Date: 2026-01-19T12:08:44Z Rating: important References: * bsc#1235815 * bsc#1248400 * bsc#1249242 * bsc#1250280 * bsc#1250665 * bsc#1251787 * bsc#1252563 * bsc#1253437 * bsc#1254451 Cross-References: * CVE-2022-50233 * CVE-2022-50327 * CVE-2022-50367 * CVE-2022-50409 * CVE-2023-53676 * CVE-2023-53717 * CVE-2024-57849 * CVE-2025-38572 * CVE-2025-40204 CVSS scores: * CVE-2022-50233 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50233 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50327 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50367 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50367 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50367 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50367 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53717 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53717 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57849 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves nine vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 4.12.14-122.237 fixes various security issues The following security issues were fixed: * CVE-2022-50233: bluetooth: device name can cause reading kernel memory by not supplying terminal \0 (bsc#1249242). * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1254451). * CVE-2022-50367: fs: fix UAF/GPF bug in nilfs_mdt_destroy (bsc#1250280). * CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory (bsc#1250665). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2023-53717: wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback() (bsc#1252563). * CVE-2024-57849: s390/cpum_sf: handle CPU hotplug remove during sampling (bsc#1235815). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2026-154=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_237-default-16-2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50233.html * https://www.suse.com/security/cve/CVE-2022-50327.html * https://www.suse.com/security/cve/CVE-2022-50367.html * https://www.suse.com/security/cve/CVE-2022-50409.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2023-53717.html * https://www.suse.com/security/cve/CVE-2024-57849.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1235815 * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1249242 * https://bugzilla.suse.com/show_bug.cgi?id=1250280 * https://bugzilla.suse.com/show_bug.cgi?id=1250665 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1252563 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1254451 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 08:30:11 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 08:30:11 -0000 Subject: SUSE-SU-2026:0176-1: important: Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4) Message-ID: <176889781128.24357.13601438749825061215@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 44 for SUSE Linux Enterprise 15 SP4) Announcement ID: SUSE-SU-2026:0176-1 Release Date: 2026-01-19T19:03:59Z Rating: important References: * bsc#1248400 * bsc#1249242 * bsc#1250665 * bsc#1251165 * bsc#1251203 * bsc#1251787 * bsc#1253437 * bsc#1254451 Cross-References: * CVE-2022-50233 * CVE-2022-50327 * CVE-2022-50409 * CVE-2022-50490 * CVE-2023-53676 * CVE-2025-38476 * CVE-2025-38572 * CVE-2025-40204 CVSS scores: * CVE-2022-50233 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50233 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50327 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50409 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves eight vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.176 fixes various security issues The following security issues were fixed: * CVE-2022-50233: bluetooth: device name can cause reading kernel memory by not supplying terminal \0 (bsc#1249242). * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1254451). * CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory (bsc#1250665). * CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251165). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-176=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-176=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_44-debugsource-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_176-default-debuginfo-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_176-default-6-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP4_Update_44-debugsource-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_176-default-debuginfo-6-150400.2.1 * kernel-livepatch-5_14_21-150400_24_176-default-6-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50233.html * https://www.suse.com/security/cve/CVE-2022-50327.html * https://www.suse.com/security/cve/CVE-2022-50409.html * https://www.suse.com/security/cve/CVE-2022-50490.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1249242 * https://bugzilla.suse.com/show_bug.cgi?id=1250665 * https://bugzilla.suse.com/show_bug.cgi?id=1251165 * https://bugzilla.suse.com/show_bug.cgi?id=1251203 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1254451 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 08:30:36 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 08:30:36 -0000 Subject: SUSE-SU-2026:0174-1: important: Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP4) Message-ID: <176889783614.24357.13650539742010836090@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP4) Announcement ID: SUSE-SU-2026:0174-1 Release Date: 2026-01-19T18:04:30Z Rating: important References: * bsc#1235815 * bsc#1248400 * bsc#1248615 * bsc#1248670 * bsc#1249242 * bsc#1250665 * bsc#1251165 * bsc#1251203 * bsc#1251787 * bsc#1253437 * bsc#1254451 Cross-References: * CVE-2022-50233 * CVE-2022-50327 * CVE-2022-50409 * CVE-2022-50490 * CVE-2023-53676 * CVE-2024-57849 * CVE-2024-58239 * CVE-2025-38476 * CVE-2025-38572 * CVE-2025-38608 * CVE-2025-40204 CVSS scores: * CVE-2022-50233 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50233 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50327 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50409 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57849 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves 11 vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.144 fixes various security issues The following security issues were fixed: * CVE-2022-50233: bluetooth: device name can cause reading kernel memory by not supplying terminal \0 (bsc#1249242). * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1254451). * CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory (bsc#1250665). * CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251165). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2024-57849: s390/cpum_sf: handle CPU hotplug remove during sampling (bsc#1235815). * CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1248615). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-174=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-174=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_144-default-debuginfo-19-150400.2.1 * kernel-livepatch-5_14_21-150400_24_144-default-19-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_34-debugsource-19-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_144-default-debuginfo-19-150400.2.1 * kernel-livepatch-5_14_21-150400_24_144-default-19-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_34-debugsource-19-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50233.html * https://www.suse.com/security/cve/CVE-2022-50327.html * https://www.suse.com/security/cve/CVE-2022-50409.html * https://www.suse.com/security/cve/CVE-2022-50490.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2024-57849.html * https://www.suse.com/security/cve/CVE-2024-58239.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1235815 * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1248615 * https://bugzilla.suse.com/show_bug.cgi?id=1248670 * https://bugzilla.suse.com/show_bug.cgi?id=1249242 * https://bugzilla.suse.com/show_bug.cgi?id=1250665 * https://bugzilla.suse.com/show_bug.cgi?id=1251165 * https://bugzilla.suse.com/show_bug.cgi?id=1251203 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1254451 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 08:30:45 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 08:30:45 -0000 Subject: SUSE-SU-2026:0173-1: important: Security update for the Linux Kernel (Live Patch 21 for SUSE Linux Enterprise 15 SP5) Message-ID: <176889784581.24357.2055966954833258697@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 21 for SUSE Linux Enterprise 15 SP5) Announcement ID: SUSE-SU-2026:0173-1 Release Date: 2026-01-19T17:33:53Z Rating: important References: * bsc#1235815 * bsc#1248400 * bsc#1248615 * bsc#1248670 * bsc#1250665 * bsc#1251165 * bsc#1251203 * bsc#1251787 * bsc#1253437 * bsc#1254451 Cross-References: * CVE-2022-50327 * CVE-2022-50409 * CVE-2022-50490 * CVE-2023-53676 * CVE-2024-57849 * CVE-2024-58239 * CVE-2025-38476 * CVE-2025-38572 * CVE-2025-38608 * CVE-2025-40204 CVSS scores: * CVE-2022-50327 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50409 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57849 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 10 vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.88 fixes various security issues The following security issues were fixed: * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1254451). * CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory (bsc#1250665). * CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251165). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2024-57849: s390/cpum_sf: handle CPU hotplug remove during sampling (bsc#1235815). * CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1248615). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-173=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-173=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_21-debugsource-17-150500.2.1 * kernel-livepatch-5_14_21-150500_55_88-default-17-150500.2.1 * kernel-livepatch-5_14_21-150500_55_88-default-debuginfo-17-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_21-debugsource-17-150500.2.1 * kernel-livepatch-5_14_21-150500_55_88-default-17-150500.2.1 * kernel-livepatch-5_14_21-150500_55_88-default-debuginfo-17-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50327.html * https://www.suse.com/security/cve/CVE-2022-50409.html * https://www.suse.com/security/cve/CVE-2022-50490.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2024-57849.html * https://www.suse.com/security/cve/CVE-2024-58239.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1235815 * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1248615 * https://bugzilla.suse.com/show_bug.cgi?id=1248670 * https://bugzilla.suse.com/show_bug.cgi?id=1250665 * https://bugzilla.suse.com/show_bug.cgi?id=1251165 * https://bugzilla.suse.com/show_bug.cgi?id=1251203 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1254451 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 08:30:53 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 08:30:53 -0000 Subject: SUSE-SU-2026:0171-1: important: Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 15 SP7) Message-ID: <176889785307.24357.9183920394898546820@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 1 for SUSE Linux Enterprise 15 SP7) Announcement ID: SUSE-SU-2026:0171-1 Release Date: 2026-01-19T16:34:42Z Rating: important References: * bsc#1248400 * bsc#1248670 * bsc#1249241 * bsc#1250192 * bsc#1251203 * bsc#1251787 * bsc#1253437 Cross-References: * CVE-2023-53676 * CVE-2025-38476 * CVE-2025-38572 * CVE-2025-38588 * CVE-2025-38608 * CVE-2025-39682 * CVE-2025-40204 CVSS scores: * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38588 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38588 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves seven vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6.4.0-150700.7.3 fixes various security issues The following security issues were fixed: * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size() (bsc#1249241). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670). * CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1250192). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2026-171=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (x86_64) * kernel-livepatch-SLE15-SP7-RT_Update_1-debugsource-9-150700.2.1 * kernel-livepatch-6_4_0-150700_7_3-rt-9-150700.2.1 * kernel-livepatch-6_4_0-150700_7_3-rt-debuginfo-9-150700.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38588.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1248670 * https://bugzilla.suse.com/show_bug.cgi?id=1249241 * https://bugzilla.suse.com/show_bug.cgi?id=1250192 * https://bugzilla.suse.com/show_bug.cgi?id=1251203 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 08:30:56 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 08:30:56 -0000 Subject: SUSE-SU-2026:0169-1: important: Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise 15 SP7) Message-ID: <176889785623.24357.4291214943963754994@smelt2.prg2.suse.org> # Security update for the Linux Kernel RT (Live Patch 5 for SUSE Linux Enterprise 15 SP7) Announcement ID: SUSE-SU-2026:0169-1 Release Date: 2026-01-19T16:04:33Z Rating: important References: * bsc#1251787 * bsc#1253437 Cross-References: * CVE-2023-53676 * CVE-2025-40204 CVSS scores: * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6.4.0-150700.7.19 fixes various security issues The following security issues were fixed: * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2026-169=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (x86_64) * kernel-livepatch-SLE15-SP7-RT_Update_5-debugsource-2-150700.2.1 * kernel-livepatch-6_4_0-150700_7_19-rt-2-150700.2.1 * kernel-livepatch-6_4_0-150700_7_19-rt-debuginfo-2-150700.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 08:31:06 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 08:31:06 -0000 Subject: SUSE-SU-2026:0168-1: important: Security update for the Linux Kernel (Live Patch 40 for SUSE Linux Enterprise 15 SP4) Message-ID: <176889786626.24357.2337207163101152218@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 40 for SUSE Linux Enterprise 15 SP4) Announcement ID: SUSE-SU-2026:0168-1 Release Date: 2026-01-19T19:33:53Z Rating: important References: * bsc#1248400 * bsc#1248615 * bsc#1248670 * bsc#1249242 * bsc#1250665 * bsc#1251165 * bsc#1251203 * bsc#1251787 * bsc#1253437 * bsc#1254451 Cross-References: * CVE-2022-50233 * CVE-2022-50327 * CVE-2022-50409 * CVE-2022-50490 * CVE-2023-53676 * CVE-2024-58239 * CVE-2025-38476 * CVE-2025-38572 * CVE-2025-38608 * CVE-2025-40204 CVSS scores: * CVE-2022-50233 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50233 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50327 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50409 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves 10 vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.164 fixes various security issues The following security issues were fixed: * CVE-2022-50233: bluetooth: device name can cause reading kernel memory by not supplying terminal \0 (bsc#1249242). * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1254451). * CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory (bsc#1250665). * CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251165). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1248615). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-175=1 SUSE-2026-168=1 SUSE-2026-177=1 SUSE-2026-178=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-175=1 SUSE-SLE- Module-Live-Patching-15-SP4-2026-168=1 SUSE-SLE-Module-Live- Patching-15-SP4-2026-177=1 SUSE-SLE-Module-Live-Patching-15-SP4-2026-178=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_164-default-debuginfo-12-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_39-debugsource-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_161-default-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-12-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_37-debugsource-13-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_40-debugsource-12-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_38-debugsource-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_164-default-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_153-default-debuginfo-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_158-default-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_153-default-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_158-default-debuginfo-12-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_164-default-debuginfo-12-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_39-debugsource-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_161-default-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_161-default-debuginfo-12-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_37-debugsource-13-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_40-debugsource-12-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_38-debugsource-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_164-default-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_153-default-debuginfo-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_158-default-12-150400.2.1 * kernel-livepatch-5_14_21-150400_24_153-default-13-150400.2.1 * kernel-livepatch-5_14_21-150400_24_158-default-debuginfo-12-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50233.html * https://www.suse.com/security/cve/CVE-2022-50327.html * https://www.suse.com/security/cve/CVE-2022-50409.html * https://www.suse.com/security/cve/CVE-2022-50490.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2024-58239.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1248615 * https://bugzilla.suse.com/show_bug.cgi?id=1248670 * https://bugzilla.suse.com/show_bug.cgi?id=1249242 * https://bugzilla.suse.com/show_bug.cgi?id=1250665 * https://bugzilla.suse.com/show_bug.cgi?id=1251165 * https://bugzilla.suse.com/show_bug.cgi?id=1251203 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1254451 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 08:31:28 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 08:31:28 -0000 Subject: SUSE-SU-2026:0170-1: important: Security update for the Linux Kernel Message-ID: <176889788805.24357.7335094834197449954@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:0170-1 Release Date: 2026-01-19T16:28:28Z Rating: important References: * bsc#1234896 * bsc#1244824 * bsc#1245970 * bsc#1246473 * bsc#1246911 * bsc#1247143 * bsc#1247374 * bsc#1247518 * bsc#1247976 * bsc#1248223 * bsc#1248297 * bsc#1248306 * bsc#1248312 * bsc#1248338 * bsc#1248511 * bsc#1248614 * bsc#1248621 * bsc#1248748 * jsc#PED-8240 Cross-References: * CVE-2022-50116 * CVE-2024-53177 * CVE-2024-58239 * CVE-2025-38180 * CVE-2025-38323 * CVE-2025-38352 * CVE-2025-38460 * CVE-2025-38498 * CVE-2025-38499 * CVE-2025-38546 * CVE-2025-38555 * CVE-2025-38560 * CVE-2025-38563 * CVE-2025-38608 * CVE-2025-38617 * CVE-2025-38618 * CVE-2025-38644 CVSS scores: * CVE-2022-50116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50116 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53177 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-53177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-53177 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38180 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38180 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38180 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38323 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38323 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38323 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38352 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38352 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38352 ( NVD ): 7.4 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38460 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38460 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38460 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38498 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38498 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38498 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38499 ( SUSE ): 6.2 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H * CVE-2025-38499 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H * CVE-2025-38499 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38546 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38546 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38546 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38555 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38555 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38555 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38560 ( SUSE ): 5.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H * CVE-2025-38560 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2025-38563 ( SUSE ): 7.5 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H * CVE-2025-38563 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38617 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38617 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38618 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38618 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38644 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38644 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38644 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves 17 vulnerabilities, contains one feature and has one security fix can now be installed. ## Description: The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes. The following security bugs were fixed: * CVE-2022-50116: kernel: tty: n_gsm: fix deadlock and link starvation in outgoing data path (bsc#1244824). * CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error paths (bsc#1234896). * CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1248614). * CVE-2025-38180: net: atm: fix /proc/net/atm/lec handling (bsc#1245970). * CVE-2025-38323: net: atm: add lec_mutex (bsc#1246473). * CVE-2025-38352: posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del() (bsc#1246911). * CVE-2025-38460: atm: clip: Fix potential null-ptr-deref in to_atmarpd() (bsc#1247143). * CVE-2025-38498: do_change_type(): refuse to operate on unmounted/not ours mounts (bsc#1247374). * CVE-2025-38499: clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns (bsc#1247976). * CVE-2025-38546: atm: clip: Fix memory leak of struct clip_vcc (bsc#1248223). * CVE-2025-38555: usb: gadget : fix use-after-free in composite_dev_cleanup() (bsc#1248297). * CVE-2025-38560: x86/sev: Evict cache lines during SNP memory validation (bsc#1248312). * CVE-2025-38563: perf/core: Prevent VMA split of buffer mappings (bsc#1248306). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248338). * CVE-2025-38617: net/packet: fix a race in packet_set_ring() and packet_notifier() (bsc#1248621). * CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY (bsc#1248511). * CVE-2025-38644: wifi: mac80211: reject TDLS operations when station is not associated (bsc#1248748). The following non-security bugs were fixed: * NFSv4.1: fix backchannel max_resp_sz verification check (bsc#1247518). * Disable N_GSM (jsc#PED-8240). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-170=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP4 (nosrc) * kernel-default-5.14.21-150400.24.176.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-default-livepatch-5.14.21-150400.24.176.1 * kernel-default-debugsource-5.14.21-150400.24.176.1 * kernel-livepatch-SLE15-SP4_Update_44-debugsource-1-150400.9.3.1 * kernel-livepatch-5_14_21-150400_24_176-default-1-150400.9.3.1 * kernel-default-livepatch-devel-5.14.21-150400.24.176.1 * kernel-livepatch-5_14_21-150400_24_176-default-debuginfo-1-150400.9.3.1 * kernel-default-debuginfo-5.14.21-150400.24.176.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50116.html * https://www.suse.com/security/cve/CVE-2024-53177.html * https://www.suse.com/security/cve/CVE-2024-58239.html * https://www.suse.com/security/cve/CVE-2025-38180.html * https://www.suse.com/security/cve/CVE-2025-38323.html * https://www.suse.com/security/cve/CVE-2025-38352.html * https://www.suse.com/security/cve/CVE-2025-38460.html * https://www.suse.com/security/cve/CVE-2025-38498.html * https://www.suse.com/security/cve/CVE-2025-38499.html * https://www.suse.com/security/cve/CVE-2025-38546.html * https://www.suse.com/security/cve/CVE-2025-38555.html * https://www.suse.com/security/cve/CVE-2025-38560.html * https://www.suse.com/security/cve/CVE-2025-38563.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-38617.html * https://www.suse.com/security/cve/CVE-2025-38618.html * https://www.suse.com/security/cve/CVE-2025-38644.html * https://bugzilla.suse.com/show_bug.cgi?id=1234896 * https://bugzilla.suse.com/show_bug.cgi?id=1244824 * https://bugzilla.suse.com/show_bug.cgi?id=1245970 * https://bugzilla.suse.com/show_bug.cgi?id=1246473 * https://bugzilla.suse.com/show_bug.cgi?id=1246911 * https://bugzilla.suse.com/show_bug.cgi?id=1247143 * https://bugzilla.suse.com/show_bug.cgi?id=1247374 * https://bugzilla.suse.com/show_bug.cgi?id=1247518 * https://bugzilla.suse.com/show_bug.cgi?id=1247976 * https://bugzilla.suse.com/show_bug.cgi?id=1248223 * https://bugzilla.suse.com/show_bug.cgi?id=1248297 * https://bugzilla.suse.com/show_bug.cgi?id=1248306 * https://bugzilla.suse.com/show_bug.cgi?id=1248312 * https://bugzilla.suse.com/show_bug.cgi?id=1248338 * https://bugzilla.suse.com/show_bug.cgi?id=1248511 * https://bugzilla.suse.com/show_bug.cgi?id=1248614 * https://bugzilla.suse.com/show_bug.cgi?id=1248621 * https://bugzilla.suse.com/show_bug.cgi?id=1248748 * https://jira.suse.com/browse/PED-8240 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 12:30:16 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 12:30:16 -0000 Subject: SUSE-SU-2026:0180-1: important: Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) Message-ID: <176891221663.31307.6178153658374808407@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 26 for SUSE Linux Enterprise 15 SP5) Announcement ID: SUSE-SU-2026:0180-1 Release Date: 2026-01-20T07:04:30Z Rating: important References: * bsc#1248400 * bsc#1248615 * bsc#1248670 * bsc#1250665 * bsc#1251165 * bsc#1251203 * bsc#1251787 * bsc#1253437 * bsc#1254451 Cross-References: * CVE-2022-50327 * CVE-2022-50409 * CVE-2022-50490 * CVE-2023-53676 * CVE-2024-58239 * CVE-2025-38476 * CVE-2025-38572 * CVE-2025-38608 * CVE-2025-40204 CVSS scores: * CVE-2022-50327 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50409 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves nine vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.103 fixes various security issues The following security issues were fixed: * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1254451). * CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory (bsc#1250665). * CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251165). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1248615). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-180=1 SUSE-2026-181=1 SUSE-2026-179=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-180=1 SUSE-SLE- Module-Live-Patching-15-SP5-2026-181=1 SUSE-SLE-Module-Live- Patching-15-SP5-2026-179=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_25-debugsource-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_24-debugsource-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_103-default-debuginfo-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_100-default-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_97-default-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_97-default-debuginfo-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_100-default-debuginfo-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_103-default-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_26-debugsource-12-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_25-debugsource-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_24-debugsource-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_103-default-debuginfo-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_100-default-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_97-default-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_97-default-debuginfo-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_100-default-debuginfo-12-150500.2.1 * kernel-livepatch-5_14_21-150500_55_103-default-12-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_26-debugsource-12-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50327.html * https://www.suse.com/security/cve/CVE-2022-50409.html * https://www.suse.com/security/cve/CVE-2022-50490.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2024-58239.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1248615 * https://bugzilla.suse.com/show_bug.cgi?id=1248670 * https://bugzilla.suse.com/show_bug.cgi?id=1250665 * https://bugzilla.suse.com/show_bug.cgi?id=1251165 * https://bugzilla.suse.com/show_bug.cgi?id=1251203 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1254451 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 16:30:03 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 16:30:03 -0000 Subject: SUSE-SU-2026:20094-1: moderate: Security update for haproxy Message-ID: <176892660358.31326.17698465045447068081@smelt2.prg2.suse.org> # Security update for haproxy Announcement ID: SUSE-SU-2026:20094-1 Release Date: 2026-01-14T10:55:17Z Rating: moderate References: * bsc#1250983 Cross-References: * CVE-2025-11230 CVSS scores: * CVE-2025-11230 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-11230 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11230 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability can now be installed. ## Description: This update for haproxy fixes the following issues: * CVE-2025-11230: issue in the mjson JSON decoder leads to excessive resource consumption when processing numbers with large exponents (bsc#1250983). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-141=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * haproxy-3.2.0+git0.e134140d2-160000.3.1 * haproxy-debuginfo-3.2.0+git0.e134140d2-160000.3.1 * haproxy-debugsource-3.2.0+git0.e134140d2-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11230.html * https://bugzilla.suse.com/show_bug.cgi?id=1250983 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 16:30:10 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 16:30:10 -0000 Subject: SUSE-SU-2026:20093-1: important: Security update for hawk2 Message-ID: <176892661033.31326.15264176440519637958@smelt2.prg2.suse.org> # Security update for hawk2 Announcement ID: SUSE-SU-2026:20093-1 Release Date: 2026-01-13T12:39:59Z Rating: important References: * bsc#1230275 * bsc#1247899 * bsc#1248100 * bsc#1251939 Cross-References: * CVE-2025-55193 * CVE-2025-61919 CVSS scores: * CVE-2025-55193 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-55193 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-55193 ( NVD ): 2.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-61919 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61919 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-61919 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves two vulnerabilities and has two fixes can now be installed. ## Description: This update for hawk2 fixes the following issues: * Bump ruby gem rack to 3.1.18 (bsc#1251939). * Bump ruby gem uri to 1.0.4. * Fix the mtime in manifest.json (bsc#1230275). * Make builds determinitstic (bsc#1230275). * Bump rails version from 8.0.2 to 8.0.2.1 (bsc#1248100). * Require openssl explicitly (bsc#1247899). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-134=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * hawk2-debuginfo-2.7.0+git.1742310530.bfcd0e2c-160000.3.1 * hawk2-debugsource-2.7.0+git.1742310530.bfcd0e2c-160000.3.1 * hawk2-2.7.0+git.1742310530.bfcd0e2c-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-55193.html * https://www.suse.com/security/cve/CVE-2025-61919.html * https://bugzilla.suse.com/show_bug.cgi?id=1230275 * https://bugzilla.suse.com/show_bug.cgi?id=1247899 * https://bugzilla.suse.com/show_bug.cgi?id=1248100 * https://bugzilla.suse.com/show_bug.cgi?id=1251939 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 16:30:12 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 16:30:12 -0000 Subject: SUSE-SU-2026:20092-1: moderate: Security update for haproxy Message-ID: <176892661260.31326.7778752609330464392@smelt2.prg2.suse.org> # Security update for haproxy Announcement ID: SUSE-SU-2026:20092-1 Release Date: 2026-01-14T10:57:49Z Rating: moderate References: * bsc#1250983 Cross-References: * CVE-2025-11230 CVSS scores: * CVE-2025-11230 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-11230 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11230 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server High Availability Extension 16.0 An update that solves one vulnerability can now be installed. ## Description: This update for haproxy fixes the following issues: * CVE-2025-11230: issue in the mjson JSON decoder leads to excessive resource consumption when processing numbers with large exponents (bsc#1250983). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server High Availability Extension 16.0 zypper in -t patch SUSE-SLES-HA-16.0-141=1 ## Package List: * SUSE Linux Enterprise Server High Availability Extension 16.0 (ppc64le s390x x86_64) * haproxy-3.2.0+git0.e134140d2-160000.3.1 * haproxy-debuginfo-3.2.0+git0.e134140d2-160000.3.1 * haproxy-debugsource-3.2.0+git0.e134140d2-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11230.html * https://bugzilla.suse.com/show_bug.cgi?id=1250983 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 16:30:17 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 16:30:17 -0000 Subject: SUSE-SU-2026:20091-1: important: Security update for hawk2 Message-ID: <176892661726.31326.18399973630627933283@smelt2.prg2.suse.org> # Security update for hawk2 Announcement ID: SUSE-SU-2026:20091-1 Release Date: 2026-01-13T12:46:40Z Rating: important References: * bsc#1230275 * bsc#1247899 * bsc#1248100 * bsc#1251939 Cross-References: * CVE-2025-55193 * CVE-2025-61919 CVSS scores: * CVE-2025-55193 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-55193 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-55193 ( NVD ): 2.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-61919 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61919 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-61919 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server High Availability Extension 16.0 An update that solves two vulnerabilities and has two fixes can now be installed. ## Description: This update for hawk2 fixes the following issues: * Bump ruby gem rack to 3.1.18 (bsc#1251939). * Bump ruby gem uri to 1.0.4. * Fix the mtime in manifest.json (bsc#1230275). * Make builds determinitstic (bsc#1230275). * Bump rails version from 8.0.2 to 8.0.2.1 (bsc#1248100). * Require openssl explicitly (bsc#1247899). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server High Availability Extension 16.0 zypper in -t patch SUSE-SLES-HA-16.0-134=1 ## Package List: * SUSE Linux Enterprise Server High Availability Extension 16.0 (ppc64le s390x x86_64) * hawk2-debuginfo-2.7.0+git.1742310530.bfcd0e2c-160000.3.1 * hawk2-debugsource-2.7.0+git.1742310530.bfcd0e2c-160000.3.1 * hawk2-2.7.0+git.1742310530.bfcd0e2c-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-55193.html * https://www.suse.com/security/cve/CVE-2025-61919.html * https://bugzilla.suse.com/show_bug.cgi?id=1230275 * https://bugzilla.suse.com/show_bug.cgi?id=1247899 * https://bugzilla.suse.com/show_bug.cgi?id=1248100 * https://bugzilla.suse.com/show_bug.cgi?id=1251939 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 16:30:20 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 16:30:20 -0000 Subject: SUSE-SU-2026:20090-1: critical: Security update for cpp-httplib Message-ID: <176892662028.31326.17877122726872626859@smelt2.prg2.suse.org> # Security update for cpp-httplib Announcement ID: SUSE-SU-2026:20090-1 Release Date: 2026-01-15T22:11:25Z Rating: critical References: * bsc#1254734 * bsc#1254735 Cross-References: * CVE-2025-66570 * CVE-2025-66577 CVSS scores: * CVE-2025-66570 ( SUSE ): 9.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-66570 ( SUSE ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-66570 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-66570 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-66577 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-66577 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-66577 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for cpp-httplib fixes the following issues: * CVE-2025-66570: IP spoofing, log poisoning, and authorization bypass via header shadowing due to acceptance and parsing of client-controlled injected HTTP headers in incoming requests (bsc#1254734). * CVE-2025-66577: access and error log poisoning with spoofed client IPs due to unconditional acceptance of client-controlled `X-Forwarded-For` and `X-Real-IP` headers (bsc#1254735). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-150=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-150=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * cpp-httplib-debugsource-0.22.0-160000.3.1 * libcpp-httplib0_22-0.22.0-160000.3.1 * libcpp-httplib0_22-debuginfo-0.22.0-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * cpp-httplib-debugsource-0.22.0-160000.3.1 * libcpp-httplib0_22-0.22.0-160000.3.1 * libcpp-httplib0_22-debuginfo-0.22.0-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-66570.html * https://www.suse.com/security/cve/CVE-2025-66577.html * https://bugzilla.suse.com/show_bug.cgi?id=1254734 * https://bugzilla.suse.com/show_bug.cgi?id=1254735 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 16:30:24 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 16:30:24 -0000 Subject: SUSE-SU-2026:20089-1: important: Security update for alloy Message-ID: <176892662401.31326.6852582872454880027@smelt2.prg2.suse.org> # Security update for alloy Announcement ID: SUSE-SU-2026:20089-1 Release Date: 2026-01-15T17:56:17Z Rating: important References: * bsc#1251509 * bsc#1251716 * bsc#1253609 Cross-References: * CVE-2025-47911 * CVE-2025-47913 * CVE-2025-58190 CVSS scores: * CVE-2025-47911 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-47911 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-47913 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-47913 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-47913 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-58190 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-58190 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for alloy fixes the following issues: Upgrade to version 1.12.1. Security issues fixed: * CVE-2025-47911: golang.org/x/net/html: quadratic complexity algorithms used when parsing untrusted HTML documents (bsc#1251509). * CVE-2025-58190: golang.org/x/net/html: excessive memory consumption by `html.ParseFragment` when processing specially crafted input (bsc#1251716). * CVE-2025-47913: golang.org/x/crypto: early client process termination when receiving an unexpected message type in response to a key listing or signing request (bsc#1253609). Other updates and bugfixes: * Version 1.12.1: * Bugfixes * update to Beyla 2.7.10. * Version 1.12.0: * Breaking changes * `prometheus.exporter.blackbox`, `prometheus.exporter.snmp` and `prometheus.exporter.statsd` now use the component ID instead of the hostname as their instance label in their exported metrics. * Features * (Experimental) Add an `otelcol.receiver.cloudflare` component to receive logs pushed by Cloudflare's LogPush jobs. * (Experimental) Additions to experimental `database_observability.mysql` component: * `explain_plans` * collector now changes schema before returning the connection to the pool. * collector now passes queries more permissively. * enable `explain_plans` collector by default * (Experimental) Additions to experimental `database_observability.postgres` component: * `explain_plans` * added the explain plan collector. * collector now passes queries more permissively. * `query_samples` * add user field to wait events within `query_samples` collector. * rework the query samples collector to buffer per-query execution state across scrapes and emit finalized entries. * process turned idle rows to calculate finalization times precisely and emit first seen idle rows. * `query_details` * escape queries coming from `pg_stat_statements` with quotes. * enable `explain_plans` collector by default. * safely generate `server_id` when UDP socket used for database connection. * add table registry and include "validated" in parsed table name logs. * Add `otelcol.exporter.googlecloudpubsub` community component to export metrics, traces, and logs to Google Cloud Pub/Sub topic. * Add `structured_metadata_drop` stage for `loki.process` to filter structured metadata. * Send remote config status to the remote server for the `remotecfg` service. * Send effective config to the remote server for the `remotecfg` service. * Add a `stat_statements` configuration block to the `prometheus.exporter.postgres` component to enable selecting both the query ID and the full SQL statement. The new block includes one option to enable statement selection, and another to configure the maximum length of the statement text. * Add truncate stage for `loki.process` to truncate log entries, label values, and `structured_metadata` values. * Add `u_probe_links` & `load_probe` configuration fields to alloy `pyroscope.ebpf` to extend configuration of the `opentelemetry-ebpf-profiler` to allow uprobe profiling and dynamic probing. * Add `verbose_mode` configuration fields to `alloy pyroscope.ebpf` to be enable `ebpf-profiler` verbose mode. * Add `file_match` block to `loki.source.file` for built-in file discovery using glob patterns. * Add a regex argument to the `structured_metadata` stage in `loki.process` to extract labels matching a regular expression. * OpenTelemetry Collector dependencies upgraded from v0.134.0 to v0.139.0. * See the upstream core and contrib changelogs for more details. * A new `mimir.alerts.kubernetes` component which discovers AlertmanagerConfig Kubernetes resources and loads them into a Mimir instance. * Mark `stage.windowsevent` block in the `loki.process` component as GA. * Enhancements * Add per-application rate limiting with the strategy attribute in the `faro.receiver` component, to prevent one application from consuming the rate limit quota of others. * Add support of tls in components `loki.source.(awsfirehose|gcplog|heroku|api)` and `prometheus.receive_http` and `pyroscope.receive_http`. * Remove `SendSIGKILL=no` from unit files and recommendations. * Reduce memory overhead of `prometheus.remote_write`'s WAL by lowering the size of the allocated series storage. * Reduce lock wait/contention on the `labelstore.LabelStore` by removing unecessary usage from `prometheus.relabel`. * `prometheus.exporter.postgres` dependency has been updated to v0.18.1. * Update Beyla component to 2.7.8. * Support delimiters in `stage.luhn`. * `pyroscope.java`: update `async-profiler` to 4.2. * `prometheus.exporter.unix`: Add an arp config block to configure the ARP collector. * `prometheus.exporter.snowflake` dependency has been updated to 20251016132346-6d442402afb2. * `loki.source.podlogs` now supports `preserve_discovered_labels` parameter to preserve discovered pod metadata labels for use by downstream components. * Rework underlying framework of Alloy UI to use Vite instead of Create React App. * Use POST requests for remote config requests to avoid hitting http2 header limits. * `loki.source.api` during component shutdown will now reject all the inflight requests with status code 503 after `graceful_shutdown_timeout` has expired. * `kubernetes.discovery`: Add support for attaching namespace metadata. * Add `meta_cache_address` to `beyla.ebpf` component. * Bugfixes * Stop `loki.source.kubernetes` discarding log lines with duplicate timestamps. * Fix direction of arrows for pyroscope components in UI graph. * Only log EOF errors for syslog port investigations in `loki.source.syslog` as Debug, not Warn. * Fix `prometheus.exporter.process` ignoring the `remove_empty_groups` argument. * Fix issues with "unknown series ref when trying to add exemplar" from `prometheus.remote_write` by allowing series ref links to be updated if they change. * Fix `loki.source.podlogs` component to register the Kubernetes field index for `spec.nodeName` when node filtering is enabled, preventing "Index with name `field:spec.nodeName` does not exist" errors. * Fix issue in `loki.source.file` where scheduling files could take too long. * Fix `loki.write` no longer includes internal labels __. * Fix missing native histograms custom buckets (NHCB) samples from `prometheus.remote_write`. * `otelcol.receiver.prometheus` now supports mixed histograms if `prometheus.scrape` has `honor_metadata` set to true. * `loki.source.file` has better support for non-UTF-8 encoded files. * Fix the `loki.write` endpoint block's `enable_http2` attribute to actually affect the client. * Optionally remove trailing newlines before appending entries in `stage.multiline`. * `loki.source.api` no longer drops request when relabel rules drops a specific stream. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-149=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-149=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * alloy-debuginfo-1.12.1-160000.1.1 * alloy-1.12.1-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * alloy-debuginfo-1.12.1-160000.1.1 * alloy-1.12.1-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-47911.html * https://www.suse.com/security/cve/CVE-2025-47913.html * https://www.suse.com/security/cve/CVE-2025-58190.html * https://bugzilla.suse.com/show_bug.cgi?id=1251509 * https://bugzilla.suse.com/show_bug.cgi?id=1251716 * https://bugzilla.suse.com/show_bug.cgi?id=1253609 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 16:30:28 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 16:30:28 -0000 Subject: SUSE-SU-2026:20088-1: moderate: Security update for erlang Message-ID: <176892662836.31326.5216661798344402658@smelt2.prg2.suse.org> # Security update for erlang Announcement ID: SUSE-SU-2026:20088-1 Release Date: 2026-01-15T17:21:23Z Rating: moderate References: * bsc#1249469 * bsc#1249470 * bsc#1249472 Cross-References: * CVE-2025-48038 * CVE-2025-48039 * CVE-2025-48040 CVSS scores: * CVE-2025-48038 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-48038 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-48038 ( NVD ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-48039 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-48039 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-48039 ( NVD ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-48040 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-48040 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-48040 ( NVD ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for erlang fixes the following issues: Update the ssh component to the latest in the maint-27 branch. Security issues fixed: * CVE-2025-48040: ssh: overly tolerant handling of data received from unauthenticated users when processing key exchange messages may lead to excessive resource consumption (bsc#1249472). * CVE-2025-48039: ssh: unverified paths from authenticated SFTP users may lead to excessive resource consumption (bsc#1249469). * CVE-2025-48038: ssh: unverified file handles from authenticated SFTP users may lead to excessive resource consumption (bsc#1249470). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-148=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-148=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * erlang-epmd-27.1.3-160000.3.1 * erlang-27.1.3-160000.3.1 * erlang-debugsource-27.1.3-160000.3.1 * erlang-debuginfo-27.1.3-160000.3.1 * erlang-epmd-debuginfo-27.1.3-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * erlang-epmd-27.1.3-160000.3.1 * erlang-27.1.3-160000.3.1 * erlang-debugsource-27.1.3-160000.3.1 * erlang-debuginfo-27.1.3-160000.3.1 * erlang-epmd-debuginfo-27.1.3-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-48038.html * https://www.suse.com/security/cve/CVE-2025-48039.html * https://www.suse.com/security/cve/CVE-2025-48040.html * https://bugzilla.suse.com/show_bug.cgi?id=1249469 * https://bugzilla.suse.com/show_bug.cgi?id=1249470 * https://bugzilla.suse.com/show_bug.cgi?id=1249472 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 16:30:31 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 16:30:31 -0000 Subject: SUSE-RU-2026:20087-1: important: Recommended update for suse-migration-services Message-ID: <176892663156.31326.5281458350772066601@smelt2.prg2.suse.org> # Recommended update for suse-migration-services Announcement ID: SUSE-RU-2026:20087-1 Release Date: 2026-01-15T16:28:43Z Rating: important References: * bsc#1250003 * bsc#1253963 * jsc#PED-13640 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that contains one feature and has two fixes can now be installed. ## Description: This update for suse-migration-services fixes the following issues: * Bump to version: 2.1.29 * Fix mount_system unit * Run ssh precheck only for SLE16 target The check for the ssh default settings change should only be performed for migrations to SLE16 * Only generate wicked xml if service is the active network * Fix unit link check and no use of path.join * Fixed migration live image package requires * Update setup_host_network service * Fix backup processing * Fix log handler setup * Drop and backup /etc/sysconfig/network * Skip migration if wicked is not the default network config service * Add package_installed method * Backup drop_path data * Check if package exists prior drop * Fixed use of suse version macros * drop README_QA.rst * Update conditional requires per review * Consolidate project documentation * Fixed spec file regarding wicked2nm * Bump to version: 2.1.28 * Fix update_version helper * Fix mount_system * Fix order of reboot service * Improve dracut logging * Drop wicked component after nm migration * Move script package to the main migration provider * Add DropComponents class * Fixed spec file: * suse-migration-container-pam-config.service was not installed * Create systemd.link files for biosdevname (bsc#1253963) * Create lib file for common network-prereq tasks * update PAM configurations to use pam_unix.so SLE16 no longer provides compat links for pam_unix_*.so. Fix the configuration for tools that are still using those compat links so they don't break after migration (PED-13640) * Omit cio_ignore kernel commandline on zkvm (bsc#1250003) * Bump to version: 2.1.27 * Refactor mount_system service * Fix order of reboot service * Add support for wicked2nm in container workflow * Fix unit test for solver test case * Fixes for btrfs_snapshot_pre_migration ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-147=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-147=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * suse-migration-pre-checks-2.1.29-160000.1.1 * suse-migration-services-common-2.1.29-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * suse-migration-pre-checks-2.1.29-160000.1.1 * suse-migration-services-common-2.1.29-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1250003 * https://bugzilla.suse.com/show_bug.cgi?id=1253963 * https://jira.suse.com/browse/PED-13640 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 16:30:33 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 16:30:33 -0000 Subject: SUSE-SU-2026:20086-1: important: Security update for MozillaFirefox Message-ID: <176892663375.31326.13644527659464832550@smelt2.prg2.suse.org> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2026:20086-1 Release Date: 2026-01-15T16:28:43Z Rating: important References: * bsc#1256340 Cross-References: * CVE-2025-14327 * CVE-2026-0877 * CVE-2026-0878 * CVE-2026-0879 * CVE-2026-0880 * CVE-2026-0882 * CVE-2026-0883 * CVE-2026-0884 * CVE-2026-0885 * CVE-2026-0886 * CVE-2026-0887 * CVE-2026-0890 * CVE-2026-0891 CVSS scores: * CVE-2025-14327 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-14327 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-14327 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-14327 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2026-0877 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2026-0878 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N * CVE-2026-0879 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-0880 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-0882 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-0883 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-0884 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-0885 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2026-0886 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-0887 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2026-0890 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L * CVE-2026-0891 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves 13 vulnerabilities can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: Update to Firefox Extended Support Release 140.7.0 ESR (bsc#1256340). * MFSA 2026-03 (bsc#1256340) * CVE-2026-0877: Mitigation bypass in the DOM: Security component * CVE-2026-0878: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component * CVE-2026-0879: Sandbox escape due to incorrect boundary conditions in the Graphics component * CVE-2026-0880: Sandbox escape due to integer overflow in the Graphics component * CVE-2026-0882: Use-after-free in the IPC component * CVE-2025-14327: Spoofing issue in the Downloads Panel component * CVE-2026-0883: Information disclosure in the Networking component * CVE-2026-0884: Use-after-free in the JavaScript Engine component * CVE-2026-0885: Use-after-free in the JavaScript: GC component * CVE-2026-0886: Incorrect boundary conditions in the Graphics component * CVE-2026-0887: Clickjacking issue, information disclosure in the PDF Viewer component * CVE-2026-0890: Spoofing issue in the DOM: Copy & Paste and Drag & Drop component * CVE-2026-0891: Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-146=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-146=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-translations-common-140.7.0-160000.1.1 * MozillaFirefox-translations-other-140.7.0-160000.1.1 * MozillaFirefox-debuginfo-140.7.0-160000.1.1 * MozillaFirefox-140.7.0-160000.1.1 * MozillaFirefox-debugsource-140.7.0-160000.1.1 * SUSE Linux Enterprise Server 16.0 (noarch) * MozillaFirefox-devel-140.7.0-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * MozillaFirefox-translations-common-140.7.0-160000.1.1 * MozillaFirefox-translations-other-140.7.0-160000.1.1 * MozillaFirefox-debuginfo-140.7.0-160000.1.1 * MozillaFirefox-140.7.0-160000.1.1 * MozillaFirefox-debugsource-140.7.0-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * MozillaFirefox-devel-140.7.0-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14327.html * https://www.suse.com/security/cve/CVE-2026-0877.html * https://www.suse.com/security/cve/CVE-2026-0878.html * https://www.suse.com/security/cve/CVE-2026-0879.html * https://www.suse.com/security/cve/CVE-2026-0880.html * https://www.suse.com/security/cve/CVE-2026-0882.html * https://www.suse.com/security/cve/CVE-2026-0883.html * https://www.suse.com/security/cve/CVE-2026-0884.html * https://www.suse.com/security/cve/CVE-2026-0885.html * https://www.suse.com/security/cve/CVE-2026-0886.html * https://www.suse.com/security/cve/CVE-2026-0887.html * https://www.suse.com/security/cve/CVE-2026-0890.html * https://www.suse.com/security/cve/CVE-2026-0891.html * https://bugzilla.suse.com/show_bug.cgi?id=1256340 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 16:30:38 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 16:30:38 -0000 Subject: SUSE-SU-2026:20085-1: important: Security update for bind Message-ID: <176892663828.31326.17790324520755665605@smelt2.prg2.suse.org> # Security update for bind Announcement ID: SUSE-SU-2026:20085-1 Release Date: 2026-01-15T10:43:49Z Rating: important References: * bsc#1230649 * bsc#1252378 * bsc#1252379 * bsc#1252380 Cross-References: * CVE-2025-40778 * CVE-2025-40780 * CVE-2025-8677 CVSS scores: * CVE-2025-40778 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N * CVE-2025-40778 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40778 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40780 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N * CVE-2025-40780 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-40780 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N * CVE-2025-8677 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-8677 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-8677 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves three vulnerabilities and has one fix can now be installed. ## Description: This update for bind fixes the following issues: * Upgrade to release 9.20.15 Security Fixes: * CVE-2025-40778: Fixed cache poisoning attacks with unsolicited RRs (bsc#1252379) * CVE-2025-40780: Fixed cache poisoning due to weak PRNG (bsc#1252380) * CVE-2025-8677: Fixed resource exhaustion via malformed DNSKEY handling (bsc#1252378) New Features: * Add dnssec-policy keys configuration check to named-checkconf. * Add a new option `manual-mode` to dnssec-policy. * Add a new option `servfail- until-ready` to response-policy zones. * Support for parsing HHIT and BRID records has been added. * Support for parsing DSYNC records has been added. Removed Features: * Deprecate the `tkey-gssapi-credential` statement. * Obsolete the `tkey-domain` statement. Feature Changes: * Add deprecation warnings for RSASHA1, RSASHA1-NSEC3SHA1, and DS digest type 1. Bug Fixes: * Missing DNSSEC information when CD bit is set in query. * rndc sign during ZSK rollover will now replace signatures. * Use signer name when disabling DNSSEC algorithms. * Preserve cache when reload fails and reload the server again. * Prevent spurious SERVFAILs for certain 0-TTL resource records. * Fix unexpected termination if catalog-zones had undefined `default-primaries`. * Stale RRsets in a CNAME chain were not always refreshed. * Add RPZ extended DNS error for zones with a CNAME override policy configured. * Fix dig +keepopen option. * Log dropped or slipped responses in the query-errors category. * Fix synth-from-dnssec not working in some scenarios. * Clean enough memory when adding new ADB names/entries under memory pressure. * Prevent spurious validation failures. * Ensure file descriptors 0-2 are in use before using libuv [bsc#1230649] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-144=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-144=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * bind-modules-perl-debuginfo-9.20.15-160000.1.1 * bind-modules-sqlite3-9.20.15-160000.1.1 * bind-utils-9.20.15-160000.1.1 * bind-modules-mysql-debuginfo-9.20.15-160000.1.1 * bind-modules-generic-9.20.15-160000.1.1 * bind-9.20.15-160000.1.1 * bind-debugsource-9.20.15-160000.1.1 * bind-modules-mysql-9.20.15-160000.1.1 * bind-modules-generic-debuginfo-9.20.15-160000.1.1 * bind-utils-debuginfo-9.20.15-160000.1.1 * bind-modules-ldap-debuginfo-9.20.15-160000.1.1 * bind-modules-perl-9.20.15-160000.1.1 * bind-debuginfo-9.20.15-160000.1.1 * bind-modules-ldap-9.20.15-160000.1.1 * bind-modules-sqlite3-debuginfo-9.20.15-160000.1.1 * SUSE Linux Enterprise Server 16.0 (noarch) * bind-doc-9.20.15-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * bind-modules-perl-debuginfo-9.20.15-160000.1.1 * bind-modules-sqlite3-9.20.15-160000.1.1 * bind-utils-9.20.15-160000.1.1 * bind-modules-mysql-debuginfo-9.20.15-160000.1.1 * bind-modules-generic-9.20.15-160000.1.1 * bind-9.20.15-160000.1.1 * bind-debugsource-9.20.15-160000.1.1 * bind-modules-mysql-9.20.15-160000.1.1 * bind-modules-generic-debuginfo-9.20.15-160000.1.1 * bind-utils-debuginfo-9.20.15-160000.1.1 * bind-modules-ldap-debuginfo-9.20.15-160000.1.1 * bind-modules-perl-9.20.15-160000.1.1 * bind-debuginfo-9.20.15-160000.1.1 * bind-modules-ldap-9.20.15-160000.1.1 * bind-modules-sqlite3-debuginfo-9.20.15-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * bind-doc-9.20.15-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-40778.html * https://www.suse.com/security/cve/CVE-2025-40780.html * https://www.suse.com/security/cve/CVE-2025-8677.html * https://bugzilla.suse.com/show_bug.cgi?id=1230649 * https://bugzilla.suse.com/show_bug.cgi?id=1252378 * https://bugzilla.suse.com/show_bug.cgi?id=1252379 * https://bugzilla.suse.com/show_bug.cgi?id=1252380 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 16:30:42 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 16:30:42 -0000 Subject: SUSE-SU-2026:20084-1: important: Security update for tomcat Message-ID: <176892664247.31326.4820524021352388700@smelt2.prg2.suse.org> # Security update for tomcat Announcement ID: SUSE-SU-2026:20084-1 Release Date: 2026-01-14T13:16:53Z Rating: important References: * bsc#1252753 * bsc#1252756 * bsc#1252905 Cross-References: * CVE-2025-55752 * CVE-2025-55754 * CVE-2025-61795 CVSS scores: * CVE-2025-55752 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-55752 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-55752 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-55754 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-55754 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-55754 ( NVD ): 9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H * CVE-2025-61795 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61795 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-61795 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for tomcat fixes the following issues: * Update to Tomcat 9.0.111 * Security fixes: * CVE-2025-55752: directory traversal via rewrite with possible RCE if PUT is enabled (bsc#1252753). * CVE-2025-55754: improper neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat (bsc#1252905). * CVE-2025-61795: temporary copies during the processing of multipart upload can lead to a denial of service (bsc#1252756). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-143=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-143=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * tomcat-javadoc-9.0.111-160000.1.1 * tomcat-lib-9.0.111-160000.1.1 * tomcat-docs-webapp-9.0.111-160000.1.1 * tomcat-jsvc-9.0.111-160000.1.1 * tomcat-embed-9.0.111-160000.1.1 * tomcat-el-3_0-api-9.0.111-160000.1.1 * tomcat-servlet-4_0-api-9.0.111-160000.1.1 * tomcat-jsp-2_3-api-9.0.111-160000.1.1 * tomcat-webapps-9.0.111-160000.1.1 * tomcat-admin-webapps-9.0.111-160000.1.1 * tomcat-9.0.111-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * tomcat-javadoc-9.0.111-160000.1.1 * tomcat-lib-9.0.111-160000.1.1 * tomcat-docs-webapp-9.0.111-160000.1.1 * tomcat-jsvc-9.0.111-160000.1.1 * tomcat-embed-9.0.111-160000.1.1 * tomcat-el-3_0-api-9.0.111-160000.1.1 * tomcat-servlet-4_0-api-9.0.111-160000.1.1 * tomcat-jsp-2_3-api-9.0.111-160000.1.1 * tomcat-webapps-9.0.111-160000.1.1 * tomcat-admin-webapps-9.0.111-160000.1.1 * tomcat-9.0.111-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-55752.html * https://www.suse.com/security/cve/CVE-2025-55754.html * https://www.suse.com/security/cve/CVE-2025-61795.html * https://bugzilla.suse.com/show_bug.cgi?id=1252753 * https://bugzilla.suse.com/show_bug.cgi?id=1252756 * https://bugzilla.suse.com/show_bug.cgi?id=1252905 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 16:30:43 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 16:30:43 -0000 Subject: SUSE-RU-2026:20083-1: moderate: Recommended update for openvswitch Message-ID: <176892664388.31326.15433170801999661795@smelt2.prg2.suse.org> # Recommended update for openvswitch Announcement ID: SUSE-RU-2026:20083-1 Release Date: 2026-01-14T11:17:40Z Rating: moderate References: Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that can now be installed. ## Description: This update for openvswitch fixes the following issues: * Update OVN to 25.03.2 * Bug fixes * Dynamic Routing: * Add the option "dynamic-routing-redistribute-local-only" to Logical Routers and Logical Router Ports which refines the way in which chassis-specific Advertised_Routes (e.g., for NAT and LB IPs) are advertised. * Add the option "dynamic-routing-vrf-id" to Logical Routers which allows CMS to specify the Linux routing table id for a given vrf. * Add ovn-nbctl lsp-add-router-port which will create router port on specified LS. * Add ovn-nbctl lsp-add-localnet-port which will create localnet port on specified LS. * Update OVN to 25.03.1 * Bug fixes * Update Openvswitch to 3.5.2 * Bug fixes ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-142=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-142=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * libovn-25_03-0-debuginfo-25.03.2-160000.3.1 * ovn-devel-25.03.2-160000.3.1 * libopenvswitch-3_5-0-debuginfo-3.5.2-160000.3.1 * ovn-host-debuginfo-25.03.2-160000.3.1 * ovn-docker-25.03.2-160000.3.1 * openvswitch-devel-3.5.2-160000.3.1 * openvswitch-pki-3.5.2-160000.3.1 * openvswitch-vtep-3.5.2-160000.3.1 * openvswitch-3.5.2-160000.3.1 * ovn-vtep-25.03.2-160000.3.1 * ovn-25.03.2-160000.3.1 * python3-openvswitch-3.5.2-160000.3.1 * ovn-debuginfo-25.03.2-160000.3.1 * libopenvswitch-3_5-0-3.5.2-160000.3.1 * ovn-central-debuginfo-25.03.2-160000.3.1 * ovn-vtep-debuginfo-25.03.2-160000.3.1 * ovn-host-25.03.2-160000.3.1 * openvswitch-ipsec-3.5.2-160000.3.1 * openvswitch-vtep-debuginfo-3.5.2-160000.3.1 * openvswitch-debuginfo-3.5.2-160000.3.1 * ovn-central-25.03.2-160000.3.1 * python3-openvswitch-debuginfo-3.5.2-160000.3.1 * openvswitch-debugsource-3.5.2-160000.3.1 * libovn-25_03-0-25.03.2-160000.3.1 * SUSE Linux Enterprise Server 16.0 (noarch) * ovn-doc-25.03.2-160000.3.1 * openvswitch-doc-3.5.2-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * libovn-25_03-0-debuginfo-25.03.2-160000.3.1 * ovn-devel-25.03.2-160000.3.1 * libopenvswitch-3_5-0-debuginfo-3.5.2-160000.3.1 * ovn-host-debuginfo-25.03.2-160000.3.1 * ovn-docker-25.03.2-160000.3.1 * openvswitch-devel-3.5.2-160000.3.1 * openvswitch-pki-3.5.2-160000.3.1 * openvswitch-vtep-3.5.2-160000.3.1 * openvswitch-3.5.2-160000.3.1 * ovn-vtep-25.03.2-160000.3.1 * ovn-25.03.2-160000.3.1 * python3-openvswitch-3.5.2-160000.3.1 * ovn-debuginfo-25.03.2-160000.3.1 * libopenvswitch-3_5-0-3.5.2-160000.3.1 * ovn-central-debuginfo-25.03.2-160000.3.1 * ovn-vtep-debuginfo-25.03.2-160000.3.1 * ovn-host-25.03.2-160000.3.1 * openvswitch-ipsec-3.5.2-160000.3.1 * openvswitch-vtep-debuginfo-3.5.2-160000.3.1 * openvswitch-debuginfo-3.5.2-160000.3.1 * ovn-central-25.03.2-160000.3.1 * python3-openvswitch-debuginfo-3.5.2-160000.3.1 * openvswitch-debugsource-3.5.2-160000.3.1 * libovn-25_03-0-25.03.2-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * ovn-doc-25.03.2-160000.3.1 * openvswitch-doc-3.5.2-160000.3.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 16:30:50 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 16:30:50 -0000 Subject: SUSE-SU-2026:20082-1: moderate: Security update for curl Message-ID: <176892665038.31326.6381534659276668649@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2026:20082-1 Release Date: 2026-01-14T11:01:44Z Rating: moderate References: * bsc#1255731 * bsc#1255732 * bsc#1255733 * bsc#1255734 * bsc#1256105 Cross-References: * CVE-2025-14017 * CVE-2025-14524 * CVE-2025-14819 * CVE-2025-15079 * CVE-2025-15224 CVSS scores: * CVE-2025-14017 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-14017 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-14017 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-14524 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-14524 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-14524 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-14819 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-14819 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-14819 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-15079 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-15079 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-15079 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-15224 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-15224 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2025-15224 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves five vulnerabilities can now be installed. ## Description: This update for curl fixes the following issues: This update for curl fixes the following issues: * CVE-2025-14017: broken TLS options for threaded LDAPS (bsc#1256105). * CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731). * CVE-2025-14819: libssh global knownhost override (bsc#1255732). * CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733). * CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-140=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-140=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * curl-debuginfo-8.14.1-160000.4.1 * libcurl-devel-8.14.1-160000.4.1 * curl-mini-debugsource-8.14.1-160000.4.1 * libcurl-mini4-debuginfo-8.14.1-160000.4.1 * libcurl4-debuginfo-8.14.1-160000.4.1 * libcurl-mini4-8.14.1-160000.4.1 * curl-debugsource-8.14.1-160000.4.1 * libcurl4-8.14.1-160000.4.1 * curl-8.14.1-160000.4.1 * SUSE Linux Enterprise Server 16.0 (noarch) * curl-zsh-completion-8.14.1-160000.4.1 * libcurl-devel-doc-8.14.1-160000.4.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * curl-debuginfo-8.14.1-160000.4.1 * libcurl-devel-8.14.1-160000.4.1 * curl-mini-debugsource-8.14.1-160000.4.1 * libcurl-mini4-debuginfo-8.14.1-160000.4.1 * libcurl4-debuginfo-8.14.1-160000.4.1 * libcurl-mini4-8.14.1-160000.4.1 * curl-debugsource-8.14.1-160000.4.1 * libcurl4-8.14.1-160000.4.1 * curl-8.14.1-160000.4.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * curl-zsh-completion-8.14.1-160000.4.1 * libcurl-devel-doc-8.14.1-160000.4.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14017.html * https://www.suse.com/security/cve/CVE-2025-14524.html * https://www.suse.com/security/cve/CVE-2025-14819.html * https://www.suse.com/security/cve/CVE-2025-15079.html * https://www.suse.com/security/cve/CVE-2025-15224.html * https://bugzilla.suse.com/show_bug.cgi?id=1255731 * https://bugzilla.suse.com/show_bug.cgi?id=1255732 * https://bugzilla.suse.com/show_bug.cgi?id=1255733 * https://bugzilla.suse.com/show_bug.cgi?id=1255734 * https://bugzilla.suse.com/show_bug.cgi?id=1256105 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 16:30:54 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 16:30:54 -0000 Subject: SUSE-SU-2026:20081-1: moderate: Security update for apache2 Message-ID: <176892665499.31326.13423059246443086730@smelt2.prg2.suse.org> # Security update for apache2 Announcement ID: SUSE-SU-2026:20081-1 Release Date: 2026-01-14T10:49:51Z Rating: moderate References: * bsc#1254511 * bsc#1254512 * bsc#1254514 * bsc#1254515 Cross-References: * CVE-2025-55753 * CVE-2025-58098 * CVE-2025-65082 * CVE-2025-66200 CVSS scores: * CVE-2025-55753 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-55753 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-55753 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-58098 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-58098 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-58098 ( NVD ): 8.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L * CVE-2025-65082 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-65082 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-65082 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-66200 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-66200 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-66200 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for apache2 fixes the following issues: * CVE-2025-55753: Fixed mod_md (ACME), unintended retry intervals (bsc#1254511) * CVE-2025-58098: Fixed Server Side Includes adds query string to #exec cmd (bsc#1254512) * CVE-2025-65082: Fixed CGI environment variable override (bsc#1254514) * CVE-2025-66200: Fixed mod_userdir+suexec bypass via AllowOverride FileInfo (bsc#1254515) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-139=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-139=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * apache2-2.4.63-160000.3.1 * apache2-debugsource-2.4.63-160000.3.1 * apache2-event-2.4.63-160000.3.1 * apache2-devel-2.4.63-160000.3.1 * apache2-event-debuginfo-2.4.63-160000.3.1 * apache2-prefork-debuginfo-2.4.63-160000.3.1 * apache2-utils-debugsource-2.4.63-160000.3.1 * apache2-event-debugsource-2.4.63-160000.3.1 * apache2-prefork-debugsource-2.4.63-160000.3.1 * apache2-utils-debuginfo-2.4.63-160000.3.1 * apache2-utils-2.4.63-160000.3.1 * apache2-prefork-2.4.63-160000.3.1 * apache2-worker-debugsource-2.4.63-160000.3.1 * apache2-debuginfo-2.4.63-160000.3.1 * apache2-worker-2.4.63-160000.3.1 * apache2-worker-debuginfo-2.4.63-160000.3.1 * SUSE Linux Enterprise Server 16.0 (noarch) * apache2-manual-2.4.63-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * apache2-2.4.63-160000.3.1 * apache2-debugsource-2.4.63-160000.3.1 * apache2-event-2.4.63-160000.3.1 * apache2-devel-2.4.63-160000.3.1 * apache2-event-debuginfo-2.4.63-160000.3.1 * apache2-prefork-debuginfo-2.4.63-160000.3.1 * apache2-utils-debugsource-2.4.63-160000.3.1 * apache2-event-debugsource-2.4.63-160000.3.1 * apache2-prefork-debugsource-2.4.63-160000.3.1 * apache2-utils-debuginfo-2.4.63-160000.3.1 * apache2-utils-2.4.63-160000.3.1 * apache2-prefork-2.4.63-160000.3.1 * apache2-worker-debugsource-2.4.63-160000.3.1 * apache2-debuginfo-2.4.63-160000.3.1 * apache2-worker-2.4.63-160000.3.1 * apache2-worker-debuginfo-2.4.63-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * apache2-manual-2.4.63-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-55753.html * https://www.suse.com/security/cve/CVE-2025-58098.html * https://www.suse.com/security/cve/CVE-2025-65082.html * https://www.suse.com/security/cve/CVE-2025-66200.html * https://bugzilla.suse.com/show_bug.cgi?id=1254511 * https://bugzilla.suse.com/show_bug.cgi?id=1254512 * https://bugzilla.suse.com/show_bug.cgi?id=1254514 * https://bugzilla.suse.com/show_bug.cgi?id=1254515 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 16:30:59 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 16:30:59 -0000 Subject: SUSE-SU-2026:20080-1: important: Security update for gpg2 Message-ID: <176892665950.31326.13974239106595098921@smelt2.prg2.suse.org> # Security update for gpg2 Announcement ID: SUSE-SU-2026:20080-1 Release Date: 2026-01-14T10:23:16Z Rating: important References: * bsc#1255715 * bsc#1256244 * bsc#1256246 * bsc#1256390 Cross-References: * CVE-2025-68973 CVSS scores: * CVE-2025-68973 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-68973 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-68973 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability and has three fixes can now be installed. ## Description: This update for gpg2 fixes the following issues: * CVE-2025-68973: out-of-bounds write when processing specially crafted input in the armor parser can lead to memory corruption (bsc#1255715). Other security fixes: * gpg: Avoid potential downgrade to SHA1 in 3rd party key signatures (bsc#1256246). * gpg: Error out on unverified output for non-detached signatures (bsc#1256244). * gpg: Deprecate the option --not-dash-escaped (bsc#1256390). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-138=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-138=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * gpg2-debugsource-2.5.5-160000.3.1 * gpg2-tpm-2.5.5-160000.3.1 * dirmngr-2.5.5-160000.3.1 * gpg2-2.5.5-160000.3.1 * gpg2-tpm-debuginfo-2.5.5-160000.3.1 * dirmngr-debuginfo-2.5.5-160000.3.1 * gpg2-debuginfo-2.5.5-160000.3.1 * SUSE Linux Enterprise Server 16.0 (noarch) * gpg2-lang-2.5.5-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * gpg2-debugsource-2.5.5-160000.3.1 * gpg2-tpm-2.5.5-160000.3.1 * dirmngr-2.5.5-160000.3.1 * gpg2-2.5.5-160000.3.1 * gpg2-tpm-debuginfo-2.5.5-160000.3.1 * dirmngr-debuginfo-2.5.5-160000.3.1 * gpg2-debuginfo-2.5.5-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * gpg2-lang-2.5.5-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-68973.html * https://bugzilla.suse.com/show_bug.cgi?id=1255715 * https://bugzilla.suse.com/show_bug.cgi?id=1256244 * https://bugzilla.suse.com/show_bug.cgi?id=1256246 * https://bugzilla.suse.com/show_bug.cgi?id=1256390 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 16:31:02 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 16:31:02 -0000 Subject: SUSE-RU-2026:20079-1: moderate: Recommended update for hyper-v Message-ID: <176892666208.31326.3972896068477360472@smelt2.prg2.suse.org> # Recommended update for hyper-v Announcement ID: SUSE-RU-2026:20079-1 Release Date: 2026-01-14T09:25:29Z Rating: moderate References: * bsc#1244154 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that has one fix can now be installed. ## Description: This update for hyper-v fixes the following issues: * fcopy: Fix irregularities with size of ring buffer * fcopy: Fix incorrect file path conversion * enable debug logs for hv_kvp_daemon (bsc#1244154) * update route parsing in kvp daemon * reduce resource usage in hv_kvp_daemon * reduce resouce usage in hv_get_dns_info helper * hv_kvp_daemon: Pass NIC name to hv_get_dns_info as well * terminate fcopy daemon if read from uio fails * change permissions of NetworkManager configuration file * fix a complier warning in the fcopy uio daemon * remove obsolete kvptest.ps1.txt which failed since a decade * remove obsolete rpm postinstall code for SLE11SP2 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-137=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-137=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 x86_64) * hyper-v-debugsource-9-160000.3.1 * hyper-v-debuginfo-9-160000.3.1 * hyper-v-9-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * hyper-v-debugsource-9-160000.3.1 * hyper-v-debuginfo-9-160000.3.1 * hyper-v-9-160000.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1244154 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 16:31:04 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 16:31:04 -0000 Subject: SUSE-SU-2026:20078-1: important: Security update for squid Message-ID: <176892666473.31326.14082603393737808144@smelt2.prg2.suse.org> # Security update for squid Announcement ID: SUSE-SU-2026:20078-1 Release Date: 2026-01-14T08:39:17Z Rating: important References: * bsc#1250627 * bsc#1252281 Cross-References: * CVE-2025-59362 * CVE-2025-62168 CVSS scores: * CVE-2025-59362 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-59362 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-59362 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-62168 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N * CVE-2025-62168 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N * CVE-2025-62168 ( NVD ): 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-62168 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for squid fixes the following issues: * CVE-2025-62168: failure to redact HTTP authentication credentials in error handling leads to the disclosure of credentials a trusted client uses to authenticate (bsc#1252281). * CVE-2025-59362: SNMP message processing component of Squid Cache can lead to stack-based buffer overflow (bsc#1250627). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-136=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-136=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * squid-debugsource-6.12-160000.3.1 * squid-debuginfo-6.12-160000.3.1 * squid-6.12-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * squid-debugsource-6.12-160000.3.1 * squid-debuginfo-6.12-160000.3.1 * squid-6.12-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-59362.html * https://www.suse.com/security/cve/CVE-2025-62168.html * https://bugzilla.suse.com/show_bug.cgi?id=1250627 * https://bugzilla.suse.com/show_bug.cgi?id=1252281 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 16:31:08 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 16:31:08 -0000 Subject: SUSE-SU-2026:20077-1: important: Security update for python-uv Message-ID: <176892666891.31326.958992778459789996@smelt2.prg2.suse.org> # Security update for python-uv Announcement ID: SUSE-SU-2026:20077-1 Release Date: 2026-01-13T12:48:04Z Rating: important References: * bsc#1249011 * bsc#1252399 Cross-References: * CVE-2025-58160 * CVE-2025-62518 CVSS scores: * CVE-2025-58160 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-58160 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2025-58160 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-62518 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-62518 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2025-62518 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves two vulnerabilities can now be installed. ## Description: This update for python-uv fixes the following issues: * CVE-2025-62518: astral-tokio-tar: Fixed boundary parsing issue allowing attackers to smuggle additional archive entries (bsc#1252399) * CVE-2025-58160: tracing-subscriber: Fixed log pollution (bsc#1249011) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-135=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-135=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * python313-uv-0.7.18-160000.3.1 * python-uv-debugsource-0.7.18-160000.3.1 * python313-uv-debuginfo-0.7.18-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * python313-uv-0.7.18-160000.3.1 * python-uv-debugsource-0.7.18-160000.3.1 * python313-uv-debuginfo-0.7.18-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-58160.html * https://www.suse.com/security/cve/CVE-2025-62518.html * https://bugzilla.suse.com/show_bug.cgi?id=1249011 * https://bugzilla.suse.com/show_bug.cgi?id=1252399 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 16:31:13 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 16:31:13 -0000 Subject: SUSE-SU-2026:0185-1: important: Security update for the Linux Kernel (Live Patch 45 for SUSE Linux Enterprise 15 SP4) Message-ID: <176892667369.31326.1332364675188015560@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 45 for SUSE Linux Enterprise 15 SP4) Announcement ID: SUSE-SU-2026:0185-1 Release Date: 2026-01-20T11:08:06Z Rating: important References: * bsc#1251165 * bsc#1251787 * bsc#1253437 * bsc#1254451 Cross-References: * CVE-2022-50327 * CVE-2022-50490 * CVE-2023-53676 * CVE-2025-40204 CVSS scores: * CVE-2022-50327 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves four vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.179 fixes various security issues The following security issues were fixed: * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1254451). * CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251165). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-185=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-185=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_179-default-debuginfo-4-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_45-debugsource-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_179-default-4-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_179-default-debuginfo-4-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_45-debugsource-4-150400.2.1 * kernel-livepatch-5_14_21-150400_24_179-default-4-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50327.html * https://www.suse.com/security/cve/CVE-2022-50490.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1251165 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1254451 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 16:31:22 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 16:31:22 -0000 Subject: SUSE-SU-2026:0184-1: important: Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) Message-ID: <176892668258.31326.8713389666572754467@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 28 for SUSE Linux Enterprise 15 SP5) Announcement ID: SUSE-SU-2026:0184-1 Release Date: 2026-01-20T09:34:00Z Rating: important References: * bsc#1248400 * bsc#1248615 * bsc#1248670 * bsc#1250665 * bsc#1251165 * bsc#1251203 * bsc#1251787 * bsc#1253437 * bsc#1254451 Cross-References: * CVE-2022-50327 * CVE-2022-50409 * CVE-2022-50490 * CVE-2023-53676 * CVE-2024-58239 * CVE-2025-38476 * CVE-2025-38572 * CVE-2025-38608 * CVE-2025-40204 CVSS scores: * CVE-2022-50327 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50409 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves nine vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.113 fixes various security issues The following security issues were fixed: * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1254451). * CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory (bsc#1250665). * CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251165). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1248615). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-184=1 SUSE-2026-182=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-184=1 SUSE-SLE- Module-Live-Patching-15-SP5-2026-182=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_110-default-debuginfo-11-150500.2.1 * kernel-livepatch-5_14_21-150500_55_110-default-11-150500.2.1 * kernel-livepatch-5_14_21-150500_55_113-default-10-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_28-debugsource-10-150500.2.1 * kernel-livepatch-5_14_21-150500_55_113-default-debuginfo-10-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_27-debugsource-11-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_110-default-debuginfo-11-150500.2.1 * kernel-livepatch-5_14_21-150500_55_110-default-11-150500.2.1 * kernel-livepatch-5_14_21-150500_55_113-default-10-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_28-debugsource-10-150500.2.1 * kernel-livepatch-5_14_21-150500_55_113-default-debuginfo-10-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_27-debugsource-11-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50327.html * https://www.suse.com/security/cve/CVE-2022-50409.html * https://www.suse.com/security/cve/CVE-2022-50490.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2024-58239.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1248615 * https://bugzilla.suse.com/show_bug.cgi?id=1248670 * https://bugzilla.suse.com/show_bug.cgi?id=1250665 * https://bugzilla.suse.com/show_bug.cgi?id=1251165 * https://bugzilla.suse.com/show_bug.cgi?id=1251203 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1254451 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 20:30:09 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 20:30:09 -0000 Subject: SUSE-SU-2026:0188-1: important: Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5) Message-ID: <176894100994.31326.15229755595460373226@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 31 for SUSE Linux Enterprise 15 SP5) Announcement ID: SUSE-SU-2026:0188-1 Release Date: 2026-01-20T14:06:23Z Rating: important References: * bsc#1251165 * bsc#1251203 * bsc#1251787 * bsc#1253437 * bsc#1254451 Cross-References: * CVE-2022-50327 * CVE-2022-50490 * CVE-2023-53676 * CVE-2025-38476 * CVE-2025-40204 CVSS scores: * CVE-2022-50327 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves five vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.124 fixes various security issues The following security issues were fixed: * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1254451). * CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251165). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-188=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-188=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_31-debugsource-3-150500.2.1 * kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-3-150500.2.1 * kernel-livepatch-5_14_21-150500_55_124-default-3-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_31-debugsource-3-150500.2.1 * kernel-livepatch-5_14_21-150500_55_124-default-debuginfo-3-150500.2.1 * kernel-livepatch-5_14_21-150500_55_124-default-3-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50327.html * https://www.suse.com/security/cve/CVE-2022-50490.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1251165 * https://bugzilla.suse.com/show_bug.cgi?id=1251203 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1254451 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 20:30:17 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 20:30:17 -0000 Subject: SUSE-SU-2026:0187-1: important: Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5) Message-ID: <176894101714.31326.1201136354185338174@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 30 for SUSE Linux Enterprise 15 SP5) Announcement ID: SUSE-SU-2026:0187-1 Release Date: 2026-01-20T12:46:06Z Rating: important References: * bsc#1248400 * bsc#1250665 * bsc#1251165 * bsc#1251203 * bsc#1251787 * bsc#1253437 * bsc#1254451 Cross-References: * CVE-2022-50327 * CVE-2022-50409 * CVE-2022-50490 * CVE-2023-53676 * CVE-2025-38476 * CVE-2025-38572 * CVE-2025-40204 CVSS scores: * CVE-2022-50327 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50409 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves seven vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.121 fixes various security issues The following security issues were fixed: * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1254451). * CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory (bsc#1250665). * CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251165). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-187=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-187=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_30-debugsource-5-150500.2.1 * kernel-livepatch-5_14_21-150500_55_121-default-debuginfo-5-150500.2.1 * kernel-livepatch-5_14_21-150500_55_121-default-5-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_30-debugsource-5-150500.2.1 * kernel-livepatch-5_14_21-150500_55_121-default-debuginfo-5-150500.2.1 * kernel-livepatch-5_14_21-150500_55_121-default-5-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50327.html * https://www.suse.com/security/cve/CVE-2022-50409.html * https://www.suse.com/security/cve/CVE-2022-50490.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1250665 * https://bugzilla.suse.com/show_bug.cgi?id=1251165 * https://bugzilla.suse.com/show_bug.cgi?id=1251203 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1254451 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 20:30:26 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 20:30:26 -0000 Subject: SUSE-SU-2026:0186-1: important: Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5) Message-ID: <176894102613.31326.1762419349072104290@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 29 for SUSE Linux Enterprise 15 SP5) Announcement ID: SUSE-SU-2026:0186-1 Release Date: 2026-01-20T12:45:55Z Rating: important References: * bsc#1248400 * bsc#1248615 * bsc#1248670 * bsc#1250665 * bsc#1251165 * bsc#1251203 * bsc#1251787 * bsc#1253437 * bsc#1254451 Cross-References: * CVE-2022-50327 * CVE-2022-50409 * CVE-2022-50490 * CVE-2023-53676 * CVE-2024-58239 * CVE-2025-38476 * CVE-2025-38572 * CVE-2025-38608 * CVE-2025-40204 CVSS scores: * CVE-2022-50327 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50409 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves nine vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.116 fixes various security issues The following security issues were fixed: * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1254451). * CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory (bsc#1250665). * CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251165). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1248615). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-186=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-186=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_29-debugsource-8-150500.2.1 * kernel-livepatch-5_14_21-150500_55_116-default-8-150500.2.1 * kernel-livepatch-5_14_21-150500_55_116-default-debuginfo-8-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_116-default-8-150500.2.1 * kernel-livepatch-5_14_21-150500_55_116-default-debuginfo-8-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x) * kernel-livepatch-SLE15-SP5_Update_29-debugsource-8-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50327.html * https://www.suse.com/security/cve/CVE-2022-50409.html * https://www.suse.com/security/cve/CVE-2022-50490.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2024-58239.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1248615 * https://bugzilla.suse.com/show_bug.cgi?id=1248670 * https://bugzilla.suse.com/show_bug.cgi?id=1250665 * https://bugzilla.suse.com/show_bug.cgi?id=1251165 * https://bugzilla.suse.com/show_bug.cgi?id=1251203 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1254451 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jan 20 20:30:31 2026 From: null at suse.de (SLE-UPDATES) Date: Tue, 20 Jan 2026 20:30:31 -0000 Subject: SUSE-RU-2026:0189-1: moderate: Recommended update for release-notes-sle_hpc Message-ID: <176894103144.31326.5122995255216848136@smelt2.prg2.suse.org> # Recommended update for release-notes-sle_hpc Announcement ID: SUSE-RU-2026:0189-1 Release Date: 2026-01-20T15:15:59Z Rating: moderate References: * bsc#1229862 * bsc#1235749 * bsc#1235766 * bsc#933411 * jsc#PED-12383 * jsc#PED-6787 Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS An update that contains two features and has four fixes can now be installed. ## Description: This update for release-notes-sle_hpc fixes the following issues: * Upgrade version to 15.6.20251031 (bsc#933411) * Added apptainer info (bsc#1235749) * Added warewulf 4.5.8 update info (bsc#1235766) * Added note about hdf5 deprecation (jsc#PED-12383) * Added Slurm deprecation notice (jsc#PED-6787) * fixed obsolete link (bsc#1229862) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-189=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-189=1 ## Package List: * openSUSE Leap 15.6 (noarch) * release-notes-sle_hpc-15.600000000.20251031-150600.3.6.33 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * release-notes-sle_hpc-15.600000000.20251031-150600.3.6.33 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1229862 * https://bugzilla.suse.com/show_bug.cgi?id=1235749 * https://bugzilla.suse.com/show_bug.cgi?id=1235766 * https://bugzilla.suse.com/show_bug.cgi?id=933411 * https://jira.suse.com/browse/PED-12383 * https://jira.suse.com/browse/PED-6787 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 21 08:30:05 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Jan 2026 08:30:05 -0000 Subject: SUSE-SU-2026:0190-1: moderate: Security update for abseil-cpp Message-ID: <176898420569.31307.4964973605925094531@smelt2.prg2.suse.org> # Security update for abseil-cpp Announcement ID: SUSE-SU-2026:0190-1 Release Date: 2026-01-20T16:57:29Z Rating: moderate References: * bsc#1237543 Cross-References: * CVE-2025-0838 CVSS scores: * CVE-2025-0838 ( SUSE ): 5.9 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:A/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L * CVE-2025-0838 ( SUSE ): 5.6 CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L * CVE-2025-0838 ( NVD ): 5.9 CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:A/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-0838 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 An update that solves one vulnerability can now be installed. ## Description: This update for abseil-cpp fixes the following issues: * CVE-2025-0838: Fixed potential integer overflow in hash container create/resize (bsc#1237543). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2026-190=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * abseil-cpp-devel-20211102.0-150300.7.9.1 * abseil-cpp-debuginfo-20211102.0-150300.7.9.1 * abseil-cpp-20211102.0-150300.7.9.1 * abseil-cpp-debugsource-20211102.0-150300.7.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-0838.html * https://bugzilla.suse.com/show_bug.cgi?id=1237543 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 21 12:30:12 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Jan 2026 12:30:12 -0000 Subject: SUSE-SU-2026:0191-1: important: Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise 15 SP4) Message-ID: <176899861210.31326.16889287572746266796@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 43 for SUSE Linux Enterprise 15 SP4) Announcement ID: SUSE-SU-2026:0191-1 Release Date: 2026-01-20T21:05:44Z Rating: important References: * bsc#1248400 * bsc#1248615 * bsc#1248670 * bsc#1249242 * bsc#1250665 * bsc#1251165 * bsc#1251203 * bsc#1251787 * bsc#1253437 * bsc#1254451 Cross-References: * CVE-2022-50233 * CVE-2022-50327 * CVE-2022-50409 * CVE-2022-50490 * CVE-2023-53676 * CVE-2024-58239 * CVE-2025-38476 * CVE-2025-38572 * CVE-2025-38608 * CVE-2025-40204 CVSS scores: * CVE-2022-50233 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50233 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50233 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50327 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50409 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Live Patching 15-SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Real Time 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves 10 vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.173 fixes various security issues The following security issues were fixed: * CVE-2022-50233: bluetooth: device name can cause reading kernel memory by not supplying terminal \0 (bsc#1249242). * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1254451). * CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory (bsc#1250665). * CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251165). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1248615). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-191=1 * SUSE Linux Enterprise Live Patching 15-SP4 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2026-191=1 ## Package List: * openSUSE Leap 15.4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_173-default-7-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_43-debugsource-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-7-150400.2.1 * SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150400_24_173-default-7-150400.2.1 * kernel-livepatch-SLE15-SP4_Update_43-debugsource-7-150400.2.1 * kernel-livepatch-5_14_21-150400_24_173-default-debuginfo-7-150400.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50233.html * https://www.suse.com/security/cve/CVE-2022-50327.html * https://www.suse.com/security/cve/CVE-2022-50409.html * https://www.suse.com/security/cve/CVE-2022-50490.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2024-58239.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1248615 * https://bugzilla.suse.com/show_bug.cgi?id=1248670 * https://bugzilla.suse.com/show_bug.cgi?id=1249242 * https://bugzilla.suse.com/show_bug.cgi?id=1250665 * https://bugzilla.suse.com/show_bug.cgi?id=1251165 * https://bugzilla.suse.com/show_bug.cgi?id=1251203 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1254451 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 21 12:30:15 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Jan 2026 12:30:15 -0000 Subject: SUSE-SU-2026:0192-1: moderate: Security update for libpng16 Message-ID: <176899861507.31326.4849182625683926458@smelt2.prg2.suse.org> # Security update for libpng16 Announcement ID: SUSE-SU-2026:0192-1 Release Date: 2026-01-21T03:33:46Z Rating: moderate References: * bsc#1256525 Cross-References: * CVE-2026-22695 CVSS scores: * CVE-2026-22695 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22695 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H * CVE-2026-22695 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libpng16 fixes the following issues: * CVE-2026-22695: Fixed heap buffer over-read in png_image_finish_read (bsc#1256525) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-192=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libpng16-16-debuginfo-32bit-1.6.8-15.15.1 * libpng16-16-debuginfo-1.6.8-15.15.1 * libpng16-devel-1.6.8-15.15.1 * libpng16-compat-devel-1.6.8-15.15.1 * libpng16-debugsource-1.6.8-15.15.1 * libpng16-16-1.6.8-15.15.1 * libpng16-16-32bit-1.6.8-15.15.1 ## References: * https://www.suse.com/security/cve/CVE-2026-22695.html * https://bugzilla.suse.com/show_bug.cgi?id=1256525 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 21 16:30:03 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Jan 2026 16:30:03 -0000 Subject: SUSE-SU-2026:0199-1: moderate: Security update for python-FontTools Message-ID: <176901300366.3075.17512172759917025410@smelt2.prg2.suse.org> # Security update for python-FontTools Announcement ID: SUSE-SU-2026:0199-1 Release Date: 2026-01-21T11:04:01Z Rating: moderate References: * bsc#1254366 Cross-References: * CVE-2025-66034 CVSS scores: * CVE-2025-66034 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-66034 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L * CVE-2025-66034 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L * CVE-2025-66034 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for python-FontTools fixes the following issues: * CVE-2025-66034: Fixed arbitrary file write vulnerability that could lead to remote code execution (bsc#1254366). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-199=1 openSUSE-SLE-15.6-2026-199=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-199=1 ## Package List: * openSUSE Leap 15.6 (noarch) * python311-FontTools-4.47.2-150600.3.3.1 * SUSE Package Hub 15 15-SP7 (noarch) * python311-FontTools-4.47.2-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-66034.html * https://bugzilla.suse.com/show_bug.cgi?id=1254366 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 21 16:30:07 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Jan 2026 16:30:07 -0000 Subject: SUSE-SU-2026:0198-1: important: Security update for ffmpeg-4 Message-ID: <176901300732.3075.11563223510160284823@smelt2.prg2.suse.org> # Security update for ffmpeg-4 Announcement ID: SUSE-SU-2026:0198-1 Release Date: 2026-01-21T10:16:25Z Rating: important References: * bsc#1220545 * bsc#1255392 Cross-References: * CVE-2023-6601 * CVE-2025-63757 CVSS scores: * CVE-2023-6601 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2023-6601 ( NVD ): 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N * CVE-2023-6601 ( NVD ): 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N * CVE-2025-63757 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-63757 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-63757 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for ffmpeg-4 fixes the following issues: * CVE-2023-6601: Fixed HLS Unsafe File Extension Bypass (bsc#1220545). * CVE-2025-63757: Fixed integer overflow in yuv2ya16_X_c_template() (bsc#1255392). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-198=1 openSUSE-SLE-15.6-2026-198=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-198=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2026-198=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libavcodec58_134-4.4.6-150600.13.38.1 * libavfilter7_110-4.4.6-150600.13.38.1 * ffmpeg-4-libswscale-devel-4.4.6-150600.13.38.1 * ffmpeg-4-libavcodec-devel-4.4.6-150600.13.38.1 * ffmpeg-4-debuginfo-4.4.6-150600.13.38.1 * libswscale5_9-debuginfo-4.4.6-150600.13.38.1 * ffmpeg-4-4.4.6-150600.13.38.1 * libavdevice58_13-debuginfo-4.4.6-150600.13.38.1 * libavcodec58_134-debuginfo-4.4.6-150600.13.38.1 * ffmpeg-4-libavdevice-devel-4.4.6-150600.13.38.1 * libavfilter7_110-debuginfo-4.4.6-150600.13.38.1 * ffmpeg-4-libpostproc-devel-4.4.6-150600.13.38.1 * libswresample3_9-4.4.6-150600.13.38.1 * libavdevice58_13-4.4.6-150600.13.38.1 * ffmpeg-4-libavutil-devel-4.4.6-150600.13.38.1 * libavutil56_70-4.4.6-150600.13.38.1 * libavformat58_76-debuginfo-4.4.6-150600.13.38.1 * ffmpeg-4-libavformat-devel-4.4.6-150600.13.38.1 * ffmpeg-4-private-devel-4.4.6-150600.13.38.1 * ffmpeg-4-libswresample-devel-4.4.6-150600.13.38.1 * libavutil56_70-debuginfo-4.4.6-150600.13.38.1 * ffmpeg-4-debugsource-4.4.6-150600.13.38.1 * libavresample4_0-4.4.6-150600.13.38.1 * libpostproc55_9-debuginfo-4.4.6-150600.13.38.1 * libswresample3_9-debuginfo-4.4.6-150600.13.38.1 * ffmpeg-4-libavresample-devel-4.4.6-150600.13.38.1 * ffmpeg-4-libavfilter-devel-4.4.6-150600.13.38.1 * libavformat58_76-4.4.6-150600.13.38.1 * libavresample4_0-debuginfo-4.4.6-150600.13.38.1 * libpostproc55_9-4.4.6-150600.13.38.1 * libswscale5_9-4.4.6-150600.13.38.1 * openSUSE Leap 15.6 (x86_64) * libavcodec58_134-32bit-4.4.6-150600.13.38.1 * libavutil56_70-32bit-4.4.6-150600.13.38.1 * libavformat58_76-32bit-debuginfo-4.4.6-150600.13.38.1 * libswscale5_9-32bit-debuginfo-4.4.6-150600.13.38.1 * libavfilter7_110-32bit-debuginfo-4.4.6-150600.13.38.1 * libpostproc55_9-32bit-4.4.6-150600.13.38.1 * libavfilter7_110-32bit-4.4.6-150600.13.38.1 * libavutil56_70-32bit-debuginfo-4.4.6-150600.13.38.1 * libavresample4_0-32bit-debuginfo-4.4.6-150600.13.38.1 * libpostproc55_9-32bit-debuginfo-4.4.6-150600.13.38.1 * libavdevice58_13-32bit-debuginfo-4.4.6-150600.13.38.1 * libswresample3_9-32bit-debuginfo-4.4.6-150600.13.38.1 * libswresample3_9-32bit-4.4.6-150600.13.38.1 * libavcodec58_134-32bit-debuginfo-4.4.6-150600.13.38.1 * libavformat58_76-32bit-4.4.6-150600.13.38.1 * libavresample4_0-32bit-4.4.6-150600.13.38.1 * libswscale5_9-32bit-4.4.6-150600.13.38.1 * libavdevice58_13-32bit-4.4.6-150600.13.38.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libavfilter7_110-64bit-debuginfo-4.4.6-150600.13.38.1 * libavformat58_76-64bit-debuginfo-4.4.6-150600.13.38.1 * libswscale5_9-64bit-debuginfo-4.4.6-150600.13.38.1 * libavformat58_76-64bit-4.4.6-150600.13.38.1 * libavresample4_0-64bit-4.4.6-150600.13.38.1 * libavresample4_0-64bit-debuginfo-4.4.6-150600.13.38.1 * libswresample3_9-64bit-debuginfo-4.4.6-150600.13.38.1 * libpostproc55_9-64bit-debuginfo-4.4.6-150600.13.38.1 * libswresample3_9-64bit-4.4.6-150600.13.38.1 * libavutil56_70-64bit-4.4.6-150600.13.38.1 * libavcodec58_134-64bit-4.4.6-150600.13.38.1 * libswscale5_9-64bit-4.4.6-150600.13.38.1 * libavdevice58_13-64bit-debuginfo-4.4.6-150600.13.38.1 * libpostproc55_9-64bit-4.4.6-150600.13.38.1 * libavdevice58_13-64bit-4.4.6-150600.13.38.1 * libavfilter7_110-64bit-4.4.6-150600.13.38.1 * libavcodec58_134-64bit-debuginfo-4.4.6-150600.13.38.1 * libavutil56_70-64bit-debuginfo-4.4.6-150600.13.38.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * libavcodec58_134-4.4.6-150600.13.38.1 * libavfilter7_110-4.4.6-150600.13.38.1 * ffmpeg-4-libswscale-devel-4.4.6-150600.13.38.1 * ffmpeg-4-libavcodec-devel-4.4.6-150600.13.38.1 * ffmpeg-4-debuginfo-4.4.6-150600.13.38.1 * libswscale5_9-debuginfo-4.4.6-150600.13.38.1 * ffmpeg-4-4.4.6-150600.13.38.1 * libavdevice58_13-debuginfo-4.4.6-150600.13.38.1 * libavcodec58_134-debuginfo-4.4.6-150600.13.38.1 * ffmpeg-4-libavdevice-devel-4.4.6-150600.13.38.1 * libavfilter7_110-debuginfo-4.4.6-150600.13.38.1 * ffmpeg-4-libpostproc-devel-4.4.6-150600.13.38.1 * libswresample3_9-4.4.6-150600.13.38.1 * libavdevice58_13-4.4.6-150600.13.38.1 * ffmpeg-4-libavutil-devel-4.4.6-150600.13.38.1 * libavutil56_70-4.4.6-150600.13.38.1 * libavformat58_76-debuginfo-4.4.6-150600.13.38.1 * ffmpeg-4-libavformat-devel-4.4.6-150600.13.38.1 * ffmpeg-4-private-devel-4.4.6-150600.13.38.1 * ffmpeg-4-libswresample-devel-4.4.6-150600.13.38.1 * libavutil56_70-debuginfo-4.4.6-150600.13.38.1 * ffmpeg-4-debugsource-4.4.6-150600.13.38.1 * libavresample4_0-4.4.6-150600.13.38.1 * libpostproc55_9-debuginfo-4.4.6-150600.13.38.1 * libswresample3_9-debuginfo-4.4.6-150600.13.38.1 * ffmpeg-4-libavresample-devel-4.4.6-150600.13.38.1 * ffmpeg-4-libavfilter-devel-4.4.6-150600.13.38.1 * libavformat58_76-4.4.6-150600.13.38.1 * libavresample4_0-debuginfo-4.4.6-150600.13.38.1 * libpostproc55_9-4.4.6-150600.13.38.1 * libswscale5_9-4.4.6-150600.13.38.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * libavcodec58_134-4.4.6-150600.13.38.1 * libswscale5_9-debuginfo-4.4.6-150600.13.38.1 * libavutil56_70-4.4.6-150600.13.38.1 * libswresample3_9-debuginfo-4.4.6-150600.13.38.1 * libavformat58_76-debuginfo-4.4.6-150600.13.38.1 * libavcodec58_134-debuginfo-4.4.6-150600.13.38.1 * libavformat58_76-4.4.6-150600.13.38.1 * libswresample3_9-4.4.6-150600.13.38.1 * libavutil56_70-debuginfo-4.4.6-150600.13.38.1 * ffmpeg-4-debuginfo-4.4.6-150600.13.38.1 * ffmpeg-4-debugsource-4.4.6-150600.13.38.1 * libswscale5_9-4.4.6-150600.13.38.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6601.html * https://www.suse.com/security/cve/CVE-2025-63757.html * https://bugzilla.suse.com/show_bug.cgi?id=1220545 * https://bugzilla.suse.com/show_bug.cgi?id=1255392 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 21 16:30:11 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Jan 2026 16:30:11 -0000 Subject: SUSE-SU-2026:0197-1: important: Security update for postgresql17, postgresql18 Message-ID: <176901301126.3075.3678375951552669120@smelt2.prg2.suse.org> # Security update for postgresql17, postgresql18 Announcement ID: SUSE-SU-2026:0197-1 Release Date: 2026-01-21T09:32:00Z Rating: important References: * bsc#1253332 * bsc#1253333 Cross-References: * CVE-2025-12817 * CVE-2025-12818 CVSS scores: * CVE-2025-12817 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-12817 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-12817 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-12818 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-12818 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-12818 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for postgresql17, postgresql18 fixes the following issues: Changes in postgresql18: * Fix build with uring for post SLE15 code streams. Update to 18.1: * https://www.postgresql.org/about/news/p-3171/ * https://www.postgresql.org/docs/release/18.1/ * bsc#1253332, CVE-2025-12817: Missing check for CREATE privileges on the schema in CREATE STATISTICS allowed table owners to create statistics in any schema, potentially leading to unexpected naming conflicts. * bsc#1253333, CVE-2025-12818: Several places in libpq were not sufficiently careful about computing the required size of a memory allocation. Sufficiently large inputs could cause integer overflow, resulting in an undersized buffer, which would then lead to writing past the end of the buffer. * pg_config --libs returns -lnuma so we need to require it. Update to 18.0: * https://www.postgresql.org/about/news/p-3142/ * https://www.postgresql.org/docs/18/release-18.html Changes in postgresql17: Update to 17.7: * https://www.postgresql.org/about/news/p-3171/ * https://www.postgresql.org/docs/release/17.7/ * bsc#1253332, CVE-2025-12817: Missing check for CREATE privileges on the schema in CREATE STATISTICS allowed table owners to create statistics in any schema, potentially leading to unexpected naming conflicts. * bsc#1253333, CVE-2025-12818: Several places in libpq were not sufficiently careful about computing the required size of a memory allocation. Sufficiently large inputs could cause integer overflow, resulting in an undersized buffer, which would then lead to writing past the end of the buffer. * switch library to pg 18 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-197=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-197=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libpq5-debuginfo-18.1-8.3.4 * libpq5-18.1-8.3.4 * libecpg6-debuginfo-18.1-8.3.4 * libecpg6-18.1-8.3.4 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * postgresql-18-4.32.1 * postgresql-server-18-4.32.1 * postgresql-docs-18-4.32.1 * postgresql-contrib-18-4.32.1 * postgresql-pltcl-18-4.32.1 * postgresql-server-devel-18-4.32.1 * postgresql-plperl-18-4.32.1 * postgresql-devel-18-4.32.1 * postgresql-plpython-18-4.32.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libecpg6-32bit-18.1-8.3.4 * libecpg6-debuginfo-32bit-18.1-8.3.4 * libpq5-32bit-18.1-8.3.4 * libpq5-debuginfo-32bit-18.1-8.3.4 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libecpg6-32bit-18.1-8.3.4 * libpq5-32bit-18.1-8.3.4 * libpq5-debuginfo-32bit-18.1-8.3.4 * libpq5-18.1-8.3.4 * libecpg6-18.1-8.3.4 * libpq5-debuginfo-18.1-8.3.4 * libecpg6-debuginfo-32bit-18.1-8.3.4 * libecpg6-debuginfo-18.1-8.3.4 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * postgresql-18-4.32.1 * postgresql-server-18-4.32.1 * postgresql-docs-18-4.32.1 * postgresql-contrib-18-4.32.1 * postgresql-pltcl-18-4.32.1 * postgresql-server-devel-18-4.32.1 * postgresql-plperl-18-4.32.1 * postgresql-devel-18-4.32.1 * postgresql-plpython-18-4.32.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12817.html * https://www.suse.com/security/cve/CVE-2025-12818.html * https://bugzilla.suse.com/show_bug.cgi?id=1253332 * https://bugzilla.suse.com/show_bug.cgi?id=1253333 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 21 16:30:16 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Jan 2026 16:30:16 -0000 Subject: SUSE-SU-2026:0196-1: important: Security update for ovmf Message-ID: <176901301697.3075.11395341198604460108@smelt2.prg2.suse.org> # Security update for ovmf Announcement ID: SUSE-SU-2026:0196-1 Release Date: 2026-01-21T09:05:27Z Rating: important References: * bsc#1218881 * bsc#1218882 * bsc#1218883 * bsc#1218884 * bsc#1218885 Cross-References: * CVE-2023-45231 * CVE-2023-45232 * CVE-2023-45233 * CVE-2023-45234 * CVE-2023-45235 CVSS scores: * CVE-2023-45231 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-45231 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-45231 ( NVD ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-45232 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-45232 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-45232 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-45233 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-45233 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-45233 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-45234 ( SUSE ): 8.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H * CVE-2023-45234 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-45234 ( NVD ): 8.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H * CVE-2023-45235 ( SUSE ): 8.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H * CVE-2023-45235 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2023-45235 ( NVD ): 8.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves five vulnerabilities can now be installed. ## Description: This update for ovmf fixes the following issues: * CVE-2023-45231: Fixed out of bounds read when handling a ND Redirect message with truncated options (bsc#1218881). * CVE-2023-45232: Fixed infinite loop when parsing unknown options in the Destination Options header (bsc#1218882). * CVE-2023-45233: Fixed infinite loop when parsing a PadN option in the Destination Options header (bsc#1218883). * CVE-2023-45234: Fixed buffer overflow when processing DNS Servers option in a DHCPv6 Advertise message (bsc#1218884). * CVE-2023-45235: Fixed buffer overflow when handling Server ID option from a DHCPv6 proxy Advertise message (bsc#1218885). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-196=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-196=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 x86_64) * ovmf-2017+git1510945757.b2662641d5-3.55.1 * ovmf-tools-2017+git1510945757.b2662641d5-3.55.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * qemu-uefi-aarch64-2017+git1510945757.b2662641d5-3.55.1 * qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * ovmf-2017+git1510945757.b2662641d5-3.55.1 * ovmf-tools-2017+git1510945757.b2662641d5-3.55.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * qemu-ovmf-x86_64-2017+git1510945757.b2662641d5-3.55.1 ## References: * https://www.suse.com/security/cve/CVE-2023-45231.html * https://www.suse.com/security/cve/CVE-2023-45232.html * https://www.suse.com/security/cve/CVE-2023-45233.html * https://www.suse.com/security/cve/CVE-2023-45234.html * https://www.suse.com/security/cve/CVE-2023-45235.html * https://bugzilla.suse.com/show_bug.cgi?id=1218881 * https://bugzilla.suse.com/show_bug.cgi?id=1218882 * https://bugzilla.suse.com/show_bug.cgi?id=1218883 * https://bugzilla.suse.com/show_bug.cgi?id=1218884 * https://bugzilla.suse.com/show_bug.cgi?id=1218885 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 21 16:30:19 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Jan 2026 16:30:19 -0000 Subject: SUSE-SU-2026:0195-1: important: Security update for net-snmp Message-ID: <176901301937.3075.8457526553641802676@smelt2.prg2.suse.org> # Security update for net-snmp Announcement ID: SUSE-SU-2026:0195-1 Release Date: 2026-01-21T09:05:20Z Rating: important References: * bsc#1255491 Cross-References: * CVE-2025-68615 CVSS scores: * CVE-2025-68615 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68615 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68615 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for net-snmp fixes the following issues: * CVE-2025-68615: Fixed snmptrapd buffer overflow (bsc#1255491) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-195=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-195=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libsnmp40-debuginfo-5.9.4-14.11.1 * net-snmp-debugsource-5.9.4-14.11.1 * perl-SNMP-5.9.4-14.11.1 * net-snmp-devel-5.9.4-14.11.1 * snmp-mibs-5.9.4-14.11.1 * perl-SNMP-debuginfo-5.9.4-14.11.1 * net-snmp-debuginfo-5.9.4-14.11.1 * libsnmp40-5.9.4-14.11.1 * net-snmp-5.9.4-14.11.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libsnmp40-32bit-5.9.4-14.11.1 * libsnmp40-debuginfo-32bit-5.9.4-14.11.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libsnmp40-debuginfo-5.9.4-14.11.1 * libsnmp40-debuginfo-32bit-5.9.4-14.11.1 * net-snmp-debugsource-5.9.4-14.11.1 * perl-SNMP-5.9.4-14.11.1 * net-snmp-devel-5.9.4-14.11.1 * snmp-mibs-5.9.4-14.11.1 * perl-SNMP-debuginfo-5.9.4-14.11.1 * net-snmp-debuginfo-5.9.4-14.11.1 * libsnmp40-32bit-5.9.4-14.11.1 * libsnmp40-5.9.4-14.11.1 * net-snmp-5.9.4-14.11.1 ## References: * https://www.suse.com/security/cve/CVE-2025-68615.html * https://bugzilla.suse.com/show_bug.cgi?id=1255491 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 21 16:30:21 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Jan 2026 16:30:21 -0000 Subject: SUSE-SU-2026:0194-1: moderate: Security update for libsodium Message-ID: <176901302164.3075.5749154984704191805@smelt2.prg2.suse.org> # Security update for libsodium Announcement ID: SUSE-SU-2026:0194-1 Release Date: 2026-01-21T09:05:12Z Rating: moderate References: * bsc#1256070 Cross-References: * CVE-2025-15444 CVSS scores: * CVE-2025-15444 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2025-15444 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libsodium fixes the following issues: * CVE-2025-15444: fixed cryptographic bypass via improper elliptic curve point validation (bsc#1256070). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2026-194=1 ## Package List: * Public Cloud Module 12 (aarch64 ppc64le s390x x86_64) * libsodium23-1.0.16-1.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-15444.html * https://bugzilla.suse.com/show_bug.cgi?id=1256070 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 21 16:30:24 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Jan 2026 16:30:24 -0000 Subject: SUSE-SU-2026:0193-1: moderate: Security update for libvirt Message-ID: <176901302473.3075.5510141570825929984@smelt2.prg2.suse.org> # Security update for libvirt Announcement ID: SUSE-SU-2026:0193-1 Release Date: 2026-01-21T08:04:56Z Rating: moderate References: * bsc#1253278 * bsc#1253703 Cross-References: * CVE-2025-12748 * CVE-2025-13193 CVSS scores: * CVE-2025-12748 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-12748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-12748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-13193 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-13193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-13193 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for libvirt fixes the following issues: * CVE-2025-13193: Fixed umask for 'qemu-img' when creating external inactive snapshots (bsc#1253703) * CVE-2025-12748: Fixed check ACLs before parsing the whole domain XML (bsc#1253278) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-193=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libvirt-daemon-driver-network-5.1.0-13.45.1 * libvirt-daemon-hooks-5.1.0-13.45.1 * libvirt-daemon-driver-nodedev-debuginfo-5.1.0-13.45.1 * libvirt-daemon-lxc-5.1.0-13.45.1 * libvirt-daemon-config-network-5.1.0-13.45.1 * libvirt-nss-debuginfo-5.1.0-13.45.1 * libvirt-daemon-debuginfo-5.1.0-13.45.1 * libvirt-daemon-driver-secret-debuginfo-5.1.0-13.45.1 * libvirt-libs-5.1.0-13.45.1 * libvirt-daemon-driver-storage-logical-5.1.0-13.45.1 * libvirt-daemon-driver-storage-scsi-5.1.0-13.45.1 * libvirt-daemon-driver-storage-disk-5.1.0-13.45.1 * libvirt-daemon-qemu-5.1.0-13.45.1 * libvirt-5.1.0-13.45.1 * libvirt-debugsource-5.1.0-13.45.1 * libvirt-daemon-driver-libxl-debuginfo-5.1.0-13.45.1 * libvirt-lock-sanlock-debuginfo-5.1.0-13.45.1 * libvirt-daemon-5.1.0-13.45.1 * libvirt-daemon-driver-storage-mpath-debuginfo-5.1.0-13.45.1 * libvirt-daemon-driver-qemu-debuginfo-5.1.0-13.45.1 * libvirt-daemon-driver-storage-scsi-debuginfo-5.1.0-13.45.1 * libvirt-lock-sanlock-5.1.0-13.45.1 * libvirt-daemon-driver-storage-rbd-debuginfo-5.1.0-13.45.1 * libvirt-daemon-driver-storage-mpath-5.1.0-13.45.1 * libvirt-client-debuginfo-5.1.0-13.45.1 * libvirt-daemon-driver-network-debuginfo-5.1.0-13.45.1 * libvirt-client-5.1.0-13.45.1 * libvirt-daemon-driver-storage-logical-debuginfo-5.1.0-13.45.1 * libvirt-doc-5.1.0-13.45.1 * libvirt-daemon-driver-nwfilter-5.1.0-13.45.1 * libvirt-daemon-xen-5.1.0-13.45.1 * libvirt-devel-5.1.0-13.45.1 * libvirt-daemon-driver-storage-iscsi-debuginfo-5.1.0-13.45.1 * libvirt-daemon-driver-nodedev-5.1.0-13.45.1 * libvirt-daemon-driver-interface-debuginfo-5.1.0-13.45.1 * libvirt-daemon-driver-lxc-5.1.0-13.45.1 * libvirt-daemon-driver-storage-disk-debuginfo-5.1.0-13.45.1 * libvirt-daemon-driver-storage-core-debuginfo-5.1.0-13.45.1 * libvirt-daemon-driver-nwfilter-debuginfo-5.1.0-13.45.1 * libvirt-admin-5.1.0-13.45.1 * libvirt-daemon-driver-interface-5.1.0-13.45.1 * libvirt-libs-debuginfo-5.1.0-13.45.1 * libvirt-daemon-driver-secret-5.1.0-13.45.1 * libvirt-daemon-driver-lxc-debuginfo-5.1.0-13.45.1 * libvirt-daemon-driver-storage-rbd-5.1.0-13.45.1 * libvirt-admin-debuginfo-5.1.0-13.45.1 * libvirt-daemon-driver-storage-5.1.0-13.45.1 * libvirt-daemon-driver-storage-core-5.1.0-13.45.1 * libvirt-daemon-driver-qemu-5.1.0-13.45.1 * libvirt-daemon-config-nwfilter-5.1.0-13.45.1 * libvirt-daemon-driver-storage-iscsi-5.1.0-13.45.1 * libvirt-nss-5.1.0-13.45.1 * libvirt-daemon-driver-libxl-5.1.0-13.45.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12748.html * https://www.suse.com/security/cve/CVE-2025-13193.html * https://bugzilla.suse.com/show_bug.cgi?id=1253278 * https://bugzilla.suse.com/show_bug.cgi?id=1253703 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 21 20:30:10 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Jan 2026 20:30:10 -0000 Subject: SUSE-SU-2026:0206-1: important: Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5) Message-ID: <176902741041.31307.16234250158691654627@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 23 for SUSE Linux Enterprise 15 SP5) Announcement ID: SUSE-SU-2026:0206-1 Release Date: 2026-01-21T15:38:12Z Rating: important References: * bsc#1248400 * bsc#1248615 * bsc#1248670 * bsc#1250665 * bsc#1251165 * bsc#1251203 * bsc#1251787 * bsc#1253437 * bsc#1254451 Cross-References: * CVE-2022-50327 * CVE-2022-50409 * CVE-2022-50490 * CVE-2023-53676 * CVE-2024-58239 * CVE-2025-38476 * CVE-2025-38572 * CVE-2025-38608 * CVE-2025-40204 CVSS scores: * CVE-2022-50327 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50409 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves nine vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.94 fixes various security issues The following security issues were fixed: * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1254451). * CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory (bsc#1250665). * CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251165). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1248615). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-206=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-206=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_94-default-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_94-default-debuginfo-13-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_23-debugsource-13-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-5_14_21-150500_55_94-default-13-150500.2.1 * kernel-livepatch-5_14_21-150500_55_94-default-debuginfo-13-150500.2.1 * kernel-livepatch-SLE15-SP5_Update_23-debugsource-13-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50327.html * https://www.suse.com/security/cve/CVE-2022-50409.html * https://www.suse.com/security/cve/CVE-2022-50490.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2024-58239.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1248615 * https://bugzilla.suse.com/show_bug.cgi?id=1248670 * https://bugzilla.suse.com/show_bug.cgi?id=1250665 * https://bugzilla.suse.com/show_bug.cgi?id=1251165 * https://bugzilla.suse.com/show_bug.cgi?id=1251203 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1254451 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 21 20:30:13 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Jan 2026 20:30:13 -0000 Subject: SUSE-SU-2026:0204-1: important: Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise 15 SP6) Message-ID: <176902741382.31307.18345657333870713933@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 16 for SUSE Linux Enterprise 15 SP6) Announcement ID: SUSE-SU-2026:0204-1 Release Date: 2026-01-21T13:33:36Z Rating: important References: * bsc#1251787 * bsc#1253437 Cross-References: * CVE-2023-53676 * CVE-2025-40204 CVSS scores: * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6.4.0-150600.23.73 fixes various security issues The following security issues were fixed: * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-204=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-204=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_16-debugsource-2-150600.2.1 * kernel-livepatch-6_4_0-150600_23_73-default-debuginfo-2-150600.2.1 * kernel-livepatch-6_4_0-150600_23_73-default-2-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_16-debugsource-2-150600.2.1 * kernel-livepatch-6_4_0-150600_23_73-default-debuginfo-2-150600.2.1 * kernel-livepatch-6_4_0-150600_23_73-default-2-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 21 20:30:17 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Jan 2026 20:30:17 -0000 Subject: SUSE-SU-2026:0203-1: important: Security update for the Linux Kernel (Live Patch 15 for SUSE Linux Enterprise 15 SP6) Message-ID: <176902741763.31307.18276407807315212674@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 15 for SUSE Linux Enterprise 15 SP6) Announcement ID: SUSE-SU-2026:0203-1 Release Date: 2026-01-21T13:04:03Z Rating: important References: * bsc#1250192 * bsc#1251787 * bsc#1253437 Cross-References: * CVE-2023-53676 * CVE-2025-39682 * CVE-2025-40204 CVSS scores: * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves three vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6.4.0-150600.23.70 fixes various security issues The following security issues were fixed: * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1250192). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-203=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-203=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_70-default-5-150600.2.1 * kernel-livepatch-6_4_0-150600_23_70-default-debuginfo-5-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_15-debugsource-5-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_70-default-5-150600.2.1 * kernel-livepatch-6_4_0-150600_23_70-default-debuginfo-5-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_15-debugsource-5-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1250192 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 21 20:30:22 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Jan 2026 20:30:22 -0000 Subject: SUSE-SU-2026:0202-1: important: Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 15 SP7) Message-ID: <176902742217.31307.190518540792401223@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 3 for SUSE Linux Enterprise 15 SP7) Announcement ID: SUSE-SU-2026:0202-1 Release Date: 2026-01-21T14:35:51Z Rating: important References: * bsc#1248670 * bsc#1250192 * bsc#1251787 * bsc#1253437 Cross-References: * CVE-2023-53676 * CVE-2025-38608 * CVE-2025-39682 * CVE-2025-40204 CVSS scores: * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves four vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6.4.0-150700.53.11 fixes various security issues The following security issues were fixed: * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670). * CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1250192). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2026-205=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-202=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-202=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP7_Update_3-debugsource-5-150700.2.1 * kernel-livepatch-6_4_0-150700_53_11-default-5-150700.2.1 * kernel-livepatch-6_4_0-150700_53_11-default-debuginfo-5-150700.2.1 * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_14-debugsource-5-150600.2.1 * kernel-livepatch-6_4_0-150600_23_65-default-debuginfo-5-150600.2.1 * kernel-livepatch-6_4_0-150600_23_65-default-5-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP6_Update_14-debugsource-5-150600.2.1 * kernel-livepatch-6_4_0-150600_23_65-default-debuginfo-5-150600.2.1 * kernel-livepatch-6_4_0-150600_23_65-default-5-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1248670 * https://bugzilla.suse.com/show_bug.cgi?id=1250192 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 21 20:30:27 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Jan 2026 20:30:27 -0000 Subject: SUSE-SU-2026:0200-1: important: Security update for the Linux Kernel (Live Patch 73 for SUSE Linux Enterprise 12 SP5) Message-ID: <176902742720.31307.11710391770199266433@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 73 for SUSE Linux Enterprise 12 SP5) Announcement ID: SUSE-SU-2026:0200-1 Release Date: 2026-01-21T12:17:10Z Rating: important References: * bsc#1250280 * bsc#1251787 * bsc#1252563 * bsc#1253437 * bsc#1254451 Cross-References: * CVE-2022-50327 * CVE-2022-50367 * CVE-2023-53676 * CVE-2023-53717 * CVE-2025-40204 CVSS scores: * CVE-2022-50327 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50367 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50367 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50367 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50367 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53717 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53717 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Live Patching 12-SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves five vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 4.12.14-122.275 fixes various security issues The following security issues were fixed: * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1254451). * CVE-2022-50367: fs: fix UAF/GPF bug in nilfs_mdt_destroy (bsc#1250280). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2023-53717: wifi: ath9k: Fix potential stack-out-of-bounds write in ath9k_wmi_rsp_callback() (bsc#1252563). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 12-SP5 zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2026-200=1 ## Package List: * SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64) * kgraft-patch-4_12_14-122_275-default-2-2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50327.html * https://www.suse.com/security/cve/CVE-2022-50367.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2023-53717.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1250280 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1252563 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1254451 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jan 21 20:30:29 2026 From: null at suse.de (SLE-UPDATES) Date: Wed, 21 Jan 2026 20:30:29 -0000 Subject: SUSE-RU-2026:0201-1: moderate: Recommended update for libheif Message-ID: <176902742961.31307.14805104584458200679@smelt2.prg2.suse.org> # Recommended update for libheif Announcement ID: SUSE-RU-2026:0201-1 Release Date: 2026-01-21T12:30:15Z Rating: moderate References: * bsc#1249446 Affected Products: * Desktop Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that has one fix can now be installed. ## Description: This update for libheif fixes the following issue: * missing aom, jpeg, dav1d, ffmpeg plugins are shipped to the Desktop Applications module (bsc#1249446). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-201=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-201=1 ## Package List: * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libheif-jpeg-1.19.5-150700.3.5.1 * libheif-rav1e-1.19.5-150700.3.5.1 * libheif-debugsource-1.19.5-150700.3.5.1 * libheif-rav1e-debuginfo-1.19.5-150700.3.5.1 * libheif-aom-1.19.5-150700.3.5.1 * libheif-dav1d-1.19.5-150700.3.5.1 * libheif-aom-debuginfo-1.19.5-150700.3.5.1 * libheif-jpeg-debuginfo-1.19.5-150700.3.5.1 * libheif1-debuginfo-1.19.5-150700.3.5.1 * libheif-dav1d-debuginfo-1.19.5-150700.3.5.1 * libheif1-1.19.5-150700.3.5.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * libheif-ffmpeg-debuginfo-1.19.5-150700.3.5.1 * gdk-pixbuf-loader-libheif-1.19.5-150700.3.5.1 * libheif-debugsource-1.19.5-150700.3.5.1 * libheif-ffmpeg-1.19.5-150700.3.5.1 * libheif-devel-1.19.5-150700.3.5.1 * gdk-pixbuf-loader-libheif-debuginfo-1.19.5-150700.3.5.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1249446 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 08:30:11 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 08:30:11 -0000 Subject: SUSE-SU-2026:0209-1: important: Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7) Message-ID: <176907061194.31326.1372120656311446051@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 4 for SUSE Linux Enterprise 15 SP7) Announcement ID: SUSE-SU-2026:0209-1 Release Date: 2026-01-21T18:03:57Z Rating: important References: * bsc#1250192 * bsc#1251787 * bsc#1253437 Cross-References: * CVE-2023-53676 * CVE-2025-39682 * CVE-2025-40204 CVSS scores: * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6.4.0-150700.53.16 fixes various security issues The following security issues were fixed: * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1250192). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2026-209=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150700_53_16-default-debuginfo-5-150700.2.1 * kernel-livepatch-6_4_0-150700_53_16-default-5-150700.2.1 * kernel-livepatch-SLE15-SP7_Update_4-debugsource-5-150700.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1250192 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 16:30:10 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 16:30:10 -0000 Subject: SUSE-SU-2026:0210-1: important: Security update for python3 Message-ID: <176909941009.16839.6750216248294206831@smelt2.prg2.suse.org> # Security update for python3 Announcement ID: SUSE-SU-2026:0210-1 Release Date: 2026-01-22T09:07:45Z Rating: important References: * bsc#1203750 * bsc#1244032 * bsc#1244056 * bsc#1244059 * bsc#1244060 * bsc#1244061 * bsc#1251841 Cross-References: * CVE-2007-4559 * CVE-2024-12718 * CVE-2025-4138 * CVE-2025-4330 * CVE-2025-4435 * CVE-2025-4517 CVSS scores: * CVE-2007-4559 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L * CVE-2007-4559 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2024-12718 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2024-12718 ( NVD ): 10.0 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2024-12718 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-4138 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N * CVE-2025-4138 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2025-4330 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2025-4330 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-4435 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2025-4435 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-4517 ( SUSE ): 7.5 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-4517 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-4517 ( NVD ): 9.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves six vulnerabilities and has one security fix can now be installed. ## Description: This update for python3 fixes the following issues: Security fixes: * CVE-2025-4517: Fixed arbitrary filesystem writes outside the extraction directory during extraction with filter="data" (bsc#1244032) * CVE-2025-4330: Fixed extraction filter bypass for linking outside extraction directory (bsc#1244060) * CVE-2007-4559: Fixed python tarfile module directory traversal (bsc#1203750) * CVE-2024-12718: Fixed bypass extraction filter to modify file metadata outside extraction directory (bsc#1244056) * CVE-2025-4138: Fixed symlinking targets to not point outside the destination directory, and the modification of some file metadata (bsc#1244059) * CVE-2025-4435: Fixed tarfile extracting filtered members when errorlevel=0 (bsc#1244061) Other fixes: * Fixed two shebangs with /usr/local/bin/python ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-210=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-210=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * python3-devel-3.4.10-25.169.1 * python3-base-debugsource-3.4.10-25.169.1 * python3-curses-debuginfo-3.4.10-25.169.1 * python3-base-debuginfo-3.4.10-25.169.1 * libpython3_4m1_0-3.4.10-25.169.1 * libpython3_4m1_0-debuginfo-3.4.10-25.169.1 * python3-3.4.10-25.169.1 * python3-curses-3.4.10-25.169.1 * python3-debuginfo-3.4.10-25.169.1 * python3-debugsource-3.4.10-25.169.1 * python3-tk-3.4.10-25.169.1 * python3-tk-debuginfo-3.4.10-25.169.1 * python3-base-3.4.10-25.169.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (ppc64le s390x x86_64) * python3-devel-debuginfo-3.4.10-25.169.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libpython3_4m1_0-32bit-3.4.10-25.169.1 * python3-base-debuginfo-32bit-3.4.10-25.169.1 * libpython3_4m1_0-debuginfo-32bit-3.4.10-25.169.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * python3-devel-3.4.10-25.169.1 * python3-devel-debuginfo-3.4.10-25.169.1 * python3-base-debugsource-3.4.10-25.169.1 * python3-base-debuginfo-32bit-3.4.10-25.169.1 * python3-curses-debuginfo-3.4.10-25.169.1 * python3-base-debuginfo-3.4.10-25.169.1 * libpython3_4m1_0-32bit-3.4.10-25.169.1 * libpython3_4m1_0-3.4.10-25.169.1 * libpython3_4m1_0-debuginfo-3.4.10-25.169.1 * python3-3.4.10-25.169.1 * python3-curses-3.4.10-25.169.1 * python3-debuginfo-3.4.10-25.169.1 * python3-debugsource-3.4.10-25.169.1 * python3-tk-3.4.10-25.169.1 * python3-tk-debuginfo-3.4.10-25.169.1 * python3-base-3.4.10-25.169.1 * libpython3_4m1_0-debuginfo-32bit-3.4.10-25.169.1 ## References: * https://www.suse.com/security/cve/CVE-2007-4559.html * https://www.suse.com/security/cve/CVE-2024-12718.html * https://www.suse.com/security/cve/CVE-2025-4138.html * https://www.suse.com/security/cve/CVE-2025-4330.html * https://www.suse.com/security/cve/CVE-2025-4435.html * https://www.suse.com/security/cve/CVE-2025-4517.html * https://bugzilla.suse.com/show_bug.cgi?id=1203750 * https://bugzilla.suse.com/show_bug.cgi?id=1244032 * https://bugzilla.suse.com/show_bug.cgi?id=1244056 * https://bugzilla.suse.com/show_bug.cgi?id=1244059 * https://bugzilla.suse.com/show_bug.cgi?id=1244060 * https://bugzilla.suse.com/show_bug.cgi?id=1244061 * https://bugzilla.suse.com/show_bug.cgi?id=1251841 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:30:04 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:30:04 -0000 Subject: SUSE-SU-2026:0247-1: important: Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 15 SP7) Message-ID: <176911380452.16839.1577344809728195703@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 5 for SUSE Linux Enterprise 15 SP7) Announcement ID: SUSE-SU-2026:0247-1 Release Date: 2026-01-22T15:22:23Z Rating: important References: * bsc#1251787 * bsc#1253437 Cross-References: * CVE-2023-53676 * CVE-2025-40204 CVSS scores: * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6.4.0-150700.53.19 fixes various security issues The following security issues were fixed: * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2026-247=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150700_53_19-default-2-150700.2.1 * kernel-livepatch-SLE15-SP7_Update_5-debugsource-2-150700.2.1 * kernel-livepatch-6_4_0-150700_53_19-default-debuginfo-2-150700.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:30:15 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:30:15 -0000 Subject: SUSE-SU-2026:0246-1: important: Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise 15 SP5) Message-ID: <176911381501.16839.9359477221362099759@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 22 for SUSE Linux Enterprise 15 SP5) Announcement ID: SUSE-SU-2026:0246-1 Release Date: 2026-01-22T15:19:55Z Rating: important References: * bsc#1235815 * bsc#1248400 * bsc#1248615 * bsc#1248670 * bsc#1250665 * bsc#1251165 * bsc#1251203 * bsc#1251787 * bsc#1253437 * bsc#1254451 Cross-References: * CVE-2022-50327 * CVE-2022-50409 * CVE-2022-50490 * CVE-2023-53676 * CVE-2024-57849 * CVE-2024-58239 * CVE-2025-38476 * CVE-2025-38572 * CVE-2025-38608 * CVE-2025-40204 CVSS scores: * CVE-2022-50327 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50327 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50327 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50409 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50409 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50409 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50490 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50490 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57849 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-58239 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-58239 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Live Patching 15-SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Real Time 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves 10 vulnerabilities can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 5.14.21-150500.55.91 fixes various security issues The following security issues were fixed: * CVE-2022-50327: ACPI: processor: idle: Check acpi_fetch_acpi_dev() return value (bsc#1254451). * CVE-2022-50409: net: If sock is dead don't access sock's sk_wq in sk_stream_wait_memory (bsc#1250665). * CVE-2022-50490: bpf: Propagate error from htab_lock_bucket() to userspace (bsc#1251165). * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2024-57849: s390/cpum_sf: handle CPU hotplug remove during sampling (bsc#1235815). * CVE-2024-58239: tls: stop recv() if initial process_rx_list gave us non-DATA (bsc#1248615). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-246=1 * SUSE Linux Enterprise Live Patching 15-SP5 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2026-246=1 ## Package List: * openSUSE Leap 15.5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_22-debugsource-17-150500.2.1 * kernel-livepatch-5_14_21-150500_55_91-default-17-150500.2.1 * kernel-livepatch-5_14_21-150500_55_91-default-debuginfo-17-150500.2.1 * SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64) * kernel-livepatch-SLE15-SP5_Update_22-debugsource-17-150500.2.1 * kernel-livepatch-5_14_21-150500_55_91-default-17-150500.2.1 * kernel-livepatch-5_14_21-150500_55_91-default-debuginfo-17-150500.2.1 ## References: * https://www.suse.com/security/cve/CVE-2022-50327.html * https://www.suse.com/security/cve/CVE-2022-50409.html * https://www.suse.com/security/cve/CVE-2022-50490.html * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2024-57849.html * https://www.suse.com/security/cve/CVE-2024-58239.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1235815 * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1248615 * https://bugzilla.suse.com/show_bug.cgi?id=1248670 * https://bugzilla.suse.com/show_bug.cgi?id=1250665 * https://bugzilla.suse.com/show_bug.cgi?id=1251165 * https://bugzilla.suse.com/show_bug.cgi?id=1251203 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1254451 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:30:19 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:30:19 -0000 Subject: SUSE-RU-2026:0249-1: moderate: Recommended update for libwebp Message-ID: <176911381931.16839.2605196400303733726@smelt2.prg2.suse.org> # Recommended update for libwebp Announcement ID: SUSE-RU-2026:0249-1 Release Date: 2026-01-22T15:23:52Z Rating: moderate References: * bsc#1252895 Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that has one fix can now be installed. ## Description: This update for libwebp ships the commandline tools to Package Hub. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-249=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-249=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-249=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libwebp-tools-debuginfo-1.0.3-150200.3.14.1 * libwebp-debugsource-1.0.3-150200.3.14.1 * libwebp7-1.0.3-150200.3.14.1 * libwebpmux3-debuginfo-1.0.3-150200.3.14.1 * libwebp7-debuginfo-1.0.3-150200.3.14.1 * libwebp-tools-1.0.3-150200.3.14.1 * libwebpdecoder3-debuginfo-1.0.3-150200.3.14.1 * libwebpdemux2-1.0.3-150200.3.14.1 * libwebp-devel-1.0.3-150200.3.14.1 * libwebpdecoder3-1.0.3-150200.3.14.1 * libwebpdemux2-debuginfo-1.0.3-150200.3.14.1 * libwebpmux3-1.0.3-150200.3.14.1 * openSUSE Leap 15.6 (x86_64) * libwebpdemux2-32bit-1.0.3-150200.3.14.1 * libwebpdecoder3-32bit-1.0.3-150200.3.14.1 * libwebp-devel-32bit-1.0.3-150200.3.14.1 * libwebpmux3-32bit-debuginfo-1.0.3-150200.3.14.1 * libwebpmux3-32bit-1.0.3-150200.3.14.1 * libwebpdecoder3-32bit-debuginfo-1.0.3-150200.3.14.1 * libwebp7-32bit-debuginfo-1.0.3-150200.3.14.1 * libwebpdemux2-32bit-debuginfo-1.0.3-150200.3.14.1 * libwebp7-32bit-1.0.3-150200.3.14.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libwebp-debugsource-1.0.3-150200.3.14.1 * libwebp7-1.0.3-150200.3.14.1 * libwebpmux3-debuginfo-1.0.3-150200.3.14.1 * libwebp7-debuginfo-1.0.3-150200.3.14.1 * libwebpdecoder3-debuginfo-1.0.3-150200.3.14.1 * libwebpdemux2-1.0.3-150200.3.14.1 * libwebp-devel-1.0.3-150200.3.14.1 * libwebpdecoder3-1.0.3-150200.3.14.1 * libwebpdemux2-debuginfo-1.0.3-150200.3.14.1 * libwebpmux3-1.0.3-150200.3.14.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * libwebp-tools-debuginfo-1.0.3-150200.3.14.1 * libwebp-tools-1.0.3-150200.3.14.1 * SUSE Package Hub 15 15-SP7 (x86_64) * libwebp7-32bit-1.0.3-150200.3.14.1 * libwebp7-32bit-debuginfo-1.0.3-150200.3.14.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1252895 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:30:16 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:30:16 -0000 Subject: SUSE-RU-2026:0250-1: moderate: Recommended update for openvswitch Message-ID: <176911381692.16839.8478063573929307430@smelt2.prg2.suse.org> # Recommended update for openvswitch Announcement ID: SUSE-RU-2026:0250-1 Release Date: 2026-01-22T15:25:43Z Rating: moderate References: * jsc#PED-13646 Affected Products: * Server Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that contains one feature can now be installed. ## Description: This update for openvswitch fixes the following issues: * OVN update to version 25.03.2 (jsc#PED-13646): * Bug fixes * Dynamic Routing: * Add the option "dynamic-routing-redistribute-local-only" to Logical Routers and Logical Router Ports which refines the way in which chassis-specific Advertised_Routes (e.g., for NAT and LB IPs) are advertised. * Add the option "dynamic-routing-vrf-id" to Logical Routers which allows CMS to specify the Linux routing table id for a given vrf. * Add ovn-nbctl lsp-add-router-port which will create router port on specified LS. * Add ovn-nbctl lsp-add-localnet-port which will create localnet port on specified LS. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-250=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2026-250=1 ## Package List: * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * openvswitch-debuginfo-3.5.2-150700.41.9.1 * openvswitch-debugsource-3.5.2-150700.41.9.1 * python3-openvswitch-3.5.2-150700.41.9.1 * python3-openvswitch-debuginfo-3.5.2-150700.41.9.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * openvswitch-debuginfo-3.5.2-150700.41.9.1 * openvswitch-3.5.2-150700.41.9.1 * openvswitch-pki-3.5.2-150700.41.9.1 * ovn-central-debuginfo-25.03.2-150700.41.9.1 * python3-openvswitch-debuginfo-3.5.2-150700.41.9.1 * openvswitch-vtep-3.5.2-150700.41.9.1 * openvswitch-vtep-debuginfo-3.5.2-150700.41.9.1 * python3-openvswitch-3.5.2-150700.41.9.1 * ovn-docker-25.03.2-150700.41.9.1 * ovn-host-debuginfo-25.03.2-150700.41.9.1 * libovn-25_03-0-25.03.2-150700.41.9.1 * openvswitch-devel-3.5.2-150700.41.9.1 * libovn-25_03-0-debuginfo-25.03.2-150700.41.9.1 * ovn-vtep-debuginfo-25.03.2-150700.41.9.1 * openvswitch-ipsec-3.5.2-150700.41.9.1 * libopenvswitch-3_5-0-3.5.2-150700.41.9.1 * libopenvswitch-3_5-0-debuginfo-3.5.2-150700.41.9.1 * ovn-debuginfo-25.03.2-150700.41.9.1 * openvswitch-debugsource-3.5.2-150700.41.9.1 * openvswitch-test-3.5.2-150700.41.9.1 * ovn-vtep-25.03.2-150700.41.9.1 * openvswitch-test-debuginfo-3.5.2-150700.41.9.1 * ovn-host-25.03.2-150700.41.9.1 * ovn-central-25.03.2-150700.41.9.1 * ovn-devel-25.03.2-150700.41.9.1 * ovn-25.03.2-150700.41.9.1 ## References: * https://jira.suse.com/browse/PED-13646 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:30:20 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:30:20 -0000 Subject: SUSE-RU-2026:0248-1: moderate: Recommended update for aliyun-cli Message-ID: <176911382070.16839.3299229590360618095@smelt2.prg2.suse.org> # Recommended update for aliyun-cli Announcement ID: SUSE-RU-2026:0248-1 Release Date: 2026-01-22T15:23:15Z Rating: moderate References: * jsc#PED-13767 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * Public Cloud Module 15-SP7 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that contains one feature can now be installed. ## Description: This update for aliyun-cli fixes the following issues: aliyun-cli is shipped in version 3.1.1. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2026-248=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2026-248=1 * Public Cloud Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2026-248=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-248=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-248=1 ## Package List: * Public Cloud Module 15-SP5 (aarch64 x86_64) * aliyun-cli-3.1.1-150400.9.3.1 * Public Cloud Module 15-SP6 (aarch64 x86_64) * aliyun-cli-3.1.1-150400.9.3.1 * Public Cloud Module 15-SP7 (aarch64 x86_64) * aliyun-cli-3.1.1-150400.9.3.1 * openSUSE Leap 15.4 (aarch64 ppc64le x86_64) * aliyun-cli-3.1.1-150400.9.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le x86_64) * aliyun-cli-3.1.1-150400.9.3.1 ## References: * https://jira.suse.com/browse/PED-13767 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:30:23 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:30:23 -0000 Subject: SUSE-SU-2026:0245-1: moderate: Security update for php7 Message-ID: <176911382383.16839.12158220837291068598@smelt2.prg2.suse.org> # Security update for php7 Announcement ID: SUSE-SU-2026:0245-1 Release Date: 2026-01-22T15:18:47Z Rating: moderate References: * bsc#1255711 * jsc#PED-13850 Cross-References: * CVE-2025-14178 CVSS scores: * CVE-2025-14178 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-14178 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2025-14178 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H * CVE-2025-14178 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H Affected Products: * Legacy Module 15-SP7 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for php7 fixes the following issues: Security fixes: * CVE-2025-14178: heap buffer overflow occurs in array_merge() when the total element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE (bsc#1255711). Other fixes: * Add all php7 packages to PackageHUB (unsupported), no source changes. (bsc#1251932) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-245=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-245=1 * Legacy Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2026-245=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-245=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-245=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-245=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-245=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-245=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-245=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-245=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-245=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-245=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * php7-embed-debuginfo-7.4.33-150400.4.55.1 * php7-json-7.4.33-150400.4.55.1 * php7-xmlreader-7.4.33-150400.4.55.1 * php7-calendar-7.4.33-150400.4.55.1 * php7-readline-debuginfo-7.4.33-150400.4.55.1 * php7-iconv-debuginfo-7.4.33-150400.4.55.1 * php7-ldap-debuginfo-7.4.33-150400.4.55.1 * php7-phar-debuginfo-7.4.33-150400.4.55.1 * php7-sysvsem-7.4.33-150400.4.55.1 * php7-pcntl-debuginfo-7.4.33-150400.4.55.1 * php7-zip-7.4.33-150400.4.55.1 * php7-zip-debuginfo-7.4.33-150400.4.55.1 * php7-bcmath-debuginfo-7.4.33-150400.4.55.1 * php7-pgsql-debuginfo-7.4.33-150400.4.55.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-debuginfo-7.4.33-150400.4.55.1 * php7-intl-debuginfo-7.4.33-150400.4.55.1 * php7-cli-debuginfo-7.4.33-150400.4.55.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-7.4.33-150400.4.55.1 * php7-fpm-7.4.33-150400.4.55.1 * php7-pgsql-7.4.33-150400.4.55.1 * php7-dba-debuginfo-7.4.33-150400.4.55.1 * php7-odbc-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.55.1 * php7-json-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-7.4.33-150400.4.55.1 * php7-test-7.4.33-150400.4.55.1 * php7-fpm-debugsource-7.4.33-150400.4.55.1 * php7-soap-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-7.4.33-150400.4.55.1 * php7-xsl-debuginfo-7.4.33-150400.4.55.1 * php7-shmop-debuginfo-7.4.33-150400.4.55.1 * php7-mysql-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1 * php7-fpm-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-7.4.33-150400.4.55.1 * php7-sodium-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-debuginfo-7.4.33-150400.4.55.1 * php7-curl-debuginfo-7.4.33-150400.4.55.1 * php7-sockets-7.4.33-150400.4.55.1 * php7-openssl-debuginfo-7.4.33-150400.4.55.1 * php7-enchant-7.4.33-150400.4.55.1 * php7-ldap-7.4.33-150400.4.55.1 * php7-sqlite-7.4.33-150400.4.55.1 * php7-mbstring-debuginfo-7.4.33-150400.4.55.1 * php7-mbstring-7.4.33-150400.4.55.1 * php7-shmop-7.4.33-150400.4.55.1 * php7-ctype-7.4.33-150400.4.55.1 * php7-fileinfo-7.4.33-150400.4.55.1 * php7-odbc-7.4.33-150400.4.55.1 * php7-calendar-debuginfo-7.4.33-150400.4.55.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1 * php7-dom-7.4.33-150400.4.55.1 * php7-xsl-7.4.33-150400.4.55.1 * apache2-mod_php7-7.4.33-150400.4.55.1 * php7-intl-7.4.33-150400.4.55.1 * php7-openssl-7.4.33-150400.4.55.1 * php7-ftp-7.4.33-150400.4.55.1 * php7-posix-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-7.4.33-150400.4.55.1 * php7-gd-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-7.4.33-150400.4.55.1 * php7-readline-7.4.33-150400.4.55.1 * php7-embed-debugsource-7.4.33-150400.4.55.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-debuginfo-7.4.33-150400.4.55.1 * php7-gd-7.4.33-150400.4.55.1 * php7-gmp-7.4.33-150400.4.55.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-7.4.33-150400.4.55.1 * php7-ftp-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.55.1 * php7-sysvmsg-7.4.33-150400.4.55.1 * php7-fastcgi-7.4.33-150400.4.55.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.55.1 * php7-gmp-debuginfo-7.4.33-150400.4.55.1 * php7-pcntl-7.4.33-150400.4.55.1 * php7-sockets-debuginfo-7.4.33-150400.4.55.1 * php7-phar-7.4.33-150400.4.55.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.55.1 * php7-soap-7.4.33-150400.4.55.1 * php7-enchant-debuginfo-7.4.33-150400.4.55.1 * php7-tokenizer-7.4.33-150400.4.55.1 * php7-bcmath-7.4.33-150400.4.55.1 * php7-debugsource-7.4.33-150400.4.55.1 * php7-posix-7.4.33-150400.4.55.1 * php7-iconv-7.4.33-150400.4.55.1 * php7-dom-debuginfo-7.4.33-150400.4.55.1 * php7-devel-7.4.33-150400.4.55.1 * php7-exif-debuginfo-7.4.33-150400.4.55.1 * php7-sodium-7.4.33-150400.4.55.1 * php7-xmlwriter-7.4.33-150400.4.55.1 * php7-exif-7.4.33-150400.4.55.1 * php7-fastcgi-debugsource-7.4.33-150400.4.55.1 * php7-xmlrpc-7.4.33-150400.4.55.1 * php7-debuginfo-7.4.33-150400.4.55.1 * php7-curl-7.4.33-150400.4.55.1 * php7-dba-7.4.33-150400.4.55.1 * php7-opcache-debuginfo-7.4.33-150400.4.55.1 * php7-7.4.33-150400.4.55.1 * php7-mysql-7.4.33-150400.4.55.1 * php7-opcache-7.4.33-150400.4.55.1 * php7-embed-7.4.33-150400.4.55.1 * php7-cli-7.4.33-150400.4.55.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1 * php7-sqlite-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-debuginfo-7.4.33-150400.4.55.1 * php7-ctype-debuginfo-7.4.33-150400.4.55.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * php7-embed-debuginfo-7.4.33-150400.4.55.1 * php7-json-7.4.33-150400.4.55.1 * php7-xmlreader-7.4.33-150400.4.55.1 * php7-calendar-7.4.33-150400.4.55.1 * php7-readline-debuginfo-7.4.33-150400.4.55.1 * php7-iconv-debuginfo-7.4.33-150400.4.55.1 * php7-ldap-debuginfo-7.4.33-150400.4.55.1 * php7-phar-debuginfo-7.4.33-150400.4.55.1 * php7-sysvsem-7.4.33-150400.4.55.1 * php7-pcntl-debuginfo-7.4.33-150400.4.55.1 * php7-zip-7.4.33-150400.4.55.1 * php7-zip-debuginfo-7.4.33-150400.4.55.1 * php7-bcmath-debuginfo-7.4.33-150400.4.55.1 * php7-pgsql-debuginfo-7.4.33-150400.4.55.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-debuginfo-7.4.33-150400.4.55.1 * php7-intl-debuginfo-7.4.33-150400.4.55.1 * php7-cli-debuginfo-7.4.33-150400.4.55.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-7.4.33-150400.4.55.1 * php7-fpm-7.4.33-150400.4.55.1 * php7-pgsql-7.4.33-150400.4.55.1 * php7-dba-debuginfo-7.4.33-150400.4.55.1 * php7-odbc-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.55.1 * php7-json-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-7.4.33-150400.4.55.1 * php7-test-7.4.33-150400.4.55.1 * php7-fpm-debugsource-7.4.33-150400.4.55.1 * php7-soap-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-7.4.33-150400.4.55.1 * php7-xsl-debuginfo-7.4.33-150400.4.55.1 * php7-shmop-debuginfo-7.4.33-150400.4.55.1 * php7-mysql-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1 * php7-fpm-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-7.4.33-150400.4.55.1 * php7-sodium-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-debuginfo-7.4.33-150400.4.55.1 * php7-curl-debuginfo-7.4.33-150400.4.55.1 * php7-sockets-7.4.33-150400.4.55.1 * php7-openssl-debuginfo-7.4.33-150400.4.55.1 * php7-enchant-7.4.33-150400.4.55.1 * php7-ldap-7.4.33-150400.4.55.1 * php7-sqlite-7.4.33-150400.4.55.1 * php7-mbstring-debuginfo-7.4.33-150400.4.55.1 * php7-mbstring-7.4.33-150400.4.55.1 * php7-shmop-7.4.33-150400.4.55.1 * php7-ctype-7.4.33-150400.4.55.1 * php7-fileinfo-7.4.33-150400.4.55.1 * php7-odbc-7.4.33-150400.4.55.1 * php7-calendar-debuginfo-7.4.33-150400.4.55.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1 * php7-dom-7.4.33-150400.4.55.1 * apache2-mod_php7-7.4.33-150400.4.55.1 * php7-xsl-7.4.33-150400.4.55.1 * php7-intl-7.4.33-150400.4.55.1 * php7-openssl-7.4.33-150400.4.55.1 * php7-ftp-7.4.33-150400.4.55.1 * php7-posix-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-7.4.33-150400.4.55.1 * php7-gd-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-7.4.33-150400.4.55.1 * php7-readline-7.4.33-150400.4.55.1 * php7-embed-debugsource-7.4.33-150400.4.55.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-debuginfo-7.4.33-150400.4.55.1 * php7-gd-7.4.33-150400.4.55.1 * php7-gmp-7.4.33-150400.4.55.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-7.4.33-150400.4.55.1 * php7-ftp-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.55.1 * php7-sysvmsg-7.4.33-150400.4.55.1 * php7-fastcgi-7.4.33-150400.4.55.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.55.1 * php7-gmp-debuginfo-7.4.33-150400.4.55.1 * php7-pcntl-7.4.33-150400.4.55.1 * php7-sockets-debuginfo-7.4.33-150400.4.55.1 * php7-phar-7.4.33-150400.4.55.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.55.1 * php7-soap-7.4.33-150400.4.55.1 * php7-enchant-debuginfo-7.4.33-150400.4.55.1 * php7-tokenizer-7.4.33-150400.4.55.1 * php7-bcmath-7.4.33-150400.4.55.1 * php7-debugsource-7.4.33-150400.4.55.1 * php7-posix-7.4.33-150400.4.55.1 * php7-iconv-7.4.33-150400.4.55.1 * php7-dom-debuginfo-7.4.33-150400.4.55.1 * php7-devel-7.4.33-150400.4.55.1 * php7-exif-debuginfo-7.4.33-150400.4.55.1 * php7-sodium-7.4.33-150400.4.55.1 * php7-xmlwriter-7.4.33-150400.4.55.1 * php7-exif-7.4.33-150400.4.55.1 * php7-fastcgi-debugsource-7.4.33-150400.4.55.1 * php7-xmlrpc-7.4.33-150400.4.55.1 * php7-debuginfo-7.4.33-150400.4.55.1 * php7-curl-7.4.33-150400.4.55.1 * php7-dba-7.4.33-150400.4.55.1 * php7-opcache-debuginfo-7.4.33-150400.4.55.1 * php7-7.4.33-150400.4.55.1 * php7-mysql-7.4.33-150400.4.55.1 * php7-opcache-7.4.33-150400.4.55.1 * php7-embed-7.4.33-150400.4.55.1 * php7-cli-7.4.33-150400.4.55.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1 * php7-sqlite-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-debuginfo-7.4.33-150400.4.55.1 * php7-ctype-debuginfo-7.4.33-150400.4.55.1 * Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64) * apache2-mod_php7-debugsource-7.4.33-150400.4.55.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-7.4.33-150400.4.55.1 * php7-7.4.33-150400.4.55.1 * php7-debugsource-7.4.33-150400.4.55.1 * php7-debuginfo-7.4.33-150400.4.55.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * php7-embed-debuginfo-7.4.33-150400.4.55.1 * php7-json-7.4.33-150400.4.55.1 * php7-xmlreader-7.4.33-150400.4.55.1 * php7-calendar-7.4.33-150400.4.55.1 * php7-readline-debuginfo-7.4.33-150400.4.55.1 * php7-iconv-debuginfo-7.4.33-150400.4.55.1 * php7-ldap-debuginfo-7.4.33-150400.4.55.1 * php7-phar-debuginfo-7.4.33-150400.4.55.1 * php7-sysvsem-7.4.33-150400.4.55.1 * php7-pcntl-debuginfo-7.4.33-150400.4.55.1 * php7-zip-7.4.33-150400.4.55.1 * php7-zip-debuginfo-7.4.33-150400.4.55.1 * php7-bcmath-debuginfo-7.4.33-150400.4.55.1 * php7-pgsql-debuginfo-7.4.33-150400.4.55.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-debuginfo-7.4.33-150400.4.55.1 * php7-intl-debuginfo-7.4.33-150400.4.55.1 * php7-cli-debuginfo-7.4.33-150400.4.55.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-7.4.33-150400.4.55.1 * php7-fpm-7.4.33-150400.4.55.1 * php7-pgsql-7.4.33-150400.4.55.1 * php7-dba-debuginfo-7.4.33-150400.4.55.1 * php7-odbc-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.55.1 * php7-json-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-7.4.33-150400.4.55.1 * php7-test-7.4.33-150400.4.55.1 * php7-fpm-debugsource-7.4.33-150400.4.55.1 * php7-soap-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-7.4.33-150400.4.55.1 * php7-xsl-debuginfo-7.4.33-150400.4.55.1 * php7-shmop-debuginfo-7.4.33-150400.4.55.1 * php7-mysql-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1 * php7-fpm-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-7.4.33-150400.4.55.1 * php7-sodium-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-debuginfo-7.4.33-150400.4.55.1 * php7-curl-debuginfo-7.4.33-150400.4.55.1 * php7-sockets-7.4.33-150400.4.55.1 * php7-openssl-debuginfo-7.4.33-150400.4.55.1 * php7-enchant-7.4.33-150400.4.55.1 * php7-ldap-7.4.33-150400.4.55.1 * php7-sqlite-7.4.33-150400.4.55.1 * php7-mbstring-debuginfo-7.4.33-150400.4.55.1 * php7-mbstring-7.4.33-150400.4.55.1 * php7-shmop-7.4.33-150400.4.55.1 * php7-ctype-7.4.33-150400.4.55.1 * php7-fileinfo-7.4.33-150400.4.55.1 * php7-odbc-7.4.33-150400.4.55.1 * php7-calendar-debuginfo-7.4.33-150400.4.55.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1 * php7-dom-7.4.33-150400.4.55.1 * apache2-mod_php7-7.4.33-150400.4.55.1 * php7-xsl-7.4.33-150400.4.55.1 * php7-intl-7.4.33-150400.4.55.1 * php7-openssl-7.4.33-150400.4.55.1 * php7-ftp-7.4.33-150400.4.55.1 * php7-posix-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-7.4.33-150400.4.55.1 * php7-gd-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-7.4.33-150400.4.55.1 * php7-readline-7.4.33-150400.4.55.1 * php7-embed-debugsource-7.4.33-150400.4.55.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-debuginfo-7.4.33-150400.4.55.1 * php7-gd-7.4.33-150400.4.55.1 * php7-gmp-7.4.33-150400.4.55.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-7.4.33-150400.4.55.1 * php7-ftp-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.55.1 * php7-sysvmsg-7.4.33-150400.4.55.1 * php7-fastcgi-7.4.33-150400.4.55.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.55.1 * php7-gmp-debuginfo-7.4.33-150400.4.55.1 * php7-pcntl-7.4.33-150400.4.55.1 * php7-sockets-debuginfo-7.4.33-150400.4.55.1 * php7-phar-7.4.33-150400.4.55.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.55.1 * php7-soap-7.4.33-150400.4.55.1 * php7-enchant-debuginfo-7.4.33-150400.4.55.1 * php7-tokenizer-7.4.33-150400.4.55.1 * php7-bcmath-7.4.33-150400.4.55.1 * php7-debugsource-7.4.33-150400.4.55.1 * php7-posix-7.4.33-150400.4.55.1 * php7-iconv-7.4.33-150400.4.55.1 * php7-dom-debuginfo-7.4.33-150400.4.55.1 * php7-exif-debuginfo-7.4.33-150400.4.55.1 * php7-sodium-7.4.33-150400.4.55.1 * php7-xmlwriter-7.4.33-150400.4.55.1 * php7-exif-7.4.33-150400.4.55.1 * php7-fastcgi-debugsource-7.4.33-150400.4.55.1 * php7-xmlrpc-7.4.33-150400.4.55.1 * php7-debuginfo-7.4.33-150400.4.55.1 * php7-curl-7.4.33-150400.4.55.1 * php7-dba-7.4.33-150400.4.55.1 * php7-opcache-debuginfo-7.4.33-150400.4.55.1 * php7-7.4.33-150400.4.55.1 * php7-mysql-7.4.33-150400.4.55.1 * php7-opcache-7.4.33-150400.4.55.1 * php7-embed-7.4.33-150400.4.55.1 * php7-cli-7.4.33-150400.4.55.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1 * php7-sqlite-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-debuginfo-7.4.33-150400.4.55.1 * php7-ctype-debuginfo-7.4.33-150400.4.55.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * php7-json-7.4.33-150400.4.55.1 * php7-xmlreader-7.4.33-150400.4.55.1 * php7-calendar-7.4.33-150400.4.55.1 * php7-readline-debuginfo-7.4.33-150400.4.55.1 * php7-iconv-debuginfo-7.4.33-150400.4.55.1 * php7-ldap-debuginfo-7.4.33-150400.4.55.1 * php7-phar-debuginfo-7.4.33-150400.4.55.1 * php7-sysvsem-7.4.33-150400.4.55.1 * php7-pcntl-debuginfo-7.4.33-150400.4.55.1 * php7-zip-7.4.33-150400.4.55.1 * php7-zip-debuginfo-7.4.33-150400.4.55.1 * php7-bcmath-debuginfo-7.4.33-150400.4.55.1 * php7-pgsql-debuginfo-7.4.33-150400.4.55.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-debuginfo-7.4.33-150400.4.55.1 * php7-intl-debuginfo-7.4.33-150400.4.55.1 * php7-cli-debuginfo-7.4.33-150400.4.55.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-7.4.33-150400.4.55.1 * php7-fpm-7.4.33-150400.4.55.1 * php7-pgsql-7.4.33-150400.4.55.1 * php7-dba-debuginfo-7.4.33-150400.4.55.1 * php7-odbc-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.55.1 * php7-json-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-7.4.33-150400.4.55.1 * php7-fpm-debugsource-7.4.33-150400.4.55.1 * php7-soap-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-7.4.33-150400.4.55.1 * php7-xsl-debuginfo-7.4.33-150400.4.55.1 * php7-shmop-debuginfo-7.4.33-150400.4.55.1 * php7-mysql-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1 * php7-fpm-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-7.4.33-150400.4.55.1 * php7-sodium-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-debuginfo-7.4.33-150400.4.55.1 * php7-curl-debuginfo-7.4.33-150400.4.55.1 * php7-sockets-7.4.33-150400.4.55.1 * php7-openssl-debuginfo-7.4.33-150400.4.55.1 * php7-enchant-7.4.33-150400.4.55.1 * php7-ldap-7.4.33-150400.4.55.1 * php7-sqlite-7.4.33-150400.4.55.1 * php7-mbstring-debuginfo-7.4.33-150400.4.55.1 * php7-mbstring-7.4.33-150400.4.55.1 * php7-shmop-7.4.33-150400.4.55.1 * php7-ctype-7.4.33-150400.4.55.1 * php7-fileinfo-7.4.33-150400.4.55.1 * php7-odbc-7.4.33-150400.4.55.1 * php7-calendar-debuginfo-7.4.33-150400.4.55.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1 * php7-dom-7.4.33-150400.4.55.1 * apache2-mod_php7-7.4.33-150400.4.55.1 * php7-xsl-7.4.33-150400.4.55.1 * php7-intl-7.4.33-150400.4.55.1 * php7-openssl-7.4.33-150400.4.55.1 * php7-ftp-7.4.33-150400.4.55.1 * php7-posix-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-7.4.33-150400.4.55.1 * php7-gd-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-7.4.33-150400.4.55.1 * php7-readline-7.4.33-150400.4.55.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-debuginfo-7.4.33-150400.4.55.1 * php7-gd-7.4.33-150400.4.55.1 * php7-gmp-7.4.33-150400.4.55.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-7.4.33-150400.4.55.1 * php7-ftp-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.55.1 * php7-sysvmsg-7.4.33-150400.4.55.1 * php7-fastcgi-7.4.33-150400.4.55.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.55.1 * php7-gmp-debuginfo-7.4.33-150400.4.55.1 * php7-pcntl-7.4.33-150400.4.55.1 * php7-sockets-debuginfo-7.4.33-150400.4.55.1 * php7-phar-7.4.33-150400.4.55.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.55.1 * php7-soap-7.4.33-150400.4.55.1 * php7-enchant-debuginfo-7.4.33-150400.4.55.1 * php7-tokenizer-7.4.33-150400.4.55.1 * php7-bcmath-7.4.33-150400.4.55.1 * php7-debugsource-7.4.33-150400.4.55.1 * php7-posix-7.4.33-150400.4.55.1 * php7-iconv-7.4.33-150400.4.55.1 * php7-dom-debuginfo-7.4.33-150400.4.55.1 * php7-devel-7.4.33-150400.4.55.1 * php7-exif-debuginfo-7.4.33-150400.4.55.1 * php7-sodium-7.4.33-150400.4.55.1 * php7-xmlwriter-7.4.33-150400.4.55.1 * php7-exif-7.4.33-150400.4.55.1 * php7-fastcgi-debugsource-7.4.33-150400.4.55.1 * php7-xmlrpc-7.4.33-150400.4.55.1 * php7-debuginfo-7.4.33-150400.4.55.1 * php7-curl-7.4.33-150400.4.55.1 * php7-dba-7.4.33-150400.4.55.1 * php7-opcache-debuginfo-7.4.33-150400.4.55.1 * php7-7.4.33-150400.4.55.1 * php7-mysql-7.4.33-150400.4.55.1 * php7-opcache-7.4.33-150400.4.55.1 * php7-cli-7.4.33-150400.4.55.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1 * php7-sqlite-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-debuginfo-7.4.33-150400.4.55.1 * php7-ctype-debuginfo-7.4.33-150400.4.55.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * php7-json-7.4.33-150400.4.55.1 * php7-xmlreader-7.4.33-150400.4.55.1 * php7-calendar-7.4.33-150400.4.55.1 * php7-readline-debuginfo-7.4.33-150400.4.55.1 * php7-iconv-debuginfo-7.4.33-150400.4.55.1 * php7-ldap-debuginfo-7.4.33-150400.4.55.1 * php7-phar-debuginfo-7.4.33-150400.4.55.1 * php7-sysvsem-7.4.33-150400.4.55.1 * php7-pcntl-debuginfo-7.4.33-150400.4.55.1 * php7-zip-7.4.33-150400.4.55.1 * php7-zip-debuginfo-7.4.33-150400.4.55.1 * php7-bcmath-debuginfo-7.4.33-150400.4.55.1 * php7-pgsql-debuginfo-7.4.33-150400.4.55.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-debuginfo-7.4.33-150400.4.55.1 * php7-intl-debuginfo-7.4.33-150400.4.55.1 * php7-cli-debuginfo-7.4.33-150400.4.55.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-7.4.33-150400.4.55.1 * php7-fpm-7.4.33-150400.4.55.1 * php7-pgsql-7.4.33-150400.4.55.1 * php7-dba-debuginfo-7.4.33-150400.4.55.1 * php7-odbc-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.55.1 * php7-json-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-7.4.33-150400.4.55.1 * php7-fpm-debugsource-7.4.33-150400.4.55.1 * php7-soap-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-7.4.33-150400.4.55.1 * php7-xsl-debuginfo-7.4.33-150400.4.55.1 * php7-shmop-debuginfo-7.4.33-150400.4.55.1 * php7-mysql-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1 * php7-fpm-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-7.4.33-150400.4.55.1 * php7-sodium-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-debuginfo-7.4.33-150400.4.55.1 * php7-curl-debuginfo-7.4.33-150400.4.55.1 * php7-sockets-7.4.33-150400.4.55.1 * php7-openssl-debuginfo-7.4.33-150400.4.55.1 * php7-enchant-7.4.33-150400.4.55.1 * php7-ldap-7.4.33-150400.4.55.1 * php7-sqlite-7.4.33-150400.4.55.1 * php7-mbstring-debuginfo-7.4.33-150400.4.55.1 * php7-mbstring-7.4.33-150400.4.55.1 * php7-shmop-7.4.33-150400.4.55.1 * php7-ctype-7.4.33-150400.4.55.1 * php7-fileinfo-7.4.33-150400.4.55.1 * php7-odbc-7.4.33-150400.4.55.1 * php7-calendar-debuginfo-7.4.33-150400.4.55.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1 * php7-dom-7.4.33-150400.4.55.1 * apache2-mod_php7-7.4.33-150400.4.55.1 * php7-xsl-7.4.33-150400.4.55.1 * php7-intl-7.4.33-150400.4.55.1 * php7-openssl-7.4.33-150400.4.55.1 * php7-ftp-7.4.33-150400.4.55.1 * php7-posix-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-7.4.33-150400.4.55.1 * php7-gd-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-7.4.33-150400.4.55.1 * php7-readline-7.4.33-150400.4.55.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-debuginfo-7.4.33-150400.4.55.1 * php7-gd-7.4.33-150400.4.55.1 * php7-gmp-7.4.33-150400.4.55.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-7.4.33-150400.4.55.1 * php7-ftp-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.55.1 * php7-sysvmsg-7.4.33-150400.4.55.1 * php7-fastcgi-7.4.33-150400.4.55.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.55.1 * php7-gmp-debuginfo-7.4.33-150400.4.55.1 * php7-pcntl-7.4.33-150400.4.55.1 * php7-sockets-debuginfo-7.4.33-150400.4.55.1 * php7-phar-7.4.33-150400.4.55.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.55.1 * php7-soap-7.4.33-150400.4.55.1 * php7-enchant-debuginfo-7.4.33-150400.4.55.1 * php7-tokenizer-7.4.33-150400.4.55.1 * php7-bcmath-7.4.33-150400.4.55.1 * php7-debugsource-7.4.33-150400.4.55.1 * php7-posix-7.4.33-150400.4.55.1 * php7-iconv-7.4.33-150400.4.55.1 * php7-dom-debuginfo-7.4.33-150400.4.55.1 * php7-devel-7.4.33-150400.4.55.1 * php7-exif-debuginfo-7.4.33-150400.4.55.1 * php7-sodium-7.4.33-150400.4.55.1 * php7-xmlwriter-7.4.33-150400.4.55.1 * php7-exif-7.4.33-150400.4.55.1 * php7-fastcgi-debugsource-7.4.33-150400.4.55.1 * php7-xmlrpc-7.4.33-150400.4.55.1 * php7-debuginfo-7.4.33-150400.4.55.1 * php7-curl-7.4.33-150400.4.55.1 * php7-dba-7.4.33-150400.4.55.1 * php7-opcache-debuginfo-7.4.33-150400.4.55.1 * php7-7.4.33-150400.4.55.1 * php7-mysql-7.4.33-150400.4.55.1 * php7-opcache-7.4.33-150400.4.55.1 * php7-cli-7.4.33-150400.4.55.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1 * php7-sqlite-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-debuginfo-7.4.33-150400.4.55.1 * php7-ctype-debuginfo-7.4.33-150400.4.55.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * php7-json-7.4.33-150400.4.55.1 * php7-xmlreader-7.4.33-150400.4.55.1 * php7-calendar-7.4.33-150400.4.55.1 * php7-readline-debuginfo-7.4.33-150400.4.55.1 * php7-iconv-debuginfo-7.4.33-150400.4.55.1 * php7-ldap-debuginfo-7.4.33-150400.4.55.1 * php7-phar-debuginfo-7.4.33-150400.4.55.1 * php7-sysvsem-7.4.33-150400.4.55.1 * php7-pcntl-debuginfo-7.4.33-150400.4.55.1 * php7-zip-7.4.33-150400.4.55.1 * php7-zip-debuginfo-7.4.33-150400.4.55.1 * php7-bcmath-debuginfo-7.4.33-150400.4.55.1 * php7-pgsql-debuginfo-7.4.33-150400.4.55.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-debuginfo-7.4.33-150400.4.55.1 * php7-intl-debuginfo-7.4.33-150400.4.55.1 * php7-cli-debuginfo-7.4.33-150400.4.55.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-7.4.33-150400.4.55.1 * php7-fpm-7.4.33-150400.4.55.1 * php7-pgsql-7.4.33-150400.4.55.1 * php7-dba-debuginfo-7.4.33-150400.4.55.1 * php7-odbc-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.55.1 * php7-json-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-7.4.33-150400.4.55.1 * php7-fpm-debugsource-7.4.33-150400.4.55.1 * php7-soap-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-7.4.33-150400.4.55.1 * php7-xsl-debuginfo-7.4.33-150400.4.55.1 * php7-shmop-debuginfo-7.4.33-150400.4.55.1 * php7-mysql-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1 * php7-fpm-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-7.4.33-150400.4.55.1 * php7-sodium-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-debuginfo-7.4.33-150400.4.55.1 * php7-curl-debuginfo-7.4.33-150400.4.55.1 * php7-sockets-7.4.33-150400.4.55.1 * php7-openssl-debuginfo-7.4.33-150400.4.55.1 * php7-enchant-7.4.33-150400.4.55.1 * php7-ldap-7.4.33-150400.4.55.1 * php7-sqlite-7.4.33-150400.4.55.1 * php7-mbstring-debuginfo-7.4.33-150400.4.55.1 * php7-mbstring-7.4.33-150400.4.55.1 * php7-shmop-7.4.33-150400.4.55.1 * php7-ctype-7.4.33-150400.4.55.1 * php7-fileinfo-7.4.33-150400.4.55.1 * php7-odbc-7.4.33-150400.4.55.1 * php7-calendar-debuginfo-7.4.33-150400.4.55.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1 * php7-dom-7.4.33-150400.4.55.1 * apache2-mod_php7-7.4.33-150400.4.55.1 * php7-xsl-7.4.33-150400.4.55.1 * php7-intl-7.4.33-150400.4.55.1 * php7-openssl-7.4.33-150400.4.55.1 * php7-ftp-7.4.33-150400.4.55.1 * php7-posix-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-7.4.33-150400.4.55.1 * php7-gd-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-7.4.33-150400.4.55.1 * php7-readline-7.4.33-150400.4.55.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-debuginfo-7.4.33-150400.4.55.1 * php7-gd-7.4.33-150400.4.55.1 * php7-gmp-7.4.33-150400.4.55.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-7.4.33-150400.4.55.1 * php7-ftp-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.55.1 * php7-sysvmsg-7.4.33-150400.4.55.1 * php7-fastcgi-7.4.33-150400.4.55.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.55.1 * php7-gmp-debuginfo-7.4.33-150400.4.55.1 * php7-pcntl-7.4.33-150400.4.55.1 * php7-sockets-debuginfo-7.4.33-150400.4.55.1 * php7-phar-7.4.33-150400.4.55.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.55.1 * php7-soap-7.4.33-150400.4.55.1 * php7-enchant-debuginfo-7.4.33-150400.4.55.1 * php7-tokenizer-7.4.33-150400.4.55.1 * php7-bcmath-7.4.33-150400.4.55.1 * php7-debugsource-7.4.33-150400.4.55.1 * php7-posix-7.4.33-150400.4.55.1 * php7-iconv-7.4.33-150400.4.55.1 * php7-dom-debuginfo-7.4.33-150400.4.55.1 * php7-devel-7.4.33-150400.4.55.1 * php7-exif-debuginfo-7.4.33-150400.4.55.1 * php7-sodium-7.4.33-150400.4.55.1 * php7-xmlwriter-7.4.33-150400.4.55.1 * php7-exif-7.4.33-150400.4.55.1 * php7-fastcgi-debugsource-7.4.33-150400.4.55.1 * php7-xmlrpc-7.4.33-150400.4.55.1 * php7-debuginfo-7.4.33-150400.4.55.1 * php7-curl-7.4.33-150400.4.55.1 * php7-dba-7.4.33-150400.4.55.1 * php7-opcache-debuginfo-7.4.33-150400.4.55.1 * php7-7.4.33-150400.4.55.1 * php7-mysql-7.4.33-150400.4.55.1 * php7-opcache-7.4.33-150400.4.55.1 * php7-cli-7.4.33-150400.4.55.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1 * php7-sqlite-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-debuginfo-7.4.33-150400.4.55.1 * php7-ctype-debuginfo-7.4.33-150400.4.55.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * php7-json-7.4.33-150400.4.55.1 * php7-xmlreader-7.4.33-150400.4.55.1 * php7-calendar-7.4.33-150400.4.55.1 * php7-readline-debuginfo-7.4.33-150400.4.55.1 * php7-iconv-debuginfo-7.4.33-150400.4.55.1 * php7-ldap-debuginfo-7.4.33-150400.4.55.1 * php7-phar-debuginfo-7.4.33-150400.4.55.1 * php7-sysvsem-7.4.33-150400.4.55.1 * php7-pcntl-debuginfo-7.4.33-150400.4.55.1 * php7-zip-7.4.33-150400.4.55.1 * php7-zip-debuginfo-7.4.33-150400.4.55.1 * php7-bcmath-debuginfo-7.4.33-150400.4.55.1 * php7-pgsql-debuginfo-7.4.33-150400.4.55.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-debuginfo-7.4.33-150400.4.55.1 * php7-intl-debuginfo-7.4.33-150400.4.55.1 * php7-cli-debuginfo-7.4.33-150400.4.55.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-7.4.33-150400.4.55.1 * php7-fpm-7.4.33-150400.4.55.1 * php7-pgsql-7.4.33-150400.4.55.1 * php7-dba-debuginfo-7.4.33-150400.4.55.1 * php7-odbc-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.55.1 * php7-json-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-7.4.33-150400.4.55.1 * php7-fpm-debugsource-7.4.33-150400.4.55.1 * php7-soap-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-7.4.33-150400.4.55.1 * php7-xsl-debuginfo-7.4.33-150400.4.55.1 * php7-shmop-debuginfo-7.4.33-150400.4.55.1 * php7-mysql-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1 * php7-fpm-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-7.4.33-150400.4.55.1 * php7-sodium-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-debuginfo-7.4.33-150400.4.55.1 * php7-curl-debuginfo-7.4.33-150400.4.55.1 * php7-sockets-7.4.33-150400.4.55.1 * php7-openssl-debuginfo-7.4.33-150400.4.55.1 * php7-enchant-7.4.33-150400.4.55.1 * php7-ldap-7.4.33-150400.4.55.1 * php7-sqlite-7.4.33-150400.4.55.1 * php7-mbstring-debuginfo-7.4.33-150400.4.55.1 * php7-mbstring-7.4.33-150400.4.55.1 * php7-shmop-7.4.33-150400.4.55.1 * php7-ctype-7.4.33-150400.4.55.1 * php7-fileinfo-7.4.33-150400.4.55.1 * php7-odbc-7.4.33-150400.4.55.1 * php7-calendar-debuginfo-7.4.33-150400.4.55.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1 * php7-dom-7.4.33-150400.4.55.1 * apache2-mod_php7-7.4.33-150400.4.55.1 * php7-xsl-7.4.33-150400.4.55.1 * php7-intl-7.4.33-150400.4.55.1 * php7-openssl-7.4.33-150400.4.55.1 * php7-ftp-7.4.33-150400.4.55.1 * php7-posix-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-7.4.33-150400.4.55.1 * php7-gd-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-7.4.33-150400.4.55.1 * php7-readline-7.4.33-150400.4.55.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-debuginfo-7.4.33-150400.4.55.1 * php7-gd-7.4.33-150400.4.55.1 * php7-gmp-7.4.33-150400.4.55.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-7.4.33-150400.4.55.1 * php7-ftp-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.55.1 * php7-sysvmsg-7.4.33-150400.4.55.1 * php7-fastcgi-7.4.33-150400.4.55.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.55.1 * php7-gmp-debuginfo-7.4.33-150400.4.55.1 * php7-pcntl-7.4.33-150400.4.55.1 * php7-sockets-debuginfo-7.4.33-150400.4.55.1 * php7-phar-7.4.33-150400.4.55.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.55.1 * php7-soap-7.4.33-150400.4.55.1 * php7-enchant-debuginfo-7.4.33-150400.4.55.1 * php7-tokenizer-7.4.33-150400.4.55.1 * php7-bcmath-7.4.33-150400.4.55.1 * php7-debugsource-7.4.33-150400.4.55.1 * php7-posix-7.4.33-150400.4.55.1 * php7-iconv-7.4.33-150400.4.55.1 * php7-dom-debuginfo-7.4.33-150400.4.55.1 * php7-devel-7.4.33-150400.4.55.1 * php7-exif-debuginfo-7.4.33-150400.4.55.1 * php7-sodium-7.4.33-150400.4.55.1 * php7-xmlwriter-7.4.33-150400.4.55.1 * php7-exif-7.4.33-150400.4.55.1 * php7-fastcgi-debugsource-7.4.33-150400.4.55.1 * php7-xmlrpc-7.4.33-150400.4.55.1 * php7-debuginfo-7.4.33-150400.4.55.1 * php7-curl-7.4.33-150400.4.55.1 * php7-dba-7.4.33-150400.4.55.1 * php7-opcache-debuginfo-7.4.33-150400.4.55.1 * php7-7.4.33-150400.4.55.1 * php7-mysql-7.4.33-150400.4.55.1 * php7-opcache-7.4.33-150400.4.55.1 * php7-cli-7.4.33-150400.4.55.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1 * php7-sqlite-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-debuginfo-7.4.33-150400.4.55.1 * php7-ctype-debuginfo-7.4.33-150400.4.55.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * php7-json-7.4.33-150400.4.55.1 * php7-xmlreader-7.4.33-150400.4.55.1 * php7-calendar-7.4.33-150400.4.55.1 * php7-readline-debuginfo-7.4.33-150400.4.55.1 * php7-iconv-debuginfo-7.4.33-150400.4.55.1 * php7-ldap-debuginfo-7.4.33-150400.4.55.1 * php7-phar-debuginfo-7.4.33-150400.4.55.1 * php7-sysvsem-7.4.33-150400.4.55.1 * php7-pcntl-debuginfo-7.4.33-150400.4.55.1 * php7-zip-7.4.33-150400.4.55.1 * php7-zip-debuginfo-7.4.33-150400.4.55.1 * php7-bcmath-debuginfo-7.4.33-150400.4.55.1 * php7-pgsql-debuginfo-7.4.33-150400.4.55.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-debuginfo-7.4.33-150400.4.55.1 * php7-intl-debuginfo-7.4.33-150400.4.55.1 * php7-cli-debuginfo-7.4.33-150400.4.55.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-7.4.33-150400.4.55.1 * php7-fpm-7.4.33-150400.4.55.1 * php7-pgsql-7.4.33-150400.4.55.1 * php7-dba-debuginfo-7.4.33-150400.4.55.1 * php7-odbc-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.55.1 * php7-json-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-7.4.33-150400.4.55.1 * php7-fpm-debugsource-7.4.33-150400.4.55.1 * php7-soap-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-7.4.33-150400.4.55.1 * php7-xsl-debuginfo-7.4.33-150400.4.55.1 * php7-shmop-debuginfo-7.4.33-150400.4.55.1 * php7-mysql-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1 * php7-fpm-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-7.4.33-150400.4.55.1 * php7-sodium-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-debuginfo-7.4.33-150400.4.55.1 * php7-curl-debuginfo-7.4.33-150400.4.55.1 * php7-sockets-7.4.33-150400.4.55.1 * php7-openssl-debuginfo-7.4.33-150400.4.55.1 * php7-enchant-7.4.33-150400.4.55.1 * php7-ldap-7.4.33-150400.4.55.1 * php7-sqlite-7.4.33-150400.4.55.1 * php7-mbstring-debuginfo-7.4.33-150400.4.55.1 * php7-mbstring-7.4.33-150400.4.55.1 * php7-shmop-7.4.33-150400.4.55.1 * php7-ctype-7.4.33-150400.4.55.1 * php7-fileinfo-7.4.33-150400.4.55.1 * php7-odbc-7.4.33-150400.4.55.1 * php7-calendar-debuginfo-7.4.33-150400.4.55.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1 * php7-dom-7.4.33-150400.4.55.1 * apache2-mod_php7-7.4.33-150400.4.55.1 * php7-xsl-7.4.33-150400.4.55.1 * php7-intl-7.4.33-150400.4.55.1 * php7-openssl-7.4.33-150400.4.55.1 * php7-ftp-7.4.33-150400.4.55.1 * php7-posix-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-7.4.33-150400.4.55.1 * php7-gd-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-7.4.33-150400.4.55.1 * php7-readline-7.4.33-150400.4.55.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-debuginfo-7.4.33-150400.4.55.1 * php7-gd-7.4.33-150400.4.55.1 * php7-gmp-7.4.33-150400.4.55.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-7.4.33-150400.4.55.1 * php7-ftp-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.55.1 * php7-sysvmsg-7.4.33-150400.4.55.1 * php7-fastcgi-7.4.33-150400.4.55.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.55.1 * php7-gmp-debuginfo-7.4.33-150400.4.55.1 * php7-pcntl-7.4.33-150400.4.55.1 * php7-sockets-debuginfo-7.4.33-150400.4.55.1 * php7-phar-7.4.33-150400.4.55.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.55.1 * php7-soap-7.4.33-150400.4.55.1 * php7-enchant-debuginfo-7.4.33-150400.4.55.1 * php7-tokenizer-7.4.33-150400.4.55.1 * php7-bcmath-7.4.33-150400.4.55.1 * php7-debugsource-7.4.33-150400.4.55.1 * php7-posix-7.4.33-150400.4.55.1 * php7-iconv-7.4.33-150400.4.55.1 * php7-dom-debuginfo-7.4.33-150400.4.55.1 * php7-devel-7.4.33-150400.4.55.1 * php7-exif-debuginfo-7.4.33-150400.4.55.1 * php7-sodium-7.4.33-150400.4.55.1 * php7-xmlwriter-7.4.33-150400.4.55.1 * php7-exif-7.4.33-150400.4.55.1 * php7-fastcgi-debugsource-7.4.33-150400.4.55.1 * php7-xmlrpc-7.4.33-150400.4.55.1 * php7-debuginfo-7.4.33-150400.4.55.1 * php7-curl-7.4.33-150400.4.55.1 * php7-dba-7.4.33-150400.4.55.1 * php7-opcache-debuginfo-7.4.33-150400.4.55.1 * php7-7.4.33-150400.4.55.1 * php7-mysql-7.4.33-150400.4.55.1 * php7-opcache-7.4.33-150400.4.55.1 * php7-cli-7.4.33-150400.4.55.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1 * php7-sqlite-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-debuginfo-7.4.33-150400.4.55.1 * php7-ctype-debuginfo-7.4.33-150400.4.55.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * php7-json-7.4.33-150400.4.55.1 * php7-xmlreader-7.4.33-150400.4.55.1 * php7-calendar-7.4.33-150400.4.55.1 * php7-readline-debuginfo-7.4.33-150400.4.55.1 * php7-iconv-debuginfo-7.4.33-150400.4.55.1 * php7-ldap-debuginfo-7.4.33-150400.4.55.1 * php7-phar-debuginfo-7.4.33-150400.4.55.1 * php7-sysvsem-7.4.33-150400.4.55.1 * php7-pcntl-debuginfo-7.4.33-150400.4.55.1 * php7-zip-7.4.33-150400.4.55.1 * php7-zip-debuginfo-7.4.33-150400.4.55.1 * php7-bcmath-debuginfo-7.4.33-150400.4.55.1 * php7-pgsql-debuginfo-7.4.33-150400.4.55.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-debuginfo-7.4.33-150400.4.55.1 * php7-intl-debuginfo-7.4.33-150400.4.55.1 * php7-cli-debuginfo-7.4.33-150400.4.55.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-7.4.33-150400.4.55.1 * php7-fpm-7.4.33-150400.4.55.1 * php7-pgsql-7.4.33-150400.4.55.1 * php7-dba-debuginfo-7.4.33-150400.4.55.1 * php7-odbc-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.55.1 * php7-json-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-7.4.33-150400.4.55.1 * php7-fpm-debugsource-7.4.33-150400.4.55.1 * php7-soap-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-7.4.33-150400.4.55.1 * php7-xsl-debuginfo-7.4.33-150400.4.55.1 * php7-shmop-debuginfo-7.4.33-150400.4.55.1 * php7-mysql-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1 * php7-fpm-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-7.4.33-150400.4.55.1 * php7-sodium-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-debuginfo-7.4.33-150400.4.55.1 * php7-curl-debuginfo-7.4.33-150400.4.55.1 * php7-sockets-7.4.33-150400.4.55.1 * php7-openssl-debuginfo-7.4.33-150400.4.55.1 * php7-enchant-7.4.33-150400.4.55.1 * php7-ldap-7.4.33-150400.4.55.1 * php7-sqlite-7.4.33-150400.4.55.1 * php7-mbstring-debuginfo-7.4.33-150400.4.55.1 * php7-mbstring-7.4.33-150400.4.55.1 * php7-shmop-7.4.33-150400.4.55.1 * php7-ctype-7.4.33-150400.4.55.1 * php7-fileinfo-7.4.33-150400.4.55.1 * php7-odbc-7.4.33-150400.4.55.1 * php7-calendar-debuginfo-7.4.33-150400.4.55.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1 * php7-dom-7.4.33-150400.4.55.1 * apache2-mod_php7-7.4.33-150400.4.55.1 * php7-xsl-7.4.33-150400.4.55.1 * php7-intl-7.4.33-150400.4.55.1 * php7-openssl-7.4.33-150400.4.55.1 * php7-ftp-7.4.33-150400.4.55.1 * php7-posix-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-7.4.33-150400.4.55.1 * php7-gd-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-7.4.33-150400.4.55.1 * php7-readline-7.4.33-150400.4.55.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-debuginfo-7.4.33-150400.4.55.1 * php7-gd-7.4.33-150400.4.55.1 * php7-gmp-7.4.33-150400.4.55.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-7.4.33-150400.4.55.1 * php7-ftp-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.55.1 * php7-sysvmsg-7.4.33-150400.4.55.1 * php7-fastcgi-7.4.33-150400.4.55.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.55.1 * php7-gmp-debuginfo-7.4.33-150400.4.55.1 * php7-pcntl-7.4.33-150400.4.55.1 * php7-sockets-debuginfo-7.4.33-150400.4.55.1 * php7-phar-7.4.33-150400.4.55.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.55.1 * php7-soap-7.4.33-150400.4.55.1 * php7-enchant-debuginfo-7.4.33-150400.4.55.1 * php7-tokenizer-7.4.33-150400.4.55.1 * php7-bcmath-7.4.33-150400.4.55.1 * php7-debugsource-7.4.33-150400.4.55.1 * php7-posix-7.4.33-150400.4.55.1 * php7-iconv-7.4.33-150400.4.55.1 * php7-dom-debuginfo-7.4.33-150400.4.55.1 * php7-devel-7.4.33-150400.4.55.1 * php7-exif-debuginfo-7.4.33-150400.4.55.1 * php7-sodium-7.4.33-150400.4.55.1 * php7-xmlwriter-7.4.33-150400.4.55.1 * php7-exif-7.4.33-150400.4.55.1 * php7-fastcgi-debugsource-7.4.33-150400.4.55.1 * php7-xmlrpc-7.4.33-150400.4.55.1 * php7-debuginfo-7.4.33-150400.4.55.1 * php7-curl-7.4.33-150400.4.55.1 * php7-dba-7.4.33-150400.4.55.1 * php7-opcache-debuginfo-7.4.33-150400.4.55.1 * php7-7.4.33-150400.4.55.1 * php7-mysql-7.4.33-150400.4.55.1 * php7-opcache-7.4.33-150400.4.55.1 * php7-cli-7.4.33-150400.4.55.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1 * php7-sqlite-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-debuginfo-7.4.33-150400.4.55.1 * php7-ctype-debuginfo-7.4.33-150400.4.55.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * php7-json-7.4.33-150400.4.55.1 * php7-xmlreader-7.4.33-150400.4.55.1 * php7-calendar-7.4.33-150400.4.55.1 * php7-readline-debuginfo-7.4.33-150400.4.55.1 * php7-iconv-debuginfo-7.4.33-150400.4.55.1 * php7-ldap-debuginfo-7.4.33-150400.4.55.1 * php7-phar-debuginfo-7.4.33-150400.4.55.1 * php7-sysvsem-7.4.33-150400.4.55.1 * php7-pcntl-debuginfo-7.4.33-150400.4.55.1 * php7-zip-7.4.33-150400.4.55.1 * php7-zip-debuginfo-7.4.33-150400.4.55.1 * php7-bcmath-debuginfo-7.4.33-150400.4.55.1 * php7-pgsql-debuginfo-7.4.33-150400.4.55.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-debuginfo-7.4.33-150400.4.55.1 * php7-intl-debuginfo-7.4.33-150400.4.55.1 * php7-cli-debuginfo-7.4.33-150400.4.55.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-7.4.33-150400.4.55.1 * php7-fpm-7.4.33-150400.4.55.1 * php7-pgsql-7.4.33-150400.4.55.1 * php7-dba-debuginfo-7.4.33-150400.4.55.1 * php7-odbc-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.55.1 * php7-json-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-7.4.33-150400.4.55.1 * php7-fpm-debugsource-7.4.33-150400.4.55.1 * php7-soap-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-7.4.33-150400.4.55.1 * php7-xsl-debuginfo-7.4.33-150400.4.55.1 * php7-shmop-debuginfo-7.4.33-150400.4.55.1 * php7-mysql-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1 * php7-fpm-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-7.4.33-150400.4.55.1 * php7-sodium-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-debuginfo-7.4.33-150400.4.55.1 * php7-curl-debuginfo-7.4.33-150400.4.55.1 * php7-sockets-7.4.33-150400.4.55.1 * php7-openssl-debuginfo-7.4.33-150400.4.55.1 * php7-enchant-7.4.33-150400.4.55.1 * php7-ldap-7.4.33-150400.4.55.1 * php7-sqlite-7.4.33-150400.4.55.1 * php7-mbstring-debuginfo-7.4.33-150400.4.55.1 * php7-mbstring-7.4.33-150400.4.55.1 * php7-shmop-7.4.33-150400.4.55.1 * php7-ctype-7.4.33-150400.4.55.1 * php7-fileinfo-7.4.33-150400.4.55.1 * php7-odbc-7.4.33-150400.4.55.1 * php7-calendar-debuginfo-7.4.33-150400.4.55.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1 * php7-dom-7.4.33-150400.4.55.1 * apache2-mod_php7-7.4.33-150400.4.55.1 * php7-xsl-7.4.33-150400.4.55.1 * php7-intl-7.4.33-150400.4.55.1 * php7-openssl-7.4.33-150400.4.55.1 * php7-ftp-7.4.33-150400.4.55.1 * php7-posix-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-7.4.33-150400.4.55.1 * php7-gd-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-7.4.33-150400.4.55.1 * php7-readline-7.4.33-150400.4.55.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-debuginfo-7.4.33-150400.4.55.1 * php7-gd-7.4.33-150400.4.55.1 * php7-gmp-7.4.33-150400.4.55.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-7.4.33-150400.4.55.1 * php7-ftp-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.55.1 * php7-sysvmsg-7.4.33-150400.4.55.1 * php7-fastcgi-7.4.33-150400.4.55.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.55.1 * php7-gmp-debuginfo-7.4.33-150400.4.55.1 * php7-pcntl-7.4.33-150400.4.55.1 * php7-sockets-debuginfo-7.4.33-150400.4.55.1 * php7-phar-7.4.33-150400.4.55.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.55.1 * php7-soap-7.4.33-150400.4.55.1 * php7-enchant-debuginfo-7.4.33-150400.4.55.1 * php7-tokenizer-7.4.33-150400.4.55.1 * php7-bcmath-7.4.33-150400.4.55.1 * php7-debugsource-7.4.33-150400.4.55.1 * php7-posix-7.4.33-150400.4.55.1 * php7-iconv-7.4.33-150400.4.55.1 * php7-dom-debuginfo-7.4.33-150400.4.55.1 * php7-devel-7.4.33-150400.4.55.1 * php7-exif-debuginfo-7.4.33-150400.4.55.1 * php7-sodium-7.4.33-150400.4.55.1 * php7-xmlwriter-7.4.33-150400.4.55.1 * php7-exif-7.4.33-150400.4.55.1 * php7-fastcgi-debugsource-7.4.33-150400.4.55.1 * php7-xmlrpc-7.4.33-150400.4.55.1 * php7-debuginfo-7.4.33-150400.4.55.1 * php7-curl-7.4.33-150400.4.55.1 * php7-dba-7.4.33-150400.4.55.1 * php7-opcache-debuginfo-7.4.33-150400.4.55.1 * php7-7.4.33-150400.4.55.1 * php7-mysql-7.4.33-150400.4.55.1 * php7-opcache-7.4.33-150400.4.55.1 * php7-cli-7.4.33-150400.4.55.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1 * php7-sqlite-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-debuginfo-7.4.33-150400.4.55.1 * php7-ctype-debuginfo-7.4.33-150400.4.55.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * php7-json-7.4.33-150400.4.55.1 * php7-xmlreader-7.4.33-150400.4.55.1 * php7-calendar-7.4.33-150400.4.55.1 * php7-readline-debuginfo-7.4.33-150400.4.55.1 * php7-iconv-debuginfo-7.4.33-150400.4.55.1 * php7-ldap-debuginfo-7.4.33-150400.4.55.1 * php7-phar-debuginfo-7.4.33-150400.4.55.1 * php7-sysvsem-7.4.33-150400.4.55.1 * php7-pcntl-debuginfo-7.4.33-150400.4.55.1 * php7-zip-7.4.33-150400.4.55.1 * php7-zip-debuginfo-7.4.33-150400.4.55.1 * php7-bcmath-debuginfo-7.4.33-150400.4.55.1 * php7-pgsql-debuginfo-7.4.33-150400.4.55.1 * php7-xmlrpc-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-debuginfo-7.4.33-150400.4.55.1 * php7-intl-debuginfo-7.4.33-150400.4.55.1 * php7-cli-debuginfo-7.4.33-150400.4.55.1 * php7-fastcgi-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-7.4.33-150400.4.55.1 * php7-fpm-7.4.33-150400.4.55.1 * php7-pgsql-7.4.33-150400.4.55.1 * php7-dba-debuginfo-7.4.33-150400.4.55.1 * php7-odbc-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debugsource-7.4.33-150400.4.55.1 * php7-json-debuginfo-7.4.33-150400.4.55.1 * php7-pdo-7.4.33-150400.4.55.1 * php7-fpm-debugsource-7.4.33-150400.4.55.1 * php7-soap-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-7.4.33-150400.4.55.1 * php7-xsl-debuginfo-7.4.33-150400.4.55.1 * php7-shmop-debuginfo-7.4.33-150400.4.55.1 * php7-mysql-debuginfo-7.4.33-150400.4.55.1 * apache2-mod_php7-debuginfo-7.4.33-150400.4.55.1 * php7-fpm-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-7.4.33-150400.4.55.1 * php7-sodium-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-debuginfo-7.4.33-150400.4.55.1 * php7-curl-debuginfo-7.4.33-150400.4.55.1 * php7-sockets-7.4.33-150400.4.55.1 * php7-openssl-debuginfo-7.4.33-150400.4.55.1 * php7-enchant-7.4.33-150400.4.55.1 * php7-ldap-7.4.33-150400.4.55.1 * php7-sqlite-7.4.33-150400.4.55.1 * php7-mbstring-debuginfo-7.4.33-150400.4.55.1 * php7-mbstring-7.4.33-150400.4.55.1 * php7-shmop-7.4.33-150400.4.55.1 * php7-ctype-7.4.33-150400.4.55.1 * php7-fileinfo-7.4.33-150400.4.55.1 * php7-odbc-7.4.33-150400.4.55.1 * php7-calendar-debuginfo-7.4.33-150400.4.55.1 * php7-xmlwriter-debuginfo-7.4.33-150400.4.55.1 * php7-dom-7.4.33-150400.4.55.1 * apache2-mod_php7-7.4.33-150400.4.55.1 * php7-xsl-7.4.33-150400.4.55.1 * php7-intl-7.4.33-150400.4.55.1 * php7-openssl-7.4.33-150400.4.55.1 * php7-ftp-7.4.33-150400.4.55.1 * php7-posix-debuginfo-7.4.33-150400.4.55.1 * php7-tidy-7.4.33-150400.4.55.1 * php7-gd-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-7.4.33-150400.4.55.1 * php7-readline-7.4.33-150400.4.55.1 * php7-fileinfo-debuginfo-7.4.33-150400.4.55.1 * php7-bz2-debuginfo-7.4.33-150400.4.55.1 * php7-zlib-debuginfo-7.4.33-150400.4.55.1 * php7-gd-7.4.33-150400.4.55.1 * php7-gmp-7.4.33-150400.4.55.1 * php7-tokenizer-debuginfo-7.4.33-150400.4.55.1 * php7-snmp-7.4.33-150400.4.55.1 * php7-ftp-debuginfo-7.4.33-150400.4.55.1 * php7-sysvshm-debuginfo-7.4.33-150400.4.55.1 * php7-sysvmsg-7.4.33-150400.4.55.1 * php7-fastcgi-7.4.33-150400.4.55.1 * php7-xmlreader-debuginfo-7.4.33-150400.4.55.1 * php7-gmp-debuginfo-7.4.33-150400.4.55.1 * php7-pcntl-7.4.33-150400.4.55.1 * php7-sockets-debuginfo-7.4.33-150400.4.55.1 * php7-phar-7.4.33-150400.4.55.1 * php7-sysvsem-debuginfo-7.4.33-150400.4.55.1 * php7-soap-7.4.33-150400.4.55.1 * php7-enchant-debuginfo-7.4.33-150400.4.55.1 * php7-tokenizer-7.4.33-150400.4.55.1 * php7-bcmath-7.4.33-150400.4.55.1 * php7-debugsource-7.4.33-150400.4.55.1 * php7-posix-7.4.33-150400.4.55.1 * php7-iconv-7.4.33-150400.4.55.1 * php7-dom-debuginfo-7.4.33-150400.4.55.1 * php7-devel-7.4.33-150400.4.55.1 * php7-exif-debuginfo-7.4.33-150400.4.55.1 * php7-sodium-7.4.33-150400.4.55.1 * php7-xmlwriter-7.4.33-150400.4.55.1 * php7-exif-7.4.33-150400.4.55.1 * php7-fastcgi-debugsource-7.4.33-150400.4.55.1 * php7-xmlrpc-7.4.33-150400.4.55.1 * php7-debuginfo-7.4.33-150400.4.55.1 * php7-curl-7.4.33-150400.4.55.1 * php7-dba-7.4.33-150400.4.55.1 * php7-opcache-debuginfo-7.4.33-150400.4.55.1 * php7-7.4.33-150400.4.55.1 * php7-mysql-7.4.33-150400.4.55.1 * php7-opcache-7.4.33-150400.4.55.1 * php7-cli-7.4.33-150400.4.55.1 * php7-sysvmsg-debuginfo-7.4.33-150400.4.55.1 * php7-sqlite-debuginfo-7.4.33-150400.4.55.1 * php7-gettext-debuginfo-7.4.33-150400.4.55.1 * php7-ctype-debuginfo-7.4.33-150400.4.55.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14178.html * https://bugzilla.suse.com/show_bug.cgi?id=1255711 * https://jira.suse.com/browse/PED-13850 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:30:27 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:30:27 -0000 Subject: SUSE-SU-2026:0243-1: moderate: Security update for librsvg Message-ID: <176911382700.16839.15880988450512060029@smelt2.prg2.suse.org> # Security update for librsvg Announcement ID: SUSE-SU-2026:0243-1 Release Date: 2026-01-22T13:57:48Z Rating: moderate References: * bsc#1243867 Cross-References: * CVE-2024-12224 CVSS scores: * CVE-2024-12224 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-12224 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-12224 ( NVD ): 5.1 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * Basesystem Module 15-SP7 * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for librsvg fixes the following issues: Update to version 2.57.4 - bsc#1243867: * CVE-2024-12224: RUSTSEC-2024-0421 - idna accepts Punycode labels that do not produce any non-ASCII when decoded. * RUSTSEC-2024-0404 - Unsoundness in anstream. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-243=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-243=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-243=1 openSUSE-SLE-15.6-2026-243=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * gdk-pixbuf-loader-rsvg-debuginfo-2.57.4-150600.3.3.1 * librsvg-debugsource-2.57.4-150600.3.3.1 * librsvg-2-2-2.57.4-150600.3.3.1 * librsvg-2-2-debuginfo-2.57.4-150600.3.3.1 * gdk-pixbuf-loader-rsvg-2.57.4-150600.3.3.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * librsvg-debugsource-2.57.4-150600.3.3.1 * librsvg-devel-2.57.4-150600.3.3.1 * typelib-1_0-Rsvg-2_0-2.57.4-150600.3.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * typelib-1_0-Rsvg-2_0-2.57.4-150600.3.3.1 * gdk-pixbuf-loader-rsvg-debuginfo-2.57.4-150600.3.3.1 * rsvg-convert-2.57.4-150600.3.3.1 * librsvg-debugsource-2.57.4-150600.3.3.1 * librsvg-devel-2.57.4-150600.3.3.1 * librsvg-2-2-2.57.4-150600.3.3.1 * librsvg-2-2-debuginfo-2.57.4-150600.3.3.1 * gdk-pixbuf-loader-rsvg-2.57.4-150600.3.3.1 * rsvg-convert-debuginfo-2.57.4-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * librsvg-2-2-32bit-2.57.4-150600.3.3.1 * librsvg-2-2-32bit-debuginfo-2.57.4-150600.3.3.1 * gdk-pixbuf-loader-rsvg-32bit-debuginfo-2.57.4-150600.3.3.1 * gdk-pixbuf-loader-rsvg-32bit-2.57.4-150600.3.3.1 * openSUSE Leap 15.6 (noarch) * rsvg-thumbnailer-2.57.4-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * gdk-pixbuf-loader-rsvg-64bit-2.57.4-150600.3.3.1 * gdk-pixbuf-loader-rsvg-64bit-debuginfo-2.57.4-150600.3.3.1 * librsvg-2-2-64bit-debuginfo-2.57.4-150600.3.3.1 * librsvg-2-2-64bit-2.57.4-150600.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12224.html * https://bugzilla.suse.com/show_bug.cgi?id=1243867 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:30:29 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:30:29 -0000 Subject: SUSE-RU-2026:0242-1: moderate: Recommended update for git Message-ID: <176911382954.16839.11944924904794321742@smelt2.prg2.suse.org> # Recommended update for git Announcement ID: SUSE-RU-2026:0242-1 Release Date: 2026-01-22T13:57:26Z Rating: moderate References: * bsc#1251224 Affected Products: * Basesystem Module 15-SP7 * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for git fixes the following issue: * Revert incorrect AppArmor profile change, in SLE 15 the binaries remain in /usr/lib/git (bsc#1251224) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-242=1 openSUSE-SLE-15.6-2026-242=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-242=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-242=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * git-debuginfo-2.51.0-150600.3.15.1 * git-gui-2.51.0-150600.3.15.1 * git-credential-libsecret-debuginfo-2.51.0-150600.3.15.1 * git-web-2.51.0-150600.3.15.1 * git-debugsource-2.51.0-150600.3.15.1 * gitk-2.51.0-150600.3.15.1 * perl-Git-2.51.0-150600.3.15.1 * git-p4-2.51.0-150600.3.15.1 * git-arch-2.51.0-150600.3.15.1 * git-email-2.51.0-150600.3.15.1 * git-2.51.0-150600.3.15.1 * git-daemon-2.51.0-150600.3.15.1 * git-credential-libsecret-2.51.0-150600.3.15.1 * git-daemon-debuginfo-2.51.0-150600.3.15.1 * git-svn-2.51.0-150600.3.15.1 * git-core-2.51.0-150600.3.15.1 * git-cvs-2.51.0-150600.3.15.1 * git-core-debuginfo-2.51.0-150600.3.15.1 * openSUSE Leap 15.6 (noarch) * git-doc-2.51.0-150600.3.15.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * git-debugsource-2.51.0-150600.3.15.1 * git-debuginfo-2.51.0-150600.3.15.1 * git-core-2.51.0-150600.3.15.1 * git-core-debuginfo-2.51.0-150600.3.15.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * git-debuginfo-2.51.0-150600.3.15.1 * git-gui-2.51.0-150600.3.15.1 * git-web-2.51.0-150600.3.15.1 * git-debugsource-2.51.0-150600.3.15.1 * perl-Git-2.51.0-150600.3.15.1 * git-arch-2.51.0-150600.3.15.1 * git-email-2.51.0-150600.3.15.1 * git-2.51.0-150600.3.15.1 * git-daemon-2.51.0-150600.3.15.1 * git-daemon-debuginfo-2.51.0-150600.3.15.1 * git-svn-2.51.0-150600.3.15.1 * gitk-2.51.0-150600.3.15.1 * git-cvs-2.51.0-150600.3.15.1 * Development Tools Module 15-SP7 (noarch) * git-doc-2.51.0-150600.3.15.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1251224 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:30:31 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:30:31 -0000 Subject: SUSE-RU-2026:0241-1: moderate: Recommended update for libHBAAPI2 Message-ID: <176911383165.16839.4638788389114040956@smelt2.prg2.suse.org> # Recommended update for libHBAAPI2 Announcement ID: SUSE-RU-2026:0241-1 Release Date: 2026-01-22T13:57:04Z Rating: moderate References: * bsc#1252158 Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for libHBAAPI2 fixes the following issues: * use %license tag for COPYING [bsc#1252158] ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-241=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2026-241=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-241=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libHBAAPI2-debuginfo-2.2.10-150000.3.3.1 * libHBAAPI2-debugsource-2.2.10-150000.3.3.1 * libHBAAPI2-2.2.10-150000.3.3.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libHBAAPI2-debuginfo-2.2.10-150000.3.3.1 * libHBAAPI2-devel-2.2.10-150000.3.3.1 * libHBAAPI2-debugsource-2.2.10-150000.3.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libHBAAPI2-debuginfo-2.2.10-150000.3.3.1 * libHBAAPI2-devel-2.2.10-150000.3.3.1 * libHBAAPI2-debugsource-2.2.10-150000.3.3.1 * libHBAAPI2-2.2.10-150000.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1252158 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:30:34 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:30:34 -0000 Subject: SUSE-RU-2026:0240-1: moderate: Recommended update for nvidia-open-driver-G06-signed Message-ID: <176911383483.16839.6522164323783546646@smelt2.prg2.suse.org> # Recommended update for nvidia-open-driver-G06-signed Announcement ID: SUSE-RU-2026:0240-1 Release Date: 2026-01-22T12:28:15Z Rating: moderate References: * bsc#1255858 Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for nvidia-open-driver-G06-signed fixes the following issues: * fix build for sle15-sp4 * update non-CUDA variant to version 580.126.09 (bsc#1255858) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-240=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 x86_64) * nvidia-open-driver-G06-signed-cuda-kmp-default-580.105.08_k6.4.0_150700.53.25-150700.3.40.1 * nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.105.08_k6.4.0_150700.53.25-150700.3.40.1 * nvidia-open-driver-G06-signed-kmp-default-580.126.09_k6.4.0_150700.53.25-150700.3.40.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k6.4.0_150700.53.25-150700.3.40.1 * nvidia-open-driver-G06-signed-default-devel-580.126.09-150700.3.40.1 * nvidia-open-driver-G06-signed-cuda-default-devel-580.105.08-150700.3.40.1 * nvidia-open-driver-G06-signed-cuda-debugsource-580.105.08-150700.3.40.1 * nv-prefer-signed-open-driver-580.105.08-150700.3.40.1 * nvidia-open-driver-G06-signed-debugsource-580.126.09-150700.3.40.1 * Basesystem Module 15-SP7 (aarch64) * nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.105.08_k6.4.0_150700.53.25-150700.3.40.1 * nvidia-open-driver-G06-signed-kmp-64kb-580.126.09_k6.4.0_150700.53.25-150700.3.40.1 * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.126.09_k6.4.0_150700.53.25-150700.3.40.1 * nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.105.08_k6.4.0_150700.53.25-150700.3.40.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1255858 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:30:36 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:30:36 -0000 Subject: SUSE-RU-2026:0239-1: moderate: Recommended update for nvidia-open-driver-G06-signed Message-ID: <176911383694.16839.4621981306439949016@smelt2.prg2.suse.org> # Recommended update for nvidia-open-driver-G06-signed Announcement ID: SUSE-RU-2026:0239-1 Release Date: 2026-01-22T12:28:05Z Rating: moderate References: * bsc#1255858 Affected Products: * openSUSE Leap 15.6 * Public Cloud Module 15-SP6 * Public Cloud Module 15-SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for nvidia-open-driver-G06-signed fixes the following issues: * fix build for sle15-sp4 * update non-CUDA variant to version 580.126.09 (bsc#1255858) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-239=1 openSUSE-SLE-15.6-2026-239=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2026-239=1 * Public Cloud Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2026-239=1 ## Package List: * openSUSE Leap 15.6 (x86_64) * nvidia-open-driver-G06-signed-kmp-azure-debuginfo-580.126.09_k6.4.0_150600.8.58-150600.3.80.1 * nvidia-open-driver-G06-signed-cuda-kmp-azure-debuginfo-580.105.08_k6.4.0_150600.8.58-150600.3.80.1 * nvidia-open-driver-G06-signed-cuda-kmp-azure-580.105.08_k6.4.0_150600.8.58-150600.3.80.1 * nvidia-open-driver-G06-signed-cuda-azure-devel-580.105.08-150600.3.80.1 * nvidia-open-driver-G06-signed-kmp-azure-580.126.09_k6.4.0_150600.8.58-150600.3.80.1 * nvidia-open-driver-G06-signed-azure-devel-580.126.09-150600.3.80.1 * openSUSE Leap 15.6 (noarch) * nvidia-open-driver-G06-signed-cuda-check-580.105.08-150600.3.80.1 * nvidia-open-driver-G06-signed-check-580.126.09-150600.3.80.1 * openSUSE Leap 15.6 (aarch64 x86_64) * nvidia-open-driver-G06-signed-cuda-default-devel-580.105.08-150600.3.80.1 * nvidia-open-driver-G06-signed-cuda-debugsource-580.105.08-150600.3.80.1 * nv-prefer-signed-open-driver-580.105.08-150600.3.80.1 * nvidia-open-driver-G06-signed-debugsource-580.126.09-150600.3.80.1 * nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.126.09_k6.4.0_150600.23.81-150600.3.80.1 * nvidia-open-driver-G06-signed-cuda-kmp-default-580.105.08_k6.4.0_150600.23.81-150600.3.80.1 * nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.105.08_k6.4.0_150600.23.81-150600.3.80.1 * nvidia-open-driver-G06-signed-default-devel-580.126.09-150600.3.80.1 * nvidia-open-driver-G06-signed-kmp-default-580.126.09_k6.4.0_150600.23.81-150600.3.80.1 * openSUSE Leap 15.6 (aarch64) * nvidia-open-driver-G06-signed-64kb-devel-580.126.09-150600.3.80.1 * nvidia-open-driver-G06-signed-kmp-64kb-580.126.09_k6.4.0_150600.23.81-150600.3.80.1 * nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.126.09_k6.4.0_150600.23.81-150600.3.80.1 * nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.105.08_k6.4.0_150600.23.81-150600.3.80.1 * nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.105.08_k6.4.0_150600.23.81-150600.3.80.1 * nvidia-open-driver-G06-signed-cuda-64kb-devel-580.105.08-150600.3.80.1 * Public Cloud Module 15-SP6 (x86_64) * nvidia-open-driver-G06-signed-kmp-azure-debuginfo-580.126.09_k6.4.0_150600.8.58-150600.3.80.1 * nvidia-open-driver-G06-signed-cuda-kmp-azure-debuginfo-580.105.08_k6.4.0_150600.8.58-150600.3.80.1 * nvidia-open-driver-G06-signed-cuda-kmp-azure-580.105.08_k6.4.0_150600.8.58-150600.3.80.1 * nvidia-open-driver-G06-signed-cuda-azure-devel-580.105.08-150600.3.80.1 * nvidia-open-driver-G06-signed-kmp-azure-580.126.09_k6.4.0_150600.8.58-150600.3.80.1 * nvidia-open-driver-G06-signed-azure-devel-580.126.09-150600.3.80.1 * Public Cloud Module 15-SP7 (x86_64) * nvidia-open-driver-G06-signed-cuda-azure-devel-580.105.08-150600.3.80.1 * nvidia-open-driver-G06-signed-cuda-debugsource-580.105.08-150600.3.80.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1255858 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:30:40 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:30:40 -0000 Subject: SUSE-SU-2026:0238-1: moderate: Security update for dpdk Message-ID: <176911384009.16839.2370591606432052449@smelt2.prg2.suse.org> # Security update for dpdk Announcement ID: SUSE-SU-2026:0238-1 Release Date: 2026-01-22T12:26:26Z Rating: moderate References: * bsc#1254161 Cross-References: * CVE-2025-23259 CVSS scores: * CVE-2025-23259 ( SUSE ): 7.0 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-23259 ( SUSE ): 6.3 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-23259 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H Affected Products: * Server Applications Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for dpdk fixes the following issues: Update to version 24.11.4: * CVE-2025-23259: Fixed an attacker on a VM in the system can cause information disclosure and denial of service (bsc#1254161). Changelog: https://doc.dpdk.org/guides-24.11/rel_notes/release_24_11.html#id10 https://doc.dpdk.org/guides-24.11/rel_notes/release_24_11.html#id5 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2026-238=1 ## Package List: * Server Applications Module 15-SP7 (aarch64 ppc64le x86_64) * libdpdk-25-24.11.4-150700.3.6.1 * dpdk-24.11.4-150700.3.6.1 * libdpdk-25-debuginfo-24.11.4-150700.3.6.1 * dpdk-debuginfo-24.11.4-150700.3.6.1 * dpdk-tools-24.11.4-150700.3.6.1 * dpdk-devel-24.11.4-150700.3.6.1 * dpdk-debugsource-24.11.4-150700.3.6.1 * Server Applications Module 15-SP7 (aarch64) * dpdk-thunderx-devel-24.11.4-150700.3.6.1 * dpdk-thunderx-24.11.4-150700.3.6.1 * dpdk-thunderx-debugsource-24.11.4-150700.3.6.1 * dpdk-thunderx-debuginfo-24.11.4-150700.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-23259.html * https://bugzilla.suse.com/show_bug.cgi?id=1254161 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:30:43 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:30:43 -0000 Subject: SUSE-SU-2026:0237-1: moderate: Security update for wireshark Message-ID: <176911384367.16839.4099719947165414143@smelt2.prg2.suse.org> # Security update for wireshark Announcement ID: SUSE-SU-2026:0237-1 Release Date: 2026-01-22T12:26:16Z Rating: moderate References: * bsc#1256734 * bsc#1256736 * bsc#1256739 Cross-References: * CVE-2026-0959 * CVE-2026-0960 * CVE-2026-0962 CVSS scores: * CVE-2026-0959 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-0959 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2026-0959 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2026-0959 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2026-0960 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-0960 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2026-0960 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2026-0960 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2026-0962 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-0962 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2026-0962 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2026-0962 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for wireshark fixes the following issues: * CVE-2026-0959: IEEE 802.11 dissector crash (bsc#1256734). * CVE-2026-0960: HTTP3 dissector infinite loop (bsc#1256736). * CVE-2026-0962: SOME/IP-SD dissector crash (bsc#1256739). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-237=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-237=1 openSUSE-SLE-15.6-2026-237=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-237=1 ## Package List: * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * wireshark-devel-4.2.14-150600.18.35.1 * wireshark-debuginfo-4.2.14-150600.18.35.1 * wireshark-ui-qt-debuginfo-4.2.14-150600.18.35.1 * wireshark-debugsource-4.2.14-150600.18.35.1 * wireshark-ui-qt-4.2.14-150600.18.35.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * wireshark-devel-4.2.14-150600.18.35.1 * libwireshark17-debuginfo-4.2.14-150600.18.35.1 * wireshark-debuginfo-4.2.14-150600.18.35.1 * libwiretap14-debuginfo-4.2.14-150600.18.35.1 * libwiretap14-4.2.14-150600.18.35.1 * wireshark-ui-qt-debuginfo-4.2.14-150600.18.35.1 * wireshark-debugsource-4.2.14-150600.18.35.1 * libwsutil15-debuginfo-4.2.14-150600.18.35.1 * libwireshark17-4.2.14-150600.18.35.1 * wireshark-4.2.14-150600.18.35.1 * wireshark-ui-qt-4.2.14-150600.18.35.1 * libwsutil15-4.2.14-150600.18.35.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libwireshark17-debuginfo-4.2.14-150600.18.35.1 * wireshark-debuginfo-4.2.14-150600.18.35.1 * libwiretap14-debuginfo-4.2.14-150600.18.35.1 * libwiretap14-4.2.14-150600.18.35.1 * wireshark-debugsource-4.2.14-150600.18.35.1 * libwsutil15-debuginfo-4.2.14-150600.18.35.1 * libwireshark17-4.2.14-150600.18.35.1 * wireshark-4.2.14-150600.18.35.1 * libwsutil15-4.2.14-150600.18.35.1 ## References: * https://www.suse.com/security/cve/CVE-2026-0959.html * https://www.suse.com/security/cve/CVE-2026-0960.html * https://www.suse.com/security/cve/CVE-2026-0962.html * https://bugzilla.suse.com/show_bug.cgi?id=1256734 * https://bugzilla.suse.com/show_bug.cgi?id=1256736 * https://bugzilla.suse.com/show_bug.cgi?id=1256739 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:30:49 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:30:49 -0000 Subject: SUSE-SU-2026:0236-1: important: Security update for busybox Message-ID: <176911384921.16839.8893598619237615691@smelt2.prg2.suse.org> # Security update for busybox Announcement ID: SUSE-SU-2026:0236-1 Release Date: 2026-01-22T12:25:56Z Rating: important References: * bsc#1236670 * bsc#1241661 * bsc#1247779 * bsc#1249237 * bsc#1253245 Cross-References: * CVE-2025-46394 * CVE-2025-60876 CVSS scores: * CVE-2025-46394 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N * CVE-2025-46394 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N * CVE-2025-46394 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-46394 ( NVD ): 3.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N * CVE-2025-60876 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:H/SI:H/SA:N * CVE-2025-60876 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N * CVE-2025-60876 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Affected Products: * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves two vulnerabilities and has three security fixes can now be installed. ## Description: This update for busybox fixes the following issues: This update for busybox fixes the following issues: Security issues: * CVE-2025-46394: Fixed tar hidden files via escape sequence (CVE-2025-46394, bsc#1241661) * CVE-2025-60876: Fixed HTTP request header injection in wget (CVE-2025-60876, bsc#1253245) Other issues: * Set CONFIG_FIRST_SYSTEM_ID to 201 to avoid confclict (bsc#1236670) * Fixed unshare -mrpf sh core dump on ppc64le (bsc#1249237) * Fixed adduser inside containers on an SELinux host (bsc#1247779) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-236=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-236=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-236=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-236=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-236=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-236=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-236=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-236=1 ## Package List: * openSUSE Leap 15.5 (noarch) * busybox-policycoreutils-1.37.0-150500.7.9.1 * busybox-tar-1.37.0-150500.7.9.1 * busybox-udhcpc-1.37.0-150500.7.9.1 * busybox-selinux-tools-1.37.0-150500.7.9.1 * busybox-findutils-1.37.0-150500.7.9.1 * busybox-time-1.37.0-150500.7.9.1 * busybox-netcat-1.37.0-150500.7.9.1 * busybox-ncurses-utils-1.37.0-150500.7.9.1 * busybox-ed-1.37.0-150500.7.9.1 * busybox-adduser-1.37.0-150500.7.9.1 * busybox-links-1.37.0-150500.7.9.1 * busybox-traceroute-1.37.0-150500.7.9.1 * busybox-misc-1.37.0-150500.7.9.1 * busybox-net-tools-1.37.0-150500.7.9.1 * busybox-unzip-1.37.0-150500.7.9.1 * busybox-util-linux-1.37.0-150500.7.9.1 * busybox-iproute2-1.37.0-150500.7.9.1 * busybox-sharutils-1.37.0-150500.7.9.1 * busybox-whois-1.37.0-150500.7.9.1 * busybox-tftp-1.37.0-150500.7.9.1 * busybox-kbd-1.37.0-150500.7.9.1 * busybox-cpio-1.37.0-150500.7.9.1 * busybox-grep-1.37.0-150500.7.9.1 * busybox-patch-1.37.0-150500.7.9.1 * busybox-bind-utils-1.37.0-150500.7.9.1 * busybox-vlan-1.37.0-150500.7.9.1 * busybox-iputils-1.37.0-150500.7.9.1 * busybox-sendmail-1.37.0-150500.7.9.1 * busybox-attr-1.37.0-150500.7.9.1 * busybox-xz-1.37.0-150500.7.9.1 * busybox-gzip-1.37.0-150500.7.9.1 * busybox-hostname-1.37.0-150500.7.9.1 * busybox-kmod-1.37.0-150500.7.9.1 * busybox-sed-1.37.0-150500.7.9.1 * busybox-psmisc-1.37.0-150500.7.9.1 * busybox-dos2unix-1.37.0-150500.7.9.1 * busybox-sha3sum-1.37.0-150500.7.9.1 * busybox-which-1.37.0-150500.7.9.1 * busybox-gawk-1.37.0-150500.7.9.1 * busybox-tunctl-1.37.0-150500.7.9.1 * busybox-diffutils-1.37.0-150500.7.9.1 * busybox-telnet-1.37.0-150500.7.9.1 * busybox-sysvinit-tools-1.37.0-150500.7.9.1 * busybox-hexedit-1.37.0-150500.7.9.1 * busybox-syslogd-1.37.0-150500.7.9.1 * busybox-procps-1.37.0-150500.7.9.1 * busybox-sh-1.37.0-150500.7.9.1 * busybox-coreutils-1.37.0-150500.7.9.1 * busybox-vi-1.37.0-150500.7.9.1 * busybox-bzip2-1.37.0-150500.7.9.1 * busybox-less-1.37.0-150500.7.9.1 * busybox-man-1.37.0-150500.7.9.1 * busybox-bc-1.37.0-150500.7.9.1 * busybox-wget-1.37.0-150500.7.9.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * busybox-static-1.37.0-150500.10.14.1 * busybox-testsuite-1.37.0-150500.10.14.1 * busybox-1.37.0-150500.10.14.1 * busybox-static-debuginfo-1.37.0-150500.10.14.1 * busybox-debuginfo-1.37.0-150500.10.14.1 * busybox-debugsource-1.37.0-150500.10.14.1 * openSUSE Leap 15.5 (aarch64 x86_64 i586) * busybox-warewulf3-1.37.0-150500.10.14.1 * busybox-warewulf3-debuginfo-1.37.0-150500.10.14.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * busybox-1.37.0-150500.10.14.1 * busybox-static-1.37.0-150500.10.14.1 * busybox-testsuite-1.37.0-150500.10.14.1 * openSUSE Leap 15.6 (noarch) * busybox-policycoreutils-1.37.0-150500.7.9.1 * busybox-tar-1.37.0-150500.7.9.1 * busybox-udhcpc-1.37.0-150500.7.9.1 * busybox-selinux-tools-1.37.0-150500.7.9.1 * busybox-findutils-1.37.0-150500.7.9.1 * busybox-time-1.37.0-150500.7.9.1 * busybox-netcat-1.37.0-150500.7.9.1 * busybox-ncurses-utils-1.37.0-150500.7.9.1 * busybox-ed-1.37.0-150500.7.9.1 * busybox-adduser-1.37.0-150500.7.9.1 * busybox-links-1.37.0-150500.7.9.1 * busybox-traceroute-1.37.0-150500.7.9.1 * busybox-misc-1.37.0-150500.7.9.1 * busybox-net-tools-1.37.0-150500.7.9.1 * busybox-unzip-1.37.0-150500.7.9.1 * busybox-util-linux-1.37.0-150500.7.9.1 * busybox-iproute2-1.37.0-150500.7.9.1 * busybox-sharutils-1.37.0-150500.7.9.1 * busybox-whois-1.37.0-150500.7.9.1 * busybox-tftp-1.37.0-150500.7.9.1 * busybox-kbd-1.37.0-150500.7.9.1 * busybox-cpio-1.37.0-150500.7.9.1 * busybox-grep-1.37.0-150500.7.9.1 * busybox-patch-1.37.0-150500.7.9.1 * busybox-bind-utils-1.37.0-150500.7.9.1 * busybox-vlan-1.37.0-150500.7.9.1 * busybox-iputils-1.37.0-150500.7.9.1 * busybox-sendmail-1.37.0-150500.7.9.1 * busybox-attr-1.37.0-150500.7.9.1 * busybox-xz-1.37.0-150500.7.9.1 * busybox-gzip-1.37.0-150500.7.9.1 * busybox-hostname-1.37.0-150500.7.9.1 * busybox-kmod-1.37.0-150500.7.9.1 * busybox-sed-1.37.0-150500.7.9.1 * busybox-psmisc-1.37.0-150500.7.9.1 * busybox-dos2unix-1.37.0-150500.7.9.1 * busybox-sha3sum-1.37.0-150500.7.9.1 * busybox-which-1.37.0-150500.7.9.1 * busybox-gawk-1.37.0-150500.7.9.1 * busybox-tunctl-1.37.0-150500.7.9.1 * busybox-diffutils-1.37.0-150500.7.9.1 * busybox-telnet-1.37.0-150500.7.9.1 * busybox-sysvinit-tools-1.37.0-150500.7.9.1 * busybox-hexedit-1.37.0-150500.7.9.1 * busybox-syslogd-1.37.0-150500.7.9.1 * busybox-procps-1.37.0-150500.7.9.1 * busybox-sh-1.37.0-150500.7.9.1 * busybox-coreutils-1.37.0-150500.7.9.1 * busybox-vi-1.37.0-150500.7.9.1 * busybox-bzip2-1.37.0-150500.7.9.1 * busybox-less-1.37.0-150500.7.9.1 * busybox-man-1.37.0-150500.7.9.1 * busybox-bc-1.37.0-150500.7.9.1 * busybox-wget-1.37.0-150500.7.9.1 * openSUSE Leap 15.6 (aarch64 x86_64) * busybox-warewulf3-1.37.0-150500.10.14.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * busybox-1.37.0-150500.10.14.1 * busybox-static-1.37.0-150500.10.14.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * busybox-1.37.0-150500.10.14.1 * busybox-static-1.37.0-150500.10.14.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * busybox-1.37.0-150500.10.14.1 * busybox-static-1.37.0-150500.10.14.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * busybox-1.37.0-150500.10.14.1 * busybox-static-1.37.0-150500.10.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * busybox-1.37.0-150500.10.14.1 * busybox-static-1.37.0-150500.10.14.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * busybox-1.37.0-150500.10.14.1 * busybox-static-1.37.0-150500.10.14.1 ## References: * https://www.suse.com/security/cve/CVE-2025-46394.html * https://www.suse.com/security/cve/CVE-2025-60876.html * https://bugzilla.suse.com/show_bug.cgi?id=1236670 * https://bugzilla.suse.com/show_bug.cgi?id=1241661 * https://bugzilla.suse.com/show_bug.cgi?id=1247779 * https://bugzilla.suse.com/show_bug.cgi?id=1249237 * https://bugzilla.suse.com/show_bug.cgi?id=1253245 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:30:53 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:30:53 -0000 Subject: SUSE-SU-2026:0235-1: important: Security update for busybox Message-ID: <176911385396.16839.14253632427436443147@smelt2.prg2.suse.org> # Security update for busybox Announcement ID: SUSE-SU-2026:0235-1 Release Date: 2026-01-22T12:25:10Z Rating: important References: * bsc#1236670 * bsc#1241661 * bsc#1249237 * bsc#1253245 Cross-References: * CVE-2025-46394 * CVE-2025-60876 CVSS scores: * CVE-2025-46394 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N * CVE-2025-46394 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N * CVE-2025-46394 ( NVD ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2025-46394 ( NVD ): 3.2 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N * CVE-2025-60876 ( SUSE ): 8.8 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:H/SI:H/SA:N * CVE-2025-60876 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N * CVE-2025-60876 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities and has two security fixes can now be installed. ## Description: This update for busybox fixes the following issues: Security issues: * CVE-2025-46394: Fixed tar hidden files via escape sequence (CVE-2025-46394, bsc#1241661) * CVE-2025-60876: Fixed HTTP request header injection in wget (CVE-2025-60876, bsc#1253245) Other issues: * Set CONFIG_FIRST_SYSTEM_ID to 201 to avoid confclict (bsc#1236670) * Fixed unshare -mrpf sh core dump on ppc64le (bsc#1249237) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-235=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * busybox-1.37.0-150700.18.10.1 * busybox-static-1.37.0-150700.18.10.1 ## References: * https://www.suse.com/security/cve/CVE-2025-46394.html * https://www.suse.com/security/cve/CVE-2025-60876.html * https://bugzilla.suse.com/show_bug.cgi?id=1236670 * https://bugzilla.suse.com/show_bug.cgi?id=1241661 * https://bugzilla.suse.com/show_bug.cgi?id=1249237 * https://bugzilla.suse.com/show_bug.cgi?id=1253245 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:30:56 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:30:56 -0000 Subject: SUSE-SU-2026:0234-1: moderate: Security update for libpng16 Message-ID: <176911385694.16839.11084852705282873367@smelt2.prg2.suse.org> # Security update for libpng16 Announcement ID: SUSE-SU-2026:0234-1 Release Date: 2026-01-22T12:24:52Z Rating: moderate References: * bsc#1256525 * bsc#1256526 Cross-References: * CVE-2026-22695 * CVE-2026-22801 CVSS scores: * CVE-2026-22695 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22695 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H * CVE-2026-22695 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H * CVE-2026-22695 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H * CVE-2026-22801 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2026-22801 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2026-22801 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2026-22801 ( NVD ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for libpng16 fixes the following issues: * CVE-2026-22695: Fixed heap buffer over-read in png_image_finish_read (bsc#1256525) * CVE-2026-22801: Fixed integer truncation causing heap buffer over-read in png_image_write_* (bsc#1256526). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-234=1 openSUSE-SLE-15.6-2026-234=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-234=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libpng16-16-debuginfo-1.6.40-150600.3.6.1 * libpng16-devel-1.6.40-150600.3.6.1 * libpng16-tools-1.6.40-150600.3.6.1 * libpng16-16-1.6.40-150600.3.6.1 * libpng16-compat-devel-1.6.40-150600.3.6.1 * libpng16-tools-debuginfo-1.6.40-150600.3.6.1 * libpng16-debugsource-1.6.40-150600.3.6.1 * openSUSE Leap 15.6 (x86_64) * libpng16-16-32bit-debuginfo-1.6.40-150600.3.6.1 * libpng16-compat-devel-32bit-1.6.40-150600.3.6.1 * libpng16-devel-32bit-1.6.40-150600.3.6.1 * libpng16-16-32bit-1.6.40-150600.3.6.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libpng16-devel-64bit-1.6.40-150600.3.6.1 * libpng16-16-64bit-1.6.40-150600.3.6.1 * libpng16-16-64bit-debuginfo-1.6.40-150600.3.6.1 * libpng16-compat-devel-64bit-1.6.40-150600.3.6.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libpng16-16-debuginfo-1.6.40-150600.3.6.1 * libpng16-devel-1.6.40-150600.3.6.1 * libpng16-16-1.6.40-150600.3.6.1 * libpng16-compat-devel-1.6.40-150600.3.6.1 * libpng16-debugsource-1.6.40-150600.3.6.1 * Basesystem Module 15-SP7 (x86_64) * libpng16-16-32bit-debuginfo-1.6.40-150600.3.6.1 * libpng16-16-32bit-1.6.40-150600.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2026-22695.html * https://www.suse.com/security/cve/CVE-2026-22801.html * https://bugzilla.suse.com/show_bug.cgi?id=1256525 * https://bugzilla.suse.com/show_bug.cgi?id=1256526 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:30:59 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:30:59 -0000 Subject: SUSE-SU-2026:0233-1: moderate: Security update for python-virtualenv Message-ID: <176911385945.16839.9923675982357588535@smelt2.prg2.suse.org> # Security update for python-virtualenv Announcement ID: SUSE-SU-2026:0233-1 Release Date: 2026-01-22T12:24:36Z Rating: moderate References: * bsc#1256458 Cross-References: * CVE-2026-22702 CVSS scores: * CVE-2026-22702 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2026-22702 ( SUSE ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2026-22702 ( NVD ): 4.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for python-virtualenv fixes the following issues: * CVE-2026-22702: Fixed local attacker can redirect file operations via TOCTOU race condition (bsc#1256458). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-233=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-233=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-233=1 ## Package List: * Python 3 Module 15-SP7 (noarch) * python311-virtualenv-20.22.0-150400.9.9.1 * openSUSE Leap 15.4 (noarch) * python311-virtualenv-20.22.0-150400.9.9.1 * openSUSE Leap 15.6 (noarch) * python311-virtualenv-20.22.0-150400.9.9.1 ## References: * https://www.suse.com/security/cve/CVE-2026-22702.html * https://bugzilla.suse.com/show_bug.cgi?id=1256458 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:31:01 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:31:01 -0000 Subject: SUSE-SU-2026:0232-1: important: Security update for pgadmin4 Message-ID: <176911386197.16839.15004488741571989410@smelt2.prg2.suse.org> # Security update for pgadmin4 Announcement ID: SUSE-SU-2026:0232-1 Release Date: 2026-01-22T12:24:17Z Rating: important References: * bsc#1249151 Cross-References: * CVE-2025-9636 CVSS scores: * CVE-2025-9636 ( SUSE ): 7.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-9636 ( SUSE ): 7.9 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L * CVE-2025-9636 ( NVD ): 7.9 CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L Affected Products: * openSUSE Leap 15.3 * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for pgadmin4 fixes the following issues: * CVE-2025-9636: Fixed Cross-Origin Opener Policy (COOP) vulnerability (bsc#1249151). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-232=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-232=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-232=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-232=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-232=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-232=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-232=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-232=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-232=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-232=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-232=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2026-232=1 ## Package List: * Python 3 Module 15-SP7 (noarch) * pgadmin4-doc-4.30-150300.3.24.1 * pgadmin4-web-4.30-150300.3.24.1 * Python 3 Module 15-SP7 (s390x) * pgadmin4-4.30-150300.3.24.1 * pgadmin4-debuginfo-4.30-150300.3.24.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * pgadmin4-4.30-150300.3.24.1 * pgadmin4-debuginfo-4.30-150300.3.24.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * pgadmin4-doc-4.30-150300.3.24.1 * pgadmin4-web-4.30-150300.3.24.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * pgadmin4-4.30-150300.3.24.1 * pgadmin4-debuginfo-4.30-150300.3.24.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * pgadmin4-doc-4.30-150300.3.24.1 * pgadmin4-web-4.30-150300.3.24.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * pgadmin4-4.30-150300.3.24.1 * pgadmin4-debuginfo-4.30-150300.3.24.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * pgadmin4-doc-4.30-150300.3.24.1 * pgadmin4-web-4.30-150300.3.24.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * pgadmin4-4.30-150300.3.24.1 * pgadmin4-debuginfo-4.30-150300.3.24.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * pgadmin4-doc-4.30-150300.3.24.1 * pgadmin4-web-4.30-150300.3.24.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * pgadmin4-4.30-150300.3.24.1 * pgadmin4-debuginfo-4.30-150300.3.24.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * pgadmin4-doc-4.30-150300.3.24.1 * pgadmin4-web-4.30-150300.3.24.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * pgadmin4-4.30-150300.3.24.1 * pgadmin4-debuginfo-4.30-150300.3.24.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * pgadmin4-doc-4.30-150300.3.24.1 * pgadmin4-web-4.30-150300.3.24.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * pgadmin4-doc-4.30-150300.3.24.1 * pgadmin4-web-4.30-150300.3.24.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (s390x) * pgadmin4-4.30-150300.3.24.1 * pgadmin4-debuginfo-4.30-150300.3.24.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * pgadmin4-4.30-150300.3.24.1 * pgadmin4-debuginfo-4.30-150300.3.24.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * pgadmin4-doc-4.30-150300.3.24.1 * pgadmin4-web-4.30-150300.3.24.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * pgadmin4-4.30-150300.3.24.1 * pgadmin4-debuginfo-4.30-150300.3.24.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * pgadmin4-doc-4.30-150300.3.24.1 * pgadmin4-web-4.30-150300.3.24.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * pgadmin4-web-4.30-150300.3.24.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * pgadmin4-4.30-150300.3.24.1 * pgadmin4-debuginfo-4.30-150300.3.24.1 * openSUSE Leap 15.3 (noarch) * pgadmin4-doc-4.30-150300.3.24.1 * pgadmin4-web-4.30-150300.3.24.1 * pgadmin4-web-uwsgi-4.30-150300.3.24.1 ## References: * https://www.suse.com/security/cve/CVE-2025-9636.html * https://bugzilla.suse.com/show_bug.cgi?id=1249151 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:31:04 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:31:04 -0000 Subject: SUSE-SU-2026:0231-1: low: Security update for exiv2-0_26 Message-ID: <176911386452.16839.18169155610789041454@smelt2.prg2.suse.org> # Security update for exiv2-0_26 Announcement ID: SUSE-SU-2026:0231-1 Release Date: 2026-01-22T12:23:05Z Rating: low References: * bsc#1248963 Cross-References: * CVE-2025-55304 CVSS scores: * CVE-2025-55304 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-55304 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-55304 ( NVD ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves one vulnerability can now be installed. ## Description: This update for exiv2-0_26 fixes the following issues: Add reference for previously fixed issue: * CVE-2025-55304: Fixed quadratic performance algorithm in the ICC profile parsing code of `JpegBase::readMetadata` (bsc#1248963). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-231=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-231=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-231=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-231=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-231=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-231=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * exiv2-0_26-debugsource-0.26-150400.9.27.1 * libexiv2-26-0.26-150400.9.27.1 * libexiv2-26-debuginfo-0.26-150400.9.27.1 * openSUSE Leap 15.4 (x86_64) * libexiv2-26-32bit-0.26-150400.9.27.1 * libexiv2-26-32bit-debuginfo-0.26-150400.9.27.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libexiv2-26-64bit-debuginfo-0.26-150400.9.27.1 * libexiv2-26-64bit-0.26-150400.9.27.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * exiv2-0_26-debugsource-0.26-150400.9.27.1 * libexiv2-26-0.26-150400.9.27.1 * libexiv2-26-debuginfo-0.26-150400.9.27.1 * openSUSE Leap 15.6 (x86_64) * libexiv2-26-32bit-0.26-150400.9.27.1 * libexiv2-26-32bit-debuginfo-0.26-150400.9.27.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libexiv2-26-0.26-150400.9.27.1 * libexiv2-26-debuginfo-0.26-150400.9.27.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libexiv2-26-0.26-150400.9.27.1 * libexiv2-26-debuginfo-0.26-150400.9.27.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libexiv2-26-0.26-150400.9.27.1 * libexiv2-26-debuginfo-0.26-150400.9.27.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libexiv2-26-0.26-150400.9.27.1 * libexiv2-26-debuginfo-0.26-150400.9.27.1 ## References: * https://www.suse.com/security/cve/CVE-2025-55304.html * https://bugzilla.suse.com/show_bug.cgi?id=1248963 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:31:07 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:31:07 -0000 Subject: SUSE-SU-2026:0230-1: moderate: Security update for util-linux Message-ID: <176911386760.16839.2583099990777437403@smelt2.prg2.suse.org> # Security update for util-linux Announcement ID: SUSE-SU-2026:0230-1 Release Date: 2026-01-22T12:22:40Z Rating: moderate References: * bsc#1254666 * jsc#PED-13682 Cross-References: * CVE-2025-14104 CVSS scores: * CVE-2025-14104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-14104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-14104 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability and contains one feature can now be installed. ## Description: This update for util-linux fixes the following issues: * CVE-2025-14104: Fixed heap buffer overread in setpwnam() when processing 256-byte usernames (bsc#1254666). * lscpu: Add support for NVIDIA Olympus arm64 core (jsc#PED-13682). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2026-230=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-230=1 ## Package List: * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * util-linux-systemd-debuginfo-2.40.4-150700.4.3.1 * util-linux-systemd-debugsource-2.40.4-150700.4.3.1 * uuidd-debuginfo-2.40.4-150700.4.3.1 * uuidd-2.40.4-150700.4.3.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libuuid-devel-2.40.4-150700.4.3.1 * util-linux-systemd-debugsource-2.40.4-150700.4.3.1 * util-linux-tty-tools-debuginfo-2.40.4-150700.4.3.1 * libuuid1-2.40.4-150700.4.3.1 * libfdisk1-2.40.4-150700.4.3.1 * libblkid-devel-2.40.4-150700.4.3.1 * util-linux-tty-tools-2.40.4-150700.4.3.1 * libuuid1-debuginfo-2.40.4-150700.4.3.1 * libfdisk-devel-2.40.4-150700.4.3.1 * util-linux-debuginfo-2.40.4-150700.4.3.1 * util-linux-systemd-debuginfo-2.40.4-150700.4.3.1 * libblkid1-debuginfo-2.40.4-150700.4.3.1 * libsmartcols1-debuginfo-2.40.4-150700.4.3.1 * libfdisk1-debuginfo-2.40.4-150700.4.3.1 * libuuid-devel-static-2.40.4-150700.4.3.1 * util-linux-debugsource-2.40.4-150700.4.3.1 * libblkid1-2.40.4-150700.4.3.1 * libsmartcols1-2.40.4-150700.4.3.1 * libmount1-2.40.4-150700.4.3.1 * util-linux-systemd-2.40.4-150700.4.3.1 * libmount1-debuginfo-2.40.4-150700.4.3.1 * libblkid-devel-static-2.40.4-150700.4.3.1 * libmount-devel-2.40.4-150700.4.3.1 * libsmartcols-devel-2.40.4-150700.4.3.1 * util-linux-2.40.4-150700.4.3.1 * Basesystem Module 15-SP7 (noarch) * util-linux-lang-2.40.4-150700.4.3.1 * Basesystem Module 15-SP7 (s390x) * util-linux-extra-2.40.4-150700.4.3.1 * util-linux-extra-debuginfo-2.40.4-150700.4.3.1 * Basesystem Module 15-SP7 (x86_64) * libblkid1-32bit-debuginfo-2.40.4-150700.4.3.1 * libuuid1-32bit-2.40.4-150700.4.3.1 * libmount1-32bit-2.40.4-150700.4.3.1 * libuuid1-32bit-debuginfo-2.40.4-150700.4.3.1 * libblkid1-32bit-2.40.4-150700.4.3.1 * libmount1-32bit-debuginfo-2.40.4-150700.4.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14104.html * https://bugzilla.suse.com/show_bug.cgi?id=1254666 * https://jira.suse.com/browse/PED-13682 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:31:10 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:31:10 -0000 Subject: SUSE-SU-2026:0229-1: important: Security update for ffmpeg-4 Message-ID: <176911387073.16839.10374761880489295771@smelt2.prg2.suse.org> # Security update for ffmpeg-4 Announcement ID: SUSE-SU-2026:0229-1 Release Date: 2026-01-22T12:22:23Z Rating: important References: * bsc#1220545 * bsc#1255392 Cross-References: * CVE-2023-6601 * CVE-2025-63757 CVSS scores: * CVE-2023-6601 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2023-6601 ( NVD ): 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N * CVE-2023-6601 ( NVD ): 4.7 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N * CVE-2025-63757 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-63757 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-63757 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves two vulnerabilities can now be installed. ## Description: This update for ffmpeg-4 fixes the following issues: * CVE-2023-6601: Fixed HLS Unsafe File Extension Bypass (bsc#1220545). * CVE-2025-63757: Fixed integer overflow in yuv2ya16_X_c_template() (bsc#1255392). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-229=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-229=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-229=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-229=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-229=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libavformat58_76-debuginfo-4.4.6-150400.3.60.1 * ffmpeg-4-4.4.6-150400.3.60.1 * libavresample4_0-debuginfo-4.4.6-150400.3.60.1 * libavcodec58_134-debuginfo-4.4.6-150400.3.60.1 * ffmpeg-4-debugsource-4.4.6-150400.3.60.1 * ffmpeg-4-libswresample-devel-4.4.6-150400.3.60.1 * libavutil56_70-debuginfo-4.4.6-150400.3.60.1 * ffmpeg-4-libavresample-devel-4.4.6-150400.3.60.1 * libavcodec58_134-4.4.6-150400.3.60.1 * libavfilter7_110-4.4.6-150400.3.60.1 * libavformat58_76-4.4.6-150400.3.60.1 * libavutil56_70-4.4.6-150400.3.60.1 * libswresample3_9-4.4.6-150400.3.60.1 * ffmpeg-4-private-devel-4.4.6-150400.3.60.1 * libswresample3_9-debuginfo-4.4.6-150400.3.60.1 * libavresample4_0-4.4.6-150400.3.60.1 * libavfilter7_110-debuginfo-4.4.6-150400.3.60.1 * ffmpeg-4-libavformat-devel-4.4.6-150400.3.60.1 * ffmpeg-4-libavutil-devel-4.4.6-150400.3.60.1 * libpostproc55_9-4.4.6-150400.3.60.1 * libswscale5_9-4.4.6-150400.3.60.1 * libswscale5_9-debuginfo-4.4.6-150400.3.60.1 * ffmpeg-4-libavcodec-devel-4.4.6-150400.3.60.1 * libavdevice58_13-4.4.6-150400.3.60.1 * ffmpeg-4-libavdevice-devel-4.4.6-150400.3.60.1 * libavdevice58_13-debuginfo-4.4.6-150400.3.60.1 * libpostproc55_9-debuginfo-4.4.6-150400.3.60.1 * ffmpeg-4-debuginfo-4.4.6-150400.3.60.1 * ffmpeg-4-libavfilter-devel-4.4.6-150400.3.60.1 * ffmpeg-4-libswscale-devel-4.4.6-150400.3.60.1 * ffmpeg-4-libpostproc-devel-4.4.6-150400.3.60.1 * openSUSE Leap 15.4 (x86_64) * libavutil56_70-32bit-debuginfo-4.4.6-150400.3.60.1 * libswscale5_9-32bit-debuginfo-4.4.6-150400.3.60.1 * libavfilter7_110-32bit-debuginfo-4.4.6-150400.3.60.1 * libavfilter7_110-32bit-4.4.6-150400.3.60.1 * libpostproc55_9-32bit-4.4.6-150400.3.60.1 * libpostproc55_9-32bit-debuginfo-4.4.6-150400.3.60.1 * libavcodec58_134-32bit-4.4.6-150400.3.60.1 * libswresample3_9-32bit-debuginfo-4.4.6-150400.3.60.1 * libavdevice58_13-32bit-debuginfo-4.4.6-150400.3.60.1 * libavresample4_0-32bit-debuginfo-4.4.6-150400.3.60.1 * libavutil56_70-32bit-4.4.6-150400.3.60.1 * libavformat58_76-32bit-debuginfo-4.4.6-150400.3.60.1 * libswresample3_9-32bit-4.4.6-150400.3.60.1 * libavcodec58_134-32bit-debuginfo-4.4.6-150400.3.60.1 * libavformat58_76-32bit-4.4.6-150400.3.60.1 * libswscale5_9-32bit-4.4.6-150400.3.60.1 * libavdevice58_13-32bit-4.4.6-150400.3.60.1 * libavresample4_0-32bit-4.4.6-150400.3.60.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libavresample4_0-64bit-debuginfo-4.4.6-150400.3.60.1 * libavdevice58_13-64bit-debuginfo-4.4.6-150400.3.60.1 * libavformat58_76-64bit-4.4.6-150400.3.60.1 * libavcodec58_134-64bit-debuginfo-4.4.6-150400.3.60.1 * libavutil56_70-64bit-debuginfo-4.4.6-150400.3.60.1 * libavformat58_76-64bit-debuginfo-4.4.6-150400.3.60.1 * libswresample3_9-64bit-4.4.6-150400.3.60.1 * libavdevice58_13-64bit-4.4.6-150400.3.60.1 * libswscale5_9-64bit-4.4.6-150400.3.60.1 * libavresample4_0-64bit-4.4.6-150400.3.60.1 * libavutil56_70-64bit-4.4.6-150400.3.60.1 * libavfilter7_110-64bit-debuginfo-4.4.6-150400.3.60.1 * libavfilter7_110-64bit-4.4.6-150400.3.60.1 * libpostproc55_9-64bit-4.4.6-150400.3.60.1 * libpostproc55_9-64bit-debuginfo-4.4.6-150400.3.60.1 * libswscale5_9-64bit-debuginfo-4.4.6-150400.3.60.1 * libavcodec58_134-64bit-4.4.6-150400.3.60.1 * libswresample3_9-64bit-debuginfo-4.4.6-150400.3.60.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libpostproc55_9-4.4.6-150400.3.60.1 * libavformat58_76-4.4.6-150400.3.60.1 * libavutil56_70-4.4.6-150400.3.60.1 * libswresample3_9-4.4.6-150400.3.60.1 * libavcodec58_134-debuginfo-4.4.6-150400.3.60.1 * libswresample3_9-debuginfo-4.4.6-150400.3.60.1 * libswscale5_9-4.4.6-150400.3.60.1 * libavformat58_76-debuginfo-4.4.6-150400.3.60.1 * ffmpeg-4-debugsource-4.4.6-150400.3.60.1 * libavutil56_70-debuginfo-4.4.6-150400.3.60.1 * libpostproc55_9-debuginfo-4.4.6-150400.3.60.1 * libavcodec58_134-4.4.6-150400.3.60.1 * ffmpeg-4-debuginfo-4.4.6-150400.3.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libpostproc55_9-4.4.6-150400.3.60.1 * libavformat58_76-4.4.6-150400.3.60.1 * libavutil56_70-4.4.6-150400.3.60.1 * libswresample3_9-4.4.6-150400.3.60.1 * libavcodec58_134-debuginfo-4.4.6-150400.3.60.1 * libswresample3_9-debuginfo-4.4.6-150400.3.60.1 * libswscale5_9-4.4.6-150400.3.60.1 * libavformat58_76-debuginfo-4.4.6-150400.3.60.1 * ffmpeg-4-debugsource-4.4.6-150400.3.60.1 * libavutil56_70-debuginfo-4.4.6-150400.3.60.1 * libpostproc55_9-debuginfo-4.4.6-150400.3.60.1 * libavcodec58_134-4.4.6-150400.3.60.1 * ffmpeg-4-debuginfo-4.4.6-150400.3.60.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libpostproc55_9-4.4.6-150400.3.60.1 * libavformat58_76-4.4.6-150400.3.60.1 * libavutil56_70-4.4.6-150400.3.60.1 * libswresample3_9-4.4.6-150400.3.60.1 * libavcodec58_134-debuginfo-4.4.6-150400.3.60.1 * libswresample3_9-debuginfo-4.4.6-150400.3.60.1 * libswscale5_9-4.4.6-150400.3.60.1 * libavformat58_76-debuginfo-4.4.6-150400.3.60.1 * ffmpeg-4-debugsource-4.4.6-150400.3.60.1 * libavutil56_70-debuginfo-4.4.6-150400.3.60.1 * libpostproc55_9-debuginfo-4.4.6-150400.3.60.1 * libavcodec58_134-4.4.6-150400.3.60.1 * ffmpeg-4-debuginfo-4.4.6-150400.3.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libpostproc55_9-4.4.6-150400.3.60.1 * libavformat58_76-4.4.6-150400.3.60.1 * libavutil56_70-4.4.6-150400.3.60.1 * libswresample3_9-4.4.6-150400.3.60.1 * libavcodec58_134-debuginfo-4.4.6-150400.3.60.1 * libswresample3_9-debuginfo-4.4.6-150400.3.60.1 * libswscale5_9-4.4.6-150400.3.60.1 * libavformat58_76-debuginfo-4.4.6-150400.3.60.1 * ffmpeg-4-debugsource-4.4.6-150400.3.60.1 * libavutil56_70-debuginfo-4.4.6-150400.3.60.1 * libpostproc55_9-debuginfo-4.4.6-150400.3.60.1 * libavcodec58_134-4.4.6-150400.3.60.1 * ffmpeg-4-debuginfo-4.4.6-150400.3.60.1 ## References: * https://www.suse.com/security/cve/CVE-2023-6601.html * https://www.suse.com/security/cve/CVE-2025-63757.html * https://bugzilla.suse.com/show_bug.cgi?id=1220545 * https://bugzilla.suse.com/show_bug.cgi?id=1255392 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:31:13 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:31:13 -0000 Subject: SUSE-SU-2026:0228-1: important: Security update for net-snmp Message-ID: <176911387342.16839.8185353805512694537@smelt2.prg2.suse.org> # Security update for net-snmp Announcement ID: SUSE-SU-2026:0228-1 Release Date: 2026-01-22T12:22:04Z Rating: important References: * bsc#1255491 Cross-References: * CVE-2025-68615 CVSS scores: * CVE-2025-68615 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68615 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68615 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for net-snmp fixes the following issues: * CVE-2025-68615: Fixed snmptrapd buffer overflow (bsc#1255491) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-228=1 openSUSE-SLE-15.6-2026-228=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-228=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-228=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-228=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-228=1 ## Package List: * openSUSE Leap 15.6 (x86_64) * libsnmp40-32bit-debuginfo-5.9.4-150600.24.10.1 * net-snmp-devel-32bit-5.9.4-150600.24.10.1 * libsnmp40-32bit-5.9.4-150600.24.10.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * net-snmp-debuginfo-5.9.4-150600.24.10.1 * snmp-mibs-5.9.4-150600.24.10.1 * libsnmp40-debuginfo-5.9.4-150600.24.10.1 * net-snmp-debugsource-5.9.4-150600.24.10.1 * python3-net-snmp-5.9.4-150600.24.10.1 * python3-net-snmp-debuginfo-5.9.4-150600.24.10.1 * net-snmp-5.9.4-150600.24.10.1 * libsnmp40-5.9.4-150600.24.10.1 * net-snmp-devel-5.9.4-150600.24.10.1 * perl-SNMP-5.9.4-150600.24.10.1 * perl-SNMP-debuginfo-5.9.4-150600.24.10.1 * openSUSE Leap 15.6 (aarch64_ilp32) * net-snmp-devel-64bit-5.9.4-150600.24.10.1 * libsnmp40-64bit-5.9.4-150600.24.10.1 * libsnmp40-64bit-debuginfo-5.9.4-150600.24.10.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * net-snmp-debuginfo-5.9.4-150600.24.10.1 * snmp-mibs-5.9.4-150600.24.10.1 * libsnmp40-debuginfo-5.9.4-150600.24.10.1 * net-snmp-debugsource-5.9.4-150600.24.10.1 * net-snmp-5.9.4-150600.24.10.1 * libsnmp40-5.9.4-150600.24.10.1 * net-snmp-devel-5.9.4-150600.24.10.1 * perl-SNMP-5.9.4-150600.24.10.1 * perl-SNMP-debuginfo-5.9.4-150600.24.10.1 * SUSE Package Hub 15 15-SP7 (x86_64) * libsnmp40-32bit-debuginfo-5.9.4-150600.24.10.1 * libsnmp40-32bit-5.9.4-150600.24.10.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * net-snmp-debuginfo-5.9.4-150600.24.10.1 * snmp-mibs-5.9.4-150600.24.10.1 * libsnmp40-debuginfo-5.9.4-150600.24.10.1 * net-snmp-debugsource-5.9.4-150600.24.10.1 * net-snmp-5.9.4-150600.24.10.1 * libsnmp40-5.9.4-150600.24.10.1 * net-snmp-devel-5.9.4-150600.24.10.1 * perl-SNMP-5.9.4-150600.24.10.1 * perl-SNMP-debuginfo-5.9.4-150600.24.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * net-snmp-debuginfo-5.9.4-150600.24.10.1 * snmp-mibs-5.9.4-150600.24.10.1 * libsnmp40-debuginfo-5.9.4-150600.24.10.1 * net-snmp-debugsource-5.9.4-150600.24.10.1 * net-snmp-5.9.4-150600.24.10.1 * libsnmp40-5.9.4-150600.24.10.1 * net-snmp-devel-5.9.4-150600.24.10.1 * perl-SNMP-5.9.4-150600.24.10.1 * perl-SNMP-debuginfo-5.9.4-150600.24.10.1 ## References: * https://www.suse.com/security/cve/CVE-2025-68615.html * https://bugzilla.suse.com/show_bug.cgi?id=1255491 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:31:16 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:31:16 -0000 Subject: SUSE-SU-2026:0227-1: important: Security update for net-snmp Message-ID: <176911387619.16839.3442773573740045906@smelt2.prg2.suse.org> # Security update for net-snmp Announcement ID: SUSE-SU-2026:0227-1 Release Date: 2026-01-22T12:21:40Z Rating: important References: * bsc#1255491 Cross-References: * CVE-2025-68615 CVSS scores: * CVE-2025-68615 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68615 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68615 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for net-snmp fixes the following issues: * CVE-2025-68615: Fixed snmptrapd buffer overflow (bsc#1255491) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-227=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-227=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-227=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-227=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-227=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-227=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-227=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-227=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-227=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2026-227=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-227=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-227=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-227=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-227=1 ## Package List: * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * snmp-mibs-5.9.4-150300.15.21.1 * net-snmp-debugsource-5.9.4-150300.15.21.1 * libsnmp40-debuginfo-5.9.4-150300.15.21.1 * net-snmp-debuginfo-5.9.4-150300.15.21.1 * libsnmp40-5.9.4-150300.15.21.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * net-snmp-5.9.4-150300.15.21.1 * perl-SNMP-debuginfo-5.9.4-150300.15.21.1 * perl-SNMP-5.9.4-150300.15.21.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * net-snmp-devel-5.9.4-150300.15.21.1 * snmp-mibs-5.9.4-150300.15.21.1 * net-snmp-debugsource-5.9.4-150300.15.21.1 * libsnmp40-debuginfo-5.9.4-150300.15.21.1 * perl-SNMP-5.9.4-150300.15.21.1 * net-snmp-debuginfo-5.9.4-150300.15.21.1 * perl-SNMP-debuginfo-5.9.4-150300.15.21.1 * net-snmp-5.9.4-150300.15.21.1 * libsnmp40-5.9.4-150300.15.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * net-snmp-devel-5.9.4-150300.15.21.1 * snmp-mibs-5.9.4-150300.15.21.1 * net-snmp-debugsource-5.9.4-150300.15.21.1 * libsnmp40-debuginfo-5.9.4-150300.15.21.1 * perl-SNMP-5.9.4-150300.15.21.1 * net-snmp-debuginfo-5.9.4-150300.15.21.1 * perl-SNMP-debuginfo-5.9.4-150300.15.21.1 * net-snmp-5.9.4-150300.15.21.1 * libsnmp40-5.9.4-150300.15.21.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * net-snmp-devel-5.9.4-150300.15.21.1 * snmp-mibs-5.9.4-150300.15.21.1 * net-snmp-debugsource-5.9.4-150300.15.21.1 * libsnmp40-debuginfo-5.9.4-150300.15.21.1 * perl-SNMP-5.9.4-150300.15.21.1 * net-snmp-debuginfo-5.9.4-150300.15.21.1 * perl-SNMP-debuginfo-5.9.4-150300.15.21.1 * net-snmp-5.9.4-150300.15.21.1 * libsnmp40-5.9.4-150300.15.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * net-snmp-devel-5.9.4-150300.15.21.1 * snmp-mibs-5.9.4-150300.15.21.1 * net-snmp-debugsource-5.9.4-150300.15.21.1 * libsnmp40-debuginfo-5.9.4-150300.15.21.1 * perl-SNMP-5.9.4-150300.15.21.1 * net-snmp-debuginfo-5.9.4-150300.15.21.1 * perl-SNMP-debuginfo-5.9.4-150300.15.21.1 * net-snmp-5.9.4-150300.15.21.1 * libsnmp40-5.9.4-150300.15.21.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * net-snmp-devel-5.9.4-150300.15.21.1 * snmp-mibs-5.9.4-150300.15.21.1 * net-snmp-debugsource-5.9.4-150300.15.21.1 * libsnmp40-debuginfo-5.9.4-150300.15.21.1 * perl-SNMP-5.9.4-150300.15.21.1 * net-snmp-debuginfo-5.9.4-150300.15.21.1 * perl-SNMP-debuginfo-5.9.4-150300.15.21.1 * net-snmp-5.9.4-150300.15.21.1 * libsnmp40-5.9.4-150300.15.21.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * net-snmp-devel-5.9.4-150300.15.21.1 * snmp-mibs-5.9.4-150300.15.21.1 * net-snmp-debugsource-5.9.4-150300.15.21.1 * libsnmp40-debuginfo-5.9.4-150300.15.21.1 * perl-SNMP-5.9.4-150300.15.21.1 * net-snmp-debuginfo-5.9.4-150300.15.21.1 * perl-SNMP-debuginfo-5.9.4-150300.15.21.1 * net-snmp-5.9.4-150300.15.21.1 * libsnmp40-5.9.4-150300.15.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * net-snmp-devel-5.9.4-150300.15.21.1 * snmp-mibs-5.9.4-150300.15.21.1 * net-snmp-debugsource-5.9.4-150300.15.21.1 * libsnmp40-debuginfo-5.9.4-150300.15.21.1 * perl-SNMP-5.9.4-150300.15.21.1 * net-snmp-debuginfo-5.9.4-150300.15.21.1 * perl-SNMP-debuginfo-5.9.4-150300.15.21.1 * net-snmp-5.9.4-150300.15.21.1 * libsnmp40-5.9.4-150300.15.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * net-snmp-devel-5.9.4-150300.15.21.1 * snmp-mibs-5.9.4-150300.15.21.1 * net-snmp-debugsource-5.9.4-150300.15.21.1 * libsnmp40-debuginfo-5.9.4-150300.15.21.1 * perl-SNMP-5.9.4-150300.15.21.1 * net-snmp-debuginfo-5.9.4-150300.15.21.1 * perl-SNMP-debuginfo-5.9.4-150300.15.21.1 * net-snmp-5.9.4-150300.15.21.1 * libsnmp40-5.9.4-150300.15.21.1 * openSUSE Leap 15.3 (x86_64) * net-snmp-devel-32bit-5.9.4-150300.15.21.1 * libsnmp40-32bit-5.9.4-150300.15.21.1 * libsnmp40-32bit-debuginfo-5.9.4-150300.15.21.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * python3-net-snmp-5.9.4-150300.15.21.1 * net-snmp-devel-5.9.4-150300.15.21.1 * snmp-mibs-5.9.4-150300.15.21.1 * net-snmp-debugsource-5.9.4-150300.15.21.1 * libsnmp40-debuginfo-5.9.4-150300.15.21.1 * python2-net-snmp-debuginfo-5.9.4-150300.15.21.1 * perl-SNMP-5.9.4-150300.15.21.1 * net-snmp-debuginfo-5.9.4-150300.15.21.1 * perl-SNMP-debuginfo-5.9.4-150300.15.21.1 * python2-net-snmp-5.9.4-150300.15.21.1 * net-snmp-5.9.4-150300.15.21.1 * libsnmp40-5.9.4-150300.15.21.1 * python3-net-snmp-debuginfo-5.9.4-150300.15.21.1 * openSUSE Leap 15.3 (aarch64_ilp32) * net-snmp-devel-64bit-5.9.4-150300.15.21.1 * libsnmp40-64bit-debuginfo-5.9.4-150300.15.21.1 * libsnmp40-64bit-5.9.4-150300.15.21.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * snmp-mibs-5.9.4-150300.15.21.1 * net-snmp-debugsource-5.9.4-150300.15.21.1 * libsnmp40-debuginfo-5.9.4-150300.15.21.1 * net-snmp-debuginfo-5.9.4-150300.15.21.1 * libsnmp40-5.9.4-150300.15.21.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * snmp-mibs-5.9.4-150300.15.21.1 * net-snmp-debugsource-5.9.4-150300.15.21.1 * libsnmp40-debuginfo-5.9.4-150300.15.21.1 * net-snmp-debuginfo-5.9.4-150300.15.21.1 * libsnmp40-5.9.4-150300.15.21.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * snmp-mibs-5.9.4-150300.15.21.1 * net-snmp-debugsource-5.9.4-150300.15.21.1 * libsnmp40-debuginfo-5.9.4-150300.15.21.1 * net-snmp-debuginfo-5.9.4-150300.15.21.1 * libsnmp40-5.9.4-150300.15.21.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * snmp-mibs-5.9.4-150300.15.21.1 * net-snmp-debugsource-5.9.4-150300.15.21.1 * libsnmp40-debuginfo-5.9.4-150300.15.21.1 * net-snmp-debuginfo-5.9.4-150300.15.21.1 * libsnmp40-5.9.4-150300.15.21.1 ## References: * https://www.suse.com/security/cve/CVE-2025-68615.html * https://bugzilla.suse.com/show_bug.cgi?id=1255491 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:31:18 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:31:18 -0000 Subject: SUSE-SU-2026:0226-1: moderate: Security update for python-marshmallow Message-ID: <176911387868.16839.4188688000393898035@smelt2.prg2.suse.org> # Security update for python-marshmallow Announcement ID: SUSE-SU-2026:0226-1 Release Date: 2026-01-22T12:20:28Z Rating: moderate References: * bsc#1255473 Cross-References: * CVE-2025-68480 CVSS scores: * CVE-2025-68480 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-68480 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-68480 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * Public Cloud Module 15-SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python-marshmallow fixes the following issues: * CVE-2025-68480: Fixed possible DoS when using Schema.load(data, many=True) (bsc#1255473). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-226=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-226=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-226=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2026-226=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2026-226=1 * Public Cloud Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2026-226=1 ## Package List: * openSUSE Leap 15.4 (noarch) * python311-marshmallow-3.20.2-150400.9.10.1 * openSUSE Leap 15.6 (noarch) * python311-marshmallow-3.20.2-150400.9.10.1 * Public Cloud Module 15-SP4 (noarch) * python311-marshmallow-3.20.2-150400.9.10.1 * Public Cloud Module 15-SP5 (noarch) * python311-marshmallow-3.20.2-150400.9.10.1 * Public Cloud Module 15-SP6 (noarch) * python311-marshmallow-3.20.2-150400.9.10.1 * Public Cloud Module 15-SP7 (noarch) * python311-marshmallow-3.20.2-150400.9.10.1 ## References: * https://www.suse.com/security/cve/CVE-2025-68480.html * https://bugzilla.suse.com/show_bug.cgi?id=1255473 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:31:21 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:31:21 -0000 Subject: SUSE-SU-2026:0225-1: important: Security update for net-snmp Message-ID: <176911388154.16839.14069009668435465865@smelt2.prg2.suse.org> # Security update for net-snmp Announcement ID: SUSE-SU-2026:0225-1 Release Date: 2026-01-22T12:20:00Z Rating: important References: * bsc#1255491 Cross-References: * CVE-2025-68615 CVSS scores: * CVE-2025-68615 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68615 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68615 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for net-snmp fixes the following issues: * CVE-2025-68615: Fixed snmptrapd buffer overflow (bsc#1255491). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-225=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-225=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-225=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-225=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-225=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-225=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-225=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-225=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-225=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-225=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-225=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-225=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-225=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-225=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libsnmp30-debuginfo-5.7.3-150100.10.15.1 * libsnmp30-5.7.3-150100.10.15.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libsnmp30-debuginfo-5.7.3-150100.10.15.1 * libsnmp30-5.7.3-150100.10.15.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libsnmp30-debuginfo-5.7.3-150100.10.15.1 * net-snmp-debugsource-5.7.3-150100.10.15.1 * net-snmp-debuginfo-5.7.3-150100.10.15.1 * libsnmp30-5.7.3-150100.10.15.1 * SUSE Package Hub 15 15-SP7 (x86_64) * libsnmp30-32bit-5.7.3-150100.10.15.1 * libsnmp30-32bit-debuginfo-5.7.3-150100.10.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libsnmp30-debuginfo-5.7.3-150100.10.15.1 * libsnmp30-5.7.3-150100.10.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libsnmp30-debuginfo-5.7.3-150100.10.15.1 * libsnmp30-5.7.3-150100.10.15.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libsnmp30-debuginfo-5.7.3-150100.10.15.1 * net-snmp-debugsource-5.7.3-150100.10.15.1 * net-snmp-debuginfo-5.7.3-150100.10.15.1 * libsnmp30-5.7.3-150100.10.15.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libsnmp30-debuginfo-5.7.3-150100.10.15.1 * net-snmp-debugsource-5.7.3-150100.10.15.1 * net-snmp-debuginfo-5.7.3-150100.10.15.1 * libsnmp30-5.7.3-150100.10.15.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libsnmp30-debuginfo-5.7.3-150100.10.15.1 * libsnmp30-5.7.3-150100.10.15.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libsnmp30-debuginfo-5.7.3-150100.10.15.1 * net-snmp-debugsource-5.7.3-150100.10.15.1 * net-snmp-debuginfo-5.7.3-150100.10.15.1 * libsnmp30-5.7.3-150100.10.15.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * libsnmp30-debuginfo-5.7.3-150100.10.15.1 * net-snmp-debugsource-5.7.3-150100.10.15.1 * net-snmp-debuginfo-5.7.3-150100.10.15.1 * libsnmp30-5.7.3-150100.10.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libsnmp30-debuginfo-5.7.3-150100.10.15.1 * libsnmp30-5.7.3-150100.10.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libsnmp30-debuginfo-5.7.3-150100.10.15.1 * net-snmp-debugsource-5.7.3-150100.10.15.1 * net-snmp-debuginfo-5.7.3-150100.10.15.1 * libsnmp30-5.7.3-150100.10.15.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * libsnmp30-debuginfo-5.7.3-150100.10.15.1 * net-snmp-debugsource-5.7.3-150100.10.15.1 * net-snmp-debuginfo-5.7.3-150100.10.15.1 * libsnmp30-5.7.3-150100.10.15.1 ## References: * https://www.suse.com/security/cve/CVE-2025-68615.html * https://bugzilla.suse.com/show_bug.cgi?id=1255491 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:31:24 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:31:24 -0000 Subject: SUSE-SU-2026:0224-1: moderate: Security update for libtasn1 Message-ID: <176911388406.16839.3414963787201157982@smelt2.prg2.suse.org> # Security update for libtasn1 Announcement ID: SUSE-SU-2026:0224-1 Release Date: 2026-01-22T12:18:39Z Rating: moderate References: * bsc#1256341 Cross-References: * CVE-2025-13151 CVSS scores: * CVE-2025-13151 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-13151 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H * CVE-2025-13151 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for libtasn1 fixes the following issues: * CVE-2025-13151: stack-based buffer overflow in `asn1_expend_octet_string` (bsc#1256341). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-224=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-224=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-224=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-224=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-224=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-224=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-224=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-224=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-224=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libtasn1-4.13-150000.4.14.1 * libtasn1-6-4.13-150000.4.14.1 * libtasn1-debugsource-4.13-150000.4.14.1 * libtasn1-6-debuginfo-4.13-150000.4.14.1 * libtasn1-devel-4.13-150000.4.14.1 * libtasn1-debuginfo-4.13-150000.4.14.1 * openSUSE Leap 15.6 (x86_64) * libtasn1-devel-32bit-4.13-150000.4.14.1 * libtasn1-6-32bit-4.13-150000.4.14.1 * libtasn1-6-32bit-debuginfo-4.13-150000.4.14.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libtasn1-4.13-150000.4.14.1 * libtasn1-6-4.13-150000.4.14.1 * libtasn1-debugsource-4.13-150000.4.14.1 * libtasn1-6-debuginfo-4.13-150000.4.14.1 * libtasn1-debuginfo-4.13-150000.4.14.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libtasn1-4.13-150000.4.14.1 * libtasn1-6-4.13-150000.4.14.1 * libtasn1-debugsource-4.13-150000.4.14.1 * libtasn1-6-debuginfo-4.13-150000.4.14.1 * libtasn1-debuginfo-4.13-150000.4.14.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libtasn1-4.13-150000.4.14.1 * libtasn1-6-4.13-150000.4.14.1 * libtasn1-debugsource-4.13-150000.4.14.1 * libtasn1-6-debuginfo-4.13-150000.4.14.1 * libtasn1-debuginfo-4.13-150000.4.14.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libtasn1-4.13-150000.4.14.1 * libtasn1-6-4.13-150000.4.14.1 * libtasn1-debugsource-4.13-150000.4.14.1 * libtasn1-6-debuginfo-4.13-150000.4.14.1 * libtasn1-debuginfo-4.13-150000.4.14.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libtasn1-4.13-150000.4.14.1 * libtasn1-6-4.13-150000.4.14.1 * libtasn1-debugsource-4.13-150000.4.14.1 * libtasn1-6-debuginfo-4.13-150000.4.14.1 * libtasn1-debuginfo-4.13-150000.4.14.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libtasn1-4.13-150000.4.14.1 * libtasn1-6-4.13-150000.4.14.1 * libtasn1-debugsource-4.13-150000.4.14.1 * libtasn1-6-debuginfo-4.13-150000.4.14.1 * libtasn1-devel-4.13-150000.4.14.1 * libtasn1-debuginfo-4.13-150000.4.14.1 * Basesystem Module 15-SP7 (x86_64) * libtasn1-6-32bit-4.13-150000.4.14.1 * libtasn1-6-32bit-debuginfo-4.13-150000.4.14.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libtasn1-4.13-150000.4.14.1 * libtasn1-6-4.13-150000.4.14.1 * libtasn1-debugsource-4.13-150000.4.14.1 * libtasn1-6-debuginfo-4.13-150000.4.14.1 * libtasn1-debuginfo-4.13-150000.4.14.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libtasn1-4.13-150000.4.14.1 * libtasn1-6-4.13-150000.4.14.1 * libtasn1-debugsource-4.13-150000.4.14.1 * libtasn1-6-debuginfo-4.13-150000.4.14.1 * libtasn1-debuginfo-4.13-150000.4.14.1 ## References: * https://www.suse.com/security/cve/CVE-2025-13151.html * https://bugzilla.suse.com/show_bug.cgi?id=1256341 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:31:26 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:31:26 -0000 Subject: SUSE-SU-2026:0223-1: moderate: Security update for libsodium Message-ID: <176911388674.16839.15583912233773598725@smelt2.prg2.suse.org> # Security update for libsodium Announcement ID: SUSE-SU-2026:0223-1 Release Date: 2026-01-22T12:18:06Z Rating: moderate References: * bsc#1256070 Cross-References: * CVE-2025-15444 CVSS scores: * CVE-2025-15444 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N * CVE-2025-15444 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for libsodium fixes the following issues: * CVE-2025-15444: fixed cryptographic bypass via improper elliptic curve point validation (bsc#1256070). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-223=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-223=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-223=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-223=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-223=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-223=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-223=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-223=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-223=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libsodium-debugsource-1.0.18-150000.4.11.1 * libsodium23-debuginfo-1.0.18-150000.4.11.1 * libsodium23-1.0.18-150000.4.11.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libsodium-debugsource-1.0.18-150000.4.11.1 * libsodium23-debuginfo-1.0.18-150000.4.11.1 * libsodium23-1.0.18-150000.4.11.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * libsodium-debugsource-1.0.18-150000.4.11.1 * libsodium-devel-1.0.18-150000.4.11.1 * libsodium23-1.0.18-150000.4.11.1 * libsodium23-debuginfo-1.0.18-150000.4.11.1 * openSUSE Leap 15.6 (x86_64) * libsodium23-32bit-1.0.18-150000.4.11.1 * libsodium23-32bit-debuginfo-1.0.18-150000.4.11.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libsodium-debugsource-1.0.18-150000.4.11.1 * libsodium23-debuginfo-1.0.18-150000.4.11.1 * libsodium23-1.0.18-150000.4.11.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libsodium-debugsource-1.0.18-150000.4.11.1 * libsodium23-debuginfo-1.0.18-150000.4.11.1 * libsodium23-1.0.18-150000.4.11.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libsodium-debugsource-1.0.18-150000.4.11.1 * libsodium23-debuginfo-1.0.18-150000.4.11.1 * libsodium23-1.0.18-150000.4.11.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libsodium-debugsource-1.0.18-150000.4.11.1 * libsodium23-debuginfo-1.0.18-150000.4.11.1 * libsodium23-1.0.18-150000.4.11.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libsodium-debugsource-1.0.18-150000.4.11.1 * libsodium23-debuginfo-1.0.18-150000.4.11.1 * libsodium23-1.0.18-150000.4.11.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libsodium-debugsource-1.0.18-150000.4.11.1 * libsodium-devel-1.0.18-150000.4.11.1 * libsodium23-1.0.18-150000.4.11.1 * libsodium23-debuginfo-1.0.18-150000.4.11.1 * Basesystem Module 15-SP7 (x86_64) * libsodium23-32bit-1.0.18-150000.4.11.1 * libsodium23-32bit-debuginfo-1.0.18-150000.4.11.1 ## References: * https://www.suse.com/security/cve/CVE-2025-15444.html * https://bugzilla.suse.com/show_bug.cgi?id=1256070 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:31:30 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:31:30 -0000 Subject: SUSE-SU-2026:0222-1: important: Security update for python-tornado Message-ID: <176911389002.16839.17820102233117975952@smelt2.prg2.suse.org> # Security update for python-tornado Announcement ID: SUSE-SU-2026:0222-1 Release Date: 2026-01-22T12:17:37Z Rating: important References: * bsc#1254904 * bsc#1254905 Cross-References: * CVE-2025-67725 * CVE-2025-67726 CVSS scores: * CVE-2025-67725 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-67725 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67725 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67726 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-67726 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-67726 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for python-tornado fixes the following issues: * CVE-2025-67725: inefficient algorithm when parsing parameters for HTTP header values (bsc#1254905). * CVE-2025-67726: Denial of Service (DoS) via maliciously crafted HTTP request caused by the HTTPHeaders.add method (bsc#1254904). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-222=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-222=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-222=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-222=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-222=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-222=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-222=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-222=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-222=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-222=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-222=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-222=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-222=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-222=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-222=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-222=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-222=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-222=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.13.1 * python3-tornado-4.5.3-150000.3.13.1 * python3-tornado-debuginfo-4.5.3-150000.3.13.1 * python-tornado-debugsource-4.5.3-150000.3.13.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.13.1 * python3-tornado-4.5.3-150000.3.13.1 * python3-tornado-debuginfo-4.5.3-150000.3.13.1 * python-tornado-debugsource-4.5.3-150000.3.13.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.13.1 * python3-tornado-4.5.3-150000.3.13.1 * python3-tornado-debuginfo-4.5.3-150000.3.13.1 * python-tornado-debugsource-4.5.3-150000.3.13.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.13.1 * python3-tornado-4.5.3-150000.3.13.1 * python3-tornado-debuginfo-4.5.3-150000.3.13.1 * python-tornado-debugsource-4.5.3-150000.3.13.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.13.1 * python3-tornado-4.5.3-150000.3.13.1 * python3-tornado-debuginfo-4.5.3-150000.3.13.1 * python-tornado-debugsource-4.5.3-150000.3.13.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.13.1 * python3-tornado-4.5.3-150000.3.13.1 * python3-tornado-debuginfo-4.5.3-150000.3.13.1 * python-tornado-debugsource-4.5.3-150000.3.13.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * python-tornado-debuginfo-4.5.3-150000.3.13.1 * python3-tornado-4.5.3-150000.3.13.1 * python3-tornado-debuginfo-4.5.3-150000.3.13.1 * python-tornado-debugsource-4.5.3-150000.3.13.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * python-tornado-debuginfo-4.5.3-150000.3.13.1 * python3-tornado-4.5.3-150000.3.13.1 * python3-tornado-debuginfo-4.5.3-150000.3.13.1 * python-tornado-debugsource-4.5.3-150000.3.13.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * python-tornado-debuginfo-4.5.3-150000.3.13.1 * python3-tornado-4.5.3-150000.3.13.1 * python3-tornado-debuginfo-4.5.3-150000.3.13.1 * python-tornado-debugsource-4.5.3-150000.3.13.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * python-tornado-debuginfo-4.5.3-150000.3.13.1 * python3-tornado-4.5.3-150000.3.13.1 * python3-tornado-debuginfo-4.5.3-150000.3.13.1 * python-tornado-debugsource-4.5.3-150000.3.13.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.13.1 * python3-tornado-4.5.3-150000.3.13.1 * python3-tornado-debuginfo-4.5.3-150000.3.13.1 * python-tornado-debugsource-4.5.3-150000.3.13.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.13.1 * python3-tornado-4.5.3-150000.3.13.1 * python3-tornado-debuginfo-4.5.3-150000.3.13.1 * python-tornado-debugsource-4.5.3-150000.3.13.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.13.1 * python3-tornado-4.5.3-150000.3.13.1 * python3-tornado-debuginfo-4.5.3-150000.3.13.1 * python-tornado-debugsource-4.5.3-150000.3.13.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * python-tornado-debuginfo-4.5.3-150000.3.13.1 * python3-tornado-4.5.3-150000.3.13.1 * python3-tornado-debuginfo-4.5.3-150000.3.13.1 * python-tornado-debugsource-4.5.3-150000.3.13.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * python-tornado-debuginfo-4.5.3-150000.3.13.1 * python3-tornado-4.5.3-150000.3.13.1 * python3-tornado-debuginfo-4.5.3-150000.3.13.1 * python-tornado-debugsource-4.5.3-150000.3.13.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * python-tornado-debuginfo-4.5.3-150000.3.13.1 * python3-tornado-4.5.3-150000.3.13.1 * python3-tornado-debuginfo-4.5.3-150000.3.13.1 * python-tornado-debugsource-4.5.3-150000.3.13.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.13.1 * python3-tornado-4.5.3-150000.3.13.1 * python3-tornado-debuginfo-4.5.3-150000.3.13.1 * python-tornado-debugsource-4.5.3-150000.3.13.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * python-tornado-debuginfo-4.5.3-150000.3.13.1 * python3-tornado-4.5.3-150000.3.13.1 * python3-tornado-debuginfo-4.5.3-150000.3.13.1 * python-tornado-debugsource-4.5.3-150000.3.13.1 ## References: * https://www.suse.com/security/cve/CVE-2025-67725.html * https://www.suse.com/security/cve/CVE-2025-67726.html * https://bugzilla.suse.com/show_bug.cgi?id=1254904 * https://bugzilla.suse.com/show_bug.cgi?id=1254905 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:31:32 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:31:32 -0000 Subject: SUSE-SU-2026:0221-1: moderate: Security update for curl Message-ID: <176911389226.16839.16116340282168659728@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2026:0221-1 Release Date: 2026-01-22T12:15:42Z Rating: moderate References: * bsc#1256105 Cross-References: * CVE-2025-14017 CVSS scores: * CVE-2025-14017 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-14017 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-14017 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for curl fixes the following issues: * CVE-2025-14017: Fixed broken TLS options for threaded LDAPS (bsc#1256105). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-221=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libcurl-devel-8.14.1-150700.7.11.1 * curl-debuginfo-8.14.1-150700.7.11.1 * libcurl4-debuginfo-8.14.1-150700.7.11.1 * curl-8.14.1-150700.7.11.1 * libcurl4-8.14.1-150700.7.11.1 * curl-debugsource-8.14.1-150700.7.11.1 * Basesystem Module 15-SP7 (x86_64) * libcurl4-32bit-8.14.1-150700.7.11.1 * libcurl4-32bit-debuginfo-8.14.1-150700.7.11.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14017.html * https://bugzilla.suse.com/show_bug.cgi?id=1256105 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:31:35 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:31:35 -0000 Subject: SUSE-SU-2026:0220-1: moderate: Security update for python-filelock Message-ID: <176911389580.16839.2911381358125138749@smelt2.prg2.suse.org> # Security update for python-filelock Announcement ID: SUSE-SU-2026:0220-1 Release Date: 2026-01-22T12:15:30Z Rating: moderate References: * bsc#1255244 * bsc#1256457 Cross-References: * CVE-2025-68146 * CVE-2026-22701 CVSS scores: * CVE-2025-68146 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-68146 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-68146 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2026-22701 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2026-22701 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2026-22701 ( NVD ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for python-filelock fixes the following issues: * CVE-2025-68146: TOCTOU race condition may allow local attackers to corrupt or truncate arbitrary user files (bsc#1255244). * CVE-2026-22701: TOCTOU race condition in the SoftFileLock implementation (bsc#1256457). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-220=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-220=1 * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-220=1 ## Package List: * openSUSE Leap 15.4 (noarch) * python311-filelock-3.12.2-150400.10.8.1 * openSUSE Leap 15.6 (noarch) * python311-filelock-3.12.2-150400.10.8.1 * Python 3 Module 15-SP7 (noarch) * python311-filelock-3.12.2-150400.10.8.1 ## References: * https://www.suse.com/security/cve/CVE-2025-68146.html * https://www.suse.com/security/cve/CVE-2026-22701.html * https://bugzilla.suse.com/show_bug.cgi?id=1255244 * https://bugzilla.suse.com/show_bug.cgi?id=1256457 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:31:43 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:31:43 -0000 Subject: SUSE-SU-2026:0219-1: important: Security update for go1.24 Message-ID: <176911390312.16839.11368590033572612598@smelt2.prg2.suse.org> # Security update for go1.24 Announcement ID: SUSE-SU-2026:0219-1 Release Date: 2026-01-22T12:14:15Z Rating: important References: * bsc#1236217 * bsc#1256816 * bsc#1256817 * bsc#1256818 * bsc#1256819 * bsc#1256820 * bsc#1256821 Cross-References: * CVE-2025-61726 * CVE-2025-61728 * CVE-2025-61730 * CVE-2025-61731 * CVE-2025-68119 * CVE-2025-68121 CVSS scores: * CVE-2025-61726 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61726 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-61728 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-61730 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-61730 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-61731 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-61731 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-68119 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68119 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-68121 ( SUSE ): 7.6 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-68121 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves six vulnerabilities and has one security fix can now be installed. ## Description: This update for go1.24 fixes the following issues: Update to go1.24.12 (released 2026-01-15) (bsc#1236217) Security fixes: * CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821). * CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820). * CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819). * CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817). * CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816). * CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818). Other fixes: * go#76408 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled * go#76624 os: on Unix, Readdirnames skips directory entries with zero inodes * go#76760 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386 * go#76796 runtime: race detector crash on ppc64le * go#76966 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling <function>: runtime error: index out of range ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-219=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-219=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-219=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-219=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-219=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-219=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-219=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-219=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-219=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-219=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-219=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-219=1 ## Package List: * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * go1.24-doc-1.24.12-150000.1.53.1 * go1.24-1.24.12-150000.1.53.1 * go1.24-race-1.24.12-150000.1.53.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * go1.24-doc-1.24.12-150000.1.53.1 * go1.24-1.24.12-150000.1.53.1 * go1.24-race-1.24.12-150000.1.53.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * go1.24-doc-1.24.12-150000.1.53.1 * go1.24-1.24.12-150000.1.53.1 * go1.24-race-1.24.12-150000.1.53.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * go1.24-doc-1.24.12-150000.1.53.1 * go1.24-1.24.12-150000.1.53.1 * go1.24-race-1.24.12-150000.1.53.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * go1.24-doc-1.24.12-150000.1.53.1 * go1.24-1.24.12-150000.1.53.1 * go1.24-race-1.24.12-150000.1.53.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * go1.24-doc-1.24.12-150000.1.53.1 * go1.24-1.24.12-150000.1.53.1 * go1.24-race-1.24.12-150000.1.53.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * go1.24-doc-1.24.12-150000.1.53.1 * go1.24-1.24.12-150000.1.53.1 * go1.24-race-1.24.12-150000.1.53.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * go1.24-doc-1.24.12-150000.1.53.1 * go1.24-1.24.12-150000.1.53.1 * go1.24-race-1.24.12-150000.1.53.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * go1.24-doc-1.24.12-150000.1.53.1 * go1.24-1.24.12-150000.1.53.1 * go1.24-race-1.24.12-150000.1.53.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * go1.24-doc-1.24.12-150000.1.53.1 * go1.24-1.24.12-150000.1.53.1 * go1.24-race-1.24.12-150000.1.53.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * go1.24-doc-1.24.12-150000.1.53.1 * go1.24-1.24.12-150000.1.53.1 * go1.24-race-1.24.12-150000.1.53.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * go1.24-doc-1.24.12-150000.1.53.1 * go1.24-1.24.12-150000.1.53.1 * go1.24-race-1.24.12-150000.1.53.1 ## References: * https://www.suse.com/security/cve/CVE-2025-61726.html * https://www.suse.com/security/cve/CVE-2025-61728.html * https://www.suse.com/security/cve/CVE-2025-61730.html * https://www.suse.com/security/cve/CVE-2025-61731.html * https://www.suse.com/security/cve/CVE-2025-68119.html * https://www.suse.com/security/cve/CVE-2025-68121.html * https://bugzilla.suse.com/show_bug.cgi?id=1236217 * https://bugzilla.suse.com/show_bug.cgi?id=1256816 * https://bugzilla.suse.com/show_bug.cgi?id=1256817 * https://bugzilla.suse.com/show_bug.cgi?id=1256818 * https://bugzilla.suse.com/show_bug.cgi?id=1256819 * https://bugzilla.suse.com/show_bug.cgi?id=1256820 * https://bugzilla.suse.com/show_bug.cgi?id=1256821 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:31:52 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:31:52 -0000 Subject: SUSE-SU-2026:0218-1: important: Security update for go1.25 Message-ID: <176911391209.16839.11612646178303997160@smelt2.prg2.suse.org> # Security update for go1.25 Announcement ID: SUSE-SU-2026:0218-1 Release Date: 2026-01-22T12:13:12Z Rating: important References: * bsc#1244485 * bsc#1256816 * bsc#1256817 * bsc#1256818 * bsc#1256819 * bsc#1256820 * bsc#1256821 Cross-References: * CVE-2025-61726 * CVE-2025-61728 * CVE-2025-61730 * CVE-2025-61731 * CVE-2025-68119 * CVE-2025-68121 CVSS scores: * CVE-2025-61726 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61726 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-61728 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-61728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-61730 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-61730 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-61731 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-61731 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-68119 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68119 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-68121 ( SUSE ): 7.6 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-68121 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N Affected Products: * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves six vulnerabilities and has one security fix can now be installed. ## Description: This update for go1.25 fixes the following issues: Update to go1.25.6 (released 2026-01-15) (bsc#1244485) Security fixes: * CVE-2025-61730: crypto/tls: handshake messages may be processed at the incorrect encryption level (bsc#1256821). * CVE-2025-68119: cmd/go: unexpected code execution when invoking toolchain (bsc#1256820). * CVE-2025-61731: cmd/go: bypass of flag sanitization can lead to arbitrary code execution (bsc#1256819). * CVE-2025-61726: net/http: memory exhaustion in Request.ParseForm (bsc#1256817). * CVE-2025-61728: archive/zip: denial of service when parsing arbitrary ZIP archives (bsc#1256816). * CVE-2025-68121: crypto/tls: Config.Clone copies automatically generated session ticket keys, session resumption does not account for the expiration of full certificate chain (bsc#1256818). Other fixes: * go#76392 os: package initialization hangs is Stdin is blocked * go#76409 crypto/tls: earlyTrafficSecret should use ClientHelloInner if ECH enabled * go#76620 os: on Unix, Readdirnames skips directory entries with zero inodes * go#76761 runtime: stack split at bad time in os/signal with Go 1.25.4 windows 386 * go#76776 runtime: race detector crash on ppc64le * go#76967 cmd/compile/internal/ssa: Compile.func1(): panic during sccp while compiling <function>: runtime error: index out of range * go#76973 errors: errors.Join behavior changed in 1.25 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-218=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-218=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-218=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-218=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-218=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-218=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-218=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-218=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-218=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-218=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-218=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-218=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * go1.25-1.25.6-150000.1.26.1 * go1.25-race-1.25.6-150000.1.26.1 * go1.25-doc-1.25.6-150000.1.26.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * go1.25-1.25.6-150000.1.26.1 * go1.25-race-1.25.6-150000.1.26.1 * go1.25-doc-1.25.6-150000.1.26.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * go1.25-1.25.6-150000.1.26.1 * go1.25-race-1.25.6-150000.1.26.1 * go1.25-doc-1.25.6-150000.1.26.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * go1.25-1.25.6-150000.1.26.1 * go1.25-race-1.25.6-150000.1.26.1 * go1.25-doc-1.25.6-150000.1.26.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * go1.25-1.25.6-150000.1.26.1 * go1.25-race-1.25.6-150000.1.26.1 * go1.25-doc-1.25.6-150000.1.26.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * go1.25-1.25.6-150000.1.26.1 * go1.25-race-1.25.6-150000.1.26.1 * go1.25-doc-1.25.6-150000.1.26.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * go1.25-1.25.6-150000.1.26.1 * go1.25-race-1.25.6-150000.1.26.1 * go1.25-doc-1.25.6-150000.1.26.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * go1.25-1.25.6-150000.1.26.1 * go1.25-race-1.25.6-150000.1.26.1 * go1.25-doc-1.25.6-150000.1.26.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * go1.25-1.25.6-150000.1.26.1 * go1.25-race-1.25.6-150000.1.26.1 * go1.25-doc-1.25.6-150000.1.26.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * go1.25-1.25.6-150000.1.26.1 * go1.25-race-1.25.6-150000.1.26.1 * go1.25-doc-1.25.6-150000.1.26.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * go1.25-1.25.6-150000.1.26.1 * go1.25-race-1.25.6-150000.1.26.1 * go1.25-doc-1.25.6-150000.1.26.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * go1.25-1.25.6-150000.1.26.1 * go1.25-race-1.25.6-150000.1.26.1 * go1.25-doc-1.25.6-150000.1.26.1 ## References: * https://www.suse.com/security/cve/CVE-2025-61726.html * https://www.suse.com/security/cve/CVE-2025-61728.html * https://www.suse.com/security/cve/CVE-2025-61730.html * https://www.suse.com/security/cve/CVE-2025-61731.html * https://www.suse.com/security/cve/CVE-2025-68119.html * https://www.suse.com/security/cve/CVE-2025-68121.html * https://bugzilla.suse.com/show_bug.cgi?id=1244485 * https://bugzilla.suse.com/show_bug.cgi?id=1256816 * https://bugzilla.suse.com/show_bug.cgi?id=1256817 * https://bugzilla.suse.com/show_bug.cgi?id=1256818 * https://bugzilla.suse.com/show_bug.cgi?id=1256819 * https://bugzilla.suse.com/show_bug.cgi?id=1256820 * https://bugzilla.suse.com/show_bug.cgi?id=1256821 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:31:54 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:31:54 -0000 Subject: SUSE-SU-2026:0217-1: critical: Security update for keylime Message-ID: <176911391475.16839.17634385190407765954@smelt2.prg2.suse.org> # Security update for keylime Announcement ID: SUSE-SU-2026:0217-1 Release Date: 2026-01-22T12:12:11Z Rating: critical References: * bsc#1254199 Cross-References: * CVE-2025-13609 CVSS scores: * CVE-2025-13609 ( SUSE ): 9.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H * CVE-2025-13609 ( SUSE ): 9.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H * CVE-2025-13609 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.4 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for keylime fixes the following issues: * CVE-2025-13609: avoid re-registration of clients with same UUID but with different TPM identity (bsc#1254199). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-217=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-217=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-217=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-217=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-217=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-217=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-217=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-217=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-217=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-217=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-217=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-217=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-217=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * keylime-config-6.3.2-150400.4.23.1 * keylime-logrotate-6.3.2-150400.4.23.1 * keylime-agent-6.3.2-150400.4.23.1 * keylime-firewalld-6.3.2-150400.4.23.1 * keylime-verifier-6.3.2-150400.4.23.1 * python3-keylime-6.3.2-150400.4.23.1 * keylime-tpm_cert_store-6.3.2-150400.4.23.1 * keylime-registrar-6.3.2-150400.4.23.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * keylime-config-6.3.2-150400.4.23.1 * keylime-logrotate-6.3.2-150400.4.23.1 * keylime-agent-6.3.2-150400.4.23.1 * keylime-firewalld-6.3.2-150400.4.23.1 * keylime-verifier-6.3.2-150400.4.23.1 * python3-keylime-6.3.2-150400.4.23.1 * keylime-tpm_cert_store-6.3.2-150400.4.23.1 * keylime-registrar-6.3.2-150400.4.23.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * keylime-config-6.3.2-150400.4.23.1 * keylime-logrotate-6.3.2-150400.4.23.1 * keylime-agent-6.3.2-150400.4.23.1 * keylime-firewalld-6.3.2-150400.4.23.1 * keylime-verifier-6.3.2-150400.4.23.1 * python3-keylime-6.3.2-150400.4.23.1 * keylime-tpm_cert_store-6.3.2-150400.4.23.1 * keylime-registrar-6.3.2-150400.4.23.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * keylime-config-6.3.2-150400.4.23.1 * keylime-logrotate-6.3.2-150400.4.23.1 * keylime-agent-6.3.2-150400.4.23.1 * keylime-firewalld-6.3.2-150400.4.23.1 * keylime-verifier-6.3.2-150400.4.23.1 * python3-keylime-6.3.2-150400.4.23.1 * keylime-tpm_cert_store-6.3.2-150400.4.23.1 * keylime-registrar-6.3.2-150400.4.23.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * keylime-config-6.3.2-150400.4.23.1 * keylime-logrotate-6.3.2-150400.4.23.1 * keylime-agent-6.3.2-150400.4.23.1 * keylime-firewalld-6.3.2-150400.4.23.1 * keylime-verifier-6.3.2-150400.4.23.1 * python3-keylime-6.3.2-150400.4.23.1 * keylime-tpm_cert_store-6.3.2-150400.4.23.1 * keylime-registrar-6.3.2-150400.4.23.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * keylime-config-6.3.2-150400.4.23.1 * keylime-logrotate-6.3.2-150400.4.23.1 * keylime-agent-6.3.2-150400.4.23.1 * keylime-firewalld-6.3.2-150400.4.23.1 * keylime-verifier-6.3.2-150400.4.23.1 * python3-keylime-6.3.2-150400.4.23.1 * keylime-tpm_cert_store-6.3.2-150400.4.23.1 * keylime-registrar-6.3.2-150400.4.23.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * keylime-config-6.3.2-150400.4.23.1 * keylime-logrotate-6.3.2-150400.4.23.1 * keylime-agent-6.3.2-150400.4.23.1 * keylime-firewalld-6.3.2-150400.4.23.1 * keylime-verifier-6.3.2-150400.4.23.1 * python3-keylime-6.3.2-150400.4.23.1 * keylime-tpm_cert_store-6.3.2-150400.4.23.1 * keylime-registrar-6.3.2-150400.4.23.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * keylime-config-6.3.2-150400.4.23.1 * keylime-logrotate-6.3.2-150400.4.23.1 * keylime-agent-6.3.2-150400.4.23.1 * keylime-firewalld-6.3.2-150400.4.23.1 * keylime-verifier-6.3.2-150400.4.23.1 * python3-keylime-6.3.2-150400.4.23.1 * keylime-tpm_cert_store-6.3.2-150400.4.23.1 * keylime-registrar-6.3.2-150400.4.23.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * keylime-config-6.3.2-150400.4.23.1 * keylime-logrotate-6.3.2-150400.4.23.1 * keylime-agent-6.3.2-150400.4.23.1 * keylime-firewalld-6.3.2-150400.4.23.1 * keylime-verifier-6.3.2-150400.4.23.1 * python3-keylime-6.3.2-150400.4.23.1 * keylime-tpm_cert_store-6.3.2-150400.4.23.1 * keylime-registrar-6.3.2-150400.4.23.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * keylime-config-6.3.2-150400.4.23.1 * keylime-logrotate-6.3.2-150400.4.23.1 * keylime-agent-6.3.2-150400.4.23.1 * keylime-firewalld-6.3.2-150400.4.23.1 * keylime-verifier-6.3.2-150400.4.23.1 * python3-keylime-6.3.2-150400.4.23.1 * keylime-tpm_cert_store-6.3.2-150400.4.23.1 * keylime-registrar-6.3.2-150400.4.23.1 * openSUSE Leap 15.4 (noarch) * keylime-config-6.3.2-150400.4.23.1 * keylime-logrotate-6.3.2-150400.4.23.1 * keylime-agent-6.3.2-150400.4.23.1 * keylime-firewalld-6.3.2-150400.4.23.1 * keylime-verifier-6.3.2-150400.4.23.1 * python3-keylime-6.3.2-150400.4.23.1 * keylime-tpm_cert_store-6.3.2-150400.4.23.1 * keylime-registrar-6.3.2-150400.4.23.1 * openSUSE Leap 15.6 (noarch) * keylime-config-6.3.2-150400.4.23.1 * keylime-logrotate-6.3.2-150400.4.23.1 * keylime-agent-6.3.2-150400.4.23.1 * keylime-firewalld-6.3.2-150400.4.23.1 * keylime-verifier-6.3.2-150400.4.23.1 * python3-keylime-6.3.2-150400.4.23.1 * keylime-tpm_cert_store-6.3.2-150400.4.23.1 * keylime-registrar-6.3.2-150400.4.23.1 * Basesystem Module 15-SP7 (noarch) * keylime-config-6.3.2-150400.4.23.1 * keylime-logrotate-6.3.2-150400.4.23.1 * keylime-agent-6.3.2-150400.4.23.1 * keylime-firewalld-6.3.2-150400.4.23.1 * keylime-verifier-6.3.2-150400.4.23.1 * python3-keylime-6.3.2-150400.4.23.1 * keylime-tpm_cert_store-6.3.2-150400.4.23.1 * keylime-registrar-6.3.2-150400.4.23.1 ## References: * https://www.suse.com/security/cve/CVE-2025-13609.html * https://bugzilla.suse.com/show_bug.cgi?id=1254199 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:31:57 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:31:57 -0000 Subject: SUSE-SU-2026:0216-1: important: Security update for kernel-firmware Message-ID: <176911391746.16839.14492793644727183832@smelt2.prg2.suse.org> # Security update for kernel-firmware Announcement ID: SUSE-SU-2026:0216-1 Release Date: 2026-01-22T12:11:06Z Rating: important References: * bsc#1256483 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that has one security fix can now be installed. ## Description: This update for kernel-firmware fixes the following issues: * Update AMD CPU ucode to 20251203 (bsc#1256483) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-216=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-216=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-216=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-216=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-216=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-216=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-216=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-216=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-216=1 ## Package List: * openSUSE Leap 15.4 (noarch) * ucode-amd-20220509-150400.4.31.1 * kernel-firmware-all-20220509-150400.4.31.1 * kernel-firmware-liquidio-20220509-150400.4.31.1 * kernel-firmware-bluetooth-20220509-150400.4.31.1 * kernel-firmware-radeon-20220509-150400.4.31.1 * kernel-firmware-mwifiex-20220509-150400.4.31.1 * kernel-firmware-nfp-20220509-150400.4.31.1 * kernel-firmware-ath11k-20220509-150400.4.31.1 * kernel-firmware-mediatek-20220509-150400.4.31.1 * kernel-firmware-realtek-20220509-150400.4.31.1 * kernel-firmware-brcm-20220509-150400.4.31.1 * kernel-firmware-sound-20220509-150400.4.31.1 * kernel-firmware-atheros-20220509-150400.4.31.1 * kernel-firmware-amdgpu-20220509-150400.4.31.1 * kernel-firmware-qlogic-20220509-150400.4.31.1 * kernel-firmware-ueagle-20220509-150400.4.31.1 * kernel-firmware-chelsio-20220509-150400.4.31.1 * kernel-firmware-i915-20220509-150400.4.31.1 * kernel-firmware-dpaa2-20220509-150400.4.31.1 * kernel-firmware-media-20220509-150400.4.31.1 * kernel-firmware-network-20220509-150400.4.31.1 * kernel-firmware-20220509-150400.4.31.1 * kernel-firmware-qcom-20220509-150400.4.31.1 * kernel-firmware-platform-20220509-150400.4.31.1 * kernel-firmware-mellanox-20220509-150400.4.31.1 * kernel-firmware-ath10k-20220509-150400.4.31.1 * kernel-firmware-nvidia-20220509-150400.4.31.1 * kernel-firmware-serial-20220509-150400.4.31.1 * kernel-firmware-prestera-20220509-150400.4.31.1 * kernel-firmware-intel-20220509-150400.4.31.1 * kernel-firmware-marvell-20220509-150400.4.31.1 * kernel-firmware-ti-20220509-150400.4.31.1 * kernel-firmware-bnx2-20220509-150400.4.31.1 * kernel-firmware-usb-network-20220509-150400.4.31.1 * kernel-firmware-iwlwifi-20220509-150400.4.31.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * ucode-amd-20220509-150400.4.31.1 * kernel-firmware-all-20220509-150400.4.31.1 * kernel-firmware-liquidio-20220509-150400.4.31.1 * kernel-firmware-bluetooth-20220509-150400.4.31.1 * kernel-firmware-radeon-20220509-150400.4.31.1 * kernel-firmware-mwifiex-20220509-150400.4.31.1 * kernel-firmware-nfp-20220509-150400.4.31.1 * kernel-firmware-ath11k-20220509-150400.4.31.1 * kernel-firmware-mediatek-20220509-150400.4.31.1 * kernel-firmware-realtek-20220509-150400.4.31.1 * kernel-firmware-brcm-20220509-150400.4.31.1 * kernel-firmware-sound-20220509-150400.4.31.1 * kernel-firmware-atheros-20220509-150400.4.31.1 * kernel-firmware-amdgpu-20220509-150400.4.31.1 * kernel-firmware-qlogic-20220509-150400.4.31.1 * kernel-firmware-ueagle-20220509-150400.4.31.1 * kernel-firmware-chelsio-20220509-150400.4.31.1 * kernel-firmware-i915-20220509-150400.4.31.1 * kernel-firmware-dpaa2-20220509-150400.4.31.1 * kernel-firmware-media-20220509-150400.4.31.1 * kernel-firmware-network-20220509-150400.4.31.1 * kernel-firmware-qcom-20220509-150400.4.31.1 * kernel-firmware-platform-20220509-150400.4.31.1 * kernel-firmware-mellanox-20220509-150400.4.31.1 * kernel-firmware-ath10k-20220509-150400.4.31.1 * kernel-firmware-nvidia-20220509-150400.4.31.1 * kernel-firmware-serial-20220509-150400.4.31.1 * kernel-firmware-prestera-20220509-150400.4.31.1 * kernel-firmware-intel-20220509-150400.4.31.1 * kernel-firmware-marvell-20220509-150400.4.31.1 * kernel-firmware-ti-20220509-150400.4.31.1 * kernel-firmware-bnx2-20220509-150400.4.31.1 * kernel-firmware-usb-network-20220509-150400.4.31.1 * kernel-firmware-iwlwifi-20220509-150400.4.31.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * ucode-amd-20220509-150400.4.31.1 * kernel-firmware-all-20220509-150400.4.31.1 * kernel-firmware-liquidio-20220509-150400.4.31.1 * kernel-firmware-bluetooth-20220509-150400.4.31.1 * kernel-firmware-radeon-20220509-150400.4.31.1 * kernel-firmware-mwifiex-20220509-150400.4.31.1 * kernel-firmware-nfp-20220509-150400.4.31.1 * kernel-firmware-ath11k-20220509-150400.4.31.1 * kernel-firmware-mediatek-20220509-150400.4.31.1 * kernel-firmware-realtek-20220509-150400.4.31.1 * kernel-firmware-brcm-20220509-150400.4.31.1 * kernel-firmware-sound-20220509-150400.4.31.1 * kernel-firmware-atheros-20220509-150400.4.31.1 * kernel-firmware-amdgpu-20220509-150400.4.31.1 * kernel-firmware-qlogic-20220509-150400.4.31.1 * kernel-firmware-ueagle-20220509-150400.4.31.1 * kernel-firmware-chelsio-20220509-150400.4.31.1 * kernel-firmware-i915-20220509-150400.4.31.1 * kernel-firmware-dpaa2-20220509-150400.4.31.1 * kernel-firmware-media-20220509-150400.4.31.1 * kernel-firmware-network-20220509-150400.4.31.1 * kernel-firmware-qcom-20220509-150400.4.31.1 * kernel-firmware-platform-20220509-150400.4.31.1 * kernel-firmware-mellanox-20220509-150400.4.31.1 * kernel-firmware-ath10k-20220509-150400.4.31.1 * kernel-firmware-nvidia-20220509-150400.4.31.1 * kernel-firmware-serial-20220509-150400.4.31.1 * kernel-firmware-prestera-20220509-150400.4.31.1 * kernel-firmware-intel-20220509-150400.4.31.1 * kernel-firmware-marvell-20220509-150400.4.31.1 * kernel-firmware-ti-20220509-150400.4.31.1 * kernel-firmware-bnx2-20220509-150400.4.31.1 * kernel-firmware-usb-network-20220509-150400.4.31.1 * kernel-firmware-iwlwifi-20220509-150400.4.31.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * ucode-amd-20220509-150400.4.31.1 * kernel-firmware-all-20220509-150400.4.31.1 * kernel-firmware-liquidio-20220509-150400.4.31.1 * kernel-firmware-bluetooth-20220509-150400.4.31.1 * kernel-firmware-radeon-20220509-150400.4.31.1 * kernel-firmware-mwifiex-20220509-150400.4.31.1 * kernel-firmware-nfp-20220509-150400.4.31.1 * kernel-firmware-ath11k-20220509-150400.4.31.1 * kernel-firmware-mediatek-20220509-150400.4.31.1 * kernel-firmware-realtek-20220509-150400.4.31.1 * kernel-firmware-brcm-20220509-150400.4.31.1 * kernel-firmware-sound-20220509-150400.4.31.1 * kernel-firmware-atheros-20220509-150400.4.31.1 * kernel-firmware-amdgpu-20220509-150400.4.31.1 * kernel-firmware-qlogic-20220509-150400.4.31.1 * kernel-firmware-ueagle-20220509-150400.4.31.1 * kernel-firmware-chelsio-20220509-150400.4.31.1 * kernel-firmware-i915-20220509-150400.4.31.1 * kernel-firmware-dpaa2-20220509-150400.4.31.1 * kernel-firmware-media-20220509-150400.4.31.1 * kernel-firmware-network-20220509-150400.4.31.1 * kernel-firmware-qcom-20220509-150400.4.31.1 * kernel-firmware-platform-20220509-150400.4.31.1 * kernel-firmware-mellanox-20220509-150400.4.31.1 * kernel-firmware-ath10k-20220509-150400.4.31.1 * kernel-firmware-nvidia-20220509-150400.4.31.1 * kernel-firmware-serial-20220509-150400.4.31.1 * kernel-firmware-prestera-20220509-150400.4.31.1 * kernel-firmware-intel-20220509-150400.4.31.1 * kernel-firmware-marvell-20220509-150400.4.31.1 * kernel-firmware-ti-20220509-150400.4.31.1 * kernel-firmware-bnx2-20220509-150400.4.31.1 * kernel-firmware-usb-network-20220509-150400.4.31.1 * kernel-firmware-iwlwifi-20220509-150400.4.31.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * ucode-amd-20220509-150400.4.31.1 * kernel-firmware-all-20220509-150400.4.31.1 * kernel-firmware-liquidio-20220509-150400.4.31.1 * kernel-firmware-bluetooth-20220509-150400.4.31.1 * kernel-firmware-radeon-20220509-150400.4.31.1 * kernel-firmware-mwifiex-20220509-150400.4.31.1 * kernel-firmware-nfp-20220509-150400.4.31.1 * kernel-firmware-ath11k-20220509-150400.4.31.1 * kernel-firmware-mediatek-20220509-150400.4.31.1 * kernel-firmware-realtek-20220509-150400.4.31.1 * kernel-firmware-brcm-20220509-150400.4.31.1 * kernel-firmware-sound-20220509-150400.4.31.1 * kernel-firmware-atheros-20220509-150400.4.31.1 * kernel-firmware-amdgpu-20220509-150400.4.31.1 * kernel-firmware-qlogic-20220509-150400.4.31.1 * kernel-firmware-ueagle-20220509-150400.4.31.1 * kernel-firmware-chelsio-20220509-150400.4.31.1 * kernel-firmware-i915-20220509-150400.4.31.1 * kernel-firmware-dpaa2-20220509-150400.4.31.1 * kernel-firmware-media-20220509-150400.4.31.1 * kernel-firmware-network-20220509-150400.4.31.1 * kernel-firmware-qcom-20220509-150400.4.31.1 * kernel-firmware-platform-20220509-150400.4.31.1 * kernel-firmware-mellanox-20220509-150400.4.31.1 * kernel-firmware-ath10k-20220509-150400.4.31.1 * kernel-firmware-nvidia-20220509-150400.4.31.1 * kernel-firmware-serial-20220509-150400.4.31.1 * kernel-firmware-prestera-20220509-150400.4.31.1 * kernel-firmware-intel-20220509-150400.4.31.1 * kernel-firmware-marvell-20220509-150400.4.31.1 * kernel-firmware-ti-20220509-150400.4.31.1 * kernel-firmware-bnx2-20220509-150400.4.31.1 * kernel-firmware-usb-network-20220509-150400.4.31.1 * kernel-firmware-iwlwifi-20220509-150400.4.31.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * ucode-amd-20220509-150400.4.31.1 * kernel-firmware-all-20220509-150400.4.31.1 * kernel-firmware-liquidio-20220509-150400.4.31.1 * kernel-firmware-bluetooth-20220509-150400.4.31.1 * kernel-firmware-radeon-20220509-150400.4.31.1 * kernel-firmware-mwifiex-20220509-150400.4.31.1 * kernel-firmware-nfp-20220509-150400.4.31.1 * kernel-firmware-ath11k-20220509-150400.4.31.1 * kernel-firmware-mediatek-20220509-150400.4.31.1 * kernel-firmware-realtek-20220509-150400.4.31.1 * kernel-firmware-brcm-20220509-150400.4.31.1 * kernel-firmware-sound-20220509-150400.4.31.1 * kernel-firmware-atheros-20220509-150400.4.31.1 * kernel-firmware-amdgpu-20220509-150400.4.31.1 * kernel-firmware-qlogic-20220509-150400.4.31.1 * kernel-firmware-ueagle-20220509-150400.4.31.1 * kernel-firmware-chelsio-20220509-150400.4.31.1 * kernel-firmware-i915-20220509-150400.4.31.1 * kernel-firmware-dpaa2-20220509-150400.4.31.1 * kernel-firmware-media-20220509-150400.4.31.1 * kernel-firmware-network-20220509-150400.4.31.1 * kernel-firmware-qcom-20220509-150400.4.31.1 * kernel-firmware-platform-20220509-150400.4.31.1 * kernel-firmware-mellanox-20220509-150400.4.31.1 * kernel-firmware-ath10k-20220509-150400.4.31.1 * kernel-firmware-nvidia-20220509-150400.4.31.1 * kernel-firmware-serial-20220509-150400.4.31.1 * kernel-firmware-prestera-20220509-150400.4.31.1 * kernel-firmware-intel-20220509-150400.4.31.1 * kernel-firmware-marvell-20220509-150400.4.31.1 * kernel-firmware-ti-20220509-150400.4.31.1 * kernel-firmware-bnx2-20220509-150400.4.31.1 * kernel-firmware-usb-network-20220509-150400.4.31.1 * kernel-firmware-iwlwifi-20220509-150400.4.31.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * ucode-amd-20220509-150400.4.31.1 * kernel-firmware-all-20220509-150400.4.31.1 * kernel-firmware-liquidio-20220509-150400.4.31.1 * kernel-firmware-bluetooth-20220509-150400.4.31.1 * kernel-firmware-radeon-20220509-150400.4.31.1 * kernel-firmware-mwifiex-20220509-150400.4.31.1 * kernel-firmware-nfp-20220509-150400.4.31.1 * kernel-firmware-ath11k-20220509-150400.4.31.1 * kernel-firmware-mediatek-20220509-150400.4.31.1 * kernel-firmware-realtek-20220509-150400.4.31.1 * kernel-firmware-brcm-20220509-150400.4.31.1 * kernel-firmware-sound-20220509-150400.4.31.1 * kernel-firmware-atheros-20220509-150400.4.31.1 * kernel-firmware-amdgpu-20220509-150400.4.31.1 * kernel-firmware-qlogic-20220509-150400.4.31.1 * kernel-firmware-ueagle-20220509-150400.4.31.1 * kernel-firmware-chelsio-20220509-150400.4.31.1 * kernel-firmware-i915-20220509-150400.4.31.1 * kernel-firmware-dpaa2-20220509-150400.4.31.1 * kernel-firmware-media-20220509-150400.4.31.1 * kernel-firmware-network-20220509-150400.4.31.1 * kernel-firmware-qcom-20220509-150400.4.31.1 * kernel-firmware-platform-20220509-150400.4.31.1 * kernel-firmware-mellanox-20220509-150400.4.31.1 * kernel-firmware-ath10k-20220509-150400.4.31.1 * kernel-firmware-nvidia-20220509-150400.4.31.1 * kernel-firmware-serial-20220509-150400.4.31.1 * kernel-firmware-prestera-20220509-150400.4.31.1 * kernel-firmware-intel-20220509-150400.4.31.1 * kernel-firmware-marvell-20220509-150400.4.31.1 * kernel-firmware-ti-20220509-150400.4.31.1 * kernel-firmware-bnx2-20220509-150400.4.31.1 * kernel-firmware-usb-network-20220509-150400.4.31.1 * kernel-firmware-iwlwifi-20220509-150400.4.31.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * ucode-amd-20220509-150400.4.31.1 * kernel-firmware-all-20220509-150400.4.31.1 * kernel-firmware-liquidio-20220509-150400.4.31.1 * kernel-firmware-bluetooth-20220509-150400.4.31.1 * kernel-firmware-radeon-20220509-150400.4.31.1 * kernel-firmware-mwifiex-20220509-150400.4.31.1 * kernel-firmware-nfp-20220509-150400.4.31.1 * kernel-firmware-ath11k-20220509-150400.4.31.1 * kernel-firmware-mediatek-20220509-150400.4.31.1 * kernel-firmware-realtek-20220509-150400.4.31.1 * kernel-firmware-brcm-20220509-150400.4.31.1 * kernel-firmware-sound-20220509-150400.4.31.1 * kernel-firmware-atheros-20220509-150400.4.31.1 * kernel-firmware-amdgpu-20220509-150400.4.31.1 * kernel-firmware-qlogic-20220509-150400.4.31.1 * kernel-firmware-ueagle-20220509-150400.4.31.1 * kernel-firmware-chelsio-20220509-150400.4.31.1 * kernel-firmware-i915-20220509-150400.4.31.1 * kernel-firmware-dpaa2-20220509-150400.4.31.1 * kernel-firmware-media-20220509-150400.4.31.1 * kernel-firmware-network-20220509-150400.4.31.1 * kernel-firmware-qcom-20220509-150400.4.31.1 * kernel-firmware-platform-20220509-150400.4.31.1 * kernel-firmware-mellanox-20220509-150400.4.31.1 * kernel-firmware-ath10k-20220509-150400.4.31.1 * kernel-firmware-nvidia-20220509-150400.4.31.1 * kernel-firmware-serial-20220509-150400.4.31.1 * kernel-firmware-prestera-20220509-150400.4.31.1 * kernel-firmware-intel-20220509-150400.4.31.1 * kernel-firmware-marvell-20220509-150400.4.31.1 * kernel-firmware-ti-20220509-150400.4.31.1 * kernel-firmware-bnx2-20220509-150400.4.31.1 * kernel-firmware-usb-network-20220509-150400.4.31.1 * kernel-firmware-iwlwifi-20220509-150400.4.31.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * ucode-amd-20220509-150400.4.31.1 * kernel-firmware-all-20220509-150400.4.31.1 * kernel-firmware-liquidio-20220509-150400.4.31.1 * kernel-firmware-bluetooth-20220509-150400.4.31.1 * kernel-firmware-radeon-20220509-150400.4.31.1 * kernel-firmware-mwifiex-20220509-150400.4.31.1 * kernel-firmware-nfp-20220509-150400.4.31.1 * kernel-firmware-ath11k-20220509-150400.4.31.1 * kernel-firmware-mediatek-20220509-150400.4.31.1 * kernel-firmware-realtek-20220509-150400.4.31.1 * kernel-firmware-brcm-20220509-150400.4.31.1 * kernel-firmware-sound-20220509-150400.4.31.1 * kernel-firmware-atheros-20220509-150400.4.31.1 * kernel-firmware-amdgpu-20220509-150400.4.31.1 * kernel-firmware-qlogic-20220509-150400.4.31.1 * kernel-firmware-ueagle-20220509-150400.4.31.1 * kernel-firmware-chelsio-20220509-150400.4.31.1 * kernel-firmware-i915-20220509-150400.4.31.1 * kernel-firmware-dpaa2-20220509-150400.4.31.1 * kernel-firmware-media-20220509-150400.4.31.1 * kernel-firmware-network-20220509-150400.4.31.1 * kernel-firmware-qcom-20220509-150400.4.31.1 * kernel-firmware-platform-20220509-150400.4.31.1 * kernel-firmware-mellanox-20220509-150400.4.31.1 * kernel-firmware-ath10k-20220509-150400.4.31.1 * kernel-firmware-nvidia-20220509-150400.4.31.1 * kernel-firmware-serial-20220509-150400.4.31.1 * kernel-firmware-prestera-20220509-150400.4.31.1 * kernel-firmware-intel-20220509-150400.4.31.1 * kernel-firmware-marvell-20220509-150400.4.31.1 * kernel-firmware-ti-20220509-150400.4.31.1 * kernel-firmware-bnx2-20220509-150400.4.31.1 * kernel-firmware-usb-network-20220509-150400.4.31.1 * kernel-firmware-iwlwifi-20220509-150400.4.31.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1256483 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:32:04 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:32:04 -0000 Subject: SUSE-SU-2026:0215-1: important: Security update for gpg2 Message-ID: <176911392443.16839.6525890971336308423@smelt2.prg2.suse.org> # Security update for gpg2 Announcement ID: SUSE-SU-2026:0215-1 Release Date: 2026-01-22T12:10:29Z Rating: important References: * bsc#1255715 * bsc#1256243 * bsc#1256244 * bsc#1256246 * bsc#1256390 Cross-References: * CVE-2025-68973 CVSS scores: * CVE-2025-68973 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-68973 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-68973 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability and has four security fixes can now be installed. ## Description: This update for gpg2 fixes the following issues: * CVE-2025-68973: Fix possible memory corruption in the armor parser (gpg.fail/memcpy)(bsc#1255715). * Avoid potential downgrade to SHA1 in 3rd party key signatures (gpg.fail/sha1) (bsc#1256246). * Error out on unverified output for non-detached signatures (gpg.fail/detached) (bsc#1256244). * Fix a memory leak in gpg2 agent (bsc#1256243). * Fix Cleartext Signature Forgery in the NotDashEscaped header implementation in GnuPG (gpg.fail/notdash) (bsc#1256390). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-215=1 openSUSE-SLE-15.6-2026-215=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-215=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-215=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-215=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * gpg2-tpm-2.4.4-150600.3.12.1 * dirmngr-debuginfo-2.4.4-150600.3.12.1 * dirmngr-2.4.4-150600.3.12.1 * gpg2-debugsource-2.4.4-150600.3.12.1 * gpg2-debuginfo-2.4.4-150600.3.12.1 * gpg2-tpm-debuginfo-2.4.4-150600.3.12.1 * gpg2-2.4.4-150600.3.12.1 * openSUSE Leap 15.6 (noarch) * gpg2-lang-2.4.4-150600.3.12.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * dirmngr-debuginfo-2.4.4-150600.3.12.1 * dirmngr-2.4.4-150600.3.12.1 * gpg2-debugsource-2.4.4-150600.3.12.1 * gpg2-debuginfo-2.4.4-150600.3.12.1 * gpg2-2.4.4-150600.3.12.1 * Basesystem Module 15-SP7 (noarch) * gpg2-lang-2.4.4-150600.3.12.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * dirmngr-debuginfo-2.4.4-150600.3.12.1 * dirmngr-2.4.4-150600.3.12.1 * gpg2-debugsource-2.4.4-150600.3.12.1 * gpg2-debuginfo-2.4.4-150600.3.12.1 * gpg2-2.4.4-150600.3.12.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * gpg2-lang-2.4.4-150600.3.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * dirmngr-debuginfo-2.4.4-150600.3.12.1 * dirmngr-2.4.4-150600.3.12.1 * gpg2-debugsource-2.4.4-150600.3.12.1 * gpg2-debuginfo-2.4.4-150600.3.12.1 * gpg2-2.4.4-150600.3.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * gpg2-lang-2.4.4-150600.3.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-68973.html * https://bugzilla.suse.com/show_bug.cgi?id=1255715 * https://bugzilla.suse.com/show_bug.cgi?id=1256243 * https://bugzilla.suse.com/show_bug.cgi?id=1256244 * https://bugzilla.suse.com/show_bug.cgi?id=1256246 * https://bugzilla.suse.com/show_bug.cgi?id=1256390 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:32:09 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:32:09 -0000 Subject: SUSE-SU-2026:0214-1: important: Security update for gpg2 Message-ID: <176911392912.16839.15613013653153625395@smelt2.prg2.suse.org> # Security update for gpg2 Announcement ID: SUSE-SU-2026:0214-1 Release Date: 2026-01-22T12:10:07Z Rating: important References: * bsc#1255715 * bsc#1256244 * bsc#1256246 * bsc#1256390 Cross-References: * CVE-2025-68973 CVSS scores: * CVE-2025-68973 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-68973 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-68973 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability and has three security fixes can now be installed. ## Description: This update for gpg2 fixes the following issues: * CVE-2025-68973: Fix possible memory corruption in the armor parser (gpg.fail/memcpy)(bsc#1255715). * Avoid potential downgrade to SHA1 in 3rd party key signatures (gpg.fail/sha1) (bsc#1256246). * Error out on unverified output for non-detached signatures (gpg.fail/detached) (bsc#1256244). * Fix Cleartext Signature Forgery in the NotDashEscaped header implementation in GnuPG (gpg.fail/notdash) (bsc#1256390). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-214=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-214=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-214=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-214=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-214=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-214=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-214=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-214=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-214=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-214=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-214=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-214=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-214=1 * openSUSE Leap 15.3 zypper in -t patch SUSE-2026-214=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-214=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-214=1 ## Package List: * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * gpg2-debugsource-2.2.27-150300.3.16.1 * gpg2-2.2.27-150300.3.16.1 * gpg2-debuginfo-2.2.27-150300.3.16.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * gpg2-debugsource-2.2.27-150300.3.16.1 * gpg2-2.2.27-150300.3.16.1 * gpg2-debuginfo-2.2.27-150300.3.16.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * gpg2-debugsource-2.2.27-150300.3.16.1 * gpg2-2.2.27-150300.3.16.1 * gpg2-debuginfo-2.2.27-150300.3.16.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * dirmngr-2.2.27-150300.3.16.1 * gpg2-debuginfo-2.2.27-150300.3.16.1 * gpg2-debugsource-2.2.27-150300.3.16.1 * gpg2-2.2.27-150300.3.16.1 * dirmngr-debuginfo-2.2.27-150300.3.16.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * gpg2-lang-2.2.27-150300.3.16.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * dirmngr-2.2.27-150300.3.16.1 * gpg2-debuginfo-2.2.27-150300.3.16.1 * gpg2-debugsource-2.2.27-150300.3.16.1 * gpg2-2.2.27-150300.3.16.1 * dirmngr-debuginfo-2.2.27-150300.3.16.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * gpg2-lang-2.2.27-150300.3.16.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * dirmngr-2.2.27-150300.3.16.1 * gpg2-debuginfo-2.2.27-150300.3.16.1 * gpg2-debugsource-2.2.27-150300.3.16.1 * gpg2-2.2.27-150300.3.16.1 * dirmngr-debuginfo-2.2.27-150300.3.16.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * gpg2-lang-2.2.27-150300.3.16.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * dirmngr-2.2.27-150300.3.16.1 * gpg2-debuginfo-2.2.27-150300.3.16.1 * gpg2-debugsource-2.2.27-150300.3.16.1 * gpg2-2.2.27-150300.3.16.1 * dirmngr-debuginfo-2.2.27-150300.3.16.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * gpg2-lang-2.2.27-150300.3.16.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * dirmngr-2.2.27-150300.3.16.1 * gpg2-debuginfo-2.2.27-150300.3.16.1 * gpg2-debugsource-2.2.27-150300.3.16.1 * gpg2-2.2.27-150300.3.16.1 * dirmngr-debuginfo-2.2.27-150300.3.16.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * gpg2-lang-2.2.27-150300.3.16.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * dirmngr-2.2.27-150300.3.16.1 * gpg2-debuginfo-2.2.27-150300.3.16.1 * gpg2-debugsource-2.2.27-150300.3.16.1 * gpg2-2.2.27-150300.3.16.1 * dirmngr-debuginfo-2.2.27-150300.3.16.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * gpg2-lang-2.2.27-150300.3.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * dirmngr-2.2.27-150300.3.16.1 * gpg2-debuginfo-2.2.27-150300.3.16.1 * gpg2-debugsource-2.2.27-150300.3.16.1 * gpg2-2.2.27-150300.3.16.1 * dirmngr-debuginfo-2.2.27-150300.3.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * gpg2-lang-2.2.27-150300.3.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * dirmngr-2.2.27-150300.3.16.1 * gpg2-debuginfo-2.2.27-150300.3.16.1 * gpg2-debugsource-2.2.27-150300.3.16.1 * gpg2-2.2.27-150300.3.16.1 * dirmngr-debuginfo-2.2.27-150300.3.16.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * gpg2-lang-2.2.27-150300.3.16.1 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * gpg2-debugsource-2.2.27-150300.3.16.1 * gpg2-2.2.27-150300.3.16.1 * gpg2-debuginfo-2.2.27-150300.3.16.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * gpg2-debugsource-2.2.27-150300.3.16.1 * gpg2-2.2.27-150300.3.16.1 * gpg2-debuginfo-2.2.27-150300.3.16.1 * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * dirmngr-2.2.27-150300.3.16.1 * gpg2-debuginfo-2.2.27-150300.3.16.1 * gpg2-debugsource-2.2.27-150300.3.16.1 * gpg2-2.2.27-150300.3.16.1 * dirmngr-debuginfo-2.2.27-150300.3.16.1 * openSUSE Leap 15.3 (noarch) * gpg2-lang-2.2.27-150300.3.16.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * gpg2-debugsource-2.2.27-150300.3.16.1 * gpg2-2.2.27-150300.3.16.1 * gpg2-debuginfo-2.2.27-150300.3.16.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * gpg2-debugsource-2.2.27-150300.3.16.1 * gpg2-2.2.27-150300.3.16.1 * gpg2-debuginfo-2.2.27-150300.3.16.1 ## References: * https://www.suse.com/security/cve/CVE-2025-68973.html * https://bugzilla.suse.com/show_bug.cgi?id=1255715 * https://bugzilla.suse.com/show_bug.cgi?id=1256244 * https://bugzilla.suse.com/show_bug.cgi?id=1256246 * https://bugzilla.suse.com/show_bug.cgi?id=1256390 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:32:11 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:32:11 -0000 Subject: SUSE-SU-2026:0213-1: important: Security update for ovmf Message-ID: <176911393178.16839.4488419379278224089@smelt2.prg2.suse.org> # Security update for ovmf Announcement ID: SUSE-SU-2026:0213-1 Release Date: 2026-01-22T12:08:49Z Rating: important References: * bsc#1218680 Cross-References: * CVE-2022-36765 CVSS scores: * CVE-2022-36765 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H * CVE-2022-36765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-36765 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for ovmf fixes the following issues: * CVE-2022-36765: Fixed integer overflow to buffer overflow via local network vulnerability (bsc#1218680). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-213=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-213=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-213=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-213=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-213=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-213=1 ## Package List: * openSUSE Leap 15.5 (aarch64 x86_64) * ovmf-202208-150500.6.12.1 * ovmf-tools-202208-150500.6.12.1 * openSUSE Leap 15.5 (noarch) * qemu-uefi-aarch64-202208-150500.6.12.1 * qemu-ovmf-x86_64-202208-150500.6.12.1 * qemu-uefi-aarch32-202208-150500.6.12.1 * qemu-ovmf-ia32-202208-150500.6.12.1 * openSUSE Leap 15.5 (x86_64) * qemu-ovmf-x86_64-debug-202208-150500.6.12.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * qemu-ovmf-x86_64-202208-150500.6.12.1 * qemu-uefi-aarch64-202208-150500.6.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * ovmf-202208-150500.6.12.1 * ovmf-tools-202208-150500.6.12.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * qemu-ovmf-x86_64-202208-150500.6.12.1 * qemu-uefi-aarch64-202208-150500.6.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * ovmf-202208-150500.6.12.1 * ovmf-tools-202208-150500.6.12.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * qemu-ovmf-x86_64-202208-150500.6.12.1 * qemu-uefi-aarch64-202208-150500.6.12.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 x86_64) * ovmf-202208-150500.6.12.1 * ovmf-tools-202208-150500.6.12.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * qemu-ovmf-x86_64-202208-150500.6.12.1 * qemu-uefi-aarch64-202208-150500.6.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * ovmf-202208-150500.6.12.1 * ovmf-tools-202208-150500.6.12.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * qemu-ovmf-x86_64-202208-150500.6.12.1 ## References: * https://www.suse.com/security/cve/CVE-2022-36765.html * https://bugzilla.suse.com/show_bug.cgi?id=1218680 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:32:14 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:32:14 -0000 Subject: SUSE-SU-2026:0212-1: important: Security update for ovmf Message-ID: <176911393419.16839.4670613237273305995@smelt2.prg2.suse.org> # Security update for ovmf Announcement ID: SUSE-SU-2026:0212-1 Release Date: 2026-01-22T12:08:35Z Rating: important References: * bsc#1218680 Cross-References: * CVE-2022-36765 CVSS scores: * CVE-2022-36765 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H * CVE-2022-36765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-36765 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that solves one vulnerability can now be installed. ## Description: This update for ovmf fixes the following issues: * CVE-2022-36765: Fixed integer overflow to buffer overflow via local network vulnerability (bsc#1218680). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-212=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-212=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-212=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-212=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-212=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-212=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-212=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-212=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-212=1 ## Package List: * openSUSE Leap 15.4 (aarch64 x86_64) * ovmf-202202-150400.5.21.1 * ovmf-tools-202202-150400.5.21.1 * openSUSE Leap 15.4 (noarch) * qemu-ovmf-x86_64-202202-150400.5.21.1 * qemu-uefi-aarch32-202202-150400.5.21.1 * qemu-ovmf-ia32-202202-150400.5.21.1 * qemu-uefi-aarch64-202202-150400.5.21.1 * openSUSE Leap 15.4 (x86_64) * qemu-ovmf-x86_64-debug-202202-150400.5.21.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (noarch) * qemu-ovmf-x86_64-202202-150400.5.21.1 * qemu-uefi-aarch64-202202-150400.5.21.1 * SUSE Linux Enterprise Micro 5.3 (noarch) * qemu-ovmf-x86_64-202202-150400.5.21.1 * qemu-uefi-aarch64-202202-150400.5.21.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (noarch) * qemu-ovmf-x86_64-202202-150400.5.21.1 * qemu-uefi-aarch64-202202-150400.5.21.1 * SUSE Linux Enterprise Micro 5.4 (noarch) * qemu-ovmf-x86_64-202202-150400.5.21.1 * qemu-uefi-aarch64-202202-150400.5.21.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * ovmf-202202-150400.5.21.1 * ovmf-tools-202202-150400.5.21.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * qemu-ovmf-x86_64-202202-150400.5.21.1 * qemu-uefi-aarch64-202202-150400.5.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * ovmf-202202-150400.5.21.1 * ovmf-tools-202202-150400.5.21.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * qemu-ovmf-x86_64-202202-150400.5.21.1 * qemu-uefi-aarch64-202202-150400.5.21.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 x86_64) * ovmf-202202-150400.5.21.1 * ovmf-tools-202202-150400.5.21.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * qemu-ovmf-x86_64-202202-150400.5.21.1 * qemu-uefi-aarch64-202202-150400.5.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * ovmf-202202-150400.5.21.1 * ovmf-tools-202202-150400.5.21.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * qemu-ovmf-x86_64-202202-150400.5.21.1 ## References: * https://www.suse.com/security/cve/CVE-2022-36765.html * https://bugzilla.suse.com/show_bug.cgi?id=1218680 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jan 22 20:32:18 2026 From: null at suse.de (SLE-UPDATES) Date: Thu, 22 Jan 2026 20:32:18 -0000 Subject: SUSE-SU-2026:0211-1: important: Security update for libsoup Message-ID: <176911393803.16839.6125228626186627803@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2026:0211-1 Release Date: 2026-01-22T12:08:12Z Rating: important References: * bsc#1254876 * bsc#1256399 * bsc#1256418 Cross-References: * CVE-2025-14523 * CVE-2026-0716 * CVE-2026-0719 CVSS scores: * CVE-2025-14523 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-14523 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2025-14523 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2026-0716 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-0716 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L * CVE-2026-0716 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2026-0719 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-0719 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-0719 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2025-14523: Reject duplicated Host in headers and followed upstream update (bsc#1254876). * CVE-2026-0716: Fixed out-of-bounds read for websocket (bsc#1256418) * CVE-2026-0719: Fixed overflow for password md4sum (bsc#1256399) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-211=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-211=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-211=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-211=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-211=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-211=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-211=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-211=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-211=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * libsoup-devel-3.0.4-150400.3.28.1 * typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1 * libsoup-3_0-0-3.0.4-150400.3.28.1 * libsoup-debugsource-3.0.4-150400.3.28.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1 * openSUSE Leap 15.4 (x86_64) * libsoup-3_0-0-32bit-debuginfo-3.0.4-150400.3.28.1 * libsoup-3_0-0-32bit-3.0.4-150400.3.28.1 * libsoup-devel-32bit-3.0.4-150400.3.28.1 * openSUSE Leap 15.4 (noarch) * libsoup-lang-3.0.4-150400.3.28.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libsoup-devel-64bit-3.0.4-150400.3.28.1 * libsoup-3_0-0-64bit-debuginfo-3.0.4-150400.3.28.1 * libsoup-3_0-0-64bit-3.0.4-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * libsoup-devel-3.0.4-150400.3.28.1 * typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1 * libsoup-3_0-0-3.0.4-150400.3.28.1 * libsoup-debugsource-3.0.4-150400.3.28.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * libsoup-lang-3.0.4-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * libsoup-devel-3.0.4-150400.3.28.1 * typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1 * libsoup-3_0-0-3.0.4-150400.3.28.1 * libsoup-debugsource-3.0.4-150400.3.28.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * libsoup-lang-3.0.4-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * libsoup-devel-3.0.4-150400.3.28.1 * typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1 * libsoup-3_0-0-3.0.4-150400.3.28.1 * libsoup-debugsource-3.0.4-150400.3.28.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * libsoup-lang-3.0.4-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * libsoup-devel-3.0.4-150400.3.28.1 * typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1 * libsoup-3_0-0-3.0.4-150400.3.28.1 * libsoup-debugsource-3.0.4-150400.3.28.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * libsoup-lang-3.0.4-150400.3.28.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * libsoup-devel-3.0.4-150400.3.28.1 * typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1 * libsoup-3_0-0-3.0.4-150400.3.28.1 * libsoup-debugsource-3.0.4-150400.3.28.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * libsoup-lang-3.0.4-150400.3.28.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libsoup-devel-3.0.4-150400.3.28.1 * typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1 * libsoup-3_0-0-3.0.4-150400.3.28.1 * libsoup-debugsource-3.0.4-150400.3.28.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * libsoup-lang-3.0.4-150400.3.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * libsoup-devel-3.0.4-150400.3.28.1 * typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1 * libsoup-3_0-0-3.0.4-150400.3.28.1 * libsoup-debugsource-3.0.4-150400.3.28.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * libsoup-lang-3.0.4-150400.3.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * libsoup-devel-3.0.4-150400.3.28.1 * typelib-1_0-Soup-3_0-3.0.4-150400.3.28.1 * libsoup-3_0-0-3.0.4-150400.3.28.1 * libsoup-debugsource-3.0.4-150400.3.28.1 * libsoup-3_0-0-debuginfo-3.0.4-150400.3.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * libsoup-lang-3.0.4-150400.3.28.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14523.html * https://www.suse.com/security/cve/CVE-2026-0716.html * https://www.suse.com/security/cve/CVE-2026-0719.html * https://bugzilla.suse.com/show_bug.cgi?id=1254876 * https://bugzilla.suse.com/show_bug.cgi?id=1256399 * https://bugzilla.suse.com/show_bug.cgi?id=1256418 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:30:17 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:30:17 -0000 Subject: SUSE-RU-2026:20117-1: important: Recommended update for s390-tools Message-ID: <176915701721.16846.10401295268443819897@smelt2.prg2.suse.org> # Recommended update for s390-tools Announcement ID: SUSE-RU-2026:20117-1 Release Date: 2026-01-21T11:11:31Z Rating: important References: * bsc#1229461 * bsc#1230345 * bsc#1250643 * bsc#1250644 * jsc#PED-10303 * jsc#PED-14586 * jsc#PED-3223 * jsc#PED-9591 Affected Products: * SUSE Linux Micro 6.2 An update that contains four features and has four fixes can now be installed. ## Description: This update for s390-tools fixes the following issues: Upgrade s390-tools to 2.40 (jsc#PED-14586): * Add new tools / libraries: * Add project-wide .clang-tidy configuration * libutil: Introduce util_time for time related functionality * libutil: Introduce zsh/bash autocompletion tooling based on util_opt * pvinfo: Tool to display Secure Execution system information * pvverify: Tool to verify host-key documents * Changes of existing tools: * cpumf: Implement zsh and bash autocompletion * dasdfmt: Implement zsh and bash autocompletion * dbginfo.sh: Add NetworkManager and netplan * dbginfo.sh: Add kvm_stat * dbginfo.sh: Adding stp time information * dbginfo.sh: Simplify procfs collection * hyptop: Add physical information row * hyptop: Calculate sample time delta for physical partition * hyptop: Replace long option names using _ with - for consistency For example: --cpu_types -> \--cpu-types (Options with _ are still supported for backward compatibility) * libekmfweb: Add function to validate a certificate against the identity key * netboot: Add longer kernel command lines support * udev/rules.d: Make virtio-blk devices non-rotational * udev/rules.d: Set default io scheduler to 'none' for virtio-blk * ziomon: Add support to sample device symlinks (/dev/disk/...) * ziorep_config: Add fcp-lun details to -M option output * ziorep_config: Add port_id and failed attributes to -A option output * netboot: Install on non-s390 architectures * Bug Fixes: * lib(ekmfweb|kmipclient): Use ln without -r * s390-tools: Fix various compilation issues with musl libc * zipl/boot: Fix unused loadparm when SCLP line-mode console is absent Upgrade s390-tools to version 2.39 (jsc#PED-10303): * Changes of existing tools: * chpstat: Add options to select IEC units for scaling (SI units are default) * chzdev: Introduce --no-module-load option * cpi: Disable CPI for SEL guests by default * dbginfo.sh: Enhance logging on timeout triggered * iucvterm: Install symlink for lsiucvallow.8 man page * lshwc: Add command line flag to specify individual counters * lspai: Add command line flag for delta values * lspai: Add command line flag for short counter names * lspai: Add command line flag to specify individual counters * lspai: Add command line flags for all cpus * lspai: Add command line flags for hexadecimal output * man: Use CR for constant width font * pvimg: Add '\--image-key' option * zdev: Allow dynamic control of module load * zipl/boot: Fix EBCDIC code page 500 conversion and decrease size by 200 bytes * zipl: Add support of heterogeneous mirrors (remove technical limitations on mirrored targets, thus allowing mirrored devices consist of partitions at different offsets on disks of different types and geometry). * zkey: Add support for generating and importing exportable secure keys * Bug Fixes: * chpstat: Fix scaling of DPU utilization calculation * zdev/dracut: Prevent loading of unused kernel modules * zdev: Fix double device configuration on DPM systems * zdev: Fix double device configuration with rd.dasd * zipl_helper.device-mapper: Fix segfault in an error path ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-159=1 ## Package List: * SUSE Linux Micro 6.2 (s390x) * libkmipclient1-2.40.0-160000.1.1 * libkmipclient1-debuginfo-2.40.0-160000.1.1 * s390-tools-2.40.0-160000.1.1 * s390-tools-debuginfo-2.40.0-160000.1.1 * libekmfweb1-2.40.0-160000.1.1 * libekmfweb1-debuginfo-2.40.0-160000.1.1 * s390-tools-debugsource-2.40.0-160000.1.1 * SUSE Linux Micro 6.2 (noarch) * s390-tools-genprotimg-data-2.40.0-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1229461 * https://bugzilla.suse.com/show_bug.cgi?id=1230345 * https://bugzilla.suse.com/show_bug.cgi?id=1250643 * https://bugzilla.suse.com/show_bug.cgi?id=1250644 * https://jira.suse.com/browse/PED-10303 * https://jira.suse.com/browse/PED-14586 * https://jira.suse.com/browse/PED-3223 * https://jira.suse.com/browse/PED-9591 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:30:20 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:30:20 -0000 Subject: SUSE-SU-2026:20116-1: important: Security update for podman Message-ID: <176915702088.16846.5520207527763658396@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2026:20116-1 Release Date: 2026-01-21T11:03:18Z Rating: important References: * bsc#1249154 * bsc#1252376 Cross-References: * CVE-2025-31133 * CVE-2025-52565 * CVE-2025-52881 * CVE-2025-9566 CVSS scores: * CVE-2025-31133 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-31133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-31133 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-31133 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-52565 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52565 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52565 ( NVD ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-52565 ( NVD ): 7.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H * CVE-2025-52881 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52881 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52881 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-52881 ( NVD ): 7.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H * CVE-2025-9566 ( SUSE ): 7.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-9566 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-9566 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H Affected Products: * SUSE Linux Micro 6.2 An update that solves four vulnerabilities can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2025-31133,CVE-2025-52565,CVE-2025-52881: container breakouts by bypassing runc's restrictions for writing to arbitrary /proc files (bsc#1252376). * CVE-2025-9566: kube play command may overwrite host files (bsc#1249154). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-161=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * podmansh-5.4.2-160000.3.1 * podman-remote-debuginfo-5.4.2-160000.3.1 * podman-5.4.2-160000.3.1 * podman-remote-5.4.2-160000.3.1 * podman-debuginfo-5.4.2-160000.3.1 * SUSE Linux Micro 6.2 (noarch) * podman-docker-5.4.2-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31133.html * https://www.suse.com/security/cve/CVE-2025-52565.html * https://www.suse.com/security/cve/CVE-2025-52881.html * https://www.suse.com/security/cve/CVE-2025-9566.html * https://bugzilla.suse.com/show_bug.cgi?id=1249154 * https://bugzilla.suse.com/show_bug.cgi?id=1252376 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:30:25 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:30:25 -0000 Subject: SUSE-RU-2026:20115-1: important: Recommended update for samba Message-ID: <176915702525.16846.1494687409283099519@smelt2.prg2.suse.org> # Recommended update for samba Announcement ID: SUSE-RU-2026:20115-1 Release Date: 2026-01-20T11:24:22Z Rating: important References: * bsc#1234210 * bsc#1249058 * bsc#1254665 * bsc#1254926 Affected Products: * SUSE Linux Micro 6.2 An update that has four fixes can now be installed. ## Description: This update for samba fixes the following issues: Changes in samba: * samba-ad-dc-libs packages are missing a DLZ plugin for bind 9.20; (bsc#1249058). * Adjust README.SUSE to reflect the new preferred location for '[printers]' share; (bsc#1254665). * Fix Samba printers reporting invalid sid during print jobs; (bsc#1234210); (bsc#1254926) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-157=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * libldb2-4.22.6+git.456.11475143caf-160000.1.1 * libldb2-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-debugsource-4.22.6+git.456.11475143caf-160000.1.1 * samba-client-libs-4.22.6+git.456.11475143caf-160000.1.1 * samba-client-libs-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234210 * https://bugzilla.suse.com/show_bug.cgi?id=1249058 * https://bugzilla.suse.com/show_bug.cgi?id=1254665 * https://bugzilla.suse.com/show_bug.cgi?id=1254926 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:30:28 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:30:28 -0000 Subject: SUSE-SU-2026:20114-1: important: Security update of open-vm-tools Message-ID: <176915702842.16846.16605647150122513031@smelt2.prg2.suse.org> # Security update of open-vm-tools Announcement ID: SUSE-SU-2026:20114-1 Release Date: 2026-01-20T11:00:32Z Rating: important References: * bsc#1250373 * bsc#1250692 Cross-References: * CVE-2025-41244 CVSS scores: * CVE-2025-41244 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-41244 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-41244 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.2 An update that solves one vulnerability and has one fix can now be installed. ## Description: This update for open-vm-tools fixes the following issues: Update to open-vm-tools 13.0.5 based on build 24915695. (boo#1250692): Please refer to the Release Notes at https://github.com/vmware/open-vm- tools/blob/stable-13.0.5/ReleaseNotes.md. The granular changes that have gone into the open-vm-tools 13.0.5 release are in the ChangeLog at https://github.com/vmware/open-vm- tools/blob/stable-13.0.5/open-vm-tools/ChangeLog. There are no new features in the open-vm-tools 13.0.5 release. This is primarily a maintenance release that addresses a security issue. This release resolves and includes the patch for CVE-2025-41244. For more information on this vulnerability and its impact on Broadcom products, see VMSA-2025-0015. A minor enhancement has been made for Guest OS Customization. The DeployPkg plugin has been updated to use "systemctl reboot", if available. For a more complete list of issues addressed in this release, see the What's New and Resolved Issues section of the Release Notes. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-158=1 ## Package List: * SUSE Linux Micro 6.2 (x86_64) * libvmtools0-13.0.5-160000.1.1 * open-vm-tools-13.0.5-160000.1.1 * libvmtools0-debuginfo-13.0.5-160000.1.1 * open-vm-tools-debuginfo-13.0.5-160000.1.1 * open-vm-tools-debugsource-13.0.5-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-41244.html * https://bugzilla.suse.com/show_bug.cgi?id=1250373 * https://bugzilla.suse.com/show_bug.cgi?id=1250692 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:30:43 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:30:43 -0000 Subject: SUSE-RU-2026:20113-1: critical: Recommended update for selinux-policy Message-ID: <176915704372.16846.16869758630705970353@smelt2.prg2.suse.org> # Recommended update for selinux-policy Announcement ID: SUSE-RU-2026:20113-1 Release Date: 2026-01-19T14:45:38Z Rating: critical References: * bsc#1231354 * bsc#1233358 * bsc#1241964 * bsc#1244459 * bsc#1244573 * bsc#1246080 * bsc#1246559 * bsc#1251789 * bsc#1251931 * bsc#1252095 * bsc#1252431 * bsc#1252992 * bsc#1252993 * bsc#1253098 * bsc#1253389 * bsc#1254395 * bsc#1254889 * bsc#1255024 Affected Products: * SUSE Linux Micro 6.2 An update that has 18 fixes can now be installed. ## Description: This update for selinux-policy fixes the following issues: Changes in selinux-policy: Update to version 20250627+git345.3965b24b0: * Allow 'mysql-systemd-helper upgrade' to work correctly (bsc#1255024) Update to version 20250627+git343.b66ec7135: * Allow snapper_tu_etc_plugin_t to connect to machined varlink socket (bsc#1254889) Update to version 20250627+git341.4beeb2d65: * Allow virtlogd_t dac_override (bsc#1253389) * Introduce systemd_cryptsetup_generator_var_run_t file type (bsc#1244459) * Allow virtqemud_t to read/write device_t (bsc#1251789) * update support for polkit agent helper (bsc#1251931) * Allow system_mail_t read apache system content conditionally * Allow login_userdomain read lastlog * Allow sshd-net read and write to sshd vsock socket * Update ktls policy * Add comprehensive SELinux policy module for bwrap thumbnail generation * Revert "Allow thumb_t create permission in the user namespace" * Allow systemd-machined read svirt process state * Allow sshd_auth_t getopt/setopt on tcp_socket (bsc#1252992) * Allow sysadm access to TPM * Allow tlp get the attributes of the pidfs filesystem * Allow kmscon to read netlink_kobject_uevent_socket * Allow systemd-ssh-issue read kernel sysctls * fix: bz2279215 Allow speech-dispatcher access to user home/cache files * Allow create kerberos files in postgresql db home * Fix files_delete_boot_symlinks() to contain delete_lnk_files_pattern * Allow shell comamnds in locate systemd service (bsc#1246559) * Introduce initrc_nnp_daemon_domain interface * Label /var/lib/cosmic-greeter with xdm_var_lib_t * Allow setroubleshoot-fixit get attributes of xattr fs * Allow insights-client manage /etc symlinks * Allow insights-client get attributes of the rpm executable * Allow nfsidmapd search virt lib directories * Allow iotop stream connect to systemd-userdbd * Allow snapper_sdbootutil_plugin_t manage unlabeled_t files,dirs,symlinks (bsc#1252993) * Allow gnome-remote-desktop read sssd public files * Allow thumb_t stream connect to systemd-userdbd * Add auth_nnp_domtrans_chkpwd() * Allow sshd_auth_t getopt/setopt on tcp_socket (bsc#1252992) * Allow bluez dbus API passing unix domain sockets * Allow bluez dbus api pass sockets over dbus * Dontaudit systemd-generator connect to sssd over a unix stream socket * Allow init watch/watch_reads systemd-machined user ptys * Introduce sap_service_transition_to_unconfined_user boolean * allow init to read sap symlinks * Allow SAP domain to relocation text in all files * Fix macros.selinux-policy to allow changing booleans when policy is not loaded. Previous logic was broken (bsc#1254395) Update to version 20250627+git293.3432d4834: * Allow pcscd_t to search cgroup (bsc#1253098) * Fix syntax error in userdomain.if * Allow nnp_transition for OpenSMTPD (bsc#1252431) * Allow ras-mc-ctl get attributes of the kmod executable * Define file equivalency for /var/opt * Allow virtnodedev_t the perfmon capability * Allow nut_upsdrvctl_t the sys_ptrace capability * Label /usr/lib/systemd/user/graphical-session-pre.target with xdm_unit_file_t * Allow snapper sdbootutil plugin read emmc devices (bsc#1231354) * Allow pcrlock to delete pid entries * Allow systemd_pcrlock_t to manage its pid files * Mark snapper_sdbootutil_plugin_t as permissive * Drop unnamed filetrans, should be done upstream (bsc#1241964) * Label pcrlock pid file correctly (bsc#1241964) * Allow snapper sdbootutil plugin send msg to system bus (bsc#1241964) * snapper takes output from stdout/err, allow pcrlock to write * Add tpm2_getcap permissions to snapper sdbootutil (bsc#1244573) * Allow snapper sdbootutil plugin to read snapper data and conf * Allow snapper sdbootutil plugin to grep /proc/stat (bsc#1241964) * Replace snapper tmp file access for pcrlock (bsc#1241964) * Allow snapper sdbootutil read kernel module dirs (bsc#1241964) * Allow snapper sdbootutil plugin use bootctl (bsc#1241964) * Allow snapper sdbootutil plugin to list and read sysfs (bsc#1241964) * Allow snapper sdbootutil sys_admin (bsc#1241964) * Allow snapper sdbootutils plugin to findmnt (bsc#1241964) * Allow snapper sdbootutil plugin rw tpm (bsc#1233358) * Move manage dos permissions and dontaudit execmem to snapper sdbootutils plugin (bsc#1241964) * Move snapper domtrans to sdbootutil to plugin (bsc#1241964) * Revert snapper access to keys, move to sdbootutils plugin policy (bsc#1241964) * Add initial seperate policy for sdbootutil called by snapper (bsc#1233358) * Allow sort in snapper_grub_plugin_t read cpu.max (bsc#1252095) * systemd-sysctl: allow rw on binfm_misc_fs_t to set binfmt_misc status * Allow cupsd to manage cupsd_rw_etc_t lnk_files * Set temporary no-stub resolv.conf file from NetworkManager as net_conf_t * Allow spamc read aliases file * Mark configfs_t as mountpoint (bsc#1246080) * Allow systemd-machined watch cgroup files * Allow sshd-auth read generic proc files * Allow sshd-auth read and write user domain ptys * Allow logwatch read and write sendmail unix stream sockets * Allow logwatch domain transition on rpm execution * Allow thumb_t mounton its private tmpfs files * Allow thumb_t create permission in the user namespace * Allow corenet_unconfined_type name_bind to icmp_socket * Allow systemd-networkd to manage systemd_networkd_var_lib_t files * Allow sshd-session get attributes of sshd vsock socket ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-154=1 ## Package List: * SUSE Linux Micro 6.2 (noarch) * selinux-policy-20250627+git345.3965b24b0-160000.1.1 * selinux-policy-devel-20250627+git345.3965b24b0-160000.1.1 * selinux-policy-minimum-20250627+git345.3965b24b0-160000.1.1 * selinux-policy-targeted-20250627+git345.3965b24b0-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1231354 * https://bugzilla.suse.com/show_bug.cgi?id=1233358 * https://bugzilla.suse.com/show_bug.cgi?id=1241964 * https://bugzilla.suse.com/show_bug.cgi?id=1244459 * https://bugzilla.suse.com/show_bug.cgi?id=1244573 * https://bugzilla.suse.com/show_bug.cgi?id=1246080 * https://bugzilla.suse.com/show_bug.cgi?id=1246559 * https://bugzilla.suse.com/show_bug.cgi?id=1251789 * https://bugzilla.suse.com/show_bug.cgi?id=1251931 * https://bugzilla.suse.com/show_bug.cgi?id=1252095 * https://bugzilla.suse.com/show_bug.cgi?id=1252431 * https://bugzilla.suse.com/show_bug.cgi?id=1252992 * https://bugzilla.suse.com/show_bug.cgi?id=1252993 * https://bugzilla.suse.com/show_bug.cgi?id=1253098 * https://bugzilla.suse.com/show_bug.cgi?id=1253389 * https://bugzilla.suse.com/show_bug.cgi?id=1254395 * https://bugzilla.suse.com/show_bug.cgi?id=1254889 * https://bugzilla.suse.com/show_bug.cgi?id=1255024 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:30:48 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:30:48 -0000 Subject: SUSE-SU-2026:20112-1: critical: Security update for docker Message-ID: <176915704868.16846.2524022971441964991@smelt2.prg2.suse.org> # Security update for docker Announcement ID: SUSE-SU-2026:20112-1 Release Date: 2026-01-17T13:19:29Z Rating: critical References: * bsc#1247367 * bsc#1247594 * bsc#1248373 * bsc#1250508 * jsc#PED-12534 * jsc#PED-8905 Cross-References: * CVE-2025-54388 CVSS scores: * CVE-2025-54388 ( SUSE ): 5.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N * CVE-2025-54388 ( SUSE ): 5.2 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-54388 ( NVD ): 5.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-54388 ( NVD ): 4.6 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Micro 6.2 An update that solves one vulnerability, contains two features and has three fixes can now be installed. ## Description: This update for docker fixes the following issues: Changes in docker: * Update to Docker 28.5.1-ce. See upstream changelog online at * Update to Docker 28.5.0-ce. See upstream changelog online at * Update to docker-buildx v0.29.0. Upstream changelog: * Remove git-core recommends on SLE. Most SLE systems have installRecommends=yes by default and thus end up installing git with Docker. bsc#1250508 This feature is mostly intended for developers ("docker build git://") so most users already have the dependency installed, and the error when git is missing is fairly straightforward (so they can easily figure out what they need to install). * Update to docker-buildx v0.28.0. Upstream changelog: * Update to Docker 28.4.0-ce. See upstream changelog online at * Fixes a nil pointer panic in "docker push". bsc#1248373 * Update warnings and errors related to "docker buildx ..." so that they reference our openSUSE docker-buildx packages. * Enable building docker-buildx for SLE15 systems with SUSEConnect secret injection enabled. PED-12534 PED-8905 bsc#1247594 As docker-buildx does not support our SUSEConnect secret injection (and some users depend "docker build" working transparently), patch the docker CLI so that "docker build" will no longer automatically call "docker buildx build", effectively making DOCKER_BUILDKIT=0 the default configuration. Users can manually use "docker buildx ..." commands or set DOCKER_BUILDKIT=1 in order to opt-in to using docker-buildx. Users can silence the "docker build" warning by setting DOCKER_BUILDKIT=0 explicitly. In order to inject SCC credentials with docker-buildx, users should use RUN --mount=type=secret,id=SCCcredentials zypper -n ... in their Dockerfiles, and docker buildx build --secret id=SCCcredentials,src=/etc/zypp/credentials.d/SCCcredentials,type=file . when doing their builds. * Update to Docker 28.3.3-ce. See upstream changelog online at CVE-2025-54388 bsc#1247367 * Update to docker-buildx v0.26.1. Upstream changelog: * Update to docker-buildx v0.26.0. Upstream changelog: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-151=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * docker-buildx-0.29.0-160000.4.1 * docker-debuginfo-28.5.1_ce-160000.4.1 * docker-28.5.1_ce-160000.4.1 * docker-buildx-debuginfo-0.29.0-160000.4.1 ## References: * https://www.suse.com/security/cve/CVE-2025-54388.html * https://bugzilla.suse.com/show_bug.cgi?id=1247367 * https://bugzilla.suse.com/show_bug.cgi?id=1247594 * https://bugzilla.suse.com/show_bug.cgi?id=1248373 * https://bugzilla.suse.com/show_bug.cgi?id=1250508 * https://jira.suse.com/browse/PED-12534 * https://jira.suse.com/browse/PED-8905 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:30:50 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:30:50 -0000 Subject: SUSE-RU-2026:20111-1: moderate: Recommended update for openvswitch Message-ID: <176915705009.16846.7754489438947387724@smelt2.prg2.suse.org> # Recommended update for openvswitch Announcement ID: SUSE-RU-2026:20111-1 Release Date: 2026-01-14T11:12:45Z Rating: moderate References: Affected Products: * SUSE Linux Micro 6.2 An update that can now be installed. ## Description: This update for openvswitch fixes the following issues: * Update OVN to 25.03.2 * Bug fixes * Dynamic Routing: * Add the option "dynamic-routing-redistribute-local-only" to Logical Routers and Logical Router Ports which refines the way in which chassis-specific Advertised_Routes (e.g., for NAT and LB IPs) are advertised. * Add the option "dynamic-routing-vrf-id" to Logical Routers which allows CMS to specify the Linux routing table id for a given vrf. * Add ovn-nbctl lsp-add-router-port which will create router port on specified LS. * Add ovn-nbctl lsp-add-localnet-port which will create localnet port on specified LS. * Update OVN to 25.03.1 * Bug fixes * Update Openvswitch to 3.5.2 * Bug fixes ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-142=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * openvswitch-debuginfo-3.5.2-160000.3.1 * python3-openvswitch-3.5.2-160000.3.1 * openvswitch-3.5.2-160000.3.1 * openvswitch-debugsource-3.5.2-160000.3.1 * libopenvswitch-3_5-0-debuginfo-3.5.2-160000.3.1 * libopenvswitch-3_5-0-3.5.2-160000.3.1 * python3-openvswitch-debuginfo-3.5.2-160000.3.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:30:55 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:30:55 -0000 Subject: SUSE-SU-2026:20110-1: moderate: Security update for curl Message-ID: <176915705500.16846.16684093261010807606@smelt2.prg2.suse.org> # Security update for curl Announcement ID: SUSE-SU-2026:20110-1 Release Date: 2026-01-14T10:57:51Z Rating: moderate References: * bsc#1255731 * bsc#1255732 * bsc#1255733 * bsc#1255734 * bsc#1256105 Cross-References: * CVE-2025-14017 * CVE-2025-14524 * CVE-2025-14819 * CVE-2025-15079 * CVE-2025-15224 CVSS scores: * CVE-2025-14017 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-14017 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-14017 ( NVD ): 6.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-14524 ( SUSE ): 5.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-14524 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-14524 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-14819 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-14819 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-14819 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-15079 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-15079 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-15079 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-15224 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-15224 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2025-15224 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Micro 6.2 An update that solves five vulnerabilities can now be installed. ## Description: This update for curl fixes the following issues: This update for curl fixes the following issues: * CVE-2025-14017: broken TLS options for threaded LDAPS (bsc#1256105). * CVE-2025-14524: bearer token leak on cross-protocol redirect (bsc#1255731). * CVE-2025-14819: libssh global knownhost override (bsc#1255732). * CVE-2025-15079: libssh key passphrase bypass without agent set (bsc#1255733). * CVE-2025-15224: OpenSSL partial chain store policy bypass (bsc#1255734). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-140=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * curl-8.14.1-160000.4.1 * libcurl4-8.14.1-160000.4.1 * libcurl4-debuginfo-8.14.1-160000.4.1 * curl-debugsource-8.14.1-160000.4.1 * curl-debuginfo-8.14.1-160000.4.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14017.html * https://www.suse.com/security/cve/CVE-2025-14524.html * https://www.suse.com/security/cve/CVE-2025-14819.html * https://www.suse.com/security/cve/CVE-2025-15079.html * https://www.suse.com/security/cve/CVE-2025-15224.html * https://bugzilla.suse.com/show_bug.cgi?id=1255731 * https://bugzilla.suse.com/show_bug.cgi?id=1255732 * https://bugzilla.suse.com/show_bug.cgi?id=1255733 * https://bugzilla.suse.com/show_bug.cgi?id=1255734 * https://bugzilla.suse.com/show_bug.cgi?id=1256105 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:30:58 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:30:58 -0000 Subject: SUSE-SU-2026:20109-1: moderate: Security update for haproxy Message-ID: <176915705836.16846.14118456649743909103@smelt2.prg2.suse.org> # Security update for haproxy Announcement ID: SUSE-SU-2026:20109-1 Release Date: 2026-01-14T10:55:17Z Rating: moderate References: * bsc#1250983 Cross-References: * CVE-2025-11230 CVSS scores: * CVE-2025-11230 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-11230 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-11230 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Micro 6.2 An update that solves one vulnerability can now be installed. ## Description: This update for haproxy fixes the following issues: * CVE-2025-11230: issue in the mjson JSON decoder leads to excessive resource consumption when processing numbers with large exponents (bsc#1250983). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-141=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * haproxy-3.2.0+git0.e134140d2-160000.3.1 * haproxy-debuginfo-3.2.0+git0.e134140d2-160000.3.1 * haproxy-debugsource-3.2.0+git0.e134140d2-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-11230.html * https://bugzilla.suse.com/show_bug.cgi?id=1250983 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:31:02 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:31:02 -0000 Subject: SUSE-SU-2026:20108-1: important: Security update for gpg2 Message-ID: <176915706260.16846.12435204750573035377@smelt2.prg2.suse.org> # Security update for gpg2 Announcement ID: SUSE-SU-2026:20108-1 Release Date: 2026-01-14T10:21:38Z Rating: important References: * bsc#1255715 * bsc#1256244 * bsc#1256246 * bsc#1256390 Cross-References: * CVE-2025-68973 CVSS scores: * CVE-2025-68973 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-68973 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N * CVE-2025-68973 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Micro 6.2 An update that solves one vulnerability and has three fixes can now be installed. ## Description: This update for gpg2 fixes the following issues: * CVE-2025-68973: out-of-bounds write when processing specially crafted input in the armor parser can lead to memory corruption (bsc#1255715). Other security fixes: * gpg: Avoid potential downgrade to SHA1 in 3rd party key signatures (bsc#1256246). * gpg: Error out on unverified output for non-detached signatures (bsc#1256244). * gpg: Deprecate the option --not-dash-escaped (bsc#1256390). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-138=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64) * gpg2-debuginfo-2.5.5-160000.3.1 * gpg2-2.5.5-160000.3.1 * gpg2-debugsource-2.5.5-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-68973.html * https://bugzilla.suse.com/show_bug.cgi?id=1255715 * https://bugzilla.suse.com/show_bug.cgi?id=1256244 * https://bugzilla.suse.com/show_bug.cgi?id=1256246 * https://bugzilla.suse.com/show_bug.cgi?id=1256390 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:31:04 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:31:04 -0000 Subject: SUSE-RU-2026:20107-1: moderate: Recommended update for hyper-v Message-ID: <176915706468.16846.4132368543909620076@smelt2.prg2.suse.org> # Recommended update for hyper-v Announcement ID: SUSE-RU-2026:20107-1 Release Date: 2026-01-14T09:25:04Z Rating: moderate References: * bsc#1244154 Affected Products: * SUSE Linux Micro 6.2 An update that has one fix can now be installed. ## Description: This update for hyper-v fixes the following issues: * fcopy: Fix irregularities with size of ring buffer * fcopy: Fix incorrect file path conversion * enable debug logs for hv_kvp_daemon (bsc#1244154) * update route parsing in kvp daemon * reduce resource usage in hv_kvp_daemon * reduce resouce usage in hv_get_dns_info helper * hv_kvp_daemon: Pass NIC name to hv_get_dns_info as well * terminate fcopy daemon if read from uio fails * change permissions of NetworkManager configuration file * fix a complier warning in the fcopy uio daemon * remove obsolete kvptest.ps1.txt which failed since a decade * remove obsolete rpm postinstall code for SLE11SP2 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Micro 6.2 zypper in -t patch SUSE-SL-Micro-6.2-137=1 ## Package List: * SUSE Linux Micro 6.2 (aarch64 x86_64) * hyper-v-9-160000.3.1 * hyper-v-debugsource-9-160000.3.1 * hyper-v-debuginfo-9-160000.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1244154 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:31:06 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:31:06 -0000 Subject: SUSE-RU-2026:20106-1: moderate: Recommended update for resource-agents Message-ID: <176915706690.16846.6872493031824670527@smelt2.prg2.suse.org> # Recommended update for resource-agents Announcement ID: SUSE-RU-2026:20106-1 Release Date: 2026-01-21T11:01:08Z Rating: moderate References: * bsc#1249819 Affected Products: * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that has one fix can now be installed. ## Description: This update for resource-agents fixes the following issues: * Fix: OCF Resource Agents for vsftpd failure: No PID found (bsc#1249819) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-160=1 ## Package List: * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * resource-agents-debugsource-4.16.0+git90.968ad701-160000.2.1 * resource-agents-debuginfo-4.16.0+git90.968ad701-160000.2.1 * resource-agents-4.16.0+git90.968ad701-160000.2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1249819 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:31:08 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:31:08 -0000 Subject: SUSE-RU-2026:20105-1: moderate: Recommended update for resource-agents Message-ID: <176915706882.16846.2647990972145790263@smelt2.prg2.suse.org> # Recommended update for resource-agents Announcement ID: SUSE-RU-2026:20105-1 Release Date: 2026-01-21T11:09:05Z Rating: moderate References: * bsc#1249819 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server High Availability Extension 16.0 An update that has one fix can now be installed. ## Description: This update for resource-agents fixes the following issues: * Fix: OCF Resource Agents for vsftpd failure: No PID found (bsc#1249819) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server High Availability Extension 16.0 zypper in -t patch SUSE-SLES-HA-16.0-160=1 ## Package List: * SUSE Linux Enterprise Server High Availability Extension 16.0 (ppc64le s390x x86_64) * resource-agents-debugsource-4.16.0+git90.968ad701-160000.2.1 * resource-agents-debuginfo-4.16.0+git90.968ad701-160000.2.1 * resource-agents-4.16.0+git90.968ad701-160000.2.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1249819 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:31:13 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:31:13 -0000 Subject: SUSE-RU-2026:20104-1: important: Recommended update for s390-tools Message-ID: <176915707304.16846.11805518653944675454@smelt2.prg2.suse.org> # Recommended update for s390-tools Announcement ID: SUSE-RU-2026:20104-1 Release Date: 2026-01-21T11:09:24Z Rating: important References: * bsc#1229461 * bsc#1230345 * bsc#1250643 * bsc#1250644 * jsc#PED-10303 * jsc#PED-14586 * jsc#PED-3223 * jsc#PED-9591 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that contains four features and has four fixes can now be installed. ## Description: This update for s390-tools fixes the following issues: Upgrade s390-tools to 2.40 (jsc#PED-14586): * Add new tools / libraries: * Add project-wide .clang-tidy configuration * libutil: Introduce util_time for time related functionality * libutil: Introduce zsh/bash autocompletion tooling based on util_opt * pvinfo: Tool to display Secure Execution system information * pvverify: Tool to verify host-key documents * Changes of existing tools: * cpumf: Implement zsh and bash autocompletion * dasdfmt: Implement zsh and bash autocompletion * dbginfo.sh: Add NetworkManager and netplan * dbginfo.sh: Add kvm_stat * dbginfo.sh: Adding stp time information * dbginfo.sh: Simplify procfs collection * hyptop: Add physical information row * hyptop: Calculate sample time delta for physical partition * hyptop: Replace long option names using _ with - for consistency For example: --cpu_types -> \--cpu-types (Options with _ are still supported for backward compatibility) * libekmfweb: Add function to validate a certificate against the identity key * netboot: Add longer kernel command lines support * udev/rules.d: Make virtio-blk devices non-rotational * udev/rules.d: Set default io scheduler to 'none' for virtio-blk * ziomon: Add support to sample device symlinks (/dev/disk/...) * ziorep_config: Add fcp-lun details to -M option output * ziorep_config: Add port_id and failed attributes to -A option output * netboot: Install on non-s390 architectures * Bug Fixes: * lib(ekmfweb|kmipclient): Use ln without -r * s390-tools: Fix various compilation issues with musl libc * zipl/boot: Fix unused loadparm when SCLP line-mode console is absent Upgrade s390-tools to version 2.39 (jsc#PED-10303): * Changes of existing tools: * chpstat: Add options to select IEC units for scaling (SI units are default) * chzdev: Introduce --no-module-load option * cpi: Disable CPI for SEL guests by default * dbginfo.sh: Enhance logging on timeout triggered * iucvterm: Install symlink for lsiucvallow.8 man page * lshwc: Add command line flag to specify individual counters * lspai: Add command line flag for delta values * lspai: Add command line flag for short counter names * lspai: Add command line flag to specify individual counters * lspai: Add command line flags for all cpus * lspai: Add command line flags for hexadecimal output * man: Use CR for constant width font * pvimg: Add '\--image-key' option * zdev: Allow dynamic control of module load * zipl/boot: Fix EBCDIC code page 500 conversion and decrease size by 200 bytes * zipl: Add support of heterogeneous mirrors (remove technical limitations on mirrored targets, thus allowing mirrored devices consist of partitions at different offsets on disks of different types and geometry). * zkey: Add support for generating and importing exportable secure keys * Bug Fixes: * chpstat: Fix scaling of DPU utilization calculation * zdev/dracut: Prevent loading of unused kernel modules * zdev: Fix double device configuration on DPM systems * zdev: Fix double device configuration with rd.dasd * zipl_helper.device-mapper: Fix segfault in an error path ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-159=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-159=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (s390x x86_64) * s390-tools-2.40.0-160000.1.1 * SUSE Linux Enterprise Server 16.0 (s390x) * s390-tools-zdsfs-2.40.0-160000.1.1 * libkmipclient1-2.40.0-160000.1.1 * libkmipclient1-debuginfo-2.40.0-160000.1.1 * s390-tools-debuginfo-2.40.0-160000.1.1 * s390-tools-hmcdrvfs-2.40.0-160000.1.1 * s390-tools-hmcdrvfs-debuginfo-2.40.0-160000.1.1 * libekmfweb1-2.40.0-160000.1.1 * osasnmpd-2.40.0-160000.1.1 * s390-tools-chreipl-fcp-mpath-2.40.0-160000.1.1 * libekmfweb1-debuginfo-2.40.0-160000.1.1 * osasnmpd-debuginfo-2.40.0-160000.1.1 * s390-tools-zdsfs-debuginfo-2.40.0-160000.1.1 * s390-tools-debugsource-2.40.0-160000.1.1 * SUSE Linux Enterprise Server 16.0 (noarch) * s390-tools-genprotimg-data-2.40.0-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * s390-tools-2.40.0-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1229461 * https://bugzilla.suse.com/show_bug.cgi?id=1230345 * https://bugzilla.suse.com/show_bug.cgi?id=1250643 * https://bugzilla.suse.com/show_bug.cgi?id=1250644 * https://jira.suse.com/browse/PED-10303 * https://jira.suse.com/browse/PED-14586 * https://jira.suse.com/browse/PED-3223 * https://jira.suse.com/browse/PED-9591 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:31:15 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:31:15 -0000 Subject: SUSE-SU-2026:20103-1: important: Security update for podman Message-ID: <176915707592.16846.8863720651452574827@smelt2.prg2.suse.org> # Security update for podman Announcement ID: SUSE-SU-2026:20103-1 Release Date: 2026-01-21T11:06:30Z Rating: important References: * bsc#1249154 * bsc#1252376 Cross-References: * CVE-2025-31133 * CVE-2025-52565 * CVE-2025-52881 * CVE-2025-9566 CVSS scores: * CVE-2025-31133 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-31133 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-31133 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-31133 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H * CVE-2025-52565 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52565 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52565 ( NVD ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-52565 ( NVD ): 7.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H * CVE-2025-52881 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H * CVE-2025-52881 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-52881 ( NVD ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-52881 ( NVD ): 7.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H * CVE-2025-9566 ( SUSE ): 7.2 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-9566 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-9566 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves four vulnerabilities can now be installed. ## Description: This update for podman fixes the following issues: * CVE-2025-31133,CVE-2025-52565,CVE-2025-52881: container breakouts by bypassing runc's restrictions for writing to arbitrary /proc files (bsc#1252376). * CVE-2025-9566: kube play command may overwrite host files (bsc#1249154). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-161=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-161=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * podmansh-5.4.2-160000.3.1 * podman-remote-debuginfo-5.4.2-160000.3.1 * podman-5.4.2-160000.3.1 * podman-remote-5.4.2-160000.3.1 * podman-debuginfo-5.4.2-160000.3.1 * SUSE Linux Enterprise Server 16.0 (noarch) * podman-docker-5.4.2-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * podmansh-5.4.2-160000.3.1 * podman-remote-debuginfo-5.4.2-160000.3.1 * podman-5.4.2-160000.3.1 * podman-remote-5.4.2-160000.3.1 * podman-debuginfo-5.4.2-160000.3.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * podman-docker-5.4.2-160000.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-31133.html * https://www.suse.com/security/cve/CVE-2025-52565.html * https://www.suse.com/security/cve/CVE-2025-52881.html * https://www.suse.com/security/cve/CVE-2025-9566.html * https://bugzilla.suse.com/show_bug.cgi?id=1249154 * https://bugzilla.suse.com/show_bug.cgi?id=1252376 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:31:37 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:31:37 -0000 Subject: SUSE-SU-2026:20102-1: important: Security update for webkit2gtk3 Message-ID: <176915709777.16846.17352581622421943599@smelt2.prg2.suse.org> # Security update for webkit2gtk3 Announcement ID: SUSE-SU-2026:20102-1 Release Date: 2026-01-20T12:08:51Z Rating: important References: * bsc#1250439 * bsc#1250440 * bsc#1250441 * bsc#1250442 * bsc#1251975 * bsc#1254164 * bsc#1254165 * bsc#1254166 * bsc#1254167 * bsc#1254168 * bsc#1254169 * bsc#1254170 * bsc#1254171 * bsc#1254172 * bsc#1254174 * bsc#1254175 * bsc#1254176 * bsc#1254177 * bsc#1254179 * bsc#1254208 * bsc#1254473 * bsc#1254498 * bsc#1254509 * bsc#1255183 * bsc#1255191 * bsc#1255194 * bsc#1255195 * bsc#1255198 * bsc#1255200 * bsc#1255497 Cross-References: * CVE-2023-43000 * CVE-2025-13502 * CVE-2025-13947 * CVE-2025-14174 * CVE-2025-43272 * CVE-2025-43342 * CVE-2025-43343 * CVE-2025-43356 * CVE-2025-43368 * CVE-2025-43392 * CVE-2025-43419 * CVE-2025-43421 * CVE-2025-43425 * CVE-2025-43427 * CVE-2025-43429 * CVE-2025-43430 * CVE-2025-43431 * CVE-2025-43432 * CVE-2025-43434 * CVE-2025-43440 * CVE-2025-43443 * CVE-2025-43458 * CVE-2025-43480 * CVE-2025-43501 * CVE-2025-43529 * CVE-2025-43531 * CVE-2025-43535 * CVE-2025-43536 * CVE-2025-43541 * CVE-2025-66287 CVSS scores: * CVE-2023-43000 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-43000 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2023-43000 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-13502 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-13502 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-13502 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-13947 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N * CVE-2025-13947 ( NVD ): 7.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N * CVE-2025-14174 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-14174 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-14174 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-43272 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43272 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43342 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-43342 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-43343 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-43343 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-43343 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-43356 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-43356 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-43368 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43368 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43392 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-43392 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-43392 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2025-43419 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-43419 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-43419 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-43421 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43421 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43421 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43425 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43425 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43425 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43427 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43427 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43427 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43429 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-43429 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43429 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43430 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-43430 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43430 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43431 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L * CVE-2025-43431 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-43432 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-43432 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43432 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43434 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-43434 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43434 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43440 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43440 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43440 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43443 ( SUSE ): 5.3 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-43443 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43443 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43458 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-43458 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43458 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43480 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-43480 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N * CVE-2025-43480 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2025-43501 ( SUSE ): 6.8 CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43501 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43501 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43529 ( SUSE ): 8.6 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-43529 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-43529 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-43531 ( SUSE ): 6.0 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43531 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43531 ( NVD ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43535 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43535 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43535 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43536 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43536 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43536 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-43541 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-43541 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-43541 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-66287 ( SUSE ): 7.5 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-66287 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-66287 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves 30 vulnerabilities can now be installed. ## Description: This update for webkit2gtk3 fixes the following issues: Update to version 2.50.4. Security issues fixed: * CVE-2025-13502: processing of maliciously crafted payloads by the GLib remote inspector server may lead to a UIProcess crash due to an out-of- bounds read and an integer underflow (bsc#1254208). * CVE-2025-13947: use of the file drag-and-drop mechanism may lead to remote information disclosure due to a lack of verification of the origins of drag operations (bsc#1254473). * CVE-2025-14174: processing maliciously crafted web content may lead to memory corruption due to improper validation (bsc#1255497). * CVE-2025-43272: processing maliciously crafted web content may lead to an unexpected process crash due to improper memory handling (bsc#1250439). * CVE-2025-43342: processing maliciously crafted web content may lead to an unexpected process crash due to a correctness issue and missing checks (bsc#1250440). * CVE-2025-43343: processing maliciously crafted web content may lead to an unexpected process crash due to improper memory handling (bsc#1251975). * CVE-2025-43356: a website may be able to access sensor information without user consent due to improper cache handling (bsc#1250441). * CVE-2025-43368: processing maliciously crafted web content may lead to an unexpected process crash due to a use-after-free issue (bsc#1250442). * CVE-2025-43392: websites may exfiltrate image data cross-origin due to issues with cache handling (bsc#1254165). * CVE-2025-43419: processing maliciously crafted web content may lead to memory corruption due to improper memory handling (bsc#1254166). * CVE-2025-43421: processing maliciously crafted web content may lead to an unexpected process crash due to enabled array allocation sinking (bsc#1254167). * CVE-2025-43425: processing maliciously crafted web content may lead to an unexpected process crash due to improper memory handling (bsc#1254168). * CVE-2025-43427: processing maliciously crafted web content may lead to an unexpected process crash due to issues with state management (bsc#1254169). * CVE-2025-43429: processing maliciously crafted web content may lead to an unexpected process crash due to a buffer overflow issue (bsc#1254174). * CVE-2025-43430: processing maliciously crafted web content may lead to an unexpected process crash due to issues with state management (bsc#1254172). * CVE-2025-43431: processing maliciously crafted web content may lead to memory corruption due to improper memory handling (bsc#1254170). * CVE-2025-43432: processing maliciously crafted web content may lead to an unexpected process crash due to a use-after-free issue (bsc#1254171). * CVE-2025-43434: processing maliciously crafted web content may lead to an unexpected process crash due to a use-after-free issue (bsc#1254179). * CVE-2025-43440: processing maliciously crafted web content may lead to an unexpected process crash due to missing checks (bsc#1254177). * CVE-2025-43443: processing maliciously crafted web content may lead to an unexpected process crash due to missing checks (bsc#1254176). * CVE-2025-43458: processing maliciously crafted web content may lead to an unexpected process crash due to issues with state management (bsc#1254498). * CVE-2025-43501: processing maliciously crafted web content may lead to an unexpected process crash due to a buffer overflow issue (bsc#1255194). * CVE-2025-43529: processing maliciously crafted web content may lead to arbitrary code execution due to a use-after-free issue (bsc#1255198). * CVE-2025-43531: processing maliciously crafted web content may lead to an unexpected process crash due to a race condition (bsc#1255183). * CVE-2025-43535: processing maliciously crafted web content may lead to an unexpected process crash due to improper memory handling (bsc#1255195). * CVE-2025-43536: processing maliciously crafted web content may lead to an unexpected process crash due to a use-after-free issue (bsc#1255200). * CVE-2025-43541: processing maliciously crafted web content may lead to an unexpected process crash due to type confusion (bsc#1255191). * CVE-2025-66287: processing maliciously crafted web content may lead to an unexpected process crash due to improper memory handling (bsc#1254509). Other issues fixed and changes: * Version 2.50.4: * Correctly handle the program name passed to the sleep disabler. * Ensure GStreamer is initialized before using the Quirks. * Fix several crashes and rendering issues. * Version 2.50.3: * Fix seeking and looping of media elements that set the "loop" property. * Fix several crashes and rendering issues. * Version 2.50.2: * Prevent unsafe URI schemes from participating in media playback. * Make jsc_value_array_buffer_get_data() function introspectable. * Fix logging in to Google accounts that have a WebAuthn second factor configured. * Fix loading webkit://gpu when there are no threads configured for GPU rendering. * Fix rendering gradiants that use the CSS hue interpolation method. * Fix pasting image data from the clipboard. * Fix font-family selection when the font name contains spaces. * Fix the build with standard C libraries that lack execinfo.h, like Musl or uClibc. * Fix capturing canvas snapshots in the Web Inspector. * Fix several crashes and rendering issues. * Version 2.50.1: * Improve text rendering performance. * Fix audio playback broken on instagram. * Fix rendering of layers with fractional transforms. * Fix the build with ENABLE(VIDEO) disabled. * Fix the build in s390x. * Fix several crashes and rendering issues. * Version 2.50.0: * Improved rendering performance by recording each layer once and replaying every dirty region in different worker threads. * Enable damage propagation to the UI process by default. * CSS property font-variant-emoji is now enabled by default. * Font synthesis properties (bold/italic) are now properly handled. * Ensure web view is focused on tap gesture. * Added new API to get the theme color of a WebKitWebView. * Version 2.49.90: * Add support for font collection / fragment identifiers. * Fix web process deadlock on exit. * Fix stuttering when playing WebP animations * Fix CSS animations with cubic-bezier timing function. * Do not start the MemoryPressureMonitor if it?s disabled * Fix several crashes and rendering issues. * Updated translations. * Version 2.48.6: * Fix emojis incorrectly rendered in their text variant. * Add support for font collection / fragment identifiers. * Fix web process deadlock on exit. * Fix stuttering when playing WebP animations. * Fix CSS animations with cubic-bezier timing function. * Do not start the MemoryPressureMonitor if it's disabled. * Fix several crashes and rendering issues. * Fix a11y regression where AT-SPI roles were mapped incorrectly. * Disable skia on ppc64le. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-156=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-156=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * WebKitGTK-6.0-lang-2.50.4-160000.1.1 * WebKitGTK-4.1-lang-2.50.4-160000.1.1 * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * libjavascriptcoregtk-4_1-0-debuginfo-2.50.4-160000.1.1 * libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 * webkit2gtk3-minibrowser-debuginfo-2.50.4-160000.1.1 * webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 * webkit-jsc-6.0-debuginfo-2.50.4-160000.1.1 * webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 * webkit2gtk4-minibrowser-debuginfo-2.50.4-160000.1.1 * typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 * webkit-jsc-6.0-2.50.4-160000.1.1 * typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 * libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 * typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 * libwebkit2gtk-4_1-0-2.50.4-160000.1.1 * typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 * libwebkitgtk-6_0-4-2.50.4-160000.1.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.50.4-160000.1.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.50.4-160000.1.1 * webkit-jsc-4.1-debuginfo-2.50.4-160000.1.1 * webkit2gtk4-minibrowser-2.50.4-160000.1.1 * typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 * webkit-jsc-4.1-2.50.4-160000.1.1 * webkit2gtk4-debugsource-2.50.4-160000.1.1 * webkit2gtk3-debuginfo-2.50.4-160000.1.1 * webkit2gtk4-debuginfo-2.50.4-160000.1.1 * typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 * webkitgtk-6_0-injected-bundles-debuginfo-2.50.4-160000.1.1 * libwebkit2gtk-4_1-0-debuginfo-2.50.4-160000.1.1 * webkit2gtk3-debugsource-2.50.4-160000.1.1 * libwebkitgtk-6_0-4-debuginfo-2.50.4-160000.1.1 * webkit2gtk3-minibrowser-2.50.4-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * WebKitGTK-6.0-lang-2.50.4-160000.1.1 * WebKitGTK-4.1-lang-2.50.4-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * libjavascriptcoregtk-4_1-0-debuginfo-2.50.4-160000.1.1 * libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 * webkit2gtk3-minibrowser-debuginfo-2.50.4-160000.1.1 * webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 * webkit-jsc-6.0-debuginfo-2.50.4-160000.1.1 * webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 * webkit2gtk4-minibrowser-debuginfo-2.50.4-160000.1.1 * typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 * webkit-jsc-6.0-2.50.4-160000.1.1 * typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 * libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 * typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 * libwebkit2gtk-4_1-0-2.50.4-160000.1.1 * typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 * libwebkitgtk-6_0-4-2.50.4-160000.1.1 * webkit2gtk-4_1-injected-bundles-debuginfo-2.50.4-160000.1.1 * libjavascriptcoregtk-6_0-1-debuginfo-2.50.4-160000.1.1 * webkit-jsc-4.1-debuginfo-2.50.4-160000.1.1 * webkit2gtk4-minibrowser-2.50.4-160000.1.1 * typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 * webkit-jsc-4.1-2.50.4-160000.1.1 * webkit2gtk4-debugsource-2.50.4-160000.1.1 * webkit2gtk3-debuginfo-2.50.4-160000.1.1 * webkit2gtk4-debuginfo-2.50.4-160000.1.1 * typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 * webkitgtk-6_0-injected-bundles-debuginfo-2.50.4-160000.1.1 * libwebkit2gtk-4_1-0-debuginfo-2.50.4-160000.1.1 * webkit2gtk3-debugsource-2.50.4-160000.1.1 * libwebkitgtk-6_0-4-debuginfo-2.50.4-160000.1.1 * webkit2gtk3-minibrowser-2.50.4-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2023-43000.html * https://www.suse.com/security/cve/CVE-2025-13502.html * https://www.suse.com/security/cve/CVE-2025-13947.html * https://www.suse.com/security/cve/CVE-2025-14174.html * https://www.suse.com/security/cve/CVE-2025-43272.html * https://www.suse.com/security/cve/CVE-2025-43342.html * https://www.suse.com/security/cve/CVE-2025-43343.html * https://www.suse.com/security/cve/CVE-2025-43356.html * https://www.suse.com/security/cve/CVE-2025-43368.html * https://www.suse.com/security/cve/CVE-2025-43392.html * https://www.suse.com/security/cve/CVE-2025-43419.html * https://www.suse.com/security/cve/CVE-2025-43421.html * https://www.suse.com/security/cve/CVE-2025-43425.html * https://www.suse.com/security/cve/CVE-2025-43427.html * https://www.suse.com/security/cve/CVE-2025-43429.html * https://www.suse.com/security/cve/CVE-2025-43430.html * https://www.suse.com/security/cve/CVE-2025-43431.html * https://www.suse.com/security/cve/CVE-2025-43432.html * https://www.suse.com/security/cve/CVE-2025-43434.html * https://www.suse.com/security/cve/CVE-2025-43440.html * https://www.suse.com/security/cve/CVE-2025-43443.html * https://www.suse.com/security/cve/CVE-2025-43458.html * https://www.suse.com/security/cve/CVE-2025-43480.html * https://www.suse.com/security/cve/CVE-2025-43501.html * https://www.suse.com/security/cve/CVE-2025-43529.html * https://www.suse.com/security/cve/CVE-2025-43531.html * https://www.suse.com/security/cve/CVE-2025-43535.html * https://www.suse.com/security/cve/CVE-2025-43536.html * https://www.suse.com/security/cve/CVE-2025-43541.html * https://www.suse.com/security/cve/CVE-2025-66287.html * https://bugzilla.suse.com/show_bug.cgi?id=1250439 * https://bugzilla.suse.com/show_bug.cgi?id=1250440 * https://bugzilla.suse.com/show_bug.cgi?id=1250441 * https://bugzilla.suse.com/show_bug.cgi?id=1250442 * https://bugzilla.suse.com/show_bug.cgi?id=1251975 * https://bugzilla.suse.com/show_bug.cgi?id=1254164 * https://bugzilla.suse.com/show_bug.cgi?id=1254165 * https://bugzilla.suse.com/show_bug.cgi?id=1254166 * https://bugzilla.suse.com/show_bug.cgi?id=1254167 * https://bugzilla.suse.com/show_bug.cgi?id=1254168 * https://bugzilla.suse.com/show_bug.cgi?id=1254169 * https://bugzilla.suse.com/show_bug.cgi?id=1254170 * https://bugzilla.suse.com/show_bug.cgi?id=1254171 * https://bugzilla.suse.com/show_bug.cgi?id=1254172 * https://bugzilla.suse.com/show_bug.cgi?id=1254174 * https://bugzilla.suse.com/show_bug.cgi?id=1254175 * https://bugzilla.suse.com/show_bug.cgi?id=1254176 * https://bugzilla.suse.com/show_bug.cgi?id=1254177 * https://bugzilla.suse.com/show_bug.cgi?id=1254179 * https://bugzilla.suse.com/show_bug.cgi?id=1254208 * https://bugzilla.suse.com/show_bug.cgi?id=1254473 * https://bugzilla.suse.com/show_bug.cgi?id=1254498 * https://bugzilla.suse.com/show_bug.cgi?id=1254509 * https://bugzilla.suse.com/show_bug.cgi?id=1255183 * https://bugzilla.suse.com/show_bug.cgi?id=1255191 * https://bugzilla.suse.com/show_bug.cgi?id=1255194 * https://bugzilla.suse.com/show_bug.cgi?id=1255195 * https://bugzilla.suse.com/show_bug.cgi?id=1255198 * https://bugzilla.suse.com/show_bug.cgi?id=1255200 * https://bugzilla.suse.com/show_bug.cgi?id=1255497 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:31:42 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:31:42 -0000 Subject: SUSE-RU-2026:20101-1: important: Recommended update for samba Message-ID: <176915710232.16846.14153768959523034094@smelt2.prg2.suse.org> # Recommended update for samba Announcement ID: SUSE-RU-2026:20101-1 Release Date: 2026-01-20T11:08:06Z Rating: important References: * bsc#1234210 * bsc#1249058 * bsc#1254665 * bsc#1254926 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that has four fixes can now be installed. ## Description: This update for samba fixes the following issues: Changes in samba: * samba-ad-dc-libs packages are missing a DLZ plugin for bind 9.20; (bsc#1249058). * Adjust README.SUSE to reflect the new preferred location for '[printers]' share; (bsc#1254665). * Fix Samba printers reporting invalid sid during print jobs; (bsc#1234210); (bsc#1254926) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-157=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-157=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * samba-python3-4.22.6+git.456.11475143caf-160000.1.1 * ctdb-pcp-pmda-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-dsdb-modules-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-libs-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * ctdb-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * libldb2-4.22.6+git.456.11475143caf-160000.1.1 * samba-ad-dc-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-libs-python3-4.22.6+git.456.11475143caf-160000.1.1 * ctdb-pcp-pmda-4.22.6+git.456.11475143caf-160000.1.1 * samba-ldb-ldap-4.22.6+git.456.11475143caf-160000.1.1 * samba-winbind-libs-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-libs-python3-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-tool-4.22.6+git.456.11475143caf-160000.1.1 * libldb2-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-winbind-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-4.22.6+git.456.11475143caf-160000.1.1 * samba-winbind-4.22.6+git.456.11475143caf-160000.1.1 * samba-client-libs-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-ad-dc-libs-4.22.6+git.456.11475143caf-160000.1.1 * libldb-devel-4.22.6+git.456.11475143caf-160000.1.1 * samba-ad-dc-libs-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-devel-4.22.6+git.456.11475143caf-160000.1.1 * samba-python3-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-ad-dc-4.22.6+git.456.11475143caf-160000.1.1 * samba-client-4.22.6+git.456.11475143caf-160000.1.1 * samba-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-client-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-debugsource-4.22.6+git.456.11475143caf-160000.1.1 * samba-client-libs-4.22.6+git.456.11475143caf-160000.1.1 * samba-gpupdate-4.22.6+git.456.11475143caf-160000.1.1 * samba-dcerpc-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * python3-ldb-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-ldb-ldap-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * ldb-tools-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-libs-4.22.6+git.456.11475143caf-160000.1.1 * samba-dsdb-modules-4.22.6+git.456.11475143caf-160000.1.1 * ldb-tools-4.22.6+git.456.11475143caf-160000.1.1 * python3-ldb-4.22.6+git.456.11475143caf-160000.1.1 * samba-dcerpc-4.22.6+git.456.11475143caf-160000.1.1 * ctdb-4.22.6+git.456.11475143caf-160000.1.1 * samba-winbind-libs-4.22.6+git.456.11475143caf-160000.1.1 * SUSE Linux Enterprise Server 16.0 (noarch) * samba-doc-4.22.6+git.456.11475143caf-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * samba-python3-4.22.6+git.456.11475143caf-160000.1.1 * ctdb-pcp-pmda-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-dsdb-modules-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-libs-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * ctdb-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * libldb2-4.22.6+git.456.11475143caf-160000.1.1 * samba-ad-dc-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-libs-python3-4.22.6+git.456.11475143caf-160000.1.1 * ctdb-pcp-pmda-4.22.6+git.456.11475143caf-160000.1.1 * samba-ldb-ldap-4.22.6+git.456.11475143caf-160000.1.1 * samba-winbind-libs-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-libs-python3-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-tool-4.22.6+git.456.11475143caf-160000.1.1 * libldb2-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-winbind-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-4.22.6+git.456.11475143caf-160000.1.1 * samba-winbind-4.22.6+git.456.11475143caf-160000.1.1 * samba-client-libs-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-ad-dc-libs-4.22.6+git.456.11475143caf-160000.1.1 * libldb-devel-4.22.6+git.456.11475143caf-160000.1.1 * samba-ad-dc-libs-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-devel-4.22.6+git.456.11475143caf-160000.1.1 * samba-python3-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-ad-dc-4.22.6+git.456.11475143caf-160000.1.1 * samba-client-4.22.6+git.456.11475143caf-160000.1.1 * samba-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-client-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-debugsource-4.22.6+git.456.11475143caf-160000.1.1 * samba-client-libs-4.22.6+git.456.11475143caf-160000.1.1 * samba-gpupdate-4.22.6+git.456.11475143caf-160000.1.1 * samba-dcerpc-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * python3-ldb-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-ldb-ldap-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * ldb-tools-debuginfo-4.22.6+git.456.11475143caf-160000.1.1 * samba-libs-4.22.6+git.456.11475143caf-160000.1.1 * samba-dsdb-modules-4.22.6+git.456.11475143caf-160000.1.1 * ldb-tools-4.22.6+git.456.11475143caf-160000.1.1 * python3-ldb-4.22.6+git.456.11475143caf-160000.1.1 * samba-dcerpc-4.22.6+git.456.11475143caf-160000.1.1 * ctdb-4.22.6+git.456.11475143caf-160000.1.1 * samba-winbind-libs-4.22.6+git.456.11475143caf-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * samba-doc-4.22.6+git.456.11475143caf-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234210 * https://bugzilla.suse.com/show_bug.cgi?id=1249058 * https://bugzilla.suse.com/show_bug.cgi?id=1254665 * https://bugzilla.suse.com/show_bug.cgi?id=1254926 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:31:45 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:31:45 -0000 Subject: SUSE-SU-2026:20100-1: important: Security update of open-vm-tools Message-ID: <176915710500.16846.12751328552979030396@smelt2.prg2.suse.org> # Security update of open-vm-tools Announcement ID: SUSE-SU-2026:20100-1 Release Date: 2026-01-20T11:02:10Z Rating: important References: * bsc#1250373 * bsc#1250692 Cross-References: * CVE-2025-41244 CVSS scores: * CVE-2025-41244 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-41244 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-41244 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability and has one fix can now be installed. ## Description: This update for open-vm-tools fixes the following issues: Update to open-vm-tools 13.0.5 based on build 24915695. (boo#1250692): Please refer to the Release Notes at https://github.com/vmware/open-vm- tools/blob/stable-13.0.5/ReleaseNotes.md. The granular changes that have gone into the open-vm-tools 13.0.5 release are in the ChangeLog at https://github.com/vmware/open-vm- tools/blob/stable-13.0.5/open-vm-tools/ChangeLog. There are no new features in the open-vm-tools 13.0.5 release. This is primarily a maintenance release that addresses a security issue. This release resolves and includes the patch for CVE-2025-41244. For more information on this vulnerability and its impact on Broadcom products, see VMSA-2025-0015. A minor enhancement has been made for Guest OS Customization. The DeployPkg plugin has been updated to use "systemctl reboot", if available. For a more complete list of issues addressed in this release, see the What's New and Resolved Issues section of the Release Notes. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-158=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-158=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 x86_64) * open-vm-tools-desktop-debuginfo-13.0.5-160000.1.1 * open-vm-tools-sdmp-13.0.5-160000.1.1 * open-vm-tools-containerinfo-13.0.5-160000.1.1 * libvmtools0-13.0.5-160000.1.1 * open-vm-tools-sdmp-debuginfo-13.0.5-160000.1.1 * open-vm-tools-13.0.5-160000.1.1 * libvmtools0-debuginfo-13.0.5-160000.1.1 * open-vm-tools-debuginfo-13.0.5-160000.1.1 * open-vm-tools-containerinfo-debuginfo-13.0.5-160000.1.1 * open-vm-tools-debugsource-13.0.5-160000.1.1 * libvmtools-devel-13.0.5-160000.1.1 * open-vm-tools-desktop-13.0.5-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (x86_64) * open-vm-tools-desktop-debuginfo-13.0.5-160000.1.1 * open-vm-tools-sdmp-13.0.5-160000.1.1 * open-vm-tools-containerinfo-13.0.5-160000.1.1 * libvmtools0-13.0.5-160000.1.1 * open-vm-tools-sdmp-debuginfo-13.0.5-160000.1.1 * open-vm-tools-13.0.5-160000.1.1 * libvmtools0-debuginfo-13.0.5-160000.1.1 * open-vm-tools-debuginfo-13.0.5-160000.1.1 * open-vm-tools-containerinfo-debuginfo-13.0.5-160000.1.1 * open-vm-tools-debugsource-13.0.5-160000.1.1 * libvmtools-devel-13.0.5-160000.1.1 * open-vm-tools-desktop-13.0.5-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2025-41244.html * https://bugzilla.suse.com/show_bug.cgi?id=1250373 * https://bugzilla.suse.com/show_bug.cgi?id=1250692 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:31:46 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:31:46 -0000 Subject: SUSE-SU-2026:20099-1: moderate: Security update for rust1.91, rust1.92 Message-ID: <176915710643.16846.10495650899677210056@smelt2.prg2.suse.org> # Security update for rust1.91, rust1.92 Announcement ID: SUSE-SU-2026:20099-1 Release Date: 2026-01-19T19:43:51Z Rating: moderate References: * jsc#PED-11411 * jsc#SLE-18626 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that contains two features can now be installed. ## Description: This update for rust1.91 and rust1.92 fixes the following issues: Rust is shipped in 1.91.0 version. Please see https://github.com/rust-lang/rust/releases/tag/1.91.0 for changes. Rust is shipped in 1.92.0 version. Please see https://github.com/rust-lang/rust/releases/tag/1.92.0 for changes. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-155=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-155=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * cargo1.91-1.91.0-160000.1.1 * rust1.92-debuginfo-1.92.0-160000.1.1 * cargo1.91-debuginfo-1.91.0-160000.1.1 * cargo1.92-1.92.0-160000.1.1 * cargo1.92-debuginfo-1.92.0-160000.1.1 * rust1.91-debuginfo-1.91.0-160000.1.1 * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64 nosrc) * rust1.92-1.92.0-160000.1.1 * rust1.91-1.91.0-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * cargo1.91-1.91.0-160000.1.1 * rust1.92-debuginfo-1.92.0-160000.1.1 * cargo1.91-debuginfo-1.91.0-160000.1.1 * cargo1.92-1.92.0-160000.1.1 * cargo1.92-debuginfo-1.92.0-160000.1.1 * rust1.91-debuginfo-1.91.0-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (nosrc ppc64le x86_64) * rust1.92-1.92.0-160000.1.1 * rust1.91-1.91.0-160000.1.1 ## References: * https://jira.suse.com/browse/PED-11411 * https://jira.suse.com/browse/SLE-18626 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:31:59 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:31:59 -0000 Subject: SUSE-RU-2026:20098-1: critical: Recommended update for selinux-policy Message-ID: <176915711989.16846.16956667439509680861@smelt2.prg2.suse.org> # Recommended update for selinux-policy Announcement ID: SUSE-RU-2026:20098-1 Release Date: 2026-01-19T14:46:34Z Rating: critical References: * bsc#1231354 * bsc#1233358 * bsc#1241964 * bsc#1244459 * bsc#1244573 * bsc#1246080 * bsc#1246559 * bsc#1251789 * bsc#1251931 * bsc#1252095 * bsc#1252431 * bsc#1252992 * bsc#1252993 * bsc#1253098 * bsc#1253389 * bsc#1254395 * bsc#1254889 * bsc#1255024 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that has 18 fixes can now be installed. ## Description: This update for selinux-policy fixes the following issues: Changes in selinux-policy: Update to version 20250627+git345.3965b24b0: * Allow 'mysql-systemd-helper upgrade' to work correctly (bsc#1255024) Update to version 20250627+git343.b66ec7135: * Allow snapper_tu_etc_plugin_t to connect to machined varlink socket (bsc#1254889) Update to version 20250627+git341.4beeb2d65: * Allow virtlogd_t dac_override (bsc#1253389) * Introduce systemd_cryptsetup_generator_var_run_t file type (bsc#1244459) * Allow virtqemud_t to read/write device_t (bsc#1251789) * update support for polkit agent helper (bsc#1251931) * Allow system_mail_t read apache system content conditionally * Allow login_userdomain read lastlog * Allow sshd-net read and write to sshd vsock socket * Update ktls policy * Add comprehensive SELinux policy module for bwrap thumbnail generation * Revert "Allow thumb_t create permission in the user namespace" * Allow systemd-machined read svirt process state * Allow sshd_auth_t getopt/setopt on tcp_socket (bsc#1252992) * Allow sysadm access to TPM * Allow tlp get the attributes of the pidfs filesystem * Allow kmscon to read netlink_kobject_uevent_socket * Allow systemd-ssh-issue read kernel sysctls * fix: bz2279215 Allow speech-dispatcher access to user home/cache files * Allow create kerberos files in postgresql db home * Fix files_delete_boot_symlinks() to contain delete_lnk_files_pattern * Allow shell comamnds in locate systemd service (bsc#1246559) * Introduce initrc_nnp_daemon_domain interface * Label /var/lib/cosmic-greeter with xdm_var_lib_t * Allow setroubleshoot-fixit get attributes of xattr fs * Allow insights-client manage /etc symlinks * Allow insights-client get attributes of the rpm executable * Allow nfsidmapd search virt lib directories * Allow iotop stream connect to systemd-userdbd * Allow snapper_sdbootutil_plugin_t manage unlabeled_t files,dirs,symlinks (bsc#1252993) * Allow gnome-remote-desktop read sssd public files * Allow thumb_t stream connect to systemd-userdbd * Add auth_nnp_domtrans_chkpwd() * Allow sshd_auth_t getopt/setopt on tcp_socket (bsc#1252992) * Allow bluez dbus API passing unix domain sockets * Allow bluez dbus api pass sockets over dbus * Dontaudit systemd-generator connect to sssd over a unix stream socket * Allow init watch/watch_reads systemd-machined user ptys * Introduce sap_service_transition_to_unconfined_user boolean * allow init to read sap symlinks * Allow SAP domain to relocation text in all files * Fix macros.selinux-policy to allow changing booleans when policy is not loaded. Previous logic was broken (bsc#1254395) Update to version 20250627+git293.3432d4834: * Allow pcscd_t to search cgroup (bsc#1253098) * Fix syntax error in userdomain.if * Allow nnp_transition for OpenSMTPD (bsc#1252431) * Allow ras-mc-ctl get attributes of the kmod executable * Define file equivalency for /var/opt * Allow virtnodedev_t the perfmon capability * Allow nut_upsdrvctl_t the sys_ptrace capability * Label /usr/lib/systemd/user/graphical-session-pre.target with xdm_unit_file_t * Allow snapper sdbootutil plugin read emmc devices (bsc#1231354) * Allow pcrlock to delete pid entries * Allow systemd_pcrlock_t to manage its pid files * Mark snapper_sdbootutil_plugin_t as permissive * Drop unnamed filetrans, should be done upstream (bsc#1241964) * Label pcrlock pid file correctly (bsc#1241964) * Allow snapper sdbootutil plugin send msg to system bus (bsc#1241964) * snapper takes output from stdout/err, allow pcrlock to write * Add tpm2_getcap permissions to snapper sdbootutil (bsc#1244573) * Allow snapper sdbootutil plugin to read snapper data and conf * Allow snapper sdbootutil plugin to grep /proc/stat (bsc#1241964) * Replace snapper tmp file access for pcrlock (bsc#1241964) * Allow snapper sdbootutil read kernel module dirs (bsc#1241964) * Allow snapper sdbootutil plugin use bootctl (bsc#1241964) * Allow snapper sdbootutil plugin to list and read sysfs (bsc#1241964) * Allow snapper sdbootutil sys_admin (bsc#1241964) * Allow snapper sdbootutils plugin to findmnt (bsc#1241964) * Allow snapper sdbootutil plugin rw tpm (bsc#1233358) * Move manage dos permissions and dontaudit execmem to snapper sdbootutils plugin (bsc#1241964) * Move snapper domtrans to sdbootutil to plugin (bsc#1241964) * Revert snapper access to keys, move to sdbootutils plugin policy (bsc#1241964) * Add initial seperate policy for sdbootutil called by snapper (bsc#1233358) * Allow sort in snapper_grub_plugin_t read cpu.max (bsc#1252095) * systemd-sysctl: allow rw on binfm_misc_fs_t to set binfmt_misc status * Allow cupsd to manage cupsd_rw_etc_t lnk_files * Set temporary no-stub resolv.conf file from NetworkManager as net_conf_t * Allow spamc read aliases file * Mark configfs_t as mountpoint (bsc#1246080) * Allow systemd-machined watch cgroup files * Allow sshd-auth read generic proc files * Allow sshd-auth read and write user domain ptys * Allow logwatch read and write sendmail unix stream sockets * Allow logwatch domain transition on rpm execution * Allow thumb_t mounton its private tmpfs files * Allow thumb_t create permission in the user namespace * Allow corenet_unconfined_type name_bind to icmp_socket * Allow systemd-networkd to manage systemd_networkd_var_lib_t files * Allow sshd-session get attributes of sshd vsock socket ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-154=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-154=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * selinux-policy-sandbox-20250627+git345.3965b24b0-160000.1.1 * selinux-policy-targeted-20250627+git345.3965b24b0-160000.1.1 * selinux-policy-devel-20250627+git345.3965b24b0-160000.1.1 * selinux-policy-20250627+git345.3965b24b0-160000.1.1 * selinux-policy-minimum-20250627+git345.3965b24b0-160000.1.1 * selinux-policy-doc-20250627+git345.3965b24b0-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * selinux-policy-sandbox-20250627+git345.3965b24b0-160000.1.1 * selinux-policy-targeted-20250627+git345.3965b24b0-160000.1.1 * selinux-policy-devel-20250627+git345.3965b24b0-160000.1.1 * selinux-policy-20250627+git345.3965b24b0-160000.1.1 * selinux-policy-minimum-20250627+git345.3965b24b0-160000.1.1 * selinux-policy-doc-20250627+git345.3965b24b0-160000.1.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1231354 * https://bugzilla.suse.com/show_bug.cgi?id=1233358 * https://bugzilla.suse.com/show_bug.cgi?id=1241964 * https://bugzilla.suse.com/show_bug.cgi?id=1244459 * https://bugzilla.suse.com/show_bug.cgi?id=1244573 * https://bugzilla.suse.com/show_bug.cgi?id=1246080 * https://bugzilla.suse.com/show_bug.cgi?id=1246559 * https://bugzilla.suse.com/show_bug.cgi?id=1251789 * https://bugzilla.suse.com/show_bug.cgi?id=1251931 * https://bugzilla.suse.com/show_bug.cgi?id=1252095 * https://bugzilla.suse.com/show_bug.cgi?id=1252431 * https://bugzilla.suse.com/show_bug.cgi?id=1252992 * https://bugzilla.suse.com/show_bug.cgi?id=1252993 * https://bugzilla.suse.com/show_bug.cgi?id=1253098 * https://bugzilla.suse.com/show_bug.cgi?id=1253389 * https://bugzilla.suse.com/show_bug.cgi?id=1254395 * https://bugzilla.suse.com/show_bug.cgi?id=1254889 * https://bugzilla.suse.com/show_bug.cgi?id=1255024 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:32:01 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:32:01 -0000 Subject: SUSE-RU-2026:20097-1: critical: Recommended update for scap-security-guide Message-ID: <176915712125.16846.3269822584310681806@smelt2.prg2.suse.org> # Recommended update for scap-security-guide Announcement ID: SUSE-RU-2026:20097-1 Release Date: 2026-01-19T10:50:45Z Rating: critical References: * jsc#ECO-3319 Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that contains one feature can now be installed. ## Description: This update for scap-security-guide fixes the following issues: * updated to 0.1.79 (jsc#ECO-3319) * Add rhcos4 Profile for BSI Grundschutz * Create SLE15 general profile * Fix crypto policy settings in RHEL CIS profiles * Remove deprecated CIS OpenShift 1.4.0 and 1.5.0 profiles * Remove OCP STIG V1R1 * Remove OCP STIG V2R1 * Various updates for SLE 12/15 * updated to 0.1.78 (jsc#ECO-3319) * Enable SCE content for problematic rules that can traverse the whole filesystem * Remove unnecessary Jinja2 macros in control files * Update RHEL 8 STIG to V2R4 and RHEL 9 STIG to V2R5 * Add Debian 13 profile for ANSSI BP 28 (enhanced) * Create SLEM5 General profile * Create SL Micro 6 product and general profile * Update SLE15 STIG version to V2R5 * Update SLE12 STIG version to V3R3 * Update SLEM5 STIG version to V1R2 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-152=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-152=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (noarch) * scap-security-guide-0.1.79-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * scap-security-guide-0.1.79-160000.1.1 ## References: * https://jira.suse.com/browse/ECO-3319 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:32:04 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:32:04 -0000 Subject: SUSE-SU-2026:20096-1: moderate: Security update for cargo-c Message-ID: <176915712476.16846.14009261746243098077@smelt2.prg2.suse.org> # Security update for cargo-c Announcement ID: SUSE-SU-2026:20096-1 Release Date: 2026-01-19T10:42:10Z Rating: moderate References: * bsc#1243179 * bsc#1243851 * bsc#1249012 Cross-References: * CVE-2024-12224 * CVE-2025-4574 * CVE-2025-58160 CVSS scores: * CVE-2024-12224 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-12224 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-12224 ( NVD ): 5.1 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-4574 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-4574 ( SUSE ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-4574 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L * CVE-2025-58160 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-58160 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N * CVE-2025-58160 ( NVD ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves three vulnerabilities can now be installed. ## Description: This update for cargo-c fixes the following issues: * CVE-2025-4574: crossbeam-channel: Fixed double-free on drop in Channel::discard_all_messages (bsc#1243179) * CVE-2025-58160: tracing-subscriber: Fixed log pollution (bsc#1249012) * CVE-2024-12224: idna: Fixed improper validation of Punycode labels (bsc#1243851) Other fixes: \- Fixed _service file to have proper versioning \- Update to version 0.10.15~git0.3e178d5: * Bump actions/download-artifact from 4 to 5 * Update implib requirement from 0.3.5 to 0.4.0 * Add rlib to the targets when building tests * Allow disabling emission of library version constants in header files * Bump to cargo 0.90 * Fix static_libraries swallowing sequence of -framework flags * Fix non-POSIX paths in Libdir under Windows * Bump actions- rs-plus/clippy-check from 2.2.1 to 2.3.0 * Fix clippy lints * Bump cargo-0.89, object-0.37.1, cbindgen-0.29 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-153=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-153=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * cargo-c-0.10.15-160000.1.1 * cargo-c-debugsource-0.10.15-160000.1.1 * cargo-c-debuginfo-0.10.15-160000.1.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * cargo-c-0.10.15-160000.1.1 * cargo-c-debugsource-0.10.15-160000.1.1 * cargo-c-debuginfo-0.10.15-160000.1.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12224.html * https://www.suse.com/security/cve/CVE-2025-4574.html * https://www.suse.com/security/cve/CVE-2025-58160.html * https://bugzilla.suse.com/show_bug.cgi?id=1243179 * https://bugzilla.suse.com/show_bug.cgi?id=1243851 * https://bugzilla.suse.com/show_bug.cgi?id=1249012 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:32:09 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:32:09 -0000 Subject: SUSE-SU-2026:20095-1: critical: Security update for docker Message-ID: <176915712935.16846.7221498775264631479@smelt2.prg2.suse.org> # Security update for docker Announcement ID: SUSE-SU-2026:20095-1 Release Date: 2026-01-17T13:20:26Z Rating: critical References: * bsc#1247367 * bsc#1247594 * bsc#1248373 * bsc#1250508 * jsc#PED-12534 * jsc#PED-8905 Cross-References: * CVE-2025-54388 CVSS scores: * CVE-2025-54388 ( SUSE ): 5.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N * CVE-2025-54388 ( SUSE ): 5.2 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-54388 ( NVD ): 5.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-54388 ( NVD ): 4.6 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Affected Products: * SUSE Linux Enterprise Server 16.0 * SUSE Linux Enterprise Server for SAP Applications 16.0 An update that solves one vulnerability, contains two features and has three fixes can now be installed. ## Description: This update for docker fixes the following issues: Changes in docker: * Update to Docker 28.5.1-ce. See upstream changelog online at * Update to Docker 28.5.0-ce. See upstream changelog online at * Update to docker-buildx v0.29.0. Upstream changelog: * Remove git-core recommends on SLE. Most SLE systems have installRecommends=yes by default and thus end up installing git with Docker. bsc#1250508 This feature is mostly intended for developers ("docker build git://") so most users already have the dependency installed, and the error when git is missing is fairly straightforward (so they can easily figure out what they need to install). * Update to docker-buildx v0.28.0. Upstream changelog: * Update to Docker 28.4.0-ce. See upstream changelog online at * Fixes a nil pointer panic in "docker push". bsc#1248373 * Update warnings and errors related to "docker buildx ..." so that they reference our openSUSE docker-buildx packages. * Enable building docker-buildx for SLE15 systems with SUSEConnect secret injection enabled. PED-12534 PED-8905 bsc#1247594 As docker-buildx does not support our SUSEConnect secret injection (and some users depend "docker build" working transparently), patch the docker CLI so that "docker build" will no longer automatically call "docker buildx build", effectively making DOCKER_BUILDKIT=0 the default configuration. Users can manually use "docker buildx ..." commands or set DOCKER_BUILDKIT=1 in order to opt-in to using docker-buildx. Users can silence the "docker build" warning by setting DOCKER_BUILDKIT=0 explicitly. In order to inject SCC credentials with docker-buildx, users should use RUN --mount=type=secret,id=SCCcredentials zypper -n ... in their Dockerfiles, and docker buildx build --secret id=SCCcredentials,src=/etc/zypp/credentials.d/SCCcredentials,type=file . when doing their builds. * Update to Docker 28.3.3-ce. See upstream changelog online at CVE-2025-54388 bsc#1247367 * Update to docker-buildx v0.26.1. Upstream changelog: * Update to docker-buildx v0.26.0. Upstream changelog: ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 16.0 zypper in -t patch SUSE-SLES-16.0-151=1 * SUSE Linux Enterprise Server for SAP Applications 16.0 zypper in -t patch SUSE-SLES-16.0-151=1 ## Package List: * SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64) * docker-buildx-0.29.0-160000.4.1 * docker-debuginfo-28.5.1_ce-160000.4.1 * docker-28.5.1_ce-160000.4.1 * docker-buildx-debuginfo-0.29.0-160000.4.1 * SUSE Linux Enterprise Server 16.0 (noarch) * docker-zsh-completion-28.5.1_ce-160000.4.1 * docker-bash-completion-28.5.1_ce-160000.4.1 * docker-rootless-extras-28.5.1_ce-160000.4.1 * docker-fish-completion-28.5.1_ce-160000.4.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (ppc64le x86_64) * docker-buildx-0.29.0-160000.4.1 * docker-debuginfo-28.5.1_ce-160000.4.1 * docker-28.5.1_ce-160000.4.1 * docker-buildx-debuginfo-0.29.0-160000.4.1 * SUSE Linux Enterprise Server for SAP Applications 16.0 (noarch) * docker-zsh-completion-28.5.1_ce-160000.4.1 * docker-bash-completion-28.5.1_ce-160000.4.1 * docker-rootless-extras-28.5.1_ce-160000.4.1 * docker-fish-completion-28.5.1_ce-160000.4.1 ## References: * https://www.suse.com/security/cve/CVE-2025-54388.html * https://bugzilla.suse.com/show_bug.cgi?id=1247367 * https://bugzilla.suse.com/show_bug.cgi?id=1247594 * https://bugzilla.suse.com/show_bug.cgi?id=1248373 * https://bugzilla.suse.com/show_bug.cgi?id=1250508 * https://jira.suse.com/browse/PED-12534 * https://jira.suse.com/browse/PED-8905 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:32:16 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:32:16 -0000 Subject: SUSE-SU-2026:0262-1: important: Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP6) Message-ID: <176915713688.16846.9713966511470595385@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 8 for SUSE Linux Enterprise 15 SP6) Announcement ID: SUSE-SU-2026:0262-1 Release Date: 2026-01-22T16:33:42Z Rating: important References: * bsc#1248400 * bsc#1248670 * bsc#1249241 * bsc#1250192 * bsc#1251203 * bsc#1251787 * bsc#1253437 * bsc#1256928 Cross-References: * CVE-2023-53676 * CVE-2025-38476 * CVE-2025-38572 * CVE-2025-38588 * CVE-2025-38608 * CVE-2025-39682 * CVE-2025-40204 CVSS scores: * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38588 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38588 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves seven vulnerabilities and has one security fix can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6.4.0-150600.23.38 fixes various security issues The following security issues were fixed: * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size() (bsc#1249241). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670). * CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1250192). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). The following non security issue was fixed: * fix addr_bit_set() issue on big-endian machines (bsc#1256928). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-262=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-262=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_38-default-12-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_8-debugsource-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_38-default-debuginfo-12-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_38-default-12-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_8-debugsource-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_38-default-debuginfo-12-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38588.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1248670 * https://bugzilla.suse.com/show_bug.cgi?id=1249241 * https://bugzilla.suse.com/show_bug.cgi?id=1250192 * https://bugzilla.suse.com/show_bug.cgi?id=1251203 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1256928 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:32:21 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:32:21 -0000 Subject: SUSE-RU-2026:0261-1: important: Recommended update for samba Message-ID: <176915714130.16846.8448174423465703092@smelt2.prg2.suse.org> # Recommended update for samba Announcement ID: SUSE-RU-2026:0261-1 Release Date: 2026-01-22T16:14:04Z Rating: important References: * bsc#1234210 * bsc#1254439 * bsc#1254586 * bsc#1254926 Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Availability Extension 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has four fixes can now be installed. ## Description: This update for samba fixes the following issues: * Fix testparm error handling the "sync machine password to keytab" option (bsc#1254439) * Fix Samba printers reporting invalid sid during print jobs (bsc#1234210, bsc#1254926) * samba-bgqd can't find [printers] share (bsc#1254586) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-261=1 * SUSE Linux Enterprise High Availability Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-HA-15-SP7-2026-261=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * samba-tool-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-libs-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * libldb2-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-client-libs-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * python3-ldb-debuginfo-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-debuginfo-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-debugsource-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-dcerpc-debuginfo-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-ldb-ldap-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-gpupdate-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-libs-python3-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-libs-python3-debuginfo-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-python3-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-client-libs-debuginfo-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-dcerpc-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-client-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-winbind-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * ldb-tools-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-winbind-debuginfo-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-libs-debuginfo-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * libldb2-debuginfo-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * python3-ldb-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-client-debuginfo-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-devel-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-winbind-libs-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-ldb-ldap-debuginfo-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-python3-debuginfo-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-winbind-libs-debuginfo-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * libldb-devel-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * ldb-tools-debuginfo-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * Basesystem Module 15-SP7 (aarch64 x86_64) * samba-ceph-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-ceph-debuginfo-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * Basesystem Module 15-SP7 (x86_64) * samba-libs-32bit-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-client-libs-32bit-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-winbind-libs-32bit-debuginfo-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * libldb2-32bit-debuginfo-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-libs-32bit-debuginfo-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * libldb2-32bit-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-client-libs-32bit-debuginfo-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-winbind-libs-32bit-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * SUSE Linux Enterprise High Availability Extension 15 SP7 (aarch64 ppc64le s390x x86_64) * ctdb-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-debuginfo-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * ctdb-debuginfo-4.21.10+git.449.dcced69e1b5-150700.3.19.1 * samba-debugsource-4.21.10+git.449.dcced69e1b5-150700.3.19.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234210 * https://bugzilla.suse.com/show_bug.cgi?id=1254439 * https://bugzilla.suse.com/show_bug.cgi?id=1254586 * https://bugzilla.suse.com/show_bug.cgi?id=1254926 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:32:23 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:32:23 -0000 Subject: SUSE-SU-2026:0260-1: important: Security update for MozillaFirefox Message-ID: <176915714338.16846.15037551369059901010@smelt2.prg2.suse.org> # Security update for MozillaFirefox Announcement ID: SUSE-SU-2026:0260-1 Release Date: 2026-01-22T16:12:21Z Rating: important References: * bsc#1256340 Cross-References: * CVE-2025-14327 * CVE-2026-0877 * CVE-2026-0878 * CVE-2026-0879 * CVE-2026-0880 * CVE-2026-0882 * CVE-2026-0883 * CVE-2026-0884 * CVE-2026-0885 * CVE-2026-0886 * CVE-2026-0887 * CVE-2026-0890 * CVE-2026-0891 CVSS scores: * CVE-2025-14327 ( SUSE ): 5.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-14327 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N * CVE-2025-14327 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2025-14327 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N * CVE-2026-0877 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N * CVE-2026-0878 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N * CVE-2026-0879 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-0880 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-0882 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2026-0883 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-0884 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-0885 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2026-0886 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2026-0887 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N * CVE-2026-0890 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L * CVE-2026-0891 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves 13 vulnerabilities can now be installed. ## Description: This update for MozillaFirefox fixes the following issues: Update to Firefox Extended Support Release 140.7.0 ESR (bsc#1256340). * MFSA 2026-03 * CVE-2026-0877: Mitigation bypass in the DOM: Security component * CVE-2026-0878: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component * CVE-2026-0879: Sandbox escape due to incorrect boundary conditions in the Graphics component * CVE-2026-0880: Sandbox escape due to integer overflow in the Graphics component * CVE-2026-0882: Use-after-free in the IPC component * CVE-2025-14327: Spoofing issue in the Downloads Panel component * CVE-2026-0883: Information disclosure in the Networking component * CVE-2026-0884: Use-after-free in the JavaScript Engine component * CVE-2026-0885: Use-after-free in the JavaScript: GC component * CVE-2026-0886: Incorrect boundary conditions in the Graphics component * CVE-2026-0887: Clickjacking issue, information disclosure in the PDF Viewer component * CVE-2026-0890: Spoofing issue in the DOM: Copy-Paste and Drag-Drop component * CVE-2026-0891: Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-260=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-260=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-260=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-260=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-260=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-260=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-260=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-260=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-260=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-260=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-260=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-260=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-translations-other-140.7.0-150200.152.216.1 * MozillaFirefox-debugsource-140.7.0-150200.152.216.1 * MozillaFirefox-translations-common-140.7.0-150200.152.216.1 * MozillaFirefox-140.7.0-150200.152.216.1 * MozillaFirefox-branding-upstream-140.7.0-150200.152.216.1 * MozillaFirefox-debuginfo-140.7.0-150200.152.216.1 * openSUSE Leap 15.6 (noarch) * MozillaFirefox-devel-140.7.0-150200.152.216.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * MozillaFirefox-translations-other-140.7.0-150200.152.216.1 * MozillaFirefox-debugsource-140.7.0-150200.152.216.1 * MozillaFirefox-translations-common-140.7.0-150200.152.216.1 * MozillaFirefox-140.7.0-150200.152.216.1 * MozillaFirefox-debuginfo-140.7.0-150200.152.216.1 * Desktop Applications Module 15-SP7 (noarch) * MozillaFirefox-devel-140.7.0-150200.152.216.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * MozillaFirefox-translations-other-140.7.0-150200.152.216.1 * MozillaFirefox-debugsource-140.7.0-150200.152.216.1 * MozillaFirefox-translations-common-140.7.0-150200.152.216.1 * MozillaFirefox-140.7.0-150200.152.216.1 * MozillaFirefox-debuginfo-140.7.0-150200.152.216.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * MozillaFirefox-devel-140.7.0-150200.152.216.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * MozillaFirefox-translations-other-140.7.0-150200.152.216.1 * MozillaFirefox-debugsource-140.7.0-150200.152.216.1 * MozillaFirefox-translations-common-140.7.0-150200.152.216.1 * MozillaFirefox-140.7.0-150200.152.216.1 * MozillaFirefox-debuginfo-140.7.0-150200.152.216.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * MozillaFirefox-devel-140.7.0-150200.152.216.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * MozillaFirefox-translations-other-140.7.0-150200.152.216.1 * MozillaFirefox-debugsource-140.7.0-150200.152.216.1 * MozillaFirefox-translations-common-140.7.0-150200.152.216.1 * MozillaFirefox-140.7.0-150200.152.216.1 * MozillaFirefox-debuginfo-140.7.0-150200.152.216.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * MozillaFirefox-devel-140.7.0-150200.152.216.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * MozillaFirefox-translations-other-140.7.0-150200.152.216.1 * MozillaFirefox-debugsource-140.7.0-150200.152.216.1 * MozillaFirefox-translations-common-140.7.0-150200.152.216.1 * MozillaFirefox-140.7.0-150200.152.216.1 * MozillaFirefox-debuginfo-140.7.0-150200.152.216.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * MozillaFirefox-devel-140.7.0-150200.152.216.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-translations-other-140.7.0-150200.152.216.1 * MozillaFirefox-debugsource-140.7.0-150200.152.216.1 * MozillaFirefox-translations-common-140.7.0-150200.152.216.1 * MozillaFirefox-140.7.0-150200.152.216.1 * MozillaFirefox-debuginfo-140.7.0-150200.152.216.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * MozillaFirefox-devel-140.7.0-150200.152.216.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-translations-other-140.7.0-150200.152.216.1 * MozillaFirefox-debugsource-140.7.0-150200.152.216.1 * MozillaFirefox-translations-common-140.7.0-150200.152.216.1 * MozillaFirefox-140.7.0-150200.152.216.1 * MozillaFirefox-debuginfo-140.7.0-150200.152.216.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * MozillaFirefox-devel-140.7.0-150200.152.216.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-translations-other-140.7.0-150200.152.216.1 * MozillaFirefox-debugsource-140.7.0-150200.152.216.1 * MozillaFirefox-translations-common-140.7.0-150200.152.216.1 * MozillaFirefox-140.7.0-150200.152.216.1 * MozillaFirefox-debuginfo-140.7.0-150200.152.216.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * MozillaFirefox-devel-140.7.0-150200.152.216.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * MozillaFirefox-translations-other-140.7.0-150200.152.216.1 * MozillaFirefox-debugsource-140.7.0-150200.152.216.1 * MozillaFirefox-translations-common-140.7.0-150200.152.216.1 * MozillaFirefox-140.7.0-150200.152.216.1 * MozillaFirefox-debuginfo-140.7.0-150200.152.216.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * MozillaFirefox-devel-140.7.0-150200.152.216.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * MozillaFirefox-translations-other-140.7.0-150200.152.216.1 * MozillaFirefox-debugsource-140.7.0-150200.152.216.1 * MozillaFirefox-translations-common-140.7.0-150200.152.216.1 * MozillaFirefox-140.7.0-150200.152.216.1 * MozillaFirefox-debuginfo-140.7.0-150200.152.216.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * MozillaFirefox-devel-140.7.0-150200.152.216.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * MozillaFirefox-translations-other-140.7.0-150200.152.216.1 * MozillaFirefox-debugsource-140.7.0-150200.152.216.1 * MozillaFirefox-translations-common-140.7.0-150200.152.216.1 * MozillaFirefox-140.7.0-150200.152.216.1 * MozillaFirefox-debuginfo-140.7.0-150200.152.216.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * MozillaFirefox-devel-140.7.0-150200.152.216.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14327.html * https://www.suse.com/security/cve/CVE-2026-0877.html * https://www.suse.com/security/cve/CVE-2026-0878.html * https://www.suse.com/security/cve/CVE-2026-0879.html * https://www.suse.com/security/cve/CVE-2026-0880.html * https://www.suse.com/security/cve/CVE-2026-0882.html * https://www.suse.com/security/cve/CVE-2026-0883.html * https://www.suse.com/security/cve/CVE-2026-0884.html * https://www.suse.com/security/cve/CVE-2026-0885.html * https://www.suse.com/security/cve/CVE-2026-0886.html * https://www.suse.com/security/cve/CVE-2026-0887.html * https://www.suse.com/security/cve/CVE-2026-0890.html * https://www.suse.com/security/cve/CVE-2026-0891.html * https://bugzilla.suse.com/show_bug.cgi?id=1256340 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:32:27 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:32:27 -0000 Subject: SUSE-SU-2026:0259-1: moderate: Security update for avahi Message-ID: <176915714767.16846.3975663624493565908@smelt2.prg2.suse.org> # Security update for avahi Announcement ID: SUSE-SU-2026:0259-1 Release Date: 2026-01-22T16:11:01Z Rating: moderate References: * bsc#1256498 * bsc#1256499 * bsc#1256500 Cross-References: * CVE-2025-68276 * CVE-2025-68468 * CVE-2025-68471 CVSS scores: * CVE-2025-68276 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68276 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68468 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68468 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-68468 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-68471 ( SUSE ): 7.1 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68471 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-68471 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * Basesystem Module 15-SP7 * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for avahi fixes the following issues: * CVE-2025-68276: Fixed refuse to create wide-area record browsers when wide- area is off (bsc#1256498) * CVE-2025-68471: Fixed DoS bug by changing assert to return (bsc#1256500) * CVE-2025-68468: Fixed DoS bug by removing incorrect assertion (bsc#1256499) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-259=1 openSUSE-SLE-15.6-2026-259=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-259=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2026-259=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-259=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * avahi-utils-gtk-debuginfo-0.8-150600.15.12.1 * libavahi-ui-gtk3-0-debuginfo-0.8-150600.15.12.1 * libavahi-devel-0.8-150600.15.12.1 * libdns_sd-0.8-150600.15.12.1 * libavahi-ui-gtk3-0-0.8-150600.15.12.1 * libavahi-gobject0-0.8-150600.15.12.1 * typelib-1_0-Avahi-0_6-0.8-150600.15.12.1 * libavahi-gobject-devel-0.8-150600.15.12.1 * avahi-glib2-debugsource-0.8-150600.15.12.1 * python3-avahi-gtk-0.8-150600.15.12.1 * avahi-compat-howl-devel-0.8-150600.15.12.1 * libavahi-qt5-devel-0.8-150600.15.12.1 * avahi-utils-0.8-150600.15.12.1 * avahi-debuginfo-0.8-150600.15.12.1 * libdns_sd-debuginfo-0.8-150600.15.12.1 * avahi-0.8-150600.15.12.1 * libavahi-glib1-debuginfo-0.8-150600.15.12.1 * libavahi-libevent1-0.8-150600.15.12.1 * libavahi-core7-0.8-150600.15.12.1 * libavahi-glib1-0.8-150600.15.12.1 * libavahi-core7-debuginfo-0.8-150600.15.12.1 * libhowl0-debuginfo-0.8-150600.15.12.1 * avahi-utils-gtk-0.8-150600.15.12.1 * libavahi-client3-debuginfo-0.8-150600.15.12.1 * libavahi-libevent1-debuginfo-0.8-150600.15.12.1 * libavahi-glib-devel-0.8-150600.15.12.1 * avahi-debugsource-0.8-150600.15.12.1 * python3-avahi-0.8-150600.15.12.1 * avahi-qt5-debugsource-0.8-150600.15.12.1 * avahi-utils-debuginfo-0.8-150600.15.12.1 * libavahi-common3-debuginfo-0.8-150600.15.12.1 * libavahi-qt5-1-0.8-150600.15.12.1 * libhowl0-0.8-150600.15.12.1 * avahi-autoipd-debuginfo-0.8-150600.15.12.1 * avahi-autoipd-0.8-150600.15.12.1 * libavahi-client3-0.8-150600.15.12.1 * libavahi-qt5-1-debuginfo-0.8-150600.15.12.1 * avahi-compat-mDNSResponder-devel-0.8-150600.15.12.1 * libavahi-common3-0.8-150600.15.12.1 * libavahi-gobject0-debuginfo-0.8-150600.15.12.1 * openSUSE Leap 15.6 (x86_64) * libavahi-glib1-32bit-0.8-150600.15.12.1 * libavahi-client3-32bit-debuginfo-0.8-150600.15.12.1 * libavahi-common3-32bit-debuginfo-0.8-150600.15.12.1 * libavahi-common3-32bit-0.8-150600.15.12.1 * libdns_sd-32bit-debuginfo-0.8-150600.15.12.1 * libavahi-client3-32bit-0.8-150600.15.12.1 * libavahi-glib1-32bit-debuginfo-0.8-150600.15.12.1 * libdns_sd-32bit-0.8-150600.15.12.1 * avahi-32bit-debuginfo-0.8-150600.15.12.1 * openSUSE Leap 15.6 (noarch) * avahi-lang-0.8-150600.15.12.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libavahi-client3-64bit-0.8-150600.15.12.1 * libdns_sd-64bit-0.8-150600.15.12.1 * libavahi-common3-64bit-0.8-150600.15.12.1 * libdns_sd-64bit-debuginfo-0.8-150600.15.12.1 * libavahi-glib1-64bit-0.8-150600.15.12.1 * libavahi-glib1-64bit-debuginfo-0.8-150600.15.12.1 * libavahi-client3-64bit-debuginfo-0.8-150600.15.12.1 * libavahi-common3-64bit-debuginfo-0.8-150600.15.12.1 * avahi-64bit-debuginfo-0.8-150600.15.12.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libavahi-ui-gtk3-0-debuginfo-0.8-150600.15.12.1 * libavahi-devel-0.8-150600.15.12.1 * libavahi-ui-gtk3-0-0.8-150600.15.12.1 * libdns_sd-0.8-150600.15.12.1 * libavahi-gobject0-0.8-150600.15.12.1 * typelib-1_0-Avahi-0_6-0.8-150600.15.12.1 * avahi-compat-mDNSResponder-devel-0.8-150600.15.12.1 * avahi-glib2-debugsource-0.8-150600.15.12.1 * avahi-compat-howl-devel-0.8-150600.15.12.1 * avahi-utils-0.8-150600.15.12.1 * avahi-debuginfo-0.8-150600.15.12.1 * libdns_sd-debuginfo-0.8-150600.15.12.1 * avahi-0.8-150600.15.12.1 * libavahi-glib1-debuginfo-0.8-150600.15.12.1 * libavahi-libevent1-0.8-150600.15.12.1 * libavahi-core7-0.8-150600.15.12.1 * libavahi-glib1-0.8-150600.15.12.1 * libavahi-core7-debuginfo-0.8-150600.15.12.1 * libhowl0-debuginfo-0.8-150600.15.12.1 * libavahi-client3-debuginfo-0.8-150600.15.12.1 * libavahi-libevent1-debuginfo-0.8-150600.15.12.1 * libavahi-glib-devel-0.8-150600.15.12.1 * avahi-debugsource-0.8-150600.15.12.1 * avahi-utils-debuginfo-0.8-150600.15.12.1 * libavahi-common3-debuginfo-0.8-150600.15.12.1 * libhowl0-0.8-150600.15.12.1 * libavahi-client3-0.8-150600.15.12.1 * libavahi-gobject0-debuginfo-0.8-150600.15.12.1 * libavahi-common3-0.8-150600.15.12.1 * Basesystem Module 15-SP7 (noarch) * avahi-lang-0.8-150600.15.12.1 * Basesystem Module 15-SP7 (x86_64) * libavahi-client3-32bit-debuginfo-0.8-150600.15.12.1 * libavahi-common3-32bit-debuginfo-0.8-150600.15.12.1 * libavahi-common3-32bit-0.8-150600.15.12.1 * libavahi-client3-32bit-0.8-150600.15.12.1 * avahi-32bit-debuginfo-0.8-150600.15.12.1 * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * avahi-glib2-debugsource-0.8-150600.15.12.1 * avahi-utils-gtk-debuginfo-0.8-150600.15.12.1 * avahi-autoipd-debuginfo-0.8-150600.15.12.1 * avahi-utils-gtk-0.8-150600.15.12.1 * avahi-debuginfo-0.8-150600.15.12.1 * avahi-autoipd-0.8-150600.15.12.1 * avahi-debugsource-0.8-150600.15.12.1 * libavahi-gobject-devel-0.8-150600.15.12.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * avahi-debuginfo-0.8-150600.15.12.1 * avahi-debugsource-0.8-150600.15.12.1 * python3-avahi-0.8-150600.15.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-68276.html * https://www.suse.com/security/cve/CVE-2025-68468.html * https://www.suse.com/security/cve/CVE-2025-68471.html * https://bugzilla.suse.com/show_bug.cgi?id=1256498 * https://bugzilla.suse.com/show_bug.cgi?id=1256499 * https://bugzilla.suse.com/show_bug.cgi?id=1256500 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:32:31 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:32:31 -0000 Subject: SUSE-SU-2026:0258-1: important: Security update for libsoup2 Message-ID: <176915715129.16846.16764734173672031250@smelt2.prg2.suse.org> # Security update for libsoup2 Announcement ID: SUSE-SU-2026:0258-1 Release Date: 2026-01-22T16:10:32Z Rating: important References: * bsc#1254876 * bsc#1256399 Cross-References: * CVE-2025-14523 * CVE-2026-0719 CVSS scores: * CVE-2025-14523 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-14523 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2025-14523 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2026-0719 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-0719 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-0719 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves two vulnerabilities can now be installed. ## Description: This update for libsoup2 fixes the following issues: * CVE-2025-14523: Reject duplicated Host in headers and followed upstream update (bsc#1254876). * CVE-2026-0719: Fixed overflow for password md4sum (bsc#1256399) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-258=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-258=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-258=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-258=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-258=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-258=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-258=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-258=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2026-258=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-258=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2026-258=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-258=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-258=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-258=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * typelib-1_0-Soup-2_4-2.74.2-150400.3.19.1 * libsoup-2_4-1-2.74.2-150400.3.19.1 * libsoup2-devel-2.74.2-150400.3.19.1 * libsoup2-debugsource-2.74.2-150400.3.19.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * libsoup2-lang-2.74.2-150400.3.19.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * typelib-1_0-Soup-2_4-2.74.2-150400.3.19.1 * libsoup-2_4-1-2.74.2-150400.3.19.1 * libsoup2-devel-2.74.2-150400.3.19.1 * libsoup2-debugsource-2.74.2-150400.3.19.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * libsoup2-lang-2.74.2-150400.3.19.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * typelib-1_0-Soup-2_4-2.74.2-150400.3.19.1 * libsoup-2_4-1-2.74.2-150400.3.19.1 * libsoup2-devel-2.74.2-150400.3.19.1 * libsoup2-debugsource-2.74.2-150400.3.19.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * libsoup2-lang-2.74.2-150400.3.19.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * typelib-1_0-Soup-2_4-2.74.2-150400.3.19.1 * libsoup-2_4-1-2.74.2-150400.3.19.1 * libsoup2-devel-2.74.2-150400.3.19.1 * libsoup2-debugsource-2.74.2-150400.3.19.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * libsoup2-lang-2.74.2-150400.3.19.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * typelib-1_0-Soup-2_4-2.74.2-150400.3.19.1 * libsoup-2_4-1-2.74.2-150400.3.19.1 * libsoup2-devel-2.74.2-150400.3.19.1 * libsoup2-debugsource-2.74.2-150400.3.19.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * libsoup2-lang-2.74.2-150400.3.19.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * typelib-1_0-Soup-2_4-2.74.2-150400.3.19.1 * libsoup-2_4-1-2.74.2-150400.3.19.1 * libsoup2-devel-2.74.2-150400.3.19.1 * libsoup2-debugsource-2.74.2-150400.3.19.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * libsoup2-lang-2.74.2-150400.3.19.1 * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * typelib-1_0-Soup-2_4-2.74.2-150400.3.19.1 * libsoup-2_4-1-2.74.2-150400.3.19.1 * libsoup2-devel-2.74.2-150400.3.19.1 * libsoup2-debugsource-2.74.2-150400.3.19.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1 * openSUSE Leap 15.4 (x86_64) * libsoup2-devel-32bit-2.74.2-150400.3.19.1 * libsoup-2_4-1-32bit-debuginfo-2.74.2-150400.3.19.1 * libsoup-2_4-1-32bit-2.74.2-150400.3.19.1 * openSUSE Leap 15.4 (noarch) * libsoup2-lang-2.74.2-150400.3.19.1 * openSUSE Leap 15.4 (aarch64_ilp32) * libsoup2-devel-64bit-2.74.2-150400.3.19.1 * libsoup-2_4-1-64bit-debuginfo-2.74.2-150400.3.19.1 * libsoup-2_4-1-64bit-2.74.2-150400.3.19.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libsoup2-debugsource-2.74.2-150400.3.19.1 * libsoup-2_4-1-2.74.2-150400.3.19.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libsoup2-debugsource-2.74.2-150400.3.19.1 * libsoup-2_4-1-2.74.2-150400.3.19.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libsoup2-debugsource-2.74.2-150400.3.19.1 * libsoup-2_4-1-2.74.2-150400.3.19.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libsoup2-debugsource-2.74.2-150400.3.19.1 * libsoup-2_4-1-2.74.2-150400.3.19.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * libsoup2-debugsource-2.74.2-150400.3.19.1 * libsoup-2_4-1-2.74.2-150400.3.19.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * typelib-1_0-Soup-2_4-2.74.2-150400.3.19.1 * libsoup-2_4-1-2.74.2-150400.3.19.1 * libsoup2-devel-2.74.2-150400.3.19.1 * libsoup2-debugsource-2.74.2-150400.3.19.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * libsoup2-lang-2.74.2-150400.3.19.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * typelib-1_0-Soup-2_4-2.74.2-150400.3.19.1 * libsoup-2_4-1-2.74.2-150400.3.19.1 * libsoup2-devel-2.74.2-150400.3.19.1 * libsoup2-debugsource-2.74.2-150400.3.19.1 * libsoup-2_4-1-debuginfo-2.74.2-150400.3.19.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * libsoup2-lang-2.74.2-150400.3.19.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14523.html * https://www.suse.com/security/cve/CVE-2026-0719.html * https://bugzilla.suse.com/show_bug.cgi?id=1254876 * https://bugzilla.suse.com/show_bug.cgi?id=1256399 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:32:35 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:32:35 -0000 Subject: SUSE-SU-2026:0257-1: important: Security update for libsoup Message-ID: <176915715539.16846.17151877337301948177@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2026:0257-1 Release Date: 2026-01-22T16:09:23Z Rating: important References: * bsc#1254876 * bsc#1256399 * bsc#1256418 Cross-References: * CVE-2025-14523 * CVE-2026-0716 * CVE-2026-0719 CVSS scores: * CVE-2025-14523 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-14523 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2025-14523 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2026-0716 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-0716 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L * CVE-2026-0716 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L * CVE-2026-0719 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-0719 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-0719 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2026-0716: Fixed out-of-bounds read for websocket (bsc#1256418) * CVE-2026-0719: Fixed overflow for password md4sum (bsc#1256399) * CVE-2025-14523: Reject duplicated Host in headers and followed upstream update (bsc#1254876). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-257=1 openSUSE-SLE-15.6-2026-257=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-257=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-257=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-257=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libsoup-debugsource-3.4.4-150600.3.28.1 * libsoup-3_0-0-debuginfo-3.4.4-150600.3.28.1 * libsoup-3_0-0-3.4.4-150600.3.28.1 * libsoup-devel-3.4.4-150600.3.28.1 * typelib-1_0-Soup-3_0-3.4.4-150600.3.28.1 * openSUSE Leap 15.6 (x86_64) * libsoup-3_0-0-32bit-debuginfo-3.4.4-150600.3.28.1 * libsoup-devel-32bit-3.4.4-150600.3.28.1 * libsoup-3_0-0-32bit-3.4.4-150600.3.28.1 * openSUSE Leap 15.6 (noarch) * libsoup-lang-3.4.4-150600.3.28.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libsoup-devel-64bit-3.4.4-150600.3.28.1 * libsoup-3_0-0-64bit-debuginfo-3.4.4-150600.3.28.1 * libsoup-3_0-0-64bit-3.4.4-150600.3.28.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libsoup-debugsource-3.4.4-150600.3.28.1 * libsoup-3_0-0-debuginfo-3.4.4-150600.3.28.1 * libsoup-3_0-0-3.4.4-150600.3.28.1 * libsoup-devel-3.4.4-150600.3.28.1 * typelib-1_0-Soup-3_0-3.4.4-150600.3.28.1 * Basesystem Module 15-SP7 (noarch) * libsoup-lang-3.4.4-150600.3.28.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * libsoup-debugsource-3.4.4-150600.3.28.1 * libsoup-3_0-0-debuginfo-3.4.4-150600.3.28.1 * libsoup-3_0-0-3.4.4-150600.3.28.1 * libsoup-devel-3.4.4-150600.3.28.1 * typelib-1_0-Soup-3_0-3.4.4-150600.3.28.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * libsoup-lang-3.4.4-150600.3.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * libsoup-debugsource-3.4.4-150600.3.28.1 * libsoup-3_0-0-debuginfo-3.4.4-150600.3.28.1 * libsoup-3_0-0-3.4.4-150600.3.28.1 * libsoup-devel-3.4.4-150600.3.28.1 * typelib-1_0-Soup-3_0-3.4.4-150600.3.28.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * libsoup-lang-3.4.4-150600.3.28.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14523.html * https://www.suse.com/security/cve/CVE-2026-0716.html * https://www.suse.com/security/cve/CVE-2026-0719.html * https://bugzilla.suse.com/show_bug.cgi?id=1254876 * https://bugzilla.suse.com/show_bug.cgi?id=1256399 * https://bugzilla.suse.com/show_bug.cgi?id=1256418 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:32:37 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:32:37 -0000 Subject: SUSE-SU-2026:0256-1: moderate: Security update for openldap2_5 Message-ID: <176915715771.16846.12161336238034718945@smelt2.prg2.suse.org> # Security update for openldap2_5 Announcement ID: SUSE-SU-2026:0256-1 Release Date: 2026-01-22T16:09:02Z Rating: moderate References: * bsc#1256297 Cross-References: * CVE-2026-22185 CVSS scores: * CVE-2026-22185 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-22185 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2026-22185 ( NVD ): 4.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for openldap2_5 fixes the following issues: Security fixes: * CVE-2026-22185: Fixed possible crash in malicious DB (bsc#1256297) Other fixes: * Update to version 2.5.20+11: * ITS#10421 mdb_load: check for malicious input ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-256=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-256=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-256=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2026-256=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * openldap2_5-ppolicy-check-password-debuginfo-2.5.20+11-150500.11.38.1 * openldap2_5-contrib-2.5.20+11-150500.11.38.1 * openldap2_5-client-2.5.20+11-150500.11.38.1 * openldap2_5-2.5.20+11-150500.11.38.1 * openldap2_5-debugsource-2.5.20+11-150500.11.38.1 * openldap2_5-devel-2.5.20+11-150500.11.38.1 * libldap-2_5-0-2.5.20+11-150500.11.38.1 * libldap-2_5-0-debuginfo-2.5.20+11-150500.11.38.1 * openldap2_5-ppolicy-check-password-2.5.20+11-150500.11.38.1 * openldap2_5-debuginfo-2.5.20+11-150500.11.38.1 * openldap2_5-contrib-debuginfo-2.5.20+11-150500.11.38.1 * openSUSE Leap 15.5 (noarch) * openldap2_5-doc-2.5.20+11-150500.11.38.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * openldap2_5-ppolicy-check-password-debuginfo-2.5.20+11-150500.11.38.1 * openldap2_5-contrib-2.5.20+11-150500.11.38.1 * openldap2_5-client-2.5.20+11-150500.11.38.1 * openldap2_5-2.5.20+11-150500.11.38.1 * openldap2_5-debugsource-2.5.20+11-150500.11.38.1 * openldap2_5-devel-2.5.20+11-150500.11.38.1 * libldap-2_5-0-2.5.20+11-150500.11.38.1 * libldap-2_5-0-debuginfo-2.5.20+11-150500.11.38.1 * openldap2_5-ppolicy-check-password-2.5.20+11-150500.11.38.1 * openldap2_5-debuginfo-2.5.20+11-150500.11.38.1 * openldap2_5-contrib-debuginfo-2.5.20+11-150500.11.38.1 * openSUSE Leap 15.6 (noarch) * openldap2_5-doc-2.5.20+11-150500.11.38.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * openldap2_5-client-2.5.20+11-150500.11.38.1 * openldap2_5-debugsource-2.5.20+11-150500.11.38.1 * openldap2_5-devel-2.5.20+11-150500.11.38.1 * libldap-2_5-0-2.5.20+11-150500.11.38.1 * libldap-2_5-0-debuginfo-2.5.20+11-150500.11.38.1 * openldap2_5-debuginfo-2.5.20+11-150500.11.38.1 * Basesystem Module 15-SP7 (noarch) * openldap2_5-doc-2.5.20+11-150500.11.38.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * openldap2_5-ppolicy-check-password-debuginfo-2.5.20+11-150500.11.38.1 * openldap2_5-contrib-2.5.20+11-150500.11.38.1 * openldap2_5-2.5.20+11-150500.11.38.1 * openldap2_5-debugsource-2.5.20+11-150500.11.38.1 * openldap2_5-ppolicy-check-password-2.5.20+11-150500.11.38.1 * openldap2_5-debuginfo-2.5.20+11-150500.11.38.1 * openldap2_5-contrib-debuginfo-2.5.20+11-150500.11.38.1 ## References: * https://www.suse.com/security/cve/CVE-2026-22185.html * https://bugzilla.suse.com/show_bug.cgi?id=1256297 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:32:40 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:32:40 -0000 Subject: SUSE-SU-2026:0255-1: moderate: Security update for python-urllib3 Message-ID: <176915716040.16846.10360612904353596643@smelt2.prg2.suse.org> # Security update for python-urllib3 Announcement ID: SUSE-SU-2026:0255-1 Release Date: 2026-01-22T16:08:48Z Rating: moderate References: * bsc#1256331 Cross-References: * CVE-2026-21441 CVSS scores: * CVE-2026-21441 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-21441 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2026-21441 ( NVD ): 8.9 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2026-21441 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * Public Cloud Module 15-SP4 * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python-urllib3 fixes the following issues: * CVE-2026-21441: Fixed excessive resource consumption during decompression of data in HTTP redirect responses (bsc#1256331) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-255=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-255=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-255=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-255=1 ## Package List: * Python 3 Module 15-SP7 (noarch) * python311-urllib3-2.0.7-150400.7.24.1 * openSUSE Leap 15.4 (noarch) * python311-urllib3-2.0.7-150400.7.24.1 * openSUSE Leap 15.6 (noarch) * python311-urllib3-2.0.7-150400.7.24.1 * Public Cloud Module 15-SP4 (noarch) * python311-urllib3-2.0.7-150400.7.24.1 ## References: * https://www.suse.com/security/cve/CVE-2026-21441.html * https://bugzilla.suse.com/show_bug.cgi?id=1256331 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:32:42 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:32:42 -0000 Subject: SUSE-SU-2026:0254-1: moderate: Security update for log4j Message-ID: <176915716287.16846.13412530123847336393@smelt2.prg2.suse.org> # Security update for log4j Announcement ID: SUSE-SU-2026:0254-1 Release Date: 2026-01-22T16:08:29Z Rating: moderate References: * bsc#1255427 Cross-References: * CVE-2025-68161 CVSS scores: * CVE-2025-68161 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N * CVE-2025-68161 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N * CVE-2025-68161 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-68161 ( NVD ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for log4j fixes the following issues: Security fixes: * CVE-2025-68161: Fixed absent TLS hostname verification that may allow a man- in-the-middle attack (bsc#1255427) Other fixes: * Upgrade to 2.18.0 * Added * Add support for Jakarta Mail API in the SMTP appender. * Add support for custom Log4j 1.x levels. * Add support for adding and retrieving appenders in Log4j 1.x bridge. * Add support for custom LMAX disruptor WaitStrategy configuration. * Add support for Apache Extras' RollingFileAppender in Log4j 1.x bridge. * Add MutableThreadContextMapFilter. * Add support for 24 colors in highlighting * Changed * Improves ServiceLoader support on servlet containers. * Make the default disruptor WaitStrategy used by Async Loggers garbage-free. * Do not throw UnsupportedOperationException when JUL ApiLogger::setLevel is called. * Support Spring 2.6.x. * Move perf tests to log4j-core-its * Upgrade the Flume Appender to Flume 1.10.0 * Fixed * Fix minor typo #792. * Improve validation and reporting of configuration errors. * Allow enterprise id to be an OID fragment. * Fix problem with non-uppercase custom levels. * Avoid ClassCastException in JeroMqManager with custom LoggerContextFactory #791. * DirectWriteRolloverStrategy should use the current time when creating files. * Fixes the syslog appender in Log4j 1.x bridge, when used with a custom layout. * log4j-1.2-api 2.17.2 throws NullPointerException while removing appender with name as null. * Improve JsonTemplateLayout performance. * Fix resolution of non-Log4j properties. * Fixes Spring Boot logging system registration in a multi-application environment. * JAR file containing Log4j configuration isn?t closed. * Properties defined in configuration using a value attribute (as opposed to element) are read correctly. * Syslog appender lacks the SocketOptions setting. * Log4j 1.2 bridge should not wrap components unnecessarily. * Update 3rd party dependencies for 2.18.0. * SizeBasedTriggeringPolicy would fail to rename files properly when integer pattern contained a leading zero. * Fixes default SslConfiguration, when a custom keystore is used. * Fixes appender concurrency problems in Log4j 1.x bridge. * Fix and test for race condition in FileUtils.mkdir(). * LocalizedMessage logs misleading errors on the console. * Add missing message parameterization in RegexFilter. * Add the missing context stack to JsonLayout template. * HttpWatcher did not pass credentials when polling. * UrlConnectionFactory.createConnection now accepts an AuthorizationProvider as a parameter. * The DirectWriteRolloverStrategy was not detecting the correct index to use during startup. * Async Loggers were including the location information by default. * ClassArbiter?s newBuilder method referenced the wrong class. * Don?t use Paths.get() to avoid circular file systems. * Fix parsing error, when XInclude is disabled. * Fix LevelRangeFilterBuilder to align with log4j1?s behavior. * Fixes problem with wrong ANSI escape code for bright colors * Log4j 1.2 bridge should generate Log4j 2.x messages based on the parameter runtime type. * Update to 2.19.0 * Added * Add implementation of SLF4J2 fluent API. * Add support for SLF4J2 stack-valued MDC. * Changed * Add getExplicitLevel method to LoggerConfig. * Allow PropertySources to be added. * Allow Plugins to be injected with the LoggerContext reference. * Fixed * Add correct manifest entries for OSGi to log4j-jcl * Improve support for passwordless keystores. * SystemPropertyArbiter was assigning the value as the name. * Make JsonTemplateLayout stack trace truncation operate for each label block. * Fix recursion between Log4j 1.2 LogManager and Category. * Fix resolution of properties not starting with log4j2.. * Logger$PrivateConfig.filter(Level, Marker, String) was allocating empty varargs array. * Allows a space separated list of style specifiers in the %style pattern for consistency with %highlight. * Fix NPE in log4j-to-jul in the case the root logger level is null. * Fix RollingRandomAccessFileAppender with DirectWriteRolloverStrategy can?t create the first log file of different directory. * Generate new SSL certs for testing. * Fix ServiceLoaderUtil behavior in the presence of a SecurityManager. * Fix regression in Rfc5424Layout default values. * Harden InstantFormatter against delegate failures. * Add async support to Log4jServletFilter. * Removed * Removed build page in favor of a single build instructions file. * Remove SLF4J 1.8.x binding. * Update to 2.20.0 * Added * Add support for timezones in RollingFileAppender date pattern * Add LogEvent timestamp to ProducerRecord in KafkaAppender * Add PatternLayout support for abbreviating the name of all logger components except the 2 rightmost * Removes internal field that leaked into public API. * Add a LogBuilder#logAndGet() method to emulate the Logger#traceEntry method. * Changed * Simplify site generation * Switch the issue tracker from JIRA to GitHub Issues * Remove liquibase-log4j2 maven module * Fix order of stacktrace elements, that causes cache misses in ThrowableProxyHelper. * Switch from com.sun.mail to Eclipse Angus. * Add Log4j2 Core as default runtime dependency of the SLF4J2-to-Log4j2 API bridge. * Replace maven-changes-plugin with a custom changelog implementation * Moved log4j-api and log4j-core artifacts with classifier tests to log4j-api-test and log4j-core-test respectively. * Deprecated * Deprecate support for package scanning for plugins * Fixed * Copy programmatically supplied location even if includeLocation="false". * Eliminate status logger warning, when disableAnsi or noConsoleNoAnsi is used the style and highlight patterns. * Fix detection of location requirements in RewriteAppender. * Replace regex with manual code to escape characters in Rfc5424Layout. * Fix java.sql.Time object formatting in MapMessage * Fix previous fire time computation in CronTriggeringPolicy * Correct default to not include location for AsyncRootLoggers * Make StatusConsoleListener use SimpleLogger internally. * Lazily evaluate the level of a SLF4J LogEventBuilder * Fixes priority of Legacy system properties, which are now back to having higher priority than Environment variables. * Protects ServiceLoaderUtil from unchecked ServiceLoader exceptions. * Fix Configurator#setLevel for internal classes * Fix level propagation in Log4jBridgeHandler * Disable OsgiServiceLocator if not running in OSGI container. * When using a Date Lookup in the file pattern the current time should be used. * Fixed LogBuilder filtering in the presence of global filters. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-254=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-254=1 ## Package List: * openSUSE Leap 15.6 (noarch) * log4j-slf4j-2.20.0-150200.4.30.1 * log4j-jcl-2.20.0-150200.4.30.1 * log4j-2.20.0-150200.4.30.1 * log4j-javadoc-2.20.0-150200.4.30.1 * Basesystem Module 15-SP7 (noarch) * log4j-slf4j-2.20.0-150200.4.30.1 * log4j-jcl-2.20.0-150200.4.30.1 * log4j-2.20.0-150200.4.30.1 * log4j-javadoc-2.20.0-150200.4.30.1 ## References: * https://www.suse.com/security/cve/CVE-2025-68161.html * https://bugzilla.suse.com/show_bug.cgi?id=1255427 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:32:46 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:32:46 -0000 Subject: SUSE-SU-2026:0253-1: important: Security update for libsoup2 Message-ID: <176915716640.16846.15898926198393837366@smelt2.prg2.suse.org> # Security update for libsoup2 Announcement ID: SUSE-SU-2026:0253-1 Release Date: 2026-01-22T16:08:15Z Rating: important References: * bsc#1254876 * bsc#1256399 Cross-References: * CVE-2025-14523 * CVE-2026-0719 CVSS scores: * CVE-2025-14523 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-14523 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2025-14523 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N * CVE-2026-0719 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-0719 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-0719 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Affected Products: * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for libsoup2 fixes the following issues: * CVE-2025-14523: Reject duplicated Host in headers and followed upstream update (bsc#1254876). * CVE-2026-0719: Fixed overflow for password md4sum (bsc#1256399) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-253=1 openSUSE-SLE-15.6-2026-253=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-253=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-253=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-253=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libsoup-2_4-1-2.74.3-150600.4.19.1 * libsoup-2_4-1-debuginfo-2.74.3-150600.4.19.1 * libsoup2-devel-2.74.3-150600.4.19.1 * typelib-1_0-Soup-2_4-2.74.3-150600.4.19.1 * libsoup2-debugsource-2.74.3-150600.4.19.1 * openSUSE Leap 15.6 (x86_64) * libsoup2-devel-32bit-2.74.3-150600.4.19.1 * libsoup-2_4-1-32bit-2.74.3-150600.4.19.1 * libsoup-2_4-1-32bit-debuginfo-2.74.3-150600.4.19.1 * openSUSE Leap 15.6 (noarch) * libsoup2-lang-2.74.3-150600.4.19.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libsoup-2_4-1-64bit-debuginfo-2.74.3-150600.4.19.1 * libsoup2-devel-64bit-2.74.3-150600.4.19.1 * libsoup-2_4-1-64bit-2.74.3-150600.4.19.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libsoup-2_4-1-2.74.3-150600.4.19.1 * libsoup-2_4-1-debuginfo-2.74.3-150600.4.19.1 * libsoup2-devel-2.74.3-150600.4.19.1 * typelib-1_0-Soup-2_4-2.74.3-150600.4.19.1 * libsoup2-debugsource-2.74.3-150600.4.19.1 * Basesystem Module 15-SP7 (noarch) * libsoup2-lang-2.74.3-150600.4.19.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * libsoup-2_4-1-2.74.3-150600.4.19.1 * libsoup-2_4-1-debuginfo-2.74.3-150600.4.19.1 * libsoup2-devel-2.74.3-150600.4.19.1 * typelib-1_0-Soup-2_4-2.74.3-150600.4.19.1 * libsoup2-debugsource-2.74.3-150600.4.19.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * libsoup2-lang-2.74.3-150600.4.19.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * libsoup-2_4-1-2.74.3-150600.4.19.1 * libsoup-2_4-1-debuginfo-2.74.3-150600.4.19.1 * libsoup2-devel-2.74.3-150600.4.19.1 * typelib-1_0-Soup-2_4-2.74.3-150600.4.19.1 * libsoup2-debugsource-2.74.3-150600.4.19.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * libsoup2-lang-2.74.3-150600.4.19.1 ## References: * https://www.suse.com/security/cve/CVE-2025-14523.html * https://www.suse.com/security/cve/CVE-2026-0719.html * https://bugzilla.suse.com/show_bug.cgi?id=1254876 * https://bugzilla.suse.com/show_bug.cgi?id=1256399 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:32:55 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:32:55 -0000 Subject: SUSE-SU-2026:0252-1: important: Security update for python-pyasn1 Message-ID: <176915717506.16846.3166339885697670375@smelt2.prg2.suse.org> # Security update for python-pyasn1 Announcement ID: SUSE-SU-2026:0252-1 Release Date: 2026-01-22T16:06:59Z Rating: important References: * bsc#1256902 Cross-References: * CVE-2026-23490 CVSS scores: * CVE-2026-23490 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2026-23490 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * Public Cloud Module 15-SP4 * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python-pyasn1 fixes the following issues: * CVE-2026-23490: Fixed Denial-of-Service issue that may lead to memory exhaustion from malformed RELATIVE-OID with excessive continuation octets (bsc#1256902) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-252=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-252=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-252=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-252=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-252=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-252=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-252=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-252=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-252=1 * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-252=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-252=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-252=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-252=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-252=1 ## Package List: * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * python311-pyasn1-0.5.0-150400.12.10.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * python311-pyasn1-0.5.0-150400.12.10.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * python311-pyasn1-0.5.0-150400.12.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * python311-pyasn1-0.5.0-150400.12.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * python311-pyasn1-0.5.0-150400.12.10.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * python311-pyasn1-0.5.0-150400.12.10.1 * openSUSE Leap 15.4 (noarch) * python311-pyasn1-0.5.0-150400.12.10.1 * openSUSE Leap 15.6 (noarch) * python311-pyasn1-0.5.0-150400.12.10.1 * Public Cloud Module 15-SP4 (noarch) * python311-pyasn1-0.5.0-150400.12.10.1 * Python 3 Module 15-SP7 (noarch) * python311-pyasn1-0.5.0-150400.12.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * python311-pyasn1-0.5.0-150400.12.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * python311-pyasn1-0.5.0-150400.12.10.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * python311-pyasn1-0.5.0-150400.12.10.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * python311-pyasn1-0.5.0-150400.12.10.1 ## References: * https://www.suse.com/security/cve/CVE-2026-23490.html * https://bugzilla.suse.com/show_bug.cgi?id=1256902 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 08:32:58 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 08:32:58 -0000 Subject: SUSE-RU-2026:0251-1: important: Recommended update for python-Brotli Message-ID: <176915717827.16846.16536627101342253284@smelt2.prg2.suse.org> # Recommended update for python-Brotli Announcement ID: SUSE-RU-2026:0251-1 Release Date: 2026-01-22T16:05:53Z Rating: important References: * bsc#1254867 * bsc#1256017 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has two fixes can now be installed. ## Description: This update for python-Brotli fixes the following issues: * Add max-length-decompression (bsc#1254867, bsc#1256017) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-251=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-251=1 * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-251=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-251=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-251=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-251=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-251=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-251=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-251=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-251=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-251=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-251=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-251=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python311-Brotli-1.1.0-150400.7.8.1 * python311-Brotli-debuginfo-1.1.0-150400.7.8.1 * python-Brotli-debugsource-1.1.0-150400.7.8.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python311-Brotli-1.1.0-150400.7.8.1 * python311-Brotli-debuginfo-1.1.0-150400.7.8.1 * python-Brotli-debugsource-1.1.0-150400.7.8.1 * Python 3 Module 15-SP7 (aarch64 ppc64le s390x x86_64) * python311-Brotli-1.1.0-150400.7.8.1 * python311-Brotli-debuginfo-1.1.0-150400.7.8.1 * python-Brotli-debugsource-1.1.0-150400.7.8.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * python311-Brotli-1.1.0-150400.7.8.1 * python311-Brotli-debuginfo-1.1.0-150400.7.8.1 * python-Brotli-debugsource-1.1.0-150400.7.8.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * python311-Brotli-1.1.0-150400.7.8.1 * python311-Brotli-debuginfo-1.1.0-150400.7.8.1 * python-Brotli-debugsource-1.1.0-150400.7.8.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * python311-Brotli-1.1.0-150400.7.8.1 * python311-Brotli-debuginfo-1.1.0-150400.7.8.1 * python-Brotli-debugsource-1.1.0-150400.7.8.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * python311-Brotli-1.1.0-150400.7.8.1 * python311-Brotli-debuginfo-1.1.0-150400.7.8.1 * python-Brotli-debugsource-1.1.0-150400.7.8.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * python311-Brotli-1.1.0-150400.7.8.1 * python311-Brotli-debuginfo-1.1.0-150400.7.8.1 * python-Brotli-debugsource-1.1.0-150400.7.8.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * python311-Brotli-1.1.0-150400.7.8.1 * python311-Brotli-debuginfo-1.1.0-150400.7.8.1 * python-Brotli-debugsource-1.1.0-150400.7.8.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * python311-Brotli-1.1.0-150400.7.8.1 * python311-Brotli-debuginfo-1.1.0-150400.7.8.1 * python-Brotli-debugsource-1.1.0-150400.7.8.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * python311-Brotli-1.1.0-150400.7.8.1 * python311-Brotli-debuginfo-1.1.0-150400.7.8.1 * python-Brotli-debugsource-1.1.0-150400.7.8.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * python311-Brotli-1.1.0-150400.7.8.1 * python311-Brotli-debuginfo-1.1.0-150400.7.8.1 * python-Brotli-debugsource-1.1.0-150400.7.8.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * python311-Brotli-1.1.0-150400.7.8.1 * python311-Brotli-debuginfo-1.1.0-150400.7.8.1 * python-Brotli-debugsource-1.1.0-150400.7.8.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1254867 * https://bugzilla.suse.com/show_bug.cgi?id=1256017 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 12:30:02 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 12:30:02 -0000 Subject: SUSE-SU-2026:0265-1: important: Security update for libsoup Message-ID: <176917140292.27285.8551991997922792019@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2026:0265-1 Release Date: 2026-01-23T07:08:47Z Rating: important References: * bsc#1256399 Cross-References: * CVE-2026-0719 CVSS scores: * CVE-2026-0719 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2026-0719 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2026-0719 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2026-0719: Fixed stack-based buffer overflow in NTLM authentication (bsc#1256399). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-265=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-265=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libsoup-debugsource-2.62.2-5.26.1 * libsoup-2_4-1-debuginfo-2.62.2-5.26.1 * libsoup-devel-2.62.2-5.26.1 * typelib-1_0-Soup-2_4-2.62.2-5.26.1 * libsoup-2_4-1-2.62.2-5.26.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * libsoup-lang-2.62.2-5.26.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libsoup-2_4-1-32bit-2.62.2-5.26.1 * libsoup-2_4-1-debuginfo-32bit-2.62.2-5.26.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libsoup-2_4-1-2.62.2-5.26.1 * libsoup-debugsource-2.62.2-5.26.1 * libsoup-2_4-1-32bit-2.62.2-5.26.1 * libsoup-2_4-1-debuginfo-2.62.2-5.26.1 * libsoup-devel-2.62.2-5.26.1 * typelib-1_0-Soup-2_4-2.62.2-5.26.1 * libsoup-2_4-1-debuginfo-32bit-2.62.2-5.26.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * libsoup-lang-2.62.2-5.26.1 ## References: * https://www.suse.com/security/cve/CVE-2026-0719.html * https://bugzilla.suse.com/show_bug.cgi?id=1256399 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 12:30:05 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 12:30:05 -0000 Subject: SUSE-SU-2026:0264-1: low: Security update for glib2 Message-ID: <176917140564.27285.7506065585075658985@smelt2.prg2.suse.org> # Security update for glib2 Announcement ID: SUSE-SU-2026:0264-1 Release Date: 2026-01-23T04:34:00Z Rating: low References: * bsc#1257049 Cross-References: * CVE-2026-0988 CVSS scores: * CVE-2026-0988 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-0988 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2026-0988 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves one vulnerability can now be installed. ## Description: This update for glib2 fixes the following issues: * CVE-2026-0988: Fixed a potential integer overflow in g_buffered_input_stream_peek (bsc#1257049). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-264=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2026-264=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libglib-2_0-0-2.62.6-150200.3.39.1 * libgmodule-2_0-0-debuginfo-2.62.6-150200.3.39.1 * libgobject-2_0-0-debuginfo-2.62.6-150200.3.39.1 * glib2-tools-2.62.6-150200.3.39.1 * libgio-2_0-0-2.62.6-150200.3.39.1 * libglib-2_0-0-debuginfo-2.62.6-150200.3.39.1 * libgobject-2_0-0-2.62.6-150200.3.39.1 * libgio-2_0-0-debuginfo-2.62.6-150200.3.39.1 * glib2-debugsource-2.62.6-150200.3.39.1 * libgmodule-2_0-0-2.62.6-150200.3.39.1 * glib2-tools-debuginfo-2.62.6-150200.3.39.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libglib-2_0-0-2.62.6-150200.3.39.1 * libgmodule-2_0-0-debuginfo-2.62.6-150200.3.39.1 * libgobject-2_0-0-debuginfo-2.62.6-150200.3.39.1 * glib2-tools-2.62.6-150200.3.39.1 * libgio-2_0-0-2.62.6-150200.3.39.1 * libglib-2_0-0-debuginfo-2.62.6-150200.3.39.1 * libgobject-2_0-0-2.62.6-150200.3.39.1 * libgio-2_0-0-debuginfo-2.62.6-150200.3.39.1 * glib2-debugsource-2.62.6-150200.3.39.1 * libgmodule-2_0-0-2.62.6-150200.3.39.1 * glib2-tools-debuginfo-2.62.6-150200.3.39.1 ## References: * https://www.suse.com/security/cve/CVE-2026-0988.html * https://bugzilla.suse.com/show_bug.cgi?id=1257049 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 12:35:36 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 12:35:36 -0000 Subject: SUSE-SU-2026:0263-1: important: Security update for the Linux Kernel Message-ID: <176917173621.27285.8404814204267445710@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:0263-1 Release Date: 2026-01-22T21:15:03Z Rating: important References: * bsc#1065729 * bsc#1193629 * bsc#1194869 * bsc#1196823 * bsc#1204957 * bsc#1205567 * bsc#1206451 * bsc#1206843 * bsc#1206889 * bsc#1207051 * bsc#1207088 * bsc#1207315 * bsc#1207611 * bsc#1207620 * bsc#1207622 * bsc#1207636 * bsc#1207644 * bsc#1207646 * bsc#1207652 * bsc#1207653 * bsc#1208570 * bsc#1208758 * bsc#1209799 * bsc#1209980 * bsc#1210644 * bsc#1210817 * bsc#1210943 * bsc#1211690 * bsc#1213025 * bsc#1213032 * bsc#1213093 * bsc#1213105 * bsc#1213110 * bsc#1213111 * bsc#1213653 * bsc#1213747 * bsc#1213867 * bsc#1214635 * bsc#1214940 * bsc#1214962 * bsc#1214986 * bsc#1214990 * bsc#1216062 * bsc#1224573 * bsc#1225832 * bsc#1226797 * bsc#1226846 * bsc#1228015 * bsc#1233640 * bsc#1235038 * bsc#1237563 * bsc#1249871 * bsc#1252046 * bsc#1252678 * bsc#1253409 * bsc#1254392 * bsc#1254520 * bsc#1254559 * bsc#1254562 * bsc#1254572 * bsc#1254578 * bsc#1254580 * bsc#1254592 * bsc#1254601 * bsc#1254608 * bsc#1254609 * bsc#1254614 * bsc#1254615 * bsc#1254617 * bsc#1254623 * bsc#1254625 * bsc#1254626 * bsc#1254631 * bsc#1254632 * bsc#1254634 * bsc#1254644 * bsc#1254645 * bsc#1254649 * bsc#1254651 * bsc#1254653 * bsc#1254656 * bsc#1254658 * bsc#1254660 * bsc#1254664 * bsc#1254671 * bsc#1254674 * bsc#1254676 * bsc#1254677 * bsc#1254681 * bsc#1254684 * bsc#1254685 * bsc#1254686 * bsc#1254690 * bsc#1254692 * bsc#1254694 * bsc#1254696 * bsc#1254698 * bsc#1254699 * bsc#1254704 * bsc#1254706 * bsc#1254709 * bsc#1254710 * bsc#1254711 * bsc#1254712 * bsc#1254713 * bsc#1254714 * bsc#1254716 * bsc#1254723 * bsc#1254725 * bsc#1254728 * bsc#1254729 * bsc#1254743 * bsc#1254745 * bsc#1254751 * bsc#1254753 * bsc#1254754 * bsc#1254756 * bsc#1254759 * bsc#1254763 * bsc#1254775 * bsc#1254780 * bsc#1254781 * bsc#1254782 * bsc#1254783 * bsc#1254785 * bsc#1254786 * bsc#1254788 * bsc#1254789 * bsc#1254792 * bsc#1254813 * bsc#1254843 * bsc#1254847 * bsc#1254851 * bsc#1254894 * bsc#1254902 * bsc#1254910 * bsc#1254911 * bsc#1254915 * bsc#1254916 * bsc#1254917 * bsc#1254920 * bsc#1254922 * bsc#1254958 * bsc#1254959 * bsc#1254974 * bsc#1254979 * bsc#1254986 * bsc#1254994 * bsc#1255002 * bsc#1255005 * bsc#1255007 * bsc#1255049 * bsc#1255060 * bsc#1255107 * bsc#1255163 * bsc#1255165 * bsc#1255245 * bsc#1255467 * bsc#1255469 * bsc#1255521 * bsc#1255528 * bsc#1255532 * bsc#1255546 * bsc#1255549 * bsc#1255554 * bsc#1255555 * bsc#1255558 * bsc#1255560 * bsc#1255561 * bsc#1255562 * bsc#1255565 * bsc#1255574 * bsc#1255576 * bsc#1255578 * bsc#1255582 * bsc#1255596 * bsc#1255600 * bsc#1255605 * bsc#1255607 * bsc#1255608 * bsc#1255609 * bsc#1255618 * bsc#1255619 * bsc#1255620 * bsc#1255623 * bsc#1255624 * bsc#1255626 * bsc#1255627 * bsc#1255628 * bsc#1255635 * bsc#1255636 * bsc#1255688 * bsc#1255690 * bsc#1255697 * bsc#1255702 * bsc#1255704 * bsc#1255745 * bsc#1255747 * bsc#1255749 * bsc#1255750 * bsc#1255757 * bsc#1255758 * bsc#1255760 * bsc#1255761 * bsc#1255762 * bsc#1255763 * bsc#1255769 * bsc#1255771 * bsc#1255773 * bsc#1255780 * bsc#1255786 * bsc#1255787 * bsc#1255789 * bsc#1255790 * bsc#1255791 * bsc#1255792 * bsc#1255796 * bsc#1255797 * bsc#1255800 * bsc#1255801 * bsc#1255802 * bsc#1255803 * bsc#1255804 * bsc#1255806 * bsc#1255808 * bsc#1255819 * bsc#1255839 * bsc#1255841 * bsc#1255843 * bsc#1255844 * bsc#1255872 * bsc#1255875 * bsc#1255876 * bsc#1255877 * bsc#1255878 * bsc#1255880 * bsc#1255881 * bsc#1255888 * bsc#1255889 * bsc#1255890 * bsc#1255899 * bsc#1255901 * bsc#1255902 * bsc#1255905 * bsc#1255906 * bsc#1255909 * bsc#1255910 * bsc#1255912 * bsc#1255916 * bsc#1255919 * bsc#1255920 * bsc#1255922 * bsc#1255924 * bsc#1255925 * bsc#1255939 * bsc#1255946 * bsc#1255950 * bsc#1255953 * bsc#1255954 * bsc#1255955 * bsc#1255962 * bsc#1255964 * bsc#1255968 * bsc#1255969 * bsc#1255970 * bsc#1255971 * bsc#1255974 * bsc#1255978 * bsc#1255979 * bsc#1255983 * bsc#1255985 * bsc#1255990 * bsc#1255993 * bsc#1255994 * bsc#1255996 * bsc#1255998 * bsc#1256034 * bsc#1256040 * bsc#1256042 * bsc#1256045 * bsc#1256046 * bsc#1256048 * bsc#1256049 * bsc#1256050 * bsc#1256053 * bsc#1256056 * bsc#1256057 * bsc#1256062 * bsc#1256063 * bsc#1256064 * bsc#1256065 * bsc#1256071 * bsc#1256074 * bsc#1256081 * bsc#1256084 * bsc#1256086 * bsc#1256088 * bsc#1256091 * bsc#1256093 * bsc#1256099 * bsc#1256101 * bsc#1256103 * bsc#1256106 * bsc#1256111 * bsc#1256112 * bsc#1256114 * bsc#1256115 * bsc#1256118 * bsc#1256119 * bsc#1256121 * bsc#1256122 * bsc#1256124 * bsc#1256125 * bsc#1256126 * bsc#1256127 * bsc#1256128 * bsc#1256130 * bsc#1256131 * bsc#1256132 * bsc#1256133 * bsc#1256136 * bsc#1256137 * bsc#1256140 * bsc#1256141 * bsc#1256142 * bsc#1256143 * bsc#1256144 * bsc#1256145 * bsc#1256149 * bsc#1256150 * bsc#1256152 * bsc#1256154 * bsc#1256155 * bsc#1256157 * bsc#1256158 * bsc#1256162 * bsc#1256164 * bsc#1256165 * bsc#1256166 * bsc#1256167 * bsc#1256172 * bsc#1256173 * bsc#1256174 * bsc#1256177 * bsc#1256178 * bsc#1256179 * bsc#1256182 * bsc#1256184 * bsc#1256185 * bsc#1256186 * bsc#1256188 * bsc#1256189 * bsc#1256191 * bsc#1256192 * bsc#1256193 * bsc#1256194 * bsc#1256196 * bsc#1256198 * bsc#1256199 * bsc#1256200 * bsc#1256202 * bsc#1256203 * bsc#1256204 * bsc#1256205 * bsc#1256206 * bsc#1256207 * bsc#1256208 * bsc#1256211 * bsc#1256214 * bsc#1256215 * bsc#1256216 * bsc#1256218 * bsc#1256219 * bsc#1256220 * bsc#1256221 * bsc#1256223 * bsc#1256228 * bsc#1256230 * bsc#1256231 * bsc#1256235 * bsc#1256239 * bsc#1256241 * bsc#1256242 * bsc#1256245 * bsc#1256248 * bsc#1256250 * bsc#1256254 * bsc#1256260 * bsc#1256265 * bsc#1256269 * bsc#1256271 * bsc#1256274 * bsc#1256282 * bsc#1256285 * bsc#1256291 * bsc#1256294 * bsc#1256295 * bsc#1256300 * bsc#1256302 * bsc#1256306 * bsc#1256309 * bsc#1256317 * bsc#1256320 * bsc#1256323 * bsc#1256326 * bsc#1256328 * bsc#1256333 * bsc#1256334 * bsc#1256335 * bsc#1256337 * bsc#1256338 * bsc#1256344 * bsc#1256346 * bsc#1256349 * bsc#1256352 * bsc#1256353 * bsc#1256355 * bsc#1256358 * bsc#1256359 * bsc#1256363 * bsc#1256364 * bsc#1256368 * bsc#1256370 * bsc#1256375 * bsc#1256381 * bsc#1256382 * bsc#1256383 * bsc#1256384 * bsc#1256386 * bsc#1256388 * bsc#1256391 * bsc#1256394 * bsc#1256395 * bsc#1256396 * bsc#1256397 * bsc#1256398 * bsc#1256423 * bsc#1256426 * bsc#1256432 * jsc#PED-1073 * jsc#PED-14062 * jsc#PED-1407 * jsc#PED-1495 * jsc#PED-1549 * jsc#PED-1559 * jsc#PED-2765 * jsc#PED-370 * jsc#PED-376 * jsc#PED-7167 * jsc#PED-8111 * jsc#SLE-13847 * jsc#SLE-18378 * jsc#SLE-18384 * jsc#SLE-19253 * jsc#SLE-19255 Cross-References: * CVE-2022-0854 * CVE-2022-48853 * CVE-2022-50614 * CVE-2022-50615 * CVE-2022-50617 * CVE-2022-50618 * CVE-2022-50619 * CVE-2022-50621 * CVE-2022-50622 * CVE-2022-50623 * CVE-2022-50625 * CVE-2022-50626 * CVE-2022-50629 * CVE-2022-50630 * CVE-2022-50633 * CVE-2022-50635 * CVE-2022-50636 * CVE-2022-50638 * CVE-2022-50640 * CVE-2022-50641 * CVE-2022-50643 * CVE-2022-50644 * CVE-2022-50646 * CVE-2022-50649 * CVE-2022-50652 * CVE-2022-50653 * CVE-2022-50656 * CVE-2022-50658 * CVE-2022-50660 * CVE-2022-50661 * CVE-2022-50662 * CVE-2022-50664 * CVE-2022-50665 * CVE-2022-50666 * CVE-2022-50667 * CVE-2022-50668 * CVE-2022-50669 * CVE-2022-50670 * CVE-2022-50671 * CVE-2022-50672 * CVE-2022-50673 * CVE-2022-50675 * CVE-2022-50677 * CVE-2022-50678 * CVE-2022-50679 * CVE-2022-50698 * CVE-2022-50699 * CVE-2022-50700 * CVE-2022-50701 * CVE-2022-50702 * CVE-2022-50703 * CVE-2022-50704 * CVE-2022-50705 * CVE-2022-50709 * CVE-2022-50710 * CVE-2022-50712 * CVE-2022-50714 * CVE-2022-50715 * CVE-2022-50716 * CVE-2022-50717 * CVE-2022-50718 * CVE-2022-50719 * CVE-2022-50722 * CVE-2022-50723 * CVE-2022-50724 * CVE-2022-50726 * CVE-2022-50727 * CVE-2022-50728 * CVE-2022-50730 * CVE-2022-50731 * CVE-2022-50732 * CVE-2022-50733 * CVE-2022-50735 * CVE-2022-50736 * CVE-2022-50738 * CVE-2022-50740 * CVE-2022-50742 * CVE-2022-50744 * CVE-2022-50745 * CVE-2022-50747 * CVE-2022-50749 * CVE-2022-50750 * CVE-2022-50751 * CVE-2022-50752 * CVE-2022-50754 * CVE-2022-50755 * CVE-2022-50756 * CVE-2022-50757 * CVE-2022-50758 * CVE-2022-50760 * CVE-2022-50761 * CVE-2022-50763 * CVE-2022-50767 * CVE-2022-50768 * CVE-2022-50769 * CVE-2022-50770 * CVE-2022-50773 * CVE-2022-50774 * CVE-2022-50776 * CVE-2022-50777 * CVE-2022-50779 * CVE-2022-50781 * CVE-2022-50782 * CVE-2022-50809 * CVE-2022-50814 * CVE-2022-50818 * CVE-2022-50819 * CVE-2022-50821 * CVE-2022-50822 * CVE-2022-50823 * CVE-2022-50824 * CVE-2022-50826 * CVE-2022-50827 * CVE-2022-50828 * CVE-2022-50829 * CVE-2022-50830 * CVE-2022-50832 * CVE-2022-50833 * CVE-2022-50834 * CVE-2022-50835 * CVE-2022-50836 * CVE-2022-50838 * CVE-2022-50839 * CVE-2022-50840 * CVE-2022-50842 * CVE-2022-50843 * CVE-2022-50844 * CVE-2022-50845 * CVE-2022-50846 * CVE-2022-50847 * CVE-2022-50848 * CVE-2022-50849 * CVE-2022-50850 * CVE-2022-50851 * CVE-2022-50853 * CVE-2022-50856 * CVE-2022-50858 * CVE-2022-50859 * CVE-2022-50860 * CVE-2022-50861 * CVE-2022-50862 * CVE-2022-50864 * CVE-2022-50866 * CVE-2022-50867 * CVE-2022-50868 * CVE-2022-50870 * CVE-2022-50872 * CVE-2022-50873 * CVE-2022-50876 * CVE-2022-50878 * CVE-2022-50880 * CVE-2022-50881 * CVE-2022-50882 * CVE-2022-50883 * CVE-2022-50884 * CVE-2022-50885 * CVE-2022-50886 * CVE-2022-50887 * CVE-2022-50888 * CVE-2022-50889 * CVE-2023-23559 * CVE-2023-53254 * CVE-2023-53743 * CVE-2023-53744 * CVE-2023-53746 * CVE-2023-53747 * CVE-2023-53751 * CVE-2023-53753 * CVE-2023-53754 * CVE-2023-53755 * CVE-2023-53761 * CVE-2023-53766 * CVE-2023-53769 * CVE-2023-53780 * CVE-2023-53781 * CVE-2023-53783 * CVE-2023-53786 * CVE-2023-53788 * CVE-2023-53792 * CVE-2023-53794 * CVE-2023-53801 * CVE-2023-53802 * CVE-2023-53803 * CVE-2023-53804 * CVE-2023-53806 * CVE-2023-53808 * CVE-2023-53811 * CVE-2023-53814 * CVE-2023-53816 * CVE-2023-53818 * CVE-2023-53819 * CVE-2023-53820 * CVE-2023-53827 * CVE-2023-53828 * CVE-2023-53830 * CVE-2023-53832 * CVE-2023-53833 * CVE-2023-53834 * CVE-2023-53837 * CVE-2023-53840 * CVE-2023-53842 * CVE-2023-53844 * CVE-2023-53845 * CVE-2023-53847 * CVE-2023-53848 * CVE-2023-53849 * CVE-2023-53850 * CVE-2023-53852 * CVE-2023-53858 * CVE-2023-53860 * CVE-2023-53862 * CVE-2023-53864 * CVE-2023-53866 * CVE-2023-53989 * CVE-2023-53990 * CVE-2023-53991 * CVE-2023-53996 * CVE-2023-53998 * CVE-2023-54001 * CVE-2023-54003 * CVE-2023-54007 * CVE-2023-54009 * CVE-2023-54010 * CVE-2023-54014 * CVE-2023-54015 * CVE-2023-54017 * CVE-2023-54018 * CVE-2023-54019 * CVE-2023-54020 * CVE-2023-54021 * CVE-2023-54024 * CVE-2023-54025 * CVE-2023-54026 * CVE-2023-54028 * CVE-2023-54036 * CVE-2023-54039 * CVE-2023-54040 * CVE-2023-54041 * CVE-2023-54042 * CVE-2023-54044 * CVE-2023-54045 * CVE-2023-54046 * CVE-2023-54047 * CVE-2023-54048 * CVE-2023-54049 * CVE-2023-54050 * CVE-2023-54051 * CVE-2023-54053 * CVE-2023-54055 * CVE-2023-54057 * CVE-2023-54058 * CVE-2023-54064 * CVE-2023-54070 * CVE-2023-54072 * CVE-2023-54074 * CVE-2023-54076 * CVE-2023-54078 * CVE-2023-54079 * CVE-2023-54083 * CVE-2023-54084 * CVE-2023-54090 * CVE-2023-54091 * CVE-2023-54092 * CVE-2023-54095 * CVE-2023-54096 * CVE-2023-54097 * CVE-2023-54098 * CVE-2023-54100 * CVE-2023-54102 * CVE-2023-54104 * CVE-2023-54106 * CVE-2023-54107 * CVE-2023-54108 * CVE-2023-54110 * CVE-2023-54111 * CVE-2023-54114 * CVE-2023-54115 * CVE-2023-54116 * CVE-2023-54118 * CVE-2023-54119 * CVE-2023-54120 * CVE-2023-54122 * CVE-2023-54123 * CVE-2023-54126 * CVE-2023-54127 * CVE-2023-54128 * CVE-2023-54130 * CVE-2023-54131 * CVE-2023-54132 * CVE-2023-54134 * CVE-2023-54136 * CVE-2023-54138 * CVE-2023-54140 * CVE-2023-54144 * CVE-2023-54146 * CVE-2023-54148 * CVE-2023-54150 * CVE-2023-54153 * CVE-2023-54156 * CVE-2023-54159 * CVE-2023-54164 * CVE-2023-54166 * CVE-2023-54168 * CVE-2023-54169 * CVE-2023-54170 * CVE-2023-54171 * CVE-2023-54173 * CVE-2023-54175 * CVE-2023-54177 * CVE-2023-54179 * CVE-2023-54183 * CVE-2023-54186 * CVE-2023-54189 * CVE-2023-54190 * CVE-2023-54194 * CVE-2023-54197 * CVE-2023-54198 * CVE-2023-54199 * CVE-2023-54201 * CVE-2023-54202 * CVE-2023-54205 * CVE-2023-54208 * CVE-2023-54210 * CVE-2023-54211 * CVE-2023-54213 * CVE-2023-54214 * CVE-2023-54219 * CVE-2023-54226 * CVE-2023-54229 * CVE-2023-54230 * CVE-2023-54234 * CVE-2023-54236 * CVE-2023-54238 * CVE-2023-54242 * CVE-2023-54244 * CVE-2023-54245 * CVE-2023-54251 * CVE-2023-54252 * CVE-2023-54254 * CVE-2023-54260 * CVE-2023-54262 * CVE-2023-54264 * CVE-2023-54266 * CVE-2023-54267 * CVE-2023-54269 * CVE-2023-54270 * CVE-2023-54271 * CVE-2023-54274 * CVE-2023-54275 * CVE-2023-54277 * CVE-2023-54280 * CVE-2023-54284 * CVE-2023-54286 * CVE-2023-54287 * CVE-2023-54289 * CVE-2023-54292 * CVE-2023-54293 * CVE-2023-54294 * CVE-2023-54295 * CVE-2023-54298 * CVE-2023-54299 * CVE-2023-54300 * CVE-2023-54301 * CVE-2023-54302 * CVE-2023-54304 * CVE-2023-54305 * CVE-2023-54309 * CVE-2023-54311 * CVE-2023-54315 * CVE-2023-54317 * CVE-2023-54319 * CVE-2023-54320 * CVE-2023-54321 * CVE-2023-54322 * CVE-2023-54325 * CVE-2023-54326 * CVE-2024-36933 * CVE-2024-53093 * CVE-2024-56590 * CVE-2025-39977 * CVE-2025-40019 * CVE-2025-40139 * CVE-2025-40215 * CVE-2025-40220 * CVE-2025-40233 * CVE-2025-40256 * CVE-2025-40258 * CVE-2025-40277 * CVE-2025-40280 * CVE-2025-40331 * CVE-2025-68218 * CVE-2025-68732 CVSS scores: * CVE-2022-0854 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-0854 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-48853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-48853 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2022-50614 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50614 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50615 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50615 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50617 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50618 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50619 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50621 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50622 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50622 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50623 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50625 ( SUSE ): 2.3 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50626 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50630 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50633 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50633 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50635 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50636 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50636 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50638 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50638 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2022-50640 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50640 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50641 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50641 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50643 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50643 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50644 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50644 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50646 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50646 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50649 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50649 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50652 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50652 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50653 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50653 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50656 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50656 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L * CVE-2022-50658 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50660 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50662 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50664 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50665 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50666 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50667 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50668 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50669 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50670 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50671 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50672 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50673 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50673 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50675 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50677 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50678 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50679 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50699 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50700 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50700 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50702 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50703 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50705 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50709 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50709 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2022-50710 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50710 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50712 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50714 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50714 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50715 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50716 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50716 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50717 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50717 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50718 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50719 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50722 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50723 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50723 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50724 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50726 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50726 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50727 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50730 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50731 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50732 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50732 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50733 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50733 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50735 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50735 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50736 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50736 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50738 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50738 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50740 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50740 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50742 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50742 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50744 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50745 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50745 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50747 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2022-50749 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50749 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N * CVE-2022-50750 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50750 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50751 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2022-50751 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2022-50752 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50752 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50755 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50755 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50756 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50756 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50757 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50758 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50758 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50760 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50761 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50763 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50763 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50767 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50768 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50769 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50770 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50770 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50773 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50773 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50774 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2022-50774 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2022-50776 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50777 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50777 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50779 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50779 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50781 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2022-50781 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H * CVE-2022-50782 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50782 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50809 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50822 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50823 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50824 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50824 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50826 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50826 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50827 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50827 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50829 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H * CVE-2022-50830 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2022-50830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50835 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50838 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50845 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50853 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50858 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50867 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50868 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50870 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50872 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50873 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50876 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50878 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50880 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50881 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50882 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50883 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50884 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50885 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50886 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50887 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50888 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2022-50889 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-23559 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L * CVE-2023-23559 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-23559 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53254 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53254 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53254 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-53254 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-53743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53744 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53746 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53747 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53751 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53751 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53754 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53755 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53761 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53761 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53766 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53766 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53769 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53780 ( SUSE ): 1.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53781 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53781 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53783 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53786 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53788 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53794 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53794 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53801 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53802 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53803 ( SUSE ): 5.1 CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53803 ( SUSE ): 4.6 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2023-53804 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53806 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53806 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53811 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53814 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53816 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2023-53818 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53820 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53827 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53827 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53830 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53832 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53833 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53837 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53840 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53845 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-53845 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-53847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53849 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53862 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53866 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53866 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53989 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53990 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53991 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53996 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2023-53996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2023-53998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54003 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54003 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54007 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54009 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54009 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54010 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54010 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54015 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54017 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54017 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54018 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54018 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54020 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54021 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54021 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54028 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54036 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54036 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54039 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54041 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54041 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54042 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54042 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54044 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54044 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54045 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54046 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54046 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-54047 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54050 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54057 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54058 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54072 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54072 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54076 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54076 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54078 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54078 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54079 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54079 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54083 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54083 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54084 ( SUSE ): 7.0 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54084 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54090 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54090 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54091 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54091 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54092 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54095 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54096 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54096 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-54097 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54097 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54098 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54100 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54100 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-54102 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54102 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-54104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-54106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54108 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54110 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54111 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54111 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54114 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54114 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54115 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54118 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54118 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-54119 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54120 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54120 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54122 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54123 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54123 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54126 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54126 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54127 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54127 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-54128 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54128 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-54130 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54130 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54131 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54131 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54132 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54132 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54134 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54134 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54136 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54136 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54138 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54138 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54140 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54140 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54144 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54144 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54146 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54146 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-54148 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54148 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H * CVE-2023-54150 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54150 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-54153 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54159 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54159 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54164 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54166 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54166 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54168 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54169 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54170 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54173 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54173 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54175 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54175 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54177 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54179 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54179 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54183 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54183 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54186 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54186 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54189 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54190 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54190 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54194 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54194 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54197 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54198 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54199 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54201 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54201 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54202 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54205 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54205 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54208 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54208 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54210 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54210 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54211 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54213 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54213 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54214 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54214 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54219 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54219 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54226 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54226 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54229 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54229 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54230 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54230 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54234 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54234 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54236 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54236 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-54238 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54238 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54242 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54242 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54244 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54245 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54245 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-54251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54252 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54252 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54254 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54254 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54260 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54260 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54262 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54262 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54264 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54266 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54266 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54267 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-54267 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-54269 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54269 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-54270 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54270 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54271 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54271 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54274 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54274 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54275 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54275 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54277 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54280 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54280 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54284 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54284 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54286 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54286 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54287 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54289 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54292 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54292 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54293 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54293 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-54294 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54294 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-54295 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54295 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54298 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54299 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54300 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54300 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54301 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54301 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54302 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54302 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-54304 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54305 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54309 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54309 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-54311 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54311 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54315 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54317 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54317 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-54319 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54320 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54320 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54321 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54321 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54322 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54322 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54325 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54325 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-54326 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54326 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-36933 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2024-36933 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56590 ( SUSE ): 6.9 CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2024-56590 ( SUSE ): 5.7 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-56590 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39977 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39977 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40019 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40019 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40139 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40139 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40215 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40215 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40220 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40220 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40258 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40258 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40280 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40280 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68732 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68732 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise Micro 5.5 An update that solves 392 vulnerabilities, contains 16 features and has 47 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP5 RT kernel was updated to fix various security issues The following security issues were fixed: * CVE-2022-50630: mm: hugetlb: fix UAF in hugetlb_handle_userfault (bsc#1254785). * CVE-2022-50700: wifi: ath10k: Delay the unmapping of the buffer (bsc#1255576). * CVE-2023-53254: cacheinfo: Fix shared_cpu_map to handle shared caches at different levels (bsc#1249871). * CVE-2023-53781: smc: Fix use-after-free in tcp_write_timer_handler() (bsc#1254751). * CVE-2024-56590: Bluetooth: hci_core: Fix not checking skb length on hci_acldata_packet (bsc#1235038). * CVE-2025-39977: futex: Prevent use-after-free during requeue-PI (bsc#1252046). * CVE-2025-40019: crypto: essiv - Check ssize for decryption and in-place encryption (bsc#1252678). * CVE-2025-40139: net: ipv4: Consolidate ipv4_mtu and ip_dst_mtu_maybe_forward (bsc#1253409). * CVE-2025-40215: kABI: xfrm: delete x->tunnel as we delete x (bsc#1254959). * CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520). * CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813). * CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1254843). * CVE-2025-40277: drm/vmwgfx: Validate command header size against (bsc#1254894). * CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self() (bsc#1254847). * CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615). * CVE-2025-68732: gpu: host1x: Fix race in syncpt alloc/free (bsc#1255688). The following non security issues were fixed: * ACPI/IORT: Fix memory leak in iort_rmr_alloc_sids() (git-fixes). * ACPI: PRM: Remove unnecessary strict handler address checks (git-fixes). * ACPI: property: Do not pass NULL handles to acpi_attach_data() (git-fixes). * ACPI: property: Fix buffer properties extraction for subnodes (git-fixes). * KVM: SVM: Fix TSC_AUX virtualization setup (git-fixes). * RDMA/cm: Rate limit destroy CM ID timeout error message (git-fixes). * RDMA/counter: Check CAP_NET_RAW check in user namespace for RDMA counters (git-fixes). * RDMA/hns: Fix the modification of max_send_sge (git-fixes). * RDMA/mlx5: Check CAP_NET_RAW in user namespace for anchor create (git- fixes). * RDMA/mlx5: Check CAP_NET_RAW in user namespace for devx create (git-fixes). * RDMA/mlx5: Check CAP_NET_RAW in user namespace for flow create (git-fixes). * RDMA/mlx5: Fix compilation warning when USER_ACCESS isn't set (git-fixes). * RDMA/nldev: Check CAP_NET_RAW in user namespace for QP modify (git-fixes). * RDMA/uverbs: Add empty rdma_uattrs_has_raw_cap() declaration (git-fixes). * RDMA/uverbs: Check CAP_NET_RAW in user namespace for QP create (git-fixes). * RDMA/uverbs: Check CAP_NET_RAW in user namespace for RAW QP create (git- fixes). * RDMA/uverbs: Check CAP_NET_RAW in user namespace for flow create (git- fixes). * arch/idle: Change arch_cpu_idle() behavior: always exit with IRQs disabled (git-fixes). * cpuidle/poll: Ensure IRQs stay disabled after cpuidle_state::enter() calls (git-fixes). * cpuidle: Move IRQ state validation (git-fixes). * cpuidle: haltpoll: Do not enable interrupts when entering idle (git-fixes). * dm: free table mempools if not used in __bind (git-fixes). * padata: Honor the caller's alignment in case of chunk_size 0 (bsc#1237563). * platform/x86/intel-uncore-freq: Fail module load when plat_info is NULL (git-fixes). * x86/bugs: Fix RSB clearing in indirect_branch_prediction_barrier() (git- fixes). * x86/bugs: Use SBPB in write_ibpb() if applicable (git-fixes). * x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT (git-fixes). * x86/tdx: Drop flags from __tdx_hypercall() (git-fixes). * x86/tdx: Dynamically disable SEPT violations from causing #VEs (git-fixes). * x86/tdx: Emit warning if IRQs are enabled during HLT #VE handling (git- fixes). * x86/tdx: Extend TDX_MODULE_CALL to support more TDCALL/SEAMCALL leafs (git- fixes). * x86/tdx: Fix __noreturn build warning around __tdx_hypercall_failed() (git- fixes). * x86/tdx: Fix arch_safe_halt() execution for TDX VMs (git-fixes). * x86/tdx: Introduce wrappers to read and write TD metadata (git-fixes). * x86/tdx: Make TDX_HYPERCALL asm similar to TDX_MODULE_CALL (git-fixes). * x86/tdx: Make macros of TDCALLs consistent with the spec (git-fixes). * x86/tdx: Pass TDCALL/SEAMCALL input/output registers via a structure (git- fixes). * x86/tdx: Reimplement __tdx_hypercall() using TDX_MODULE_CALL asm (git- fixes). * x86/tdx: Remove 'struct tdx_hypercall_args' (git-fixes). * x86/tdx: Remove TDX_HCALL_ISSUE_STI (git-fixes). * x86/tdx: Rename __tdx_module_call() to __tdcall() (git-fixes). * x86/tdx: Rename tdx_parse_tdinfo() to tdx_setup() (git-fixes). * x86/tdx: Retry partially-completed page conversion hypercalls (git-fixes). * x86/tdx: Skip saving output regs when SEAMCALL fails with VMFailInvalid (git-fixes). * x86/tdx: Zero out the missing RSI in TDX_HYPERCALL macro (git-fixes). * x86/virt/tdx: Make TDX_MODULE_CALL handle SEAMCALL #UD and #GP (git-fixes). * x86/virt/tdx: Wire up basic SEAMCALL functions (git-fixes). * xfs: fix sparse inode limits on runt AG (bsc#1254392). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2026-263=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2026-263=1 ## Package List: * openSUSE Leap 15.5 (noarch) * kernel-devel-rt-5.14.21-150500.13.118.1 * kernel-source-rt-5.14.21-150500.13.118.1 * openSUSE Leap 15.5 (x86_64) * gfs2-kmp-rt-5.14.21-150500.13.118.1 * ocfs2-kmp-rt-debuginfo-5.14.21-150500.13.118.1 * kernel-rt-debugsource-5.14.21-150500.13.118.1 * kernel-rt-devel-5.14.21-150500.13.118.1 * kselftests-kmp-rt-5.14.21-150500.13.118.1 * kernel-rt_debug-vdso-5.14.21-150500.13.118.1 * kernel-rt_debug-devel-5.14.21-150500.13.118.1 * kernel-rt_debug-debugsource-5.14.21-150500.13.118.1 * kernel-rt-devel-debuginfo-5.14.21-150500.13.118.1 * reiserfs-kmp-rt-debuginfo-5.14.21-150500.13.118.1 * kernel-rt-optional-5.14.21-150500.13.118.1 * kernel-rt-vdso-5.14.21-150500.13.118.1 * kernel-rt-optional-debuginfo-5.14.21-150500.13.118.1 * kselftests-kmp-rt-debuginfo-5.14.21-150500.13.118.1 * kernel-syms-rt-5.14.21-150500.13.118.1 * kernel-rt_debug-vdso-debuginfo-5.14.21-150500.13.118.1 * kernel-rt-vdso-debuginfo-5.14.21-150500.13.118.1 * kernel-rt-livepatch-devel-5.14.21-150500.13.118.1 * dlm-kmp-rt-debuginfo-5.14.21-150500.13.118.1 * ocfs2-kmp-rt-5.14.21-150500.13.118.1 * kernel-rt-extra-debuginfo-5.14.21-150500.13.118.1 * kernel-rt_debug-debuginfo-5.14.21-150500.13.118.1 * reiserfs-kmp-rt-5.14.21-150500.13.118.1 * kernel-rt-extra-5.14.21-150500.13.118.1 * cluster-md-kmp-rt-debuginfo-5.14.21-150500.13.118.1 * cluster-md-kmp-rt-5.14.21-150500.13.118.1 * kernel-rt-livepatch-5.14.21-150500.13.118.1 * kernel-rt_debug-devel-debuginfo-5.14.21-150500.13.118.1 * gfs2-kmp-rt-debuginfo-5.14.21-150500.13.118.1 * kernel-rt-debuginfo-5.14.21-150500.13.118.1 * dlm-kmp-rt-5.14.21-150500.13.118.1 * openSUSE Leap 15.5 (nosrc x86_64) * kernel-rt_debug-5.14.21-150500.13.118.1 * kernel-rt-5.14.21-150500.13.118.1 * SUSE Linux Enterprise Micro 5.5 (noarch) * kernel-devel-rt-5.14.21-150500.13.118.1 * kernel-source-rt-5.14.21-150500.13.118.1 * SUSE Linux Enterprise Micro 5.5 (nosrc x86_64) * kernel-rt-5.14.21-150500.13.118.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * kernel-rt-debugsource-5.14.21-150500.13.118.1 * kernel-rt-debuginfo-5.14.21-150500.13.118.1 ## References: * https://www.suse.com/security/cve/CVE-2022-0854.html * https://www.suse.com/security/cve/CVE-2022-48853.html * https://www.suse.com/security/cve/CVE-2022-50614.html * https://www.suse.com/security/cve/CVE-2022-50615.html * https://www.suse.com/security/cve/CVE-2022-50617.html * https://www.suse.com/security/cve/CVE-2022-50618.html * https://www.suse.com/security/cve/CVE-2022-50619.html * https://www.suse.com/security/cve/CVE-2022-50621.html * https://www.suse.com/security/cve/CVE-2022-50622.html * https://www.suse.com/security/cve/CVE-2022-50623.html * https://www.suse.com/security/cve/CVE-2022-50625.html * https://www.suse.com/security/cve/CVE-2022-50626.html * https://www.suse.com/security/cve/CVE-2022-50629.html * https://www.suse.com/security/cve/CVE-2022-50630.html * https://www.suse.com/security/cve/CVE-2022-50633.html * https://www.suse.com/security/cve/CVE-2022-50635.html * https://www.suse.com/security/cve/CVE-2022-50636.html * https://www.suse.com/security/cve/CVE-2022-50638.html * https://www.suse.com/security/cve/CVE-2022-50640.html * https://www.suse.com/security/cve/CVE-2022-50641.html * https://www.suse.com/security/cve/CVE-2022-50643.html * https://www.suse.com/security/cve/CVE-2022-50644.html * https://www.suse.com/security/cve/CVE-2022-50646.html * https://www.suse.com/security/cve/CVE-2022-50649.html * https://www.suse.com/security/cve/CVE-2022-50652.html * https://www.suse.com/security/cve/CVE-2022-50653.html * https://www.suse.com/security/cve/CVE-2022-50656.html * https://www.suse.com/security/cve/CVE-2022-50658.html * https://www.suse.com/security/cve/CVE-2022-50660.html * https://www.suse.com/security/cve/CVE-2022-50661.html * https://www.suse.com/security/cve/CVE-2022-50662.html * https://www.suse.com/security/cve/CVE-2022-50664.html * https://www.suse.com/security/cve/CVE-2022-50665.html * https://www.suse.com/security/cve/CVE-2022-50666.html * https://www.suse.com/security/cve/CVE-2022-50667.html * https://www.suse.com/security/cve/CVE-2022-50668.html * https://www.suse.com/security/cve/CVE-2022-50669.html * https://www.suse.com/security/cve/CVE-2022-50670.html * https://www.suse.com/security/cve/CVE-2022-50671.html * https://www.suse.com/security/cve/CVE-2022-50672.html * https://www.suse.com/security/cve/CVE-2022-50673.html * https://www.suse.com/security/cve/CVE-2022-50675.html * https://www.suse.com/security/cve/CVE-2022-50677.html * https://www.suse.com/security/cve/CVE-2022-50678.html * https://www.suse.com/security/cve/CVE-2022-50679.html * https://www.suse.com/security/cve/CVE-2022-50698.html * https://www.suse.com/security/cve/CVE-2022-50699.html * https://www.suse.com/security/cve/CVE-2022-50700.html * https://www.suse.com/security/cve/CVE-2022-50701.html * https://www.suse.com/security/cve/CVE-2022-50702.html * https://www.suse.com/security/cve/CVE-2022-50703.html * https://www.suse.com/security/cve/CVE-2022-50704.html * https://www.suse.com/security/cve/CVE-2022-50705.html * https://www.suse.com/security/cve/CVE-2022-50709.html * https://www.suse.com/security/cve/CVE-2022-50710.html * https://www.suse.com/security/cve/CVE-2022-50712.html * https://www.suse.com/security/cve/CVE-2022-50714.html * https://www.suse.com/security/cve/CVE-2022-50715.html * https://www.suse.com/security/cve/CVE-2022-50716.html * https://www.suse.com/security/cve/CVE-2022-50717.html * https://www.suse.com/security/cve/CVE-2022-50718.html * https://www.suse.com/security/cve/CVE-2022-50719.html * https://www.suse.com/security/cve/CVE-2022-50722.html * https://www.suse.com/security/cve/CVE-2022-50723.html * https://www.suse.com/security/cve/CVE-2022-50724.html * https://www.suse.com/security/cve/CVE-2022-50726.html * https://www.suse.com/security/cve/CVE-2022-50727.html * https://www.suse.com/security/cve/CVE-2022-50728.html * https://www.suse.com/security/cve/CVE-2022-50730.html * https://www.suse.com/security/cve/CVE-2022-50731.html * https://www.suse.com/security/cve/CVE-2022-50732.html * https://www.suse.com/security/cve/CVE-2022-50733.html * https://www.suse.com/security/cve/CVE-2022-50735.html * https://www.suse.com/security/cve/CVE-2022-50736.html * https://www.suse.com/security/cve/CVE-2022-50738.html * https://www.suse.com/security/cve/CVE-2022-50740.html * https://www.suse.com/security/cve/CVE-2022-50742.html * https://www.suse.com/security/cve/CVE-2022-50744.html * https://www.suse.com/security/cve/CVE-2022-50745.html * https://www.suse.com/security/cve/CVE-2022-50747.html * https://www.suse.com/security/cve/CVE-2022-50749.html * https://www.suse.com/security/cve/CVE-2022-50750.html * https://www.suse.com/security/cve/CVE-2022-50751.html * https://www.suse.com/security/cve/CVE-2022-50752.html * https://www.suse.com/security/cve/CVE-2022-50754.html * https://www.suse.com/security/cve/CVE-2022-50755.html * https://www.suse.com/security/cve/CVE-2022-50756.html * https://www.suse.com/security/cve/CVE-2022-50757.html * https://www.suse.com/security/cve/CVE-2022-50758.html * https://www.suse.com/security/cve/CVE-2022-50760.html * https://www.suse.com/security/cve/CVE-2022-50761.html * https://www.suse.com/security/cve/CVE-2022-50763.html * https://www.suse.com/security/cve/CVE-2022-50767.html * https://www.suse.com/security/cve/CVE-2022-50768.html * https://www.suse.com/security/cve/CVE-2022-50769.html * https://www.suse.com/security/cve/CVE-2022-50770.html * https://www.suse.com/security/cve/CVE-2022-50773.html * https://www.suse.com/security/cve/CVE-2022-50774.html * https://www.suse.com/security/cve/CVE-2022-50776.html * https://www.suse.com/security/cve/CVE-2022-50777.html * https://www.suse.com/security/cve/CVE-2022-50779.html * https://www.suse.com/security/cve/CVE-2022-50781.html * https://www.suse.com/security/cve/CVE-2022-50782.html * https://www.suse.com/security/cve/CVE-2022-50809.html * https://www.suse.com/security/cve/CVE-2022-50814.html * https://www.suse.com/security/cve/CVE-2022-50818.html * https://www.suse.com/security/cve/CVE-2022-50819.html * https://www.suse.com/security/cve/CVE-2022-50821.html * https://www.suse.com/security/cve/CVE-2022-50822.html * https://www.suse.com/security/cve/CVE-2022-50823.html * https://www.suse.com/security/cve/CVE-2022-50824.html * https://www.suse.com/security/cve/CVE-2022-50826.html * https://www.suse.com/security/cve/CVE-2022-50827.html * https://www.suse.com/security/cve/CVE-2022-50828.html * https://www.suse.com/security/cve/CVE-2022-50829.html * https://www.suse.com/security/cve/CVE-2022-50830.html * https://www.suse.com/security/cve/CVE-2022-50832.html * https://www.suse.com/security/cve/CVE-2022-50833.html * https://www.suse.com/security/cve/CVE-2022-50834.html * https://www.suse.com/security/cve/CVE-2022-50835.html * https://www.suse.com/security/cve/CVE-2022-50836.html * https://www.suse.com/security/cve/CVE-2022-50838.html * https://www.suse.com/security/cve/CVE-2022-50839.html * https://www.suse.com/security/cve/CVE-2022-50840.html * https://www.suse.com/security/cve/CVE-2022-50842.html * https://www.suse.com/security/cve/CVE-2022-50843.html * https://www.suse.com/security/cve/CVE-2022-50844.html * https://www.suse.com/security/cve/CVE-2022-50845.html * https://www.suse.com/security/cve/CVE-2022-50846.html * https://www.suse.com/security/cve/CVE-2022-50847.html * https://www.suse.com/security/cve/CVE-2022-50848.html * https://www.suse.com/security/cve/CVE-2022-50849.html * https://www.suse.com/security/cve/CVE-2022-50850.html * https://www.suse.com/security/cve/CVE-2022-50851.html * https://www.suse.com/security/cve/CVE-2022-50853.html * https://www.suse.com/security/cve/CVE-2022-50856.html * https://www.suse.com/security/cve/CVE-2022-50858.html * https://www.suse.com/security/cve/CVE-2022-50859.html * https://www.suse.com/security/cve/CVE-2022-50860.html * https://www.suse.com/security/cve/CVE-2022-50861.html * https://www.suse.com/security/cve/CVE-2022-50862.html * https://www.suse.com/security/cve/CVE-2022-50864.html * https://www.suse.com/security/cve/CVE-2022-50866.html * https://www.suse.com/security/cve/CVE-2022-50867.html * https://www.suse.com/security/cve/CVE-2022-50868.html * https://www.suse.com/security/cve/CVE-2022-50870.html * https://www.suse.com/security/cve/CVE-2022-50872.html * https://www.suse.com/security/cve/CVE-2022-50873.html * https://www.suse.com/security/cve/CVE-2022-50876.html * https://www.suse.com/security/cve/CVE-2022-50878.html * https://www.suse.com/security/cve/CVE-2022-50880.html * https://www.suse.com/security/cve/CVE-2022-50881.html * https://www.suse.com/security/cve/CVE-2022-50882.html * https://www.suse.com/security/cve/CVE-2022-50883.html * https://www.suse.com/security/cve/CVE-2022-50884.html * https://www.suse.com/security/cve/CVE-2022-50885.html * https://www.suse.com/security/cve/CVE-2022-50886.html * https://www.suse.com/security/cve/CVE-2022-50887.html * https://www.suse.com/security/cve/CVE-2022-50888.html * https://www.suse.com/security/cve/CVE-2022-50889.html * https://www.suse.com/security/cve/CVE-2023-23559.html * https://www.suse.com/security/cve/CVE-2023-53254.html * https://www.suse.com/security/cve/CVE-2023-53743.html * https://www.suse.com/security/cve/CVE-2023-53744.html * https://www.suse.com/security/cve/CVE-2023-53746.html * https://www.suse.com/security/cve/CVE-2023-53747.html * https://www.suse.com/security/cve/CVE-2023-53751.html * https://www.suse.com/security/cve/CVE-2023-53753.html * https://www.suse.com/security/cve/CVE-2023-53754.html * https://www.suse.com/security/cve/CVE-2023-53755.html * https://www.suse.com/security/cve/CVE-2023-53761.html * https://www.suse.com/security/cve/CVE-2023-53766.html * https://www.suse.com/security/cve/CVE-2023-53769.html * https://www.suse.com/security/cve/CVE-2023-53780.html * https://www.suse.com/security/cve/CVE-2023-53781.html * https://www.suse.com/security/cve/CVE-2023-53783.html * https://www.suse.com/security/cve/CVE-2023-53786.html * https://www.suse.com/security/cve/CVE-2023-53788.html * https://www.suse.com/security/cve/CVE-2023-53792.html * https://www.suse.com/security/cve/CVE-2023-53794.html * https://www.suse.com/security/cve/CVE-2023-53801.html * https://www.suse.com/security/cve/CVE-2023-53802.html * https://www.suse.com/security/cve/CVE-2023-53803.html * https://www.suse.com/security/cve/CVE-2023-53804.html * https://www.suse.com/security/cve/CVE-2023-53806.html * https://www.suse.com/security/cve/CVE-2023-53808.html * https://www.suse.com/security/cve/CVE-2023-53811.html * https://www.suse.com/security/cve/CVE-2023-53814.html * https://www.suse.com/security/cve/CVE-2023-53816.html * https://www.suse.com/security/cve/CVE-2023-53818.html * https://www.suse.com/security/cve/CVE-2023-53819.html * https://www.suse.com/security/cve/CVE-2023-53820.html * https://www.suse.com/security/cve/CVE-2023-53827.html * https://www.suse.com/security/cve/CVE-2023-53828.html * https://www.suse.com/security/cve/CVE-2023-53830.html * https://www.suse.com/security/cve/CVE-2023-53832.html * https://www.suse.com/security/cve/CVE-2023-53833.html * https://www.suse.com/security/cve/CVE-2023-53834.html * https://www.suse.com/security/cve/CVE-2023-53837.html * https://www.suse.com/security/cve/CVE-2023-53840.html * https://www.suse.com/security/cve/CVE-2023-53842.html * https://www.suse.com/security/cve/CVE-2023-53844.html * https://www.suse.com/security/cve/CVE-2023-53845.html * https://www.suse.com/security/cve/CVE-2023-53847.html * https://www.suse.com/security/cve/CVE-2023-53848.html * https://www.suse.com/security/cve/CVE-2023-53849.html * https://www.suse.com/security/cve/CVE-2023-53850.html * https://www.suse.com/security/cve/CVE-2023-53852.html * https://www.suse.com/security/cve/CVE-2023-53858.html * https://www.suse.com/security/cve/CVE-2023-53860.html * https://www.suse.com/security/cve/CVE-2023-53862.html * https://www.suse.com/security/cve/CVE-2023-53864.html * https://www.suse.com/security/cve/CVE-2023-53866.html * https://www.suse.com/security/cve/CVE-2023-53989.html * https://www.suse.com/security/cve/CVE-2023-53990.html * https://www.suse.com/security/cve/CVE-2023-53991.html * https://www.suse.com/security/cve/CVE-2023-53996.html * https://www.suse.com/security/cve/CVE-2023-53998.html * https://www.suse.com/security/cve/CVE-2023-54001.html * https://www.suse.com/security/cve/CVE-2023-54003.html * https://www.suse.com/security/cve/CVE-2023-54007.html * https://www.suse.com/security/cve/CVE-2023-54009.html * https://www.suse.com/security/cve/CVE-2023-54010.html * https://www.suse.com/security/cve/CVE-2023-54014.html * https://www.suse.com/security/cve/CVE-2023-54015.html * https://www.suse.com/security/cve/CVE-2023-54017.html * https://www.suse.com/security/cve/CVE-2023-54018.html * https://www.suse.com/security/cve/CVE-2023-54019.html * https://www.suse.com/security/cve/CVE-2023-54020.html * https://www.suse.com/security/cve/CVE-2023-54021.html * https://www.suse.com/security/cve/CVE-2023-54024.html * https://www.suse.com/security/cve/CVE-2023-54025.html * https://www.suse.com/security/cve/CVE-2023-54026.html * https://www.suse.com/security/cve/CVE-2023-54028.html * https://www.suse.com/security/cve/CVE-2023-54036.html * https://www.suse.com/security/cve/CVE-2023-54039.html * https://www.suse.com/security/cve/CVE-2023-54040.html * https://www.suse.com/security/cve/CVE-2023-54041.html * https://www.suse.com/security/cve/CVE-2023-54042.html * https://www.suse.com/security/cve/CVE-2023-54044.html * https://www.suse.com/security/cve/CVE-2023-54045.html * https://www.suse.com/security/cve/CVE-2023-54046.html * https://www.suse.com/security/cve/CVE-2023-54047.html * https://www.suse.com/security/cve/CVE-2023-54048.html * https://www.suse.com/security/cve/CVE-2023-54049.html * https://www.suse.com/security/cve/CVE-2023-54050.html * https://www.suse.com/security/cve/CVE-2023-54051.html * https://www.suse.com/security/cve/CVE-2023-54053.html * https://www.suse.com/security/cve/CVE-2023-54055.html * https://www.suse.com/security/cve/CVE-2023-54057.html * https://www.suse.com/security/cve/CVE-2023-54058.html * https://www.suse.com/security/cve/CVE-2023-54064.html * https://www.suse.com/security/cve/CVE-2023-54070.html * https://www.suse.com/security/cve/CVE-2023-54072.html * https://www.suse.com/security/cve/CVE-2023-54074.html * https://www.suse.com/security/cve/CVE-2023-54076.html * https://www.suse.com/security/cve/CVE-2023-54078.html * https://www.suse.com/security/cve/CVE-2023-54079.html * https://www.suse.com/security/cve/CVE-2023-54083.html * https://www.suse.com/security/cve/CVE-2023-54084.html * https://www.suse.com/security/cve/CVE-2023-54090.html * https://www.suse.com/security/cve/CVE-2023-54091.html * https://www.suse.com/security/cve/CVE-2023-54092.html * https://www.suse.com/security/cve/CVE-2023-54095.html * https://www.suse.com/security/cve/CVE-2023-54096.html * https://www.suse.com/security/cve/CVE-2023-54097.html * https://www.suse.com/security/cve/CVE-2023-54098.html * https://www.suse.com/security/cve/CVE-2023-54100.html * https://www.suse.com/security/cve/CVE-2023-54102.html * https://www.suse.com/security/cve/CVE-2023-54104.html * https://www.suse.com/security/cve/CVE-2023-54106.html * https://www.suse.com/security/cve/CVE-2023-54107.html * https://www.suse.com/security/cve/CVE-2023-54108.html * https://www.suse.com/security/cve/CVE-2023-54110.html * https://www.suse.com/security/cve/CVE-2023-54111.html * https://www.suse.com/security/cve/CVE-2023-54114.html * https://www.suse.com/security/cve/CVE-2023-54115.html * https://www.suse.com/security/cve/CVE-2023-54116.html * https://www.suse.com/security/cve/CVE-2023-54118.html * https://www.suse.com/security/cve/CVE-2023-54119.html * https://www.suse.com/security/cve/CVE-2023-54120.html * https://www.suse.com/security/cve/CVE-2023-54122.html * https://www.suse.com/security/cve/CVE-2023-54123.html * https://www.suse.com/security/cve/CVE-2023-54126.html * https://www.suse.com/security/cve/CVE-2023-54127.html * https://www.suse.com/security/cve/CVE-2023-54128.html * https://www.suse.com/security/cve/CVE-2023-54130.html * https://www.suse.com/security/cve/CVE-2023-54131.html * https://www.suse.com/security/cve/CVE-2023-54132.html * https://www.suse.com/security/cve/CVE-2023-54134.html * https://www.suse.com/security/cve/CVE-2023-54136.html * https://www.suse.com/security/cve/CVE-2023-54138.html * https://www.suse.com/security/cve/CVE-2023-54140.html * https://www.suse.com/security/cve/CVE-2023-54144.html * https://www.suse.com/security/cve/CVE-2023-54146.html * https://www.suse.com/security/cve/CVE-2023-54148.html * https://www.suse.com/security/cve/CVE-2023-54150.html * https://www.suse.com/security/cve/CVE-2023-54153.html * https://www.suse.com/security/cve/CVE-2023-54156.html * https://www.suse.com/security/cve/CVE-2023-54159.html * https://www.suse.com/security/cve/CVE-2023-54164.html * https://www.suse.com/security/cve/CVE-2023-54166.html * https://www.suse.com/security/cve/CVE-2023-54168.html * https://www.suse.com/security/cve/CVE-2023-54169.html * https://www.suse.com/security/cve/CVE-2023-54170.html * https://www.suse.com/security/cve/CVE-2023-54171.html * https://www.suse.com/security/cve/CVE-2023-54173.html * https://www.suse.com/security/cve/CVE-2023-54175.html * https://www.suse.com/security/cve/CVE-2023-54177.html * https://www.suse.com/security/cve/CVE-2023-54179.html * https://www.suse.com/security/cve/CVE-2023-54183.html * https://www.suse.com/security/cve/CVE-2023-54186.html * https://www.suse.com/security/cve/CVE-2023-54189.html * https://www.suse.com/security/cve/CVE-2023-54190.html * https://www.suse.com/security/cve/CVE-2023-54194.html * https://www.suse.com/security/cve/CVE-2023-54197.html * https://www.suse.com/security/cve/CVE-2023-54198.html * https://www.suse.com/security/cve/CVE-2023-54199.html * https://www.suse.com/security/cve/CVE-2023-54201.html * https://www.suse.com/security/cve/CVE-2023-54202.html * https://www.suse.com/security/cve/CVE-2023-54205.html * https://www.suse.com/security/cve/CVE-2023-54208.html * https://www.suse.com/security/cve/CVE-2023-54210.html * https://www.suse.com/security/cve/CVE-2023-54211.html * https://www.suse.com/security/cve/CVE-2023-54213.html * https://www.suse.com/security/cve/CVE-2023-54214.html * https://www.suse.com/security/cve/CVE-2023-54219.html * https://www.suse.com/security/cve/CVE-2023-54226.html * https://www.suse.com/security/cve/CVE-2023-54229.html * https://www.suse.com/security/cve/CVE-2023-54230.html * https://www.suse.com/security/cve/CVE-2023-54234.html * https://www.suse.com/security/cve/CVE-2023-54236.html * https://www.suse.com/security/cve/CVE-2023-54238.html * https://www.suse.com/security/cve/CVE-2023-54242.html * https://www.suse.com/security/cve/CVE-2023-54244.html * https://www.suse.com/security/cve/CVE-2023-54245.html * https://www.suse.com/security/cve/CVE-2023-54251.html * https://www.suse.com/security/cve/CVE-2023-54252.html * https://www.suse.com/security/cve/CVE-2023-54254.html * https://www.suse.com/security/cve/CVE-2023-54260.html * https://www.suse.com/security/cve/CVE-2023-54262.html * https://www.suse.com/security/cve/CVE-2023-54264.html * https://www.suse.com/security/cve/CVE-2023-54266.html * https://www.suse.com/security/cve/CVE-2023-54267.html * https://www.suse.com/security/cve/CVE-2023-54269.html * https://www.suse.com/security/cve/CVE-2023-54270.html * https://www.suse.com/security/cve/CVE-2023-54271.html * https://www.suse.com/security/cve/CVE-2023-54274.html * https://www.suse.com/security/cve/CVE-2023-54275.html * https://www.suse.com/security/cve/CVE-2023-54277.html * https://www.suse.com/security/cve/CVE-2023-54280.html * https://www.suse.com/security/cve/CVE-2023-54284.html * https://www.suse.com/security/cve/CVE-2023-54286.html * https://www.suse.com/security/cve/CVE-2023-54287.html * https://www.suse.com/security/cve/CVE-2023-54289.html * https://www.suse.com/security/cve/CVE-2023-54292.html * https://www.suse.com/security/cve/CVE-2023-54293.html * https://www.suse.com/security/cve/CVE-2023-54294.html * https://www.suse.com/security/cve/CVE-2023-54295.html * https://www.suse.com/security/cve/CVE-2023-54298.html * https://www.suse.com/security/cve/CVE-2023-54299.html * https://www.suse.com/security/cve/CVE-2023-54300.html * https://www.suse.com/security/cve/CVE-2023-54301.html * https://www.suse.com/security/cve/CVE-2023-54302.html * https://www.suse.com/security/cve/CVE-2023-54304.html * https://www.suse.com/security/cve/CVE-2023-54305.html * https://www.suse.com/security/cve/CVE-2023-54309.html * https://www.suse.com/security/cve/CVE-2023-54311.html * https://www.suse.com/security/cve/CVE-2023-54315.html * https://www.suse.com/security/cve/CVE-2023-54317.html * https://www.suse.com/security/cve/CVE-2023-54319.html * https://www.suse.com/security/cve/CVE-2023-54320.html * https://www.suse.com/security/cve/CVE-2023-54321.html * https://www.suse.com/security/cve/CVE-2023-54322.html * https://www.suse.com/security/cve/CVE-2023-54325.html * https://www.suse.com/security/cve/CVE-2023-54326.html * https://www.suse.com/security/cve/CVE-2024-36933.html * https://www.suse.com/security/cve/CVE-2024-53093.html * https://www.suse.com/security/cve/CVE-2024-56590.html * https://www.suse.com/security/cve/CVE-2025-39977.html * https://www.suse.com/security/cve/CVE-2025-40019.html * https://www.suse.com/security/cve/CVE-2025-40139.html * https://www.suse.com/security/cve/CVE-2025-40215.html * https://www.suse.com/security/cve/CVE-2025-40220.html * https://www.suse.com/security/cve/CVE-2025-40233.html * https://www.suse.com/security/cve/CVE-2025-40256.html * https://www.suse.com/security/cve/CVE-2025-40258.html * https://www.suse.com/security/cve/CVE-2025-40277.html * https://www.suse.com/security/cve/CVE-2025-40280.html * https://www.suse.com/security/cve/CVE-2025-40331.html * https://www.suse.com/security/cve/CVE-2025-68218.html * https://www.suse.com/security/cve/CVE-2025-68732.html * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1193629 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1196823 * https://bugzilla.suse.com/show_bug.cgi?id=1204957 * https://bugzilla.suse.com/show_bug.cgi?id=1205567 * https://bugzilla.suse.com/show_bug.cgi?id=1206451 * https://bugzilla.suse.com/show_bug.cgi?id=1206843 * https://bugzilla.suse.com/show_bug.cgi?id=1206889 * https://bugzilla.suse.com/show_bug.cgi?id=1207051 * https://bugzilla.suse.com/show_bug.cgi?id=1207088 * https://bugzilla.suse.com/show_bug.cgi?id=1207315 * https://bugzilla.suse.com/show_bug.cgi?id=1207611 * https://bugzilla.suse.com/show_bug.cgi?id=1207620 * https://bugzilla.suse.com/show_bug.cgi?id=1207622 * https://bugzilla.suse.com/show_bug.cgi?id=1207636 * https://bugzilla.suse.com/show_bug.cgi?id=1207644 * https://bugzilla.suse.com/show_bug.cgi?id=1207646 * https://bugzilla.suse.com/show_bug.cgi?id=1207652 * https://bugzilla.suse.com/show_bug.cgi?id=1207653 * https://bugzilla.suse.com/show_bug.cgi?id=1208570 * https://bugzilla.suse.com/show_bug.cgi?id=1208758 * https://bugzilla.suse.com/show_bug.cgi?id=1209799 * https://bugzilla.suse.com/show_bug.cgi?id=1209980 * https://bugzilla.suse.com/show_bug.cgi?id=1210644 * https://bugzilla.suse.com/show_bug.cgi?id=1210817 * https://bugzilla.suse.com/show_bug.cgi?id=1210943 * https://bugzilla.suse.com/show_bug.cgi?id=1211690 * https://bugzilla.suse.com/show_bug.cgi?id=1213025 * https://bugzilla.suse.com/show_bug.cgi?id=1213032 * https://bugzilla.suse.com/show_bug.cgi?id=1213093 * https://bugzilla.suse.com/show_bug.cgi?id=1213105 * https://bugzilla.suse.com/show_bug.cgi?id=1213110 * https://bugzilla.suse.com/show_bug.cgi?id=1213111 * https://bugzilla.suse.com/show_bug.cgi?id=1213653 * https://bugzilla.suse.com/show_bug.cgi?id=1213747 * https://bugzilla.suse.com/show_bug.cgi?id=1213867 * https://bugzilla.suse.com/show_bug.cgi?id=1214635 * https://bugzilla.suse.com/show_bug.cgi?id=1214940 * https://bugzilla.suse.com/show_bug.cgi?id=1214962 * https://bugzilla.suse.com/show_bug.cgi?id=1214986 * https://bugzilla.suse.com/show_bug.cgi?id=1214990 * https://bugzilla.suse.com/show_bug.cgi?id=1216062 * https://bugzilla.suse.com/show_bug.cgi?id=1224573 * https://bugzilla.suse.com/show_bug.cgi?id=1225832 * https://bugzilla.suse.com/show_bug.cgi?id=1226797 * https://bugzilla.suse.com/show_bug.cgi?id=1226846 * https://bugzilla.suse.com/show_bug.cgi?id=1228015 * https://bugzilla.suse.com/show_bug.cgi?id=1233640 * https://bugzilla.suse.com/show_bug.cgi?id=1235038 * https://bugzilla.suse.com/show_bug.cgi?id=1237563 * https://bugzilla.suse.com/show_bug.cgi?id=1249871 * https://bugzilla.suse.com/show_bug.cgi?id=1252046 * https://bugzilla.suse.com/show_bug.cgi?id=1252678 * https://bugzilla.suse.com/show_bug.cgi?id=1253409 * https://bugzilla.suse.com/show_bug.cgi?id=1254392 * https://bugzilla.suse.com/show_bug.cgi?id=1254520 * https://bugzilla.suse.com/show_bug.cgi?id=1254559 * https://bugzilla.suse.com/show_bug.cgi?id=1254562 * https://bugzilla.suse.com/show_bug.cgi?id=1254572 * https://bugzilla.suse.com/show_bug.cgi?id=1254578 * https://bugzilla.suse.com/show_bug.cgi?id=1254580 * https://bugzilla.suse.com/show_bug.cgi?id=1254592 * https://bugzilla.suse.com/show_bug.cgi?id=1254601 * https://bugzilla.suse.com/show_bug.cgi?id=1254608 * https://bugzilla.suse.com/show_bug.cgi?id=1254609 * https://bugzilla.suse.com/show_bug.cgi?id=1254614 * https://bugzilla.suse.com/show_bug.cgi?id=1254615 * https://bugzilla.suse.com/show_bug.cgi?id=1254617 * https://bugzilla.suse.com/show_bug.cgi?id=1254623 * https://bugzilla.suse.com/show_bug.cgi?id=1254625 * https://bugzilla.suse.com/show_bug.cgi?id=1254626 * https://bugzilla.suse.com/show_bug.cgi?id=1254631 * https://bugzilla.suse.com/show_bug.cgi?id=1254632 * https://bugzilla.suse.com/show_bug.cgi?id=1254634 * https://bugzilla.suse.com/show_bug.cgi?id=1254644 * https://bugzilla.suse.com/show_bug.cgi?id=1254645 * https://bugzilla.suse.com/show_bug.cgi?id=1254649 * https://bugzilla.suse.com/show_bug.cgi?id=1254651 * https://bugzilla.suse.com/show_bug.cgi?id=1254653 * https://bugzilla.suse.com/show_bug.cgi?id=1254656 * https://bugzilla.suse.com/show_bug.cgi?id=1254658 * https://bugzilla.suse.com/show_bug.cgi?id=1254660 * https://bugzilla.suse.com/show_bug.cgi?id=1254664 * https://bugzilla.suse.com/show_bug.cgi?id=1254671 * https://bugzilla.suse.com/show_bug.cgi?id=1254674 * https://bugzilla.suse.com/show_bug.cgi?id=1254676 * https://bugzilla.suse.com/show_bug.cgi?id=1254677 * https://bugzilla.suse.com/show_bug.cgi?id=1254681 * https://bugzilla.suse.com/show_bug.cgi?id=1254684 * https://bugzilla.suse.com/show_bug.cgi?id=1254685 * https://bugzilla.suse.com/show_bug.cgi?id=1254686 * https://bugzilla.suse.com/show_bug.cgi?id=1254690 * https://bugzilla.suse.com/show_bug.cgi?id=1254692 * https://bugzilla.suse.com/show_bug.cgi?id=1254694 * https://bugzilla.suse.com/show_bug.cgi?id=1254696 * https://bugzilla.suse.com/show_bug.cgi?id=1254698 * https://bugzilla.suse.com/show_bug.cgi?id=1254699 * https://bugzilla.suse.com/show_bug.cgi?id=1254704 * https://bugzilla.suse.com/show_bug.cgi?id=1254706 * https://bugzilla.suse.com/show_bug.cgi?id=1254709 * https://bugzilla.suse.com/show_bug.cgi?id=1254710 * https://bugzilla.suse.com/show_bug.cgi?id=1254711 * https://bugzilla.suse.com/show_bug.cgi?id=1254712 * https://bugzilla.suse.com/show_bug.cgi?id=1254713 * https://bugzilla.suse.com/show_bug.cgi?id=1254714 * https://bugzilla.suse.com/show_bug.cgi?id=1254716 * https://bugzilla.suse.com/show_bug.cgi?id=1254723 * https://bugzilla.suse.com/show_bug.cgi?id=1254725 * https://bugzilla.suse.com/show_bug.cgi?id=1254728 * https://bugzilla.suse.com/show_bug.cgi?id=1254729 * https://bugzilla.suse.com/show_bug.cgi?id=1254743 * https://bugzilla.suse.com/show_bug.cgi?id=1254745 * https://bugzilla.suse.com/show_bug.cgi?id=1254751 * https://bugzilla.suse.com/show_bug.cgi?id=1254753 * https://bugzilla.suse.com/show_bug.cgi?id=1254754 * https://bugzilla.suse.com/show_bug.cgi?id=1254756 * https://bugzilla.suse.com/show_bug.cgi?id=1254759 * https://bugzilla.suse.com/show_bug.cgi?id=1254763 * https://bugzilla.suse.com/show_bug.cgi?id=1254775 * https://bugzilla.suse.com/show_bug.cgi?id=1254780 * https://bugzilla.suse.com/show_bug.cgi?id=1254781 * https://bugzilla.suse.com/show_bug.cgi?id=1254782 * https://bugzilla.suse.com/show_bug.cgi?id=1254783 * https://bugzilla.suse.com/show_bug.cgi?id=1254785 * https://bugzilla.suse.com/show_bug.cgi?id=1254786 * https://bugzilla.suse.com/show_bug.cgi?id=1254788 * https://bugzilla.suse.com/show_bug.cgi?id=1254789 * https://bugzilla.suse.com/show_bug.cgi?id=1254792 * https://bugzilla.suse.com/show_bug.cgi?id=1254813 * https://bugzilla.suse.com/show_bug.cgi?id=1254843 * https://bugzilla.suse.com/show_bug.cgi?id=1254847 * https://bugzilla.suse.com/show_bug.cgi?id=1254851 * https://bugzilla.suse.com/show_bug.cgi?id=1254894 * https://bugzilla.suse.com/show_bug.cgi?id=1254902 * https://bugzilla.suse.com/show_bug.cgi?id=1254910 * https://bugzilla.suse.com/show_bug.cgi?id=1254911 * https://bugzilla.suse.com/show_bug.cgi?id=1254915 * https://bugzilla.suse.com/show_bug.cgi?id=1254916 * https://bugzilla.suse.com/show_bug.cgi?id=1254917 * https://bugzilla.suse.com/show_bug.cgi?id=1254920 * https://bugzilla.suse.com/show_bug.cgi?id=1254922 * https://bugzilla.suse.com/show_bug.cgi?id=1254958 * https://bugzilla.suse.com/show_bug.cgi?id=1254959 * https://bugzilla.suse.com/show_bug.cgi?id=1254974 * https://bugzilla.suse.com/show_bug.cgi?id=1254979 * https://bugzilla.suse.com/show_bug.cgi?id=1254986 * https://bugzilla.suse.com/show_bug.cgi?id=1254994 * https://bugzilla.suse.com/show_bug.cgi?id=1255002 * https://bugzilla.suse.com/show_bug.cgi?id=1255005 * https://bugzilla.suse.com/show_bug.cgi?id=1255007 * https://bugzilla.suse.com/show_bug.cgi?id=1255049 * https://bugzilla.suse.com/show_bug.cgi?id=1255060 * https://bugzilla.suse.com/show_bug.cgi?id=1255107 * https://bugzilla.suse.com/show_bug.cgi?id=1255163 * https://bugzilla.suse.com/show_bug.cgi?id=1255165 * https://bugzilla.suse.com/show_bug.cgi?id=1255245 * https://bugzilla.suse.com/show_bug.cgi?id=1255467 * https://bugzilla.suse.com/show_bug.cgi?id=1255469 * https://bugzilla.suse.com/show_bug.cgi?id=1255521 * https://bugzilla.suse.com/show_bug.cgi?id=1255528 * https://bugzilla.suse.com/show_bug.cgi?id=1255532 * https://bugzilla.suse.com/show_bug.cgi?id=1255546 * https://bugzilla.suse.com/show_bug.cgi?id=1255549 * https://bugzilla.suse.com/show_bug.cgi?id=1255554 * https://bugzilla.suse.com/show_bug.cgi?id=1255555 * https://bugzilla.suse.com/show_bug.cgi?id=1255558 * https://bugzilla.suse.com/show_bug.cgi?id=1255560 * https://bugzilla.suse.com/show_bug.cgi?id=1255561 * https://bugzilla.suse.com/show_bug.cgi?id=1255562 * https://bugzilla.suse.com/show_bug.cgi?id=1255565 * https://bugzilla.suse.com/show_bug.cgi?id=1255574 * https://bugzilla.suse.com/show_bug.cgi?id=1255576 * https://bugzilla.suse.com/show_bug.cgi?id=1255578 * https://bugzilla.suse.com/show_bug.cgi?id=1255582 * https://bugzilla.suse.com/show_bug.cgi?id=1255596 * https://bugzilla.suse.com/show_bug.cgi?id=1255600 * https://bugzilla.suse.com/show_bug.cgi?id=1255605 * https://bugzilla.suse.com/show_bug.cgi?id=1255607 * https://bugzilla.suse.com/show_bug.cgi?id=1255608 * https://bugzilla.suse.com/show_bug.cgi?id=1255609 * https://bugzilla.suse.com/show_bug.cgi?id=1255618 * https://bugzilla.suse.com/show_bug.cgi?id=1255619 * https://bugzilla.suse.com/show_bug.cgi?id=1255620 * https://bugzilla.suse.com/show_bug.cgi?id=1255623 * https://bugzilla.suse.com/show_bug.cgi?id=1255624 * https://bugzilla.suse.com/show_bug.cgi?id=1255626 * https://bugzilla.suse.com/show_bug.cgi?id=1255627 * https://bugzilla.suse.com/show_bug.cgi?id=1255628 * https://bugzilla.suse.com/show_bug.cgi?id=1255635 * https://bugzilla.suse.com/show_bug.cgi?id=1255636 * https://bugzilla.suse.com/show_bug.cgi?id=1255688 * https://bugzilla.suse.com/show_bug.cgi?id=1255690 * https://bugzilla.suse.com/show_bug.cgi?id=1255697 * https://bugzilla.suse.com/show_bug.cgi?id=1255702 * https://bugzilla.suse.com/show_bug.cgi?id=1255704 * https://bugzilla.suse.com/show_bug.cgi?id=1255745 * https://bugzilla.suse.com/show_bug.cgi?id=1255747 * https://bugzilla.suse.com/show_bug.cgi?id=1255749 * https://bugzilla.suse.com/show_bug.cgi?id=1255750 * https://bugzilla.suse.com/show_bug.cgi?id=1255757 * https://bugzilla.suse.com/show_bug.cgi?id=1255758 * https://bugzilla.suse.com/show_bug.cgi?id=1255760 * https://bugzilla.suse.com/show_bug.cgi?id=1255761 * https://bugzilla.suse.com/show_bug.cgi?id=1255762 * https://bugzilla.suse.com/show_bug.cgi?id=1255763 * https://bugzilla.suse.com/show_bug.cgi?id=1255769 * https://bugzilla.suse.com/show_bug.cgi?id=1255771 * https://bugzilla.suse.com/show_bug.cgi?id=1255773 * https://bugzilla.suse.com/show_bug.cgi?id=1255780 * https://bugzilla.suse.com/show_bug.cgi?id=1255786 * https://bugzilla.suse.com/show_bug.cgi?id=1255787 * https://bugzilla.suse.com/show_bug.cgi?id=1255789 * https://bugzilla.suse.com/show_bug.cgi?id=1255790 * https://bugzilla.suse.com/show_bug.cgi?id=1255791 * https://bugzilla.suse.com/show_bug.cgi?id=1255792 * https://bugzilla.suse.com/show_bug.cgi?id=1255796 * https://bugzilla.suse.com/show_bug.cgi?id=1255797 * https://bugzilla.suse.com/show_bug.cgi?id=1255800 * https://bugzilla.suse.com/show_bug.cgi?id=1255801 * https://bugzilla.suse.com/show_bug.cgi?id=1255802 * https://bugzilla.suse.com/show_bug.cgi?id=1255803 * https://bugzilla.suse.com/show_bug.cgi?id=1255804 * https://bugzilla.suse.com/show_bug.cgi?id=1255806 * https://bugzilla.suse.com/show_bug.cgi?id=1255808 * https://bugzilla.suse.com/show_bug.cgi?id=1255819 * https://bugzilla.suse.com/show_bug.cgi?id=1255839 * https://bugzilla.suse.com/show_bug.cgi?id=1255841 * https://bugzilla.suse.com/show_bug.cgi?id=1255843 * https://bugzilla.suse.com/show_bug.cgi?id=1255844 * https://bugzilla.suse.com/show_bug.cgi?id=1255872 * https://bugzilla.suse.com/show_bug.cgi?id=1255875 * https://bugzilla.suse.com/show_bug.cgi?id=1255876 * https://bugzilla.suse.com/show_bug.cgi?id=1255877 * https://bugzilla.suse.com/show_bug.cgi?id=1255878 * https://bugzilla.suse.com/show_bug.cgi?id=1255880 * https://bugzilla.suse.com/show_bug.cgi?id=1255881 * https://bugzilla.suse.com/show_bug.cgi?id=1255888 * https://bugzilla.suse.com/show_bug.cgi?id=1255889 * https://bugzilla.suse.com/show_bug.cgi?id=1255890 * https://bugzilla.suse.com/show_bug.cgi?id=1255899 * https://bugzilla.suse.com/show_bug.cgi?id=1255901 * https://bugzilla.suse.com/show_bug.cgi?id=1255902 * https://bugzilla.suse.com/show_bug.cgi?id=1255905 * https://bugzilla.suse.com/show_bug.cgi?id=1255906 * https://bugzilla.suse.com/show_bug.cgi?id=1255909 * https://bugzilla.suse.com/show_bug.cgi?id=1255910 * https://bugzilla.suse.com/show_bug.cgi?id=1255912 * https://bugzilla.suse.com/show_bug.cgi?id=1255916 * https://bugzilla.suse.com/show_bug.cgi?id=1255919 * https://bugzilla.suse.com/show_bug.cgi?id=1255920 * https://bugzilla.suse.com/show_bug.cgi?id=1255922 * https://bugzilla.suse.com/show_bug.cgi?id=1255924 * https://bugzilla.suse.com/show_bug.cgi?id=1255925 * https://bugzilla.suse.com/show_bug.cgi?id=1255939 * https://bugzilla.suse.com/show_bug.cgi?id=1255946 * https://bugzilla.suse.com/show_bug.cgi?id=1255950 * https://bugzilla.suse.com/show_bug.cgi?id=1255953 * https://bugzilla.suse.com/show_bug.cgi?id=1255954 * https://bugzilla.suse.com/show_bug.cgi?id=1255955 * https://bugzilla.suse.com/show_bug.cgi?id=1255962 * https://bugzilla.suse.com/show_bug.cgi?id=1255964 * https://bugzilla.suse.com/show_bug.cgi?id=1255968 * https://bugzilla.suse.com/show_bug.cgi?id=1255969 * https://bugzilla.suse.com/show_bug.cgi?id=1255970 * https://bugzilla.suse.com/show_bug.cgi?id=1255971 * https://bugzilla.suse.com/show_bug.cgi?id=1255974 * https://bugzilla.suse.com/show_bug.cgi?id=1255978 * https://bugzilla.suse.com/show_bug.cgi?id=1255979 * https://bugzilla.suse.com/show_bug.cgi?id=1255983 * https://bugzilla.suse.com/show_bug.cgi?id=1255985 * https://bugzilla.suse.com/show_bug.cgi?id=1255990 * https://bugzilla.suse.com/show_bug.cgi?id=1255993 * https://bugzilla.suse.com/show_bug.cgi?id=1255994 * https://bugzilla.suse.com/show_bug.cgi?id=1255996 * https://bugzilla.suse.com/show_bug.cgi?id=1255998 * https://bugzilla.suse.com/show_bug.cgi?id=1256034 * https://bugzilla.suse.com/show_bug.cgi?id=1256040 * https://bugzilla.suse.com/show_bug.cgi?id=1256042 * https://bugzilla.suse.com/show_bug.cgi?id=1256045 * https://bugzilla.suse.com/show_bug.cgi?id=1256046 * https://bugzilla.suse.com/show_bug.cgi?id=1256048 * https://bugzilla.suse.com/show_bug.cgi?id=1256049 * https://bugzilla.suse.com/show_bug.cgi?id=1256050 * https://bugzilla.suse.com/show_bug.cgi?id=1256053 * https://bugzilla.suse.com/show_bug.cgi?id=1256056 * https://bugzilla.suse.com/show_bug.cgi?id=1256057 * https://bugzilla.suse.com/show_bug.cgi?id=1256062 * https://bugzilla.suse.com/show_bug.cgi?id=1256063 * https://bugzilla.suse.com/show_bug.cgi?id=1256064 * https://bugzilla.suse.com/show_bug.cgi?id=1256065 * https://bugzilla.suse.com/show_bug.cgi?id=1256071 * https://bugzilla.suse.com/show_bug.cgi?id=1256074 * https://bugzilla.suse.com/show_bug.cgi?id=1256081 * https://bugzilla.suse.com/show_bug.cgi?id=1256084 * https://bugzilla.suse.com/show_bug.cgi?id=1256086 * https://bugzilla.suse.com/show_bug.cgi?id=1256088 * https://bugzilla.suse.com/show_bug.cgi?id=1256091 * https://bugzilla.suse.com/show_bug.cgi?id=1256093 * https://bugzilla.suse.com/show_bug.cgi?id=1256099 * https://bugzilla.suse.com/show_bug.cgi?id=1256101 * https://bugzilla.suse.com/show_bug.cgi?id=1256103 * https://bugzilla.suse.com/show_bug.cgi?id=1256106 * https://bugzilla.suse.com/show_bug.cgi?id=1256111 * https://bugzilla.suse.com/show_bug.cgi?id=1256112 * https://bugzilla.suse.com/show_bug.cgi?id=1256114 * https://bugzilla.suse.com/show_bug.cgi?id=1256115 * https://bugzilla.suse.com/show_bug.cgi?id=1256118 * https://bugzilla.suse.com/show_bug.cgi?id=1256119 * https://bugzilla.suse.com/show_bug.cgi?id=1256121 * https://bugzilla.suse.com/show_bug.cgi?id=1256122 * https://bugzilla.suse.com/show_bug.cgi?id=1256124 * https://bugzilla.suse.com/show_bug.cgi?id=1256125 * https://bugzilla.suse.com/show_bug.cgi?id=1256126 * https://bugzilla.suse.com/show_bug.cgi?id=1256127 * https://bugzilla.suse.com/show_bug.cgi?id=1256128 * https://bugzilla.suse.com/show_bug.cgi?id=1256130 * https://bugzilla.suse.com/show_bug.cgi?id=1256131 * https://bugzilla.suse.com/show_bug.cgi?id=1256132 * https://bugzilla.suse.com/show_bug.cgi?id=1256133 * https://bugzilla.suse.com/show_bug.cgi?id=1256136 * https://bugzilla.suse.com/show_bug.cgi?id=1256137 * https://bugzilla.suse.com/show_bug.cgi?id=1256140 * https://bugzilla.suse.com/show_bug.cgi?id=1256141 * https://bugzilla.suse.com/show_bug.cgi?id=1256142 * https://bugzilla.suse.com/show_bug.cgi?id=1256143 * https://bugzilla.suse.com/show_bug.cgi?id=1256144 * https://bugzilla.suse.com/show_bug.cgi?id=1256145 * https://bugzilla.suse.com/show_bug.cgi?id=1256149 * https://bugzilla.suse.com/show_bug.cgi?id=1256150 * https://bugzilla.suse.com/show_bug.cgi?id=1256152 * https://bugzilla.suse.com/show_bug.cgi?id=1256154 * https://bugzilla.suse.com/show_bug.cgi?id=1256155 * https://bugzilla.suse.com/show_bug.cgi?id=1256157 * https://bugzilla.suse.com/show_bug.cgi?id=1256158 * https://bugzilla.suse.com/show_bug.cgi?id=1256162 * https://bugzilla.suse.com/show_bug.cgi?id=1256164 * https://bugzilla.suse.com/show_bug.cgi?id=1256165 * https://bugzilla.suse.com/show_bug.cgi?id=1256166 * https://bugzilla.suse.com/show_bug.cgi?id=1256167 * https://bugzilla.suse.com/show_bug.cgi?id=1256172 * https://bugzilla.suse.com/show_bug.cgi?id=1256173 * https://bugzilla.suse.com/show_bug.cgi?id=1256174 * https://bugzilla.suse.com/show_bug.cgi?id=1256177 * https://bugzilla.suse.com/show_bug.cgi?id=1256178 * https://bugzilla.suse.com/show_bug.cgi?id=1256179 * https://bugzilla.suse.com/show_bug.cgi?id=1256182 * https://bugzilla.suse.com/show_bug.cgi?id=1256184 * https://bugzilla.suse.com/show_bug.cgi?id=1256185 * https://bugzilla.suse.com/show_bug.cgi?id=1256186 * https://bugzilla.suse.com/show_bug.cgi?id=1256188 * https://bugzilla.suse.com/show_bug.cgi?id=1256189 * https://bugzilla.suse.com/show_bug.cgi?id=1256191 * https://bugzilla.suse.com/show_bug.cgi?id=1256192 * https://bugzilla.suse.com/show_bug.cgi?id=1256193 * https://bugzilla.suse.com/show_bug.cgi?id=1256194 * https://bugzilla.suse.com/show_bug.cgi?id=1256196 * https://bugzilla.suse.com/show_bug.cgi?id=1256198 * https://bugzilla.suse.com/show_bug.cgi?id=1256199 * https://bugzilla.suse.com/show_bug.cgi?id=1256200 * https://bugzilla.suse.com/show_bug.cgi?id=1256202 * https://bugzilla.suse.com/show_bug.cgi?id=1256203 * https://bugzilla.suse.com/show_bug.cgi?id=1256204 * https://bugzilla.suse.com/show_bug.cgi?id=1256205 * https://bugzilla.suse.com/show_bug.cgi?id=1256206 * https://bugzilla.suse.com/show_bug.cgi?id=1256207 * https://bugzilla.suse.com/show_bug.cgi?id=1256208 * https://bugzilla.suse.com/show_bug.cgi?id=1256211 * https://bugzilla.suse.com/show_bug.cgi?id=1256214 * https://bugzilla.suse.com/show_bug.cgi?id=1256215 * https://bugzilla.suse.com/show_bug.cgi?id=1256216 * https://bugzilla.suse.com/show_bug.cgi?id=1256218 * https://bugzilla.suse.com/show_bug.cgi?id=1256219 * https://bugzilla.suse.com/show_bug.cgi?id=1256220 * https://bugzilla.suse.com/show_bug.cgi?id=1256221 * https://bugzilla.suse.com/show_bug.cgi?id=1256223 * https://bugzilla.suse.com/show_bug.cgi?id=1256228 * https://bugzilla.suse.com/show_bug.cgi?id=1256230 * https://bugzilla.suse.com/show_bug.cgi?id=1256231 * https://bugzilla.suse.com/show_bug.cgi?id=1256235 * https://bugzilla.suse.com/show_bug.cgi?id=1256239 * https://bugzilla.suse.com/show_bug.cgi?id=1256241 * https://bugzilla.suse.com/show_bug.cgi?id=1256242 * https://bugzilla.suse.com/show_bug.cgi?id=1256245 * https://bugzilla.suse.com/show_bug.cgi?id=1256248 * https://bugzilla.suse.com/show_bug.cgi?id=1256250 * https://bugzilla.suse.com/show_bug.cgi?id=1256254 * https://bugzilla.suse.com/show_bug.cgi?id=1256260 * https://bugzilla.suse.com/show_bug.cgi?id=1256265 * https://bugzilla.suse.com/show_bug.cgi?id=1256269 * https://bugzilla.suse.com/show_bug.cgi?id=1256271 * https://bugzilla.suse.com/show_bug.cgi?id=1256274 * https://bugzilla.suse.com/show_bug.cgi?id=1256282 * https://bugzilla.suse.com/show_bug.cgi?id=1256285 * https://bugzilla.suse.com/show_bug.cgi?id=1256291 * https://bugzilla.suse.com/show_bug.cgi?id=1256294 * https://bugzilla.suse.com/show_bug.cgi?id=1256295 * https://bugzilla.suse.com/show_bug.cgi?id=1256300 * https://bugzilla.suse.com/show_bug.cgi?id=1256302 * https://bugzilla.suse.com/show_bug.cgi?id=1256306 * https://bugzilla.suse.com/show_bug.cgi?id=1256309 * https://bugzilla.suse.com/show_bug.cgi?id=1256317 * https://bugzilla.suse.com/show_bug.cgi?id=1256320 * https://bugzilla.suse.com/show_bug.cgi?id=1256323 * https://bugzilla.suse.com/show_bug.cgi?id=1256326 * https://bugzilla.suse.com/show_bug.cgi?id=1256328 * https://bugzilla.suse.com/show_bug.cgi?id=1256333 * https://bugzilla.suse.com/show_bug.cgi?id=1256334 * https://bugzilla.suse.com/show_bug.cgi?id=1256335 * https://bugzilla.suse.com/show_bug.cgi?id=1256337 * https://bugzilla.suse.com/show_bug.cgi?id=1256338 * https://bugzilla.suse.com/show_bug.cgi?id=1256344 * https://bugzilla.suse.com/show_bug.cgi?id=1256346 * https://bugzilla.suse.com/show_bug.cgi?id=1256349 * https://bugzilla.suse.com/show_bug.cgi?id=1256352 * https://bugzilla.suse.com/show_bug.cgi?id=1256353 * https://bugzilla.suse.com/show_bug.cgi?id=1256355 * https://bugzilla.suse.com/show_bug.cgi?id=1256358 * https://bugzilla.suse.com/show_bug.cgi?id=1256359 * https://bugzilla.suse.com/show_bug.cgi?id=1256363 * https://bugzilla.suse.com/show_bug.cgi?id=1256364 * https://bugzilla.suse.com/show_bug.cgi?id=1256368 * https://bugzilla.suse.com/show_bug.cgi?id=1256370 * https://bugzilla.suse.com/show_bug.cgi?id=1256375 * https://bugzilla.suse.com/show_bug.cgi?id=1256381 * https://bugzilla.suse.com/show_bug.cgi?id=1256382 * https://bugzilla.suse.com/show_bug.cgi?id=1256383 * https://bugzilla.suse.com/show_bug.cgi?id=1256384 * https://bugzilla.suse.com/show_bug.cgi?id=1256386 * https://bugzilla.suse.com/show_bug.cgi?id=1256388 * https://bugzilla.suse.com/show_bug.cgi?id=1256391 * https://bugzilla.suse.com/show_bug.cgi?id=1256394 * https://bugzilla.suse.com/show_bug.cgi?id=1256395 * https://bugzilla.suse.com/show_bug.cgi?id=1256396 * https://bugzilla.suse.com/show_bug.cgi?id=1256397 * https://bugzilla.suse.com/show_bug.cgi?id=1256398 * https://bugzilla.suse.com/show_bug.cgi?id=1256423 * https://bugzilla.suse.com/show_bug.cgi?id=1256426 * https://bugzilla.suse.com/show_bug.cgi?id=1256432 * https://jira.suse.com/browse/PED-1073 * https://jira.suse.com/browse/PED-14062 * https://jira.suse.com/browse/PED-1407 * https://jira.suse.com/browse/PED-1495 * https://jira.suse.com/browse/PED-1549 * https://jira.suse.com/browse/PED-1559 * https://jira.suse.com/browse/PED-2765 * https://jira.suse.com/browse/PED-370 * https://jira.suse.com/browse/PED-376 * https://jira.suse.com/browse/PED-7167 * https://jira.suse.com/browse/PED-8111 * https://jira.suse.com/browse/SLE-13847 * https://jira.suse.com/browse/SLE-18378 * https://jira.suse.com/browse/SLE-18384 * https://jira.suse.com/browse/SLE-19253 * https://jira.suse.com/browse/SLE-19255 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 16:30:09 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 16:30:09 -0000 Subject: SUSE-SU-2026:0270-1: important: Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6) Message-ID: <176918580978.16867.1817394569747665153@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 7 for SUSE Linux Enterprise 15 SP6) Announcement ID: SUSE-SU-2026:0270-1 Release Date: 2026-01-23T10:33:38Z Rating: important References: * bsc#1248400 * bsc#1248670 * bsc#1249241 * bsc#1250192 * bsc#1251203 * bsc#1251787 * bsc#1253437 * bsc#1256928 Cross-References: * CVE-2023-53676 * CVE-2025-38476 * CVE-2025-38572 * CVE-2025-38588 * CVE-2025-38608 * CVE-2025-39682 * CVE-2025-40204 CVSS scores: * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38588 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38588 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves seven vulnerabilities and has one security fix can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6.4.0-150600.23.33 fixes various security issues The following security issues were fixed: * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size() (bsc#1249241). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670). * CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1250192). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). The following non security issue was fixed: * fix addr_bit_set() issue on big-endian machines (bsc#1256928). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-270=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-270=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_33-default-debuginfo-17-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_7-debugsource-17-150600.2.1 * kernel-livepatch-6_4_0-150600_23_33-default-17-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_33-default-debuginfo-17-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_7-debugsource-17-150600.2.1 * kernel-livepatch-6_4_0-150600_23_33-default-17-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38588.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1248670 * https://bugzilla.suse.com/show_bug.cgi?id=1249241 * https://bugzilla.suse.com/show_bug.cgi?id=1250192 * https://bugzilla.suse.com/show_bug.cgi?id=1251203 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1256928 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 16:30:18 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 16:30:18 -0000 Subject: SUSE-SU-2026:0269-1: important: Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP6) Message-ID: <176918581848.16867.12998652131196786877@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 6 for SUSE Linux Enterprise 15 SP6) Announcement ID: SUSE-SU-2026:0269-1 Release Date: 2026-01-23T10:04:12Z Rating: important References: * bsc#1235815 * bsc#1248400 * bsc#1248670 * bsc#1249241 * bsc#1250192 * bsc#1251203 * bsc#1251787 * bsc#1253437 * bsc#1256928 Cross-References: * CVE-2023-53676 * CVE-2024-57849 * CVE-2025-38476 * CVE-2025-38572 * CVE-2025-38588 * CVE-2025-38608 * CVE-2025-39682 * CVE-2025-40204 CVSS scores: * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57849 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2024-57849 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38588 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38588 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves eight vulnerabilities and has one security fix can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6.4.0-150600.23.30 fixes various security issues The following security issues were fixed: * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2024-57849: s390/cpum_sf: handle CPU hotplug remove during sampling (bsc#1235815). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size() (bsc#1249241). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670). * CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1250192). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). The following non security issue was fixed: * fix addr_bit_set() issue on big-endian machines (bsc#1256928). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-269=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-269=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_30-default-debuginfo-17-150600.2.1 * kernel-livepatch-6_4_0-150600_23_30-default-17-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_6-debugsource-17-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_30-default-debuginfo-17-150600.2.1 * kernel-livepatch-6_4_0-150600_23_30-default-17-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_6-debugsource-17-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2024-57849.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38588.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1235815 * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1248670 * https://bugzilla.suse.com/show_bug.cgi?id=1249241 * https://bugzilla.suse.com/show_bug.cgi?id=1250192 * https://bugzilla.suse.com/show_bug.cgi?id=1251203 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1256928 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 16:30:20 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 16:30:20 -0000 Subject: SUSE-SU-2026:0273-1: important: Security update for azure-cli-core Message-ID: <176918582093.16867.13469639614064652417@smelt2.prg2.suse.org> # Security update for azure-cli-core Announcement ID: SUSE-SU-2026:0273-1 Release Date: 2026-01-23T11:26:43Z Rating: important References: * bsc#1239460 Cross-References: * CVE-2025-24049 CVSS scores: * CVE-2025-24049 ( SUSE ): 8.6 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-24049 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-24049 ( NVD ): 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for azure-cli-core fixes the following issues: * CVE-2025-24049: Fix improper neutralization of special elements used in a command which allows an unauthorized attacker to elevate privileges locally. (bsc#1239460) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2026-273=1 ## Package List: * Public Cloud Module 12 (noarch) * azure-cli-core-2.17.1-2.25.1 ## References: * https://www.suse.com/security/cve/CVE-2025-24049.html * https://bugzilla.suse.com/show_bug.cgi?id=1239460 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 16:30:22 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 16:30:22 -0000 Subject: SUSE-RU-2026:0272-1: moderate: Recommended update for libpfm Message-ID: <176918582246.16867.14256726830900179513@smelt2.prg2.suse.org> # Recommended update for libpfm Announcement ID: SUSE-RU-2026:0272-1 Release Date: 2026-01-23T11:02:05Z Rating: moderate References: * jsc#PED-13665 Affected Products: * Basesystem Module 15-SP7 * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that contains one feature can now be installed. ## Description: This update for libpfm fixes the following issues: * s390: Add counter definition for IBM z17 (jsc#PED-13665) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-272=1 openSUSE-SLE-15.6-2026-272=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-272=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2026-272=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-272=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-272=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libpfm-devel-debuginfo-4.13.0-150600.3.3.1 * libpfm-debugsource-4.13.0-150600.3.3.1 * libpfm4-4.13.0-150600.3.3.1 * libpfm-devel-static-4.13.0-150600.3.3.1 * libpfm-devel-4.13.0-150600.3.3.1 * python3-libpfm-4.13.0-150600.3.3.1 * python3-libpfm-debuginfo-4.13.0-150600.3.3.1 * libpfm4-debuginfo-4.13.0-150600.3.3.1 * openSUSE Leap 15.6 (x86_64) * libpfm4-32bit-4.13.0-150600.3.3.1 * libpfm4-32bit-debuginfo-4.13.0-150600.3.3.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libpfm4-64bit-debuginfo-4.13.0-150600.3.3.1 * libpfm4-64bit-4.13.0-150600.3.3.1 * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libpfm-devel-debuginfo-4.13.0-150600.3.3.1 * libpfm-debugsource-4.13.0-150600.3.3.1 * libpfm4-4.13.0-150600.3.3.1 * libpfm-devel-4.13.0-150600.3.3.1 * libpfm4-debuginfo-4.13.0-150600.3.3.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libpfm-devel-static-4.13.0-150600.3.3.1 * libpfm-debugsource-4.13.0-150600.3.3.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * libpfm-devel-debuginfo-4.13.0-150600.3.3.1 * libpfm-debugsource-4.13.0-150600.3.3.1 * libpfm4-4.13.0-150600.3.3.1 * libpfm-devel-static-4.13.0-150600.3.3.1 * libpfm-devel-4.13.0-150600.3.3.1 * libpfm4-debuginfo-4.13.0-150600.3.3.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * libpfm-devel-debuginfo-4.13.0-150600.3.3.1 * libpfm-debugsource-4.13.0-150600.3.3.1 * libpfm4-4.13.0-150600.3.3.1 * libpfm-devel-static-4.13.0-150600.3.3.1 * libpfm-devel-4.13.0-150600.3.3.1 * libpfm4-debuginfo-4.13.0-150600.3.3.1 ## References: * https://jira.suse.com/browse/PED-13665 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 16:30:24 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 16:30:24 -0000 Subject: SUSE-RU-2026:0271-1: important: Recommended update for python-setuptools Message-ID: <176918582483.16867.623804242619690161@smelt2.prg2.suse.org> # Recommended update for python-setuptools Announcement ID: SUSE-RU-2026:0271-1 Release Date: 2026-01-23T11:01:36Z Rating: important References: * bsc#1254255 * jsc#PED-14457 Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * Public Cloud Module 15-SP4 * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that contains one feature and has one fix can now be installed. ## Description: This update for python-setuptools fixes the following issues: * Implement basic PEP 639 support, (jsc#PED-14457, bsc#1254255) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-271=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2026-271=1 * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2026-271=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2026-271=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2026-271=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2026-271=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2026-271=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2026-271=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2026-271=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-271=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2026-271=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2026-271=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-271=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2026-271=1 ## Package List: * openSUSE Leap 15.6 (noarch) * python311-setuptools-67.7.2-150400.3.22.1 * python311-setuptools-wheel-67.7.2-150400.3.22.1 * Public Cloud Module 15-SP4 (noarch) * python311-setuptools-67.7.2-150400.3.22.1 * Python 3 Module 15-SP7 (noarch) * python311-setuptools-67.7.2-150400.3.22.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch) * python311-setuptools-67.7.2-150400.3.22.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch) * python311-setuptools-67.7.2-150400.3.22.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch) * python311-setuptools-67.7.2-150400.3.22.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch) * python311-setuptools-67.7.2-150400.3.22.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (noarch) * python311-setuptools-67.7.2-150400.3.22.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (noarch) * python311-setuptools-67.7.2-150400.3.22.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (noarch) * python311-setuptools-67.7.2-150400.3.22.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch) * python311-setuptools-67.7.2-150400.3.22.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch) * python311-setuptools-67.7.2-150400.3.22.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (noarch) * python311-setuptools-67.7.2-150400.3.22.1 * openSUSE Leap 15.4 (noarch) * python311-setuptools-67.7.2-150400.3.22.1 * python311-setuptools-wheel-67.7.2-150400.3.22.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1254255 * https://jira.suse.com/browse/PED-14457 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 16:30:27 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 16:30:27 -0000 Subject: SUSE-SU-2026:0268-1: moderate: Security update for python Message-ID: <176918582759.16867.6003724737492000581@smelt2.prg2.suse.org> # Security update for python Announcement ID: SUSE-SU-2026:0268-1 Release Date: 2026-01-23T09:40:55Z Rating: moderate References: * bsc#1254400 * bsc#1254997 Cross-References: * CVE-2025-12084 * CVE-2025-13836 * CVE-2025-6075 CVSS scores: * CVE-2025-12084 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-12084 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L * CVE-2025-12084 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-12084 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-13836 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13836 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-13836 ( NVD ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-13836 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H * CVE-2025-6075 ( SUSE ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-6075 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-6075 ( NVD ): 1.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that solves three vulnerabilities can now be installed. ## Description: This update for python fixes the following issues: * CVE-2025-13836: Fixed reading an HTTP response from a server, if no read amount is specified, with using Content-Length per default as the length (bsc#1254400) * CVE-2025-12084: Fixed Denial of Service due to quadratic algorithm in xml.dom.minidom (bsc#1254997). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2026-268=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2026-268=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python-curses-debuginfo-2.7.18-150000.94.1 * python-base-2.7.18-150000.94.1 * python-curses-2.7.18-150000.94.1 * python-tk-debuginfo-2.7.18-150000.94.1 * python-devel-2.7.18-150000.94.1 * python-demo-2.7.18-150000.94.1 * python-debuginfo-2.7.18-150000.94.1 * python-2.7.18-150000.94.1 * python-base-debuginfo-2.7.18-150000.94.1 * libpython2_7-1_0-2.7.18-150000.94.1 * python-xml-2.7.18-150000.94.1 * python-base-debugsource-2.7.18-150000.94.1 * python-debugsource-2.7.18-150000.94.1 * python-gdbm-debuginfo-2.7.18-150000.94.1 * python-tk-2.7.18-150000.94.1 * python-gdbm-2.7.18-150000.94.1 * python-xml-debuginfo-2.7.18-150000.94.1 * python-idle-2.7.18-150000.94.1 * libpython2_7-1_0-debuginfo-2.7.18-150000.94.1 * openSUSE Leap 15.6 (x86_64) * python-32bit-debuginfo-2.7.18-150000.94.1 * python-32bit-2.7.18-150000.94.1 * python-base-32bit-2.7.18-150000.94.1 * libpython2_7-1_0-32bit-2.7.18-150000.94.1 * libpython2_7-1_0-32bit-debuginfo-2.7.18-150000.94.1 * python-base-32bit-debuginfo-2.7.18-150000.94.1 * openSUSE Leap 15.6 (noarch) * python-doc-pdf-2.7.18-150000.94.1 * python-doc-2.7.18-150000.94.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * python-curses-debuginfo-2.7.18-150000.94.1 * python-base-2.7.18-150000.94.1 * python-curses-2.7.18-150000.94.1 * python-debuginfo-2.7.18-150000.94.1 * python-2.7.18-150000.94.1 * python-base-debuginfo-2.7.18-150000.94.1 * libpython2_7-1_0-2.7.18-150000.94.1 * python-xml-2.7.18-150000.94.1 * python-base-debugsource-2.7.18-150000.94.1 * python-debugsource-2.7.18-150000.94.1 * python-gdbm-debuginfo-2.7.18-150000.94.1 * python-xml-debuginfo-2.7.18-150000.94.1 * python-gdbm-2.7.18-150000.94.1 * libpython2_7-1_0-debuginfo-2.7.18-150000.94.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12084.html * https://www.suse.com/security/cve/CVE-2025-13836.html * https://www.suse.com/security/cve/CVE-2025-6075.html * https://bugzilla.suse.com/show_bug.cgi?id=1254400 * https://bugzilla.suse.com/show_bug.cgi?id=1254997 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 16:30:30 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 16:30:30 -0000 Subject: SUSE-SU-2026:0267-1: important: Recommended update for kernel-firmware Message-ID: <176918583001.16867.5887273391932847429@smelt2.prg2.suse.org> # Recommended update for kernel-firmware Announcement ID: SUSE-SU-2026:0267-1 Release Date: 2026-01-23T09:40:31Z Rating: important References: * bsc#1256483 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one security fix can now be installed. ## Description: This update for kernel-firmware fixes the following issues: * Update AMD ucode to 20251203 (bsc#1256483) ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2026-267=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-267=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * kernel-firmware-20190618-5.40.2 * ucode-amd-20190618-5.40.2 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * kernel-firmware-20190618-5.40.2 * ucode-amd-20190618-5.40.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1256483 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 16:30:32 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 16:30:32 -0000 Subject: SUSE-SU-2026:0266-1: low: Security update for glib2 Message-ID: <176918583217.16867.14615988357238836639@smelt2.prg2.suse.org> # Security update for glib2 Announcement ID: SUSE-SU-2026:0266-1 Release Date: 2026-01-23T08:55:04Z Rating: low References: * bsc#1257049 Cross-References: * CVE-2026-0988 CVSS scores: * CVE-2026-0988 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2026-0988 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2026-0988 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for glib2 fixes the following issues: * CVE-2026-0988: Fixed a potential integer overflow in g_buffered_input_stream_peek (bsc#1257049). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-266=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libgthread-2_0-0-debuginfo-32bit-2.48.2-12.55.1 * libgmodule-2_0-0-debuginfo-2.48.2-12.55.1 * libgobject-2_0-0-32bit-2.48.2-12.55.1 * libgthread-2_0-0-debuginfo-2.48.2-12.55.1 * glib2-tools-debuginfo-2.48.2-12.55.1 * glib2-devel-debuginfo-2.48.2-12.55.1 * glib2-tools-2.48.2-12.55.1 * libgio-2_0-0-debuginfo-32bit-2.48.2-12.55.1 * libgmodule-2_0-0-32bit-2.48.2-12.55.1 * libgthread-2_0-0-32bit-2.48.2-12.55.1 * glib2-devel-2.48.2-12.55.1 * libglib-2_0-0-32bit-2.48.2-12.55.1 * libgobject-2_0-0-debuginfo-32bit-2.48.2-12.55.1 * libgio-2_0-0-32bit-2.48.2-12.55.1 * libglib-2_0-0-debuginfo-32bit-2.48.2-12.55.1 * libgobject-2_0-0-debuginfo-2.48.2-12.55.1 * libgio-2_0-0-debuginfo-2.48.2-12.55.1 * glib2-devel-static-2.48.2-12.55.1 * libgmodule-2_0-0-2.48.2-12.55.1 * libgthread-2_0-0-2.48.2-12.55.1 * glib2-debugsource-2.48.2-12.55.1 * libgio-2_0-0-2.48.2-12.55.1 * libglib-2_0-0-2.48.2-12.55.1 * libgmodule-2_0-0-debuginfo-32bit-2.48.2-12.55.1 * libgobject-2_0-0-2.48.2-12.55.1 * libglib-2_0-0-debuginfo-2.48.2-12.55.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * glib2-lang-2.48.2-12.55.1 ## References: * https://www.suse.com/security/cve/CVE-2026-0988.html * https://bugzilla.suse.com/show_bug.cgi?id=1257049 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 20:35:16 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 20:35:16 -0000 Subject: SUSE-SU-2026:0278-1: important: Security update for the Linux Kernel Message-ID: <176920051660.16867.9766442493964598736@smelt2.prg2.suse.org> # Security update for the Linux Kernel Announcement ID: SUSE-SU-2026:0278-1 Release Date: 2026-01-23T15:08:33Z Rating: important References: * bsc#1012628 * bsc#1065729 * bsc#1194869 * bsc#1205462 * bsc#1214285 * bsc#1214635 * bsc#1214847 * bsc#1215146 * bsc#1215211 * bsc#1215344 * bsc#1216062 * bsc#1216436 * bsc#1219165 * bsc#1220419 * bsc#1223731 * bsc#1232223 * bsc#1234163 * bsc#1243112 * bsc#1245193 * bsc#1245449 * bsc#1246328 * bsc#1247500 * bsc#1248886 * bsc#1249256 * bsc#1251752 * bsc#1252046 * bsc#1252342 * bsc#1252686 * bsc#1252776 * bsc#1252808 * bsc#1252824 * bsc#1252861 * bsc#1252919 * bsc#1252973 * bsc#1253155 * bsc#1253262 * bsc#1253342 * bsc#1253365 * bsc#1253386 * bsc#1253400 * bsc#1253402 * bsc#1253408 * bsc#1253413 * bsc#1253442 * bsc#1253458 * bsc#1253463 * bsc#1253623 * bsc#1253647 * bsc#1253674 * bsc#1253739 * bsc#1254119 * bsc#1254126 * bsc#1254235 * bsc#1254244 * bsc#1254363 * bsc#1254373 * bsc#1254378 * bsc#1254477 * bsc#1254518 * bsc#1254520 * bsc#1254599 * bsc#1254606 * bsc#1254611 * bsc#1254613 * bsc#1254615 * bsc#1254616 * bsc#1254621 * bsc#1254623 * bsc#1254626 * bsc#1254648 * bsc#1254649 * bsc#1254653 * bsc#1254655 * bsc#1254657 * bsc#1254660 * bsc#1254661 * bsc#1254663 * bsc#1254669 * bsc#1254677 * bsc#1254678 * bsc#1254688 * bsc#1254690 * bsc#1254691 * bsc#1254693 * bsc#1254695 * bsc#1254698 * bsc#1254701 * bsc#1254704 * bsc#1254705 * bsc#1254707 * bsc#1254712 * bsc#1254715 * bsc#1254717 * bsc#1254723 * bsc#1254724 * bsc#1254732 * bsc#1254733 * bsc#1254737 * bsc#1254739 * bsc#1254742 * bsc#1254743 * bsc#1254749 * bsc#1254750 * bsc#1254753 * bsc#1254754 * bsc#1254758 * bsc#1254761 * bsc#1254762 * bsc#1254765 * bsc#1254782 * bsc#1254791 * bsc#1254793 * bsc#1254794 * bsc#1254795 * bsc#1254796 * bsc#1254797 * bsc#1254798 * bsc#1254813 * bsc#1254815 * bsc#1254824 * bsc#1254825 * bsc#1254827 * bsc#1254828 * bsc#1254829 * bsc#1254830 * bsc#1254832 * bsc#1254840 * bsc#1254843 * bsc#1254846 * bsc#1254847 * bsc#1254849 * bsc#1254850 * bsc#1254851 * bsc#1254854 * bsc#1254856 * bsc#1254858 * bsc#1254860 * bsc#1254864 * bsc#1254869 * bsc#1254894 * bsc#1254918 * bsc#1254957 * bsc#1254959 * bsc#1254983 * bsc#1254996 * bsc#1255005 * bsc#1255009 * bsc#1255025 * bsc#1255026 * bsc#1255030 * bsc#1255033 * bsc#1255034 * bsc#1255035 * bsc#1255039 * bsc#1255041 * bsc#1255042 * bsc#1255046 * bsc#1255057 * bsc#1255062 * bsc#1255064 * bsc#1255065 * bsc#1255068 * bsc#1255071 * bsc#1255072 * bsc#1255075 * bsc#1255077 * bsc#1255081 * bsc#1255082 * bsc#1255083 * bsc#1255085 * bsc#1255087 * bsc#1255092 * bsc#1255094 * bsc#1255095 * bsc#1255097 * bsc#1255100 * bsc#1255101 * bsc#1255116 * bsc#1255121 * bsc#1255122 * bsc#1255124 * bsc#1255131 * bsc#1255134 * bsc#1255135 * bsc#1255136 * bsc#1255142 * bsc#1255145 * bsc#1255146 * bsc#1255149 * bsc#1255152 * bsc#1255154 * bsc#1255155 * bsc#1255163 * bsc#1255167 * bsc#1255169 * bsc#1255171 * bsc#1255175 * bsc#1255179 * bsc#1255181 * bsc#1255182 * bsc#1255187 * bsc#1255190 * bsc#1255193 * bsc#1255196 * bsc#1255197 * bsc#1255199 * bsc#1255202 * bsc#1255203 * bsc#1255206 * bsc#1255209 * bsc#1255218 * bsc#1255220 * bsc#1255221 * bsc#1255224 * bsc#1255227 * bsc#1255230 * bsc#1255233 * bsc#1255234 * bsc#1255242 * bsc#1255245 * bsc#1255246 * bsc#1255247 * bsc#1255251 * bsc#1255252 * bsc#1255253 * bsc#1255256 * bsc#1255259 * bsc#1255262 * bsc#1255272 * bsc#1255273 * bsc#1255274 * bsc#1255276 * bsc#1255279 * bsc#1255280 * bsc#1255281 * bsc#1255297 * bsc#1255316 * bsc#1255318 * bsc#1255325 * bsc#1255329 * bsc#1255346 * bsc#1255349 * bsc#1255351 * bsc#1255357 * bsc#1255380 * bsc#1255395 * bsc#1255415 * bsc#1255428 * bsc#1255433 * bsc#1255434 * bsc#1255463 * bsc#1255480 * bsc#1255483 * bsc#1255489 * bsc#1255493 * bsc#1255495 * bsc#1255505 * bsc#1255507 * bsc#1255538 * bsc#1255540 * bsc#1255545 * bsc#1255549 * bsc#1255550 * bsc#1255553 * bsc#1255557 * bsc#1255558 * bsc#1255563 * bsc#1255564 * bsc#1255567 * bsc#1255570 * bsc#1255578 * bsc#1255579 * bsc#1255580 * bsc#1255583 * bsc#1255591 * bsc#1255601 * bsc#1255603 * bsc#1255605 * bsc#1255611 * bsc#1255614 * bsc#1255616 * bsc#1255617 * bsc#1255618 * bsc#1255621 * bsc#1255628 * bsc#1255629 * bsc#1255630 * bsc#1255632 * bsc#1255636 * bsc#1255688 * bsc#1255691 * bsc#1255702 * bsc#1255704 * bsc#1255706 * bsc#1255707 * bsc#1255709 * bsc#1255722 * bsc#1255723 * bsc#1255724 * bsc#1255758 * bsc#1255759 * bsc#1255760 * bsc#1255763 * bsc#1255769 * bsc#1255770 * bsc#1255772 * bsc#1255774 * bsc#1255775 * bsc#1255776 * bsc#1255780 * bsc#1255785 * bsc#1255786 * bsc#1255789 * bsc#1255790 * bsc#1255792 * bsc#1255793 * bsc#1255795 * bsc#1255798 * bsc#1255800 * bsc#1255801 * bsc#1255806 * bsc#1255807 * bsc#1255809 * bsc#1255810 * bsc#1255812 * bsc#1255814 * bsc#1255820 * bsc#1255838 * bsc#1255842 * bsc#1255843 * bsc#1255872 * bsc#1255875 * bsc#1255879 * bsc#1255883 * bsc#1255884 * bsc#1255886 * bsc#1255888 * bsc#1255890 * bsc#1255891 * bsc#1255892 * bsc#1255899 * bsc#1255902 * bsc#1255907 * bsc#1255911 * bsc#1255915 * bsc#1255918 * bsc#1255921 * bsc#1255924 * bsc#1255925 * bsc#1255931 * bsc#1255932 * bsc#1255934 * bsc#1255943 * bsc#1255944 * bsc#1255949 * bsc#1255951 * bsc#1255952 * bsc#1255955 * bsc#1255957 * bsc#1255961 * bsc#1255963 * bsc#1255964 * bsc#1255967 * bsc#1255974 * bsc#1255978 * bsc#1255984 * bsc#1255988 * bsc#1255990 * bsc#1255992 * bsc#1255993 * bsc#1255994 * bsc#1255996 * bsc#1256033 * bsc#1256034 * bsc#1256045 * bsc#1256050 * bsc#1256058 * bsc#1256071 * bsc#1256074 * bsc#1256081 * bsc#1256082 * bsc#1256083 * bsc#1256084 * bsc#1256085 * bsc#1256090 * bsc#1256093 * bsc#1256094 * bsc#1256095 * bsc#1256096 * bsc#1256099 * bsc#1256100 * bsc#1256104 * bsc#1256106 * bsc#1256107 * bsc#1256117 * bsc#1256119 * bsc#1256121 * bsc#1256145 * bsc#1256153 * bsc#1256178 * bsc#1256197 * bsc#1256231 * bsc#1256233 * bsc#1256234 * bsc#1256238 * bsc#1256263 * bsc#1256267 * bsc#1256268 * bsc#1256271 * bsc#1256273 * bsc#1256274 * bsc#1256279 * bsc#1256285 * bsc#1256291 * bsc#1256292 * bsc#1256300 * bsc#1256301 * bsc#1256302 * bsc#1256335 * bsc#1256348 * bsc#1256351 * bsc#1256354 * bsc#1256358 * bsc#1256361 * bsc#1256364 * bsc#1256366 * bsc#1256367 * bsc#1256368 * bsc#1256369 * bsc#1256370 * bsc#1256371 * bsc#1256373 * bsc#1256375 * bsc#1256379 * bsc#1256387 * bsc#1256394 * bsc#1256395 * bsc#1256396 * bsc#1256528 * jsc#PED-13611 * jsc#PED-14062 * jsc#PED-14280 * jsc#PED-14353 * jsc#PED-3527 * jsc#PED-4866 * jsc#PED-5065 * jsc#PED-5453 * jsc#PED-5475 * jsc#PED-5477 * jsc#PED-5511 * jsc#PED-6036 * jsc#PED-6041 * jsc#PED-6045 * jsc#PED-6067 * jsc#PED-6068 * jsc#PED-6069 * jsc#PED-6070 * jsc#PED-6071 * jsc#PED-6104 * jsc#PED-6114 * jsc#PED-6116 * jsc#PED-6120 * jsc#PED-6123 * jsc#PED-6811 * jsc#PED-7514 * jsc#PED-7542 * jsc#PED-7779 * jsc#PED-7780 Cross-References: * CVE-2023-42752 * CVE-2023-53743 * CVE-2023-53750 * CVE-2023-53752 * CVE-2023-53759 * CVE-2023-53762 * CVE-2023-53766 * CVE-2023-53768 * CVE-2023-53777 * CVE-2023-53778 * CVE-2023-53782 * CVE-2023-53784 * CVE-2023-53785 * CVE-2023-53787 * CVE-2023-53791 * CVE-2023-53792 * CVE-2023-53793 * CVE-2023-53794 * CVE-2023-53795 * CVE-2023-53797 * CVE-2023-53799 * CVE-2023-53807 * CVE-2023-53808 * CVE-2023-53813 * CVE-2023-53815 * CVE-2023-53819 * CVE-2023-53821 * CVE-2023-53823 * CVE-2023-53825 * CVE-2023-53828 * CVE-2023-53831 * CVE-2023-53834 * CVE-2023-53836 * CVE-2023-53839 * CVE-2023-53841 * CVE-2023-53842 * CVE-2023-53843 * CVE-2023-53844 * CVE-2023-53846 * CVE-2023-53847 * CVE-2023-53848 * CVE-2023-53850 * CVE-2023-53851 * CVE-2023-53852 * CVE-2023-53855 * CVE-2023-53856 * CVE-2023-53857 * CVE-2023-53858 * CVE-2023-53860 * CVE-2023-53861 * CVE-2023-53863 * CVE-2023-53864 * CVE-2023-53865 * CVE-2023-53989 * CVE-2023-53992 * CVE-2023-53994 * CVE-2023-53995 * CVE-2023-53996 * CVE-2023-53997 * CVE-2023-53998 * CVE-2023-53999 * CVE-2023-54000 * CVE-2023-54001 * CVE-2023-54005 * CVE-2023-54006 * CVE-2023-54008 * CVE-2023-54014 * CVE-2023-54016 * CVE-2023-54017 * CVE-2023-54019 * CVE-2023-54022 * CVE-2023-54023 * CVE-2023-54025 * CVE-2023-54026 * CVE-2023-54027 * CVE-2023-54030 * CVE-2023-54031 * CVE-2023-54032 * CVE-2023-54035 * CVE-2023-54037 * CVE-2023-54038 * CVE-2023-54042 * CVE-2023-54045 * CVE-2023-54048 * CVE-2023-54049 * CVE-2023-54051 * CVE-2023-54052 * CVE-2023-54060 * CVE-2023-54064 * CVE-2023-54066 * CVE-2023-54067 * CVE-2023-54069 * CVE-2023-54070 * CVE-2023-54072 * CVE-2023-54076 * CVE-2023-54080 * CVE-2023-54081 * CVE-2023-54083 * CVE-2023-54088 * CVE-2023-54089 * CVE-2023-54091 * CVE-2023-54092 * CVE-2023-54093 * CVE-2023-54094 * CVE-2023-54095 * CVE-2023-54096 * CVE-2023-54099 * CVE-2023-54101 * CVE-2023-54104 * CVE-2023-54106 * CVE-2023-54112 * CVE-2023-54113 * CVE-2023-54115 * CVE-2023-54117 * CVE-2023-54121 * CVE-2023-54125 * CVE-2023-54127 * CVE-2023-54133 * CVE-2023-54134 * CVE-2023-54135 * CVE-2023-54136 * CVE-2023-54137 * CVE-2023-54140 * CVE-2023-54141 * CVE-2023-54142 * CVE-2023-54143 * CVE-2023-54145 * CVE-2023-54148 * CVE-2023-54149 * CVE-2023-54153 * CVE-2023-54154 * CVE-2023-54155 * CVE-2023-54156 * CVE-2023-54164 * CVE-2023-54166 * CVE-2023-54169 * CVE-2023-54170 * CVE-2023-54171 * CVE-2023-54172 * CVE-2023-54173 * CVE-2023-54177 * CVE-2023-54178 * CVE-2023-54179 * CVE-2023-54181 * CVE-2023-54183 * CVE-2023-54185 * CVE-2023-54189 * CVE-2023-54194 * CVE-2023-54201 * CVE-2023-54204 * CVE-2023-54207 * CVE-2023-54209 * CVE-2023-54210 * CVE-2023-54211 * CVE-2023-54215 * CVE-2023-54219 * CVE-2023-54220 * CVE-2023-54221 * CVE-2023-54223 * CVE-2023-54224 * CVE-2023-54225 * CVE-2023-54227 * CVE-2023-54229 * CVE-2023-54230 * CVE-2023-54235 * CVE-2023-54240 * CVE-2023-54241 * CVE-2023-54246 * CVE-2023-54247 * CVE-2023-54251 * CVE-2023-54253 * CVE-2023-54254 * CVE-2023-54255 * CVE-2023-54258 * CVE-2023-54261 * CVE-2023-54263 * CVE-2023-54264 * CVE-2023-54266 * CVE-2023-54267 * CVE-2023-54271 * CVE-2023-54276 * CVE-2023-54278 * CVE-2023-54281 * CVE-2023-54282 * CVE-2023-54283 * CVE-2023-54285 * CVE-2023-54289 * CVE-2023-54291 * CVE-2023-54292 * CVE-2023-54293 * CVE-2023-54296 * CVE-2023-54297 * CVE-2023-54299 * CVE-2023-54300 * CVE-2023-54302 * CVE-2023-54303 * CVE-2023-54304 * CVE-2023-54309 * CVE-2023-54312 * CVE-2023-54313 * CVE-2023-54314 * CVE-2023-54315 * CVE-2023-54316 * CVE-2023-54318 * CVE-2023-54319 * CVE-2023-54322 * CVE-2023-54324 * CVE-2023-54326 * CVE-2024-26944 * CVE-2025-38321 * CVE-2025-38728 * CVE-2025-39977 * CVE-2025-40006 * CVE-2025-40024 * CVE-2025-40033 * CVE-2025-40042 * CVE-2025-40053 * CVE-2025-40081 * CVE-2025-40102 * CVE-2025-40123 * CVE-2025-40134 * CVE-2025-40135 * CVE-2025-40153 * CVE-2025-40158 * CVE-2025-40160 * CVE-2025-40167 * CVE-2025-40170 * CVE-2025-40178 * CVE-2025-40179 * CVE-2025-40187 * CVE-2025-40190 * CVE-2025-40211 * CVE-2025-40213 * CVE-2025-40215 * CVE-2025-40219 * CVE-2025-40220 * CVE-2025-40223 * CVE-2025-40225 * CVE-2025-40231 * CVE-2025-40233 * CVE-2025-40240 * CVE-2025-40242 * CVE-2025-40244 * CVE-2025-40248 * CVE-2025-40250 * CVE-2025-40251 * CVE-2025-40252 * CVE-2025-40256 * CVE-2025-40258 * CVE-2025-40262 * CVE-2025-40263 * CVE-2025-40268 * CVE-2025-40269 * CVE-2025-40271 * CVE-2025-40272 * CVE-2025-40273 * CVE-2025-40274 * CVE-2025-40275 * CVE-2025-40276 * CVE-2025-40277 * CVE-2025-40278 * CVE-2025-40279 * CVE-2025-40280 * CVE-2025-40282 * CVE-2025-40283 * CVE-2025-40284 * CVE-2025-40287 * CVE-2025-40288 * CVE-2025-40289 * CVE-2025-40292 * CVE-2025-40293 * CVE-2025-40294 * CVE-2025-40297 * CVE-2025-40301 * CVE-2025-40302 * CVE-2025-40304 * CVE-2025-40306 * CVE-2025-40307 * CVE-2025-40308 * CVE-2025-40309 * CVE-2025-40310 * CVE-2025-40311 * CVE-2025-40312 * CVE-2025-40314 * CVE-2025-40315 * CVE-2025-40316 * CVE-2025-40317 * CVE-2025-40318 * CVE-2025-40319 * CVE-2025-40320 * CVE-2025-40321 * CVE-2025-40322 * CVE-2025-40323 * CVE-2025-40324 * CVE-2025-40329 * CVE-2025-40330 * CVE-2025-40331 * CVE-2025-40332 * CVE-2025-40337 * CVE-2025-40338 * CVE-2025-40339 * CVE-2025-40340 * CVE-2025-40342 * CVE-2025-40343 * CVE-2025-40345 * CVE-2025-40346 * CVE-2025-40347 * CVE-2025-40349 * CVE-2025-40351 * CVE-2025-40354 * CVE-2025-40357 * CVE-2025-40359 * CVE-2025-40360 * CVE-2025-68168 * CVE-2025-68170 * CVE-2025-68172 * CVE-2025-68176 * CVE-2025-68180 * CVE-2025-68181 * CVE-2025-68183 * CVE-2025-68184 * CVE-2025-68185 * CVE-2025-68190 * CVE-2025-68192 * CVE-2025-68194 * CVE-2025-68195 * CVE-2025-68197 * CVE-2025-68201 * CVE-2025-68204 * CVE-2025-68206 * CVE-2025-68207 * CVE-2025-68208 * CVE-2025-68209 * CVE-2025-68217 * CVE-2025-68218 * CVE-2025-68222 * CVE-2025-68223 * CVE-2025-68230 * CVE-2025-68233 * CVE-2025-68235 * CVE-2025-68237 * CVE-2025-68238 * CVE-2025-68239 * CVE-2025-68244 * CVE-2025-68249 * CVE-2025-68252 * CVE-2025-68255 * CVE-2025-68257 * CVE-2025-68258 * CVE-2025-68259 * CVE-2025-68264 * CVE-2025-68286 * CVE-2025-68287 * CVE-2025-68289 * CVE-2025-68290 * CVE-2025-68298 * CVE-2025-68302 * CVE-2025-68303 * CVE-2025-68305 * CVE-2025-68306 * CVE-2025-68307 * CVE-2025-68308 * CVE-2025-68312 * CVE-2025-68313 * CVE-2025-68328 * CVE-2025-68330 * CVE-2025-68331 * CVE-2025-68332 * CVE-2025-68335 * CVE-2025-68339 * CVE-2025-68340 * CVE-2025-68345 * CVE-2025-68346 * CVE-2025-68347 * CVE-2025-68351 * CVE-2025-68354 * CVE-2025-68362 * CVE-2025-68378 * CVE-2025-68380 * CVE-2025-68724 * CVE-2025-68732 * CVE-2025-68734 * CVE-2025-68740 * CVE-2025-68742 * CVE-2025-68744 * CVE-2025-68746 * CVE-2025-68747 * CVE-2025-68749 * CVE-2025-68750 * CVE-2025-68753 * CVE-2025-68757 * CVE-2025-68758 * CVE-2025-68759 * CVE-2025-68765 * CVE-2025-68766 CVSS scores: * CVE-2023-42752 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-42752 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53743 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53750 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53752 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53759 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53762 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53766 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53766 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53768 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53777 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53777 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53782 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-53782 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2023-53784 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53784 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53785 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53787 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53791 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53792 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53793 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53794 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53794 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-53795 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53797 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53799 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53807 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53808 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53813 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53815 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53821 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53823 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53825 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53828 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53831 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53834 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53836 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53839 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53841 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-53841 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-53842 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53843 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53844 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53846 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53847 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53848 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53850 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53851 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53852 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53855 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53856 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53857 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53860 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53861 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53863 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53864 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53865 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53989 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53989 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53992 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53994 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53995 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-53995 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53996 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2023-53996 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2023-53997 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53998 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-53999 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54000 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54001 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54005 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54006 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54008 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54014 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54014 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54016 ( SUSE ): 5.3 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54016 ( SUSE ): 4.3 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54017 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54017 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54022 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54023 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54023 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54025 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54026 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54027 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54030 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54030 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54031 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54032 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54035 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54037 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54042 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54042 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54045 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54045 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54049 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54051 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54052 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54060 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54066 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54067 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54069 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54072 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54072 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54076 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54076 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54080 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54080 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54083 ( SUSE ): 8.4 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54083 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54088 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54088 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54089 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54089 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-54091 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54091 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54092 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54092 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54093 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54094 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54094 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54095 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54096 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54096 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-54099 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54099 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54101 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54101 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-54104 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54104 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-54106 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54113 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54115 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54115 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54117 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54125 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54125 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2023-54127 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54127 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-54133 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54133 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54134 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54134 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54135 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54135 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54136 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54136 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54137 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54137 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2023-54140 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54140 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54141 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54141 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54142 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54142 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54143 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54143 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54145 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-54145 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-54148 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54148 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H * CVE-2023-54149 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54149 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54153 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54153 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54154 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54154 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54155 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54155 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54156 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54164 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54164 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54166 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54166 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54169 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54170 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54173 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54173 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54177 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54177 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54178 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54178 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54179 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54179 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54181 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54183 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54183 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54185 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-54185 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-54189 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54189 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54194 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54194 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54201 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54201 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54204 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54207 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54207 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54209 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54209 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54210 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54210 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-54211 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54211 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54215 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54215 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54219 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54219 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54220 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54220 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54221 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54221 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54223 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54224 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54224 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54225 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54225 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54227 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54227 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54229 ( SUSE ): 5.1 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54229 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54230 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54230 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54235 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54235 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54240 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54241 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54241 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54246 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54246 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54247 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-54247 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-54251 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54253 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54253 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H * CVE-2023-54254 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54254 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54255 ( SUSE ): 7.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54255 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-54258 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54261 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54261 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54263 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54264 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54264 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54266 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54266 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54267 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2023-54267 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2023-54271 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54271 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54276 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54278 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54278 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54281 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54281 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54282 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54282 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54283 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54283 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54285 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54285 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54289 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54291 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54291 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54292 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54292 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54293 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54293 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-54296 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54296 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54297 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54297 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54299 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54299 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54300 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54300 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54302 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54302 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-54303 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54303 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2023-54304 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54309 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54309 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-54312 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54312 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-54313 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54313 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54314 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54314 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54315 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54316 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2023-54316 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2023-54318 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54319 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2023-54322 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2023-54322 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2023-54324 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-54324 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2023-54326 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2023-54326 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-26944 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2024-26944 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38321 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N * CVE-2025-38321 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L * CVE-2025-38321 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38728 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38728 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38728 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-39977 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-39977 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40006 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40006 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40024 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40024 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40033 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40033 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40042 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40053 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40053 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40081 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40102 ( SUSE ): 0.0 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40102 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N * CVE-2025-40123 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40123 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40134 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40134 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40135 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40135 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40153 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40153 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40158 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40158 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40160 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40160 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40167 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40167 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40170 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40170 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40178 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40179 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40179 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40187 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40190 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40190 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40211 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40211 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40213 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40213 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40215 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40215 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40219 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40219 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40220 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40220 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40223 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40225 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40231 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40240 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40242 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40242 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40244 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40248 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40250 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40251 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40256 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40258 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40258 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40262 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40263 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40263 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40268 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40268 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40269 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40269 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40271 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40272 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40273 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40274 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40275 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40276 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40277 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40278 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40279 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40279 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N * CVE-2025-40280 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40280 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40282 ( SUSE ): 7.1 CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40282 ( SUSE ): 6.5 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40283 ( SUSE ): 7.0 CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40283 ( SUSE ): 6.6 CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40284 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40284 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40288 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40288 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40289 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40292 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40292 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H * CVE-2025-40293 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40293 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40294 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-40294 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N * CVE-2025-40297 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40297 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40301 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40301 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L * CVE-2025-40302 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40302 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-40304 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40304 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40306 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40307 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40307 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40308 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40309 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40309 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40310 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40310 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40311 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40311 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40314 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40314 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40315 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40315 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40316 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40317 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40319 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40320 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40321 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40322 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40322 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2025-40323 ( SUSE ): 7.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40323 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40324 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40329 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40330 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40331 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40332 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40337 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40338 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40338 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40339 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40340 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40342 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40342 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40343 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40343 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40345 ( SUSE ): 7.0 CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-40345 ( SUSE ): 6.8 CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-40346 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40346 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40347 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40349 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40349 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40351 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40354 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40354 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-40357 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-40357 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-40359 ( SUSE ): 2.0 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-40359 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L * CVE-2025-40360 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-40360 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68168 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68168 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68170 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68176 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68180 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68181 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68183 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68183 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68184 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68184 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68185 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68185 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68190 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68190 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68192 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68194 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68194 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68197 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68201 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68201 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68204 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68204 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68206 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68206 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68208 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68208 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H * CVE-2025-68209 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68218 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68222 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68223 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68223 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68230 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68230 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68233 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68235 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68237 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68238 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68239 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68244 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68249 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68252 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68255 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68255 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-68257 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68258 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68259 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68264 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68264 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-68286 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68287 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68289 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68290 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68298 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68302 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68303 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68305 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68305 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68306 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68306 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68307 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68307 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68308 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68308 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68312 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68312 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68313 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68313 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68328 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68328 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68330 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68330 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68331 ( SUSE ): 5.4 CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68331 ( SUSE ): 6.3 CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68332 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68335 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68339 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68339 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H * CVE-2025-68340 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68340 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-68345 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68346 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68347 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68347 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68351 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68354 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68362 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68378 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68380 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68724 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68732 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68732 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68734 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68734 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68740 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68740 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68742 ( SUSE ): 5.6 CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68742 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68744 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68744 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68746 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68746 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68747 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-68747 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-68749 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68749 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68750 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68750 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H * CVE-2025-68753 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-68753 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2025-68757 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68757 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68758 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68758 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-68759 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68759 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68765 ( SUSE ): 6.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-68765 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-68766 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N * CVE-2025-68766 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H Affected Products: * SUSE Linux Enterprise Live Patching 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Real Time Module 15-SP7 An update that solves 395 vulnerabilities, contains 29 features and has 44 security fixes can now be installed. ## Description: The SUSE Linux Enterprise 15 SP7 RT kernel was updated to fix various security issues The following security issues were fixed: * CVE-2025-38321: smb: Log an error when close_all_cached_dirs fails (bsc#1246328). * CVE-2025-38728: smb3: fix for slab out of bounds on mount to ksmbd (bsc#1249256). * CVE-2025-39977: futex: Prevent use-after-free during requeue-PI (bsc#1252046). * CVE-2025-40006: mm/hugetlb: fix folio is still mapped when deleted (bsc#1252342). * CVE-2025-40024: vhost: Take a reference on the task in struct vhost_task (bsc#1252686). * CVE-2025-40033: remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable() (bsc#1252824). * CVE-2025-40042: tracing: Fix race condition in kprobe initialization causing NULL pointer dereference (bsc#1252861). * CVE-2025-40053: net: dlink: handle copy_thresh allocation failure (bsc#1252808). * CVE-2025-40081: perf: arm_spe: Prevent overflow in PERF_IDX2OFF() (bsc#1252776). * CVE-2025-40102: KVM: arm64: Prevent access to vCPU events before init (bsc#1252919). * CVE-2025-40134: dm: fix NULL pointer dereference in __dm_suspend() (bsc#1253386). * CVE-2025-40135: ipv6: use RCU in ip6_xmit() (bsc#1253342). * CVE-2025-40153: mm: hugetlb: avoid soft lockup when mprotect to large memory area (bsc#1253408). * CVE-2025-40158: ipv6: use RCU in ip6_output() (bsc#1253402). * CVE-2025-40160: xen/events: Cleanup find_virq() return codes (bsc#1253400). * CVE-2025-40167: ext4: detect invalid INLINE_DATA + EXTENTS flag combination (bsc#1253458). * CVE-2025-40170: net: use dst_dev_rcu() in sk_setup_caps() (bsc#1253413). * CVE-2025-40178: pid: Add a judgment for ns null in pid_nr_ns (bsc#1253463). * CVE-2025-40179: ext4: verify orphan file size is not too big (bsc#1253442). * CVE-2025-40187: net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce() (bsc#1253647). * CVE-2025-40190: ext4: guard against EA inode refcount underflow in xattr update (bsc#1253623). * CVE-2025-40215: kABI: xfrm: delete x->tunnel as we delete x (bsc#1254959). * CVE-2025-40220: fuse: fix livelock in synchronous file put from fuseblk workers (bsc#1254520). * CVE-2025-40231: vsock: fix lock inversion in vsock_assign_transport() (bsc#1254815). * CVE-2025-40233: ocfs2: clear extent cache after moving/defragmenting extents (bsc#1254813). * CVE-2025-40240: sctp: avoid NULL dereference when chunk data buffer is missing (bsc#1254869). * CVE-2025-40242: gfs2: Fix unlikely race in gdlm_put_lock (bsc#1255075). * CVE-2025-40248: vsock: Ignore signal/timeout on connect() if already established (bsc#1254864). * CVE-2025-40250: net/mlx5: Clean up only new IRQ glue on request_irq() failure (bsc#1254854). * CVE-2025-40251: devlink: rate: Unset parent pointer in devl_rate_nodes_destroy (bsc#1254856). * CVE-2025-40252: net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end() (bsc#1254849). * CVE-2025-40258: mptcp: fix race condition in mptcp_schedule_work() (bsc#1254843). * CVE-2025-40268: cifs: client: fix memory leak in smb3_fs_context_parse_param (bsc#1255082). * CVE-2025-40271: fs/proc: fix uaf in proc_readdir_de() (bsc#1255297). * CVE-2025-40274: KVM: guest_memfd: Remove bindings on memslot deletion when gmem is dying (bsc#1254830). * CVE-2025-40278: net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak (bsc#1254825). * CVE-2025-40279: net: sched: act_connmark: initialize struct tc_ife to fix kernel leak (bsc#1254846). * CVE-2025-40280: tipc: Fix use-after-free in tipc_mon_reinit_self() (bsc#1254847). * CVE-2025-40287: exfat: fix improper check of dentry.stream.valid_size (bsc#1255030). * CVE-2025-40289: drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM (bsc#1255042). * CVE-2025-40292: virtio-net: fix received length check in big packets (bsc#1255175). * CVE-2025-40293: iommufd: Don't overflow during division for dirty tracking (bsc#1255179). * CVE-2025-40297: net: bridge: fix use-after-free due to MST port state bypass (bsc#1255187). * CVE-2025-40307: exfat: validate cluster allocation bits of the allocation bitmap (bsc#1255039). * CVE-2025-40319: bpf: Sync pending IRQ work before freeing ring buffer (bsc#1254794). * CVE-2025-40330: bnxt_en: Shutdown FW DMA in bnxt_shutdown() (bsc#1254616). * CVE-2025-40331: sctp: Prevent TOCTOU out-of-bounds write (bsc#1254615). * CVE-2025-40337: net: stmmac: Correctly handle Rx checksum offload errors (bsc#1255081). * CVE-2025-40338: ASoC: Intel: avs: Do not share the name pointer between components (bsc#1255273). * CVE-2025-40346: arch_topology: Fix incorrect error check in topology_parse_cpu_capacity() (bsc#1255318). * CVE-2025-40357: net/smc: fix general protection fault in __smc_diag_dump (bsc#1255097). * CVE-2025-68197: bnxt_en: Fix null pointer dereference in bnxt_bs_trace_check_wrap() (bsc#1255242). * CVE-2025-68204: pmdomain: arm: scmi: Fix genpd leak on provider registration failure (bsc#1255224). * CVE-2025-68206: netfilter: nft_ct: add seqadj extension for natted connections (bsc#1255142). * CVE-2025-68208: bpf: account for current allocated stack depth in widen_imprecise_scalars() (bsc#1255227). * CVE-2025-68209: mlx5: Fix default values in create CQ (bsc#1255230). * CVE-2025-68239: binfmt_misc: restore write access before closing files opened by open_exec() (bsc#1255272). * CVE-2025-68255: staging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing (bsc#1255395). * CVE-2025-68259: KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced (bsc#1255199). * CVE-2025-68264: ext4: refresh inline data size before write operations (bsc#1255380). * CVE-2025-68302: net: sxgbe: fix potential NULL dereference in sxgbe_rx() (bsc#1255121). * CVE-2025-68340: team: Move team device type change at the end of team_port_add (bsc#1255507). * CVE-2025-68378: bpf: Refactor stack map trace depth calculation into helper function (bsc#1255614). * CVE-2025-68742: bpf: Improve program stats run-time calculation (bsc#1255707). * CVE-2025-68744: bpf: Free special fields when update [lru_,]percpu_hash maps (bsc#1255709). The following non security issues were fixed: * ACPI: CPPC: Fix missing PCC check for guaranteed_perf (git-fixes). * ACPI: PCC: Fix race condition by removing static qualifier (git-fixes). * ACPI: processor_core: fix map_x2apic_id for amd-pstate on am4 (git-fixes). * ACPI: property: Fix fwnode refcount leak in acpi_fwnode_graph_parse_endpoint() (git-fixes). * ACPI: property: Use ACPI functions in acpi_graph_get_next_endpoint() only (stable-fixes). * ACPICA: Avoid walking the Namespace if start_node is NULL (stable-fixes). * ALSA: ac97: fix a double free in snd_ac97_controller_register() (git-fixes). * ALSA: dice: fix buffer overflow in detect_stream_formats() (git-fixes). * ALSA: firewire-motu: add bounds check in put_user loop for DSP events (git- fixes). * ALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events (git- fixes). * ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi() (git-fixes). * ALSA: pcmcia: Fix resource leak in snd_pdacf_probe error path (git-fixes). * ALSA: uapi: Fix typo in asound.h comment (git-fixes). * ALSA: usb-audio: Add DSD quirk for LEAK Stereo 230 (stable-fixes). * ALSA: usb-audio: Add native DSD quirks for PureAudio DAC series (stable- fixes). * ALSA: usb-audio: fix uac2 clock source at terminal parser (git-fixes). * ALSA: usb-mixer: us16x08: validate meter packet indices (git-fixes). * ALSA: vxpocket: Fix resource leak in vxpocket_probe error path (git-fixes). * ASoC: Intel: catpt: Fix error path in hw_params() (git-fixes). * ASoC: ak4458: Disable regulator when error happens (git-fixes). * ASoC: ak4458: remove the reset operation in probe and remove (git-fixes). * ASoC: ak5558: Disable regulator when error happens (git-fixes). * ASoC: bcm: bcm63xx-pcm-whistler: Check return value of of_dma_configure() (git-fixes). * ASoC: codecs: lpass-tx-macro: fix SM6115 support (git-fixes). * ASoC: codecs: wcd938x: fix OF node leaks on probe failure (git-fixes). * ASoC: fsl_xcvr: clear the channel status control memory (git-fixes). * ASoC: qcom: q6adm: the the copp device only during last instance (git- fixes). * ASoC: qcom: q6apm-dai: set flags to reflect correct operation of appl_ptr (git-fixes). * ASoC: qcom: q6asm-dai: perform correct state check before closing (git- fixes). * ASoC: qcom: qdsp6: q6asm-dai: set 10 ms period and buffer alignment (git- fixes). * ASoC: stm32: sai: fix OF node leak on probe (git-fixes). * ASoC: stm32: sai: fix clk prepare imbalance on probe failure (git-fixes). * ASoC: stm32: sai: fix device leak on probe (git-fixes). * ASoC: sun4i-spdif: Add missing kerneldoc fields for sun4i_spdif_quirks (git- fixes). * Bluetooth: HCI: Fix tracking of advertisement set/instance 0x00 (git-fixes). * Bluetooth: MGMT: fix crash in set_mesh_sync and set_mesh_complete (git- fixes). * Bluetooth: SMP: Fix not generating mackey and ltk when repairing (git- fixes). * Bluetooth: btrtl: Avoid loading the config file on security chips (stable- fixes). * Bluetooth: btusb: Add new VID/PID 13d3/3533 for RTL8821CE (stable-fixes). * Bluetooth: btusb: Add new VID/PID 2b89/6275 for RTL8761BUV (stable-fixes). * Bluetooth: btusb: mediatek: Avoid btusb_mtk_claim_iso_intf() NULL deref (git-fixes). * Bluetooth: btusb: mediatek: Fix kernel crash when releasing mtk iso interface (git-fixes). * Bluetooth: btusb: revert use of devm_kzalloc in btusb (git-fixes). * Bluetooth: hci_sock: Prevent race in socket write iter and sock bind (git- fixes). * Documentation/kernel-parameters: fix typo in retbleed= kernel parameter description (git-fixes). * Documentation: hid-alps: Fix packet format section headings (git-fixes). * Documentation: parport-lowlevel: Separate function listing code blocks (git- fixes). * HID: apple: Add SONiX AK870 PRO to non_apple_keyboards quirk list (stable- fixes). * HID: elecom: Add support for ELECOM M-XT3URBK (018F) (stable-fixes). * HID: hid-input: Extend Elan ignore battery quirk to USB (stable-fixes). * HID: input: map HID_GD_Z to ABS_DISTANCE for stylus/pen (stable-fixes). * HID: logitech-dj: Remove duplicate error logging (git-fixes). * HID: logitech-hidpp: Do not assume FAP in hidpp_send_message_sync() (git- fixes). * HID: quirks: work around VID/PID conflict for appledisplay (git-fixes). * Input: atkbd - skip deactivate for HONOR FMB-P's internal keyboard (git- fixes). * Input: cros_ec_keyb - fix an invalid memory access (stable-fixes). * Input: goodix - add support for ACPI ID GDIX1003 (stable-fixes). * Input: goodix - add support for ACPI ID GDX9110 (stable-fixes). * Input: i8042 - add TUXEDO InfinityBook Max Gen10 AMD to i8042 quirk table (stable-fixes). * Input: ti_am335x_tsc - fix off-by-one error in wire_order validation (git- fixes). * KEYS: trusted: Fix a memory leak in tpm2_load_cmd (git-fixes). * KEYS: trusted_tpm1: Compare HMAC values in constant time (git-fixes). * KVM: SEV: Drop GHCB_VERSION_DEFAULT and open code it (bsc#1255463). * PCI/PM: Reinstate clearing state_saved in legacy and !PM codepaths (git- fixes). * PCI: dwc: Fix wrong PORT_LOGIC_LTSSM_STATE_MASK definition (git-fixes). * PCI: keystone: Exit ks_pcie_probe() for invalid mode (git-fixes). * PCI: rcar-gen2: Drop ARM dependency from PCI_RCAR_GEN2 (git-fixes). * PM: runtime: Do not clear needs_force_resume with enabled runtime PM (git- fixes). * Revert "drm/amd/display: Fix pbn to kbps Conversion" (stable-fixes). * Revert "drm/amd/display: Move setup_stream_attribute" (stable-fixes). * Revert "drm/amd: Skip power ungate during suspend for VPE" (git-fixes). * Revert "mtd: rawnand: marvell: fix layouts" (git-fixes). * Revert "net: r8169: Disable multicast filter for RTL8168H and RTL8107E" (jsc#PED-14353). * Revert "r8169: don't try to disable interrupts if NAPI is, scheduled already" (jsc#PED-14353). * USB: Fix descriptor count when handling invalid MBIM extended descriptor (git-fixes). * USB: lpc32xx_udc: Fix error handling in probe (git-fixes). * USB: serial: belkin_sa: fix TIOCMBIS and TIOCMBIC (git-fixes). * USB: serial: ftdi_sio: add support for u-blox EVK-M101 (stable-fixes). * USB: serial: ftdi_sio: match on interface number for jtag (stable-fixes). * USB: serial: kobil_sct: fix TIOCMBIS and TIOCMBIC (git-fixes). * USB: serial: option: add Foxconn T99W760 (stable-fixes). * USB: serial: option: add Quectel RG255C (stable-fixes). * USB: serial: option: add Telit Cinterion FE910C04 new compositions (stable- fixes). * USB: serial: option: add Telit FN920C04 ECM compositions (stable-fixes). * USB: serial: option: add UNISOC UIS7720 (stable-fixes). * USB: serial: option: add support for Rolling RW101R-GL (stable-fixes). * USB: serial: option: move Telit 0x10c7 composition in the right place (stable-fixes). * USB: storage: Remove subclass and protocol overrides from Novatek quirk (git-fixes). * accel/ivpu: Fix DCT active percent format (git-fixes). * accel/ivpu: Fix race condition when unbinding BOs (git-fixes). * arm64: zynqmp: Fix usb node drive strength and slew rate (git-fixes). * arm64: zynqmp: Revert usb node drive strength and slew rate for (git-fixes). * atm/fore200e: Fix possible data race in fore200e_open() (git-fixes). * atm: Fix dma_free_coherent() size (git-fixes). * atm: idt77252: Add missing `dma_map_error()` (stable-fixes). * backlight: led-bl: Add devlink to supplier LEDs (git-fixes). * backlight: lp855x: Fix lp855x.h kernel-doc warnings (git-fixes). * bpf: Do not limit bpf_cgroup_from_id to current's namespace (bsc#1255433). * bpf: Reject bpf_timer for PREEMPT_RT (git-fixes). * broadcom: b44: prevent uninitialized value usage (git-fixes). * btrfs: make sure extent and csum paths are always released in scrub_raid56_parity_stripe() (git-fixes). * can: gs_usb: gs_can_open(): fix error handling (git-fixes). * can: gs_usb: gs_usb_xmit_callback(): fix handling of failed transmitted URBs (git-fixes). * can: j1939: make j1939_sk_bind() fail if device is no longer registered (git-fixes). * can: kvaser_usb: leaf: Fix potential infinite loop in command parsers (git- fixes). * can: sja1000: fix max irq loop handling (git-fixes). * can: sun4i_can: sun4i_can_interrupt(): fix max irq loop handling (git- fixes). * cgroup: rstat: use LOCK CMPXCHG in css_rstat_updated (bsc#1255434). * char: applicom: fix NULL pointer dereference in ac_ioctl (stable-fixes). * cifs: Fix uncached read into ITER_KVEC iterator (bsc#1245449). * clk: qcom: camcc-sm6350: Fix PLL config of PLL2 (git-fixes). * clk: qcom: camcc-sm6350: Specify Titan GDSC power domain as a parent to other (git-fixes). * clk: renesas: cpg-mssr: Add missing 1ms delay into reset toggle callback (git-fixes). * clk: renesas: r9a06g032: Fix memory leak in error path (git-fixes). * clk: samsung: exynos-clkout: Assign .num before accessing .hws (git-fixes). * comedi: c6xdigio: Fix invalid PNP driver unregistration (git-fixes). * comedi: check device's attached status in compat ioctls (git-fixes). * comedi: multiq3: sanitize config options in multiq3_attach() (git-fixes). * comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel() (git-fixes). * cpufreq: intel_pstate: Check IDA only before MSR_IA32_PERF_CTL writes (git- fixes). * cpufreq: nforce2: fix reference count leak in nforce2 (git-fixes). * cpuidle: menu: Use residency threshold in polling state override decisions (bsc#1255026). * crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id (git-fixes). * crypto: authenc - Correctly pass EINPROGRESS back up to the caller (git- fixes). * crypto: ccree - Correctly handle return of sg_nents_for_len (git-fixes). * crypto: hisilicon/qm - restore original qos values (git-fixes). * crypto: iaa - Fix incorrect return value in save_iaa_wq() (git-fixes). * crypto: qat - fix duplicate restarting msg during AER error (git-fixes). * crypto: rockchip - drop redundant crypto_skcipher_ivsize() calls (git- fixes). * crypto: seqiv - Do not use req->iv after crypto_aead_encrypt (git-fixes). * dm-integrity: limit MAX_TAG_SIZE to 255 (git-fixes). * dm-verity: fix unreliable memory allocation (git-fixes). * dm: fix queue start/stop imbalance under suspend/load/resume races (bsc#1253386). * drivers/usb/dwc3: fix PCI parent check (git-fixes). * drm/amd/amdgpu: reserve vm invalidation engine for uni_mes (stable-fixes). * drm/amd/display: Check NULL before accessing (stable-fixes). * drm/amd/display: Clear the CUR_ENABLE register on DCN20 on DPP5 (stable- fixes). * drm/amd/display: Don't change brightness for disabled connectors (stable- fixes). * drm/amd/display: Fix logical vs bitwise bug in get_embedded_panel_info_v2_1() (git-fixes). * drm/amd/display: Fix pbn to kbps Conversion (stable-fixes). * drm/amd/display: Fix scratch registers offsets for DCN35 (stable-fixes). * drm/amd/display: Fix scratch registers offsets for DCN351 (stable-fixes). * drm/amd/display: Increase DPCD read retries (stable-fixes). * drm/amd/display: Insert dccg log for easy debug (stable-fixes). * drm/amd/display: Move sleep into each retry for retrieve_link_cap() (stable- fixes). * drm/amd/display: Prevent Gating DTBCLK before It Is Properly Latched (git- fixes). * drm/amd/display: Use GFP_ATOMIC in dc_create_plane_state() (stable-fixes). * drm/amd/display: avoid reset DTBCLK at clock init (stable-fixes). * drm/amd/display: disable DPP RCG before DPP CLK enable (stable-fixes). * drm/amd: Skip power ungate during suspend for VPE (stable-fixes). * drm/amdgpu/gmc11: add amdgpu_vm_handle_fault() handling (stable-fixes). * drm/amdgpu/gmc12: add amdgpu_vm_handle_fault() handling (stable-fixes). * drm/amdgpu: Forward VMID reservation errors (git-fixes). * drm/amdgpu: Skip emit de meta data on gfx11 with rs64 enabled (stable- fixes). * drm/amdgpu: add missing lock to amdgpu_ttm_access_memory_sdma (git-fixes). * drm/amdgpu: fix cyan_skillfish2 gpu info fw handling (git-fixes). * drm/amdgpu: fix gpu page fault after hibernation on PF passthrough (stable- fixes). * drm/amdkfd: Export the cwsr_size and ctl_stack_size to userspace (stable- fixes). * drm/amdkfd: Fix GPU mappings for APU after prefetch (stable-fixes). * drm/amdkfd: Trap handler support for expert scheduling mode (stable-fixes). * drm/amdkfd: Use huge page size to check split svm range alignment (git- fixes). * drm/amdkfd: bump minimum vgpr size for gfx1151 (stable-fixes). * drm/displayid: add quirk to ignore DisplayID checksum errors (stable-fixes). * drm/displayid: pass iter to drm_find_displayid_extension() (stable-fixes). * drm/edid: add DRM_EDID_IDENT_INIT() to initialize struct drm_edid_ident (stable-fixes). * drm/gma500: Remove unused helper psb_fbdev_fb_setcolreg() (git-fixes). * drm/i915/dp: Initialize the source OUI write timestamp always (stable- fixes). * drm/i915/dp_mst: Disable Panel Replay (git-fixes). * drm/i915/gem: Zero-initialize the eb.vma array in i915_gem_do_execbuffer (git-fixes). * drm/i915: Fix format string truncation warning (git-fixes). * drm/imagination: Disallow exporting of PM/FW protected objects (git-fixes). * drm/imagination: Fix reference to devm_platform_get_and_ioremap_resource() (git-fixes). * drm/me/gsc: mei interrupt top half should be in irq disabled context (git- fixes). * drm/mediatek: Fix CCORR mtk_ctm_s31_32_to_s1_n function issue (git-fixes). * drm/mediatek: Fix device node reference leak in mtk_dp_dt_parse() (git- fixes). * drm/mediatek: Fix probe device leaks (git-fixes). * drm/mediatek: Fix probe memory leak (git-fixes). * drm/mediatek: Fix probe resource leaks (git-fixes). * drm/mediatek: ovl_adaptor: Fix probe device leaks (git-fixes). * drm/mgag200: Fix big-endian support (git-fixes). * drm/msm/a2xx: stop over-complaining about the legacy firmware (git-fixes). * drm/msm/a6xx: Fix out of bound IO access in a6xx_get_gmu_registers (git- fixes). * drm/msm/a6xx: Fix the gemnoc workaround (git-fixes). * drm/msm/a6xx: Flush LRZ cache before PT switch (git-fixes). * drm/msm/a6xx: Improve MX rail fallback in RPMH vote init (git-fixes). * drm/msm/dpu: Add missing NULL pointer check for pingpong interface (git- fixes). * drm/msm/dpu: Remove dead-code in dpu_encoder_helper_reset_mixers() (git- fixes). * drm/msm/dpu: drop dpu_hw_dsc_destroy() prototype (git-fixes). * drm/nouveau/dispnv50: Don't call drm_atomic_get_crtc_state() in prepare_fb (git-fixes). * drm/nouveau: refactor deprecated strcpy (git-fixes). * drm/nouveau: restrict the flush page to a 32-bit address (git-fixes). * drm/panel: sony-td4353-jdi: Enable prepare_prev_first (git-fixes). * drm/panel: visionox-rm69299: Don't clear all mode flags (git-fixes). * drm/panthor: Avoid adding of kernel BOs to extobj list (git-fixes). * drm/panthor: Fix UAF on kernel BO VA nodes (git-fixes). * drm/panthor: Fix group_free_queue() for partially initialized queues (git- fixes). * drm/panthor: Fix potential memleak of vma structure (git-fixes). * drm/panthor: Fix race with suspend during unplug (git-fixes). * drm/panthor: Flush shmem writes before mapping buffers CPU-uncached (git- fixes). * drm/panthor: Handle errors returned by drm_sched_entity_init() (git-fixes). * drm/pl111: Fix error handling in pl111_amba_probe (git-fixes). * drm/plane: Fix IS_ERR() vs NULL check in drm_plane_create_hotspot_properties() (git-fixes). * drm/radeon: delete radeon_fence_process in is_signaled, no deadlock (stable- fixes). * drm/sched: Fix race in drm_sched_entity_select_rq() (git-fixes). * drm/tilcdc: Fix removal actions in case of failed probe (git-fixes). * drm/tilcdc: request and mapp iomem with devres (stable-fixes). * drm/ttm: Avoid NULL pointer deref for evicted BOs (git-fixes). * drm/vgem-fence: Fix potential deadlock on release (git-fixes). * drm/vmwgfx: Use kref in vmw_bo_dirty (stable-fixes). * drm/xe/bo: Don't include the CCS metadata in the dma-buf sg-table (git- fixes). * drm/xe/oa: Disallow 0 OA property values (git-fixes). * drm/xe/oa: Fix potential UAF in xe_oa_add_config_ioctl() (git-fixes). * drm/xe/oa: Limit num_syncs to prevent oversized allocations (git-fixes). * drm/xe: Adjust long-running workload timeslices to reasonable values (git- fixes). * drm/xe: Drop preempt-fences when destroying imported dma-bufs (git-fixes). * drm/xe: Fix conversion from clock ticks to milliseconds (git-fixes). * drm/xe: Limit num_syncs to prevent oversized allocations (git-fixes). * drm/xe: Prevent BIT() overflow when handling invalid prefetch region (git- fixes). * drm/xe: Restore engine registers before restarting schedulers after GT reset (git-fixes). * drm/xe: Use usleep_range for accurate long-running workload timeslicing (git-fixes). * drm: atmel-hlcdc: fix atmel_xlcdc_plane_setup_scaler() (git-fixes). * drm: nouveau: Replace sprintf() with sysfs_emit() (git-fixes). * drm: sti: fix device leaks at component probe (git-fixes). * efi/libstub: Avoid physical address 0x0 when doing random allocation (stable-fixes). * efi/libstub: Describe missing 'out' parameter in efi_load_initrd (git- fixes). * efi/libstub: Fix page table access in 5-level to 4-level paging transition (git-fixes). * efi: stmm: Fix incorrect buffer allocation method (git-fixes). * efi: stmm: fix kernel-doc "bad line" warnings (git-fixes). * exfat: add a check for invalid data size (git-fixes). * exfat: using hweight instead of internal logic (git-fixes). * ext4: use optimized mballoc scanning regardless of inode format (bsc#1254378). * ext4: wait for ongoing I/O to complete before freeing blocks (bsc#1256366). * fbdev: gbefb: fix to use physical address instead of dma address (stable- fixes). * fbdev: pxafb: Fix multiple clamped values in pxafb_adjust_timing (git- fixes). * fbdev: ssd1307fb: fix potential page leak in ssd1307fb_probe() (git-fixes). * fbdev: tcx.c fix mem_map to correct smem_start offset (git-fixes). * firewire: nosy: Fix dma_free_coherent() size (git-fixes). * firmware: imx: scu-irq: Init workqueue before request mbox channel (stable- fixes). * firmware: imx: scu-irq: fix OF node leak in (git-fixes). * firmware: stratix10-svc: Add mutex in stratix10 memory management (git- fixes). * firmware: stratix10-svc: fix bug in saving controller data (git-fixes). * firmware: stratix10-svc: fix make htmldocs warning for stratix10_svc (git- fixes). * fs: dlm: allow to F_SETLKW getting interrupted (bsc#1255025). * ftrace: bpf: Fix IPMODIFY + DIRECT in modify_ftrace_direct() (git-fixes). * genalloc.h: fix htmldocs warning (git-fixes). * gpio: rockchip: mark the GPIO controller as sleeping (git-fixes). * gpu: host1x: Fix race in syncpt alloc/free (git-fixes). * hwmon: (ibmpex) fix use-after-free in high/low store (git-fixes). * hwmon: (max16065) Use local variable to avoid TOCTOU (git-fixes). * hwmon: (tmp401) fix overflow caused by default conversion rate value (git- fixes). * hwmon: (w83791d) Convert macros to functions to avoid TOCTOU (git-fixes). * hwmon: (w83l786ng) Convert macros to functions to avoid TOCTOU (git-fixes). * hwmon: sy7636a: Fix regulator_enable resource leak on error path (git- fixes). * i2c: amd-mp2: fix reference leak in MP2 PCI device (git-fixes). * i2c: designware: Disable SMBus interrupts to prevent storms from mis- configured firmware (stable-fixes). * i2c: i2c.h: fix a bad kernel-doc line (git-fixes). * i3c: fix refcount inconsistency in i3c_master_register (git-fixes). * i3c: master: Inherit DMA masks and parameters from parent device (stable- fixes). * i3c: master: svc: Prevent incomplete IBI transaction (git-fixes). * idr: fix idr_alloc() returning an ID out of range (git-fixes). * iio: accel: bmc150: Fix irq assumption regression (stable-fixes). * iio: accel: fix ADXL355 startup race condition (git-fixes). * iio: adc: ad7280a: fix ad7280_store_balance_timer() (git-fixes). * iio: adc: ti_am335x_adc: Limit step_avg to valid range for gcc complains (stable-fixes). * iio: core: Clean up device correctly on iio_device_alloc() failure (git- fixes). * iio: core: add missing mutex_destroy in iio_dev_release() (git-fixes). * iio: imu: st_lsm6dsx: Fix measurement unit for odr struct member (git- fixes). * iio: imu: st_lsm6dsx: fix array size for st_lsm6dsx_settings fields (git- fixes). * iio: st_lsm6dsx: Fixed calibrated timestamp calculation (git-fixes). * ima: Handle error code returned by ima_filter_rule_match() (git-fixes). * intel_th: Fix error handling in intel_th_output_open (git-fixes). * ipmi: Fix __scan_channels() failing to rescan channels (stable-fixes). * ipmi: Fix handling of messages with provided receive message pointer (git- fixes). * ipmi: Fix the race between __scan_channels() and deliver_response() (stable- fixes). * ipmi: Rework user message limit handling (git-fixes). * irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc() (git-fixes). * kconfig/mconf: Initialize the default locale at startup (stable-fixes). * kconfig/nconf: Initialize the default locale at startup (stable-fixes). * leds: leds-lp50xx: Allow LED 0 to be added to module bank (git-fixes). * leds: leds-lp50xx: Enable chip before any communication (git-fixes). * leds: leds-lp50xx: LP5009 supports 3 modules for a total of 9 LEDs (git- fixes). * leds: netxbig: Fix GPIO descriptor leak in error paths (git-fixes). * lib/vsprintf: Check pointer before dereferencing in time_and_date() (git- fixes). * mailbox: mailbox-test: Fix debugfs_create_dir error checking (git-fixes). * media: TDA1997x: Remove redundant cancel_delayed_work in probe (git-fixes). * media: adv7842: Avoid possible out-of-bounds array accesses in adv7842_cp_log_status() (git-fixes). * media: amphion: Add a frame flush mode for decoder (stable-fixes). * media: amphion: Cancel message work before releasing the VPU core (git- fixes). * media: amphion: Make some vpu_v4l2 functions static (stable-fixes). * media: amphion: Remove vpu_vb_is_codecconfig (git-fixes). * media: atomisp: Prefix firmware paths with "intel/ipu/" (bsc#1252973). * media: atomisp: Remove firmware_name module parameter (bsc#1252973). * media: cec: Fix debugfs leak on bus_register() failure (git-fixes). * media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg() (git-fixes). * media: i2c: ADV7604: Remove redundant cancel_delayed_work in probe (git- fixes). * media: i2c: adv7842: Remove redundant cancel_delayed_work in probe (git- fixes). * media: imx-mipi-csis: Drop extra clock enable at probe() (git-fixes). * media: msp3400: Avoid possible out-of-bounds array accesses in msp3400c_thread() (git-fixes). * media: nxp: imx8-isi: Mark all crossbar sink pads as MUST_CONNECT (stable- fixes). * media: ov5640: fix vblank unchange issue when work at dvp mode (git-fixes). * media: pci: ivtv: Don't create fake v4l2_fh (stable-fixes). * media: pvrusb2: Fix incorrect variable used in trace message (git-fixes). * media: qcom: camss: Fix genpd cleanup (git-fixes). * media: qcom: camss: Fix ordering of pm_runtime_enable (git-fixes). * media: qcom: camss: cleanup media device allocated resource on error path (git-fixes). * media: qcom: venus: fix incorrect return value (stable-fixes). * media: radio-isa: use dev_name to fill in bus_info (stable-fixes). * media: rc: st_rc: Fix reset control resource leak (git-fixes). * media: renesas: rcar_drif: fix device node reference leak in rcar_drif_bond_enabled (git-fixes). * media: s5p-mfc: Fix potential deadlock on condlock (stable-fixes). * media: samsung: exynos4-is: fix potential ABBA deadlock on init (git-fixes). * media: uvcvideo: Force UVC version to 1.0a for 0408:4033 (stable-fixes). * media: v4l2-mem2mem: Fix outdated documentation (git-fixes). * media: verisilicon: Fix CPU stalls on G2 bus error (git-fixes). * media: verisilicon: Protect G2 HEVC decoder against invalid DPB index (git- fixes). * media: verisilicon: Store chroma and motion vectors offset (stable-fixes). * media: verisilicon: g2: Use common helpers to compute chroma and mv offsets (stable-fixes). * media: videobuf2: Fix device reference leak in vb2_dc_alloc error path (git- fixes). * media: vidtv: initialize local pointers upon transfer of memory ownership (git-fixes). * media: vpif_capture: fix section mismatch (git-fixes). * media: vpif_display: fix section mismatch (git-fixes). * mei: gsc: add dependency on Xe driver (git-fixes). * mei: me: add wildcat lake P DID (stable-fixes). * mfd: altera-sysmgr: Fix device leak on sysmgr regmap lookup (git-fixes). * mfd: da9055: Fix missing regmap_del_irq_chip() in error path (git-fixes). * mfd: max77620: Fix potential IRQ chip conflict when probing two devices (git-fixes). * mfd: mt6358-irq: Fix missing irq_domain_remove() in error path (git-fixes). * mfd: mt6397-irq: Fix missing irq_domain_remove() in error path (git-fixes). * mmc: sdhci-esdhc-imx: add alternate ARCH_S32 dependency to Kconfig (git- fixes). * mmc: sdhci-msm: Avoid early clock doubling during HS400 transition (stable- fixes). * most: usb: fix double free on late probe failure (git-fixes). * mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add() (git-fixes). * mtd: lpddr_cmds: fix signed shifts in lpddr_cmds (git-fixes). * mtd: maps: pcmciamtd: fix potential memory leak in pcmciamtd_detach() (git- fixes). * mtd: nand: relax ECC parameter validation check (git-fixes). * mtd: rawnand: lpc32xx_slc: fix GPIO descriptor leak on probe error and remove (git-fixes). * mtd: rawnand: renesas: Handle devm_pm_runtime_enable() errors (git-fixes). * net: mdio: aspeed: add dummy read to avoid read-after-write issue (git- fixes). * net: nfc: fix deadlock between nfc_unregister_device and rfkill_fop_write (git-fixes). * net: phy: adin1100: Fix software power-down ready condition (git-fixes). * net: phy: mxl-gpy: fix bogus error on USXGMII and integrated PHY (git- fixes). * net: phy: mxl-gpy: fix link properties on USXGMII and internal PHYs (git- fixes). * net: r8169: Disable multicast filter for RTL8168H and RTL8107E (jsc#PED-14353). * net: rose: fix invalid array index in rose_kill_by_device() (git-fixes). * net: usb: pegasus: fix memory leak in update_eth_regs_async() (git-fixes). * net: usb: rtl8150: fix memory leak on usb_submit_urb() failure (git-fixes). * net: usb: sr9700: fix incorrect command used to write single register (git- fixes). * net: wwan: iosm: Fix memory leak in ipc_mux_deinit() (git-fixes). * netdevsim: print human readable IP address (bsc#1255071). * nfc: pn533: Fix error code in pn533_acr122_poweron_rdr() (git-fixes). * nfsd: do not defer requests during idmap lookup in v4 compound decode (bsc#1232223). * nfsd: fix return error codes for nfsd_map_name_to_id (bsc#1232223). * nvme: Use non zero KATO for persistent discovery connections (git-fixes). * orangefs: fix xattr related buffer overflow.. (git-fixes). * perf list: Add IBM z17 event descriptions (jsc#PED-13611). * perf/x86/intel: Fix KASAN global-out-of-bounds warning (git-fixes). * phy: broadcom: bcm63xx-usbh: fix section mismatches (git-fixes). * phy: renesas: rcar-gen3-usb2: Fix an error handling path in rcar_gen3_phy_usb2_probe() (git-fixes). * pinctrl: qcom: lpass-lpi: mark the GPIO controller as sleeping (git-fixes). * pinctrl: qcom: msm: Fix deadlock in pinmux configuration (stable-fixes). * pinctrl: single: Fix PIN_CONFIG_BIAS_DISABLE handling (stable-fixes). * pinctrl: single: Fix incorrect type for error return variable (git-fixes). * pinctrl: stm32: fix hwspinlock resource leak in probe function (git-fixes). * platform/chrome: cros_ec_ishtp: Fix UAF after unbinding driver (git-fixes). * platform/mellanox: mlxbf-pmc: Remove trailing whitespaces from event names (git-fixes). * platform/x86/amd/pmc: Add spurious_8042 to Xbox Ally (stable-fixes). * platform/x86/amd: pmc: Add Lenovo Legion Go 2 to pmc quirk list (stable- fixes). * platform/x86/intel/hid: Add Dell Pro Rugged 10/12 tablet to VGBS DMI quirks (stable-fixes). * platform/x86: acer-wmi: Ignore backlight event (stable-fixes). * platform/x86: asus-wmi: use brightness_set_blocking() for kbd led (git- fixes). * platform/x86: hp-bioscfg: Fix out-of-bounds array access in ACPI package parsing (git-fixes). * platform/x86: huawei-wmi: add keys for HONOR models (stable-fixes). * platform/x86: ibm_rtl: fix EBDA signature search pointer arithmetic (git- fixes). * platform/x86: intel: chtwc_int33fe: don't dereference swnode args (git- fixes). * platform/x86: intel: punit_ipc: fix memory corruption (git-fixes). * platform/x86: msi-laptop: add missing sysfs_remove_group() (git-fixes). * power: supply: apm_power: only unset own apm_get_power_status (git-fixes). * power: supply: cw2015: Check devm_delayed_work_autocancel() return code (git-fixes). * power: supply: rt9467: Prevent using uninitialized local variable in rt9467_set_value_from_ranges() (git-fixes). * power: supply: rt9467: Return error on failure in rt9467_set_value_from_ranges() (git-fixes). * power: supply: wm831x: Check wm831x_set_bits() return value (git-fixes). * powerpc/64s/slb: Fix SLB multihit issue during SLB preload (bac#1236022 ltc#211187). * powerpc/eeh: fix recursive pci_lock_rescan_remove locking in EEH event handling (bsc#1253262 ltc#216029). * powerpc/kexec: Enable SMT before waking offline CPUs (bsc#1214285 bsc#1205462 ltc#200161 ltc#200588 git-fixes bsc#1253739 ltc#211493 bsc#1254244 ltc#216496). * pwm: bcm2835: Make sure the channel is enabled after pwm_request() (git- fixes). * r8169: Fix spelling mistake: "tx_underun" -> "tx_underrun" (jsc#PED-14353). * r8169: Use PCI_IRQ_INTX instead of PCI_IRQ_LEGACY (jsc#PED-14353). * r8169: add MODULE_FIRMWARE entry for RTL8126A (jsc#PED-14353). * r8169: add PHY c45 ops for MDIO_MMD_VENDOR2 registers (jsc#PED-14353). * r8169: add generic rtl_set_eee_txidle_timer function (jsc#PED-14353). * r8169: add missing MODULE_FIRMWARE entry for RTL8126A rev.b (jsc#PED-14353). * r8169: add support for Intel Killer E5000 (jsc#PED-14353). * r8169: add support for RTL8125BP rev.b (jsc#PED-14353). * r8169: add support for RTL8125D (jsc#PED-14353). * r8169: add support for RTL8125D rev.b (jsc#PED-14353). * r8169: add support for RTL8126A rev.b (jsc#PED-14353). * r8169: add support for RTL8168M (jsc#PED-14353). * r8169: add support for returning tx_lpi_timer in ethtool get_eee (jsc#PED-14353). * r8169: add support for the temperature sensor being available from RTL8125B (jsc#PED-14353). * r8169: adjust version numbering for RTL8126 (jsc#PED-14353). * r8169: align RTL8125 EEE config with vendor driver (jsc#PED-14353). * r8169: align RTL8125/RTL8126 PHY config with vendor driver (jsc#PED-14353). * r8169: align RTL8126 EEE config with vendor driver (jsc#PED-14353). * r8169: align WAKE_PHY handling with r8125/r8126 vendor drivers (jsc#PED-14353). * r8169: avoid duplicated messages if loading firmware fails and switch to warn level (jsc#PED-14353). * r8169: avoid unsolicited interrupts (jsc#PED-14353). * r8169: check for PCI read error in probe (jsc#PED-14353). * r8169: disable ALDPS per default for RTL8125 (jsc#PED-14353). * r8169: disable RTL8126 ZRX-DC timeout (jsc#PED-14353). * r8169: disable interrupt source RxOverflow (jsc#PED-14353). * r8169: don't apply UDP padding quirk on RTL8126A (jsc#PED-14353). * r8169: don't increment tx_dropped in case of NETDEV_TX_BUSY (jsc#PED-14353). * r8169: don't scan PHY addresses > 0 (jsc#PED-14353). * r8169: don't take RTNL lock in rtl_task() (jsc#PED-14353). * r8169: enable EEE at 2.5G per default on RTL8125B (jsc#PED-14353). * r8169: enable RTL8168H/RTL8168EP/RTL8168FP ASPM support (jsc#PED-14353). * r8169: fix RTL8117 Wake-on-Lan in DASH mode (git-fixes). * r8169: fix inconsistent indenting in rtl8169_get_eth_mac_stats (jsc#PED-14353). * r8169: implement additional ethtool stats ops (jsc#PED-14353). * r8169: improve RTL8411b phy-down fixup (jsc#PED-14353). * r8169: improve __rtl8169_set_wol (jsc#PED-14353). * r8169: improve handling task scheduling (jsc#PED-14353). * r8169: improve initialization of RSS registers on RTL8125/RTL8126 (jsc#PED-14353). * r8169: improve rtl_set_d3_pll_down (jsc#PED-14353). * r8169: increase max jumbo packet size on RTL8125/RTL8126 (jsc#PED-14353). * r8169: remove detection of chip version 11 (early RTL8168b) (jsc#PED-14353). * r8169: remove leftover locks after reverted change (jsc#PED-14353). * r8169: remove multicast filter limit (jsc#PED-14353). * r8169: remove not needed check in rtl_fw_write_firmware (jsc#PED-14353). * r8169: remove original workaround for RTL8125 broken rx issue (jsc#PED-14353). * r8169: remove redundant hwmon support (jsc#PED-14353). * r8169: remove rtl_dash_loop_wait_high/low (jsc#PED-14353). * r8169: remove support for chip version 11 (jsc#PED-14353). * r8169: remove unused flag RTL_FLAG_TASK_RESET_NO_QUEUE_WAKE (jsc#PED-14353). * r8169: set EEE speed down ratio to 1 (stable-fixes). * r8169: simplify EEE handling (jsc#PED-14353). * r8169: simplify code by using core-provided pcpu stats allocation (jsc#PED-14353). * r8169: support setting the EEE tx idle timer on RTL8168h (jsc#PED-14353). * r8169: use dev_err_probe in all appropriate places in rtl_init_one() (jsc#PED-14353). * r8169: use helper r8169_mod_reg8_cond to simplify rtl_jumbo_config (jsc#PED-14353). * regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex (git-fixes). * regulator: core: disable supply if enabling main regulator fails (git- fixes). * reset: fix BIT macro reference (stable-fixes). * rpmsg: glink: fix rpmsg device leak (git-fixes). * rtc: gamecube: Check the return value of ioremap() (git-fixes). * scsi: lpfc: Add capability to register Platform Name ID to fabric (bsc#1254119). * scsi: lpfc: Allow support for BB credit recovery in point-to-point topology (bsc#1254119). * scsi: lpfc: Ensure unregistration of rpis for received PLOGIs (bsc#1254119). * scsi: lpfc: Fix leaked ndlp krefs when in point-to-point topology (bsc#1254119). * scsi: lpfc: Fix reusing an ndlp that is marked NLP_DROPPED during FLOGI (bsc#1254119). * scsi: lpfc: Modify kref handling for Fabric Controller ndlps (bsc#1254119). * scsi: lpfc: Remove redundant NULL ptr assignment in lpfc_els_free_iocb() (bsc#1254119). * scsi: lpfc: Revise discovery related function headers and comments (bsc#1254119). * scsi: lpfc: Update lpfc version to 14.4.0.12 (bsc#1254119). * scsi: lpfc: Update various NPIV diagnostic log messaging (bsc#1254119). * scsi: mpi3mr: Fix I/O failures during controller reset (bsc#1251752 jsc#PED-14280). * scsi: mpi3mr: Fix controller init failure on fault during queue creation (bsc#1251752 jsc#PED-14280). * scsi: mpi3mr: Fix device loss during enclosure reboot due to zero link speed (bsc#1251752 jsc#PED-14280). * scsi: mpi3mr: Fix premature TM timeouts on virtual drives (bsc#1251752 jsc#PED-14280). * scsi: mpi3mr: Update MPI headers to revision 37 (bsc#1251752 jsc#PED-14280). * scsi: mpi3mr: Update driver version to 8.14.0.5.50 (bsc#1251752 jsc#PED-14280). * scsi: mpi3mr: Update driver version to 8.15.0.5.50 (bsc#1251752 jsc#PED-14280). * selftests/bpf: Skip timer cases when bpf_timer is not supported (git-fixes). * selftests/net: calibrate txtimestamp (bsc#1255085). * selftests/net: convert fcnal-test.sh to run it in unique namespace (bsc#1254235). * selftests/net: convert fib-onlink-tests.sh to run it in unique namespace (bsc#1254235). * selftests/net: convert fib_nexthop_multiprefix to run it in unique namespace (bsc#1254235). * selftests/net: convert fib_nexthop_nongw.sh to run it in unique namespace (bsc#1254235). * selftests/net: convert fib_nexthops.sh to run it in unique namespace (bsc#1254235). * selftests/net: convert fib_rule_tests.sh to run it in unique namespace (bsc#1254235). * selftests/net: convert fib_tests.sh to run it in unique namespace (bsc#1254235). * selftests/net: convert srv6_end_dt46_l3vpn_test.sh to run it in unique namespace (bsc#1254235). * selftests/net: convert srv6_end_dt4_l3vpn_test.sh to run it in unique namespace (bsc#1254235). * selftests/net: convert srv6_end_dt6_l3vpn_test.sh to run it in unique namespace (bsc#1254235). * selftests/net: convert test_vxlan_vnifiltering.sh to run it in unique namespace (bsc#1255349). * selftests/net: convert vrf_route_leaking.sh to run it in unique namespace (bsc#1255349). * selftests/net: synchronize udpgro tests' tx and rx connection (bsc#1254235). * selftests: Introduce Makefile variable to list shared bash scripts (bsc#1254235). * selftests: bonding: Add net/forwarding/lib.sh to TEST_INCLUDES (bsc#1254235). * selftests: dsa: Replace test symlinks by wrapper script (bsc#1254235). * selftests: net: Remove executable bits from library scripts (bsc#1254235). * selftests: net: explicitly wait for listener ready (bsc#1254235). * selftests: net: fib-onlink-tests: Set high metric for default IPv6 route (bsc#1255346). * selftests: net: include forwarding lib (bsc#1254235). * selftests: net: included needed helper in the install targets (bsc#1254235). * selftests: net: more strict check in net_helper (bsc#1254235). * selftests: net: use slowwait to make sure IPv6 setup finished (bsc#1255349). * selftests: net: use slowwait to stabilize vrf_route_leaking test (bsc#1255349). * selftests: net: veth: test the ability to independently manipulate GRO and XDP (bsc#1255101). * selftests: team: Add shared library scripts to TEST_INCLUDES (bsc#1254235). * selftests: vrf_route_leaking: remove ipv6_ping_frag from default testing (bsc#1255349). * serial: add support of CPCI cards (stable-fixes). * serial: amba-pl011: prefer dma_mapping_error() over explicit address checking (git-fixes). * serial: core: Fix serial device initialization (git-fixes). * serial: core: Restore sysfs fwnode information (git-fixes). * serial: sprd: Return -EPROBE_DEFER when uart clock is not ready (stable- fixes). * slimbus: ngd: Fix reference count leak in qcom_slim_ngd_notify_slaves (git- fixes). * smc91x: fix broken irq-context in PREEMPT_RT (git-fixes). * soc/tegra: fuse: speedo-tegra210: Update speedo IDs (git-fixes). * soc: amlogic: canvas: fix device leak on lookup (git-fixes). * soc: qcom: ocmem: fix device leak on lookup (git-fixes). * soc: qcom: smem: fix hwspinlock resource leak in probe error paths (git- fixes). * spi: amlogic-spifc-a1: Handle devm_pm_runtime_enable() errors (git-fixes). * spi: bcm63xx: drop wrong casts in probe() (git-fixes). * spi: bcm63xx: fix premature CS deassertion on RX-only transactions (git- fixes). * spi: fsl-cpm: Check length parity before switching to 16 bit mode (git- fixes). * spi: imx: keep dma request disabled before dma transfer setup (stable- fixes). * spi: tegra210-qspi: Remove cache operations (git-fixes). * spi: tegra210-quad: Add support for internal DMA (git-fixes). * spi: tegra210-quad: Check hardware status on timeout (bsc#1253155). * spi: tegra210-quad: Fix timeout handling (bsc#1253155). * spi: tegra210-quad: Fix timeout handling (git-fixes). * spi: tegra210-quad: Refactor error handling into helper functions (bsc#1253155). * spi: tegra210-quad: Update dummy sequence configuration (git-fixes). * spi: xilinx: increase number of retries before declaring stall (stable- fixes). * staging: fbtft: core: fix potential memory leak in fbtft_probe_common() (git-fixes). * staging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing (stable-fixes). * staging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser (stable- fixes). * thunderbolt: Add support for Intel Wildcat Lake (stable-fixes). * tick/sched: Limit non-timekeeper CPUs calling jiffies update (bsc#1254477). * tracing: Fix access to trace_event_file (bsc#1254373). * uio: uio_fsl_elbc_gpcm:: Add null pointer check to uio_fsl_elbc_gpcm_probe (git-fixes). * usb: cdns3: Fix double resource release in cdns3_pci_probe (git-fixes). * usb: chaoskey: fix locking for O_NONBLOCK (git-fixes). * usb: chipidea: udc: limit usb request length to max 16KB (stable-fixes). * usb: dwc2: disable platform lowlevel hw resources during shutdown (stable- fixes). * usb: dwc2: fix hang during shutdown if set as peripheral (git-fixes). * usb: dwc2: fix hang during suspend if set as peripheral (git-fixes). * usb: dwc3: Abort suspend on soft disconnect failure (git-fixes). * usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths (git-fixes). * usb: dwc3: keep susphy enabled during exit to avoid controller faults (git- fixes). * usb: dwc3: of-simple: fix clock resource leak in dwc3_of_simple_probe (git- fixes). * usb: dwc3: pci: Sort out the Intel device IDs (stable-fixes). * usb: dwc3: pci: add support for the Intel Nova Lake -S (stable-fixes). * usb: gadget: configfs: Correctly set use_os_string at bind (git-fixes). * usb: gadget: f_eem: Fix memory leak in eem_unwrap (git-fixes). * usb: gadget: lpc32xx_udc: fix clock imbalance in error path (git-fixes). * usb: gadget: renesas_usbf: Handle devm_pm_runtime_enable() errors (git- fixes). * usb: gadget: tegra-xudc: Always reinitialize data toggle when clear halt (git-fixes). * usb: ohci-nxp: Use helper function devm_clk_get_enabled() (stable-fixes). * usb: ohci-nxp: fix device leak on probe failure (git-fixes). * usb: phy: Initialize struct usb_phy list_head (git-fixes). * usb: phy: isp1301: fix non-OF device reference imbalance (git-fixes). * usb: raw-gadget: cap raw_io transfer length to KMALLOC_MAX_SIZE (git-fixes). * usb: raw-gadget: do not limit transfer length (git-fixes). * usb: renesas_usbhs: Fix a resource leak in usbhs_pipe_malloc() (git-fixes). * usb: storage: Fix memory leak in USB bulk transport (git-fixes). * usb: storage: sddr55: Reject out-of-bound new_pba (stable-fixes). * usb: typec: tipd: Clear interrupts first (git-fixes). * usb: typec: ucsi: Handle incorrect num_connectors capability (stable-fixes). * usb: typec: ucsi: psy: Set max current to zero when disconnected (git- fixes). * usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer (git-fixes). * usb: udc: Add trace event for usb_gadget_set_state (stable-fixes). * usb: usb-storage: Maintain minimal modifications to the bcdDevice range (git-fixes). * usb: usb-storage: No additional quirks need to be added to the EL-R12 optical drive (stable-fixes). * usb: vhci-hcd: Prevent suspending virtually attached devices (git-fixes). * usb: xhci: limit run_graceperiod for only usb 3.0 devices (stable-fixes). * usbip: Fix locking bug in RT-enabled kernels (stable-fixes). * via_wdt: fix critical boot hang due to unnamed resource allocation (stable- fixes). * virtio_console: fix order of fields cols and rows (stable-fixes). * watchdog: wdat_wdt: Fix ACPI table leak in probe function (git-fixes). * wifi: ath10k: Add missing include of export.h (stable-fixes). * wifi: ath10k: Avoid vdev delete timeout when firmware is already down (stable-fixes). * wifi: ath10k: move recovery check logic into a new work (git-fixes). * wifi: ath11k: fix peer HE MCS assignment (git-fixes). * wifi: ath11k: restore register window after global reset (git-fixes). * wifi: ath12k: fix potential memory leak in ath12k_wow_arp_ns_offload() (git- fixes). * wifi: avoid kernel-infoleak from struct iw_point (git-fixes). * wifi: brcmfmac: Add DMI nvram filename quirk for Acer A1 840 tablet (stable- fixes). * wifi: cfg80211: sme: store capped length in __cfg80211_connect_result() (git-fixes). * wifi: cfg80211: stop radar detection in cfg80211_leave() (stable-fixes). * wifi: cfg80211: use cfg80211_leave() in iftype change (stable-fixes). * wifi: cw1200: Fix potential memory leak in cw1200_bh_rx_helper() (git- fixes). * wifi: ieee80211: correct FILS status codes (git-fixes). * wifi: mac80211: do not use old MBSSID elements (git-fixes). * wifi: mac80211: fix CMAC functions not handling errors (git-fixes). * wifi: mac80211: restore non-chanctx injection behaviour (git-fixes). * wifi: mt76: Fix DTS power-limits on little endian systems (git-fixes). * wifi: mt76: mt7925: fix CLC command timeout when suspend/resume (stable- fixes). * wifi: mt76: mt7925: fix the unfinished command of regd_notifier before suspend (stable-fixes). * wifi: mt76: mt792x: fix wifi init fail by setting MCU_RUNNING after CLC load (stable-fixes). * wifi: nl80211: vendor-cmd: intel: fix a blank kernel-doc line warning (git- fixes). * wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring() (git- fixes). * wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb() (git-fixes). * wifi: rtlwifi: 8192cu: fix tid out of range in rtl92cu_tx_fill_desc() (git- fixes). * wifi: rtw88: Add USB ID 2001:3329 for D-Link AC13U rev. A1 (stable-fixes). * wifi: rtw88: limit indirect IO under powered off for RTL8822CS (git-fixes). * x86/hyperv: Fix APIC ID and VP index confusion in hv_snp_boot_ap() (git- fixes). * x86/microcode/AMD: Add TSA microcode SHAs (bsc#1256528). * x86/microcode/AMD: Add Zen5 model 0x44, stepping 0x1 minrev (bsc#1256528). * x86/microcode/AMD: Add more known models to entry sign checking (bsc#1256528). * x86/microcode/AMD: Add some forgotten models to the SHA check (bsc#1256528). * x86/microcode/AMD: Clean the cache if update did not load microcode (bsc#1256528). * x86/microcode/AMD: Extend the SHA check to Zen5, block loading of any unreleased standalone Zen5 microcode patches (bsc#1256528). * x86/microcode/AMD: Fix Entrysign revision check for Zen5/Strix Halo (bsc#1256528). * x86/microcode/AMD: Fix __apply_microcode_amd()'s return value (bsc#1256528). * x86/microcode/AMD: Limit Entrysign signature checking to known generations (bsc#1256528). * x86/microcode/AMD: Load only SHA256-checksummed patches (bsc#1256528). * x86/microcode/AMD: Select which microcode patch to load (bsc#1256528). * x86/microcode/AMD: Use sha256() instead of init/update/final (bsc#1256528). * x86/microcode: Fix Entrysign revision check for Zen1/Naples (bsc#1256528). * xhci: dbgtty: fix device unregister (git-fixes). * xhci: fix stale flag preventig URBs after link state error is cleared (git- fixes). ## Special Instructions and Notes: * Please reboot the system after installing this update. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Live Patching 15-SP7 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP7-2026-278=1 * SUSE Real Time Module 15-SP7 zypper in -t patch SUSE-SLE-Module-RT-15-SP7-2026-278=1 ## Package List: * SUSE Linux Enterprise Live Patching 15-SP7 (x86_64) * kernel-livepatch-6_4_0-150700_7_28-rt-debuginfo-1-150700.1.3.1 * kernel-livepatch-6_4_0-150700_7_28-rt-1-150700.1.3.1 * kernel-livepatch-SLE15-SP7-RT_Update_8-debugsource-1-150700.1.3.1 * SUSE Real Time Module 15-SP7 (x86_64) * cluster-md-kmp-rt-debuginfo-6.4.0-150700.7.28.1 * kernel-syms-rt-6.4.0-150700.7.28.1 * ocfs2-kmp-rt-6.4.0-150700.7.28.1 * kernel-rt-devel-6.4.0-150700.7.28.1 * kernel-rt-debuginfo-6.4.0-150700.7.28.1 * ocfs2-kmp-rt-debuginfo-6.4.0-150700.7.28.1 * dlm-kmp-rt-debuginfo-6.4.0-150700.7.28.1 * cluster-md-kmp-rt-6.4.0-150700.7.28.1 * gfs2-kmp-rt-6.4.0-150700.7.28.1 * gfs2-kmp-rt-debuginfo-6.4.0-150700.7.28.1 * kernel-rt-debugsource-6.4.0-150700.7.28.1 * kernel-rt-devel-debuginfo-6.4.0-150700.7.28.1 * dlm-kmp-rt-6.4.0-150700.7.28.1 * SUSE Real Time Module 15-SP7 (noarch) * kernel-devel-rt-6.4.0-150700.7.28.1 * kernel-source-rt-6.4.0-150700.7.28.1 * SUSE Real Time Module 15-SP7 (nosrc x86_64) * kernel-rt-6.4.0-150700.7.28.1 ## References: * https://www.suse.com/security/cve/CVE-2023-42752.html * https://www.suse.com/security/cve/CVE-2023-53743.html * https://www.suse.com/security/cve/CVE-2023-53750.html * https://www.suse.com/security/cve/CVE-2023-53752.html * https://www.suse.com/security/cve/CVE-2023-53759.html * https://www.suse.com/security/cve/CVE-2023-53762.html * https://www.suse.com/security/cve/CVE-2023-53766.html * https://www.suse.com/security/cve/CVE-2023-53768.html * https://www.suse.com/security/cve/CVE-2023-53777.html * https://www.suse.com/security/cve/CVE-2023-53778.html * https://www.suse.com/security/cve/CVE-2023-53782.html * https://www.suse.com/security/cve/CVE-2023-53784.html * https://www.suse.com/security/cve/CVE-2023-53785.html * https://www.suse.com/security/cve/CVE-2023-53787.html * https://www.suse.com/security/cve/CVE-2023-53791.html * https://www.suse.com/security/cve/CVE-2023-53792.html * https://www.suse.com/security/cve/CVE-2023-53793.html * https://www.suse.com/security/cve/CVE-2023-53794.html * https://www.suse.com/security/cve/CVE-2023-53795.html * https://www.suse.com/security/cve/CVE-2023-53797.html * https://www.suse.com/security/cve/CVE-2023-53799.html * https://www.suse.com/security/cve/CVE-2023-53807.html * https://www.suse.com/security/cve/CVE-2023-53808.html * https://www.suse.com/security/cve/CVE-2023-53813.html * https://www.suse.com/security/cve/CVE-2023-53815.html * https://www.suse.com/security/cve/CVE-2023-53819.html * https://www.suse.com/security/cve/CVE-2023-53821.html * https://www.suse.com/security/cve/CVE-2023-53823.html * https://www.suse.com/security/cve/CVE-2023-53825.html * https://www.suse.com/security/cve/CVE-2023-53828.html * https://www.suse.com/security/cve/CVE-2023-53831.html * https://www.suse.com/security/cve/CVE-2023-53834.html * https://www.suse.com/security/cve/CVE-2023-53836.html * https://www.suse.com/security/cve/CVE-2023-53839.html * https://www.suse.com/security/cve/CVE-2023-53841.html * https://www.suse.com/security/cve/CVE-2023-53842.html * https://www.suse.com/security/cve/CVE-2023-53843.html * https://www.suse.com/security/cve/CVE-2023-53844.html * https://www.suse.com/security/cve/CVE-2023-53846.html * https://www.suse.com/security/cve/CVE-2023-53847.html * https://www.suse.com/security/cve/CVE-2023-53848.html * https://www.suse.com/security/cve/CVE-2023-53850.html * https://www.suse.com/security/cve/CVE-2023-53851.html * https://www.suse.com/security/cve/CVE-2023-53852.html * https://www.suse.com/security/cve/CVE-2023-53855.html * https://www.suse.com/security/cve/CVE-2023-53856.html * https://www.suse.com/security/cve/CVE-2023-53857.html * https://www.suse.com/security/cve/CVE-2023-53858.html * https://www.suse.com/security/cve/CVE-2023-53860.html * https://www.suse.com/security/cve/CVE-2023-53861.html * https://www.suse.com/security/cve/CVE-2023-53863.html * https://www.suse.com/security/cve/CVE-2023-53864.html * https://www.suse.com/security/cve/CVE-2023-53865.html * https://www.suse.com/security/cve/CVE-2023-53989.html * https://www.suse.com/security/cve/CVE-2023-53992.html * https://www.suse.com/security/cve/CVE-2023-53994.html * https://www.suse.com/security/cve/CVE-2023-53995.html * https://www.suse.com/security/cve/CVE-2023-53996.html * https://www.suse.com/security/cve/CVE-2023-53997.html * https://www.suse.com/security/cve/CVE-2023-53998.html * https://www.suse.com/security/cve/CVE-2023-53999.html * https://www.suse.com/security/cve/CVE-2023-54000.html * https://www.suse.com/security/cve/CVE-2023-54001.html * https://www.suse.com/security/cve/CVE-2023-54005.html * https://www.suse.com/security/cve/CVE-2023-54006.html * https://www.suse.com/security/cve/CVE-2023-54008.html * https://www.suse.com/security/cve/CVE-2023-54014.html * https://www.suse.com/security/cve/CVE-2023-54016.html * https://www.suse.com/security/cve/CVE-2023-54017.html * https://www.suse.com/security/cve/CVE-2023-54019.html * https://www.suse.com/security/cve/CVE-2023-54022.html * https://www.suse.com/security/cve/CVE-2023-54023.html * https://www.suse.com/security/cve/CVE-2023-54025.html * https://www.suse.com/security/cve/CVE-2023-54026.html * https://www.suse.com/security/cve/CVE-2023-54027.html * https://www.suse.com/security/cve/CVE-2023-54030.html * https://www.suse.com/security/cve/CVE-2023-54031.html * https://www.suse.com/security/cve/CVE-2023-54032.html * https://www.suse.com/security/cve/CVE-2023-54035.html * https://www.suse.com/security/cve/CVE-2023-54037.html * https://www.suse.com/security/cve/CVE-2023-54038.html * https://www.suse.com/security/cve/CVE-2023-54042.html * https://www.suse.com/security/cve/CVE-2023-54045.html * https://www.suse.com/security/cve/CVE-2023-54048.html * https://www.suse.com/security/cve/CVE-2023-54049.html * https://www.suse.com/security/cve/CVE-2023-54051.html * https://www.suse.com/security/cve/CVE-2023-54052.html * https://www.suse.com/security/cve/CVE-2023-54060.html * https://www.suse.com/security/cve/CVE-2023-54064.html * https://www.suse.com/security/cve/CVE-2023-54066.html * https://www.suse.com/security/cve/CVE-2023-54067.html * https://www.suse.com/security/cve/CVE-2023-54069.html * https://www.suse.com/security/cve/CVE-2023-54070.html * https://www.suse.com/security/cve/CVE-2023-54072.html * https://www.suse.com/security/cve/CVE-2023-54076.html * https://www.suse.com/security/cve/CVE-2023-54080.html * https://www.suse.com/security/cve/CVE-2023-54081.html * https://www.suse.com/security/cve/CVE-2023-54083.html * https://www.suse.com/security/cve/CVE-2023-54088.html * https://www.suse.com/security/cve/CVE-2023-54089.html * https://www.suse.com/security/cve/CVE-2023-54091.html * https://www.suse.com/security/cve/CVE-2023-54092.html * https://www.suse.com/security/cve/CVE-2023-54093.html * https://www.suse.com/security/cve/CVE-2023-54094.html * https://www.suse.com/security/cve/CVE-2023-54095.html * https://www.suse.com/security/cve/CVE-2023-54096.html * https://www.suse.com/security/cve/CVE-2023-54099.html * https://www.suse.com/security/cve/CVE-2023-54101.html * https://www.suse.com/security/cve/CVE-2023-54104.html * https://www.suse.com/security/cve/CVE-2023-54106.html * https://www.suse.com/security/cve/CVE-2023-54112.html * https://www.suse.com/security/cve/CVE-2023-54113.html * https://www.suse.com/security/cve/CVE-2023-54115.html * https://www.suse.com/security/cve/CVE-2023-54117.html * https://www.suse.com/security/cve/CVE-2023-54121.html * https://www.suse.com/security/cve/CVE-2023-54125.html * https://www.suse.com/security/cve/CVE-2023-54127.html * https://www.suse.com/security/cve/CVE-2023-54133.html * https://www.suse.com/security/cve/CVE-2023-54134.html * https://www.suse.com/security/cve/CVE-2023-54135.html * https://www.suse.com/security/cve/CVE-2023-54136.html * https://www.suse.com/security/cve/CVE-2023-54137.html * https://www.suse.com/security/cve/CVE-2023-54140.html * https://www.suse.com/security/cve/CVE-2023-54141.html * https://www.suse.com/security/cve/CVE-2023-54142.html * https://www.suse.com/security/cve/CVE-2023-54143.html * https://www.suse.com/security/cve/CVE-2023-54145.html * https://www.suse.com/security/cve/CVE-2023-54148.html * https://www.suse.com/security/cve/CVE-2023-54149.html * https://www.suse.com/security/cve/CVE-2023-54153.html * https://www.suse.com/security/cve/CVE-2023-54154.html * https://www.suse.com/security/cve/CVE-2023-54155.html * https://www.suse.com/security/cve/CVE-2023-54156.html * https://www.suse.com/security/cve/CVE-2023-54164.html * https://www.suse.com/security/cve/CVE-2023-54166.html * https://www.suse.com/security/cve/CVE-2023-54169.html * https://www.suse.com/security/cve/CVE-2023-54170.html * https://www.suse.com/security/cve/CVE-2023-54171.html * https://www.suse.com/security/cve/CVE-2023-54172.html * https://www.suse.com/security/cve/CVE-2023-54173.html * https://www.suse.com/security/cve/CVE-2023-54177.html * https://www.suse.com/security/cve/CVE-2023-54178.html * https://www.suse.com/security/cve/CVE-2023-54179.html * https://www.suse.com/security/cve/CVE-2023-54181.html * https://www.suse.com/security/cve/CVE-2023-54183.html * https://www.suse.com/security/cve/CVE-2023-54185.html * https://www.suse.com/security/cve/CVE-2023-54189.html * https://www.suse.com/security/cve/CVE-2023-54194.html * https://www.suse.com/security/cve/CVE-2023-54201.html * https://www.suse.com/security/cve/CVE-2023-54204.html * https://www.suse.com/security/cve/CVE-2023-54207.html * https://www.suse.com/security/cve/CVE-2023-54209.html * https://www.suse.com/security/cve/CVE-2023-54210.html * https://www.suse.com/security/cve/CVE-2023-54211.html * https://www.suse.com/security/cve/CVE-2023-54215.html * https://www.suse.com/security/cve/CVE-2023-54219.html * https://www.suse.com/security/cve/CVE-2023-54220.html * https://www.suse.com/security/cve/CVE-2023-54221.html * https://www.suse.com/security/cve/CVE-2023-54223.html * https://www.suse.com/security/cve/CVE-2023-54224.html * https://www.suse.com/security/cve/CVE-2023-54225.html * https://www.suse.com/security/cve/CVE-2023-54227.html * https://www.suse.com/security/cve/CVE-2023-54229.html * https://www.suse.com/security/cve/CVE-2023-54230.html * https://www.suse.com/security/cve/CVE-2023-54235.html * https://www.suse.com/security/cve/CVE-2023-54240.html * https://www.suse.com/security/cve/CVE-2023-54241.html * https://www.suse.com/security/cve/CVE-2023-54246.html * https://www.suse.com/security/cve/CVE-2023-54247.html * https://www.suse.com/security/cve/CVE-2023-54251.html * https://www.suse.com/security/cve/CVE-2023-54253.html * https://www.suse.com/security/cve/CVE-2023-54254.html * https://www.suse.com/security/cve/CVE-2023-54255.html * https://www.suse.com/security/cve/CVE-2023-54258.html * https://www.suse.com/security/cve/CVE-2023-54261.html * https://www.suse.com/security/cve/CVE-2023-54263.html * https://www.suse.com/security/cve/CVE-2023-54264.html * https://www.suse.com/security/cve/CVE-2023-54266.html * https://www.suse.com/security/cve/CVE-2023-54267.html * https://www.suse.com/security/cve/CVE-2023-54271.html * https://www.suse.com/security/cve/CVE-2023-54276.html * https://www.suse.com/security/cve/CVE-2023-54278.html * https://www.suse.com/security/cve/CVE-2023-54281.html * https://www.suse.com/security/cve/CVE-2023-54282.html * https://www.suse.com/security/cve/CVE-2023-54283.html * https://www.suse.com/security/cve/CVE-2023-54285.html * https://www.suse.com/security/cve/CVE-2023-54289.html * https://www.suse.com/security/cve/CVE-2023-54291.html * https://www.suse.com/security/cve/CVE-2023-54292.html * https://www.suse.com/security/cve/CVE-2023-54293.html * https://www.suse.com/security/cve/CVE-2023-54296.html * https://www.suse.com/security/cve/CVE-2023-54297.html * https://www.suse.com/security/cve/CVE-2023-54299.html * https://www.suse.com/security/cve/CVE-2023-54300.html * https://www.suse.com/security/cve/CVE-2023-54302.html * https://www.suse.com/security/cve/CVE-2023-54303.html * https://www.suse.com/security/cve/CVE-2023-54304.html * https://www.suse.com/security/cve/CVE-2023-54309.html * https://www.suse.com/security/cve/CVE-2023-54312.html * https://www.suse.com/security/cve/CVE-2023-54313.html * https://www.suse.com/security/cve/CVE-2023-54314.html * https://www.suse.com/security/cve/CVE-2023-54315.html * https://www.suse.com/security/cve/CVE-2023-54316.html * https://www.suse.com/security/cve/CVE-2023-54318.html * https://www.suse.com/security/cve/CVE-2023-54319.html * https://www.suse.com/security/cve/CVE-2023-54322.html * https://www.suse.com/security/cve/CVE-2023-54324.html * https://www.suse.com/security/cve/CVE-2023-54326.html * https://www.suse.com/security/cve/CVE-2024-26944.html * https://www.suse.com/security/cve/CVE-2025-38321.html * https://www.suse.com/security/cve/CVE-2025-38728.html * https://www.suse.com/security/cve/CVE-2025-39977.html * https://www.suse.com/security/cve/CVE-2025-40006.html * https://www.suse.com/security/cve/CVE-2025-40024.html * https://www.suse.com/security/cve/CVE-2025-40033.html * https://www.suse.com/security/cve/CVE-2025-40042.html * https://www.suse.com/security/cve/CVE-2025-40053.html * https://www.suse.com/security/cve/CVE-2025-40081.html * https://www.suse.com/security/cve/CVE-2025-40102.html * https://www.suse.com/security/cve/CVE-2025-40123.html * https://www.suse.com/security/cve/CVE-2025-40134.html * https://www.suse.com/security/cve/CVE-2025-40135.html * https://www.suse.com/security/cve/CVE-2025-40153.html * https://www.suse.com/security/cve/CVE-2025-40158.html * https://www.suse.com/security/cve/CVE-2025-40160.html * https://www.suse.com/security/cve/CVE-2025-40167.html * https://www.suse.com/security/cve/CVE-2025-40170.html * https://www.suse.com/security/cve/CVE-2025-40178.html * https://www.suse.com/security/cve/CVE-2025-40179.html * https://www.suse.com/security/cve/CVE-2025-40187.html * https://www.suse.com/security/cve/CVE-2025-40190.html * https://www.suse.com/security/cve/CVE-2025-40211.html * https://www.suse.com/security/cve/CVE-2025-40213.html * https://www.suse.com/security/cve/CVE-2025-40215.html * https://www.suse.com/security/cve/CVE-2025-40219.html * https://www.suse.com/security/cve/CVE-2025-40220.html * https://www.suse.com/security/cve/CVE-2025-40223.html * https://www.suse.com/security/cve/CVE-2025-40225.html * https://www.suse.com/security/cve/CVE-2025-40231.html * https://www.suse.com/security/cve/CVE-2025-40233.html * https://www.suse.com/security/cve/CVE-2025-40240.html * https://www.suse.com/security/cve/CVE-2025-40242.html * https://www.suse.com/security/cve/CVE-2025-40244.html * https://www.suse.com/security/cve/CVE-2025-40248.html * https://www.suse.com/security/cve/CVE-2025-40250.html * https://www.suse.com/security/cve/CVE-2025-40251.html * https://www.suse.com/security/cve/CVE-2025-40252.html * https://www.suse.com/security/cve/CVE-2025-40256.html * https://www.suse.com/security/cve/CVE-2025-40258.html * https://www.suse.com/security/cve/CVE-2025-40262.html * https://www.suse.com/security/cve/CVE-2025-40263.html * https://www.suse.com/security/cve/CVE-2025-40268.html * https://www.suse.com/security/cve/CVE-2025-40269.html * https://www.suse.com/security/cve/CVE-2025-40271.html * https://www.suse.com/security/cve/CVE-2025-40272.html * https://www.suse.com/security/cve/CVE-2025-40273.html * https://www.suse.com/security/cve/CVE-2025-40274.html * https://www.suse.com/security/cve/CVE-2025-40275.html * https://www.suse.com/security/cve/CVE-2025-40276.html * https://www.suse.com/security/cve/CVE-2025-40277.html * https://www.suse.com/security/cve/CVE-2025-40278.html * https://www.suse.com/security/cve/CVE-2025-40279.html * https://www.suse.com/security/cve/CVE-2025-40280.html * https://www.suse.com/security/cve/CVE-2025-40282.html * https://www.suse.com/security/cve/CVE-2025-40283.html * https://www.suse.com/security/cve/CVE-2025-40284.html * https://www.suse.com/security/cve/CVE-2025-40287.html * https://www.suse.com/security/cve/CVE-2025-40288.html * https://www.suse.com/security/cve/CVE-2025-40289.html * https://www.suse.com/security/cve/CVE-2025-40292.html * https://www.suse.com/security/cve/CVE-2025-40293.html * https://www.suse.com/security/cve/CVE-2025-40294.html * https://www.suse.com/security/cve/CVE-2025-40297.html * https://www.suse.com/security/cve/CVE-2025-40301.html * https://www.suse.com/security/cve/CVE-2025-40302.html * https://www.suse.com/security/cve/CVE-2025-40304.html * https://www.suse.com/security/cve/CVE-2025-40306.html * https://www.suse.com/security/cve/CVE-2025-40307.html * https://www.suse.com/security/cve/CVE-2025-40308.html * https://www.suse.com/security/cve/CVE-2025-40309.html * https://www.suse.com/security/cve/CVE-2025-40310.html * https://www.suse.com/security/cve/CVE-2025-40311.html * https://www.suse.com/security/cve/CVE-2025-40312.html * https://www.suse.com/security/cve/CVE-2025-40314.html * https://www.suse.com/security/cve/CVE-2025-40315.html * https://www.suse.com/security/cve/CVE-2025-40316.html * https://www.suse.com/security/cve/CVE-2025-40317.html * https://www.suse.com/security/cve/CVE-2025-40318.html * https://www.suse.com/security/cve/CVE-2025-40319.html * https://www.suse.com/security/cve/CVE-2025-40320.html * https://www.suse.com/security/cve/CVE-2025-40321.html * https://www.suse.com/security/cve/CVE-2025-40322.html * https://www.suse.com/security/cve/CVE-2025-40323.html * https://www.suse.com/security/cve/CVE-2025-40324.html * https://www.suse.com/security/cve/CVE-2025-40329.html * https://www.suse.com/security/cve/CVE-2025-40330.html * https://www.suse.com/security/cve/CVE-2025-40331.html * https://www.suse.com/security/cve/CVE-2025-40332.html * https://www.suse.com/security/cve/CVE-2025-40337.html * https://www.suse.com/security/cve/CVE-2025-40338.html * https://www.suse.com/security/cve/CVE-2025-40339.html * https://www.suse.com/security/cve/CVE-2025-40340.html * https://www.suse.com/security/cve/CVE-2025-40342.html * https://www.suse.com/security/cve/CVE-2025-40343.html * https://www.suse.com/security/cve/CVE-2025-40345.html * https://www.suse.com/security/cve/CVE-2025-40346.html * https://www.suse.com/security/cve/CVE-2025-40347.html * https://www.suse.com/security/cve/CVE-2025-40349.html * https://www.suse.com/security/cve/CVE-2025-40351.html * https://www.suse.com/security/cve/CVE-2025-40354.html * https://www.suse.com/security/cve/CVE-2025-40357.html * https://www.suse.com/security/cve/CVE-2025-40359.html * https://www.suse.com/security/cve/CVE-2025-40360.html * https://www.suse.com/security/cve/CVE-2025-68168.html * https://www.suse.com/security/cve/CVE-2025-68170.html * https://www.suse.com/security/cve/CVE-2025-68172.html * https://www.suse.com/security/cve/CVE-2025-68176.html * https://www.suse.com/security/cve/CVE-2025-68180.html * https://www.suse.com/security/cve/CVE-2025-68181.html * https://www.suse.com/security/cve/CVE-2025-68183.html * https://www.suse.com/security/cve/CVE-2025-68184.html * https://www.suse.com/security/cve/CVE-2025-68185.html * https://www.suse.com/security/cve/CVE-2025-68190.html * https://www.suse.com/security/cve/CVE-2025-68192.html * https://www.suse.com/security/cve/CVE-2025-68194.html * https://www.suse.com/security/cve/CVE-2025-68195.html * https://www.suse.com/security/cve/CVE-2025-68197.html * https://www.suse.com/security/cve/CVE-2025-68201.html * https://www.suse.com/security/cve/CVE-2025-68204.html * https://www.suse.com/security/cve/CVE-2025-68206.html * https://www.suse.com/security/cve/CVE-2025-68207.html * https://www.suse.com/security/cve/CVE-2025-68208.html * https://www.suse.com/security/cve/CVE-2025-68209.html * https://www.suse.com/security/cve/CVE-2025-68217.html * https://www.suse.com/security/cve/CVE-2025-68218.html * https://www.suse.com/security/cve/CVE-2025-68222.html * https://www.suse.com/security/cve/CVE-2025-68223.html * https://www.suse.com/security/cve/CVE-2025-68230.html * https://www.suse.com/security/cve/CVE-2025-68233.html * https://www.suse.com/security/cve/CVE-2025-68235.html * https://www.suse.com/security/cve/CVE-2025-68237.html * https://www.suse.com/security/cve/CVE-2025-68238.html * https://www.suse.com/security/cve/CVE-2025-68239.html * https://www.suse.com/security/cve/CVE-2025-68244.html * https://www.suse.com/security/cve/CVE-2025-68249.html * https://www.suse.com/security/cve/CVE-2025-68252.html * https://www.suse.com/security/cve/CVE-2025-68255.html * https://www.suse.com/security/cve/CVE-2025-68257.html * https://www.suse.com/security/cve/CVE-2025-68258.html * https://www.suse.com/security/cve/CVE-2025-68259.html * https://www.suse.com/security/cve/CVE-2025-68264.html * https://www.suse.com/security/cve/CVE-2025-68286.html * https://www.suse.com/security/cve/CVE-2025-68287.html * https://www.suse.com/security/cve/CVE-2025-68289.html * https://www.suse.com/security/cve/CVE-2025-68290.html * https://www.suse.com/security/cve/CVE-2025-68298.html * https://www.suse.com/security/cve/CVE-2025-68302.html * https://www.suse.com/security/cve/CVE-2025-68303.html * https://www.suse.com/security/cve/CVE-2025-68305.html * https://www.suse.com/security/cve/CVE-2025-68306.html * https://www.suse.com/security/cve/CVE-2025-68307.html * https://www.suse.com/security/cve/CVE-2025-68308.html * https://www.suse.com/security/cve/CVE-2025-68312.html * https://www.suse.com/security/cve/CVE-2025-68313.html * https://www.suse.com/security/cve/CVE-2025-68328.html * https://www.suse.com/security/cve/CVE-2025-68330.html * https://www.suse.com/security/cve/CVE-2025-68331.html * https://www.suse.com/security/cve/CVE-2025-68332.html * https://www.suse.com/security/cve/CVE-2025-68335.html * https://www.suse.com/security/cve/CVE-2025-68339.html * https://www.suse.com/security/cve/CVE-2025-68340.html * https://www.suse.com/security/cve/CVE-2025-68345.html * https://www.suse.com/security/cve/CVE-2025-68346.html * https://www.suse.com/security/cve/CVE-2025-68347.html * https://www.suse.com/security/cve/CVE-2025-68351.html * https://www.suse.com/security/cve/CVE-2025-68354.html * https://www.suse.com/security/cve/CVE-2025-68362.html * https://www.suse.com/security/cve/CVE-2025-68378.html * https://www.suse.com/security/cve/CVE-2025-68380.html * https://www.suse.com/security/cve/CVE-2025-68724.html * https://www.suse.com/security/cve/CVE-2025-68732.html * https://www.suse.com/security/cve/CVE-2025-68734.html * https://www.suse.com/security/cve/CVE-2025-68740.html * https://www.suse.com/security/cve/CVE-2025-68742.html * https://www.suse.com/security/cve/CVE-2025-68744.html * https://www.suse.com/security/cve/CVE-2025-68746.html * https://www.suse.com/security/cve/CVE-2025-68747.html * https://www.suse.com/security/cve/CVE-2025-68749.html * https://www.suse.com/security/cve/CVE-2025-68750.html * https://www.suse.com/security/cve/CVE-2025-68753.html * https://www.suse.com/security/cve/CVE-2025-68757.html * https://www.suse.com/security/cve/CVE-2025-68758.html * https://www.suse.com/security/cve/CVE-2025-68759.html * https://www.suse.com/security/cve/CVE-2025-68765.html * https://www.suse.com/security/cve/CVE-2025-68766.html * https://bugzilla.suse.com/show_bug.cgi?id=1012628 * https://bugzilla.suse.com/show_bug.cgi?id=1065729 * https://bugzilla.suse.com/show_bug.cgi?id=1194869 * https://bugzilla.suse.com/show_bug.cgi?id=1205462 * https://bugzilla.suse.com/show_bug.cgi?id=1214285 * https://bugzilla.suse.com/show_bug.cgi?id=1214635 * https://bugzilla.suse.com/show_bug.cgi?id=1214847 * https://bugzilla.suse.com/show_bug.cgi?id=1215146 * https://bugzilla.suse.com/show_bug.cgi?id=1215211 * https://bugzilla.suse.com/show_bug.cgi?id=1215344 * https://bugzilla.suse.com/show_bug.cgi?id=1216062 * https://bugzilla.suse.com/show_bug.cgi?id=1216436 * https://bugzilla.suse.com/show_bug.cgi?id=1219165 * https://bugzilla.suse.com/show_bug.cgi?id=1220419 * https://bugzilla.suse.com/show_bug.cgi?id=1223731 * https://bugzilla.suse.com/show_bug.cgi?id=1232223 * https://bugzilla.suse.com/show_bug.cgi?id=1234163 * https://bugzilla.suse.com/show_bug.cgi?id=1243112 * https://bugzilla.suse.com/show_bug.cgi?id=1245193 * https://bugzilla.suse.com/show_bug.cgi?id=1245449 * https://bugzilla.suse.com/show_bug.cgi?id=1246328 * https://bugzilla.suse.com/show_bug.cgi?id=1247500 * https://bugzilla.suse.com/show_bug.cgi?id=1248886 * https://bugzilla.suse.com/show_bug.cgi?id=1249256 * https://bugzilla.suse.com/show_bug.cgi?id=1251752 * https://bugzilla.suse.com/show_bug.cgi?id=1252046 * https://bugzilla.suse.com/show_bug.cgi?id=1252342 * https://bugzilla.suse.com/show_bug.cgi?id=1252686 * https://bugzilla.suse.com/show_bug.cgi?id=1252776 * https://bugzilla.suse.com/show_bug.cgi?id=1252808 * https://bugzilla.suse.com/show_bug.cgi?id=1252824 * https://bugzilla.suse.com/show_bug.cgi?id=1252861 * https://bugzilla.suse.com/show_bug.cgi?id=1252919 * https://bugzilla.suse.com/show_bug.cgi?id=1252973 * https://bugzilla.suse.com/show_bug.cgi?id=1253155 * https://bugzilla.suse.com/show_bug.cgi?id=1253262 * https://bugzilla.suse.com/show_bug.cgi?id=1253342 * https://bugzilla.suse.com/show_bug.cgi?id=1253365 * https://bugzilla.suse.com/show_bug.cgi?id=1253386 * https://bugzilla.suse.com/show_bug.cgi?id=1253400 * https://bugzilla.suse.com/show_bug.cgi?id=1253402 * https://bugzilla.suse.com/show_bug.cgi?id=1253408 * https://bugzilla.suse.com/show_bug.cgi?id=1253413 * https://bugzilla.suse.com/show_bug.cgi?id=1253442 * https://bugzilla.suse.com/show_bug.cgi?id=1253458 * https://bugzilla.suse.com/show_bug.cgi?id=1253463 * https://bugzilla.suse.com/show_bug.cgi?id=1253623 * https://bugzilla.suse.com/show_bug.cgi?id=1253647 * https://bugzilla.suse.com/show_bug.cgi?id=1253674 * https://bugzilla.suse.com/show_bug.cgi?id=1253739 * https://bugzilla.suse.com/show_bug.cgi?id=1254119 * https://bugzilla.suse.com/show_bug.cgi?id=1254126 * https://bugzilla.suse.com/show_bug.cgi?id=1254235 * https://bugzilla.suse.com/show_bug.cgi?id=1254244 * https://bugzilla.suse.com/show_bug.cgi?id=1254363 * https://bugzilla.suse.com/show_bug.cgi?id=1254373 * https://bugzilla.suse.com/show_bug.cgi?id=1254378 * https://bugzilla.suse.com/show_bug.cgi?id=1254477 * https://bugzilla.suse.com/show_bug.cgi?id=1254518 * https://bugzilla.suse.com/show_bug.cgi?id=1254520 * https://bugzilla.suse.com/show_bug.cgi?id=1254599 * https://bugzilla.suse.com/show_bug.cgi?id=1254606 * https://bugzilla.suse.com/show_bug.cgi?id=1254611 * https://bugzilla.suse.com/show_bug.cgi?id=1254613 * https://bugzilla.suse.com/show_bug.cgi?id=1254615 * https://bugzilla.suse.com/show_bug.cgi?id=1254616 * https://bugzilla.suse.com/show_bug.cgi?id=1254621 * https://bugzilla.suse.com/show_bug.cgi?id=1254623 * https://bugzilla.suse.com/show_bug.cgi?id=1254626 * https://bugzilla.suse.com/show_bug.cgi?id=1254648 * https://bugzilla.suse.com/show_bug.cgi?id=1254649 * https://bugzilla.suse.com/show_bug.cgi?id=1254653 * https://bugzilla.suse.com/show_bug.cgi?id=1254655 * https://bugzilla.suse.com/show_bug.cgi?id=1254657 * https://bugzilla.suse.com/show_bug.cgi?id=1254660 * https://bugzilla.suse.com/show_bug.cgi?id=1254661 * https://bugzilla.suse.com/show_bug.cgi?id=1254663 * https://bugzilla.suse.com/show_bug.cgi?id=1254669 * https://bugzilla.suse.com/show_bug.cgi?id=1254677 * https://bugzilla.suse.com/show_bug.cgi?id=1254678 * https://bugzilla.suse.com/show_bug.cgi?id=1254688 * https://bugzilla.suse.com/show_bug.cgi?id=1254690 * https://bugzilla.suse.com/show_bug.cgi?id=1254691 * https://bugzilla.suse.com/show_bug.cgi?id=1254693 * https://bugzilla.suse.com/show_bug.cgi?id=1254695 * https://bugzilla.suse.com/show_bug.cgi?id=1254698 * https://bugzilla.suse.com/show_bug.cgi?id=1254701 * https://bugzilla.suse.com/show_bug.cgi?id=1254704 * https://bugzilla.suse.com/show_bug.cgi?id=1254705 * https://bugzilla.suse.com/show_bug.cgi?id=1254707 * https://bugzilla.suse.com/show_bug.cgi?id=1254712 * https://bugzilla.suse.com/show_bug.cgi?id=1254715 * https://bugzilla.suse.com/show_bug.cgi?id=1254717 * https://bugzilla.suse.com/show_bug.cgi?id=1254723 * https://bugzilla.suse.com/show_bug.cgi?id=1254724 * https://bugzilla.suse.com/show_bug.cgi?id=1254732 * https://bugzilla.suse.com/show_bug.cgi?id=1254733 * https://bugzilla.suse.com/show_bug.cgi?id=1254737 * https://bugzilla.suse.com/show_bug.cgi?id=1254739 * https://bugzilla.suse.com/show_bug.cgi?id=1254742 * https://bugzilla.suse.com/show_bug.cgi?id=1254743 * https://bugzilla.suse.com/show_bug.cgi?id=1254749 * https://bugzilla.suse.com/show_bug.cgi?id=1254750 * https://bugzilla.suse.com/show_bug.cgi?id=1254753 * https://bugzilla.suse.com/show_bug.cgi?id=1254754 * https://bugzilla.suse.com/show_bug.cgi?id=1254758 * https://bugzilla.suse.com/show_bug.cgi?id=1254761 * https://bugzilla.suse.com/show_bug.cgi?id=1254762 * https://bugzilla.suse.com/show_bug.cgi?id=1254765 * https://bugzilla.suse.com/show_bug.cgi?id=1254782 * https://bugzilla.suse.com/show_bug.cgi?id=1254791 * https://bugzilla.suse.com/show_bug.cgi?id=1254793 * https://bugzilla.suse.com/show_bug.cgi?id=1254794 * https://bugzilla.suse.com/show_bug.cgi?id=1254795 * https://bugzilla.suse.com/show_bug.cgi?id=1254796 * https://bugzilla.suse.com/show_bug.cgi?id=1254797 * https://bugzilla.suse.com/show_bug.cgi?id=1254798 * https://bugzilla.suse.com/show_bug.cgi?id=1254813 * https://bugzilla.suse.com/show_bug.cgi?id=1254815 * https://bugzilla.suse.com/show_bug.cgi?id=1254824 * https://bugzilla.suse.com/show_bug.cgi?id=1254825 * https://bugzilla.suse.com/show_bug.cgi?id=1254827 * https://bugzilla.suse.com/show_bug.cgi?id=1254828 * https://bugzilla.suse.com/show_bug.cgi?id=1254829 * https://bugzilla.suse.com/show_bug.cgi?id=1254830 * https://bugzilla.suse.com/show_bug.cgi?id=1254832 * https://bugzilla.suse.com/show_bug.cgi?id=1254840 * https://bugzilla.suse.com/show_bug.cgi?id=1254843 * https://bugzilla.suse.com/show_bug.cgi?id=1254846 * https://bugzilla.suse.com/show_bug.cgi?id=1254847 * https://bugzilla.suse.com/show_bug.cgi?id=1254849 * https://bugzilla.suse.com/show_bug.cgi?id=1254850 * https://bugzilla.suse.com/show_bug.cgi?id=1254851 * https://bugzilla.suse.com/show_bug.cgi?id=1254854 * https://bugzilla.suse.com/show_bug.cgi?id=1254856 * https://bugzilla.suse.com/show_bug.cgi?id=1254858 * https://bugzilla.suse.com/show_bug.cgi?id=1254860 * https://bugzilla.suse.com/show_bug.cgi?id=1254864 * https://bugzilla.suse.com/show_bug.cgi?id=1254869 * https://bugzilla.suse.com/show_bug.cgi?id=1254894 * https://bugzilla.suse.com/show_bug.cgi?id=1254918 * https://bugzilla.suse.com/show_bug.cgi?id=1254957 * https://bugzilla.suse.com/show_bug.cgi?id=1254959 * https://bugzilla.suse.com/show_bug.cgi?id=1254983 * https://bugzilla.suse.com/show_bug.cgi?id=1254996 * https://bugzilla.suse.com/show_bug.cgi?id=1255005 * https://bugzilla.suse.com/show_bug.cgi?id=1255009 * https://bugzilla.suse.com/show_bug.cgi?id=1255025 * https://bugzilla.suse.com/show_bug.cgi?id=1255026 * https://bugzilla.suse.com/show_bug.cgi?id=1255030 * https://bugzilla.suse.com/show_bug.cgi?id=1255033 * https://bugzilla.suse.com/show_bug.cgi?id=1255034 * https://bugzilla.suse.com/show_bug.cgi?id=1255035 * https://bugzilla.suse.com/show_bug.cgi?id=1255039 * https://bugzilla.suse.com/show_bug.cgi?id=1255041 * https://bugzilla.suse.com/show_bug.cgi?id=1255042 * https://bugzilla.suse.com/show_bug.cgi?id=1255046 * https://bugzilla.suse.com/show_bug.cgi?id=1255057 * https://bugzilla.suse.com/show_bug.cgi?id=1255062 * https://bugzilla.suse.com/show_bug.cgi?id=1255064 * https://bugzilla.suse.com/show_bug.cgi?id=1255065 * https://bugzilla.suse.com/show_bug.cgi?id=1255068 * https://bugzilla.suse.com/show_bug.cgi?id=1255071 * https://bugzilla.suse.com/show_bug.cgi?id=1255072 * https://bugzilla.suse.com/show_bug.cgi?id=1255075 * https://bugzilla.suse.com/show_bug.cgi?id=1255077 * https://bugzilla.suse.com/show_bug.cgi?id=1255081 * https://bugzilla.suse.com/show_bug.cgi?id=1255082 * https://bugzilla.suse.com/show_bug.cgi?id=1255083 * https://bugzilla.suse.com/show_bug.cgi?id=1255085 * https://bugzilla.suse.com/show_bug.cgi?id=1255087 * https://bugzilla.suse.com/show_bug.cgi?id=1255092 * https://bugzilla.suse.com/show_bug.cgi?id=1255094 * https://bugzilla.suse.com/show_bug.cgi?id=1255095 * https://bugzilla.suse.com/show_bug.cgi?id=1255097 * https://bugzilla.suse.com/show_bug.cgi?id=1255100 * https://bugzilla.suse.com/show_bug.cgi?id=1255101 * https://bugzilla.suse.com/show_bug.cgi?id=1255116 * https://bugzilla.suse.com/show_bug.cgi?id=1255121 * https://bugzilla.suse.com/show_bug.cgi?id=1255122 * https://bugzilla.suse.com/show_bug.cgi?id=1255124 * https://bugzilla.suse.com/show_bug.cgi?id=1255131 * https://bugzilla.suse.com/show_bug.cgi?id=1255134 * https://bugzilla.suse.com/show_bug.cgi?id=1255135 * https://bugzilla.suse.com/show_bug.cgi?id=1255136 * https://bugzilla.suse.com/show_bug.cgi?id=1255142 * https://bugzilla.suse.com/show_bug.cgi?id=1255145 * https://bugzilla.suse.com/show_bug.cgi?id=1255146 * https://bugzilla.suse.com/show_bug.cgi?id=1255149 * https://bugzilla.suse.com/show_bug.cgi?id=1255152 * https://bugzilla.suse.com/show_bug.cgi?id=1255154 * https://bugzilla.suse.com/show_bug.cgi?id=1255155 * https://bugzilla.suse.com/show_bug.cgi?id=1255163 * https://bugzilla.suse.com/show_bug.cgi?id=1255167 * https://bugzilla.suse.com/show_bug.cgi?id=1255169 * https://bugzilla.suse.com/show_bug.cgi?id=1255171 * https://bugzilla.suse.com/show_bug.cgi?id=1255175 * https://bugzilla.suse.com/show_bug.cgi?id=1255179 * https://bugzilla.suse.com/show_bug.cgi?id=1255181 * https://bugzilla.suse.com/show_bug.cgi?id=1255182 * https://bugzilla.suse.com/show_bug.cgi?id=1255187 * https://bugzilla.suse.com/show_bug.cgi?id=1255190 * https://bugzilla.suse.com/show_bug.cgi?id=1255193 * https://bugzilla.suse.com/show_bug.cgi?id=1255196 * https://bugzilla.suse.com/show_bug.cgi?id=1255197 * https://bugzilla.suse.com/show_bug.cgi?id=1255199 * https://bugzilla.suse.com/show_bug.cgi?id=1255202 * https://bugzilla.suse.com/show_bug.cgi?id=1255203 * https://bugzilla.suse.com/show_bug.cgi?id=1255206 * https://bugzilla.suse.com/show_bug.cgi?id=1255209 * https://bugzilla.suse.com/show_bug.cgi?id=1255218 * https://bugzilla.suse.com/show_bug.cgi?id=1255220 * https://bugzilla.suse.com/show_bug.cgi?id=1255221 * https://bugzilla.suse.com/show_bug.cgi?id=1255224 * https://bugzilla.suse.com/show_bug.cgi?id=1255227 * https://bugzilla.suse.com/show_bug.cgi?id=1255230 * https://bugzilla.suse.com/show_bug.cgi?id=1255233 * https://bugzilla.suse.com/show_bug.cgi?id=1255234 * https://bugzilla.suse.com/show_bug.cgi?id=1255242 * https://bugzilla.suse.com/show_bug.cgi?id=1255245 * https://bugzilla.suse.com/show_bug.cgi?id=1255246 * https://bugzilla.suse.com/show_bug.cgi?id=1255247 * https://bugzilla.suse.com/show_bug.cgi?id=1255251 * https://bugzilla.suse.com/show_bug.cgi?id=1255252 * https://bugzilla.suse.com/show_bug.cgi?id=1255253 * https://bugzilla.suse.com/show_bug.cgi?id=1255256 * https://bugzilla.suse.com/show_bug.cgi?id=1255259 * https://bugzilla.suse.com/show_bug.cgi?id=1255262 * https://bugzilla.suse.com/show_bug.cgi?id=1255272 * https://bugzilla.suse.com/show_bug.cgi?id=1255273 * https://bugzilla.suse.com/show_bug.cgi?id=1255274 * https://bugzilla.suse.com/show_bug.cgi?id=1255276 * https://bugzilla.suse.com/show_bug.cgi?id=1255279 * https://bugzilla.suse.com/show_bug.cgi?id=1255280 * https://bugzilla.suse.com/show_bug.cgi?id=1255281 * https://bugzilla.suse.com/show_bug.cgi?id=1255297 * https://bugzilla.suse.com/show_bug.cgi?id=1255316 * https://bugzilla.suse.com/show_bug.cgi?id=1255318 * https://bugzilla.suse.com/show_bug.cgi?id=1255325 * https://bugzilla.suse.com/show_bug.cgi?id=1255329 * https://bugzilla.suse.com/show_bug.cgi?id=1255346 * https://bugzilla.suse.com/show_bug.cgi?id=1255349 * https://bugzilla.suse.com/show_bug.cgi?id=1255351 * https://bugzilla.suse.com/show_bug.cgi?id=1255357 * https://bugzilla.suse.com/show_bug.cgi?id=1255380 * https://bugzilla.suse.com/show_bug.cgi?id=1255395 * https://bugzilla.suse.com/show_bug.cgi?id=1255415 * https://bugzilla.suse.com/show_bug.cgi?id=1255428 * https://bugzilla.suse.com/show_bug.cgi?id=1255433 * https://bugzilla.suse.com/show_bug.cgi?id=1255434 * https://bugzilla.suse.com/show_bug.cgi?id=1255463 * https://bugzilla.suse.com/show_bug.cgi?id=1255480 * https://bugzilla.suse.com/show_bug.cgi?id=1255483 * https://bugzilla.suse.com/show_bug.cgi?id=1255489 * https://bugzilla.suse.com/show_bug.cgi?id=1255493 * https://bugzilla.suse.com/show_bug.cgi?id=1255495 * https://bugzilla.suse.com/show_bug.cgi?id=1255505 * https://bugzilla.suse.com/show_bug.cgi?id=1255507 * https://bugzilla.suse.com/show_bug.cgi?id=1255538 * https://bugzilla.suse.com/show_bug.cgi?id=1255540 * https://bugzilla.suse.com/show_bug.cgi?id=1255545 * https://bugzilla.suse.com/show_bug.cgi?id=1255549 * https://bugzilla.suse.com/show_bug.cgi?id=1255550 * https://bugzilla.suse.com/show_bug.cgi?id=1255553 * https://bugzilla.suse.com/show_bug.cgi?id=1255557 * https://bugzilla.suse.com/show_bug.cgi?id=1255558 * https://bugzilla.suse.com/show_bug.cgi?id=1255563 * https://bugzilla.suse.com/show_bug.cgi?id=1255564 * https://bugzilla.suse.com/show_bug.cgi?id=1255567 * https://bugzilla.suse.com/show_bug.cgi?id=1255570 * https://bugzilla.suse.com/show_bug.cgi?id=1255578 * https://bugzilla.suse.com/show_bug.cgi?id=1255579 * https://bugzilla.suse.com/show_bug.cgi?id=1255580 * https://bugzilla.suse.com/show_bug.cgi?id=1255583 * https://bugzilla.suse.com/show_bug.cgi?id=1255591 * https://bugzilla.suse.com/show_bug.cgi?id=1255601 * https://bugzilla.suse.com/show_bug.cgi?id=1255603 * https://bugzilla.suse.com/show_bug.cgi?id=1255605 * https://bugzilla.suse.com/show_bug.cgi?id=1255611 * https://bugzilla.suse.com/show_bug.cgi?id=1255614 * https://bugzilla.suse.com/show_bug.cgi?id=1255616 * https://bugzilla.suse.com/show_bug.cgi?id=1255617 * https://bugzilla.suse.com/show_bug.cgi?id=1255618 * https://bugzilla.suse.com/show_bug.cgi?id=1255621 * https://bugzilla.suse.com/show_bug.cgi?id=1255628 * https://bugzilla.suse.com/show_bug.cgi?id=1255629 * https://bugzilla.suse.com/show_bug.cgi?id=1255630 * https://bugzilla.suse.com/show_bug.cgi?id=1255632 * https://bugzilla.suse.com/show_bug.cgi?id=1255636 * https://bugzilla.suse.com/show_bug.cgi?id=1255688 * https://bugzilla.suse.com/show_bug.cgi?id=1255691 * https://bugzilla.suse.com/show_bug.cgi?id=1255702 * https://bugzilla.suse.com/show_bug.cgi?id=1255704 * https://bugzilla.suse.com/show_bug.cgi?id=1255706 * https://bugzilla.suse.com/show_bug.cgi?id=1255707 * https://bugzilla.suse.com/show_bug.cgi?id=1255709 * https://bugzilla.suse.com/show_bug.cgi?id=1255722 * https://bugzilla.suse.com/show_bug.cgi?id=1255723 * https://bugzilla.suse.com/show_bug.cgi?id=1255724 * https://bugzilla.suse.com/show_bug.cgi?id=1255758 * https://bugzilla.suse.com/show_bug.cgi?id=1255759 * https://bugzilla.suse.com/show_bug.cgi?id=1255760 * https://bugzilla.suse.com/show_bug.cgi?id=1255763 * https://bugzilla.suse.com/show_bug.cgi?id=1255769 * https://bugzilla.suse.com/show_bug.cgi?id=1255770 * https://bugzilla.suse.com/show_bug.cgi?id=1255772 * https://bugzilla.suse.com/show_bug.cgi?id=1255774 * https://bugzilla.suse.com/show_bug.cgi?id=1255775 * https://bugzilla.suse.com/show_bug.cgi?id=1255776 * https://bugzilla.suse.com/show_bug.cgi?id=1255780 * https://bugzilla.suse.com/show_bug.cgi?id=1255785 * https://bugzilla.suse.com/show_bug.cgi?id=1255786 * https://bugzilla.suse.com/show_bug.cgi?id=1255789 * https://bugzilla.suse.com/show_bug.cgi?id=1255790 * https://bugzilla.suse.com/show_bug.cgi?id=1255792 * https://bugzilla.suse.com/show_bug.cgi?id=1255793 * https://bugzilla.suse.com/show_bug.cgi?id=1255795 * https://bugzilla.suse.com/show_bug.cgi?id=1255798 * https://bugzilla.suse.com/show_bug.cgi?id=1255800 * https://bugzilla.suse.com/show_bug.cgi?id=1255801 * https://bugzilla.suse.com/show_bug.cgi?id=1255806 * https://bugzilla.suse.com/show_bug.cgi?id=1255807 * https://bugzilla.suse.com/show_bug.cgi?id=1255809 * https://bugzilla.suse.com/show_bug.cgi?id=1255810 * https://bugzilla.suse.com/show_bug.cgi?id=1255812 * https://bugzilla.suse.com/show_bug.cgi?id=1255814 * https://bugzilla.suse.com/show_bug.cgi?id=1255820 * https://bugzilla.suse.com/show_bug.cgi?id=1255838 * https://bugzilla.suse.com/show_bug.cgi?id=1255842 * https://bugzilla.suse.com/show_bug.cgi?id=1255843 * https://bugzilla.suse.com/show_bug.cgi?id=1255872 * https://bugzilla.suse.com/show_bug.cgi?id=1255875 * https://bugzilla.suse.com/show_bug.cgi?id=1255879 * https://bugzilla.suse.com/show_bug.cgi?id=1255883 * https://bugzilla.suse.com/show_bug.cgi?id=1255884 * https://bugzilla.suse.com/show_bug.cgi?id=1255886 * https://bugzilla.suse.com/show_bug.cgi?id=1255888 * https://bugzilla.suse.com/show_bug.cgi?id=1255890 * https://bugzilla.suse.com/show_bug.cgi?id=1255891 * https://bugzilla.suse.com/show_bug.cgi?id=1255892 * https://bugzilla.suse.com/show_bug.cgi?id=1255899 * https://bugzilla.suse.com/show_bug.cgi?id=1255902 * https://bugzilla.suse.com/show_bug.cgi?id=1255907 * https://bugzilla.suse.com/show_bug.cgi?id=1255911 * https://bugzilla.suse.com/show_bug.cgi?id=1255915 * https://bugzilla.suse.com/show_bug.cgi?id=1255918 * https://bugzilla.suse.com/show_bug.cgi?id=1255921 * https://bugzilla.suse.com/show_bug.cgi?id=1255924 * https://bugzilla.suse.com/show_bug.cgi?id=1255925 * https://bugzilla.suse.com/show_bug.cgi?id=1255931 * https://bugzilla.suse.com/show_bug.cgi?id=1255932 * https://bugzilla.suse.com/show_bug.cgi?id=1255934 * https://bugzilla.suse.com/show_bug.cgi?id=1255943 * https://bugzilla.suse.com/show_bug.cgi?id=1255944 * https://bugzilla.suse.com/show_bug.cgi?id=1255949 * https://bugzilla.suse.com/show_bug.cgi?id=1255951 * https://bugzilla.suse.com/show_bug.cgi?id=1255952 * https://bugzilla.suse.com/show_bug.cgi?id=1255955 * https://bugzilla.suse.com/show_bug.cgi?id=1255957 * https://bugzilla.suse.com/show_bug.cgi?id=1255961 * https://bugzilla.suse.com/show_bug.cgi?id=1255963 * https://bugzilla.suse.com/show_bug.cgi?id=1255964 * https://bugzilla.suse.com/show_bug.cgi?id=1255967 * https://bugzilla.suse.com/show_bug.cgi?id=1255974 * https://bugzilla.suse.com/show_bug.cgi?id=1255978 * https://bugzilla.suse.com/show_bug.cgi?id=1255984 * https://bugzilla.suse.com/show_bug.cgi?id=1255988 * https://bugzilla.suse.com/show_bug.cgi?id=1255990 * https://bugzilla.suse.com/show_bug.cgi?id=1255992 * https://bugzilla.suse.com/show_bug.cgi?id=1255993 * https://bugzilla.suse.com/show_bug.cgi?id=1255994 * https://bugzilla.suse.com/show_bug.cgi?id=1255996 * https://bugzilla.suse.com/show_bug.cgi?id=1256033 * https://bugzilla.suse.com/show_bug.cgi?id=1256034 * https://bugzilla.suse.com/show_bug.cgi?id=1256045 * https://bugzilla.suse.com/show_bug.cgi?id=1256050 * https://bugzilla.suse.com/show_bug.cgi?id=1256058 * https://bugzilla.suse.com/show_bug.cgi?id=1256071 * https://bugzilla.suse.com/show_bug.cgi?id=1256074 * https://bugzilla.suse.com/show_bug.cgi?id=1256081 * https://bugzilla.suse.com/show_bug.cgi?id=1256082 * https://bugzilla.suse.com/show_bug.cgi?id=1256083 * https://bugzilla.suse.com/show_bug.cgi?id=1256084 * https://bugzilla.suse.com/show_bug.cgi?id=1256085 * https://bugzilla.suse.com/show_bug.cgi?id=1256090 * https://bugzilla.suse.com/show_bug.cgi?id=1256093 * https://bugzilla.suse.com/show_bug.cgi?id=1256094 * https://bugzilla.suse.com/show_bug.cgi?id=1256095 * https://bugzilla.suse.com/show_bug.cgi?id=1256096 * https://bugzilla.suse.com/show_bug.cgi?id=1256099 * https://bugzilla.suse.com/show_bug.cgi?id=1256100 * https://bugzilla.suse.com/show_bug.cgi?id=1256104 * https://bugzilla.suse.com/show_bug.cgi?id=1256106 * https://bugzilla.suse.com/show_bug.cgi?id=1256107 * https://bugzilla.suse.com/show_bug.cgi?id=1256117 * https://bugzilla.suse.com/show_bug.cgi?id=1256119 * https://bugzilla.suse.com/show_bug.cgi?id=1256121 * https://bugzilla.suse.com/show_bug.cgi?id=1256145 * https://bugzilla.suse.com/show_bug.cgi?id=1256153 * https://bugzilla.suse.com/show_bug.cgi?id=1256178 * https://bugzilla.suse.com/show_bug.cgi?id=1256197 * https://bugzilla.suse.com/show_bug.cgi?id=1256231 * https://bugzilla.suse.com/show_bug.cgi?id=1256233 * https://bugzilla.suse.com/show_bug.cgi?id=1256234 * https://bugzilla.suse.com/show_bug.cgi?id=1256238 * https://bugzilla.suse.com/show_bug.cgi?id=1256263 * https://bugzilla.suse.com/show_bug.cgi?id=1256267 * https://bugzilla.suse.com/show_bug.cgi?id=1256268 * https://bugzilla.suse.com/show_bug.cgi?id=1256271 * https://bugzilla.suse.com/show_bug.cgi?id=1256273 * https://bugzilla.suse.com/show_bug.cgi?id=1256274 * https://bugzilla.suse.com/show_bug.cgi?id=1256279 * https://bugzilla.suse.com/show_bug.cgi?id=1256285 * https://bugzilla.suse.com/show_bug.cgi?id=1256291 * https://bugzilla.suse.com/show_bug.cgi?id=1256292 * https://bugzilla.suse.com/show_bug.cgi?id=1256300 * https://bugzilla.suse.com/show_bug.cgi?id=1256301 * https://bugzilla.suse.com/show_bug.cgi?id=1256302 * https://bugzilla.suse.com/show_bug.cgi?id=1256335 * https://bugzilla.suse.com/show_bug.cgi?id=1256348 * https://bugzilla.suse.com/show_bug.cgi?id=1256351 * https://bugzilla.suse.com/show_bug.cgi?id=1256354 * https://bugzilla.suse.com/show_bug.cgi?id=1256358 * https://bugzilla.suse.com/show_bug.cgi?id=1256361 * https://bugzilla.suse.com/show_bug.cgi?id=1256364 * https://bugzilla.suse.com/show_bug.cgi?id=1256366 * https://bugzilla.suse.com/show_bug.cgi?id=1256367 * https://bugzilla.suse.com/show_bug.cgi?id=1256368 * https://bugzilla.suse.com/show_bug.cgi?id=1256369 * https://bugzilla.suse.com/show_bug.cgi?id=1256370 * https://bugzilla.suse.com/show_bug.cgi?id=1256371 * https://bugzilla.suse.com/show_bug.cgi?id=1256373 * https://bugzilla.suse.com/show_bug.cgi?id=1256375 * https://bugzilla.suse.com/show_bug.cgi?id=1256379 * https://bugzilla.suse.com/show_bug.cgi?id=1256387 * https://bugzilla.suse.com/show_bug.cgi?id=1256394 * https://bugzilla.suse.com/show_bug.cgi?id=1256395 * https://bugzilla.suse.com/show_bug.cgi?id=1256396 * https://bugzilla.suse.com/show_bug.cgi?id=1256528 * https://jira.suse.com/browse/PED-13611 * https://jira.suse.com/browse/PED-14062 * https://jira.suse.com/browse/PED-14280 * https://jira.suse.com/browse/PED-14353 * https://jira.suse.com/browse/PED-3527 * https://jira.suse.com/browse/PED-4866 * https://jira.suse.com/browse/PED-5065 * https://jira.suse.com/browse/PED-5453 * https://jira.suse.com/browse/PED-5475 * https://jira.suse.com/browse/PED-5477 * https://jira.suse.com/browse/PED-5511 * https://jira.suse.com/browse/PED-6036 * https://jira.suse.com/browse/PED-6041 * https://jira.suse.com/browse/PED-6045 * https://jira.suse.com/browse/PED-6067 * https://jira.suse.com/browse/PED-6068 * https://jira.suse.com/browse/PED-6069 * https://jira.suse.com/browse/PED-6070 * https://jira.suse.com/browse/PED-6071 * https://jira.suse.com/browse/PED-6104 * https://jira.suse.com/browse/PED-6114 * https://jira.suse.com/browse/PED-6116 * https://jira.suse.com/browse/PED-6120 * https://jira.suse.com/browse/PED-6123 * https://jira.suse.com/browse/PED-6811 * https://jira.suse.com/browse/PED-7514 * https://jira.suse.com/browse/PED-7542 * https://jira.suse.com/browse/PED-7779 * https://jira.suse.com/browse/PED-7780 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 20:35:27 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 20:35:27 -0000 Subject: SUSE-SU-2026:0274-1: important: Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP6) Message-ID: <176920052714.16867.7716832467239293214@smelt2.prg2.suse.org> # Security update for the Linux Kernel (Live Patch 12 for SUSE Linux Enterprise 15 SP6) Announcement ID: SUSE-SU-2026:0274-1 Release Date: 2026-01-23T14:05:58Z Rating: important References: * bsc#1248400 * bsc#1248670 * bsc#1249241 * bsc#1250192 * bsc#1251203 * bsc#1251787 * bsc#1253437 * bsc#1256928 Cross-References: * CVE-2023-53676 * CVE-2025-38476 * CVE-2025-38572 * CVE-2025-38588 * CVE-2025-38608 * CVE-2025-39682 * CVE-2025-40204 CVSS scores: * CVE-2023-53676 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38476 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38476 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38572 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38572 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38588 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-38588 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-38588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-38608 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-38608 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H * CVE-2025-38608 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-39682 ( SUSE ): 7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H * CVE-2025-40204 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Live Patching 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves seven vulnerabilities and has one security fix can now be installed. ## Description: This update for the SUSE Linux Enterprise kernel 6.4.0-150600.23.53 fixes various security issues The following security issues were fixed: * CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in lio_target_nacl_info_show() (bsc#1251787). * CVE-2025-38476: rpl: Fix use-after-free in rpl_do_srh_inline() (bsc#1251203). * CVE-2025-38572: ipv6: reject malicious packets in ipv6_gso_segment() (bsc#1248400). * CVE-2025-38588: ipv6: prevent infinite loop in rt6_nlmsg_size() (bsc#1249241). * CVE-2025-38608: bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls (bsc#1248670). * CVE-2025-39682: tls: fix handling of zero-length records on the rx_list (bsc#1250192). * CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253437). The following non security issue was fixed: * fix addr_bit_set() issue on big-endian machines (bsc#1256928). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-275=1 SUSE-2026-276=1 SUSE-2026-277=1 SUSE-2026-274=1 * SUSE Linux Enterprise Live Patching 15-SP6 zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2026-275=1 SUSE-SLE- Module-Live-Patching-15-SP6-2026-276=1 SUSE-SLE-Module-Live- Patching-15-SP6-2026-277=1 SUSE-SLE-Module-Live-Patching-15-SP6-2026-274=1 ## Package List: * openSUSE Leap 15.6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_50-default-10-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_10-debugsource-11-150600.2.1 * kernel-livepatch-6_4_0-150600_23_42-default-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_47-default-11-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_9-debugsource-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_47-default-debuginfo-11-150600.2.1 * kernel-livepatch-6_4_0-150600_23_53-default-10-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_11-debugsource-10-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_12-debugsource-10-150600.2.1 * kernel-livepatch-6_4_0-150600_23_53-default-debuginfo-10-150600.2.1 * kernel-livepatch-6_4_0-150600_23_42-default-debuginfo-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_50-default-debuginfo-10-150600.2.1 * SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64) * kernel-livepatch-6_4_0-150600_23_50-default-10-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_10-debugsource-11-150600.2.1 * kernel-livepatch-6_4_0-150600_23_42-default-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_47-default-11-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_9-debugsource-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_47-default-debuginfo-11-150600.2.1 * kernel-livepatch-6_4_0-150600_23_53-default-10-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_11-debugsource-10-150600.2.1 * kernel-livepatch-SLE15-SP6_Update_12-debugsource-10-150600.2.1 * kernel-livepatch-6_4_0-150600_23_53-default-debuginfo-10-150600.2.1 * kernel-livepatch-6_4_0-150600_23_42-default-debuginfo-12-150600.2.1 * kernel-livepatch-6_4_0-150600_23_50-default-debuginfo-10-150600.2.1 ## References: * https://www.suse.com/security/cve/CVE-2023-53676.html * https://www.suse.com/security/cve/CVE-2025-38476.html * https://www.suse.com/security/cve/CVE-2025-38572.html * https://www.suse.com/security/cve/CVE-2025-38588.html * https://www.suse.com/security/cve/CVE-2025-38608.html * https://www.suse.com/security/cve/CVE-2025-39682.html * https://www.suse.com/security/cve/CVE-2025-40204.html * https://bugzilla.suse.com/show_bug.cgi?id=1248400 * https://bugzilla.suse.com/show_bug.cgi?id=1248670 * https://bugzilla.suse.com/show_bug.cgi?id=1249241 * https://bugzilla.suse.com/show_bug.cgi?id=1250192 * https://bugzilla.suse.com/show_bug.cgi?id=1251203 * https://bugzilla.suse.com/show_bug.cgi?id=1251787 * https://bugzilla.suse.com/show_bug.cgi?id=1253437 * https://bugzilla.suse.com/show_bug.cgi?id=1256928 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 20:35:32 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 20:35:32 -0000 Subject: SUSE-SU-2026:0280-1: important: Security update for openvswitch Message-ID: <176920053247.16867.10506877423619711386@smelt2.prg2.suse.org> # Security update for openvswitch Announcement ID: SUSE-SU-2026:0280-1 Release Date: 2026-01-23T15:34:06Z Rating: important References: * bsc#1210054 * bsc#1212125 * bsc#1216002 * bsc#1219465 * bsc#1255435 Cross-References: * CVE-2023-1668 * CVE-2023-3152 * CVE-2023-3153 * CVE-2023-3966 * CVE-2023-5366 * CVE-2024-2182 * CVE-2025-0650 CVSS scores: * CVE-2023-1668 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2023-1668 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2023-1668 ( NVD ): 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H * CVE-2023-3152 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2023-3152 ( NVD ): 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-3152 ( NVD ): 6.3 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L * CVE-2023-3153 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-3153 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2023-3966 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3966 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-3966 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2023-5366 ( SUSE ): 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H * CVE-2023-5366 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N * CVE-2024-2182 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2024-2182 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-0650 ( SUSE ): 9.2 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-0650 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-0650 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP6 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves seven vulnerabilities can now be installed. ## Description: This update for openvswitch fixes the following issues: Update to v3.1.7: * CVE-2023-3966: openvswitch, openvswitch3: Invalid memory access in Geneve with HW offload (bsc#1219465). * CVE-2024-2182: openvswitch: ov: insufficient validation of incoming BFD packets may lead to denial of service (bsc#1255435). * CVE-2023-1668: openvswitch: remote traffic denial of service via crafted packets with IP proto 0 (bsc#1210054). * CVE-2023-3153: openvswitch,openvswitch3: service monitor MAC flow is not rate limited (bsc#1212125). * CVE-2023-5366: openvswitch: missing masks on a final stage with ports trie (bsc#1216002). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2026-280=1 openSUSE-SLE-15.6-2026-280=1 * SUSE Linux Enterprise Server 15 SP6 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2026-280=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP6-2026-280=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * openvswitch-ipsec-3.1.7-150600.33.9.1 * openvswitch-pki-3.1.7-150600.33.9.1 * ovn-23.03.3-150600.33.9.1 * ovn-vtep-23.03.3-150600.33.9.1 * ovn-host-debuginfo-23.03.3-150600.33.9.1 * libovn-23_03-0-23.03.3-150600.33.9.1 * ovn-host-23.03.3-150600.33.9.1 * ovn-vtep-debuginfo-23.03.3-150600.33.9.1 * openvswitch-test-debuginfo-3.1.7-150600.33.9.1 * ovn-central-23.03.3-150600.33.9.1 * openvswitch-3.1.7-150600.33.9.1 * ovn-docker-23.03.3-150600.33.9.1 * ovn-devel-23.03.3-150600.33.9.1 * ovn-debuginfo-23.03.3-150600.33.9.1 * libopenvswitch-3_1-0-3.1.7-150600.33.9.1 * openvswitch-debugsource-3.1.7-150600.33.9.1 * openvswitch-test-3.1.7-150600.33.9.1 * openvswitch-vtep-debuginfo-3.1.7-150600.33.9.1 * openvswitch-vtep-3.1.7-150600.33.9.1 * ovn-central-debuginfo-23.03.3-150600.33.9.1 * libovn-23_03-0-debuginfo-23.03.3-150600.33.9.1 * libopenvswitch-3_1-0-debuginfo-3.1.7-150600.33.9.1 * python3-ovs-3.1.7-150600.33.9.1 * openvswitch-debuginfo-3.1.7-150600.33.9.1 * openvswitch-devel-3.1.7-150600.33.9.1 * openSUSE Leap 15.6 (noarch) * ovn-doc-23.03.3-150600.33.9.1 * openvswitch-doc-3.1.7-150600.33.9.1 * SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64) * openvswitch-ipsec-3.1.7-150600.33.9.1 * openvswitch-pki-3.1.7-150600.33.9.1 * ovn-23.03.3-150600.33.9.1 * ovn-vtep-23.03.3-150600.33.9.1 * ovn-host-debuginfo-23.03.3-150600.33.9.1 * libovn-23_03-0-23.03.3-150600.33.9.1 * ovn-host-23.03.3-150600.33.9.1 * ovn-vtep-debuginfo-23.03.3-150600.33.9.1 * openvswitch-test-debuginfo-3.1.7-150600.33.9.1 * ovn-central-23.03.3-150600.33.9.1 * openvswitch-3.1.7-150600.33.9.1 * ovn-docker-23.03.3-150600.33.9.1 * ovn-devel-23.03.3-150600.33.9.1 * ovn-debuginfo-23.03.3-150600.33.9.1 * libopenvswitch-3_1-0-3.1.7-150600.33.9.1 * openvswitch-debugsource-3.1.7-150600.33.9.1 * openvswitch-test-3.1.7-150600.33.9.1 * openvswitch-vtep-debuginfo-3.1.7-150600.33.9.1 * openvswitch-vtep-3.1.7-150600.33.9.1 * ovn-central-debuginfo-23.03.3-150600.33.9.1 * libovn-23_03-0-debuginfo-23.03.3-150600.33.9.1 * libopenvswitch-3_1-0-debuginfo-3.1.7-150600.33.9.1 * python3-ovs-3.1.7-150600.33.9.1 * openvswitch-debuginfo-3.1.7-150600.33.9.1 * openvswitch-devel-3.1.7-150600.33.9.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 (ppc64le x86_64) * openvswitch-ipsec-3.1.7-150600.33.9.1 * openvswitch-pki-3.1.7-150600.33.9.1 * ovn-23.03.3-150600.33.9.1 * ovn-vtep-23.03.3-150600.33.9.1 * ovn-host-debuginfo-23.03.3-150600.33.9.1 * libovn-23_03-0-23.03.3-150600.33.9.1 * ovn-host-23.03.3-150600.33.9.1 * ovn-vtep-debuginfo-23.03.3-150600.33.9.1 * openvswitch-test-debuginfo-3.1.7-150600.33.9.1 * ovn-central-23.03.3-150600.33.9.1 * openvswitch-3.1.7-150600.33.9.1 * ovn-docker-23.03.3-150600.33.9.1 * ovn-devel-23.03.3-150600.33.9.1 * ovn-debuginfo-23.03.3-150600.33.9.1 * libopenvswitch-3_1-0-3.1.7-150600.33.9.1 * openvswitch-debugsource-3.1.7-150600.33.9.1 * openvswitch-test-3.1.7-150600.33.9.1 * openvswitch-vtep-debuginfo-3.1.7-150600.33.9.1 * openvswitch-vtep-3.1.7-150600.33.9.1 * ovn-central-debuginfo-23.03.3-150600.33.9.1 * libovn-23_03-0-debuginfo-23.03.3-150600.33.9.1 * libopenvswitch-3_1-0-debuginfo-3.1.7-150600.33.9.1 * python3-ovs-3.1.7-150600.33.9.1 * openvswitch-debuginfo-3.1.7-150600.33.9.1 * openvswitch-devel-3.1.7-150600.33.9.1 ## References: * https://www.suse.com/security/cve/CVE-2023-1668.html * https://www.suse.com/security/cve/CVE-2023-3152.html * https://www.suse.com/security/cve/CVE-2023-3153.html * https://www.suse.com/security/cve/CVE-2023-3966.html * https://www.suse.com/security/cve/CVE-2023-5366.html * https://www.suse.com/security/cve/CVE-2024-2182.html * https://www.suse.com/security/cve/CVE-2025-0650.html * https://bugzilla.suse.com/show_bug.cgi?id=1210054 * https://bugzilla.suse.com/show_bug.cgi?id=1212125 * https://bugzilla.suse.com/show_bug.cgi?id=1216002 * https://bugzilla.suse.com/show_bug.cgi?id=1219465 * https://bugzilla.suse.com/show_bug.cgi?id=1255435 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jan 23 20:35:36 2026 From: null at suse.de (SLE-UPDATES) Date: Fri, 23 Jan 2026 20:35:36 -0000 Subject: SUSE-SU-2026:0279-1: moderate: Security update for libvirt Message-ID: <176920053677.16867.2350485688877865832@smelt2.prg2.suse.org> # Security update for libvirt Announcement ID: SUSE-SU-2026:0279-1 Release Date: 2026-01-23T15:09:06Z Rating: moderate References: * bsc#1253278 * bsc#1253703 Cross-References: * CVE-2025-12748 * CVE-2025-13193 CVSS scores: * CVE-2025-12748 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-12748 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-12748 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H * CVE-2025-13193 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2025-13193 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N * CVE-2025-13193 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N Affected Products: * Basesystem Module 15-SP7 * Server Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for libvirt fixes the following issues: * CVE-2025-13193: Fixed umask for 'qemu-img' when creating external inactive snapshots (bsc#1253703) * CVE-2025-12748: Fixed check ACLs before parsing the whole domain XML (bsc#1253278) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2026-279=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2026-279=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libvirt-libs-debuginfo-11.0.0-150700.4.13.1 * libvirt-debugsource-11.0.0-150700.4.13.1 * libvirt-libs-11.0.0-150700.4.13.1 * Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libvirt-daemon-log-11.0.0-150700.4.13.1 * libvirt-daemon-driver-nwfilter-11.0.0-150700.4.13.1 * libvirt-daemon-common-11.0.0-150700.4.13.1 * libvirt-daemon-driver-interface-11.0.0-150700.4.13.1 * libvirt-daemon-driver-nodedev-debuginfo-11.0.0-150700.4.13.1 * libvirt-daemon-debuginfo-11.0.0-150700.4.13.1 * libvirt-daemon-driver-storage-core-debuginfo-11.0.0-150700.4.13.1 * libvirt-daemon-qemu-11.0.0-150700.4.13.1 * libvirt-client-11.0.0-150700.4.13.1 * libvirt-daemon-driver-storage-logical-11.0.0-150700.4.13.1 * libvirt-daemon-config-nwfilter-11.0.0-150700.4.13.1 * libvirt-daemon-driver-storage-scsi-debuginfo-11.0.0-150700.4.13.1 * libvirt-debugsource-11.0.0-150700.4.13.1 * libvirt-daemon-plugin-lockd-debuginfo-11.0.0-150700.4.13.1 * libvirt-daemon-lock-debuginfo-11.0.0-150700.4.13.1 * libvirt-daemon-driver-storage-mpath-debuginfo-11.0.0-150700.4.13.1 * libvirt-daemon-log-debuginfo-11.0.0-150700.4.13.1 * libvirt-daemon-driver-storage-scsi-11.0.0-150700.4.13.1 * libvirt-daemon-plugin-sanlock-debuginfo-11.0.0-150700.4.13.1 * libvirt-11.0.0-150700.4.13.1 * libvirt-daemon-driver-storage-11.0.0-150700.4.13.1 * libvirt-daemon-driver-secret-debuginfo-11.0.0-150700.4.13.1 * libvirt-daemon-driver-qemu-debuginfo-11.0.0-150700.4.13.1 * libvirt-daemon-driver-storage-logical-debuginfo-11.0.0-150700.4.13.1 * libvirt-daemon-plugin-sanlock-11.0.0-150700.4.13.1 * libvirt-nss-11.0.0-150700.4.13.1 * libvirt-nss-debuginfo-11.0.0-150700.4.13.1 * libvirt-daemon-driver-qemu-11.0.0-150700.4.13.1 * libvirt-daemon-driver-secret-11.0.0-150700.4.13.1 * libvirt-daemon-plugin-lockd-11.0.0-150700.4.13.1 * libvirt-daemon-driver-network-11.0.0-150700.4.13.1 * libvirt-daemon-lock-11.0.0-150700.4.13.1 * libvirt-daemon-proxy-11.0.0-150700.4.13.1 * libvirt-client-qemu-11.0.0-150700.4.13.1 * libvirt-daemon-11.0.0-150700.4.13.1 * libvirt-daemon-driver-storage-disk-debuginfo-11.0.0-150700.4.13.1 * libvirt-daemon-driver-interface-debuginfo-11.0.0-150700.4.13.1 * libvirt-daemon-driver-storage-mpath-11.0.0-150700.4.13.1 * libvirt-daemon-config-network-11.0.0-150700.4.13.1 * libvirt-daemon-hooks-11.0.0-150700.4.13.1 * libvirt-daemon-driver-storage-iscsi-debuginfo-11.0.0-150700.4.13.1 * libvirt-daemon-proxy-debuginfo-11.0.0-150700.4.13.1 * libvirt-daemon-driver-storage-iscsi-11.0.0-150700.4.13.1 * libvirt-client-debuginfo-11.0.0-150700.4.13.1 * libvirt-daemon-driver-network-debuginfo-11.0.0-150700.4.13.1 * libvirt-daemon-driver-storage-core-11.0.0-150700.4.13.1 * libvirt-daemon-common-debuginfo-11.0.0-150700.4.13.1 * libvirt-devel-11.0.0-150700.4.13.1 * libvirt-daemon-driver-nwfilter-debuginfo-11.0.0-150700.4.13.1 * libvirt-daemon-driver-storage-disk-11.0.0-150700.4.13.1 * libvirt-daemon-driver-storage-iscsi-direct-11.0.0-150700.4.13.1 * libvirt-daemon-driver-storage-iscsi-direct-debuginfo-11.0.0-150700.4.13.1 * libvirt-daemon-driver-nodedev-11.0.0-150700.4.13.1 * Server Applications Module 15-SP7 (aarch64 x86_64) * libvirt-daemon-driver-storage-rbd-11.0.0-150700.4.13.1 * libvirt-daemon-driver-storage-rbd-debuginfo-11.0.0-150700.4.13.1 * Server Applications Module 15-SP7 (noarch) * libvirt-doc-11.0.0-150700.4.13.1 * Server Applications Module 15-SP7 (x86_64) * libvirt-daemon-driver-libxl-11.0.0-150700.4.13.1 * libvirt-daemon-driver-libxl-debuginfo-11.0.0-150700.4.13.1 * libvirt-daemon-xen-11.0.0-150700.4.13.1 ## References: * https://www.suse.com/security/cve/CVE-2025-12748.html * https://www.suse.com/security/cve/CVE-2025-13193.html * https://bugzilla.suse.com/show_bug.cgi?id=1253278 * https://bugzilla.suse.com/show_bug.cgi?id=1253703 -------------- next part -------------- An HTML attachment was scrubbed... URL: