SUSE 5511 Published by

SUSE Linux has received several security updates, including a critical patch for the Linux kernel and another for the glib2 library. Additionally, security updates are available for various packages such as mariadb, python315, and zk. The patches also address vulnerabilities in rsync, mozjs52, and libsoup, with some of these fixes classified as moderate rather than critical.

SUSE-SU-2025:4504-1: important: Security update for glib2
SUSE-SU-2025:4505-1: important: Security update for the Linux Kernel
SUSE-SU-2025:4506-1: important: Security update for the Linux Kernel
openSUSE-SU-2025:20177-1: important: Security update for cheat
openSUSE-SU-2025:20175-1: important: Security update for mariadb
openSUSE-SU-2025:15840-1: moderate: python315-3.15.0~a3-1.1 on GA media
openSUSE-SU-2025:15839-1: moderate: python310-3.10.19-3.1 on GA media
openSUSE-SU-2025:15841-1: moderate: zk-0.15.2-1.1 on GA media
SUSE-SU-2025:4511-1: moderate: Security update for rsync
SUSE-SU-2025:4512-1: moderate: Security update for mozjs52
SUSE-SU-2025:4514-1: important: Security update for libsoup




SUSE-SU-2025:4504-1: important: Security update for glib2


# Security update for glib2

Announcement ID: SUSE-SU-2025:4504-1
Release Date: 2025-12-22T16:30:41Z
Rating: important
References:

* bsc#1254297
* bsc#1254662
* bsc#1254878

Cross-References:

* CVE-2025-13601
* CVE-2025-14087
* CVE-2025-14512

CVSS scores:

* CVE-2025-13601 ( SUSE ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-13601 ( NVD ): 7.7 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-14087 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-14087 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-14087 ( NVD ): 5.6 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-14512 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-14512 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-14512 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Proxy 4.3 LTS
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Retail Branch Server 4.3 LTS
* SUSE Manager Server 4.3
* SUSE Manager Server 4.3 LTS

An update that solves three vulnerabilities can now be installed.

## Description:

This update for glib2 fixes the following issues:

* CVE-2025-14512: integer overflow in the GIO `escape_byte_string()` function
when processing malicious files or remote filesystem attribute values can
lead to denial-of-service (bsc#1254878).
* CVE-2025-14087: buffer underflow in the GVariant parser `bytestring_parse()`
and `string_parse()` functions when processing attacker-influenced data may
lead to crash or code execution (bsc#1254662).
* CVE-2025-13601: heap-based buffer overflow in the `g_escape_uri_string()`
function when processing strings with a large number of unacceptable
characters may lead to crash or code execution (bsc#1254297).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-4504=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-4504=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-4504=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-4504=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-4504=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-4504=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4504=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4504=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4504=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4504=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4504=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4504=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4504=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4504=1

* SUSE Manager Proxy 4.3 LTS
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4504=1

* SUSE Manager Retail Branch Server 4.3 LTS
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-LTS-2025-4504=1

* SUSE Manager Server 4.3 LTS
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4504=1

## Package List:

* openSUSE Leap 15.4 (noarch)
* glib2-lang-2.70.5-150400.3.29.1
* gio-branding-upstream-2.70.5-150400.3.29.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* glib2-doc-2.70.5-150400.3.29.1
* libgobject-2_0-0-2.70.5-150400.3.29.1
* glib2-debugsource-2.70.5-150400.3.29.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-2.70.5-150400.3.29.1
* glib2-devel-debuginfo-2.70.5-150400.3.29.1
* glib2-tests-devel-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-2.70.5-150400.3.29.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-debuginfo-2.70.5-150400.3.29.1
* glib2-tests-devel-2.70.5-150400.3.29.1
* libgthread-2_0-0-2.70.5-150400.3.29.1
* glib2-devel-static-2.70.5-150400.3.29.1
* glib2-devel-2.70.5-150400.3.29.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.29.1
* openSUSE Leap 15.4 (x86_64)
* glib2-devel-32bit-debuginfo-2.70.5-150400.3.29.1
* libgobject-2_0-0-32bit-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-2.70.5-150400.3.29.1
* glib2-tools-32bit-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-32bit-2.70.5-150400.3.29.1
* libgthread-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* glib2-devel-32bit-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-2.70.5-150400.3.29.1
* glib2-tools-32bit-2.70.5-150400.3.29.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libgmodule-2_0-0-64bit-debuginfo-2.70.5-150400.3.29.1
* libgobject-2_0-0-64bit-debuginfo-2.70.5-150400.3.29.1
* libgmodule-2_0-0-64bit-2.70.5-150400.3.29.1
* libglib-2_0-0-64bit-2.70.5-150400.3.29.1
* glib2-devel-64bit-2.70.5-150400.3.29.1
* libgobject-2_0-0-64bit-2.70.5-150400.3.29.1
* libgthread-2_0-0-64bit-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-64bit-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-64bit-2.70.5-150400.3.29.1
* glib2-devel-64bit-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-64bit-2.70.5-150400.3.29.1
* libgio-2_0-0-64bit-2.70.5-150400.3.29.1
* libglib-2_0-0-64bit-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-64bit-debuginfo-2.70.5-150400.3.29.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libgobject-2_0-0-2.70.5-150400.3.29.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-debugsource-2.70.5-150400.3.29.1
* glib2-tools-2.70.5-150400.3.29.1
* libglib-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-2.70.5-150400.3.29.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.29.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libgobject-2_0-0-2.70.5-150400.3.29.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-debugsource-2.70.5-150400.3.29.1
* glib2-tools-2.70.5-150400.3.29.1
* libglib-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-2.70.5-150400.3.29.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.29.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libgobject-2_0-0-2.70.5-150400.3.29.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-debugsource-2.70.5-150400.3.29.1
* glib2-tools-2.70.5-150400.3.29.1
* libglib-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-2.70.5-150400.3.29.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.29.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libgobject-2_0-0-2.70.5-150400.3.29.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-debugsource-2.70.5-150400.3.29.1
* glib2-tools-2.70.5-150400.3.29.1
* libglib-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-2.70.5-150400.3.29.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.29.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libgobject-2_0-0-2.70.5-150400.3.29.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-debugsource-2.70.5-150400.3.29.1
* glib2-tools-2.70.5-150400.3.29.1
* libglib-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-2.70.5-150400.3.29.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libgobject-2_0-0-2.70.5-150400.3.29.1
* glib2-debugsource-2.70.5-150400.3.29.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-2.70.5-150400.3.29.1
* glib2-devel-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-2.70.5-150400.3.29.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-2.70.5-150400.3.29.1
* glib2-devel-2.70.5-150400.3.29.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* glib2-lang-2.70.5-150400.3.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64)
* libgobject-2_0-0-32bit-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-2.70.5-150400.3.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libgobject-2_0-0-2.70.5-150400.3.29.1
* glib2-debugsource-2.70.5-150400.3.29.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-2.70.5-150400.3.29.1
* glib2-devel-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-2.70.5-150400.3.29.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-2.70.5-150400.3.29.1
* glib2-devel-2.70.5-150400.3.29.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* glib2-lang-2.70.5-150400.3.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64)
* libgobject-2_0-0-32bit-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-2.70.5-150400.3.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libgobject-2_0-0-2.70.5-150400.3.29.1
* glib2-debugsource-2.70.5-150400.3.29.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-2.70.5-150400.3.29.1
* glib2-devel-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-2.70.5-150400.3.29.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-2.70.5-150400.3.29.1
* glib2-devel-2.70.5-150400.3.29.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* glib2-lang-2.70.5-150400.3.29.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64)
* libgobject-2_0-0-32bit-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-2.70.5-150400.3.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libgobject-2_0-0-2.70.5-150400.3.29.1
* glib2-debugsource-2.70.5-150400.3.29.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-2.70.5-150400.3.29.1
* glib2-devel-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-2.70.5-150400.3.29.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-2.70.5-150400.3.29.1
* glib2-devel-2.70.5-150400.3.29.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* glib2-lang-2.70.5-150400.3.29.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64)
* libgobject-2_0-0-32bit-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-2.70.5-150400.3.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libgobject-2_0-0-2.70.5-150400.3.29.1
* glib2-debugsource-2.70.5-150400.3.29.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-2.70.5-150400.3.29.1
* glib2-devel-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-2.70.5-150400.3.29.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-2.70.5-150400.3.29.1
* glib2-devel-2.70.5-150400.3.29.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* glib2-lang-2.70.5-150400.3.29.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64)
* libgobject-2_0-0-32bit-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-2.70.5-150400.3.29.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libgobject-2_0-0-2.70.5-150400.3.29.1
* glib2-debugsource-2.70.5-150400.3.29.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-2.70.5-150400.3.29.1
* glib2-devel-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-2.70.5-150400.3.29.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-2.70.5-150400.3.29.1
* glib2-devel-2.70.5-150400.3.29.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.29.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* glib2-lang-2.70.5-150400.3.29.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64)
* libgobject-2_0-0-32bit-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-2.70.5-150400.3.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libgobject-2_0-0-2.70.5-150400.3.29.1
* glib2-debugsource-2.70.5-150400.3.29.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-2.70.5-150400.3.29.1
* glib2-devel-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-2.70.5-150400.3.29.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-2.70.5-150400.3.29.1
* glib2-devel-2.70.5-150400.3.29.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* glib2-lang-2.70.5-150400.3.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* libgobject-2_0-0-32bit-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-2.70.5-150400.3.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libgobject-2_0-0-2.70.5-150400.3.29.1
* glib2-debugsource-2.70.5-150400.3.29.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-2.70.5-150400.3.29.1
* glib2-devel-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-2.70.5-150400.3.29.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-2.70.5-150400.3.29.1
* glib2-devel-2.70.5-150400.3.29.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* glib2-lang-2.70.5-150400.3.29.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* libgobject-2_0-0-32bit-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-2.70.5-150400.3.29.1
* SUSE Manager Proxy 4.3 LTS (x86_64)
* libgobject-2_0-0-32bit-2.70.5-150400.3.29.1
* glib2-tools-2.70.5-150400.3.29.1
* libgio-2_0-0-2.70.5-150400.3.29.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgobject-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1
* libglib-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-2.70.5-150400.3.29.1
* glib2-tools-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-2.70.5-150400.3.29.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-debugsource-2.70.5-150400.3.29.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-devel-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-2.70.5-150400.3.29.1
* glib2-devel-2.70.5-150400.3.29.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.29.1
* SUSE Manager Proxy 4.3 LTS (noarch)
* glib2-lang-2.70.5-150400.3.29.1
* SUSE Manager Retail Branch Server 4.3 LTS (x86_64)
* libgobject-2_0-0-32bit-2.70.5-150400.3.29.1
* glib2-tools-2.70.5-150400.3.29.1
* libgio-2_0-0-2.70.5-150400.3.29.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgobject-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1
* libglib-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-2.70.5-150400.3.29.1
* glib2-tools-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-2.70.5-150400.3.29.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-debugsource-2.70.5-150400.3.29.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-devel-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-2.70.5-150400.3.29.1
* glib2-devel-2.70.5-150400.3.29.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.29.1
* SUSE Manager Retail Branch Server 4.3 LTS (noarch)
* glib2-lang-2.70.5-150400.3.29.1
* SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64)
* libgobject-2_0-0-2.70.5-150400.3.29.1
* glib2-debugsource-2.70.5-150400.3.29.1
* libgio-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-2.70.5-150400.3.29.1
* glib2-devel-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-2.70.5-150400.3.29.1
* libgmodule-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-2.70.5-150400.3.29.1
* libgobject-2_0-0-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-debuginfo-2.70.5-150400.3.29.1
* glib2-tools-debuginfo-2.70.5-150400.3.29.1
* libgthread-2_0-0-2.70.5-150400.3.29.1
* glib2-devel-2.70.5-150400.3.29.1
* libglib-2_0-0-debuginfo-2.70.5-150400.3.29.1
* SUSE Manager Server 4.3 LTS (noarch)
* glib2-lang-2.70.5-150400.3.29.1
* SUSE Manager Server 4.3 LTS (x86_64)
* libgobject-2_0-0-32bit-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgio-2_0-0-32bit-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-2.70.5-150400.3.29.1
* libgobject-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libgmodule-2_0-0-32bit-debuginfo-2.70.5-150400.3.29.1
* libglib-2_0-0-32bit-2.70.5-150400.3.29.1

## References:

* https://www.suse.com/security/cve/CVE-2025-13601.html
* https://www.suse.com/security/cve/CVE-2025-14087.html
* https://www.suse.com/security/cve/CVE-2025-14512.html
* https://bugzilla.suse.com/show_bug.cgi?id=1254297
* https://bugzilla.suse.com/show_bug.cgi?id=1254662
* https://bugzilla.suse.com/show_bug.cgi?id=1254878



SUSE-SU-2025:4505-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:4505-1
Release Date: 2025-12-22T16:35:15Z
Rating: important
References:

* bsc#1232223
* bsc#1236743
* bsc#1237888
* bsc#1243474
* bsc#1245193
* bsc#1247076
* bsc#1247079
* bsc#1247500
* bsc#1247509
* bsc#1249547
* bsc#1249912
* bsc#1249982
* bsc#1250176
* bsc#1250237
* bsc#1250252
* bsc#1250705
* bsc#1251120
* bsc#1251786
* bsc#1252063
* bsc#1252267
* bsc#1252269
* bsc#1252303
* bsc#1252353
* bsc#1252681
* bsc#1252763
* bsc#1252773
* bsc#1252780
* bsc#1252794
* bsc#1252795
* bsc#1252809
* bsc#1252817
* bsc#1252821
* bsc#1252836
* bsc#1252845
* bsc#1252862
* bsc#1252912
* bsc#1252917
* bsc#1252928
* bsc#1253018
* bsc#1253176
* bsc#1253275
* bsc#1253318
* bsc#1253324
* bsc#1253349
* bsc#1253352
* bsc#1253355
* bsc#1253360
* bsc#1253362
* bsc#1253363
* bsc#1253367
* bsc#1253369
* bsc#1253393
* bsc#1253395
* bsc#1253403
* bsc#1253407
* bsc#1253409
* bsc#1253412
* bsc#1253416
* bsc#1253421
* bsc#1253423
* bsc#1253424
* bsc#1253425
* bsc#1253427
* bsc#1253428
* bsc#1253431
* bsc#1253436
* bsc#1253438
* bsc#1253440
* bsc#1253441
* bsc#1253445
* bsc#1253448
* bsc#1253449
* bsc#1253453
* bsc#1253456
* bsc#1253472
* bsc#1253779

Cross-References:

* CVE-2022-50253
* CVE-2023-53676
* CVE-2025-21710
* CVE-2025-37916
* CVE-2025-38359
* CVE-2025-38361
* CVE-2025-39788
* CVE-2025-39805
* CVE-2025-39819
* CVE-2025-39859
* CVE-2025-39944
* CVE-2025-39980
* CVE-2025-40001
* CVE-2025-40021
* CVE-2025-40027
* CVE-2025-40030
* CVE-2025-40038
* CVE-2025-40040
* CVE-2025-40048
* CVE-2025-40055
* CVE-2025-40059
* CVE-2025-40064
* CVE-2025-40070
* CVE-2025-40074
* CVE-2025-40075
* CVE-2025-40083
* CVE-2025-40098
* CVE-2025-40105
* CVE-2025-40107
* CVE-2025-40109
* CVE-2025-40110
* CVE-2025-40111
* CVE-2025-40115
* CVE-2025-40116
* CVE-2025-40118
* CVE-2025-40120
* CVE-2025-40121
* CVE-2025-40127
* CVE-2025-40129
* CVE-2025-40139
* CVE-2025-40140
* CVE-2025-40141
* CVE-2025-40149
* CVE-2025-40154
* CVE-2025-40156
* CVE-2025-40157
* CVE-2025-40159
* CVE-2025-40164
* CVE-2025-40168
* CVE-2025-40169
* CVE-2025-40171
* CVE-2025-40172
* CVE-2025-40173
* CVE-2025-40176
* CVE-2025-40180
* CVE-2025-40183
* CVE-2025-40186
* CVE-2025-40188
* CVE-2025-40194
* CVE-2025-40198
* CVE-2025-40200
* CVE-2025-40204
* CVE-2025-40205
* CVE-2025-40206
* CVE-2025-40207

CVSS scores:

* CVE-2022-50253 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50253 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53676 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37916 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37916 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-37916 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38359 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38359 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38361 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38361 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38361 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39788 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-39788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-39805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39819 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39980 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39980 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40001 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40001 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40021 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40021 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2025-40027 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40027 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40030 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40038 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40040 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40055 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40059 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40083 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40098 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40105 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40105 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40107 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40109 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40110 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40110 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40111 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40115 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40115 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40116 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40118 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40118 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40120 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40121 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40121 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40127 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40129 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40129 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40139 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40139 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40140 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40140 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40141 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40141 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-40149 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40149 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-40154 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40154 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40156 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40157 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40157 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40159 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40159 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40164 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40164 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40168 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40168 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-40169 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40169 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40171 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40171 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40172 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40173 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40173 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40176 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40176 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40180 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40180 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-40183 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40183 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40186 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40186 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40188 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40194 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40194 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40198 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40200 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40204 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-40205 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40206 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40206 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40207 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.6
* Public Cloud Module 15-SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves 65 vulnerabilities and has 11 security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP6 Azure kernel was updated to receive various
security bugfixes.

The following security bugs were fixed:

* CVE-2022-50253: bpf: make sure skb->len != 0 when redirecting to a tunneling
device (bsc#1249912).
* CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in
lio_target_nacl_info_show() (bsc#1251786).
* CVE-2025-21710: tcp: correct handling of extreme memory squeeze
(bsc#1237888).
* CVE-2025-37916: pds_core: remove write-after-free of client_id
(bsc#1243474).
* CVE-2025-38359: s390/mm: Fix in_atomic() handling in
do_secure_storage_access() (bsc#1247076).
* CVE-2025-38361: drm/amd/display: Check dce_hwseq before dereferencing it
(bsc#1247079).
* CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE
(bsc#1249547).
* CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove()
(bsc#1249982).
* CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).
* CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by
ptp_ocp_watchdog (bsc#1250252).
* CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()
(bsc#1251120).
* CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a
group (bsc#1252063).
* CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue
(bsc#1252303).
* CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent
(bsc#1252681).
* CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).
* CVE-2025-40030: pinctrl: check the return value of
pinmux_ops::get_function_name() (bsc#1252773).
* CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP
isn't valid (bsc#1252817).
* CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise
(bsc#1252780).
* CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask
(bsc#1252862).
* CVE-2025-40055: ocfs2: fix double free in user_cluster_connect()
(bsc#1252821).
* CVE-2025-40059: coresight: Fix incorrect handling for return value of
devm_kzalloc (bsc#1252809).
* CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev()
(bsc#1252845).
* CVE-2025-40070: pps: fix warning in pps_register_cdev when register device
fail (bsc#1252836).
* CVE-2025-40074: ipv4: start using dst_dev_rcu() (bsc#1252794).
* CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).
* CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue
(bsc#1252912).
* CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in
cs35l41_get_acpi_mute_state() (bsc#1252917).
* CVE-2025-40105: vfs: Don't leak disconnected dentries on umount
(bsc#1252928).
* CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in
smc_clc_prfx_set() (bsc#1253409).
* CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in
get_netdev_for_sock() (bsc#1253355).
* CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation
(bsc#1253403).
* CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in
smc_clc_prfx_match() (bsc#1253427).
* CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).
* CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth
(bsc#1253421).
* CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold
fails (bsc#1253425).
* CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).

The following non-security bugs were fixed:

* ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes).
* ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes).
* ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes).
* ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable-
fixes).
* ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes).
* ACPI: property: Return present device nodes only on fwnode interface
(stable-fixes).
* ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes).
* ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-
fixes).
* ACPICA: dispatcher: Use acpi_ds_clear_operands() in
acpi_ds_call_control_method() (stable-fixes).
* ALSA: hda: Fix missing pointer check in hda_component_manager_init function
(git-fixes).
* ALSA: serial-generic: remove shared static buffer (stable-fixes).
* ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes).
* ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd
(git-fixes).
* ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable-
fixes).
* ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes).
* ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes).
* ALSA: usb-audio: do not log messages meant for 1810c when initializing 1824c
(git-fixes).
* ALSA: usb-audio: fix uac2 clock source at terminal parser (git-fixes).
* ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes).
* ASoC: cs4271: Fix regulator leak on probe failure (git-fixes).
* ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable-
fixes).
* ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes).
* ASoC: qcom: sc8280xp: explicitly set S16LE format in
sc8280xp_be_hw_params_fixup() (stable-fixes).
* ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes).
* ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable-
fixes).
* Bluetooth: 6lowpan: Do not hold spin lock over sleeping functions (git-
fixes).
* Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes).
* Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion
(git-fixes).
* Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes).
* Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes).
* Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes).
* Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes).
* Bluetooth: bcsp: receive data only if registered (stable-fixes).
* Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes).
* Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames
(stable-fixes).
* Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git-
fixes).
* Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes).
* Documentation: ACPI: i2c-muxes: fix I2C device references (git-fixes).
* Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes).
* HID: amd_sfh: Stop sensor before starting (git-fixes).
* HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes).
* HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes).
* HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes).
* HID: uclogic: Fix potential memory leak in error path (git-fixes).
* Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes).
* Input: imx_sc_key - fix memory corruption on unload (git-fixes).
* Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes).
* KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes).
* KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-
fixes).
* KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing
(git-fixes).
* KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes).
* KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-
fixes).
* KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest
(git-fixes).
* KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes).
* KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git-
fixes).
* KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git-
fixes).
* KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest
(git-fixes).
* KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes).
* KVM: VMX: Preserve host's DEBUGCTLMSR_FREEZE_IN_SMM while running the guest
(git-fixes).
* KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git-
fixes).
* KVM: nVMX: Check vmcs12->guest_ia32_debugctl on nested VM-Enter (git-fixes).
* KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE
(git-fixes).
* KVM: x86: Add helper to retrieve current value of user return MSR (git-
fixes).
* KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap
(git-fixes).
* KVM: x86: Do not treat ENTER and LEAVE as branches, because they are not
(git-fixes).
* KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git-
fixes).
* NFS4: Fix state renewals missing after boot (git-fixes).
* NFS: check if suid/sgid was cleared after a write as needed (git-fixes).
* NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes).
* NFSD: Skip close replay processing if XDR encoding fails (git-fixes).
* NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes).
* NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes).
* NFSv4: handle ERR_GRACE on delegation recalls (git-fixes).
* PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes).
* PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes).
* PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes).
* PCI: cadence: Check for the existence of cdns_pcie::ops before using it
(stable-fixes).
* PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable-
fixes).
* PCI: j721e: Fix incorrect error message in probe() (git-fixes).
* PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-
fixes).
* PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).
* RDMA/bnxt_re: Do not fail destroy QP and cleanup debugfs earlier (git-
fixes).
* RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes).
* RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes).
* RDMA/hns: Fix the modification of max_send_sge (git-fixes).
* RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes).
* RDMA/irdma: Fix SD index calculation (git-fixes).
* RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes).
* Revert "drm/tegra: dsi: Clear enable register if powered by bootloader"
(git-fixes).
* Revert "wifi: ath10k: avoid unnecessary wait for service ready message"
(git-fixes).
* accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes).
* accel/habanalabs/gaudi2: read preboot status after recovering from dirty
state (stable-fixes).
* accel/habanalabs: return ENOMEM if less than requested pages were pinned
(stable-fixes).
* accel/habanalabs: support mapping cb with vmalloc-backed coherent memory
(stable-fixes).
* acpi,srat: Fix incorrect device handle check for Generic Initiator (git-
fixes).
* amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes).
* block: avoid possible overflow for chunk_sectors check in blk_stack_limits()
(git-fixes).
* block: fix kobject double initialization in add_disk (git-fixes).
* btrfs: abort transaction on failure to add link to inode (git-fixes).
* btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git-
fix).
* btrfs: avoid using fixed char array size for tree names (git-fix).
* btrfs: do not update last_log_commit when logging inode due to a new name
(git-fixes).
* btrfs: fix COW handling in run_delalloc_nocow() (git-fix).
* btrfs: fix inode leak on failure to add link to inode (git-fixes).
* btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix).
* btrfs: mark dirty extent range for out of bound prealloc extents (git-
fixes).
* btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix).
* btrfs: rename err to ret in btrfs_link() (git-fixes).
* btrfs: run btrfs_error_commit_super() early (git-fix).
* btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-
fixes).
* btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes).
* btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name
(git-fixes).
* btrfs: simplify error handling logic for btrfs_link() (git-fixes).
* btrfs: tree-checker: add dev extent item checks (git-fix).
* btrfs: tree-checker: add type and sequence check for inline backrefs (git-
fix).
* btrfs: tree-checker: fix the wrong output of data backref objectid (git-
fix).
* btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix).
* btrfs: tree-checker: validate dref root and objectid (git-fix).
* btrfs: use smp_mb__after_atomic() when forcing COW in
create_pending_snapshot() (git-fixes).
* char: misc: Does not request module for miscdevice with dynamic minor
(stable-fixes).
* char: misc: Make misc_register() reentry for miscdevice who wants dynamic
minor (stable-fixes).
* char: misc: restrict the dynamic range to exclude reserved minors (stable-
fixes).
* cramfs: Verify inode mode when loading from disk (git-fixes).
* crypto: aspeed - fix double free caused by devm (git-fixes).
* crypto: aspeed-acry - Convert to platform remove callback returning void
(stable-fixes).
* crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git-
fixes).
* crypto: iaa - Do not clobber req->base.data (git-fixes).
* crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes).
* dmaengine: dw-edma: Set status for callback_result (stable-fixes).
* dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes).
* drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream
(stable-fixes).
* drm/amd/display: Disable VRR on DCE 6 (stable-fixes).
* drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes).
* drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes).
* drm/amd/display: Fix black screen with HDMI outputs (git-fixes).
* drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable-
fixes).
* drm/amd/display: add more cyan skillfish devices (stable-fixes).
* drm/amd/display: ensure committing streams is seamless (stable-fixes).
* drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).
* drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable-
fixes).
* drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes).
* drm/amd/pm: Use cached metrics data on arcturus (stable-fixes).
* drm/amd: Avoid evicting resources at S5 (stable-fixes).
* drm/amd: Fix suspend failure with secure display TA (git-fixes).
* drm/amd: add more cyan skillfish PCI ids (stable-fixes).
* drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes).
* drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes).
* drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices
(stable-fixes).
* drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable-
fixes).
* drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes).
* drm/amdgpu: do not enable SMU on cyan skillfish (stable-fixes).
* drm/amdgpu: reject gang submissions under SRIOV (stable-fixes).
* drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes).
* drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes).
* drm/amdkfd: fix vram allocation failure for a special case (stable-fixes).
* drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes).
* drm/bridge: cdns-dsi: Do not fail on MIPI_DSI_MODE_VIDEO_BURST (stable-
fixes).
* drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes).
* drm/bridge: display-connector: do not set OP_DETECT for DisplayPorts
(stable-fixes).
* drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git-
fixes).
* drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes).
* drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable-
fixes).
* drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes).
* drm/msm: make sure to not queue up recovery more than once (stable-fixes).
* drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf()
(stable-fixes).
* drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes).
* drm/tegra: Add call to put_pid() (git-fixes).
* drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes).
* drm/tidss: Set crtc modesetting parameters with adjusted mode (stable-
fixes).
* drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes).
* drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git-
fixes).
* exfat: limit log print for IO error (git-fixes).
* extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes).
* extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes).
* fbcon: Set fb_display[i]->mode to NULL when the mode is released (stable-
fixes).
* fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds
(stable-fixes).
* fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes).
* fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable-
fixes).
* hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable-
fixes).
* hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes).
* hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes).
* hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models
(stable-fixes).
* hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable-
fixes).
* hwmon: sy7636a: add alias (stable-fixes).
* iio: adc: imx93_adc: load calibrated values even calibration failed (stable-
fixes).
* iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before
setting register (stable-fixes).
* ima: do not clear IMA_DIGSIG flag when setting or removing non-IMA xattr
(stable-fixes).
* iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git-
fixes).
* isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes).
* jfs: Verify inode mode when loading from disk (git-fixes).
* jfs: fix uninitialized waitqueue in transaction manager (git-fixes).
* kABI fix for KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO
into the guest (git-fixes).
* kabi/severities: drop xfer_to_guest_mode_handle_work.
* lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC
(git-fixes).
* md/raid1: fix data lost for writemostly rdev (git-fixes).
* md: fix mssing blktrace bio split events (git-fixes).
* media: adv7180: Add missing lock in suspend callback (stable-fixes).
* media: adv7180: Do not write format to device in set_fmt (stable-fixes).
* media: adv7180: Only validate format in querystd (stable-fixes).
* media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).
* media: fix uninitialized symbol warnings (stable-fixes).
* media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR
(stable-fixes).
* media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer
(stable-fixes).
* media: imon: make send_packet() more robust (stable-fixes).
* media: ov08x40: Fix the horizontal flip control (stable-fixes).
* media: redrat3: use int type to store negative error codes (stable-fixes).
* media: uvcvideo: Use heuristic to find stream entity (git-fixes).
* memstick: Add timeout to prevent indefinite waiting (stable-fixes).
* mfd: da9063: Split chip variant reading in two bus transactions (stable-
fixes).
* mfd: madera: Work around false-positive -Wininitialized warning (stable-
fixes).
* mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes).
* mfd: stmpe: Remove IRQ domain upon removal (stable-fixes).
* minixfs: Verify inode mode when loading from disk (git-fixes).
* mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git-
fixes).
* mm/secretmem: fix use-after-free race in fault handler (git-fixes).
* mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes).
* mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes).
* mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes).
* mtd: onenand: Pass correct pointer to IRQ handler (git-fixes).
* mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes).
* mtdchar: fix integer overflow in read/write ioctls (git-fixes).
* net/mana: fix warning in the writer of client oob (git-fixes).
* net/smc: Remove validation of reserved bits in CLC Decline message
(bsc#1253779).
* net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes).
* net: phy: clear link parameters on admin link down (stable-fixes).
* net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable-
fixes).
* net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes).
* net: tcp: send zero-window ACK when no memory (bsc#1253779).
* net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git-
fixes).
* nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode
dereferencing (git-fixes).
* nfsd: do not defer requests during idmap lookup in v4 compound decode
(bsc#1232223).
* nfsd: fix return error codes for nfsd_map_name_to_id (bsc#1232223).
* nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes).
* perf script: add --addr2line option (bsc#1247509).
* phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes).
* phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet
(stable-fixes).
* phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0
(stable-fixes).
* pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes).
* pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git-
fixes).
* pinctrl: single: fix bias pull up/down handling in pin_config_set (stable-
fixes).
* platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos
(git-fixes).
* power: supply: qcom_battmgr: add OOI chemistry (stable-fixes).
* power: supply: qcom_battmgr: handle charging state change notifications
(stable-fixes).
* power: supply: sbs-charger: Support multiple devices (stable-fixes).
* powerpc: export MIN RMA size (bsc#1236743).
* powerpc: increase MIN RMA size for CAS negotiation (bsc#1236743,
bsc#1252269).
* regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes).
* rtc: rx8025: fix incorrect register reference (git-fixes).
* s390/mm,fault: simplify kfence fault handling (bsc#1247076).
* scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git-
fixes).
* scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes).
* scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes).
* scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git-
fixes).
* scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes).
* scsi: mpi3mr: Correctly handle ATA device errors (git-fixes).
* scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes).
* scsi: mpt3sas: Correctly handle ATA device errors (git-fixes).
* scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git-
fixes).
* scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes).
* scsi: storvsc: Prefer returning channel with the same CPU as on the I/O
issuing CPU (bsc#1252267).
* selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes).
* selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes).
* selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes).
* selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes).
* selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes).
* selftests/bpf: Fix string read in strncmp benchmark (git-fixes).
* selftests/bpf: Mitigate sockmap_ktls disconnect_after_delete failure (git-
fixes).
* selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes).
* selftests/bpf: fix signedness bug in redir_partial() (git-fixes).
* serial: 8250_exar: add support for Advantech 2 port card with Device ID
0x0018 (git-fixes).
* serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes).
* soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes).
* soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes).
* soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes).
* spi: Try to get ACPI GPIO IRQ earlier (git-fixes).
* spi: loopback-test: Do not use %pK through printk (stable-fixes).
* spi: rpc-if: Add resume support for RZ/G3E (stable-fixes).
* strparser: Fix signed/unsigned mismatch bug (git-fixes).
* tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate
psock->cork (bsc#1250705).
* thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes).
* tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable-
fixes).
* tools/cpupower: fix error return value in cpupower_write_sysfs() (stable-
fixes).
* tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes).
* tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable-
fixes).
* tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes).
* tools: lib: thermal: do not preserve owner in install (stable-fixes).
* tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes).
* uio_hv_generic: Query the ringbuffer size for device (git-fixes).
* usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes).
* usb: cdns3: gadget: Use-after-free during failed initialization and exit of
cdnsp gadget (stable-fixes).
* usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable-
fixes).
* usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes).
* usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes).
* usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable-
fixes).
* usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable-
fixes).
* video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable-
fixes).
* watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable-
fixes).
* wifi: ath10k: Fix connection after GTK rekeying (stable-fixes).
* wifi: ath11k: zero init info->status in wmi_process_mgmt_tx_comp() (git-
fixes).
* wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes).
* wifi: mac80211: Fix HE capabilities element check (stable-fixes).
* wifi: mac80211: reject address change while connecting (git-fixes).
* wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes).
* wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git-
fixes).
* wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device
(stable-fixes).
* wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes).
* wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git-
fixes).
* wifi: rtw88: sdio: use indirect IO for device registers before power-on
(stable-fixes).
* wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git-
fixes).
* x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes).
* x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes).
* x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes).
* x86/CPU/AMD: Do the common init on future Zens too (git-fixes).
* x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes).
* x86/bugs: Fix reporting of LFENCE retpoline (git-fixes).
* x86/bugs: Report correct retbleed mitigation status (git-fixes).
* x86/vmscape: Add old Intel CPUs to affected list (git-fixes).
* xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes).
* xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive
(git-fixes).
* xhci: dbc: Improve performance by removing delay in transfer event polling
(stable-fixes).
* xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event
(git-fixes).
* xhci: dbc: poll at different rate depending on data transfer activity
(stable-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-4505=1 openSUSE-SLE-15.6-2025-4505=1

* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-4505=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* kernel-devel-azure-6.4.0-150600.8.58.1
* kernel-source-azure-6.4.0-150600.8.58.1
* openSUSE Leap 15.6 (aarch64 x86_64)
* kernel-azure-debuginfo-6.4.0-150600.8.58.1
* kselftests-kmp-azure-debuginfo-6.4.0-150600.8.58.1
* gfs2-kmp-azure-6.4.0-150600.8.58.1
* kernel-azure-optional-debuginfo-6.4.0-150600.8.58.1
* dlm-kmp-azure-6.4.0-150600.8.58.1
* kernel-syms-azure-6.4.0-150600.8.58.1
* cluster-md-kmp-azure-6.4.0-150600.8.58.1
* kernel-azure-devel-debuginfo-6.4.0-150600.8.58.1
* kselftests-kmp-azure-6.4.0-150600.8.58.1
* dlm-kmp-azure-debuginfo-6.4.0-150600.8.58.1
* ocfs2-kmp-azure-debuginfo-6.4.0-150600.8.58.1
* reiserfs-kmp-azure-6.4.0-150600.8.58.1
* ocfs2-kmp-azure-6.4.0-150600.8.58.1
* reiserfs-kmp-azure-debuginfo-6.4.0-150600.8.58.1
* gfs2-kmp-azure-debuginfo-6.4.0-150600.8.58.1
* kernel-azure-devel-6.4.0-150600.8.58.1
* kernel-azure-debugsource-6.4.0-150600.8.58.1
* kernel-azure-extra-debuginfo-6.4.0-150600.8.58.1
* cluster-md-kmp-azure-debuginfo-6.4.0-150600.8.58.1
* kernel-azure-extra-6.4.0-150600.8.58.1
* kernel-azure-optional-6.4.0-150600.8.58.1
* openSUSE Leap 15.6 (aarch64 nosrc x86_64)
* kernel-azure-6.4.0-150600.8.58.1
* openSUSE Leap 15.6 (x86_64)
* kernel-azure-vdso-debuginfo-6.4.0-150600.8.58.1
* kernel-azure-vdso-6.4.0-150600.8.58.1
* Public Cloud Module 15-SP6 (aarch64 nosrc x86_64)
* kernel-azure-6.4.0-150600.8.58.1
* Public Cloud Module 15-SP6 (aarch64 x86_64)
* kernel-syms-azure-6.4.0-150600.8.58.1
* kernel-azure-devel-6.4.0-150600.8.58.1
* kernel-azure-debuginfo-6.4.0-150600.8.58.1
* kernel-azure-debugsource-6.4.0-150600.8.58.1
* kernel-azure-devel-debuginfo-6.4.0-150600.8.58.1
* Public Cloud Module 15-SP6 (noarch)
* kernel-devel-azure-6.4.0-150600.8.58.1
* kernel-source-azure-6.4.0-150600.8.58.1

## References:

* https://www.suse.com/security/cve/CVE-2022-50253.html
* https://www.suse.com/security/cve/CVE-2023-53676.html
* https://www.suse.com/security/cve/CVE-2025-21710.html
* https://www.suse.com/security/cve/CVE-2025-37916.html
* https://www.suse.com/security/cve/CVE-2025-38359.html
* https://www.suse.com/security/cve/CVE-2025-38361.html
* https://www.suse.com/security/cve/CVE-2025-39788.html
* https://www.suse.com/security/cve/CVE-2025-39805.html
* https://www.suse.com/security/cve/CVE-2025-39819.html
* https://www.suse.com/security/cve/CVE-2025-39859.html
* https://www.suse.com/security/cve/CVE-2025-39944.html
* https://www.suse.com/security/cve/CVE-2025-39980.html
* https://www.suse.com/security/cve/CVE-2025-40001.html
* https://www.suse.com/security/cve/CVE-2025-40021.html
* https://www.suse.com/security/cve/CVE-2025-40027.html
* https://www.suse.com/security/cve/CVE-2025-40030.html
* https://www.suse.com/security/cve/CVE-2025-40038.html
* https://www.suse.com/security/cve/CVE-2025-40040.html
* https://www.suse.com/security/cve/CVE-2025-40048.html
* https://www.suse.com/security/cve/CVE-2025-40055.html
* https://www.suse.com/security/cve/CVE-2025-40059.html
* https://www.suse.com/security/cve/CVE-2025-40064.html
* https://www.suse.com/security/cve/CVE-2025-40070.html
* https://www.suse.com/security/cve/CVE-2025-40074.html
* https://www.suse.com/security/cve/CVE-2025-40075.html
* https://www.suse.com/security/cve/CVE-2025-40083.html
* https://www.suse.com/security/cve/CVE-2025-40098.html
* https://www.suse.com/security/cve/CVE-2025-40105.html
* https://www.suse.com/security/cve/CVE-2025-40107.html
* https://www.suse.com/security/cve/CVE-2025-40109.html
* https://www.suse.com/security/cve/CVE-2025-40110.html
* https://www.suse.com/security/cve/CVE-2025-40111.html
* https://www.suse.com/security/cve/CVE-2025-40115.html
* https://www.suse.com/security/cve/CVE-2025-40116.html
* https://www.suse.com/security/cve/CVE-2025-40118.html
* https://www.suse.com/security/cve/CVE-2025-40120.html
* https://www.suse.com/security/cve/CVE-2025-40121.html
* https://www.suse.com/security/cve/CVE-2025-40127.html
* https://www.suse.com/security/cve/CVE-2025-40129.html
* https://www.suse.com/security/cve/CVE-2025-40139.html
* https://www.suse.com/security/cve/CVE-2025-40140.html
* https://www.suse.com/security/cve/CVE-2025-40141.html
* https://www.suse.com/security/cve/CVE-2025-40149.html
* https://www.suse.com/security/cve/CVE-2025-40154.html
* https://www.suse.com/security/cve/CVE-2025-40156.html
* https://www.suse.com/security/cve/CVE-2025-40157.html
* https://www.suse.com/security/cve/CVE-2025-40159.html
* https://www.suse.com/security/cve/CVE-2025-40164.html
* https://www.suse.com/security/cve/CVE-2025-40168.html
* https://www.suse.com/security/cve/CVE-2025-40169.html
* https://www.suse.com/security/cve/CVE-2025-40171.html
* https://www.suse.com/security/cve/CVE-2025-40172.html
* https://www.suse.com/security/cve/CVE-2025-40173.html
* https://www.suse.com/security/cve/CVE-2025-40176.html
* https://www.suse.com/security/cve/CVE-2025-40180.html
* https://www.suse.com/security/cve/CVE-2025-40183.html
* https://www.suse.com/security/cve/CVE-2025-40186.html
* https://www.suse.com/security/cve/CVE-2025-40188.html
* https://www.suse.com/security/cve/CVE-2025-40194.html
* https://www.suse.com/security/cve/CVE-2025-40198.html
* https://www.suse.com/security/cve/CVE-2025-40200.html
* https://www.suse.com/security/cve/CVE-2025-40204.html
* https://www.suse.com/security/cve/CVE-2025-40205.html
* https://www.suse.com/security/cve/CVE-2025-40206.html
* https://www.suse.com/security/cve/CVE-2025-40207.html
* https://bugzilla.suse.com/show_bug.cgi?id=1232223
* https://bugzilla.suse.com/show_bug.cgi?id=1236743
* https://bugzilla.suse.com/show_bug.cgi?id=1237888
* https://bugzilla.suse.com/show_bug.cgi?id=1243474
* https://bugzilla.suse.com/show_bug.cgi?id=1245193
* https://bugzilla.suse.com/show_bug.cgi?id=1247076
* https://bugzilla.suse.com/show_bug.cgi?id=1247079
* https://bugzilla.suse.com/show_bug.cgi?id=1247500
* https://bugzilla.suse.com/show_bug.cgi?id=1247509
* https://bugzilla.suse.com/show_bug.cgi?id=1249547
* https://bugzilla.suse.com/show_bug.cgi?id=1249912
* https://bugzilla.suse.com/show_bug.cgi?id=1249982
* https://bugzilla.suse.com/show_bug.cgi?id=1250176
* https://bugzilla.suse.com/show_bug.cgi?id=1250237
* https://bugzilla.suse.com/show_bug.cgi?id=1250252
* https://bugzilla.suse.com/show_bug.cgi?id=1250705
* https://bugzilla.suse.com/show_bug.cgi?id=1251120
* https://bugzilla.suse.com/show_bug.cgi?id=1251786
* https://bugzilla.suse.com/show_bug.cgi?id=1252063
* https://bugzilla.suse.com/show_bug.cgi?id=1252267
* https://bugzilla.suse.com/show_bug.cgi?id=1252269
* https://bugzilla.suse.com/show_bug.cgi?id=1252303
* https://bugzilla.suse.com/show_bug.cgi?id=1252353
* https://bugzilla.suse.com/show_bug.cgi?id=1252681
* https://bugzilla.suse.com/show_bug.cgi?id=1252763
* https://bugzilla.suse.com/show_bug.cgi?id=1252773
* https://bugzilla.suse.com/show_bug.cgi?id=1252780
* https://bugzilla.suse.com/show_bug.cgi?id=1252794
* https://bugzilla.suse.com/show_bug.cgi?id=1252795
* https://bugzilla.suse.com/show_bug.cgi?id=1252809
* https://bugzilla.suse.com/show_bug.cgi?id=1252817
* https://bugzilla.suse.com/show_bug.cgi?id=1252821
* https://bugzilla.suse.com/show_bug.cgi?id=1252836
* https://bugzilla.suse.com/show_bug.cgi?id=1252845
* https://bugzilla.suse.com/show_bug.cgi?id=1252862
* https://bugzilla.suse.com/show_bug.cgi?id=1252912
* https://bugzilla.suse.com/show_bug.cgi?id=1252917
* https://bugzilla.suse.com/show_bug.cgi?id=1252928
* https://bugzilla.suse.com/show_bug.cgi?id=1253018
* https://bugzilla.suse.com/show_bug.cgi?id=1253176
* https://bugzilla.suse.com/show_bug.cgi?id=1253275
* https://bugzilla.suse.com/show_bug.cgi?id=1253318
* https://bugzilla.suse.com/show_bug.cgi?id=1253324
* https://bugzilla.suse.com/show_bug.cgi?id=1253349
* https://bugzilla.suse.com/show_bug.cgi?id=1253352
* https://bugzilla.suse.com/show_bug.cgi?id=1253355
* https://bugzilla.suse.com/show_bug.cgi?id=1253360
* https://bugzilla.suse.com/show_bug.cgi?id=1253362
* https://bugzilla.suse.com/show_bug.cgi?id=1253363
* https://bugzilla.suse.com/show_bug.cgi?id=1253367
* https://bugzilla.suse.com/show_bug.cgi?id=1253369
* https://bugzilla.suse.com/show_bug.cgi?id=1253393
* https://bugzilla.suse.com/show_bug.cgi?id=1253395
* https://bugzilla.suse.com/show_bug.cgi?id=1253403
* https://bugzilla.suse.com/show_bug.cgi?id=1253407
* https://bugzilla.suse.com/show_bug.cgi?id=1253409
* https://bugzilla.suse.com/show_bug.cgi?id=1253412
* https://bugzilla.suse.com/show_bug.cgi?id=1253416
* https://bugzilla.suse.com/show_bug.cgi?id=1253421
* https://bugzilla.suse.com/show_bug.cgi?id=1253423
* https://bugzilla.suse.com/show_bug.cgi?id=1253424
* https://bugzilla.suse.com/show_bug.cgi?id=1253425
* https://bugzilla.suse.com/show_bug.cgi?id=1253427
* https://bugzilla.suse.com/show_bug.cgi?id=1253428
* https://bugzilla.suse.com/show_bug.cgi?id=1253431
* https://bugzilla.suse.com/show_bug.cgi?id=1253436
* https://bugzilla.suse.com/show_bug.cgi?id=1253438
* https://bugzilla.suse.com/show_bug.cgi?id=1253440
* https://bugzilla.suse.com/show_bug.cgi?id=1253441
* https://bugzilla.suse.com/show_bug.cgi?id=1253445
* https://bugzilla.suse.com/show_bug.cgi?id=1253448
* https://bugzilla.suse.com/show_bug.cgi?id=1253449
* https://bugzilla.suse.com/show_bug.cgi?id=1253453
* https://bugzilla.suse.com/show_bug.cgi?id=1253456
* https://bugzilla.suse.com/show_bug.cgi?id=1253472
* https://bugzilla.suse.com/show_bug.cgi?id=1253779



SUSE-SU-2025:4506-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:4506-1
Release Date: 2025-12-22T16:39:04Z
Rating: important
References:

* bsc#1233640
* bsc#1249806
* bsc#1251786
* bsc#1252033
* bsc#1252267
* bsc#1252780
* bsc#1252862
* bsc#1253367
* bsc#1253431
* bsc#1253436

Cross-References:

* CVE-2022-50280
* CVE-2023-53676
* CVE-2024-53093
* CVE-2025-40040
* CVE-2025-40048
* CVE-2025-40121
* CVE-2025-40154
* CVE-2025-40204

CVSS scores:

* CVE-2022-50280 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50280 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53676 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53093 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53093 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40040 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40121 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40121 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40154 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40154 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40204 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves eight vulnerabilities and has two security fixes can now
be installed.

## Description:

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

* CVE-2022-50280: pnode: terminate at peers of source (bsc#1249806).
* CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in
lio_target_nacl_info_show() (bsc#1251786).
* CVE-2024-53093: nvme-multipath: defer partition scanning (bsc#1233640).
* CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise
(bsc#1252780).
* CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask
(bsc#1252862).
* CVE-2025-40121: ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping
(bsc#1253367).
* CVE-2025-40154: ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping
(bsc#1253431).
* CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).

The following non-security bugs were fixed:

* Fix type signess in fbcon_set_font() (bsc#1252033).
* scsi: storvsc: Prefer returning channel with the same CPU as on the I/O
issuing CPU (bsc#1252267).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2025-4506=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-4506=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4506=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4506=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4506=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4506=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-4506=1

## Package List:

* openSUSE Leap 15.5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.130.1
* openSUSE Leap 15.5 (noarch)
* kernel-devel-5.14.21-150500.55.130.3
* kernel-source-vanilla-5.14.21-150500.55.130.3
* kernel-macros-5.14.21-150500.55.130.3
* kernel-source-5.14.21-150500.55.130.3
* kernel-docs-html-5.14.21-150500.55.130.1
* openSUSE Leap 15.5 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.130.3
* kernel-kvmsmall-debugsource-5.14.21-150500.55.130.3
* kernel-kvmsmall-debuginfo-5.14.21-150500.55.130.3
* kernel-default-base-rebuild-5.14.21-150500.55.130.3.150500.6.63.3
* kernel-default-base-5.14.21-150500.55.130.3.150500.6.63.3
* kernel-kvmsmall-devel-5.14.21-150500.55.130.3
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kselftests-kmp-default-5.14.21-150500.55.130.3
* ocfs2-kmp-default-5.14.21-150500.55.130.3
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.130.3
* cluster-md-kmp-default-5.14.21-150500.55.130.3
* kernel-default-optional-debuginfo-5.14.21-150500.55.130.3
* gfs2-kmp-default-5.14.21-150500.55.130.3
* reiserfs-kmp-default-5.14.21-150500.55.130.3
* kernel-default-extra-5.14.21-150500.55.130.3
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.130.3
* dlm-kmp-default-5.14.21-150500.55.130.3
* kernel-default-extra-debuginfo-5.14.21-150500.55.130.3
* kernel-default-devel-debuginfo-5.14.21-150500.55.130.3
* dlm-kmp-default-debuginfo-5.14.21-150500.55.130.3
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.130.3
* kernel-default-optional-5.14.21-150500.55.130.3
* kernel-obs-build-5.14.21-150500.55.130.3
* kernel-syms-5.14.21-150500.55.130.1
* kernel-obs-build-debugsource-5.14.21-150500.55.130.3
* kernel-obs-qa-5.14.21-150500.55.130.1
* kselftests-kmp-default-debuginfo-5.14.21-150500.55.130.3
* kernel-default-debugsource-5.14.21-150500.55.130.3
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.130.3
* kernel-default-livepatch-5.14.21-150500.55.130.3
* kernel-default-debuginfo-5.14.21-150500.55.130.3
* kernel-default-devel-5.14.21-150500.55.130.3
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.130.3
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_33-debugsource-1-150500.11.3.3
* kernel-livepatch-5_14_21-150500_55_130-default-debuginfo-1-150500.11.3.3
* kernel-livepatch-5_14_21-150500_55_130-default-1-150500.11.3.3
* kernel-default-livepatch-devel-5.14.21-150500.55.130.3
* openSUSE Leap 15.5 (x86_64)
* kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.130.3
* kernel-default-vdso-debuginfo-5.14.21-150500.55.130.3
* kernel-kvmsmall-vdso-5.14.21-150500.55.130.3
* kernel-default-vdso-5.14.21-150500.55.130.3
* openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150500.55.130.3
* openSUSE Leap 15.5 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.130.3
* openSUSE Leap 15.5 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150500.55.130.3
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.130.3
* openSUSE Leap 15.5 (nosrc)
* dtb-aarch64-5.14.21-150500.55.130.1
* openSUSE Leap 15.5 (aarch64)
* kernel-64kb-optional-5.14.21-150500.55.130.3
* ocfs2-kmp-64kb-5.14.21-150500.55.130.3
* kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.130.3
* dtb-marvell-5.14.21-150500.55.130.1
* dlm-kmp-64kb-5.14.21-150500.55.130.3
* gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.130.3
* dtb-hisilicon-5.14.21-150500.55.130.1
* ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.130.3
* reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.130.3
* dtb-broadcom-5.14.21-150500.55.130.1
* dtb-apm-5.14.21-150500.55.130.1
* kernel-64kb-optional-debuginfo-5.14.21-150500.55.130.3
* dtb-amd-5.14.21-150500.55.130.1
* dtb-arm-5.14.21-150500.55.130.1
* kernel-64kb-extra-debuginfo-5.14.21-150500.55.130.3
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.130.3
* dtb-freescale-5.14.21-150500.55.130.1
* dtb-exynos-5.14.21-150500.55.130.1
* kernel-64kb-extra-5.14.21-150500.55.130.3
* kselftests-kmp-64kb-5.14.21-150500.55.130.3
* cluster-md-kmp-64kb-5.14.21-150500.55.130.3
* dtb-cavium-5.14.21-150500.55.130.1
* dtb-rockchip-5.14.21-150500.55.130.1
* dtb-xilinx-5.14.21-150500.55.130.1
* reiserfs-kmp-64kb-5.14.21-150500.55.130.3
* cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.130.3
* dtb-qcom-5.14.21-150500.55.130.1
* dtb-allwinner-5.14.21-150500.55.130.1
* dtb-renesas-5.14.21-150500.55.130.1
* dtb-apple-5.14.21-150500.55.130.1
* dtb-sprd-5.14.21-150500.55.130.1
* dtb-lg-5.14.21-150500.55.130.1
* dtb-mediatek-5.14.21-150500.55.130.1
* gfs2-kmp-64kb-5.14.21-150500.55.130.3
* dtb-amazon-5.14.21-150500.55.130.1
* kernel-64kb-debuginfo-5.14.21-150500.55.130.3
* kernel-64kb-devel-5.14.21-150500.55.130.3
* kernel-64kb-debugsource-5.14.21-150500.55.130.3
* dlm-kmp-64kb-debuginfo-5.14.21-150500.55.130.3
* dtb-socionext-5.14.21-150500.55.130.1
* dtb-amlogic-5.14.21-150500.55.130.1
* dtb-nvidia-5.14.21-150500.55.130.1
* dtb-altera-5.14.21-150500.55.130.1
* openSUSE Leap 15.5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.130.3
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.130.3
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* kernel-default-base-5.14.21-150500.55.130.3.150500.6.63.3
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* kernel-default-debugsource-5.14.21-150500.55.130.3
* kernel-default-debuginfo-5.14.21-150500.55.130.3
* SUSE Linux Enterprise Micro 5.5 (noarch)
* kernel-macros-5.14.21-150500.55.130.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.130.3
* ocfs2-kmp-default-5.14.21-150500.55.130.3
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.130.3
* kernel-default-debugsource-5.14.21-150500.55.130.3
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.130.3
* cluster-md-kmp-default-5.14.21-150500.55.130.3
* kernel-obs-build-5.14.21-150500.55.130.3
* kernel-syms-5.14.21-150500.55.130.1
* dlm-kmp-default-5.14.21-150500.55.130.3
* kernel-default-base-5.14.21-150500.55.130.3.150500.6.63.3
* kernel-default-debuginfo-5.14.21-150500.55.130.3
* dlm-kmp-default-debuginfo-5.14.21-150500.55.130.3
* kernel-obs-build-debugsource-5.14.21-150500.55.130.3
* kernel-default-devel-5.14.21-150500.55.130.3
* kernel-default-devel-debuginfo-5.14.21-150500.55.130.3
* gfs2-kmp-default-5.14.21-150500.55.130.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
nosrc)
* kernel-64kb-5.14.21-150500.55.130.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64)
* kernel-64kb-devel-5.14.21-150500.55.130.3
* kernel-64kb-debuginfo-5.14.21-150500.55.130.3
* kernel-64kb-debugsource-5.14.21-150500.55.130.3
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.130.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150500.55.130.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* kernel-source-5.14.21-150500.55.130.3
* kernel-devel-5.14.21-150500.55.130.3
* kernel-macros-5.14.21-150500.55.130.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.130.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.130.3
* ocfs2-kmp-default-5.14.21-150500.55.130.3
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.130.3
* kernel-default-debugsource-5.14.21-150500.55.130.3
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.130.3
* cluster-md-kmp-default-5.14.21-150500.55.130.3
* kernel-obs-build-5.14.21-150500.55.130.3
* kernel-syms-5.14.21-150500.55.130.1
* dlm-kmp-default-5.14.21-150500.55.130.3
* kernel-default-base-5.14.21-150500.55.130.3.150500.6.63.3
* kernel-default-debuginfo-5.14.21-150500.55.130.3
* dlm-kmp-default-debuginfo-5.14.21-150500.55.130.3
* kernel-obs-build-debugsource-5.14.21-150500.55.130.3
* kernel-default-devel-5.14.21-150500.55.130.3
* kernel-default-devel-debuginfo-5.14.21-150500.55.130.3
* gfs2-kmp-default-5.14.21-150500.55.130.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.130.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64)
* kernel-64kb-devel-5.14.21-150500.55.130.3
* kernel-64kb-debuginfo-5.14.21-150500.55.130.3
* kernel-64kb-debugsource-5.14.21-150500.55.130.3
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.130.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150500.55.130.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* kernel-source-5.14.21-150500.55.130.3
* kernel-devel-5.14.21-150500.55.130.3
* kernel-macros-5.14.21-150500.55.130.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.130.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.130.3
* reiserfs-kmp-default-5.14.21-150500.55.130.3
* ocfs2-kmp-default-5.14.21-150500.55.130.3
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.130.3
* kernel-default-debugsource-5.14.21-150500.55.130.3
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.130.3
* cluster-md-kmp-default-5.14.21-150500.55.130.3
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.130.3
* kernel-obs-build-5.14.21-150500.55.130.3
* kernel-syms-5.14.21-150500.55.130.1
* dlm-kmp-default-5.14.21-150500.55.130.3
* kernel-default-debuginfo-5.14.21-150500.55.130.3
* dlm-kmp-default-debuginfo-5.14.21-150500.55.130.3
* kernel-obs-build-debugsource-5.14.21-150500.55.130.3
* kernel-default-devel-5.14.21-150500.55.130.3
* kernel-default-devel-debuginfo-5.14.21-150500.55.130.3
* gfs2-kmp-default-5.14.21-150500.55.130.3
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.130.3
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64)
* kernel-64kb-devel-5.14.21-150500.55.130.3
* kernel-64kb-debuginfo-5.14.21-150500.55.130.3
* kernel-64kb-debugsource-5.14.21-150500.55.130.3
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.130.3
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-5.14.21-150500.55.130.3
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150500.55.130.3.150500.6.63.3
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* kernel-source-5.14.21-150500.55.130.3
* kernel-devel-5.14.21-150500.55.130.3
* kernel-macros-5.14.21-150500.55.130.3
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch nosrc)
* kernel-docs-5.14.21-150500.55.130.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.130.3
* SUSE Linux Enterprise Server 15 SP5 LTSS (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150500.55.130.3
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.130.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.130.3
* reiserfs-kmp-default-5.14.21-150500.55.130.3
* ocfs2-kmp-default-5.14.21-150500.55.130.3
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.130.3
* kernel-default-debugsource-5.14.21-150500.55.130.3
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.130.3
* cluster-md-kmp-default-5.14.21-150500.55.130.3
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.130.3
* kernel-obs-build-5.14.21-150500.55.130.3
* kernel-syms-5.14.21-150500.55.130.1
* dlm-kmp-default-5.14.21-150500.55.130.3
* kernel-default-base-5.14.21-150500.55.130.3.150500.6.63.3
* kernel-default-debuginfo-5.14.21-150500.55.130.3
* dlm-kmp-default-debuginfo-5.14.21-150500.55.130.3
* kernel-obs-build-debugsource-5.14.21-150500.55.130.3
* kernel-default-devel-5.14.21-150500.55.130.3
* kernel-default-devel-debuginfo-5.14.21-150500.55.130.3
* gfs2-kmp-default-5.14.21-150500.55.130.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150500.55.130.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* kernel-source-5.14.21-150500.55.130.3
* kernel-devel-5.14.21-150500.55.130.3
* kernel-macros-5.14.21-150500.55.130.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.130.1
* SUSE Linux Enterprise Live Patching 15-SP5 (nosrc)
* kernel-default-5.14.21-150500.55.130.3
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-default-debugsource-5.14.21-150500.55.130.3
* kernel-livepatch-SLE15-SP5_Update_33-debugsource-1-150500.11.3.3
* kernel-livepatch-5_14_21-150500_55_130-default-debuginfo-1-150500.11.3.3
* kernel-livepatch-5_14_21-150500_55_130-default-1-150500.11.3.3
* kernel-default-livepatch-5.14.21-150500.55.130.3
* kernel-default-livepatch-devel-5.14.21-150500.55.130.3
* kernel-default-debuginfo-5.14.21-150500.55.130.3

## References:

* https://www.suse.com/security/cve/CVE-2022-50280.html
* https://www.suse.com/security/cve/CVE-2023-53676.html
* https://www.suse.com/security/cve/CVE-2024-53093.html
* https://www.suse.com/security/cve/CVE-2025-40040.html
* https://www.suse.com/security/cve/CVE-2025-40048.html
* https://www.suse.com/security/cve/CVE-2025-40121.html
* https://www.suse.com/security/cve/CVE-2025-40154.html
* https://www.suse.com/security/cve/CVE-2025-40204.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233640
* https://bugzilla.suse.com/show_bug.cgi?id=1249806
* https://bugzilla.suse.com/show_bug.cgi?id=1251786
* https://bugzilla.suse.com/show_bug.cgi?id=1252033
* https://bugzilla.suse.com/show_bug.cgi?id=1252267
* https://bugzilla.suse.com/show_bug.cgi?id=1252780
* https://bugzilla.suse.com/show_bug.cgi?id=1252862
* https://bugzilla.suse.com/show_bug.cgi?id=1253367
* https://bugzilla.suse.com/show_bug.cgi?id=1253431
* https://bugzilla.suse.com/show_bug.cgi?id=1253436



openSUSE-SU-2025:20177-1: important: Security update for cheat


openSUSE security update: security update for cheat
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2025:20177-1
Rating: important
References:

* bsc#1247629
* bsc#1253593
* bsc#1253922
* bsc#1254051

Cross-References:

* CVE-2023-48795
* CVE-2025-21613
* CVE-2025-21614
* CVE-2025-22869
* CVE-2025-22870
* CVE-2025-47913
* CVE-2025-47914
* CVE-2025-58181

CVSS scores:

* CVE-2023-48795 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-21613 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-22869 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-22869 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-22870 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
* CVE-2025-22870 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-47913 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-47913 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-47914 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-47914 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58181 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58181 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves 8 vulnerabilities and has 4 bug fixes can now be installed.

Description:

This update for cheat fixes the following issues:

- Security:
* CVE-2025-47913: Fix client process termination (bsc#1253593)
* CVE-2025-58181: Fix potential unbounded memory consumption (bsc#1253922)
* CVE-2025-47914: Fix panic due to an out of bounds read (bsc#1254051)
* Replace golang.org/x/crypto=golang.org/x/crypto@v0.45.0
* Replace golang.org/x/net=golang.org/x/net@v0.47.0
* Replace golang.org/x/sys=golang.org/x/sys@v0.38.0

- Packaging improvements:
* Drop Requires: golang-packaging. The recommended Go toolchain
dependency expression is BuildRequires: golang(API) >= 1.x or
optionally the metapackage BuildRequires: go
* Use BuildRequires: golang(API) >= 1.19 matching go.mod
* Build PIE with pattern that may become recommended procedure:
%%ifnarch ppc64 GOFLAGS="-buildmode=pie" %%endif go build
A go toolchain buildmode default config would be preferable
but none exist at this time.
* Drop mod=vendor, go1.14+ will detect vendor dir and auto-enable
* Remove go build -o output binary location and name. Default
binary has the same name as package of func main() and is
placed in the top level of the build directory.
* Add basic %check to execute binary --help

- Packaging improvements:
* Service go_modules replace dependencies with CVEs
* Replace github.com/cloudflare/circl=github.com/cloudflare/circl@v1.6.1
Fix GO-2025-3754 GHSA-2x5j-vhc8-9cwm
* Replace golang.org/x/net=golang.org/x/net@v0.36.0
Fixes GO-2025-3503 CVE-2025-22870
* Replace golang.org/x/crypto=golang.org/x/crypto@v0.35.0
Fixes GO-2023-2402 CVE-2023-48795 GHSA-45x7-px36-x8w8
Fixes GO-2025-3487 CVE-2025-22869
* Replace github.com/go-git/go-git/v5=github.com/go-git/go-git/v5@v5.13.0
Fixes GO-2025-3367 CVE-2025-21614 GHSA-r9px-m959-cxf4
Fixes GO-2025-3368 CVE-2025-21613 GHSA-v725-9546-7q7m
* Service tar_scm set mode manual from disabled
* Service tar_scm create archive from git so we can exclude
vendor directory upstream committed to git. Committed vendor
directory contents have build issues even after go mod tidy.
* Service tar_scm exclude dir vendor
* Service set_version set mode manual from disabled
* Service set_version remove param basename not needed

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-packagehub-59=1

Package List:

- openSUSE Leap 16.0:

cheat-4.4.2-bp160.2.1

References:

* https://www.suse.com/security/cve/CVE-2023-48795.html
* https://www.suse.com/security/cve/CVE-2025-21613.html
* https://www.suse.com/security/cve/CVE-2025-21614.html
* https://www.suse.com/security/cve/CVE-2025-22869.html
* https://www.suse.com/security/cve/CVE-2025-22870.html
* https://www.suse.com/security/cve/CVE-2025-47913.html
* https://www.suse.com/security/cve/CVE-2025-47914.html
* https://www.suse.com/security/cve/CVE-2025-58181.html



openSUSE-SU-2025:20175-1: important: Security update for mariadb


openSUSE security update: security update for mariadb
-------------------------------------------------------------

Announcement ID: openSUSE-SU-2025:20175-1
Rating: important
References:

* bsc#1243040
* bsc#1252162
* bsc#1254313
* bsc#1254476

Cross-References:

* CVE-2025-13699

CVSS scores:

* CVE-2025-13699 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-13699 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products:

openSUSE Leap 16.0

-------------------------------------------------------------

An update that solves one vulnerability and has 4 bug fixes can now be installed.

Description:

This update for mariadb fixes the following issues:

- Update to 11.8.5:
* CVE-2025-13699: Fixed Directory Traversal Remote Code Execution
Vulnerability (bsc#1254313)

Other fixes:

- Add %license tags to license files (bsc#1252162)
- Add INSTALL_DOCREADMEDIR cmake flag to install readme and license files
- Remove client plugin parsec.so, it is shipped by libmariadb_plugins
(bsc#1243040, bsc#1254476)

Patch instructions:

To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

- openSUSE Leap 16.0

zypper in -t patch openSUSE-Leap-16.0-116=1

Package List:

- openSUSE Leap 16.0:

libmariadbd-devel-11.8.5-160000.1.1
libmariadbd19-11.8.5-160000.1.1
mariadb-11.8.5-160000.1.1
mariadb-bench-11.8.5-160000.1.1
mariadb-client-11.8.5-160000.1.1
mariadb-errormessages-11.8.5-160000.1.1
mariadb-galera-11.8.5-160000.1.1
mariadb-rpm-macros-11.8.5-160000.1.1
mariadb-test-11.8.5-160000.1.1
mariadb-tools-11.8.5-160000.1.1

References:

* https://www.suse.com/security/cve/CVE-2025-13699.html



openSUSE-SU-2025:15840-1: moderate: python315-3.15.0~a3-1.1 on GA media


# python315-3.15.0~a3-1.1 on GA media

Announcement ID: openSUSE-SU-2025:15840-1
Rating: moderate

Cross-References:

* CVE-2025-12084
* CVE-2025-13836
* CVE-2025-13837

CVSS scores:

* CVE-2025-12084 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-12084 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13836 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-13836 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13837 ( SUSE ): 4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-13837 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* openSUSE Tumbleweed

An update that solves 3 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the python315-3.15.0~a3-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python315 3.15.0~a3-1.1
* python315-curses 3.15.0~a3-1.1
* python315-dbm 3.15.0~a3-1.1
* python315-idle 3.15.0~a3-1.1
* python315-profiling 3.15.0~a3-1.1
* python315-tk 3.15.0~a3-1.1
* python315-x86-64-v3 3.15.0~a3-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-12084.html
* https://www.suse.com/security/cve/CVE-2025-13836.html
* https://www.suse.com/security/cve/CVE-2025-13837.html



openSUSE-SU-2025:15839-1: moderate: python310-3.10.19-3.1 on GA media


# python310-3.10.19-3.1 on GA media

Announcement ID: openSUSE-SU-2025:15839-1
Rating: moderate

Cross-References:

* CVE-2025-12084
* CVE-2025-13836
* CVE-2025-13837

CVSS scores:

* CVE-2025-12084 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-12084 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13836 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-13836 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-13837 ( SUSE ): 4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-13837 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Affected Products:

* openSUSE Tumbleweed

An update that solves 3 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the python310-3.10.19-3.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* python310 3.10.19-3.1
* python310-32bit 3.10.19-3.1
* python310-curses 3.10.19-3.1
* python310-dbm 3.10.19-3.1
* python310-idle 3.10.19-3.1
* python310-tk 3.10.19-3.1

## References:

* https://www.suse.com/security/cve/CVE-2025-12084.html
* https://www.suse.com/security/cve/CVE-2025-13836.html
* https://www.suse.com/security/cve/CVE-2025-13837.html



openSUSE-SU-2025:15841-1: moderate: zk-0.15.2-1.1 on GA media


# zk-0.15.2-1.1 on GA media

Announcement ID: openSUSE-SU-2025:15841-1
Rating: moderate

Cross-References:

* CVE-2025-58181

CVSS scores:

* CVE-2025-58181 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58181 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the zk-0.15.2-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* zk 0.15.2-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-58181.html



SUSE-SU-2025:4511-1: moderate: Security update for rsync


# Security update for rsync

Announcement ID: SUSE-SU-2025:4511-1
Release Date: 2025-12-23T12:14:50Z
Rating: moderate
References:

* bsc#1254441

Cross-References:

* CVE-2025-10158

CVSS scores:

* CVE-2025-10158 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-10158 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Affected Products:

* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves one vulnerability can now be installed.

## Description:

This update for rsync fixes the following issues:

* CVE-2025-10158: Fixed out-of-bounds array access via negative index
(bsc#1254441)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-4511=1 openSUSE-SLE-15.6-2025-4511=1

* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4511=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* rsync-3.2.7-150600.3.14.1
* rsync-debugsource-3.2.7-150600.3.14.1
* rsync-debuginfo-3.2.7-150600.3.14.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* rsync-3.2.7-150600.3.14.1
* rsync-debugsource-3.2.7-150600.3.14.1
* rsync-debuginfo-3.2.7-150600.3.14.1

## References:

* https://www.suse.com/security/cve/CVE-2025-10158.html
* https://bugzilla.suse.com/show_bug.cgi?id=1254441



SUSE-SU-2025:4512-1: moderate: Security update for mozjs52


# Security update for mozjs52

Announcement ID: SUSE-SU-2025:4512-1
Release Date: 2025-12-23T12:24:53Z
Rating: moderate
References:

* bsc#1230036
* bsc#1230037
* bsc#1230038
* bsc#1232599

Cross-References:

* CVE-2024-45490
* CVE-2024-45491
* CVE-2024-45492
* CVE-2024-50602

CVSS scores:

* CVE-2024-45490 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-45490 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45490 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45490 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45491 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-45491 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45491 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-45491 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45492 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-45492 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45492 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-45492 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50602 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50602 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50602 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7

An update that solves four vulnerabilities can now be installed.

## Description:

This update for mozjs52 fixes the following issues:

* CVE-2024-45491: Fixed integer overflow in dtdCopy (bsc#1230037)
* CVE-2024-50602: Fixed DoS via XML_ResumeParser (bsc#1232599)
* CVE-2024-45492: Fixed integer overflow in function nextScaffoldPart
(bsc#1230038)
* CVE-2024-45490: Fixed negative len for XML_ParseBuffer (bsc#1230036)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-4512=1

* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4512=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* mozjs52-debuginfo-52.6.0-150000.3.9.1
* libmozjs-52-52.6.0-150000.3.9.1
* mozjs52-52.6.0-150000.3.9.1
* libmozjs-52-debuginfo-52.6.0-150000.3.9.1
* mozjs52-debugsource-52.6.0-150000.3.9.1
* mozjs52-devel-52.6.0-150000.3.9.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64)
* mozjs52-debuginfo-52.6.0-150000.3.9.1
* libmozjs-52-52.6.0-150000.3.9.1
* mozjs52-debugsource-52.6.0-150000.3.9.1
* libmozjs-52-debuginfo-52.6.0-150000.3.9.1

## References:

* https://www.suse.com/security/cve/CVE-2024-45490.html
* https://www.suse.com/security/cve/CVE-2024-45491.html
* https://www.suse.com/security/cve/CVE-2024-45492.html
* https://www.suse.com/security/cve/CVE-2024-50602.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230036
* https://bugzilla.suse.com/show_bug.cgi?id=1230037
* https://bugzilla.suse.com/show_bug.cgi?id=1230038
* https://bugzilla.suse.com/show_bug.cgi?id=1232599



SUSE-SU-2025:4514-1: important: Security update for libsoup


# Security update for libsoup

Announcement ID: SUSE-SU-2025:4514-1
Release Date: 2025-12-23T15:00:01Z
Rating: important
References:

* bsc#1241238
* bsc#1252555

Cross-References:

* CVE-2025-12105
* CVE-2025-32911

CVSS scores:

* CVE-2025-12105 ( SUSE ): 8.8
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-12105 ( SUSE ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-12105 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-32911 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-32911 ( NVD ): 9.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Proxy 4.3 LTS
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Retail Branch Server 4.3 LTS
* SUSE Manager Server 4.3
* SUSE Manager Server 4.3 LTS

An update that solves two vulnerabilities can now be installed.

## Description:

This update for libsoup fixes the following issues:

* CVE-2025-12105: Fixed heap use-after-free in message queue handling during
HTTP/2 read completion (bsc#1252555)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4514=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4514=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4514=1

* SUSE Manager Proxy 4.3 LTS
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4514=1

* SUSE Manager Retail Branch Server 4.3 LTS
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-LTS-2025-4514=1

* SUSE Manager Server 4.3 LTS
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4514=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-4514=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4514=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4514=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4514=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4514=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4514=1

## Package List:

* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libsoup-3_0-0-3.0.4-150400.3.21.1
* libsoup-devel-3.0.4-150400.3.21.1
* libsoup-debugsource-3.0.4-150400.3.21.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.21.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.21.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* libsoup-lang-3.0.4-150400.3.21.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libsoup-3_0-0-3.0.4-150400.3.21.1
* libsoup-devel-3.0.4-150400.3.21.1
* libsoup-debugsource-3.0.4-150400.3.21.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.21.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.21.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* libsoup-lang-3.0.4-150400.3.21.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libsoup-3_0-0-3.0.4-150400.3.21.1
* libsoup-devel-3.0.4-150400.3.21.1
* libsoup-debugsource-3.0.4-150400.3.21.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.21.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.21.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* libsoup-lang-3.0.4-150400.3.21.1
* SUSE Manager Proxy 4.3 LTS (x86_64)
* libsoup-3_0-0-3.0.4-150400.3.21.1
* libsoup-devel-3.0.4-150400.3.21.1
* libsoup-debugsource-3.0.4-150400.3.21.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.21.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.21.1
* SUSE Manager Proxy 4.3 LTS (noarch)
* libsoup-lang-3.0.4-150400.3.21.1
* SUSE Manager Retail Branch Server 4.3 LTS (x86_64)
* libsoup-3_0-0-3.0.4-150400.3.21.1
* libsoup-devel-3.0.4-150400.3.21.1
* libsoup-debugsource-3.0.4-150400.3.21.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.21.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.21.1
* SUSE Manager Retail Branch Server 4.3 LTS (noarch)
* libsoup-lang-3.0.4-150400.3.21.1
* SUSE Manager Server 4.3 LTS (ppc64le s390x x86_64)
* libsoup-3_0-0-3.0.4-150400.3.21.1
* libsoup-devel-3.0.4-150400.3.21.1
* libsoup-debugsource-3.0.4-150400.3.21.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.21.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.21.1
* SUSE Manager Server 4.3 LTS (noarch)
* libsoup-lang-3.0.4-150400.3.21.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libsoup-3_0-0-3.0.4-150400.3.21.1
* libsoup-devel-3.0.4-150400.3.21.1
* libsoup-debugsource-3.0.4-150400.3.21.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.21.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.21.1
* openSUSE Leap 15.4 (x86_64)
* libsoup-3_0-0-32bit-debuginfo-3.0.4-150400.3.21.1
* libsoup-3_0-0-32bit-3.0.4-150400.3.21.1
* libsoup-devel-32bit-3.0.4-150400.3.21.1
* openSUSE Leap 15.4 (noarch)
* libsoup-lang-3.0.4-150400.3.21.1
* openSUSE Leap 15.4 (aarch64_ilp32)
* libsoup-3_0-0-64bit-debuginfo-3.0.4-150400.3.21.1
* libsoup-devel-64bit-3.0.4-150400.3.21.1
* libsoup-3_0-0-64bit-3.0.4-150400.3.21.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libsoup-3_0-0-3.0.4-150400.3.21.1
* libsoup-devel-3.0.4-150400.3.21.1
* libsoup-debugsource-3.0.4-150400.3.21.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.21.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.21.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* libsoup-lang-3.0.4-150400.3.21.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libsoup-3_0-0-3.0.4-150400.3.21.1
* libsoup-devel-3.0.4-150400.3.21.1
* libsoup-debugsource-3.0.4-150400.3.21.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.21.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.21.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* libsoup-lang-3.0.4-150400.3.21.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* libsoup-3_0-0-3.0.4-150400.3.21.1
* libsoup-devel-3.0.4-150400.3.21.1
* libsoup-debugsource-3.0.4-150400.3.21.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.21.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.21.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* libsoup-lang-3.0.4-150400.3.21.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* libsoup-3_0-0-3.0.4-150400.3.21.1
* libsoup-devel-3.0.4-150400.3.21.1
* libsoup-debugsource-3.0.4-150400.3.21.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.21.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.21.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* libsoup-lang-3.0.4-150400.3.21.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libsoup-3_0-0-3.0.4-150400.3.21.1
* libsoup-devel-3.0.4-150400.3.21.1
* libsoup-debugsource-3.0.4-150400.3.21.1
* typelib-1_0-Soup-3_0-3.0.4-150400.3.21.1
* libsoup-3_0-0-debuginfo-3.0.4-150400.3.21.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* libsoup-lang-3.0.4-150400.3.21.1

## References:

* https://www.suse.com/security/cve/CVE-2025-12105.html
* https://www.suse.com/security/cve/CVE-2025-32911.html
* https://bugzilla.suse.com/show_bug.cgi?id=1241238
* https://bugzilla.suse.com/show_bug.cgi?id=1252555