SUSE-SU-2025:02121-1: important: Security update for helm
SUSE-SU-2025:02122-1: important: Security update for MozillaFirefox
SUSE-SU-2025:02124-1: important: Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3)
SUSE-SU-2025:02125-1: important: Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)
SUSE-SU-2025:02127-1: important: Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6)
SUSE-SU-2025:02126-1: important: Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)
SUSE-SU-2025:02128-1: important: Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP6)
SUSE-SU-2025:02139-1: important: Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)
SUSE-SU-2025:02142-1: important: Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4)
SUSE-SU-2025:02140-1: important: Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3)
SUSE-SU-2025:02134-1: important: Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP4)
SUSE-SU-2025:02136-1: important: Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)
SUSE-SU-2025:02138-1: important: Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3)
SUSE-SU-2025:02121-1: important: Security update for helm
# Security update for helm
Announcement ID: SUSE-SU-2025:02121-1
Release Date: 2025-06-26T08:34:33Z
Rating: important
References:
* bsc#1241802
Cross-References:
* CVE-2025-22872
CVSS scores:
* CVE-2025-22872 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
* CVE-2025-22872 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
* CVE-2025-22872 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L
Affected Products:
* Containers Module 15-SP6
* Containers Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP6
* SUSE Package Hub 15 15-SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for helm fixes the following issues:
Update to version 3.18.3:
* build(deps): bump golang.org/x/crypto from 0.38.0 to 0.39.0 6838ebc
(dependabot[bot])
* fix: user username password for login 5b9e2f6 (Terry Howe)
* Update pkg/registry/transport.go 2782412 (Terry Howe)
* Update pkg/registry/transport.go e66cf6a (Terry Howe)
* fix: add debug logging to oci transport 191f05c (Terry Howe)
Update to version 3.18.2:
* fix: legacy docker support broken for login 04cad46 (Terry Howe)
* Handle an empty registry config file. bc9f8a2 (Matt Farina)
Update to version 3.18.1:
* Notes:
* This release fixes regressions around template generation and OCI registry interaction in 3.18.0
* There are at least 2 known regressions unaddressed in this release. They are being worked on.
* Empty registry configuration files. When the file exists but it is empty.
* Login to Docker Hub on some domains fails.
* Changelog
* fix(client): skipnode utilization for PreCopy
* fix(client): layers now returns manifest - remove duplicate from descriptors
* fix(client): return nil on non-allowed media types
* Prevent fetching newReference again as we have in calling method
* Prevent failure when resolving version tags in oras memory store
* Update pkg/plugin/plugin.go
* Update pkg/plugin/plugin.go
* Wait for Helm v4 before raising when platformCommand and Command are set
* Fix 3.18.0 regression: registry login with scheme
* Revert "fix (helm) : toToml` renders int as float [ backport to v3 ]"
Update to version 3.18.0 (bsc#1241802, CVE-2025-22872):
* Notable Changes
* Add support for JSON Schema 2020
* Enabled cpu and memory profiling
* Add hook annotation to output hook logs to client on error
* Changelog
* build(deps): bump the k8s-io group with 7 updates
* fix: govulncheck workflow
* bump version to v3.18.0
* fix:add proxy support when mTLS configured
* docs: Note about http fallback for OCI registries
* Bump net package to avoid CVE on dev-v3
* Bump toml
* backport #30677to dev3
* build(deps): bump github.com/rubenv/sql-migrate from 1.7.2 to 1.8.0
* Add install test for TakeOwnership flag
* Fix --take-ownership
* build(deps): bump github.com/rubenv/sql-migrate from 1.7.1 to 1.7.2
* build(deps): bump golang.org/x/crypto from 0.36.0 to 0.37.0
* build(deps): bump golang.org/x/term from 0.30.0 to 0.31.0
* Testing text bump
* Permit more Go version and not only 1.23.8
* Bumps github.com/distribution/distribution/v3 from 3.0.0-rc.3 to 3.0.0
* Unarchiving fix
* Fix typo
* Report as debug log, the time spent waiting for resources
* build(deps): bump github.com/containerd/containerd from 1.7.26 to 1.7.27
* Update pkg/registry/fallback.go
* automatic fallback to http
* chore(oci): upgrade to ORAS v2
* Updating to 0.37.0 for x/net
* build(deps): bump the k8s-io group with 7 updates
* build(deps): bump golang.org/x/crypto from 0.35.0 to 0.36.0
* build(deps): bump github.com/opencontainers/image-spec
* build(deps): bump github.com/containerd/containerd from 1.7.25 to 1.7.26
* build(deps): bump golang.org/x/crypto from 0.33.0 to 0.35.0
* Fix cherry-pick helm.sh/helm/v4 -> helm.sh/helm/v3
* Add HookOutputFunc and generic yaml unmarshaller
* clarify fix error message
* fix err check
* add short circuit return
* Add hook annotations to output pod logs to client on success and fail
* chore: use []error instead of []string
* Update cmd/helm/profiling.go
* chore: update profiling doc in CONTRIBUTING.md
* Update CONTRIBUTING guide
* Prefer environment variables to CLI flags
* Move pprof paths to HELM_PPROF env variable
* feat: Add flags to enable CPU and memory profiling
* build(deps): bump github.com/distribution/distribution/v3
* build(deps): bump github.com/spf13/cobra from 1.8.1 to 1.9.1
* Moving to SetOut and SetErr for Cobra
* build(deps): bump the k8s-io group with 7 updates
* build(deps): bump golang.org/x/crypto from 0.32.0 to 0.33.0
* build(deps): bump golang.org/x/term from 0.28.0 to 0.29.0
* build(deps): bump golang.org/x/text from 0.21.0 to 0.22.0
* build(deps): bump github.com/spf13/pflag from 1.0.5 to 1.0.6
* build(deps): bump github.com/cyphar/filepath-securejoin
* build(deps): bump github.com/evanphx/json-patch
* build(deps): bump the k8s-io group with 7 updates
* fix: check group for resource info match
* Bump github.com/cyphar/filepath-securejoin from 0.3.6 to 0.4.0
* add test for nullifying nested global value
* Ensuring the file paths are clean prior to passing to securejoin
* Bump github.com/containerd/containerd from 1.7.24 to 1.7.25
* Bump golang.org/x/crypto from 0.31.0 to 0.32.0
* Bump golang.org/x/term from 0.27.0 to 0.28.0
* bump version to v3.17.0
* Bump github.com/moby/term from 0.5.0 to 0.5.2
* Add test case for removing an entire object
* Tests for bugfix: Override subcharts with null values #12879
* feat: Added multi-platform plugin hook support to v3
* This commit fixes the issue where the yaml.Unmarshaller converts all int values into float64, this passes in option to decoder, which enables conversion of int into .
* merge null child chart objects
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-2121=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-2121=1
* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-2121=1
* Containers Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-2121=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-2121=1
* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-2121=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* helm-3.18.3-150000.1.50.1
* helm-debuginfo-3.18.3-150000.1.50.1
* openSUSE Leap 15.6 (noarch)
* helm-fish-completion-3.18.3-150000.1.50.1
* helm-bash-completion-3.18.3-150000.1.50.1
* helm-zsh-completion-3.18.3-150000.1.50.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* helm-3.18.3-150000.1.50.1
* helm-debuginfo-3.18.3-150000.1.50.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* helm-bash-completion-3.18.3-150000.1.50.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* helm-3.18.3-150000.1.50.1
* helm-debuginfo-3.18.3-150000.1.50.1
* Containers Module 15-SP6 (noarch)
* helm-zsh-completion-3.18.3-150000.1.50.1
* helm-bash-completion-3.18.3-150000.1.50.1
* Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* helm-3.18.3-150000.1.50.1
* helm-debuginfo-3.18.3-150000.1.50.1
* Containers Module 15-SP7 (noarch)
* helm-zsh-completion-3.18.3-150000.1.50.1
* helm-bash-completion-3.18.3-150000.1.50.1
* SUSE Package Hub 15 15-SP6 (noarch)
* helm-fish-completion-3.18.3-150000.1.50.1
* SUSE Package Hub 15 15-SP7 (noarch)
* helm-fish-completion-3.18.3-150000.1.50.1
## References:
* https://www.suse.com/security/cve/CVE-2025-22872.html
* https://bugzilla.suse.com/show_bug.cgi?id=1241802
SUSE-SU-2025:02122-1: important: Security update for MozillaFirefox
# Security update for MozillaFirefox
Announcement ID: SUSE-SU-2025:02122-1
Release Date: 2025-06-26T08:46:47Z
Rating: important
References:
* bsc#1244670
Cross-References:
* CVE-2025-6424
* CVE-2025-6425
* CVE-2025-6426
* CVE-2025-6429
* CVE-2025-6430
CVSS scores:
* CVE-2025-6424 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-6424 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-6425 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-6425 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2025-6426 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L
* CVE-2025-6426 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L
* CVE-2025-6429 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-6429 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2025-6430 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-6430 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Affected Products:
* Desktop Applications Module 15-SP6
* Desktop Applications Module 15-SP7
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves five vulnerabilities can now be installed.
## Description:
This update for MozillaFirefox fixes the following issues:
Update to MozillaFirefox 128.12.0 (MFSA 2025-23, bsc#1244670):
* CVE-2025-6424: Use-after-free in FontFaceSet
* CVE-2025-6425: The WebCompat WebExtension shipped with Firefox exposed a
persistent UUID
* CVE-2025-6426: No warning when opening executable terminal files on macOS
* CVE-2025-6429: Incorrect parsing of URLs could have allowed embedding of
youtube.com
* CVE-2025-6430: Content-Disposition header ignored when a file is included in
an embed or object tag
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-2122=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-2122=1
* Desktop Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-2122=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2122=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2122=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2122=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2122=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2122=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2122=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2122=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2122=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2122=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2122=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2122=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2025-2122=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-128.12.0-150200.152.188.1
* MozillaFirefox-branding-upstream-128.12.0-150200.152.188.1
* MozillaFirefox-debuginfo-128.12.0-150200.152.188.1
* MozillaFirefox-debugsource-128.12.0-150200.152.188.1
* MozillaFirefox-translations-other-128.12.0-150200.152.188.1
* MozillaFirefox-translations-common-128.12.0-150200.152.188.1
* openSUSE Leap 15.6 (noarch)
* MozillaFirefox-devel-128.12.0-150200.152.188.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-128.12.0-150200.152.188.1
* MozillaFirefox-debuginfo-128.12.0-150200.152.188.1
* MozillaFirefox-translations-other-128.12.0-150200.152.188.1
* MozillaFirefox-debugsource-128.12.0-150200.152.188.1
* MozillaFirefox-translations-common-128.12.0-150200.152.188.1
* Desktop Applications Module 15-SP6 (noarch)
* MozillaFirefox-devel-128.12.0-150200.152.188.1
* Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-128.12.0-150200.152.188.1
* MozillaFirefox-debuginfo-128.12.0-150200.152.188.1
* MozillaFirefox-translations-other-128.12.0-150200.152.188.1
* MozillaFirefox-debugsource-128.12.0-150200.152.188.1
* MozillaFirefox-translations-common-128.12.0-150200.152.188.1
* Desktop Applications Module 15-SP7 (noarch)
* MozillaFirefox-devel-128.12.0-150200.152.188.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* MozillaFirefox-128.12.0-150200.152.188.1
* MozillaFirefox-debuginfo-128.12.0-150200.152.188.1
* MozillaFirefox-translations-other-128.12.0-150200.152.188.1
* MozillaFirefox-debugsource-128.12.0-150200.152.188.1
* MozillaFirefox-translations-common-128.12.0-150200.152.188.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* MozillaFirefox-devel-128.12.0-150200.152.188.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-128.12.0-150200.152.188.1
* MozillaFirefox-debuginfo-128.12.0-150200.152.188.1
* MozillaFirefox-translations-other-128.12.0-150200.152.188.1
* MozillaFirefox-debugsource-128.12.0-150200.152.188.1
* MozillaFirefox-translations-common-128.12.0-150200.152.188.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* MozillaFirefox-devel-128.12.0-150200.152.188.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-128.12.0-150200.152.188.1
* MozillaFirefox-debuginfo-128.12.0-150200.152.188.1
* MozillaFirefox-translations-other-128.12.0-150200.152.188.1
* MozillaFirefox-debugsource-128.12.0-150200.152.188.1
* MozillaFirefox-translations-common-128.12.0-150200.152.188.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* MozillaFirefox-devel-128.12.0-150200.152.188.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* MozillaFirefox-128.12.0-150200.152.188.1
* MozillaFirefox-debuginfo-128.12.0-150200.152.188.1
* MozillaFirefox-translations-other-128.12.0-150200.152.188.1
* MozillaFirefox-debugsource-128.12.0-150200.152.188.1
* MozillaFirefox-translations-common-128.12.0-150200.152.188.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* MozillaFirefox-devel-128.12.0-150200.152.188.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* MozillaFirefox-128.12.0-150200.152.188.1
* MozillaFirefox-debuginfo-128.12.0-150200.152.188.1
* MozillaFirefox-translations-other-128.12.0-150200.152.188.1
* MozillaFirefox-debugsource-128.12.0-150200.152.188.1
* MozillaFirefox-translations-common-128.12.0-150200.152.188.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* MozillaFirefox-devel-128.12.0-150200.152.188.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-128.12.0-150200.152.188.1
* MozillaFirefox-debuginfo-128.12.0-150200.152.188.1
* MozillaFirefox-translations-other-128.12.0-150200.152.188.1
* MozillaFirefox-debugsource-128.12.0-150200.152.188.1
* MozillaFirefox-translations-common-128.12.0-150200.152.188.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (noarch)
* MozillaFirefox-devel-128.12.0-150200.152.188.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-128.12.0-150200.152.188.1
* MozillaFirefox-debuginfo-128.12.0-150200.152.188.1
* MozillaFirefox-translations-other-128.12.0-150200.152.188.1
* MozillaFirefox-debugsource-128.12.0-150200.152.188.1
* MozillaFirefox-translations-common-128.12.0-150200.152.188.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* MozillaFirefox-devel-128.12.0-150200.152.188.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-128.12.0-150200.152.188.1
* MozillaFirefox-debuginfo-128.12.0-150200.152.188.1
* MozillaFirefox-translations-other-128.12.0-150200.152.188.1
* MozillaFirefox-debugsource-128.12.0-150200.152.188.1
* MozillaFirefox-translations-common-128.12.0-150200.152.188.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* MozillaFirefox-devel-128.12.0-150200.152.188.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* MozillaFirefox-128.12.0-150200.152.188.1
* MozillaFirefox-debuginfo-128.12.0-150200.152.188.1
* MozillaFirefox-translations-other-128.12.0-150200.152.188.1
* MozillaFirefox-debugsource-128.12.0-150200.152.188.1
* MozillaFirefox-translations-common-128.12.0-150200.152.188.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* MozillaFirefox-devel-128.12.0-150200.152.188.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* MozillaFirefox-128.12.0-150200.152.188.1
* MozillaFirefox-debuginfo-128.12.0-150200.152.188.1
* MozillaFirefox-translations-other-128.12.0-150200.152.188.1
* MozillaFirefox-debugsource-128.12.0-150200.152.188.1
* MozillaFirefox-translations-common-128.12.0-150200.152.188.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* MozillaFirefox-devel-128.12.0-150200.152.188.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* MozillaFirefox-128.12.0-150200.152.188.1
* MozillaFirefox-debuginfo-128.12.0-150200.152.188.1
* MozillaFirefox-translations-other-128.12.0-150200.152.188.1
* MozillaFirefox-debugsource-128.12.0-150200.152.188.1
* MozillaFirefox-translations-common-128.12.0-150200.152.188.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* MozillaFirefox-devel-128.12.0-150200.152.188.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* MozillaFirefox-128.12.0-150200.152.188.1
* MozillaFirefox-debuginfo-128.12.0-150200.152.188.1
* MozillaFirefox-translations-other-128.12.0-150200.152.188.1
* MozillaFirefox-debugsource-128.12.0-150200.152.188.1
* MozillaFirefox-translations-common-128.12.0-150200.152.188.1
* SUSE Enterprise Storage 7.1 (noarch)
* MozillaFirefox-devel-128.12.0-150200.152.188.1
## References:
* https://www.suse.com/security/cve/CVE-2025-6424.html
* https://www.suse.com/security/cve/CVE-2025-6425.html
* https://www.suse.com/security/cve/CVE-2025-6426.html
* https://www.suse.com/security/cve/CVE-2025-6429.html
* https://www.suse.com/security/cve/CVE-2025-6430.html
* https://bugzilla.suse.com/show_bug.cgi?id=1244670
SUSE-SU-2025:02124-1: important: Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3)
# Security update for the Linux Kernel (Live Patch 46 for SLE 15 SP3)
Announcement ID: SUSE-SU-2025:02124-1
Release Date: 2025-06-26T10:03:52Z
Rating: important
References:
* bsc#1227903
* bsc#1232908
* bsc#1232929
* bsc#1233680
* bsc#1233708
* bsc#1235062
* bsc#1235231
* bsc#1238730
Cross-References:
* CVE-2022-49545
* CVE-2024-40937
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50279
* CVE-2024-50301
* CVE-2024-56601
* CVE-2024-56605
CVSS scores:
* CVE-2022-49545 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49545 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves eight vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_167 fixes several issues.
The following security issues were fixed:
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235231).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232908).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233708).
* CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission
(bsc#1233680).
* CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error
in l2cap_sock_create() (bsc#1235062).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929).
* CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any()
(bsc#1227903).
* CVE-2022-49545: ALSA: usb-audio: Cancel pending work at closing a MIDI
substream (bsc#1238730).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2025-2124=1 SUSE-2025-2130=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-2124=1 SUSE-SLE-
Module-Live-Patching-15-SP3-2025-2130=1
## Package List:
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP3_Update_46-debugsource-15-150300.2.2
* kernel-livepatch-5_3_18-150300_59_167-default-debuginfo-15-150300.2.2
* kernel-livepatch-5_3_18-150300_59_164-default-16-150300.2.2
* kernel-livepatch-5_3_18-150300_59_164-default-debuginfo-16-150300.2.2
* kernel-livepatch-5_3_18-150300_59_167-default-15-150300.2.2
* kernel-livepatch-SLE15-SP3_Update_45-debugsource-16-150300.2.2
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_164-preempt-debuginfo-16-150300.2.2
* kernel-livepatch-5_3_18-150300_59_164-preempt-16-150300.2.2
* kernel-livepatch-5_3_18-150300_59_167-preempt-debuginfo-15-150300.2.2
* kernel-livepatch-5_3_18-150300_59_167-preempt-15-150300.2.2
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_164-default-16-150300.2.2
* kernel-livepatch-5_3_18-150300_59_167-default-15-150300.2.2
## References:
* https://www.suse.com/security/cve/CVE-2022-49545.html
* https://www.suse.com/security/cve/CVE-2024-40937.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227903
* https://bugzilla.suse.com/show_bug.cgi?id=1232908
* https://bugzilla.suse.com/show_bug.cgi?id=1232929
* https://bugzilla.suse.com/show_bug.cgi?id=1233680
* https://bugzilla.suse.com/show_bug.cgi?id=1233708
* https://bugzilla.suse.com/show_bug.cgi?id=1235062
* https://bugzilla.suse.com/show_bug.cgi?id=1235231
* https://bugzilla.suse.com/show_bug.cgi?id=1238730
SUSE-SU-2025:02125-1: important: Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)
# Security update for the Linux Kernel (Live Patch 28 for SLE 15 SP4)
Announcement ID: SUSE-SU-2025:02125-1
Release Date: 2025-06-26T09:03:58Z
Rating: important
References:
* bsc#1227903
* bsc#1232908
* bsc#1232929
* bsc#1233680
* bsc#1233708
* bsc#1235062
* bsc#1235231
Cross-References:
* CVE-2024-40937
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50279
* CVE-2024-50301
* CVE-2024-56601
* CVE-2024-56605
CVSS scores:
* CVE-2024-40937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves seven vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_125 fixes several issues.
The following security issues were fixed:
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235231).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232908).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233708).
* CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission
(bsc#1233680).
* CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error
in l2cap_sock_create() (bsc#1235062).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929).
* CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any()
(bsc#1227903).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-2125=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-2125=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_28-debugsource-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_125-default-debuginfo-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_125-default-14-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_28-debugsource-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_125-default-debuginfo-14-150400.2.1
* kernel-livepatch-5_14_21-150400_24_125-default-14-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-40937.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227903
* https://bugzilla.suse.com/show_bug.cgi?id=1232908
* https://bugzilla.suse.com/show_bug.cgi?id=1232929
* https://bugzilla.suse.com/show_bug.cgi?id=1233680
* https://bugzilla.suse.com/show_bug.cgi?id=1233708
* https://bugzilla.suse.com/show_bug.cgi?id=1235062
* https://bugzilla.suse.com/show_bug.cgi?id=1235231
SUSE-SU-2025:02127-1: important: Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6)
# Security update for the Linux Kernel (Live Patch 5 for SLE 15 SP6)
Announcement ID: SUSE-SU-2025:02127-1
Release Date: 2025-06-26T09:04:15Z
Rating: important
References:
* bsc#1232908
* bsc#1232927
* bsc#1232929
* bsc#1233245
* bsc#1233680
* bsc#1233708
* bsc#1235062
* bsc#1235086
* bsc#1235129
* bsc#1235231
* bsc#1236244
Cross-References:
* CVE-2024-50124
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50257
* CVE-2024-50279
* CVE-2024-50301
* CVE-2024-53074
* CVE-2024-53208
* CVE-2024-56582
* CVE-2024-56601
* CVE-2024-56605
CVSS scores:
* CVE-2024-50124 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53074 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53074 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53208 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56582 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56582 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves 11 vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 6.4.0-150600_23_25 fixes several issues.
The following security issues were fixed:
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235231).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233708).
* CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission
(bsc#1233680).
* CVE-2024-53074: wifi: iwlwifi: mvm: do not leak a link on AP removal
(bsc#1235086).
* CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio()
(bsc#1235129).
* CVE-2024-53208: Bluetooth: MGMT: Fix slab-use-after-free Read in
set_powered_sync (bsc#1236244).
* CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233245).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232908).
* CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error
in l2cap_sock_create() (bsc#1235062).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929).
* CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232927).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-2127=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-2127=1
## Package List:
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_5-debugsource-11-150600.2.1
* kernel-livepatch-6_4_0-150600_23_25-default-11-150600.2.1
* kernel-livepatch-6_4_0-150600_23_25-default-debuginfo-11-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_5-debugsource-11-150600.2.1
* kernel-livepatch-6_4_0-150600_23_25-default-11-150600.2.1
* kernel-livepatch-6_4_0-150600_23_25-default-debuginfo-11-150600.2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-50124.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50257.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-53074.html
* https://www.suse.com/security/cve/CVE-2024-53208.html
* https://www.suse.com/security/cve/CVE-2024-56582.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://bugzilla.suse.com/show_bug.cgi?id=1232908
* https://bugzilla.suse.com/show_bug.cgi?id=1232927
* https://bugzilla.suse.com/show_bug.cgi?id=1232929
* https://bugzilla.suse.com/show_bug.cgi?id=1233245
* https://bugzilla.suse.com/show_bug.cgi?id=1233680
* https://bugzilla.suse.com/show_bug.cgi?id=1233708
* https://bugzilla.suse.com/show_bug.cgi?id=1235062
* https://bugzilla.suse.com/show_bug.cgi?id=1235086
* https://bugzilla.suse.com/show_bug.cgi?id=1235129
* https://bugzilla.suse.com/show_bug.cgi?id=1235231
* https://bugzilla.suse.com/show_bug.cgi?id=1236244
SUSE-SU-2025:02126-1: important: Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)
# Security update for the Linux Kernel (Live Patch 2 for SLE 15 SP6)
Announcement ID: SUSE-SU-2025:02126-1
Release Date: 2025-06-26T09:04:06Z
Rating: important
References:
* bsc#1227903
* bsc#1232908
* bsc#1232927
* bsc#1232929
* bsc#1233245
* bsc#1233680
* bsc#1233708
* bsc#1235062
* bsc#1235129
* bsc#1235231
* bsc#1236244
Cross-References:
* CVE-2024-40937
* CVE-2024-50124
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50257
* CVE-2024-50279
* CVE-2024-50301
* CVE-2024-53208
* CVE-2024-56582
* CVE-2024-56601
* CVE-2024-56605
CVSS scores:
* CVE-2024-40937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50124 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50124 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50257 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50257 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-53208 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56582 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56582 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56582 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves 11 vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 6.4.0-150600_23_14 fixes several issues.
The following security issues were fixed:
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235231).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232908).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233708).
* CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission
(bsc#1233680).
* CVE-2024-56582: btrfs: fix use-after-free in btrfs_encoded_read_endio()
(bsc#1235129).
* CVE-2024-53208: Bluetooth: MGMT: Fix slab-use-after-free Read in
set_powered_sync (bsc#1236244).
* CVE-2024-50257: netfilter: Fix use-after-free in get_info() (bsc#1233245).
* CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error
in l2cap_sock_create() (bsc#1235062).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929).
* CVE-2024-50124: Bluetooth: ISO: Fix UAF on iso_sock_timeout (bsc#1232927).
* CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any()
(bsc#1227903).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-2126=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-2126=1
## Package List:
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-16-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_2-debugsource-16-150600.2.1
* kernel-livepatch-6_4_0-150600_23_14-default-16-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_14-default-debuginfo-16-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_2-debugsource-16-150600.2.1
* kernel-livepatch-6_4_0-150600_23_14-default-16-150600.2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-40937.html
* https://www.suse.com/security/cve/CVE-2024-50124.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50257.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-53208.html
* https://www.suse.com/security/cve/CVE-2024-56582.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227903
* https://bugzilla.suse.com/show_bug.cgi?id=1232908
* https://bugzilla.suse.com/show_bug.cgi?id=1232927
* https://bugzilla.suse.com/show_bug.cgi?id=1232929
* https://bugzilla.suse.com/show_bug.cgi?id=1233245
* https://bugzilla.suse.com/show_bug.cgi?id=1233680
* https://bugzilla.suse.com/show_bug.cgi?id=1233708
* https://bugzilla.suse.com/show_bug.cgi?id=1235062
* https://bugzilla.suse.com/show_bug.cgi?id=1235129
* https://bugzilla.suse.com/show_bug.cgi?id=1235231
* https://bugzilla.suse.com/show_bug.cgi?id=1236244
SUSE-SU-2025:02128-1: important: Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP6)
# Security update for the Linux Kernel (Live Patch 7 for SLE 15 SP6)
Announcement ID: SUSE-SU-2025:02128-1
Release Date: 2025-06-26T09:04:27Z
Rating: important
References:
* bsc#1235231
Cross-References:
* CVE-2024-56601
CVSS scores:
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
An update that solves one vulnerability can now be installed.
## Description:
This update for the Linux Kernel 6.4.0-150600_23_33 fixes one issue.
The following security issue was fixed:
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235231).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-2128=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-2128=1
## Package List:
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_33-default-7-150600.2.1
* kernel-livepatch-6_4_0-150600_23_33-default-debuginfo-7-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_7-debugsource-7-150600.2.1
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-livepatch-6_4_0-150600_23_33-default-7-150600.2.1
* kernel-livepatch-6_4_0-150600_23_33-default-debuginfo-7-150600.2.1
* kernel-livepatch-SLE15-SP6_Update_7-debugsource-7-150600.2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://bugzilla.suse.com/show_bug.cgi?id=1235231
SUSE-SU-2025:02139-1: important: Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)
# Security update for the Linux Kernel (Live Patch 44 for SLE 15 SP3)
Announcement ID: SUSE-SU-2025:02139-1
Release Date: 2025-06-26T16:03:55Z
Rating: important
References:
* bsc#1227903
* bsc#1232908
* bsc#1232929
* bsc#1233680
* bsc#1233708
* bsc#1235062
* bsc#1235231
* bsc#1238730
Cross-References:
* CVE-2022-49545
* CVE-2024-40937
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50279
* CVE-2024-50301
* CVE-2024-56601
* CVE-2024-56605
CVSS scores:
* CVE-2022-49545 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49545 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-40937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves eight vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_161 fixes several issues.
The following security issues were fixed:
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235231).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232908).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233708).
* CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission
(bsc#1233680).
* CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error
in l2cap_sock_create() (bsc#1235062).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929).
* CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any()
(bsc#1227903).
* CVE-2022-49545: ALSA: usb-audio: Cancel pending work at closing a MIDI
substream (bsc#1238730).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2025-2139=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-2139=1
## Package List:
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_161-default-19-150300.2.2
* kernel-livepatch-SLE15-SP3_Update_44-debugsource-19-150300.2.2
* kernel-livepatch-5_3_18-150300_59_161-default-debuginfo-19-150300.2.2
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_161-preempt-debuginfo-19-150300.2.2
* kernel-livepatch-5_3_18-150300_59_161-preempt-19-150300.2.2
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_161-default-19-150300.2.2
## References:
* https://www.suse.com/security/cve/CVE-2022-49545.html
* https://www.suse.com/security/cve/CVE-2024-40937.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227903
* https://bugzilla.suse.com/show_bug.cgi?id=1232908
* https://bugzilla.suse.com/show_bug.cgi?id=1232929
* https://bugzilla.suse.com/show_bug.cgi?id=1233680
* https://bugzilla.suse.com/show_bug.cgi?id=1233708
* https://bugzilla.suse.com/show_bug.cgi?id=1235062
* https://bugzilla.suse.com/show_bug.cgi?id=1235231
* https://bugzilla.suse.com/show_bug.cgi?id=1238730
SUSE-SU-2025:02142-1: important: Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4)
# Security update for the Linux Kernel (Live Patch 26 for SLE 15 SP4)
Announcement ID: SUSE-SU-2025:02142-1
Release Date: 2025-06-26T18:33:39Z
Rating: important
References:
* bsc#1227903
* bsc#1232908
* bsc#1232929
* bsc#1233680
* bsc#1233708
* bsc#1235062
* bsc#1235231
Cross-References:
* CVE-2024-40937
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50279
* CVE-2024-50301
* CVE-2024-56601
* CVE-2024-56605
CVSS scores:
* CVE-2024-40937 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves seven vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_119 fixes several issues.
The following security issues were fixed:
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235231).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232908).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233708).
* CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission
(bsc#1233680).
* CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error
in l2cap_sock_create() (bsc#1235062).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929).
* CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any()
(bsc#1227903).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-2142=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-2142=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_119-default-19-150400.2.2
* kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-19-150400.2.2
* kernel-livepatch-SLE15-SP4_Update_26-debugsource-19-150400.2.2
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_119-default-19-150400.2.2
* kernel-livepatch-5_14_21-150400_24_119-default-debuginfo-19-150400.2.2
* kernel-livepatch-SLE15-SP4_Update_26-debugsource-19-150400.2.2
## References:
* https://www.suse.com/security/cve/CVE-2024-40937.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227903
* https://bugzilla.suse.com/show_bug.cgi?id=1232908
* https://bugzilla.suse.com/show_bug.cgi?id=1232929
* https://bugzilla.suse.com/show_bug.cgi?id=1233680
* https://bugzilla.suse.com/show_bug.cgi?id=1233708
* https://bugzilla.suse.com/show_bug.cgi?id=1235062
* https://bugzilla.suse.com/show_bug.cgi?id=1235231
SUSE-SU-2025:02140-1: important: Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3)
# Security update for the Linux Kernel (Live Patch 48 for SLE 15 SP3)
Announcement ID: SUSE-SU-2025:02140-1
Release Date: 2025-06-26T19:33:39Z
Rating: important
References:
* bsc#1232908
* bsc#1232929
* bsc#1233680
* bsc#1233708
* bsc#1235062
* bsc#1235231
* bsc#1238730
Cross-References:
* CVE-2022-49545
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50279
* CVE-2024-50301
* CVE-2024-56601
* CVE-2024-56605
CVSS scores:
* CVE-2022-49545 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49545 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves seven vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_174 fixes several issues.
The following security issues were fixed:
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235231).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233708).
* CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission
(bsc#1233680).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232908).
* CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error
in l2cap_sock_create() (bsc#1235062).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929).
* CVE-2022-49545: ALSA: usb-audio: Cancel pending work at closing a MIDI
substream (bsc#1238730).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2025-2140=1 SUSE-2025-2141=1 SUSE-2025-2143=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-2140=1 SUSE-SLE-
Module-Live-Patching-15-SP3-2025-2141=1 SUSE-SLE-Module-Live-
Patching-15-SP3-2025-2143=1
## Package List:
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_170-default-debuginfo-13-150300.2.2
* kernel-livepatch-5_3_18-150300_59_182-default-debuginfo-9-150300.2.2
* kernel-livepatch-5_3_18-150300_59_170-default-13-150300.2.2
* kernel-livepatch-SLE15-SP3_Update_50-debugsource-9-150300.2.2
* kernel-livepatch-5_3_18-150300_59_182-default-9-150300.2.2
* kernel-livepatch-SLE15-SP3_Update_47-debugsource-13-150300.2.2
* kernel-livepatch-SLE15-SP3_Update_48-debugsource-12-150300.2.2
* kernel-livepatch-5_3_18-150300_59_174-default-12-150300.2.2
* kernel-livepatch-5_3_18-150300_59_174-default-debuginfo-12-150300.2.2
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_182-preempt-9-150300.2.2
* kernel-livepatch-5_3_18-150300_59_182-preempt-debuginfo-9-150300.2.2
* kernel-livepatch-5_3_18-150300_59_174-preempt-12-150300.2.2
* kernel-livepatch-5_3_18-150300_59_170-preempt-13-150300.2.2
* kernel-livepatch-5_3_18-150300_59_174-preempt-debuginfo-12-150300.2.2
* kernel-livepatch-5_3_18-150300_59_170-preempt-debuginfo-13-150300.2.2
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_170-default-debuginfo-13-150300.2.2
* kernel-livepatch-5_3_18-150300_59_170-default-13-150300.2.2
* kernel-livepatch-5_3_18-150300_59_182-default-9-150300.2.2
* kernel-livepatch-SLE15-SP3_Update_47-debugsource-13-150300.2.2
* kernel-livepatch-5_3_18-150300_59_174-default-12-150300.2.2
## References:
* https://www.suse.com/security/cve/CVE-2022-49545.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://bugzilla.suse.com/show_bug.cgi?id=1232908
* https://bugzilla.suse.com/show_bug.cgi?id=1232929
* https://bugzilla.suse.com/show_bug.cgi?id=1233680
* https://bugzilla.suse.com/show_bug.cgi?id=1233708
* https://bugzilla.suse.com/show_bug.cgi?id=1235062
* https://bugzilla.suse.com/show_bug.cgi?id=1235231
* https://bugzilla.suse.com/show_bug.cgi?id=1238730
SUSE-SU-2025:02134-1: important: Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP4)
# Security update for the Linux Kernel (Live Patch 31 for SLE 15 SP4)
Announcement ID: SUSE-SU-2025:02134-1
Release Date: 2025-06-26T12:33:34Z
Rating: important
References:
* bsc#1232908
* bsc#1232929
* bsc#1233680
* bsc#1233708
* bsc#1235062
* bsc#1235231
Cross-References:
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50279
* CVE-2024-50301
* CVE-2024-56601
* CVE-2024-56605
CVSS scores:
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves six vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150400_24_133 fixes several issues.
The following security issues were fixed:
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235231).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233708).
* CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission
(bsc#1233680).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232908).
* CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error
in l2cap_sock_create() (bsc#1235062).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-2134=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-2134=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_133-default-10-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_31-debugsource-10-150400.2.1
* kernel-livepatch-5_14_21-150400_24_133-default-debuginfo-10-150400.2.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_133-default-10-150400.2.1
* kernel-livepatch-SLE15-SP4_Update_31-debugsource-10-150400.2.1
* kernel-livepatch-5_14_21-150400_24_133-default-debuginfo-10-150400.2.1
## References:
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://bugzilla.suse.com/show_bug.cgi?id=1232908
* https://bugzilla.suse.com/show_bug.cgi?id=1232929
* https://bugzilla.suse.com/show_bug.cgi?id=1233680
* https://bugzilla.suse.com/show_bug.cgi?id=1233708
* https://bugzilla.suse.com/show_bug.cgi?id=1235062
* https://bugzilla.suse.com/show_bug.cgi?id=1235231
SUSE-SU-2025:02136-1: important: Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)
# Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)
Announcement ID: SUSE-SU-2025:02136-1
Release Date: 2025-06-26T14:03:45Z
Rating: important
References:
* bsc#1232908
* bsc#1232929
* bsc#1233680
* bsc#1233708
* bsc#1235062
* bsc#1235231
* bsc#1238730
Cross-References:
* CVE-2022-49545
* CVE-2024-50125
* CVE-2024-50127
* CVE-2024-50279
* CVE-2024-50301
* CVE-2024-56601
* CVE-2024-56605
CVSS scores:
* CVE-2022-49545 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49545 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50125 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50125 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50127 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50127 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50279 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50279 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-50301 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56605 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56605 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves seven vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_179 fixes several issues.
The following security issues were fixed:
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235231).
* CVE-2024-50279: dm cache: fix out-of-bounds access to the dirty bitset when
resizing (bsc#1233708).
* CVE-2024-50301: security/keys: fix slab-out-of-bounds in key_task_permission
(bsc#1233680).
* CVE-2024-50127: net: sched: fix use-after-free in taprio_change()
(bsc#1232908).
* CVE-2024-56605: Bluetooth: L2CAP: do not leave dangling sk pointer on error
in l2cap_sock_create() (bsc#1235062).
* CVE-2024-50125: Bluetooth: SCO: Fix UAF on sco_sock_timeout (bsc#1232929).
* CVE-2022-49545: ALSA: usb-audio: Cancel pending work at closing a MIDI
substream (bsc#1238730).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2025-2136=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-2136=1
## Package List:
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_179-default-debuginfo-11-150300.2.2
* kernel-livepatch-SLE15-SP3_Update_49-debugsource-11-150300.2.2
* kernel-livepatch-5_3_18-150300_59_179-default-11-150300.2.2
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_179-preempt-11-150300.2.2
* kernel-livepatch-5_3_18-150300_59_179-preempt-debuginfo-11-150300.2.2
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_179-default-debuginfo-11-150300.2.2
* kernel-livepatch-SLE15-SP3_Update_49-debugsource-11-150300.2.2
* kernel-livepatch-5_3_18-150300_59_179-default-11-150300.2.2
## References:
* https://www.suse.com/security/cve/CVE-2022-49545.html
* https://www.suse.com/security/cve/CVE-2024-50125.html
* https://www.suse.com/security/cve/CVE-2024-50127.html
* https://www.suse.com/security/cve/CVE-2024-50279.html
* https://www.suse.com/security/cve/CVE-2024-50301.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56605.html
* https://bugzilla.suse.com/show_bug.cgi?id=1232908
* https://bugzilla.suse.com/show_bug.cgi?id=1232929
* https://bugzilla.suse.com/show_bug.cgi?id=1233680
* https://bugzilla.suse.com/show_bug.cgi?id=1233708
* https://bugzilla.suse.com/show_bug.cgi?id=1235062
* https://bugzilla.suse.com/show_bug.cgi?id=1235231
* https://bugzilla.suse.com/show_bug.cgi?id=1238730
SUSE-SU-2025:02138-1: important: Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3)
# Security update for the Linux Kernel (Live Patch 52 for SLE 15 SP3)
Announcement ID: SUSE-SU-2025:02138-1
Release Date: 2025-06-26T15:34:35Z
Rating: important
References:
* bsc#1235231
* bsc#1238730
Cross-References:
* CVE-2022-49545
* CVE-2024-56601
CVSS scores:
* CVE-2022-49545 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49545 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_188 fixes several issues.
The following security issues were fixed:
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235231).
* CVE-2022-49545: ALSA: usb-audio: Cancel pending work at closing a MIDI
substream (bsc#1238730).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2025-2138=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-2138=1
## Package List:
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_188-default-6-150300.2.2
* kernel-livepatch-SLE15-SP3_Update_52-debugsource-6-150300.2.2
* kernel-livepatch-5_3_18-150300_59_188-default-debuginfo-6-150300.2.2
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_188-preempt-6-150300.2.2
* kernel-livepatch-5_3_18-150300_59_188-preempt-debuginfo-6-150300.2.2
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_188-default-6-150300.2.2
## References:
* https://www.suse.com/security/cve/CVE-2022-49545.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://bugzilla.suse.com/show_bug.cgi?id=1235231
* https://bugzilla.suse.com/show_bug.cgi?id=1238730