openSUSE-SU-2025:0473-1: moderate: Security update for icinga-php-library, icingaweb2
SUSE-SU-2025:4433-1: moderate: Security update for python39
SUSE-SU-2025:4434-1: low: Security update for poppler
SUSE-SU-2025:4437-1: important: Security update for helm
SUSE-SU-2025:4440-1: moderate: Security update for wireshark
SUSE-SU-2025:4432-1: moderate: Security update for libpng12
openSUSE-SU-2025:20164-1: important: Security update for openssl-3
openSUSE-SU-2025:20163-1: important: Security update for grub2
openSUSE-SU-2025:20162-1: important: Security update for ImageMagick
SUSE-SU-2025:4422-1: important: Security update for the Linux Kernel
SUSE-SU-2025:4421-1: moderate: Security update for buildah
SUSE-SU-2025:4424-1: important: Security update for MozillaFirefox
SUSE-SU-2025:4425-1: moderate: Security update for cups
SUSE-SU-2025:4426-1: moderate: Security update for xkbcomp
openSUSE-SU-2025:0473-1: moderate: Security update for icinga-php-library, icingaweb2
openSUSE Security Update: Security update for icinga-php-library, icingaweb2
_______________________________
Announcement ID: openSUSE-SU-2025:0473-1
Rating: moderate
References:
Cross-References: CVE-2025-27404 CVE-2025-27405 CVE-2025-27609
CVE-2025-30164
CVSS scores:
CVE-2025-27404 (SUSE): 7.6 CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
Affected Products:
openSUSE Backports SLE-15-SP7
_______________________________
An update that fixes four vulnerabilities is now available.
Description:
This update for icinga-php-library, icingaweb2 fixes the following issues:
Changes in icingaweb2:
- Update to 2.12.6
- Search box shows many magnifying glasses for some community themes
#5395
- Authentication hooks are not called with external backends #5415
- Improve Minimal layout #5386
- Update to 2.12.5
* PHP 8.4 Support We're again a little behind schedule, but now we
support PHP 8.4! This means that installations on Ubuntu 25.04 and
Fedora 42+ can now install Icinga Web without worrying about PHP
related incompatibilities. Icinga packages will be available in the
next few days.
* Good Things Take Time There's only a single (notable) recent issue
that is fixed with this release. All the others are a bit older.
- External URLs set up as dashlets are not embedded the same as
navigation items #5346
* But the team sat together a few weeks ago and fixed a bug here and
there. And of course, also in Icinga Web!
- Users who are not allowed to change the theme, cannot change the
theme mode either #5385
- Improved compatibility with several SSO authentication providers
#5000, #5227
- Filtering for older-than events with relative time does not work
#5263
- Empty values are NULL in CSV exports #5350
* Breaking, Somewhat This is mainly for developers. With the support of
PHP 8.4, we introduced a new environment variable,
ICINGAWEB_ENVIRONMENT. Unless set to dev, Icinga Web will not show nor
log deprecation notices anymore.
- Update to 2.12.4
- Database login broken after upgrade #5343
- Update to 2.12.3
- XSS in embedded content CVE-2025-27405
- DOM-based XSS CVE-2025-27404
- Open redirect on login page CVE-2025-30164
- Reflected XSS CVE-2025-27609
- Login against Postgres DB is case-sensitive #5223
- Role list has no functioning quick search #5300
- After clicking on Check now, the page does not refresh itself #5293
- Service States display wrong since update to 2.12.2 #5290
- Set right version for icinga-php-library.
- Fix usage of %requires_eq: invalid syntax previosly resulted in ignored
lines and now properly returns an error.
- Update to 2.12.2
- Sort by name of roles does not work properly #4789
- Settings menu flyout closes too fast / easy #5196
- CSP header is missing the script-src policy #5180
- Broken event overview due to IntlDateFormatter #5172
- Downtimes, which were started and canceled, are missing in the history
#5176
- Usage of IcingaWeb2 api command returns 404, but is successful #5183
- Allow fontawesome icons as menu items #5205
- Error while opening a navigation root item #5177
- Dashlets twice in dashboard & not deletable #5203
- PluginOutputRenderer gets called twice #5271
- Graphs disappear after form controls are used #4996
- Make subgroups of custom variables fully collapsible #5256
- Provide group as required by RPM 4.19
- Update to 2.12.1
- Add PHP 8.3 support
- Login Redirect Loop #5133
- UI database migration not fully compatible with PostgreSQL #5129
- Missing styles when logging out and in while CSP is enabled #5126
- Update to 2.12.0
- Support for PHP 8.2 #4918
- Support for Content-Security-Policy #4528
- Allow to initiate a refresh with __REFRESH__ #5108
- Don't refresh twice upon __CLOSE__ #5106
- Add event column-moved #5049
- Add copy-to-clipboard behavior #5041
- Access Oracle Database via tnsnames.ora / LDAP Naming Services #5062
- Reduce risk of crashing the x509 collector daemon #5115
- CSV export does not escape double quotes #4910
* Full changelog see:
https://github.com/Icinga/icingaweb2/milestone/79?closed=1
- Massive changes in spec needed.
- DB schema files are in schema not etc/schema in packaged tarball
- Add subpackge php-fpm with php-fpm configuration.
- Remove max php version restrictions for suse.
- Fix rights for /etc/icingaweb2/enabledModules directory as upstream use.
Changes in icinga-php-library:
- Update to 1.17.0
- No changelog from upstream.
- Update ot 0.14.1
- No changelog from upstream.
- Remove unneded requires and buildrequires icinga-php-common.
- Add missing requires.
- Update to 0.13.0
- No changelog from upstream.
- Update to 0.12.0
- No changelog from upstream.
- Update to 0.11.0
- No changelog from upstream.
Patch Instructions:
To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Backports SLE-15-SP7:
zypper in -t patch openSUSE-2025-473=1
Package List:
- openSUSE Backports SLE-15-SP7 (noarch):
icinga-php-library-0.17.0-bp157.2.3.1
icingacli-2.12.6-bp157.2.3.1
icingaweb2-2.12.6-bp157.2.3.1
icingaweb2-common-2.12.6-bp157.2.3.1
icingaweb2-php-fpm-2.12.6-bp157.2.3.1
php-icinga-2.12.6-bp157.2.3.1
References:
https://www.suse.com/security/cve/CVE-2025-27404.html
https://www.suse.com/security/cve/CVE-2025-27405.html
https://www.suse.com/security/cve/CVE-2025-27609.html
https://www.suse.com/security/cve/CVE-2025-30164.html
SUSE-SU-2025:4433-1: moderate: Security update for python39
# Security update for python39
Announcement ID: SUSE-SU-2025:4433-1
Release Date: 2025-12-17T13:20:28Z
Rating: moderate
References:
Affected Products:
* openSUSE Leap 15.3
* openSUSE Leap 15.6
An update that can now be installed.
## Description:
This update for python39 fixes the following issues:
* Update to 3.9.25:
* Security
* gh-137836: Add support of the “plaintext” element, RAWTEXT elements “xmp”, “iframe”, “noembed” and “noframes”, and optionally RAWTEXT element “noscript” in html.parser.HTMLParser.
* gh-136063: email.message: ensure linear complexity for legacy HTTP parameters parsing. Patch by Bénédikt Tran.
* Library
* gh-98793: Fix argument typechecks in _overlapped.WSAConnect() and _overlapped.Overlapped.WSASendTo() functions. bpo-44817: Ignore WinError 53 (ERROR_BAD_NETPATH), 65 (ERROR_NETWORK_ACCESS_DENIED) and 161 (ERROR_BAD_PATHNAME) when using ntpath.realpath().
* Core and Builtins
* gh-120384: Fix an array out of bounds crash in list_ass_subscript, which could be invoked via some specificly tailored input: including concurrent modification of a list object, where one thread assigns a slice and another clears it.
* gh-120298: Fix use-after free in list_richcompare_impl which can be invoked via some specificly tailored evil input.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2025-4433=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-4433=1
## Package List:
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* python39-curses-3.9.25-150300.4.87.1
* python39-tools-3.9.25-150300.4.87.1
* python39-debuginfo-3.9.25-150300.4.87.1
* python39-testsuite-debuginfo-3.9.25-150300.4.87.1
* python39-3.9.25-150300.4.87.1
* python39-curses-debuginfo-3.9.25-150300.4.87.1
* python39-dbm-3.9.25-150300.4.87.1
* python39-doc-devhelp-3.9.25-150300.4.87.1
* python39-base-3.9.25-150300.4.87.1
* python39-idle-3.9.25-150300.4.87.1
* python39-tk-3.9.25-150300.4.87.1
* python39-debugsource-3.9.25-150300.4.87.1
* libpython3_9-1_0-3.9.25-150300.4.87.1
* python39-testsuite-3.9.25-150300.4.87.1
* python39-devel-3.9.25-150300.4.87.1
* python39-base-debuginfo-3.9.25-150300.4.87.1
* python39-core-debugsource-3.9.25-150300.4.87.1
* libpython3_9-1_0-debuginfo-3.9.25-150300.4.87.1
* python39-doc-3.9.25-150300.4.87.1
* python39-tk-debuginfo-3.9.25-150300.4.87.1
* python39-dbm-debuginfo-3.9.25-150300.4.87.1
* openSUSE Leap 15.3 (x86_64)
* libpython3_9-1_0-32bit-debuginfo-3.9.25-150300.4.87.1
* libpython3_9-1_0-32bit-3.9.25-150300.4.87.1
* python39-32bit-debuginfo-3.9.25-150300.4.87.1
* python39-base-32bit-3.9.25-150300.4.87.1
* python39-base-32bit-debuginfo-3.9.25-150300.4.87.1
* python39-32bit-3.9.25-150300.4.87.1
* openSUSE Leap 15.3 (aarch64_ilp32)
* python39-64bit-debuginfo-3.9.25-150300.4.87.1
* python39-64bit-3.9.25-150300.4.87.1
* python39-base-64bit-debuginfo-3.9.25-150300.4.87.1
* python39-base-64bit-3.9.25-150300.4.87.1
* libpython3_9-1_0-64bit-3.9.25-150300.4.87.1
* libpython3_9-1_0-64bit-debuginfo-3.9.25-150300.4.87.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* python39-curses-3.9.25-150300.4.87.1
* python39-core-debugsource-3.9.25-150300.4.87.1
* python39-tools-3.9.25-150300.4.87.1
* python39-debuginfo-3.9.25-150300.4.87.1
* python39-testsuite-debuginfo-3.9.25-150300.4.87.1
* python39-3.9.25-150300.4.87.1
* python39-curses-debuginfo-3.9.25-150300.4.87.1
* python39-dbm-3.9.25-150300.4.87.1
* python39-doc-devhelp-3.9.25-150300.4.87.1
* python39-base-3.9.25-150300.4.87.1
* python39-idle-3.9.25-150300.4.87.1
* python39-debugsource-3.9.25-150300.4.87.1
* libpython3_9-1_0-3.9.25-150300.4.87.1
* python39-testsuite-3.9.25-150300.4.87.1
* python39-devel-3.9.25-150300.4.87.1
* python39-base-debuginfo-3.9.25-150300.4.87.1
* python39-tk-3.9.25-150300.4.87.1
* libpython3_9-1_0-debuginfo-3.9.25-150300.4.87.1
* python39-doc-3.9.25-150300.4.87.1
* python39-tk-debuginfo-3.9.25-150300.4.87.1
* python39-dbm-debuginfo-3.9.25-150300.4.87.1
* openSUSE Leap 15.6 (x86_64)
* libpython3_9-1_0-32bit-debuginfo-3.9.25-150300.4.87.1
* libpython3_9-1_0-32bit-3.9.25-150300.4.87.1
* python39-32bit-debuginfo-3.9.25-150300.4.87.1
* python39-base-32bit-3.9.25-150300.4.87.1
* python39-base-32bit-debuginfo-3.9.25-150300.4.87.1
* python39-32bit-3.9.25-150300.4.87.1
SUSE-SU-2025:4434-1: low: Security update for poppler
# Security update for poppler
Announcement ID: SUSE-SU-2025:4434-1
Release Date: 2025-12-17T13:31:23Z
Rating: low
References:
* bsc#1252337
Cross-References:
* CVE-2025-11896
CVSS scores:
* CVE-2025-11896 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-11896 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2025-11896 ( NVD ): 2.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Affected Products:
* Basesystem Module 15-SP6
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP6
* SUSE Package Hub 15 15-SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for poppler fixes the following issues:
* CVE-2025-11896: Fixed infinite recursion leading to stack overflow due to
object loop in PDF CMap (bsc#1252337)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4434=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-4434=1 openSUSE-SLE-15.6-2025-4434=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4434=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4434=1
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4434=1
## Package List:
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64)
* libpoppler-qt6-devel-24.03.0-150600.3.27.1
* poppler-qt6-debugsource-24.03.0-150600.3.27.1
* libpoppler-cpp0-debuginfo-24.03.0-150600.3.27.1
* libpoppler-qt5-devel-24.03.0-150600.3.27.1
* libpoppler-devel-24.03.0-150600.3.27.1
* libpoppler-cpp0-24.03.0-150600.3.27.1
* libpoppler-qt6-3-24.03.0-150600.3.27.1
* libpoppler-qt6-3-debuginfo-24.03.0-150600.3.27.1
* poppler-qt5-debugsource-24.03.0-150600.3.27.1
* libpoppler-qt5-1-24.03.0-150600.3.27.1
* poppler-debugsource-24.03.0-150600.3.27.1
* libpoppler-qt5-1-debuginfo-24.03.0-150600.3.27.1
* SUSE Package Hub 15 15-SP7 (x86_64)
* libpoppler135-32bit-24.03.0-150600.3.27.1
* libpoppler135-32bit-debuginfo-24.03.0-150600.3.27.1
* libpoppler-glib8-32bit-debuginfo-24.03.0-150600.3.27.1
* libpoppler-glib8-32bit-24.03.0-150600.3.27.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libpoppler-glib8-24.03.0-150600.3.27.1
* poppler-tools-debuginfo-24.03.0-150600.3.27.1
* poppler-tools-24.03.0-150600.3.27.1
* libpoppler-qt6-devel-24.03.0-150600.3.27.1
* libpoppler135-24.03.0-150600.3.27.1
* libpoppler135-debuginfo-24.03.0-150600.3.27.1
* libpoppler-cpp0-debuginfo-24.03.0-150600.3.27.1
* poppler-qt6-debugsource-24.03.0-150600.3.27.1
* libpoppler-qt5-devel-24.03.0-150600.3.27.1
* libpoppler-devel-24.03.0-150600.3.27.1
* libpoppler-cpp0-24.03.0-150600.3.27.1
* typelib-1_0-Poppler-0_18-24.03.0-150600.3.27.1
* libpoppler-qt6-3-24.03.0-150600.3.27.1
* libpoppler-qt6-3-debuginfo-24.03.0-150600.3.27.1
* poppler-qt5-debugsource-24.03.0-150600.3.27.1
* libpoppler-qt5-1-24.03.0-150600.3.27.1
* libpoppler-glib-devel-24.03.0-150600.3.27.1
* poppler-debugsource-24.03.0-150600.3.27.1
* libpoppler-qt5-1-debuginfo-24.03.0-150600.3.27.1
* libpoppler-glib8-debuginfo-24.03.0-150600.3.27.1
* openSUSE Leap 15.6 (x86_64)
* libpoppler135-32bit-debuginfo-24.03.0-150600.3.27.1
* libpoppler-glib8-32bit-debuginfo-24.03.0-150600.3.27.1
* libpoppler-cpp0-32bit-debuginfo-24.03.0-150600.3.27.1
* libpoppler-qt5-1-32bit-debuginfo-24.03.0-150600.3.27.1
* libpoppler135-32bit-24.03.0-150600.3.27.1
* libpoppler-cpp0-32bit-24.03.0-150600.3.27.1
* libpoppler-qt5-1-32bit-24.03.0-150600.3.27.1
* libpoppler-glib8-32bit-24.03.0-150600.3.27.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* libpoppler-qt5-1-64bit-debuginfo-24.03.0-150600.3.27.1
* libpoppler-glib8-64bit-debuginfo-24.03.0-150600.3.27.1
* libpoppler135-64bit-debuginfo-24.03.0-150600.3.27.1
* libpoppler-cpp0-64bit-24.03.0-150600.3.27.1
* libpoppler-cpp0-64bit-debuginfo-24.03.0-150600.3.27.1
* libpoppler135-64bit-24.03.0-150600.3.27.1
* libpoppler-glib8-64bit-24.03.0-150600.3.27.1
* libpoppler-qt5-1-64bit-24.03.0-150600.3.27.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libpoppler-glib8-24.03.0-150600.3.27.1
* poppler-tools-debuginfo-24.03.0-150600.3.27.1
* poppler-tools-24.03.0-150600.3.27.1
* libpoppler135-24.03.0-150600.3.27.1
* libpoppler135-debuginfo-24.03.0-150600.3.27.1
* libpoppler-cpp0-debuginfo-24.03.0-150600.3.27.1
* libpoppler-devel-24.03.0-150600.3.27.1
* libpoppler-cpp0-24.03.0-150600.3.27.1
* typelib-1_0-Poppler-0_18-24.03.0-150600.3.27.1
* libpoppler-glib-devel-24.03.0-150600.3.27.1
* poppler-debugsource-24.03.0-150600.3.27.1
* libpoppler-glib8-debuginfo-24.03.0-150600.3.27.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libpoppler-glib8-24.03.0-150600.3.27.1
* poppler-tools-debuginfo-24.03.0-150600.3.27.1
* poppler-tools-24.03.0-150600.3.27.1
* libpoppler135-24.03.0-150600.3.27.1
* libpoppler135-debuginfo-24.03.0-150600.3.27.1
* libpoppler-cpp0-debuginfo-24.03.0-150600.3.27.1
* libpoppler-devel-24.03.0-150600.3.27.1
* libpoppler-cpp0-24.03.0-150600.3.27.1
* typelib-1_0-Poppler-0_18-24.03.0-150600.3.27.1
* libpoppler-glib-devel-24.03.0-150600.3.27.1
* poppler-debugsource-24.03.0-150600.3.27.1
* libpoppler-glib8-debuginfo-24.03.0-150600.3.27.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* libpoppler-qt6-devel-24.03.0-150600.3.27.1
* poppler-qt6-debugsource-24.03.0-150600.3.27.1
* libpoppler-cpp0-debuginfo-24.03.0-150600.3.27.1
* libpoppler-qt5-devel-24.03.0-150600.3.27.1
* libpoppler-devel-24.03.0-150600.3.27.1
* libpoppler-cpp0-24.03.0-150600.3.27.1
* libpoppler-qt6-3-24.03.0-150600.3.27.1
* libpoppler-qt6-3-debuginfo-24.03.0-150600.3.27.1
* poppler-qt5-debugsource-24.03.0-150600.3.27.1
* libpoppler-qt5-1-24.03.0-150600.3.27.1
* poppler-debugsource-24.03.0-150600.3.27.1
* libpoppler-qt5-1-debuginfo-24.03.0-150600.3.27.1
* SUSE Package Hub 15 15-SP6 (x86_64)
* libpoppler135-32bit-24.03.0-150600.3.27.1
* libpoppler135-32bit-debuginfo-24.03.0-150600.3.27.1
* libpoppler-glib8-32bit-debuginfo-24.03.0-150600.3.27.1
* libpoppler-glib8-32bit-24.03.0-150600.3.27.1
## References:
* https://www.suse.com/security/cve/CVE-2025-11896.html
* https://bugzilla.suse.com/show_bug.cgi?id=1252337
SUSE-SU-2025:4437-1: important: Security update for helm
# Security update for helm
Announcement ID: SUSE-SU-2025:4437-1
Release Date: 2025-12-17T14:45:04Z
Rating: important
References:
Affected Products:
* Containers Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP7
An update that can now be installed.
## Description:
This update for helm rebuilds it against current GO to fix security issues in
go-stdlib.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4437=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-4437=1
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-4437=1
* Containers Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-4437=1
## Package List:
* SUSE Package Hub 15 15-SP7 (noarch)
* helm-fish-completion-3.19.1-150000.1.59.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* helm-debuginfo-3.19.1-150000.1.59.1
* helm-3.19.1-150000.1.59.1
* openSUSE Leap 15.6 (noarch)
* helm-zsh-completion-3.19.1-150000.1.59.1
* helm-bash-completion-3.19.1-150000.1.59.1
* helm-fish-completion-3.19.1-150000.1.59.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* helm-debuginfo-3.19.1-150000.1.59.1
* helm-3.19.1-150000.1.59.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* helm-bash-completion-3.19.1-150000.1.59.1
* Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* helm-debuginfo-3.19.1-150000.1.59.1
* helm-3.19.1-150000.1.59.1
* Containers Module 15-SP7 (noarch)
* helm-zsh-completion-3.19.1-150000.1.59.1
* helm-bash-completion-3.19.1-150000.1.59.1
SUSE-SU-2025:4440-1: moderate: Security update for wireshark
# Security update for wireshark
Announcement ID: SUSE-SU-2025:4440-1
Release Date: 2025-12-17T15:44:46Z
Rating: moderate
References:
* bsc#1254108
* bsc#1254472
Cross-References:
* CVE-2025-13499
* CVE-2025-13946
CVSS scores:
* CVE-2025-13499 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-13499 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
* CVE-2025-13499 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-13499 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-13946 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-13946 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP7
* Desktop Applications Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves two vulnerabilities can now be installed.
## Description:
This update for wireshark fixes the following issues:
* CVE-2025-13499: Fixed Kafka dissector crash due to malformed packet
(bsc#1254108).
* CVE-2025-13946: Fixed MEGACO dissector infinite loop that allows denial of
service (bsc#1254472).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Desktop Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-4440=1
* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-4440=1 openSUSE-SLE-15.6-2025-4440=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4440=1
## Package List:
* Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* wireshark-ui-qt-debuginfo-4.2.14-150600.18.32.1
* wireshark-debugsource-4.2.14-150600.18.32.1
* wireshark-debuginfo-4.2.14-150600.18.32.1
* wireshark-ui-qt-4.2.14-150600.18.32.1
* wireshark-devel-4.2.14-150600.18.32.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* libwiretap14-4.2.14-150600.18.32.1
* libwsutil15-debuginfo-4.2.14-150600.18.32.1
* wireshark-ui-qt-debuginfo-4.2.14-150600.18.32.1
* libwsutil15-4.2.14-150600.18.32.1
* wireshark-debugsource-4.2.14-150600.18.32.1
* libwiretap14-debuginfo-4.2.14-150600.18.32.1
* wireshark-4.2.14-150600.18.32.1
* libwireshark17-4.2.14-150600.18.32.1
* wireshark-debuginfo-4.2.14-150600.18.32.1
* wireshark-ui-qt-4.2.14-150600.18.32.1
* libwireshark17-debuginfo-4.2.14-150600.18.32.1
* wireshark-devel-4.2.14-150600.18.32.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libwiretap14-4.2.14-150600.18.32.1
* libwsutil15-debuginfo-4.2.14-150600.18.32.1
* libwsutil15-4.2.14-150600.18.32.1
* wireshark-debugsource-4.2.14-150600.18.32.1
* libwiretap14-debuginfo-4.2.14-150600.18.32.1
* wireshark-4.2.14-150600.18.32.1
* libwireshark17-4.2.14-150600.18.32.1
* wireshark-debuginfo-4.2.14-150600.18.32.1
* libwireshark17-debuginfo-4.2.14-150600.18.32.1
## References:
* https://www.suse.com/security/cve/CVE-2025-13499.html
* https://www.suse.com/security/cve/CVE-2025-13946.html
* https://bugzilla.suse.com/show_bug.cgi?id=1254108
* https://bugzilla.suse.com/show_bug.cgi?id=1254472
SUSE-SU-2025:4432-1: moderate: Security update for libpng12
# Security update for libpng12
Announcement ID: SUSE-SU-2025:4432-1
Release Date: 2025-12-17T13:07:34Z
Rating: moderate
References:
* bsc#1254157
Cross-References:
* CVE-2025-64505
CVSS scores:
* CVE-2025-64505 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-64505 ( SUSE ): 6.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
* CVE-2025-64505 ( NVD ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
Affected Products:
* Basesystem Module 15-SP6
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for libpng12 fixes the following issues:
* CVE-2025-64505: Fixed heap buffer over-read in `png_do_quantize` via
malformed palette index (bsc#1254157)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4432=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-4432=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4432=1
## Package List:
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libpng12-0-debuginfo-1.2.57-150000.4.3.1
* libpng12-0-1.2.57-150000.4.3.1
* libpng12-devel-1.2.57-150000.4.3.1
* libpng12-debugsource-1.2.57-150000.4.3.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libpng12-devel-1.2.57-150000.4.3.1
* libpng12-debugsource-1.2.57-150000.4.3.1
* libpng12-compat-devel-1.2.57-150000.4.3.1
* libpng12-0-debuginfo-1.2.57-150000.4.3.1
* libpng12-0-1.2.57-150000.4.3.1
* openSUSE Leap 15.6 (x86_64)
* libpng12-compat-devel-32bit-1.2.57-150000.4.3.1
* libpng12-devel-32bit-1.2.57-150000.4.3.1
* libpng12-0-32bit-debuginfo-1.2.57-150000.4.3.1
* libpng12-0-32bit-1.2.57-150000.4.3.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libpng12-0-debuginfo-1.2.57-150000.4.3.1
* libpng12-0-1.2.57-150000.4.3.1
* libpng12-devel-1.2.57-150000.4.3.1
* libpng12-debugsource-1.2.57-150000.4.3.1
## References:
* https://www.suse.com/security/cve/CVE-2025-64505.html
* https://bugzilla.suse.com/show_bug.cgi?id=1254157
openSUSE-SU-2025:20164-1: important: Security update for openssl-3
openSUSE security update: security update for openssl-3
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2025:20164-1
Rating: important
References:
* bsc#1250232
* bsc#1250233
* bsc#1250234
Cross-References:
* CVE-2025-9230
* CVE-2025-9231
* CVE-2025-9232
CVSS scores:
* CVE-2025-9230 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-9230 ( SUSE ): 7.7 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-9231 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-9231 ( SUSE ): 6 CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-9232 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-9232 ( SUSE ): 6 CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 3 vulnerabilities and has 3 bug fixes can now be installed.
Description:
This update for openssl-3 fixes the following issues:
- CVE-2025-9230: Fixed out-of-bounds read & write in RFC 3211 KEK unwrap (bsc#1250232)
- CVE-2025-9231: Fixedk timing side-channel in SM2 algorithm on 64 bit ARM (bsc#1250233)
- CVE-2025-9232: Fixed out-of-bounds read in HTTP client no_proxy handling (bsc#1250234)
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-107=1
Package List:
- openSUSE Leap 16.0:
libopenssl-3-devel-3.5.0-160000.4.1
libopenssl-3-fips-provider-3.5.0-160000.4.1
libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.4.1
libopenssl3-3.5.0-160000.4.1
libopenssl3-x86-64-v3-3.5.0-160000.4.1
openssl-3-3.5.0-160000.4.1
openssl-3-doc-3.5.0-160000.4.1
References:
* https://www.suse.com/security/cve/CVE-2025-9230.html
* https://www.suse.com/security/cve/CVE-2025-9231.html
* https://www.suse.com/security/cve/CVE-2025-9232.html
openSUSE-SU-2025:20163-1: important: Security update for grub2
openSUSE security update: security update for grub2
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2025:20163-1
Rating: important
References:
* bsc#1234959
* bsc#1245636
* bsc#1245738
* bsc#1245953
* bsc#1246231
* bsc#1247242
* bsc#1249088
* bsc#1249385
* bsc#1252930
* bsc#1252931
* bsc#1252932
* bsc#1252933
* bsc#1252934
* bsc#1252935
Cross-References:
* CVE-2024-56738
* CVE-2025-54770
* CVE-2025-54771
* CVE-2025-61661
* CVE-2025-61662
* CVE-2025-61663
* CVE-2025-61664
CVSS scores:
* CVE-2024-56738 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-56738 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-54770 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-54770 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-54771 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-54771 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-61661 ( SUSE ): 4.8 CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-61661 ( SUSE ): 4.3 CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-61662 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-61662 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-61663 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-61663 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-61664 ( SUSE ): 4.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-61664 ( SUSE ): 2.1 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 7 vulnerabilities and has 14 bug fixes can now be installed.
Description:
This update for grub2 fixes the following issues:
Changes in grub2:
- CVE-2025-54771: Fixed grub_file_close() does not properly controls the fs refcount (bsc#1252931)
- CVE-2025-54770: Fixed missing unregister call for net_set_vlan command may lead to use-after-free (bsc#1252930)
- CVE-2025-61662: Fixed missing unregister call for gettext command may lead to use-after-free (bsc#1252933)
- CVE-2025-61663: Fixed missing unregister call for normal commands may lead to use-after-free (bsc#1252934)
- CVE-2025-61664: Fixed missing unregister call for normal_exit command may lead to use-after-free (bsc#1252935)
- CVE-2025-61661: Fixed out-of-bounds write in grub_usb_get_string() function (bsc#1252932)
- Bump upstream SBAT generation to 6
- Fix "sparse file not allowed" error after grub2-reboot (bsc#1245738)
- Fix PowerPC network boot prefix to correctly locate grub.cfg (bsc#1249385)
- turn off page flipping for i386-pc using VBE video backend (bsc#1245636)
- Fix boot hangs in setting up serial console when ACPI SPCR table is present
and redirection is disabled (bsc#1249088)
- Fix timeout when loading initrd via http after PPC CAS reboot (bsc#1245953)
- Skip mount point in grub_find_device function (bsc#1246231)
- CVE-2024-56738: Fixed side-channel attack due to not constant-time algorithm in grub_crypto_memcmp (bsc#1234959)
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-106=1
Package List:
- openSUSE Leap 16.0:
grub2-2.12-160000.3.1
grub2-arm64-efi-2.12-160000.3.1
grub2-arm64-efi-bls-2.12-160000.3.1
grub2-arm64-efi-debug-2.12-160000.3.1
grub2-arm64-efi-extras-2.12-160000.3.1
grub2-branding-upstream-2.12-160000.3.1
grub2-common-2.12-160000.3.1
grub2-i386-pc-2.12-160000.3.1
grub2-i386-pc-debug-2.12-160000.3.1
grub2-i386-pc-extras-2.12-160000.3.1
grub2-powerpc-ieee1275-2.12-160000.3.1
grub2-powerpc-ieee1275-debug-2.12-160000.3.1
grub2-powerpc-ieee1275-extras-2.12-160000.3.1
grub2-s390x-emu-2.12-160000.3.1
grub2-s390x-emu-debug-2.12-160000.3.1
grub2-s390x-emu-extras-2.12-160000.3.1
grub2-snapper-plugin-2.12-160000.3.1
grub2-systemd-sleep-plugin-2.12-160000.3.1
grub2-x86_64-efi-2.12-160000.3.1
grub2-x86_64-efi-bls-2.12-160000.3.1
grub2-x86_64-efi-debug-2.12-160000.3.1
grub2-x86_64-efi-extras-2.12-160000.3.1
grub2-x86_64-xen-2.12-160000.3.1
grub2-x86_64-xen-debug-2.12-160000.3.1
grub2-x86_64-xen-extras-2.12-160000.3.1
References:
* https://www.suse.com/security/cve/CVE-2024-56738.html
* https://www.suse.com/security/cve/CVE-2025-54770.html
* https://www.suse.com/security/cve/CVE-2025-54771.html
* https://www.suse.com/security/cve/CVE-2025-61661.html
* https://www.suse.com/security/cve/CVE-2025-61662.html
* https://www.suse.com/security/cve/CVE-2025-61663.html
* https://www.suse.com/security/cve/CVE-2025-61664.html
openSUSE-SU-2025:20162-1: important: Security update for ImageMagick
openSUSE security update: security update for imagemagick
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2025:20162-1
Rating: important
References:
* bsc#1248767
* bsc#1248780
* bsc#1248784
* bsc#1249362
* bsc#1252282
* bsc#1252749
Cross-References:
* CVE-2025-55212
* CVE-2025-55298
* CVE-2025-57803
* CVE-2025-57807
* CVE-2025-62171
* CVE-2025-62594
CVSS scores:
* CVE-2025-55212 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-55212 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-55298 ( SUSE ): 8.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2025-55298 ( SUSE ): 9 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-57803 ( SUSE ): 8.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
* CVE-2025-57803 ( SUSE ): 9 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-57807 ( SUSE ): 4.2 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
* CVE-2025-57807 ( SUSE ): 1 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-62171 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
* CVE-2025-62171 ( SUSE ): 5.7 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-62594 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
* CVE-2025-62594 ( SUSE ): 5.8 CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 6 vulnerabilities and has 6 bug fixes can now be installed.
Description:
This update for ImageMagick fixes the following issues:
- CVE-2025-62594: unsigned underflow and division-by-zero can lead to OOB pointer arithmetic and process crash
(bsc#1252749).
- CVE-2025-57807: BlobStream Forward-Seek Under-Allocation (bsc#1249362).
- CVE-2025-62171: incomplete fix for integer overflow in BMP Decoder (bsc#1252282).
- CVE-2025-55298: format string bug vulnerability can lead to heap overflow (bsc#1248780).
- CVE-2025-57803: 32-bit integer overflow can lead to heap out-of-bounds (OOB) write (bsc#1248784).
- CVE-2025-55212: division-by-zero in ThumbnailImage() when passing a geometry string containing only a colon to
`montage -geometry` (bsc#1248767).
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-105=1
Package List:
- openSUSE Leap 16.0:
ImageMagick-7.1.2.0-160000.4.1
ImageMagick-config-7-SUSE-7.1.2.0-160000.4.1
ImageMagick-config-7-upstream-limited-7.1.2.0-160000.4.1
ImageMagick-config-7-upstream-open-7.1.2.0-160000.4.1
ImageMagick-config-7-upstream-secure-7.1.2.0-160000.4.1
ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.4.1
ImageMagick-devel-7.1.2.0-160000.4.1
ImageMagick-doc-7.1.2.0-160000.4.1
ImageMagick-extra-7.1.2.0-160000.4.1
libMagick++-7_Q16HDRI5-7.1.2.0-160000.4.1
libMagick++-devel-7.1.2.0-160000.4.1
libMagickCore-7_Q16HDRI10-7.1.2.0-160000.4.1
libMagickWand-7_Q16HDRI10-7.1.2.0-160000.4.1
perl-PerlMagick-7.1.2.0-160000.4.1
References:
* https://www.suse.com/security/cve/CVE-2025-55212.html
* https://www.suse.com/security/cve/CVE-2025-55298.html
* https://www.suse.com/security/cve/CVE-2025-57803.html
* https://www.suse.com/security/cve/CVE-2025-57807.html
* https://www.suse.com/security/cve/CVE-2025-62171.html
* https://www.suse.com/security/cve/CVE-2025-62594.html
SUSE-SU-2025:4422-1: important: Security update for the Linux Kernel
# Security update for the Linux Kernel
Announcement ID: SUSE-SU-2025:4422-1
Release Date: 2025-12-17T10:53:11Z
Rating: important
References:
* bsc#1232223
* bsc#1237888
* bsc#1243474
* bsc#1245193
* bsc#1247076
* bsc#1247079
* bsc#1247500
* bsc#1247509
* bsc#1249547
* bsc#1249912
* bsc#1249982
* bsc#1250176
* bsc#1250237
* bsc#1250252
* bsc#1250705
* bsc#1251120
* bsc#1251786
* bsc#1252063
* bsc#1252267
* bsc#1252303
* bsc#1252353
* bsc#1252681
* bsc#1252763
* bsc#1252773
* bsc#1252780
* bsc#1252794
* bsc#1252795
* bsc#1252809
* bsc#1252817
* bsc#1252821
* bsc#1252836
* bsc#1252845
* bsc#1252862
* bsc#1252912
* bsc#1252917
* bsc#1252928
* bsc#1253018
* bsc#1253176
* bsc#1253275
* bsc#1253318
* bsc#1253324
* bsc#1253349
* bsc#1253352
* bsc#1253355
* bsc#1253360
* bsc#1253362
* bsc#1253363
* bsc#1253367
* bsc#1253369
* bsc#1253393
* bsc#1253395
* bsc#1253403
* bsc#1253407
* bsc#1253409
* bsc#1253412
* bsc#1253416
* bsc#1253421
* bsc#1253423
* bsc#1253424
* bsc#1253425
* bsc#1253427
* bsc#1253428
* bsc#1253431
* bsc#1253436
* bsc#1253438
* bsc#1253440
* bsc#1253441
* bsc#1253445
* bsc#1253448
* bsc#1253449
* bsc#1253453
* bsc#1253456
* bsc#1253472
* bsc#1253779
Cross-References:
* CVE-2022-50253
* CVE-2023-53676
* CVE-2025-21710
* CVE-2025-37916
* CVE-2025-38359
* CVE-2025-38361
* CVE-2025-39788
* CVE-2025-39805
* CVE-2025-39819
* CVE-2025-39859
* CVE-2025-39944
* CVE-2025-39980
* CVE-2025-40001
* CVE-2025-40021
* CVE-2025-40027
* CVE-2025-40030
* CVE-2025-40038
* CVE-2025-40040
* CVE-2025-40048
* CVE-2025-40055
* CVE-2025-40059
* CVE-2025-40064
* CVE-2025-40070
* CVE-2025-40074
* CVE-2025-40075
* CVE-2025-40083
* CVE-2025-40098
* CVE-2025-40105
* CVE-2025-40107
* CVE-2025-40109
* CVE-2025-40110
* CVE-2025-40111
* CVE-2025-40115
* CVE-2025-40116
* CVE-2025-40118
* CVE-2025-40120
* CVE-2025-40121
* CVE-2025-40127
* CVE-2025-40129
* CVE-2025-40139
* CVE-2025-40140
* CVE-2025-40141
* CVE-2025-40149
* CVE-2025-40154
* CVE-2025-40156
* CVE-2025-40157
* CVE-2025-40159
* CVE-2025-40164
* CVE-2025-40168
* CVE-2025-40169
* CVE-2025-40171
* CVE-2025-40172
* CVE-2025-40173
* CVE-2025-40176
* CVE-2025-40180
* CVE-2025-40183
* CVE-2025-40186
* CVE-2025-40188
* CVE-2025-40194
* CVE-2025-40198
* CVE-2025-40200
* CVE-2025-40204
* CVE-2025-40205
* CVE-2025-40206
* CVE-2025-40207
CVSS scores:
* CVE-2022-50253 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50253 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2022-50253 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2023-53676 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2023-53676 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21710 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21710 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-37916 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-37916 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-37916 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38359 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38359 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38359 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38361 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38361 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38361 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39788 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-39788 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-39805 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39805 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39819 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39819 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39859 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39859 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-39944 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-39980 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-39980 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40001 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40001 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40021 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40021 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
* CVE-2025-40027 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40027 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40030 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40030 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40038 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40038 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40040 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40040 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40048 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40055 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40055 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40059 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40064 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40070 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40074 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40075 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40083 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40083 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40098 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40098 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40105 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40105 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40107 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40107 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40109 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40109 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40110 ( SUSE ): 5.6
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40110 ( SUSE ): 4.1 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40111 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40115 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40115 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40116 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40116 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40118 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40118 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40120 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40120 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40121 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40121 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40127 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40127 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40129 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40129 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40139 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40139 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40140 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40140 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40141 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40141 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-40149 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40149 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-40154 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40154 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40156 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40156 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40157 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40157 ( SUSE ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40159 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40159 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40164 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40164 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40168 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40168 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-40169 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40169 ( SUSE ): 5.8 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-40171 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40171 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2025-40172 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40172 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40173 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40173 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40176 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40176 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40180 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40180 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-40183 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-40183 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-40186 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40186 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-40188 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40188 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40194 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40194 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40198 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40198 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40200 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40200 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40204 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-40204 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-40205 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40205 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40206 ( SUSE ): 5.9
CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40206 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-40207 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-40207 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP6
* Development Tools Module 15-SP6
* Legacy Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Availability Extension 15 SP6
* SUSE Linux Enterprise Live Patching 15-SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP6
An update that solves 65 vulnerabilities and has nine security fixes can now be
installed.
## Description:
The SUSE Linux Enterprise 15 SP6 kernel was updated to fix various security
issues
The following security issues were fixed:
* CVE-2022-50253: bpf: make sure skb->len != 0 when redirecting to a tunneling
device (bsc#1249912).
* CVE-2023-53676: scsi: target: iscsi: Fix buffer overflow in
lio_target_nacl_info_show() (bsc#1251786).
* CVE-2025-21710: tcp: correct handling of extreme memory squeeze
(bsc#1237888).
* CVE-2025-37916: pds_core: remove write-after-free of client_id
(bsc#1243474).
* CVE-2025-38359: s390/mm: Fix in_atomic() handling in
do_secure_storage_access() (bsc#1247076).
* CVE-2025-38361: drm/amd/display: Check dce_hwseq before dereferencing it
(bsc#1247079).
* CVE-2025-39788: scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE
(bsc#1249547).
* CVE-2025-39805: net: macb: fix unregister_netdev call order in macb_remove()
(bsc#1249982).
* CVE-2025-39819: fs/smb: Fix inconsistent refcnt update (bsc#1250176).
* CVE-2025-39859: ptp: ocp: fix use-after-free bugs causing by
ptp_ocp_watchdog (bsc#1250252).
* CVE-2025-39944: octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()
(bsc#1251120).
* CVE-2025-39980: nexthop: Forbid FDB status change while nexthop is in a
group (bsc#1252063).
* CVE-2025-40001: scsi: mvsas: Fix use-after-free bugs in mvs_work_queue
(bsc#1252303).
* CVE-2025-40021: tracing: dynevent: Add a missing lockdown check on dynevent
(bsc#1252681).
* CVE-2025-40027: net/9p: fix double req put in p9_fd_cancelled (bsc#1252763).
* CVE-2025-40030: pinctrl: check the return value of
pinmux_ops::get_function_name() (bsc#1252773).
* CVE-2025-40038: KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP
isn't valid (bsc#1252817).
* CVE-2025-40040: mm/ksm: fix flag-dropping behavior in ksm_madvise
(bsc#1252780).
* CVE-2025-40048: uio_hv_generic: Let userspace take care of interrupt mask
(bsc#1252862).
* CVE-2025-40055: ocfs2: fix double free in user_cluster_connect()
(bsc#1252821).
* CVE-2025-40059: coresight: Fix incorrect handling for return value of
devm_kzalloc (bsc#1252809).
* CVE-2025-40064: smc: Fix use-after-free in __pnet_find_base_ndev()
(bsc#1252845).
* CVE-2025-40070: pps: fix warning in pps_register_cdev when register device
fail (bsc#1252836).
* CVE-2025-40074: ipv4: start using dst_dev_rcu() (bsc#1252794).
* CVE-2025-40075: tcp_metrics: use dst_dev_net_rcu() (bsc#1252795).
* CVE-2025-40083: net/sched: sch_qfq: Fix null-deref in agg_dequeue
(bsc#1252912).
* CVE-2025-40098: ALSA: hda: cs35l41: Fix NULL pointer dereference in
cs35l41_get_acpi_mute_state() (bsc#1252917).
* CVE-2025-40105: vfs: Don't leak disconnected dentries on umount
(bsc#1252928).
* CVE-2025-40139: smc: Use __sk_dst_get() and dst_dev_rcu() in in
smc_clc_prfx_set() (bsc#1253409).
* CVE-2025-40149: tls: Use __sk_dst_get() and dst_dev_rcu() in
get_netdev_for_sock() (bsc#1253355).
* CVE-2025-40159: xsk: Harden userspace-supplied xdp_desc validation
(bsc#1253403).
* CVE-2025-40168: smc: Use __sk_dst_get() and dst_dev_rcu() in
smc_clc_prfx_match() (bsc#1253427).
* CVE-2025-40169: bpf: Reject negative offsets for ALU ops (bsc#1253416).
* CVE-2025-40173: net/ip6_tunnel: Prevent perpetual tunnel growth
(bsc#1253421).
* CVE-2025-40176: tls: wait for pending async decryptions if tls_strp_msg_hold
fails (bsc#1253425).
* CVE-2025-40204: sctp: Fix MAC comparison to be constant-time (bsc#1253436).
The following non security issues were fixed:
* ACPI: CPPC: Check _CPC validity for only the online CPUs (git-fixes).
* ACPI: CPPC: Limit perf ctrs in PCC check only to online CPUs (git-fixes).
* ACPI: CPPC: Perform fast check switch only for online CPUs (git-fixes).
* ACPI: PRM: Skip handlers with NULL handler_address or NULL VA (stable-
fixes).
* ACPI: SBS: Fix present test in acpi_battery_read() (git-fixes).
* ACPI: property: Return present device nodes only on fwnode interface
(stable-fixes).
* ACPI: scan: Add Intel CVS ACPI HIDs to acpi_ignore_dep_ids (stable-fixes).
* ACPICA: Update dsmethod.c to get rid of unused variable warning (stable-
fixes).
* ACPICA: dispatcher: Use acpi_ds_clear_operands() in
acpi_ds_call_control_method() (stable-fixes).
* ALSA: hda: Fix missing pointer check in hda_component_manager_init function
(git-fixes).
* ALSA: serial-generic: remove shared static buffer (stable-fixes).
* ALSA: usb-audio: Add validation of UAC2/UAC3 effect units (stable-fixes).
* ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd
(git-fixes).
* ALSA: usb-audio: Fix potential overflow of PCM transfer buffer (stable-
fixes).
* ALSA: usb-audio: add mono main switch to Presonus S1824c (stable-fixes).
* ALSA: usb-audio: apply quirk for MOONDROP Quark2 (stable-fixes).
* ALSA: usb-audio: don't log messages meant for 1810c when initializing 1824c
(git-fixes).
* ALSA: usb-audio: fix uac2 clock source at terminal parser (git-fixes).
* ASoC: codecs: va-macro: fix resource leak in probe error path (git-fixes).
* ASoC: cs4271: Fix regulator leak on probe failure (git-fixes).
* ASoC: max98090/91: fixed max98091 ALSA widget powering up/down (stable-
fixes).
* ASoC: meson: aiu-encoder-i2s: fix bit clock polarity (stable-fixes).
* ASoC: qcom: sc8280xp: explicitly set S16LE format in
sc8280xp_be_hw_params_fixup() (stable-fixes).
* ASoC: stm32: sai: manage context in set_sysclk callback (stable-fixes).
* ASoC: tlv320aic3x: Fix class-D initialization for tlv320aic3007 (stable-
fixes).
* Bluetooth: 6lowpan: Don't hold spin lock over sleeping functions (git-
fixes).
* Bluetooth: 6lowpan: add missing l2cap_chan_lock() (git-fixes).
* Bluetooth: 6lowpan: fix BDADDR_LE vs ADDR_LE_DEV address type confusion
(git-fixes).
* Bluetooth: 6lowpan: reset link-local header on ipv6 recv path (git-fixes).
* Bluetooth: L2CAP: export l2cap_chan_hold for modules (stable-fixes).
* Bluetooth: MGMT: cancel mesh send timer when hdev removed (git-fixes).
* Bluetooth: SCO: Fix UAF on sco_conn_free (stable-fixes).
* Bluetooth: bcsp: receive data only if registered (stable-fixes).
* Bluetooth: btrtl: Fix memory leak in rtlbt_parse_firmware_v2() (git-fixes).
* Bluetooth: btusb: Check for unexpected bytes when defragmenting HCI frames
(stable-fixes).
* Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF (git-
fixes).
* Bluetooth: hci_event: validate skb length for unknown CC opcode (git-fixes).
* Drivers: hv: vmbus: Add utility function for querying ring size (git-fixes).
* HID: amd_sfh: Stop sensor before starting (git-fixes).
* HID: hid-ntrig: Prevent memory leak in ntrig_report_version() (git-fixes).
* HID: quirks: avoid Cooler Master MM712 dongle wakeup bug (stable-fixes).
* HID: quirks: work around VID/PID conflict for 0x4c4a/0x4155 (git-fixes).
* HID: uclogic: Fix potential memory leak in error path (git-fixes).
* Input: atmel_mxt_ts - allow reset GPIO to sleep (stable-fixes).
* Input: imx_sc_key - fix memory corruption on unload (git-fixes).
* Input: pegasus-notetaker - fix potential out-of-bounds access (git-fixes).
* KVM: Pass new routing entries and irqfd when updating IRTEs (git-fixes).
* KVM: SVM: Delete IRTE link from previous vCPU before setting new IRTE (git-
fixes).
* KVM: SVM: Delete IRTE link from previous vCPU irrespective of new routing
(git-fixes).
* KVM: SVM: Emulate PERF_CNTR_GLOBAL_STATUS_SET for PerfMonV2 (git-fixes).
* KVM: SVM: Mark VMCB_LBR dirty when MSR_IA32_DEBUGCTLMSR is updated (git-
fixes).
* KVM: SVM: Re-load current, not host, TSC_AUX on #VMEXIT from SEV-ES guest
(git-fixes).
* KVM: SVM: Track per-vCPU IRTEs using kvm_kernel_irqfd structure (git-fixes).
* KVM: SVM: WARN if an invalid posted interrupt IRTE entry is added (git-
fixes).
* KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported (git-
fixes).
* KVM: VMX: Apply MMIO Stale Data mitigation if KVM maps MMIO into the guest
(git-fixes).
* KVM: VMX: Fix check for valid GVA on an EPT violation (git-fixes).
* KVM: VMX: Preserve host's DEBUGCTLMSR_FREEZE_IN_SMM while running the guest
(git-fixes).
* KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs (git-
fixes).
* KVM: nVMX: Check vmcs12->guest_ia32_debugctl on nested VM-Enter (git-fixes).
* KVM: x86/mmu: Locally cache whether a PFN is host MMIO when making a SPTE
(git-fixes).
* KVM: x86: Add helper to retrieve current value of user return MSR (git-
fixes).
* KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap
(git-fixes).
* KVM: x86: Don't treat ENTER and LEAVE as branches, because they aren't (git-
fixes).
* KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag (git-
fixes).
* NFS4: Fix state renewals missing after boot (git-fixes).
* NFS: check if suid/sgid was cleared after a write as needed (git-fixes).
* NFSD: Never cache a COMPOUND when the SEQUENCE operation fails (git-fixes).
* NFSD: Skip close replay processing if XDR encoding fails (git-fixes).
* NFSD: free copynotify stateid in nfs4_free_ol_stateid() (git-fixes).
* NFSv4.1: fix mount hang after CREATE_SESSION failure (git-fixes).
* NFSv4: handle ERR_GRACE on delegation recalls (git-fixes).
* PCI/P2PDMA: Fix incorrect pointer usage in devm_kfree() call (stable-fixes).
* PCI/PM: Skip resuming to D0 if device is disconnected (stable-fixes).
* PCI: Disable MSI on RDC PCI to PCIe bridges (stable-fixes).
* PCI: cadence: Check for the existence of cdns_pcie::ops before using it
(stable-fixes).
* PCI: dwc: Verify the single eDMA IRQ in dw_pcie_edma_irq_verify() (stable-
fixes).
* PCI: j721e: Fix incorrect error message in probe() (git-fixes).
* PCI: rcar-host: Convert struct rcar_msi mask_lock into raw spinlock (git-
fixes).
* PCI: tegra194: Reset BARs when running in PCIe endpoint mode (git-fixes).
* RDMA/bnxt_re: Don't fail destroy QP and cleanup debugfs earlier (git-fixes).
* RDMA/bnxt_re: Fix a potential memory leak in destroy_gsi_sqp (git-fixes).
* RDMA/hns: Fix recv CQ and QP cache affinity (git-fixes).
* RDMA/hns: Fix the modification of max_send_sge (git-fixes).
* RDMA/hns: Fix wrong WQE data when QP wraps around (git-fixes).
* RDMA/irdma: Fix SD index calculation (git-fixes).
* RDMA/irdma: Set irdma_cq cq_num field during CQ create (git-fixes).
* accel/habanalabs/gaudi2: fix BMON disable configuration (stable-fixes).
* accel/habanalabs/gaudi2: read preboot status after recovering from dirty
state (stable-fixes).
* accel/habanalabs: return ENOMEM if less than requested pages were pinned
(stable-fixes).
* accel/habanalabs: support mapping cb with vmalloc-backed coherent memory
(stable-fixes).
* acpi,srat: Fix incorrect device handle check for Generic Initiator (git-
fixes).
* amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw (stable-fixes).
* block: avoid possible overflow for chunk_sectors check in blk_stack_limits()
(git-fixes).
* block: fix kobject double initialization in add_disk (git-fixes).
* btrfs: abort transaction on failure to add link to inode (git-fixes).
* btrfs: avoid page_lockend underflow in btrfs_punch_hole_lock_range() (git-
fix).
* btrfs: avoid using fixed char array size for tree names (git-fix).
* btrfs: do not update last_log_commit when logging inode due to a new name
(git-fixes).
* btrfs: fix COW handling in run_delalloc_nocow() (git-fix).
* btrfs: fix inode leak on failure to add link to inode (git-fixes).
* btrfs: make btrfs_clear_delalloc_extent() free delalloc reserve (git-fix).
* btrfs: mark dirty extent range for out of bound prealloc extents (git-
fixes).
* btrfs: qgroup: correctly model root qgroup rsv in convert (git-fix).
* btrfs: rename err to ret in btrfs_link() (git-fixes).
* btrfs: run btrfs_error_commit_super() early (git-fix).
* btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-
fix).
* btrfs: scrub: put bio after errors in scrub_raid56_parity_stripe() (git-
fixes).
* btrfs: send: fix duplicated rmdir operations when using extrefs (git-fixes).
* btrfs: set inode flag BTRFS_INODE_COPY_EVERYTHING when logging new name
(git-fixes).
* btrfs: simplify error handling logic for btrfs_link() (git-fixes).
* btrfs: tree-checker: add dev extent item checks (git-fix).
* btrfs: tree-checker: add type and sequence check for inline backrefs (git-
fix).
* btrfs: tree-checker: fix the wrong output of data backref objectid (git-
fix).
* btrfs: tree-checker: reject BTRFS_FT_UNKNOWN dir type (git-fix).
* btrfs: tree-checker: validate dref root and objectid (git-fix).
* btrfs: use smp_mb__after_atomic() when forcing COW in
create_pending_snapshot() (git-fixes).
* char: misc: Does not request module for miscdevice with dynamic minor
(stable-fixes).
* char: misc: Make misc_register() reentry for miscdevice who wants dynamic
minor (stable-fixes).
* char: misc: restrict the dynamic range to exclude reserved minors (stable-
fixes).
* cramfs: Verify inode mode when loading from disk (git-fixes).
* crypto: aspeed - fix double free caused by devm (git-fixes).
* crypto: aspeed-acry - Convert to platform remove callback returning void
(stable-fixes).
* crypto: hisilicon/qm - Fix device reference leak in qm_get_qos_value (git-
fixes).
* crypto: iaa - Do not clobber req->base.data (git-fixes).
* crypto: qat - use kcalloc() in qat_uclo_map_objs_from_mof() (stable-fixes).
* dmaengine: dw-edma: Set status for callback_result (stable-fixes).
* dmaengine: mv_xor: match alloc_wc and free_wc (stable-fixes).
* drm/amd/display: Add AVI infoframe copy in copy_stream_update_to_stream
(stable-fixes).
* drm/amd/display: Disable VRR on DCE 6 (stable-fixes).
* drm/amd/display: Fix DVI-D/HDMI adapters (stable-fixes).
* drm/amd/display: Fix NULL deref in debugfs odm_combine_segments (git-fixes).
* drm/amd/display: Fix black screen with HDMI outputs (git-fixes).
* drm/amd/display: Increase AUX Intra-Hop Done Max Wait Duration (stable-
fixes).
* drm/amd/display: add more cyan skillfish devices (stable-fixes).
* drm/amd/display: ensure committing streams is seamless (stable-fixes).
* drm/amd/display: update dpp/disp clock from smu clock table (stable-fixes).
* drm/amd/pm: Disable MCLK switching on SI at high pixel clocks (stable-
fixes).
* drm/amd/pm: Use cached metrics data on aldebaran (stable-fixes).
* drm/amd/pm: Use cached metrics data on arcturus (stable-fixes).
* drm/amd: Avoid evicting resources at S5 (stable-fixes).
* drm/amd: Fix suspend failure with secure display TA (git-fixes).
* drm/amd: add more cyan skillfish PCI ids (stable-fixes).
* drm/amdgpu/jpeg: Hold pg_lock before jpeg poweroff (stable-fixes).
* drm/amdgpu: Allow kfd CRIU with no buffer objects (stable-fixes).
* drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices
(stable-fixes).
* drm/amdgpu: Use memdup_array_user in amdgpu_cs_wait_fences_ioctl (stable-
fixes).
* drm/amdgpu: add support for cyan skillfish gpu_info (stable-fixes).
* drm/amdgpu: don't enable SMU on cyan skillfish (stable-fixes).
* drm/amdgpu: reject gang submissions under SRIOV (stable-fixes).
* drm/amdkfd: Handle lack of READ permissions in SVM mapping (stable-fixes).
* drm/amdkfd: Tie UNMAP_LATENCY to queue_preemption (stable-fixes).
* drm/amdkfd: fix vram allocation failure for a special case (stable-fixes).
* drm/amdkfd: return -ENOTTY for unsupported IOCTLs (stable-fixes).
* drm/bridge: cdns-dsi: Don't fail on MIPI_DSI_MODE_VIDEO_BURST (stable-
fixes).
* drm/bridge: cdns-dsi: Fix REG_WAKEUP_TIME value (stable-fixes).
* drm/bridge: display-connector: don't set OP_DETECT for DisplayPorts (stable-
fixes).
* drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD (git-
fixes).
* drm/i915: Fix conversion between clock ticks and nanoseconds (git-fixes).
* drm/msm/dsi/phy: Toggle back buffer resync after preparing PLL (stable-
fixes).
* drm/msm/dsi/phy_7nm: Fix missing initial VCO rate (stable-fixes).
* drm/msm: make sure to not queue up recovery more than once (stable-fixes).
* drm/nouveau: replace snprintf() with scnprintf() in nvkm_snprintbf()
(stable-fixes).
* drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb (git-fixes).
* drm/tegra: Add call to put_pid() (git-fixes).
* drm/tegra: dc: Fix reference leak in tegra_dc_couple() (git-fixes).
* drm/tidss: Set crtc modesetting parameters with adjusted mode (stable-
fixes).
* drm/tidss: Use the crtc_* timings when programming the HW (stable-fixes).
* drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE (git-
fixes).
* exfat: limit log print for IO error (git-fixes).
* extcon: adc-jack: Cleanup wakeup source only if it was enabled (git-fixes).
* extcon: adc-jack: Fix wakeup source leaks on device unbind (stable-fixes).
* fbcon: Set fb_display[i]->mode to NULL when the mode is released (stable-
fixes).
* fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds
(stable-fixes).
* fbdev: bitblit: bound-check glyph index in bit_putcs* (stable-fixes).
* fbdev: pvr2fb: Fix leftover reference to ONCHIP_NR_DMA_CHANNELS (stable-
fixes).
* hwmon: (asus-ec-sensors) increase timeout for locking ACPI mutex (stable-
fixes).
* hwmon: (dell-smm) Add support for Dell OptiPlex 7040 (stable-fixes).
* hwmon: (k10temp) Add device ID for Strix Halo (stable-fixes).
* hwmon: (k10temp) Add thermal support for AMD Family 1Ah-based models
(stable-fixes).
* hwmon: (sbtsi_temp) AMD CPU extended temperature range support (stable-
fixes).
* hwmon: sy7636a: add alias (stable-fixes).
* iio: adc: imx93_adc: load calibrated values even calibration failed (stable-
fixes).
* iio: adc: spear_adc: mask SPEAR_ADC_STATUS channel and avg sample before
setting register (stable-fixes).
* ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr
(stable-fixes).
* iommu/amd: Return an error if vCPU affinity is set for non-vCPU IRTE (git-
fixes).
* isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe() (git-fixes).
* jfs: Verify inode mode when loading from disk (git-fixes).
* jfs: fix uninitialized waitqueue in transaction manager (git-fixes).
* lib/crypto: curve25519-hacl64: Fix older clang KASAN workaround for GCC
(git-fixes).
* md/raid1: fix data lost for writemostly rdev (git-fixes).
* md: fix mssing blktrace bio split events (git-fixes).
* media: adv7180: Add missing lock in suspend callback (stable-fixes).
* media: adv7180: Do not write format to device in set_fmt (stable-fixes).
* media: adv7180: Only validate format in querystd (stable-fixes).
* media: amphion: Delete v4l2_fh synchronously in .release() (stable-fixes).
* media: fix uninitialized symbol warnings (stable-fixes).
* media: i2c: Kconfig: Ensure a dependency on HAVE_CLK for VIDEO_CAMERA_SENSOR
(stable-fixes).
* media: i2c: og01a1b: Specify monochrome media bus format instead of Bayer
(stable-fixes).
* media: imon: make send_packet() more robust (stable-fixes).
* media: ov08x40: Fix the horizontal flip control (stable-fixes).
* media: redrat3: use int type to store negative error codes (stable-fixes).
* media: uvcvideo: Use heuristic to find stream entity (git-fixes).
* memstick: Add timeout to prevent indefinite waiting (stable-fixes).
* mfd: da9063: Split chip variant reading in two bus transactions (stable-
fixes).
* mfd: madera: Work around false-positive -Wininitialized warning (stable-
fixes).
* mfd: stmpe-i2c: Add missing MODULE_LICENSE (stable-fixes).
* mfd: stmpe: Remove IRQ domain upon removal (stable-fixes).
* minixfs: Verify inode mode when loading from disk (git-fixes).
* mm/mm_init: fix hash table order logging in alloc_large_system_hash() (git-
fixes).
* mm/secretmem: fix use-after-free race in fault handler (git-fixes).
* mmc: host: renesas_sdhi: Fix the actual clock (stable-fixes).
* mmc: sdhci-msm: Enable tuning for SDR50 mode for SD card (stable-fixes).
* mmc: sdhci-of-dwcmshc: Change DLL_STRBIN_TAPNUM_DEFAULT to 0x4 (git-fixes).
* mtd: onenand: Pass correct pointer to IRQ handler (git-fixes).
* mtd: rawnand: cadence: fix DMA device NULL pointer dereference (git-fixes).
* mtdchar: fix integer overflow in read/write ioctls (git-fixes).
* net/mana: fix warning in the writer of client oob (git-fixes).
* net/smc: Remove validation of reserved bits in CLC Decline message
(bsc#1253779).
* net: nfc: nci: Increase NCI_DATA_TIMEOUT to 3000 ms (stable-fixes).
* net: phy: clear link parameters on admin link down (stable-fixes).
* net: phy: fixed_phy: let fixed_phy_unregister free the phy_device (stable-
fixes).
* net: phy: marvell: Fix 88e1510 downshift counter errata (stable-fixes).
* net: tcp: send zero-window ACK when no memory (bsc#1253779).
* net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup (git-
fixes).
* nfs4_setup_readdir(): insufficient locking for ->d_parent->d_inode
dereferencing (git-fixes).
* nfsd: do not defer requests during idmap lookup in v4 compound decode
(bsc#1232223).
* nfsd: fix return error codes for nfsd_map_name_to_id (bsc#1232223).
* nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot (git-fixes).
* perf script: add --addr2line option (bsc#1247509).
* phy: cadence: cdns-dphy: Enable lower resolutions in dphy (stable-fixes).
* phy: renesas: r8a779f0-ether-serdes: add new step added to latest datasheet
(stable-fixes).
* phy: rockchip: phy-rockchip-inno-csidphy: allow writes to grf register 0
(stable-fixes).
* pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc (git-fixes).
* pinctrl: s32cc: initialize gpio_pin_config::list after kmalloc() (git-
fixes).
* pinctrl: single: fix bias pull up/down handling in pin_config_set (stable-
fixes).
* platform/x86/intel/speed_select_if: Convert PCIBIOS_* return codes to errnos
(git-fixes).
* power: supply: qcom_battmgr: add OOI chemistry (stable-fixes).
* power: supply: qcom_battmgr: handle charging state change notifications
(stable-fixes).
* power: supply: sbs-charger: Support multiple devices (stable-fixes).
* regulator: fixed: fix GPIO descriptor leak on register failure (git-fixes).
* rtc: rx8025: fix incorrect register reference (git-fixes).
* s390/mm,fault: simplify kfence fault handling (bsc#1247076).
* scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans (git-
fixes).
* scsi: aacraid: Stop using PCI_IRQ_AFFINITY (git-fixes).
* scsi: core: sysfs: Correct sysfs attributes access rights (git-fixes).
* scsi: hpsa: Fix potential memory leak in hpsa_big_passthru_ioctl() (git-
fixes).
* scsi: libfc: Prevent integer overflow in fc_fcp_recv_data() (git-fixes).
* scsi: mpi3mr: Correctly handle ATA device errors (git-fixes).
* scsi: mpi3mr: Drop unnecessary volatile from __iomem pointers (git-fixes).
* scsi: mpt3sas: Correctly handle ATA device errors (git-fixes).
* scsi: mpt3sas: Fix crash in transport port remove by using ioc_info() (git-
fixes).
* scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod (git-fixes).
* scsi: storvsc: Prefer returning channel with the same CPU as on the I/O
issuing CPU (bsc#1252267).
* selftests/bpf: Close fd in error path in drop_on_reuseport (git-fixes).
* selftests/bpf: Close obj in error path in xdp_adjust_tail (git-fixes).
* selftests/bpf: Fix missing ARRAY_SIZE() definition in bench.c (git-fixes).
* selftests/bpf: Fix missing BUILD_BUG_ON() declaration (git-fixes).
* selftests/bpf: Fix missing UINT_MAX definitions in benchmarks (git-fixes).
* selftests/bpf: Fix string read in strncmp benchmark (git-fixes).
* selftests/bpf: Mitigate sockmap_ktls disconnect_after_delete failure (git-
fixes).
* selftests/bpf: Use pid_t consistently in test_progs.c (git-fixes).
* selftests/bpf: fix signedness bug in redir_partial() (git-fixes).
* serial: 8250_exar: add support for Advantech 2 port card with Device ID
0x0018 (git-fixes).
* serial: 8250_mtk: Enable baud clock and manage in runtime PM (git-fixes).
* soc/tegra: fuse: Add Tegra114 nvmem cells and fuse lookups (stable-fixes).
* soc: aspeed: socinfo: Add AST27xx silicon IDs (stable-fixes).
* soc: qcom: smem: Fix endian-unaware access of num_entries (stable-fixes).
* spi: Try to get ACPI GPIO IRQ earlier (git-fixes).
* spi: loopback-test: Don't use %pK through printk (stable-fixes).
* spi: rpc-if: Add resume support for RZ/G3E (stable-fixes).
* strparser: Fix signed/unsigned mismatch bug (git-fixes).
* tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate
psock->cork (bsc#1250705).
* thunderbolt: Use is_pciehp instead of is_hotplug_bridge (stable-fixes).
* tools/cpupower: Fix incorrect size in cpuidle_state_disable() (stable-
fixes).
* tools/cpupower: fix error return value in cpupower_write_sysfs() (stable-
fixes).
* tools/power x86_energy_perf_policy: Enhance HWP enable (stable-fixes).
* tools/power x86_energy_perf_policy: Fix incorrect fopen mode usage (stable-
fixes).
* tools/power x86_energy_perf_policy: Prefer driver HWP limits (stable-fixes).
* tools: lib: thermal: don't preserve owner in install (stable-fixes).
* tools: lib: thermal: use pkg-config to locate libnl3 (stable-fixes).
* uio_hv_generic: Query the ringbuffer size for device (git-fixes).
* usb/core/quirks: Add Huawei ME906S to wakeup quirk (git-fixes).
* usb: cdns3: gadget: Use-after-free during failed initialization and exit of
cdnsp gadget (stable-fixes).
* usb: gadget: f_fs: Fix epfile null pointer access after ep enable (stable-
fixes).
* usb: gadget: f_hid: Fix zero length packet transfer (stable-fixes).
* usb: gadget: f_ncm: Fix MAC assignment NCM ethernet (stable-fixes).
* usb: mon: Increase BUFF_MAX to 64 MiB to support multi-MB URBs (stable-
fixes).
* usb: xhci: plat: Facilitate using autosuspend for xhci plat devices (stable-
fixes).
* video: backlight: lp855x_bl: Set correct EPROM start for LP8556 (stable-
fixes).
* watchdog: s3c2410_wdt: Fix max_timeout being calculated larger (stable-
fixes).
* wifi: ath10k: Fix connection after GTK rekeying (stable-fixes).
* wifi: ath11k: zero init info->status in wmi_process_mgmt_tx_comp() (git-
fixes).
* wifi: ath12k: Increase DP_REO_CMD_RING_SIZE to 256 (stable-fixes).
* wifi: mac80211: Fix HE capabilities element check (stable-fixes).
* wifi: mac80211: reject address change while connecting (git-fixes).
* wifi: mac80211: skip rate verification for not captured PSDUs (git-fixes).
* wifi: mac80211_hwsim: Limit destroy_on_close radio removal to netgroup (git-
fixes).
* wifi: mt76: mt7921: Add 160MHz beamformee capability for mt7922 device
(stable-fixes).
* wifi: mt76: mt7996: Temporarily disable EPCS (stable-fixes).
* wifi: mwl8k: inject DSSS Parameter Set element into beacons if missing (git-
fixes).
* wifi: rtw88: sdio: use indirect IO for device registers before power-on
(stable-fixes).
* wifi: zd1211rw: fix potential memory leak in __zd_usb_enable_rx() (git-
fixes).
* x86/CPU/AMD: Add RDSEED fix for Zen5 (git-fixes).
* x86/CPU/AMD: Add additional fixed RDSEED microcode revisions (git-fixes).
* x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode (git-fixes).
* x86/CPU/AMD: Do the common init on future Zens too (git-fixes).
* x86/amd_nb: Add new PCI IDs for AMD family 0x1a (stable-fixes).
* x86/bugs: Fix reporting of LFENCE retpoline (git-fixes).
* x86/bugs: Report correct retbleed mitigation status (git-fixes).
* x86/vmscape: Add old Intel CPUs to affected list (git-fixes).
* xhci: dbc: Allow users to modify DbC poll interval via sysfs (stable-fixes).
* xhci: dbc: Avoid event polling busyloop if pending rx transfers are inactive
(git-fixes).
* xhci: dbc: Improve performance by removing delay in transfer event polling
(stable-fixes).
* xhci: dbc: fix bogus 1024 byte prefix if ttyDBC read races with stall event
(git-fixes).
* xhci: dbc: poll at different rate depending on data transfer activity
(stable-fixes).
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-4422=1 openSUSE-SLE-15.6-2025-4422=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4422=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-4422=1
* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2025-4422=1
* SUSE Linux Enterprise High Availability Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-HA-15-SP6-2025-4422=1
* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-4422=1
* SUSE Linux Enterprise Live Patching 15-SP6
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP6-2025-4422=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.
## Package List:
* openSUSE Leap 15.6 (noarch nosrc)
* kernel-docs-6.4.0-150600.23.81.1
* openSUSE Leap 15.6 (noarch)
* kernel-devel-6.4.0-150600.23.81.2
* kernel-source-vanilla-6.4.0-150600.23.81.2
* kernel-source-6.4.0-150600.23.81.2
* kernel-docs-html-6.4.0-150600.23.81.1
* kernel-macros-6.4.0-150600.23.81.2
* openSUSE Leap 15.6 (nosrc ppc64le x86_64)
* kernel-debug-6.4.0-150600.23.81.3
* openSUSE Leap 15.6 (ppc64le x86_64)
* kernel-debug-devel-debuginfo-6.4.0-150600.23.81.3
* kernel-debug-devel-6.4.0-150600.23.81.3
* kernel-debug-debugsource-6.4.0-150600.23.81.3
* kernel-debug-debuginfo-6.4.0-150600.23.81.3
* openSUSE Leap 15.6 (x86_64)
* kernel-default-vdso-6.4.0-150600.23.81.3
* kernel-kvmsmall-vdso-6.4.0-150600.23.81.3
* kernel-debug-vdso-debuginfo-6.4.0-150600.23.81.3
* kernel-default-vdso-debuginfo-6.4.0-150600.23.81.3
* kernel-debug-vdso-6.4.0-150600.23.81.3
* kernel-kvmsmall-vdso-debuginfo-6.4.0-150600.23.81.3
* openSUSE Leap 15.6 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-debugsource-6.4.0-150600.23.81.3
* kernel-kvmsmall-devel-debuginfo-6.4.0-150600.23.81.3
* kernel-default-base-rebuild-6.4.0-150600.23.81.3.150600.12.36.3
* kernel-kvmsmall-devel-6.4.0-150600.23.81.3
* kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3
* kernel-kvmsmall-debuginfo-6.4.0-150600.23.81.3
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* kernel-default-extra-debuginfo-6.4.0-150600.23.81.3
* kernel-default-optional-6.4.0-150600.23.81.3
* reiserfs-kmp-default-6.4.0-150600.23.81.3
* kernel-obs-build-debugsource-6.4.0-150600.23.81.3
* kernel-default-devel-6.4.0-150600.23.81.3
* kselftests-kmp-default-debuginfo-6.4.0-150600.23.81.3
* gfs2-kmp-default-6.4.0-150600.23.81.3
* kernel-obs-qa-6.4.0-150600.23.81.1
* kernel-default-debuginfo-6.4.0-150600.23.81.3
* kernel-default-devel-debuginfo-6.4.0-150600.23.81.3
* kernel-default-livepatch-6.4.0-150600.23.81.3
* kernel-default-extra-6.4.0-150600.23.81.3
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.81.3
* dlm-kmp-default-6.4.0-150600.23.81.3
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.81.3
* ocfs2-kmp-default-6.4.0-150600.23.81.3
* kernel-default-optional-debuginfo-6.4.0-150600.23.81.3
* dlm-kmp-default-debuginfo-6.4.0-150600.23.81.3
* cluster-md-kmp-default-6.4.0-150600.23.81.3
* kselftests-kmp-default-6.4.0-150600.23.81.3
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.81.3
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.81.3
* kernel-obs-build-6.4.0-150600.23.81.3
* kernel-default-debugsource-6.4.0-150600.23.81.3
* kernel-syms-6.4.0-150600.23.81.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-6.4.0-150600.23.81.3
* openSUSE Leap 15.6 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP6_Update_18-debugsource-1-150600.13.3.3
* kernel-default-livepatch-devel-6.4.0-150600.23.81.3
* kernel-livepatch-6_4_0-150600_23_81-default-debuginfo-1-150600.13.3.3
* kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3
* openSUSE Leap 15.6 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-6.4.0-150600.23.81.3
* openSUSE Leap 15.6 (nosrc s390x)
* kernel-zfcpdump-6.4.0-150600.23.81.3
* openSUSE Leap 15.6 (s390x)
* kernel-zfcpdump-debuginfo-6.4.0-150600.23.81.3
* kernel-zfcpdump-debugsource-6.4.0-150600.23.81.3
* openSUSE Leap 15.6 (nosrc)
* dtb-aarch64-6.4.0-150600.23.81.1
* openSUSE Leap 15.6 (aarch64)
* kselftests-kmp-64kb-debuginfo-6.4.0-150600.23.81.3
* dtb-cavium-6.4.0-150600.23.81.1
* dtb-sprd-6.4.0-150600.23.81.1
* kernel-64kb-debuginfo-6.4.0-150600.23.81.3
* dtb-qcom-6.4.0-150600.23.81.1
* reiserfs-kmp-64kb-6.4.0-150600.23.81.3
* kernel-64kb-extra-debuginfo-6.4.0-150600.23.81.3
* dtb-marvell-6.4.0-150600.23.81.1
* dtb-renesas-6.4.0-150600.23.81.1
* kernel-64kb-devel-debuginfo-6.4.0-150600.23.81.3
* dtb-apple-6.4.0-150600.23.81.1
* dtb-socionext-6.4.0-150600.23.81.1
* kernel-64kb-optional-6.4.0-150600.23.81.3
* dtb-allwinner-6.4.0-150600.23.81.1
* dtb-amd-6.4.0-150600.23.81.1
* ocfs2-kmp-64kb-debuginfo-6.4.0-150600.23.81.3
* cluster-md-kmp-64kb-debuginfo-6.4.0-150600.23.81.3
* kernel-64kb-extra-6.4.0-150600.23.81.3
* kernel-64kb-debugsource-6.4.0-150600.23.81.3
* dlm-kmp-64kb-6.4.0-150600.23.81.3
* dtb-xilinx-6.4.0-150600.23.81.1
* kselftests-kmp-64kb-6.4.0-150600.23.81.3
* kernel-64kb-devel-6.4.0-150600.23.81.3
* dtb-altera-6.4.0-150600.23.81.1
* dtb-amlogic-6.4.0-150600.23.81.1
* dtb-apm-6.4.0-150600.23.81.1
* dtb-lg-6.4.0-150600.23.81.1
* dtb-arm-6.4.0-150600.23.81.1
* cluster-md-kmp-64kb-6.4.0-150600.23.81.3
* dtb-amazon-6.4.0-150600.23.81.1
* dtb-exynos-6.4.0-150600.23.81.1
* dtb-mediatek-6.4.0-150600.23.81.1
* dtb-broadcom-6.4.0-150600.23.81.1
* dtb-hisilicon-6.4.0-150600.23.81.1
* dtb-nvidia-6.4.0-150600.23.81.1
* reiserfs-kmp-64kb-debuginfo-6.4.0-150600.23.81.3
* gfs2-kmp-64kb-debuginfo-6.4.0-150600.23.81.3
* dtb-freescale-6.4.0-150600.23.81.1
* dlm-kmp-64kb-debuginfo-6.4.0-150600.23.81.3
* dtb-rockchip-6.4.0-150600.23.81.1
* gfs2-kmp-64kb-6.4.0-150600.23.81.3
* ocfs2-kmp-64kb-6.4.0-150600.23.81.3
* kernel-64kb-optional-debuginfo-6.4.0-150600.23.81.3
* openSUSE Leap 15.6 (aarch64 nosrc)
* kernel-64kb-6.4.0-150600.23.81.3
* Basesystem Module 15-SP6 (aarch64 nosrc)
* kernel-64kb-6.4.0-150600.23.81.3
* Basesystem Module 15-SP6 (aarch64)
* kernel-64kb-devel-debuginfo-6.4.0-150600.23.81.3
* kernel-64kb-devel-6.4.0-150600.23.81.3
* kernel-64kb-debuginfo-6.4.0-150600.23.81.3
* kernel-64kb-debugsource-6.4.0-150600.23.81.3
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-6.4.0-150600.23.81.3
* Basesystem Module 15-SP6 (aarch64 ppc64le x86_64)
* kernel-default-base-6.4.0-150600.23.81.3.150600.12.36.3
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kernel-default-devel-6.4.0-150600.23.81.3
* kernel-default-debugsource-6.4.0-150600.23.81.3
* kernel-default-debuginfo-6.4.0-150600.23.81.3
* kernel-default-devel-debuginfo-6.4.0-150600.23.81.3
* Basesystem Module 15-SP6 (noarch)
* kernel-macros-6.4.0-150600.23.81.2
* kernel-devel-6.4.0-150600.23.81.2
* Basesystem Module 15-SP6 (nosrc s390x)
* kernel-zfcpdump-6.4.0-150600.23.81.3
* Basesystem Module 15-SP6 (s390x)
* kernel-zfcpdump-debuginfo-6.4.0-150600.23.81.3
* kernel-zfcpdump-debugsource-6.4.0-150600.23.81.3
* Development Tools Module 15-SP6 (noarch nosrc)
* kernel-docs-6.4.0-150600.23.81.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* kernel-obs-build-6.4.0-150600.23.81.3
* kernel-syms-6.4.0-150600.23.81.1
* kernel-obs-build-debugsource-6.4.0-150600.23.81.3
* Development Tools Module 15-SP6 (noarch)
* kernel-source-6.4.0-150600.23.81.2
* Legacy Module 15-SP6 (nosrc)
* kernel-default-6.4.0-150600.23.81.3
* Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* reiserfs-kmp-default-debuginfo-6.4.0-150600.23.81.3
* kernel-default-debugsource-6.4.0-150600.23.81.3
* kernel-default-debuginfo-6.4.0-150600.23.81.3
* reiserfs-kmp-default-6.4.0-150600.23.81.3
* SUSE Linux Enterprise High Availability Extension 15 SP6 (aarch64 ppc64le
s390x x86_64)
* ocfs2-kmp-default-debuginfo-6.4.0-150600.23.81.3
* kernel-default-debuginfo-6.4.0-150600.23.81.3
* ocfs2-kmp-default-6.4.0-150600.23.81.3
* cluster-md-kmp-default-debuginfo-6.4.0-150600.23.81.3
* dlm-kmp-default-6.4.0-150600.23.81.3
* gfs2-kmp-default-debuginfo-6.4.0-150600.23.81.3
* dlm-kmp-default-debuginfo-6.4.0-150600.23.81.3
* kernel-default-debugsource-6.4.0-150600.23.81.3
* cluster-md-kmp-default-6.4.0-150600.23.81.3
* gfs2-kmp-default-6.4.0-150600.23.81.3
* SUSE Linux Enterprise High Availability Extension 15 SP6 (nosrc)
* kernel-default-6.4.0-150600.23.81.3
* SUSE Linux Enterprise Workstation Extension 15 SP6 (nosrc)
* kernel-default-6.4.0-150600.23.81.3
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* kernel-default-extra-6.4.0-150600.23.81.3
* kernel-default-extra-debuginfo-6.4.0-150600.23.81.3
* kernel-default-debugsource-6.4.0-150600.23.81.3
* kernel-default-debuginfo-6.4.0-150600.23.81.3
* SUSE Linux Enterprise Live Patching 15-SP6 (nosrc)
* kernel-default-6.4.0-150600.23.81.3
* SUSE Linux Enterprise Live Patching 15-SP6 (ppc64le s390x x86_64)
* kernel-default-debuginfo-6.4.0-150600.23.81.3
* kernel-livepatch-6_4_0-150600_23_81-default-1-150600.13.3.3
* kernel-default-livepatch-6.4.0-150600.23.81.3
* kernel-livepatch-6_4_0-150600_23_81-default-debuginfo-1-150600.13.3.3
* kernel-default-debugsource-6.4.0-150600.23.81.3
* kernel-livepatch-SLE15-SP6_Update_18-debugsource-1-150600.13.3.3
* kernel-default-livepatch-devel-6.4.0-150600.23.81.3
## References:
* https://www.suse.com/security/cve/CVE-2022-50253.html
* https://www.suse.com/security/cve/CVE-2023-53676.html
* https://www.suse.com/security/cve/CVE-2025-21710.html
* https://www.suse.com/security/cve/CVE-2025-37916.html
* https://www.suse.com/security/cve/CVE-2025-38359.html
* https://www.suse.com/security/cve/CVE-2025-38361.html
* https://www.suse.com/security/cve/CVE-2025-39788.html
* https://www.suse.com/security/cve/CVE-2025-39805.html
* https://www.suse.com/security/cve/CVE-2025-39819.html
* https://www.suse.com/security/cve/CVE-2025-39859.html
* https://www.suse.com/security/cve/CVE-2025-39944.html
* https://www.suse.com/security/cve/CVE-2025-39980.html
* https://www.suse.com/security/cve/CVE-2025-40001.html
* https://www.suse.com/security/cve/CVE-2025-40021.html
* https://www.suse.com/security/cve/CVE-2025-40027.html
* https://www.suse.com/security/cve/CVE-2025-40030.html
* https://www.suse.com/security/cve/CVE-2025-40038.html
* https://www.suse.com/security/cve/CVE-2025-40040.html
* https://www.suse.com/security/cve/CVE-2025-40048.html
* https://www.suse.com/security/cve/CVE-2025-40055.html
* https://www.suse.com/security/cve/CVE-2025-40059.html
* https://www.suse.com/security/cve/CVE-2025-40064.html
* https://www.suse.com/security/cve/CVE-2025-40070.html
* https://www.suse.com/security/cve/CVE-2025-40074.html
* https://www.suse.com/security/cve/CVE-2025-40075.html
* https://www.suse.com/security/cve/CVE-2025-40083.html
* https://www.suse.com/security/cve/CVE-2025-40098.html
* https://www.suse.com/security/cve/CVE-2025-40105.html
* https://www.suse.com/security/cve/CVE-2025-40107.html
* https://www.suse.com/security/cve/CVE-2025-40109.html
* https://www.suse.com/security/cve/CVE-2025-40110.html
* https://www.suse.com/security/cve/CVE-2025-40111.html
* https://www.suse.com/security/cve/CVE-2025-40115.html
* https://www.suse.com/security/cve/CVE-2025-40116.html
* https://www.suse.com/security/cve/CVE-2025-40118.html
* https://www.suse.com/security/cve/CVE-2025-40120.html
* https://www.suse.com/security/cve/CVE-2025-40121.html
* https://www.suse.com/security/cve/CVE-2025-40127.html
* https://www.suse.com/security/cve/CVE-2025-40129.html
* https://www.suse.com/security/cve/CVE-2025-40139.html
* https://www.suse.com/security/cve/CVE-2025-40140.html
* https://www.suse.com/security/cve/CVE-2025-40141.html
* https://www.suse.com/security/cve/CVE-2025-40149.html
* https://www.suse.com/security/cve/CVE-2025-40154.html
* https://www.suse.com/security/cve/CVE-2025-40156.html
* https://www.suse.com/security/cve/CVE-2025-40157.html
* https://www.suse.com/security/cve/CVE-2025-40159.html
* https://www.suse.com/security/cve/CVE-2025-40164.html
* https://www.suse.com/security/cve/CVE-2025-40168.html
* https://www.suse.com/security/cve/CVE-2025-40169.html
* https://www.suse.com/security/cve/CVE-2025-40171.html
* https://www.suse.com/security/cve/CVE-2025-40172.html
* https://www.suse.com/security/cve/CVE-2025-40173.html
* https://www.suse.com/security/cve/CVE-2025-40176.html
* https://www.suse.com/security/cve/CVE-2025-40180.html
* https://www.suse.com/security/cve/CVE-2025-40183.html
* https://www.suse.com/security/cve/CVE-2025-40186.html
* https://www.suse.com/security/cve/CVE-2025-40188.html
* https://www.suse.com/security/cve/CVE-2025-40194.html
* https://www.suse.com/security/cve/CVE-2025-40198.html
* https://www.suse.com/security/cve/CVE-2025-40200.html
* https://www.suse.com/security/cve/CVE-2025-40204.html
* https://www.suse.com/security/cve/CVE-2025-40205.html
* https://www.suse.com/security/cve/CVE-2025-40206.html
* https://www.suse.com/security/cve/CVE-2025-40207.html
* https://bugzilla.suse.com/show_bug.cgi?id=1232223
* https://bugzilla.suse.com/show_bug.cgi?id=1237888
* https://bugzilla.suse.com/show_bug.cgi?id=1243474
* https://bugzilla.suse.com/show_bug.cgi?id=1245193
* https://bugzilla.suse.com/show_bug.cgi?id=1247076
* https://bugzilla.suse.com/show_bug.cgi?id=1247079
* https://bugzilla.suse.com/show_bug.cgi?id=1247500
* https://bugzilla.suse.com/show_bug.cgi?id=1247509
* https://bugzilla.suse.com/show_bug.cgi?id=1249547
* https://bugzilla.suse.com/show_bug.cgi?id=1249912
* https://bugzilla.suse.com/show_bug.cgi?id=1249982
* https://bugzilla.suse.com/show_bug.cgi?id=1250176
* https://bugzilla.suse.com/show_bug.cgi?id=1250237
* https://bugzilla.suse.com/show_bug.cgi?id=1250252
* https://bugzilla.suse.com/show_bug.cgi?id=1250705
* https://bugzilla.suse.com/show_bug.cgi?id=1251120
* https://bugzilla.suse.com/show_bug.cgi?id=1251786
* https://bugzilla.suse.com/show_bug.cgi?id=1252063
* https://bugzilla.suse.com/show_bug.cgi?id=1252267
* https://bugzilla.suse.com/show_bug.cgi?id=1252303
* https://bugzilla.suse.com/show_bug.cgi?id=1252353
* https://bugzilla.suse.com/show_bug.cgi?id=1252681
* https://bugzilla.suse.com/show_bug.cgi?id=1252763
* https://bugzilla.suse.com/show_bug.cgi?id=1252773
* https://bugzilla.suse.com/show_bug.cgi?id=1252780
* https://bugzilla.suse.com/show_bug.cgi?id=1252794
* https://bugzilla.suse.com/show_bug.cgi?id=1252795
* https://bugzilla.suse.com/show_bug.cgi?id=1252809
* https://bugzilla.suse.com/show_bug.cgi?id=1252817
* https://bugzilla.suse.com/show_bug.cgi?id=1252821
* https://bugzilla.suse.com/show_bug.cgi?id=1252836
* https://bugzilla.suse.com/show_bug.cgi?id=1252845
* https://bugzilla.suse.com/show_bug.cgi?id=1252862
* https://bugzilla.suse.com/show_bug.cgi?id=1252912
* https://bugzilla.suse.com/show_bug.cgi?id=1252917
* https://bugzilla.suse.com/show_bug.cgi?id=1252928
* https://bugzilla.suse.com/show_bug.cgi?id=1253018
* https://bugzilla.suse.com/show_bug.cgi?id=1253176
* https://bugzilla.suse.com/show_bug.cgi?id=1253275
* https://bugzilla.suse.com/show_bug.cgi?id=1253318
* https://bugzilla.suse.com/show_bug.cgi?id=1253324
* https://bugzilla.suse.com/show_bug.cgi?id=1253349
* https://bugzilla.suse.com/show_bug.cgi?id=1253352
* https://bugzilla.suse.com/show_bug.cgi?id=1253355
* https://bugzilla.suse.com/show_bug.cgi?id=1253360
* https://bugzilla.suse.com/show_bug.cgi?id=1253362
* https://bugzilla.suse.com/show_bug.cgi?id=1253363
* https://bugzilla.suse.com/show_bug.cgi?id=1253367
* https://bugzilla.suse.com/show_bug.cgi?id=1253369
* https://bugzilla.suse.com/show_bug.cgi?id=1253393
* https://bugzilla.suse.com/show_bug.cgi?id=1253395
* https://bugzilla.suse.com/show_bug.cgi?id=1253403
* https://bugzilla.suse.com/show_bug.cgi?id=1253407
* https://bugzilla.suse.com/show_bug.cgi?id=1253409
* https://bugzilla.suse.com/show_bug.cgi?id=1253412
* https://bugzilla.suse.com/show_bug.cgi?id=1253416
* https://bugzilla.suse.com/show_bug.cgi?id=1253421
* https://bugzilla.suse.com/show_bug.cgi?id=1253423
* https://bugzilla.suse.com/show_bug.cgi?id=1253424
* https://bugzilla.suse.com/show_bug.cgi?id=1253425
* https://bugzilla.suse.com/show_bug.cgi?id=1253427
* https://bugzilla.suse.com/show_bug.cgi?id=1253428
* https://bugzilla.suse.com/show_bug.cgi?id=1253431
* https://bugzilla.suse.com/show_bug.cgi?id=1253436
* https://bugzilla.suse.com/show_bug.cgi?id=1253438
* https://bugzilla.suse.com/show_bug.cgi?id=1253440
* https://bugzilla.suse.com/show_bug.cgi?id=1253441
* https://bugzilla.suse.com/show_bug.cgi?id=1253445
* https://bugzilla.suse.com/show_bug.cgi?id=1253448
* https://bugzilla.suse.com/show_bug.cgi?id=1253449
* https://bugzilla.suse.com/show_bug.cgi?id=1253453
* https://bugzilla.suse.com/show_bug.cgi?id=1253456
* https://bugzilla.suse.com/show_bug.cgi?id=1253472
* https://bugzilla.suse.com/show_bug.cgi?id=1253779
SUSE-SU-2025:4421-1: moderate: Security update for buildah
# Security update for buildah
Announcement ID: SUSE-SU-2025:4421-1
Release Date: 2025-12-17T09:04:40Z
Rating: moderate
References:
Affected Products:
* Containers Module 15-SP7
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP6 LTSS
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that can now be installed.
## Description:
This update for buildah rebuilds it against the current security release of GO.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4421=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4421=1
* SUSE Linux Enterprise Server 15 SP6 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP6-LTSS-2025-4421=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4421=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2025-4421=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-4421=1
* Containers Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-4421=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4421=1
## Package List:
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* buildah-1.35.5-150500.3.50.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* buildah-1.35.5-150500.3.50.1
* SUSE Linux Enterprise Server 15 SP6 LTSS (aarch64 ppc64le s390x x86_64)
* buildah-1.35.5-150500.3.50.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* buildah-1.35.5-150500.3.50.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* buildah-1.35.5-150500.3.50.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* buildah-1.35.5-150500.3.50.1
* Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* buildah-1.35.5-150500.3.50.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* buildah-1.35.5-150500.3.50.1
SUSE-SU-2025:4424-1: important: Security update for MozillaFirefox
# Security update for MozillaFirefox
Announcement ID: SUSE-SU-2025:4424-1
Release Date: 2025-12-17T11:10:08Z
Rating: important
References:
* bsc#1254551
Cross-References:
* CVE-2025-14321
* CVE-2025-14322
* CVE-2025-14323
* CVE-2025-14324
* CVE-2025-14325
* CVE-2025-14328
* CVE-2025-14329
* CVE-2025-14330
* CVE-2025-14331
* CVE-2025-14333
CVSS scores:
* CVE-2025-14321 ( SUSE ): 8.6
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-14321 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-14321 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-14321 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-14322 ( SUSE ): 8.6
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-14322 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-14322 ( NVD ): 8.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
* CVE-2025-14323 ( SUSE ): 8.6
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-14323 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-14323 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-14324 ( SUSE ): 8.6
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-14324 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-14324 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-14324 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-14325 ( SUSE ): 8.6
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-14325 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-14325 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-14328 ( SUSE ): 5.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-14328 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2025-14328 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-14329 ( SUSE ): 5.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-14329 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2025-14329 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-14330 ( SUSE ): 5.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-14330 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2025-14330 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-14330 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-14331 ( SUSE ): 5.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-14331 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2025-14331 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2025-14331 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2025-14333 ( SUSE ): 8.6
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-14333 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-14333 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-14333 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* Desktop Applications Module 15-SP6
* Desktop Applications Module 15-SP7
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves 10 vulnerabilities can now be installed.
## Description:
This update for MozillaFirefox fixes the following issues:
Update to Firefox Extended Support Release 140.6.0 ESR (bsc#1254551).
* MFSA 2025-94
* CVE-2025-14321: use-after-free in the WebRTC: Signaling component.
* CVE-2025-14322: sandbox escape due to incorrect boundary conditions in the
Graphics: CanvasWebGL component.
* CVE-2025-14323: privilege escalation in the DOM: Notifications component.
* CVE-2025-14324: JIT miscompilation in the JavaScript Engine: JIT component.
* CVE-2025-14325: JIT miscompilation in the JavaScript Engine: JIT component.
* CVE-2025-14328: privilege escalation in the Netmonitor component.
* CVE-2025-14329: privilege escalation in the Netmonitor component.
* CVE-2025-14330: JIT miscompilation in the JavaScript Engine: JIT component.
* CVE-2025-14331: same-origin policy bypass in the Request Handling component.
* CVE-2025-14333: memory safety bugs.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-4424=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-4424=1
* Desktop Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-4424=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4424=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4424=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4424=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4424=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4424=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4424=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4424=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4424=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4424=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4424=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4424=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2025-4424=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-translations-other-140.6.0-150200.152.213.1
* MozillaFirefox-debuginfo-140.6.0-150200.152.213.1
* MozillaFirefox-140.6.0-150200.152.213.1
* MozillaFirefox-debugsource-140.6.0-150200.152.213.1
* MozillaFirefox-branding-upstream-140.6.0-150200.152.213.1
* MozillaFirefox-translations-common-140.6.0-150200.152.213.1
* openSUSE Leap 15.6 (noarch)
* MozillaFirefox-devel-140.6.0-150200.152.213.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-translations-other-140.6.0-150200.152.213.1
* MozillaFirefox-debuginfo-140.6.0-150200.152.213.1
* MozillaFirefox-debugsource-140.6.0-150200.152.213.1
* MozillaFirefox-translations-common-140.6.0-150200.152.213.1
* MozillaFirefox-140.6.0-150200.152.213.1
* Desktop Applications Module 15-SP6 (noarch)
* MozillaFirefox-devel-140.6.0-150200.152.213.1
* Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-translations-other-140.6.0-150200.152.213.1
* MozillaFirefox-debuginfo-140.6.0-150200.152.213.1
* MozillaFirefox-debugsource-140.6.0-150200.152.213.1
* MozillaFirefox-translations-common-140.6.0-150200.152.213.1
* MozillaFirefox-140.6.0-150200.152.213.1
* Desktop Applications Module 15-SP7 (noarch)
* MozillaFirefox-devel-140.6.0-150200.152.213.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* MozillaFirefox-translations-other-140.6.0-150200.152.213.1
* MozillaFirefox-debuginfo-140.6.0-150200.152.213.1
* MozillaFirefox-debugsource-140.6.0-150200.152.213.1
* MozillaFirefox-translations-common-140.6.0-150200.152.213.1
* MozillaFirefox-140.6.0-150200.152.213.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* MozillaFirefox-devel-140.6.0-150200.152.213.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-translations-other-140.6.0-150200.152.213.1
* MozillaFirefox-debuginfo-140.6.0-150200.152.213.1
* MozillaFirefox-debugsource-140.6.0-150200.152.213.1
* MozillaFirefox-translations-common-140.6.0-150200.152.213.1
* MozillaFirefox-140.6.0-150200.152.213.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* MozillaFirefox-devel-140.6.0-150200.152.213.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-translations-other-140.6.0-150200.152.213.1
* MozillaFirefox-debuginfo-140.6.0-150200.152.213.1
* MozillaFirefox-debugsource-140.6.0-150200.152.213.1
* MozillaFirefox-translations-common-140.6.0-150200.152.213.1
* MozillaFirefox-140.6.0-150200.152.213.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* MozillaFirefox-devel-140.6.0-150200.152.213.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* MozillaFirefox-translations-other-140.6.0-150200.152.213.1
* MozillaFirefox-debuginfo-140.6.0-150200.152.213.1
* MozillaFirefox-debugsource-140.6.0-150200.152.213.1
* MozillaFirefox-translations-common-140.6.0-150200.152.213.1
* MozillaFirefox-140.6.0-150200.152.213.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* MozillaFirefox-devel-140.6.0-150200.152.213.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* MozillaFirefox-translations-other-140.6.0-150200.152.213.1
* MozillaFirefox-debuginfo-140.6.0-150200.152.213.1
* MozillaFirefox-debugsource-140.6.0-150200.152.213.1
* MozillaFirefox-translations-common-140.6.0-150200.152.213.1
* MozillaFirefox-140.6.0-150200.152.213.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* MozillaFirefox-devel-140.6.0-150200.152.213.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-translations-other-140.6.0-150200.152.213.1
* MozillaFirefox-debuginfo-140.6.0-150200.152.213.1
* MozillaFirefox-debugsource-140.6.0-150200.152.213.1
* MozillaFirefox-translations-common-140.6.0-150200.152.213.1
* MozillaFirefox-140.6.0-150200.152.213.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (noarch)
* MozillaFirefox-devel-140.6.0-150200.152.213.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-translations-other-140.6.0-150200.152.213.1
* MozillaFirefox-debuginfo-140.6.0-150200.152.213.1
* MozillaFirefox-debugsource-140.6.0-150200.152.213.1
* MozillaFirefox-translations-common-140.6.0-150200.152.213.1
* MozillaFirefox-140.6.0-150200.152.213.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* MozillaFirefox-devel-140.6.0-150200.152.213.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-translations-other-140.6.0-150200.152.213.1
* MozillaFirefox-debuginfo-140.6.0-150200.152.213.1
* MozillaFirefox-debugsource-140.6.0-150200.152.213.1
* MozillaFirefox-translations-common-140.6.0-150200.152.213.1
* MozillaFirefox-140.6.0-150200.152.213.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* MozillaFirefox-devel-140.6.0-150200.152.213.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* MozillaFirefox-translations-other-140.6.0-150200.152.213.1
* MozillaFirefox-debuginfo-140.6.0-150200.152.213.1
* MozillaFirefox-debugsource-140.6.0-150200.152.213.1
* MozillaFirefox-translations-common-140.6.0-150200.152.213.1
* MozillaFirefox-140.6.0-150200.152.213.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* MozillaFirefox-devel-140.6.0-150200.152.213.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* MozillaFirefox-translations-other-140.6.0-150200.152.213.1
* MozillaFirefox-debuginfo-140.6.0-150200.152.213.1
* MozillaFirefox-debugsource-140.6.0-150200.152.213.1
* MozillaFirefox-translations-common-140.6.0-150200.152.213.1
* MozillaFirefox-140.6.0-150200.152.213.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* MozillaFirefox-devel-140.6.0-150200.152.213.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* MozillaFirefox-translations-other-140.6.0-150200.152.213.1
* MozillaFirefox-debuginfo-140.6.0-150200.152.213.1
* MozillaFirefox-debugsource-140.6.0-150200.152.213.1
* MozillaFirefox-translations-common-140.6.0-150200.152.213.1
* MozillaFirefox-140.6.0-150200.152.213.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* MozillaFirefox-devel-140.6.0-150200.152.213.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* MozillaFirefox-translations-other-140.6.0-150200.152.213.1
* MozillaFirefox-debuginfo-140.6.0-150200.152.213.1
* MozillaFirefox-debugsource-140.6.0-150200.152.213.1
* MozillaFirefox-translations-common-140.6.0-150200.152.213.1
* MozillaFirefox-140.6.0-150200.152.213.1
* SUSE Enterprise Storage 7.1 (noarch)
* MozillaFirefox-devel-140.6.0-150200.152.213.1
## References:
* https://www.suse.com/security/cve/CVE-2025-14321.html
* https://www.suse.com/security/cve/CVE-2025-14322.html
* https://www.suse.com/security/cve/CVE-2025-14323.html
* https://www.suse.com/security/cve/CVE-2025-14324.html
* https://www.suse.com/security/cve/CVE-2025-14325.html
* https://www.suse.com/security/cve/CVE-2025-14328.html
* https://www.suse.com/security/cve/CVE-2025-14329.html
* https://www.suse.com/security/cve/CVE-2025-14330.html
* https://www.suse.com/security/cve/CVE-2025-14331.html
* https://www.suse.com/security/cve/CVE-2025-14333.html
* https://bugzilla.suse.com/show_bug.cgi?id=1254551
SUSE-SU-2025:4425-1: moderate: Security update for cups
# Security update for cups
Announcement ID: SUSE-SU-2025:4425-1
Release Date: 2025-12-17T11:20:35Z
Rating: moderate
References:
* bsc#1244057
* bsc#1254353
Cross-References:
* CVE-2025-58436
CVSS scores:
* CVE-2025-58436 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-58436 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-58436 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-58436 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP6
* Basesystem Module 15-SP7
* Desktop Applications Module 15-SP6
* Desktop Applications Module 15-SP7
* Development Tools Module 15-SP6
* Development Tools Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.2
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability and has one security fix can now be
installed.
## Description:
This update for cups fixes the following issues:
Security issues fixed:
* CVE-2025-58436: single client sending slow messages to cupsd can delay the
application and make it unusable for other clients (bsc#1244057).
Other issues fixed:
* Update the CVE-2025-58436 patch to fix a regression that causes GTK
applications to hang (bsc#1254353).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-4425=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4425=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4425=1
* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-4425=1
* Desktop Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-4425=1
* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-4425=1
* Development Tools Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-4425=1
* SUSE Linux Enterprise Micro 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4425=1
* SUSE Linux Enterprise Micro for Rancher 5.2
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-4425=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-4425=1
* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-4425=1
* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-4425=1
* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-4425=1
* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-4425=1
## Package List:
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* libcups2-debuginfo-2.2.7-150000.3.83.1
* libcups2-2.2.7-150000.3.83.1
* cups-debuginfo-2.2.7-150000.3.83.1
* cups-debugsource-2.2.7-150000.3.83.1
* cups-config-2.2.7-150000.3.83.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* libcups2-debuginfo-2.2.7-150000.3.83.1
* libcupsmime1-2.2.7-150000.3.83.1
* libcupsimage2-debuginfo-2.2.7-150000.3.83.1
* libcupsmime1-debuginfo-2.2.7-150000.3.83.1
* cups-client-debuginfo-2.2.7-150000.3.83.1
* libcups2-2.2.7-150000.3.83.1
* cups-2.2.7-150000.3.83.1
* cups-debuginfo-2.2.7-150000.3.83.1
* libcupscgi1-2.2.7-150000.3.83.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.83.1
* libcupscgi1-debuginfo-2.2.7-150000.3.83.1
* cups-debugsource-2.2.7-150000.3.83.1
* libcupsppdc1-2.2.7-150000.3.83.1
* cups-config-2.2.7-150000.3.83.1
* cups-devel-2.2.7-150000.3.83.1
* libcupsimage2-2.2.7-150000.3.83.1
* cups-client-2.2.7-150000.3.83.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* libcups2-debuginfo-2.2.7-150000.3.83.1
* libcupsmime1-2.2.7-150000.3.83.1
* libcupsimage2-debuginfo-2.2.7-150000.3.83.1
* libcupsmime1-debuginfo-2.2.7-150000.3.83.1
* cups-client-debuginfo-2.2.7-150000.3.83.1
* libcups2-2.2.7-150000.3.83.1
* cups-2.2.7-150000.3.83.1
* cups-debuginfo-2.2.7-150000.3.83.1
* libcupscgi1-2.2.7-150000.3.83.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.83.1
* libcupscgi1-debuginfo-2.2.7-150000.3.83.1
* cups-debugsource-2.2.7-150000.3.83.1
* libcupsppdc1-2.2.7-150000.3.83.1
* cups-config-2.2.7-150000.3.83.1
* cups-devel-2.2.7-150000.3.83.1
* libcupsimage2-2.2.7-150000.3.83.1
* cups-client-2.2.7-150000.3.83.1
* Desktop Applications Module 15-SP6 (x86_64)
* libcups2-32bit-2.2.7-150000.3.83.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.83.1
* Desktop Applications Module 15-SP7 (x86_64)
* libcups2-32bit-2.2.7-150000.3.83.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.83.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* cups-ddk-debuginfo-2.2.7-150000.3.83.1
* cups-debugsource-2.2.7-150000.3.83.1
* cups-ddk-2.2.7-150000.3.83.1
* cups-debuginfo-2.2.7-150000.3.83.1
* Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* cups-ddk-debuginfo-2.2.7-150000.3.83.1
* cups-debugsource-2.2.7-150000.3.83.1
* cups-ddk-2.2.7-150000.3.83.1
* cups-debuginfo-2.2.7-150000.3.83.1
* SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
* libcups2-debuginfo-2.2.7-150000.3.83.1
* libcups2-2.2.7-150000.3.83.1
* cups-debuginfo-2.2.7-150000.3.83.1
* cups-debugsource-2.2.7-150000.3.83.1
* cups-config-2.2.7-150000.3.83.1
* SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
* libcups2-debuginfo-2.2.7-150000.3.83.1
* libcups2-2.2.7-150000.3.83.1
* cups-debuginfo-2.2.7-150000.3.83.1
* cups-debugsource-2.2.7-150000.3.83.1
* cups-config-2.2.7-150000.3.83.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* libcups2-debuginfo-2.2.7-150000.3.83.1
* libcupsmime1-2.2.7-150000.3.83.1
* cups-ddk-2.2.7-150000.3.83.1
* libcupsimage2-debuginfo-2.2.7-150000.3.83.1
* libcupsmime1-debuginfo-2.2.7-150000.3.83.1
* cups-client-debuginfo-2.2.7-150000.3.83.1
* libcups2-2.2.7-150000.3.83.1
* cups-2.2.7-150000.3.83.1
* cups-debuginfo-2.2.7-150000.3.83.1
* libcupscgi1-2.2.7-150000.3.83.1
* libcupsppdc1-debuginfo-2.2.7-150000.3.83.1
* libcupscgi1-debuginfo-2.2.7-150000.3.83.1
* cups-debugsource-2.2.7-150000.3.83.1
* libcupsppdc1-2.2.7-150000.3.83.1
* cups-config-2.2.7-150000.3.83.1
* cups-ddk-debuginfo-2.2.7-150000.3.83.1
* cups-devel-2.2.7-150000.3.83.1
* libcupsimage2-2.2.7-150000.3.83.1
* cups-client-2.2.7-150000.3.83.1
* openSUSE Leap 15.6 (x86_64)
* libcupscgi1-32bit-2.2.7-150000.3.83.1
* libcups2-32bit-debuginfo-2.2.7-150000.3.83.1
* libcups2-32bit-2.2.7-150000.3.83.1
* libcupsimage2-32bit-debuginfo-2.2.7-150000.3.83.1
* libcupsmime1-32bit-2.2.7-150000.3.83.1
* libcupsmime1-32bit-debuginfo-2.2.7-150000.3.83.1
* libcupscgi1-32bit-debuginfo-2.2.7-150000.3.83.1
* libcupsppdc1-32bit-2.2.7-150000.3.83.1
* cups-devel-32bit-2.2.7-150000.3.83.1
* libcupsppdc1-32bit-debuginfo-2.2.7-150000.3.83.1
* libcupsimage2-32bit-2.2.7-150000.3.83.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* libcups2-debuginfo-2.2.7-150000.3.83.1
* libcups2-2.2.7-150000.3.83.1
* cups-debuginfo-2.2.7-150000.3.83.1
* cups-debugsource-2.2.7-150000.3.83.1
* cups-config-2.2.7-150000.3.83.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* libcups2-debuginfo-2.2.7-150000.3.83.1
* libcups2-2.2.7-150000.3.83.1
* cups-debuginfo-2.2.7-150000.3.83.1
* cups-debugsource-2.2.7-150000.3.83.1
* cups-config-2.2.7-150000.3.83.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* libcups2-debuginfo-2.2.7-150000.3.83.1
* libcups2-2.2.7-150000.3.83.1
* cups-debuginfo-2.2.7-150000.3.83.1
* cups-debugsource-2.2.7-150000.3.83.1
* cups-config-2.2.7-150000.3.83.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* libcups2-debuginfo-2.2.7-150000.3.83.1
* libcups2-2.2.7-150000.3.83.1
* cups-debuginfo-2.2.7-150000.3.83.1
* cups-debugsource-2.2.7-150000.3.83.1
* cups-config-2.2.7-150000.3.83.1
## References:
* https://www.suse.com/security/cve/CVE-2025-58436.html
* https://bugzilla.suse.com/show_bug.cgi?id=1244057
* https://bugzilla.suse.com/show_bug.cgi?id=1254353
SUSE-SU-2025:4426-1: moderate: Security update for xkbcomp
# Security update for xkbcomp
Announcement ID: SUSE-SU-2025:4426-1
Release Date: 2025-12-17T11:22:48Z
Rating: moderate
References:
* bsc#1105832
Cross-References:
* CVE-2018-15853
* CVE-2018-15859
* CVE-2018-15861
* CVE-2018-15863
CVSS scores:
* CVE-2018-15853 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2018-15853 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2018-15853 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2018-15859 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2018-15859 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2018-15859 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2018-15861 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2018-15861 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2018-15861 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2018-15863 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2018-15863 ( SUSE ): 3.3 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
* CVE-2018-15863 ( NVD ): 5.5 CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Affected Products:
* Basesystem Module 15-SP6
* Basesystem Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves four vulnerabilities can now be installed.
## Description:
This update for xkbcomp fixes the following issues:
* CVE-2018-15863: NULL pointer dereference triggered by a a crafted keymap
file with a no-op modmask expression can lead to a crash (bsc#1105832).
* CVE-2018-15861: NULL pointer dereference triggered by a crafted keymap file
that induces an `xkb_intern_atom` failure can lead to a crash (bsc#1105832).
* CVE-2018-15859: NULL pointer dereference triggered by a specially a crafted
keymap file can lead to a crash (bsc#1105832).
* CVE-2018-15853: endless recursion triggered by a crafted keymap file that
induces boolean negation can lead to a crash (bsc#1105832).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-4426=1
* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-4426=1
* Basesystem Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-4426=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* xkbcomp-devel-1.4.1-150000.3.6.1
* xkbcomp-1.4.1-150000.3.6.1
* xkbcomp-debugsource-1.4.1-150000.3.6.1
* xkbcomp-debuginfo-1.4.1-150000.3.6.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* xkbcomp-devel-1.4.1-150000.3.6.1
* xkbcomp-1.4.1-150000.3.6.1
* xkbcomp-debugsource-1.4.1-150000.3.6.1
* xkbcomp-debuginfo-1.4.1-150000.3.6.1
* Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* xkbcomp-devel-1.4.1-150000.3.6.1
* xkbcomp-1.4.1-150000.3.6.1
* xkbcomp-debugsource-1.4.1-150000.3.6.1
* xkbcomp-debuginfo-1.4.1-150000.3.6.1
## References:
* https://www.suse.com/security/cve/CVE-2018-15853.html
* https://www.suse.com/security/cve/CVE-2018-15859.html
* https://www.suse.com/security/cve/CVE-2018-15861.html
* https://www.suse.com/security/cve/CVE-2018-15863.html
* https://bugzilla.suse.com/show_bug.cgi?id=1105832