SUSE-SU-2025:4005-1: important: Security update for java-1_8_0-openj9
SUSE-SU-2025:4003-1: important: Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP5)
SUSE-SU-2025:4004-1: important: Security update for the Linux Kernel (Live Patch 61 for SLE 15 SP3)
openSUSE-SU-2025-20011-1: moderate: Security update for MozillaThunderbird
SUSE-SU-2025:4039-1: important: Security update for java-1_8_0-openjdk
SUSE-SU-2025:4036-1: important: Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP4)
openSUSE-SU-2025-20008-1: important: Security update for chromium
SUSE-SU-2025:4035-1: important: Security update for erlang26
openSUSE-SU-2025-20006-1: important: Security update for MozillaThunderbird
SUSE-SU-2025:4040-1: important: Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise 15 SP4)
SUSE-SU-2025:4005-1: important: Security update for java-1_8_0-openj9
# Security update for java-1_8_0-openj9
Announcement ID: SUSE-SU-2025:4005-1
Release Date: 2025-11-10T01:04:28Z
Rating: important
References:
* bsc#1252414
* bsc#1252417
Cross-References:
* CVE-2025-53057
* CVE-2025-53066
CVSS scores:
* CVE-2025-53057 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-53057 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-53057 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-53066 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-53066 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-53066 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP6
* SUSE Package Hub 15 15-SP7
An update that solves two vulnerabilities can now be installed.
## Description:
This update for java-1_8_0-openj9 fixes the following issues:
Update to OpenJDK 8u472 build 08 with OpenJDK 0.56.0 virtual machine (including
Oracle October 2025 CPU changes):
* CVE-2025-53057: Fixed unauthenticated attacker achieving unauthorized access
to critical data or complete access (bsc#1252414)
* CVE-2025-53066: Fixed unauthenticated attacker achieving unauthorized
creation, deletion or modification access to critical data (bsc#1252417)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-4005=1
* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-4005=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-4005=1
## Package List:
* SUSE Package Hub 15 15-SP6 (ppc64le s390x)
* java-1_8_0-openj9-src-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-demo-debuginfo-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-debugsource-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-headless-debuginfo-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-demo-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-devel-debuginfo-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-accessibility-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-debuginfo-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-headless-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-devel-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-1.8.0.472-150200.3.60.3
* SUSE Package Hub 15 15-SP7 (ppc64le s390x)
* java-1_8_0-openj9-src-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-demo-debuginfo-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-debugsource-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-headless-debuginfo-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-demo-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-devel-debuginfo-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-accessibility-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-debuginfo-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-headless-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-devel-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-1.8.0.472-150200.3.60.3
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* java-1_8_0-openj9-src-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-demo-debuginfo-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-debugsource-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-headless-debuginfo-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-demo-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-devel-debuginfo-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-accessibility-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-debuginfo-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-headless-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-devel-1.8.0.472-150200.3.60.3
* java-1_8_0-openj9-1.8.0.472-150200.3.60.3
* openSUSE Leap 15.6 (noarch)
* java-1_8_0-openj9-javadoc-1.8.0.472-150200.3.60.3
## References:
* https://www.suse.com/security/cve/CVE-2025-53057.html
* https://www.suse.com/security/cve/CVE-2025-53066.html
* https://bugzilla.suse.com/show_bug.cgi?id=1252414
* https://bugzilla.suse.com/show_bug.cgi?id=1252417
SUSE-SU-2025:4003-1: important: Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP5)
# Security update for the Linux Kernel (Live Patch 30 for SLE 15 SP5)
Announcement ID: SUSE-SU-2025:4003-1
Release Date: 2025-11-09T06:04:02Z
Rating: important
References:
* bsc#1248631
* bsc#1249847
Cross-References:
* CVE-2022-50252
* CVE-2025-38664
CVSS scores:
* CVE-2022-50252 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38664 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
An update that solves two vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.14.21-150500_55_121 fixes several issues.
The following security issues were fixed:
* CVE-2025-38664: ice: Fix a null pointer dereference in
ice_copy_and_init_pkg() (bsc#1248631).
* CVE-2022-50252: igb: Do not free q_vector unless new one was allocated
(bsc#1249847).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-4003=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-4003=1
* openSUSE Leap 15.5
zypper in -t patch SUSE-2025-4002=1
* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-4002=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_44-debugsource-3-150400.4.1
* kernel-livepatch-5_14_21-150400_24_176-default-debuginfo-3-150400.4.1
* kernel-livepatch-5_14_21-150400_24_176-default-3-150400.4.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_44-debugsource-3-150400.4.1
* kernel-livepatch-5_14_21-150400_24_176-default-debuginfo-3-150400.4.1
* kernel-livepatch-5_14_21-150400_24_176-default-3-150400.4.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_30-debugsource-3-150500.4.1
* kernel-livepatch-5_14_21-150500_55_121-default-debuginfo-3-150500.4.1
* kernel-livepatch-5_14_21-150500_55_121-default-3-150500.4.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP5_Update_30-debugsource-3-150500.4.1
* kernel-livepatch-5_14_21-150500_55_121-default-debuginfo-3-150500.4.1
* kernel-livepatch-5_14_21-150500_55_121-default-3-150500.4.1
## References:
* https://www.suse.com/security/cve/CVE-2022-50252.html
* https://www.suse.com/security/cve/CVE-2025-38664.html
* https://bugzilla.suse.com/show_bug.cgi?id=1248631
* https://bugzilla.suse.com/show_bug.cgi?id=1249847
SUSE-SU-2025:4004-1: important: Security update for the Linux Kernel (Live Patch 61 for SLE 15 SP3)
# Security update for the Linux Kernel (Live Patch 61 for SLE 15 SP3)
Announcement ID: SUSE-SU-2025:4004-1
Release Date: 2025-11-09T07:03:52Z
Rating: important
References:
* bsc#1248631
* bsc#1249841
* bsc#1249847
Cross-References:
* CVE-2022-50248
* CVE-2022-50252
* CVE-2025-38664
CVSS scores:
* CVE-2022-50248 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50248 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-50252 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38664 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
An update that solves three vulnerabilities can now be installed.
## Description:
This update for the Linux Kernel 5.3.18-150300_59_218 fixes several issues.
The following security issues were fixed:
* CVE-2022-50248: wifi: iwlwifi: mvm: fix double free on tx path
(bsc#1249841).
* CVE-2025-38664: ice: Fix a null pointer dereference in
ice_copy_and_init_pkg() (bsc#1248631).
* CVE-2022-50252: igb: Do not free q_vector unless new one was allocated
(bsc#1249847).
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.3
zypper in -t patch SUSE-2025-4004=1
* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-4004=1
## Package List:
* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP3_Update_61-debugsource-2-150300.2.1
* kernel-livepatch-5_3_18-150300_59_218-default-debuginfo-2-150300.2.1
* kernel-livepatch-5_3_18-150300_59_218-default-2-150300.2.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_218-preempt-2-150300.2.1
* kernel-livepatch-5_3_18-150300_59_218-preempt-debuginfo-2-150300.2.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-5_3_18-150300_59_218-default-2-150300.2.1
## References:
* https://www.suse.com/security/cve/CVE-2022-50248.html
* https://www.suse.com/security/cve/CVE-2022-50252.html
* https://www.suse.com/security/cve/CVE-2025-38664.html
* https://bugzilla.suse.com/show_bug.cgi?id=1248631
* https://bugzilla.suse.com/show_bug.cgi?id=1249841
* https://bugzilla.suse.com/show_bug.cgi?id=1249847
openSUSE-SU-2025-20011-1: moderate: Security update for MozillaThunderbird
openSUSE security update: security update for mozillathunderbird
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2025-20011-1
Rating: moderate
References:
* bsc#1247774
* bsc#1251263
Cross-References:
* CVE-2025-11708
* CVE-2025-11709
* CVE-2025-11710
* CVE-2025-11711
* CVE-2025-11712
* CVE-2025-11713
* CVE-2025-11714
* CVE-2025-11715
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 8 vulnerabilities and has 2 bug fixes can now be installed.
Description:
This update for MozillaThunderbird fixes the following issues:
Mozilla Thunderbird 140.4:
* changed: Account Hub is now disabled by default for second
email account
* changed: Flatpak runtime has been updated to Freedesktop SDK
24.08
* fixed: Users could not read mail signed with OpenPGP v6 and
PQC keys
* fixed: Image preview in Insert Image dialog failed with CSP
error for web resources
* fixed: Emptying trash on exit did not work with some
providers
* fixed: Thunderbird could crash when applying filters
* fixed: Users were unable to override expired mail server
certificate
* fixed: Opening Website header link in RSS feed incorrectly
re-encoded URL parameters
* fixed: Security fixes
MFSA 2025-85 (bsc#1251263):
* CVE-2025-11708
Use-after-free in MediaTrackGraphImpl::GetInstance()
* CVE-2025-11709
Out of bounds read/write in a privileged process triggered by
WebGL textures
* CVE-2025-11710
Cross-process information leaked due to malicious IPC
messages
* CVE-2025-11711
Some non-writable Object properties could be modified
* CVE-2025-11712
An OBJECT tag type attribute overrode browser behavior on web
resources without a content-type
* CVE-2025-11713
Potential user-assisted code execution in ???Copy as cURL???
command
* CVE-2025-11714
Memory safety bugs fixed in Firefox ESR 115.29, Firefox ESR
140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144
* CVE-2025-11715
Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird
ESR 140.4, Firefox 144 and Thunderbird 144
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-packagehub-15=1
Package List:
- openSUSE Leap 16.0:
MozillaThunderbird-140.4.0-bp160.1.1
MozillaThunderbird-openpgp-librnp-140.4.0-bp160.1.1
MozillaThunderbird-translations-common-140.4.0-bp160.1.1
MozillaThunderbird-translations-other-140.4.0-bp160.1.1
References:
* https://www.suse.com/security/cve/CVE-2025-11708.html
* https://www.suse.com/security/cve/CVE-2025-11709.html
* https://www.suse.com/security/cve/CVE-2025-11710.html
* https://www.suse.com/security/cve/CVE-2025-11711.html
* https://www.suse.com/security/cve/CVE-2025-11712.html
* https://www.suse.com/security/cve/CVE-2025-11713.html
* https://www.suse.com/security/cve/CVE-2025-11714.html
* https://www.suse.com/security/cve/CVE-2025-11715.html
SUSE-SU-2025:4039-1: important: Security update for java-1_8_0-openjdk
# Security update for java-1_8_0-openjdk
Announcement ID: SUSE-SU-2025:4039-1
Release Date: 2025-11-10T15:05:47Z
Rating: important
References:
* bsc#1252414
* bsc#1252417
Cross-References:
* CVE-2025-53057
* CVE-2025-53066
CVSS scores:
* CVE-2025-53057 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2025-53057 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-53057 ( NVD ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-53066 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-53066 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-53066 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Affected Products:
* Legacy Module 15-SP6
* Legacy Module 15-SP7
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves two vulnerabilities can now be installed.
## Description:
This update for java-1_8_0-openjdk fixes the following issues:
Update to version jdk8u472 (icedtea-3.37.0):
* CVE-2025-53057: Fixed certificate handling leading to unauthorized creation,
deletion or modification access to critical data (bsc#1252414)
* CVE-2025-53066: Fixed Path factories leading to unauthorized access to
critical data or complete access (bsc#1252417)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4039=1
* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4039=1
* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4039=1
* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4039=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4039=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4039=1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4039=1
* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2025-4039=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-4039=1
* Legacy Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP6-2025-4039=1
* Legacy Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Legacy-15-SP7-2025-4039=1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4039=1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4039=1
## Package List:
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-src-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-accessibility-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3
* openSUSE Leap 15.6 (noarch)
* java-1_8_0-openjdk-javadoc-1.8.0.472-150000.3.114.3
* Legacy Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3
* Legacy Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* java-1_8_0-openjdk-demo-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-demo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-headless-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-debuginfo-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debugsource-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-devel-1.8.0.472-150000.3.114.3
* java-1_8_0-openjdk-debuginfo-1.8.0.472-150000.3.114.3
## References:
* https://www.suse.com/security/cve/CVE-2025-53057.html
* https://www.suse.com/security/cve/CVE-2025-53066.html
* https://bugzilla.suse.com/show_bug.cgi?id=1252414
* https://bugzilla.suse.com/show_bug.cgi?id=1252417
SUSE-SU-2025:4036-1: important: Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise 15 SP4)
# Security update for the Linux Kernel (Live Patch 34 for SUSE Linux Enterprise
15 SP4)
Announcement ID: SUSE-SU-2025:4036-1
Release Date: 2025-11-10T14:04:16Z
Rating: important
References:
* bsc#1246019
* bsc#1248631
* bsc#1249207
* bsc#1249208
* bsc#1249847
* bsc#1252946
Cross-References:
* CVE-2022-50252
* CVE-2024-53164
* CVE-2025-38617
* CVE-2025-38618
* CVE-2025-38664
CVSS scores:
* CVE-2022-50252 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53164 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38617 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38618 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38664 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves five vulnerabilities and has one security fix can now be
installed.
## Description:
This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.144 fixes
various security issues
The following security issues were fixed:
* CVE-2022-50252: igb: Do not free q_vector unless new one was allocated
(bsc#1249847).
* CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019).
* CVE-2025-38617: net/packet: fix a race in packet_set_ring() and
packet_notifier() (bsc#1249208).
* CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY
(bsc#1249207).
* CVE-2025-38664: ice: Fix a null pointer dereference in
ice_copy_and_init_pkg() (bsc#1248631).
The following non security issue was fixed:
* bsc#1249208: fix livepatching target module name (bsc#1252946)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-4036=1 SUSE-2025-4034=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-4036=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2025-4034=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_136-default-18-150400.4.1
* kernel-livepatch-5_14_21-150400_24_144-default-debuginfo-16-150400.4.1
* kernel-livepatch-SLE15-SP4_Update_34-debugsource-16-150400.4.1
* kernel-livepatch-5_14_21-150400_24_136-default-debuginfo-18-150400.4.1
* kernel-livepatch-SLE15-SP4_Update_32-debugsource-18-150400.4.1
* kernel-livepatch-5_14_21-150400_24_144-default-16-150400.4.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_136-default-18-150400.4.1
* kernel-livepatch-5_14_21-150400_24_144-default-debuginfo-16-150400.4.1
* kernel-livepatch-SLE15-SP4_Update_34-debugsource-16-150400.4.1
* kernel-livepatch-5_14_21-150400_24_136-default-debuginfo-18-150400.4.1
* kernel-livepatch-SLE15-SP4_Update_32-debugsource-18-150400.4.1
* kernel-livepatch-5_14_21-150400_24_144-default-16-150400.4.1
## References:
* https://www.suse.com/security/cve/CVE-2022-50252.html
* https://www.suse.com/security/cve/CVE-2024-53164.html
* https://www.suse.com/security/cve/CVE-2025-38617.html
* https://www.suse.com/security/cve/CVE-2025-38618.html
* https://www.suse.com/security/cve/CVE-2025-38664.html
* https://bugzilla.suse.com/show_bug.cgi?id=1246019
* https://bugzilla.suse.com/show_bug.cgi?id=1248631
* https://bugzilla.suse.com/show_bug.cgi?id=1249207
* https://bugzilla.suse.com/show_bug.cgi?id=1249208
* https://bugzilla.suse.com/show_bug.cgi?id=1249847
* https://bugzilla.suse.com/show_bug.cgi?id=1252946
openSUSE-SU-2025-20008-1: important: Security update for chromium
openSUSE security update: security update for chromium
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2025-20008-1
Rating: important
References:
* bsc#1252881
Cross-References:
* CVE-2025-12428
* CVE-2025-12429
* CVE-2025-12430
* CVE-2025-12431
* CVE-2025-12432
* CVE-2025-12433
* CVE-2025-12434
* CVE-2025-12435
* CVE-2025-12436
* CVE-2025-12437
* CVE-2025-12438
* CVE-2025-12439
* CVE-2025-12440
* CVE-2025-12441
* CVE-2025-12443
* CVE-2025-12444
* CVE-2025-12445
* CVE-2025-12446
* CVE-2025-12447
* CVE-2025-54874
CVSS scores:
* CVE-2025-54874 ( SUSE ): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-54874 ( SUSE ): 7.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 20 vulnerabilities and has one bug fix can now be installed.
Description:
This update for chromium fixes the following issues:
Chromium 142.0.7444.59, the stable channel promotion of 142.
Security fixes (boo#1252881):
* CVE-2025-12428: Type Confusion in V8
* CVE-2025-12429: Inappropriate implementation in V8
* CVE-2025-12430: Object lifecycle issue in Media
* CVE-2025-12431: Inappropriate implementation in Extensions
* CVE-2025-12432: Race in V8
* CVE-2025-12433: Inappropriate implementation in V8
* CVE-2025-12434: Race in Storage
* CVE-2025-12435: Incorrect security UI in Omnibox
* CVE-2025-12436: Policy bypass in Extensions
* CVE-2025-12437: Use after free in PageInfo
* CVE-2025-12438: Use after free in Ozone
* CVE-2025-12439: Inappropriate implementation in App-Bound Encryption
* CVE-2025-12440: Inappropriate implementation in Autofill
* CVE-2025-12441: Out of bounds read in V8
* CVE-2025-12443: Out of bounds read in WebXR
* CVE-2025-12444: Incorrect security UI in Fullscreen UI
* CVE-2025-12445: Policy bypass in Extensions
* CVE-2025-12446: Incorrect security UI in SplitView
* CVE-2025-12447: Incorrect security UI in Omnibox
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-packagehub-12=1
Package List:
- openSUSE Leap 16.0:
chromedriver-142.0.7444.59-bp160.1.1
chromium-142.0.7444.59-bp160.1.1
References:
* https://www.suse.com/security/cve/CVE-2025-12428.html
* https://www.suse.com/security/cve/CVE-2025-12429.html
* https://www.suse.com/security/cve/CVE-2025-12430.html
* https://www.suse.com/security/cve/CVE-2025-12431.html
* https://www.suse.com/security/cve/CVE-2025-12432.html
* https://www.suse.com/security/cve/CVE-2025-12433.html
* https://www.suse.com/security/cve/CVE-2025-12434.html
* https://www.suse.com/security/cve/CVE-2025-12435.html
* https://www.suse.com/security/cve/CVE-2025-12436.html
* https://www.suse.com/security/cve/CVE-2025-12437.html
* https://www.suse.com/security/cve/CVE-2025-12438.html
* https://www.suse.com/security/cve/CVE-2025-12439.html
* https://www.suse.com/security/cve/CVE-2025-12440.html
* https://www.suse.com/security/cve/CVE-2025-12441.html
* https://www.suse.com/security/cve/CVE-2025-12443.html
* https://www.suse.com/security/cve/CVE-2025-12444.html
* https://www.suse.com/security/cve/CVE-2025-12445.html
* https://www.suse.com/security/cve/CVE-2025-12446.html
* https://www.suse.com/security/cve/CVE-2025-12447.html
* https://www.suse.com/security/cve/CVE-2025-54874.html
SUSE-SU-2025:4035-1: important: Security update for erlang26
# Security update for erlang26
Announcement ID: SUSE-SU-2025:4035-1
Release Date: 2025-11-10T13:47:19Z
Rating: important
References:
* bsc#1249473
Cross-References:
* CVE-2025-48041
CVSS scores:
* CVE-2025-48041 ( SUSE ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-48041 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-48041 ( NVD ): 7.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Affected Products:
* openSUSE Leap 15.3
* openSUSE Leap 15.6
* Server Applications Module 15-SP6
* Server Applications Module 15-SP7
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
An update that solves one vulnerability can now be installed.
## Description:
This update for erlang26 fixes the following issues:
* CVE-2025-48041: Fixed exhaustion of file handles in ssh (bsc#1249473)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* Server Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-4035=1
* openSUSE Leap 15.3
zypper in -t patch SUSE-2025-4035=1
* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-4035=1
* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-4035=1
## Package List:
* Server Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* erlang26-epmd-debuginfo-26.2.1-150300.7.19.1
* erlang26-epmd-26.2.1-150300.7.19.1
* erlang26-debuginfo-26.2.1-150300.7.19.1
* erlang26-26.2.1-150300.7.19.1
* erlang26-debugsource-26.2.1-150300.7.19.1
* openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586)
* erlang26-dialyzer-26.2.1-150300.7.19.1
* erlang26-reltool-src-26.2.1-150300.7.19.1
* erlang26-doc-26.2.1-150300.7.19.1
* erlang26-wx-src-26.2.1-150300.7.19.1
* erlang26-et-src-26.2.1-150300.7.19.1
* erlang26-epmd-26.2.1-150300.7.19.1
* erlang26-debuginfo-26.2.1-150300.7.19.1
* erlang26-et-26.2.1-150300.7.19.1
* erlang26-diameter-26.2.1-150300.7.19.1
* erlang26-epmd-debuginfo-26.2.1-150300.7.19.1
* erlang26-debugger-26.2.1-150300.7.19.1
* erlang26-dialyzer-debuginfo-26.2.1-150300.7.19.1
* erlang26-wx-26.2.1-150300.7.19.1
* erlang26-observer-src-26.2.1-150300.7.19.1
* erlang26-debugger-src-26.2.1-150300.7.19.1
* erlang26-dialyzer-src-26.2.1-150300.7.19.1
* erlang26-26.2.1-150300.7.19.1
* erlang26-observer-26.2.1-150300.7.19.1
* erlang26-src-26.2.1-150300.7.19.1
* erlang26-wx-debuginfo-26.2.1-150300.7.19.1
* erlang26-reltool-26.2.1-150300.7.19.1
* erlang26-jinterface-src-26.2.1-150300.7.19.1
* erlang26-diameter-src-26.2.1-150300.7.19.1
* erlang26-jinterface-26.2.1-150300.7.19.1
* erlang26-debugsource-26.2.1-150300.7.19.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* erlang26-dialyzer-26.2.1-150300.7.19.1
* erlang26-reltool-src-26.2.1-150300.7.19.1
* erlang26-doc-26.2.1-150300.7.19.1
* erlang26-wx-src-26.2.1-150300.7.19.1
* erlang26-et-src-26.2.1-150300.7.19.1
* erlang26-epmd-26.2.1-150300.7.19.1
* erlang26-debuginfo-26.2.1-150300.7.19.1
* erlang26-et-26.2.1-150300.7.19.1
* erlang26-diameter-26.2.1-150300.7.19.1
* erlang26-epmd-debuginfo-26.2.1-150300.7.19.1
* erlang26-debugger-26.2.1-150300.7.19.1
* erlang26-dialyzer-debuginfo-26.2.1-150300.7.19.1
* erlang26-wx-26.2.1-150300.7.19.1
* erlang26-observer-src-26.2.1-150300.7.19.1
* erlang26-debugger-src-26.2.1-150300.7.19.1
* erlang26-dialyzer-src-26.2.1-150300.7.19.1
* erlang26-26.2.1-150300.7.19.1
* erlang26-observer-26.2.1-150300.7.19.1
* erlang26-src-26.2.1-150300.7.19.1
* erlang26-wx-debuginfo-26.2.1-150300.7.19.1
* erlang26-reltool-26.2.1-150300.7.19.1
* erlang26-jinterface-src-26.2.1-150300.7.19.1
* erlang26-diameter-src-26.2.1-150300.7.19.1
* erlang26-jinterface-26.2.1-150300.7.19.1
* erlang26-debugsource-26.2.1-150300.7.19.1
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* erlang26-epmd-debuginfo-26.2.1-150300.7.19.1
* erlang26-epmd-26.2.1-150300.7.19.1
* erlang26-debuginfo-26.2.1-150300.7.19.1
* erlang26-26.2.1-150300.7.19.1
* erlang26-debugsource-26.2.1-150300.7.19.1
## References:
* https://www.suse.com/security/cve/CVE-2025-48041.html
* https://bugzilla.suse.com/show_bug.cgi?id=1249473
openSUSE-SU-2025-20006-1: important: Security update for MozillaThunderbird
openSUSE security update: security update for mozillathunderbird
-------------------------------------------------------------
Announcement ID: openSUSE-SU-2025-20006-1
Rating: important
References:
* bsc#1249391
Cross-References:
* CVE-2025-10527
* CVE-2025-10528
* CVE-2025-10529
* CVE-2025-10532
* CVE-2025-10533
* CVE-2025-10536
* CVE-2025-10537
Affected Products:
openSUSE Leap 16.0
-------------------------------------------------------------
An update that solves 7 vulnerabilities and has one bug fix can now be installed.
Description:
This update for MozillaThunderbird fixes the following issues:
Changes in MozillaThunderbird:
Mozilla Thunderbird 140.3.0 ESR:
* Right-clicking 'List-ID' -> 'Unsubscribe' created double encoded
draft subject
* Thunderbird could crash on startup
* Thunderbird could crash when importing mail
* Opening Website header link in RSS feed incorrectly re-encoded
URL parameters
MFSA 2025-78 (bsc#1249391)
* CVE-2025-10527
Sandbox escape due to use-after-free in the Graphics:
Canvas2D component
* CVE-2025-10528
Sandbox escape due to undefined behavior, invalid pointer in
the Graphics: Canvas2D component
* CVE-2025-10529
Same-origin policy bypass in the Layout component
* CVE-2025-10532
Incorrect boundary conditions in the JavaScript: GC component
* CVE-2025-10533
Integer overflow in the SVG component
* CVE-2025-10536
Information disclosure in the Networking: Cache component
* CVE-2025-10537
Memory safety bugs fixed in Firefox ESR 140.3, Thunderbird
ESR 140.3, Firefox 143 and Thunderbird 143
Patch instructions:
To install this openSUSE security update use the suse recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 16.0
zypper in -t patch openSUSE-Leap-16.0-packagehub-10=1
Package List:
- openSUSE Leap 16.0:
MozillaThunderbird-140.3.0-bp160.1.1
MozillaThunderbird-openpgp-librnp-140.3.0-bp160.1.1
MozillaThunderbird-translations-common-140.3.0-bp160.1.1
MozillaThunderbird-translations-other-140.3.0-bp160.1.1
References:
* https://www.suse.com/security/cve/CVE-2025-10527.html
* https://www.suse.com/security/cve/CVE-2025-10528.html
* https://www.suse.com/security/cve/CVE-2025-10529.html
* https://www.suse.com/security/cve/CVE-2025-10532.html
* https://www.suse.com/security/cve/CVE-2025-10533.html
* https://www.suse.com/security/cve/CVE-2025-10536.html
* https://www.suse.com/security/cve/CVE-2025-10537.html
SUSE-SU-2025:4040-1: important: Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise 15 SP4)
# Security update for the Linux Kernel (Live Patch 42 for SUSE Linux Enterprise
15 SP4)
Announcement ID: SUSE-SU-2025:4040-1
Release Date: 2025-11-10T19:03:48Z
Rating: important
References:
* bsc#1246019
* bsc#1248631
* bsc#1249207
* bsc#1249208
* bsc#1249847
* bsc#1252946
Cross-References:
* CVE-2022-50252
* CVE-2024-53164
* CVE-2025-38617
* CVE-2025-38618
* CVE-2025-38664
CVSS scores:
* CVE-2022-50252 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-50252 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53164 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53164 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53164 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-38617 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38617 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38618 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38618 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38664 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
An update that solves five vulnerabilities and has one security fix can now be
installed.
## Description:
This update for the SUSE Linux Enterprise kernel 5.14.21-150400.24.170 fixes
various security issues
The following security issues were fixed:
* CVE-2022-50252: igb: Do not free q_vector unless new one was allocated
(bsc#1249847).
* CVE-2024-53164: net: sched: fix ordering of qlen adjustment (bsc#1246019).
* CVE-2025-38617: net/packet: fix a race in packet_set_ring() and
packet_notifier() (bsc#1249208).
* CVE-2025-38618: vsock: Do not allow binding to VMADDR_PORT_ANY
(bsc#1249207).
* CVE-2025-38664: ice: Fix a null pointer dereference in
ice_copy_and_init_pkg() (bsc#1248631).
The following non security issue was fixed:
* bsc#1249208: fix livepatching target module name (bsc#1252946)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-4042=1 SUSE-2025-4040=1 SUSE-2025-4041=1
* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-4042=1 SUSE-SLE-
Module-Live-Patching-15-SP4-2025-4040=1 SUSE-SLE-Module-Live-
Patching-15-SP4-2025-4041=1
## Package List:
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_170-default-debuginfo-7-150400.4.1
* kernel-livepatch-SLE15-SP4_Update_42-debugsource-7-150400.4.1
* kernel-livepatch-SLE15-SP4_Update_37-debugsource-10-150400.4.1
* kernel-livepatch-5_14_21-150400_24_153-default-debuginfo-10-150400.4.1
* kernel-livepatch-5_14_21-150400_24_153-default-10-150400.4.1
* kernel-livepatch-5_14_21-150400_24_170-default-7-150400.4.1
* kernel-livepatch-5_14_21-150400_24_158-default-9-150400.4.1
* kernel-livepatch-SLE15-SP4_Update_38-debugsource-9-150400.4.1
* kernel-livepatch-5_14_21-150400_24_158-default-debuginfo-9-150400.4.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-livepatch-5_14_21-150400_24_170-default-debuginfo-7-150400.4.1
* kernel-livepatch-SLE15-SP4_Update_42-debugsource-7-150400.4.1
* kernel-livepatch-SLE15-SP4_Update_37-debugsource-10-150400.4.1
* kernel-livepatch-5_14_21-150400_24_153-default-debuginfo-10-150400.4.1
* kernel-livepatch-5_14_21-150400_24_153-default-10-150400.4.1
* kernel-livepatch-5_14_21-150400_24_170-default-7-150400.4.1
* kernel-livepatch-5_14_21-150400_24_158-default-9-150400.4.1
* kernel-livepatch-SLE15-SP4_Update_38-debugsource-9-150400.4.1
* kernel-livepatch-5_14_21-150400_24_158-default-debuginfo-9-150400.4.1
## References:
* https://www.suse.com/security/cve/CVE-2022-50252.html
* https://www.suse.com/security/cve/CVE-2024-53164.html
* https://www.suse.com/security/cve/CVE-2025-38617.html
* https://www.suse.com/security/cve/CVE-2025-38618.html
* https://www.suse.com/security/cve/CVE-2025-38664.html
* https://bugzilla.suse.com/show_bug.cgi?id=1246019
* https://bugzilla.suse.com/show_bug.cgi?id=1248631
* https://bugzilla.suse.com/show_bug.cgi?id=1249207
* https://bugzilla.suse.com/show_bug.cgi?id=1249208
* https://bugzilla.suse.com/show_bug.cgi?id=1249847
* https://bugzilla.suse.com/show_bug.cgi?id=1252946