SUSE 5495 Published by

There are several security updates available for SUSE Linux. Important and critical security updates include a fix for netty, netty-tcnative, and regionServiceClientConfig for Azure, EC2, and GCE, which have been rated as important or critical. Additionally, there are two moderate updates for kernel-devel-6.16.5-1.1 and java-1_8_0-openjdk-1.8.0.462-1.1.

SUSE-SU-2025:03114-1: important: Security update for netty, netty-tcnative
openSUSE-SU-2025:15533-1: moderate: kernel-devel-6.16.5-1.1 on GA media
openSUSE-SU-2025:15532-1: moderate: java-1_8_0-openjdk-1.8.0.462-1.1 on GA media
SUSE-SU-2025:03117-1: critical: Security update for regionServiceClientConfigAzure
SUSE-SU-2025:03118-1: critical: Security update for regionServiceClientConfigEC2
SUSE-SU-2025:03119-1: critical: Security update for regionServiceClientConfigGCE
SUSE-SU-2025:03124-1: important: Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)




SUSE-SU-2025:03114-1: important: Security update for netty, netty-tcnative


# Security update for netty, netty-tcnative

Announcement ID: SUSE-SU-2025:03114-1
Release Date: 2025-09-09T10:36:11Z
Rating: important
References:

* bsc#1247991
* bsc#1249116
* bsc#1249134

Cross-References:

* CVE-2025-55163
* CVE-2025-58056
* CVE-2025-58057

CVSS scores:

* CVE-2025-55163 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-55163 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-55163 ( NVD ): 8.2
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-58056 ( NVD ): 2.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-58056 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-58057 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2025-58057 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-58057 ( NVD ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-58057 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* Development Tools Module 15-SP6
* Development Tools Module 15-SP7
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Package Hub 15 15-SP6
* SUSE Package Hub 15 15-SP7

An update that solves three vulnerabilities can now be installed.

## Description:

This update for netty, netty-tcnative fixes the following issues:

Upgrade to upstream version 4.1.126.

Security issues fixed:

* CVE-2025-58057: decompression codecs allocating a large number of buffers
after processing specially crafted input can cause a denial of service
(bsc#1249134).
* CVE-2025-58056: incorrect parsing of chunk extensions can lead to request
smuggling (bsc#1249116).
* CVE-2025-55163: "MadeYouReset" denial of serivce attack in the HTTP/2
protocol (bsc#1247991).

Other issues fixed:

* Fixes from version 4.1.126
* Fix IllegalReferenceCountException on invalid upgrade response.
* Drop unknown frame on missing stream.
* Don't try to handle incomplete upgrade request.
* Update to netty-tcnative 2.0.73Final.

* Fixes from version 4.1.124

* Fix NPE and AssertionErrors when many tasks are scheduled and cancelled.
* HTTP2: Http2ConnectionHandler should always use Http2ConnectionEncoder.
* Epoll: Correctly handle UDP packets with source port of 0.
* Fix netty-common OSGi Import-Package header.
* MqttConnectPayload.toString() includes password.

* Fixes from version 4.1.123

* Fix chunk reuse bug in adaptive allocator.
* More accurate adaptive memory usage accounting.
* Introduce size-classes for the adaptive allocator.
* Reduce magazine proliferation eagerness.
* Fix concurrent ByteBuffer access issue in AdaptiveByteBuf.getBytes.
* Fix possible buffer corruption caused by incorrect setCharSequence(...)
implementation.
* AdaptiveByteBuf: Fix AdaptiveByteBuf.maxFastWritableBytes() to take
writerIndex() into account.
* Optimize capacity bumping for adaptive ByteBufs.
* AbstractDnsRecord: equals() and hashCode() to ignore name field's case.
* Backport Unsafe guards.
* Guard recomputed offset access with hasUnsafe.
* HTTP2: Always produce a RST frame on stream exception.
* Correct what artifacts included in netty-bom.

* Fixes from version 4.1.122

* DirContextUtils.addNameServer(...) should just catch Exception internally.
* Make public API specify explicit maxAllocation to prevent OOM.
* Fix concurrent ByteBuf write access bug in adaptive allocator.
* Fix transport-native-kqueue Bundle-SymbolicNames.
* Fix resolver-dns-native-macos Bundle-SymbolicNames.
* Always correctly calculate the memory address of the ByteBuf even if
sun.misc.Unsafe is not usable.
* Upgrade lz4 dependencies as the old version did not correctly handle
ByteBuffer that have an arrayOffset > 0.
* Optimize ByteBuf.setCharSequence for adaptive allocator.
* Kqueue: Fix registration failure when fd is reused.
* Make JdkZlibEncoder accept Deflater.DEFAULT_COMPRESSION as level.
* Ensure OpenSsl.availableJavaCipherSuites does not contain null values.
* Always prefer direct buffers for pooled allocators if not explicit disabled.
* Update to netty-tcnative 2.0.72.Final.
* Re-enable sun.misc.Unsafe by default on Java 24+.
* Kqueue: Delay removal from registration map to fix noisy warnings.

* Fixes from version 4.1.121

* Epoll.isAvailable() returns false on Ubuntu 20.04/22.04 arch amd64.
* Fix transport-native-epoll Bundle-SymbolicNames.

* Fixes from version 4.1.120

* Fix flawed termination condition check in
HttpPostRequestEncoder#encodeNextChunkUrlEncoded(int) for current
InterfaceHttpData.
* Exposed decoderEnforceMaxConsecutiveEmptyDataFrames and
decoderEnforceMaxRstFramesPerWindow.
* ThreadExecutorMap must restore old EventExecutor.
* Make Recycler virtual thread friendly.
* Disable sun.misc.Unsafe by default on Java 24+.
* Adaptive: Correctly enforce leak detection when using
AdaptiveByteBufAllocator.
* Add suppressed exception to original cause when calling Future.sync*.
* Add SETTINGS_ENABLE_CONNECT_PROTOCOL to the default HTTP/2 settings.
* Correct computation for suboptimal chunk retirement probability.
* Fix bug in method AdaptivePoolingAllocator.allocateWithoutLock(...).
* Fix a Bytebuf leak in TcpDnsQueryDecoder.
* SSL: Clear native error if named group is not supported.
* WebSocketClientCompressionHandler shouldn't claim window bits support when
jzlib is not available.
* Fix the assignment error of maxQoS parameter in ConnAck Properties.

* Fixes from version 4.1.119

* Replace SSL assertion with explicit record length check.
* Fix NPE when upgrade message fails to aggregate.
* SslHandler: Fix possible NPE when executor is used for delegating.
* Consistently add channel info in HTTP/2 logs.
* Add QueryStringDecoder option to leave '+' alone.
* Use initialized BouncyCastle providers when available.

* Fix pom.xml errors that will be fatal with Maven 4

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-3114=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-3114=1

* SUSE Linux Enterprise Server 15 SP3 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-3114=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-3114=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-3114=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-3114=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-3114=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-3114=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2025-3114=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-3114=1

* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-3114=1

* Development Tools Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-3114=1

* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-3114=1

* SUSE Package Hub 15 15-SP7
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-3114=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-3114=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-3114=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-3114=1

## Package List:

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* netty-tcnative-2.0.73-150200.3.30.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* netty-tcnative-2.0.73-150200.3.30.1
* SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64)
* netty-tcnative-2.0.73-150200.3.30.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* netty-tcnative-2.0.73-150200.3.30.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* netty-tcnative-2.0.73-150200.3.30.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* netty-tcnative-2.0.73-150200.3.30.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* netty-tcnative-2.0.73-150200.3.30.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* netty-tcnative-2.0.73-150200.3.30.1
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* netty-tcnative-2.0.73-150200.3.30.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* netty-4.1.126-150200.4.34.1
* netty-tcnative-2.0.73-150200.3.30.1
* openSUSE Leap 15.6 (noarch)
* netty-tcnative-javadoc-2.0.73-150200.3.30.1
* netty-javadoc-4.1.126-150200.4.34.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* netty-tcnative-2.0.73-150200.3.30.1
* Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* netty-tcnative-debugsource-2.0.73-150200.3.30.1
* netty-tcnative-2.0.73-150200.3.30.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* netty-4.1.126-150200.4.34.1
* SUSE Package Hub 15 15-SP6 (noarch)
* netty-javadoc-4.1.126-150200.4.34.1
* SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64)
* netty-4.1.126-150200.4.34.1
* SUSE Package Hub 15 15-SP7 (noarch)
* netty-javadoc-4.1.126-150200.4.34.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* netty-tcnative-2.0.73-150200.3.30.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* netty-tcnative-2.0.73-150200.3.30.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* netty-tcnative-2.0.73-150200.3.30.1

## References:

* https://www.suse.com/security/cve/CVE-2025-55163.html
* https://www.suse.com/security/cve/CVE-2025-58056.html
* https://www.suse.com/security/cve/CVE-2025-58057.html
* https://bugzilla.suse.com/show_bug.cgi?id=1247991
* https://bugzilla.suse.com/show_bug.cgi?id=1249116
* https://bugzilla.suse.com/show_bug.cgi?id=1249134



openSUSE-SU-2025:15533-1: moderate: kernel-devel-6.16.5-1.1 on GA media


# kernel-devel-6.16.5-1.1 on GA media

Announcement ID: openSUSE-SU-2025:15533-1
Rating: moderate

Cross-References:

* CVE-2025-38652

CVSS scores:

* CVE-2025-38652 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-38652 ( SUSE ): 6.9 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves one vulnerability can now be installed.

## Description:

These are all security issues fixed in the kernel-devel-6.16.5-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* kernel-devel 6.16.5-1.1
* kernel-macros 6.16.5-1.1
* kernel-source 6.16.5-1.1
* kernel-source-vanilla 6.16.5-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-38652.html



openSUSE-SU-2025:15532-1: moderate: java-1_8_0-openjdk-1.8.0.462-1.1 on GA media


# java-1_8_0-openjdk-1.8.0.462-1.1 on GA media

Announcement ID: openSUSE-SU-2025:15532-1
Rating: moderate

Cross-References:

* CVE-2025-30749
* CVE-2025-30754
* CVE-2025-30761
* CVE-2025-50106

CVSS scores:

* CVE-2025-30749 ( SUSE ): 7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
* CVE-2025-30749 ( SUSE ): 8.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2025-30754 ( SUSE ): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2025-30754 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-30761 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2025-50106 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Tumbleweed

An update that solves 4 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the java-1_8_0-openjdk-1.8.0.462-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* java-1_8_0-openjdk 1.8.0.462-1.1
* java-1_8_0-openjdk-accessibility 1.8.0.462-1.1
* java-1_8_0-openjdk-demo 1.8.0.462-1.1
* java-1_8_0-openjdk-devel 1.8.0.462-1.1
* java-1_8_0-openjdk-headless 1.8.0.462-1.1
* java-1_8_0-openjdk-javadoc 1.8.0.462-1.1
* java-1_8_0-openjdk-src 1.8.0.462-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-30749.html
* https://www.suse.com/security/cve/CVE-2025-30754.html
* https://www.suse.com/security/cve/CVE-2025-30761.html
* https://www.suse.com/security/cve/CVE-2025-50106.html



SUSE-SU-2025:03117-1: critical: Security update for regionServiceClientConfigAzure


# Security update for regionServiceClientConfigAzure

Announcement ID: SUSE-SU-2025:03117-1
Release Date: 2025-09-09T12:58:06Z
Rating: critical
References:

* bsc#1243419
* bsc#1246995

Affected Products:

* openSUSE Leap 15.6
* Public Cloud Module 15-SP3
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* Public Cloud Module 15-SP6
* Public Cloud Module 15-SP7
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3

An update that has two security fixes can now be installed.

## Description:

This update for regionServiceClientConfigAzure contains the following fixes:

* Update to version 3.0.0.(bsc#1246995)
* SLE 16 python-requests requires SSL v3 certificates. Update 2 region server
certs to support SLE 16 when it gets released.

* Update dependency name for metadata package, name change in SLE 16.
(bsc#1243419)

* Replacing certificate for rgnsrv-azure-southeastasia to get rid of weird
chain cert

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2025-3117=1

* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-3117=1

* Public Cloud Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2025-3117=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-3117=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-3117=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-3117=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-3117=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-3117=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-3117=1

* Public Cloud Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2025-3117=1

* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2025-3117=1

## Package List:

* Public Cloud Module 15-SP5 (noarch)
* regionServiceClientConfigAzure-3.0.0-150000.3.28.1
* Public Cloud Module 15-SP6 (noarch)
* regionServiceClientConfigAzure-3.0.0-150000.3.28.1
* Public Cloud Module 15-SP7 (noarch)
* regionServiceClientConfigAzure-3.0.0-150000.3.28.1
* openSUSE Leap 15.6 (noarch)
* regionServiceClientConfigAzure-3.0.0-150000.3.28.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* regionServiceClientConfigAzure-3.0.0-150000.3.28.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* regionServiceClientConfigAzure-3.0.0-150000.3.28.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* regionServiceClientConfigAzure-3.0.0-150000.3.28.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* regionServiceClientConfigAzure-3.0.0-150000.3.28.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* regionServiceClientConfigAzure-3.0.0-150000.3.28.1
* Public Cloud Module 15-SP3 (noarch)
* regionServiceClientConfigAzure-3.0.0-150000.3.28.1
* Public Cloud Module 15-SP4 (noarch)
* regionServiceClientConfigAzure-3.0.0-150000.3.28.1

## References:

* https://bugzilla.suse.com/show_bug.cgi?id=1243419
* https://bugzilla.suse.com/show_bug.cgi?id=1246995



SUSE-SU-2025:03118-1: critical: Security update for regionServiceClientConfigEC2


# Security update for regionServiceClientConfigEC2

Announcement ID: SUSE-SU-2025:03118-1
Release Date: 2025-09-09T12:59:06Z
Rating: critical
References:

* bsc#1243419
* bsc#1246995

Affected Products:

* openSUSE Leap 15.6
* Public Cloud Module 15-SP3
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* Public Cloud Module 15-SP6
* Public Cloud Module 15-SP7
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3

An update that has two security fixes can now be installed.

## Description:

This update for regionServiceClientConfigEC2 contains the following fixes:

* Update to version 5.0.0. (bsc#1246995)
* SLE 16 python-requests requires SSL v3 certificates. Update 2 region server
certs to support SLE 16 when it gets released.

* Update dependency to accomodate metadata binary package name change in SLE
16. (bsc#1243419)

* New 4096 certificate for rgnsrv-ec2-us-east1

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-3118=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-3118=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-3118=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-3118=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-3118=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-3118=1

* Public Cloud Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2025-3118=1

* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2025-3118=1

* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2025-3118=1

* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-3118=1

* Public Cloud Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2025-3118=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* regionServiceClientConfigEC2-5.0.0-150000.3.38.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* regionServiceClientConfigEC2-5.0.0-150000.3.38.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* regionServiceClientConfigEC2-5.0.0-150000.3.38.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* regionServiceClientConfigEC2-5.0.0-150000.3.38.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* regionServiceClientConfigEC2-5.0.0-150000.3.38.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* regionServiceClientConfigEC2-5.0.0-150000.3.38.1
* Public Cloud Module 15-SP3 (noarch)
* regionServiceClientConfigEC2-5.0.0-150000.3.38.1
* Public Cloud Module 15-SP4 (noarch)
* regionServiceClientConfigEC2-5.0.0-150000.3.38.1
* Public Cloud Module 15-SP5 (noarch)
* regionServiceClientConfigEC2-5.0.0-150000.3.38.1
* Public Cloud Module 15-SP6 (noarch)
* regionServiceClientConfigEC2-5.0.0-150000.3.38.1
* Public Cloud Module 15-SP7 (noarch)
* regionServiceClientConfigEC2-5.0.0-150000.3.38.1

## References:

* https://bugzilla.suse.com/show_bug.cgi?id=1243419
* https://bugzilla.suse.com/show_bug.cgi?id=1246995



SUSE-SU-2025:03119-1: critical: Security update for regionServiceClientConfigGCE


# Security update for regionServiceClientConfigGCE

Announcement ID: SUSE-SU-2025:03119-1
Release Date: 2025-09-09T12:59:59Z
Rating: critical
References:

* bsc#1242063
* bsc#1246995

Affected Products:

* openSUSE Leap 15.6
* Public Cloud Module 15-SP3
* Public Cloud Module 15-SP4
* Public Cloud Module 15-SP5
* Public Cloud Module 15-SP6
* Public Cloud Module 15-SP7
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Manager Proxy 4.2
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.2
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.2
* SUSE Manager Server 4.3

An update that has two security fixes can now be installed.

## Description:

This update for regionServiceClientConfigGCE contains the following fixes:

* Update to version 5.0.0 (bsc#1246995)
* SLE 16 python-requests requires SSL v3 certificates. Update 2 region server
certs to support SLE 16 when it gets released.

* Update conditional to handle name change of metadata package in SLE 16.
(bsc#1242063)

* Add noipv6 patch

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-3119=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-3119=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-3119=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-3119=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-3119=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-3119=1

* Public Cloud Module 15-SP3
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2025-3119=1

* Public Cloud Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2025-3119=1

* Public Cloud Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2025-3119=1

* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-3119=1

* Public Cloud Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2025-3119=1

## Package List:

* openSUSE Leap 15.6 (noarch)
* regionServiceClientConfigGCE-5.0.0-150000.4.18.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* regionServiceClientConfigGCE-5.0.0-150000.4.18.1
* SUSE Linux Enterprise Micro 5.3 (noarch)
* regionServiceClientConfigGCE-5.0.0-150000.4.18.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* regionServiceClientConfigGCE-5.0.0-150000.4.18.1
* SUSE Linux Enterprise Micro 5.4 (noarch)
* regionServiceClientConfigGCE-5.0.0-150000.4.18.1
* SUSE Linux Enterprise Micro 5.5 (noarch)
* regionServiceClientConfigGCE-5.0.0-150000.4.18.1
* Public Cloud Module 15-SP3 (noarch)
* regionServiceClientConfigGCE-5.0.0-150000.4.18.1
* Public Cloud Module 15-SP4 (noarch)
* regionServiceClientConfigGCE-5.0.0-150000.4.18.1
* Public Cloud Module 15-SP5 (noarch)
* regionServiceClientConfigGCE-5.0.0-150000.4.18.1
* Public Cloud Module 15-SP6 (noarch)
* regionServiceClientConfigGCE-5.0.0-150000.4.18.1
* Public Cloud Module 15-SP7 (noarch)
* regionServiceClientConfigGCE-5.0.0-150000.4.18.1

## References:

* https://bugzilla.suse.com/show_bug.cgi?id=1242063
* https://bugzilla.suse.com/show_bug.cgi?id=1246995



SUSE-SU-2025:03124-1: important: Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)


# Security update for the Linux Kernel (Live Patch 49 for SLE 15 SP3)

Announcement ID: SUSE-SU-2025:03124-1
Release Date: 2025-09-09T19:33:51Z
Rating: important
References:

* bsc#1231676
* bsc#1231943
* bsc#1232271
* bsc#1237930
* bsc#1242579
* bsc#1244235
* bsc#1245775
* bsc#1245791
* bsc#1246030

Cross-References:

* CVE-2022-49053
* CVE-2024-47674
* CVE-2024-47706
* CVE-2024-49867
* CVE-2025-21999
* CVE-2025-37890
* CVE-2025-38000
* CVE-2025-38001
* CVE-2025-38212

CVSS scores:

* CVE-2022-49053 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2022-49053 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2022-49053 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47674 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47674 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47674 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-47706 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-47706 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-47706 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49867 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-49867 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-49867 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2025-21999 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-21999 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-21999 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-37890 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38000 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38000 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38001 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38001 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-38212 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-38212 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.3
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise Live Patching 15-SP3
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP3

An update that solves nine vulnerabilities can now be installed.

## Description:

This update for the Linux Kernel 5.3.18-150300_59_179 fixes several issues.

The following security issues were fixed:

* CVE-2025-21999: proc: fix UAF in proc_get_inode() (bsc#1242579).
* CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237930).
* CVE-2025-38001: net_sched: hfsc: Address reentrant enqueue adding class to
eltree twice (bsc#1244235).
* CVE-2024-49867: btrfs: wait for fixup workers before stopping cleaner
kthread during umount (bsc#1232271).
* CVE-2025-38000: sch_hfsc: Fix qlen accounting bug when using peek in
hfsc_enqueue() (bsc#1245775).
* CVE-2025-37890: net_sched: hfsc: Fix a UAF vulnerability in class with netem
as child qdisc (bsc#1245791).
* CVE-2024-47674: mm: avoid leaving partial pfn mappings around in error case
(bsc#1231676).
* CVE-2024-47706: block, bfq: fix possible UAF for bfqq->bic with merge chain
(bsc#1231943).
* CVE-2025-38212: ipc: fix to protect IPCS lookups using RCU (bsc#1246030).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.3
zypper in -t patch SUSE-2025-3124=1

* SUSE Linux Enterprise Live Patching 15-SP3
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP3-2025-3124=1

## Package List:

* openSUSE Leap 15.3 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP3_Update_49-debugsource-15-150300.2.1
* kernel-livepatch-5_3_18-150300_59_179-default-15-150300.2.1
* kernel-livepatch-5_3_18-150300_59_179-default-debuginfo-15-150300.2.1
* openSUSE Leap 15.3 (x86_64)
* kernel-livepatch-5_3_18-150300_59_179-preempt-debuginfo-15-150300.2.1
* kernel-livepatch-5_3_18-150300_59_179-preempt-15-150300.2.1
* SUSE Linux Enterprise Live Patching 15-SP3 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP3_Update_49-debugsource-15-150300.2.1
* kernel-livepatch-5_3_18-150300_59_179-default-15-150300.2.1
* kernel-livepatch-5_3_18-150300_59_179-default-debuginfo-15-150300.2.1

## References:

* https://www.suse.com/security/cve/CVE-2022-49053.html
* https://www.suse.com/security/cve/CVE-2024-47674.html
* https://www.suse.com/security/cve/CVE-2024-47706.html
* https://www.suse.com/security/cve/CVE-2024-49867.html
* https://www.suse.com/security/cve/CVE-2025-21999.html
* https://www.suse.com/security/cve/CVE-2025-37890.html
* https://www.suse.com/security/cve/CVE-2025-38000.html
* https://www.suse.com/security/cve/CVE-2025-38001.html
* https://www.suse.com/security/cve/CVE-2025-38212.html
* https://bugzilla.suse.com/show_bug.cgi?id=1231676
* https://bugzilla.suse.com/show_bug.cgi?id=1231943
* https://bugzilla.suse.com/show_bug.cgi?id=1232271
* https://bugzilla.suse.com/show_bug.cgi?id=1237930
* https://bugzilla.suse.com/show_bug.cgi?id=1242579
* https://bugzilla.suse.com/show_bug.cgi?id=1244235
* https://bugzilla.suse.com/show_bug.cgi?id=1245775
* https://bugzilla.suse.com/show_bug.cgi?id=1245791
* https://bugzilla.suse.com/show_bug.cgi?id=1246030