SUSE 5495 Published by

Security updates have been released for SUSE Linux, which include fixes for various vulnerabilities. The affected packages are nginx, raptor, nvidia-open-driver-G06-signed, firefox-esr, and tkimg.

SUSE-SU-2025:03243-1: moderate: Security update for nginx
SUSE-SU-2025:03244-1: moderate: Security update for raptor
SUSE-SU-2025:03247-1: important: Security update for nvidia-open-driver-G06-signed
openSUSE-SU-2025:15555-1: moderate: firefox-esr-140.3.0-1.1 on GA media
openSUSE-SU-2025:15556-1: moderate: tkimg-2.1.0-1.1 on GA media




SUSE-SU-2025:03243-1: moderate: Security update for nginx


# Security update for nginx

Announcement ID: SUSE-SU-2025:03243-1
Release Date: 2025-09-17T10:24:11Z
Rating: moderate
References:

* bsc#1236851
* bsc#1248070

Cross-References:

* CVE-2025-23419
* CVE-2025-53859

CVSS scores:

* CVE-2025-23419 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-23419 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-23419 ( NVD ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-23419 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-53859 ( SUSE ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-53859 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
* CVE-2025-53859 ( NVD ): 6.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-53859 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Affected Products:

* openSUSE Leap 15.4

An update that solves two vulnerabilities can now be installed.

## Description:

This update for nginx fixes the following issues:

* CVE-2025-53859: the server side may leak arbitrary bytes during the NGINX
SMTP authentication process (bsc#1248070).
* CVE-2025-23419: session resumption can bypass client certificate
authentication requirements using TLSv1.3 (bsc#1236851).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-3243=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* nginx-debugsource-1.21.5-150400.3.12.1
* nginx-debuginfo-1.21.5-150400.3.12.1
* nginx-1.21.5-150400.3.12.1
* openSUSE Leap 15.4 (noarch)
* nginx-source-1.21.5-150400.3.12.1

## References:

* https://www.suse.com/security/cve/CVE-2025-23419.html
* https://www.suse.com/security/cve/CVE-2025-53859.html
* https://bugzilla.suse.com/show_bug.cgi?id=1236851
* https://bugzilla.suse.com/show_bug.cgi?id=1248070



SUSE-SU-2025:03244-1: moderate: Security update for raptor


# Security update for raptor

Announcement ID: SUSE-SU-2025:03244-1
Release Date: 2025-09-17T10:52:20Z
Rating: moderate
References:

* bsc#1235673
* bsc#1235674

Cross-References:

* CVE-2024-57822
* CVE-2024-57823

CVSS scores:

* CVE-2024-57822 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57822 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-57822 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-57823 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57823 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-57823 ( NVD ): 9.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Affected Products:

* Desktop Applications Module 15-SP6
* Desktop Applications Module 15-SP7
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves two vulnerabilities can now be installed.

## Description:

This update for raptor fixes the following issues:

* CVE-2024-57823: Fixed integer underflow when normalizing a URI with the
turtle parser (bsc#1235673)
* CVE-2024-57822: Fixed heap buffer overread when parsing triples with the
nquads parser (bsc#1235674)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-3244=1

* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-3244=1

* Desktop Applications Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-3244=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* raptor-2.0.15-150200.9.18.1
* libraptor-devel-2.0.15-150200.9.18.1
* libraptor2-0-2.0.15-150200.9.18.1
* raptor-debuginfo-2.0.15-150200.9.18.1
* raptor-debugsource-2.0.15-150200.9.18.1
* libraptor2-0-debuginfo-2.0.15-150200.9.18.1
* openSUSE Leap 15.6 (x86_64)
* libraptor2-0-32bit-debuginfo-2.0.15-150200.9.18.1
* libraptor2-0-32bit-2.0.15-150200.9.18.1
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* raptor-2.0.15-150200.9.18.1
* libraptor-devel-2.0.15-150200.9.18.1
* libraptor2-0-2.0.15-150200.9.18.1
* raptor-debuginfo-2.0.15-150200.9.18.1
* raptor-debugsource-2.0.15-150200.9.18.1
* libraptor2-0-debuginfo-2.0.15-150200.9.18.1
* Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64)
* raptor-2.0.15-150200.9.18.1
* libraptor-devel-2.0.15-150200.9.18.1
* libraptor2-0-2.0.15-150200.9.18.1
* raptor-debuginfo-2.0.15-150200.9.18.1
* raptor-debugsource-2.0.15-150200.9.18.1
* libraptor2-0-debuginfo-2.0.15-150200.9.18.1

## References:

* https://www.suse.com/security/cve/CVE-2024-57822.html
* https://www.suse.com/security/cve/CVE-2024-57823.html
* https://bugzilla.suse.com/show_bug.cgi?id=1235673
* https://bugzilla.suse.com/show_bug.cgi?id=1235674



SUSE-SU-2025:03247-1: important: Security update for nvidia-open-driver-G06-signed


# Security update for nvidia-open-driver-G06-signed

Announcement ID: SUSE-SU-2025:03247-1
Release Date: 2025-09-17T11:11:45Z
Rating: important
References:

* bsc#1237208
* bsc#1247528
* bsc#1247529
* bsc#1247530
* bsc#1247531
* bsc#1247532
* bsc#1247907
* bsc#1247923
* bsc#1249235
* jsc#PED-13295

Cross-References:

* CVE-2025-23277
* CVE-2025-23278
* CVE-2025-23279
* CVE-2025-23283
* CVE-2025-23286

CVSS scores:

* CVE-2025-23277 ( SUSE ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-23277 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-23278 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-23278 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2025-23279 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-23279 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-23283 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-23283 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-23286 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-23286 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* Public Cloud Module 15-SP6
* Public Cloud Module 15-SP7
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7

An update that solves five vulnerabilities, contains one feature and has four
security fixes can now be installed.

## Description:

This update for nvidia-open-driver-G06-signed fixes the following issues:

Updated CUDA variant to 580.82.07:

* CVE-2025-23277: Fixed access to memory outside bounds permitted under normal
use cases in NVIDIA Display Driver (bsc#1247528).
* CVE-2025-23278: Fixed improper index validation by issuing a call with
crafted parameters in NVIDIA Display Driver (bsc#1247529).
* CVE-2025-23286: Fixed invalid memory read in NVIDIA GPU Display Driver
(bsc#1247530).
* CVE-2025-23283: Fixed stack buffer overflow triggerable by a malicious guest
in Virtual GPU Manager in NVIDIA vGPU software (bsc#1247531).
* CVE-2025-23279: Fixed race condition that leads to privileges escalations in
NVIDIA .run Installer (bsc#1247532).

Update non-CUDA variant to 580.82.07 (bsc#1249235).

Other fixes:

* Added Requires to be provided by special versions of nvidia-modprobe and
nvidia-persitenced built against SP4 (bsc#1237208, jsc#PED-13295).
* Get rid of rule of older KMPs not to load nvidia_drm module,
which are still installed in parallel and therefore still
active (bsc#1247923).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-3247=1 openSUSE-SLE-15.6-2025-3247=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-3247=1

* Public Cloud Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-3247=1

* Public Cloud Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2025-3247=1

## Package List:

* openSUSE Leap 15.6 (x86_64)
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-580.82.07_k6.4.0_150600.8.48-150600.3.63.1
* nvidia-open-driver-G06-signed-cuda-kmp-azure-debuginfo-580.82.07_k6.4.0_150600.8.48-150600.3.63.1
* nvidia-open-driver-G06-signed-cuda-azure-devel-580.82.07-150600.3.63.1
* nvidia-open-driver-G06-signed-azure-devel-580.82.07-150600.3.63.1
* nvidia-open-driver-G06-signed-kmp-azure-580.82.07_k6.4.0_150600.8.48-150600.3.63.1
* nvidia-open-driver-G06-signed-cuda-kmp-azure-580.82.07_k6.4.0_150600.8.48-150600.3.63.1
* openSUSE Leap 15.6 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-580.82.07-150600.3.63.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.82.07_k6.4.0_150600.23.65-150600.3.63.1
* nvidia-open-driver-G06-signed-kmp-default-580.82.07_k6.4.0_150600.23.65-150600.3.63.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.82.07_k6.4.0_150600.23.65-150600.3.63.1
* nvidia-open-driver-G06-signed-default-devel-580.82.07-150600.3.63.1
* nvidia-open-driver-G06-signed-cuda-default-devel-580.82.07-150600.3.63.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.82.07_k6.4.0_150600.23.65-150600.3.63.1
* nvidia-open-driver-G06-signed-debugsource-580.82.07-150600.3.63.1
* nv-prefer-signed-open-driver-580.82.07-150600.3.63.1
* openSUSE Leap 15.6 (aarch64)
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.82.07_k6.4.0_150600.23.65-150600.3.63.1
* nvidia-open-driver-G06-signed-64kb-devel-580.82.07-150600.3.63.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.82.07_k6.4.0_150600.23.65-150600.3.63.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-580.82.07-150600.3.63.1
* nvidia-open-driver-G06-signed-kmp-64kb-580.82.07_k6.4.0_150600.23.65-150600.3.63.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.82.07_k6.4.0_150600.23.65-150600.3.63.1
* Basesystem Module 15-SP6 (aarch64 x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-580.82.07-150600.3.63.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-debuginfo-580.82.07_k6.4.0_150600.23.65-150600.3.63.1
* nvidia-open-driver-G06-signed-kmp-default-580.82.07_k6.4.0_150600.23.65-150600.3.63.1
* nvidia-open-driver-G06-signed-cuda-kmp-default-580.82.07_k6.4.0_150600.23.65-150600.3.63.1
* nvidia-open-driver-G06-signed-default-devel-580.82.07-150600.3.63.1
* nvidia-open-driver-G06-signed-cuda-default-devel-580.82.07-150600.3.63.1
* nvidia-open-driver-G06-signed-kmp-default-debuginfo-580.82.07_k6.4.0_150600.23.65-150600.3.63.1
* nvidia-open-driver-G06-signed-debugsource-580.82.07-150600.3.63.1
* nv-prefer-signed-open-driver-580.82.07-150600.3.63.1
* Basesystem Module 15-SP6 (aarch64)
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-580.82.07_k6.4.0_150600.23.65-150600.3.63.1
* nvidia-open-driver-G06-signed-64kb-devel-580.82.07-150600.3.63.1
* nvidia-open-driver-G06-signed-cuda-kmp-64kb-debuginfo-580.82.07_k6.4.0_150600.23.65-150600.3.63.1
* nvidia-open-driver-G06-signed-cuda-64kb-devel-580.82.07-150600.3.63.1
* nvidia-open-driver-G06-signed-kmp-64kb-580.82.07_k6.4.0_150600.23.65-150600.3.63.1
* nvidia-open-driver-G06-signed-kmp-64kb-debuginfo-580.82.07_k6.4.0_150600.23.65-150600.3.63.1
* Public Cloud Module 15-SP6 (x86_64)
* nvidia-open-driver-G06-signed-kmp-azure-debuginfo-580.82.07_k6.4.0_150600.8.48-150600.3.63.1
* nvidia-open-driver-G06-signed-cuda-kmp-azure-debuginfo-580.82.07_k6.4.0_150600.8.48-150600.3.63.1
* nvidia-open-driver-G06-signed-cuda-azure-devel-580.82.07-150600.3.63.1
* nvidia-open-driver-G06-signed-azure-devel-580.82.07-150600.3.63.1
* nvidia-open-driver-G06-signed-kmp-azure-580.82.07_k6.4.0_150600.8.48-150600.3.63.1
* nvidia-open-driver-G06-signed-cuda-kmp-azure-580.82.07_k6.4.0_150600.8.48-150600.3.63.1
* Public Cloud Module 15-SP7 (x86_64)
* nvidia-open-driver-G06-signed-cuda-debugsource-580.82.07-150600.3.63.1
* nvidia-open-driver-G06-signed-cuda-azure-devel-580.82.07-150600.3.63.1

## References:

* https://www.suse.com/security/cve/CVE-2025-23277.html
* https://www.suse.com/security/cve/CVE-2025-23278.html
* https://www.suse.com/security/cve/CVE-2025-23279.html
* https://www.suse.com/security/cve/CVE-2025-23283.html
* https://www.suse.com/security/cve/CVE-2025-23286.html
* https://bugzilla.suse.com/show_bug.cgi?id=1237208
* https://bugzilla.suse.com/show_bug.cgi?id=1247528
* https://bugzilla.suse.com/show_bug.cgi?id=1247529
* https://bugzilla.suse.com/show_bug.cgi?id=1247530
* https://bugzilla.suse.com/show_bug.cgi?id=1247531
* https://bugzilla.suse.com/show_bug.cgi?id=1247532
* https://bugzilla.suse.com/show_bug.cgi?id=1247907
* https://bugzilla.suse.com/show_bug.cgi?id=1247923
* https://bugzilla.suse.com/show_bug.cgi?id=1249235
* https://jira.suse.com/browse/PED-13295



openSUSE-SU-2025:15555-1: moderate: firefox-esr-140.3.0-1.1 on GA media


# firefox-esr-140.3.0-1.1 on GA media

Announcement ID: openSUSE-SU-2025:15555-1
Rating: moderate

Cross-References:

* CVE-2025-10527
* CVE-2025-10528
* CVE-2025-10529
* CVE-2025-10532
* CVE-2025-10533
* CVE-2025-10536
* CVE-2025-10537

Affected Products:

* openSUSE Tumbleweed

An update that solves 7 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the firefox-esr-140.3.0-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* firefox-esr 140.3.0-1.1
* firefox-esr-branding-upstream 140.3.0-1.1
* firefox-esr-translations-common 140.3.0-1.1
* firefox-esr-translations-other 140.3.0-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-10527.html
* https://www.suse.com/security/cve/CVE-2025-10528.html
* https://www.suse.com/security/cve/CVE-2025-10529.html
* https://www.suse.com/security/cve/CVE-2025-10532.html
* https://www.suse.com/security/cve/CVE-2025-10533.html
* https://www.suse.com/security/cve/CVE-2025-10536.html
* https://www.suse.com/security/cve/CVE-2025-10537.html



openSUSE-SU-2025:15556-1: moderate: tkimg-2.1.0-1.1 on GA media


# tkimg-2.1.0-1.1 on GA media

Announcement ID: openSUSE-SU-2025:15556-1
Rating: moderate

Cross-References:

* CVE-2025-8851
* CVE-2025-9165

CVSS scores:

* CVE-2025-8851 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-8851 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-9165 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2025-9165 ( SUSE ): 4.8 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Products:

* openSUSE Tumbleweed

An update that solves 2 vulnerabilities can now be installed.

## Description:

These are all security issues fixed in the tkimg-2.1.0-1.1 package on the GA media of openSUSE Tumbleweed.

## Package List:

* openSUSE Tumbleweed:
* tkimg 2.1.0-1.1
* tkimg-devel 2.1.0-1.1

## References:

* https://www.suse.com/security/cve/CVE-2025-8851.html
* https://www.suse.com/security/cve/CVE-2025-9165.html