SUSE 5268 Published by

SUSE Linux has issued multiple security updates, featuring updates for the Linux Kernel, openvswitch, podman, buildah, glibc, openssh, java-11-openj9, and grub2:

SUSE-SU-2025:0576-1: important: Security update for the Linux Kernel
SUSE-SU-2025:0577-1: important: Security update for the Linux Kernel
SUSE-SU-2025:0578-1: important: Security update for openvswitch
SUSE-SU-2025:0579-1: moderate: Security update for podman
SUSE-SU-2025:0581-1: moderate: Security update for buildah
SUSE-SU-2025:0582-1: low: Security update for glibc
SUSE-SU-2025:0583-1: important: Security update for openvswitch
SUSE-SU-2025:0585-1: moderate: Security update for openssh
openSUSE-SU-2025:0066-1: important: Security update for java-11-openj9
SUSE-SU-2025:0586-1: important: Security update for grub2
SUSE-SU-2025:0587-1: important: Security update for grub2
SUSE-SU-2025:0588-1: important: Security update for grub2




SUSE-SU-2025:0576-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:0576-1
Release Date: 2025-02-18T12:50:33Z
Rating: important
References:

* bsc#1230697
* bsc#1231847
* bsc#1233112
* bsc#1233642
* bsc#1234025
* bsc#1234690
* bsc#1234884
* bsc#1234896
* bsc#1234931
* bsc#1235134
* bsc#1235217
* bsc#1235230
* bsc#1235249
* bsc#1235430
* bsc#1235433
* bsc#1235441
* bsc#1235451
* bsc#1235466
* bsc#1235480
* bsc#1235521
* bsc#1235584
* bsc#1235645
* bsc#1235723
* bsc#1235759
* bsc#1235764
* bsc#1235814
* bsc#1235818
* bsc#1235920
* bsc#1235969
* bsc#1236628

Cross-References:

* CVE-2024-50199
* CVE-2024-53095
* CVE-2024-53104
* CVE-2024-53144
* CVE-2024-53166
* CVE-2024-53177
* CVE-2024-54680
* CVE-2024-56600
* CVE-2024-56601
* CVE-2024-56602
* CVE-2024-56623
* CVE-2024-56631
* CVE-2024-56642
* CVE-2024-56645
* CVE-2024-56648
* CVE-2024-56650
* CVE-2024-56658
* CVE-2024-56661
* CVE-2024-56664
* CVE-2024-56704
* CVE-2024-56759
* CVE-2024-57791
* CVE-2024-57792
* CVE-2024-57798
* CVE-2024-57849
* CVE-2024-57893
* CVE-2024-57897
* CVE-2024-8805

CVSS scores:

* CVE-2024-50199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53104 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53166 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53166 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53166 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53166 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53177 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53177 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-54680 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-54680 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56600 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56602 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56602 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56623 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56623 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56623 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56631 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56631 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56642 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56642 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56645 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56645 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56648 ( SUSE ): 8.6
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56650 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-56658 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56658 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56661 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56664 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56664 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56704 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56704 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56759 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56759 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57791 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57791 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57792 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57792 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57798 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57849 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57893 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57893 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57897 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Availability Extension 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Live Patching 15-SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves 28 vulnerabilities and has two security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

* CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112).
* CVE-2024-53104: media: uvcvideo: Skip parsing frames of type
UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
* CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234884).
* CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error
paths (bsc#1234896).
* CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in
inet6_create() (bsc#1235217).
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235230).
* CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in
ieee802154_create() (bsc#1235521).
* CVE-2024-56623: scsi: qla2xxx: Fix use after free on unload (bsc#1235466).
* CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release()
(bsc#1235480).
* CVE-2024-56642: tipc: Fix use-after-free of kernel socket in
cleanup_bearer() (bsc#1235433).
* CVE-2024-56645: can: j1939: j1939_session_new(): fix skb reference counting
(bsc#1235134).
* CVE-2024-56648: net: hsr: avoid potential out-of-bound access in
fill_frame_info() (bsc#1235451).
* CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check()
(bsc#1235430).
* CVE-2024-56658: net: defer final 'struct net' free in netns dismantle
(bsc#1235441).
* CVE-2024-56664: bpf, sockmap: Fix race between element replace and close()
(bsc#1235249).
* CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).
* CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing
is enabled (bsc#1235645).
* CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining
clc data (bsc#1235759).
* CVE-2024-57792: power: supply: gpio-charger: Fix set charge current limits
(bsc#1235764).
* CVE-2024-57798: drm/dp_mst: Ensure mst_primary pointer is valid in
drm_dp_mst_handle_up_req() (bsc#1235818).
* CVE-2024-57849: s390/cpum_sf: Handle CPU hotplug remove during sampling
(bsc#1235814).
* CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages
(bsc#1235920).
* CVE-2024-57897: drm/amdkfd: Correct the migration DMA map direction
(bsc#1235969).

The following non-security bugs were fixed:

* NFS: Adjust the amount of readahead performed by NFS readdir (bsc#1231847).
* NFS: Do not flush the readdir cache in nfs_dentry_iput() (bsc#1231847).
* NFS: Improve heuristic for readdirplus (bsc#1231847).
* NFS: Trigger the "ls -l" readdir heuristic sooner (bsc#1231847).
* tipc: fix NULL deref in cleanup_bearer() (bsc#1235433).
* x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0
(git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-576=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-576=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-576=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-576=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2025-576=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-576=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-576=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-576=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-576=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-576=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-576=1

* SUSE Linux Enterprise Live Patching 15-SP4
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP4-2025-576=1
Please note that this is the initial kernel livepatch without fixes itself, this
package is later updated by separate standalone kernel livepatch updates.

* SUSE Linux Enterprise High Availability Extension 15 SP4
zypper in -t patch SUSE-SLE-Product-HA-15-SP4-2025-576=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-576=1

## Package List:

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.150.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64)
* kernel-64kb-devel-5.14.21-150400.24.150.1
* kernel-64kb-debuginfo-5.14.21-150400.24.150.1
* kernel-64kb-debugsource-5.14.21-150400.24.150.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.150.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.150.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.150.1
* kernel-default-debugsource-5.14.21-150400.24.150.1
* reiserfs-kmp-default-5.14.21-150400.24.150.1
* kernel-obs-build-5.14.21-150400.24.150.1
* kernel-obs-build-debugsource-5.14.21-150400.24.150.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.150.1
* kernel-default-debuginfo-5.14.21-150400.24.150.1
* kernel-default-base-5.14.21-150400.24.150.1.150400.24.74.1
* kernel-default-devel-5.14.21-150400.24.150.1
* kernel-syms-5.14.21-150400.24.150.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* kernel-source-5.14.21-150400.24.150.1
* kernel-devel-5.14.21-150400.24.150.1
* kernel-macros-5.14.21-150400.24.150.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64)
* kernel-64kb-devel-5.14.21-150400.24.150.1
* kernel-64kb-debuginfo-5.14.21-150400.24.150.1
* kernel-64kb-debugsource-5.14.21-150400.24.150.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.150.1.150400.24.74.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.150.1
* kernel-default-debugsource-5.14.21-150400.24.150.1
* reiserfs-kmp-default-5.14.21-150400.24.150.1
* kernel-obs-build-5.14.21-150400.24.150.1
* kernel-obs-build-debugsource-5.14.21-150400.24.150.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.150.1
* kernel-default-debuginfo-5.14.21-150400.24.150.1
* kernel-default-devel-5.14.21-150400.24.150.1
* kernel-syms-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* kernel-source-5.14.21-150400.24.150.1
* kernel-devel-5.14.21-150400.24.150.1
* kernel-macros-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch nosrc)
* kernel-docs-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.150.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.150.1
* kernel-default-debugsource-5.14.21-150400.24.150.1
* reiserfs-kmp-default-5.14.21-150400.24.150.1
* kernel-obs-build-5.14.21-150400.24.150.1
* kernel-obs-build-debugsource-5.14.21-150400.24.150.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.150.1
* kernel-default-debuginfo-5.14.21-150400.24.150.1
* kernel-default-base-5.14.21-150400.24.150.1.150400.24.74.1
* kernel-default-devel-5.14.21-150400.24.150.1
* kernel-syms-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* kernel-source-5.14.21-150400.24.150.1
* kernel-devel-5.14.21-150400.24.150.1
* kernel-macros-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.150.1
* SUSE Manager Proxy 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.150.1
* SUSE Manager Proxy 4.3 (x86_64)
* kernel-default-debugsource-5.14.21-150400.24.150.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.150.1
* kernel-default-debuginfo-5.14.21-150400.24.150.1
* kernel-default-base-5.14.21-150400.24.150.1.150400.24.74.1
* kernel-default-devel-5.14.21-150400.24.150.1
* kernel-syms-5.14.21-150400.24.150.1
* SUSE Manager Proxy 4.3 (noarch)
* kernel-source-5.14.21-150400.24.150.1
* kernel-devel-5.14.21-150400.24.150.1
* kernel-macros-5.14.21-150400.24.150.1
* SUSE Manager Retail Branch Server 4.3 (nosrc x86_64)
* kernel-default-5.14.21-150400.24.150.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* kernel-default-debugsource-5.14.21-150400.24.150.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.150.1
* kernel-default-debuginfo-5.14.21-150400.24.150.1
* kernel-default-base-5.14.21-150400.24.150.1.150400.24.74.1
* kernel-default-devel-5.14.21-150400.24.150.1
* SUSE Manager Retail Branch Server 4.3 (noarch)
* kernel-devel-5.14.21-150400.24.150.1
* kernel-macros-5.14.21-150400.24.150.1
* SUSE Manager Server 4.3 (nosrc ppc64le s390x x86_64)
* kernel-default-5.14.21-150400.24.150.1
* SUSE Manager Server 4.3 (ppc64le x86_64)
* kernel-default-base-5.14.21-150400.24.150.1.150400.24.74.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.150.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.150.1
* kernel-default-debuginfo-5.14.21-150400.24.150.1
* kernel-default-devel-5.14.21-150400.24.150.1
* kernel-syms-5.14.21-150400.24.150.1
* SUSE Manager Server 4.3 (noarch)
* kernel-source-5.14.21-150400.24.150.1
* kernel-devel-5.14.21-150400.24.150.1
* kernel-macros-5.14.21-150400.24.150.1
* SUSE Manager Server 4.3 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.150.1
* SUSE Manager Server 4.3 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.150.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.150.1
* openSUSE Leap 15.4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.150.1
* openSUSE Leap 15.4 (noarch)
* kernel-source-vanilla-5.14.21-150400.24.150.1
* kernel-source-5.14.21-150400.24.150.1
* kernel-macros-5.14.21-150400.24.150.1
* kernel-devel-5.14.21-150400.24.150.1
* kernel-docs-html-5.14.21-150400.24.150.1
* openSUSE Leap 15.4 (nosrc ppc64le x86_64)
* kernel-debug-5.14.21-150400.24.150.1
* openSUSE Leap 15.4 (ppc64le x86_64)
* kernel-debug-debugsource-5.14.21-150400.24.150.1
* kernel-debug-devel-debuginfo-5.14.21-150400.24.150.1
* kernel-debug-debuginfo-5.14.21-150400.24.150.1
* kernel-debug-devel-5.14.21-150400.24.150.1
* openSUSE Leap 15.4 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-debuginfo-5.14.21-150400.24.150.1
* kernel-kvmsmall-devel-5.14.21-150400.24.150.1
* kernel-kvmsmall-devel-debuginfo-5.14.21-150400.24.150.1
* kernel-default-base-5.14.21-150400.24.150.1.150400.24.74.1
* kernel-kvmsmall-debugsource-5.14.21-150400.24.150.1
* kernel-default-base-rebuild-5.14.21-150400.24.150.1.150400.24.74.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
* kernel-default-extra-debuginfo-5.14.21-150400.24.150.1
* kernel-default-debugsource-5.14.21-150400.24.150.1
* reiserfs-kmp-default-5.14.21-150400.24.150.1
* kernel-default-livepatch-5.14.21-150400.24.150.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.150.1
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.150.1
* kselftests-kmp-default-debuginfo-5.14.21-150400.24.150.1
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.150.1
* kselftests-kmp-default-5.14.21-150400.24.150.1
* kernel-default-optional-debuginfo-5.14.21-150400.24.150.1
* kernel-default-debuginfo-5.14.21-150400.24.150.1
* kernel-syms-5.14.21-150400.24.150.1
* gfs2-kmp-default-5.14.21-150400.24.150.1
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.150.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.150.1
* kernel-default-extra-5.14.21-150400.24.150.1
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.150.1
* kernel-obs-qa-5.14.21-150400.24.150.1
* kernel-obs-build-5.14.21-150400.24.150.1
* cluster-md-kmp-default-5.14.21-150400.24.150.1
* kernel-obs-build-debugsource-5.14.21-150400.24.150.1
* dlm-kmp-default-5.14.21-150400.24.150.1
* ocfs2-kmp-default-5.14.21-150400.24.150.1
* kernel-default-devel-5.14.21-150400.24.150.1
* kernel-default-optional-5.14.21-150400.24.150.1
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150400.24.150.1
* openSUSE Leap 15.4 (ppc64le s390x x86_64)
* kernel-livepatch-SLE15-SP4_Update_36-debugsource-1-150400.9.3.1
* kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-1-150400.9.3.1
* kernel-default-livepatch-devel-5.14.21-150400.24.150.1
* kernel-livepatch-5_14_21-150400_24_150-default-1-150400.9.3.1
* openSUSE Leap 15.4 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150400.24.150.1
* openSUSE Leap 15.4 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150400.24.150.1
* openSUSE Leap 15.4 (s390x)
* kernel-zfcpdump-debugsource-5.14.21-150400.24.150.1
* kernel-zfcpdump-debuginfo-5.14.21-150400.24.150.1
* openSUSE Leap 15.4 (nosrc)
* dtb-aarch64-5.14.21-150400.24.150.1
* openSUSE Leap 15.4 (aarch64)
* gfs2-kmp-64kb-debuginfo-5.14.21-150400.24.150.1
* dtb-altera-5.14.21-150400.24.150.1
* dtb-nvidia-5.14.21-150400.24.150.1
* dtb-rockchip-5.14.21-150400.24.150.1
* kernel-64kb-devel-5.14.21-150400.24.150.1
* dtb-cavium-5.14.21-150400.24.150.1
* reiserfs-kmp-64kb-debuginfo-5.14.21-150400.24.150.1
* gfs2-kmp-64kb-5.14.21-150400.24.150.1
* dtb-apple-5.14.21-150400.24.150.1
* ocfs2-kmp-64kb-5.14.21-150400.24.150.1
* kselftests-kmp-64kb-5.14.21-150400.24.150.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.150.1
* dtb-amd-5.14.21-150400.24.150.1
* dtb-apm-5.14.21-150400.24.150.1
* dtb-allwinner-5.14.21-150400.24.150.1
* dtb-amlogic-5.14.21-150400.24.150.1
* reiserfs-kmp-64kb-5.14.21-150400.24.150.1
* dtb-qcom-5.14.21-150400.24.150.1
* dtb-exynos-5.14.21-150400.24.150.1
* dtb-freescale-5.14.21-150400.24.150.1
* kernel-64kb-optional-debuginfo-5.14.21-150400.24.150.1
* dtb-socionext-5.14.21-150400.24.150.1
* dtb-marvell-5.14.21-150400.24.150.1
* dtb-xilinx-5.14.21-150400.24.150.1
* dtb-mediatek-5.14.21-150400.24.150.1
* dtb-sprd-5.14.21-150400.24.150.1
* dtb-hisilicon-5.14.21-150400.24.150.1
* kernel-64kb-debugsource-5.14.21-150400.24.150.1
* ocfs2-kmp-64kb-debuginfo-5.14.21-150400.24.150.1
* dtb-renesas-5.14.21-150400.24.150.1
* dlm-kmp-64kb-debuginfo-5.14.21-150400.24.150.1
* kselftests-kmp-64kb-debuginfo-5.14.21-150400.24.150.1
* dtb-amazon-5.14.21-150400.24.150.1
* dtb-broadcom-5.14.21-150400.24.150.1
* cluster-md-kmp-64kb-5.14.21-150400.24.150.1
* cluster-md-kmp-64kb-debuginfo-5.14.21-150400.24.150.1
* kernel-64kb-debuginfo-5.14.21-150400.24.150.1
* kernel-64kb-optional-5.14.21-150400.24.150.1
* dtb-arm-5.14.21-150400.24.150.1
* dtb-lg-5.14.21-150400.24.150.1
* kernel-64kb-extra-debuginfo-5.14.21-150400.24.150.1
* dlm-kmp-64kb-5.14.21-150400.24.150.1
* kernel-64kb-extra-5.14.21-150400.24.150.1
* openSUSE Leap 15.4 (aarch64 nosrc)
* kernel-64kb-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.150.1.150400.24.74.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.150.1
* kernel-default-debuginfo-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.150.1.150400.24.74.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.150.1
* kernel-default-debuginfo-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.150.1.150400.24.74.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.150.1
* kernel-default-debuginfo-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 nosrc s390x x86_64)
* kernel-default-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 x86_64)
* kernel-default-base-5.14.21-150400.24.150.1.150400.24.74.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.150.1
* kernel-default-debuginfo-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Live Patching 15-SP4 (nosrc)
* kernel-default-5.14.21-150400.24.150.1
* SUSE Linux Enterprise Live Patching 15-SP4 (ppc64le s390x x86_64)
* kernel-default-debugsource-5.14.21-150400.24.150.1
* kernel-livepatch-SLE15-SP4_Update_36-debugsource-1-150400.9.3.1
* kernel-livepatch-5_14_21-150400_24_150-default-1-150400.9.3.1
* kernel-default-livepatch-5.14.21-150400.24.150.1
* kernel-default-debuginfo-5.14.21-150400.24.150.1
* kernel-default-livepatch-devel-5.14.21-150400.24.150.1
* kernel-livepatch-5_14_21-150400_24_150-default-debuginfo-1-150400.9.3.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (aarch64 ppc64le
s390x x86_64)
* gfs2-kmp-default-debuginfo-5.14.21-150400.24.150.1
* kernel-default-debugsource-5.14.21-150400.24.150.1
* gfs2-kmp-default-5.14.21-150400.24.150.1
* cluster-md-kmp-default-5.14.21-150400.24.150.1
* ocfs2-kmp-default-debuginfo-5.14.21-150400.24.150.1
* cluster-md-kmp-default-debuginfo-5.14.21-150400.24.150.1
* dlm-kmp-default-5.14.21-150400.24.150.1
* dlm-kmp-default-debuginfo-5.14.21-150400.24.150.1
* kernel-default-debuginfo-5.14.21-150400.24.150.1
* ocfs2-kmp-default-5.14.21-150400.24.150.1
* SUSE Linux Enterprise High Availability Extension 15 SP4 (nosrc)
* kernel-default-5.14.21-150400.24.150.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
nosrc)
* kernel-64kb-5.14.21-150400.24.150.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64)
* kernel-64kb-devel-5.14.21-150400.24.150.1
* kernel-64kb-debuginfo-5.14.21-150400.24.150.1
* kernel-64kb-debugsource-5.14.21-150400.24.150.1
* kernel-64kb-devel-debuginfo-5.14.21-150400.24.150.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150400.24.150.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* reiserfs-kmp-default-debuginfo-5.14.21-150400.24.150.1
* kernel-default-debugsource-5.14.21-150400.24.150.1
* reiserfs-kmp-default-5.14.21-150400.24.150.1
* kernel-obs-build-5.14.21-150400.24.150.1
* kernel-obs-build-debugsource-5.14.21-150400.24.150.1
* kernel-default-devel-debuginfo-5.14.21-150400.24.150.1
* kernel-default-debuginfo-5.14.21-150400.24.150.1
* kernel-default-base-5.14.21-150400.24.150.1.150400.24.74.1
* kernel-default-devel-5.14.21-150400.24.150.1
* kernel-syms-5.14.21-150400.24.150.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* kernel-source-5.14.21-150400.24.150.1
* kernel-devel-5.14.21-150400.24.150.1
* kernel-macros-5.14.21-150400.24.150.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch nosrc)
* kernel-docs-5.14.21-150400.24.150.1

## References:

* https://www.suse.com/security/cve/CVE-2024-50199.html
* https://www.suse.com/security/cve/CVE-2024-53095.html
* https://www.suse.com/security/cve/CVE-2024-53104.html
* https://www.suse.com/security/cve/CVE-2024-53144.html
* https://www.suse.com/security/cve/CVE-2024-53166.html
* https://www.suse.com/security/cve/CVE-2024-53177.html
* https://www.suse.com/security/cve/CVE-2024-54680.html
* https://www.suse.com/security/cve/CVE-2024-56600.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56602.html
* https://www.suse.com/security/cve/CVE-2024-56623.html
* https://www.suse.com/security/cve/CVE-2024-56631.html
* https://www.suse.com/security/cve/CVE-2024-56642.html
* https://www.suse.com/security/cve/CVE-2024-56645.html
* https://www.suse.com/security/cve/CVE-2024-56648.html
* https://www.suse.com/security/cve/CVE-2024-56650.html
* https://www.suse.com/security/cve/CVE-2024-56658.html
* https://www.suse.com/security/cve/CVE-2024-56661.html
* https://www.suse.com/security/cve/CVE-2024-56664.html
* https://www.suse.com/security/cve/CVE-2024-56704.html
* https://www.suse.com/security/cve/CVE-2024-56759.html
* https://www.suse.com/security/cve/CVE-2024-57791.html
* https://www.suse.com/security/cve/CVE-2024-57792.html
* https://www.suse.com/security/cve/CVE-2024-57798.html
* https://www.suse.com/security/cve/CVE-2024-57849.html
* https://www.suse.com/security/cve/CVE-2024-57893.html
* https://www.suse.com/security/cve/CVE-2024-57897.html
* https://www.suse.com/security/cve/CVE-2024-8805.html
* https://bugzilla.suse.com/show_bug.cgi?id=1230697
* https://bugzilla.suse.com/show_bug.cgi?id=1231847
* https://bugzilla.suse.com/show_bug.cgi?id=1233112
* https://bugzilla.suse.com/show_bug.cgi?id=1233642
* https://bugzilla.suse.com/show_bug.cgi?id=1234025
* https://bugzilla.suse.com/show_bug.cgi?id=1234690
* https://bugzilla.suse.com/show_bug.cgi?id=1234884
* https://bugzilla.suse.com/show_bug.cgi?id=1234896
* https://bugzilla.suse.com/show_bug.cgi?id=1234931
* https://bugzilla.suse.com/show_bug.cgi?id=1235134
* https://bugzilla.suse.com/show_bug.cgi?id=1235217
* https://bugzilla.suse.com/show_bug.cgi?id=1235230
* https://bugzilla.suse.com/show_bug.cgi?id=1235249
* https://bugzilla.suse.com/show_bug.cgi?id=1235430
* https://bugzilla.suse.com/show_bug.cgi?id=1235433
* https://bugzilla.suse.com/show_bug.cgi?id=1235441
* https://bugzilla.suse.com/show_bug.cgi?id=1235451
* https://bugzilla.suse.com/show_bug.cgi?id=1235466
* https://bugzilla.suse.com/show_bug.cgi?id=1235480
* https://bugzilla.suse.com/show_bug.cgi?id=1235521
* https://bugzilla.suse.com/show_bug.cgi?id=1235584
* https://bugzilla.suse.com/show_bug.cgi?id=1235645
* https://bugzilla.suse.com/show_bug.cgi?id=1235723
* https://bugzilla.suse.com/show_bug.cgi?id=1235759
* https://bugzilla.suse.com/show_bug.cgi?id=1235764
* https://bugzilla.suse.com/show_bug.cgi?id=1235814
* https://bugzilla.suse.com/show_bug.cgi?id=1235818
* https://bugzilla.suse.com/show_bug.cgi?id=1235920
* https://bugzilla.suse.com/show_bug.cgi?id=1235969
* https://bugzilla.suse.com/show_bug.cgi?id=1236628



SUSE-SU-2025:0577-1: important: Security update for the Linux Kernel


# Security update for the Linux Kernel

Announcement ID: SUSE-SU-2025:0577-1
Release Date: 2025-02-18T12:51:54Z
Rating: important
References:

* bsc#1194869
* bsc#1216813
* bsc#1223384
* bsc#1225736
* bsc#1226848
* bsc#1226980
* bsc#1228537
* bsc#1228592
* bsc#1230341
* bsc#1230432
* bsc#1230527
* bsc#1230697
* bsc#1231088
* bsc#1231847
* bsc#1232914
* bsc#1233028
* bsc#1233055
* bsc#1233097
* bsc#1233103
* bsc#1233112
* bsc#1233464
* bsc#1233488
* bsc#1233642
* bsc#1233778
* bsc#1234024
* bsc#1234025
* bsc#1234078
* bsc#1234087
* bsc#1234153
* bsc#1234155
* bsc#1234223
* bsc#1234381
* bsc#1234683
* bsc#1234690
* bsc#1234825
* bsc#1234829
* bsc#1234832
* bsc#1234884
* bsc#1234889
* bsc#1234896
* bsc#1234899
* bsc#1234900
* bsc#1234905
* bsc#1234909
* bsc#1234916
* bsc#1234918
* bsc#1234922
* bsc#1234930
* bsc#1234931
* bsc#1234934
* bsc#1234962
* bsc#1234999
* bsc#1235002
* bsc#1235009
* bsc#1235011
* bsc#1235053
* bsc#1235057
* bsc#1235059
* bsc#1235100
* bsc#1235122
* bsc#1235123
* bsc#1235133
* bsc#1235134
* bsc#1235217
* bsc#1235222
* bsc#1235230
* bsc#1235249
* bsc#1235410
* bsc#1235430
* bsc#1235433
* bsc#1235441
* bsc#1235451
* bsc#1235458
* bsc#1235466
* bsc#1235473
* bsc#1235480
* bsc#1235491
* bsc#1235495
* bsc#1235496
* bsc#1235521
* bsc#1235557
* bsc#1235563
* bsc#1235570
* bsc#1235584
* bsc#1235611
* bsc#1235635
* bsc#1235641
* bsc#1235643
* bsc#1235645
* bsc#1235647
* bsc#1235723
* bsc#1235739
* bsc#1235747
* bsc#1235759
* bsc#1235764
* bsc#1235768
* bsc#1235806
* bsc#1235812
* bsc#1235814
* bsc#1235818
* bsc#1235842
* bsc#1235920
* bsc#1235969
* bsc#1236628

Cross-References:

* CVE-2024-26758
* CVE-2024-26943
* CVE-2024-36898
* CVE-2024-38599
* CVE-2024-41047
* CVE-2024-45019
* CVE-2024-46858
* CVE-2024-50051
* CVE-2024-50136
* CVE-2024-50142
* CVE-2024-50151
* CVE-2024-50195
* CVE-2024-50199
* CVE-2024-50210
* CVE-2024-50275
* CVE-2024-50299
* CVE-2024-53095
* CVE-2024-53103
* CVE-2024-53104
* CVE-2024-53112
* CVE-2024-53121
* CVE-2024-53127
* CVE-2024-53129
* CVE-2024-53138
* CVE-2024-53141
* CVE-2024-53144
* CVE-2024-53148
* CVE-2024-53151
* CVE-2024-53166
* CVE-2024-53169
* CVE-2024-53171
* CVE-2024-53174
* CVE-2024-53177
* CVE-2024-53208
* CVE-2024-53209
* CVE-2024-53215
* CVE-2024-53217
* CVE-2024-53224
* CVE-2024-53227
* CVE-2024-53229
* CVE-2024-53690
* CVE-2024-54680
* CVE-2024-55916
* CVE-2024-56531
* CVE-2024-56532
* CVE-2024-56533
* CVE-2024-56557
* CVE-2024-56558
* CVE-2024-56562
* CVE-2024-56567
* CVE-2024-56588
* CVE-2024-56595
* CVE-2024-56596
* CVE-2024-56597
* CVE-2024-56600
* CVE-2024-56601
* CVE-2024-56602
* CVE-2024-56623
* CVE-2024-56629
* CVE-2024-56631
* CVE-2024-56642
* CVE-2024-56644
* CVE-2024-56645
* CVE-2024-56648
* CVE-2024-56650
* CVE-2024-56658
* CVE-2024-56661
* CVE-2024-56664
* CVE-2024-56678
* CVE-2024-56681
* CVE-2024-56698
* CVE-2024-56701
* CVE-2024-56704
* CVE-2024-56722
* CVE-2024-56739
* CVE-2024-56745
* CVE-2024-56747
* CVE-2024-56754
* CVE-2024-56756
* CVE-2024-56759
* CVE-2024-56765
* CVE-2024-56776
* CVE-2024-56777
* CVE-2024-56778
* CVE-2024-57791
* CVE-2024-57792
* CVE-2024-57793
* CVE-2024-57798
* CVE-2024-57849
* CVE-2024-57850
* CVE-2024-57876
* CVE-2024-57893
* CVE-2024-57897
* CVE-2024-8805

CVSS scores:

* CVE-2024-26758 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26758 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-26943 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-36898 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L
* CVE-2024-38599 ( SUSE ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-41047 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-45019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-45019 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46858 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-46858 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50051 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50051 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50051 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50136 ( SUSE ): 0.0
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50136 ( SUSE ): 0.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
* CVE-2024-50136 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50142 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50142 ( SUSE ): 6.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
* CVE-2024-50142 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50151 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
* CVE-2024-50151 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-50151 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50195 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50195 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50199 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50210 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-50210 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50210 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50275 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50275 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-50299 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-50299 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53095 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53103 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53103 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53104 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53104 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53112 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53112 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53112 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53121 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53127 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53129 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53129 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53138 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H
* CVE-2024-53138 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53141 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53141 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53141 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53144 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53148 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53148 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53151 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53151 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53151 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53166 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53166 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53166 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53166 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53169 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53169 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53171 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53171 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53171 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53174 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53174 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53174 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53177 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53177 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53177 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53208 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53208 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53208 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53209 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53209 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-53215 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53215 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53215 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53217 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53217 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53217 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53224 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53224 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53224 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53227 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53227 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53227 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-53229 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53229 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-53690 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-53690 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54680 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-54680 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54680 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-54680 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-55916 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-55916 ( SUSE ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-55916 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56531 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56531 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56532 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56532 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56533 ( SUSE ): 4.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56533 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56557 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56557 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56558 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56558 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56558 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56562 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56562 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56567 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56567 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56567 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56588 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56588 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56588 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56595 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56595 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56595 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56596 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56596 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56596 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56597 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56597 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-56600 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56600 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56600 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56601 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56601 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56602 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56602 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56602 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56623 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56623 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56623 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56629 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56629 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56629 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56631 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56631 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56631 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56642 ( SUSE ): 7.5
CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56642 ( SUSE ): 7.1 CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56642 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56644 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56644 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56645 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56645 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56648 ( SUSE ): 8.6
CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56648 ( SUSE ): 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56648 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56650 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56650 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56650 ( NVD ): 7.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
* CVE-2024-56658 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56658 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56658 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56661 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56661 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56661 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56664 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56664 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56664 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56678 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56678 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56678 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56681 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56681 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-56698 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56698 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56698 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56701 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56701 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56704 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56704 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56704 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56722 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56722 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56722 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56739 ( SUSE ): 5.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56739 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56739 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56745 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56745 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56745 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56747 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2024-56747 ( SUSE ): 2.5 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-56747 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56754 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56754 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-56754 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56756 ( SUSE ): 5.8
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56756 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H
* CVE-2024-56756 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56759 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56759 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56759 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56765 ( SUSE ): 7.1
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56765 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56765 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-56776 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56776 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56776 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56777 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56777 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56777 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56778 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56778 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56778 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57791 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57791 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-57792 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57792 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57793 ( SUSE ): 6.2
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:H
* CVE-2024-57793 ( SUSE ): 8.4 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H
* CVE-2024-57798 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57798 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57798 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57849 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57849 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57850 ( SUSE ): 8.5
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57850 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57876 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57876 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57893 ( SUSE ): 7.3
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57893 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-57897 ( SUSE ): 6.8
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2024-57897 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-8805 ( SUSE ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8805 ( NVD ): 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-8805 ( NVD ): 8.8 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Availability Extension 15 SP5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Live Patching 15-SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves 94 vulnerabilities and has 10 security fixes can now be
installed.

## Description:

The SUSE Linux Enterprise 15 SP5 kernel was updated to receive various security
bugfixes.

The following security bugs were fixed:

* CVE-2024-36898: gpiolib: cdev: fix uninitialised kfifo (bsc#1225736).
* CVE-2024-46858: mptcp: pm: Fix uaf in __timer_delete_sync (bsc#1231088).
* CVE-2024-50142: xfrm: validate new SA's prefixlen using SA family when
sel.family is unset (bsc#1233028).
* CVE-2024-50151: smb: client: fix OOBs when building SMB2_IOCTL request
(bsc#1233055).
* CVE-2024-50199: mm/swapfile: skip HugeTLB pages for unuse_vma (bsc#1233112).
* CVE-2024-50299: sctp: properly validate chunk size in sctp_sf_ootb()
(bsc#1233488).
* CVE-2024-53104: media: uvcvideo: Skip parsing frames of type
UVC_VS_UNDEFINED in uvc_parse_format (bsc#1234025).
* CVE-2024-53141: netfilter: ipset: add missing range check in bitmap_ip_uadt
(bsc#1234381).
* CVE-2024-53166: block, bfq: fix bfqq uaf in bfq_limit_depth() (bsc#1234884).
* CVE-2024-53177: smb: prevent use-after-free due to open_cached_dir error
paths (bsc#1234896).
* CVE-2024-53209: bnxt_en: Fix receive ring space parameters when XDP is
active (bsc#1235002).
* CVE-2024-53227: scsi: bfa: Fix use-after-free in bfad_im_module_exit()
(bsc#1235011).
* CVE-2024-56588: scsi: hisi_sas: Create all dump files during debugfs
initialization (bsc#1235123).
* CVE-2024-56600: net: inet6: do not leave a dangling sk pointer in
inet6_create() (bsc#1235217).
* CVE-2024-56601: net: inet: do not leave a dangling sk pointer in
inet_create() (bsc#1235230).
* CVE-2024-56602: net: ieee802154: do not leave a dangling sk pointer in
ieee802154_create() (bsc#1235521).
* CVE-2024-56623: scsi: qla2xxx: Fix use after free on unload (bsc#1235466).
* CVE-2024-56631: scsi: sg: Fix slab-use-after-free read in sg_release()
(bsc#1235480).
* CVE-2024-56642: tipc: Fix use-after-free of kernel socket in
cleanup_bearer() (bsc#1235433).
* CVE-2024-56645: can: j1939: j1939_session_new(): fix skb reference counting
(bsc#1235134).
* CVE-2024-56648: net: hsr: avoid potential out-of-bound access in
fill_frame_info() (bsc#1235451).
* CVE-2024-56650: netfilter: x_tables: fix LED ID check in led_tg_check()
(bsc#1235430).
* CVE-2024-56658: net: defer final 'struct net' free in netns dismantle
(bsc#1235441).
* CVE-2024-56664: bpf, sockmap: Fix race between element replace and close()
(bsc#1235249).
* CVE-2024-56704: 9p/xen: fix release of IRQ (bsc#1235584).
* CVE-2024-56747: scsi: qedi: Fix a possible memory leak in
qedi_alloc_and_init_sb() (bsc#1234934).
* CVE-2024-56759: btrfs: fix use-after-free when COWing tree bock and tracing
is enabled (bsc#1235645).
* CVE-2024-57791: net/smc: check return value of sock_recvmsg when draining
clc data (bsc#1235759).
* CVE-2024-57792: power: supply: gpio-charger: Fix set charge current limits
(bsc#1235764).
* CVE-2024-57793: virt: tdx-guest: Just leak decrypted memory on unrecoverable
errors (bsc#1235768).
* CVE-2024-57798: drm/dp_mst: Ensure mst_primary pointer is valid in
drm_dp_mst_handle_up_req() (bsc#1235818).
* CVE-2024-57849: s390/cpum_sf: Handle CPU hotplug remove during sampling
(bsc#1235814).
* CVE-2024-57876: drm/dp_mst: Fix resetting msg rx state after topology
removal (bsc#1235806).
* CVE-2024-57893: ALSA: seq: oss: Fix races at processing SysEx messages
(bsc#1235920).
* CVE-2024-57897: drm/amdkfd: Correct the migration DMA map direction
(bsc#1235969).

The following non-security bugs were fixed:

* NFS: Adjust the amount of readahead performed by NFS readdir (bsc#1231847).
* NFS: Do not flush the readdir cache in nfs_dentry_iput() (bsc#1231847).
* NFS: Improve heuristic for readdirplus (bsc#1231847).
* NFS: Trigger the "ls -l" readdir heuristic sooner (bsc#1231847).
* VFS: use system_unbound_wq for delayed_mntput (bsc#1234683).
* ceph: improve error handling and short/overflow-read logic in
__ceph_sync_read() (bsc#1228592).
* ibmvnic: Free any outstanding tx skbs during scrq reset (bsc#1226980).
* netfilter: nf_tables: validate family when identifying table via handle
(bsc#1233778).
* powerpc/pseries/vas: Add close() callback in vas_vm_ops struct
(bsc#1234825).
* tipc: fix NULL deref in cleanup_bearer() (bsc#1235433).
* x86/static-call: Remove early_boot_irqs_disabled check to fix Xen PVH dom0
(git-fixes).

## Special Instructions and Notes:

* Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2025-577=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-577=1

* SUSE Linux Enterprise Live Patching 15-SP5
zypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP5-2025-577=1

* SUSE Linux Enterprise High Availability Extension 15 SP5
zypper in -t patch SUSE-SLE-Product-HA-15-SP5-2025-577=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-577=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-577=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-577=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-577=1

## Package List:

* openSUSE Leap 15.5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.94.1
* openSUSE Leap 15.5 (noarch)
* kernel-macros-5.14.21-150500.55.94.1
* kernel-source-5.14.21-150500.55.94.1
* kernel-source-vanilla-5.14.21-150500.55.94.1
* kernel-devel-5.14.21-150500.55.94.1
* kernel-docs-html-5.14.21-150500.55.94.1
* openSUSE Leap 15.5 (nosrc ppc64le x86_64)
* kernel-debug-5.14.21-150500.55.94.1
* openSUSE Leap 15.5 (ppc64le x86_64)
* kernel-debug-devel-debuginfo-5.14.21-150500.55.94.1
* kernel-debug-debugsource-5.14.21-150500.55.94.1
* kernel-debug-devel-5.14.21-150500.55.94.1
* kernel-debug-debuginfo-5.14.21-150500.55.94.1
* openSUSE Leap 15.5 (x86_64)
* kernel-default-vdso-5.14.21-150500.55.94.1
* kernel-kvmsmall-vdso-5.14.21-150500.55.94.1
* kernel-kvmsmall-vdso-debuginfo-5.14.21-150500.55.94.1
* kernel-debug-vdso-5.14.21-150500.55.94.1
* kernel-default-vdso-debuginfo-5.14.21-150500.55.94.1
* kernel-debug-vdso-debuginfo-5.14.21-150500.55.94.1
* openSUSE Leap 15.5 (aarch64 ppc64le x86_64)
* kernel-kvmsmall-devel-5.14.21-150500.55.94.1
* kernel-kvmsmall-devel-debuginfo-5.14.21-150500.55.94.1
* kernel-kvmsmall-debuginfo-5.14.21-150500.55.94.1
* kernel-kvmsmall-debugsource-5.14.21-150500.55.94.1
* kernel-default-base-rebuild-5.14.21-150500.55.94.1.150500.6.43.1
* kernel-default-base-5.14.21-150500.55.94.1.150500.6.43.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* kernel-default-devel-5.14.21-150500.55.94.1
* kernel-syms-5.14.21-150500.55.94.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.94.1
* reiserfs-kmp-default-5.14.21-150500.55.94.1
* kselftests-kmp-default-5.14.21-150500.55.94.1
* kernel-default-debugsource-5.14.21-150500.55.94.1
* kernel-default-livepatch-5.14.21-150500.55.94.1
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.94.1
* kernel-obs-build-5.14.21-150500.55.94.1
* kernel-obs-build-debugsource-5.14.21-150500.55.94.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.94.1
* kernel-default-debuginfo-5.14.21-150500.55.94.1
* ocfs2-kmp-default-5.14.21-150500.55.94.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.94.1
* kernel-obs-qa-5.14.21-150500.55.94.1
* kernel-default-optional-5.14.21-150500.55.94.1
* kselftests-kmp-default-debuginfo-5.14.21-150500.55.94.1
* kernel-default-optional-debuginfo-5.14.21-150500.55.94.1
* dlm-kmp-default-5.14.21-150500.55.94.1
* kernel-default-extra-5.14.21-150500.55.94.1
* cluster-md-kmp-default-5.14.21-150500.55.94.1
* gfs2-kmp-default-5.14.21-150500.55.94.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.94.1
* kernel-default-extra-debuginfo-5.14.21-150500.55.94.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.94.1
* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.94.1
* openSUSE Leap 15.5 (ppc64le s390x x86_64)
* kernel-default-livepatch-devel-5.14.21-150500.55.94.1
* kernel-livepatch-5_14_21-150500_55_94-default-1-150500.11.3.1
* kernel-livepatch-5_14_21-150500_55_94-default-debuginfo-1-150500.11.3.1
* kernel-livepatch-SLE15-SP5_Update_23-debugsource-1-150500.11.3.1
* openSUSE Leap 15.5 (aarch64 nosrc ppc64le x86_64)
* kernel-kvmsmall-5.14.21-150500.55.94.1
* openSUSE Leap 15.5 (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.94.1
* openSUSE Leap 15.5 (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.94.1
* kernel-zfcpdump-debugsource-5.14.21-150500.55.94.1
* openSUSE Leap 15.5 (nosrc)
* dtb-aarch64-5.14.21-150500.55.94.1
* openSUSE Leap 15.5 (aarch64)
* dtb-altera-5.14.21-150500.55.94.1
* dtb-cavium-5.14.21-150500.55.94.1
* dtb-rockchip-5.14.21-150500.55.94.1
* dtb-socionext-5.14.21-150500.55.94.1
* dtb-nvidia-5.14.21-150500.55.94.1
* ocfs2-kmp-64kb-5.14.21-150500.55.94.1
* ocfs2-kmp-64kb-debuginfo-5.14.21-150500.55.94.1
* dtb-allwinner-5.14.21-150500.55.94.1
* dtb-arm-5.14.21-150500.55.94.1
* kernel-64kb-debuginfo-5.14.21-150500.55.94.1
* dlm-kmp-64kb-debuginfo-5.14.21-150500.55.94.1
* cluster-md-kmp-64kb-5.14.21-150500.55.94.1
* cluster-md-kmp-64kb-debuginfo-5.14.21-150500.55.94.1
* dtb-marvell-5.14.21-150500.55.94.1
* kernel-64kb-optional-5.14.21-150500.55.94.1
* dtb-sprd-5.14.21-150500.55.94.1
* gfs2-kmp-64kb-5.14.21-150500.55.94.1
* dtb-hisilicon-5.14.21-150500.55.94.1
* dlm-kmp-64kb-5.14.21-150500.55.94.1
* kernel-64kb-devel-5.14.21-150500.55.94.1
* dtb-amd-5.14.21-150500.55.94.1
* dtb-qcom-5.14.21-150500.55.94.1
* kernel-64kb-optional-debuginfo-5.14.21-150500.55.94.1
* dtb-lg-5.14.21-150500.55.94.1
* kselftests-kmp-64kb-5.14.21-150500.55.94.1
* gfs2-kmp-64kb-debuginfo-5.14.21-150500.55.94.1
* dtb-renesas-5.14.21-150500.55.94.1
* dtb-broadcom-5.14.21-150500.55.94.1
* dtb-amlogic-5.14.21-150500.55.94.1
* kernel-64kb-extra-5.14.21-150500.55.94.1
* reiserfs-kmp-64kb-debuginfo-5.14.21-150500.55.94.1
* kselftests-kmp-64kb-debuginfo-5.14.21-150500.55.94.1
* dtb-amazon-5.14.21-150500.55.94.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.94.1
* reiserfs-kmp-64kb-5.14.21-150500.55.94.1
* dtb-mediatek-5.14.21-150500.55.94.1
* dtb-exynos-5.14.21-150500.55.94.1
* dtb-apm-5.14.21-150500.55.94.1
* dtb-xilinx-5.14.21-150500.55.94.1
* dtb-freescale-5.14.21-150500.55.94.1
* kernel-64kb-extra-debuginfo-5.14.21-150500.55.94.1
* kernel-64kb-debugsource-5.14.21-150500.55.94.1
* dtb-apple-5.14.21-150500.55.94.1
* openSUSE Leap 15.5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.94.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64 nosrc)
* kernel-default-5.14.21-150500.55.94.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 x86_64)
* kernel-default-base-5.14.21-150500.55.94.1.150500.6.43.1
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* kernel-default-debuginfo-5.14.21-150500.55.94.1
* kernel-default-debugsource-5.14.21-150500.55.94.1
* SUSE Linux Enterprise Live Patching 15-SP5 (nosrc)
* kernel-default-5.14.21-150500.55.94.1
* SUSE Linux Enterprise Live Patching 15-SP5 (ppc64le s390x x86_64)
* kernel-default-livepatch-devel-5.14.21-150500.55.94.1
* kernel-default-livepatch-5.14.21-150500.55.94.1
* kernel-livepatch-5_14_21-150500_55_94-default-debuginfo-1-150500.11.3.1
* kernel-default-debuginfo-5.14.21-150500.55.94.1
* kernel-livepatch-5_14_21-150500_55_94-default-1-150500.11.3.1
* kernel-default-debugsource-5.14.21-150500.55.94.1
* kernel-livepatch-SLE15-SP5_Update_23-debugsource-1-150500.11.3.1
* SUSE Linux Enterprise High Availability Extension 15 SP5 (aarch64 ppc64le
s390x x86_64)
* gfs2-kmp-default-debuginfo-5.14.21-150500.55.94.1
* dlm-kmp-default-5.14.21-150500.55.94.1
* cluster-md-kmp-default-5.14.21-150500.55.94.1
* gfs2-kmp-default-5.14.21-150500.55.94.1
* dlm-kmp-default-debuginfo-5.14.21-150500.55.94.1
* ocfs2-kmp-default-debuginfo-5.14.21-150500.55.94.1
* kernel-default-debuginfo-5.14.21-150500.55.94.1
* cluster-md-kmp-default-debuginfo-5.14.21-150500.55.94.1
* kernel-default-debugsource-5.14.21-150500.55.94.1
* ocfs2-kmp-default-5.14.21-150500.55.94.1
* SUSE Linux Enterprise High Availability Extension 15 SP5 (nosrc)
* kernel-default-5.14.21-150500.55.94.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
nosrc)
* kernel-64kb-5.14.21-150500.55.94.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64)
* kernel-64kb-devel-5.14.21-150500.55.94.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.94.1
* kernel-64kb-debuginfo-5.14.21-150500.55.94.1
* kernel-64kb-debugsource-5.14.21-150500.55.94.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150500.55.94.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* kernel-default-devel-5.14.21-150500.55.94.1
* kernel-syms-5.14.21-150500.55.94.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.94.1
* kernel-obs-build-5.14.21-150500.55.94.1
* kernel-obs-build-debugsource-5.14.21-150500.55.94.1
* kernel-default-debuginfo-5.14.21-150500.55.94.1
* kernel-default-debugsource-5.14.21-150500.55.94.1
* kernel-default-base-5.14.21-150500.55.94.1.150500.6.43.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* kernel-devel-5.14.21-150500.55.94.1
* kernel-macros-5.14.21-150500.55.94.1
* kernel-source-5.14.21-150500.55.94.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.94.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.94.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64)
* kernel-64kb-devel-5.14.21-150500.55.94.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.94.1
* kernel-64kb-debuginfo-5.14.21-150500.55.94.1
* kernel-64kb-debugsource-5.14.21-150500.55.94.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 nosrc
x86_64)
* kernel-default-5.14.21-150500.55.94.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* kernel-default-devel-5.14.21-150500.55.94.1
* kernel-syms-5.14.21-150500.55.94.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.94.1
* kernel-obs-build-5.14.21-150500.55.94.1
* kernel-obs-build-debugsource-5.14.21-150500.55.94.1
* kernel-default-debuginfo-5.14.21-150500.55.94.1
* kernel-default-debugsource-5.14.21-150500.55.94.1
* kernel-default-base-5.14.21-150500.55.94.1.150500.6.43.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* kernel-devel-5.14.21-150500.55.94.1
* kernel-macros-5.14.21-150500.55.94.1
* kernel-source-5.14.21-150500.55.94.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.94.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 nosrc)
* kernel-64kb-5.14.21-150500.55.94.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64)
* kernel-64kb-devel-5.14.21-150500.55.94.1
* kernel-64kb-devel-debuginfo-5.14.21-150500.55.94.1
* kernel-64kb-debuginfo-5.14.21-150500.55.94.1
* kernel-64kb-debugsource-5.14.21-150500.55.94.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64
nosrc)
* kernel-default-5.14.21-150500.55.94.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le x86_64)
* kernel-default-base-5.14.21-150500.55.94.1.150500.6.43.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* kernel-default-devel-5.14.21-150500.55.94.1
* kernel-syms-5.14.21-150500.55.94.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.94.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.94.1
* kernel-obs-build-5.14.21-150500.55.94.1
* kernel-obs-build-debugsource-5.14.21-150500.55.94.1
* reiserfs-kmp-default-5.14.21-150500.55.94.1
* kernel-default-debuginfo-5.14.21-150500.55.94.1
* kernel-default-debugsource-5.14.21-150500.55.94.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* kernel-devel-5.14.21-150500.55.94.1
* kernel-macros-5.14.21-150500.55.94.1
* kernel-source-5.14.21-150500.55.94.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch nosrc)
* kernel-docs-5.14.21-150500.55.94.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (nosrc s390x)
* kernel-zfcpdump-5.14.21-150500.55.94.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (s390x)
* kernel-zfcpdump-debuginfo-5.14.21-150500.55.94.1
* kernel-zfcpdump-debugsource-5.14.21-150500.55.94.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (nosrc ppc64le
x86_64)
* kernel-default-5.14.21-150500.55.94.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* kernel-default-devel-5.14.21-150500.55.94.1
* kernel-syms-5.14.21-150500.55.94.1
* kernel-default-devel-debuginfo-5.14.21-150500.55.94.1
* reiserfs-kmp-default-debuginfo-5.14.21-150500.55.94.1
* kernel-obs-build-5.14.21-150500.55.94.1
* kernel-obs-build-debugsource-5.14.21-150500.55.94.1
* reiserfs-kmp-default-5.14.21-150500.55.94.1
* kernel-default-debuginfo-5.14.21-150500.55.94.1
* kernel-default-debugsource-5.14.21-150500.55.94.1
* kernel-default-base-5.14.21-150500.55.94.1.150500.6.43.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* kernel-devel-5.14.21-150500.55.94.1
* kernel-macros-5.14.21-150500.55.94.1
* kernel-source-5.14.21-150500.55.94.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch nosrc)
* kernel-docs-5.14.21-150500.55.94.1

## References:

* https://www.suse.com/security/cve/CVE-2024-26758.html
* https://www.suse.com/security/cve/CVE-2024-26943.html
* https://www.suse.com/security/cve/CVE-2024-36898.html
* https://www.suse.com/security/cve/CVE-2024-38599.html
* https://www.suse.com/security/cve/CVE-2024-41047.html
* https://www.suse.com/security/cve/CVE-2024-45019.html
* https://www.suse.com/security/cve/CVE-2024-46858.html
* https://www.suse.com/security/cve/CVE-2024-50051.html
* https://www.suse.com/security/cve/CVE-2024-50136.html
* https://www.suse.com/security/cve/CVE-2024-50142.html
* https://www.suse.com/security/cve/CVE-2024-50151.html
* https://www.suse.com/security/cve/CVE-2024-50195.html
* https://www.suse.com/security/cve/CVE-2024-50199.html
* https://www.suse.com/security/cve/CVE-2024-50210.html
* https://www.suse.com/security/cve/CVE-2024-50275.html
* https://www.suse.com/security/cve/CVE-2024-50299.html
* https://www.suse.com/security/cve/CVE-2024-53095.html
* https://www.suse.com/security/cve/CVE-2024-53103.html
* https://www.suse.com/security/cve/CVE-2024-53104.html
* https://www.suse.com/security/cve/CVE-2024-53112.html
* https://www.suse.com/security/cve/CVE-2024-53121.html
* https://www.suse.com/security/cve/CVE-2024-53127.html
* https://www.suse.com/security/cve/CVE-2024-53129.html
* https://www.suse.com/security/cve/CVE-2024-53138.html
* https://www.suse.com/security/cve/CVE-2024-53141.html
* https://www.suse.com/security/cve/CVE-2024-53144.html
* https://www.suse.com/security/cve/CVE-2024-53148.html
* https://www.suse.com/security/cve/CVE-2024-53151.html
* https://www.suse.com/security/cve/CVE-2024-53166.html
* https://www.suse.com/security/cve/CVE-2024-53169.html
* https://www.suse.com/security/cve/CVE-2024-53171.html
* https://www.suse.com/security/cve/CVE-2024-53174.html
* https://www.suse.com/security/cve/CVE-2024-53177.html
* https://www.suse.com/security/cve/CVE-2024-53208.html
* https://www.suse.com/security/cve/CVE-2024-53209.html
* https://www.suse.com/security/cve/CVE-2024-53215.html
* https://www.suse.com/security/cve/CVE-2024-53217.html
* https://www.suse.com/security/cve/CVE-2024-53224.html
* https://www.suse.com/security/cve/CVE-2024-53227.html
* https://www.suse.com/security/cve/CVE-2024-53229.html
* https://www.suse.com/security/cve/CVE-2024-53690.html
* https://www.suse.com/security/cve/CVE-2024-54680.html
* https://www.suse.com/security/cve/CVE-2024-55916.html
* https://www.suse.com/security/cve/CVE-2024-56531.html
* https://www.suse.com/security/cve/CVE-2024-56532.html
* https://www.suse.com/security/cve/CVE-2024-56533.html
* https://www.suse.com/security/cve/CVE-2024-56557.html
* https://www.suse.com/security/cve/CVE-2024-56558.html
* https://www.suse.com/security/cve/CVE-2024-56562.html
* https://www.suse.com/security/cve/CVE-2024-56567.html
* https://www.suse.com/security/cve/CVE-2024-56588.html
* https://www.suse.com/security/cve/CVE-2024-56595.html
* https://www.suse.com/security/cve/CVE-2024-56596.html
* https://www.suse.com/security/cve/CVE-2024-56597.html
* https://www.suse.com/security/cve/CVE-2024-56600.html
* https://www.suse.com/security/cve/CVE-2024-56601.html
* https://www.suse.com/security/cve/CVE-2024-56602.html
* https://www.suse.com/security/cve/CVE-2024-56623.html
* https://www.suse.com/security/cve/CVE-2024-56629.html
* https://www.suse.com/security/cve/CVE-2024-56631.html
* https://www.suse.com/security/cve/CVE-2024-56642.html
* https://www.suse.com/security/cve/CVE-2024-56644.html
* https://www.suse.com/security/cve/CVE-2024-56645.html
* https://www.suse.com/security/cve/CVE-2024-56648.html
* https://www.suse.com/security/cve/CVE-2024-56650.html
* https://www.suse.com/security/cve/CVE-2024-56658.html
* https://www.suse.com/security/cve/CVE-2024-56661.html
* https://www.suse.com/security/cve/CVE-2024-56664.html
* https://www.suse.com/security/cve/CVE-2024-56678.html
* https://www.suse.com/security/cve/CVE-2024-56681.html
* https://www.suse.com/security/cve/CVE-2024-56698.html
* https://www.suse.com/security/cve/CVE-2024-56701.html
* https://www.suse.com/security/cve/CVE-2024-56704.html
* https://www.suse.com/security/cve/CVE-2024-56722.html
* https://www.suse.com/security/cve/CVE-2024-56739.html
* https://www.suse.com/security/cve/CVE-2024-56745.html
* https://www.suse.com/security/cve/CVE-2024-56747.html
* https://www.suse.com/security/cve/CVE-2024-56754.html
* https://www.suse.com/security/cve/CVE-2024-56756.html
* https://www.suse.com/security/cve/CVE-2024-56759.html
* https://www.suse.com/security/cve/CVE-2024-56765.html
* https://www.suse.com/security/cve/CVE-2024-56776.html
* https://www.suse.com/security/cve/CVE-2024-56777.html
* https://www.suse.com/security/cve/CVE-2024-56778.html
* https://www.suse.com/security/cve/CVE-2024-57791.html
* https://www.suse.com/security/cve/CVE-2024-57792.html
* https://www.suse.com/security/cve/CVE-2024-57793.html
* https://www.suse.com/security/cve/CVE-2024-57798.html
* https://www.suse.com/security/cve/CVE-2024-57849.html
* https://www.suse.com/security/cve/CVE-2024-57850.html
* https://www.suse.com/security/cve/CVE-2024-57876.html
* https://www.suse.com/security/cve/CVE-2024-57893.html
* https://www.suse.com/security/cve/CVE-2024-57897.html
* https://www.suse.com/security/cve/CVE-2024-8805.html
* https://bugzilla.suse.com/show_bug.cgi?id=1194869
* https://bugzilla.suse.com/show_bug.cgi?id=1216813
* https://bugzilla.suse.com/show_bug.cgi?id=1223384
* https://bugzilla.suse.com/show_bug.cgi?id=1225736
* https://bugzilla.suse.com/show_bug.cgi?id=1226848
* https://bugzilla.suse.com/show_bug.cgi?id=1226980
* https://bugzilla.suse.com/show_bug.cgi?id=1228537
* https://bugzilla.suse.com/show_bug.cgi?id=1228592
* https://bugzilla.suse.com/show_bug.cgi?id=1230341
* https://bugzilla.suse.com/show_bug.cgi?id=1230432
* https://bugzilla.suse.com/show_bug.cgi?id=1230527
* https://bugzilla.suse.com/show_bug.cgi?id=1230697
* https://bugzilla.suse.com/show_bug.cgi?id=1231088
* https://bugzilla.suse.com/show_bug.cgi?id=1231847
* https://bugzilla.suse.com/show_bug.cgi?id=1232914
* https://bugzilla.suse.com/show_bug.cgi?id=1233028
* https://bugzilla.suse.com/show_bug.cgi?id=1233055
* https://bugzilla.suse.com/show_bug.cgi?id=1233097
* https://bugzilla.suse.com/show_bug.cgi?id=1233103
* https://bugzilla.suse.com/show_bug.cgi?id=1233112
* https://bugzilla.suse.com/show_bug.cgi?id=1233464
* https://bugzilla.suse.com/show_bug.cgi?id=1233488
* https://bugzilla.suse.com/show_bug.cgi?id=1233642
* https://bugzilla.suse.com/show_bug.cgi?id=1233778
* https://bugzilla.suse.com/show_bug.cgi?id=1234024
* https://bugzilla.suse.com/show_bug.cgi?id=1234025
* https://bugzilla.suse.com/show_bug.cgi?id=1234078
* https://bugzilla.suse.com/show_bug.cgi?id=1234087
* https://bugzilla.suse.com/show_bug.cgi?id=1234153
* https://bugzilla.suse.com/show_bug.cgi?id=1234155
* https://bugzilla.suse.com/show_bug.cgi?id=1234223
* https://bugzilla.suse.com/show_bug.cgi?id=1234381
* https://bugzilla.suse.com/show_bug.cgi?id=1234683
* https://bugzilla.suse.com/show_bug.cgi?id=1234690
* https://bugzilla.suse.com/show_bug.cgi?id=1234825
* https://bugzilla.suse.com/show_bug.cgi?id=1234829
* https://bugzilla.suse.com/show_bug.cgi?id=1234832
* https://bugzilla.suse.com/show_bug.cgi?id=1234884
* https://bugzilla.suse.com/show_bug.cgi?id=1234889
* https://bugzilla.suse.com/show_bug.cgi?id=1234896
* https://bugzilla.suse.com/show_bug.cgi?id=1234899
* https://bugzilla.suse.com/show_bug.cgi?id=1234900
* https://bugzilla.suse.com/show_bug.cgi?id=1234905
* https://bugzilla.suse.com/show_bug.cgi?id=1234909
* https://bugzilla.suse.com/show_bug.cgi?id=1234916
* https://bugzilla.suse.com/show_bug.cgi?id=1234918
* https://bugzilla.suse.com/show_bug.cgi?id=1234922
* https://bugzilla.suse.com/show_bug.cgi?id=1234930
* https://bugzilla.suse.com/show_bug.cgi?id=1234931
* https://bugzilla.suse.com/show_bug.cgi?id=1234934
* https://bugzilla.suse.com/show_bug.cgi?id=1234962
* https://bugzilla.suse.com/show_bug.cgi?id=1234999
* https://bugzilla.suse.com/show_bug.cgi?id=1235002
* https://bugzilla.suse.com/show_bug.cgi?id=1235009
* https://bugzilla.suse.com/show_bug.cgi?id=1235011
* https://bugzilla.suse.com/show_bug.cgi?id=1235053
* https://bugzilla.suse.com/show_bug.cgi?id=1235057
* https://bugzilla.suse.com/show_bug.cgi?id=1235059
* https://bugzilla.suse.com/show_bug.cgi?id=1235100
* https://bugzilla.suse.com/show_bug.cgi?id=1235122
* https://bugzilla.suse.com/show_bug.cgi?id=1235123
* https://bugzilla.suse.com/show_bug.cgi?id=1235133
* https://bugzilla.suse.com/show_bug.cgi?id=1235134
* https://bugzilla.suse.com/show_bug.cgi?id=1235217
* https://bugzilla.suse.com/show_bug.cgi?id=1235222
* https://bugzilla.suse.com/show_bug.cgi?id=1235230
* https://bugzilla.suse.com/show_bug.cgi?id=1235249
* https://bugzilla.suse.com/show_bug.cgi?id=1235410
* https://bugzilla.suse.com/show_bug.cgi?id=1235430
* https://bugzilla.suse.com/show_bug.cgi?id=1235433
* https://bugzilla.suse.com/show_bug.cgi?id=1235441
* https://bugzilla.suse.com/show_bug.cgi?id=1235451
* https://bugzilla.suse.com/show_bug.cgi?id=1235458
* https://bugzilla.suse.com/show_bug.cgi?id=1235466
* https://bugzilla.suse.com/show_bug.cgi?id=1235473
* https://bugzilla.suse.com/show_bug.cgi?id=1235480
* https://bugzilla.suse.com/show_bug.cgi?id=1235491
* https://bugzilla.suse.com/show_bug.cgi?id=1235495
* https://bugzilla.suse.com/show_bug.cgi?id=1235496
* https://bugzilla.suse.com/show_bug.cgi?id=1235521
* https://bugzilla.suse.com/show_bug.cgi?id=1235557
* https://bugzilla.suse.com/show_bug.cgi?id=1235563
* https://bugzilla.suse.com/show_bug.cgi?id=1235570
* https://bugzilla.suse.com/show_bug.cgi?id=1235584
* https://bugzilla.suse.com/show_bug.cgi?id=1235611
* https://bugzilla.suse.com/show_bug.cgi?id=1235635
* https://bugzilla.suse.com/show_bug.cgi?id=1235641
* https://bugzilla.suse.com/show_bug.cgi?id=1235643
* https://bugzilla.suse.com/show_bug.cgi?id=1235645
* https://bugzilla.suse.com/show_bug.cgi?id=1235647
* https://bugzilla.suse.com/show_bug.cgi?id=1235723
* https://bugzilla.suse.com/show_bug.cgi?id=1235739
* https://bugzilla.suse.com/show_bug.cgi?id=1235747
* https://bugzilla.suse.com/show_bug.cgi?id=1235759
* https://bugzilla.suse.com/show_bug.cgi?id=1235764
* https://bugzilla.suse.com/show_bug.cgi?id=1235768
* https://bugzilla.suse.com/show_bug.cgi?id=1235806
* https://bugzilla.suse.com/show_bug.cgi?id=1235812
* https://bugzilla.suse.com/show_bug.cgi?id=1235814
* https://bugzilla.suse.com/show_bug.cgi?id=1235818
* https://bugzilla.suse.com/show_bug.cgi?id=1235842
* https://bugzilla.suse.com/show_bug.cgi?id=1235920
* https://bugzilla.suse.com/show_bug.cgi?id=1235969
* https://bugzilla.suse.com/show_bug.cgi?id=1236628



SUSE-SU-2025:0578-1: important: Security update for openvswitch


# Security update for openvswitch

Announcement ID: SUSE-SU-2025:0578-1
Release Date: 2025-02-18T12:53:28Z
Rating: important
References:

* bsc#1236353

Cross-References:

* CVE-2025-0650

CVSS scores:

* CVE-2025-0650 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-0650 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0650 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Manager Proxy 4.3
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3

An update that solves one vulnerability can now be installed.

## Description:

This update for openvswitch fixes the following issues:

* CVE-2025-0650: ovn: egress ACLs may be bypassed via specially crafted UDP
packet (bsc#1236353).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-578=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-578=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-578=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-578=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-578=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-578=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-578=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-578=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2025-578=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-578=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* libovn-20_06-0-20.06.2-150400.24.26.1
* openvswitch-debugsource-2.14.2-150400.24.26.1
* ovn-central-20.06.2-150400.24.26.1
* ovn-host-debuginfo-20.06.2-150400.24.26.1
* ovn-devel-20.06.2-150400.24.26.1
* ovn-debuginfo-20.06.2-150400.24.26.1
* openvswitch-devel-2.14.2-150400.24.26.1
* ovn-vtep-debuginfo-20.06.2-150400.24.26.1
* openvswitch-ipsec-2.14.2-150400.24.26.1
* openvswitch-vtep-debuginfo-2.14.2-150400.24.26.1
* ovn-vtep-20.06.2-150400.24.26.1
* libovn-20_06-0-debuginfo-20.06.2-150400.24.26.1
* openvswitch-pki-2.14.2-150400.24.26.1
* ovn-host-20.06.2-150400.24.26.1
* libopenvswitch-2_14-0-2.14.2-150400.24.26.1
* python3-ovs-2.14.2-150400.24.26.1
* openvswitch-2.14.2-150400.24.26.1
* openvswitch-test-debuginfo-2.14.2-150400.24.26.1
* ovn-central-debuginfo-20.06.2-150400.24.26.1
* openvswitch-test-2.14.2-150400.24.26.1
* openvswitch-vtep-2.14.2-150400.24.26.1
* libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.26.1
* ovn-20.06.2-150400.24.26.1
* openvswitch-debuginfo-2.14.2-150400.24.26.1
* ovn-docker-20.06.2-150400.24.26.1
* openSUSE Leap 15.4 (noarch)
* ovn-doc-20.06.2-150400.24.26.1
* openvswitch-doc-2.14.2-150400.24.26.1
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* libovn-20_06-0-20.06.2-150400.24.26.1
* openvswitch-debugsource-2.14.2-150400.24.26.1
* ovn-central-20.06.2-150400.24.26.1
* ovn-host-debuginfo-20.06.2-150400.24.26.1
* ovn-devel-20.06.2-150400.24.26.1
* ovn-debuginfo-20.06.2-150400.24.26.1
* openvswitch-devel-2.14.2-150400.24.26.1
* ovn-vtep-debuginfo-20.06.2-150400.24.26.1
* openvswitch-ipsec-2.14.2-150400.24.26.1
* openvswitch-vtep-debuginfo-2.14.2-150400.24.26.1
* ovn-vtep-20.06.2-150400.24.26.1
* libovn-20_06-0-debuginfo-20.06.2-150400.24.26.1
* openvswitch-pki-2.14.2-150400.24.26.1
* ovn-host-20.06.2-150400.24.26.1
* libopenvswitch-2_14-0-2.14.2-150400.24.26.1
* python3-ovs-2.14.2-150400.24.26.1
* openvswitch-2.14.2-150400.24.26.1
* openvswitch-test-debuginfo-2.14.2-150400.24.26.1
* ovn-central-debuginfo-20.06.2-150400.24.26.1
* openvswitch-test-2.14.2-150400.24.26.1
* openvswitch-vtep-2.14.2-150400.24.26.1
* libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.26.1
* ovn-20.06.2-150400.24.26.1
* openvswitch-debuginfo-2.14.2-150400.24.26.1
* ovn-docker-20.06.2-150400.24.26.1
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* libovn-20_06-0-20.06.2-150400.24.26.1
* openvswitch-debugsource-2.14.2-150400.24.26.1
* ovn-central-20.06.2-150400.24.26.1
* ovn-host-debuginfo-20.06.2-150400.24.26.1
* ovn-devel-20.06.2-150400.24.26.1
* ovn-debuginfo-20.06.2-150400.24.26.1
* openvswitch-devel-2.14.2-150400.24.26.1
* ovn-vtep-debuginfo-20.06.2-150400.24.26.1
* openvswitch-ipsec-2.14.2-150400.24.26.1
* openvswitch-vtep-debuginfo-2.14.2-150400.24.26.1
* ovn-vtep-20.06.2-150400.24.26.1
* libovn-20_06-0-debuginfo-20.06.2-150400.24.26.1
* openvswitch-pki-2.14.2-150400.24.26.1
* ovn-host-20.06.2-150400.24.26.1
* libopenvswitch-2_14-0-2.14.2-150400.24.26.1
* python3-ovs-2.14.2-150400.24.26.1
* openvswitch-2.14.2-150400.24.26.1
* openvswitch-test-debuginfo-2.14.2-150400.24.26.1
* ovn-central-debuginfo-20.06.2-150400.24.26.1
* openvswitch-test-2.14.2-150400.24.26.1
* openvswitch-vtep-2.14.2-150400.24.26.1
* libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.26.1
* ovn-20.06.2-150400.24.26.1
* openvswitch-debuginfo-2.14.2-150400.24.26.1
* ovn-docker-20.06.2-150400.24.26.1
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* libovn-20_06-0-20.06.2-150400.24.26.1
* openvswitch-debugsource-2.14.2-150400.24.26.1
* ovn-central-20.06.2-150400.24.26.1
* ovn-host-debuginfo-20.06.2-150400.24.26.1
* ovn-devel-20.06.2-150400.24.26.1
* ovn-debuginfo-20.06.2-150400.24.26.1
* openvswitch-devel-2.14.2-150400.24.26.1
* ovn-vtep-debuginfo-20.06.2-150400.24.26.1
* openvswitch-ipsec-2.14.2-150400.24.26.1
* openvswitch-vtep-debuginfo-2.14.2-150400.24.26.1
* ovn-vtep-20.06.2-150400.24.26.1
* libovn-20_06-0-debuginfo-20.06.2-150400.24.26.1
* openvswitch-pki-2.14.2-150400.24.26.1
* ovn-host-20.06.2-150400.24.26.1
* libopenvswitch-2_14-0-2.14.2-150400.24.26.1
* python3-ovs-2.14.2-150400.24.26.1
* openvswitch-2.14.2-150400.24.26.1
* openvswitch-test-debuginfo-2.14.2-150400.24.26.1
* ovn-central-debuginfo-20.06.2-150400.24.26.1
* openvswitch-test-2.14.2-150400.24.26.1
* openvswitch-vtep-2.14.2-150400.24.26.1
* libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.26.1
* ovn-20.06.2-150400.24.26.1
* openvswitch-debuginfo-2.14.2-150400.24.26.1
* ovn-docker-20.06.2-150400.24.26.1
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* libovn-20_06-0-20.06.2-150400.24.26.1
* openvswitch-debugsource-2.14.2-150400.24.26.1
* ovn-central-20.06.2-150400.24.26.1
* ovn-host-debuginfo-20.06.2-150400.24.26.1
* ovn-devel-20.06.2-150400.24.26.1
* ovn-debuginfo-20.06.2-150400.24.26.1
* openvswitch-devel-2.14.2-150400.24.26.1
* ovn-vtep-debuginfo-20.06.2-150400.24.26.1
* openvswitch-ipsec-2.14.2-150400.24.26.1
* openvswitch-vtep-debuginfo-2.14.2-150400.24.26.1
* ovn-vtep-20.06.2-150400.24.26.1
* libovn-20_06-0-debuginfo-20.06.2-150400.24.26.1
* openvswitch-pki-2.14.2-150400.24.26.1
* ovn-host-20.06.2-150400.24.26.1
* libopenvswitch-2_14-0-2.14.2-150400.24.26.1
* python3-ovs-2.14.2-150400.24.26.1
* openvswitch-2.14.2-150400.24.26.1
* openvswitch-test-debuginfo-2.14.2-150400.24.26.1
* ovn-central-debuginfo-20.06.2-150400.24.26.1
* openvswitch-test-2.14.2-150400.24.26.1
* openvswitch-vtep-2.14.2-150400.24.26.1
* libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.26.1
* ovn-20.06.2-150400.24.26.1
* openvswitch-debuginfo-2.14.2-150400.24.26.1
* ovn-docker-20.06.2-150400.24.26.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* libovn-20_06-0-20.06.2-150400.24.26.1
* openvswitch-debugsource-2.14.2-150400.24.26.1
* ovn-central-20.06.2-150400.24.26.1
* ovn-host-debuginfo-20.06.2-150400.24.26.1
* ovn-devel-20.06.2-150400.24.26.1
* ovn-debuginfo-20.06.2-150400.24.26.1
* openvswitch-devel-2.14.2-150400.24.26.1
* ovn-vtep-debuginfo-20.06.2-150400.24.26.1
* openvswitch-ipsec-2.14.2-150400.24.26.1
* openvswitch-vtep-debuginfo-2.14.2-150400.24.26.1
* ovn-vtep-20.06.2-150400.24.26.1
* libovn-20_06-0-debuginfo-20.06.2-150400.24.26.1
* openvswitch-pki-2.14.2-150400.24.26.1
* ovn-host-20.06.2-150400.24.26.1
* libopenvswitch-2_14-0-2.14.2-150400.24.26.1
* python3-ovs-2.14.2-150400.24.26.1
* openvswitch-2.14.2-150400.24.26.1
* openvswitch-test-debuginfo-2.14.2-150400.24.26.1
* ovn-central-debuginfo-20.06.2-150400.24.26.1
* openvswitch-test-2.14.2-150400.24.26.1
* openvswitch-vtep-2.14.2-150400.24.26.1
* libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.26.1
* ovn-20.06.2-150400.24.26.1
* openvswitch-debuginfo-2.14.2-150400.24.26.1
* ovn-docker-20.06.2-150400.24.26.1
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* libovn-20_06-0-20.06.2-150400.24.26.1
* openvswitch-debugsource-2.14.2-150400.24.26.1
* ovn-central-20.06.2-150400.24.26.1
* ovn-host-debuginfo-20.06.2-150400.24.26.1
* ovn-devel-20.06.2-150400.24.26.1
* ovn-debuginfo-20.06.2-150400.24.26.1
* openvswitch-devel-2.14.2-150400.24.26.1
* ovn-vtep-debuginfo-20.06.2-150400.24.26.1
* openvswitch-ipsec-2.14.2-150400.24.26.1
* openvswitch-vtep-debuginfo-2.14.2-150400.24.26.1
* ovn-vtep-20.06.2-150400.24.26.1
* libovn-20_06-0-debuginfo-20.06.2-150400.24.26.1
* openvswitch-pki-2.14.2-150400.24.26.1
* ovn-host-20.06.2-150400.24.26.1
* libopenvswitch-2_14-0-2.14.2-150400.24.26.1
* python3-ovs-2.14.2-150400.24.26.1
* openvswitch-2.14.2-150400.24.26.1
* openvswitch-test-debuginfo-2.14.2-150400.24.26.1
* ovn-central-debuginfo-20.06.2-150400.24.26.1
* openvswitch-test-2.14.2-150400.24.26.1
* openvswitch-vtep-2.14.2-150400.24.26.1
* libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.26.1
* ovn-20.06.2-150400.24.26.1
* openvswitch-debuginfo-2.14.2-150400.24.26.1
* ovn-docker-20.06.2-150400.24.26.1
* SUSE Manager Proxy 4.3 (x86_64)
* libovn-20_06-0-20.06.2-150400.24.26.1
* openvswitch-debugsource-2.14.2-150400.24.26.1
* ovn-central-20.06.2-150400.24.26.1
* ovn-host-debuginfo-20.06.2-150400.24.26.1
* ovn-devel-20.06.2-150400.24.26.1
* ovn-debuginfo-20.06.2-150400.24.26.1
* openvswitch-devel-2.14.2-150400.24.26.1
* ovn-vtep-debuginfo-20.06.2-150400.24.26.1
* openvswitch-ipsec-2.14.2-150400.24.26.1
* openvswitch-vtep-debuginfo-2.14.2-150400.24.26.1
* ovn-vtep-20.06.2-150400.24.26.1
* libovn-20_06-0-debuginfo-20.06.2-150400.24.26.1
* openvswitch-pki-2.14.2-150400.24.26.1
* ovn-host-20.06.2-150400.24.26.1
* libopenvswitch-2_14-0-2.14.2-150400.24.26.1
* python3-ovs-2.14.2-150400.24.26.1
* openvswitch-2.14.2-150400.24.26.1
* openvswitch-test-debuginfo-2.14.2-150400.24.26.1
* ovn-central-debuginfo-20.06.2-150400.24.26.1
* openvswitch-test-2.14.2-150400.24.26.1
* openvswitch-vtep-2.14.2-150400.24.26.1
* libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.26.1
* ovn-20.06.2-150400.24.26.1
* openvswitch-debuginfo-2.14.2-150400.24.26.1
* ovn-docker-20.06.2-150400.24.26.1
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* libovn-20_06-0-20.06.2-150400.24.26.1
* openvswitch-debugsource-2.14.2-150400.24.26.1
* ovn-central-20.06.2-150400.24.26.1
* ovn-host-debuginfo-20.06.2-150400.24.26.1
* ovn-devel-20.06.2-150400.24.26.1
* ovn-debuginfo-20.06.2-150400.24.26.1
* openvswitch-devel-2.14.2-150400.24.26.1
* ovn-vtep-debuginfo-20.06.2-150400.24.26.1
* openvswitch-ipsec-2.14.2-150400.24.26.1
* openvswitch-vtep-debuginfo-2.14.2-150400.24.26.1
* ovn-vtep-20.06.2-150400.24.26.1
* libovn-20_06-0-debuginfo-20.06.2-150400.24.26.1
* openvswitch-pki-2.14.2-150400.24.26.1
* ovn-host-20.06.2-150400.24.26.1
* libopenvswitch-2_14-0-2.14.2-150400.24.26.1
* python3-ovs-2.14.2-150400.24.26.1
* openvswitch-2.14.2-150400.24.26.1
* openvswitch-test-debuginfo-2.14.2-150400.24.26.1
* ovn-central-debuginfo-20.06.2-150400.24.26.1
* openvswitch-test-2.14.2-150400.24.26.1
* openvswitch-vtep-2.14.2-150400.24.26.1
* libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.26.1
* ovn-20.06.2-150400.24.26.1
* openvswitch-debuginfo-2.14.2-150400.24.26.1
* ovn-docker-20.06.2-150400.24.26.1
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* libovn-20_06-0-20.06.2-150400.24.26.1
* openvswitch-debugsource-2.14.2-150400.24.26.1
* ovn-central-20.06.2-150400.24.26.1
* ovn-host-debuginfo-20.06.2-150400.24.26.1
* ovn-devel-20.06.2-150400.24.26.1
* ovn-debuginfo-20.06.2-150400.24.26.1
* openvswitch-devel-2.14.2-150400.24.26.1
* ovn-vtep-debuginfo-20.06.2-150400.24.26.1
* openvswitch-ipsec-2.14.2-150400.24.26.1
* openvswitch-vtep-debuginfo-2.14.2-150400.24.26.1
* ovn-vtep-20.06.2-150400.24.26.1
* libovn-20_06-0-debuginfo-20.06.2-150400.24.26.1
* openvswitch-pki-2.14.2-150400.24.26.1
* ovn-host-20.06.2-150400.24.26.1
* libopenvswitch-2_14-0-2.14.2-150400.24.26.1
* python3-ovs-2.14.2-150400.24.26.1
* openvswitch-2.14.2-150400.24.26.1
* openvswitch-test-debuginfo-2.14.2-150400.24.26.1
* ovn-central-debuginfo-20.06.2-150400.24.26.1
* openvswitch-test-2.14.2-150400.24.26.1
* openvswitch-vtep-2.14.2-150400.24.26.1
* libopenvswitch-2_14-0-debuginfo-2.14.2-150400.24.26.1
* ovn-20.06.2-150400.24.26.1
* openvswitch-debuginfo-2.14.2-150400.24.26.1
* ovn-docker-20.06.2-150400.24.26.1

## References:

* https://www.suse.com/security/cve/CVE-2025-0650.html
* https://bugzilla.suse.com/show_bug.cgi?id=1236353



SUSE-SU-2025:0579-1: moderate: Security update for podman


# Security update for podman

Announcement ID: SUSE-SU-2025:0579-1
Release Date: 2025-02-18T13:00:27Z
Rating: moderate
References:

* bsc#1227052
* bsc#1236507

Cross-References:

* CVE-2023-45288
* CVE-2024-6104

CVSS scores:

* CVE-2023-45288 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-6104 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
* CVE-2024-6104 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4

An update that solves two vulnerabilities can now be installed.

## Description:

This update for podman fixes the following issues:

* CVE-2024-6104: possible sensitive data exposure due to hashicorp/go-
retryablehttp not sanitizing URLs when writing them to log files.
(bsc#1227052)
* CVE-2023-45288: possible excessive CPU consumption due to no limit being set
on the number of CONTINUATION frames read for an HTTP/2 request in
golang.org/x/net/http2. (bsc#1236507)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-579=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-579=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-579=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-579=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-579=1

## Package List:

* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* podmansh-4.9.5-150400.4.38.1
* podman-remote-debuginfo-4.9.5-150400.4.38.1
* podman-debuginfo-4.9.5-150400.4.38.1
* podman-4.9.5-150400.4.38.1
* podman-remote-4.9.5-150400.4.38.1
* openSUSE Leap 15.4 (noarch)
* podman-docker-4.9.5-150400.4.38.1
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* podman-4.9.5-150400.4.38.1
* podman-remote-4.9.5-150400.4.38.1
* podman-remote-debuginfo-4.9.5-150400.4.38.1
* podman-debuginfo-4.9.5-150400.4.38.1
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* podman-4.9.5-150400.4.38.1
* podman-remote-4.9.5-150400.4.38.1
* podman-remote-debuginfo-4.9.5-150400.4.38.1
* podman-debuginfo-4.9.5-150400.4.38.1
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* podman-4.9.5-150400.4.38.1
* podman-remote-4.9.5-150400.4.38.1
* podman-remote-debuginfo-4.9.5-150400.4.38.1
* podman-debuginfo-4.9.5-150400.4.38.1
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* podman-4.9.5-150400.4.38.1
* podman-remote-4.9.5-150400.4.38.1
* podman-remote-debuginfo-4.9.5-150400.4.38.1
* podman-debuginfo-4.9.5-150400.4.38.1

## References:

* https://www.suse.com/security/cve/CVE-2023-45288.html
* https://www.suse.com/security/cve/CVE-2024-6104.html
* https://bugzilla.suse.com/show_bug.cgi?id=1227052
* https://bugzilla.suse.com/show_bug.cgi?id=1236507



SUSE-SU-2025:0581-1: moderate: Security update for buildah


# Security update for buildah

Announcement ID: SUSE-SU-2025:0581-1
Release Date: 2025-02-18T14:54:18Z
Rating: moderate
References:

* bsc#1236531

Cross-References:

* CVE-2023-45288

CVSS scores:

* CVE-2023-45288 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
* CVE-2023-45288 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Affected Products:

* Containers Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability can now be installed.

## Description:

This update for buildah fixes the following issues:

* CVE-2023-45288: possible excessive CPU consumption due to no limit being set
on the number of CONTINUATION frames read for an HTTP/2 request in
golang.org/x/net/http2. (bsc#1236531)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2025-581=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-581=1

* Containers Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-581=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* buildah-1.35.5-150500.3.28.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* buildah-1.35.5-150500.3.28.1
* Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* buildah-1.35.5-150500.3.28.1

## References:

* https://www.suse.com/security/cve/CVE-2023-45288.html
* https://bugzilla.suse.com/show_bug.cgi?id=1236531



SUSE-SU-2025:0582-1: low: Security update for glibc


# Security update for glibc

Announcement ID: SUSE-SU-2025:0582-1
Release Date: 2025-02-18T14:55:38Z
Rating: low
References:

* bsc#1236282

Cross-References:

* CVE-2025-0395

CVSS scores:

* CVE-2025-0395 ( SUSE ): 2.0
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-0395 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
* CVE-2025-0395 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP6
* Development Tools Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves one vulnerability can now be installed.

## Description:

This update for glibc fixes the following issues:

* CVE-2025-0395: Fix underallocation of abort_msg_s struct (bsc#1236282)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-582=1 SUSE-2025-582=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-582=1

* Development Tools Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-582=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586 i686)
* glibc-locale-base-debuginfo-2.38-150600.14.23.1
* glibc-devel-debuginfo-2.38-150600.14.23.1
* glibc-profile-2.38-150600.14.23.1
* glibc-debugsource-2.38-150600.14.23.1
* libnsl1-2.38-150600.14.23.1
* libnsl1-debuginfo-2.38-150600.14.23.1
* glibc-debuginfo-2.38-150600.14.23.1
* glibc-locale-base-2.38-150600.14.23.1
* glibc-devel-2.38-150600.14.23.1
* glibc-devel-static-2.38-150600.14.23.1
* glibc-locale-2.38-150600.14.23.1
* glibc-2.38-150600.14.23.1
* openSUSE Leap 15.6 (x86_64)
* glibc-utils-32bit-debuginfo-2.38-150600.14.23.1
* glibc-devel-32bit-2.38-150600.14.23.1
* glibc-32bit-debuginfo-2.38-150600.14.23.1
* libnsl1-32bit-2.38-150600.14.23.1
* libnsl1-32bit-debuginfo-2.38-150600.14.23.1
* glibc-locale-base-32bit-2.38-150600.14.23.1
* glibc-locale-base-32bit-debuginfo-2.38-150600.14.23.1
* glibc-profile-32bit-2.38-150600.14.23.1
* glibc-devel-32bit-debuginfo-2.38-150600.14.23.1
* glibc-32bit-2.38-150600.14.23.1
* glibc-devel-static-32bit-2.38-150600.14.23.1
* glibc-utils-32bit-2.38-150600.14.23.1
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* glibc-utils-debuginfo-2.38-150600.14.23.1
* nscd-debuginfo-2.38-150600.14.23.1
* nscd-2.38-150600.14.23.1
* glibc-extra-2.38-150600.14.23.1
* glibc-utils-2.38-150600.14.23.1
* glibc-extra-debuginfo-2.38-150600.14.23.1
* glibc-utils-src-debugsource-2.38-150600.14.23.1
* openSUSE Leap 15.6 (noarch)
* glibc-lang-2.38-150600.14.23.1
* glibc-info-2.38-150600.14.23.1
* glibc-i18ndata-2.38-150600.14.23.1
* glibc-html-2.38-150600.14.23.1
* openSUSE Leap 15.6 (aarch64_ilp32)
* glibc-devel-static-64bit-2.38-150600.14.23.1
* glibc-utils-64bit-debuginfo-2.38-150600.14.23.1
* glibc-64bit-debuginfo-2.38-150600.14.23.1
* libnsl1-64bit-debuginfo-2.38-150600.14.23.1
* glibc-locale-base-64bit-debuginfo-2.38-150600.14.23.1
* glibc-profile-64bit-2.38-150600.14.23.1
* glibc-utils-64bit-2.38-150600.14.23.1
* glibc-locale-base-64bit-2.38-150600.14.23.1
* glibc-devel-64bit-2.38-150600.14.23.1
* glibc-64bit-2.38-150600.14.23.1
* libnsl1-64bit-2.38-150600.14.23.1
* glibc-devel-64bit-debuginfo-2.38-150600.14.23.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* glibc-locale-base-debuginfo-2.38-150600.14.23.1
* nscd-debuginfo-2.38-150600.14.23.1
* glibc-devel-debuginfo-2.38-150600.14.23.1
* glibc-profile-2.38-150600.14.23.1
* glibc-debugsource-2.38-150600.14.23.1
* nscd-2.38-150600.14.23.1
* glibc-extra-2.38-150600.14.23.1
* libnsl1-2.38-150600.14.23.1
* libnsl1-debuginfo-2.38-150600.14.23.1
* glibc-debuginfo-2.38-150600.14.23.1
* glibc-locale-base-2.38-150600.14.23.1
* glibc-extra-debuginfo-2.38-150600.14.23.1
* glibc-devel-2.38-150600.14.23.1
* glibc-locale-2.38-150600.14.23.1
* glibc-2.38-150600.14.23.1
* Basesystem Module 15-SP6 (noarch)
* glibc-lang-2.38-150600.14.23.1
* glibc-i18ndata-2.38-150600.14.23.1
* glibc-info-2.38-150600.14.23.1
* Basesystem Module 15-SP6 (x86_64)
* glibc-32bit-debuginfo-2.38-150600.14.23.1
* libnsl1-32bit-2.38-150600.14.23.1
* libnsl1-32bit-debuginfo-2.38-150600.14.23.1
* glibc-locale-base-32bit-2.38-150600.14.23.1
* glibc-locale-base-32bit-debuginfo-2.38-150600.14.23.1
* glibc-32bit-2.38-150600.14.23.1
* Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* glibc-utils-debuginfo-2.38-150600.14.23.1
* glibc-debugsource-2.38-150600.14.23.1
* glibc-debuginfo-2.38-150600.14.23.1
* glibc-utils-2.38-150600.14.23.1
* glibc-devel-static-2.38-150600.14.23.1
* glibc-utils-src-debugsource-2.38-150600.14.23.1
* Development Tools Module 15-SP6 (x86_64)
* glibc-devel-32bit-2.38-150600.14.23.1
* glibc-32bit-debuginfo-2.38-150600.14.23.1
* glibc-devel-32bit-debuginfo-2.38-150600.14.23.1

## References:

* https://www.suse.com/security/cve/CVE-2025-0395.html
* https://bugzilla.suse.com/show_bug.cgi?id=1236282



SUSE-SU-2025:0583-1: important: Security update for openvswitch


# Security update for openvswitch

Announcement ID: SUSE-SU-2025:0583-1
Release Date: 2025-02-18T15:02:50Z
Rating: important
References:

* bsc#1236353

Cross-References:

* CVE-2025-0650

CVSS scores:

* CVE-2025-0650 ( SUSE ): 9.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-0650 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0650 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.6
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Package Hub 15 15-SP6

An update that solves one vulnerability can now be installed.

## Description:

This update for openvswitch fixes the following issues:

* CVE-2025-0650: ovn: egress ACLs may be bypassed via specially crafted UDP
packet (bsc#1236353).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-583=1 openSUSE-SLE-15.6-2025-583=1

* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-583=1

* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-583=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* openvswitch-debuginfo-3.1.0-150600.33.6.1
* ovn-vtep-debuginfo-23.03.0-150600.33.6.1
* ovn-host-debuginfo-23.03.0-150600.33.6.1
* openvswitch-debugsource-3.1.0-150600.33.6.1
* openvswitch-ipsec-3.1.0-150600.33.6.1
* openvswitch-test-debuginfo-3.1.0-150600.33.6.1
* openvswitch-test-3.1.0-150600.33.6.1
* openvswitch-vtep-3.1.0-150600.33.6.1
* ovn-23.03.0-150600.33.6.1
* openvswitch-devel-3.1.0-150600.33.6.1
* openvswitch-3.1.0-150600.33.6.1
* ovn-vtep-23.03.0-150600.33.6.1
* libopenvswitch-3_1-0-debuginfo-3.1.0-150600.33.6.1
* python3-ovs-3.1.0-150600.33.6.1
* ovn-central-23.03.0-150600.33.6.1
* ovn-debuginfo-23.03.0-150600.33.6.1
* libopenvswitch-3_1-0-3.1.0-150600.33.6.1
* ovn-central-debuginfo-23.03.0-150600.33.6.1
* openvswitch-pki-3.1.0-150600.33.6.1
* libovn-23_03-0-23.03.0-150600.33.6.1
* ovn-docker-23.03.0-150600.33.6.1
* openvswitch-vtep-debuginfo-3.1.0-150600.33.6.1
* libovn-23_03-0-debuginfo-23.03.0-150600.33.6.1
* ovn-host-23.03.0-150600.33.6.1
* ovn-devel-23.03.0-150600.33.6.1
* openSUSE Leap 15.6 (noarch)
* openvswitch-doc-3.1.0-150600.33.6.1
* ovn-doc-23.03.0-150600.33.6.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64)
* python3-ovs-3.1.0-150600.33.6.1
* openvswitch-debuginfo-3.1.0-150600.33.6.1
* openvswitch-debugsource-3.1.0-150600.33.6.1
* Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* openvswitch-debuginfo-3.1.0-150600.33.6.1
* ovn-vtep-debuginfo-23.03.0-150600.33.6.1
* ovn-host-debuginfo-23.03.0-150600.33.6.1
* openvswitch-debugsource-3.1.0-150600.33.6.1
* openvswitch-ipsec-3.1.0-150600.33.6.1
* openvswitch-test-debuginfo-3.1.0-150600.33.6.1
* openvswitch-test-3.1.0-150600.33.6.1
* openvswitch-vtep-3.1.0-150600.33.6.1
* ovn-23.03.0-150600.33.6.1
* openvswitch-devel-3.1.0-150600.33.6.1
* openvswitch-3.1.0-150600.33.6.1
* ovn-vtep-23.03.0-150600.33.6.1
* libopenvswitch-3_1-0-debuginfo-3.1.0-150600.33.6.1
* python3-ovs-3.1.0-150600.33.6.1
* ovn-central-23.03.0-150600.33.6.1
* ovn-debuginfo-23.03.0-150600.33.6.1
* libopenvswitch-3_1-0-3.1.0-150600.33.6.1
* ovn-central-debuginfo-23.03.0-150600.33.6.1
* openvswitch-pki-3.1.0-150600.33.6.1
* libovn-23_03-0-23.03.0-150600.33.6.1
* ovn-docker-23.03.0-150600.33.6.1
* openvswitch-vtep-debuginfo-3.1.0-150600.33.6.1
* libovn-23_03-0-debuginfo-23.03.0-150600.33.6.1
* ovn-host-23.03.0-150600.33.6.1
* ovn-devel-23.03.0-150600.33.6.1

## References:

* https://www.suse.com/security/cve/CVE-2025-0650.html
* https://bugzilla.suse.com/show_bug.cgi?id=1236353



SUSE-SU-2025:0585-1: moderate: Security update for openssh


# Security update for openssh

Announcement ID: SUSE-SU-2025:0585-1
Release Date: 2025-02-18T16:42:30Z
Rating: moderate
References:

* bsc#1237040
* bsc#1237041

Cross-References:

* CVE-2025-26465
* CVE-2025-26466

CVSS scores:

* CVE-2025-26465 ( SUSE ): 6.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
* CVE-2025-26466 ( SUSE ): 8.2
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
* CVE-2025-26466 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Affected Products:

* Basesystem Module 15-SP6
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves two vulnerabilities can now be installed.

## Description:

This update for openssh fixes the following issues:

* CVE-2025-26465: Fixed MitM attack against OpenSSH's VerifyHostKeyDNS-enabled
client (bsc#1237040).
* CVE-2025-26466: Fixed DoS attack against OpenSSH's client and server
(bsc#1237041).

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-585=1 openSUSE-SLE-15.6-2025-585=1

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-585=1

* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-585=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* openssh-debugsource-9.6p1-150600.6.15.2
* openssh-debuginfo-9.6p1-150600.6.15.2
* openssh-askpass-gnome-debuginfo-9.6p1-150600.6.15.1
* openssh-common-9.6p1-150600.6.15.2
* openssh-9.6p1-150600.6.15.2
* openssh-cavs-9.6p1-150600.6.15.2
* openssh-clients-9.6p1-150600.6.15.2
* openssh-common-debuginfo-9.6p1-150600.6.15.2
* openssh-fips-9.6p1-150600.6.15.2
* openssh-askpass-gnome-9.6p1-150600.6.15.1
* openssh-helpers-debuginfo-9.6p1-150600.6.15.2
* openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2
* openssh-server-9.6p1-150600.6.15.2
* openssh-helpers-9.6p1-150600.6.15.2
* openssh-server-debuginfo-9.6p1-150600.6.15.2
* openssh-cavs-debuginfo-9.6p1-150600.6.15.2
* openssh-clients-debuginfo-9.6p1-150600.6.15.2
* openssh-askpass-gnome-debugsource-9.6p1-150600.6.15.1
* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* openssh-debugsource-9.6p1-150600.6.15.2
* openssh-debuginfo-9.6p1-150600.6.15.2
* openssh-common-9.6p1-150600.6.15.2
* openssh-9.6p1-150600.6.15.2
* openssh-server-debuginfo-9.6p1-150600.6.15.2
* openssh-clients-9.6p1-150600.6.15.2
* openssh-common-debuginfo-9.6p1-150600.6.15.2
* openssh-fips-9.6p1-150600.6.15.2
* openssh-helpers-debuginfo-9.6p1-150600.6.15.2
* openssh-server-config-disallow-rootlogin-9.6p1-150600.6.15.2
* openssh-server-9.6p1-150600.6.15.2
* openssh-helpers-9.6p1-150600.6.15.2
* openssh-clients-debuginfo-9.6p1-150600.6.15.2
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* openssh-askpass-gnome-debuginfo-9.6p1-150600.6.15.1
* openssh-askpass-gnome-9.6p1-150600.6.15.1
* openssh-askpass-gnome-debugsource-9.6p1-150600.6.15.1

## References:

* https://www.suse.com/security/cve/CVE-2025-26465.html
* https://www.suse.com/security/cve/CVE-2025-26466.html
* https://bugzilla.suse.com/show_bug.cgi?id=1237040
* https://bugzilla.suse.com/show_bug.cgi?id=1237041



openSUSE-SU-2025:0066-1: important: Security update for java-11-openj9


openSUSE Security Update: Security update for java-11-openj9
_______________________________

Announcement ID: openSUSE-SU-2025:0066-1
Rating: important
References: #1181239 #1185055 #1185056 #1188564 #1188565
#1188566 #1191901 #1191903 #1191904 #1191906
#1191909 #1191910 #1191911 #1191912 #1191913
#1191914 #1194925 #1194926 #1194927 #1194928
#1194929 #1194930 #1194931 #1194932 #1194933
#1194934 #1194935 #1194937 #1194939 #1194940
#1194941 #1198671 #1198672 #1198673 #1198674
#1198675 #1198935 #1201684 #1201692 #1201694
#1204468 #1204471 #1204472 #1204473 #1204475
#1204480 #1204703 #1206549 #1207246 #1207248
#1207922 #1210628 #1210631 #1210632 #1210634
#1210635 #1210636 #1210637 #1211615 #1213470
#1213473 #1213474 #1213475 #1213481 #1213482
#1216374 #1217214 #1218903 #1218905 #1218906
#1218907 #1218909 #1218911 #1222979 #1222983
#1222984 #1222986 #1222987 #1225470 #1228046
#1228047 #1228048 #1228050 #1228051 #1228052
#1231702 #1231711 #1231716 #1231719 #1236278
#1236804
Cross-References: CVE-2020-14803 CVE-2021-41041 CVE-2022-21426
CVE-2022-21434 CVE-2022-21443 CVE-2022-21476
CVE-2022-21496 CVE-2022-21540 CVE-2022-21541
CVE-2022-21618 CVE-2022-21619 CVE-2022-21624
CVE-2022-21626 CVE-2022-21628 CVE-2022-34169
CVE-2022-3676 CVE-2022-39399 CVE-2023-21835
CVE-2023-21843 CVE-2023-21930 CVE-2023-21937
CVE-2023-21938 CVE-2023-21939 CVE-2023-21954
CVE-2023-21967 CVE-2023-21968 CVE-2023-22006
CVE-2023-22036 CVE-2023-22041 CVE-2023-22045
CVE-2023-22049 CVE-2023-22081 CVE-2023-25193
CVE-2023-2597 CVE-2023-5676 CVE-2024-20918
CVE-2024-20919 CVE-2024-20921 CVE-2024-20926
CVE-2024-20945 CVE-2024-20952 CVE-2024-21011
CVE-2024-21012 CVE-2024-21068 CVE-2024-21085
CVE-2024-21094 CVE-2024-21131 CVE-2024-21138
CVE-2024-21140 CVE-2024-21144 CVE-2024-21145
CVE-2024-21147 CVE-2024-21208 CVE-2024-21210
CVE-2024-21217 CVE-2024-21235 CVE-2024-3933
CVE-2025-21502
CVSS scores:
CVE-2020-14803 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2022-21426 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2022-21434 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2022-21443 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2022-21476 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2022-21496 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2022-21540 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2022-21541 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2022-21618 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2022-21619 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2022-21624 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2022-21626 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2022-21628 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2022-34169 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2022-3676 (SUSE): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2022-39399 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2023-21835 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2023-21843 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2023-21930 (SUSE): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
CVE-2023-21937 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2023-21938 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2023-21939 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2023-21954 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2023-21967 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2023-21968 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2023-22006 (SUSE): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
CVE-2023-22036 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2023-22041 (SUSE): 5.1 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2023-22045 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2023-22049 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2023-22081 (SUSE): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2023-25193 (SUSE): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2023-2597 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2023-5676 (SUSE): 6.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
CVE-2024-20918 (SUSE): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
CVE-2024-20919 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE-2024-20921 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2024-20926 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2024-20945 (SUSE): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2024-20952 (SUSE): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
CVE-2024-21011 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2024-21012 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2024-21068 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2024-21085 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2024-21094 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2024-21131 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
CVE-2024-21138 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2024-21140 (SUSE): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2024-21144 (SUSE): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
CVE-2024-21145 (SUSE): 4.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVE-2024-21147 (SUSE): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
CVE-2024-21208 (SUSE): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
CVE-2024-21210 (SUSE): 6.3 CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
CVE-2024-21217 (SUSE): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
CVE-2024-21235 (SUSE): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
CVE-2024-3933 (SUSE): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L
CVE-2025-21502 (SUSE): 6.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Products:
openSUSE Backports SLE-15-SP6
_______________________________

An update that solves 58 vulnerabilities and has 33 fixes
is now available.

Description:

This update for java-11-openj9 fixes the following issues:

- Update to OpenJDK 11.0.26 with OpenJ9 0.49.0 virtual machine
- Including Oracle October 2024 and January 2025 CPU changes
* CVE-2024-21208 (boo#1231702), CVE-2024-21210 (boo#1231711),
CVE-2024-21217 (boo#1231716), CVE-2024-21235 (boo#1231719),
CVE-2025-21502 (boo#1236278)
* OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.49/

- Update to OpenJDK 11.0.24 with OpenJ9 0.46.0 virtual machine
- Including Oracle July 2024 CPU changes
* CVE-2024-21131 (boo#1228046), CVE-2024-21138 (boo#1228047),
CVE-2024-21140 (boo#1228048), CVE-2024-21144 (boo#1228050),
CVE-2024-21147 (boo#1228052), CVE-2024-21145 (boo#1228051)
* OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.46/

- Update to OpenJDK 11.0.23 with OpenJ9 0.44.0 virtual machine
- Including Oracle April 2024 CPU changes
* CVE-2024-21012 (boo#1222987), CVE-2024-21094 (boo#1222986),
CVE-2024-21011 (boo#1222979), CVE-2024-21085 (boo#1222984),
CVE-2024-21068 (boo#1222983)
- Including OpenJ9/OMR specific fix:
* CVE-2024-3933 (boo#1225470)
* OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.44/

- Update to OpenJDK 11.0.22 with OpenJ9 0.43.0 virtual machine
- Including Oracle January 2024 CPU changes
* CVE-2024-20918 (boo#1218907), CVE-2024-20919 (boo#1218903),
CVE-2024-20921 (boo#1218905), CVE-2024-20926 (boo#1218906),
CVE-2024-20945 (boo#1218909), CVE-2024-20952 (boo#1218911)
* OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.43/
- Remove the possibility to put back removes JavaEE modules, since
our Java stack does not need this hack any more

- Update to OpenJDK 11.0.21 with OpenJ9 0.41.0 virtual machine
- Including Oracle October 2023 CPU changes
* CVE-2023-22081, boo#1216374
- Including Openj9 0.41.0 fixes of CVE-2023-5676, boo#1217214
* For other OpenJ9 changes, see
https://www.eclipse.org/openj9/docs/version0.41

- Update to OpenJDK 11.0.20.1 with OpenJ9 0.40.0 virtual machine
* JDK-8313765: Invalid CEN header (invalid zip64 extra data field size)

- Update to OpenJDK 11.0.20 with OpenJ9 0.40.0 virtual machine
- Including Oracle April 2023 CPU changes
* CVE-2023-22006 (boo#1213473), CVE-2023-22036 (boo#1213474),
CVE-2023-22041 (boo#1213475), CVE-2023-22045 (boo#1213481),
CVE-2023-22049 (boo#1213482), CVE-2023-25193 (boo#1207922)
* OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.40

- Update to OpenJDK 11.0.19 with OpenJ9 0.38.0 virtual machine
- Including Oracle April 2023 CPU changes
* CVE-2023-21930 (boo#1210628), CVE-2023-21937 (boo#1210631),
CVE-2023-21938 (boo#1210632), CVE-2023-21939 (boo#1210634),
CVE-2023-21954 (boo#1210635), CVE-2023-21967 (boo#1210636),
CVE-2023-21968 (boo#1210637)
* OpenJ9 specific vulnerability: CVE-2023-2597 (boo#1211615)
* OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.38

- Update to OpenJDK 11.0.18 with OpenJ9 0.36.1 virtual machine
* Including Oracle January 2023 CPU changes
+ CVE-2023-21835, boo#1207246
+ CVE-2023-21843, boo#1207248
* OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.36

- Update to OpenJDK 11.0.17 with OpenJ9 0.35.0 virtual machine
* Including Oracle October 2022 CPU changes CVE-2022-21618
(boo#1204468), CVE-2022-21619 (boo#1204473), CVE-2022-21626
(boo#1204471), CVE-2022-21624 (boo#1204475), CVE-2022-21628
(boo#1204472), CVE-2022-39399 (boo#1204480)
* Fixes OpenJ9 vulnerability boo#1204703, CVE-2022-3676
* OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.35

- Update to OpenJDK 11.0.16 with OpenJ9 0.33.0 virtual machine
* Including Oracle July 2022 CPU changes CVE-2022-21540 (boo#1201694),
CVE-2022-21541 (boo#1201692), CVE-2022-34169 (boo#1201684)
* OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.33

- Update to OpenJDK 11.0.15 with OpenJ9 0.32.0 virtual machine
* Fixes boo#1198935, CVE-2021-41041: unverified methods can be invoked
using MethodHandles
* Including Oracle April 2022 CPU fixes CVE-2022-21426 (boo#1198672),
CVE-2022-21434 (boo#1198674), CVE-2022-21443 (boo#1198675),
CVE-2022-21476 (boo#1198671), CVE-2022-21496 (boo#1198673)
* OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.32

- Update to OpenJDK 11.0.14.1 with OpenJ9 0.30.1 virtual machine
* including Oracle January 2022 CPU changes (boo#1194925, boo#1194926,
boo#1194927, boo#1194928, boo#1194929, boo#1194930, boo#1194931,
boo#1194932, boo#1194933, boo#1194934, boo#1194935, boo#1194937,
boo#1194939, boo#1194940, boo#1194941)
* OpenJ9 changes see https://www.eclipse.org/openj9/docs/version0.30.1

- Update to OpenJDK 11.0.13 with OpenJ9 0.29.0 virtual machine
* including Oracle July 2021 and October 2021 CPU changes (boo#1188564,
boo#1188565, boo#1188566, boo#1191901, boo#1191909, boo#1191910,
boo#1191911, boo#1191912, boo#1191913, boo#1191903, boo#1191904,
boo#1191914, boo#1191906)
* OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.29

- Update to OpenJDK 11.0.11 with OpenJ9 0.26.0 virtual machine
* including Oracle April 2021 CPU changes (boo#1185055 and boo#1185056)
* OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.26

- Update to OpenJDK 11.0.10 with OpenJ9 0.24.0 virtual machine
* including Oracle January 2021 CPU changes (boo#1181239)
* OpenJ9 changes, see https://www.eclipse.org/openj9/docs/version0.24

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".

Alternatively you can run the command listed for your product:

- openSUSE Backports SLE-15-SP6:

zypper in -t patch openSUSE-2025-66=1

Package List:

- openSUSE Backports SLE-15-SP6 (aarch64 ppc64le s390x x86_64):

java-11-openj9-11.0.26.0-bp156.4.3.1
java-11-openj9-demo-11.0.26.0-bp156.4.3.1
java-11-openj9-devel-11.0.26.0-bp156.4.3.1
java-11-openj9-headless-11.0.26.0-bp156.4.3.1
java-11-openj9-jmods-11.0.26.0-bp156.4.3.1
java-11-openj9-src-11.0.26.0-bp156.4.3.1

- openSUSE Backports SLE-15-SP6 (noarch):

java-11-openj9-javadoc-11.0.26.0-bp156.4.3.1

References:

https://www.suse.com/security/cve/CVE-2020-14803.html
https://www.suse.com/security/cve/CVE-2021-41041.html
https://www.suse.com/security/cve/CVE-2022-21426.html
https://www.suse.com/security/cve/CVE-2022-21434.html
https://www.suse.com/security/cve/CVE-2022-21443.html
https://www.suse.com/security/cve/CVE-2022-21476.html
https://www.suse.com/security/cve/CVE-2022-21496.html
https://www.suse.com/security/cve/CVE-2022-21540.html
https://www.suse.com/security/cve/CVE-2022-21541.html
https://www.suse.com/security/cve/CVE-2022-21618.html
https://www.suse.com/security/cve/CVE-2022-21619.html
https://www.suse.com/security/cve/CVE-2022-21624.html
https://www.suse.com/security/cve/CVE-2022-21626.html
https://www.suse.com/security/cve/CVE-2022-21628.html
https://www.suse.com/security/cve/CVE-2022-34169.html
https://www.suse.com/security/cve/CVE-2022-3676.html
https://www.suse.com/security/cve/CVE-2022-39399.html
https://www.suse.com/security/cve/CVE-2023-21835.html
https://www.suse.com/security/cve/CVE-2023-21843.html
https://www.suse.com/security/cve/CVE-2023-21930.html
https://www.suse.com/security/cve/CVE-2023-21937.html
https://www.suse.com/security/cve/CVE-2023-21938.html
https://www.suse.com/security/cve/CVE-2023-21939.html
https://www.suse.com/security/cve/CVE-2023-21954.html
https://www.suse.com/security/cve/CVE-2023-21967.html
https://www.suse.com/security/cve/CVE-2023-21968.html
https://www.suse.com/security/cve/CVE-2023-22006.html
https://www.suse.com/security/cve/CVE-2023-22036.html
https://www.suse.com/security/cve/CVE-2023-22041.html
https://www.suse.com/security/cve/CVE-2023-22045.html
https://www.suse.com/security/cve/CVE-2023-22049.html
https://www.suse.com/security/cve/CVE-2023-22081.html
https://www.suse.com/security/cve/CVE-2023-25193.html
https://www.suse.com/security/cve/CVE-2023-2597.html
https://www.suse.com/security/cve/CVE-2023-5676.html
https://www.suse.com/security/cve/CVE-2024-20918.html
https://www.suse.com/security/cve/CVE-2024-20919.html
https://www.suse.com/security/cve/CVE-2024-20921.html
https://www.suse.com/security/cve/CVE-2024-20926.html
https://www.suse.com/security/cve/CVE-2024-20945.html
https://www.suse.com/security/cve/CVE-2024-20952.html
https://www.suse.com/security/cve/CVE-2024-21011.html
https://www.suse.com/security/cve/CVE-2024-21012.html
https://www.suse.com/security/cve/CVE-2024-21068.html
https://www.suse.com/security/cve/CVE-2024-21085.html
https://www.suse.com/security/cve/CVE-2024-21094.html
https://www.suse.com/security/cve/CVE-2024-21131.html
https://www.suse.com/security/cve/CVE-2024-21138.html
https://www.suse.com/security/cve/CVE-2024-21140.html
https://www.suse.com/security/cve/CVE-2024-21144.html
https://www.suse.com/security/cve/CVE-2024-21145.html
https://www.suse.com/security/cve/CVE-2024-21147.html
https://www.suse.com/security/cve/CVE-2024-21208.html
https://www.suse.com/security/cve/CVE-2024-21210.html
https://www.suse.com/security/cve/CVE-2024-21217.html
https://www.suse.com/security/cve/CVE-2024-21235.html
https://www.suse.com/security/cve/CVE-2024-3933.html
https://www.suse.com/security/cve/CVE-2025-21502.html
https://bugzilla.suse.com/1181239
https://bugzilla.suse.com/1185055
https://bugzilla.suse.com/1185056
https://bugzilla.suse.com/1188564
https://bugzilla.suse.com/1188565
https://bugzilla.suse.com/1188566
https://bugzilla.suse.com/1191901
https://bugzilla.suse.com/1191903
https://bugzilla.suse.com/1191904
https://bugzilla.suse.com/1191906
https://bugzilla.suse.com/1191909
https://bugzilla.suse.com/1191910
https://bugzilla.suse.com/1191911
https://bugzilla.suse.com/1191912
https://bugzilla.suse.com/1191913
https://bugzilla.suse.com/1191914
https://bugzilla.suse.com/1194925
https://bugzilla.suse.com/1194926
https://bugzilla.suse.com/1194927
https://bugzilla.suse.com/1194928
https://bugzilla.suse.com/1194929
https://bugzilla.suse.com/1194930
https://bugzilla.suse.com/1194931
https://bugzilla.suse.com/1194932
https://bugzilla.suse.com/1194933
https://bugzilla.suse.com/1194934
https://bugzilla.suse.com/1194935
https://bugzilla.suse.com/1194937
https://bugzilla.suse.com/1194939
https://bugzilla.suse.com/1194940
https://bugzilla.suse.com/1194941
https://bugzilla.suse.com/1198671
https://bugzilla.suse.com/1198672
https://bugzilla.suse.com/1198673
https://bugzilla.suse.com/1198674
https://bugzilla.suse.com/1198675
https://bugzilla.suse.com/1198935
https://bugzilla.suse.com/1201684
https://bugzilla.suse.com/1201692
https://bugzilla.suse.com/1201694
https://bugzilla.suse.com/1204468
https://bugzilla.suse.com/1204471
https://bugzilla.suse.com/1204472
https://bugzilla.suse.com/1204473
https://bugzilla.suse.com/1204475
https://bugzilla.suse.com/1204480
https://bugzilla.suse.com/1204703
https://bugzilla.suse.com/1206549
https://bugzilla.suse.com/1207246
https://bugzilla.suse.com/1207248
https://bugzilla.suse.com/1207922
https://bugzilla.suse.com/1210628
https://bugzilla.suse.com/1210631
https://bugzilla.suse.com/1210632
https://bugzilla.suse.com/1210634
https://bugzilla.suse.com/1210635
https://bugzilla.suse.com/1210636
https://bugzilla.suse.com/1210637
https://bugzilla.suse.com/1211615
https://bugzilla.suse.com/1213470
https://bugzilla.suse.com/1213473
https://bugzilla.suse.com/1213474
https://bugzilla.suse.com/1213475
https://bugzilla.suse.com/1213481
https://bugzilla.suse.com/1213482
https://bugzilla.suse.com/1216374
https://bugzilla.suse.com/1217214
https://bugzilla.suse.com/1218903
https://bugzilla.suse.com/1218905
https://bugzilla.suse.com/1218906
https://bugzilla.suse.com/1218907
https://bugzilla.suse.com/1218909
https://bugzilla.suse.com/1218911
https://bugzilla.suse.com/1222979
https://bugzilla.suse.com/1222983
https://bugzilla.suse.com/1222984
https://bugzilla.suse.com/1222986
https://bugzilla.suse.com/1222987
https://bugzilla.suse.com/1225470
https://bugzilla.suse.com/1228046
https://bugzilla.suse.com/1228047
https://bugzilla.suse.com/1228048
https://bugzilla.suse.com/1228050
https://bugzilla.suse.com/1228051
https://bugzilla.suse.com/1228052
https://bugzilla.suse.com/1231702
https://bugzilla.suse.com/1231711
https://bugzilla.suse.com/1231716
https://bugzilla.suse.com/1231719
https://bugzilla.suse.com/1236278
https://bugzilla.suse.com/1236804



SUSE-SU-2025:0586-1: important: Security update for grub2


# Security update for grub2

Announcement ID: SUSE-SU-2025:0586-1
Release Date: 2025-02-19T07:29:02Z
Rating: important
References:

* bsc#1229163
* bsc#1229164
* bsc#1233606
* bsc#1233608
* bsc#1233609
* bsc#1233610
* bsc#1233612
* bsc#1233613
* bsc#1233614
* bsc#1233615
* bsc#1233616
* bsc#1233617
* bsc#1234958
* bsc#1236316
* bsc#1236317
* bsc#1237002
* bsc#1237006
* bsc#1237008
* bsc#1237009
* bsc#1237010
* bsc#1237011
* bsc#1237012
* bsc#1237013
* bsc#1237014

Cross-References:

* CVE-2024-45774
* CVE-2024-45775
* CVE-2024-45776
* CVE-2024-45777
* CVE-2024-45778
* CVE-2024-45779
* CVE-2024-45780
* CVE-2024-45781
* CVE-2024-45782
* CVE-2024-45783
* CVE-2024-49504
* CVE-2024-56737
* CVE-2025-0622
* CVE-2025-0624
* CVE-2025-0677
* CVE-2025-0678
* CVE-2025-0684
* CVE-2025-0685
* CVE-2025-0686
* CVE-2025-0689
* CVE-2025-0690
* CVE-2025-1118
* CVE-2025-1125

CVSS scores:

* CVE-2024-45774 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45774 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45775 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45775 ( NVD ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-45776 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45776 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45777 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45778 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-45779 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45780 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45781 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45781 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45782 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45783 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45783 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-49504 ( SUSE ): 6.9
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2024-49504 ( SUSE ): 6.2 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
* CVE-2024-49504 ( NVD ): 7.0
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2024-56737 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56737 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-56737 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-0622 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0622 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0624 ( SUSE ): 7.6 CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2025-0677 ( SUSE ): 8.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0677 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0678 ( SUSE ): 8.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0678 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0684 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0685 ( SUSE ): 8.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0685 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0686 ( SUSE ): 8.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0686 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0689 ( SUSE ): 8.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0689 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0690 ( SUSE ): 7.3
CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0690 ( SUSE ): 6.1 CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-1118 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-1118 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-1125 ( SUSE ): 8.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-1125 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* Basesystem Module 15-SP6
* openSUSE Leap 15.6
* Server Applications Module 15-SP6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6

An update that solves 23 vulnerabilities and has one security fix can now be
installed.

## Description:

This update for grub2 fixes the following issues:

* CVE-2024-45781: Fixed strcpy overflow in ufs. (bsc#1233617)
* CVE-2024-56737: Fixed a heap-based buffer overflow in hfs. (bsc#1234958)
* CVE-2024-45782: Fixed strcpy overflow in hfs. (bsc#1233615)
* CVE-2024-45780: Fixed an overflow in tar/cpio. (bsc#1233614)
* CVE-2024-45783: Fixed a refcount overflow in hfsplus. (bsc#1233616)
* CVE-2024-45774: Fixed a heap overflow in JPEG parser. (bsc#1233609)
* CVE-2024-45775: Fixed a missing NULL check in extcmd parser. (bsc#1233610)
* CVE-2024-45776: Fixed an overflow in .MO file handling. (bsc#1233612)
* CVE-2024-45777: Fixed an integer overflow in gettext. (bsc#1233613)
* CVE-2024-45778: Fixed bfs filesystem by removing it from lockdown capable
modules. (bsc#1233606)
* CVE-2024-45779: Fixed a heap overflow in bfs. (bsc#1233608)
* CVE-2024-49504: Fixed an issue that can bypass TPM-bound disk encryption on
SL(E)M encrypted Images. (bsc#1229164)
* CVE-2025-0624: Fixed an out-of-bounds write during the network boot process.
(bsc#1236316)
* CVE-2025-0622: Fixed a use-after-free when handling hooks during module
unload in command/gpg . (bsc#1236317)
* CVE-2025-0690: Fixed an integer overflow that may lead to an out-of-bounds
write through the read command. (bsc#1237012)
* CVE-2025-1118: Fixed an issue where the dump command was not being blocked
when grub was in lockdown mode. (bsc#1237013)
* CVE-2025-0677: Fixed an integer overflow that may lead to an out-of-bounds
write when handling symlinks in ufs. (bsc#1237002)
* CVE-2025-0684: Fixed an integer overflow that may lead to an out-of-bounds
write when handling symlinks in reiserfs. (bsc#1237008)
* CVE-2025-0685: Fixed an integer overflow that may lead to an out-of-bounds
write when handling symlinks in jfs. (bsc#1237009)
* CVE-2025-0686: Fixed an integer overflow that may lead to an out-of-bounds
write when handling symlinks in romfs. (bsc#1237010)
* CVE-2025-0689: Fixed a heap-based buffer overflow in udf that may lead to
arbitrary code execution. (bsc#1237011)
* CVE-2025-1125: Fixed an integer overflow that may lead to an out-of-bounds
write in hfs. (bsc#1237014)
* CVE-2025-0678: Fixed an integer overflow that may lead to an out-of-bounds
write in squash4. (bsc#1237006)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* Basesystem Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-586=1

* Server Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-586=1

* openSUSE Leap 15.6
zypper in -t patch SUSE-2025-586=1 openSUSE-SLE-15.6-2025-586=1

## Package List:

* Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* grub2-debuginfo-2.12-150600.8.18.2
* grub2-2.12-150600.8.18.2
* Basesystem Module 15-SP6 (noarch)
* grub2-powerpc-ieee1275-2.12-150600.8.18.2
* grub2-systemd-sleep-plugin-2.12-150600.8.18.2
* grub2-x86_64-efi-2.12-150600.8.18.2
* grub2-snapper-plugin-2.12-150600.8.18.2
* grub2-i386-pc-2.12-150600.8.18.2
* grub2-arm64-efi-2.12-150600.8.18.2
* Basesystem Module 15-SP6 (aarch64 s390x x86_64)
* grub2-debugsource-2.12-150600.8.18.2
* Basesystem Module 15-SP6 (s390x)
* grub2-s390x-emu-2.12-150600.8.18.2
* Server Applications Module 15-SP6 (noarch)
* grub2-x86_64-xen-2.12-150600.8.18.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586)
* grub2-branding-upstream-2.12-150600.8.18.2
* grub2-debuginfo-2.12-150600.8.18.2
* grub2-2.12-150600.8.18.2
* openSUSE Leap 15.6 (aarch64 s390x x86_64 i586)
* grub2-debugsource-2.12-150600.8.18.2
* openSUSE Leap 15.6 (noarch)
* grub2-powerpc-ieee1275-2.12-150600.8.18.2
* grub2-x86_64-efi-extras-2.12-150600.8.18.2
* grub2-i386-pc-extras-2.12-150600.8.18.2
* grub2-x86_64-xen-debug-2.12-150600.8.18.2
* grub2-i386-efi-extras-2.12-150600.8.18.2
* grub2-arm64-efi-2.12-150600.8.18.2
* grub2-i386-pc-debug-2.12-150600.8.18.2
* grub2-x86_64-xen-2.12-150600.8.18.2
* grub2-i386-efi-debug-2.12-150600.8.18.2
* grub2-snapper-plugin-2.12-150600.8.18.2
* grub2-s390x-emu-extras-2.12-150600.8.18.2
* grub2-i386-xen-debug-2.12-150600.8.18.2
* grub2-powerpc-ieee1275-debug-2.12-150600.8.18.2
* grub2-systemd-sleep-plugin-2.12-150600.8.18.2
* grub2-i386-pc-2.12-150600.8.18.2
* grub2-arm64-efi-debug-2.12-150600.8.18.2
* grub2-i386-xen-2.12-150600.8.18.2
* grub2-arm64-efi-extras-2.12-150600.8.18.2
* grub2-x86_64-efi-debug-2.12-150600.8.18.2
* grub2-x86_64-xen-extras-2.12-150600.8.18.2
* grub2-powerpc-ieee1275-extras-2.12-150600.8.18.2
* grub2-x86_64-efi-2.12-150600.8.18.2
* grub2-i386-efi-2.12-150600.8.18.2
* grub2-i386-xen-extras-2.12-150600.8.18.2
* openSUSE Leap 15.6 (s390x)
* grub2-s390x-emu-debug-2.12-150600.8.18.2
* grub2-s390x-emu-2.12-150600.8.18.2

## References:

* https://www.suse.com/security/cve/CVE-2024-45774.html
* https://www.suse.com/security/cve/CVE-2024-45775.html
* https://www.suse.com/security/cve/CVE-2024-45776.html
* https://www.suse.com/security/cve/CVE-2024-45777.html
* https://www.suse.com/security/cve/CVE-2024-45778.html
* https://www.suse.com/security/cve/CVE-2024-45779.html
* https://www.suse.com/security/cve/CVE-2024-45780.html
* https://www.suse.com/security/cve/CVE-2024-45781.html
* https://www.suse.com/security/cve/CVE-2024-45782.html
* https://www.suse.com/security/cve/CVE-2024-45783.html
* https://www.suse.com/security/cve/CVE-2024-49504.html
* https://www.suse.com/security/cve/CVE-2024-56737.html
* https://www.suse.com/security/cve/CVE-2025-0622.html
* https://www.suse.com/security/cve/CVE-2025-0624.html
* https://www.suse.com/security/cve/CVE-2025-0677.html
* https://www.suse.com/security/cve/CVE-2025-0678.html
* https://www.suse.com/security/cve/CVE-2025-0684.html
* https://www.suse.com/security/cve/CVE-2025-0685.html
* https://www.suse.com/security/cve/CVE-2025-0686.html
* https://www.suse.com/security/cve/CVE-2025-0689.html
* https://www.suse.com/security/cve/CVE-2025-0690.html
* https://www.suse.com/security/cve/CVE-2025-1118.html
* https://www.suse.com/security/cve/CVE-2025-1125.html
* https://bugzilla.suse.com/show_bug.cgi?id=1229163
* https://bugzilla.suse.com/show_bug.cgi?id=1229164
* https://bugzilla.suse.com/show_bug.cgi?id=1233606
* https://bugzilla.suse.com/show_bug.cgi?id=1233608
* https://bugzilla.suse.com/show_bug.cgi?id=1233609
* https://bugzilla.suse.com/show_bug.cgi?id=1233610
* https://bugzilla.suse.com/show_bug.cgi?id=1233612
* https://bugzilla.suse.com/show_bug.cgi?id=1233613
* https://bugzilla.suse.com/show_bug.cgi?id=1233614
* https://bugzilla.suse.com/show_bug.cgi?id=1233615
* https://bugzilla.suse.com/show_bug.cgi?id=1233616
* https://bugzilla.suse.com/show_bug.cgi?id=1233617
* https://bugzilla.suse.com/show_bug.cgi?id=1234958
* https://bugzilla.suse.com/show_bug.cgi?id=1236316
* https://bugzilla.suse.com/show_bug.cgi?id=1236317
* https://bugzilla.suse.com/show_bug.cgi?id=1237002
* https://bugzilla.suse.com/show_bug.cgi?id=1237006
* https://bugzilla.suse.com/show_bug.cgi?id=1237008
* https://bugzilla.suse.com/show_bug.cgi?id=1237009
* https://bugzilla.suse.com/show_bug.cgi?id=1237010
* https://bugzilla.suse.com/show_bug.cgi?id=1237011
* https://bugzilla.suse.com/show_bug.cgi?id=1237012
* https://bugzilla.suse.com/show_bug.cgi?id=1237013
* https://bugzilla.suse.com/show_bug.cgi?id=1237014



SUSE-SU-2025:0587-1: important: Security update for grub2


# Security update for grub2

Announcement ID: SUSE-SU-2025:0587-1
Release Date: 2025-02-19T07:29:36Z
Rating: important
References:

* bsc#1233606
* bsc#1233608
* bsc#1233609
* bsc#1233610
* bsc#1233612
* bsc#1233613
* bsc#1233614
* bsc#1233615
* bsc#1233616
* bsc#1233617
* bsc#1234958
* bsc#1236316
* bsc#1236317
* bsc#1237002
* bsc#1237006
* bsc#1237008
* bsc#1237009
* bsc#1237010
* bsc#1237011
* bsc#1237012
* bsc#1237013
* bsc#1237014

Cross-References:

* CVE-2024-45774
* CVE-2024-45775
* CVE-2024-45776
* CVE-2024-45777
* CVE-2024-45778
* CVE-2024-45779
* CVE-2024-45780
* CVE-2024-45781
* CVE-2024-45782
* CVE-2024-45783
* CVE-2024-56737
* CVE-2025-0622
* CVE-2025-0624
* CVE-2025-0677
* CVE-2025-0678
* CVE-2025-0684
* CVE-2025-0685
* CVE-2025-0686
* CVE-2025-0689
* CVE-2025-0690
* CVE-2025-1118
* CVE-2025-1125

CVSS scores:

* CVE-2024-45774 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45774 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45775 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45775 ( NVD ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-45776 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45776 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45777 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45778 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-45779 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45780 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45781 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45781 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45782 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45783 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45783 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56737 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56737 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-56737 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-0622 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0622 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0624 ( SUSE ): 7.6 CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2025-0677 ( SUSE ): 8.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0677 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0678 ( SUSE ): 8.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0678 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0684 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0685 ( SUSE ): 8.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0685 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0686 ( SUSE ): 8.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0686 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0689 ( SUSE ): 8.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0689 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0690 ( SUSE ): 7.3
CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0690 ( SUSE ): 6.1 CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-1118 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-1118 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-1125 ( SUSE ): 8.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-1125 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP5 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP5

An update that solves 22 vulnerabilities can now be installed.

## Description:

This update for grub2 fixes the following issues:

* CVE-2024-45781: Fixed strcpy overflow in ufs. (bsc#1233617)
* CVE-2024-56737: Fixed a heap-based buffer overflow in hfs. (bsc#1234958)
* CVE-2024-45782: Fixed strcpy overflow in hfs. (bsc#1233615)
* CVE-2024-45780: Fixed an overflow in tar/cpio. (bsc#1233614)
* CVE-2024-45783: Fixed a refcount overflow in hfsplus. (bsc#1233616)
* CVE-2024-45774: Fixed a heap overflow in JPEG parser. (bsc#1233609)
* CVE-2024-45775: Fixed a missing NULL check in extcmd parser. (bsc#1233610)
* CVE-2024-45776: Fixed an overflow in .MO file handling. (bsc#1233612)
* CVE-2024-45777: Fixed an integer overflow in gettext. (bsc#1233613)
* CVE-2024-45778: Fixed bfs filesystem by removing it from lockdown capable
modules. (bsc#1233606)
* CVE-2024-45779: Fixed a heap overflow in bfs. (bsc#1233608)
* CVE-2025-0624: Fixed an out-of-bounds write during the network boot process.
(bsc#1236316)
* CVE-2025-0622: Fixed a use-after-free when handling hooks during module
unload in command/gpg . (bsc#1236317)
* CVE-2025-0690: Fixed an integer overflow that may lead to an out-of-bounds
write through the read command. (bsc#1237012)
* CVE-2025-1118: Fixed an issue where the dump command was not being blocked
when grub was in lockdown mode. (bsc#1237013)
* CVE-2025-0677: Fixed an integer overflow that may lead to an out-of-bounds
write when handling symlinks in ufs. (bsc#1237002)
* CVE-2025-0684: Fixed an integer overflow that may lead to an out-of-bounds
write when handling symlinks in reiserfs. (bsc#1237008)
* CVE-2025-0685: Fixed an integer overflow that may lead to an out-of-bounds
write when handling symlinks in jfs. (bsc#1237009)
* CVE-2025-0686: Fixed an integer overflow that may lead to an out-of-bounds
write when handling symlinks in romfs. (bsc#1237010)
* CVE-2025-0689: Fixed a heap-based buffer overflow in udf that may lead to
arbitrary code execution. (bsc#1237011)
* CVE-2025-1125: Fixed an integer overflow that may lead to an out-of-bounds
write in hfs. (bsc#1237014)
* CVE-2025-0678: Fixed an integer overflow that may lead to an out-of-bounds
write in squash4. (bsc#1237006)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch SUSE-2025-587=1

* SUSE Linux Enterprise Micro 5.5
zypper in -t patch SUSE-SLE-Micro-5.5-2025-587=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-587=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5
zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-587=1

* SUSE Linux Enterprise Server 15 SP5 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-587=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP5
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-587=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586)
* grub2-debuginfo-2.06-150500.29.43.2
* grub2-2.06-150500.29.43.2
* grub2-branding-upstream-2.06-150500.29.43.2
* openSUSE Leap 15.5 (aarch64 s390x x86_64 i586)
* grub2-debugsource-2.06-150500.29.43.2
* openSUSE Leap 15.5 (noarch)
* grub2-i386-efi-extras-2.06-150500.29.43.2
* grub2-arm64-efi-2.06-150500.29.43.2
* grub2-i386-xen-extras-2.06-150500.29.43.2
* grub2-systemd-sleep-plugin-2.06-150500.29.43.2
* grub2-powerpc-ieee1275-2.06-150500.29.43.2
* grub2-arm64-efi-debug-2.06-150500.29.43.2
* grub2-x86_64-efi-extras-2.06-150500.29.43.2
* grub2-s390x-emu-extras-2.06-150500.29.43.2
* grub2-i386-pc-2.06-150500.29.43.2
* grub2-i386-xen-2.06-150500.29.43.2
* grub2-powerpc-ieee1275-extras-2.06-150500.29.43.2
* grub2-x86_64-xen-2.06-150500.29.43.2
* grub2-i386-xen-debug-2.06-150500.29.43.2
* grub2-x86_64-xen-extras-2.06-150500.29.43.2
* grub2-x86_64-xen-debug-2.06-150500.29.43.2
* grub2-i386-efi-debug-2.06-150500.29.43.2
* grub2-powerpc-ieee1275-debug-2.06-150500.29.43.2
* grub2-i386-pc-debug-2.06-150500.29.43.2
* grub2-i386-efi-2.06-150500.29.43.2
* grub2-arm64-efi-extras-2.06-150500.29.43.2
* grub2-snapper-plugin-2.06-150500.29.43.2
* grub2-x86_64-efi-debug-2.06-150500.29.43.2
* grub2-i386-pc-extras-2.06-150500.29.43.2
* grub2-x86_64-efi-2.06-150500.29.43.2
* openSUSE Leap 15.5 (s390x)
* grub2-s390x-emu-debug-2.06-150500.29.43.2
* grub2-s390x-emu-2.06-150500.29.43.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64)
* grub2-debuginfo-2.06-150500.29.43.2
* grub2-2.06-150500.29.43.2
* SUSE Linux Enterprise Micro 5.5 (noarch)
* grub2-snapper-plugin-2.06-150500.29.43.2
* grub2-i386-pc-2.06-150500.29.43.2
* grub2-arm64-efi-2.06-150500.29.43.2
* grub2-powerpc-ieee1275-2.06-150500.29.43.2
* grub2-x86_64-xen-2.06-150500.29.43.2
* grub2-x86_64-efi-2.06-150500.29.43.2
* SUSE Linux Enterprise Micro 5.5 (aarch64 s390x x86_64)
* grub2-debugsource-2.06-150500.29.43.2
* SUSE Linux Enterprise Micro 5.5 (s390x)
* grub2-s390x-emu-2.06-150500.29.43.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64
x86_64)
* grub2-debuginfo-2.06-150500.29.43.2
* grub2-2.06-150500.29.43.2
* grub2-debugsource-2.06-150500.29.43.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (noarch)
* grub2-snapper-plugin-2.06-150500.29.43.2
* grub2-i386-pc-2.06-150500.29.43.2
* grub2-arm64-efi-2.06-150500.29.43.2
* grub2-systemd-sleep-plugin-2.06-150500.29.43.2
* grub2-x86_64-xen-2.06-150500.29.43.2
* grub2-x86_64-efi-2.06-150500.29.43.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64
x86_64)
* grub2-debuginfo-2.06-150500.29.43.2
* grub2-2.06-150500.29.43.2
* grub2-debugsource-2.06-150500.29.43.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (noarch)
* grub2-snapper-plugin-2.06-150500.29.43.2
* grub2-i386-pc-2.06-150500.29.43.2
* grub2-arm64-efi-2.06-150500.29.43.2
* grub2-systemd-sleep-plugin-2.06-150500.29.43.2
* grub2-x86_64-xen-2.06-150500.29.43.2
* grub2-x86_64-efi-2.06-150500.29.43.2
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* grub2-debuginfo-2.06-150500.29.43.2
* grub2-2.06-150500.29.43.2
* SUSE Linux Enterprise Server 15 SP5 LTSS (noarch)
* grub2-snapper-plugin-2.06-150500.29.43.2
* grub2-i386-pc-2.06-150500.29.43.2
* grub2-arm64-efi-2.06-150500.29.43.2
* grub2-systemd-sleep-plugin-2.06-150500.29.43.2
* grub2-powerpc-ieee1275-2.06-150500.29.43.2
* grub2-x86_64-xen-2.06-150500.29.43.2
* grub2-x86_64-efi-2.06-150500.29.43.2
* SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 s390x x86_64)
* grub2-debugsource-2.06-150500.29.43.2
* SUSE Linux Enterprise Server 15 SP5 LTSS (s390x)
* grub2-s390x-emu-2.06-150500.29.43.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64)
* grub2-debuginfo-2.06-150500.29.43.2
* grub2-2.06-150500.29.43.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (noarch)
* grub2-snapper-plugin-2.06-150500.29.43.2
* grub2-i386-pc-2.06-150500.29.43.2
* grub2-systemd-sleep-plugin-2.06-150500.29.43.2
* grub2-powerpc-ieee1275-2.06-150500.29.43.2
* grub2-x86_64-xen-2.06-150500.29.43.2
* grub2-x86_64-efi-2.06-150500.29.43.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64)
* grub2-debugsource-2.06-150500.29.43.2

## References:

* https://www.suse.com/security/cve/CVE-2024-45774.html
* https://www.suse.com/security/cve/CVE-2024-45775.html
* https://www.suse.com/security/cve/CVE-2024-45776.html
* https://www.suse.com/security/cve/CVE-2024-45777.html
* https://www.suse.com/security/cve/CVE-2024-45778.html
* https://www.suse.com/security/cve/CVE-2024-45779.html
* https://www.suse.com/security/cve/CVE-2024-45780.html
* https://www.suse.com/security/cve/CVE-2024-45781.html
* https://www.suse.com/security/cve/CVE-2024-45782.html
* https://www.suse.com/security/cve/CVE-2024-45783.html
* https://www.suse.com/security/cve/CVE-2024-56737.html
* https://www.suse.com/security/cve/CVE-2025-0622.html
* https://www.suse.com/security/cve/CVE-2025-0624.html
* https://www.suse.com/security/cve/CVE-2025-0677.html
* https://www.suse.com/security/cve/CVE-2025-0678.html
* https://www.suse.com/security/cve/CVE-2025-0684.html
* https://www.suse.com/security/cve/CVE-2025-0685.html
* https://www.suse.com/security/cve/CVE-2025-0686.html
* https://www.suse.com/security/cve/CVE-2025-0689.html
* https://www.suse.com/security/cve/CVE-2025-0690.html
* https://www.suse.com/security/cve/CVE-2025-1118.html
* https://www.suse.com/security/cve/CVE-2025-1125.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233606
* https://bugzilla.suse.com/show_bug.cgi?id=1233608
* https://bugzilla.suse.com/show_bug.cgi?id=1233609
* https://bugzilla.suse.com/show_bug.cgi?id=1233610
* https://bugzilla.suse.com/show_bug.cgi?id=1233612
* https://bugzilla.suse.com/show_bug.cgi?id=1233613
* https://bugzilla.suse.com/show_bug.cgi?id=1233614
* https://bugzilla.suse.com/show_bug.cgi?id=1233615
* https://bugzilla.suse.com/show_bug.cgi?id=1233616
* https://bugzilla.suse.com/show_bug.cgi?id=1233617
* https://bugzilla.suse.com/show_bug.cgi?id=1234958
* https://bugzilla.suse.com/show_bug.cgi?id=1236316
* https://bugzilla.suse.com/show_bug.cgi?id=1236317
* https://bugzilla.suse.com/show_bug.cgi?id=1237002
* https://bugzilla.suse.com/show_bug.cgi?id=1237006
* https://bugzilla.suse.com/show_bug.cgi?id=1237008
* https://bugzilla.suse.com/show_bug.cgi?id=1237009
* https://bugzilla.suse.com/show_bug.cgi?id=1237010
* https://bugzilla.suse.com/show_bug.cgi?id=1237011
* https://bugzilla.suse.com/show_bug.cgi?id=1237012
* https://bugzilla.suse.com/show_bug.cgi?id=1237013
* https://bugzilla.suse.com/show_bug.cgi?id=1237014



SUSE-SU-2025:0588-1: important: Security update for grub2


# Security update for grub2

Announcement ID: SUSE-SU-2025:0588-1
Release Date: 2025-02-19T07:30:54Z
Rating: important
References:

* bsc#1233606
* bsc#1233608
* bsc#1233609
* bsc#1233610
* bsc#1233612
* bsc#1233613
* bsc#1233614
* bsc#1233615
* bsc#1233616
* bsc#1233617
* bsc#1234958
* bsc#1236316
* bsc#1236317
* bsc#1237002
* bsc#1237006
* bsc#1237008
* bsc#1237009
* bsc#1237010
* bsc#1237011
* bsc#1237012
* bsc#1237013
* bsc#1237014

Cross-References:

* CVE-2024-45774
* CVE-2024-45775
* CVE-2024-45776
* CVE-2024-45777
* CVE-2024-45778
* CVE-2024-45779
* CVE-2024-45780
* CVE-2024-45781
* CVE-2024-45782
* CVE-2024-45783
* CVE-2024-56737
* CVE-2025-0622
* CVE-2025-0624
* CVE-2025-0677
* CVE-2025-0678
* CVE-2025-0684
* CVE-2025-0685
* CVE-2025-0686
* CVE-2025-0689
* CVE-2025-0690
* CVE-2025-1118
* CVE-2025-1125

CVSS scores:

* CVE-2024-45774 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45774 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45775 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45775 ( NVD ): 5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H
* CVE-2024-45776 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45776 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45777 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45778 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L
* CVE-2024-45779 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45780 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45781 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45781 ( NVD ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45782 ( SUSE ): 6.7 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45783 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2024-45783 ( NVD ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
* CVE-2024-56737 ( SUSE ): 8.4
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2024-56737 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-56737 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-0622 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0622 ( NVD ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0624 ( SUSE ): 7.6 CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
* CVE-2025-0677 ( SUSE ): 8.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0677 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0678 ( SUSE ): 8.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0678 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0684 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0685 ( SUSE ): 8.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0685 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0686 ( SUSE ): 8.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0686 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0689 ( SUSE ): 8.9
CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0689 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0690 ( SUSE ): 7.3
CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-0690 ( SUSE ): 6.1 CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-1118 ( SUSE ): 6.7
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
* CVE-2025-1118 ( SUSE ): 4.4 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
* CVE-2025-1125 ( SUSE ): 8.7
CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
* CVE-2025-1125 ( SUSE ): 6.4 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

Affected Products:

* openSUSE Leap 15.4
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro for Rancher 5.3
* SUSE Linux Enterprise Micro for Rancher 5.4
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Manager Proxy 4.3
* SUSE Manager Proxy 4.3 Module
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Manager Server 4.3 Module

An update that solves 22 vulnerabilities can now be installed.

## Description:

This update for grub2 fixes the following issues:

* CVE-2024-45781: Fixed strcpy overflow in ufs. (bsc#1233617)
* CVE-2024-56737: Fixed a heap-based buffer overflow in hfs. (bsc#1234958)
* CVE-2024-45782: Fixed strcpy overflow in hfs. (bsc#1233615)
* CVE-2024-45780: Fixed an overflow in tar/cpio. (bsc#1233614)
* CVE-2024-45783: Fixed a refcount overflow in hfsplus. (bsc#1233616)
* CVE-2024-45774: Fixed a heap overflow in JPEG parser. (bsc#1233609)
* CVE-2024-45775: Fixed a missing NULL check in extcmd parser. (bsc#1233610)
* CVE-2024-45776: Fixed an overflow in .MO file handling. (bsc#1233612)
* CVE-2024-45777: Fixed an integer overflow in gettext. (bsc#1233613)
* CVE-2024-45778: Fixed bfs filesystem by removing it from lockdown capable
modules. (bsc#1233606)
* CVE-2024-45779: Fixed a heap overflow in bfs. (bsc#1233608)
* CVE-2025-0624: Fixed an out-of-bounds write during the network boot process.
(bsc#1236316)
* CVE-2025-0622: Fixed a use-after-free when handling hooks during module
unload in command/gpg . (bsc#1236317)
* CVE-2025-0690: Fixed an integer overflow that may lead to an out-of-bounds
write through the read command. (bsc#1237012)
* CVE-2025-1118: Fixed an issue where the dump command was not being blocked
when grub was in lockdown mode. (bsc#1237013)
* CVE-2025-0677: Fixed an integer overflow that may lead to an out-of-bounds
write when handling symlinks in ufs. (bsc#1237002)
* CVE-2025-0684: Fixed an integer overflow that may lead to an out-of-bounds
write when handling symlinks in reiserfs. (bsc#1237008)
* CVE-2025-0685: Fixed an integer overflow that may lead to an out-of-bounds
write when handling symlinks in jfs. (bsc#1237009)
* CVE-2025-0686: Fixed an integer overflow that may lead to an out-of-bounds
write when handling symlinks in romfs. (bsc#1237010)
* CVE-2025-0689: Fixed a heap-based buffer overflow in udf that may lead to
arbitrary code execution. (bsc#1237011)
* CVE-2025-1125: Fixed an integer overflow that may lead to an out-of-bounds
write in hfs. (bsc#1237014)
* CVE-2025-0678: Fixed an integer overflow that may lead to an out-of-bounds
write in squash4. (bsc#1237006)

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-588=1

* SUSE Manager Proxy 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-588=1

* SUSE Manager Retail Branch Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-
Server-4.3-2025-588=1

* SUSE Manager Server 4.3
zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-588=1

* openSUSE Leap 15.4
zypper in -t patch SUSE-2025-588=1

* SUSE Linux Enterprise Micro for Rancher 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-588=1

* SUSE Linux Enterprise Micro 5.3
zypper in -t patch SUSE-SLE-Micro-5.3-2025-588=1

* SUSE Linux Enterprise Micro for Rancher 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-588=1

* SUSE Linux Enterprise Micro 5.4
zypper in -t patch SUSE-SLE-Micro-5.4-2025-588=1

* SUSE Manager Proxy 4.3 Module
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2025-588=1

* SUSE Manager Server 4.3 Module
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2025-588=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-588=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-588=1

* SUSE Linux Enterprise Server 15 SP4 LTSS
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-588=1

## Package List:

* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* grub2-debuginfo-2.06-150400.11.55.2
* grub2-2.06-150400.11.55.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* grub2-x86_64-efi-2.06-150400.11.55.2
* grub2-systemd-sleep-plugin-2.06-150400.11.55.2
* grub2-powerpc-ieee1275-2.06-150400.11.55.2
* grub2-x86_64-xen-2.06-150400.11.55.2
* grub2-i386-pc-2.06-150400.11.55.2
* grub2-snapper-plugin-2.06-150400.11.55.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64)
* grub2-debugsource-2.06-150400.11.55.2
* SUSE Manager Proxy 4.3 (x86_64)
* grub2-debuginfo-2.06-150400.11.55.2
* grub2-debugsource-2.06-150400.11.55.2
* grub2-2.06-150400.11.55.2
* SUSE Manager Proxy 4.3 (noarch)
* grub2-x86_64-efi-2.06-150400.11.55.2
* grub2-systemd-sleep-plugin-2.06-150400.11.55.2
* grub2-x86_64-xen-2.06-150400.11.55.2
* grub2-i386-pc-2.06-150400.11.55.2
* grub2-snapper-plugin-2.06-150400.11.55.2
* SUSE Manager Retail Branch Server 4.3 (x86_64)
* grub2-debuginfo-2.06-150400.11.55.2
* grub2-debugsource-2.06-150400.11.55.2
* grub2-2.06-150400.11.55.2
* SUSE Manager Retail Branch Server 4.3 (noarch)
* grub2-x86_64-efi-2.06-150400.11.55.2
* grub2-systemd-sleep-plugin-2.06-150400.11.55.2
* grub2-x86_64-xen-2.06-150400.11.55.2
* grub2-i386-pc-2.06-150400.11.55.2
* grub2-snapper-plugin-2.06-150400.11.55.2
* SUSE Manager Server 4.3 (ppc64le s390x x86_64)
* grub2-debuginfo-2.06-150400.11.55.2
* grub2-2.06-150400.11.55.2
* SUSE Manager Server 4.3 (noarch)
* grub2-x86_64-efi-2.06-150400.11.55.2
* grub2-systemd-sleep-plugin-2.06-150400.11.55.2
* grub2-powerpc-ieee1275-2.06-150400.11.55.2
* grub2-x86_64-xen-2.06-150400.11.55.2
* grub2-i386-pc-2.06-150400.11.55.2
* grub2-snapper-plugin-2.06-150400.11.55.2
* SUSE Manager Server 4.3 (s390x x86_64)
* grub2-debugsource-2.06-150400.11.55.2
* SUSE Manager Server 4.3 (s390x)
* grub2-s390x-emu-2.06-150400.11.55.2
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586)
* grub2-debuginfo-2.06-150400.11.55.2
* grub2-2.06-150400.11.55.2
* grub2-branding-upstream-2.06-150400.11.55.2
* openSUSE Leap 15.4 (aarch64 s390x x86_64 i586)
* grub2-debugsource-2.06-150400.11.55.2
* openSUSE Leap 15.4 (noarch)
* grub2-i386-pc-extras-2.06-150400.11.55.2
* grub2-powerpc-ieee1275-2.06-150400.11.55.2
* grub2-i386-efi-extras-2.06-150400.11.55.2
* grub2-i386-efi-2.06-150400.11.55.2
* grub2-powerpc-ieee1275-extras-2.06-150400.11.55.2
* grub2-x86_64-xen-extras-2.06-150400.11.55.2
* grub2-arm64-efi-debug-2.06-150400.11.55.2
* grub2-systemd-sleep-plugin-2.06-150400.11.55.2
* grub2-x86_64-efi-debug-2.06-150400.11.55.2
* grub2-i386-pc-debug-2.06-150400.11.55.2
* grub2-snapper-plugin-2.06-150400.11.55.2
* grub2-i386-xen-extras-2.06-150400.11.55.2
* grub2-i386-xen-2.06-150400.11.55.2
* grub2-arm64-efi-extras-2.06-150400.11.55.2
* grub2-i386-efi-debug-2.06-150400.11.55.2
* grub2-i386-pc-2.06-150400.11.55.2
* grub2-x86_64-efi-2.06-150400.11.55.2
* grub2-arm64-efi-2.06-150400.11.55.2
* grub2-powerpc-ieee1275-debug-2.06-150400.11.55.2
* grub2-x86_64-xen-2.06-150400.11.55.2
* grub2-x86_64-efi-extras-2.06-150400.11.55.2
* grub2-s390x-emu-extras-2.06-150400.11.55.2
* openSUSE Leap 15.4 (s390x)
* grub2-s390x-emu-debug-2.06-150400.11.55.2
* grub2-s390x-emu-2.06-150400.11.55.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64)
* grub2-debuginfo-2.06-150400.11.55.2
* grub2-debugsource-2.06-150400.11.55.2
* grub2-2.06-150400.11.55.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (noarch)
* grub2-x86_64-efi-2.06-150400.11.55.2
* grub2-arm64-efi-2.06-150400.11.55.2
* grub2-x86_64-xen-2.06-150400.11.55.2
* grub2-i386-pc-2.06-150400.11.55.2
* grub2-snapper-plugin-2.06-150400.11.55.2
* SUSE Linux Enterprise Micro for Rancher 5.3 (s390x)
* grub2-s390x-emu-2.06-150400.11.55.2
* SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64)
* grub2-debuginfo-2.06-150400.11.55.2
* grub2-debugsource-2.06-150400.11.55.2
* grub2-2.06-150400.11.55.2
* SUSE Linux Enterprise Micro 5.3 (noarch)
* grub2-x86_64-efi-2.06-150400.11.55.2
* grub2-arm64-efi-2.06-150400.11.55.2
* grub2-x86_64-xen-2.06-150400.11.55.2
* grub2-i386-pc-2.06-150400.11.55.2
* grub2-snapper-plugin-2.06-150400.11.55.2
* SUSE Linux Enterprise Micro 5.3 (s390x)
* grub2-s390x-emu-2.06-150400.11.55.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64)
* grub2-debuginfo-2.06-150400.11.55.2
* grub2-debugsource-2.06-150400.11.55.2
* grub2-2.06-150400.11.55.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (noarch)
* grub2-x86_64-efi-2.06-150400.11.55.2
* grub2-arm64-efi-2.06-150400.11.55.2
* grub2-x86_64-xen-2.06-150400.11.55.2
* grub2-i386-pc-2.06-150400.11.55.2
* grub2-snapper-plugin-2.06-150400.11.55.2
* SUSE Linux Enterprise Micro for Rancher 5.4 (s390x)
* grub2-s390x-emu-2.06-150400.11.55.2
* SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64)
* grub2-debuginfo-2.06-150400.11.55.2
* grub2-debugsource-2.06-150400.11.55.2
* grub2-2.06-150400.11.55.2
* SUSE Linux Enterprise Micro 5.4 (noarch)
* grub2-x86_64-efi-2.06-150400.11.55.2
* grub2-arm64-efi-2.06-150400.11.55.2
* grub2-x86_64-xen-2.06-150400.11.55.2
* grub2-i386-pc-2.06-150400.11.55.2
* grub2-snapper-plugin-2.06-150400.11.55.2
* SUSE Linux Enterprise Micro 5.4 (s390x)
* grub2-s390x-emu-2.06-150400.11.55.2
* SUSE Manager Proxy 4.3 Module (noarch)
* grub2-arm64-efi-2.06-150400.11.55.2
* SUSE Manager Server 4.3 Module (noarch)
* grub2-powerpc-ieee1275-2.06-150400.11.55.2
* grub2-arm64-efi-2.06-150400.11.55.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* grub2-debuginfo-2.06-150400.11.55.2
* grub2-debugsource-2.06-150400.11.55.2
* grub2-2.06-150400.11.55.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* grub2-x86_64-efi-2.06-150400.11.55.2
* grub2-systemd-sleep-plugin-2.06-150400.11.55.2
* grub2-arm64-efi-2.06-150400.11.55.2
* grub2-x86_64-xen-2.06-150400.11.55.2
* grub2-i386-pc-2.06-150400.11.55.2
* grub2-snapper-plugin-2.06-150400.11.55.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* grub2-debuginfo-2.06-150400.11.55.2
* grub2-debugsource-2.06-150400.11.55.2
* grub2-2.06-150400.11.55.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* grub2-x86_64-efi-2.06-150400.11.55.2
* grub2-systemd-sleep-plugin-2.06-150400.11.55.2
* grub2-arm64-efi-2.06-150400.11.55.2
* grub2-x86_64-xen-2.06-150400.11.55.2
* grub2-i386-pc-2.06-150400.11.55.2
* grub2-snapper-plugin-2.06-150400.11.55.2
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64)
* grub2-debuginfo-2.06-150400.11.55.2
* grub2-2.06-150400.11.55.2
* SUSE Linux Enterprise Server 15 SP4 LTSS (noarch)
* grub2-x86_64-efi-2.06-150400.11.55.2
* grub2-systemd-sleep-plugin-2.06-150400.11.55.2
* grub2-powerpc-ieee1275-2.06-150400.11.55.2
* grub2-arm64-efi-2.06-150400.11.55.2
* grub2-x86_64-xen-2.06-150400.11.55.2
* grub2-i386-pc-2.06-150400.11.55.2
* grub2-snapper-plugin-2.06-150400.11.55.2
* SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 s390x x86_64)
* grub2-debugsource-2.06-150400.11.55.2
* SUSE Linux Enterprise Server 15 SP4 LTSS (s390x)
* grub2-s390x-emu-2.06-150400.11.55.2

## References:

* https://www.suse.com/security/cve/CVE-2024-45774.html
* https://www.suse.com/security/cve/CVE-2024-45775.html
* https://www.suse.com/security/cve/CVE-2024-45776.html
* https://www.suse.com/security/cve/CVE-2024-45777.html
* https://www.suse.com/security/cve/CVE-2024-45778.html
* https://www.suse.com/security/cve/CVE-2024-45779.html
* https://www.suse.com/security/cve/CVE-2024-45780.html
* https://www.suse.com/security/cve/CVE-2024-45781.html
* https://www.suse.com/security/cve/CVE-2024-45782.html
* https://www.suse.com/security/cve/CVE-2024-45783.html
* https://www.suse.com/security/cve/CVE-2024-56737.html
* https://www.suse.com/security/cve/CVE-2025-0622.html
* https://www.suse.com/security/cve/CVE-2025-0624.html
* https://www.suse.com/security/cve/CVE-2025-0677.html
* https://www.suse.com/security/cve/CVE-2025-0678.html
* https://www.suse.com/security/cve/CVE-2025-0684.html
* https://www.suse.com/security/cve/CVE-2025-0685.html
* https://www.suse.com/security/cve/CVE-2025-0686.html
* https://www.suse.com/security/cve/CVE-2025-0689.html
* https://www.suse.com/security/cve/CVE-2025-0690.html
* https://www.suse.com/security/cve/CVE-2025-1118.html
* https://www.suse.com/security/cve/CVE-2025-1125.html
* https://bugzilla.suse.com/show_bug.cgi?id=1233606
* https://bugzilla.suse.com/show_bug.cgi?id=1233608
* https://bugzilla.suse.com/show_bug.cgi?id=1233609
* https://bugzilla.suse.com/show_bug.cgi?id=1233610
* https://bugzilla.suse.com/show_bug.cgi?id=1233612
* https://bugzilla.suse.com/show_bug.cgi?id=1233613
* https://bugzilla.suse.com/show_bug.cgi?id=1233614
* https://bugzilla.suse.com/show_bug.cgi?id=1233615
* https://bugzilla.suse.com/show_bug.cgi?id=1233616
* https://bugzilla.suse.com/show_bug.cgi?id=1233617
* https://bugzilla.suse.com/show_bug.cgi?id=1234958
* https://bugzilla.suse.com/show_bug.cgi?id=1236316
* https://bugzilla.suse.com/show_bug.cgi?id=1236317
* https://bugzilla.suse.com/show_bug.cgi?id=1237002
* https://bugzilla.suse.com/show_bug.cgi?id=1237006
* https://bugzilla.suse.com/show_bug.cgi?id=1237008
* https://bugzilla.suse.com/show_bug.cgi?id=1237009
* https://bugzilla.suse.com/show_bug.cgi?id=1237010
* https://bugzilla.suse.com/show_bug.cgi?id=1237011
* https://bugzilla.suse.com/show_bug.cgi?id=1237012
* https://bugzilla.suse.com/show_bug.cgi?id=1237013
* https://bugzilla.suse.com/show_bug.cgi?id=1237014