SUSE-CU-2025:7780-1: Security update of suse/manager/5.0/x86_64/server

sle-container-updates at lists.suse.com sle-container-updates at lists.suse.com
Thu Oct 30 14:15:58 UTC 2025


SUSE Container Update Advisory: suse/manager/5.0/x86_64/server
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2025:7780-1
Container Tags        : suse/manager/5.0/x86_64/server:5.0.5.1 , suse/manager/5.0/x86_64/server:5.0.5.1.7.33.2 , suse/manager/5.0/x86_64/server:latest
Container Release     : 7.33.2
Severity              : critical
Type                  : security
References            : 1218459 1227577 1228260 1230262 1230267 1230267 1230649 1231150
                        1231157 1232234 1232526 1233012 1233012 1233012 1233012 1233012
                        1233012 1233421 1234959 1236589 1237143 1237442 1237595 1238491
                        1239566 1239938 1240058 1240788 1240954 1241219 1241549 1243005
                        1243273 1243279 1243397 1243457 1243486 1243706 1243895 1243933
                        1243991 1244032 1244042 1244050 1244056 1244059 1244060 1244061
                        1244183 1244183 1244183 1244270 1244272 1244273 1244279 1244336
                        1244401 1244553 1244705 1244710 1244925 1245220 1245220 1245452
                        1245496 1245573 1245672 1245743 1245936 1245985 1246038 1246081
                        1246100 1246113 1246149 1246157 1246169 1246197 1246197 1246221
                        1246231 1246232 1246233 1246237 1246267 1246277 1246296 1246299
                        1246302 1246303 1246305 1246306 1246307 1246318 1246388 1246389
                        1246397 1246421 1246439 1246466 1246477 1246570 1246575 1246584
                        1246595 1246597 1246598 1246602 1246604 1246697 1246835 1246873
                        1246912 1246965 1246974 1247054 1247144 1247148 1247249 1247690
                        1247938 1247939 1247991 1248085 1248119 1248119 1248120 1248120
                        1248122 1248122 1248174 1248252 1248252 1248660 1249088 1249116
                        1249134 1249191 1249191 1249348 1249348 1249367 1249367 1249375
                        1249584 1250232 1250232 1250343 1250911 1251263 1251279 1251280
                        37681 831629 CVE-2016-9840 CVE-2024-10041 CVE-2024-12718 CVE-2024-42516
                        CVE-2024-43204 CVE-2024-47252 CVE-2024-52615 CVE-2024-56738 CVE-2024-6874
                        CVE-2025-0665 CVE-2025-10148 CVE-2025-10148 CVE-2025-10230 CVE-2025-23048
                        CVE-2025-30749 CVE-2025-30754 CVE-2025-32988 CVE-2025-32989 CVE-2025-32990
                        CVE-2025-3576 CVE-2025-4138 CVE-2025-4330 CVE-2025-4435 CVE-2025-4516
                        CVE-2025-4517 CVE-2025-48924 CVE-2025-48989 CVE-2025-49125 CVE-2025-4947
                        CVE-2025-49630 CVE-2025-49812 CVE-2025-50059 CVE-2025-50106 CVE-2025-50181
                        CVE-2025-5025 CVE-2025-52434 CVE-2025-52520 CVE-2025-53020 CVE-2025-53192
                        CVE-2025-53192 CVE-2025-53506 CVE-2025-53880 CVE-2025-53883 CVE-2025-53905
                        CVE-2025-53906 CVE-2025-5399 CVE-2025-55157 CVE-2025-55158 CVE-2025-55163
                        CVE-2025-58056 CVE-2025-58057 CVE-2025-5914 CVE-2025-5915 CVE-2025-5916
                        CVE-2025-5917 CVE-2025-5918 CVE-2025-59375 CVE-2025-6069 CVE-2025-6297
                        CVE-2025-6395 CVE-2025-6965 CVE-2025-7425 CVE-2025-7962 CVE-2025-8058
                        CVE-2025-8114 CVE-2025-8194 CVE-2025-8277 CVE-2025-8713 CVE-2025-8713
                        CVE-2025-8714 CVE-2025-8714 CVE-2025-8715 CVE-2025-8715 CVE-2025-9086
                        CVE-2025-9086 CVE-2025-9187 CVE-2025-9230 CVE-2025-9230 CVE-2025-9640
-----------------------------------------------------------------

The container suse/manager/5.0/x86_64/server was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2543-1
Released:    Tue Jul 29 11:09:01 2025
Summary:     Recommended update for python-PyYAML, python-bcrypt, python-gssapi, python-pyparsing, python-python-dateutil, python-pytz, python-requests, python-setuptools_scm, python-simplejson, python-urllib3
Type:        recommended
Severity:    moderate
References:  1233012
This update for python-PyYAML, python-bcrypt, python-gssapi, python-pyparsing, python-python-dateutil, python-pytz, python-requests, python-setuptools_scm, python-simplejson, python-urllib3 fixes the following issues:

- Add python36 provides/obsoletes to enable SLE-12 to SLE-15 migration (bsc#1233012)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2558-1
Released:    Wed Jul 30 22:14:27 2025
Summary:     Recommended update for libsolv
Type:        recommended
Severity:    moderate
References:  1230267,1243279,1243457,1243486,1244042,1244710,1245220,1245452,1245496,1245672
This update for libsolv fixes the following issues:

- Allow easy migration from SLE Micro 5.5 + SUMA to SL Micro 6.1+MLM
  (bsc#1243457).
- implement color filtering when adding update targets.
- support orderwithrequires dependencies in susedata.xml.
- Fix SEGV in MediaDISK handler (bsc#1245452).
- Fix evaluation of libproxy results (bsc#1244710).
- Enhancements regarding mirror handling during repo refresh. Adapt to libzypp
  API changes (bsc#1230267).
- Explicitly selecting DownloadAsNeeded also selects the
  classic_rpmtrans backend.
- Enhancements with mirror handling during repo refresh, needs zypper 1.14.91.
- Fix autotestcase when ZYPP_FULLLOG=1 (bsc#1244042)  
  There was no testcase written for the very first solver run.
- zypper does not allow distinctions between install and upgrade in
  %postinstall (bsc#1243279).
- Ignore DeltaRpm download errors, in case of a failure the full rpm is
  downloaded (bsc#1245672).
- Improve fix for incorrect filesize handling and download data exceeded errors
  on HTTP responses (bsc#1245220).
- sh: Reset solver options after command (bsc#1245496).
- BuildRequires: Now %{libsolv_devel_package} greater or equal to 0.7.34
  is required (bsc#1243486).
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2566-1
Released:    Thu Jul 31 09:18:44 2025
Summary:     Security update for libarchive
Type:        security
Severity:    moderate
References:  1244270,1244272,1244273,1244279,1244336,CVE-2025-5914,CVE-2025-5915,CVE-2025-5916,CVE-2025-5917,CVE-2025-5918
This update for libarchive fixes the following issues:

- CVE-2025-5914: Fixed double free due to an integer overflow in the archive_read_format_rar_seek_data() function (bsc#1244272)
- CVE-2025-5915: Fixed heap buffer over read in copy_from_lzss_window() at archive_read_support_format_rar.c (bsc#1244273)
- CVE-2025-5916: Fixed integer overflow while reading warc files at archive_read_support_format_warc.c (bsc#1244270)
- CVE-2025-5917: Fixed off by one error in build_ustar_entry_name() at archive_write_set_format_pax.c (bsc#1244336)
- CVE-2025-5918: Fixed reading past EOF may be triggered for piped file streams (bsc#1244279)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2572-1
Released:    Thu Jul 31 11:11:10 2025
Summary:     Recommended update for python-colorama, python-importlib-metadata, python-parameterized, python-pluggy, python-py, python-scp, python-wheel, python-zipp
Type:        recommended
Severity:    moderate
References:  1233012
This update for python-colorama, python-importlib-metadata, python-parameterized, python-pluggy, python-py, python-scp, python-wheel, python-zipp fixes the following issues:

- Add python36 provides/obsoletes to enable SLE-12 to SLE-15 migration (bsc#1233012)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2573-1
Released:    Thu Jul 31 11:15:06 2025
Summary:     Recommended update for python-Cython, python-attrs, python-boto3, python-botocore, python-cffi, python-decorator, python-packaging, python-s3transfer, python-six
Type:        recommended
Severity:    moderate
References:  1233012
This update for python-Cython, python-attrs, python-boto3, python-botocore, python-cffi, python-decorator, python-packaging, python-s3transfer, python-six fixes the following issues:

- Add python36 provides/obsoletes to enable SLE-12 to SLE-15 migration (bsc#1233012)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2574-1
Released:    Thu Jul 31 11:19:37 2025
Summary:     Recommended update for python3-PyNaCl, python3-atomicwrites, python3-cryptography, python3-cryptography-vectors, python3-more-itertools, python3-paramiko, python3-pip, python3-pyOpenSSL, python3-pytest, python3-setuptools
Type:        recommended
Severity:    moderate
References:  1233012
This update for python3-PyNaCl, python3-atomicwrites, python3-cryptography, python3-cryptography-vectors, python3-more-itertools, python3-paramiko, python3-pip, python3-pyOpenSSL, python3-pytest, python3-setuptools fixes the following issues:

- Add python36 provides/obsoletes to enable SLE-12 to SLE-15 migration (bsc#1233012)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2580-1
Released:    Thu Jul 31 13:53:43 2025
Summary:     Recommended update for firewalld
Type:        recommended
Severity:    moderate
References:  1246100
This update for firewalld fixes the following issues:

- Do not recommend python311-firewalld (bsc#1246100)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2536-1
Released:    Thu Jul 31 16:44:39 2025
Summary:     Security update for boost
Type:        security
Severity:    important
References:  1245936,CVE-2016-9840
This update for boost fixes the following issues:

- CVE-2016-9840: Fixed out-of-bounds pointer arithmetic in zlib in beast (bsc#1245936)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2585-1
Released:    Fri Aug  1 09:22:26 2025
Summary:     Recommended update for fence-agents
Type:        recommended
Severity:    moderate
References:  
This update for fence-agents fixes the following issues:

- Activate checks
- Adding new fence agent for Nutanix AHV (jsc#PED-13087)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2595-1
Released:    Fri Aug  1 17:13:59 2025
Summary:     Security update for gnutls
Type:        security
Severity:    important
References:  1246232,1246233,1246267,1246299,CVE-2025-32988,CVE-2025-32989,CVE-2025-32990,CVE-2025-6395
This update for gnutls fixes the following issues:

- CVE-2025-6395: Fix NULL pointer dereference when 2nd Client Hello omits PSK (bsc#1246299)
- CVE-2025-32988: Fix double-free due to incorrect ownership handling in the export logic of SAN entries containing an otherName (bsc#1246232)
- CVE-2025-32989: Fix heap buffer overread when handling the CT SCT extension during X.509 certificate parsing (bsc#1246233)
- CVE-2025-32990: Fix 1-byte heap buffer overflow when parsing templates with certtool (bsc#1246267)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2667-1
Released:    Mon Aug  4 14:37:23 2025
Summary:     Security update for java-17-openjdk
Type:        security
Severity:    important
References:  1246575,1246584,1246595,1246598,CVE-2025-30749,CVE-2025-30754,CVE-2025-50059,CVE-2025-50106
This update for java-17-openjdk fixes the following issues:

Upgrade to upstream tag jdk-17.0.16+8 (July 2025 CPU):

- CVE-2025-30749: several scenarios can lead to heap corruption (bsc#1246595) 
- CVE-2025-30754: incomplete handshake may lead to weakening TLS protections (bsc#1246598) 
- CVE-2025-50059: Improve HTTP client header handling (bsc#1246575) 
- CVE-2025-50106: Glyph out-of-memory access and crash (bsc#1246584) 

Changelog:

    + JDK-4850101: Setting mnemonic to VK_F4 underlines the letter
      S in a button.
    + JDK-5074006: Swing JOptionPane shows </html> tag as a string
      after newline
    + JDK-6956385: URLConnection.getLastModified() leaks file
      handles for jar:file and file: URLs
    + JDK-8024624: [TEST_BUG] [macosx] CTRL+RIGHT(LEFT) doesn't
      move selection on next cell in JTable on Aqua L&F
    + JDK-8042134: JOptionPane bungles HTML messages
    + JDK-8051591: Test
      javax/swing/JTabbedPane/8007563/Test8007563.java fails
    + JDK-8077371: Binary files in JAXP test should be removed
    + JDK-8183348: Better cleanup for
      jdk/test/sun/security/pkcs12/P12SecretKey.java
    + JDK-8196465:
      javax/swing/JComboBox/8182031/ComboPopupTest.java fails on
      Linux
    + JDK-8202100: Merge vm/share/InMemoryJavaCompiler w/
      jdk/test/lib/compiler/InMemoryJavaCompiler
    + JDK-8211400: nsk.share.gc.Memory::getArrayLength returns
      wrong value
    + JDK-8218474: JComboBox display issue with GTKLookAndFeel
    + JDK-8224267: JOptionPane message string with 5000+ newlines
      produces StackOverflowError
    + JDK-8249831: Test sun/security/mscapi/nonUniqueAliases/
      /NonUniqueAliases.java is marked with @ignore
    + JDK-8251505: Use of types in compiler shared code should be
      consistent.
    + JDK-8253440: serviceability/sa/TestJhsdbJstackLineNumbers.java
      failed with 'Didn't find enough line numbers'
    + JDK-8254786: java/net/httpclient/CancelRequestTest.java
      failing intermittently
    + JDK-8256211: assert fired in
      java/net/httpclient/DependentPromiseActionsTest (infrequent)
    + JDK-8258483: [TESTBUG] gtest
      CollectorPolicy.young_scaled_initial_ergo_vm fails if heap is
      too small
    + JDK-8269516: AArch64: Assembler cleanups
    + JDK-8271419: Refactor test code for modifying CDS archive
      contents
    + JDK-8276995: Bug in jdk.jfr.event.gc.collection.TestSystemGC
    + JDK-8277983: Remove unused fields from
      sun.net.www.protocol.jar.JarURLConnection
    + JDK-8279884: Use better file for cygwin source permission
      check
    + JDK-8279894: javax/swing/JInternalFrame/8020708/bug8020708.java
      timeouts on Windows 11
    + JDK-8280468: Crashes in getConfigColormap,
      getConfigVisualId, XVisualIDFromVisual on Linux
    + JDK-8280820: Clean up bug8033699 and bug8075609.java tests:
      regtesthelpers aren't used
    + JDK-8280991: [XWayland] No displayChanged event after
      setDisplayMode call
    + JDK-8281511: java/net/ipv6tests/UdpTest.java fails with
      checkTime failed
    + JDK-8282863: java/awt/FullScreen/FullscreenWindowProps/
      /FullscreenWindowProps.java fails on Windows 10 with HiDPI
      screen
    + JDK-8286204: [Accessibility,macOS,VoiceOver] VoiceOver reads
      the spinner value 10 as 1 when user iterates to 10 for the
      first time on macOS
    + JDK-8286789: Test forceEarlyReturn002.java timed out
    + JDK-8286875: ProgrammableUpcallHandler::on_entry/on_exit
      access thread fields from native
    + JDK-8286925: Move JSON parser used in JFR tests to test
      library
    + JDK-8287352: DockerTestUtils::execute shows incorrect
      elapsed time
    + JDK-8287801: Fix test-bugs related to stress flags
    + JDK-8288707: javax/swing/JToolBar/4529206/bug4529206.java:
      setFloating does not work correctly
    + JDK-8290162: Reset recursion counter missed in fix of
      JDK-8224267
    + JDK-8292064: Convert java/lang/management/MemoryMXBean shell
      tests to java version
    + JDK-8293503: gc/metaspace/TestMetaspacePerfCounters.java
      #Epsilon-64 failed assertGreaterThanOrEqual:
      expected MMM >= NNN
    + JDK-8294038: Remove 'Classpath' exception from javax/swing
      tests
    + JDK-8294155: Exception thrown before awaitAndCheck hangs
      PassFailJFrame
    + JDK-8295470: Update openjdk.java.net => openjdk.org URLs in
      test code
    + JDK-8295670: Remove duplication in
      java/util/Formatter/Basic*.java
    + JDK-8295804:
      javax/swing/JFileChooser/JFileChooserSetLocationTest.java
      failed with 'setLocation() is not working properly'
    + JDK-8296072: CertAttrSet::encode and DerEncoder::derEncode
      should write into DerOutputStream
    + JDK-8296167: test/langtools/tools/jdeps/jdkinternals/
      /ShowReplacement.java failing after JDK-8296072
    + JDK-8296920: Regression Test DialogOrient.java fails on MacOS
    + JDK-8297173: usageTicks and totalTicks should be volatile to
      ensure that different threads get the latest ticks
    + JDK-8297242: Use-after-free during library unloading on Linux
    + JDK-8298061: vmTestbase/nsk/sysdict/vm/stress/btree/btree012/
      /btree012.java failed with 'fatal error: refcount has gone to
      zero'
    + JDK-8298147: Clang warns about pointless comparisons
    + JDK-8298248: Limit sscanf output width in cgroup file parsers
    + JDK-8298709: Fix typos in src/java.desktop/ and various test
      classes of client component
    + JDK-8298730: Refactor subsystem_file_line_contents and add
      docs and tests
    + JDK-8300645: Handle julong values in logging of
      GET_CONTAINER_INFO macros
    + JDK-8300658: memory_and_swap_limit() reporting wrong values
      on systems with swapaccount=0
    + JDK-8302226: failure_handler native.core should wait for
      coredump to finish
    + JDK-8303549: [AIX] TestNativeStack.java is failing with exit
      value 1
    + JDK-8303770: Remove Baltimore root certificate expiring in
      May 2025
    + JDK-8305010: Test vmTestbase/nsk/jvmti/scenarios/sampling/
      /SP05/sp05t003/TestDescription.java timed out: thread not
      suspended
    + JDK-8305578: X11GraphicsDevice.pGetBounds() is slow in
      remote X11 sessions
    + JDK-8306997: C2: 'malformed control flow' assert due to
      missing safepoint on backedge with a switch
    + JDK-8307318: Test
      serviceability/sa/ClhsdbCDSJstackPrintAll.java failed:
      ArrayIndexOutOfBoundsException
    + JDK-8308875: java/awt/Toolkit/GetScreenInsetsCustomGC/
      /GetScreenInsetsCustomGC.java failed with 'Cannot invoke
      'sun.awt.X11GraphicsDevice.getInsets()' because 'device' is
      null'
    + JDK-8309841: Jarsigner should print a warning if an entry is
      removed
    + JDK-8310525: DynamicLauncher for JDP test needs to try
      harder to find a free port
    + JDK-8312246: NPE when HSDB visits bad oop
    + JDK-8314120: Add tests for FileDescriptor.sync
    + JDK-8314236: Overflow in Collections.rotate
    + JDK-8314246: javax/swing/JToolBar/4529206/bug4529206.java
      fails intermittently on Linux
    + JDK-8314320: Mark runtime/CommandLine/ tests as flagless
    + JDK-8314828: Mark 3 jcmd command-line options test as
      vm.flagless
    + JDK-8315484: java/awt/dnd/RejectDragDropActionTest.java
      timed out
    + JDK-8315669: Open source several Swing PopupMenu related
      tests
    + JDK-8315721: CloseRace.java#id0 fails transiently on libgraal
    + JDK-8315742: Open source several Swing Scroll related tests
    + JDK-8315871: Opensource five more Swing regression tests
    + JDK-8315876: Open source several Swing CSS related tests
    + JDK-8315951: Open source several Swing HTMLEditorKit related
      tests
    + JDK-8315981: Opensource five more random Swing tests
    + JDK-8316061: Open source several Swing RootPane and Slider
      related tests
    + JDK-8316156: ByteArrayInputStream.transferTo causes
      MaxDirectMemorySize overflow
    + JDK-8316228: jcmd tests are broken by 8314828
    + JDK-8316324: Opensource five miscellaneous Swing tests
    + JDK-8316388: Opensource five Swing component related
      regression tests
    + JDK-8316451: 6 java/lang/instrument/PremainClass tests
      ignore VM flags
    + JDK-8316452: java/lang/instrument/modules/
      /AppendToClassPathModuleTest.java ignores VM flags
    + JDK-8316460: 4 javax/management tests ignore VM flags
    + JDK-8316497: ColorConvertOp - typo for non-ICC conversions
      needs one-line fix
    + JDK-8316629: j.text.DateFormatSymbols setZoneStrings()
      exception is unhelpful
    + JDK-8318700: MacOS Zero cannot run gtests due to wrong JVM
      path
    + JDK-8318915: Enhance checks in BigDecimal.toPlainString()
    + JDK-8318962: Update ProcessTools javadoc with suggestions in
      8315097
    + JDK-8319572: Test jdk/incubator/vector/LoadJsvmlTest.java
      ignores VM flags
    + JDK-8319578: Few java/lang/instrument ignore test.java.opts
      and accept test.vm.opts only
    + JDK-8319690: [AArch64] C2 compilation hits
      offset_ok_for_immed: assert 'c2 compiler bug'
    + JDK-8320682: [AArch64] C1 compilation fails with 'Field too
      big for insn'
    + JDK-8320687: sun.jvmstat.monitor.MonitoredHost
      .getMonitoredHost() throws unexpected exceptions when invoked
      concurrently
    + JDK-8321204: C2: assert(false) failed: node should be in
      igvn hash table
    + JDK-8321479: java -D-D crashes
    + JDK-8321509: False positive in get_trampoline fast path
      causes crash
    + JDK-8321713: Harmonize executeTestJvm with
      create[Limited]TestJavaProcessBuilder
    + JDK-8321718: ProcessTools.executeProcess calls waitFor
      before logging
    + JDK-8321931: memory_swap_current_in_bytes reports 0 as
      'unlimited'
    + JDK-8325435: [macos] Menu or JPopupMenu not closed when main
      window is resized
    + JDK-8325680: Uninitialised memory in deleteGSSCB of
      GSSLibStub.c:179
    + JDK-8325682: Rename nsk_strace.h
    + JDK-8326389: [test] improve assertEquals failure output
    + JDK-8328301: Convert Applet test
      ManualHTMLDataFlavorTest.java to main program
    + JDK-8328482: Convert and Open source few manual applet test
      to main based
    + JDK-8328484: Convert and Opensource few JFileChooser applet
      test to main
    + JDK-8328648: Remove applet usage from JFileChooser tests
      bug4150029
    + JDK-8328670: Automate and open source few closed manual
      applet test
    + JDK-8328673: Convert closed text/html/CSS manual applet test
      to main
    + JDK-8329261: G1: interpreter post-barrier x86 code asserts
      index size of wrong buffer
    + JDK-8330534: Update nsk/jdwp tests to use driver instead of
      othervm
    + JDK-8330598: java/net/httpclient/Http1ChunkedTest.java fails
      with java.util.MissingFormatArgumentException: Format
      specifier '%s'
    + JDK-8331735: UpcallLinker::on_exit races with GC when
      copying frame anchor
    + JDK-8333117: Remove support of remote and manual debuggee
      launchers
    + JDK-8333680: com/sun/tools/attach/BasicTests.java fails with
      'SocketException: Permission denied: connect'
    + JDK-8334560: [PPC64]: postalloc_expand_java_dynamic_call_sched
      does not copy all fields
    + JDK-8334644: Automate
      javax/print/attribute/PageRangesException.java
    + JDK-8334780: Crash: assert(h_array_list.not_null()) failed:
      invariant
    + JDK-8334895: OpenJDK fails to configure on linux aarch64
      when CDS is disabled after JDK-8331942
    + JDK-8335662: [AArch64] C1: guarantee(val < (1ULL << nbits))
      failed: Field too big for insn
    + JDK-8335684: Test ThreadCpuTime.java should pause like
      ThreadCpuTimeArray.java
    + JDK-8335836: serviceability/jvmti/StartPhase/AllowedFunctions/
      /AllowedFunctions.java fails with unexpected exit code: 112
    + JDK-8336587: failure_handler lldb command times out on
      macosx-aarch64 core file
    + JDK-8337221: CompileFramework: test library to conveniently
      compile java and jasm sources for fuzzing
    + JDK-8337299: vmTestbase/nsk/jdb/stop_at/stop_at002/
      /stop_at002.java failure goes undetected
    + JDK-8338154: Fix -Wzero-as-null-pointer-constant warnings in
      gtest framework
    + JDK-8339148: Make os::Linux::active_processor_count() public
    + JDK-8339300: CollectorPolicy.young_scaled_initial_ergo_vm
      gtest fails on ppc64 based platforms
    + JDK-8339639: Opensource few AWT PopupMenu tests
    + JDK-8339678: Update runtime/condy tests to be executed with
      VM flags
    + JDK-8339727: Open source several AWT focus tests - series 1
    + JDK-8339794: Open source closed choice tests #1
    + JDK-8339810: Clean up the code in sun.tools.jar.Main to
      properly close resources and use ZipFile during extract
    + JDK-8339836: Open source several AWT Mouse tests - Batch 1
    + JDK-8339842: Open source several AWT focus tests - series 2
    + JDK-8339895: Open source several AWT focus tests - series 3
    + JDK-8339906: Open source several AWT focus tests - series 4
    + JDK-8339935: Open source several AWT focus tests - series 5
    + JDK-8339982: Open source several AWT Mouse tests - Batch 2
    + JDK-8339984: Open source AWT MenuItem related tests
    + JDK-8339995: Open source several AWT focus tests - series 6
    + JDK-8340077: Open source few Checkbox tests - Set2
    + JDK-8340084: Open source AWT Frame related tests
    + JDK-8340143: Open source several Java2D rendering loop tests.
    + JDK-8340164: Open source few Component tests - Set1
    + JDK-8340173: Open source some Component/Panel/EventQueue
      tests - Set2
    + JDK-8340176: Replace usage of -noclassgc with -Xnoclassgc in
      test/jdk/java/lang/management/MemoryMXBean/LowMemoryTest2.java
    + JDK-8340193: Open source several AWT Dialog tests - Batch 1
    + JDK-8340228: Open source couple more miscellaneous AWT tests
    + JDK-8340271: Open source several AWT Robot tests
    + JDK-8340279: Open source several AWT Dialog tests - Batch 2
    + JDK-8340332: Open source mixed AWT tests - Set3
    + JDK-8340366: Open source several AWT Dialog tests - Batch 3
    + JDK-8340367: Opensource few AWT image tests
    + JDK-8340393: Open source closed choice tests #2
    + JDK-8340407: Open source a few more Component related tests
    + JDK-8340417: Open source some MenuBar tests - Set1
    + JDK-8340432: Open source some MenuBar tests - Set2
    + JDK-8340433: Open source closed choice tests #3
    + JDK-8340437: Open source few more AWT Frame related tests
    + JDK-8340458: Open source additional Component tests (part 2)
    + JDK-8340555: Open source DnD tests - Set4
    + JDK-8340560: Open Source several AWT/2D font and rendering
      tests
    + JDK-8340605: Open source several AWT PopupMenu tests
    + JDK-8340621: Open source several AWT List tests
    + JDK-8340625: Open source additional Component tests (part 3)
    + JDK-8340639: Open source few more AWT List tests
    + JDK-8340713: Open source DnD tests - Set5
    + JDK-8340784: Remove PassFailJFrame constructor with
      screenshots
    + JDK-8340790: Open source several AWT Dialog tests - Batch 4
    + JDK-8340809: Open source few more AWT PopupMenu tests
    + JDK-8340874: Open source some of the AWT Geometry/Button
      tests
    + JDK-8340907: Open source closed frame tests # 2
    + JDK-8340966: Open source few Checkbox and Cursor tests - Set1
    + JDK-8340967: Open source few Cursor tests - Set2
    + JDK-8340978: Open source few DnD tests - Set6
    + JDK-8340985: Open source some Desktop related tests
    + JDK-8341000: Open source some of the AWT Window tests
    + JDK-8341004: Open source AWT FileDialog related tests
    + JDK-8341072: Open source several AWT Canvas and Rectangle
      related tests
    + JDK-8341128: open source some 2d graphics tests
    + JDK-8341148: Open source several Choice related tests
    + JDK-8341162: Open source some of the AWT window test
    + JDK-8341170: Open source several Choice related tests (part
      2)
    + JDK-8341177: Opensource few List and a Window test
    + JDK-8341191: Open source few more AWT FileDialog tests
    + JDK-8341239: Open source closed frame tests # 3
    + JDK-8341257: Open source few DND tests - Set1
    + JDK-8341258: Open source few various AWT tests - Set1
    + JDK-8341278: Open source few TrayIcon tests - Set7
    + JDK-8341298: Open source more AWT window tests
    + JDK-8341373: Open source closed frame tests # 4
    + JDK-8341378: Open source few TrayIcon tests - Set8
    + JDK-8341447: Open source closed frame tests # 5
    + JDK-8341535: sun/awt/font/TestDevTransform.java fails with
      RuntimeException: Different rendering
    + JDK-8341637: java/net/Socket/UdpSocket.java fails with
      'java.net.BindException: Address already in use'
      (macos-aarch64)
    + JDK-8341972: java/awt/dnd/DnDRemoveFocusOwnerCrashTest.java
      timed out after JDK-8341257
    + JDK-8342376: More reliable OOM handling in
      ExceptionDuringDumpAtObjectsInitPhase test
    + JDK-8342524: Use latch in AbstractButton/bug6298940.java
      instead of delay
    + JDK-8342633: javax/management/security/
      /HashedPasswordFileTest.java creates tmp file in src dir
    + JDK-8343037: Missing @since tag on JColorChooser.showDialog
      overload
    + JDK-8343103: Enable debug logging for vmTestbase/nsk/jvmti/
      /scenarios/sampling/SP05/sp05t003/TestDescription.java
    + JDK-8343124: Tests fails with
      java.lang.IllegalAccessException: class
      com.sun.javatest.regtest.agent.MainWrapper$MainTask cannot
      access
    + JDK-8343170: java/awt/Cursor/JPanelCursorTest/
      /JPanelCursorTest.java does not show the default cursor
    + JDK-8343205: CompileBroker::possibly_add_compiler_threads
      excessively polls available memory
    + JDK-8343529: serviceability/sa/ClhsdbWhere.java fails
      AssertionFailure: Corrupted constant pool
    + JDK-8343891: Test javax/swing/JTabbedPane/
      /TestJTabbedPaneBackgroundColor.java failed
    + JDK-8343936: Adjust timeout in test
      javax/management/monitor/DerivedGaugeMonitorTest.java
    + JDK-8344316: security/auth/callback/TextCallbackHandler/
      /Password.java make runnable with JTReg and add the UI
    + JDK-8344361: Restore null return for invalid services from
      legacy providers
    + JDK-8345133: Test sun/security/tools/jarsigner/
      /TsacertOptionTest.java failed: Warning found in stdout
    + JDK-8345134: Test sun/security/tools/jarsigner/
      /ConciseJarsigner.java failed: unable to find valid
      certification path to requested target
    + JDK-8345357: test/jdk/javax/swing/JRadioButton/8033699/
      /bug8033699.java fails in ubuntu22.04
    + JDK-8345447: test/jdk/javax/swing/JToolBar/4529206/
      /bug4529206.java fails in ubuntu22.04
    + JDK-8345547: test/jdk/javax/swing/text/DefaultEditorKit/
      /4278839/bug4278839.java fails in ubuntu22.04
    + JDK-8345598: Upgrade NSS binaries for interop tests
    + JDK-8345625: Better HTTP connections
    + JDK-8345728: [Accessibility,macOS,Screen Magnifier]:
      JCheckbox unchecked state does not magnify but works for
      checked tate
    + JDK-8345838: Remove the
      appcds/javaldr/AnonVmClassesDuringDump.java test
    + JDK-8346049: jdk/test/lib/security/timestamp/TsaServer.java
      warnings
    + JDK-8346581: JRadioButton/ButtonGroupFocusTest.java fails in
      CI on Linux
    + JDK-8347000: Bug in
      com/sun/net/httpserver/bugs/B6361557.java test
    + JDK-8347019: Test javax/swing/JRadioButton/8033699/
      /bug8033699.java still fails:  Focus is not on Radio Button
      Single as Expected
    + JDK-8347083: Incomplete logging in
      nsk/jvmti/ResourceExhausted/resexhausted00* tests
    + JDK-8347126: gc/stress/TestStressG1Uncommit.java gets
      OOM-killed
    + JDK-8347267: [macOS]: UnixOperatingSystem.c:67:40: runtime
      error: division by zero
    + JDK-8347286: (fs) Remove some extensions from
      java/nio/file/Files/probeContentType/Basic.java
    + JDK-8347576: Error output in libjsound has non matching
      format strings
    + JDK-8347629: Test FailOverDirectExecutionControlTest.java
      fails with -Xcomp
    + JDK-8347911: Limit the length of inflated text chunks
    + JDK-8347995: Race condition in jdk/java/net/httpclient/
      /offline/FixedResponseHttpClient.java
    + JDK-8348107: test/jdk/java/net/httpclient/
      /HttpsTunnelAuthTest.java fails intermittently
    + JDK-8348110: Update LCMS to 2.17
    + JDK-8348299: Update List/ItemEventTest/ItemEventTest.java
    + JDK-8348596: Update FreeType to 2.13.3
    + JDK-8348597: Update HarfBuzz to 10.4.0
    + JDK-8348598: Update Libpng to 1.6.47
    + JDK-8348600: Update PipeWire to 1.3.81
    + JDK-8348865: JButton/bug4796987.java never runs because
      Windows XP is unavailable
    + JDK-8348936: [Accessibility,macOS,VoiceOver] VoiceOver
      doesn't announce untick on toggling the checkbox with 'space'
      key on macOS
    + JDK-8348989: Better Glyph drawing
    + JDK-8349039: Adjust exception No type named <ThreadType> in
      database
    + JDK-8349111: Enhance Swing supports
    + JDK-8349200: [JMH] time.format.ZonedDateTimeFormatterBenchmark
      fails
    + JDK-8349348: Refactor ClassLoaderDeadlock.sh and Deadlock.sh
      to run fully in java
    + JDK-8349492: Update sun/security/pkcs12/
      /KeytoolOpensslInteropTest.java to use a recent Openssl
      version
    + JDK-8349501: Relocate supporting classes in
      security/testlibrary to test/lib/jdk tree
    + JDK-8349594: Enhance TLS protocol support
    + JDK-8349751: AIX build failure after upgrade pipewire to
      1.3.81
    + JDK-8349974: [JMH,17u] MaskQueryOperationsBenchmark fails
      java.lang.NoClassDefFoundError
    + JDK-8350211: CTW: Attempt to preload all classes in constant
      pool
    + JDK-8350224: Test javax/swing/JComboBox/
      /TestComboBoxComponentRendering.java fails in ubuntu 23.x and
      later
    + JDK-8350260: Improve HTML instruction formatting in
      PassFailJFrame
    + JDK-8350383: Test: add more test case for string compare (UL
      case)
    + JDK-8350386: Test TestCodeCacheFull.java fails with option
      -XX:-UseCodeCacheFlushing
    + JDK-8350412: [21u] AArch64: Ambiguous frame layout leads to
      incorrect traces in JFR
    + JDK-8350498: Remove two Camerfirma root CA certificates
    + JDK-8350540: [17u,11u] B8312065.java fails Network is
      unreachable
    + JDK-8350546: Several java/net/InetAddress tests fails
      UnknownHostException
    + JDK-8350616: Skip ValidateHazardPtrsClosure in non-debug
      builds
    + JDK-8350651: Bump update version for OpenJDK: jdk-17.0.16
    + JDK-8350924: javax/swing/JMenu/4213634/bug4213634.java fails
    + JDK-8350991: Improve HTTP client header handling
    + JDK-8351086: (fc) Make
      java/nio/channels/FileChannel/BlockDeviceSize.java test manual
    + JDK-8352076: [21u] Problem list tests that fail in 21 and
      would be fixed by 8309622
    + JDK-8352109: java/awt/Desktop/MailTest.java fails in
      platforms where Action.MAIL is not supported
    + JDK-8352302: Test
      sun/security/tools/jarsigner/TimestampCheck.java is failing
    + JDK-8352649: [17u] guarantee(is_result_safe ||
      is_in_asgct()) failed inside AsyncGetCallTrace
    + JDK-8352676: Opensource JMenu tests - series1
    + JDK-8352680: Opensource few misc swing tests
    + JDK-8352684: Opensource JInternalFrame tests - series1
    + JDK-8352706: httpclient HeadTest does not run on HTTP2
    + JDK-8352716: (tz) Update Timezone Data to 2025b
    + JDK-8352908: Open source several swing tests batch1
    + JDK-8352942: jdk/jfr/startupargs/TestMemoryOptions.java
      fails with 32-bit build
    + JDK-8353070: Clean up and open source couple AWT Graphics
      related tests (Part 1)
    + JDK-8353138: Screen capture for test
      TaskbarPositionTest.java, failure case
    + JDK-8353320: Open source more Swing text tests
    + JDK-8353446: Open source several AWT Menu tests - Batch 2
    + JDK-8353475: Open source two Swing DefaultCaret tests
    + JDK-8353685: Open some JComboBox bugs 4
    + JDK-8353709: Debug symbols bundle should contain full debug
      files when building --with-external-symbols-in-bundles=public
    + JDK-8353714: [17u] Backport of 8347740 incomplete
    + JDK-8353942: Open source Swing Tests - Set 5
    + JDK-8354554: Open source several clipboard tests batch1
    + JDK-8356053: Test java/awt/Toolkit/Headless/
      /HeadlessToolkit.java fails by timeout
    + JDK-8356096: ISO 4217 Amendment 179 Update
    + JDK-8356571: Re-enable -Wtype-limits for GCC in LCMS
    + JDK-8357105: C2: compilation fails with 'assert(false)
      failed: empty program detected during loop optimization'
    + JDK-8357193: [VS 2022 17.14] Warning C5287 in debugInit.c:
      enum type mismatch during build
    + JDK-8359170: Add 2 TLS and 2 CS Sectigo roots
    + JDK-8360147: Better Glyph drawing redux
    + JDK-8361674: [17u] Remove designator
      DEFAULT_PROMOTED_VERSION_PRE=ea for release 17.0.16

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2672-1
Released:    Mon Aug  4 15:06:13 2025
Summary:     Security update for sqlite3
Type:        security
Severity:    important
References:  1246597,CVE-2025-6965
This update for sqlite3 fixes the following issues:

- Update to version 3.50.2
- CVE-2025-6965: Fixed an integer truncation to avoid assertion faults. (bsc#1246597)
    
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2684-1
Released:    Mon Aug  4 17:07:20 2025
Summary:     Security update for apache2
Type:        security
Severity:    important
References:  1246169,1246302,1246303,1246305,1246306,1246307,1246477,CVE-2024-42516,CVE-2024-43204,CVE-2024-47252,CVE-2025-23048,CVE-2025-49630,CVE-2025-49812,CVE-2025-53020
This update for apache2 fixes the following issues:

- CVE-2024-42516: Fixed HTTP response splitting. (bsc#1246477)
- CVE-2024-43204: Fixed a SSRF when mod_proxy is loaded that allows an attacker to send outbound proxy requests to a URL controlled by them. (bsc#1246305)
- CVE-2024-47252: Fixed insufficient escaping of user-supplied data in mod_ssl allows an untrusted SSL/TLS client to insert escape characters into log file. (bsc#1246303)
- CVE-2025-23048: Fixed access control bypass by trusted clients through TLS 1.3 session resumption in some mod_ssl configurations. (bsc#1246302)
- CVE-2025-49630: Fixed denial of service can be triggered by untrusted clients causing an assertion in mod_proxy_http2. (bsc#1246307)
- CVE-2025-49812: Fixed Opossum Attack Application Layer Desynchronization using Opportunistic TLS. (bsc#1246169)
- CVE-2025-53020: Fixed HTTP/2 denial of service due to late release of memory after effective lifetime. (bsc#1246306)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2714-1
Released:    Wed Aug  6 11:36:56 2025
Summary:     Recommended update for systemd
Type:        recommended
Severity:    moderate
References:  
This update for systemd fixes the following issues:

- triggers.systemd: skip update of hwdb, journal-catalog if executed during
  an offline update.

- systemd-repart is no more considered as experimental (jsc#PED-13213)

- Import commit 130293e510ceb4d121d11823e6ebd4b1e8332ea0 (merge of v254.27)
  For a complete list of changes, visit:
  https://github.com/openSUSE/systemd/compare/278fb676146e35a7b4057f52f34a7bbaf1b82369...130293e510ceb4d121d11823e6ebd4b1e8332ea0

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2720-1
Released:    Thu Aug  7 05:38:44 2025
Summary:     Recommended update for crypto-policies
Type:        recommended
Severity:    moderate
References:  
This update for crypto-policies fixes the following issues:

- Update the BSI policy (jsc#PED-12880)
    * BSI: switch to 3072 minimum RSA key size
    * BSI: Update BSI policy for new 2024 minimum

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2730-1
Released:    Fri Aug  8 06:51:35 2025
Summary:     Recommended update for perl-DBD-Pg
Type:        recommended
Severity:    moderate
References:  1244183
This update for perl-DBD-Pg fixes the following issues:

- Dependency submission for the openQA stack (bsc#1244183)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2731-1
Released:    Fri Aug  8 06:51:47 2025
Summary:     Recommended update for perl-DBI
Type:        recommended
Severity:    moderate
References:  1244183
This update for perl-DBI fixes the following issues:

- Dependency submission for the openQA stack (bsc#1244183)
- Updated to 1.647.0 (1.647)
  * Remove 'experimental' tag from statistics_info
  * RT tickets moved to github issues (rwfranks++)
  * Fix install issue

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2734-1
Released:    Fri Aug  8 10:05:10 2025
Summary:     Security update for dpkg
Type:        security
Severity:    moderate
References:  1245573,CVE-2025-6297
This update for dpkg fixes the following issues:

- CVE-2025-6297: Fixed an improper sanitization of directory permissions that could lead to DoS. (bsc#1245573)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2758-1
Released:    Tue Aug 12 12:05:22 2025
Summary:     Security update for libxml2
Type:        security
Severity:    important
References:  1246296,CVE-2025-7425
This update for libxml2 fixes the following issues:

- CVE-2025-7425: Fixed heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr (bsc#1246296)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2761-1
Released:    Tue Aug 12 14:17:29 2025
Summary:     Recommended update for python-appdirs, python-asn1crypto, python-certifi, python-chardet, python-docutils, python-idna, python-iso8601, python-jmespath, python-ply, python-pretend, python-pyasn1, python-pyasn1-modules, python-pycparser, python-rsa
Type:        recommended
Severity:    moderate
References:  1233012
This update for python-appdirs, python-asn1crypto, python-certifi, python-chardet, python-docutils, python-idna, python-iso8601, python-jmespath, python-ply, python-pretend, python-pyasn1, python-pyasn1-modules, python-pycparser, python-rsa fixes the following issues:

- Add python36 provides/obsoletes to enable SLE-12 to SLE-15 migration (bsc#1233012)

-----------------------------------------------------------------
Advisory ID: SUSE-OU-2025:2763-1
Released:    Tue Aug 12 14:45:40 2025
Summary:     Optional update for libyaml
Type:        optional
Severity:    moderate
References:  1246570

This update for libyaml ships the missing libyaml-0-2 library package to
SUSE MicroOS 5.1 and 5.2.


-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2772-1
Released:    Tue Aug 12 19:35:08 2025
Summary:     Recommended update for grub2
Type:        security
Severity:    moderate
References:  1234959,1246157,1246231,1246237,CVE-2024-56738
This update for grub2 fixes the following issues:

- CVE-2024-56738: Fixed side-channel attack due to not 
  constant-time algorithm in grub_crypto_memcmp (bsc#1234959)

Other fixes:
- Fix test -f and -s do not work properly over the network files 
  served via tftp and http (bsc#1246157, bsc#1246237)
- Skip mount point in grub_find_device function (bsc#1246231)


-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2776-1
Released:    Wed Aug 13 08:10:36 2025
Summary:     Recommended update for systemd-rpm-macros
Type:        recommended
Severity:    moderate
References:  1237143
This update for systemd-rpm-macros fixes the following issues:

- Introduce %udev_trigger_with_reload() for packages that need to trigger events
  in theirs scriplets. The new macro automatically triggers a reload of the udev
  rule files as this step is often overlooked by packages (bsc#1237143).
  
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2778-1
Released:    Wed Aug 13 08:45:57 2025
Summary:     Security update for python3
Type:        security
Severity:    important
References:  1233012,1243273,1244032,1244056,1244059,1244060,1244061,1244401,1244705,1247249,831629,CVE-2024-12718,CVE-2025-4138,CVE-2025-4330,CVE-2025-4435,CVE-2025-4516,CVE-2025-4517,CVE-2025-6069,CVE-2025-8194
This update for python3 fixes the following issues:

- CVE-2025-4516: use-after-free in the unicode-escape decoder when using the error handler (bsc#1243273).
- CVE-2024-12718: Fixed extraction filter bypass that allowed file metadata modification outside extraction directory (bsc#1244056)
- CVE-2025-4138: Fixed issue that might allow symlink targets to point outside the destination directory, and the modification of some file metadata (bsc#1244059)
- CVE-2025-4330: Fixed extraction filter bypass that allowed linking outside extraction directory (bsc#1244060)
- CVE-2025-4435: Fixed Tarfile extracts filtered members when errorlevel=0 (bsc#1244061)
- CVE-2025-4517: Fixed arbitrary filesystem writes outside the extraction directory during extraction with filter='data' (bsc#1244032)
- CVE-2025-6069: Fixed worst case quadratic complexity when processing certain crafted malformed inputs with HTMLParser (bsc#1244705)
- CVE-2025-8194: Fixed denial of service caused by tar archives with negative offsets (bsc#1247249)
    
Other fixes:
- Limit buffer size for IPv6 address parsing (bsc#1244401).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2780-1
Released:    Wed Aug 13 10:28:27 2025
Summary:     Recommended update for gcc14
Type:        recommended
Severity:    moderate
References:  1230262,1232526,1237442,1238491,1239566,1239938,1240788,1241549,1243991,1244050
This update for gcc14 fixes the following issues:

Update to GCC 14.3 release, bb24b4c804f3d95b0ba95b7496, git11799

- Fixed libqt6webengine build.
- Fix build on s390x [bsc#1241549]
- Make sure link editing is done against our own shared library
  copy rather than the installed system runtime.  [bsc#1240788]
- Allow GCC executables to be built PIE.  [bsc#1239938]
- Backport -msplit-patch-nops required for user-space livepatching on powerpc.
- Also record -D_FORTIFY_SOURCE=2 in the DWARF debug info DW_AT_producer string.  [bsc#1239566]
- Disable profiling during build when %want_reproducible_builds is set [bsc#1238491]
- Fixes reported ICE in [bsc#1237442]
- Add larchintrin.h, lasxintrin.h and lsxintrin.h
  headers to gccXY main package in %files section
- libstdc++6 fix for parsing tzdata 2024b [gcc#116657]
- Fix ICE with LTO building openvino on aarch64 [bsc#1230262]
- Exclude shared objects present for link editing in the GCC specific
  subdirectory from provides processing via __provides_exclude_from.
  [bsc#1244050][bsc#1243991]
- Make cross-*-gcc14-bootstrap package conflict with the non-bootstrap
  variant conflict with the unversioned cross-*-gcc package.

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2818-1
Released:    Fri Aug 15 14:56:21 2025
Summary:     Security update for apache-commons-lang3
Type:        security
Severity:    moderate
References:  1246397,CVE-2025-48924
This update for apache-commons-lang3 fixes the following issues:

- Update to version 3.18.0 
- CVE-2025-48924: Fixed an uncontrolled recursion vulnerability that may lead to a DoS. (bsc#1246397)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2841-1
Released:    Mon Aug 18 13:01:25 2025
Summary:     Recommended update for openssl-1_1
Type:        recommended
Severity:    moderate
References:  1246697
This update for openssl-1_1 fixes the following issues:

- FIPS: Use the NID_X9_62_prime256v1 curve in ECDSA KAT test
  instead of NID_secp256k1. [bsc#1246697]

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2921-1
Released:    Tue Aug 19 16:54:12 2025
Summary:     Recommended update for libzypp, zypper
Type:        recommended
Severity:    important
References:  1218459,1245220,1245985,1246038,1246149,1246466,1247054,1247690
This update for libzypp, zypper fixes the following issues:

- Fix evaluation of libproxy results (bsc#1247690)
- Replace URL variables inside mirrorlist/metalink files
- Append RepoInfo::path() to the mirror URLs in Preloader (bsc#1247054)
- During installation indicate the backend being used (bsc#1246038)
  If some package actually needs to know, it should test for
  ZYPP_CLASSIC_RPMTRANS being set in the environment.
  Otherwise the transaction is driven by librpm.
- Workaround 'rpm -vv' leaving scriptlets /var/tmp (bsc#1218459)
- Verbose log libproxy results if PX_DEBUG=1 is set.
- BuildRequires:  cmake >= 3.17.
- Allow explicit request to probe an added repo's URL (bsc#1246466)
- Fix tests with -DISABLE_MEDIABACKEND_TESTS=1 
- Add runtime check for a broken rpm-4.18.0 --runpostrans (bsc#1246149)
- Add regression test for (bsc#1245220) and some other filesize related tests.
- Fix addrepo to handle explicit --check and --no-check requests (bsc#1246466)
- Accept 'show' as alias for 'info' (bsc#1245985)

-----------------------------------------------------------------
Advisory ID: SUSE-OU-2025:2931-1
Released:    Wed Aug 20 17:39:18 2025
Summary:     Optional update for rsyslog
Type:        optional
Severity:    low
References:  
This update for rsyslog fixes the following issues:

- Add rsyslog-module-kafka to Package HUB
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:2956-1
Released:    Fri Aug 22 08:57:48 2025
Summary:     Recommended update for openssl-3
Type:        recommended
Severity:    moderate
References:  1247144,1247148
This update for openssl-3 fixes the following issues:

- Increased limit for CRL download (bsc#1247148, bsc#1247144)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2964-1
Released:    Fri Aug 22 14:52:39 2025
Summary:     Security update for glibc
Type:        security
Severity:    moderate
References:  1240058,1246965,CVE-2025-8058
This update for glibc fixes the following issues:

- CVE-2025-8058: Fixed double-free after allocation failure in regcomp. (bsc#1246965)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2970-1
Released:    Mon Aug 25 10:27:57 2025
Summary:     Security update for pam
Type:        security
Severity:    moderate
References:  1232234,1246221,CVE-2024-10041
This update for pam fixes the following issues:

- Improve previous CVE-2024-10041 fix which led to CPU performance issues (bsc#1232234)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2985-1
Released:    Mon Aug 25 15:55:03 2025
Summary:     Security update for python-urllib3
Type:        security
Severity:    moderate
References:  1244925,CVE-2025-50181
This update for python-urllib3 fixes the following issues:

- CVE-2025-50181: Pool managers now properly control redirects when retries is passed. (bsc#1244925)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:2986-1
Released:    Tue Aug 26 12:41:07 2025
Summary:     Security update for postgresql17
Type:        security
Severity:    important
References:  1248119,1248120,1248122,CVE-2025-8713,CVE-2025-8714,CVE-2025-8715
This update for postgresql17 fixes the following issues:

Updated to 17.6:
  * CVE-2025-8713: Fixed optimizer statistics exposing
    sampled data within a view, partition, or child table
    (bsc#1248120)
  * CVE-2025-8714: Fixed untrusted data inclusion in pg_dump 
    allows superuser of origin server to execute arbitrary code
    in psql client (bsc#1248122)
  * CVE-2025-8715: Fixed improper neutralization of newlines 
    in pg_dump leading to arbitrary code execution in the psql
    client and in the restore target server (bsc#1248119)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3024-1
Released:    Fri Aug 29 14:40:10 2025
Summary:     Security update for tomcat
Type:        security
Severity:    important
References:  1243895,1246318,1246388,1246389,CVE-2025-48989,CVE-2025-49125,CVE-2025-52434,CVE-2025-52520,CVE-2025-53506
This update for tomcat fixes the following issues:

Updated to 9.0.108:
    
- CVE-2025-52520: Fixed integer overflow can lead to DoS for some unlikely configurations of multipart upload (bsc#1246388)
- CVE-2025-53506: Fixed uncontrolled resource HTTP/2 client consumption vulnerability (bsc#1246318)
- CVE-2025-52434: Fixed race condition on connection close when using the APR/Native connector leading to a JVM crash (bsc#1246389)
- CVE-2025-48989: Fixed 'MadeYouReset' DoS in HTTP/2 due to client triggered stream reset (bsc#1243895)                                                        

Other:
    
- Correct a regression in the fix for CVE-2025-49125 that
  prevented access to PreResources and PostResources when mounted below the
  web application root with a path that was terminated with a file
  separator.

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3025-1
Released:    Fri Aug 29 14:42:18 2025
Summary:     Security update for javamail
Type:        security
Severity:    moderate
References:  1246873,CVE-2025-7962
This update for javamail fixes the following issues:

- Update to version 1.6.2
- CVE-2025-7962: Fixed an improper neutralization of \r and \n UTF-8 characters can lead to SMTP injection (bsc#1246873)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3066-1
Released:    Thu Sep  4 08:37:17 2025
Summary:     Recommended update for systemd-presets-branding-SLE
Type:        recommended
Severity:    moderate
References:  1244553,1246835
This update for systemd-presets-branding-SLE fixes the following issues:

- Enable sysstat_collect.timer and sysstat_summary.timer
  (bsc#1244553, bsc#1246835).
- Modified default SLE presets.
-----------------------------------------------------------------
Advisory ID: SUSE-OU-2025:3094-1
Released:    Mon Sep  8 11:46:41 2025
Summary:     Optional update for NetworkManager
Type:        optional
Severity:    low
References:  1246113
This update for NetworkManager fixes the following issue

- Add NetworkManager-wwan to SLE-Module-Desktop-Applications_15-SP7 (bsc#1246113)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3114-1
Released:    Tue Sep  9 12:35:12 2025
Summary:     Security update for netty, netty-tcnative
Type:        security
Severity:    important
References:  1247991,1249116,1249134,CVE-2025-55163,CVE-2025-58056,CVE-2025-58057
This update for netty, netty-tcnative fixes the following issues:

Upgrade to upstream version 4.1.126.
    
Security issues fixed:
    
- CVE-2025-58057: decompression codecs allocating a large number of buffers after processing specially crafted input can
  cause a denial of service (bsc#1249134).
- CVE-2025-58056: incorrect parsing of chunk extensions can lead to request smuggling (bsc#1249116).
- CVE-2025-55163: 'MadeYouReset' denial of serivce attack in the HTTP/2 protocol (bsc#1247991).
    
Other issues fixed:

- Fixes from version 4.1.126
  * Fix IllegalReferenceCountException on invalid upgrade response.
  * Drop unknown frame on missing stream.
  * Don't try to handle incomplete upgrade request.
  * Update to netty-tcnative 2.0.73Final.
    
- Fixes from version 4.1.124
  * Fix NPE and AssertionErrors when many tasks are scheduled and cancelled.
  * HTTP2: Http2ConnectionHandler should always use Http2ConnectionEncoder.
  * Epoll: Correctly handle UDP packets with source port of 0.
  * Fix netty-common OSGi Import-Package header.
  * MqttConnectPayload.toString() includes password.

- Fixes from version 4.1.123
  * Fix chunk reuse bug in adaptive allocator.
  * More accurate adaptive memory usage accounting.
  * Introduce size-classes for the adaptive allocator.
  * Reduce magazine proliferation eagerness.
  * Fix concurrent ByteBuffer access issue in AdaptiveByteBuf.getBytes.
  * Fix possible buffer corruption caused by incorrect setCharSequence(...) implementation.
  * AdaptiveByteBuf: Fix AdaptiveByteBuf.maxFastWritableBytes() to take writerIndex() into account.
  * Optimize capacity bumping for adaptive ByteBufs.
  * AbstractDnsRecord: equals() and hashCode() to ignore name field's case.
  * Backport Unsafe guards.
  * Guard recomputed offset access with hasUnsafe.
  * HTTP2: Always produce a RST frame on stream exception.
  * Correct what artifacts included in netty-bom.

- Fixes from version 4.1.122
  * DirContextUtils.addNameServer(...) should just catch Exception internally.
  * Make public API specify explicit maxAllocation to prevent OOM.
  * Fix concurrent ByteBuf write access bug in adaptive allocator.
  * Fix transport-native-kqueue Bundle-SymbolicNames.
  * Fix resolver-dns-native-macos Bundle-SymbolicNames.
  * Always correctly calculate the memory address of the ByteBuf even if sun.misc.Unsafe is not usable.
  * Upgrade lz4 dependencies as the old version did not correctly handle ByteBuffer that have an arrayOffset > 0.
  * Optimize ByteBuf.setCharSequence for adaptive allocator.
  * Kqueue: Fix registration failure when fd is reused.
  * Make JdkZlibEncoder accept Deflater.DEFAULT_COMPRESSION as level.
  * Ensure OpenSsl.availableJavaCipherSuites does not contain null values.
  * Always prefer direct buffers for pooled allocators if not explicit disabled.
  * Update to netty-tcnative 2.0.72.Final.
  * Re-enable sun.misc.Unsafe by default on Java 24+.
  * Kqueue: Delay removal from registration map to fix noisy warnings.

- Fixes from version 4.1.121
  * Epoll.isAvailable() returns false on Ubuntu 20.04/22.04 arch amd64.
  * Fix transport-native-epoll Bundle-SymbolicNames.

- Fixes from version 4.1.120
  * Fix flawed termination condition check in HttpPostRequestEncoder#encodeNextChunkUrlEncoded(int) for current
    InterfaceHttpData.
  * Exposed decoderEnforceMaxConsecutiveEmptyDataFrames and decoderEnforceMaxRstFramesPerWindow.
  * ThreadExecutorMap must restore old EventExecutor.
  * Make Recycler virtual thread friendly.
  * Disable sun.misc.Unsafe by default on Java 24+.
  * Adaptive: Correctly enforce leak detection when using AdaptiveByteBufAllocator.
  * Add suppressed exception to original cause when calling Future.sync*.
  * Add SETTINGS_ENABLE_CONNECT_PROTOCOL to the default HTTP/2 settings.
  * Correct computation for suboptimal chunk retirement probability.
  * Fix bug in method AdaptivePoolingAllocator.allocateWithoutLock(...).
  * Fix a Bytebuf leak in TcpDnsQueryDecoder.
  * SSL: Clear native error if named group is not supported.
  * WebSocketClientCompressionHandler shouldn't claim window bits support when jzlib is not available.
  * Fix the assignment error of maxQoS parameter in ConnAck Properties.

- Fixes from version 4.1.119
  * Replace SSL assertion with explicit record length check.
  * Fix NPE when upgrade message fails to aggregate.
  * SslHandler: Fix possible NPE when executor is used for delegating.
  * Consistently add channel info in HTTP/2 logs.
  * Add QueryStringDecoder option to leave '+' alone.
  * Use initialized BouncyCastle providers when available.

- Fix pom.xml errors that will be fatal with Maven 4

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3132-1
Released:    Wed Sep 10 13:54:02 2025
Summary:     Recommended update for salt and Python dependencies
Type:        recommended
Severity:    moderate
References:  
This update for salt and Python dependencies fixes the following issues:

- Implementation of python311-salt package and required Python 3.11 dependencies on SUSE Linux Enterprise 15 SP4
  (no source changes) (jsc#PED-13283)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3005-1
Released:    Thu Sep 11 12:21:40 2025
Summary:     Security update for postgresql16
Type:        security
Severity:    important
References:  1248119,1248120,1248122,CVE-2025-8713,CVE-2025-8714,CVE-2025-8715
This update for postgresql16 fixes the following issues:

Upgraded to 16.10:
  * CVE-2025-8713: Fixed optimizer statistics exposing
    sampled data within a view, partition, or child table
    (bsc#1248120)
  * CVE-2025-8714: Fixed untrusted data inclusion in pg_dump 
    allows superuser of origin server to execute arbitrary code
    in psql client (bsc#1248122)
  * CVE-2025-8715: Fixed improper neutralization of newlines 
    in pg_dump leading to arbitrary code execution in the psql
    client and in the restore target server (bsc#1248119)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3198-1
Released:    Fri Sep 12 14:15:08 2025
Summary:     Security update for curl
Type:        security
Severity:    important
References:  1228260,1236589,1243397,1243706,1243933,1246197,1249191,1249348,1249367,CVE-2024-6874,CVE-2025-0665,CVE-2025-10148,CVE-2025-4947,CVE-2025-5025,CVE-2025-5399,CVE-2025-9086
This update for curl fixes the following issues:

Update to version 8.14.1 (jsc#PED-13055, jsc#PED-13056).    
    
Security issues fixed:

- CVE-2025-0665: eventfd double close can cause libcurl to act unreliably (bsc#1236589).
- CVE-2025-4947: QUIC certificate check is skipped with wolfSSL allows for MITM attacks (bsc#1243397).
- CVE-2025-5025: no QUIC certificate pinning with wolfSSL can lead to connections to impostor servers that are not
  easily noticed (bsc#1243706).
- CVE-2025-5399: bug in websocket code can cause libcurl to get trapped in an endless busy-loop when processing
  specially crafted packets (bsc#1243933).
- CVE-2024-6874: punycode conversions to/from IDN can leak stack content when libcurl is built to use the macidn IDN
  backend (bsc#1228260).
- CVE-2025-9086: bug in patch comparison logic when processing cookies can lead to out-of-bounds read in heap buffer
  (bsc#1249191).
- CVE-2025-10148: predictable websocket mask can lead to proxy cache poisoning by malicious server (bsc#1249348).

Other issues fixed:
    
- Fix wrong return code when --retry is used (bsc#1249367).
  * tool_operate: fix return code when --retry is used but not triggered [b42776b]
    
- Fix the --ftp-pasv option in curl v8.14.1 (bsc#1246197).
  * tool_getparam: fix --ftp-pasv [5f805ee]

- Fixed with version 8.14.1:
  * TLS: add CURLOPT_SSL_SIGNATURE_ALGORITHMS and --sigalgs.
  * websocket: add option to disable auto-pong reply.
  * huge number of bugfixes.

  Please see https://curl.se/ch/ for full changelogs.

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3216-1
Released:    Mon Sep 15 08:37:40 2025
Summary:     Recommended update for 
Type:        recommended
Severity:    important
References:  1246081
This update for  fixes the following issues:

- Add lmdb binary into Basesystem 15-SP6 and 15-SP7 (bsc#1246081)
  
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3241-1
Released:    Wed Sep 17 08:28:28 2025
Summary:     Recommended update for salt-shaptools
Type:        recommended
Severity:    important
References:  1248174
This update for salt-shaptools fixes the following issues:

- Fix crmsh import usage using crm binary python version.
  This enables salt modules/states correct usage when the Salt Bundle is used (bsc#1248174) 

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3268-1
Released:    Thu Sep 18 13:08:10 2025
Summary:     Security update for curl
Type:        security
Severity:    important
References:  1246197,1249191,1249348,1249367,CVE-2025-10148,CVE-2025-9086
This update for curl fixes the following issues:

Security issues fixed:

- CVE-2025-9086: bug in patch comparison logic when processing cookies can lead to out-of-bounds read in heap buffer
  (bsc#1249191).
- CVE-2025-10148: predictable websocket mask can lead to proxy cache poisoning by malicious server (bsc#1249348).
    
Other issues fixed:
    
- Fix the --ftp-pasv option in curl v8.14.1 (bsc#1246197).
  * tool_getparam: fix --ftp-pasv [5f805ee]

- Update to version 8.14.1 (jsc#PED-13055, jsc#PED-13056).
  * TLS: add CURLOPT_SSL_SIGNATURE_ALGORITHMS and --sigalgs.
  * websocket: add option to disable auto-pong reply.
  * huge number of bugfixes.

  Please see https://curl.se/ch/ for full changelogs.


-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3285-1
Released:    Sun Sep 21 11:18:05 2025
Summary:     Security update for mybatis, ognl
Type:        security
Severity:    important
References:  1248252,CVE-2025-53192
This update for mybatis, ognl fixes the following issues:

Version update to 3.5.7:

  * Bug fixes:

    + Improved performance under JDK 8. #2223

Version update to 3.5.8:

  * List of changes:

    + Avoid NullPointerException when mapping an empty string to
      java.lang.Character. #2368
    + Fixed an incorrect argument when initializing static object.
      This resolves a compatibility issue with quarkus-mybatis.
      #2284
    + Performance improvements. #2297 #2335 #2340

Version update to 3.5.9:

  * List of changes:

    + Add nullable to <foreach />. If enabled, it skips the
      iteration when the collection is null instead of throwing an
      exception. To enable this feature globally, set
      nullableOnForEach=true in the config. #1883

Version update to 3.5.10:

  * Bug fixes:

    + Unexpected illegal reflective access warning (or
      InaccessibleObjectException on Java 16+) when calling method
      in OGNL expression. #2392
    + IllegalAccessException when auto-mapping Records (JEP-359)
      #2195
    + 'interrupted' status is not set when
       PooledConnection#getConnection() is interrupted. #2503

  * Enhancements:

    + A new option argNameBasedConstructorAutoMapping is added. If
      enabled, constructor argument names are used to look up
      columns when auto-mapping. #2192
    + Added a new property skipSetAutoCommitOnClose to
      JdbcTransactionFactory. Skipping setAutoCommit() call could
      improve performance with some drivers. #2426
    + <idArg /> can now be listed after <arg /> in <constructor />.
      #2541

Version update to 3.5.11:

  * Bug fixes:

    + OGNL could throw IllegalArgumentException when invoking
      inherited method. #2609
    + returnInstanceForEmptyRow is not applied to constructor
      auto-mapping. #2665

Version update to 3.5.12

  * User impactful changes

    + #2703 Referencing collection parameter by name fails fixing
      #2693
    + #2709 Fix a race condition caused by other threads calling
      mapper methods while mapped tables are being constructed
    + #2727 Enable ability to provide custom configuration to
      XMLConfigBuilder
    + #2731 Adding mapper could fail under JPMS
    + #2741 Add 'affectedData' attribute to @select,
      @SelectProvider, and <select />
    + #2767 Resolve resultType by namespace and id when not
      provided resultType and resultMap
    + #2804 Search readable property when resolving constructor arg
      type by name
    + Minor correction: 'boolean' can never be null (primative)
    + General library updates
    + Uses parameters option for compiler now (needed by spring boot
      3) (for reflection needs)

  * Code cleanup

    + #2816 Use open rewrite to partially cleanup java code
    + #2817 Add private constructors per open rewrite
    + #2819 Add final where appropriate per open rewrite
    + #2825 Cleanup if statement breaks / return logic
    + #2826 Eclipse based cleanup

  * Build

    + #2820 Remove test ci group profile in favor of more direct
      usage on GH-Actions and update deprecated surefire along in
      overview in README.md
    + Adjustments to build so shaded ognl and javassist no longer
      throw warnings
    + Build with jdk 21-ea as well now
    + Various test cleanup, updates, and additions
    + Turn on auto formatting of all java code including note to
      contributors on readme to skip formatting when necessary in
      code blocks
    + Tests may use jdk 11 now while retaining jdk 8 runtime
    + Pom cleanup / better clarification on parameters

  * Documentation

    + Various documentation updates

Version update to 3.5.13:

  * Bug fix:

    + Unable to resolve result type when the target property has
      a getter with different return type #2834

Version update to 3.5.14:

  * Bug fixes:

    + Registered type handler is not used for anonymous enums #2956
    + Discriminator does not work in constructor mapping #2913

Version update to 3.5.15:

  * Changes

    + XNode#toString() should output all child nodes. See #3001 and
      associated tickets on this issue
    + Fix performance of mappedColumnNames.contains by using 'set'
      rather than 'list'. See #3023
    + Fix osgi issue with javassist. See #3031
    + Updated shaded OGNL to 3.4.2. See #3035
    + Add support method for generating dynamic sql on SQL class.
      See #2887
    + General library updates
    + General document updates

  * Build

    + We now show builds from java 11, 17, 21, and 22 on Github
      Actions. Code is still java 8 compatible at this time.
    + Update vulnerable hsqldb to 2.7.2 fixing our tests that now
      work due to newer support. Note, users were never affected by
      this but at least one user pull request was attempted opened
      in addition to both renovate and dependabot and various
      reporting on it.
    + Now using more properties to define versions in pom to lower
      the frequency of pull requests from renovate

Version update to 3.5.16:

  * Security:

    + Prevent Invocation from being used by vulnerable applications.
      #3115

  * Bugs:

    + When database ID resolution is failed, invalid bound statement
      is used. #3040

  * Enhancements:

    + It is now possible to write a custom map wrapper to customize
      how to map column name with dots or brackets. #13 #3062

  * Performance:

    + Improved compatibility with Virtual Threads introduced by
      Loom.
    + Reduced memory footprint when performing the default (i.e.
      order based) constructor auto-mapping. #3113

  * Build:

    + Include the shaded libraries (OGNL and Javassist) in the
      sources.jar.

Version update to 3.5.17:

  * Bugs:

    + VendorDatabaseIdProvider#getDatabaseId() should return product
      name when properties is empty #3297
    + Update NClobTypeHandler to use methods for national character
      set #3298

  * Enhancements:

    + Allow DefaultSqlSessionFactory to provide a custom
      SqlSession #3128

Version update to 3.5.18:

  * Regressions

    + Fixed issue in 3.5.17 #3334

  * New

    + Ignore empty xnode per #3349
    + Share expression validator #3339
    + Throw helpful error instead of IndexOutOfBoundsException
      (automapping) #3327
    + Optimize mapper builder #3252

  * Tests

    + Add TransactionFactory, Transaction test cases #3277

  * Build

    + Reworked pom to match current java 17 build usage
    + Moved all tests to newer java standards
    + Cleaned up github actions
    + Run 'site' branch only on release commits

Version update to 3.5.19:

  * Revert Regression introduced by #3349.

- Initial packaging with version 3.4.7

ognl replaces the EOLed apache-commons-ognl that has an unpatched
  security bug (bsc#1248252, CVE-2025-53192)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3300-1
Released:    Tue Sep 23 11:03:41 2025
Summary:     Security update for vim
Type:        security
Severity:    moderate
References:  1246602,1246604,1247938,1247939,CVE-2025-53905,CVE-2025-53906,CVE-2025-55157,CVE-2025-55158
This update for vim fixes the following issues:

Updated to 9.1.1629:
- CVE-2025-53905: Fixed malicious tar archive may causing a path traversal in Vim’s tar.vim plugin (bsc#1246604)
- CVE-2025-53906: Fixed malicious zip archive may causing a path traversal in Vim’s zip (bsc#1246602)
- CVE-2025-55157: Fixed use-after-free in internal tuple reference management (bsc#1247938)
- CVE-2025-55158: Fixed double-free in internal typed value (typval_T) management (bsc#1247939)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3333-1
Released:    Wed Sep 24 08:55:10 2025
Summary:     Security update for avahi
Type:        security
Severity:    moderate
References:  1233421,CVE-2024-52615
This update for avahi fixes the following issues:

- CVE-2024-52615: wide-area DNS uses constant source port for queries and can expose the Avahi-daemon to DNS spoofing
  attacks (bsc#1233421).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3369-1
Released:    Fri Sep 26 12:54:43 2025
Summary:     Security update for libssh
Type:        security
Severity:    moderate
References:  1246974,1249375,CVE-2025-8114,CVE-2025-8277
This update for libssh fixes the following issues:

- CVE-2025-8277: memory exhaustion leading to client-side DoS due to improper memory management when KEX process is
  repeated with incorrect guesses (bsc#1249375).
- CVE-2025-8114: NULL pointer dereference when an allocation error happens during the calculation of the KEX session ID
  (bsc#1246974).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3371-1
Released:    Fri Sep 26 13:41:03 2025
Summary:     Recommended update for sysconfig
Type:        recommended
Severity:    important
References:  1237595
This update for sysconfig fixes the following issues:

- Update to version 0.85.10
- codespell run for all repository files and changes file
- spec: define permissions for ghost file attrs to avoid
  rpm --restore resets them to 0 (bsc#1237595).
- spec: fix name-repeated-in-summary rpmlint warning
  
-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3372-1
Released:    Fri Sep 26 13:42:10 2025
Summary:     Recommended update for iproute2
Type:        recommended
Severity:    important
References:  1243005,1248660
This update for iproute2 fixes the following issues:

- add post-6.4 follow-up fixes (bsc#1243005)
- sync UAPI header copies with SLE15-SP6 kernel
- devlink: support ipsec_crypto and ipsec_packet cap (bsc#1248660)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3431-1
Released:    Tue Sep 30 15:51:12 2025
Summary:     Recommended update for bind
Type:        recommended
Severity:    important
References:  1230649
This update for bind fixes the following issues:

- ensure file descriptors 0-2 are in use before using libuv (bsc#1230649)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3442-1
Released:    Tue Sep 30 16:54:04 2025
Summary:     Security update for openssl-3
Type:        security
Severity:    important
References:  1250232,CVE-2025-9230
This update for openssl-3 fixes the following issues:

- CVE-2025-9230: incorrect check of key size can lead to out-of-bounds read and write in RFC 3211 KEK unwrap
  (bsc#1250232).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3443-1
Released:    Tue Sep 30 16:54:54 2025
Summary:     Security update for openssl-1_1
Type:        security
Severity:    important
References:  1250232,CVE-2025-9230
This update for openssl-1_1 fixes the following issues:

- CVE-2025-9230: incorrect check of key size can lead to out-of-bounds read and write in RFC 3211 KEK unwrap
  (bsc#1250232).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3487-1
Released:    Wed Oct  8 08:17:19 2025
Summary:     Recommended update for grub2
Type:        recommended
Severity:    important
References:  1249088
This update for grub2 fixes the following issues:

- Fix boot hangs in setting up serial console when ACPI SPCR table is present
  and redirection is disabled (bsc#1249088)

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3591-1
Released:    Mon Oct 13 15:33:33 2025
Summary:     Recommended update for libzypp, zypper
Type:        recommended
Severity:    important
References:  1230267,1246912,1250343
This update for libzypp, zypper fixes the following issues:

- runposttrans: strip root prefix from tmppath (bsc#1250343)
- fixup! Make ld.so ignore the subarch packages during install (bsc#1246912)
- Make ld.so ignore the subarch packages during install (bsc#1246912)
- Fixed `bash-completion`: `zypper refresh` now ignores repository priority lines.
- Changes to support building against restructured libzypp in stack build (bsc#1230267)

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3612-1
Released:    Thu Oct 16 06:04:17 2025
Summary:     Security update for samba
Type:        security
Severity:    critical
References:  1251279,1251280,CVE-2025-10230,CVE-2025-9640
This update for samba fixes the following issues:

- CVE-2025-9640: Fixed uninitialized memory disclosure via vfs_streams_xattr (bsc#1251279).
- CVE-2025-10230: Fixed command Injection in WINS server hook script (bsc#1251280).

-----------------------------------------------------------------
Advisory ID: SUSE-RU-2025:3623-1
Released:    Thu Oct 16 16:36:00 2025
Summary:     Recommended update for sudo
Type:        recommended
Severity:    important
References:  1240954,1245743
This update for sudo fixes the following issues:

- Fix loss of SSH connection does not propagate through sudo (bsc#1240954, bsc#1245743).
  If user's tty goes away, tell monitor to revoke the tty in  its session.

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3624-1
Released:    Thu Oct 16 21:59:19 2025
Summary:     Security update for expat
Type:        security
Severity:    important
References:  1249584,CVE-2025-59375
This update for expat fixes the following issues:

- CVE-2025-59375: memory amplification vulnerability allows attackers to trigger excessive dynamic memory allocations
  by submitting crafted XML input (bsc#1249584).

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3699-1
Released:    Tue Oct 21 12:07:47 2025
Summary:     Security update for krb5
Type:        security
Severity:    moderate
References:  1241219,CVE-2025-3576
This update for krb5 fixes the following issues:

- CVE-2025-3576: weakness in the MD5 checksum design allows for spoofing of GSSAPI-protected messages that are using
  RC4-HMAC-MD5 (bsc#1241219).

Krb5 as very old protocol supported quite a number of ciphers
that are not longer up to current cryptographic standards.

To avoid problems with those, SUSE has by default now disabled
those alorithms.

The following algorithms have been removed from valid krb5 enctypes:

- des3-cbc-sha1
- arcfour-hmac-md5

To reenable those algorithms, you can use allow options in krb5.conf:

[libdefaults]
allow_des3 = true
allow_rc4 = true

to reenable them.

-----------------------------------------------------------------
Advisory ID: SUSE-OU-2025:3746-1
Released:    Thu Oct 23 10:33:56 2025
Summary:     Optional update for perl packages
Type:        optional
Severity:    low
References:  1244183
This update for perl packages fixes the following issues:

- Add packages needed by products like openQA (bsc#1244183).

-----------------------------------------------------------------
Advisory ID: SUSE-OU-2025:3747-1
Released:    Thu Oct 23 10:34:49 2025
Summary:     Optional update for python-tempora
Type:        optional
Severity:    low
References:  37681
This update for python-tempora fixes the following issue:

- Use update-alternatives tempora binaries (bsc#1223694)
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2025:3804-1
Released:    Mon Oct 27 12:35:04 2025
Summary:     Security update for mozilla-nss
Type:        security
Severity:    important
References:  1251263,CVE-2025-9187
This update for mozilla-nss fixes the following issues:

- Move NSS DB password hash away from SHA-1

Update to NSS 3.112.2:

  * Prevent leaks during pkcs12 decoding.
  * SEC_ASN1Decode* should ensure it has read as many bytes as each length field indicates

Update to NSS 3.112.1:

  * restore support for finding certificates by decoded serial number.


-----------------------------------------------------------------
Advisory ID: SUSE-Manager-5.0-2025-3825
Released:    Tue Oct 28 08:25:58 2025
Summary:     Security update 5.0.5.1 for for Multi-Linux Manager
Type:        security
Severity:    important
References:  1227577,1231150,1231157,1246277,1246421,1246439,1248085,1248252,1250911,CVE-2025-53192,CVE-2025-53880,CVE-2025-53883
Security update 5.0.5.1 for for Multi-Linux Manager: Server, Proxy and Retail Branch Server

This is a codestream only update


The following package changes have been done:

- crypto-policies-20230920.570ea89-150600.3.12.1 updated
- libssh-config-0.9.8-150600.11.6.1 updated
- glibc-2.38-150600.14.37.1 updated
- boost-license1_66_0-1.66.0-150200.12.7.1 updated
- libbrotlicommon1-1.0.7-150200.3.5.1 updated
- libbrotlidec1-1.0.7-150200.3.5.1 updated
- libxml2-2-2.10.3-150500.5.32.1 updated
- libsqlite3-0-3.50.2-150000.3.33.1 updated
- libgcc_s1-14.3.0+git11799-150000.1.11.1 updated
- libstdc++6-14.3.0+git11799-150000.1.11.1 updated
- libudev1-254.27-150600.4.43.3 updated
- libopenssl3-3.1.4-150600.5.39.1 updated
- libopenssl-3-fips-provider-3.1.4-150600.5.39.1 updated
- libssh4-0.9.8-150600.11.6.1 updated
- libboost_system1_66_0-1.66.0-150200.12.7.1 updated
- libboost_thread1_66_0-1.66.0-150200.12.7.1 updated
- libcurl4-8.14.1-150600.4.28.1 updated
- pam-1.3.0-150000.6.86.1 updated
- libsolv-tools-base-0.7.34-150600.8.17.2 updated
- libzypp-17.37.18-150600.3.82.1 updated
- zypper-1.14.94-150600.10.52.1 updated
- curl-8.14.1-150600.4.28.1 updated
- openssl-3-3.1.4-150600.5.39.1 updated
- libexpat1-2.7.1-150400.3.31.1 updated
- update-alternatives-1.19.0.4-150000.4.7.1 updated
- libsystemd0-254.27-150600.4.43.3 updated
- systemd-presets-branding-SLE-15.1-150600.35.3.1 updated
- systemd-254.27-150600.4.43.3 updated
- krb5-1.20.1-150600.11.14.1 updated
- glibc-locale-base-2.38-150600.14.37.1 updated
- libarchive13-3.7.2-150600.3.17.1 updated
- libatomic1-14.3.0+git11799-150000.1.11.1 updated
- libavahi-common3-0.8-150600.15.9.1 updated
- libbrotlienc1-1.0.7-150200.3.5.1 updated
- libfreebl3-3.112.2-150400.3.60.1 updated
- libgomp1-14.3.0+git11799-150000.1.11.1 updated
- libitm1-14.3.0+git11799-150000.1.11.1 updated
- liblmdb-0_9_30-0.9.30-150500.3.2.1 updated
- liblsan0-14.3.0+git11799-150000.1.11.1 updated
- libopenssl1_1-1.1.1w-150600.5.18.1 updated
- libpq5-17.6-150600.13.16.1 updated
- libquadmath0-14.3.0+git11799-150000.1.11.1 updated
- libsolv-tools-0.7.34-150600.8.17.2 updated
- libwayland-client0-1.22.0-150600.1.6 added
- libxml2-tools-2.10.3-150500.5.32.1 updated
- libyaml-0-2-0.1.7-150000.3.4.1 updated
- release-notes-susemanager-5.0.5.1-150600.11.42.2 updated
- sudo-1.9.15p5-150600.3.12.1 updated
- systemd-rpm-macros-16-150000.7.42.1 updated
- uyuni-config-modules-5.0.17-150600.3.22.1 updated
- vim-data-common-9.1.1629-150500.20.33.1 updated
- glibc-locale-2.38-150600.14.37.1 updated
- libavahi-client3-0.8-150600.15.9.1 updated
- libpython3_6m1_0-3.6.15-150300.10.97.1 updated
- python3-base-3.6.15-150300.10.97.1 updated
- python3-3.6.15-150300.10.97.2 updated
- python3-curses-3.6.15-150300.10.97.2 updated
- postgresql16-16.10-150600.16.21.1 updated
- bind-utils-9.18.33-150600.3.9.1 updated
- iproute2-6.4-150600.7.9.1 updated
- glibc-devel-2.38-150600.14.37.1 updated
- mozilla-nss-certs-3.112.2-150400.3.60.1 updated
- spacewalk-java-lib-5.0.28-150600.3.36.8 updated
- vim-9.1.1629-150500.20.33.1 updated
- perl-DBI-1.647.0-150600.12.6.1 updated
- apache2-prefork-2.4.58-150600.5.35.1 updated
- libgnutls30-3.8.3-150600.4.9.1 updated
- sysconfig-0.85.10-150200.15.1 updated
- sysconfig-netconfig-0.85.10-150200.15.1 updated
- python3-zypp-plugin-0.6.5-150600.18.8.1 updated
- python3-solv-0.7.34-150600.8.17.2 updated
- python3-six-1.14.0-150200.15.1 updated
- python3-pytz-2022.1-150300.3.9.1 updated
- python3-pyparsing-2.4.7-150300.3.3.1 updated
- python3-pycparser-2.17-150000.3.5.1 updated
- python3-pyasn1-0.4.2-150000.3.8.1 updated
- python3-more-itertools-8.10.0-150400.10.1 updated
- python3-iniconfig-1.1.1-150000.1.13.1 updated
- python3-idna-2.6-150000.3.6.1 updated
- python3-defusedxml-0.6.0-1.42 added
- python3-decorator-4.4.2-150200.7.6.1 updated
- python3-chardet-3.0.4-150000.5.6.1 updated
- python3-certifi-2018.1.18-150000.3.6.1 updated
- python3-asn1crypto-0.24.0-150000.3.5.1 updated
- python3-appdirs-1.4.3-150000.3.3.1 updated
- python3-PyYAML-5.4.1-150300.3.6.1 updated
- postgresql16-server-16.10-150600.16.21.1 updated
- mozilla-nss-3.112.2-150400.3.60.1 updated
- libsoftokn3-3.112.2-150400.3.60.1 updated
- perl-DBD-Pg-3.18.0-150600.14.6.1 updated
- apache2-2.4.58-150600.5.35.1 updated
- grub2-2.12-150600.8.37.1 updated
- grub2-i386-pc-2.12-150600.8.37.1 updated
- rsyslog-8.2406.0-150600.12.8.1 updated
- salt-shaptools-0.3.19+git.1757602235.33fff4c-150200.3.15.1 updated
- python3-python-dateutil-2.8.1-150300.3.3.1 updated
- python3-tempora-1.8-150200.3.8.1 updated
- python3-packaging-21.3-150200.3.6.1 updated
- python3-cffi-1.13.2-150200.3.5.1 updated
- python3-libxml2-2.10.3-150500.5.32.1 updated
- python3-py-1.10.0-150100.5.15.1 updated
- postgresql16-contrib-16.10-150600.16.21.1 updated
- samba-client-libs-4.19.8+git.435.78ced6cf30d-150600.3.21.1 updated
- libnm0-1.44.2-150600.3.4.1 updated
- java-17-openjdk-headless-17.0.16.0-150400.3.57.1 updated
- perl-HTML-Parser-3.830.0-150000.3.3.1 updated
- susemanager-build-keys-15.5.3-150600.5.12.1 updated
- grub2-x86_64-efi-2.12-150600.8.37.1 updated
- grub2-powerpc-ieee1275-2.12-150600.8.37.1 updated
- grub2-arm64-efi-2.12-150600.8.37.1 updated
- python3-setuptools-44.1.1-150400.9.15.1 updated
- spacewalk-backend-sql-postgresql-5.0.15-150600.4.20.9 updated
- typelib-1_0-NM-1_0-1.44.2-150600.3.4.1 updated
- tomcat-servlet-4_0-api-9.0.108-150200.91.1 updated
- tomcat-el-3_0-api-9.0.108-150200.91.1 updated
- apache-commons-lang3-3.18.0-150200.3.12.1 updated
- java-17-openjdk-17.0.16.0-150400.3.57.1 updated
- spacewalk-base-minimal-5.0.22-150600.3.30.10 updated
- susemanager-build-keys-web-15.5.3-150600.5.12.1 updated
- python3-cryptography-3.3.2-150400.26.1 updated
- tomcat-jsp-2_3-api-9.0.108-150200.91.1 updated
- ognl-3.4.7-150200.5.3.1 added
- javamail-1.6.2-150200.3.7.1 updated
- netty-4.1.126-150200.4.34.1 updated
- python3-firewall-2.0.1-150600.3.12.1 updated
- spacewalk-base-minimal-config-5.0.22-150600.3.30.10 updated
- python3-pyOpenSSL-21.0.0-150400.10.1 updated
- tomcat-lib-9.0.108-150200.91.1 updated
- mybatis-3.5.19-150200.5.9.1 updated
- firewalld-2.0.1-150600.3.12.1 updated
- python3-urllib3-1.25.10-150300.4.18.1 updated
- python3-rhnlib-5.0.5-150600.4.6.4 updated
- python3-requests-2.25.1-150300.3.18.1 updated
- spacewalk-backend-5.0.15-150600.4.20.9 updated
- spacewalk-base-5.0.22-150600.3.30.10 updated
- spacewalk-search-5.0.5-150600.3.9.2 updated
- fence-agents-4.13.1+git.1704296072.32469f29-150600.3.22.1 updated
- spacewalk-backend-sql-5.0.15-150600.4.20.9 updated
- tomcat-9.0.108-150200.91.1 updated
- spacewalk-backend-server-5.0.15-150600.4.20.9 updated
- susemanager-sls-5.0.17-150600.3.22.1 updated
- spacewalk-java-postgresql-5.0.28-150600.3.36.8 updated
- spacewalk-java-config-5.0.28-150600.3.36.8 updated
- spacewalk-backend-xmlrpc-5.0.15-150600.4.20.9 updated
- spacewalk-backend-xml-export-libs-5.0.15-150600.4.20.9 updated
- spacewalk-backend-package-push-server-5.0.15-150600.4.20.9 updated
- spacewalk-backend-iss-5.0.15-150600.4.20.9 updated
- spacewalk-backend-app-5.0.15-150600.4.20.9 updated
- saltboot-formula-0.1.1750679229.f368550-150600.3.9.2 updated
- spacewalk-html-5.0.22-150600.3.30.10 updated
- spacewalk-taskomatic-5.0.28-150600.3.36.8 updated
- spacewalk-java-5.0.28-150600.3.36.8 updated
- spacewalk-backend-iss-export-5.0.15-150600.4.20.9 updated
- spacewalk-backend-tools-5.0.15-150600.4.20.9 updated
- container:suse-manager-5.0-init-5.0.5.1-5.0.5.1-7.24.10 added
- apache-commons-ognl-4.0~20191021git51cf8f4-150200.5.7.6 removed
- container:suse-manager-5.0-init-5.0.5-5.0.5-7.21.12 removed


More information about the sle-container-updates mailing list