SUSE-RU-2025:1290-1: important: Recommended update for systemd
SLE-UPDATES
null at suse.de
Wed Apr 16 08:34:58 UTC 2025
# Recommended update for systemd
Announcement ID: SUSE-RU-2025:1290-1
Release Date: 2025-04-16T07:38:38Z
Rating: important
References:
* bsc#1188018
* bsc#1191399
* bsc#1196637
* bsc#1200170
* bsc#1205957
* bsc#1228809
* bsc#1231211
Affected Products:
* SUSE Linux Enterprise High Performance Computing 12 SP5
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server 12 SP5 LTSS
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
An update that has seven fixes can now be installed.
## Description:
This update for systemd fixes the following issues:
* basic/hashmap: add cleanup of memory pools
* core: add valgrind helper for daemon-reexec
* sd-bus: fix a memory leak in message_new_reply()
* sd-bus: unify three code-paths which free struct bus_container
* bus-message: use structured initialization to avoid use of unitialized
memory
* Add patches (bsc#1231211)
* Don't try to restart the udev socket units anymore (bsc#1228809) There's
currently no way to restart a socket activable service and its socket units
"atomically" and safely.
## Special Instructions and Notes:
* Please reboot the system after installing this update.
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1290=1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1290=1
## Package List:
* SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* systemd-debuginfo-228-157.66.1
* libudev1-228-157.66.1
* systemd-devel-228-157.66.1
* libudev-devel-228-157.66.1
* systemd-sysvinit-228-157.66.1
* udev-228-157.66.1
* systemd-228-157.66.1
* systemd-debugsource-228-157.66.1
* libsystemd0-228-157.66.1
* libsystemd0-debuginfo-228-157.66.1
* libudev1-debuginfo-228-157.66.1
* udev-debuginfo-228-157.66.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
* systemd-bash-completion-228-157.66.1
* SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64)
* libsystemd0-32bit-228-157.66.1
* systemd-32bit-228-157.66.1
* systemd-debuginfo-32bit-228-157.66.1
* libudev1-32bit-228-157.66.1
* libudev1-debuginfo-32bit-228-157.66.1
* libsystemd0-debuginfo-32bit-228-157.66.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
* systemd-debuginfo-228-157.66.1
* libsystemd0-32bit-228-157.66.1
* libudev1-228-157.66.1
* systemd-32bit-228-157.66.1
* libudev-devel-228-157.66.1
* systemd-devel-228-157.66.1
* systemd-debuginfo-32bit-228-157.66.1
* systemd-sysvinit-228-157.66.1
* libsystemd0-debuginfo-32bit-228-157.66.1
* udev-228-157.66.1
* libudev1-32bit-228-157.66.1
* libudev1-debuginfo-32bit-228-157.66.1
* systemd-228-157.66.1
* systemd-debugsource-228-157.66.1
* libsystemd0-228-157.66.1
* libsystemd0-debuginfo-228-157.66.1
* libudev1-debuginfo-228-157.66.1
* udev-debuginfo-228-157.66.1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
* systemd-bash-completion-228-157.66.1
## References:
* https://bugzilla.suse.com/show_bug.cgi?id=1188018
* https://bugzilla.suse.com/show_bug.cgi?id=1191399
* https://bugzilla.suse.com/show_bug.cgi?id=1196637
* https://bugzilla.suse.com/show_bug.cgi?id=1200170
* https://bugzilla.suse.com/show_bug.cgi?id=1205957
* https://bugzilla.suse.com/show_bug.cgi?id=1228809
* https://bugzilla.suse.com/show_bug.cgi?id=1231211
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20250416/c806ebb5/attachment.htm>
More information about the sle-updates
mailing list