SUSE-RU-2025:1290-1: important: Recommended update for systemd

SLE-UPDATES null at suse.de
Wed Apr 16 08:34:58 UTC 2025



# Recommended update for systemd

Announcement ID: SUSE-RU-2025:1290-1  
Release Date: 2025-04-16T07:38:38Z  
Rating: important  
References:

  * bsc#1188018
  * bsc#1191399
  * bsc#1196637
  * bsc#1200170
  * bsc#1205957
  * bsc#1228809
  * bsc#1231211

  
Affected Products:

  * SUSE Linux Enterprise High Performance Computing 12 SP5
  * SUSE Linux Enterprise Server 12 SP5
  * SUSE Linux Enterprise Server 12 SP5 LTSS
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
  * SUSE Linux Enterprise Server for SAP Applications 12 SP5

  
  
An update that has seven fixes can now be installed.

## Description:

This update for systemd fixes the following issues:

  * basic/hashmap: add cleanup of memory pools
  * core: add valgrind helper for daemon-reexec
  * sd-bus: fix a memory leak in message_new_reply()
  * sd-bus: unify three code-paths which free struct bus_container
  * bus-message: use structured initialization to avoid use of unitialized
    memory
  * Add patches (bsc#1231211)
  * Don't try to restart the udev socket units anymore (bsc#1228809) There's
    currently no way to restart a socket activable service and its socket units
    "atomically" and safely.

## Special Instructions and Notes:

  * Please reboot the system after installing this update.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Linux Enterprise Server 12 SP5 LTSS  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-1290=1

  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security  
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1290=1

## Package List:

  * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
    * systemd-debuginfo-228-157.66.1
    * libudev1-228-157.66.1
    * systemd-devel-228-157.66.1
    * libudev-devel-228-157.66.1
    * systemd-sysvinit-228-157.66.1
    * udev-228-157.66.1
    * systemd-228-157.66.1
    * systemd-debugsource-228-157.66.1
    * libsystemd0-228-157.66.1
    * libsystemd0-debuginfo-228-157.66.1
    * libudev1-debuginfo-228-157.66.1
    * udev-debuginfo-228-157.66.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
    * systemd-bash-completion-228-157.66.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64)
    * libsystemd0-32bit-228-157.66.1
    * systemd-32bit-228-157.66.1
    * systemd-debuginfo-32bit-228-157.66.1
    * libudev1-32bit-228-157.66.1
    * libudev1-debuginfo-32bit-228-157.66.1
    * libsystemd0-debuginfo-32bit-228-157.66.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
    * systemd-debuginfo-228-157.66.1
    * libsystemd0-32bit-228-157.66.1
    * libudev1-228-157.66.1
    * systemd-32bit-228-157.66.1
    * libudev-devel-228-157.66.1
    * systemd-devel-228-157.66.1
    * systemd-debuginfo-32bit-228-157.66.1
    * systemd-sysvinit-228-157.66.1
    * libsystemd0-debuginfo-32bit-228-157.66.1
    * udev-228-157.66.1
    * libudev1-32bit-228-157.66.1
    * libudev1-debuginfo-32bit-228-157.66.1
    * systemd-228-157.66.1
    * systemd-debugsource-228-157.66.1
    * libsystemd0-228-157.66.1
    * libsystemd0-debuginfo-228-157.66.1
    * libudev1-debuginfo-228-157.66.1
    * udev-debuginfo-228-157.66.1
  * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
    * systemd-bash-completion-228-157.66.1

## References:

  * https://bugzilla.suse.com/show_bug.cgi?id=1188018
  * https://bugzilla.suse.com/show_bug.cgi?id=1191399
  * https://bugzilla.suse.com/show_bug.cgi?id=1196637
  * https://bugzilla.suse.com/show_bug.cgi?id=1200170
  * https://bugzilla.suse.com/show_bug.cgi?id=1205957
  * https://bugzilla.suse.com/show_bug.cgi?id=1228809
  * https://bugzilla.suse.com/show_bug.cgi?id=1231211

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20250416/c806ebb5/attachment.htm>


More information about the sle-updates mailing list