From null at suse.de Tue Jul 1 08:30:07 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 01 Jul 2025 08:30:07 -0000 Subject: SUSE-RU-2025:02181-1: important: Recommended update for ovmf Message-ID: <175135860732.31370.17943243348586117632@smelt2.prg2.suse.org> # Recommended update for ovmf Announcement ID: SUSE-RU-2025:02181-1 Release Date: 2025-07-01T06:01:54Z Rating: important References: * bsc#1243199 Affected Products: * Server Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP7 An update that has one fix can now be installed. ## Description: This update for ovmf fixes the following issues: * OvmfPkg/CcExitLib: Use the proper register when filtering MSRs (bsc#1243199) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-2181=1 * Server Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-2181=1 ## Package List: * SUSE Package Hub 15 15-SP7 (noarch) * qemu-uefi-aarch32-202408-150700.3.3.1 * qemu-ovmf-x86_64-202408-150700.3.3.1 * qemu-uefi-aarch64-202408-150700.3.3.1 * SUSE Package Hub 15 15-SP7 (x86_64) * qemu-ovmf-x86_64-debug-202408-150700.3.3.1 * Server Applications Module 15-SP7 (aarch64 x86_64) * ovmf-202408-150700.3.3.1 * ovmf-tools-202408-150700.3.3.1 * Server Applications Module 15-SP7 (noarch) * qemu-uefi-aarch64-202408-150700.3.3.1 * qemu-ovmf-x86_64-202408-150700.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1243199 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jul 1 12:30:09 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 01 Jul 2025 12:30:09 -0000 Subject: SUSE-SU-2025:02189-1: moderate: Security update for ImageMagick Message-ID: <175137300985.31446.9525119186428362049@smelt2.prg2.suse.org> # Security update for ImageMagick Announcement ID: SUSE-SU-2025:02189-1 Release Date: 2025-07-01T11:48:52Z Rating: moderate References: * bsc#1235113 * bsc#1243622 Affected Products: * Desktop Applications Module 15-SP6 * Development Tools Module 15-SP6 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that has two security fixes can now be installed. ## Description: This update for ImageMagick fixes the following issues: * Restore SUSE specific hardening config policies that got lost in refactoring (bsc#1243622). * Fix issues leading to `magick -gamma` not producing expected image results (bsc#1235113). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-2189=1 openSUSE-SLE-15.6-2025-2189=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-2189=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-2189=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * libMagick++-7_Q16HDRI5-debuginfo-7.1.1.21-150600.3.8.1 * ImageMagick-extra-debuginfo-7.1.1.21-150600.3.8.1 * ImageMagick-extra-7.1.1.21-150600.3.8.1 * libMagickCore-7_Q16HDRI10-7.1.1.21-150600.3.8.1 * ImageMagick-debuginfo-7.1.1.21-150600.3.8.1 * libMagick++-7_Q16HDRI5-7.1.1.21-150600.3.8.1 * ImageMagick-config-7-upstream-open-7.1.1.21-150600.3.8.1 * perl-PerlMagick-debuginfo-7.1.1.21-150600.3.8.1 * ImageMagick-config-7-upstream-limited-7.1.1.21-150600.3.8.1 * libMagickWand-7_Q16HDRI10-7.1.1.21-150600.3.8.1 * libMagick++-devel-7.1.1.21-150600.3.8.1 * ImageMagick-config-7-SUSE-7.1.1.21-150600.3.8.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.8.1 * ImageMagick-config-7-upstream-secure-7.1.1.21-150600.3.8.1 * ImageMagick-config-7-upstream-websafe-7.1.1.21-150600.3.8.1 * ImageMagick-debugsource-7.1.1.21-150600.3.8.1 * ImageMagick-devel-7.1.1.21-150600.3.8.1 * perl-PerlMagick-7.1.1.21-150600.3.8.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.8.1 * ImageMagick-7.1.1.21-150600.3.8.1 * openSUSE Leap 15.6 (x86_64) * libMagickCore-7_Q16HDRI10-32bit-debuginfo-7.1.1.21-150600.3.8.1 * libMagick++-7_Q16HDRI5-32bit-7.1.1.21-150600.3.8.1 * libMagick++-devel-32bit-7.1.1.21-150600.3.8.1 * libMagickWand-7_Q16HDRI10-32bit-debuginfo-7.1.1.21-150600.3.8.1 * libMagick++-7_Q16HDRI5-32bit-debuginfo-7.1.1.21-150600.3.8.1 * libMagickWand-7_Q16HDRI10-32bit-7.1.1.21-150600.3.8.1 * libMagickCore-7_Q16HDRI10-32bit-7.1.1.21-150600.3.8.1 * ImageMagick-devel-32bit-7.1.1.21-150600.3.8.1 * openSUSE Leap 15.6 (noarch) * ImageMagick-doc-7.1.1.21-150600.3.8.1 * openSUSE Leap 15.6 (aarch64_ilp32) * libMagickCore-7_Q16HDRI10-64bit-debuginfo-7.1.1.21-150600.3.8.1 * libMagick++-devel-64bit-7.1.1.21-150600.3.8.1 * libMagick++-7_Q16HDRI5-64bit-debuginfo-7.1.1.21-150600.3.8.1 * libMagick++-7_Q16HDRI5-64bit-7.1.1.21-150600.3.8.1 * ImageMagick-devel-64bit-7.1.1.21-150600.3.8.1 * libMagickWand-7_Q16HDRI10-64bit-7.1.1.21-150600.3.8.1 * libMagickCore-7_Q16HDRI10-64bit-7.1.1.21-150600.3.8.1 * libMagickWand-7_Q16HDRI10-64bit-debuginfo-7.1.1.21-150600.3.8.1 * Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * libMagick++-7_Q16HDRI5-debuginfo-7.1.1.21-150600.3.8.1 * libMagickCore-7_Q16HDRI10-7.1.1.21-150600.3.8.1 * ImageMagick-debuginfo-7.1.1.21-150600.3.8.1 * libMagick++-7_Q16HDRI5-7.1.1.21-150600.3.8.1 * ImageMagick-config-7-upstream-open-7.1.1.21-150600.3.8.1 * ImageMagick-config-7-upstream-limited-7.1.1.21-150600.3.8.1 * libMagickWand-7_Q16HDRI10-7.1.1.21-150600.3.8.1 * libMagick++-devel-7.1.1.21-150600.3.8.1 * ImageMagick-config-7-SUSE-7.1.1.21-150600.3.8.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.8.1 * ImageMagick-config-7-upstream-secure-7.1.1.21-150600.3.8.1 * ImageMagick-config-7-upstream-websafe-7.1.1.21-150600.3.8.1 * ImageMagick-debugsource-7.1.1.21-150600.3.8.1 * ImageMagick-devel-7.1.1.21-150600.3.8.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.1.21-150600.3.8.1 * ImageMagick-7.1.1.21-150600.3.8.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * perl-PerlMagick-debuginfo-7.1.1.21-150600.3.8.1 * ImageMagick-debuginfo-7.1.1.21-150600.3.8.1 * perl-PerlMagick-7.1.1.21-150600.3.8.1 * ImageMagick-debugsource-7.1.1.21-150600.3.8.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1235113 * https://bugzilla.suse.com/show_bug.cgi?id=1243622 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jul 1 12:30:16 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 01 Jul 2025 12:30:16 -0000 Subject: SUSE-SU-2025:02188-1: moderate: Security update for ImageMagick Message-ID: <175137301607.31446.15522163182425017317@smelt2.prg2.suse.org> # Security update for ImageMagick Announcement ID: SUSE-SU-2025:02188-1 Release Date: 2025-07-01T11:48:32Z Rating: moderate References: * bsc#1241658 * bsc#1241659 * bsc#1243622 Cross-References: * CVE-2025-43965 * CVE-2025-46393 CVSS scores: * CVE-2025-43965 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-43965 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L * CVE-2025-43965 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-46393 ( SUSE ): 5.9 CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N * CVE-2025-46393 ( SUSE ): 5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L * CVE-2025-46393 ( NVD ): 2.9 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L Affected Products: * Desktop Applications Module 15-SP7 * Development Tools Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for ImageMagick fixes the following issues: Security issues fixed: * CVE-2025-43965: mishandling of image depth after SetQuantumFormat is used in MIFF image processing (bsc#1241659). * CVE-2025-46393: mishandling of packet_size and rendering of channels in arbitrary order in multispectral MIFF image processing (bsc#1241658). Other issues fixed: * Restore SUSE specific hardening config policies that got lost in refactoring (bsc#1243622). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-2188=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-2188=1 ## Package List: * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libMagick++-devel-7.1.1.43-150700.3.3.1 * libMagickWand-7_Q16HDRI10-debuginfo-7.1.1.43-150700.3.3.1 * libMagick++-7_Q16HDRI5-7.1.1.43-150700.3.3.1 * ImageMagick-debugsource-7.1.1.43-150700.3.3.1 * libMagickCore-7_Q16HDRI10-7.1.1.43-150700.3.3.1 * libMagickCore-7_Q16HDRI10-debuginfo-7.1.1.43-150700.3.3.1 * ImageMagick-config-7-upstream-secure-7.1.1.43-150700.3.3.1 * libMagick++-7_Q16HDRI5-debuginfo-7.1.1.43-150700.3.3.1 * ImageMagick-debuginfo-7.1.1.43-150700.3.3.1 * ImageMagick-7.1.1.43-150700.3.3.1 * ImageMagick-config-7-upstream-websafe-7.1.1.43-150700.3.3.1 * ImageMagick-config-7-upstream-limited-7.1.1.43-150700.3.3.1 * libMagickWand-7_Q16HDRI10-7.1.1.43-150700.3.3.1 * ImageMagick-config-7-upstream-open-7.1.1.43-150700.3.3.1 * ImageMagick-devel-7.1.1.43-150700.3.3.1 * ImageMagick-config-7-SUSE-7.1.1.43-150700.3.3.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * ImageMagick-debugsource-7.1.1.43-150700.3.3.1 * perl-PerlMagick-7.1.1.43-150700.3.3.1 * perl-PerlMagick-debuginfo-7.1.1.43-150700.3.3.1 * ImageMagick-debuginfo-7.1.1.43-150700.3.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-43965.html * https://www.suse.com/security/cve/CVE-2025-46393.html * https://bugzilla.suse.com/show_bug.cgi?id=1241658 * https://bugzilla.suse.com/show_bug.cgi?id=1241659 * https://bugzilla.suse.com/show_bug.cgi?id=1243622 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jul 1 12:30:19 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 01 Jul 2025 12:30:19 -0000 Subject: SUSE-SU-2025:02187-1: important: Security update for xwayland Message-ID: <175137301904.31446.8627718873675522435@smelt2.prg2.suse.org> # Security update for xwayland Announcement ID: SUSE-SU-2025:02187-1 Release Date: 2025-07-01T11:48:12Z Rating: important References: * bsc#1244084 Cross-References: * CVE-2025-49176 CVSS scores: * CVE-2025-49176 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49176 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H Affected Products: * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for xwayland fixes the following issues: * CVE-2025-49176: Fixed the integer overflow in Big Requests Extension (bsc#1244084). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-2187=1 ## Package List: * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * xwayland-24.1.5-150700.3.6.1 * xwayland-debugsource-24.1.5-150700.3.6.1 * xwayland-debuginfo-24.1.5-150700.3.6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-49176.html * https://bugzilla.suse.com/show_bug.cgi?id=1244084 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jul 1 12:30:21 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 01 Jul 2025 12:30:21 -0000 Subject: SUSE-SU-2025:02186-1: moderate: Security update for screen Message-ID: <175137302156.31446.9687535452275311137@smelt2.prg2.suse.org> # Security update for screen Announcement ID: SUSE-SU-2025:02186-1 Release Date: 2025-07-01T11:48:02Z Rating: moderate References: * bsc#1242269 Cross-References: * CVE-2025-46802 CVSS scores: * CVE-2025-46802 ( SUSE ): 5.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-46802 ( SUSE ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N * CVE-2025-46802 ( NVD ): 5.3 CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X * CVE-2025-46802 ( NVD ): 6.0 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N Affected Products: * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for screen fixes the following issues: Security issues fixed: * CVE-2025-46802: temporary `chmod` of a user's TTY to mode 0666 when attempting to attach to a multi-user session allows for TTY hijacking (bsc#1242269). Other issues fixed: * Use TTY file descriptor passing after a suspend (`MSG_CONT`). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2186=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * screen-4.0.4-23.9.1 * screen-debuginfo-4.0.4-23.9.1 * screen-debugsource-4.0.4-23.9.1 ## References: * https://www.suse.com/security/cve/CVE-2025-46802.html * https://bugzilla.suse.com/show_bug.cgi?id=1242269 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jul 1 12:30:25 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 01 Jul 2025 12:30:25 -0000 Subject: SUSE-RU-2025:02185-1: important: Recommended update for ServiceReport Message-ID: <175137302516.31446.3225147337718157587@smelt2.prg2.suse.org> # Recommended update for ServiceReport Announcement ID: SUSE-RU-2025:02185-1 Release Date: 2025-07-01T08:47:49Z Rating: important References: * bsc#1244547 Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for ServiceReport fixes the following issues: * [utils] update logic to parse /etc/os-release (bsc#1244547) * Added hardening to systemd service * Added hardening to systemd service * [Service] Make the servicereport service dependent on the kdump service * [utils] Use --update-bls-cmdline Option for GRUB Update ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-2185=1 openSUSE-SLE-15.6-2025-2185=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2185=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2185=1 ## Package List: * openSUSE Leap 15.6 (noarch) * ServiceReport-2.2.4+git7.8ca0fe4-150600.3.3.1 * Basesystem Module 15-SP6 (noarch) * ServiceReport-2.2.4+git7.8ca0fe4-150600.3.3.1 * Basesystem Module 15-SP7 (noarch) * ServiceReport-2.2.4+git7.8ca0fe4-150600.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1244547 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jul 1 12:30:27 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 01 Jul 2025 12:30:27 -0000 Subject: SUSE-SU-2025:02184-1: important: Security update for jakarta-commons-fileupload Message-ID: <175137302725.31446.10557334828566406867@smelt2.prg2.suse.org> # Security update for jakarta-commons-fileupload Announcement ID: SUSE-SU-2025:02184-1 Release Date: 2025-07-01T08:14:16Z Rating: important References: * bsc#1244657 Cross-References: * CVE-2025-48976 CVSS scores: * CVE-2025-48976 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-48976 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-48976 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for jakarta-commons-fileupload fixes the following issues: Upgrade to upstream version 1.6.0 * CVE-2025-48976: Fixed allocation of resources for multipart headers with insufficient limits can lead to a DoS (bsc#1244657). Full changelog: https://commons.apache.org/proper/commons-fileupload/changes.html#a1.6.0 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-2184=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2184=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * jakarta-commons-fileupload-javadoc-1.6.0-126.3.1 * jakarta-commons-fileupload-1.6.0-126.3.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * jakarta-commons-fileupload-javadoc-1.6.0-126.3.1 * jakarta-commons-fileupload-1.6.0-126.3.1 ## References: * https://www.suse.com/security/cve/CVE-2025-48976.html * https://bugzilla.suse.com/show_bug.cgi?id=1244657 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jul 1 12:30:28 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 01 Jul 2025 12:30:28 -0000 Subject: SUSE-RU-2025:02183-1: moderate: Recommended update for libnvidia-egl-x11 Message-ID: <175137302894.31446.2965007195106648411@smelt2.prg2.suse.org> # Recommended update for libnvidia-egl-x11 Announcement ID: SUSE-RU-2025:02183-1 Release Date: 2025-07-01T08:10:01Z Rating: moderate References: Affected Products: * Desktop Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that can now be installed. ## Description: This update for libnvidia-egl-x11 fixes the following issues: * Use upstream URL * Update to official version 1.0.1 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-2183=1 ## Package List: * Desktop Applications Module 15-SP7 (aarch64 ppc64le s390x x86_64) * libnvidia-egl-x111-1.0.1-150700.4.3.1 * libnvidia-egl-x11-debugsource-1.0.1-150700.4.3.1 * libnvidia-egl-x11-devel-1.0.1-150700.4.3.1 * libnvidia-egl-x111-debuginfo-1.0.1-150700.4.3.1 * Desktop Applications Module 15-SP7 (x86_64) * libnvidia-egl-x111-32bit-debuginfo-1.0.1-150700.4.3.1 * libnvidia-egl-x111-32bit-1.0.1-150700.4.3.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jul 1 12:30:29 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 01 Jul 2025 12:30:29 -0000 Subject: SUSE-RU-2025:02182-1: moderate: Recommended update for libnvidia-egl-wayland Message-ID: <175137302998.31446.2817760265160814466@smelt2.prg2.suse.org> # Recommended update for libnvidia-egl-wayland Announcement ID: SUSE-RU-2025:02182-1 Release Date: 2025-07-01T08:09:54Z Rating: moderate References: Affected Products: * Desktop Applications Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that can now be installed. ## Description: This update for libnvidia-egl-wayland fixes the following issues: * Fix an issue causing EGL_EXT_present_opaque to be advertised on non-Wayland EGLDisplays * Moved XML documentation to -devel package ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-2182=1 ## Package List: * Desktop Applications Module 15-SP7 (x86_64) * libnvidia-egl-wayland1-32bit-debuginfo-1.1.19-150700.3.3.1 * libnvidia-egl-wayland1-32bit-1.1.19-150700.3.3.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jul 1 16:30:03 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 01 Jul 2025 16:30:03 -0000 Subject: SUSE-SU-2025:02192-1: important: Security update for xorg-x11-server Message-ID: <175138740367.16034.18219853531484791373@smelt2.prg2.suse.org> # Security update for xorg-x11-server Announcement ID: SUSE-SU-2025:02192-1 Release Date: 2025-07-01T15:07:21Z Rating: important References: * bsc#1244084 Cross-References: * CVE-2025-49176 CVSS scores: * CVE-2025-49176 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49176 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for xorg-x11-server fixes the following issues: * CVE-2025-49176: Fixed the integer overflow in Big Requests Extension (bsc#1244084). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-2192=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2192=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2192=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2192=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2192=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-2192=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-2192=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-2192=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * xorg-x11-server-extra-1.20.3-150400.38.60.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.60.1 * xorg-x11-server-debugsource-1.20.3-150400.38.60.1 * xorg-x11-server-1.20.3-150400.38.60.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.60.1 * xorg-x11-server-source-1.20.3-150400.38.60.1 * xorg-x11-server-sdk-1.20.3-150400.38.60.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * xorg-x11-server-extra-1.20.3-150400.38.60.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.60.1 * xorg-x11-server-debugsource-1.20.3-150400.38.60.1 * xorg-x11-server-1.20.3-150400.38.60.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.60.1 * xorg-x11-server-sdk-1.20.3-150400.38.60.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * xorg-x11-server-extra-1.20.3-150400.38.60.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.60.1 * xorg-x11-server-debugsource-1.20.3-150400.38.60.1 * xorg-x11-server-1.20.3-150400.38.60.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.60.1 * xorg-x11-server-sdk-1.20.3-150400.38.60.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * xorg-x11-server-extra-1.20.3-150400.38.60.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.60.1 * xorg-x11-server-debugsource-1.20.3-150400.38.60.1 * xorg-x11-server-1.20.3-150400.38.60.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.60.1 * xorg-x11-server-sdk-1.20.3-150400.38.60.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * xorg-x11-server-extra-1.20.3-150400.38.60.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.60.1 * xorg-x11-server-debugsource-1.20.3-150400.38.60.1 * xorg-x11-server-1.20.3-150400.38.60.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.60.1 * xorg-x11-server-sdk-1.20.3-150400.38.60.1 * SUSE Manager Proxy 4.3 (x86_64) * xorg-x11-server-extra-1.20.3-150400.38.60.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.60.1 * xorg-x11-server-debugsource-1.20.3-150400.38.60.1 * xorg-x11-server-1.20.3-150400.38.60.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.60.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * xorg-x11-server-extra-1.20.3-150400.38.60.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.60.1 * xorg-x11-server-debugsource-1.20.3-150400.38.60.1 * xorg-x11-server-1.20.3-150400.38.60.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.60.1 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * xorg-x11-server-extra-1.20.3-150400.38.60.1 * xorg-x11-server-debuginfo-1.20.3-150400.38.60.1 * xorg-x11-server-debugsource-1.20.3-150400.38.60.1 * xorg-x11-server-1.20.3-150400.38.60.1 * xorg-x11-server-extra-debuginfo-1.20.3-150400.38.60.1 ## References: * https://www.suse.com/security/cve/CVE-2025-49176.html * https://bugzilla.suse.com/show_bug.cgi?id=1244084 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jul 1 16:30:06 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 01 Jul 2025 16:30:06 -0000 Subject: SUSE-SU-2025:02191-1: important: Security update for xwayland Message-ID: <175138740626.16034.12794554582340460277@smelt2.prg2.suse.org> # Security update for xwayland Announcement ID: SUSE-SU-2025:02191-1 Release Date: 2025-07-01T15:06:53Z Rating: important References: * bsc#1244084 Cross-References: * CVE-2025-49176 CVSS scores: * CVE-2025-49176 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49176 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H Affected Products: * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for xwayland fixes the following issues: * CVE-2025-49176: Fixed the integer overflow in Big Requests Extension (bsc#1244084). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-2191=1 openSUSE-SLE-15.6-2025-2191=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-2191=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * xwayland-devel-24.1.1-150600.5.15.1 * xwayland-debugsource-24.1.1-150600.5.15.1 * xwayland-24.1.1-150600.5.15.1 * xwayland-debuginfo-24.1.1-150600.5.15.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * xwayland-debugsource-24.1.1-150600.5.15.1 * xwayland-24.1.1-150600.5.15.1 * xwayland-debuginfo-24.1.1-150600.5.15.1 ## References: * https://www.suse.com/security/cve/CVE-2025-49176.html * https://bugzilla.suse.com/show_bug.cgi?id=1244084 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Tue Jul 1 16:30:10 2025 From: null at suse.de (SLE-UPDATES) Date: Tue, 01 Jul 2025 16:30:10 -0000 Subject: SUSE-SU-2025:02190-1: moderate: Security update for redis Message-ID: <175138741046.16034.1018881442588386630@smelt2.prg2.suse.org> # Security update for redis Announcement ID: SUSE-SU-2025:02190-1 Release Date: 2025-07-01T15:06:43Z Rating: moderate References: * bsc#1243804 Cross-References: * CVE-2025-27151 CVSS scores: * CVE-2025-27151 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H * CVE-2025-27151 ( NVD ): 4.7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H Affected Products: * openSUSE Leap 15.6 * Server Applications Module 15-SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for redis fixes the following issues: * CVE-2025-27151: Absence of filename size check may cause a stack overflow (bsc#1243804) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2190=1 SUSE-2025-2190=1 * Server Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP6-2025-2190=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * redis-7.2.4-150600.3.12.1 * redis-debuginfo-7.2.4-150600.3.12.1 * redis-debugsource-7.2.4-150600.3.12.1 * Server Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64) * redis-7.2.4-150600.3.12.1 * redis-debuginfo-7.2.4-150600.3.12.1 * redis-debugsource-7.2.4-150600.3.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-27151.html * https://bugzilla.suse.com/show_bug.cgi?id=1243804 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jul 2 08:30:04 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Jul 2025 08:30:04 -0000 Subject: SUSE-RU-2025:02194-1: moderate: Recommended update for python-instance-billing-flavor-check Message-ID: <175144500461.31446.5256271163325114844@smelt2.prg2.suse.org> # Recommended update for python-instance-billing-flavor-check Announcement ID: SUSE-RU-2025:02194-1 Release Date: 2025-07-02T07:03:23Z Rating: moderate References: * bsc#1242064 Affected Products: * openSUSE Leap 15.6 * Public Cloud Module 15-SP3 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * Public Cloud Module 15-SP6 * Public Cloud Module 15-SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.2 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.2 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.2 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for python-instance-billing-flavor-check fixes the following issues: * Fix infinite loop (bsc#1242064) * Fix bug in update infrastructure request (bsc#1242064) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2194=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2194=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2194=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2194=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2194=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-2194=1 * Public Cloud Module 15-SP3 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP3-2025-2194=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2025-2194=1 * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2025-2194=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-2194=1 * Public Cloud Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2025-2194=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-1.0.1-150000.1.23.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * python-instance-billing-flavor-check-1.0.1-150000.1.23.1 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * python-instance-billing-flavor-check-1.0.1-150000.1.23.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * python-instance-billing-flavor-check-1.0.1-150000.1.23.1 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * python-instance-billing-flavor-check-1.0.1-150000.1.23.1 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-1.0.1-150000.1.23.1 * Public Cloud Module 15-SP3 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-1.0.1-150000.1.23.1 * Public Cloud Module 15-SP4 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-1.0.1-150000.1.23.1 * Public Cloud Module 15-SP5 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-1.0.1-150000.1.23.1 * Public Cloud Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-1.0.1-150000.1.23.1 * Public Cloud Module 15-SP7 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-1.0.1-150000.1.23.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1242064 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jul 2 08:30:07 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Jul 2025 08:30:07 -0000 Subject: SUSE-RU-2025:02193-1: moderate: Recommended update for python-instance-billing-flavor-check Message-ID: <175144500701.31446.8741789741526307899@smelt2.prg2.suse.org> # Recommended update for python-instance-billing-flavor-check Announcement ID: SUSE-RU-2025:02193-1 Release Date: 2025-07-02T07:02:16Z Rating: moderate References: * bsc#1242064 Affected Products: * Public Cloud Module 12 * SUSE Linux Enterprise High Performance Computing 12 SP2 * SUSE Linux Enterprise High Performance Computing 12 SP3 * SUSE Linux Enterprise High Performance Computing 12 SP4 * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 * SUSE Linux Enterprise Server 12 SP1 * SUSE Linux Enterprise Server 12 SP2 * SUSE Linux Enterprise Server 12 SP3 * SUSE Linux Enterprise Server 12 SP4 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server for SAP Applications 12 * SUSE Linux Enterprise Server for SAP Applications 12 SP1 * SUSE Linux Enterprise Server for SAP Applications 12 SP2 * SUSE Linux Enterprise Server for SAP Applications 12 SP3 * SUSE Linux Enterprise Server for SAP Applications 12 SP4 * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for python-instance-billing-flavor-check fixes the following issues: * Fix infinite loop (bsc#1242064) * Fix bug in update infrastructure request (bsc#1242064) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 12 zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2025-2193=1 ## Package List: * Public Cloud Module 12 (aarch64 ppc64le s390x x86_64) * python-instance-billing-flavor-check-1.0.1-1.23.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1242064 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jul 2 12:30:07 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Jul 2025 12:30:07 -0000 Subject: SUSE-RU-2025:02199-1: moderate: Recommended update for mdadm Message-ID: <175145940725.31232.10365059023044228593@smelt2.prg2.suse.org> # Recommended update for mdadm Announcement ID: SUSE-RU-2025:02199-1 Release Date: 2025-07-02T10:49:19Z Rating: moderate References: * bsc#1226413 * bsc#1240789 * bsc#1241474 * bsc#1242696 Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has four fixes can now be installed. ## Description: This update for mdadm fixes the following issues: * Add MAILFROM address to email envelope to avoid smtp auth errors (bsc#1241474). * Allow any valid minor name in md device name (bsc#1240789). * Add dependency on suse-module-tools for SLE15 (bsc#1242696). * Remove a redundant macro definition. * Remove duplicated code (bsc#1226413). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2199=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * mdadm-debuginfo-4.4-150700.4.5.3 * mdadm-debugsource-4.4-150700.4.5.3 * mdadm-4.4-150700.4.5.3 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1226413 * https://bugzilla.suse.com/show_bug.cgi?id=1240789 * https://bugzilla.suse.com/show_bug.cgi?id=1241474 * https://bugzilla.suse.com/show_bug.cgi?id=1242696 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jul 2 12:30:10 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Jul 2025 12:30:10 -0000 Subject: SUSE-SU-2025:02198-1: low: Security update for runc Message-ID: <175145941009.31232.12488878688281335949@smelt2.prg2.suse.org> # Security update for runc Announcement ID: SUSE-SU-2025:02198-1 Release Date: 2025-07-02T09:23:30Z Rating: low References: * bsc#1230092 Cross-References: * CVE-2024-45310 CVSS scores: * CVE-2024-45310 ( SUSE ): 3.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N * CVE-2024-45310 ( NVD ): 3.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N Affected Products: * Containers Module 15-SP6 * openSUSE Leap 15.6 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 An update that solves one vulnerability can now be installed. ## Description: This update for runc fixes the following issues: * CVE-2024-45310: Fixed unintentional creation of empty files/directories on host (bsc#1230092) Other fixes: * Update to runc v1.2.6. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2198=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2198=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2198=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2198=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2198=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-2198=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-2198=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2198=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2198=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2198=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2198=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2198=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2198=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2198=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2198=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2198=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2198=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2198=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-2198=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-2198=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2198=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2198=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 * SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * runc-1.2.6-150000.73.2 * runc-debuginfo-1.2.6-150000.73.2 ## References: * https://www.suse.com/security/cve/CVE-2024-45310.html * https://bugzilla.suse.com/show_bug.cgi?id=1230092 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jul 2 12:30:14 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Jul 2025 12:30:14 -0000 Subject: SUSE-RU-2025:02197-1: moderate: Recommended update for buildah Message-ID: <175145941474.31232.7316555542894841389@smelt2.prg2.suse.org> # Recommended update for buildah Announcement ID: SUSE-RU-2025:02197-1 Release Date: 2025-07-02T09:01:19Z Rating: moderate References: * bsc#1242445 Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 An update that has one fix can now be installed. ## Description: This update for buildah fixes the following issues: * Fix buildah not relabeling mounted paths and instead relies on the OCI runtime to do this (bsc#1242445) * Rebase patches ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-2197=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2197=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2197=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2197=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-2197=1 ## Package List: * openSUSE Leap 15.3 (aarch64 ppc64le s390x x86_64 i586) * buildah-1.35.5-150300.8.42.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * buildah-1.35.5-150300.8.42.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * buildah-1.35.5-150300.8.42.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * buildah-1.35.5-150300.8.42.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * buildah-1.35.5-150300.8.42.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1242445 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jul 2 12:30:16 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Jul 2025 12:30:16 -0000 Subject: SUSE-RU-2025:02196-1: moderate: Recommended update for buildah Message-ID: <175145941686.31232.8032025211232198219@smelt2.prg2.suse.org> # Recommended update for buildah Announcement ID: SUSE-RU-2025:02196-1 Release Date: 2025-07-02T09:01:00Z Rating: moderate References: * bsc#1242445 Affected Products: * Containers Module 15-SP6 * Containers Module 15-SP7 * openSUSE Leap 15.5 * openSUSE Leap 15.6 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for buildah fixes the following issues: * Fix buildah not relabeling mounted paths and instead relies on the OCI runtime to do this (bsc#1242445) * Rebase patches ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2196=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2196=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2196=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2196=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-2196=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2196=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-2196=1 * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-2196=1 ## Package List: * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * buildah-1.35.5-150500.3.37.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * buildah-1.35.5-150500.3.37.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * buildah-1.35.5-150500.3.37.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * buildah-1.35.5-150500.3.37.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * buildah-1.35.5-150500.3.37.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * buildah-1.35.5-150500.3.37.1 * Containers Module 15-SP6 (aarch64 ppc64le s390x x86_64) * buildah-1.35.5-150500.3.37.1 * Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64) * buildah-1.35.5-150500.3.37.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1242445 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jul 2 12:30:18 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Jul 2025 12:30:18 -0000 Subject: SUSE-RU-2025:02195-1: moderate: Recommended update for buildah Message-ID: <175145941876.31232.17655550633621813875@smelt2.prg2.suse.org> # Recommended update for buildah Announcement ID: SUSE-RU-2025:02195-1 Release Date: 2025-07-02T09:00:22Z Rating: moderate References: * bsc#1242445 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 An update that has one fix can now be installed. ## Description: This update for buildah fixes the following issues: * Fix buildah not relabeling mounted paths and instead relies on the OCI runtime to do this (bsc#1242445) * Rebase patches ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-2195=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2195=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2195=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2195=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2195=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * buildah-1.35.5-150400.3.48.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * buildah-1.35.5-150400.3.48.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * buildah-1.35.5-150400.3.48.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * buildah-1.35.5-150400.3.48.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * buildah-1.35.5-150400.3.48.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1242445 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jul 2 16:30:04 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Jul 2025 16:30:04 -0000 Subject: SUSE-SU-2025:02208-1: important: Security update for xorg-x11-server Message-ID: <175147380400.31446.5370601769629669018@smelt2.prg2.suse.org> # Security update for xorg-x11-server Announcement ID: SUSE-SU-2025:02208-1 Release Date: 2025-07-02T15:16:27Z Rating: important References: * bsc#1244084 Cross-References: * CVE-2025-49176 CVSS scores: * CVE-2025-49176 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49176 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H Affected Products: * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for xorg-x11-server fixes the following issues: * CVE-2025-49176: Fixed the integer overflow in Big Requests Extension (bsc#1244084). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2208=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2208=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2208=1 * SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-2208=1 * SUSE Linux Enterprise Workstation Extension 15 SP7 zypper in -t patch SUSE-SLE-Product-WE-15-SP7-2025-2208=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-2208=1 ## Package List: * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64 x86_64) * xorg-x11-server-debugsource-1.20.3-150200.22.5.108.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.108.1 * xorg-x11-server-extra-1.20.3-150200.22.5.108.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.108.1 * xorg-x11-server-1.20.3-150200.22.5.108.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.108.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (aarch64 ppc64le s390x x86_64) * xorg-x11-server-debugsource-1.20.3-150200.22.5.108.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.108.1 * xorg-x11-server-extra-1.20.3-150200.22.5.108.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.108.1 * xorg-x11-server-1.20.3-150200.22.5.108.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.108.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64) * xorg-x11-server-debugsource-1.20.3-150200.22.5.108.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.108.1 * xorg-x11-server-extra-1.20.3-150200.22.5.108.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.108.1 * xorg-x11-server-1.20.3-150200.22.5.108.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.108.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * xorg-x11-server-wayland-debuginfo-1.20.3-150200.22.5.108.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.108.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.108.1 * xorg-x11-server-wayland-1.20.3-150200.22.5.108.1 * SUSE Linux Enterprise Workstation Extension 15 SP7 (x86_64) * xorg-x11-server-wayland-debuginfo-1.20.3-150200.22.5.108.1 * xorg-x11-server-debugsource-1.20.3-150200.22.5.108.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.108.1 * xorg-x11-server-wayland-1.20.3-150200.22.5.108.1 * SUSE Enterprise Storage 7.1 (aarch64 x86_64) * xorg-x11-server-debugsource-1.20.3-150200.22.5.108.1 * xorg-x11-server-sdk-1.20.3-150200.22.5.108.1 * xorg-x11-server-extra-1.20.3-150200.22.5.108.1 * xorg-x11-server-extra-debuginfo-1.20.3-150200.22.5.108.1 * xorg-x11-server-1.20.3-150200.22.5.108.1 * xorg-x11-server-debuginfo-1.20.3-150200.22.5.108.1 ## References: * https://www.suse.com/security/cve/CVE-2025-49176.html * https://bugzilla.suse.com/show_bug.cgi?id=1244084 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jul 2 16:30:07 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Jul 2025 16:30:07 -0000 Subject: SUSE-SU-2025:02207-1: important: Security update for xorg-x11-server Message-ID: <175147380763.31446.14570392447620711767@smelt2.prg2.suse.org> # Security update for xorg-x11-server Announcement ID: SUSE-SU-2025:02207-1 Release Date: 2025-07-02T15:15:58Z Rating: important References: * bsc#1244084 Cross-References: * CVE-2025-49176 CVSS scores: * CVE-2025-49176 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49176 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for xorg-x11-server fixes the following issues: * CVE-2025-49176: Fixed the integer overflow in Big Requests Extension (bsc#1244084). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-2207=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2207=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2207=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2207=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2207=1 ## Package List: * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * xorg-x11-server-extra-debuginfo-21.1.4-150500.7.38.1 * xorg-x11-server-Xvfb-debuginfo-21.1.4-150500.7.38.1 * xorg-x11-server-Xvfb-21.1.4-150500.7.38.1 * xorg-x11-server-source-21.1.4-150500.7.38.1 * xorg-x11-server-debugsource-21.1.4-150500.7.38.1 * xorg-x11-server-debuginfo-21.1.4-150500.7.38.1 * xorg-x11-server-21.1.4-150500.7.38.1 * xorg-x11-server-sdk-21.1.4-150500.7.38.1 * xorg-x11-server-extra-21.1.4-150500.7.38.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * xorg-x11-server-extra-debuginfo-21.1.4-150500.7.38.1 * xorg-x11-server-Xvfb-debuginfo-21.1.4-150500.7.38.1 * xorg-x11-server-Xvfb-21.1.4-150500.7.38.1 * xorg-x11-server-debugsource-21.1.4-150500.7.38.1 * xorg-x11-server-debuginfo-21.1.4-150500.7.38.1 * xorg-x11-server-21.1.4-150500.7.38.1 * xorg-x11-server-sdk-21.1.4-150500.7.38.1 * xorg-x11-server-extra-21.1.4-150500.7.38.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * xorg-x11-server-extra-debuginfo-21.1.4-150500.7.38.1 * xorg-x11-server-Xvfb-debuginfo-21.1.4-150500.7.38.1 * xorg-x11-server-Xvfb-21.1.4-150500.7.38.1 * xorg-x11-server-debugsource-21.1.4-150500.7.38.1 * xorg-x11-server-debuginfo-21.1.4-150500.7.38.1 * xorg-x11-server-21.1.4-150500.7.38.1 * xorg-x11-server-sdk-21.1.4-150500.7.38.1 * xorg-x11-server-extra-21.1.4-150500.7.38.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * xorg-x11-server-extra-debuginfo-21.1.4-150500.7.38.1 * xorg-x11-server-Xvfb-debuginfo-21.1.4-150500.7.38.1 * xorg-x11-server-Xvfb-21.1.4-150500.7.38.1 * xorg-x11-server-debugsource-21.1.4-150500.7.38.1 * xorg-x11-server-debuginfo-21.1.4-150500.7.38.1 * xorg-x11-server-21.1.4-150500.7.38.1 * xorg-x11-server-sdk-21.1.4-150500.7.38.1 * xorg-x11-server-extra-21.1.4-150500.7.38.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * xorg-x11-server-extra-debuginfo-21.1.4-150500.7.38.1 * xorg-x11-server-Xvfb-debuginfo-21.1.4-150500.7.38.1 * xorg-x11-server-Xvfb-21.1.4-150500.7.38.1 * xorg-x11-server-debugsource-21.1.4-150500.7.38.1 * xorg-x11-server-debuginfo-21.1.4-150500.7.38.1 * xorg-x11-server-21.1.4-150500.7.38.1 * xorg-x11-server-sdk-21.1.4-150500.7.38.1 * xorg-x11-server-extra-21.1.4-150500.7.38.1 ## References: * https://www.suse.com/security/cve/CVE-2025-49176.html * https://bugzilla.suse.com/show_bug.cgi?id=1244084 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jul 2 16:30:11 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Jul 2025 16:30:11 -0000 Subject: SUSE-SU-2025:02206-1: important: Security update for xorg-x11-server Message-ID: <175147381126.31446.5441925468853471341@smelt2.prg2.suse.org> # Security update for xorg-x11-server Announcement ID: SUSE-SU-2025:02206-1 Release Date: 2025-07-02T15:15:40Z Rating: important References: * bsc#1244084 Cross-References: * CVE-2025-49176 CVSS scores: * CVE-2025-49176 ( SUSE ): 8.5 CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N * CVE-2025-49176 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H * CVE-2025-49176 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H Affected Products: * Basesystem Module 15-SP7 * Development Tools Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for xorg-x11-server fixes the following issues: * CVE-2025-49176: Fixed the integer overflow in Big Requests Extension (bsc#1244084). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2206=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-2206=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * xorg-x11-server-extra-21.1.15-150700.5.6.1 * xorg-x11-server-Xvfb-21.1.15-150700.5.6.1 * xorg-x11-server-debugsource-21.1.15-150700.5.6.1 * xorg-x11-server-21.1.15-150700.5.6.1 * xorg-x11-server-extra-debuginfo-21.1.15-150700.5.6.1 * xorg-x11-server-Xvfb-debuginfo-21.1.15-150700.5.6.1 * xorg-x11-server-debuginfo-21.1.15-150700.5.6.1 * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * xorg-x11-server-debugsource-21.1.15-150700.5.6.1 * xorg-x11-server-sdk-21.1.15-150700.5.6.1 * xorg-x11-server-debuginfo-21.1.15-150700.5.6.1 ## References: * https://www.suse.com/security/cve/CVE-2025-49176.html * https://bugzilla.suse.com/show_bug.cgi?id=1244084 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jul 2 16:30:19 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Jul 2025 16:30:19 -0000 Subject: SUSE-SU-2025:02205-1: moderate: Security update for python-requests Message-ID: <175147381919.31446.13522674281284065549@smelt2.prg2.suse.org> # Security update for python-requests Announcement ID: SUSE-SU-2025:02205-1 Release Date: 2025-07-02T15:15:23Z Rating: moderate References: * bsc#1244039 Cross-References: * CVE-2024-47081 CVSS scores: * CVE-2024-47081 ( SUSE ): 8.2 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N * CVE-2024-47081 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N * CVE-2024-47081 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N Affected Products: * openSUSE Leap 15.4 * openSUSE Leap 15.6 * Public Cloud Module 15-SP4 * Python 3 Module 15-SP6 * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for python-requests fixes the following issues: * CVE-2024-47081: fixes netrc credential leak (bsc#1244039). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-2205=1 * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2205=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2025-2205=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2025-2205=1 * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2025-2205=1 ## Package List: * openSUSE Leap 15.4 (noarch) * python311-requests-2.31.0-150400.6.18.1 * openSUSE Leap 15.6 (noarch) * python311-requests-2.31.0-150400.6.18.1 * Public Cloud Module 15-SP4 (noarch) * python311-requests-2.31.0-150400.6.18.1 * Python 3 Module 15-SP6 (noarch) * python311-requests-2.31.0-150400.6.18.1 * Python 3 Module 15-SP7 (noarch) * python311-requests-2.31.0-150400.6.18.1 ## References: * https://www.suse.com/security/cve/CVE-2024-47081.html * https://bugzilla.suse.com/show_bug.cgi?id=1244039 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jul 2 16:30:25 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Jul 2025 16:30:25 -0000 Subject: SUSE-RU-2025:02204-1: moderate: Recommended update for aws-nitro-enclaves-cli Message-ID: <175147382535.31446.11071289245210024738@smelt2.prg2.suse.org> # Recommended update for aws-nitro-enclaves-cli Announcement ID: SUSE-RU-2025:02204-1 Release Date: 2025-07-02T13:42:42Z Rating: moderate References: * bsc#1243859 Cross-References: * CVE-2024-12224 CVSS scores: * CVE-2024-12224 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-12224 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-12224 ( NVD ): 5.1 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.6 * Public Cloud Module 15-SP6 * Public Cloud Module 15-SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves one vulnerability can now be installed. ## Description: This update for aws-nitro-enclaves-cli fixes the following issues: * Fix idna accepts Punycode labels that do not produce any non-ASCII when decoded (bsc#1243859) * Update to version 1.4.2 * Update aws-nitro-enclaves-sdk-bootstrap to version f718dea6 * Update to version 1.3.3~git0.afb7264 * Update aws-nitro-enclaves-sdk-bootstrap to version 7797d39a ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-2204=1 openSUSE-SLE-15.6-2025-2204=1 * Public Cloud Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP6-2025-2204=1 * Public Cloud Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP7-2025-2204=1 ## Package List: * openSUSE Leap 15.6 (aarch64 x86_64) * aws-nitro-enclaves-binaryblobs-upstream-debuginfo-1.4.2~git0.6e8512e-150600.10.6.1 * aws-nitro-enclaves-cli-debuginfo-1.4.2~git0.6e8512e-150600.10.6.1 * aws-nitro-enclaves-binaryblobs-upstream-1.4.2~git0.6e8512e-150600.10.6.1 * aws-nitro-enclaves-cli-1.4.2~git0.6e8512e-150600.10.6.1 * aws-nitro-enclaves-cli-debugsource-1.4.2~git0.6e8512e-150600.10.6.1 * system-group-ne-1.4.2~git0.6e8512e-150600.10.6.1 * Public Cloud Module 15-SP6 (aarch64 x86_64) * aws-nitro-enclaves-binaryblobs-upstream-debuginfo-1.4.2~git0.6e8512e-150600.10.6.1 * aws-nitro-enclaves-cli-debuginfo-1.4.2~git0.6e8512e-150600.10.6.1 * aws-nitro-enclaves-binaryblobs-upstream-1.4.2~git0.6e8512e-150600.10.6.1 * aws-nitro-enclaves-cli-1.4.2~git0.6e8512e-150600.10.6.1 * aws-nitro-enclaves-cli-debugsource-1.4.2~git0.6e8512e-150600.10.6.1 * system-group-ne-1.4.2~git0.6e8512e-150600.10.6.1 * Public Cloud Module 15-SP7 (aarch64 x86_64) * aws-nitro-enclaves-binaryblobs-upstream-debuginfo-1.4.2~git0.6e8512e-150600.10.6.1 * aws-nitro-enclaves-cli-debuginfo-1.4.2~git0.6e8512e-150600.10.6.1 * aws-nitro-enclaves-binaryblobs-upstream-1.4.2~git0.6e8512e-150600.10.6.1 * aws-nitro-enclaves-cli-1.4.2~git0.6e8512e-150600.10.6.1 * aws-nitro-enclaves-cli-debugsource-1.4.2~git0.6e8512e-150600.10.6.1 * system-group-ne-1.4.2~git0.6e8512e-150600.10.6.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12224.html * https://bugzilla.suse.com/show_bug.cgi?id=1243859 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jul 2 16:30:29 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Jul 2025 16:30:29 -0000 Subject: SUSE-RU-2025:02203-1: moderate: Recommended update for aws-nitro-enclaves-cli Message-ID: <175147382970.31446.4202743777537948610@smelt2.prg2.suse.org> # Recommended update for aws-nitro-enclaves-cli Announcement ID: SUSE-RU-2025:02203-1 Release Date: 2025-07-02T13:42:28Z Rating: moderate References: * bsc#1243859 Cross-References: * CVE-2024-12224 CVSS scores: * CVE-2024-12224 ( SUSE ): 2.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2024-12224 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N * CVE-2024-12224 ( NVD ): 5.1 CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X Affected Products: * openSUSE Leap 15.4 * Public Cloud Module 15-SP4 * Public Cloud Module 15-SP5 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that solves one vulnerability can now be installed. ## Description: This update for aws-nitro-enclaves-cli fixes the following issues: * Fix idna accepts Punycode labels that do not produce any non-ASCII when decoded (bsc#1243859) * Update to version 1.4.2 * Update aws-nitro-enclaves-sdk-bootstrap to version f718dea6 * Update to version 1.3.3~git0.afb7264 * Update aws-nitro-enclaves-sdk-bootstrap to version 7797d39a ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Public Cloud Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP5-2025-2203=1 * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-2203=1 * Public Cloud Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Public-Cloud-15-SP4-2025-2203=1 ## Package List: * Public Cloud Module 15-SP5 (aarch64 x86_64) * system-group-ne-1.4.2~git0.6e8512e-150400.3.9.1 * aws-nitro-enclaves-cli-debuginfo-1.4.2~git0.6e8512e-150400.3.9.1 * aws-nitro-enclaves-cli-1.4.2~git0.6e8512e-150400.3.9.1 * aws-nitro-enclaves-binaryblobs-upstream-1.4.2~git0.6e8512e-150400.3.9.1 * aws-nitro-enclaves-cli-debugsource-1.4.2~git0.6e8512e-150400.3.9.1 * aws-nitro-enclaves-binaryblobs-upstream-debuginfo-1.4.2~git0.6e8512e-150400.3.9.1 * openSUSE Leap 15.4 (aarch64 x86_64) * system-group-ne-1.4.2~git0.6e8512e-150400.3.9.1 * aws-nitro-enclaves-cli-debuginfo-1.4.2~git0.6e8512e-150400.3.9.1 * aws-nitro-enclaves-cli-1.4.2~git0.6e8512e-150400.3.9.1 * aws-nitro-enclaves-binaryblobs-upstream-1.4.2~git0.6e8512e-150400.3.9.1 * aws-nitro-enclaves-cli-debugsource-1.4.2~git0.6e8512e-150400.3.9.1 * aws-nitro-enclaves-binaryblobs-upstream-debuginfo-1.4.2~git0.6e8512e-150400.3.9.1 * Public Cloud Module 15-SP4 (aarch64 x86_64) * system-group-ne-1.4.2~git0.6e8512e-150400.3.9.1 * aws-nitro-enclaves-cli-debuginfo-1.4.2~git0.6e8512e-150400.3.9.1 * aws-nitro-enclaves-cli-1.4.2~git0.6e8512e-150400.3.9.1 * aws-nitro-enclaves-binaryblobs-upstream-1.4.2~git0.6e8512e-150400.3.9.1 * aws-nitro-enclaves-cli-debugsource-1.4.2~git0.6e8512e-150400.3.9.1 * aws-nitro-enclaves-binaryblobs-upstream-debuginfo-1.4.2~git0.6e8512e-150400.3.9.1 ## References: * https://www.suse.com/security/cve/CVE-2024-12224.html * https://bugzilla.suse.com/show_bug.cgi?id=1243859 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jul 2 16:30:32 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Jul 2025 16:30:32 -0000 Subject: SUSE-RU-2025:02202-1: moderate: Recommended update for nvidia-container-toolkit Message-ID: <175147383281.31446.549134052591981673@smelt2.prg2.suse.org> # Recommended update for nvidia-container-toolkit Announcement ID: SUSE-RU-2025:02202-1 Release Date: 2025-07-02T13:07:50Z Rating: moderate References: * bsc#1242429 Affected Products: * Containers Module 15-SP6 * Containers Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update of nvidia-container-toolkit builds it as non-PIE again to avoid crashes at runtime. (bsc#1242429) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-2202=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-2202=1 * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-2202=1 ## Package List: * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * nvidia-container-toolkit-1.11.0-150200.5.11.1 * Containers Module 15-SP6 (aarch64 ppc64le x86_64) * nvidia-container-toolkit-1.11.0-150200.5.11.1 * Containers Module 15-SP7 (aarch64 ppc64le x86_64) * nvidia-container-toolkit-1.11.0-150200.5.11.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1242429 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jul 2 16:30:37 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Jul 2025 16:30:37 -0000 Subject: SUSE-SU-2025:02201-1: important: Security update for clamav Message-ID: <175147383714.31446.2103293421738654043@smelt2.prg2.suse.org> # Security update for clamav Announcement ID: SUSE-SU-2025:02201-1 Release Date: 2025-07-02T13:04:40Z Rating: important References: * bsc#1243565 * bsc#1245054 * bsc#1245055 Cross-References: * CVE-2025-20234 * CVE-2025-20260 CVSS scores: * CVE-2025-20234 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-20234 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-20234 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-20260 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-20260 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves two vulnerabilities and has one security fix can now be installed. ## Description: This update for clamav fixes the following issues: ClamAV version 1.4.3: * CVE-2025-20260: PDF Scanning Buffer Overflow Vulnerability (bsc#1245054). * CVE-2025-20234: Vulnerability in Universal Disk Format (UDF) processing (bsc#1245055). Other bugfixes: * Fix a race condition between the mockup servers started by different test cases in freshclam_test.py (bsc#1243565) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-2201=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2201=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * clamav-1.4.3-3.47.1 * clamav-devel-1.4.3-3.47.1 * libclamav12-debuginfo-1.4.3-3.47.1 * libclammspack0-1.4.3-3.47.1 * clamav-debuginfo-1.4.3-3.47.1 * libfreshclam3-debuginfo-1.4.3-3.47.1 * clamav-milter-debuginfo-1.4.3-3.47.1 * libclamav12-1.4.3-3.47.1 * libfreshclam3-1.4.3-3.47.1 * clamav-milter-1.4.3-3.47.1 * clamav-debugsource-1.4.3-3.47.1 * libclammspack0-debuginfo-1.4.3-3.47.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * clamav-docs-html-1.4.3-3.47.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * clamav-1.4.3-3.47.1 * clamav-devel-1.4.3-3.47.1 * libclamav12-debuginfo-1.4.3-3.47.1 * libclammspack0-1.4.3-3.47.1 * clamav-debuginfo-1.4.3-3.47.1 * libfreshclam3-debuginfo-1.4.3-3.47.1 * clamav-milter-debuginfo-1.4.3-3.47.1 * libclamav12-1.4.3-3.47.1 * libfreshclam3-1.4.3-3.47.1 * clamav-milter-1.4.3-3.47.1 * clamav-debugsource-1.4.3-3.47.1 * libclammspack0-debuginfo-1.4.3-3.47.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * clamav-docs-html-1.4.3-3.47.1 ## References: * https://www.suse.com/security/cve/CVE-2025-20234.html * https://www.suse.com/security/cve/CVE-2025-20260.html * https://bugzilla.suse.com/show_bug.cgi?id=1243565 * https://bugzilla.suse.com/show_bug.cgi?id=1245054 * https://bugzilla.suse.com/show_bug.cgi?id=1245055 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jul 2 16:30:40 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Jul 2025 16:30:40 -0000 Subject: SUSE-SU-2025:02200-1: important: Security update for clamav Message-ID: <175147384003.31446.10892587230273173215@smelt2.prg2.suse.org> # Security update for clamav Announcement ID: SUSE-SU-2025:02200-1 Release Date: 2025-07-02T13:03:47Z Rating: important References: * bsc#1245054 * bsc#1245055 Cross-References: * CVE-2025-20234 * CVE-2025-20260 CVSS scores: * CVE-2025-20234 ( SUSE ): 6.9 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N * CVE-2025-20234 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-20234 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L * CVE-2025-20260 ( SUSE ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H * CVE-2025-20260 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that solves two vulnerabilities can now be installed. ## Description: This update for clamav fixes the following issues: ClamAV version 1.4.3: * CVE-2025-20260: PDF Scanning Buffer Overflow Vulnerability (bsc#1245054). * CVE-2025-20234: Vulnerability in Universal Disk Format (UDF) processing (bsc#1245055). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2200=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-2200=1 openSUSE-SLE-15.6-2025-2200=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2200=1 ## Package List: * Basesystem Module 15-SP7 (aarch64 ppc64le s390x x86_64) * clamav-milter-1.4.3-150600.18.18.1 * libclammspack0-1.4.3-150600.18.18.1 * libclamav12-1.4.3-150600.18.18.1 * clamav-debugsource-1.4.3-150600.18.18.1 * libfreshclam3-debuginfo-1.4.3-150600.18.18.1 * clamav-devel-1.4.3-150600.18.18.1 * libfreshclam3-1.4.3-150600.18.18.1 * libclamav12-debuginfo-1.4.3-150600.18.18.1 * libclammspack0-debuginfo-1.4.3-150600.18.18.1 * clamav-debuginfo-1.4.3-150600.18.18.1 * clamav-milter-debuginfo-1.4.3-150600.18.18.1 * clamav-1.4.3-150600.18.18.1 * Basesystem Module 15-SP7 (noarch) * clamav-docs-html-1.4.3-150600.18.18.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * clamav-milter-1.4.3-150600.18.18.1 * libclammspack0-1.4.3-150600.18.18.1 * libclamav12-1.4.3-150600.18.18.1 * clamav-debugsource-1.4.3-150600.18.18.1 * libfreshclam3-debuginfo-1.4.3-150600.18.18.1 * clamav-devel-1.4.3-150600.18.18.1 * libfreshclam3-1.4.3-150600.18.18.1 * libclamav12-debuginfo-1.4.3-150600.18.18.1 * libclammspack0-debuginfo-1.4.3-150600.18.18.1 * clamav-debuginfo-1.4.3-150600.18.18.1 * clamav-milter-debuginfo-1.4.3-150600.18.18.1 * clamav-1.4.3-150600.18.18.1 * openSUSE Leap 15.6 (noarch) * clamav-docs-html-1.4.3-150600.18.18.1 * Basesystem Module 15-SP6 (aarch64 ppc64le s390x x86_64) * clamav-milter-1.4.3-150600.18.18.1 * libclammspack0-1.4.3-150600.18.18.1 * libclamav12-1.4.3-150600.18.18.1 * clamav-debugsource-1.4.3-150600.18.18.1 * libfreshclam3-debuginfo-1.4.3-150600.18.18.1 * clamav-devel-1.4.3-150600.18.18.1 * libfreshclam3-1.4.3-150600.18.18.1 * libclamav12-debuginfo-1.4.3-150600.18.18.1 * libclammspack0-debuginfo-1.4.3-150600.18.18.1 * clamav-debuginfo-1.4.3-150600.18.18.1 * clamav-milter-debuginfo-1.4.3-150600.18.18.1 * clamav-1.4.3-150600.18.18.1 * Basesystem Module 15-SP6 (noarch) * clamav-docs-html-1.4.3-150600.18.18.1 ## References: * https://www.suse.com/security/cve/CVE-2025-20234.html * https://www.suse.com/security/cve/CVE-2025-20260.html * https://bugzilla.suse.com/show_bug.cgi?id=1245054 * https://bugzilla.suse.com/show_bug.cgi?id=1245055 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jul 2 20:30:09 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Jul 2025 20:30:09 -0000 Subject: SUSE-SU-2025:02213-1: moderate: Security update for libgepub Message-ID: <175148820987.12496.10237706679058469663@smelt2.prg2.suse.org> # Security update for libgepub Announcement ID: SUSE-SU-2025:02213-1 Release Date: 2025-07-02T16:38:18Z Rating: moderate References: * bsc#1244704 Cross-References: * CVE-2025-6196 CVSS scores: * CVE-2025-6196 ( SUSE ): 6.7 CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-6196 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H * CVE-2025-6196 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H Affected Products: * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that solves one vulnerability can now be installed. ## Description: This update for libgepub fixes the following issues: * CVE-2025-6196: Fixed an integer overflow in the EPUB archive handling code that can leads to massive memory allocation and application crash. (bsc#1244704) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-2213=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-2213=1 ## Package List: * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * libgepub-0_6-0-0.6.0-150200.3.5.1 * libgepub-0_6-0-debuginfo-0.6.0-150200.3.5.1 * typelib-1_0-Gepub-0_6-0.6.0-150200.3.5.1 * libgepub-debugsource-0.6.0-150200.3.5.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * libgepub-0_6-0-0.6.0-150200.3.5.1 * libgepub-0_6-0-debuginfo-0.6.0-150200.3.5.1 * typelib-1_0-Gepub-0_6-0.6.0-150200.3.5.1 * libgepub-debugsource-0.6.0-150200.3.5.1 ## References: * https://www.suse.com/security/cve/CVE-2025-6196.html * https://bugzilla.suse.com/show_bug.cgi?id=1244704 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jul 2 20:30:12 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Jul 2025 20:30:12 -0000 Subject: SUSE-SU-2025:02212-1: low: Security update for libsoup Message-ID: <175148821241.12496.5653218670025234058@smelt2.prg2.suse.org> # Security update for libsoup Announcement ID: SUSE-SU-2025:02212-1 Release Date: 2025-07-02T16:37:54Z Rating: low References: * bsc#1243314 Cross-References: * CVE-2025-4945 CVSS scores: * CVE-2025-4945 ( SUSE ): 2.3 CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-4945 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-4945 ( NVD ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N Affected Products: * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro for Rancher 5.2 An update that solves one vulnerability can now be installed. ## Description: This update for libsoup fixes the following issues: * CVE-2025-4945: Add value checks for date/time parsing (bsc#1243314). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2212=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2212=1 ## Package List: * SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64) * libsoup-2_4-1-2.68.4-150200.4.12.1 * libsoup-2_4-1-debuginfo-2.68.4-150200.4.12.1 * libsoup-debugsource-2.68.4-150200.4.12.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64) * libsoup-2_4-1-2.68.4-150200.4.12.1 * libsoup-2_4-1-debuginfo-2.68.4-150200.4.12.1 * libsoup-debugsource-2.68.4-150200.4.12.1 ## References: * https://www.suse.com/security/cve/CVE-2025-4945.html * https://bugzilla.suse.com/show_bug.cgi?id=1243314 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jul 2 20:30:19 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Jul 2025 20:30:19 -0000 Subject: SUSE-RU-2025:02210-1: moderate: Recommended update for open-vm-tools Message-ID: <175148821976.12496.13900088488017507036@smelt2.prg2.suse.org> # Recommended update for open-vm-tools Announcement ID: SUSE-RU-2025:02210-1 Release Date: 2025-07-02T16:13:03Z Rating: moderate References: * bsc#1245169 Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * Containers Module 15-SP6 * Containers Module 15-SP7 * Desktop Applications Module 15-SP6 * Desktop Applications Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for open-vm-tools fixes the following issues: * Update to open-vm-tools 13.0.0 based on build 24696409. (bsc#1245169): There are no new features in the open-vm-tools 13.0.0 release. This is primarily a maintenance release that addresses a few issues, including: * The vm-support script has been updated to collect the open-vm-tools log files from the Linux guest and information from the systemd journal. * Github pull requests has been integrated and issues fixed. Please see the Resolved Issues section of the Release Notes. * Add patch: Currently the "telinit 6" command is used to reboot a Linux VM following Guest OS Customization. As the classic Linux init system, SysVinit, is deprecated in favor of a newer init system, systemd, the telinit command may not be available on the base Linux OS. This change adds support to Guest OS Customization for the systemd init system. If the modern init system, systemd, is available, then a "systemctl reboot" command will be used to trigger reboot. Otherwise, the "telinit 6" command will be used assuming the traditional init system, SysVinit, is still available. * Drop patch now contained in 13.0.0: * Ran /usr/lib/obs/service/source_validators/helpers/fix_changelog to fix changes file where source validator was failing. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-2210=1 openSUSE-SLE-15.6-2025-2210=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2210=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2210=1 * Containers Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Containers-15-SP6-2025-2210=1 * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-2210=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-2210=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-2210=1 ## Package List: * openSUSE Leap 15.6 (aarch64 x86_64 i586) * libvmtools0-13.0.0-150600.3.15.1 * open-vm-tools-debugsource-13.0.0-150600.3.15.1 * open-vm-tools-desktop-debuginfo-13.0.0-150600.3.15.1 * libvmtools-devel-13.0.0-150600.3.15.1 * open-vm-tools-debuginfo-13.0.0-150600.3.15.1 * libvmtools0-debuginfo-13.0.0-150600.3.15.1 * open-vm-tools-containerinfo-13.0.0-150600.3.15.1 * open-vm-tools-desktop-13.0.0-150600.3.15.1 * open-vm-tools-sdmp-13.0.0-150600.3.15.1 * open-vm-tools-13.0.0-150600.3.15.1 * open-vm-tools-containerinfo-debuginfo-13.0.0-150600.3.15.1 * open-vm-tools-sdmp-debuginfo-13.0.0-150600.3.15.1 * openSUSE Leap 15.6 (x86_64) * open-vm-tools-salt-minion-13.0.0-150600.3.15.1 * Basesystem Module 15-SP6 (aarch64 x86_64) * libvmtools0-13.0.0-150600.3.15.1 * open-vm-tools-debugsource-13.0.0-150600.3.15.1 * open-vm-tools-debuginfo-13.0.0-150600.3.15.1 * libvmtools0-debuginfo-13.0.0-150600.3.15.1 * open-vm-tools-sdmp-13.0.0-150600.3.15.1 * open-vm-tools-13.0.0-150600.3.15.1 * open-vm-tools-sdmp-debuginfo-13.0.0-150600.3.15.1 * Basesystem Module 15-SP6 (x86_64) * libvmtools-devel-13.0.0-150600.3.15.1 * open-vm-tools-salt-minion-13.0.0-150600.3.15.1 * Basesystem Module 15-SP7 (aarch64 x86_64) * libvmtools0-13.0.0-150600.3.15.1 * open-vm-tools-debugsource-13.0.0-150600.3.15.1 * open-vm-tools-debuginfo-13.0.0-150600.3.15.1 * libvmtools0-debuginfo-13.0.0-150600.3.15.1 * open-vm-tools-sdmp-13.0.0-150600.3.15.1 * open-vm-tools-13.0.0-150600.3.15.1 * open-vm-tools-sdmp-debuginfo-13.0.0-150600.3.15.1 * Basesystem Module 15-SP7 (x86_64) * libvmtools-devel-13.0.0-150600.3.15.1 * open-vm-tools-salt-minion-13.0.0-150600.3.15.1 * Containers Module 15-SP6 (aarch64 x86_64) * open-vm-tools-debuginfo-13.0.0-150600.3.15.1 * open-vm-tools-containerinfo-13.0.0-150600.3.15.1 * open-vm-tools-debugsource-13.0.0-150600.3.15.1 * open-vm-tools-containerinfo-debuginfo-13.0.0-150600.3.15.1 * Containers Module 15-SP7 (aarch64 x86_64) * open-vm-tools-debuginfo-13.0.0-150600.3.15.1 * open-vm-tools-containerinfo-13.0.0-150600.3.15.1 * open-vm-tools-debugsource-13.0.0-150600.3.15.1 * open-vm-tools-containerinfo-debuginfo-13.0.0-150600.3.15.1 * Desktop Applications Module 15-SP6 (aarch64 x86_64) * open-vm-tools-desktop-debuginfo-13.0.0-150600.3.15.1 * open-vm-tools-debugsource-13.0.0-150600.3.15.1 * open-vm-tools-debuginfo-13.0.0-150600.3.15.1 * open-vm-tools-desktop-13.0.0-150600.3.15.1 * Desktop Applications Module 15-SP7 (aarch64 x86_64) * open-vm-tools-desktop-debuginfo-13.0.0-150600.3.15.1 * open-vm-tools-debugsource-13.0.0-150600.3.15.1 * open-vm-tools-debuginfo-13.0.0-150600.3.15.1 * open-vm-tools-desktop-13.0.0-150600.3.15.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1245169 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jul 2 20:30:17 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Jul 2025 20:30:17 -0000 Subject: SUSE-RU-2025:02211-1: moderate: Recommended update for open-vm-tools Message-ID: <175148821757.12496.9056670905916353643@smelt2.prg2.suse.org> # Recommended update for open-vm-tools Announcement ID: SUSE-RU-2025:02211-1 Release Date: 2025-07-02T16:13:14Z Rating: moderate References: * bsc#1245169 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has one fix can now be installed. ## Description: This update for open-vm-tools fixes the following issues: * Update to open-vm-tools 13.0.0 based on build 24696409. (bsc#1245169): There are no new features in the open-vm-tools 13.0.0 release. This is primarily a maintenance release that addresses a few issues, including: * The vm-support script has been updated to collect the open-vm-tools log files from the Linux guest and information from the systemd journal. * Github pull requests has been integrated and issues fixed. Please see the Resolved Issues section of the Release Notes. For a more complete list of issues resolved in this release, see the Resolved Issues section of the Release Notes. * Add patch: Currently the "telinit 6" command is used to reboot a Linux VM following Guest OS Customization. As the classic Linux init system, SysVinit, is deprecated in favor of a newer init system, systemd, the telinit command may not be available on the base Linux OS. This change adds support to Guest OS Customization for the systemd init system. If the modern init system, systemd, is available, then a "systemctl reboot" command will be used to trigger reboot. Otherwise, the "telinit 6" command will be used assuming the traditional init system, SysVinit, is still available. * Drop patch now contained in 13.0.0: * Ran /usr/lib/obs/service/source_validators/helpers/fix_changelog to fix changes file where source validator was failing. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2211=1 * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-2211=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * open-vm-tools-salt-minion-13.0.0-4.86.1 * open-vm-tools-debugsource-13.0.0-4.86.1 * libvmtools0-13.0.0-4.86.1 * open-vm-tools-sdmp-debuginfo-13.0.0-4.86.1 * open-vm-tools-desktop-13.0.0-4.86.1 * open-vm-tools-sdmp-13.0.0-4.86.1 * open-vm-tools-debuginfo-13.0.0-4.86.1 * open-vm-tools-13.0.0-4.86.1 * libvmtools0-debuginfo-13.0.0-4.86.1 * open-vm-tools-desktop-debuginfo-13.0.0-4.86.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (x86_64) * open-vm-tools-salt-minion-13.0.0-4.86.1 * open-vm-tools-debugsource-13.0.0-4.86.1 * libvmtools0-13.0.0-4.86.1 * open-vm-tools-sdmp-debuginfo-13.0.0-4.86.1 * open-vm-tools-desktop-13.0.0-4.86.1 * open-vm-tools-sdmp-13.0.0-4.86.1 * open-vm-tools-debuginfo-13.0.0-4.86.1 * open-vm-tools-13.0.0-4.86.1 * libvmtools0-debuginfo-13.0.0-4.86.1 * open-vm-tools-desktop-debuginfo-13.0.0-4.86.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1245169 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Wed Jul 2 20:30:23 2025 From: null at suse.de (SLE-UPDATES) Date: Wed, 02 Jul 2025 20:30:23 -0000 Subject: SUSE-RU-2025:02209-1: moderate: Recommended update for open-vm-tools Message-ID: <175148822329.12496.10948117799088958014@smelt2.prg2.suse.org> # Recommended update for open-vm-tools Announcement ID: SUSE-RU-2025:02209-1 Release Date: 2025-07-02T16:12:33Z Rating: moderate References: * bsc#1245169 Affected Products: * openSUSE Leap 15.3 * SUSE Enterprise Storage 7.1 * SUSE Linux Enterprise High Performance Computing 15 SP3 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.1 * SUSE Linux Enterprise Micro 5.2 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Micro for Rancher 5.2 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP3 * SUSE Linux Enterprise Server 15 SP3 LTSS * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP3 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has one fix can now be installed. ## Description: This update for open-vm-tools fixes the following issues: * Update to open-vm-tools 13.0.0 based on build 24696409. (bsc#1245169): There are no new features in the open-vm-tools 13.0.0 release. This is primarily a maintenance release that addresses a few issues, including: * The vm-support script has been updated to collect the open-vm-tools log files from the Linux guest and information from the systemd journal. * Github pull requests has been integrated and issues fixed. Please see the Resolved Issues section of the Release Notes. * Add patch: Currently the "telinit 6" command is used to reboot a Linux VM following Guest OS Customization. As the classic Linux init system, SysVinit, is deprecated in favor of a newer init system, systemd, the telinit command may not be available on the base Linux OS. This change adds support to Guest OS Customization for the systemd init system. If the modern init system, systemd, is available, then a "systemctl reboot" command will be used to trigger reboot. Otherwise, the "telinit 6" command will be used assuming the traditional init system, SysVinit, is still available. * Drop patch now contained in 13.0.0: * Ran /usr/lib/obs/service/source_validators/helpers/fix_changelog to fix changes file where source validator was failing. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.3 zypper in -t patch SUSE-2025-2209=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2209=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2209=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2209=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2209=1 * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-2209=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2209=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2209=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2209=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2209=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2209=1 * SUSE Linux Enterprise Server 15 SP3 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2209=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2209=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2209=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2209=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2209=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2209=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-2209=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-2209=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-2209=1 * SUSE Enterprise Storage 7.1 zypper in -t patch SUSE-Storage-7.1-2025-2209=1 * SUSE Linux Enterprise Micro 5.1 zypper in -t patch SUSE-SUSE-MicroOS-5.1-2025-2209=1 * SUSE Linux Enterprise Micro 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2209=1 * SUSE Linux Enterprise Micro for Rancher 5.2 zypper in -t patch SUSE-SUSE-MicroOS-5.2-2025-2209=1 ## Package List: * openSUSE Leap 15.3 (aarch64 x86_64 i586) * open-vm-tools-containerinfo-debuginfo-13.0.0-150300.61.1 * open-vm-tools-desktop-debuginfo-13.0.0-150300.61.1 * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-containerinfo-13.0.0-150300.61.1 * open-vm-tools-desktop-13.0.0-150300.61.1 * libvmtools-devel-13.0.0-150300.61.1 * open-vm-tools-sdmp-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * open-vm-tools-sdmp-debuginfo-13.0.0-150300.61.1 * openSUSE Leap 15.3 (x86_64) * open-vm-tools-salt-minion-13.0.0-150300.61.1 * SUSE Linux Enterprise Micro for Rancher 5.3 (x86_64) * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * SUSE Linux Enterprise Micro 5.3 (x86_64) * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * SUSE Linux Enterprise Micro for Rancher 5.4 (x86_64) * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * SUSE Linux Enterprise Micro 5.4 (x86_64) * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * SUSE Linux Enterprise Micro 5.5 (x86_64) * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (x86_64) * open-vm-tools-containerinfo-debuginfo-13.0.0-150300.61.1 * open-vm-tools-desktop-debuginfo-13.0.0-150300.61.1 * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-containerinfo-13.0.0-150300.61.1 * open-vm-tools-desktop-13.0.0-150300.61.1 * libvmtools-devel-13.0.0-150300.61.1 * open-vm-tools-sdmp-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * open-vm-tools-salt-minion-13.0.0-150300.61.1 * open-vm-tools-sdmp-debuginfo-13.0.0-150300.61.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * open-vm-tools-containerinfo-debuginfo-13.0.0-150300.61.1 * open-vm-tools-desktop-debuginfo-13.0.0-150300.61.1 * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-containerinfo-13.0.0-150300.61.1 * open-vm-tools-desktop-13.0.0-150300.61.1 * libvmtools-devel-13.0.0-150300.61.1 * open-vm-tools-sdmp-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * open-vm-tools-sdmp-debuginfo-13.0.0-150300.61.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * open-vm-tools-salt-minion-13.0.0-150300.61.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * open-vm-tools-containerinfo-debuginfo-13.0.0-150300.61.1 * open-vm-tools-desktop-debuginfo-13.0.0-150300.61.1 * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-containerinfo-13.0.0-150300.61.1 * open-vm-tools-desktop-13.0.0-150300.61.1 * libvmtools-devel-13.0.0-150300.61.1 * open-vm-tools-sdmp-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * open-vm-tools-sdmp-debuginfo-13.0.0-150300.61.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * open-vm-tools-salt-minion-13.0.0-150300.61.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * open-vm-tools-containerinfo-debuginfo-13.0.0-150300.61.1 * open-vm-tools-desktop-debuginfo-13.0.0-150300.61.1 * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-containerinfo-13.0.0-150300.61.1 * open-vm-tools-desktop-13.0.0-150300.61.1 * open-vm-tools-sdmp-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * open-vm-tools-sdmp-debuginfo-13.0.0-150300.61.1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * open-vm-tools-salt-minion-13.0.0-150300.61.1 * libvmtools-devel-13.0.0-150300.61.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * open-vm-tools-containerinfo-debuginfo-13.0.0-150300.61.1 * open-vm-tools-desktop-debuginfo-13.0.0-150300.61.1 * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-containerinfo-13.0.0-150300.61.1 * open-vm-tools-desktop-13.0.0-150300.61.1 * open-vm-tools-sdmp-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * open-vm-tools-sdmp-debuginfo-13.0.0-150300.61.1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * open-vm-tools-salt-minion-13.0.0-150300.61.1 * libvmtools-devel-13.0.0-150300.61.1 * SUSE Linux Enterprise Server 15 SP3 LTSS (x86_64) * open-vm-tools-containerinfo-debuginfo-13.0.0-150300.61.1 * open-vm-tools-desktop-debuginfo-13.0.0-150300.61.1 * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-containerinfo-13.0.0-150300.61.1 * open-vm-tools-desktop-13.0.0-150300.61.1 * libvmtools-devel-13.0.0-150300.61.1 * open-vm-tools-sdmp-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * open-vm-tools-salt-minion-13.0.0-150300.61.1 * open-vm-tools-sdmp-debuginfo-13.0.0-150300.61.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 x86_64) * open-vm-tools-containerinfo-debuginfo-13.0.0-150300.61.1 * open-vm-tools-desktop-debuginfo-13.0.0-150300.61.1 * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-containerinfo-13.0.0-150300.61.1 * open-vm-tools-desktop-13.0.0-150300.61.1 * libvmtools-devel-13.0.0-150300.61.1 * open-vm-tools-sdmp-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * open-vm-tools-sdmp-debuginfo-13.0.0-150300.61.1 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * open-vm-tools-salt-minion-13.0.0-150300.61.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 x86_64) * open-vm-tools-containerinfo-debuginfo-13.0.0-150300.61.1 * open-vm-tools-desktop-debuginfo-13.0.0-150300.61.1 * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-containerinfo-13.0.0-150300.61.1 * open-vm-tools-desktop-13.0.0-150300.61.1 * open-vm-tools-sdmp-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * open-vm-tools-sdmp-debuginfo-13.0.0-150300.61.1 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * open-vm-tools-salt-minion-13.0.0-150300.61.1 * libvmtools-devel-13.0.0-150300.61.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP3 (x86_64) * open-vm-tools-containerinfo-debuginfo-13.0.0-150300.61.1 * open-vm-tools-desktop-debuginfo-13.0.0-150300.61.1 * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-containerinfo-13.0.0-150300.61.1 * open-vm-tools-desktop-13.0.0-150300.61.1 * libvmtools-devel-13.0.0-150300.61.1 * open-vm-tools-sdmp-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * open-vm-tools-salt-minion-13.0.0-150300.61.1 * open-vm-tools-sdmp-debuginfo-13.0.0-150300.61.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * open-vm-tools-containerinfo-debuginfo-13.0.0-150300.61.1 * open-vm-tools-desktop-debuginfo-13.0.0-150300.61.1 * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-containerinfo-13.0.0-150300.61.1 * open-vm-tools-desktop-13.0.0-150300.61.1 * libvmtools-devel-13.0.0-150300.61.1 * open-vm-tools-sdmp-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * open-vm-tools-salt-minion-13.0.0-150300.61.1 * open-vm-tools-sdmp-debuginfo-13.0.0-150300.61.1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * open-vm-tools-containerinfo-debuginfo-13.0.0-150300.61.1 * open-vm-tools-desktop-debuginfo-13.0.0-150300.61.1 * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-containerinfo-13.0.0-150300.61.1 * open-vm-tools-desktop-13.0.0-150300.61.1 * libvmtools-devel-13.0.0-150300.61.1 * open-vm-tools-sdmp-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * open-vm-tools-salt-minion-13.0.0-150300.61.1 * open-vm-tools-sdmp-debuginfo-13.0.0-150300.61.1 * SUSE Manager Proxy 4.3 (x86_64) * open-vm-tools-containerinfo-debuginfo-13.0.0-150300.61.1 * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-containerinfo-13.0.0-150300.61.1 * libvmtools-devel-13.0.0-150300.61.1 * open-vm-tools-sdmp-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * open-vm-tools-salt-minion-13.0.0-150300.61.1 * open-vm-tools-sdmp-debuginfo-13.0.0-150300.61.1 * SUSE Manager Retail Branch Server 4.3 (x86_64) * open-vm-tools-containerinfo-debuginfo-13.0.0-150300.61.1 * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-containerinfo-13.0.0-150300.61.1 * libvmtools-devel-13.0.0-150300.61.1 * open-vm-tools-sdmp-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * open-vm-tools-salt-minion-13.0.0-150300.61.1 * open-vm-tools-sdmp-debuginfo-13.0.0-150300.61.1 * SUSE Manager Server 4.3 (x86_64) * open-vm-tools-containerinfo-debuginfo-13.0.0-150300.61.1 * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-containerinfo-13.0.0-150300.61.1 * libvmtools-devel-13.0.0-150300.61.1 * open-vm-tools-sdmp-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * open-vm-tools-salt-minion-13.0.0-150300.61.1 * open-vm-tools-sdmp-debuginfo-13.0.0-150300.61.1 * SUSE Enterprise Storage 7.1 (x86_64) * open-vm-tools-containerinfo-debuginfo-13.0.0-150300.61.1 * open-vm-tools-desktop-debuginfo-13.0.0-150300.61.1 * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-containerinfo-13.0.0-150300.61.1 * open-vm-tools-desktop-13.0.0-150300.61.1 * libvmtools-devel-13.0.0-150300.61.1 * open-vm-tools-sdmp-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * open-vm-tools-salt-minion-13.0.0-150300.61.1 * open-vm-tools-sdmp-debuginfo-13.0.0-150300.61.1 * SUSE Linux Enterprise Micro 5.1 (x86_64) * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * SUSE Linux Enterprise Micro 5.2 (x86_64) * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 * SUSE Linux Enterprise Micro for Rancher 5.2 (x86_64) * libvmtools0-13.0.0-150300.61.1 * open-vm-tools-debugsource-13.0.0-150300.61.1 * libvmtools0-debuginfo-13.0.0-150300.61.1 * open-vm-tools-debuginfo-13.0.0-150300.61.1 * open-vm-tools-13.0.0-150300.61.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1245169 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jul 3 12:30:06 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 03 Jul 2025 12:30:06 -0000 Subject: SUSE-SU-2025:02216-1: important: Security update for icu Message-ID: <175154580685.14128.14845603853527288393@smelt2.prg2.suse.org> # Security update for icu Announcement ID: SUSE-SU-2025:02216-1 Release Date: 2025-07-03T10:09:05Z Rating: important References: * bsc#1243721 Cross-References: * CVE-2025-5222 CVSS scores: * CVE-2025-5222 ( SUSE ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H * CVE-2025-5222 ( NVD ): 7.0 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves one vulnerability can now be installed. ## Description: This update for icu fixes the following issues: * CVE-2025-5222: Fixed stack buffer overflow in the SRBRoot:addTag function (bsc#1243721) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2216=1 * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-2216=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libicu-devel-52.1-8.16.1 * libicu52_1-52.1-8.16.1 * icu-debuginfo-52.1-8.16.1 * libicu52_1-debuginfo-32bit-52.1-8.16.1 * libicu52_1-data-52.1-8.16.1 * libicu52_1-debuginfo-52.1-8.16.1 * icu-debugsource-52.1-8.16.1 * libicu52_1-32bit-52.1-8.16.1 * libicu-doc-52.1-8.16.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * libicu52_1-52.1-8.16.1 * libicu-devel-52.1-8.16.1 * icu-debuginfo-52.1-8.16.1 * libicu52_1-data-52.1-8.16.1 * libicu52_1-debuginfo-52.1-8.16.1 * icu-debugsource-52.1-8.16.1 * libicu-doc-52.1-8.16.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * libicu52_1-32bit-52.1-8.16.1 * libicu52_1-debuginfo-32bit-52.1-8.16.1 ## References: * https://www.suse.com/security/cve/CVE-2025-5222.html * https://bugzilla.suse.com/show_bug.cgi?id=1243721 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jul 3 12:30:08 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 03 Jul 2025 12:30:08 -0000 Subject: SUSE-RU-2025:02215-1: moderate: Recommended update for firewalld Message-ID: <175154580843.14128.1299404990103103967@smelt2.prg2.suse.org> # Recommended update for firewalld Announcement ID: SUSE-RU-2025:02215-1 Release Date: 2025-07-03T10:02:29Z Rating: moderate References: Affected Products: * Basesystem Module 15-SP6 * Basesystem Module 15-SP7 * Desktop Applications Module 15-SP6 * Desktop Applications Module 15-SP7 * Development Tools Module 15-SP6 * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * Python 3 Module 15-SP6 * Python 3 Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 * SUSE Package Hub 15 15-SP6 * SUSE Package Hub 15 15-SP7 An update that can now be installed. ## Description: This update for firewalld fixes the following issue: Align with up to update python stack tools. This update also ships python311-firewall and python311-dbus-python to the Python3 Module. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-2215=1 openSUSE-SLE-15.6-2025-2215=1 * Basesystem Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP6-2025-2215=1 * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2215=1 * Desktop Applications Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2025-2215=1 * Desktop Applications Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP7-2025-2215=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-2215=1 * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-2215=1 * SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-2215=1 * SUSE Package Hub 15 15-SP7 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP7-2025-2215=1 * Python 3 Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Python3-15-SP6-2025-2215=1 * Python 3 Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Python3-15-SP7-2025-2215=1 ## Package List: * openSUSE Leap 15.6 (noarch) * python3-firewall-2.0.1-150600.3.9.1 * firewall-applet-2.0.1-150600.3.9.1 * firewalld-bash-completion-2.0.1-150600.3.9.1 * firewalld-test-2.0.1-150600.3.9.1 * firewalld-zsh-completion-2.0.1-150600.3.9.1 * firewalld-lang-2.0.1-150600.3.9.1 * firewall-macros-2.0.1-150600.3.9.1 * python311-firewall-2.0.1-150600.3.9.1 * firewalld-2.0.1-150600.3.9.1 * firewall-config-2.0.1-150600.3.9.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * python311-dbus-python-devel-1.3.2-150600.3.4.1 * python311-dbus-python-debuginfo-1.3.2-150600.3.4.1 * python311-dbus-python-1.3.2-150600.3.4.1 * python-dbus-python-debugsource-1.3.2-150600.3.4.1 * python-dbus-python-common-devel-1.3.2-150600.3.4.1 * Basesystem Module 15-SP6 (noarch) * python3-firewall-2.0.1-150600.3.9.1 * firewalld-bash-completion-2.0.1-150600.3.9.1 * firewalld-zsh-completion-2.0.1-150600.3.9.1 * firewalld-lang-2.0.1-150600.3.9.1 * firewalld-2.0.1-150600.3.9.1 * Basesystem Module 15-SP7 (noarch) * python3-firewall-2.0.1-150600.3.9.1 * firewalld-bash-completion-2.0.1-150600.3.9.1 * firewalld-zsh-completion-2.0.1-150600.3.9.1 * firewalld-lang-2.0.1-150600.3.9.1 * firewalld-2.0.1-150600.3.9.1 * Desktop Applications Module 15-SP6 (noarch) * firewall-applet-2.0.1-150600.3.9.1 * firewall-config-2.0.1-150600.3.9.1 * Desktop Applications Module 15-SP7 (noarch) * firewall-applet-2.0.1-150600.3.9.1 * firewall-config-2.0.1-150600.3.9.1 * Development Tools Module 15-SP6 (noarch) * firewall-macros-2.0.1-150600.3.9.1 * Development Tools Module 15-SP7 (noarch) * firewall-macros-2.0.1-150600.3.9.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x x86_64) * python311-dbus-python-1.3.2-150600.3.4.1 * python-dbus-python-debugsource-1.3.2-150600.3.4.1 * SUSE Package Hub 15 15-SP7 (aarch64 ppc64le s390x x86_64) * python311-dbus-python-1.3.2-150600.3.4.1 * python-dbus-python-debugsource-1.3.2-150600.3.4.1 * python311-dbus-python-debuginfo-1.3.2-150600.3.4.1 * Python 3 Module 15-SP6 (aarch64 ppc64le s390x x86_64) * python311-dbus-python-1.3.2-150600.3.4.1 * python-dbus-python-debugsource-1.3.2-150600.3.4.1 * python311-dbus-python-debuginfo-1.3.2-150600.3.4.1 * Python 3 Module 15-SP6 (noarch) * python311-firewall-2.0.1-150600.3.9.1 * Python 3 Module 15-SP7 (aarch64 ppc64le s390x x86_64) * python311-dbus-python-1.3.2-150600.3.4.1 * python-dbus-python-debugsource-1.3.2-150600.3.4.1 * python311-dbus-python-debuginfo-1.3.2-150600.3.4.1 * Python 3 Module 15-SP7 (noarch) * python311-firewall-2.0.1-150600.3.9.1 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jul 3 12:30:15 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 03 Jul 2025 12:30:15 -0000 Subject: SUSE-SU-2025:02214-1: important: Security update for tomcat Message-ID: <175154581565.14128.16345308286754744309@smelt2.prg2.suse.org> # Security update for tomcat Announcement ID: SUSE-SU-2025:02214-1 Release Date: 2025-07-03T08:04:08Z Rating: important References: * bsc#1243815 * bsc#1244649 * bsc#1244656 Cross-References: * CVE-2025-46701 * CVE-2025-48988 * CVE-2025-49125 CVSS scores: * CVE-2025-46701 ( SUSE ): 6.3 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N * CVE-2025-46701 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-46701 ( NVD ): 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L * CVE-2025-48988 ( SUSE ): 8.7 CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N * CVE-2025-48988 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-48988 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H * CVE-2025-49125 ( SUSE ): 9.1 CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N * CVE-2025-49125 ( SUSE ): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N * CVE-2025-49125 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that solves three vulnerabilities can now be installed. ## Description: This update for tomcat fixes the following issues: * CVE-2025-46701: Refactored CGI servlet to access resources via WebResources (bsc#1243815). * CVE-2025-48988: Limited the total number of parts in a multi-part request and limits the size of the headers provided with each part (bsc#1244656). * CVE-2025-49125: Expand checks for webAppMount (bsc#1244649). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-2214=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2214=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * tomcat-jsp-2_3-api-9.0.36-3.145.1 * tomcat-9.0.36-3.145.1 * tomcat-servlet-4_0-api-9.0.36-3.145.1 * tomcat-webapps-9.0.36-3.145.1 * tomcat-lib-9.0.36-3.145.1 * tomcat-javadoc-9.0.36-3.145.1 * tomcat-admin-webapps-9.0.36-3.145.1 * tomcat-docs-webapp-9.0.36-3.145.1 * tomcat-el-3_0-api-9.0.36-3.145.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * tomcat-jsp-2_3-api-9.0.36-3.145.1 * tomcat-9.0.36-3.145.1 * tomcat-servlet-4_0-api-9.0.36-3.145.1 * tomcat-webapps-9.0.36-3.145.1 * tomcat-lib-9.0.36-3.145.1 * tomcat-javadoc-9.0.36-3.145.1 * tomcat-admin-webapps-9.0.36-3.145.1 * tomcat-docs-webapp-9.0.36-3.145.1 * tomcat-el-3_0-api-9.0.36-3.145.1 ## References: * https://www.suse.com/security/cve/CVE-2025-46701.html * https://www.suse.com/security/cve/CVE-2025-48988.html * https://www.suse.com/security/cve/CVE-2025-49125.html * https://bugzilla.suse.com/show_bug.cgi?id=1243815 * https://bugzilla.suse.com/show_bug.cgi?id=1244649 * https://bugzilla.suse.com/show_bug.cgi?id=1244656 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jul 3 16:30:06 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 03 Jul 2025 16:30:06 -0000 Subject: SUSE-RU-2025:02220-1: moderate: Recommended update for sssd Message-ID: <175156020684.31232.1989285616229787537@smelt2.prg2.suse.org> # Recommended update for sssd Announcement ID: SUSE-RU-2025:02220-1 Release Date: 2025-07-03T14:36:42Z Rating: moderate References: * bsc#1238927 * bsc#1239089 Affected Products: * openSUSE Leap 15.5 * SUSE Linux Enterprise High Performance Computing 15 SP5 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 * SUSE Linux Enterprise Micro 5.5 * SUSE Linux Enterprise Server 15 SP5 * SUSE Linux Enterprise Server 15 SP5 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP5 An update that has two fixes can now be installed. ## Description: This update for sssd fixes the following issues: * Improved performance by avoiding some LDAP group searches when parameter ignore_group_members is enabled (bsc#1238927). * Fix race condition in memory cache and validate it before checking the header (bsc#1239089). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Micro 5.5 zypper in -t patch SUSE-SLE-Micro-5.5-2025-2220=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2220=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 zypper in -t patch SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2220=1 * SUSE Linux Enterprise Server 15 SP5 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2220=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2220=1 * openSUSE Leap 15.5 zypper in -t patch SUSE-2025-2220=1 ## Package List: * SUSE Linux Enterprise Micro 5.5 (aarch64 ppc64le s390x x86_64) * sssd-ad-2.5.2-150500.10.34.4 * libsss_idmap0-2.5.2-150500.10.34.4 * sssd-debugsource-2.5.2-150500.10.34.4 * sssd-krb5-debuginfo-2.5.2-150500.10.34.4 * libsss_certmap0-debuginfo-2.5.2-150500.10.34.4 * libsss_nss_idmap0-debuginfo-2.5.2-150500.10.34.4 * libsss_nss_idmap0-2.5.2-150500.10.34.4 * sssd-common-debuginfo-2.5.2-150500.10.34.4 * sssd-krb5-2.5.2-150500.10.34.4 * sssd-krb5-common-debuginfo-2.5.2-150500.10.34.4 * sssd-common-2.5.2-150500.10.34.4 * sssd-ldap-debuginfo-2.5.2-150500.10.34.4 * libsss_idmap0-debuginfo-2.5.2-150500.10.34.4 * sssd-2.5.2-150500.10.34.4 * libsss_certmap0-2.5.2-150500.10.34.4 * sssd-krb5-common-2.5.2-150500.10.34.4 * sssd-ad-debuginfo-2.5.2-150500.10.34.4 * sssd-ldap-2.5.2-150500.10.34.4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (aarch64 x86_64) * sssd-winbind-idmap-debuginfo-2.5.2-150500.10.34.4 * sssd-common-debuginfo-2.5.2-150500.10.34.4 * sssd-krb5-2.5.2-150500.10.34.4 * sssd-krb5-common-debuginfo-2.5.2-150500.10.34.4 * libipa_hbac0-debuginfo-2.5.2-150500.10.34.4 * sssd-dbus-debuginfo-2.5.2-150500.10.34.4 * sssd-tools-2.5.2-150500.10.34.4 * sssd-ad-debuginfo-2.5.2-150500.10.34.4 * sssd-dbus-2.5.2-150500.10.34.4 * libsss_idmap0-2.5.2-150500.10.34.4 * libsss_simpleifp-devel-2.5.2-150500.10.34.4 * libsss_simpleifp0-2.5.2-150500.10.34.4 * libsss_nss_idmap0-debuginfo-2.5.2-150500.10.34.4 * sssd-proxy-2.5.2-150500.10.34.4 * sssd-ipa-debuginfo-2.5.2-150500.10.34.4 * sssd-winbind-idmap-2.5.2-150500.10.34.4 * sssd-ldap-2.5.2-150500.10.34.4 * libipa_hbac0-2.5.2-150500.10.34.4 * sssd-debugsource-2.5.2-150500.10.34.4 * libsss_nss_idmap0-2.5.2-150500.10.34.4 * sssd-krb5-common-2.5.2-150500.10.34.4 * sssd-ldap-debuginfo-2.5.2-150500.10.34.4 * python3-sssd-config-debuginfo-2.5.2-150500.10.34.4 * libsss_simpleifp0-debuginfo-2.5.2-150500.10.34.4 * libipa_hbac-devel-2.5.2-150500.10.34.4 * libsss_certmap-devel-2.5.2-150500.10.34.4 * sssd-kcm-debuginfo-2.5.2-150500.10.34.4 * sssd-tools-debuginfo-2.5.2-150500.10.34.4 * sssd-ad-2.5.2-150500.10.34.4 * libsss_idmap-devel-2.5.2-150500.10.34.4 * sssd-krb5-debuginfo-2.5.2-150500.10.34.4 * sssd-proxy-debuginfo-2.5.2-150500.10.34.4 * libsss_certmap0-debuginfo-2.5.2-150500.10.34.4 * python3-sssd-config-2.5.2-150500.10.34.4 * sssd-common-2.5.2-150500.10.34.4 * libsss_idmap0-debuginfo-2.5.2-150500.10.34.4 * sssd-2.5.2-150500.10.34.4 * libsss_certmap0-2.5.2-150500.10.34.4 * sssd-kcm-2.5.2-150500.10.34.4 * sssd-ipa-2.5.2-150500.10.34.4 * libsss_nss_idmap-devel-2.5.2-150500.10.34.4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 (x86_64) * sssd-common-32bit-debuginfo-2.5.2-150500.10.34.4 * sssd-common-32bit-2.5.2-150500.10.34.4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (aarch64 x86_64) * sssd-winbind-idmap-debuginfo-2.5.2-150500.10.34.4 * sssd-common-debuginfo-2.5.2-150500.10.34.4 * sssd-krb5-2.5.2-150500.10.34.4 * sssd-krb5-common-debuginfo-2.5.2-150500.10.34.4 * libipa_hbac0-debuginfo-2.5.2-150500.10.34.4 * sssd-dbus-debuginfo-2.5.2-150500.10.34.4 * sssd-tools-2.5.2-150500.10.34.4 * sssd-ad-debuginfo-2.5.2-150500.10.34.4 * sssd-dbus-2.5.2-150500.10.34.4 * libsss_idmap0-2.5.2-150500.10.34.4 * libsss_simpleifp-devel-2.5.2-150500.10.34.4 * libsss_simpleifp0-2.5.2-150500.10.34.4 * libsss_nss_idmap0-debuginfo-2.5.2-150500.10.34.4 * sssd-proxy-2.5.2-150500.10.34.4 * sssd-ipa-debuginfo-2.5.2-150500.10.34.4 * sssd-winbind-idmap-2.5.2-150500.10.34.4 * sssd-ldap-2.5.2-150500.10.34.4 * libipa_hbac0-2.5.2-150500.10.34.4 * sssd-debugsource-2.5.2-150500.10.34.4 * libsss_nss_idmap0-2.5.2-150500.10.34.4 * sssd-krb5-common-2.5.2-150500.10.34.4 * sssd-ldap-debuginfo-2.5.2-150500.10.34.4 * python3-sssd-config-debuginfo-2.5.2-150500.10.34.4 * libsss_simpleifp0-debuginfo-2.5.2-150500.10.34.4 * libipa_hbac-devel-2.5.2-150500.10.34.4 * libsss_certmap-devel-2.5.2-150500.10.34.4 * sssd-kcm-debuginfo-2.5.2-150500.10.34.4 * sssd-tools-debuginfo-2.5.2-150500.10.34.4 * sssd-ad-2.5.2-150500.10.34.4 * libsss_idmap-devel-2.5.2-150500.10.34.4 * sssd-krb5-debuginfo-2.5.2-150500.10.34.4 * sssd-proxy-debuginfo-2.5.2-150500.10.34.4 * libsss_certmap0-debuginfo-2.5.2-150500.10.34.4 * python3-sssd-config-2.5.2-150500.10.34.4 * sssd-common-2.5.2-150500.10.34.4 * libsss_idmap0-debuginfo-2.5.2-150500.10.34.4 * sssd-2.5.2-150500.10.34.4 * libsss_certmap0-2.5.2-150500.10.34.4 * sssd-kcm-2.5.2-150500.10.34.4 * sssd-ipa-2.5.2-150500.10.34.4 * libsss_nss_idmap-devel-2.5.2-150500.10.34.4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 (x86_64) * sssd-common-32bit-debuginfo-2.5.2-150500.10.34.4 * sssd-common-32bit-2.5.2-150500.10.34.4 * SUSE Linux Enterprise Server 15 SP5 LTSS (aarch64 ppc64le s390x x86_64) * sssd-winbind-idmap-debuginfo-2.5.2-150500.10.34.4 * sssd-common-debuginfo-2.5.2-150500.10.34.4 * sssd-krb5-2.5.2-150500.10.34.4 * sssd-krb5-common-debuginfo-2.5.2-150500.10.34.4 * libipa_hbac0-debuginfo-2.5.2-150500.10.34.4 * sssd-dbus-debuginfo-2.5.2-150500.10.34.4 * sssd-tools-2.5.2-150500.10.34.4 * sssd-ad-debuginfo-2.5.2-150500.10.34.4 * sssd-dbus-2.5.2-150500.10.34.4 * libsss_idmap0-2.5.2-150500.10.34.4 * libsss_simpleifp-devel-2.5.2-150500.10.34.4 * libsss_simpleifp0-2.5.2-150500.10.34.4 * libsss_nss_idmap0-debuginfo-2.5.2-150500.10.34.4 * sssd-proxy-2.5.2-150500.10.34.4 * sssd-ipa-debuginfo-2.5.2-150500.10.34.4 * sssd-winbind-idmap-2.5.2-150500.10.34.4 * sssd-ldap-2.5.2-150500.10.34.4 * libipa_hbac0-2.5.2-150500.10.34.4 * sssd-debugsource-2.5.2-150500.10.34.4 * libsss_nss_idmap0-2.5.2-150500.10.34.4 * sssd-krb5-common-2.5.2-150500.10.34.4 * sssd-ldap-debuginfo-2.5.2-150500.10.34.4 * python3-sssd-config-debuginfo-2.5.2-150500.10.34.4 * libsss_simpleifp0-debuginfo-2.5.2-150500.10.34.4 * libipa_hbac-devel-2.5.2-150500.10.34.4 * libsss_certmap-devel-2.5.2-150500.10.34.4 * sssd-kcm-debuginfo-2.5.2-150500.10.34.4 * sssd-tools-debuginfo-2.5.2-150500.10.34.4 * sssd-ad-2.5.2-150500.10.34.4 * libsss_idmap-devel-2.5.2-150500.10.34.4 * sssd-krb5-debuginfo-2.5.2-150500.10.34.4 * sssd-proxy-debuginfo-2.5.2-150500.10.34.4 * libsss_certmap0-debuginfo-2.5.2-150500.10.34.4 * python3-sssd-config-2.5.2-150500.10.34.4 * sssd-common-2.5.2-150500.10.34.4 * libsss_idmap0-debuginfo-2.5.2-150500.10.34.4 * sssd-2.5.2-150500.10.34.4 * libsss_certmap0-2.5.2-150500.10.34.4 * sssd-kcm-2.5.2-150500.10.34.4 * sssd-ipa-2.5.2-150500.10.34.4 * libsss_nss_idmap-devel-2.5.2-150500.10.34.4 * SUSE Linux Enterprise Server 15 SP5 LTSS (x86_64) * sssd-common-32bit-debuginfo-2.5.2-150500.10.34.4 * sssd-common-32bit-2.5.2-150500.10.34.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (ppc64le x86_64) * sssd-winbind-idmap-debuginfo-2.5.2-150500.10.34.4 * sssd-common-debuginfo-2.5.2-150500.10.34.4 * sssd-krb5-2.5.2-150500.10.34.4 * sssd-krb5-common-debuginfo-2.5.2-150500.10.34.4 * libipa_hbac0-debuginfo-2.5.2-150500.10.34.4 * sssd-dbus-debuginfo-2.5.2-150500.10.34.4 * sssd-tools-2.5.2-150500.10.34.4 * sssd-ad-debuginfo-2.5.2-150500.10.34.4 * sssd-dbus-2.5.2-150500.10.34.4 * libsss_idmap0-2.5.2-150500.10.34.4 * libsss_simpleifp-devel-2.5.2-150500.10.34.4 * libsss_simpleifp0-2.5.2-150500.10.34.4 * libsss_nss_idmap0-debuginfo-2.5.2-150500.10.34.4 * sssd-proxy-2.5.2-150500.10.34.4 * sssd-ipa-debuginfo-2.5.2-150500.10.34.4 * sssd-winbind-idmap-2.5.2-150500.10.34.4 * sssd-ldap-2.5.2-150500.10.34.4 * libipa_hbac0-2.5.2-150500.10.34.4 * sssd-debugsource-2.5.2-150500.10.34.4 * libsss_nss_idmap0-2.5.2-150500.10.34.4 * sssd-krb5-common-2.5.2-150500.10.34.4 * sssd-ldap-debuginfo-2.5.2-150500.10.34.4 * python3-sssd-config-debuginfo-2.5.2-150500.10.34.4 * libsss_simpleifp0-debuginfo-2.5.2-150500.10.34.4 * libipa_hbac-devel-2.5.2-150500.10.34.4 * libsss_certmap-devel-2.5.2-150500.10.34.4 * sssd-kcm-debuginfo-2.5.2-150500.10.34.4 * sssd-tools-debuginfo-2.5.2-150500.10.34.4 * sssd-ad-2.5.2-150500.10.34.4 * libsss_idmap-devel-2.5.2-150500.10.34.4 * sssd-krb5-debuginfo-2.5.2-150500.10.34.4 * sssd-proxy-debuginfo-2.5.2-150500.10.34.4 * libsss_certmap0-debuginfo-2.5.2-150500.10.34.4 * python3-sssd-config-2.5.2-150500.10.34.4 * sssd-common-2.5.2-150500.10.34.4 * libsss_idmap0-debuginfo-2.5.2-150500.10.34.4 * sssd-2.5.2-150500.10.34.4 * libsss_certmap0-2.5.2-150500.10.34.4 * sssd-kcm-2.5.2-150500.10.34.4 * sssd-ipa-2.5.2-150500.10.34.4 * libsss_nss_idmap-devel-2.5.2-150500.10.34.4 * SUSE Linux Enterprise Server for SAP Applications 15 SP5 (x86_64) * sssd-common-32bit-debuginfo-2.5.2-150500.10.34.4 * sssd-common-32bit-2.5.2-150500.10.34.4 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64 i586) * sssd-winbind-idmap-debuginfo-2.5.2-150500.10.34.4 * python3-ipa_hbac-2.5.2-150500.10.34.4 * sssd-common-debuginfo-2.5.2-150500.10.34.4 * sssd-krb5-2.5.2-150500.10.34.4 * sssd-krb5-common-debuginfo-2.5.2-150500.10.34.4 * libipa_hbac0-debuginfo-2.5.2-150500.10.34.4 * sssd-dbus-debuginfo-2.5.2-150500.10.34.4 * sssd-tools-2.5.2-150500.10.34.4 * sssd-ad-debuginfo-2.5.2-150500.10.34.4 * sssd-dbus-2.5.2-150500.10.34.4 * libsss_idmap0-2.5.2-150500.10.34.4 * libsss_simpleifp-devel-2.5.2-150500.10.34.4 * libsss_simpleifp0-2.5.2-150500.10.34.4 * libsss_nss_idmap0-debuginfo-2.5.2-150500.10.34.4 * sssd-proxy-2.5.2-150500.10.34.4 * sssd-ipa-debuginfo-2.5.2-150500.10.34.4 * python3-sss_nss_idmap-2.5.2-150500.10.34.4 * sssd-winbind-idmap-2.5.2-150500.10.34.4 * sssd-ldap-2.5.2-150500.10.34.4 * python3-sss-murmur-2.5.2-150500.10.34.4 * libipa_hbac0-2.5.2-150500.10.34.4 * sssd-debugsource-2.5.2-150500.10.34.4 * python3-sss_nss_idmap-debuginfo-2.5.2-150500.10.34.4 * libsss_nss_idmap0-2.5.2-150500.10.34.4 * libnfsidmap-sss-debuginfo-2.5.2-150500.10.34.4 * sssd-krb5-common-2.5.2-150500.10.34.4 * sssd-ldap-debuginfo-2.5.2-150500.10.34.4 * python3-sssd-config-debuginfo-2.5.2-150500.10.34.4 * python3-ipa_hbac-debuginfo-2.5.2-150500.10.34.4 * libsss_simpleifp0-debuginfo-2.5.2-150500.10.34.4 * python3-sss-murmur-debuginfo-2.5.2-150500.10.34.4 * libipa_hbac-devel-2.5.2-150500.10.34.4 * libsss_certmap-devel-2.5.2-150500.10.34.4 * sssd-kcm-debuginfo-2.5.2-150500.10.34.4 * sssd-tools-debuginfo-2.5.2-150500.10.34.4 * sssd-ad-2.5.2-150500.10.34.4 * libsss_idmap-devel-2.5.2-150500.10.34.4 * sssd-krb5-debuginfo-2.5.2-150500.10.34.4 * sssd-proxy-debuginfo-2.5.2-150500.10.34.4 * libsss_certmap0-debuginfo-2.5.2-150500.10.34.4 * libnfsidmap-sss-2.5.2-150500.10.34.4 * python3-sssd-config-2.5.2-150500.10.34.4 * sssd-common-2.5.2-150500.10.34.4 * libsss_idmap0-debuginfo-2.5.2-150500.10.34.4 * sssd-2.5.2-150500.10.34.4 * libsss_certmap0-2.5.2-150500.10.34.4 * sssd-kcm-2.5.2-150500.10.34.4 * sssd-ipa-2.5.2-150500.10.34.4 * libsss_nss_idmap-devel-2.5.2-150500.10.34.4 * openSUSE Leap 15.5 (x86_64) * sssd-common-32bit-debuginfo-2.5.2-150500.10.34.4 * sssd-common-32bit-2.5.2-150500.10.34.4 * openSUSE Leap 15.5 (aarch64_ilp32) * sssd-common-64bit-debuginfo-2.5.2-150500.10.34.4 * sssd-common-64bit-2.5.2-150500.10.34.4 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1238927 * https://bugzilla.suse.com/show_bug.cgi?id=1239089 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jul 3 16:30:14 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 03 Jul 2025 16:30:14 -0000 Subject: SUSE-RU-2025:02219-1: moderate: Recommended update for sssd Message-ID: <175156021436.31232.13760698636040915910@smelt2.prg2.suse.org> # Recommended update for sssd Announcement ID: SUSE-RU-2025:02219-1 Release Date: 2025-07-03T14:36:08Z Rating: moderate References: * bsc#1234368 * bsc#1238927 * bsc#1239089 Affected Products: * openSUSE Leap 15.4 * SUSE Linux Enterprise High Performance Computing 15 SP4 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 * SUSE Linux Enterprise Micro 5.3 * SUSE Linux Enterprise Micro 5.4 * SUSE Linux Enterprise Micro for Rancher 5.3 * SUSE Linux Enterprise Micro for Rancher 5.4 * SUSE Linux Enterprise Server 15 SP4 * SUSE Linux Enterprise Server 15 SP4 LTSS * SUSE Linux Enterprise Server for SAP Applications 15 SP4 * SUSE Manager Proxy 4.3 * SUSE Manager Retail Branch Server 4.3 * SUSE Manager Server 4.3 An update that has three fixes can now be installed. ## Description: This update for sssd fixes the following issue: * Allow multiple services per port (bsc#1234368). * Improved performance by avoiding some LDAP group searches when parameter ignore_group_members is enabled (bsc#1238927). * Fix race condition in memory cache and validate it before checking the header (bsc#1239089). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2025-2219=1 * SUSE Linux Enterprise Micro for Rancher 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2219=1 * SUSE Linux Enterprise Micro 5.3 zypper in -t patch SUSE-SLE-Micro-5.3-2025-2219=1 * SUSE Linux Enterprise Micro for Rancher 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2219=1 * SUSE Linux Enterprise Micro 5.4 zypper in -t patch SUSE-SLE-Micro-5.4-2025-2219=1 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2219=1 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2219=1 * SUSE Linux Enterprise Server 15 SP4 LTSS zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2219=1 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2219=1 * SUSE Manager Proxy 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-2219=1 * SUSE Manager Retail Branch Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch- Server-4.3-2025-2219=1 * SUSE Manager Server 4.3 zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-2219=1 ## Package List: * openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * python3-sss_nss_idmap-debuginfo-2.5.2-150400.4.34.2 * sssd-dbus-2.5.2-150400.4.34.2 * sssd-2.5.2-150400.4.34.2 * libipa_hbac0-2.5.2-150400.4.34.2 * python3-ipa_hbac-debuginfo-2.5.2-150400.4.34.2 * sssd-ipa-2.5.2-150400.4.34.2 * libsss_certmap0-2.5.2-150400.4.34.2 * libsss_idmap0-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap-devel-2.5.2-150400.4.34.2 * sssd-kcm-2.5.2-150400.4.34.2 * python3-sssd-config-2.5.2-150400.4.34.2 * libsss_certmap0-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-common-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap0-2.5.2-150400.4.34.2 * libsss_simpleifp0-2.5.2-150400.4.34.2 * python3-sss-murmur-debuginfo-2.5.2-150400.4.34.2 * sssd-tools-debuginfo-2.5.2-150400.4.34.2 * python3-sss-murmur-2.5.2-150400.4.34.2 * sssd-dbus-debuginfo-2.5.2-150400.4.34.2 * sssd-ad-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-common-2.5.2-150400.4.34.2 * libipa_hbac-devel-2.5.2-150400.4.34.2 * libnfsidmap-sss-2.5.2-150400.4.34.2 * libsss_certmap-devel-2.5.2-150400.4.34.2 * sssd-ldap-2.5.2-150400.4.34.2 * sssd-proxy-2.5.2-150400.4.34.2 * sssd-kcm-debuginfo-2.5.2-150400.4.34.2 * libnfsidmap-sss-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-2.5.2-150400.4.34.2 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.34.2 * libsss_simpleifp-devel-2.5.2-150400.4.34.2 * sssd-proxy-debuginfo-2.5.2-150400.4.34.2 * sssd-ad-2.5.2-150400.4.34.2 * sssd-common-2.5.2-150400.4.34.2 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.34.2 * sssd-common-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.34.2 * libipa_hbac0-debuginfo-2.5.2-150400.4.34.2 * python3-sss_nss_idmap-2.5.2-150400.4.34.2 * sssd-ipa-debuginfo-2.5.2-150400.4.34.2 * python3-ipa_hbac-2.5.2-150400.4.34.2 * sssd-krb5-debuginfo-2.5.2-150400.4.34.2 * sssd-debugsource-2.5.2-150400.4.34.2 * python3-sssd-config-debuginfo-2.5.2-150400.4.34.2 * sssd-winbind-idmap-2.5.2-150400.4.34.2 * libsss_idmap0-2.5.2-150400.4.34.2 * libsss_idmap-devel-2.5.2-150400.4.34.2 * sssd-ldap-debuginfo-2.5.2-150400.4.34.2 * sssd-tools-2.5.2-150400.4.34.2 * openSUSE Leap 15.4 (x86_64) * sssd-common-32bit-2.5.2-150400.4.34.2 * sssd-common-32bit-debuginfo-2.5.2-150400.4.34.2 * openSUSE Leap 15.4 (aarch64_ilp32) * sssd-common-64bit-2.5.2-150400.4.34.2 * sssd-common-64bit-debuginfo-2.5.2-150400.4.34.2 * SUSE Linux Enterprise Micro for Rancher 5.3 (aarch64 s390x x86_64) * libsss_nss_idmap0-2.5.2-150400.4.34.2 * sssd-2.5.2-150400.4.34.2 * sssd-krb5-common-2.5.2-150400.4.34.2 * libsss_idmap0-2.5.2-150400.4.34.2 * sssd-common-2.5.2-150400.4.34.2 * libsss_certmap0-2.5.2-150400.4.34.2 * libsss_idmap0-debuginfo-2.5.2-150400.4.34.2 * sssd-common-debuginfo-2.5.2-150400.4.34.2 * sssd-ldap-2.5.2-150400.4.34.2 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.34.2 * sssd-ldap-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-common-debuginfo-2.5.2-150400.4.34.2 * libsss_certmap0-debuginfo-2.5.2-150400.4.34.2 * sssd-debugsource-2.5.2-150400.4.34.2 * SUSE Linux Enterprise Micro 5.3 (aarch64 s390x x86_64) * libsss_nss_idmap0-2.5.2-150400.4.34.2 * sssd-2.5.2-150400.4.34.2 * sssd-krb5-common-2.5.2-150400.4.34.2 * libsss_idmap0-2.5.2-150400.4.34.2 * sssd-common-2.5.2-150400.4.34.2 * libsss_certmap0-2.5.2-150400.4.34.2 * libsss_idmap0-debuginfo-2.5.2-150400.4.34.2 * sssd-common-debuginfo-2.5.2-150400.4.34.2 * sssd-ldap-2.5.2-150400.4.34.2 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.34.2 * sssd-ldap-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-common-debuginfo-2.5.2-150400.4.34.2 * libsss_certmap0-debuginfo-2.5.2-150400.4.34.2 * sssd-debugsource-2.5.2-150400.4.34.2 * SUSE Linux Enterprise Micro for Rancher 5.4 (aarch64 s390x x86_64) * libsss_nss_idmap0-2.5.2-150400.4.34.2 * sssd-2.5.2-150400.4.34.2 * sssd-krb5-common-2.5.2-150400.4.34.2 * libsss_idmap0-2.5.2-150400.4.34.2 * sssd-common-2.5.2-150400.4.34.2 * libsss_certmap0-2.5.2-150400.4.34.2 * libsss_idmap0-debuginfo-2.5.2-150400.4.34.2 * sssd-common-debuginfo-2.5.2-150400.4.34.2 * sssd-ldap-2.5.2-150400.4.34.2 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.34.2 * sssd-ldap-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-common-debuginfo-2.5.2-150400.4.34.2 * libsss_certmap0-debuginfo-2.5.2-150400.4.34.2 * sssd-debugsource-2.5.2-150400.4.34.2 * SUSE Linux Enterprise Micro 5.4 (aarch64 s390x x86_64) * libsss_nss_idmap0-2.5.2-150400.4.34.2 * sssd-2.5.2-150400.4.34.2 * sssd-krb5-common-2.5.2-150400.4.34.2 * libsss_idmap0-2.5.2-150400.4.34.2 * sssd-common-2.5.2-150400.4.34.2 * libsss_certmap0-2.5.2-150400.4.34.2 * libsss_idmap0-debuginfo-2.5.2-150400.4.34.2 * sssd-common-debuginfo-2.5.2-150400.4.34.2 * sssd-ldap-2.5.2-150400.4.34.2 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.34.2 * sssd-ldap-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-common-debuginfo-2.5.2-150400.4.34.2 * libsss_certmap0-debuginfo-2.5.2-150400.4.34.2 * sssd-debugsource-2.5.2-150400.4.34.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64 x86_64) * sssd-dbus-2.5.2-150400.4.34.2 * sssd-2.5.2-150400.4.34.2 * libipa_hbac0-2.5.2-150400.4.34.2 * sssd-ipa-2.5.2-150400.4.34.2 * libsss_certmap0-2.5.2-150400.4.34.2 * libsss_idmap0-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap-devel-2.5.2-150400.4.34.2 * sssd-kcm-2.5.2-150400.4.34.2 * python3-sssd-config-2.5.2-150400.4.34.2 * libsss_certmap0-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-common-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap0-2.5.2-150400.4.34.2 * libsss_simpleifp0-2.5.2-150400.4.34.2 * sssd-tools-debuginfo-2.5.2-150400.4.34.2 * sssd-dbus-debuginfo-2.5.2-150400.4.34.2 * sssd-ad-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-common-2.5.2-150400.4.34.2 * libipa_hbac-devel-2.5.2-150400.4.34.2 * libsss_certmap-devel-2.5.2-150400.4.34.2 * sssd-ldap-2.5.2-150400.4.34.2 * sssd-proxy-2.5.2-150400.4.34.2 * sssd-kcm-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-2.5.2-150400.4.34.2 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.34.2 * libsss_simpleifp-devel-2.5.2-150400.4.34.2 * sssd-proxy-debuginfo-2.5.2-150400.4.34.2 * sssd-ad-2.5.2-150400.4.34.2 * sssd-common-2.5.2-150400.4.34.2 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.34.2 * sssd-common-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.34.2 * libipa_hbac0-debuginfo-2.5.2-150400.4.34.2 * sssd-ipa-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-debuginfo-2.5.2-150400.4.34.2 * sssd-debugsource-2.5.2-150400.4.34.2 * python3-sssd-config-debuginfo-2.5.2-150400.4.34.2 * sssd-winbind-idmap-2.5.2-150400.4.34.2 * libsss_idmap0-2.5.2-150400.4.34.2 * libsss_idmap-devel-2.5.2-150400.4.34.2 * sssd-ldap-debuginfo-2.5.2-150400.4.34.2 * sssd-tools-2.5.2-150400.4.34.2 * SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (x86_64) * sssd-common-32bit-2.5.2-150400.4.34.2 * sssd-common-32bit-debuginfo-2.5.2-150400.4.34.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64 x86_64) * sssd-dbus-2.5.2-150400.4.34.2 * sssd-2.5.2-150400.4.34.2 * libipa_hbac0-2.5.2-150400.4.34.2 * sssd-ipa-2.5.2-150400.4.34.2 * libsss_certmap0-2.5.2-150400.4.34.2 * libsss_idmap0-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap-devel-2.5.2-150400.4.34.2 * sssd-kcm-2.5.2-150400.4.34.2 * python3-sssd-config-2.5.2-150400.4.34.2 * libsss_certmap0-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-common-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap0-2.5.2-150400.4.34.2 * libsss_simpleifp0-2.5.2-150400.4.34.2 * sssd-tools-debuginfo-2.5.2-150400.4.34.2 * sssd-dbus-debuginfo-2.5.2-150400.4.34.2 * sssd-ad-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-common-2.5.2-150400.4.34.2 * libipa_hbac-devel-2.5.2-150400.4.34.2 * libsss_certmap-devel-2.5.2-150400.4.34.2 * sssd-ldap-2.5.2-150400.4.34.2 * sssd-proxy-2.5.2-150400.4.34.2 * sssd-kcm-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-2.5.2-150400.4.34.2 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.34.2 * libsss_simpleifp-devel-2.5.2-150400.4.34.2 * sssd-proxy-debuginfo-2.5.2-150400.4.34.2 * sssd-ad-2.5.2-150400.4.34.2 * sssd-common-2.5.2-150400.4.34.2 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.34.2 * sssd-common-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.34.2 * libipa_hbac0-debuginfo-2.5.2-150400.4.34.2 * sssd-ipa-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-debuginfo-2.5.2-150400.4.34.2 * sssd-debugsource-2.5.2-150400.4.34.2 * python3-sssd-config-debuginfo-2.5.2-150400.4.34.2 * sssd-winbind-idmap-2.5.2-150400.4.34.2 * libsss_idmap0-2.5.2-150400.4.34.2 * libsss_idmap-devel-2.5.2-150400.4.34.2 * sssd-ldap-debuginfo-2.5.2-150400.4.34.2 * sssd-tools-2.5.2-150400.4.34.2 * SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (x86_64) * sssd-common-32bit-2.5.2-150400.4.34.2 * sssd-common-32bit-debuginfo-2.5.2-150400.4.34.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (aarch64 ppc64le s390x x86_64) * sssd-dbus-2.5.2-150400.4.34.2 * sssd-2.5.2-150400.4.34.2 * libipa_hbac0-2.5.2-150400.4.34.2 * sssd-ipa-2.5.2-150400.4.34.2 * libsss_certmap0-2.5.2-150400.4.34.2 * libsss_idmap0-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap-devel-2.5.2-150400.4.34.2 * sssd-kcm-2.5.2-150400.4.34.2 * python3-sssd-config-2.5.2-150400.4.34.2 * libsss_certmap0-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-common-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap0-2.5.2-150400.4.34.2 * libsss_simpleifp0-2.5.2-150400.4.34.2 * sssd-tools-debuginfo-2.5.2-150400.4.34.2 * sssd-dbus-debuginfo-2.5.2-150400.4.34.2 * sssd-ad-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-common-2.5.2-150400.4.34.2 * libipa_hbac-devel-2.5.2-150400.4.34.2 * libsss_certmap-devel-2.5.2-150400.4.34.2 * sssd-ldap-2.5.2-150400.4.34.2 * sssd-proxy-2.5.2-150400.4.34.2 * sssd-kcm-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-2.5.2-150400.4.34.2 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.34.2 * libsss_simpleifp-devel-2.5.2-150400.4.34.2 * sssd-proxy-debuginfo-2.5.2-150400.4.34.2 * sssd-ad-2.5.2-150400.4.34.2 * sssd-common-2.5.2-150400.4.34.2 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.34.2 * sssd-common-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.34.2 * libipa_hbac0-debuginfo-2.5.2-150400.4.34.2 * sssd-ipa-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-debuginfo-2.5.2-150400.4.34.2 * sssd-debugsource-2.5.2-150400.4.34.2 * python3-sssd-config-debuginfo-2.5.2-150400.4.34.2 * sssd-winbind-idmap-2.5.2-150400.4.34.2 * libsss_idmap0-2.5.2-150400.4.34.2 * libsss_idmap-devel-2.5.2-150400.4.34.2 * sssd-ldap-debuginfo-2.5.2-150400.4.34.2 * sssd-tools-2.5.2-150400.4.34.2 * SUSE Linux Enterprise Server 15 SP4 LTSS (x86_64) * sssd-common-32bit-2.5.2-150400.4.34.2 * sssd-common-32bit-debuginfo-2.5.2-150400.4.34.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64) * sssd-dbus-2.5.2-150400.4.34.2 * sssd-2.5.2-150400.4.34.2 * libipa_hbac0-2.5.2-150400.4.34.2 * sssd-ipa-2.5.2-150400.4.34.2 * libsss_certmap0-2.5.2-150400.4.34.2 * libsss_idmap0-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap-devel-2.5.2-150400.4.34.2 * sssd-kcm-2.5.2-150400.4.34.2 * python3-sssd-config-2.5.2-150400.4.34.2 * libsss_certmap0-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-common-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap0-2.5.2-150400.4.34.2 * libsss_simpleifp0-2.5.2-150400.4.34.2 * sssd-tools-debuginfo-2.5.2-150400.4.34.2 * sssd-dbus-debuginfo-2.5.2-150400.4.34.2 * sssd-ad-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-common-2.5.2-150400.4.34.2 * libipa_hbac-devel-2.5.2-150400.4.34.2 * libsss_certmap-devel-2.5.2-150400.4.34.2 * sssd-ldap-2.5.2-150400.4.34.2 * sssd-proxy-2.5.2-150400.4.34.2 * sssd-kcm-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-2.5.2-150400.4.34.2 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.34.2 * libsss_simpleifp-devel-2.5.2-150400.4.34.2 * sssd-proxy-debuginfo-2.5.2-150400.4.34.2 * sssd-ad-2.5.2-150400.4.34.2 * sssd-common-2.5.2-150400.4.34.2 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.34.2 * sssd-common-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.34.2 * libipa_hbac0-debuginfo-2.5.2-150400.4.34.2 * sssd-ipa-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-debuginfo-2.5.2-150400.4.34.2 * sssd-debugsource-2.5.2-150400.4.34.2 * python3-sssd-config-debuginfo-2.5.2-150400.4.34.2 * sssd-winbind-idmap-2.5.2-150400.4.34.2 * libsss_idmap0-2.5.2-150400.4.34.2 * libsss_idmap-devel-2.5.2-150400.4.34.2 * sssd-ldap-debuginfo-2.5.2-150400.4.34.2 * sssd-tools-2.5.2-150400.4.34.2 * SUSE Linux Enterprise Server for SAP Applications 15 SP4 (x86_64) * sssd-common-32bit-2.5.2-150400.4.34.2 * sssd-common-32bit-debuginfo-2.5.2-150400.4.34.2 * SUSE Manager Proxy 4.3 (x86_64) * sssd-dbus-2.5.2-150400.4.34.2 * sssd-2.5.2-150400.4.34.2 * libipa_hbac0-2.5.2-150400.4.34.2 * sssd-ipa-2.5.2-150400.4.34.2 * libsss_certmap0-2.5.2-150400.4.34.2 * libsss_idmap0-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap-devel-2.5.2-150400.4.34.2 * sssd-common-32bit-2.5.2-150400.4.34.2 * sssd-kcm-2.5.2-150400.4.34.2 * python3-sssd-config-2.5.2-150400.4.34.2 * libsss_certmap0-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-common-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap0-2.5.2-150400.4.34.2 * libsss_simpleifp0-2.5.2-150400.4.34.2 * sssd-tools-debuginfo-2.5.2-150400.4.34.2 * sssd-dbus-debuginfo-2.5.2-150400.4.34.2 * sssd-ad-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-common-2.5.2-150400.4.34.2 * libipa_hbac-devel-2.5.2-150400.4.34.2 * libsss_certmap-devel-2.5.2-150400.4.34.2 * sssd-ldap-2.5.2-150400.4.34.2 * sssd-proxy-2.5.2-150400.4.34.2 * sssd-kcm-debuginfo-2.5.2-150400.4.34.2 * sssd-common-32bit-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-2.5.2-150400.4.34.2 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.34.2 * libsss_simpleifp-devel-2.5.2-150400.4.34.2 * sssd-proxy-debuginfo-2.5.2-150400.4.34.2 * sssd-ad-2.5.2-150400.4.34.2 * sssd-common-2.5.2-150400.4.34.2 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.34.2 * sssd-common-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.34.2 * libipa_hbac0-debuginfo-2.5.2-150400.4.34.2 * sssd-ipa-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-debuginfo-2.5.2-150400.4.34.2 * sssd-debugsource-2.5.2-150400.4.34.2 * python3-sssd-config-debuginfo-2.5.2-150400.4.34.2 * sssd-winbind-idmap-2.5.2-150400.4.34.2 * libsss_idmap0-2.5.2-150400.4.34.2 * libsss_idmap-devel-2.5.2-150400.4.34.2 * sssd-ldap-debuginfo-2.5.2-150400.4.34.2 * sssd-tools-2.5.2-150400.4.34.2 * SUSE Manager Retail Branch Server 4.3 (x86_64) * sssd-dbus-2.5.2-150400.4.34.2 * sssd-2.5.2-150400.4.34.2 * libipa_hbac0-2.5.2-150400.4.34.2 * sssd-ipa-2.5.2-150400.4.34.2 * libsss_certmap0-2.5.2-150400.4.34.2 * libsss_idmap0-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap-devel-2.5.2-150400.4.34.2 * sssd-common-32bit-2.5.2-150400.4.34.2 * sssd-kcm-2.5.2-150400.4.34.2 * python3-sssd-config-2.5.2-150400.4.34.2 * libsss_certmap0-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-common-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap0-2.5.2-150400.4.34.2 * libsss_simpleifp0-2.5.2-150400.4.34.2 * sssd-tools-debuginfo-2.5.2-150400.4.34.2 * sssd-dbus-debuginfo-2.5.2-150400.4.34.2 * sssd-ad-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-common-2.5.2-150400.4.34.2 * libipa_hbac-devel-2.5.2-150400.4.34.2 * libsss_certmap-devel-2.5.2-150400.4.34.2 * sssd-ldap-2.5.2-150400.4.34.2 * sssd-proxy-2.5.2-150400.4.34.2 * sssd-kcm-debuginfo-2.5.2-150400.4.34.2 * sssd-common-32bit-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-2.5.2-150400.4.34.2 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.34.2 * libsss_simpleifp-devel-2.5.2-150400.4.34.2 * sssd-proxy-debuginfo-2.5.2-150400.4.34.2 * sssd-ad-2.5.2-150400.4.34.2 * sssd-common-2.5.2-150400.4.34.2 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.34.2 * sssd-common-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.34.2 * libipa_hbac0-debuginfo-2.5.2-150400.4.34.2 * sssd-ipa-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-debuginfo-2.5.2-150400.4.34.2 * sssd-debugsource-2.5.2-150400.4.34.2 * python3-sssd-config-debuginfo-2.5.2-150400.4.34.2 * sssd-winbind-idmap-2.5.2-150400.4.34.2 * libsss_idmap0-2.5.2-150400.4.34.2 * libsss_idmap-devel-2.5.2-150400.4.34.2 * sssd-ldap-debuginfo-2.5.2-150400.4.34.2 * sssd-tools-2.5.2-150400.4.34.2 * SUSE Manager Server 4.3 (ppc64le s390x x86_64) * sssd-dbus-2.5.2-150400.4.34.2 * sssd-2.5.2-150400.4.34.2 * libipa_hbac0-2.5.2-150400.4.34.2 * sssd-ipa-2.5.2-150400.4.34.2 * libsss_certmap0-2.5.2-150400.4.34.2 * libsss_idmap0-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap-devel-2.5.2-150400.4.34.2 * sssd-kcm-2.5.2-150400.4.34.2 * python3-sssd-config-2.5.2-150400.4.34.2 * libsss_certmap0-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-common-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap0-2.5.2-150400.4.34.2 * libsss_simpleifp0-2.5.2-150400.4.34.2 * sssd-tools-debuginfo-2.5.2-150400.4.34.2 * sssd-dbus-debuginfo-2.5.2-150400.4.34.2 * sssd-ad-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-common-2.5.2-150400.4.34.2 * libipa_hbac-devel-2.5.2-150400.4.34.2 * libsss_certmap-devel-2.5.2-150400.4.34.2 * sssd-ldap-2.5.2-150400.4.34.2 * sssd-proxy-2.5.2-150400.4.34.2 * sssd-kcm-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-2.5.2-150400.4.34.2 * libsss_simpleifp0-debuginfo-2.5.2-150400.4.34.2 * libsss_simpleifp-devel-2.5.2-150400.4.34.2 * sssd-proxy-debuginfo-2.5.2-150400.4.34.2 * sssd-ad-2.5.2-150400.4.34.2 * sssd-common-2.5.2-150400.4.34.2 * sssd-winbind-idmap-debuginfo-2.5.2-150400.4.34.2 * sssd-common-debuginfo-2.5.2-150400.4.34.2 * libsss_nss_idmap0-debuginfo-2.5.2-150400.4.34.2 * libipa_hbac0-debuginfo-2.5.2-150400.4.34.2 * sssd-ipa-debuginfo-2.5.2-150400.4.34.2 * sssd-krb5-debuginfo-2.5.2-150400.4.34.2 * sssd-debugsource-2.5.2-150400.4.34.2 * python3-sssd-config-debuginfo-2.5.2-150400.4.34.2 * sssd-winbind-idmap-2.5.2-150400.4.34.2 * libsss_idmap0-2.5.2-150400.4.34.2 * libsss_idmap-devel-2.5.2-150400.4.34.2 * sssd-ldap-debuginfo-2.5.2-150400.4.34.2 * sssd-tools-2.5.2-150400.4.34.2 * SUSE Manager Server 4.3 (x86_64) * sssd-common-32bit-2.5.2-150400.4.34.2 * sssd-common-32bit-debuginfo-2.5.2-150400.4.34.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1234368 * https://bugzilla.suse.com/show_bug.cgi?id=1238927 * https://bugzilla.suse.com/show_bug.cgi?id=1239089 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jul 3 16:30:16 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 03 Jul 2025 16:30:16 -0000 Subject: SUSE-RU-2025:02218-1: moderate: Recommended update for osinfo-db Message-ID: <175156021692.31232.9967384259871033696@smelt2.prg2.suse.org> # Recommended update for osinfo-db Announcement ID: SUSE-RU-2025:02218-1 Release Date: 2025-07-03T13:27:11Z Rating: moderate References: * bsc#1243296 Affected Products: * Basesystem Module 15-SP7 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for osinfo-db fixes the following issue: * virt-manager-common supports SLES16 ISO layout (bsc#1243296). ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Basesystem Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP7-2025-2218=1 ## Package List: * Basesystem Module 15-SP7 (noarch) * osinfo-db-20250124-150700.5.3.2 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1243296 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jul 3 16:30:21 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 03 Jul 2025 16:30:21 -0000 Subject: SUSE-RU-2025:02217-1: moderate: Recommended update for mozilla-nspr, mozilla-nss Message-ID: <175156022104.31232.4338902620681849788@smelt2.prg2.suse.org> # Recommended update for mozilla-nspr, mozilla-nss Announcement ID: SUSE-RU-2025:02217-1 Release Date: 2025-07-03T12:18:36Z Rating: moderate References: * bsc#1081723 * bsc#1224113 Affected Products: * SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5 An update that has two fixes can now be installed. ## Description: This update for mozilla-nspr, mozilla-nss fixes the following issues: mozilla-nspr was updated to version 4.36: * renamed the prwin16.h header to prwin.h * configure was updated from 2.69 to 2.71 * various build, test and automation script fixes * major parts of the source code were reformatted mozilla-nss was updated to NSS 3.112: * Fix alias for mac workers on try * ensure all options can be configured with SSL_OptionSet and SSL_OptionSetDefault * ABI/API break in ssl certificate processing * remove unnecessary assertion in sec_asn1d_init_state_based_on_template * update taskgraph to v14.2.1 * Workflow for automation of the release on GitHub when pushing a tag * fix faulty assertions in SEC_ASN1DecoderUpdate * Renegotiations should use a fresh ECH GREASE buffer * update taskgraph to v14.1.1 * Partial fix for ACVP build CI job * Initialize find in sftk_searchDatabase * Add clang-18 to extra builds * Fault tolerant git fetch for fuzzing * Tolerate intermittent failures in ssl_policy_pkix_ocsp * fix compiler warnings when DEBUG_ASN1D_STATES or CMSDEBUG are set * fix content type tag check in NSS_CMSMessage_ContainsCertsOrCrls * Remove Cryptofuzz CI version check update to NSS 3.111: * FIPS changes need to be upstreamed: force ems policy * Turn off Websites Trust Bit from CAs * Update nssckbi version following April 2025 Batch of Changes * Disable SMIME ?trust bit? for GoDaddy CAs * Replaced deprecated sprintf function with snprintf in dbtool.c * Need up update NSS for PKCS 3.1 * avoid leaking localCert if it is already set in ssl3_FillInCachedSID * Decrease ASAN quarantine size for Cryptofuzz in CI * selfserv: Add support for zlib certificate compression Update to NSS 3.110: * FIPS changes need to be upstreamed: force ems policy * Prevent excess allocations in sslBuffer_Grow * Remove Crl templates from ASN1 fuzz target * Remove CERT_CrlTemplate from ASN1 fuzz target * Fix memory leak in NSS_CMSMessage_IsSigned * NSS policy updates * Improve locking in nssPKIObject_GetInstances * Fix race in sdb_GetMetaData * Fix member access within null pointer * Increase smime fuzzer memory limit * Enable resumption when using custom extensions * change CN of server12 test certificate * Part 2: Add missing check in NSS_CMSDigestContext_FinishSingle * Part 1: Fix smime UBSan errors * FIPS changes need to be upstreamed: updated key checks * Don't build libpkix in static builds * handle `-p all` in try syntax * fix opt-make builds to actually be opt * fix opt-static builds to actually be opt * Remove extraneous assert Update to NSS 3.109: * Call BL_Init before RNG_RNGInit() so that special SHA instructions can be used if available * NSS policy updates - fix inaccurate key policy issues * SMIME fuzz target * ASN1 decoder fuzz target * Part 2: Revert ?Extract testcases from ssl gtests for fuzzing? * Add fuzz/README.md * Part 4: Fix tstclnt arguments script * Extend pkcs7 fuzz target * Extend certDN fuzz target * revert changes to HACL* files from bug 1866841 * Part 3: Package frida corpus script * update to NSS 3.108 * libclang-16 -> libclang-19 * Turn off Secure Email Trust Bit for Security Communication ECC RootCA1 * Turn off Secure Email Trust Bit for BJCA Global Root CA1 and BJCA Global Root CA2 * Remove SwissSign Silver CA ? G2 * Add D-Trust 2023 TLS Roots to NSS * fix fips test failure on windows * change default sensitivity of KEM keys * Part 1: Introduce frida hooks and script * add missing arm_neon.h include to gcm.c * ci: update windows workers to win2022 * strip trailing carriage returns in tools tests * work around unix/windows path translation issues in cert test script * ci: let the windows setup script work without $m * detect msys * add a specialized CTR_Update variant for AES-GCM * NSS policy updates * FIPS changes need to be upstreamed: FIPS 140-3 RNG * FIPS changes need to be upstreamed: Add SafeZero * FIPS changes need to be upstreamed - updated POST * Segmentation fault in SECITEM_Hash during pkcs12 processing * Extending NSS with LoadModuleFromFunction functionality * Ensure zero-initialization of collectArgs.cert * pkcs7 fuzz target use CERT_DestroyCertificate * Fix actual underlying ODR violations issue * mozilla::pkix: allow reference ID labels to begin and/or end with hyphens * don't look for secmod.db in nssutil_ReadSecmodDB if NSS_DISABLE_DBM is set * Fix memory leak in pkcs7 fuzz target * Set -O2 for ASan builds in CI * Change branch of tlsfuzzer dependency * Run tests in CI for ASan builds with detect_odr_violation=1 * Fix coverage failure in CI * Add fuzzing for delegated credentials, DTLS short header and Tls13BackendEch * Add fuzzing for SSL_EnableTls13GreaseEch and SSL_SetDtls13VersionWorkaround * Part 3: Restructure fuzz/ * Extract testcases from ssl gtests for fuzzing * Force Cryptofuzz to use NSS in CI * Fix Cryptofuzz on 32 bit in CI * Update Cryptofuzz repository link * fix build error from 9505f79d * simplify error handling in get_token_objects_for_cache * nss doc: fix a warning * pkcs12 fixes from RHEL need to be picked up Update to NSS 3.107: * Remove MPI fuzz targets. * Remove globals `lockStatus` and `locksEverDisabled`. * Enable PKCS8 fuzz target. * Integrate Cryptofuzz in CI. * Part 2: Set tls server target socket options in config class * Part 1: Set tls client target socket options in config class * Support building with thread sanitizer. * set nssckbi version number to 2.72. * remove Websites Trust Bit from Entrust Root Certification Authority - G4. * remove Security Communication RootCA3 root cert. * remove SecureSign RootCA11 root cert. * Add distrust-after for TLS to Entrust Roots. * update expected error code in pk12util pbmac1 tests. * Use random tstclnt args with handshake collection script * Remove extraneous assert in ssl3gthr.c. * Adding missing release notes for NSS_3_105. * Enable the disabled mlkem tests for dtls. * NSS gtests filter cleans up the constucted buffer before the use. * Make ssl_SetDefaultsFromEnvironment thread-safe. * Remove short circuit test from ssl_Init. Update to NSS 3.106: * NSS 3.106 should be distributed with NSPR 4.36. * pk12util: improve error handling in p12U_ReadPKCS12File. * Correctly destroy bulkkey in error scenario. * PKCS7 fuzz target, r=djackson,nss-reviewers. * Extract certificates with handshake collection script. * Specify len_control for fuzz targets. * Fix memory leak in dumpCertificatePEM. * Fix UBSan errors for SECU_PrintCertificate and SECU_PrintCertificateBasicInfo. * add new error codes to mozilla::pkix for Firefox to use. * allow null phKey in NSC_DeriveKey. * Only create seed corpus zip from existing corpus. * Use explicit allowlist for for KDF PRFS. * Increase optimization level for fuzz builds. * Remove incorrect assert. * Use libFuzzer options from fuzz/options/*.options in CI. * Polish corpus collection for automation. * Detect new and unfuzzed SSL options. * PKCS12 fuzzing target. Update to NSS 3.105: * Allow importing PKCS#8 private EC keys missing public key * UBSAN fix: applying zero offset to null pointer in sslsnce.c * set KRML_MUSTINLINE=inline in makefile builds * Don't set CKA_SIGN for CKK_EC_MONTGOMERY private keys * override default definition of KRML_MUSTINLINE * libssl support for mlkem768x25519 * support for ML-KEM-768 in softoken and pk11wrap * Add Libcrux implementation of ML-KEM 768 to FreeBL * Avoid misuse of ctype(3) functions * part 2: run clang-format * part 1: upgrade to clang-format 13 * clang-format fuzz * DTLS client message buffer may not empty be on retransmit * Optionally print config for TLS client and server fuzz target * Fix some simple documentation issues in NSS. * improve performance of NSC_FindObjectsInit when template has CKA_TOKEN attr * define CKM_NSS_ECDHE_NO_PAIRWISE_CHECK_KEY_PAIR_GEN Update to NSS 3.104: * Copy original corpus to heap-allocated buffer * Fix min ssl version for DTLS client fuzzer * Remove OS2 support just like we did on NSPR * clang-format NSS improvements * Adding basicutil.h to use HexString2SECItem function * removing dirent.c from build * Allow handing in keymaterial to shlibsign to make the output reproducible * remove nec4.3, sunos4, riscos and SNI references * remove other old OS (BSDI, old HP UX, NCR, openunix, sco, unixware or reliantUnix * remove mentions of WIN95 * remove mentions of WIN16 * More explicit directory naming * Add more options to TLS server fuzz target * Add more options to TLS client fuzz target * Use OSS-Fuzz corpus in NSS CI * set nssckbi version number to 2.70. * Remove Email Trust bit from ACCVRAIZ1 root cert. * Remove Email Trust bit from certSIGN ROOT CA. * Add Cybertrust Japan Roots to NSS. * Add Taiwan CA Roots to NSS. * remove search by decoded serial in nssToken_FindCertificateByIssuerAndSerialNumber * Fix tstclnt CI build failure * vfyserv: ensure peer cert chain is in db for CERT_VerifyCertificateNow * Enable all supported protocol versions for UDP * Actually use random PSK hash type * Initialize NSS DB once * Additional ECH cipher suites and PSK hash types * Automate corpus file generation for TLS client Fuzzer * Fix crash with UNSAFE_FUZZER_MODE * clang-format shlibsign.c Update to NSS 3.103: * move list size check after lock acquisition in sftk_PutObjectToList. * Add fuzzing support for SSL_ENABLE_POST_HANDSHAKE_AUTH, * Follow-up to fix test for presence of file nspr.patch. * Adjust libFuzzer size limits * Add fuzzing support for SSL_SetCertificateCompressionAlgorithm, SSL_SetClientEchConfigs, SSL_VersionRangeSet and SSL_AddExternalPsk * Add fuzzing support for SSL_ENABLE_GREASE and SSL_ENABLE_CH_EXTENSION_PERMUTATION * FIPS: Enforce approved curves with the CKK_EC_MONTGOMERY key type (bsc#1224113). update to NSS 3.102.1: * ChaChaXor to return after the function update to NSS 3.102: * Add Valgrind annotations to freebl Chacha20-Poly1305. * missing sqlite header. * GLOBALTRUST 2020: Set Distrust After for TLS and S/MIME. * improve certutil keyUsage, extKeyUsage, and nsCertType keyword handling. * correct length of raw SPKI data before printing in pp utility. * Make NSS-build reproducible, use key from openssl (bsc#1081723) * FIPS: Exclude the SHA-1 hash from SLI approval. ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-2217=1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2217=1 ## Package List: * SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * mozilla-nss-tools-3.112-58.130.1 * libsoftokn3-3.112-58.130.1 * mozilla-nss-3.112-58.130.1 * mozilla-nss-certs-3.112-58.130.1 * mozilla-nspr-4.36-19.32.1 * mozilla-nss-debuginfo-3.112-58.130.1 * mozilla-nss-sysinit-3.112-58.130.1 * mozilla-nss-sysinit-debuginfo-3.112-58.130.1 * mozilla-nss-certs-debuginfo-3.112-58.130.1 * mozilla-nspr-devel-4.36-19.32.1 * mozilla-nss-tools-debuginfo-3.112-58.130.1 * libsoftokn3-debuginfo-3.112-58.130.1 * libfreebl3-debuginfo-3.112-58.130.1 * mozilla-nspr-debugsource-4.36-19.32.1 * mozilla-nspr-debuginfo-4.36-19.32.1 * mozilla-nss-devel-3.112-58.130.1 * mozilla-nss-debugsource-3.112-58.130.1 * libfreebl3-3.112-58.130.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (s390x x86_64) * mozilla-nspr-32bit-4.36-19.32.1 * libfreebl3-32bit-3.112-58.130.1 * mozilla-nss-32bit-3.112-58.130.1 * mozilla-nss-sysinit-debuginfo-32bit-3.112-58.130.1 * libsoftokn3-debuginfo-32bit-3.112-58.130.1 * mozilla-nspr-debuginfo-32bit-4.36-19.32.1 * mozilla-nss-certs-debuginfo-32bit-3.112-58.130.1 * mozilla-nss-sysinit-32bit-3.112-58.130.1 * libfreebl3-debuginfo-32bit-3.112-58.130.1 * libsoftokn3-32bit-3.112-58.130.1 * mozilla-nss-certs-32bit-3.112-58.130.1 * mozilla-nss-debuginfo-32bit-3.112-58.130.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * libsoftokn3-3.112-58.130.1 * mozilla-nspr-4.36-19.32.1 * mozilla-nss-sysinit-3.112-58.130.1 * mozilla-nss-32bit-3.112-58.130.1 * mozilla-nss-sysinit-debuginfo-3.112-58.130.1 * mozilla-nss-sysinit-debuginfo-32bit-3.112-58.130.1 * libsoftokn3-debuginfo-32bit-3.112-58.130.1 * mozilla-nspr-debuginfo-4.36-19.32.1 * libsoftokn3-32bit-3.112-58.130.1 * mozilla-nss-debugsource-3.112-58.130.1 * mozilla-nss-debuginfo-32bit-3.112-58.130.1 * mozilla-nss-tools-3.112-58.130.1 * mozilla-nss-3.112-58.130.1 * mozilla-nss-debuginfo-3.112-58.130.1 * mozilla-nss-certs-debuginfo-32bit-3.112-58.130.1 * mozilla-nspr-debuginfo-32bit-4.36-19.32.1 * libsoftokn3-debuginfo-3.112-58.130.1 * libfreebl3-debuginfo-32bit-3.112-58.130.1 * mozilla-nss-certs-3.112-58.130.1 * mozilla-nspr-32bit-4.36-19.32.1 * mozilla-nss-tools-debuginfo-3.112-58.130.1 * mozilla-nspr-debugsource-4.36-19.32.1 * libfreebl3-32bit-3.112-58.130.1 * mozilla-nss-certs-debuginfo-3.112-58.130.1 * mozilla-nspr-devel-4.36-19.32.1 * libfreebl3-debuginfo-3.112-58.130.1 * libfreebl3-3.112-58.130.1 * mozilla-nss-sysinit-32bit-3.112-58.130.1 * mozilla-nss-devel-3.112-58.130.1 * mozilla-nss-certs-32bit-3.112-58.130.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1081723 * https://bugzilla.suse.com/show_bug.cgi?id=1224113 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Thu Jul 3 16:30:18 2025 From: null at suse.de (SLE-UPDATES) Date: Thu, 03 Jul 2025 16:30:18 -0000 Subject: SUSE-RU-2025:01798-2: moderate: Recommended update for kubernetes-old Message-ID: <175156021817.31232.1584177789365676610@smelt2.prg2.suse.org> # Recommended update for kubernetes-old Announcement ID: SUSE-RU-2025:01798-2 Release Date: 2025-07-03T13:25:31Z Rating: moderate References: * jsc#PED-11106 Affected Products: * Containers Module 15-SP7 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that contains one feature can now be installed. ## Description: This update for kubernetes-old fixes the following issues: This ships kubernetes-client version 1.30.12. (jsc#PED-11106) * Find the full changelog: https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.30.md#v13012 ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Containers Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Containers-15-SP7-2025-1798=1 ## Package List: * Containers Module 15-SP7 (aarch64 ppc64le s390x x86_64) * kubernetes1.30-client-1.30.12-150600.13.7.1 * kubernetes1.30-client-common-1.30.12-150600.13.7.1 * Containers Module 15-SP7 (noarch) * kubernetes1.30-client-bash-completion-1.30.12-150600.13.7.1 ## References: * https://jira.suse.com/browse/PED-11106 -------------- next part -------------- An HTML attachment was scrubbed... URL: From null at suse.de Fri Jul 4 08:30:05 2025 From: null at suse.de (SLE-UPDATES) Date: Fri, 04 Jul 2025 08:30:05 -0000 Subject: SUSE-RU-2025:02221-1: moderate: Recommended update for ccache Message-ID: <175161780567.31370.2520795426363318790@smelt2.prg2.suse.org> # Recommended update for ccache Announcement ID: SUSE-RU-2025:02221-1 Release Date: 2025-07-04T07:57:42Z Rating: moderate References: * bsc#1239963 Affected Products: * Development Tools Module 15-SP6 * Development Tools Module 15-SP7 * openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Desktop 15 SP7 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Real Time 15 SP7 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server 15 SP7 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP7 An update that has one fix can now be installed. ## Description: This update for ccache fixes the following issues: * Added BuildRequires: gcc11-PIE (bsc#1239963) ## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * Development Tools Module 15-SP7 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP7-2025-2221=1 * openSUSE Leap 15.6 zypper in -t patch SUSE-2025-2221=1 openSUSE-SLE-15.6-2025-2221=1 * Development Tools Module 15-SP6 zypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP6-2025-2221=1 ## Package List: * Development Tools Module 15-SP7 (aarch64 ppc64le s390x x86_64) * ccache-debugsource-4.9-150600.3.3.1 * ccache-debuginfo-4.9-150600.3.3.1 * ccache-4.9-150600.3.3.1 * openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64 i586) * ccache-debugsource-4.9-150600.3.3.1 * ccache-debuginfo-4.9-150600.3.3.1 * ccache-4.9-150600.3.3.1 * Development Tools Module 15-SP6 (aarch64 ppc64le s390x x86_64) * ccache-debugsource-4.9-150600.3.3.1 * ccache-debuginfo-4.9-150600.3.3.1 * ccache-4.9-150600.3.3.1 ## References: * https://bugzilla.suse.com/show_bug.cgi?id=1239963 -------------- next part -------------- An HTML attachment was scrubbed... URL: