SUSE-SU-2025:02475-1: critical: Maintenance update for Multi-Linux Manager 4.3: Server, Proxy and Retail Branch Server
SLE-UPDATES
null at suse.de
Wed Jul 23 16:36:29 UTC 2025
# Maintenance update for Multi-Linux Manager 4.3: Server, Proxy and Retail
Branch Server
Announcement ID: SUSE-SU-2025:02475-1
Release Date: 2025-07-23T12:36:59Z
Rating: critical
References:
* bsc#1157520
* bsc#1191142
* bsc#1209060
* bsc#1211373
* bsc#1213952
* bsc#1216187
* bsc#1221031
* bsc#1225740
* bsc#1230403
* bsc#1230908
* bsc#1233371
* bsc#1234608
* bsc#1236601
* bsc#1236635
* bsc#1236779
* bsc#1236810
* bsc#1236877
* bsc#1236910
* bsc#1237060
* bsc#1237082
* bsc#1237294
* bsc#1237403
* bsc#1237581
* bsc#1237694
* bsc#1237770
* bsc#1238922
* bsc#1238924
* bsc#1239102
* bsc#1239154
* bsc#1239604
* bsc#1239743
* bsc#1239826
* bsc#1239868
* bsc#1239907
* bsc#1240038
* bsc#1240386
* bsc#1240666
* bsc#1240842
* bsc#1241239
* bsc#1241286
* bsc#1241455
* bsc#1241490
* bsc#1242004
* bsc#1242030
* bsc#1242148
* bsc#1242554
* bsc#1242911
* bsc#1243239
* bsc#1243460
* bsc#1243724
* bsc#1243825
* bsc#1244065
* bsc#1244290
* bsc#1245005
* bsc#1245027
* bsc#1245222
* bsc#1245368
* bsc#1246119
* bsc#1246788
* jsc#MSQA-993
* jsc#PED-12321
Cross-References:
* CVE-2025-23392
* CVE-2025-23393
* CVE-2025-46809
* CVE-2025-46811
CVSS scores:
* CVE-2025-23392 ( SUSE ): 5.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-23392 ( SUSE ): 5.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N
* CVE-2025-23392 ( NVD ): 5.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-23392 ( NVD ): 5.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N
* CVE-2025-23393 ( SUSE ): 5.8
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
* CVE-2025-23393 ( SUSE ): 6.0 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
* CVE-2025-23393 ( NVD ): 5.7
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
* CVE-2025-23393 ( NVD ): 5.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N
* CVE-2025-46809 ( SUSE ): 6.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
* CVE-2025-46809 ( SUSE ): 5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
* CVE-2025-46811 ( SUSE ): 9.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-46811 ( SUSE ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* openSUSE Leap 15.3
* openSUSE Leap 15.4
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15
* SUSE Linux Enterprise Desktop 15 SP1
* SUSE Linux Enterprise Desktop 15 SP2
* SUSE Linux Enterprise Desktop 15 SP3
* SUSE Linux Enterprise Desktop 15 SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Desktop 15 SP7
* SUSE Linux Enterprise High Performance Computing 15
* SUSE Linux Enterprise High Performance Computing 15 SP1
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Micro 5.0
* SUSE Linux Enterprise Micro 5.1
* SUSE Linux Enterprise Micro 5.2
* SUSE Linux Enterprise Micro 5.3
* SUSE Linux Enterprise Micro 5.4
* SUSE Linux Enterprise Micro 5.5
* SUSE Linux Enterprise Real Time 15 SP1
* SUSE Linux Enterprise Real Time 15 SP2
* SUSE Linux Enterprise Real Time 15 SP3
* SUSE Linux Enterprise Real Time 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Real Time 15 SP7
* SUSE Linux Enterprise Server 15
* SUSE Linux Enterprise Server 15 SP1
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server 15 SP7
* SUSE Linux Enterprise Server for SAP Applications 15
* SUSE Linux Enterprise Server for SAP Applications 15 SP1
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP7
* SUSE Manager Client Tools for SLE 15
* SUSE Manager Client Tools for SLE Micro 5
* SUSE Manager Proxy 4.3
* SUSE Manager Proxy 4.3 Module
* SUSE Manager Retail Branch Server 4.3
* SUSE Manager Server 4.3
* SUSE Manager Server 4.3 Module
An update that solves four vulnerabilities, contains two features and has 55
security fixes can now be installed.
## Security update 4.3.16 for Multi-Linux Manager Proxy and Retail Branch Server
### Description:
This update fixes the following issues:
mgr-daemon:
* Version 4.3.12-0:
* Updated translation strings
proxy-helm:
* Version 4.3.17:
* Chart rebuilt to the newest version with updated dependencies for SUSE
Manager 4.3.16
proxy-httpd-image:
* Version 4.3.18:
* Image rebuilt to the newest version with updated dependencies for SUSE
Manager 4.3.16
proxy-salt-broker-image:
* Version 4.3.18:
* Image rebuilt to the newest version with updated dependencies for SUSE
Manager 4.3.16
proxy-squid-image:
* Version 4.3.18:
* Image rebuilt to the newest version with updated dependencies for SUSE
Manager 4.3.16
proxy-ssh-image:
* Version 4.3.18:
* Image rebuilt to the newest version with updated dependencies for SUSE
Manager 4.3.16
proxy-tftpd-image:
* Version 4.3.18:
* Image rebuilt to the newest version with updated dependencies for SUSE
Manager 4.3.16
spacecmd:
* Version 4.3.31-0:
* Improved translation update process
spacewalk-backend:
* version 4.3.33-0
* Security issues fixed:
* CVE-2025-46809: Do not expose HTTP Proxy password when breaking URL format (bsc#1245005)
* Other bugs fixed:
* Enhance permissions for reposync zypper cache
* Version 4.3.32-0:
* Removed python3-simplejson use in spacewalk-repo-sync (bsc#1236635)
* Improved translation update process
* Make reposync allow commas as part of HTTP Proxy password (bsc#1243460)
* Removed bootloader linux and initrd files from spacewalk-debug
* Use libzypp's Curl2 backend during reposync (bsc#1245222)
spacewalk-client-tools:
* Version 4.3.23-0:
* Improved translation update process
spacewalk-proxy-installer:
* Version 4.3.12-0:
* Fixed configure-proxy not updating squid size correctly after switch to aufs
backend
spacewalk-web:
* Version 4.3.45-0:
* Security issues fixed:
* CVE-2025-23392, CVE-2025-23393: Filter user input in systems list page (bsc#1239826, bsc#1240386)
* Other bugs fixed:
* Fix: Filters of type Product Temporary Fix cannot be created (bsc#1238922)
* Better handling of system list filtering (bsc#1242004)
* Improve translation update process
supportutils-plugin-susemanager-client, supportutils-plugin-susemanager-proxy:
* Version 4.3.5-0:
* Backported supportutils plugin resource functions, replacing the removed
supportutils scplugin.rc functions with those provided by supportconfig.rc
susemanager-build-keys:
* Changed keys to use SHA256 UIDs instead of SHA1 (bsc#1237294, bsc#1236779,
jsc#PED-12321)
* Renamed `build-alp-09d9ea69-645b99ce.asc` to `build-alp-09d9ea69.asc`
* Renamed `gpg-pubkey-3fa1d6ce-63c9481c.asc` to `gpg-pubkey-3fa1d6ce.asc`
* Adjusted `suse_ptf_key_2023.asc` and `suse_ptf_key.asc`
susemanager-tftpsync-recv:
* Version 4.3.10-0:
* Fixed possible errors replacing IP addresses and FQDNs for proxies on PXE
and Grub files (bsc#1236601)
uyuni-proxy-systemd-services:
* Version 4.3.16-0:
* Updated to SUSE Manager 4.3.16
How to apply this update:
1. Log in as root user to the SUSE Multi-Linux Manager Proxy or Retail Branch Server.
2. Stop the proxy service: `spacewalk-proxy stop`
3. Apply the patch using either zypper patch or YaST Online Update.
4. Start the Spacewalk service: `spacewalk-proxy start`
## Security update 4.3.16 for Multi-Linux Manager Server
### Description:
This update fixes the following issues:
cobbler:
* Prevent crash during Cobbler startup on NFS environments (bsc#1240666)
* Synchronize cobbler add and sync actions (bsc#1233371)
* Exclude disabled profiles from buildiso gen (bsc#1230908)
grafana-formula:
* Version 4.3.0:
* Added SUSE Linux Enterprise Server 15 SP7 to the supported versions
(bsc#1245368)
* Dropped old unsupported SUSE versions from the supported versions list
* Migrated from deprecated Graph panels to new timeseries panels
inter-server-sync:
* Version 0.3.7-0:
* Added SSL signed export and import validation (bsc#1241239)
* Version 0.3.6-0:
* Included /var/log/hub (bsc#1243724)
spacecmd:
* Version 4.3.31-0:
* Improved translation update process
spacewalk-admin:
* Version 4.3.33-0
* Security issues fixed:
* CVE-2025-46809: Do not expose HTTP Proxy password when breaking URL format (bsc#1245005)
* Other bugs fixed:
* Enhance permissions for reposync zypper cache
* Version 4.3.14-0:
* Added support for environment variables in rhn-config-satellite
(bsc#1242148)
* mgr-monitoring-ctl: avoid possible errors due to non-ascii characters
(bsc#1242030)
spacewalk-backend:
* Version 4.3.32-0
* Removed python3-simplejson use in spacewalk-repo-sync (bsc#1236635)
* Improved translation update process
* Make reposync allow commas as part of HTTP Proxy password (bsc#1243460)
* Removed bootloader linux and initrd files from spacewalk-debug
* Use libzypp's Curl2 backend during reposync (bsc#1245222)
spacewalk-client-tools:
* Version 4.3.23-0
* Improved translation update process
spacewalk-config:
* Version 4.3.16-0
* Allow passing environment variables to rhn-config-satellite (bsc#1242148)
spacewalk-java:
* Version 4.3.87-0
* Security issues fixed:
* CVE-2025-46811: Clean up stale sessions on websocket open (bsc#1246119)
* Version 4.3.86-0:
* Security issues fixed:
* CVE-2025-23393: Filter user input in systems list page (bsc#1240386)
* Other bugs fixed:
* Fixed tooltip text for icons in the patches list (bsc#1234608)
* Fixed openscap audit is running immediately even when scheduled for next days (bsc#1239743)
* Adds calling a highstate in the API for actionchain (bsc#1157520)
* Fixed behavior of `reboot_suggested` or `restart_suggested` by API (bsc#1236910)
* Fixed action chain scheduled within SSM creates no link for the new action chain (bsc#1243825)
* Fixed severity levels missing in API output of errata.getDetails (bsc#1240038)
* Fixed internal server error when accessing groups in activation keys (bsc#1237581)
* Fixed http_proxy_password stored as clear text in /var/log/messages (bsc#1242148)
* Fixed `manage errors` in user-defined pillars (bsc#1230403)
* In CLM live-patching template form, show kernel versions from base product as well (bsc#1239907)
* Improved handling of system list filtering (bsc#1242004)
* Fixed issue preventing OES products from showing up (bsc#1237082)
* Fixed config channels not following priority in highstate (bsc#1237694)
* Improved performance when changing channels on multiple system through SSM (bsc#1239154)
* Fixed package locking for packages not available anymore in the assigned repositories (bsc#1236877)
* Do not show Vendor Advisory link for SL-Micro 6.0 and 6.1 products (bsc#1237770)
* Fixed API namespace for AdminPaygHandler
* Fixed CLM channel name definition (bsc#1239868)
* Fixed XMLRPC API endpoint updateRepoSsl repository property
* Fixed API documentation for system config listFiles (bsc#1245027)
* Fixed inconsistency in task schedule deactivation and add activation capability (bsc#1225740)
spacewalk-utils:
* Version 4.3.24-0:
* Removed spacewalk-clone-by-date dependency on python3-simplejson
spacewalk-web:
* Version 4.3.45-0:
* Security issues fixed:
* CVE-2025-23392, CVE-2025-23393: Filter user input in systems list page (bsc#1239826, bsc#1240386)
* Other bugs fixed:
* Fix: Filters of type Product Temporary Fix cannot be created (bsc#1238922)
* Improved handling of system list filtering (bsc#1242004)
* Improved translation update process
subscription-matcher:
* Version 0.40:
* Fixed integer overflow which can cause a division by zero error
(bsc#1243239)
* Version 0.39:
* Fixed the wrong matching for 2 Sockets or 2 VMs subscription string
(bsc#1238924)
* Fixed logging issues
* Updated runtime dependencies
supportutils-plugin-susemanager:
* Version 4.3.15-0:
* Backported supportutils plugin resource functions, replacing the removed
supportutils `scplugin.rc` functions with those provided by
`supportconfig.rc`
susemanager:
* Version 4.3.42-0:
* Fixed bootstrap repository definition for SLE 15 SP7 and support only
bootstrapping with salt-bundle (bsc#1246788)
* Version 4.3.41-0:
* Improved translation update process
susemanager-build-keys:
* Changed keys to use SHA256 UIDs instead of SHA1 (bsc#1237294, bsc#1236779,
jsc#PED-12321)
* Renamed `build-alp-09d9ea69-645b99ce.asc` to `build-alp-09d9ea69.asc`
* Renamed `gpg-pubkey-3fa1d6ce-63c9481c.asc` to `gpg-pubkey-3fa1d6ce.asc`
* Adjusted `suse_ptf_key_2023.asc` and `suse_ptf_key.asc`
susemanager-docs_en:
* SUSE Manager 4.3.16 Update
* Added information about missing monitoring package to Administration Guide
(bsc#1191142)
* Added missing script parameters in Installation and Upgrade Guide
(bsc#1216187)
* Added reference to the list of supported SCAP profiles (bsc#1213952)
* Extended information in an admonition in Specialized Guides (bsc#1221031)
* Added missing 4505 and 4506 Salt ports in network requirements in
Installation and Upgrade Guide
* Removed references to the methods no longer used from Reference Guide
(bsc#1209060)
* Fixed Python script in Administration Guide (bsc#1244290)
* Extended troubleshooting section with a reposync example (bsc#1211373)
* Added section about enabling SUSE Manager 4.3 LTS in Installation and
Upgrade Guide
* Added missing Task Schedules to the list and updated the Task Schedule page
to reflect changes—now only allowing disabling of tasks, not deletion in the
Administration Guide
* Added SUSE Linux Enterprise 15 SP7 as a supported client
* Fixed asciidoc menu macro issue with duplicate css class, menu items now
display correctly
* Added note about autoyast profiles not having passwords
* Added details about the behavior of the rescheduled failed action
(bsc#1244065)
* Updated Network Requirement section to add settings for server configuration
behind HTTP OSI level 7 Proxy
* Clarified that NFS with Cobbler is not supported (bsc#1240666)
* Fixed a URL link in Common Workflows Guide (bsc#1242911)
* Documented uptodate action in Common Workflows Guide as background
information
* Documented renaming the journal folder when changing machine ID in
Administration Guide (bsc#1241286)
* Fixed removing Salt bundle client procedure in Client Configuration Guide
* Added referenced target and remove obsolete section in Common Workflows
(bsc#1240842, bsc#1242554)
* Fixed GPG key import command in Administration Guide (bsc#1239102)
* Added java.smtp_server parameter for mail configuration in Administration
Guide (bsc#1241490)
* Added system_listeventhistory to spacecmd reference in Reference Guide
(bsc#1239604)
* Added links to supported features tables for third party operating systems
(bsc#1236810)
* Fixed typo in Installation and Upgrade Guide (bsc#1237403)
* Added note to limit Squid's cache_dir size to 60% of available free space in
Installation and Upgrade Guide
susemanager-schema:
* Version 4.3.29-0:
* Fixed typo in OES 24.4 channel definition
susemanager-sls:
* Version 4.3.47-0:
* Change uptodate recurring action to use dist-upgrade instead of upgrade for
Debian systems (bsc#1237060)
* Adjust SLS files for SUSE Linux Enterprise SP7 and other systems running
higher Python versions
* Optimize SAP module to prevent high IO workload (bsc#1241455)
susemanager-sync-data:
* Version 4.3.24-0:
* Fixed typo in OES 24.4 product definition
How to apply this update:
1. Log in as root user to the SUSE Multi-Linux Manager Server.
2. Stop the Spacewalk service: `spacewalk-service stop`
3. Apply the patch using either zypper patch or YaST Online Update.
4. Start the Spacewalk service: `spacewalk-service start`
## Recommended update for SUSE Manager Client Tools
### Description:
This update fixes the following issues:
uyuni-proxy-systemd-services:
* Version 4.3.16-0:
* Updated to SUSE Manager 4.3.16
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Manager Proxy 4.3 Module
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2025-2475=1
* SUSE Manager Server 4.3 Module
zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2025-2475=1
* SUSE Manager Client Tools for SLE 15
zypper in -t patch SUSE-SLE-Manager-Tools-15-2025-2475=1
* SUSE Manager Client Tools for SLE Micro 5
zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2025-2475=1
## Package List:
* SUSE Manager Proxy 4.3 Module (noarch)
* spacewalk-proxy-installer-4.3.12-150400.3.9.2
* uyuni-proxy-systemd-services-4.3.16-150000.1.33.1
* python3-spacewalk-check-4.3.23-150400.3.39.3
* supportutils-plugin-susemanager-client-4.3.5-150400.3.9.2
* spacecmd-4.3.31-150400.3.48.2
* spacewalk-base-minimal-4.3.45-150400.3.60.3
* spacewalk-client-setup-4.3.23-150400.3.39.3
* mgr-daemon-4.3.12-150400.3.24.2
* spacewalk-client-tools-4.3.23-150400.3.39.3
* susemanager-build-keys-15.4.11-150400.3.35.2
* susemanager-tftpsync-recv-4.3.10-150400.3.12.2
* spacewalk-check-4.3.23-150400.3.39.3
* python3-spacewalk-client-setup-4.3.23-150400.3.39.3
* supportutils-plugin-susemanager-proxy-4.3.5-150400.3.9.2
* spacewalk-backend-4.3.33-150400.3.55.2
* spacewalk-base-minimal-config-4.3.45-150400.3.60.3
* python3-spacewalk-client-tools-4.3.23-150400.3.39.3
* susemanager-build-keys-web-15.4.11-150400.3.35.2
* SUSE Manager Server 4.3 Module (noarch)
* spacewalk-backend-sql-postgresql-4.3.33-150400.3.55.2
* spacewalk-backend-4.3.33-150400.3.55.2
* subscription-matcher-0.40-150400.3.28.2
* susemanager-sync-data-4.3.24-150400.3.44.2
* spacewalk-utils-4.3.24-150400.3.35.4
* spacewalk-backend-applet-4.3.33-150400.3.55.2
* spacewalk-backend-server-4.3.33-150400.3.55.2
* spacewalk-base-minimal-4.3.45-150400.3.60.3
* uyuni-config-modules-4.3.47-150400.3.61.4
* spacewalk-backend-config-files-common-4.3.33-150400.3.55.2
* spacewalk-client-tools-4.3.23-150400.3.39.3
* spacewalk-backend-sql-4.3.33-150400.3.55.2
* spacewalk-java-4.3.87-150400.3.110.2
* susemanager-sls-4.3.47-150400.3.61.4
* spacewalk-html-4.3.45-150400.3.60.3
* spacewalk-java-config-4.3.87-150400.3.110.2
* spacewalk-config-4.3.16-150400.3.24.2
* spacewalk-utils-extras-4.3.24-150400.3.35.4
* susemanager-build-keys-15.4.11-150400.3.35.2
* spacecmd-4.3.31-150400.3.48.2
* spacewalk-taskomatic-4.3.87-150400.3.110.2
* susemanager-schema-4.3.29-150400.3.51.2
* spacewalk-admin-4.3.14-150400.3.15.3
* susemanager-docs_en-pdf-4.3.16-150400.9.72.2
* cobbler-3.3.3-150400.5.58.3
* spacewalk-base-4.3.45-150400.3.60.3
* susemanager-docs_en-4.3.16-150400.9.72.2
* spacewalk-java-postgresql-4.3.87-150400.3.110.2
* spacewalk-java-lib-4.3.87-150400.3.110.2
* spacewalk-backend-package-push-server-4.3.33-150400.3.55.2
* susemanager-build-keys-web-15.4.11-150400.3.35.2
* spacewalk-backend-tools-4.3.33-150400.3.55.2
* supportutils-plugin-susemanager-4.3.15-150400.3.33.2
* spacewalk-backend-iss-export-4.3.33-150400.3.55.2
* spacewalk-backend-config-files-4.3.33-150400.3.55.2
* susemanager-schema-utility-4.3.29-150400.3.51.2
* spacewalk-backend-xml-export-libs-4.3.33-150400.3.55.2
* spacewalk-backend-xmlrpc-4.3.33-150400.3.55.2
* spacewalk-backend-app-4.3.33-150400.3.55.2
* spacewalk-backend-config-files-tool-4.3.33-150400.3.55.2
* spacewalk-base-minimal-config-4.3.45-150400.3.60.3
* spacewalk-backend-iss-4.3.33-150400.3.55.2
* python3-spacewalk-client-tools-4.3.23-150400.3.39.3
* grafana-formula-4.3.0-150400.3.24.2
* SUSE Manager Server 4.3 Module (ppc64le s390x x86_64)
* inter-server-sync-0.3.7-150400.3.39.4
* susemanager-4.3.42-150400.3.66.1
* inter-server-sync-debuginfo-0.3.7-150400.3.39.4
* susemanager-tools-4.3.42-150400.3.66.1
* SUSE Manager Client Tools for SLE 15 (noarch)
* uyuni-proxy-systemd-services-4.3.16-150000.1.33.1
* SUSE Manager Client Tools for SLE Micro 5 (noarch)
* uyuni-proxy-systemd-services-4.3.16-150000.1.33.1
## References:
* https://www.suse.com/security/cve/CVE-2025-23392.html
* https://www.suse.com/security/cve/CVE-2025-23393.html
* https://www.suse.com/security/cve/CVE-2025-46809.html
* https://www.suse.com/security/cve/CVE-2025-46811.html
* https://bugzilla.suse.com/show_bug.cgi?id=1157520
* https://bugzilla.suse.com/show_bug.cgi?id=1191142
* https://bugzilla.suse.com/show_bug.cgi?id=1209060
* https://bugzilla.suse.com/show_bug.cgi?id=1211373
* https://bugzilla.suse.com/show_bug.cgi?id=1213952
* https://bugzilla.suse.com/show_bug.cgi?id=1216187
* https://bugzilla.suse.com/show_bug.cgi?id=1221031
* https://bugzilla.suse.com/show_bug.cgi?id=1225740
* https://bugzilla.suse.com/show_bug.cgi?id=1230403
* https://bugzilla.suse.com/show_bug.cgi?id=1230908
* https://bugzilla.suse.com/show_bug.cgi?id=1233371
* https://bugzilla.suse.com/show_bug.cgi?id=1234608
* https://bugzilla.suse.com/show_bug.cgi?id=1236601
* https://bugzilla.suse.com/show_bug.cgi?id=1236635
* https://bugzilla.suse.com/show_bug.cgi?id=1236779
* https://bugzilla.suse.com/show_bug.cgi?id=1236810
* https://bugzilla.suse.com/show_bug.cgi?id=1236877
* https://bugzilla.suse.com/show_bug.cgi?id=1236910
* https://bugzilla.suse.com/show_bug.cgi?id=1237060
* https://bugzilla.suse.com/show_bug.cgi?id=1237082
* https://bugzilla.suse.com/show_bug.cgi?id=1237294
* https://bugzilla.suse.com/show_bug.cgi?id=1237403
* https://bugzilla.suse.com/show_bug.cgi?id=1237581
* https://bugzilla.suse.com/show_bug.cgi?id=1237694
* https://bugzilla.suse.com/show_bug.cgi?id=1237770
* https://bugzilla.suse.com/show_bug.cgi?id=1238922
* https://bugzilla.suse.com/show_bug.cgi?id=1238924
* https://bugzilla.suse.com/show_bug.cgi?id=1239102
* https://bugzilla.suse.com/show_bug.cgi?id=1239154
* https://bugzilla.suse.com/show_bug.cgi?id=1239604
* https://bugzilla.suse.com/show_bug.cgi?id=1239743
* https://bugzilla.suse.com/show_bug.cgi?id=1239826
* https://bugzilla.suse.com/show_bug.cgi?id=1239868
* https://bugzilla.suse.com/show_bug.cgi?id=1239907
* https://bugzilla.suse.com/show_bug.cgi?id=1240038
* https://bugzilla.suse.com/show_bug.cgi?id=1240386
* https://bugzilla.suse.com/show_bug.cgi?id=1240666
* https://bugzilla.suse.com/show_bug.cgi?id=1240842
* https://bugzilla.suse.com/show_bug.cgi?id=1241239
* https://bugzilla.suse.com/show_bug.cgi?id=1241286
* https://bugzilla.suse.com/show_bug.cgi?id=1241455
* https://bugzilla.suse.com/show_bug.cgi?id=1241490
* https://bugzilla.suse.com/show_bug.cgi?id=1242004
* https://bugzilla.suse.com/show_bug.cgi?id=1242030
* https://bugzilla.suse.com/show_bug.cgi?id=1242148
* https://bugzilla.suse.com/show_bug.cgi?id=1242554
* https://bugzilla.suse.com/show_bug.cgi?id=1242911
* https://bugzilla.suse.com/show_bug.cgi?id=1243239
* https://bugzilla.suse.com/show_bug.cgi?id=1243460
* https://bugzilla.suse.com/show_bug.cgi?id=1243724
* https://bugzilla.suse.com/show_bug.cgi?id=1243825
* https://bugzilla.suse.com/show_bug.cgi?id=1244065
* https://bugzilla.suse.com/show_bug.cgi?id=1244290
* https://bugzilla.suse.com/show_bug.cgi?id=1245005
* https://bugzilla.suse.com/show_bug.cgi?id=1245027
* https://bugzilla.suse.com/show_bug.cgi?id=1245222
* https://bugzilla.suse.com/show_bug.cgi?id=1245368
* https://bugzilla.suse.com/show_bug.cgi?id=1246119
* https://bugzilla.suse.com/show_bug.cgi?id=1246788
* https://jira.suse.com/browse/MSQA-993
* https://jira.suse.com/browse/PED-12321
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20250723/7da7ade3/attachment.htm>
More information about the sle-updates
mailing list