SUSE-SU-2025:02475-1: critical: Maintenance update for Multi-Linux Manager 4.3: Server, Proxy and Retail Branch Server

SLE-UPDATES null at suse.de
Wed Jul 23 16:36:29 UTC 2025



# Maintenance update for Multi-Linux Manager 4.3: Server, Proxy and Retail
Branch Server

Announcement ID: SUSE-SU-2025:02475-1  
Release Date: 2025-07-23T12:36:59Z  
Rating: critical  
References:

  * bsc#1157520
  * bsc#1191142
  * bsc#1209060
  * bsc#1211373
  * bsc#1213952
  * bsc#1216187
  * bsc#1221031
  * bsc#1225740
  * bsc#1230403
  * bsc#1230908
  * bsc#1233371
  * bsc#1234608
  * bsc#1236601
  * bsc#1236635
  * bsc#1236779
  * bsc#1236810
  * bsc#1236877
  * bsc#1236910
  * bsc#1237060
  * bsc#1237082
  * bsc#1237294
  * bsc#1237403
  * bsc#1237581
  * bsc#1237694
  * bsc#1237770
  * bsc#1238922
  * bsc#1238924
  * bsc#1239102
  * bsc#1239154
  * bsc#1239604
  * bsc#1239743
  * bsc#1239826
  * bsc#1239868
  * bsc#1239907
  * bsc#1240038
  * bsc#1240386
  * bsc#1240666
  * bsc#1240842
  * bsc#1241239
  * bsc#1241286
  * bsc#1241455
  * bsc#1241490
  * bsc#1242004
  * bsc#1242030
  * bsc#1242148
  * bsc#1242554
  * bsc#1242911
  * bsc#1243239
  * bsc#1243460
  * bsc#1243724
  * bsc#1243825
  * bsc#1244065
  * bsc#1244290
  * bsc#1245005
  * bsc#1245027
  * bsc#1245222
  * bsc#1245368
  * bsc#1246119
  * bsc#1246788
  * jsc#MSQA-993
  * jsc#PED-12321

  
Cross-References:

  * CVE-2025-23392
  * CVE-2025-23393
  * CVE-2025-46809
  * CVE-2025-46811

  
CVSS scores:

  * CVE-2025-23392 ( SUSE ):  5.7
    CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-23392 ( SUSE ):  5.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N
  * CVE-2025-23392 ( NVD ):  5.7
    CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  * CVE-2025-23392 ( NVD ):  5.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N
  * CVE-2025-23393 ( SUSE ):  5.8
    CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
  * CVE-2025-23393 ( SUSE ):  6.0 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L
  * CVE-2025-23393 ( NVD ):  5.7
    CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  * CVE-2025-23393 ( NVD ):  5.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N
  * CVE-2025-46809 ( SUSE ):  6.9
    CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
  * CVE-2025-46809 ( SUSE ):  5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
  * CVE-2025-46811 ( SUSE ):  9.3
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
  * CVE-2025-46811 ( SUSE ):  9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

  
Affected Products:

  * openSUSE Leap 15.3
  * openSUSE Leap 15.4
  * openSUSE Leap 15.5
  * openSUSE Leap 15.6
  * SUSE Linux Enterprise Desktop 15
  * SUSE Linux Enterprise Desktop 15 SP1
  * SUSE Linux Enterprise Desktop 15 SP2
  * SUSE Linux Enterprise Desktop 15 SP3
  * SUSE Linux Enterprise Desktop 15 SP4
  * SUSE Linux Enterprise Desktop 15 SP5
  * SUSE Linux Enterprise Desktop 15 SP6
  * SUSE Linux Enterprise Desktop 15 SP7
  * SUSE Linux Enterprise High Performance Computing 15
  * SUSE Linux Enterprise High Performance Computing 15 SP1
  * SUSE Linux Enterprise High Performance Computing 15 SP2
  * SUSE Linux Enterprise High Performance Computing 15 SP3
  * SUSE Linux Enterprise High Performance Computing 15 SP4
  * SUSE Linux Enterprise High Performance Computing 15 SP5
  * SUSE Linux Enterprise Micro 5.0
  * SUSE Linux Enterprise Micro 5.1
  * SUSE Linux Enterprise Micro 5.2
  * SUSE Linux Enterprise Micro 5.3
  * SUSE Linux Enterprise Micro 5.4
  * SUSE Linux Enterprise Micro 5.5
  * SUSE Linux Enterprise Real Time 15 SP1
  * SUSE Linux Enterprise Real Time 15 SP2
  * SUSE Linux Enterprise Real Time 15 SP3
  * SUSE Linux Enterprise Real Time 15 SP4
  * SUSE Linux Enterprise Real Time 15 SP5
  * SUSE Linux Enterprise Real Time 15 SP6
  * SUSE Linux Enterprise Real Time 15 SP7
  * SUSE Linux Enterprise Server 15
  * SUSE Linux Enterprise Server 15 SP1
  * SUSE Linux Enterprise Server 15 SP2
  * SUSE Linux Enterprise Server 15 SP3
  * SUSE Linux Enterprise Server 15 SP4
  * SUSE Linux Enterprise Server 15 SP5
  * SUSE Linux Enterprise Server 15 SP6
  * SUSE Linux Enterprise Server 15 SP7
  * SUSE Linux Enterprise Server for SAP Applications 15
  * SUSE Linux Enterprise Server for SAP Applications 15 SP1
  * SUSE Linux Enterprise Server for SAP Applications 15 SP2
  * SUSE Linux Enterprise Server for SAP Applications 15 SP3
  * SUSE Linux Enterprise Server for SAP Applications 15 SP4
  * SUSE Linux Enterprise Server for SAP Applications 15 SP5
  * SUSE Linux Enterprise Server for SAP Applications 15 SP6
  * SUSE Linux Enterprise Server for SAP Applications 15 SP7
  * SUSE Manager Client Tools for SLE 15
  * SUSE Manager Client Tools for SLE Micro 5
  * SUSE Manager Proxy 4.3
  * SUSE Manager Proxy 4.3 Module
  * SUSE Manager Retail Branch Server 4.3
  * SUSE Manager Server 4.3
  * SUSE Manager Server 4.3 Module

  
  
An update that solves four vulnerabilities, contains two features and has 55
security fixes can now be installed.

## Security update 4.3.16 for Multi-Linux Manager Proxy and Retail Branch Server

### Description:

This update fixes the following issues:

mgr-daemon:

  * Version 4.3.12-0:
  * Updated translation strings

proxy-helm:

  * Version 4.3.17:
  * Chart rebuilt to the newest version with updated dependencies for SUSE
    Manager 4.3.16

proxy-httpd-image:

  * Version 4.3.18:
  * Image rebuilt to the newest version with updated dependencies for SUSE
    Manager 4.3.16

proxy-salt-broker-image:

  * Version 4.3.18:
  * Image rebuilt to the newest version with updated dependencies for SUSE
    Manager 4.3.16

proxy-squid-image:

  * Version 4.3.18:
  * Image rebuilt to the newest version with updated dependencies for SUSE
    Manager 4.3.16

proxy-ssh-image:

  * Version 4.3.18:
  * Image rebuilt to the newest version with updated dependencies for SUSE
    Manager 4.3.16

proxy-tftpd-image:

  * Version 4.3.18:
  * Image rebuilt to the newest version with updated dependencies for SUSE
    Manager 4.3.16

spacecmd:

  * Version 4.3.31-0:
  * Improved translation update process

spacewalk-backend:

  * version 4.3.33-0
  * Security issues fixed:
    * CVE-2025-46809: Do not expose HTTP Proxy password when breaking URL format (bsc#1245005)
  * Other bugs fixed:
    * Enhance permissions for reposync zypper cache
  * Version 4.3.32-0:
  * Removed python3-simplejson use in spacewalk-repo-sync (bsc#1236635)
  * Improved translation update process
  * Make reposync allow commas as part of HTTP Proxy password (bsc#1243460)
  * Removed bootloader linux and initrd files from spacewalk-debug
  * Use libzypp's Curl2 backend during reposync (bsc#1245222)

spacewalk-client-tools:

  * Version 4.3.23-0:
  * Improved translation update process

spacewalk-proxy-installer:

  * Version 4.3.12-0:
  * Fixed configure-proxy not updating squid size correctly after switch to aufs
    backend

spacewalk-web:

  * Version 4.3.45-0:
  * Security issues fixed:
    * CVE-2025-23392, CVE-2025-23393: Filter user input in systems list page (bsc#1239826, bsc#1240386)
  * Other bugs fixed:
    * Fix: Filters of type Product Temporary Fix cannot be created (bsc#1238922)
    * Better handling of system list filtering (bsc#1242004)
    * Improve translation update process

supportutils-plugin-susemanager-client, supportutils-plugin-susemanager-proxy:

  * Version 4.3.5-0:
  * Backported supportutils plugin resource functions, replacing the removed
    supportutils scplugin.rc functions with those provided by supportconfig.rc

susemanager-build-keys:

  * Changed keys to use SHA256 UIDs instead of SHA1 (bsc#1237294, bsc#1236779,
    jsc#PED-12321)
  * Renamed `build-alp-09d9ea69-645b99ce.asc` to `build-alp-09d9ea69.asc`
  * Renamed `gpg-pubkey-3fa1d6ce-63c9481c.asc` to `gpg-pubkey-3fa1d6ce.asc`
  * Adjusted `suse_ptf_key_2023.asc` and `suse_ptf_key.asc`

susemanager-tftpsync-recv:

  * Version 4.3.10-0:
  * Fixed possible errors replacing IP addresses and FQDNs for proxies on PXE
    and Grub files (bsc#1236601)

uyuni-proxy-systemd-services:

  * Version 4.3.16-0:
  * Updated to SUSE Manager 4.3.16

How to apply this update:

  1. Log in as root user to the SUSE Multi-Linux Manager Proxy or Retail Branch Server.
  2. Stop the proxy service: `spacewalk-proxy stop`
  3. Apply the patch using either zypper patch or YaST Online Update.
  4. Start the Spacewalk service: `spacewalk-proxy start`

## Security update 4.3.16 for Multi-Linux Manager Server

### Description:

This update fixes the following issues:

cobbler:

  * Prevent crash during Cobbler startup on NFS environments (bsc#1240666)
  * Synchronize cobbler add and sync actions (bsc#1233371)
  * Exclude disabled profiles from buildiso gen (bsc#1230908)

grafana-formula:

  * Version 4.3.0:
  * Added SUSE Linux Enterprise Server 15 SP7 to the supported versions
    (bsc#1245368)
  * Dropped old unsupported SUSE versions from the supported versions list
  * Migrated from deprecated Graph panels to new timeseries panels

inter-server-sync:

  * Version 0.3.7-0:
  * Added SSL signed export and import validation (bsc#1241239)
  * Version 0.3.6-0:
  * Included /var/log/hub (bsc#1243724)

spacecmd:

  * Version 4.3.31-0:
  * Improved translation update process

spacewalk-admin:

  * Version 4.3.33-0
  * Security issues fixed:
    * CVE-2025-46809: Do not expose HTTP Proxy password when breaking URL format (bsc#1245005)
  * Other bugs fixed:
    * Enhance permissions for reposync zypper cache
  * Version 4.3.14-0:
  * Added support for environment variables in rhn-config-satellite
    (bsc#1242148)
  * mgr-monitoring-ctl: avoid possible errors due to non-ascii characters
    (bsc#1242030)

spacewalk-backend:

  * Version 4.3.32-0
  * Removed python3-simplejson use in spacewalk-repo-sync (bsc#1236635)
  * Improved translation update process
  * Make reposync allow commas as part of HTTP Proxy password (bsc#1243460)
  * Removed bootloader linux and initrd files from spacewalk-debug
  * Use libzypp's Curl2 backend during reposync (bsc#1245222)

spacewalk-client-tools:

  * Version 4.3.23-0
  * Improved translation update process

spacewalk-config:

  * Version 4.3.16-0
  * Allow passing environment variables to rhn-config-satellite (bsc#1242148)

spacewalk-java:

  * Version 4.3.87-0
  * Security issues fixed:
    * CVE-2025-46811: Clean up stale sessions on websocket open (bsc#1246119)
  * Version 4.3.86-0:
  * Security issues fixed:
    * CVE-2025-23393: Filter user input in systems list page (bsc#1240386)
  * Other bugs fixed:
    * Fixed tooltip text for icons in the patches list (bsc#1234608)
    * Fixed openscap audit is running immediately even when scheduled for next days (bsc#1239743)
    * Adds calling a highstate in the API for actionchain (bsc#1157520)
    * Fixed behavior of `reboot_suggested` or `restart_suggested` by API (bsc#1236910)
    * Fixed action chain scheduled within SSM creates no link for the new action chain (bsc#1243825)
    * Fixed severity levels missing in API output of errata.getDetails (bsc#1240038)
    * Fixed internal server error when accessing groups in activation keys (bsc#1237581)
    * Fixed http_proxy_password stored as clear text in /var/log/messages (bsc#1242148)
    * Fixed `manage errors` in user-defined pillars (bsc#1230403)
    * In CLM live-patching template form, show kernel versions from base product as well (bsc#1239907)
    * Improved handling of system list filtering (bsc#1242004)
    * Fixed issue preventing OES products from showing up (bsc#1237082)
    * Fixed config channels not following priority in highstate (bsc#1237694)
    * Improved performance when changing channels on multiple system through SSM (bsc#1239154)
    * Fixed package locking for packages not available anymore in the assigned repositories (bsc#1236877)
    * Do not show Vendor Advisory link for SL-Micro 6.0 and 6.1 products (bsc#1237770)
    * Fixed API namespace for AdminPaygHandler
    * Fixed CLM channel name definition (bsc#1239868)
    * Fixed XMLRPC API endpoint updateRepoSsl repository property
    * Fixed API documentation for system config listFiles (bsc#1245027)
    * Fixed inconsistency in task schedule deactivation and add activation capability (bsc#1225740)

spacewalk-utils:

  * Version 4.3.24-0:
  * Removed spacewalk-clone-by-date dependency on python3-simplejson

spacewalk-web:

  * Version 4.3.45-0:
  * Security issues fixed:
    * CVE-2025-23392, CVE-2025-23393: Filter user input in systems list page (bsc#1239826, bsc#1240386)
  * Other bugs fixed:
    * Fix: Filters of type Product Temporary Fix cannot be created (bsc#1238922)
    * Improved handling of system list filtering (bsc#1242004)
    * Improved translation update process

subscription-matcher:

  * Version 0.40:
  * Fixed integer overflow which can cause a division by zero error
    (bsc#1243239)
  * Version 0.39:
  * Fixed the wrong matching for 2 Sockets or 2 VMs subscription string
    (bsc#1238924)
  * Fixed logging issues
  * Updated runtime dependencies

supportutils-plugin-susemanager:

  * Version 4.3.15-0:
  * Backported supportutils plugin resource functions, replacing the removed
    supportutils `scplugin.rc` functions with those provided by
    `supportconfig.rc`

susemanager:

  * Version 4.3.42-0:
  * Fixed bootstrap repository definition for SLE 15 SP7 and support only
    bootstrapping with salt-bundle (bsc#1246788)
  * Version 4.3.41-0:
  * Improved translation update process

susemanager-build-keys:

  * Changed keys to use SHA256 UIDs instead of SHA1 (bsc#1237294, bsc#1236779,
    jsc#PED-12321)
  * Renamed `build-alp-09d9ea69-645b99ce.asc` to `build-alp-09d9ea69.asc`
  * Renamed `gpg-pubkey-3fa1d6ce-63c9481c.asc` to `gpg-pubkey-3fa1d6ce.asc`
  * Adjusted `suse_ptf_key_2023.asc` and `suse_ptf_key.asc`

susemanager-docs_en:

  * SUSE Manager 4.3.16 Update
  * Added information about missing monitoring package to Administration Guide
    (bsc#1191142)
  * Added missing script parameters in Installation and Upgrade Guide
    (bsc#1216187)
  * Added reference to the list of supported SCAP profiles (bsc#1213952)
  * Extended information in an admonition in Specialized Guides (bsc#1221031)
  * Added missing 4505 and 4506 Salt ports in network requirements in
    Installation and Upgrade Guide
  * Removed references to the methods no longer used from Reference Guide
    (bsc#1209060)
  * Fixed Python script in Administration Guide (bsc#1244290)
  * Extended troubleshooting section with a reposync example (bsc#1211373)
  * Added section about enabling SUSE Manager 4.3 LTS in Installation and
    Upgrade Guide
  * Added missing Task Schedules to the list and updated the Task Schedule page
    to reflect changes—now only allowing disabling of tasks, not deletion in the
    Administration Guide
  * Added SUSE Linux Enterprise 15 SP7 as a supported client
  * Fixed asciidoc menu macro issue with duplicate css class, menu items now
    display correctly
  * Added note about autoyast profiles not having passwords
  * Added details about the behavior of the rescheduled failed action
    (bsc#1244065)
  * Updated Network Requirement section to add settings for server configuration
    behind HTTP OSI level 7 Proxy
  * Clarified that NFS with Cobbler is not supported (bsc#1240666)
  * Fixed a URL link in Common Workflows Guide (bsc#1242911)
  * Documented uptodate action in Common Workflows Guide as background
    information
  * Documented renaming the journal folder when changing machine ID in
    Administration Guide (bsc#1241286)
  * Fixed removing Salt bundle client procedure in Client Configuration Guide
  * Added referenced target and remove obsolete section in Common Workflows
    (bsc#1240842, bsc#1242554)
  * Fixed GPG key import command in Administration Guide (bsc#1239102)
  * Added java.smtp_server parameter for mail configuration in Administration
    Guide (bsc#1241490)
  * Added system_listeventhistory to spacecmd reference in Reference Guide
    (bsc#1239604)
  * Added links to supported features tables for third party operating systems
    (bsc#1236810)
  * Fixed typo in Installation and Upgrade Guide (bsc#1237403)
  * Added note to limit Squid's cache_dir size to 60% of available free space in
    Installation and Upgrade Guide

susemanager-schema:

  * Version 4.3.29-0:
  * Fixed typo in OES 24.4 channel definition

susemanager-sls:

  * Version 4.3.47-0:
  * Change uptodate recurring action to use dist-upgrade instead of upgrade for
    Debian systems (bsc#1237060)
  * Adjust SLS files for SUSE Linux Enterprise SP7 and other systems running
    higher Python versions
  * Optimize SAP module to prevent high IO workload (bsc#1241455)

susemanager-sync-data:

  * Version 4.3.24-0:
  * Fixed typo in OES 24.4 product definition

How to apply this update:

  1. Log in as root user to the SUSE Multi-Linux Manager Server.
  2. Stop the Spacewalk service: `spacewalk-service stop`
  3. Apply the patch using either zypper patch or YaST Online Update.
  4. Start the Spacewalk service: `spacewalk-service start`

## Recommended update for SUSE Manager Client Tools

### Description:

This update fixes the following issues:

uyuni-proxy-systemd-services:

  * Version 4.3.16-0:
  * Updated to SUSE Manager 4.3.16

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * SUSE Manager Proxy 4.3 Module  
    zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Proxy-4.3-2025-2475=1

  * SUSE Manager Server 4.3 Module  
    zypper in -t patch SUSE-SLE-Module-SUSE-Manager-Server-4.3-2025-2475=1

  * SUSE Manager Client Tools for SLE 15  
    zypper in -t patch SUSE-SLE-Manager-Tools-15-2025-2475=1

  * SUSE Manager Client Tools for SLE Micro 5  
    zypper in -t patch SUSE-SLE-Manager-Tools-For-Micro-5-2025-2475=1

## Package List:

  * SUSE Manager Proxy 4.3 Module (noarch)
    * spacewalk-proxy-installer-4.3.12-150400.3.9.2
    * uyuni-proxy-systemd-services-4.3.16-150000.1.33.1
    * python3-spacewalk-check-4.3.23-150400.3.39.3
    * supportutils-plugin-susemanager-client-4.3.5-150400.3.9.2
    * spacecmd-4.3.31-150400.3.48.2
    * spacewalk-base-minimal-4.3.45-150400.3.60.3
    * spacewalk-client-setup-4.3.23-150400.3.39.3
    * mgr-daemon-4.3.12-150400.3.24.2
    * spacewalk-client-tools-4.3.23-150400.3.39.3
    * susemanager-build-keys-15.4.11-150400.3.35.2
    * susemanager-tftpsync-recv-4.3.10-150400.3.12.2
    * spacewalk-check-4.3.23-150400.3.39.3
    * python3-spacewalk-client-setup-4.3.23-150400.3.39.3
    * supportutils-plugin-susemanager-proxy-4.3.5-150400.3.9.2
    * spacewalk-backend-4.3.33-150400.3.55.2
    * spacewalk-base-minimal-config-4.3.45-150400.3.60.3
    * python3-spacewalk-client-tools-4.3.23-150400.3.39.3
    * susemanager-build-keys-web-15.4.11-150400.3.35.2
  * SUSE Manager Server 4.3 Module (noarch)
    * spacewalk-backend-sql-postgresql-4.3.33-150400.3.55.2
    * spacewalk-backend-4.3.33-150400.3.55.2
    * subscription-matcher-0.40-150400.3.28.2
    * susemanager-sync-data-4.3.24-150400.3.44.2
    * spacewalk-utils-4.3.24-150400.3.35.4
    * spacewalk-backend-applet-4.3.33-150400.3.55.2
    * spacewalk-backend-server-4.3.33-150400.3.55.2
    * spacewalk-base-minimal-4.3.45-150400.3.60.3
    * uyuni-config-modules-4.3.47-150400.3.61.4
    * spacewalk-backend-config-files-common-4.3.33-150400.3.55.2
    * spacewalk-client-tools-4.3.23-150400.3.39.3
    * spacewalk-backend-sql-4.3.33-150400.3.55.2
    * spacewalk-java-4.3.87-150400.3.110.2
    * susemanager-sls-4.3.47-150400.3.61.4
    * spacewalk-html-4.3.45-150400.3.60.3
    * spacewalk-java-config-4.3.87-150400.3.110.2
    * spacewalk-config-4.3.16-150400.3.24.2
    * spacewalk-utils-extras-4.3.24-150400.3.35.4
    * susemanager-build-keys-15.4.11-150400.3.35.2
    * spacecmd-4.3.31-150400.3.48.2
    * spacewalk-taskomatic-4.3.87-150400.3.110.2
    * susemanager-schema-4.3.29-150400.3.51.2
    * spacewalk-admin-4.3.14-150400.3.15.3
    * susemanager-docs_en-pdf-4.3.16-150400.9.72.2
    * cobbler-3.3.3-150400.5.58.3
    * spacewalk-base-4.3.45-150400.3.60.3
    * susemanager-docs_en-4.3.16-150400.9.72.2
    * spacewalk-java-postgresql-4.3.87-150400.3.110.2
    * spacewalk-java-lib-4.3.87-150400.3.110.2
    * spacewalk-backend-package-push-server-4.3.33-150400.3.55.2
    * susemanager-build-keys-web-15.4.11-150400.3.35.2
    * spacewalk-backend-tools-4.3.33-150400.3.55.2
    * supportutils-plugin-susemanager-4.3.15-150400.3.33.2
    * spacewalk-backend-iss-export-4.3.33-150400.3.55.2
    * spacewalk-backend-config-files-4.3.33-150400.3.55.2
    * susemanager-schema-utility-4.3.29-150400.3.51.2
    * spacewalk-backend-xml-export-libs-4.3.33-150400.3.55.2
    * spacewalk-backend-xmlrpc-4.3.33-150400.3.55.2
    * spacewalk-backend-app-4.3.33-150400.3.55.2
    * spacewalk-backend-config-files-tool-4.3.33-150400.3.55.2
    * spacewalk-base-minimal-config-4.3.45-150400.3.60.3
    * spacewalk-backend-iss-4.3.33-150400.3.55.2
    * python3-spacewalk-client-tools-4.3.23-150400.3.39.3
    * grafana-formula-4.3.0-150400.3.24.2
  * SUSE Manager Server 4.3 Module (ppc64le s390x x86_64)
    * inter-server-sync-0.3.7-150400.3.39.4
    * susemanager-4.3.42-150400.3.66.1
    * inter-server-sync-debuginfo-0.3.7-150400.3.39.4
    * susemanager-tools-4.3.42-150400.3.66.1
  * SUSE Manager Client Tools for SLE 15 (noarch)
    * uyuni-proxy-systemd-services-4.3.16-150000.1.33.1
  * SUSE Manager Client Tools for SLE Micro 5 (noarch)
    * uyuni-proxy-systemd-services-4.3.16-150000.1.33.1

## References:

  * https://www.suse.com/security/cve/CVE-2025-23392.html
  * https://www.suse.com/security/cve/CVE-2025-23393.html
  * https://www.suse.com/security/cve/CVE-2025-46809.html
  * https://www.suse.com/security/cve/CVE-2025-46811.html
  * https://bugzilla.suse.com/show_bug.cgi?id=1157520
  * https://bugzilla.suse.com/show_bug.cgi?id=1191142
  * https://bugzilla.suse.com/show_bug.cgi?id=1209060
  * https://bugzilla.suse.com/show_bug.cgi?id=1211373
  * https://bugzilla.suse.com/show_bug.cgi?id=1213952
  * https://bugzilla.suse.com/show_bug.cgi?id=1216187
  * https://bugzilla.suse.com/show_bug.cgi?id=1221031
  * https://bugzilla.suse.com/show_bug.cgi?id=1225740
  * https://bugzilla.suse.com/show_bug.cgi?id=1230403
  * https://bugzilla.suse.com/show_bug.cgi?id=1230908
  * https://bugzilla.suse.com/show_bug.cgi?id=1233371
  * https://bugzilla.suse.com/show_bug.cgi?id=1234608
  * https://bugzilla.suse.com/show_bug.cgi?id=1236601
  * https://bugzilla.suse.com/show_bug.cgi?id=1236635
  * https://bugzilla.suse.com/show_bug.cgi?id=1236779
  * https://bugzilla.suse.com/show_bug.cgi?id=1236810
  * https://bugzilla.suse.com/show_bug.cgi?id=1236877
  * https://bugzilla.suse.com/show_bug.cgi?id=1236910
  * https://bugzilla.suse.com/show_bug.cgi?id=1237060
  * https://bugzilla.suse.com/show_bug.cgi?id=1237082
  * https://bugzilla.suse.com/show_bug.cgi?id=1237294
  * https://bugzilla.suse.com/show_bug.cgi?id=1237403
  * https://bugzilla.suse.com/show_bug.cgi?id=1237581
  * https://bugzilla.suse.com/show_bug.cgi?id=1237694
  * https://bugzilla.suse.com/show_bug.cgi?id=1237770
  * https://bugzilla.suse.com/show_bug.cgi?id=1238922
  * https://bugzilla.suse.com/show_bug.cgi?id=1238924
  * https://bugzilla.suse.com/show_bug.cgi?id=1239102
  * https://bugzilla.suse.com/show_bug.cgi?id=1239154
  * https://bugzilla.suse.com/show_bug.cgi?id=1239604
  * https://bugzilla.suse.com/show_bug.cgi?id=1239743
  * https://bugzilla.suse.com/show_bug.cgi?id=1239826
  * https://bugzilla.suse.com/show_bug.cgi?id=1239868
  * https://bugzilla.suse.com/show_bug.cgi?id=1239907
  * https://bugzilla.suse.com/show_bug.cgi?id=1240038
  * https://bugzilla.suse.com/show_bug.cgi?id=1240386
  * https://bugzilla.suse.com/show_bug.cgi?id=1240666
  * https://bugzilla.suse.com/show_bug.cgi?id=1240842
  * https://bugzilla.suse.com/show_bug.cgi?id=1241239
  * https://bugzilla.suse.com/show_bug.cgi?id=1241286
  * https://bugzilla.suse.com/show_bug.cgi?id=1241455
  * https://bugzilla.suse.com/show_bug.cgi?id=1241490
  * https://bugzilla.suse.com/show_bug.cgi?id=1242004
  * https://bugzilla.suse.com/show_bug.cgi?id=1242030
  * https://bugzilla.suse.com/show_bug.cgi?id=1242148
  * https://bugzilla.suse.com/show_bug.cgi?id=1242554
  * https://bugzilla.suse.com/show_bug.cgi?id=1242911
  * https://bugzilla.suse.com/show_bug.cgi?id=1243239
  * https://bugzilla.suse.com/show_bug.cgi?id=1243460
  * https://bugzilla.suse.com/show_bug.cgi?id=1243724
  * https://bugzilla.suse.com/show_bug.cgi?id=1243825
  * https://bugzilla.suse.com/show_bug.cgi?id=1244065
  * https://bugzilla.suse.com/show_bug.cgi?id=1244290
  * https://bugzilla.suse.com/show_bug.cgi?id=1245005
  * https://bugzilla.suse.com/show_bug.cgi?id=1245027
  * https://bugzilla.suse.com/show_bug.cgi?id=1245222
  * https://bugzilla.suse.com/show_bug.cgi?id=1245368
  * https://bugzilla.suse.com/show_bug.cgi?id=1246119
  * https://bugzilla.suse.com/show_bug.cgi?id=1246788
  * https://jira.suse.com/browse/MSQA-993
  * https://jira.suse.com/browse/PED-12321

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20250723/7da7ade3/attachment.htm>


More information about the sle-updates mailing list